Mobile and Sensor Systems

Similar documents
Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

ECE 4450:427/527 - Computer Networks Spring 2017

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Mobile and Sensor Systems

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Last Lecture: Data Link Layer

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Network and Mobility

Wireless and Mobile Networks

CSC 4900 Computer Networks: Wireless Networks

CEN 538 Wireless LAN & MAN Networks

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Chapter 6 Wireless and Mobile Networks

Mohammad Hossein Manshaei 1393

Ad Hoc Networks - Applications and System Design

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Wireless and Mobile Networks 7-2

Mobile and Ubiquitous Computing

Home Area Networks. Outline

CSCI-1680 Wireless Chen Avin

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Medium Access Control

Introduction to Wireless Networks

Introduction. Chapter 1: Mobile Communications SS A case for mobility History of mobile communication Market Areas of research

CS 332 Computer Networks Wireless Networks

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

CS263: Wireless Communications and Sensor Networks

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!

M06:Wireless and Mobile Networks. Corinna Schmitt

Mohammad Hossein Manshaei 1393

Wireless Security Background

Mobile and Ubiquitous Computing: Mobile Sensing

What is an Ad Hoc Network?

Computer Networking Background

Addressing: when mobile is moving around. Mobile Registration. Principles of Mobile Routing. Mobility via Indirect Routing

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Architecture and Prototyping of an based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)

Communications Options for Wireless Sensor Networks. Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa

COMP 3331/9331: Computer Networks and Applications

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Wireless Embedded Systems ( x) Ad hoc and Sensor Networks

Mobile devices for wireless

Multi-hop Wireless Network and Its Applications

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

1 Wireless Network Architecture

CSEN 503 Introduction to Communication Networks

RSC Part I: Introduction

Part I. Wireless Communication

Introduction to Computer Networking: Trends and Issues

Wireless Network Security Spring 2011

Wireless Network Security Spring 2013

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

EECS 122 Communications Networks

Current Trends in Wireless Networking. G Santhosh Kumar Cochin University of Science and Technology

GUJARAT TECHNOLOGICAL UNIVERSITY

CSMA based Medium Access Control for Wireless Sensor Network

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

4G Mobile Communications

COMP9336/4336 Mobile Data Networking or ~cs4336. Course Introduction Mahbub Hassan, UNSW 1

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Communications & Networks Introduction

Ad Hoc Networks: Issues and Routing

Chapter 3.1 Acknowledgment:

COMP 3331/9331: Computer Networks and Applications

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Mobile Computing LECTURE # 1

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

CSC 8560 Computer Networks: Wireless and Mobility

Introduction. Computer Networks Term B10

System Challenges for Pervasive and Ubiquitous Computing

CHAPTER 1 INTRODUCTION

Network and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015

MobilityFirst Future Internet Architecture. Samuel Nelson

References. The vision of ambient intelligence. The missing component...

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

Adding Unusual Transports to The Serval Project

Advanced Mobile Communication Networks

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

IT4405 Computer Networks (Compulsory)

DO YOU UTILIZE WIRELESS TECHNOLOGY?

Mobile Communications Chapter 7: Wireless LANs

Module 6: Wireless Mobile Networks

Advanced Mobile Communication Networks

Evaluation of Information Dissemination Characteristics in a PTS VANET

A Glimpse at the Wireless Data Communications Standards. Fanny Mlinarsky 8 August 2007

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Lecture 1 Introduction Pervasive & Mobile Computing MIT 6.883

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Real-Time and Low-Power Wireless Communication with Sensors and Actuators

Outline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.

Wireless and Mobile Networks

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Transcription:

Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo

About Me time

In this course The course will include aspects related to general understanding of Mobile and ubiquitous systems and networks Sensor systems and networks 3

List of Lectures Lecture 1: Introduction to Mobile Systems. Lecture 2: Mobile Medium Access Control and Wireless Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks. Lecture 4: Sensor Systems and MAC Layer Protocols. Lecture 5: Sensor Networking Routing Protocols. Lecture 6: Sensor Systems Reprogramming and Mobile Sensing. Lecture 7: Mobile Phone Sensing. Lecture 8: Practical: Mobile Phone Programming. 4

Teaching Material No required textbook. Some suggested readings: Schiller, J. (2003). Mobile communications. Pearson (2nd ed.). Karl, H. & Willig, A. (2005). Protocols and architectures for wireless sensor networks. Wiley. Agrawal, D. & Zheng, Q. (2006). Introduction to wireless and mobile systems. Thomson. Specific lectures will reference research papers which can be used for additional reading. 5

In this lecture We will describe mobile systems and their applications and challenges. We will start talking about wireless networks. 6

