|
Announcements
Class Calender
Staff
|
Announcements
- 04/14/13 - The Monday class on April 15, 2013 is canceled. Classes will be resumed on Monday April 22nd, 2013.
- 04/14/13 - The project's Results Report is due Sunday April 21st, 2013.
- 04/14/13 - The project's presentation and project's Final Report are due Monday April 29th, 2013.
- 03/22/13
- Reading and presentation papers for the rest of classes starting
Monday March 25th are listed on the Class Calendar. Each student need
to send me his/her selection of 4 papers (on different days) from the presentation list by March 22nd, 2013 8:00pm.
- 03/15/13 - The Monday class on March 18, 2013 is canceled due to the travel to PerCom'13 conference. Classes will be resumed on Monday March 25th, 2013.
- 03/15/13 - The deadline of the project's Progress Report was due on Friday March 15th, 2013. Please submit the report as soon as possible if you haven't done that yet.
- 03/15/13 - The deadline of the Survey Paper is due on Friday April 5th.
- 02/25/13 - Today's class is canceled due to the travel to HotMobile'13 workshop. A make-up class will be scheduled.
- 02/07/13 - The deadline of the survey paper's topic selection is Friday Feb 8th, 2013.
- 02/07/13 - The deadline of the project's team selection is Friday Feb 8th, 2013.
- 02/07/13 - Deadlines and instructions for the class Survey paper and the term-project could be found here and here. Please check them since some deadlines are around the corner. Let me know if you have any question.
- 01/31/13 - Starting Feb 4th, 2013, the class location is moved to ECSB (Computer Science Building), room #3316.
- 01/31/13
- Reading and presentation papers for classes up to the Spring Break
are listed on the Class Calendar. Each student need to send me his
selection of 4 papers (on different days) from the presentation list by
Friday Feb 1st, 2013 11:59pm.
- 01/14/13 - Class' webpage is up. Please check for frequent updates/announcements
Course Description
In recent years, wireless and mobile communications have seen an
explosive growth both in terms of the number of services provided and
the types of technologies that have become available.
This course covers various topics
relevant to wireless networking. The main emphasis is on higher-layer
protocol (MAC and above) issues. The course will require extensive
reading (especially research literature), in-class participation and
discussions. The course is roughly divided into three parts:
- Introduction to the basic 802.11 mechanisms (medium access,
rate
adaptation, power save mode) covering both the legacy 802.11a/b/g MAC
protocols as well as the most recent 802.11n MIMO standard.
- State-of-the-art
in Enterprise and home wireless networking discussing several challenge
topics such as load balancing, channel management, node deployments,
centralized networks, network management, measurements and evaluation.
- Recent
advances in wireless networking, such as cognitive radio networks,
white space networking, advanced MAC protocol design, PHY-MAC
cross-layer interactions, and wireless data centers.
Course Overview
- This course involves class presentations and open
discussions. I
will cover majority of the topics through lectures on important
concepts, and presentation of related papers. The remaining classes
will comprise of student-led presentations. Each student will be
required to present 2-3 papers in the entire semester.
- Several additional papers will be recommended for reading.
- There is neither mid-term exam nor final exams.
- Tou
are expected to prepare a survey paper on an interest topic to you. A
suggested list of topics will be listed by the instructor early in the
class. You can pick your own topic for the paper.
- You are
expected to participate in a project related to one of the topics of
interest. Depending on course enrollment, the project will be done in
groups of 2 students, and will involve design and evaluation of some
protocol or enhancement and comparison to previous protocols. A
suggested list of projects will be made available by the instructor.
You can pick your own topic for the project. The project will begin
with a project proposal that must be approved. Students are encouraged
to think about the project topic early, read related papers, discuss
your ideas with me, and formulate your project proposal. A final report
for the project and presentation will be due at the end of the semester.
Prerequisites
Graduate standing in Computer Science, Computer Engineering,
or Electrical Engineering. The students must have has
"CS455/555.Introduction to Networks and Communications" or equivalent
or permission of the instructor.
