Wireless & Mobile Networking CS 752/852 - Spring 2011 Course Conclusion Tamer Nadeem Dept. of Computer Science
Big Picture Microsoft, Intel, Cisco … Internet Mesh Networks and Wireless Backbones Microsoft, Intel, Cisco … Personal Area Networks Motorola, Intel, Samsung … RFID and Sensor Networks Citywatchers, Walmart Intel, Philips, Bosch …
The OSI Communication Model
Wireless Networking /Mobile Computing Applications that exploit ubiquity and mobility. Challenges underlying such applications Ubiquitous Services Incentives Application Privacy Security Eavesdropping Loss Discrimination Transport Mobility Energy Savings Network MAC / Link Spatial Reuse Interference Mgmt. PHY Enabling wireless ubiquity. Showing what is feasible, and what is not … Channel fluctuations
What did we cover during the last 15 weeks? PHY Fundamentals MAC Schemes (TDMA, CSMA, ZMAC) Multi Rate, Channel, and Radio Networks Directional Antennas Topology & Mobility Control Ad Hoc Routing Wireless TCP
What did we cover during the last 15 weeks? Offloading and Smart AP Wireless Management Sensing and Monitoring Localization Location Privacy Device Identification Wireless Security
Take away from the course Wireless Networking MAC Layer Routing Layer Transport Layer Mobile Computing Wireless Management Smart Phone monitoring and sensing Location privacy and security Reviews, Presentations, and Project
Challenges in MAC Layer Take away: MAC Layer Challenges in MAC Layer Multiple Channel Access Control CSMA/CA Hidden/Exposed Nodes 802.11 DCF RTS/CTS, Carrier Sense Range, Interference Range Contention Windows Transmission Bit Rate Exploit temporal and spatial diversity Multi rate/channel/radio Directional Antenna Topology and Mobility Control
Take away: Routing/Transport Layer Challenges in Routing/Transport Layer Limited wireless transmission range Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Packet losses due to transmission errors TCP cannot classify the cause of loss Addressing Routing/Transport issues Proactive vs. Reactive schemes Basic Routing Schemes: Flooding, DSR, AODV, LAR Advanced routing metrics and schemes Link layer and connection split for TCP issues TCP aware vs. un-aware schemes Receiver based vs. Sender based TCP control
Take away: Mobile Computing Wireless Management Channel Hopping and Overlapping Enterprise Network Coordination Sensing and Monitoring Measuring and mining wireless activity Localization and Location Privacy Indoor vs. Outdoor localization Physical vs. Logical localization CacheCloak solution Wireless Security and Device Identification Link layer encryption Routing misbehavior PHY vs Application layer for device identification
Take away: Reviews, Presentations, and Project Less the amount of text the better your presentation Illustrations, animations, and videos As graduate students you should be able to demo and sell your work Projects Build stuff and get interesting results Hands-on experience with mobile and pervasive systems Papers if you continue working on it
I enjoyed teaching this course Conclusion I enjoyed teaching this course