View
217
Download
0
Category
Tags:
Preview:
Citation preview
Introduction to Mobile Computing -CSE 535 Fall 2007
Sandeep K. S. GuptaSchool of Computing and InformaticsArizona State University
Mobile Computing?
• Computing enabled by presence of wireless enabled portable devices (PDAs, cell phones etc.)
• Many other names/overlapping computing paradigms:– Pervasive Computing– Ubiquitous Computing– Wireless Computing– Embedded Computing
Course GoalTo understand what are the fundamental
challenges in MC and what are some of the solutions towards solving these fundamental challenges
Course Goals - Indirect
• To get you a high-paying job• To enrich you with new ideas• To train you in (mobile) systems oriented
thinking• To prepare you for research/profession in
mobile computing – but more generally – in “adaptive” (next-generation) computer systems
Course Pre-req
• Knowledge of Computer Networks, Operating Systems
• Willingness to learn!
Course/Reference Book(s) + Material1. Fundamentals of Mobile and Pervasive Computing – F.
Adelstein, S. K. S. Gupta, G. G. Richard III, and L. Schwiebert – McGraw Hill.– Book Website – Link at bottom of http://impact.asu.edu
• Reference Books:– Principles of Wireless Networks – Pahlavan and Krishnamurty– Mobile Computing- Imielinski and Korth– Protocols and Architecture for Wireless Sensor Networks - Karl
and Willing– Wireless Sensor Networks – Raghavendra, Znati et al.
• Reading List – posted on the class web site.
Topics – Tentative List• Mobile and Pervasive Computing Application, Services and
Standards
– Mobile Info access and dissemination
– Mobility and Location Management
– Routing and Middleware
– Zigbee, Bluetooth, WiFi
• Wireless Sensor networking, applications and services
– Localization
– Energy-aware routing
• Mobile Security and Privacy– Mobile computing security– Sensor network security
Course Mechanics• Homeworks+Exams+Quizzes: 30%
– Exams – take home– Homeworks – may involve programming – Quizzes – may be un-announced
• Paper presentation: 40%– Presentation, critiquing, discussion (online Google
group), summary• Term Project
– Group– Self-defined (with help of instructor)
– Involves analysis/implementation
Class Format
• Lecture (5-75 min)– As class progresses the lecture time will decrease
(on average)• One or Two Paper presentation (1/2 hr each)
– Starting soon!• 5 min. mid-break – if desired• Note: slides of presenters should be provided
to TA one day in advance.
Class Cyberpresence
• http://impact.asu.edu/~mcn/cse535fa07.html– class assignments– Solutions– Slides– reference material
• Visit regularly for latest information
What can you expect from this course?
• Lots of in-class/ on-line interaction
• Interesting and challenging assignments and exam questions
• Reading technical papers – classical as well as state-of-art
• Technical Writing – critiquing, summarizing
• Help/Tutorials by instructor/TA on difficult material
• And lot more!
Contacting Me or TA• Instructor
– Email: sandeep.gupta@asu.edu• Subject line: CSE535Fa07
– Office: BY 522– Phone: 5-3806– Office Hours: T-TH 4:30-6pm– Call me || come to my office hrs || Set up an appointment– http://impact.asu.edu
• TA Su Kim– Email: su.kim@asu.edu– Office BY517AD– Office Hours: MW 4-5:30pm or by appointment
• What do I do when I am not teaching? – Introduction to IMPACT – Mobile Computing
Lab
Goal:•Pervasive Health monitoring
•Evaluation of medical applications
Features:•Secure, Dependable and Reliable data collection, storage and communication
Sponsor:
Pervasive Health Monitoring
IMPACT: ResearchUse-inspired research in pervasive computing & wireless sensor networking
Goal:• Increasing computing capacity for datacenters
•Energy efficiency
Features:•Online thermal evaluation
•Thermal Aware Scheduling
Sponsor:
Thermal Management for Data Centers
Goal:•Evaluation of crisis response management
Features:•Theoretical model•Performance evaluation
•Access control for crisis management
Sponsor:
Criticality Aware-Systems
Goal:•Container Monitoring for Homeland Security
•Dynamic Supply Chain Management
Features:• Integration of RFID and environmental sensors
•Energy management•Communication security
Sponsor:
Goal:•Protect people’s identity & consumer computing from viral threats
Features:•PKI based•Non-tamperable, non-programmable personal authenticator
•Hardware and VM based trust management
Sponsor:
ID Assurance Intelligent Container
Goal:•Protocols for mobile ad-hoc networks
Features:•Energy efficiency•Increased lifetime•Data aggregation•Localization•Caching•Multicasting
Sponsor:
Mobile Ad-hoc Networks
Medical Devices, Mobile Pervasive Embedded Sensor Networks
BOOK: Fundamentals of Mobile and Pervasive Computing, Publisher: McGraw-Hill Dec. 2004
http://impact.asu.edu
What’s Next?• Chapter 1: Mobile Adaptive Computing• You will be invited to a class Google Group –
please join!– http://groups.google.com/groups/asu_cse535fa07– email: asu_cse535fa07@googlegroups.com
Recommended