Text
No formal text; a number of relevant papers from recent
journal publications and conference proceedings will be discussed in
class.
Grading Scheme
- Class presentation/participation 25%
- Survey Paper 35%
- Project 40%
Academic Integrity / Honor Code
By attending Old Dominion University you have accepted the
responsibility to abide by the honor code. If you are uncertain about
how the honor code applies to any course activity, you should request
clarification from the instructor. The honor code is as follows:
• " I
pledge to support the honor system of Old Dominion University. I will
refrain from any form of academic dishonesty or deception, such as
cheating or plagiarism. I am aware that as a member if the academic
community, it is my responsibility to turn in all suspected violators
of the honor system. I will report to Honor Council hearings if
summoned."
In particular, submitting anything that is
not your own work without proper attribution (giving credit to the
original author) is plagiarism and is considered to be an honor code
violation. It is not acceptable to copy source code or written work
from any other source (including other students), unless explicitly
allowed in the assignment statement. In cases where using resources
such as the Internet is allowed, proper attribution must be given.
Any
evidence of an honor code violation (cheating) will result in a 0 grade
for the assignment/exam, and the incident will be submitted to the
Department of Computer Science for further review. Note that honor code
violations can result in a permanent notation being placed on the
student's transcript. Evidence of cheating may include a student
being unable to satisfactorily answer questions asked by the instructor
about a submitted solution. Cheating includes not only receiving
unauthorized assistance, but also giving unauthorized
assistance. For class files kept in Unix space, students are expected
to use Unix file permission protections (chmod) to keep other students
from accessing the files. Failure to adequately protect files may
result in a student being held responsible for giving unauthorized
assistance, even if not directly aware of it.
Students may
still provide legitimate assistance to one another. You are
encouraged to form study groups to discuss course topics. Students
should avoid discussions of solutions to ongoing assignments and should
not, under any circumstances, show or share code solutions for an
ongoing assignment.
Please see the ODU Honor
Council’s webpage for
other concrete examples of what constitutes cheating, plagiarism, and
unauthorized collaboration. All students are responsible for knowing
the rules. If you are unclear about whether a certain activity is
allowed or not, please contact the instructor.
Course Policies
The grading scale is as
follows:
(+ and - modifiers will be applied as appropriate)
| |
|
90-100 |
|
A |
| |
|
80-89 |
|
B |
| |
|
70-79 |
|
C |
| |
|
0-69 |
|
F |
Late assignments are not accepted.
I expect you to attend class and to arrive on
time.
Your grade may be affected if you are consistently tardy. If you have
to miss a class, you are responsible checking the course website to
find any assignments or notes you may have missed. Students may leave
after 15 minutes if the instructor or a guest lecturer does not arrive
in that time.
Students should activate their @odu.edu
e-mail accounts and check them every day. If a student chooses to have
his/her messages forwarded to another account, it is the student's
responsibility to take the necessary steps to have them forwarded.
Please be respectful of your classmates
and instructor by minimizing distractions during class. Cell phones
must be turned off during class.
Make-ups for graded activities are
possible only with a valid written medical or university excuse. It is
the student's responsibility to give the instructor the written excuse
and to arrange for any makeup work to be done. A makeup exam may be
different (and possibly more difficult) than the regularly scheduled
exam.
In compliance with PL94-142 and more
recent federal legislation affirming the rights of disabled
individuals, provisions will be made for students with special needs on
an individual basis. The student must have been identified as special
needs by the university and an appropriate letter must be provided to
the course instructor. Provision will be made based upon written
guidelines from the University's Office
of Educational Accessibility. All students are expected to fulfill
all course requirements.
The course website
should be your first reference for questions about the class.
The course schedule will be updated throughout the semester with
links to assigned
readings. Announcements and frequently asked questions (FAQ) will also
be posted to the course website.
The
best way to get help is to come to office hours. If you cannot
make office hours, please send an email to setup an appointment.
I
am available via email, but do not expect or rely on an immediate
response.
| Date |
Topics
& Reading Assignments |
Presenter/Slides |
Mon Jan 14
|
Course Logistics:
Course structure,
grading, project, reading papers, etc.
