MoNet ECSE6962 Fall’03 Class Schedule

 

8/25: Administrative issues. Basics/Introduction. Medium Access Control: MAC1 (Aloha, CSMA)

         Reference material:

 

8/28: Ad-hoc networks – MAC2 (RTS/CTS, 802.11)

         Reference material:

 

9/1: Labor Day – institute holiday

9/4: MAC3- 802.11 analysis. (Assignment1 distributed in class.)

         Reference material:

 

9/8:  Connectivity and Capacity (Recent results by Gupta and Kumar):

         - Threshold for asymptotic connectivity for one-dimensional network

         - Extension to the case of two-dimensional network

         - Approximate capacity analysis

         - Implications

         Reference material:

- Text notes distributed in class pp.456-476

- Class notes (explanation of derivations)

9/11: MAC in sensor networks

Reference material:

- Wei Ye, John Heidemann, and Deborah Estrin, “Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks,” Technical Report ISI-TR-567, USC/Information Sciences Institute (accepted in IEEE Transactions on Networking), January, 2003. (presentation slides: S-MAC.ppt)

 

 

9/15: (Invited speaker: Prof. Koushik Kar) Link Scheduling: theory and applications.

9/18: (Invited speaker: Prof. Koushik Kar) Link Scheduling: theory and applications.

Reference material:

- Text notes distributed in class

 

 

9/22: Reactive Routing in Ad hoc networks; Assignment1 due; Assignment2.

Reference material:

-      Lecture Slides

-      David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter5, pages 153–181. Kluwer Academic Publishers, 1996.

-      Perkins, C.E.; Royer, E.M  Ad-hoc on-demand distance vector routing., Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on , 25-26 Feb. 1999 Page(s): 90 –100

-      Perkins, C.E.; Royer, E.M.; Das, S.R.; Marina, M.K. Performance comparison of two on-demand routing protocols for ad hoc networks, Personal Communications, IEEE [see also IEEE Wireless Communications], Volume: 8 Issue: 1 , Feb. 2001, Page(s): 16 -28

9/25: Analysis of Reactive Routing

Reference material:

- N. Zhou, H. Wu and A. Abouzeid, “Reactive Routing Overhead in Networks with Unreliable Nodes,” Proceedings of MobiCom 2003, San Diego, CA, September 2003.

 

9/29: Reactive Routing Analysis (Cont’d); Location-aided Routing; Assignment2 due.

Reference Material:

-      Slide Presentaion

-      S. Basagni et al., "A distance routing effect algorithm for mobility (DREAM)," Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), 1998, p 76-84

-      Young-Bae Ko and Nitin H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks," Wireless Networks, Vol.6, 2000.

-      D. Niculescu and B. Nath, "Trajectory based forwarding and its applications," Proceedings of MobiCom 2003, San Diego, CA, September 2003.

-      Stojmenovic, I.; Xu Lin "Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks" IEEE Transactions on Parallel and Distributed Systems, Volume: 12 Issue: 10 , Oct. 2001 Page(s): 1023 –1032

-      Brad Karp , H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” Proceedings of the sixth annual international conference on Mobile computing and networking August 2000.

10/2: Midterm1

10/6: Hierarchical Routing1

Reference Material:

-      CBRP IETF Draft

-      CBRP presentation

-      E. M. Belding-Royer, “Multi-level hierarchies for scalable ad hoc routing,” Wireless Networks, Volume 9, Issue 5  (September 2003) Pages: 461 - 478 

 

10/9: Hierarchical Routing2; Assignment3

Reference Material:

- A.B. McDonald and T.F. Znati, “A mobility-based framework for adaptive clustering in wireless ad hoc networks,” IEEE Journal on Selected Areas in Communications, Volume: 17 Issue: 8, Aug. 1999 ,

Page(s): 1466 –1487.

 

 

10/14: (Tuesday).  Power-aware routing.

-      Suresh Singh, Mike Woo and C. S. Raghavendra, “Power Aware Routing in Mobile Ad Hoc Networks,” Proceedings of the 4th annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 181-190, October 1998.

-      Lecture Notes

 
 

10/16:  Mobility models for ad-hoc networks. Assignment3 due

-      Tracy Camp, Jeff Boleng and Vanessa Davies, “A survey of Mobility Models for Ad Hoc Network Research,” Wireless Communication and Mobile Computing (WCMC): Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol.2, No.5, pp. 483-502, 2002.

 

 

10/20: Mobility models for ad-hoc networks (Cont’d)

10/23: An in-depth analysis of the long-run behavior of a mobility model.

-Jungkeun Yoo,Mingyan Liu, B. Noble, “Random Waypoint Considered Harmful,” Proceedings of INFOCOM’2003.

 

10/27: Transport protocols in ad-hoc networks.

         - K. Chandran, S. Raghunathan, S. Venkatesan and R. Prakash, “A Feedback Scheme for Improving TCP Performance in Ad-Hoc Wireless Networks,” IEEE Personal Communications, February 2001.

10/30: Transport Protocols for sensor networks

         - F. Stann and J. Heidemann, “RMST: Reliable Data Transport in Sensor Networks,” Proceedings of SNPA, May 2003.

 

11/3: Transport Protocols for sensor networks (Cont’d)

         - Y. Sankarasubramaniam, O.B. Akan and I.F. Akyildiz, “ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks,” Proceedings of MobiHoc’2003. Presentation Slides.

11/6: Sensor Networks Applications: Exposure Problems.

         - V. Phipatanasuphorn and P. Ramanathan, “Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring,” to appear, IEEE Transactions on Computers, 2003.

         - also see: T. Clouqueur, P. Ramanathan and K.K Saluja, “Analysis of exposure of target activities in a sensor network with obstacles

 

11/10: PROJECT DUE; Project Presentations;

11/13: Project Presentations Assignment4

 

 11/17: Sensor Networks Applications: Target Tracking.

         - Sundeep Pattem, Sameera Poduri, and Bhaskar Krishnamachari, "Energy-Quality Tradeoffs for Target Tracking in Wireless Sensor Networks," 2nd Workshop on Information Processing in Sensor Networks, IPSN, Palo Alto, California, April 2003

 

11/20: Security in Wireless Ad hoc Networks; Assignment4 due

         - L. Buttyan and J.-P. Hubaux, “Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks,”
Technical Report No. DSC/2001/001, EPFL, January 2001.

- S. Buchegger and J.-Y. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks,” in Proceesdings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

- S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol,” in Proceedings of MobiHoc 2002.

 

11/24:. MidtermII Assignment5

11/27: Thanksgivings holiday- no classes

 

12/1:

12/4:  Assignment5 due