Mobile and Sensor Systems



Similar documents
10. Wireless Networks

communication over wireless link handling mobile user who changes point of attachment to network

Data Center Networks, Link Layer Wireless (802.11)

ECE/CS 372 introduction to computer networks. Lecture 13

COMP 3331/9331: Computer Networks and Applications

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Chapter 6 Wireless and Mobile Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Demystifying Wireless for Real-World Measurement Applications

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

EPL 657 Wireless Networks

Multihop Wireless Networks

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Security in Ad Hoc Network

IT4405 Computer Networks (Compulsory)

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

Energy Consumption in Android Phones when using Wireless Communication Technologies

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Narrowband and Broadband Access Technologies

Municipal Mesh Network Design

About the Authors Preface Acknowledgements List of Acronyms

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

Lecture 7 Multiple Access Protocols and Wireless

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Introduction Chapter 1. Uses of Computer Networks

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Chapter 6: Wireless and Mobile Networks

Security in Wireless Mesh Networks

6LoWPAN Technical Overview

Wireless Mesh Networks: WMN Overview, WMN Architecture

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Portable Wireless Mesh Networks: Competitive Differentiation

Deploy WiFi Quickly and Easily

The next generation of knowledge and expertise Wireless Security Basics

Problems of Security in Ad Hoc Sensor Network

Computer Networking: A Survey

Fundamentals of Mobile and Pervasive Computing

Mobile Office Security Requirements for the Mobile Office

Chapter 5. Data Communication And Internet Technology

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Energy Optimal Routing Protocol for a Wireless Data Network

Mobility and cellular networks

Wireless LANs vs. Wireless WANs

How To Create An Ad Hoc Cloud On A Cell Phone

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

Enabling Seamless Mobility. Through Wireless Broadband

A survey on Wireless Mesh Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Wave Relay System and General Project Details

Solving the Wireless Mesh Multi-Hop Dilemma

How To Analyze The Security On An Ipa Wireless Sensor Network

Microchip Technology. February 2008 Valerio Moretto Slide 1

Introduction to Computer Networking: Trends and Issues

SBSCET, Firozpur (Punjab), India

Mobile Computing/ Mobile Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security in Wireless Local Area Network

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

Networking. Introduction. Types of Wireless Networks. A Build-It-Ourselves Guide to Wireless Mesh Networks

Defining the Smart Grid WAN

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

A Catechistic Method for Traffic Pattern Discovery in MANET

Mobile Computing. Logical entities are instances of a running user application or a mobile agent. Mobile agents can migrate any where over internet.

Introduction to Ad hoc Networks

Applying Mesh Networking to Wireless Lighting Control

Wireless Technologies for Industrial Applications

Spring Final Project Report

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Lecture 17: Wireless Networking"

Cambium Networks Wireless Broadband Solutions for Service Providers

Securing MANET Using Diffie Hellman Digital Signature Scheme

Remote Home Security System Based on Wireless Sensor Network Using NS2

Figure 1: Bandwidth and coverage of wireless technologies [2].

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. January 11 CMSC417 Set 1 1

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "

Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.

CHAPTER 1 1 INTRODUCTION

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Transcription:

Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo

About Me

In this course The course will include aspects related to general understanding of Mobile and ubiquitous systems and networks Sensor systems and networks 3

List of Lectures Lecture 1: Introduction to Mobile Systems. Lecture 2: Mobile Medium Access Control and Wireless Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks. Lecture 4: Sensor Systems and MAC Layer Protocols. Lecture 5: Sensor Networking Routing Protocols. Lecture 6: Sensor Systems Reprogramming and Mobile Sensing. Lecture 7: Mobile Phone Sensing. Lecture 8: Practical: Mobile Phone Programming. 4

Teaching Material No required textbook. Some suggested readings: Schiller, J. (2003). Mobile communications. Pearson (2nd ed.). Karl, H. & Willig, A. (2005). Protocols and architectures for wireless sensor networks. Wiley. Agrawal, D. & Zheng, Q. (2006). Introduction to wireless and mobile systems. Thomson. Specific lectures will reference research papers which can be used for additional reading. 5

In this lecture We will describe mobile systems and their applications and challenges. We will start talking about wireless networks. 6

Smart Phones: the Computing Platform of the Future 7

Smart Phones: the Computing Platform 8

Some Numbers Number of worldwide mobile cellular subscribers increased from 34 million in 1993 to nearly 5.5 million subscribers by 2011. The number of cellular subscribers surpasses the number of wired phone lines. 9

Source: The Economist 10

Location-based Social Network Systems 11

Geographic Recommender Systems Mirco Musolesi

13

Credit: CNet 14

Fundamental Challenges in Mobile Computing Mobile devices are resource-constrained. Mobile connectivity is highly variable in performance and reliability. Mobile devices are inherently less secure. 15