Course
Introduction: The OSI
Communication Model, Overview of Current Wireless Technologies,
Physical
Layer Fundamentals: Radio
Signal Basics, Signal Propagation Basics, Signal Modulation Basics.
Warming
Up Assignment
|
Course
Introduction
PHY
Basics
|
Mon Jan 21
|
No Lecture - Martin
Luther King Day
|
|
|
Mon
Jan 28
|
Medium Access
Control (MAC): The CSMA/CA Regime, IEEE 802.11
Reading:
- MACA
- A New Channel Access Method for Packet Radio, Phil Karn, In
ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pages
134-140, September 1990.
- MACAW:
A Medium Access Protocol for Wireless LANs, V. Bharghavan, A.
Demers, S. Shenker, and L. Zhang, ACM SIGCOMM 1994
- Performance
Analysis of the IEEE 802.11 Distributed Coordination Function,
Giuseppe Bianchi, IEEE Journal on Selected Areas in Communications,
vol. 18, no. 3, March 2000
Recommended
Reading:
- IEEE
802.11 Wireless Local Area Networks, Brian P. Crow, Indra Widjaja,
Jeong Geun Kim, and Prescott T. Sakai, IEEE Communications Magazine,
35(9):116-126, September 1997.
- Breezecom
IEEE 802.11 Tutorial.
- Overview
of Emerging IEEE 802.11 Protocols for MAC and Above, S. Choi, SK
Telecom Telecommunications Review, Sp. Issue on Wireless
Communications and Broadcasting, Nov 03
- First 20 pages of IEEE 802.11
Tutorial -- Mustafa Ergen (UC Berkeley) ... (Full IEEE
802.11 Standard for your reference)
- Effectiveness
of RTS/CTS Handshake in IEEE 802.11 based Ad Hoc Networks, K.
Xu, M. Gerla, and S. Bae, Ad Hoc Network Journal, vol. 1, no. 1,
Elsevier Science 2003
- Dual
Busy Tone Multiple Access (DBTMA) — A Multiple Access Control Scheme
for. Ad Hoc Networks, Zygmunt J. Haas, and Jing Deng, IEEE
Transactions on Communications, vol. 50, no. 6, June 2002.
|
MAC Layer |
Mon Feb 4
|
IEEE 802.11:
Multirate Adaptation, Data Fragmentation, Association/Authentication,
and Roaming (11r).
Reading:
- Performance
Anomaly of 802.11b, Martin Heusse, Franck Rousseau, Gilles
Berger-Sabbatel, Andrzej Duda, IEEE INFOCOM 2003
- Rate Adaptation
Algorithms for IEEE 802.11 Networks: A Survey and Comparison, Saiid
Biaz, Shaoen Wu, IEEE International Symposium on Computers and
Communications, 2008
- A Model for
Comparing Rate Adaptation Algorithms, Candy Yiu, Suresh Singh, ACM
WiNTECH, 2009
- An Empirical Analysis
of the IEEE 802.11 MAC Layer Handoff Process, Arunesh Mishra, Minho
Shin, William Arbaugh, ACM SIGCOMM Computer Communications Review, 2003
Presentation:
- Robust Rate
Adaptation for 802.11 Wireless Networks, Starsky Wong, Hao Yang,
Songwu Lu, Vaduvur Bharghavan, ACM MobiCom, 2006 [Mostafa
Uddin] [slides]
- Eliminating handoff
latencies in 802.11 WLANs using multiple radios: Applications,
experience, and evaluation, Vladimir Brik, Arunesh Mishra, Suman
Banerjee, ACM IMC, 2005 [Ibrahim
Ben Moustafa] [slides]
Recommended
Reading:
- Making Wireless
Networks MORAL, Nazif C. Tas, Tamer Nadeem, Ashok K. Agrawala, IEEE
INFOCOM 2011
- Smart Sender: A
