Wireless networks have gone through an unprecedented growth in the past few years, and will continue to play an indispensable role in future data communication. In the first part of the course, you will learn fundamentals in wireless networks ranging from physical layer to application layer. In the second part of the course, we will discuss research challenges and state-of-art approaches in medium access, routing, transport protocols, topology control, location management, wireless network management and security. Through class lectures, homework, paper reading, and presentation, you will gain a broad understanding of the current technology and research efforts in wireless networking, as well as further developing skill for oral presentation and writing research critiques. In addition, students are expected to accomplish a well-defined research project in a group of 2-3 to obtain experience in designing and evaluating protocols and/or techniques for wireless networks.
Mid-term (25%): This is the only exam we will have.
Homework (30%): All the homework are due before class. Homework takes one of the following three forms: (i) paper-pencil exercises, (ii) programming assignments, and (iii) paper reviews. For the second half of the class, we will discuss two papers per class. You are expected to read both papers, and write a detailed review for one paper of your choice for each class. Please use this review form template for your reviews.
Class participation (5%): You are expected to attend all the classes. If you cannot come to the class for some reason, please let me know in advance. Everyone is expected to contribute to class discussion, share opinions, and ask interesting questions.
Course project (40%): A major component in this course is to accomplish a well-defined research project in the area of wireless networking. You can work in a group of 2 to define and complete a project. I will hand out a list of project ideas for you to choose from. You also have the option to come up with your own topic, which needs to be approved by me. You are expected to write a mid-point report, a final report, and also present your work in class. Your grade will be based on your project reports and oral presentation in terms of originality, quality of execution, and clarity of presentation.
We will strictly enforce UTCS code of conduct.
Required textbook: Mobile Communications by Jochen Schiller, Addison-Wesley
Recommended references:
Wireless Communications: Principles and Practice by Theodore S. Rappaport, Prentice Hall
802.11 Wireless Networks: The Definitive Guide by Matthew Gast
Many of the readings in this course are from online conference proceedings and journals.
Our course mailing list is cs395t-wireless2006@lists.cc.utexas.edu.
To subscribe, send an email to
listproc@lists.cc.utexas.edu
with the following message in the email body:
subscribe cs395t-wireless2006
YourFirstName YourLastName
To unsubscribe, send an email message to
listproc@lists.cc.utexas.edu
with the following message in the email body:
unsubscribe cs395t-wireless2006
The subject field of your messages is ignored.
Date | Topics |
Reading material |
Part 1: Introduction to wireless networks | ||
8/30 | Course Overview and Physical Layer (ppt, pdf) | Schiller Chapter 2 |
9/4 |
Labor Day |
|
9/6 | Introduction to MAC and IEEEE 802.11 (ppt,pdf) | Suggested readings: 802.11 Wireless Networks: The Definitive Guide, Chapter 2 & 3 V. Bharghavan, A. Demers, S. Shenker , and L. Zhang. MACAW: A Media Access Protocol for Wireless LANs , In Proc. ACM SIGCOMM , London, U.K., September 1994, pp. 212-225. IEEE 802.11 standard [pdf] |
9/8 | Channel assignment and channel hopping (ppt,pdf) | Suggested readings: Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind, Srinivasan, William Arbaugh. A Client-driven Approach for Channel Management in Wireless LANs. IEEE Infocom, Barcelona, Spain, 2006. Victor Bahl, Ranveer Chandra, and John Dunagan. SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad-Hoc Wireless Networks Proc. of ACM Mobicom 2004, Sept.-Oct. 2004. |
9/11 | Presentations by Mi Kyung Han and Eric Rozner | |