Smart Phones: the Computing Platform of the Future 7

Smart Phones: the Computing Platform 8

Some Numbers 7 billion mobile subscriptions worldwide, estimates The International Telecommunication Union (May 2014). This is equivalent to 95.5 percent of the world population. A billion extra mobile subscriptions in three years, but growth is slowing 2011: 5.9 billion; 2012: 6.2 billion; 2013: 6.7 billion; 2014: 6.9 billion. The number of cellular subscribers surpasses the number of wired phone lines. 9

Mobile Users (Millions) 10

11

Video Traffic 12

Which App 13

Location-based Social Network Systems 14

Geographic Recommender Systems Mirco Musolesi

16

Credit: CNet 17

Fundamental Challenges in Mobile Computing Mobile devices are resource-constrained. Mobile connectivity is highly variable in performance and reliability. Mobile devices are inherently less secure. 18

Mobile Devices are Inherently Resource Constrained Mobile devices rely on batteries. Energy consumption due to: Computation (CPU, co-processors) Display Communication Sensing Energy-efficient algorithms are needed. 19

Mobile Devices are Inherently Resource Constrained Computational constraints But, for example, in the Samsung Galaxy SIII you have1.4 GhZ quadcore Cortex A-9 +GPU Memory constraints But, for example, in the Samsung Galaxy SIII you have1gb or 2GB of RAM 20

Mobile Connectivity is Highly Variable in Performance and Reliability Various types of connectivity: Cellular (GSM, 3G, 4G, etc.) WiFi Bluetooth Near Field Communication (NFC) Constraints related to: Coverage issues Trade-offs: energy consumption, throughput, costs 21

Mobile Devices are Inherently Less Secure Wireless not wired communication: Eavesdropping. Need for encrypted communication. Devices can be stolen: Devices might also be accessible by everyone (for example, sensors). 22

Ubiquitous and Mobile Computing The most profound technologies are those that disappear. Mark Weiser (1952-1999) 23

Copyright: PARC Mirco Musolesi 24

Mirco Musolesi 25

Issues in Designing Mobile Computing Systems Distributed systems issues: Remote communication Fault tolerance Remote information access Distributed security Networking issues: Wireless communication Transport layer for wireless channel 26

Issues in Designing Mobile Computing Systems Databases issues: Disconnected operations Weak consistency Energy issues: Adaptation in terms of communication Intelligent uploading of data Hardware aspects 27

Issues in Designing Mobile Computing Systems HCI issues: Limited interface Interaction with the devices (input, etc.) Ergonomics Privacy issues: Location sharing Activity recognition Security issues: Encrypted communication 28

Wireless and Mobile Networks Two important (but different) challenges wireless: communication over wireless link mobility: handling the mobile user who changes point of attachment to network 29

Elements of a wireless network network infrastructure wireless hosts v laptop, PDA, IP phone v run applicamons v may be stamonary (non- mobile) or mobile wireless does not always mean mobility 30

Elements of a wireless network network infrastructure base stamon typically connected to wired network relay - responsible for sending packets between wired network and wireless host(s) in its area e.g., cell towers, 802.11 access points v v 31

Elements of a wireless network network infrastructure wireless link typically used to connect mobile(s) to base stamon also used as backbone link mulmple access protocol coordinates link access various data rates, transmission distance v v v v 32

Wireless rate vs distance 33

Elements of a wireless network network infrastructure infrastructure mode base stamon connects mobiles into wired network handoff: mobile changes base stamon providing connecmon into wired network v v 34

Elements of a wireless network ad hoc mode v no base stamons v nodes can only transmit to other nodes within link coverage v nodes organize themselves into a network: route among themselves 35

Wireless network taxonomy infrastructure (e.g., APs) no infrastructure single hop host connects to base stamon (WiFi, WiMAX, cellular) which connects to larger Internet no base stamon, no connecmon to larger Internet (Bluetooth, ad hoc nets) mulmple hops host may have to relay through several wireless nodes to connect to larger Internet: mesh net no base stamon, no connecmon to larger Internet. May have to relay to reach other a given wireless node MANET, VANET 36

Suggested Readings Mark Weiser. The Computer for the 21th Century. Scientific American. September 1991. Mark Weiser. Some Computer Issues in Ubiquitous Computing. Communications of the ACM. Vol. 36. Issue 7. July 1993. M. Satyanarayanan. Pervasive Computing: Vision and Challenges. IEEE Personal Communications. Vol. 8 Issue 4. August 2001. Chapter 6 of James F. Kurose and Keith W. Ross Computer Networking. A Top Down Approach. 6 th Edition. Pearson 2012. 37

Acks Some material for the slides of this course has been contributed by: Dr Christos Efstratiou, Dr Nicholas Lane, Dr Mirco Musolesi, Dr Sarfraz Nawaz. 38