Practical Rate Adaptation Algorithm for Multirate IEEE 802.11 WLANs,
Qiuyan Xia, M. Hamdi, IEEE Transactions on Wireless Communications, 2008
- OAR:
an opportunistic auto-rate media access protocol for ad hoc networks,
Sadeghi, Kanodia, Sabhrawal, Knightly, Kluwer Wireless Networks
Journal, 2005
- Wireless
LAN: Robust rate adaptation for 802.11 wireless networks, Wong, Lu,
Yang, Bhargavan, ACM Mobicom 2006
- CARS:
Context-Aware Rate Selection for Vehicular Networks, Pravin
Shankar, Tamer Nadeem, Justinian Rosca, Liviu Iftode, IEEE ICNP 2008
- A
Rate Adaptive MAC Protocol for Multi-Hop Wireless Networks,
Holland, Vaidya, Bahl, ACM Mobicom '01
- IEEE 802.11
Fragmentation-Aware Energy-Efficient Ad-Hoc Routing Protocols, Tamer
Nadeem, Ashok Agrawala, IEEE MASS, 2004
- Throughput
Enhancement Through Dynamic Fragmentation in Wireless LANs,
Byung-Seo Kim, Yuguang Fang, IEEE Transactions on Vehicular Technology,
2005
- Throughput
Enhancement Through Combined Fragmentation and Rate Method in IEEE
802.11b WLANS,
Marek Bykowski, Karol Kowalik, Brian Keegan, Mark Davis, Workshop on
Wireless Broadband Access for Communities and Rural Developing Regions,
2008
- F-PCM: A
fragmentation-based power control MAC protocol for IEEE 802.11 mobile
ad hoc networks, Dongkyun Kim1, C. K. Toh, Wireless Communication
and Mobile Computing Journal, 2006
- Available
Bandwidth-Based Association in IEEE 802.11 Wireless LANs, Heeyoung
Lee, Seongkwan Kim, Okhwan Lee, Sunghyun Choi, Sung-Ju Lee, MSWiM 2008
- Fast Roaming
Authentication in Wireless LANs, Nidal Aboudagga, Mohamed
Eltoweissy, Jean-Jacques Quisquater1, WisSec 2006
- LeapFrog: Fast,
Timely WiFi Handoff, Yanfeng Zhang, Yongqiang Liu, Yong Xia, Quan
Huang, IEEE GLOBECOM, 2007
- Improving the
latency of 802.11 handoffs using neighbour graphs, Minho Shin,
Arunesh Mitra, William Arbaug, ACM MobiSys, 2004
- Reducing MAC
Layer Handoff Latency in IEEE 802.11 Wireless LANs, Sangho Shin,
Anshuman Singh Rawat, Henning Schulzrinne, ACM MobiWac, 2004
|
MAC Layer II
[Mostafa_slides]
[Ibrahim_slides]
|
Mon Feb 11
|
IEEE 802.11:
Transmission Power/Carrier Sense/Interference Control, Multi-Channel,
Directional Antenna
Reading:
- Partially
Overlapping Channel NOT Considered Harmful, Mishra, Srivastava,
Banerjee, et al., ACM Sigmetrics 2006
- Utilizing
Directional Antennas for Wireless Ad Hoc Networks, Roy Choudhury,
Yang, Vaidya, Ramanathan, ACM MobiCom 2002
- On Spatial Fairness of
the 802.11 DCF Protocol and the Role of Directional Antenna Chenxi,
Zhu, Tamer Nadeem, Jonathan Agre, IEEE SECON 2007
Presentation:
Recommended
Reading:
- Multi-channel
MAC for Ad Hoc Networks, So, Vaidya, ACM Mobihoc 2004
- Topology Control
of Multihop Wireless Networks using Transmit Power Adjustment, Ram
Ramanathan, Regina Rosales-Hain; IEEE INFOCOM 2000
- Joint Transmit Power
and Physical Carrier Sensing Adaptation based on Loss Differentiation
for High Density IEEE 802.11 WLAN, H. Ma, J. Zhu, S. Roy and S-Y.