9/18 | Power control and rate control (ppt,pdf) | Suggested readings: Roger Wattenhofer, Li Erran Li, Victor Bahl and Yi-Min Wang, Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks. Proc. of IEEE INFOCOM, pages 1388-1397, April 2001. Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, and Andrzej Duda. Performance Anomaly of 802.11b. In Proc. of IEEE INFOCOM, March 2003. Starsky H.Y. Wong, Hao Yang, Songwu Lu, and Vaduvur Bharghavan. Robust Rate Adaptation in 802.11 Wireless Networks. In Proc. of ACM Mobicom, Sept, 2006. |
9/20 | Multi-radio (ppt,pdf) | Suggested readings: A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou, A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks, IEEE Conference on Broadband Networks (BroadNets), Oct. 2004. Allen Miu, Hari Balakrishnan, and Can Emre Koksal. Improving Loss Resilience with Multi-Radio Diversity in Wireless Networks. In Proc. of ACM MobiCom 2005, Aug. - Sept., 2005. E. Shih, P. Bahl, and M. Sinclair. Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices. In Proc. of ACM Mobicom, 2002. |
9/22 | Introduction to network layer, mobile IP, and naming (ppt, pdf) | Suggested readings: Schiller Chapter 8.1 Charles E. Perkins, "Mobile Networking through Mobile IP." IEEE Internet Computing, January 1998. Pages 58-69 Persistent Personal Names for Globally Connected Mobile Devices. Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, and Robert Morris. In Proc. of OSDI, Nov. 2006. |
9/25 | Routing in mobile
networks (Adopted from Nitin Vaidya's tutorial pdf) |
Suggested readings: David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, 1996. Charles E. Perkins and Elizabeth M. Royer. Ad hoc On-Demand Distance Vector Routing. Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100. Charles E. Perkins and Pravin Bhagwat,"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers." Proc. of ACM SIGCOMM, August 1994, London, United Kingdom. |
10/2 | Transport protocol in wireless networks (ppt,pdf) | Suggested readings: Hari Balakrishnan, Venkat Padmanabhan, Srinivasan Seshan, and Randy H. Katz. A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. IEEE/ACM Transactions on Networking, December 1997. Hung-Yun Hsieh, Kyu-Han Kim, Yujie Zhu, and Raghupathy Sivakumar. A Receiver-Centric Transport Protocol for Mobile Hosts with Heterogeneous Wireless Interfaces. In Proc. of MobiCom 2003, Sept. 2003. |
Part 2: Different types of wireless networks | ||
10/4 | Wireless mesh networks (ETX, WCETT, ExoR, XORs) | Douglas S. J. De Couto, Daniel Aguayo, John Bicket,
Robert Morris.
A High-Throughput Path Metric for Multi-Hop Wireless Routing.
Proc. of ACM Mobicom 2003. Richard Draves, Jitendra Padhye, and Brian Zill. Routing in Multi-radio, Multi-hop Wireless Mesh Network. Proc. of ACM Mobicom 2004. |
10/9 |
Sanjit Biswas, and Robert Morris.
ExOR: Opportunistic Multi-Hop Routing for Wireless Networks
In Proc. of ACM SIGCOMM, August 2005.
Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft. XORs in the Air: Practical Wireless Network Coding. In Proc. of ACM SIGCOMM, September 2006. |
|
10/11 | Sensor networks (GPSR, BVR) | Brad Karp, and H. T. Kung.
Greedy Perimeter Stateless Routing for Wireless Networks, In
Proc. of MobiCom 2000, Aug. 2000. Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee, David Culler, Scott Shenker, Ion Stoica. BVR: Beacon Vector Routing Scalable Point-to-Point Routing in Wireless Sensor Networks. In Proc. of NSDI, May 2005. Suggested reading: Cheng Tien Ee, Rodrigo Fonseca, Sukun Kim, Daekyeong Moon, and Arsalan Tavakoli, David Culler, Scott Shenker, Ion Stoica. A Modular Network Layer for Sensornets. In Proc. of OSDI, Nov. 2006 |
10/16 | Mid-term | |
10/18 | Sensor networks (ppt, pdf) |
A. Kamra, V. Misra, J. Feldman, D. Rubenstein.
Growth Codes: Maximizing Sensor Network
Data Persistence. In Proc. of ACM SIGCOMM, Sept. 2006. Cheng Tien Ee, Sylvia Ratnasamy, Scott Shenker. Practical Data-Centric Storage In Proc. of NSDI, May 2006. |
10/23 | Cellular networks (ppt, pdf) | Schiller Chapter 4 Zhenyun Zhuang, Tae-Young Chang, Raghupathy Sivakumar, Aravind Velayutham. A3: Application-Aware Acceleration for Wireless Data Networks. In Proc. of ACM MOBICOM, Sept. 2006. |
10/25 | Delay tolerant networks | Yong Wang, Sushant Jain, Margaret Martonosi, and
Kevin Fall.
