535 Mobile Computing (Fall 2007)
|| T, TH 1:40 P.M. - 2:55 P.M. BYAC 190
|| Sandeep Gupta
||Su Jin Kim(Su.Kim@asu.edu)
|TA Office Phone
|TA Office Hour
||MW 4:00-5:30pm or by appointment
- To join the class blog, please send email to the TA (firstname.lastname@example.org) with your name and google account. You will receive the invitation to your google account.
- The book, fundamentals of mobile and pervasive computing, has been put in the noble science library. It will be available from Sep. 4th. The loan period for this book is 4-hours in order to give chance to all students.
The electronic version (not final version like the book) will be posted based on the class schedule.
- The tinyos programming assignments (from the second homework) will be group assignments. You should form your group (3-4 members) with classmates and send an email to the TA (email@example.com) including the full names and asu ids of all members asap. If you can not find a member or group, please send an email to the TA. We will try to assign a group randomly for you.
Each group will have a kit with a programming board, serial cable, 4 mica2 motes and 2 sensor boards.
- Students can use a machine in BY531AB for tinyos programming assignment. There is a sign up sheet on the desk. Please come and sign up first.
- The paper presentation schedule has been updated. Remember we have extended classes from 1:40pm to 3:10pm on Nov. 15 and 20.
Goal and Topics
The need for information anywhere anytime has been a driving force for the increasing growth in Web and Internet technology, wireless communication, and portable computing devices. The field of mobile computing is the merger of these advances in computing and communication with the aim of providing seamless and ubiquitous computing environment for mobile users. Mobile computing environments are characterized by severe resource constraints and frequent changes in operating conditions. This has led to many new and challenging problems which span several areas of computer science such as incorporation of support for mobility in network protocols, development of efficient and adaptive resource management techniques for wireless bandwidth and battery power, predicting mobility patterns, performance modeling and simulation of mobile applications, and supporting mobile real-time multimedia applications.
The goal of this course is to provide an in depth understanding of the fundamental problems in the area of mobile computing and study the existing and proposed solutions for these problems from both research and development perspective. Several topics including wireless communication, location management and mobility tracking,
location-aware information services, and mobile agents will be covered in this course. The course will be mostly self contained and will cover any required background material. Course work will involve programming and homework assignments, exams/quizzes, and term project.
The course topics will be covered through lectures and student paper presentations. At the beginning of the semester, students will be given a list of papers
organized by topics and are required to do the following:
- Presentation: Each student will choose one papers that he or she is going to present to the class.
The TA will announce the presentation schedule later.
There will be one or two paper presentations in each class.
A presenter is required to submit a summary and the presentation slides 24 hours before the presentation.
- Critique: For each paper, there will be 3 designated critics.
A critic is required to submit his or her critique of the presentation as well as the paper.
The latter will be posted on the course web.
- Inclass and online discussion: Students can ask questions during presentation. Besides, the class will also discuss the paper on a class blog (will be released later via email).
Students will be evaluated based on their participation in the discussion.
- Summary: There will be a student designated to summarize the online discussion of each paper. The summary will be posted on the course web as well.
To sum up, each student will do at least 1 paper presentation, 3 critiques, 1 paper summary, and online and inclass paper discussion. The performance and participation in each process of paper study will constitute a major portion of the class grade. Depending on the class enrollment, each student may present 2 papers.
Another major portion of the class grade will be based on the term project. Each student will conduct in-depth research on a mobile computing topic of his/her choice for the term project.
- Phase I: In Phase I of the research, the student will choose a topic to work on in consultation with the instructor and submit a written report per the requirements.
- Phase II: In Phase II of the research the student will thoroughly survey the selected topic, define a research problem related to the chosen topic, propose a solution and submit a written report
per the requirments.
- Phase III: In Phase III, the student evaluates the solution using mathematical analysis,
simulation, and/or implementation. A student is required to make an oral presentation on his/her
accomplishments for the term project in either one of the last two classes and submit a written report
at the time of final exam. More details on term projects will be discussed in class. Requirments
There will be a final exam based on the course material covered in the class.
The following grading rubric will be used to evaluate all the submitted material and performance tasks:
A+: Student shows superior understanding of purpose and significance of the problem; is able to identify
related problems; has solved the problem using novel approach and insight.
A: Student shows good understanding of purpose and significance of the problem; is able to identify related problems;
has solved the problem displaying some degree of insight.
B: Student can solve the problem with some sophistication but is unable to judge its importance.
C: Student lacks understanding of how to approach the problem or proposes very naive solutions for the problem.