Shin, Computer Networks, June 2008
- Joint Transmission
Rate, Power, and Carrier Sense Settings: An Initial Measurement Study,
Thomas Huehn, Ruben Merz and Cigdem Sengul, IEEE Workshop on Wireless
Mesh Networks (WIMESH 2010), 2010
- Location Aware
IEEE 802.11 for Spatial Reuse Enhancement, Tamer Nadeem, Lusheng
Ji,In IEEE Transactions on Mobile Computing, vol. 6, no. 10, pp.
1171-1184, October 2007
- Directional Virtual
Carrier Sensing in Ad Hoc Networks, Takai, et al., ACM Mobihoc 2002
- MAC-Layer Capture: A
Problem in Wireless Mesh Networks using Beamforming Antennas, Roy
Choudhury, N. Vaidya, IEEE SECON 2007
|
MAC Layer III |
Mon Feb 18
|
IEEE 802.11:
High-Throughput (11n), and Security (11i)
Reading
- 802.11n under the
microscope, Vivek Shrivastava et al., ACM IMC 2008
- 802.11 with
Multiple Antennas for Dummies, Daniel Halperin, Wenjun Hu, Anmol
Sheth, and David Wetherall, ACM SIGCOMM Computer Communication Review,
2010
- Your 802.11 Wireless
Network has no Clothes, William Arbaugh et al., IEEE Wireless
Communications, 2002
- Wireless Lan Security
and IEEE 802.11i, Jyh-Cheng Chen, Ming-Chia Jiang, Yi-Wen Liu,
AusCERT 2005
Presentation
Recommended
Reading:
- IEEE 802.11n:
enhancements for higher throughput in wireless LANs, Yang Xiao,
IEEE Wireless Communications, 2005
- IEEE 802.11n MAC
frame aggregation mechanisms for next-generation high-throughput WLANs,
D. Skordoulis et al., IEEE Wireless Communications, 2008
- IEEE 802.11n
Development: History, Process, and Technology, E. Perahia, IEEE
Communications Magazine, 2008
- Frame Aggregation
Mechanism for Highthroughput 802.11n WLANs, Jyoti Kolap et al.,
International Journal of Wireless & Mobile Networks (IJWMN), 2012
- 802.11n MAC Design
and System Performance, S. Abraham, A. Meylan, S. Nanda, IEEE ICC
2005
- The 802.11n
MIMO-OFDM Standard for Wireless LAN and Beyond, Richard Nee et al.,
Journal of Wireless Personal Communications, 2006
- Performance Analysis
of A-MPDU and A-MSDU Aggregation in IEEE 802.11n, Boris Ginzburg,
Alex Kesselman, IEEE Sarnoff Symposium, 2007
- Efficient MAC
Strategies for the IEEE 802.11n wireless LANs, Yang Xiao, Wirel.
Commun. Mob. Comput. 2006
- Demystifying 802.11n
Power Consumption, Daniel Halperin, Ben Greenstein, Anmol Sheth,
and David Wetherall, HotPower, 2010
- On Security
Vulnerabilities of Null Data Frames in IEEE 802.11 based WLANs,
Wenjun Gu et al., IEEE ICDCS 2008
- On the Robustness of
IEEE802.11 Rate Adaptation Algorithms against Smart Jamming,
Guevara Noubir, Rajmohan Rajaraman, Bo Sheng, Bishal Thapa, ACM WiSec
2011
- IEEE 802.11i WLAN
Security Protocol – A Software Engineer’s Model, Elankayer
Sithirasenan, V. Muthukkumarasamy, Danny Powell, AusCERT 2005
- Intercepting Mobile
Communications: The Insecurity of 802.11, Nikita Borisov, Ian
Goldberg, David Wagner, ACM MobiCom 2001
- Security mechanisms,
attacks and security enhancements for the IEEE 802.11 WLANs, Yang
Xiao et al., Int. J. Wireless and Mobile Computing, 2006
|
MAC Layer IV |
Mon Feb 25
|
Advanced 802.11:
Service Differentiation, Power Management, WiFi P2P
Reading:
- Improving IEEE
802.11 power saving mechanism, Eun-Sun Jung, Nitin H. Vaidya,
Wireless Networks, 2008
- Beyond the
Bits: Cooperative Packet Recovery Using Physical Layer Information,
Grace Woo, Pouya Kheradpour, Dawei Shen, and Dina Katabi, ACM MOBICOM,
2007.
