8/25: Administrative issues. Basics/Introduction. Medium Access Control: MAC1 (Aloha, CSMA)
Reference
material:
8/28: Ad-hoc networks – MAC2 (RTS/CTS, 802.11)
Reference
material:
9/1: Labor Day – institute holiday
9/4: MAC3- 802.11 analysis. (Assignment1 distributed in class.)
Reference
material:
9/8: Connectivity and Capacity (Recent results by Gupta and Kumar):
- Threshold for asymptotic connectivity for one-dimensional network
- Extension to the case of two-dimensional network
- Approximate capacity analysis
- Implications
Reference
material:
- Text notes distributed in class pp.456-476
- Class notes (explanation of derivations)
9/11: MAC in sensor networks
Reference material:
- Wei Ye, John Heidemann, and Deborah Estrin, “Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks,” Technical Report ISI-TR-567, USC/Information Sciences Institute (accepted in IEEE Transactions on Networking), January, 2003. (presentation slides: S-MAC.ppt)
9/15: (Invited speaker: Prof. Koushik Kar) Link
Scheduling: theory and applications.
9/18: (Invited speaker: Prof. Koushik Kar) Link
Scheduling: theory and applications.
Reference material:
- Text notes distributed in class
9/22: Reactive Routing in Ad hoc networks; Assignment1 due; Assignment2.
Reference material:
-
Lecture Slides
-
David B. Johnson and
David A. Maltz. Dynamic
Source Routing in Ad Hoc Wireless Networks. In Mobile
Computing, edited by Tomasz Imielinski and Hank Korth, chapter5, pages
153–181. Kluwer Academic Publishers, 1996.
-
Perkins,
C.E.; Royer, E.M Ad-hoc on-demand distance vector routing., Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA
'99. Second IEEE Workshop on , 25-26 Feb. 1999 Page(s): 90 –100
-
Perkins,
C.E.; Royer, E.M.; Das, S.R.; Marina, M.K. Performance comparison of two on-demand routing
protocols for ad hoc networks, Personal Communications, IEEE [see also IEEE Wireless Communications], Volume: 8 Issue: 1 , Feb. 2001, Page(s): 16 -28
9/25: Analysis of
Reactive Routing
Reference material:
- N. Zhou, H. Wu and A. Abouzeid, “Reactive Routing Overhead in Networks with Unreliable Nodes,” Proceedings of MobiCom 2003, San Diego, CA, September 2003.
9/29: Reactive Routing Analysis (Cont’d); Location-aided Routing; Assignment2 due.
Reference Material:
- S. Basagni et al., "A distance routing effect algorithm for mobility (DREAM)," Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), 1998, p 76-84
- Young-Bae Ko and Nitin H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks," Wireless Networks, Vol.6, 2000.
- D. Niculescu and B. Nath, "Trajectory based forwarding and its applications," Proceedings of MobiCom 2003, San Diego, CA, September 2003.
- Stojmenovic, I.; Xu Lin "Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks" IEEE Transactions on Parallel and Distributed Systems, Volume: 12 Issue: 10 , Oct. 2001 Page(s): 1023 –1032
- Brad Karp , H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” Proceedings of the sixth annual international conference on Mobile computing and networking August 2000.
10/2: Midterm1
10/6: Hierarchical Routing1
Reference Material:
- E. M. Belding-Royer, “Multi-level hierarchies for scalable ad hoc routing,” Wireless Networks, Volume 9, Issue 5 (September 2003) Pages: 461 - 478
10/9: Hierarchical Routing2; Assignment3
Reference Material:
- A.B. McDonald and T.F. Znati, “A mobility-based framework for adaptive clustering in wireless ad hoc networks,” IEEE Journal on Selected Areas in Communications, Volume: 17 Issue: 8, Aug. 1999 ,
Page(s): 1466 –1487.
10/14: (Tuesday). Power-aware routing.
- Suresh Singh, Mike Woo and C. S. Raghavendra, “Power Aware Routing in Mobile Ad Hoc Networks,” Proceedings of the 4th annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 181-190, October 1998.
10/16: Mobility
models for ad-hoc networks. Assignment3 due
- Tracy Camp, Jeff Boleng and Vanessa Davies, “A survey of Mobility Models for Ad Hoc Network Research,” Wireless Communication and Mobile Computing (WCMC): Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol.2, No.5, pp. 483-502, 2002.
10/20: Mobility models for ad-hoc networks (Cont’d)
10/23: An in-depth analysis of the long-run behavior of a mobility model.
-Jungkeun Yoo,Mingyan Liu, B. Noble, “Random Waypoint Considered
Harmful,” Proceedings of INFOCOM’2003.
10/27: Transport protocols in ad-hoc networks.
- K. Chandran,
S. Raghunathan, S. Venkatesan and R. Prakash, “A Feedback Scheme for Improving
TCP Performance in Ad-Hoc Wireless Networks,” IEEE Personal Communications,
February 2001.
10/30: Transport
Protocols for sensor networks
-
F. Stann and J. Heidemann, “RMST:
Reliable Data Transport in Sensor Networks,” Proceedings of SNPA, May 2003.
11/3: Transport Protocols
for sensor networks (Cont’d)
- Y.
Sankarasubramaniam, O.B. Akan and I.F. Akyildiz, “ESRT: Event-to-Sink Reliable Transport in
Wireless Sensor Networks,” Proceedings of MobiHoc’2003. Presentation Slides.
11/6: Sensor Networks
Applications: Exposure Problems.
-
V. Phipatanasuphorn and P. Ramanathan, “Vulnerability
of Sensor Networks to Unauthorized Traversal and Monitoring,” to appear, IEEE Transactions on Computers, 2003.
- also see: T. Clouqueur, P. Ramanathan
and K.K Saluja, “Analysis
of exposure of target activities in a sensor network with obstacles”
11/10: PROJECT DUE;
Project Presentations;
11/13: Project Presentations Assignment4
11/17: Sensor Networks Applications: Target Tracking.
- Sundeep Pattem, Sameera Poduri, and Bhaskar
Krishnamachari, "Energy-Quality
Tradeoffs for Target Tracking in Wireless Sensor Networks," 2nd
Workshop on Information Processing in Sensor Networks, IPSN, Palo Alto,
California, April 2003
11/20: Security in Wireless Ad hoc Networks; Assignment4 due
- L. Buttyan
and J.-P. Hubaux, “Nuglets:
a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc
Networks,”
Technical Report No. DSC/2001/001, EPFL, January 2001.
- S. Buchegger and J.-Y. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks,” in Proceesdings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
- S. Buchegger and J.-Y. Le Boudec,
“Performance
Analysis of the CONFIDANT Protocol,” in Proceedings of MobiHoc 2002.
11/24:. MidtermII Assignment5
11/27: Thanksgivings
holiday- no classes
12/1:
12/4: Assignment5 due