The final letter grade will be assigned based on weighted average of the grades obtained in the following categories:
Notice: the above description is not finalized and subject to change. Student should check back this
page on a regular basis.
| phase I
| phase II
| phase III
|Quiz, home, exam
||HW1 description, reference,
Matlab Sources: matlab_code.zip (for version 2007),matlab_code_65.zip (for version 6.5)
||HW2 description, How to program on a mica2 mote
hw2.zip, HW2_skel.java, Groups
|Phase I: Proposal
|Phase II report
|Phase III report
Context-aware Migratory Services in Ad Hoc Networks
||Introduction to Class;
||Overviews of Mobile Computing and Wireless Sensor Networks
Chap.1 in the text book, Fundamentals of Mobile and Pervasive Computing
(without figures, not final version of the book)
||Overviews of Wireless Communications and Energy-efficiency in Wireless Sensor Networks
Beyond Batteries: Storing Power in a Sheet of Paper Options
||Wireless Networking: Mobile IP and Power Issues in WSN
Chap.2 Location Management in the text book
||Localization in Wireless Sensor Networks
The zip file for videos is about 66MB. If you want to watch the movies included in the presentation, please download and unzip it.
||Localization in Wireless Sensor Networks
||TCP on Mobile Computing
Improving the performance of reliable transport protocols in mobilecomputing environments, IEEE Journal on Selected Areas in Communications, 1995
||Application-aware Adaptive Computing
Agile Application-Aware Adaptation for Mobility, SOSP'97
||Projects in IMPACT Lab.
||Botanical Garden by Ken (firstname.lastname@example.org)|
Ayushman: Pervasive Health Monitoring System and Testbed by Krishna (email@example.com)
Kids Networks by Su (firstname.lastname@example.org)
||Location Management and Introduction to TinyOS
||draft of HW#2|
TinyOS, Programming TinyOS
||Cache consistency maintenance
A Strategy to Manage Cache Consistency in a Disconnected Distributed Environment by Anurag Kahol, Sumit Khurana, Sandeep K.S. Gupta, and Pradip K. Srimani
||Cache consistency maintenance
Basic Probability & Queuing Theory
||Location Management and Optimazations in Mobile Networks
||Reviews of Probability and Markov Chains and Mobility Models for Mobile Computing
||Meeting for a Project Proposal
||Context-aware Computing & Ad hoc/sensor networks
||Security in Wireless Sensor Networks
||Localization from mere connectivity, A Passive Approach to Sensor Network Localization
||MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking, Location Estimation in Ad-Hoc Networks with Directional Antennas
||Experiments on local positioning with Bluetooth, Energy-Aware Adaptive Routing for Large-Scale Ad Hoc Networks: Protocol and Performance Analysis
||sushma, Jay(ppt), Jay(pptx)|
||Context-Aware Mobile Computing: Learning Context-Dependent Personal Preferences from a Wearable Sensor Array,COOP - A cooperative caching service in MANETs,GPS-Free Node Localization in Mobile Wireless Sensor Networks
||Fine-Grained Network Time Synchronization using Reference Broadcasts, Network Layer Support for Service Discovery in MANETs, Location Management in Cellular Networks: Classification of the Most Important Paradigms, Realistic Simulation Framework, and Relative Performance Analysis
||Robust Distributed Detection Using Low Power Acoustic Sensors,
Automatic target detection using a ground-based passive acoustic sensor,Broadband Wireless Media Access Control from 802.11 to 802.16
||Ecolocation: A Sequence Based Technique for RF Localization in Wireless Sensor Networks
- Fundamentals of Mobile and Pervasive Computing by S. K. S. Gupta, F. Adelstein, G. Richard and L. Schweibert
POLICY ON CHEATING
- from UC Berkeley
- by Matt Welsh
- by Robert Szewczyk
- Lecture on TinyOS ()
- Lecture notes on Crossbow Mica Motes ()
- Presentations from that took
place in Boston from the 15-16 of Jan 2004
- Presentations on TinyOS from
the tutorial session that took place in , San Fransisco
- System Architecture
Directions for Networked Sensors () by J. Hill, R. Szewczyk, A. Woo, S.
Hollar, D. Culler and K. Pister
- Active Message
Communication for Tiny Networked Sensors () by P. Buonadonna, J. Hill, and D. Culler
- A Network-Centric Approach
to Embedded Software for Tiny Devices () by R. Szewczyk, A. Woo, P. Buonadonna, J.
Hill, and D. Culler
Any incidence of cheating in this class will be severely dealt with. This applies to homework assignments, programming assignments, quizzes and tests. The minimum penalty for cheating will be that the student will not obtain any credit for that particular assignment. (This means that if in a test and/or assignment a student is found have cheated, he/she will obtain zero in that test and/or assignment.) For the homework and the programming assignments students may discuss the problems with others, but one is expected to turn in the results of one's own effort (not the results of a friend's efforts). One tends to get very suspicious if two identically wrong results show up in the homework assignment and/or tests. The names of the offenders will be maintained in the departmental files. The repeat offenders may be debarred from the University.