Wireless & Mobile Networking CS 752/852 - Spring 2011

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
Autonomous Mobile Mesh Networks and their Design Changes.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
CS541 Advanced Networking 1 Wireless Mesh Networks Neil Tang 1/26/2009.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
ECE 4450:427/527 - Computer Networks Spring 2015
1 Wireless Networking & Mobile Computing ECE 256, CS 215 Spring 2009 Romit Roy Choudhury Dept. of ECE and CS.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
بسم الله الرحمن الرحيم. Wireless Mesh Network (WMN) Izzeldin Shibeika – April, UNCC -
Cross Layer Design (CLD) for Wireless Networks. Future Wireless Systems Nth Generation Cellular Wireless Internet Access Wireless Video/Music Wireless.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
1 Wireless Networking & Mobile Computing ECE 256, CS 215 Spring 2012 Romit Roy Choudhury Dept. of ECE and CS.
1 Wireless Networking & Mobile Computing ECE Spring 2007 Romit Roy Choudhury Dept. of ECE and CS.
Mid Term Review. Mid Term Tue, April 1 –Open Book –Open papers –Open laptop In class exam –Duration 1hour 15 minutes Exam level –Not too easy, not too.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
1 Wireless Networking & Mobile Computing ECE 256, CS 215 Spring 2011 Romit Roy Choudhury Dept. of ECE and CS.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Routing Metrics for Wireless Mesh Networks
MAC Protocols that use directional Antennas
Helsinki University of Technology
Wireless MAC.
Routing Metrics for Wireless Mesh Networks
AODV-OLSR Scalable Ad hoc Routing
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Chapter 16 Mobile Networking in ns
Wireless Sensor Network (WSN)
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-channel, multi-radio wireless networks
Wireless and Mobile Ad Hoc Networks
Wireless Networking & Mobile Computing ECE 256, CS 215 Spring 2011
CS 457 – Lecture 7 Wireless Networks
Smart University utilising the concept of the Internet of Things (IoT) Simon Downes BSc MBCS Carlene Campbell March 2018.
Routing Metrics for Wireless Mesh Networks
Wireless Body Area Network (WBAN)
Lecture 45 Review of Lectures Dr. Ghalib A. Shah
Wireless and TCP: Performance Issues
MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802
The Impact of Multihop Wireless Channel on TCP Performance
Study of performance of regular TCP in MANETs (using simulator).
Multi-channel, multi-radio
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Routing in Mobile Ad-hoc Networks
Multi hop connections using
Multi hop connections using
EEL 6935 Wireless Ad Hoc Networks
User Cooperation for Improving Spatial Spectral Utilization in Multhop Wireless Networks March 1, 2006 Chansu Yu 3/1/2006 NEONet 2006.
A Distributed Clustering Scheme For Underwater Sensor Networks
Computer Networks: Wireless Networks
Wireless and TCP: Performance Issues
Presentation transcript:

Wireless & Mobile Networking CS 752/852 - Spring 2011 Course Conclusion Tamer Nadeem Dept. of Computer Science

Big Picture Microsoft, Intel, Cisco … Internet Mesh Networks and Wireless Backbones Microsoft, Intel, Cisco … Personal Area Networks Motorola, Intel, Samsung … RFID and Sensor Networks Citywatchers, Walmart Intel, Philips, Bosch …

The OSI Communication Model

Wireless Networking /Mobile Computing Applications that exploit ubiquity and mobility. Challenges underlying such applications Ubiquitous Services Incentives Application Privacy Security Eavesdropping Loss Discrimination Transport Mobility Energy Savings Network MAC / Link Spatial Reuse Interference Mgmt. PHY Enabling wireless ubiquity. Showing what is feasible, and what is not … Channel fluctuations

What did we cover during the last 15 weeks? PHY Fundamentals MAC Schemes (TDMA, CSMA, ZMAC) Multi Rate, Channel, and Radio Networks Directional Antennas Topology & Mobility Control Ad Hoc Routing Wireless TCP

What did we cover during the last 15 weeks? Offloading and Smart AP Wireless Management Sensing and Monitoring Localization Location Privacy Device Identification Wireless Security

Take away from the course Wireless Networking MAC Layer Routing Layer Transport Layer Mobile Computing Wireless Management Smart Phone monitoring and sensing Location privacy and security Reviews, Presentations, and Project

Challenges in MAC Layer Take away: MAC Layer Challenges in MAC Layer Multiple Channel Access Control CSMA/CA Hidden/Exposed Nodes 802.11 DCF RTS/CTS, Carrier Sense Range, Interference Range Contention Windows Transmission Bit Rate Exploit temporal and spatial diversity Multi rate/channel/radio Directional Antenna Topology and Mobility Control

Take away: Routing/Transport Layer Challenges in Routing/Transport Layer Limited wireless transmission range Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Packet losses due to transmission errors TCP cannot classify the cause of loss Addressing Routing/Transport issues Proactive vs. Reactive schemes Basic Routing Schemes: Flooding, DSR, AODV, LAR Advanced routing metrics and schemes Link layer and connection split for TCP issues TCP aware vs. un-aware schemes Receiver based vs. Sender based TCP control

Take away: Mobile Computing Wireless Management Channel Hopping and Overlapping Enterprise Network Coordination Sensing and Monitoring Measuring and mining wireless activity Localization and Location Privacy Indoor vs. Outdoor localization Physical vs. Logical localization CacheCloak solution Wireless Security and Device Identification Link layer encryption Routing misbehavior PHY vs Application layer for device identification

Take away: Reviews, Presentations, and Project Less the amount of text the better your presentation Illustrations, animations, and videos As graduate students you should be able to demo and sell your work Projects Build stuff and get interesting results Hands-on experience with mobile and pervasive systems Papers if you continue working on it

I enjoyed teaching this course  Conclusion I enjoyed teaching this course 