EC 687/787 - Mobile Computing (Fall 2013)


Instructor

Prof. Yu Chansu, e-mail: c.yu91@csuohio.edu, Office: SH 331, phone: 2584

Course Information

Download here (including syllabus, grading policy, labs, course schedule, etc.)

Final Exam

Midterm Exam

Class projects

Previous class projects

·         Dan Levtonyuk, Emanuel Papp, Xiang Li, BER Performance of DSSS Technique under Periodic Jamming - Mid-report

 

Example class projects

Lecture notes and Announcements

 

·         Read: Xirrus, 802.11a/b/g Demystified, http://www.xirrus.com/pdfs/Tutorial_802.11abg.pdf, 2008 (excluding page 9).

·         Read: Jim Zyren and Al Petrick, Tutorial on Basic Link Budget Analysis, Intersil Application Note, June 1998.

·         Read: IEEE 802.11 spec (1999), “DSSS PHY specification,” Ch. 15

·         Read: Ns2 manual, “Mobile networking in ns,” Ch. 16 (http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf)

·         Read: Ns2 manual, “Trace and Monitoring support,” Ch. 23

·         Optional reading A. Kamerman and L. Monteban, “WaveLAN-II: A High-Performance Wireless LAN for the Unlicensed Band,” Bell Labs Technical J., pp. 118-133, Summer 1997.

·         Lab -PDR analysis: What is the overall PDR? What is the PDR for WT1-WT2, WT3-WT4 and WT5-WT6? Discuss the results.

·         Lab (optional) Delay analysis: Show the delay.awk. What is the average packet delay? What is the packet delay for WT1-WT2, WT3-WT4, and WT5-WT6? Discuss the results.

·         Read: IEEE 802 spec (1999), “MAC sublayer functional description,” Ch. 9.2

·         Read: System for spatial backoff contention resolution for wireless networks (http://www.freepatentsonline.com/20070214247.pdf)

·         Read “The Universal Handset,” IEEE Spectrum, April 2009 (http://spectrum.ieee.org/computing/embedded-systems/the-universal-handset)

·         Lab

o    Complete the experiment through step 17. Experiment the dial tone example and test with different values of source (frequency and magnitude).

o    In step 6: Where do we add “Throttle” block and why?

o    In step 9: How many dots are there in one cycle?

o    In step 10: How low can you drop the sample rate?

o    In step 15: Explain the parameters for “High Pass Filter”.

o    Add “Noise” block (where to add?) to see its effect on the sound and FFT.

·         Presentation must be based on powerpoint slides (~10 slides)

·         Presentation should be no more than 15 minutes

·         Homework III (Due Oct. 3)

1)       Read: IEEE 802.11 spec (1999), “MAC sublayer management entity,” Ch. 11.1~3

2)       Read the following three articles and compare the three approaches in one page.

o    W. Ye, J. Heidemann, D. Estrin, “An Energy Efficient MAC Protocol for Wireless Sensor Networks,” Infocom, 2002.

o    System for spatial backoff contention resolution for wireless networks (http://www.freepatentsonline.com/20070214247.pdf)

o    Kyle Jamieson , Hari Balakrishnan , Y. C. Tay, Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks, 2003

1)       Complete the experiment through step 17.
a) In steps 1-6, experiment the example and test with different values of source (frequency and magnitude). 
b) In step 9, what should be the appropriate interpolation and decimation rate?
c) Explain the results in step 12.
d) What is the suitable decimation rate in step 13?
e) Explain the results in step 14 and step 15.
f) Explain the test results in step 17.

2)       Read the document entitled “The USRP under 1.5X Magnifiying Lens!” (http://gnuradio.org/redmine/attachments/129/USRP_Documentation.pdf) to know more about the USRP hardware and to answer the following questions.

a)       When running a gnuradio program, it often displays "O" "U" "u" "a" characters on the screen. What do they mean?

b)       USRP does not have a boot ROM. How does it boot itself?

c)       How can we change the FPGA configuration? Which tool can be used?

3)       Read MSR’s RADAR research page and write a one-page essay about it.

·         Homework V (Due Oct. 17)

1) Read “Random Waypoint Considered Harmful” IEEE Infocom, 2003

2) Read “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP” and summarize it in one page.

3) Mobility scenario

a) Read ~/ndep-utils/cmu-scen-gen/setdest/setdest.{cc, h}

b) Report results of step 7 (PDR and plot).

c) In step 8, explain the statistics at the end of the generated mobility file.

d) Discuss the two versions of setdest in step 9. What is the problem with the first version of setdest?

e) Complete and report step 10.

