View
214
Download
1
Category
Preview:
Citation preview
1
Wireless Networking & Mobile Computing
ECE 256, CS 215
Spring 2011
Romit Roy ChoudhuryDept. of ECE and CS
2
Course LogisticsCourse ThemeCourse StructureCourse LoadClosing Thoughts
3
Course LogisticsCourse ThemeCourse StructureCourse LoadClosing Thoughts
4
Welcome to ECE 256
Timings: M/W 1:15pm to 2:30pm Location: 125 Hudson Hall Course TA: Arpan Roy
Friday 1:30 to 3:00pm, Hudson 213
Insructor: Romit Roy ChoudhuryPh.D from UIUC, 2006Research in Networks, Dist Sys,
Mobile Comp.
Email me at romit.rc@duke.eduVisit me at 203 Hudson Hall
5
Welcome to ECE 256
Prerequisite: ECE 156 or CS 114Else, come and talk to me
Prereqs. strongly encouraged, not mandatory Few students in past have taken 256 without
156•Were in senior year and very passionate about
networking
•Read 156 material on their own
Any of you low on prerequisites?
6
Welcome to ECE 256
Grading: Presentation/Participation: 10% Homework (Paper reviews, etc.): 20% 1 mid-term exam: 20% Semester-long project: 50%
7
Welcome to ECE 256
Class broadcast email:ece_256_01@ee.duke.edu
Course Website:http://www.ee.duke.edu/~romit/courses/s11/ece256-sp11.html Most course related information will be posted on the
website
Please check course website frequently
8
Welcome to ECE 256
Make up classes Will need to travel now and then Would have to schedule make-up classes
9
Course LogisticsCourse ThemeCourse StructureCourse LoadClosing Thoughts
10
Shifting Trends
The edge of the Internet becoming wireless
Single hop networks
Multi-hop networks
11
Many Benefits due to Wireless
Significantly lower cost No cable, low labor cost, low maintenance
Ease Scatter and play
Unrestricted mobility Unplugged from power outlet
Ubiquity Available like water/electricity - holy grail
12
Changing Face of Mobile Devices
Small, powerful, and sensor-embedded Always with us … always on Shifting from reactive to proactive computing
13
If everything goes right, the future will be
“A concious invisible Internet hanging from a passive, visible Internet …”
14
The Future
Internet
15
The Future
RFID and Sensor Networks
Citywatchers, WalmartIntel, Philips, Bosch …
Personal AreaNetworks
Motorola, Intel,Samsung …
Mesh Networks andWireless Backbones
Microsoft, Intel, Cisco …Internet
16
But, what does it take for that mobile/wireless future to become feasible?
17
Research
PHY
MAC / Link
Network
Transport
Security
ApplicationIncentives
Channel fluctuations
Spatial Reuse
MobilityEnergy Savings
EavesdroppingLoss Discrimination
Privacy
Ubiquitous Services
Interference Mgmt.
Enabling wireless ubiquity.Showing what is feasible, and
what is not …
Enabling wireless ubiquity.Showing what is feasible, and
what is not …
Applications that exploit ubiquity and mobility.
Challenges underlying such applications
Applications that exploit ubiquity and mobility.
Challenges underlying such applications
18
Research
PHY
MAC / Link
Network
Transport
Security
ApplicationIncentives
Channel fluctuations
Spatial Reuse
MobilityEnergy Savings
EavesdroppingLoss Discrimination
Privacy
Ubiquitous Services
Interference Mgmt.
Wireless Networking
Wireless Networking
MobileComputing
MobileComputing
19
This Course
Introduces fundamentals of wireless channel The departure from wired networks … Emerging innovations in EE, communications area
Exposes implications on protocol design At MAC, Network, Transport, Security Investigates gap between idea and and actual system Considers theoretical aspects
Envisions new mobile computing applications Identifies challenges underlying them Resolves these challenges into a full system solution
Allows you to design/develop your own ideas Ideally extending the state of the art
20
At the End of this Course …
You understand Physical layer (radios, rate, antennas, channels) MAC protocols (who gets the chance to talk) Cross-Layer protocols (interference cancellation, OFDM …) Routing (path selection algorithms and issues) Reliability (wireless congestion control, rate control)
Applications (social networks, personal networks, P2P networks) Sensing Systems
• Localization (extracting the location of a device)• Mobility (how it helps and disrupts communication)• Interfaces (phones are more than communication devices)• Privacy (how to protect a user from being tracked)
Energy-awareness (how it percolates various network functions) Capacity (what is feasible, what are performance bounds)
21
What this Course Does Not Cover
Not a wireless communications course Does not cover
Modulation schemes Transmitter/Receiver design Signal processing and antenna design Source coding / channel coding Etc.