- Supporting Service
Differentiation in Wireless Packet Networks Using Distributed Control,
Andras Veres, Andrew T. Campbell, Michael Barry, Li-hsiang Sun,IEEE
Journal on Selected Areas in Communications, vol. 19, no. 10, October
2001
Presentation:
Recommended
Reading:
- Introducing
service differentiation into IEEE 802.11, Aad, I., Castelluccia,
C.,Fifth IEEE Symposium on Computers and Communications (ISCC), 2000.
- Micro power
management of active 802.11 interfaces, Jiayang Liu, Li Zhong, ACM
MobiSys 2008
- 802.11
power-saving mode for mobile computing in Wi-Fi hotspots: limitations,
enhancements and open issues, G. Anastasi et al., Journal Wireless
Networks, 2008
- CoolSpots:
Reducing the Power Consumption of Wireless Mobile Devices with Multiple
Radio Interfaces, Trevor Pering et al., MobiSys '06, 2006
- WiFi-Opp:
Ad-Hoc-less Opportunistic Networking, Sacha Trifunovic et al., ACM
CHANTS 2011
|
MAC Layer V
|
Mon Mar 04
|
Advanced MAC Design:
WPAN, Bluetooth, ZigBee, Ultra-Wideband
Reading:
- Bluetooth
wireless technology basics
- An
Introduction to ZigBee - ONLY the first 17 pages - to the end of
Chapter 4
- Emerging Wireless
Standards - WiFi, ZigBee and WiMAX Bhavneet Sidhu, Hardeep Singh,
and Amit Chhabra, World Academy of Science, Engineering and Technology,
2007
- A Comparative
Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi
Jin-Shyan Lee, Yu-Wei Su, Chung-Chou Shen, IEEE IECON 2007
Presentation:
Recommended
Reading:
- Bluetooth
scatternet formation: A survey, Roger M. Whitaker, Leigh Hodge,
Imrich Chlamtac, Ad Hoc Networks 3 (2005). ONLY the first 12 pages - to
the end of Section 4.2
- Performance
of Bluetooth scatternets and other asynchronous TDMA ad hoc networks,
Theodoros Salonidis, Leandros Tassiulas, MoMuC, 2003.
- Cool-Tether:
Energy Efficient On-the-fly WiFi Hot-spots using Mobile Phones Ashish
Sharma et al., ACM CoNEXT 2009
- Blue-Fi:
Enhancing Wi-Fi Performance using Bluetooth Signals Ganesh
Ananthanarayanan, Ion Stoica, ACM Mobisys 2009
- Surviving Wi-Fi
Interference in Low Power ZigBee Networks Chieh-Jan Mike Liang et
al., ACM SenSys 2010
- Airshark:
Detecting Non-WiFi RF Devices using Commodity WiFi Hardware Shravan
Rayanchu, Ashish Patro, Suman Banerjee, ACM IMC 2011
|
MAC Layer VI
|
Mon Mar 11
|
No Lecture - Spring
Break
|
|
Mon Mar 18
|
No Lecture - Travel to PerCom'13 Conference
|
|
Mon Mar 25
|
Enterprise\Home Wireless Networks
Reading:
- Designing High Performance Enterprise Wi-Fi Networks, Rohan Murty et al., Proceedings of NSDI, 2008
- Distributed Channel Management in Uncoordinated Wireless Environments, Arunesh Mishra, Dheeraj Agrawal, Vivek Shrivastava, Suman Banerjee, Samrat Ganguly; ACM Mobicom 2006
- CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path,
Vivek Shrivastava, Nabeel Ahmed, Shravan Rayanchu, Suman Banerjee,
Srinivasan Keshav, Konstantina Papagiannaki, Arunesh Mishra; ACM
MobiCom 2009
Presentation:
- Predicting Length of Stay at WiFi Hotspots, Justin Manweiler et al., IEEE INFOCOM 2013 [Ahmed Salem]
- Self-management in chaotic wireless deployments, Aditya Akella, Glenn Judd, Srinivasan Seshan, Peter Steenkiste; Wireless Network (2007) 13:737–755 [Abdulla Alasaadi]
- Cell Breathing Techniques for Load Balancing in Wireless LANs, Bejerano, Y., Seung-Jae Han; IEEE Transactions on Mobile Computing, June 2009 []
Recommended Reading:
- Wireless mesh networks: a survey, Ian F. Akyildiza, Xudong Wangb, Weilin Wang; Computer Networks, Volume 47, Issue 4, March 2005, Pages 445–487
