· The final exam will be written in SA 304
· Remaining presentation schedule:
· March 30: Securing IOT against DoS attacks using SDN
· March 30: Energy harvesting aware routing protocols in wireless sensor networks
· April 4: Multi-Constrained QoS in Highly Mobile Ad Hoc Networks
· Project: throughout the term, I’ve provided comments and suggestions on the final project, in particular on the project proposals and the assignments. Please make sure that you read and adhere to these comments (posted below) as much as possible. Some additional thoughts:
· The project does NOT require you to actually run any simulations. If you do so, it would be a bonus, but that should not be the focus of your efforts.
· The project does, however, expect you to identify a research problem and review and evaluate the state-of-the-art solutions to that problem. Once you know the strengths and weaknesses of existing solutions, PROPOSE a new solution that would arguable advance the current state-of-the-art. You have to explain in what way you think your proposal would improve on the existing work. So a generic project structure/outline would be
· Problem Statement (keep it short, maybe 1 page)
· Review of State-of-the-Art (at most 10 pages)
1. Evaluation Criteria
2. Brief Description of Selected Solutions that claim to address the problem
3. Evaluation: strengths, weaknesses, shortcomings, gaps. Note that one possible outcome is that certain approaches may be quite good/cover most of the researched problem and should therefore be used as a basis for future work. Another outcome of course could be that none of the proposals is really satisfactory. And then there are all the possibilities in between.
· Research Proposal (remaining pages)
1. Outline of your proposal
2. Discussion of expected benefits over previously reviewed solutions (based on the evaluation criteria defined earlier)
3. Description of research plan: how would you demonstrate that your proposal does indeed have the expected benefits? Simulations? Testbed implementations? Provide some details such as specific scenarios, tools to use in a testbed implementation, etc.
· References (within 15 pages for total report)
In the Winter 2017 term, Thomas Kunz is teaching a graduate course on Mobile Computing (course description can be found here). As more information becomes available, it will be posted on this page.
· Page with some fun/humorous takes on wireless networks
· Page with news/updates related to wireless networks
· Page with information (hopefully) helpful for doing successful research
As usual in a graduate course, no single textbook covers all the topics we will touch on. However, fairly complete coverages of the course content can be found in:
· Mobile Communications, 2nd edition, by Jochen Schiller, Pearson Education Limited 2003, ISBN 0-321-12381-6.
· Ad Hoc Wireless Networks: Architectures and Protocols, by C. Siva Ram Murthy and B.S. Manoj, Prentice Hall 2004, ISBN 0-13-147023-X (despite the title, it also covers many cellular/WLAN topics briefly).
Also, in particular as a starting point for the course project, you may want to look at the following books (in addition to the references provided in the Appendix section on the website):
Finally, here are links to three open access books on wireless networks/wireless sensor networks that also may be of interest to you:
Course handouts and other information, including assignments (all very much work in progress):
· Course handout (as of December 19, 2016)
· For the course assignments, you will need to design and run networking experiments and analyze the results. You have a choice of either NS2 (an older, widely used network simulator for MANET research in particular) or Cooja (based on Contiki OS, it provides a fairly complete set of relevant protocols for WSN and IoT).
· A guide to installing a Linux Virtual Machine on Windows PCs. Please note that the instructions are from 2 years ago, so the version numbers are not the most recent ones. But the overall set of instructions is still valid. However, should you use the prepared image that you download from the course website, re-install “Guest Additions” (under “Devices”) to ensure it matches your version of VirtualBox.
1. An alternative step-by-step description can be found here
· Some comments on installing NS2
· Cooja/Contiki OS: Alternatively, you can do the assignments with Cooja, the simulator for WSN and based on the Contiki OS (recently re-branded as the Open Source Operating System for the Internet of Things).
· Similar to NS2, you can download a virtual image and use that for your working environment. Follow the instructions on the Getting Started page.
· Once you have the virtual machine up and running, you may have to work on some basic maintenance tasks: update the software to the latest version, install the latest version of VMWare Tools, etc. You will need root privileges for any of that, the root password is the same as the account: user. It should be sufficient to simply follow the prompts.
· Assignment 1 handout (as of January 24). In preparing your experiments and report, you should apply the recommendations from the following papers: Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions, MANET Simulation Studies: The Incredibles, and On the Credibility of Manet Simulations
· This paper provides some of the results you were asked to derive experimentally in an analytical fashion (if you found it and used it, it would have helped to validate your work). The key parameters this paper studies (besides protocol-specific parameters that I rules off-limits) are: number of nodes, packet size, and CSMA/CA vs. CSMA/CA with RTS/CTS.
· I read through all reports and sent individual comments. Again, for your information, here are my comments on factors you plan to study, and also a sample assignment submission from one group that was well done. Overall, the submissions were a bit disappointing: we spent a number of lectures on how to do simulation studies. I also pointed you to a number of papers on how to do this (and what pitfalls to avoid), see above. You should apply these insights and lessons when planning and conducting your own simulation experiments. This will also be true for the second assignment, which again will ask you to design experiments to evaluate some protocol performance using NS2.
· Assignment 2 handout. There are also three papers referenced in the assignment handout, you can access them here: paper 1, paper 2, paper 3. In addition to the individual feedback, here are some overall comments and observations.
· Final Exams: here are example final exams from previous years, together with a sample solution (i.e., possible or expected answers):
· I looked up some old course projects and post three here that I considered well done (Sample 1, Sample 2, Sample 3). For all three examples, they defined a specific research problem relevant to the course, reviewed the state-of-the-art, EVALUATED it, and then did something with that information. However, the requirements for the course were different in past years. In some years we had actual mote hardware and the requirement for the project was to implement something. Also, some projects were done as group projects, others as individual projects. I would strongly advise you to NOT simply copy the research problem from one of these samples: as you can tell from the references, some of these reports are from quite a few years ago, so they may not reflect the CURRENT set of “hot” or relevant research topics.
· Feedback on project proposals: I summarized some key observations in this document. It points to a “style guide” that I have written for my own graduate students. Please adhere to the advice/rules in this document when preparing your final report (would also be helpful for the assignment report, but I will pay more attention in the final report for the course project).
Course material (password-protected, will be updated throughout the term):
As the slides will be updated, I will post them here for download and review, as PDF files in an easy-to-print 2 slides per page format. The set of slides includes some I adapted from Prof. Schiller's slides for his textbook.