Erasure Coding Based Routing for Opportunistic Networks. In
Proc. of Workshop on delay tolerant networking and related networks. A. Seth, D. Kroeker, M. Zaharia, S. Guo, and S. Keshav. Low-cost Communication for Rural Internet Kiosks Using Mechanical Backhaul. In Proc. of ACM Mobicom, Sept. 2006. |
10/30 | RFID and WiMax (ppt,pdf) | Schiller Chapter 7.5 M. Kodialam and Thyaga Nandagopal. Fast and Reliable Estimation Schemes in RFID Systems. In Proc. of ACM Mobicom, Sept. 2006. A. Ghosh, D. Wolter, J. G. Andrews, and R. Chen. Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential. IEEE Communication Magazine, Feb. 2005. |
Part 3: Wireless network management and security | ||
11/1 | Localization | Yu-Chung Cheng, Yatin Chawathe, Anthony LaMarca, and
John Krumm.
Accuracy Characterization for Metropolitan-scale Wi-Fi Localization.
In Proc. of ACM MobiSys 2005, June 2005. Saikat Guha, Rohan Narayan Murty and Emin Gun Sirer. Sextant: A Unified Framework for Node and Event Localization in Sensor Networks. In Proc. of MobiHoc 2005, May 2005. |
11/6 | Wireless network usage studies | Magdalena Balazinska and Paul Castro.
Characterizing Mobility and Network Usage in a Corporate Wireless
Local-Area Network. In Proc. of ACM MobiSys 2003. Aditya Akella, Glenn Judd, Srinivsan Seshan, and Peter Steenkiste. Self-Management in Chaotic Wireless Deployments Proc. of ACM Mobicom 2005. Aug. - Sept. 2005. |
11/8 | Wireless network diagnosis | Atul Adya, Victor Bahl, Ranveer Chandra, and Lili
Qiu.
Architecture and Techniques for Diagnosing Faults in IEEE 802.11
Infrastructure Networks. Proc. of DACM MOBICOM 2004, Sept. 2004. Ranveer Chandra, Venkata Padmanabhan, Ming Zhang. WiFiProfiler: Cooperative Diagnosis in Wireless LANs. In Proc. of ACM MOBISYS, June 2006. |
11/13 | Y. Cheng, J. Bellardo, P. Benko, A. C. Snoeren, G.
M. Voelker, and S. Savage.
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis.
In Proc. of ACM SIGCOMM, Sept. 2006. R. Mahajan, M. Rodrig, D. Wetherall, J. Zahorjan. Analyzing the MAC-level Behavior of Wireless Networks in the Wild In Proc. of ACM SIGCOMM, Sept. 2006. Anmol Sheth, Christian Doerr, Richard Han, Dirk Grunwald, and Douglas Sicker. MOJO: A Distributed Physical Layer Anomaly Detection System for 802.11 WLANs In Proc. of ACM MOBISYS, June 2006. |
|
11/15 | Wireless network security | Nikita Borisov, Ian Goldberg, and David Wagner.
Intercepting Mobile Communications: The Insecurity of 802.11.
Proc. of ACM Mobicom, 2001. Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, and Brian Zill. Enhancing Security of Corporate Wi-Fi Networks Using DAIR. In Proc. of ACM MOBISYS, June 2006. |
11/20 | Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy
Wood.
The Feasibility of launching and detecting jamming attacks in
wireless networks. In Proc. of ACM MobiHoc 2005. Maxim Raya, Jean-Pierre Hubaux, and Imad Aad. Domino: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. Proc. of ACM MobiSys 2004. |
|
11/22 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly.
Denial of Service Resilience in Ad Hoc Networks. In Proc. of ACM
MobiCom 2004, Sept. 2004. Ratul Mahajan, Maya Rodrig, David Wetherall, and John Zahorjan. Sustaining Cooperation in Multi-hop Wireless Networks. In Proc. of NSDI, May 2005. Yih-Chun Hu, Adrian Perrig, and David Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proc. of ACM Mobicom, Sept. 2002. |
|
11/27 | Chuanxiong Guo, Helen J. Wang, and Wenwu Zhu.
Smart Phone Attacks and Defenses. Proc. of HotNets III, 2004. Patrick Traynor, William Enck, Patrick McDaniel, Thomas La Porta. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. In Proc. of ACM MOBICOM, Sept. 2006. |
|
11/29 | Project Presentation | |
12/4 | Project Presentation | |
12/6 | Project Presentation |