- How Healthy Are Today's Enterprise Networks?, S. Guha, J. Chandrashekar, N. Taft and K. Papagiannaki; ACM Internet Measurement Conference (IMC) 2008
- Traffic-aware channel assignment in enterprise wireless networks, Eric Rozner , Yogita Mehta , Aditya Akella , Lili Qiu; Proceedings of ICNP 2007
- DirCast: A Practical and Efficient Wi-Fi Multicast System, SRanveer Chandra et al., IEEE ICNP 2009
- DAIR: A Framework for Managing Enterprise Wireless Networks Using Desktop Infrastructure, Paramvir Bahl et al.; Proceedings of HotNets 2005
- Decentralized enterprise systems: a multiplatform wireless sensor network approach, Nirvana Meratnia et l., IEEE Wireless Communications, Volume:14, Issue:6, Dec. 2007
- Analysis of a campus-wide wireless network, David Kotz, Kobby Essien, Journal of Wireless Networks archive, Volume 11 Issue 1-2, January 2005
- Analyzing the MAC-level behavior of wireless networks in the wild, Ratul Mahajan et al., Proceedings of the SIGCOMM 2006
- Resonance: dynamic access control for enterprise networks, Ankur Kumar Nayak et al., Proceedings of the 1st ACM workshop on Research on enterprise networking, 2009
- RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning, Chad D. Mano at al., ACM Transactions on Information and System Security (TISSEC), Volume 11 Issue 2, March 2008
|
Enterprise Management
|
Mon Apr 1
|
Enterprise\Home Wireless Networks
Reading:
- A survey on smart home networking, J Cheng, T Kunzz, Carleton University, Systems and Computer Engineering, Tech. Rep. SCE-09-10
- Farther Than You May Think: An Empirical Investigation of the Proximity of Users to Their Mobile Phones, Shwetak N. Patel et al., UbiComp 2006
- Characterization of 802.11 Wireless Networks in the Home, Mark Yarvis; Dina Papagiannaki; Steven Conner, Intel Technical eport, 2003
Presentation:
- RxIP: Monitoring the Health of Home Wireless Networks, Justin Manweiler, Peter Franklin, Romit Roy Choudhury, IEEE INFOCOM 2012 [Ahmed Alhafdhi]
- No Time to Countdown: Migrating Backoff to the Frequency Domain, Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi, ACM MobiCom 2011 [Ibrahim Ben Moustafa]
- A reservation based backoff method for video streaming in 802.11 home networks, Yong He et al., IEEE Journal onSelected Areas in Communications, 2010 []
Recommended Reading:
- Flex-WiFi: a mixed infrastructure and ad-hoc IEEE 802.11 network for data traffic in a home environment, Carlo Parata, Vincenzo Scarpa, Gabriella Convertino, IEEE WoWMoM 2007
- PACA: Peer-Assisted Channel Assignment for Home Wireless LANs, Chi-Fai Wong, S.-H. Gary Chan, Jiancong Chen, IEEE GlobeCom, 2006
- Portable, but not mobile: a study of wireless laptops in the home, Allison Woodruff et al., Proceedings of the 5th international conference on Pervasive computing (PERVASIVE), 2007
- HomeRF: wireless networking for the connected home, Kevin J. Negus et al., IEEE Personal Communications Magazine, 2000
- Dynamic Admission Control in IEEE 802.11e EDCA-based Wireless Home Network, Hayoung Yoon, JongWon Kim, DongYun Shin, Proceedings of IEEE CCNC, 2006
|
Home Networking
|
Mon Apr 8
|
Survey
Paper Presentations
|
|
Mon Apr 15
|
Advanced Topics: Packet Recovery, Interference Mitigation, Low-Power, MIMO
Reading:
- Understanding the Limitations of Power Control for WLANs,
Vivek Shrivastava, Dheeraj Agrawal, Arunesh Mishra, Suman Banerjee,
Tamer Nadeem, The Seventh ACM Internet Measurement Conference (IMC),
2007.
- Wireless Memory: Eliminating Communication Redundancy in Wi-Fi Networks, Zhenyun Zhuang, Raghupathy Sivakumar, IEEE WoWMoM 2011
Presentation:
- WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access, Tao Jin, Guevara Noubir, and Bo Sheng, IEEE INFOCOM 2011. [Mostafa Uddin]
- ZipTx: Harnessing Partial Packets in 802.11 Networks, Kate Ching-Ju Lin, Nate Kushman, Dina Katabi, ACM MobiCom 2008. [Andrew Schaefer]
- MIMO Rate Adaptation in 802.11n Wireless Networks, Ioannis Pefkianakis et al., ACM MobiCom 2010. []
Recommended Reading:
|
|
Mon Apr 22
|
Advanced Topics: Cognitive Networks, Software Defined Radio, Software Defined Networks
Reading:
- Cognitive networks, Ryan W. Thomas et al., IEEE DySPAN 2005
- NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey Ian F. Akyildiz et al., Elsevier Computer Networks, Vol. 50, 2006
- The software radio architecture, Joseph Mitola, IEEE Communications Magazine, 1995
- Software-defined radio: basics and evolution to cognitive radio, Friedrich K. Jondral, Journal on Wireless Communications and Networking, 2005
Presentation:
- A survey of spectrum sensing algorithms for cognitive radio applications, Tevfik Yücek, Hüuseyin Arslan, IEEE Communications Surveys & Tutorials, 2009 [Reid Rankin]
- A survey on MAC protocols for cognitive radio networks, Claudia Cormiob, Kaushik R. Chowdhurya, Elsevier Ad Hoc Networks, Vol. 7, No. 7, 2009 [Ahmed Salem]
- Enabling MAC Protocol Implementations on Software-Defined Radios, George Nychis et al., Proceedings of NSDI, 2009 []
Recommended Reading:
- A survey on spectrum management in cognitive radio networks, Ian F. Akyildiz et al., IEEE Communications Magazine, 2008
- Cooperative spectrum sensing in cognitive radio networks: A survey, Ian F. Akyildiz, Brandon F. Lo, Ravikumar Balakrishnan, Elsevier Physical Communication, Vol. 4, No. 1, 2011
- Trends in the development of communication networks: Cognitive networks, Carolina Fortuna, Mihael Mohorcic, Elsevier Computer Networks, Vol. 53, No. 9, 2009
- A Survey of Dynamic Spectrum Access, Qing Zhao, Brian M. Sadler, IEEE Signal Processing Magazine, 2007
- A Survey on MAC Strategies for Cognitive Radio Networks, Antonio De Domenico et al., IEEE Communications Surveys & Tutorials, Vol. 14, No. 1, 2012
- Software Defined Radio: Challenges and Opportunities, Tore Ulversøy, IEEE Communications Surveys & Tutorials, 2010
- Software-defined radio receiver: dream to reality, Rahim Bagheri et al., IEEE Communications Magazine, 2006
- Software-Defined Networking: The New Norm for Networks, Open Networking Foundation, White Paper, 2012
- A network in a laptop: rapid prototyping for software-defined networks,
Bob Lantz, Brandon Heller, Nick McKeown, Proceedings of the 9th ACM
SIGCOMM Workshop on Hot Topics in Networks(Hotnets-IX), 2010
|
Home Networking
|
Mon Apr 29
|
Class
Project Presentations
|
|
|