This is course on Design, analysis, and implementation of
protocols and algorithms in (mobile) wireless network systems
22
Some other Thoughts
Dilemma1. Teach very advanced stuff for the networking
pro2. Teach from absolute scratch for the
uninitiated
I will try to strike a balancePlease bear with me if materials are
sometimes too easy/difficult for YOU
23
Course LogisticsCourse ThemeCourse StructureCourse LoadClosing Thoughts
24
Course Structure
I will present most lectures and papers You present once in entire semester (30
minutes) 2 students present in one class
For every class, read 2 of assigned papers Write reviews for each and email TA before class Bring printed copy to class A random set of reviews will be graded :)
Several recommended readings Make an effort to read them I understand that you cannot do so always
25
Course Structure
1 open-book mid term, No Final Exam Tentative date of mid-term: End march/early
April
Semester-long class project In groups of 2 (max 3) Focus on this from early on
Class ends with a final project poster/demo Submit conference-style paper Prize for 3 best projects
•Potentially funded by industry
26
Course LogisticsCourse ThemeCourse StructureCourse Load (reading, presenting, discussing, project)
Closing Thoughts
27
Participation / Presentation
Ask lots of questions. Period. I strongly encourage you to ask, disagree,
debate
Class presentation You present one paper (30 minutes) Pick an open slot (ones not marked “Romit”)
•Earlier you pick, more options you have to choose from•Deadline is Jan 26, 2011
Email me your choice of paper (and date) Don’t worry about not knowing the topic of ppt
•When its time to present, you will know enough
28
Reading Assignment
Read the papers assigned for reading Critic / Review them carefully Reviews should not be more than a page
Email reviews to TA + Bring a hard copy to class
Random set of reviews will be graded I might upload selected reviews on a webpage
29
Thoughts on Reading Papers
Know why you are reading the paper Reading for absorbing concepts (class assignment)
•Read fully, think, reread, ask, challenge
Reading for excitement (deciding project topic)•Read initial parts, don’t try to understand everything, get
a feel
Reading for problem identification •Read the problem carefully
Reading to discriminate (before finalizing project)•Read solution, ensure your ideas different, analyse
performance
MostImportant
MostImportant
30
Course Research Projects
Examples of projects from past PhonePoint Pen Location Proof Smart Antenna Multicast Automatic Video Highlights Ambient Aware Ringtones AAMPL: Accelerometer based Localization …
31
Course Research Projects
Projects consist of 3 parts: Problem identification Solution design Performance evaluation
Each paper you read is someone’s project Many papers are actually student’s class
projects Read them critically Ask yourself
• Is the problem really important ? Should you care ?• Is the solution sound ? Under what assumptions? Do
you have other (better) ideas ?• Is evaluation biased ? Are reults shown only in good
light?
32
More on Projects
Discuss your thoughts, ideas with me They need not be cooked, and can have many
flaws Statistically, every 18 ideas lead to one decent
idea
If you like an area / direction Read many many related papers
Don’t try to come up with a quick solution Ensure your problem is a new, real problem Finding the solution is typically easy
33
More on Projects
Protocol evaluation typically requires coding Think what you would like to do Options are:
•Coding on real devices (like sensors, phones, routers)
•Coding in existing network simulators (ns2, Qualnet, etc.)
•Coding your own simulator
•Theoretical projects involve MATLAB, CPLEX, etc.
Project ideas take time to “marinate” Think now and then … Spending 2 hours for 10 days much better than 10
hours for the last 2 days
34
More on Projects
Find a project partner early Discuss reviews, papers, potential project
themes
Class project often bottlenecked by platform Think of evaluation platform during project
selection If you are not familiar with the Linux OS, it’s a
bad idea to do a project involving router-prorgamming
35
More on Projects
Microsoft Research developing a cloud that offers access to sophisticated services and data for researchers and application developers.
ECE 256 will have access to Hawaii Microsoft already provided Windows 7 phones Access to the cloud services
Visit http://research.microsoft.com/en-us/um/redmond/projects/hawaii/
36
Course LogisticsCourse ThemeCourse StructureCourse LoadClosing Thoughts
37
Some Closing Thoughts
This class is about research Be active, ask questions, debate, and disagree
Don’t worry too much about grades It does not matter as much as you think
Read a lot - this is a hot research area If you are hunting for MS/PhD area, read even
more
Interact with me Even if you have ZERO clue of what’s going on
38
Hello! I am ECE 256
Any Questions?
39
ECE 256 Assignment 1
Watch:
Assignment Due: Jan 26Group work allowedTheater preferred, TV acceptable
40
Questions ?
Recommended