· The lecture part of the class is over, I posted a copy of the final exam and my sample solution below.
· It was pointed out to me that the course handout had two (different) due dates for the course project: April 16 and April 20. The version posted below has this fixed: the final report is due Monday, April 20, at noon, to be submitted via e-mail. I do NOT require a hardcopy.
· I’ve re-produced my comments on the project proposals that I had posted lower before, please make sure you take these into account when working on your reports:
1. References should not simply be websites/links. The majority should be academic papers (i.e., they were published in an academic journal or conference proceedings). Also, please provide all necessary bibliographic info (name of journal, page numbers, month/year or volume/issue, etc.). If you are unclear what constitutes a complete reference, please consult either the IEEE Style Guide or, as an example, this page (the list of my own publications).
2. In the text, you need to provide (in the final version) references to your references. It is not a paper you reference if you do not REFER to it in the text. So only list papers in the “Reference” section that you referred to in the body of the document. You can choose to order your references either in the order of occurrence or by ordering them alphabetically, sorted by last name of the first author.
3. The project does NOT require you to actually run any simulations. If you do so, it would be a bonus, but that should not be the focus of your efforts.
4. The project does, however, expect you to identify a research problem and review and evaluate the state-of-the-art solutions to that problem. Once you know the strengths and weaknesses of existing solutions, PROPOSE a new solution that would arguable advance the current state-of-the-art. You have to explain in what way you think your proposal would improve on the existing work. So a generic project structure/outline would be
· Problem Statement
· Review of State-of-the-Art
· Evaluation Criteria
· Brief Description of Selected Solutions that claim to address the problem
· Evaluation: strengths, weaknesses, shortcomings, gaps. Note that one possible outcome is that certain approaches may be quite good/cover most of the researched problem and should therefore be used as a basis for future work. Another outcome of course could be that none of the proposals is really satisfactory. And then there are all the possibilities in between.
· Research Proposal
· Outline of your proposal
· Discussion of expected benefits over previously reviewed solutions (based on the evaluation criteria defined earlier)
· Description of research plan: how would you demonstrate that your proposal does indeed have the expected benefits? Simulations? Testbed implementations? Provide some details such as specific scenarios, tools to use in a testbed implementation, etc.
5. In selecting the points of comparison, you should try to beat/compare with the strongest possible existing solution. Do not pick an obvious straw man case (a solution that everyone knows is weak). The latter is only advisable IF that weak solution is an established standard way of solving the research problem. And in that case you would include it PLUS whatever you deem to be the best existing proposed solution…..
the Winter 2015 term, Thomas Kunz is teaching a
graduate course on Mobile Computing (course description can be found here). As more
information becomes available, it will be posted on this page.
Some humorous links with information loosely connected to the course:
· For a funny take on computers and mobile devices, check out My Blackberry isn’t working, which uses very British humour, so look at it at your own risk… To understand one of the puns: Orange is a cellular service provider in the UK.
· Here is another little fun fact: some academic colleague was successful publishing a journal paper with very little content. Even better, some 33 years later or so, others managed to publish a follow-up paper. However, in this course, I’ll expect a bit more content J.
· In the category of funny academic papers, here is another one. It is probably funnier once you had experience with the academic review process yourself though.
· We touch on security/encryption quite a bit in this course, if you want to learn the basic terminology, check out Bob and Alice (in particular this external link, which has a humorous description/introduction to the topic).
· Here is a link to the humorous description of Kerberos, a widely popular distributed authentication protocol
· Another topic we talk about in class are standards. Here is a funny story about the consequences of standards.
· There is also a whole slew of RFCs to describe IP over Avian Carriers (goes to show that the IETF can have some fun as well J)
Some more factual/technical links:
· The Google project to provide wireless broadband services to underserviced regions is called Loon.
· We talked about spectrum auctions earlier in the term. Here is an article from The Globe and Mail (January 27) that touches on that topic as well, and how the rules for the upcoming auction have been set to advantage smaller players.
· According to Wikipedia, IPv4 address space is exhausted in some regions of the world: Three of the five RIRs have exhausted allocation of all the blocks they have not reserved for IPv6 transition; this occurred for the Asia-Pacific on 15 April 2011, for Europe on 14 September 2012, and for Latin America and the Caribbean on 10 June 2014.
· IEEE Spectrum (January 2012) has an interesting overview article on LTE. One of the more interesting tidbits of information is right up front: smartphones can require as much as 115 MB/hour of bandwidth!
· An interesting networking paper is "End-to-End Arguments in System Design" by Saltzer et al. (which, according to Google Scholar, has been cited over 2400 times as of November 2014), and the key argument/principle also has its own Wikipedia entry
· And in terms of writing papers, here is a great blog entry about why some employers at least care about grammar/writing skills
As usual in a graduate course, no single textbook covers all the topics we will touch on. However, fairly complete coverages of the course content can be found in:
· Mobile Communications, 2nd edition, by Jochen Schiller, Pearson Education Limited 2003, ISBN 0-321-12381-6.
· Ad Hoc Wireless Networks: Architectures and Protocols, by C. Siva Ram Murthy and B.S. Manoj, Prentice Hall 2004, ISBN 0-13-147023-X (despite the title, it also covers many cellular/WLAN topics briefly).
Also, in particular as a starting point for the course project, you may want to look at the following books (in addition to the references provided in the Appendix section on the website):
Some relevant links to get you started thinking about your research project:
Finally, here are links to three open access books on wireless networks/wireless sensor networks that also may be of interest to you:
Reading papers, preparing presentations: the course will require you to (among other things) read papers, prepare a presentation, and engage in a course project, training your research skills. To prepare for these tasks, you should consult a number of online references on how to go about this (preparing a GOOD presentation or project report takes substantial effort):
· IEEE Computer, September 2005, had an interesting article on Presentation Skills.
· Another useful reference is the website Advice on Research and Writing and the Graduate Study in the Computer and Mathematical Sciences: A Survival Manual website.
· On the other hand, avoid the pitfalls identied in How to Have a Bad Career in Research/Academia.
· A lengthy but very interesting talk by Richard Hamming on what it takes to be a great researcher.
· An interesting editorial on what higher education should be about.
Plagiarism is unfortunately a not too infrequent problem in academia. I expect all submissions to clearly identify what sources/references have been used for what part of your submission. If you are unsure as to what constitutes plagiarism, please check this website.
Course handouts and other information, including assignments (all very much work in progress):
· A guide to installing a Linux Virtual Machine on Windows PCs
· An alternative step-by-step description can be found here
· Some comments on installing NS2
· Avoid the pitfalls documented in this paper, in particular (but not only) the comments on output analysis
· When writing your report, ensure that you use proper English. For starters, there is little gained if you have a lot of data and insights, but cannot explain your results. Also, the careful editing and proofreading of your work is also an indication of how careful you are in your work, see here for an argument why this matters outside academia as well.
· Mathematical analysis for IEEE 802.11 throughput: Bianchi’s 2000 paper.
· Please make sure that you take the feedback from Assignment 1 into consideration when working on this assignment.
Course material (password-protected, will be updated throughout the term):
As the slides will be updated, I will post them here for download and review, as PDF files in an easy-to-print 2 slides per page format. The set of slides includes some I adapted from Prof. Schiller's slides for his textbook, a few slides are from the Tutorial on Wireless Sensor Networks by Deborah Estrin, Akbar Sayeed, and Mani Srivastava, and some slides are prepared by Nitin Vaidya for his tutorials on Mobile Ad Hoc Networks: Routing, MAC and Transport Issues and TCP for Wireless and Mobile Hosts: