· Course project: the next deliverable (after the assignment) is the project proposal. I’ve written up a few more guidelines for you to consider as you prepare that proposal.
· I looked up some old course projects and post three here that I considered well done (Sample 1, Sample 2, Sample 3). For all three examples, they defined a specific research problem relevant to the course, reviewed the state-of-the-art, EVALUATED it, and then did something with that information. However, the requirements for the course were different in past years. In some years we had actual mote hardware and the requirement for the project was to implement something. Also, some projects were done as group projects, others as individual projects. I would strongly advise you to NOT simply copy the research problem from one of these samples: as you can tell from the references, some of these reports are from quite a few years ago, so they may not reflect the CURRENT set of “hot” or relevant research topics.
In the Winter 2017 term, Thomas Kunz is teaching a graduate course on Mobile Computing (course description can be found here). As more information becomes available, it will be posted on this page.
· Page with some fun/humorous takes on wireless networks
· Page with news/updates related to wireless networks
· Page with information (hopefully) helpful for doing successful research
As usual in a graduate course, no single textbook covers all the topics we will touch on. However, fairly complete coverages of the course content can be found in:
· Mobile Communications, 2nd edition, by Jochen Schiller, Pearson Education Limited 2003, ISBN 0-321-12381-6.
· Ad Hoc Wireless Networks: Architectures and Protocols, by C. Siva Ram Murthy and B.S. Manoj, Prentice Hall 2004, ISBN 0-13-147023-X (despite the title, it also covers many cellular/WLAN topics briefly).
Also, in particular as a starting point for the course project, you may want to look at the following books (in addition to the references provided in the Appendix section on the website):
Finally, here are links to three open access books on wireless networks/wireless sensor networks that also may be of interest to you:
Course handouts and other information, including assignments (all very much work in progress):
· Course handout (as of December 19, 2016)
· For the course assignments, you will need to design and run networking experiments and analyze the results. You have a choice of either NS2 (an older, widely used network simulator for MANET research in particular) or Cooja (based on Contiki OS, it provides a fairly complete set of relevant protocols for WSN and IoT).
· A guide to installing a Linux Virtual Machine on Windows PCs. Please note that the instructions are from 2 years ago, so the version numbers are not the most recent ones. But the overall set of instructions is still valid. However, should you use the prepared image that you download from the course website, re-install “Guest Additions” (under “Devices”) to ensure it matches your version of VirtualBox.
1. An alternative step-by-step description can be found here
· Some comments on installing NS2
· Cooja/Contiki OS: Alternatively, you can do the assignments with Cooja, the simulator for WSN and based on the Contiki OS (recently re-branded as the Open Source Operating System for the Internet of Things).
· Similar to NS2, you can download a virtual image and use that for your working environment. Follow the instructions on the Getting Started page.
· Once you have the virtual machine up and running, you may have to work on some basic maintenance tasks: update the software to the latest version, install the latest version of VMWare Tools, etc. You will need root privileges for any of that, the root password is the same as the account: user. It should be sufficient to simply follow the prompts.
· Assignment 1 handout (as of January 24). In preparing your experiments and report, you should apply the recommendations from the following papers: Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions, MANET Simulation Studies: The Incredibles, and On the Credibility of Manet Simulations
· This paper provides some of the results you were asked to derive experimentally in an analytical fashion (if you found it and used it, it would have helped to validate your work). The key parameters this paper studies (besides protocol-specific parameters that I rules off-limits) are: number of nodes, packet size, and CSMA/CA vs. CSMA/CA with RTS/CTS.
· I read through all reports and sent individual comments. Again, for your information, here are my comments on factors you plan to study, and also a sample assignment submission from one group that was well done. Overall, the submissions were a bit disappointing: we spent a number of lectures on how to do simulation studies. I also pointed you to a number of papers on how to do this (and what pitfalls to avoid), see above. You should apply these insights and lessons when planning and conducting your own simulation experiments. This will also be true for the second assignment, which again will ask you to design experiments to evaluate some protocol performance using NS2.
Course material (password-protected, will be updated throughout the term):
As the slides will be updated, I will post them here for download and review, as PDF files in an easy-to-print 2 slides per page format. The set of slides includes some I adapted from Prof. Schiller's slides for his textbook.