4) Traffic scenario

a) Read ~/ndep-utils/cmu-scen-gen/cbrgen.tcl

b) A different seed in cbrgen.tcl produces different traffic pattern. Discuss what’s been changed (randomized)?

c) Complete and report step 13.

 

1)       Run the simulations for all TX-rate. Obtain the aggregate CBR throughput for each run. And draw a chart drawing throughput versus TX-rate

2)       Research: For the same data rate, change the capture threshold to see its effect on performance

3)       Research: Modify mac-802_11.cc file so that the receiver gets a new packet (p) if Sp/IpktRx>CPThresh. Observe how it improves the performance. Do not forget to explain and discuss the results.

 

·         Lecture notes & Quiz

·         IEEE 802.11 Spec., “MAC Frame Formats,” Ch. 7.1

·         IEEE 802.11 Spec. “DCF & PCF,” Ch. 9.2 & 9.3

·         IEEE 802.11 Spec., “Synchronization & Power Management,” Ch. 11.1 & 11.2

·         IEEE 802.11 Spec., “DSSS PHY specification,” Ch. 15

·         Xirrus, 802.11a/b/g Demystified, http://www.xirrus.com/pdfs/Tutorial_802.11abg.pdf, 2008 (excluding page 9).

·         Jim Zyren and Al Petrick, Tutorial on Basic Link Budget Analysis, Intersil Application Note, June 1998.

·         W. Ye, J. Heidemann, D. Estrin, “An Energy Efficient MAC Protocol for Wireless Sensor Networks,” Infocom, 2002.

·         System for spatial backoff contention resolution for wireless networks

·         Kyle Jamieson , Hari Balakrishnan , Y. C. Tay, Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks, 2003

·         “NAPman: Network-Assisted Power Management for WiFi Devices,” ACM MobiSys 2010

·         “Random Waypoint Considered Harmful” IEEE Infocom, 2003

·         “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP”

·         File: infra.tcl, fil_tcp.awk

·         Homework VII (no report is necessary):

1.       With infra.tcl & fil_tcp.awk, explain when and why throughput changes. Also, describe what you observed with nam animation.

2.       Repeat the same scenario of infra.tcl but with UDP traffic. Plot a chart that compares throughput of TCP, UDP (0.05), UDP (0.01) and UDP (0.005) and discuss the differences.

3.       With the TCP traffic in infra.tcl, trace the variable using the periodic probing method and variable tracing method. Plot the chart that shows both of them and explain the differences between the two methods.

 

·         File: manet-test.tcl, manet-test2.tcl, manet-aodv.sh, manet-dsr.sh, mob, traffic

·         Homework VIII (Due Nov. 21)

·         1) Comparison of MANET routing algorithms

a) Answer questions in step 2: Where are initial positions of the three nodes? When do they start moving? Do they pause some time between movements? What are the three nodes’ first waypoints and their speeds? After reaching the waypoints, when do they move again? In “traffic”, which node is the source and which node is the destination? When does the traffic start? What is the packet size?

b) Describe your observations in step 3 (DSDV). Do you observe that the traffic does not go through in the middle of the simulation but does it as time progresses? What else do you observe? Also, describe your observations with AODV and DSR in steps 5 and 6. Explain the differences.

c) With DSDV, how often does node 0 send the message in step 4? Is this the same for other nodes? Are the message sizes the same? If not, why?

d) Presents PDR, average packet delay, routing control overhead in terms of bytes, and normalized routing overhead of DSDV, AODV and DSR in steps 4, 5 and 6.

e) According to DSR trace file format, which additional information about DSR does the trace tell you?

 2) Performance study in a (relatively) large-scale MANET

a) Plot performance metrics for both DSR and AODV versus pause-times, for each CBR Load. State if any peculiar behavior is observed in steps 8 and 9.

 3) Confidence in your simulation results

a) What is CI with 100% CL?

b) What is the equation for CI corresponding to 99% CL?

c) In step 10, what are the 10 seed numbers (including 1) you used and the 10 delay values? What is the mean and standard deviation of delay measurements? What is your CI with 95% CL? Discuss if this CI is satisfactory.

·         D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, edited by T. Imielinski and H. F. Korth, Kluwer Academic Publishers, 1996.

·         Perkins, C. and Royer, E., “Ad-hoc On-Demand Distance Vector Routing," IEEE Workshop on Mobile Computing Systems and Applications, Feb. 1999

·         Gerla, M. and Chen, T.-W., “Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks,” IEEE Int’ Conf. on Communications (ICC), pp. 70-74, Jun. 2000

 

 

 

Links and Notices


Maintained by Chansu Yu (c.yu91@csuohio.edu)