Mobile Devices are Inherently Resource Constrained Mobile devices rely on batteries. Energy consumption due to: Computation (CPU, co-processors) Display Communication Sensing Energy-efficient algorithms are needed. 16

Mobile Devices are Inherently Resource Constrained Computational constraints But, for example, in the Samsung Galaxy SIII you have1.4 GhZ quadcore Cortex A-9 +GPU Memory constraints But, for example, in the Samsung Galaxy SIII you have1gb or 2GB of RAM 17

Mobile Connectivity is Highly Variable in Performance and Reliability Various types of connectivity: Cellular (GSM, 3G, 4G, etc.) WiFi Bluetooth Near Field Communication (NFC) Constraints related to: Coverage issues Trade-offs: energy consumption, throughput, costs 18

Mobile Devices are Inherently Less Secure Wireless not wired communication: Eavesdropping. Need for encrypted communication. Devices can be stolen: Devices might also be accessible by everyone (for example, sensors). 19

Ubiquitous and Mobile Computing The most profound technologies are those that disappear. Mark Weiser (1952-1999) 20

Copyright: PARC Mirco Musolesi 21

Mirco Musolesi 22

Issues in Designing Mobile Computing Systems Distributed systems issues: Remote communication Fault tolerance Remote information access Distributed security Networking issues: Wireless communication Transport layer for wireless channel 23

Issues in Designing Mobile Computing Systems Databases issues: Disconnected operations Weak consistency Energy issues: Adaptation in terms of communication Intelligent uploading of data Hardware aspects 24

Issues in Designing Mobile Computing Systems HCI issues: Limited interface Interaction with the devices (input, etc.) Ergonomics Privacy issues: Location sharing Activity recognition Security issues: Encrypted communication 25

Wireless and Mobile Networks Background: Number of wireless (mobile) phone subscribers now exceeds number wired phone subscribers! Number of wireless Internet-connected devices soon to exceed number of wired Internet-connected devices laptops, Internet-enabled phones promise anytime Internet access Two important (but different) challenges wireless: communication over wireless link mobility: handling the mobile user who changes point of attachment to network 26

Elements of a wireless network network infrastructure wireless hosts v laptop, PDA, IP phone v run applicaqons v may be staqonary (non- mobile) or mobile wireless does not always mean mobility 27

Elements of a wireless network network infrastructure base staqon typically connected to wired network relay - responsible for sending packets between wired network and wireless host(s) in its area e.g., cell towers, 802.11 access points v v 28

Elements of a wireless network network infrastructure wireless link typically used to connect mobile(s) to base staqon also used as backbone link mulqple access protocol coordinates link access various data rates, transmission distance v v v v 29

Characteristics of selected wireless link standards 200 802.11n Data rate (Mbps) 54 5-11 4 1.384 802.15 802.11a,g 802.11b 802.11a,g point-to-point 802.16 (WiMAX) UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO UMTS/WCDMA, CDMA2000 3G data 3G cellular enhanced.056 IS-95, CDMA, GSM 2G Indoor 10-30m Outdoor 50-200m Mid-range outdoor 200m 4 Km Long-range outdoor 5Km 20 Km 30

Elements of a wireless network network infrastructure infrastructure mode base staqon connects mobiles into wired network handoff: mobile changes base staqon providing connecqon into wired network v v 31

Elements of a wireless network ad hoc mode v no base staqons v nodes can only transmit to other nodes within link coverage v nodes organize themselves into a network: route among themselves 32

Wireless network taxonomy infrastructure (e.g., APs) no infrastructure single hop host connects to base staqon (WiFi, WiMAX, cellular) which connects to larger Internet no base staqon, no connecqon to larger Internet (Bluetooth, ad hoc nets) mulqple hops host may have to relay through several wireless nodes to connect to larger Internet: mesh net no base staqon, no connecqon to larger Internet. May have to relay to reach other a given wireless node MANET, VANET 33

Suggested Readings Mark Weiser. The Computer for the 21th Century. Scientific American. September 1991. Mark Weiser. Some Computer Issues in Ubiquitous Computing. Communications of the ACM. Vol. 36. Issue 7. July 1993. M. Satyanarayanan. Pervasive Computing: Vision and Challenges. IEEE Personal Communications. Vol. 8 Issue 4. August 2001. Chapter 6 of James F. Kurose and Keith W. Ross Computer Networking. A Top Down Approach. 6 th Edition. Pearson 2012. 34

Acks Some material for the slides of this course has been contributed by: Dr Christos Efstratiou, Dr Nicholas Lane, Dr Mirco Musolesi, Dr Sarfraz Nawaz. 35