Upload
geraldine-black
View
219
Download
1
Embed Size (px)
Citation preview
1
Upcoming Topics and Projects
Romit Roy ChoudhuryDept. of ECE
2
Agenda
Look-ahead into future ECE 256 topics
Examples of some project ideas My thoughts, your thoughts Evaluation methods
Project plan and timeline
3
Topics Timeline
Wired-Wireless Hybrid Networks
4
Topics Timeline Wireless LANs, infrastructure networks Multi-hop Routing
Static mesh networks (mesh) Mobile networks (vehicular, ad hoc, DTN)
Static Mesh Networks
Static Mesh Networks
5
Topics Timeline Wireless LANs, infrastructure networks Multi-hop Routing
Static mesh networks (mesh) Mobile networks (vehicular, ad hoc, DTN)
Delay TolerantNetworks
Delay TolerantNetworks
6
Topics Timeline Wireless LANs, infrastructure networks Multi-hop Routing
Static mesh networks (mesh) Mobile networks (vehicular, ad hoc, DTN)
QuickTime™ and aYUV420 codec decompressor
are needed to see this picture.
Delay TolerantNetworks
Delay TolerantNetworks
7
Wireless LANs, infrastructure networks Multi-hop Routing
Ad hoc networks, Mesh Networks Delay Tolerant Networks
Sensor Networks MAC, routing (energy-awareness) Dissemination, aggregation Reliable transport, Applications
Topics Timeline
Sensor Network
Base Station
8
Topics Timeline
Wireless LANs, infrastructure networks Multi-hop Routing
Ad hoc networks, Mesh Networks Delay Tolerant Networks
Sensor Networks MAC, routing (energy-awareness) Dissemination, aggregation Reliable transport, Applications
Transport Layer (Wireless TCP) Variants of TCP Rate based transport
InternetInternetS
9
Topics Timeline
Wireless LANs, infrastructure networks Multi-hop Routing
Ad hoc networks, Mesh Networks Delay Tolerant Networks
Sensor Networks MAC, routing (energy-awareness) Dissemination, aggregation Reliable transport
Transport Layer (Wireless TCP) Variants of TCP Rate based transport
Mobile Phone as sensor Networks Apps, Localization, Security, Privacy, incentives,
10
Internet Internet
A Virtual Information Telescope
11
Project topics & directions
12
Examples:
Wireless Piggyback ACK, ExOR MIM, MAC, SIC MAC Opportunistic transmission, coding WLAN Multicast Directional antennas for security Localization (Congruity)
Sensor Networks
DTN (Broadcast, mobility modeling, routing)
13
Examples:
Mobile Computing Applications (MicroBlog, Video, Loc-based RSS
Feed, LiveCompare) Localization
•Place Labs
•EnLoc
•SurroundSense + AAMPL
Privacy Client-Assisted network management
14
Project TimelineProject Timeline
By March 1: Solid literature survey Have a solid problem formulation Have idea of the solution / approach
Before Spring break: Have the solution ready
Spring Break: Start implementing basic idea No optimization necessary
End March: Have basic evaluation framework ready
April: Implement, debug, optimize, …
Learn simulator,implementationtools, Etc.
Learn simulator,implementationtools, Etc.
15
Evaluation
Theory Mathematical models, optimization … MATLAB, own code …
Simulation Wireless Mesh: Qualnet, ns2, OPNET, OMNet … Sensor: Tossim (TinyOS) Your own simulator
Implementation Soekris routers, phones, motes, laptops …
16
Announcement
Cisco Champion’s Award for 3 best projects Great addition to your resume
17
Your Thoughts ?
Don’t worry if they are not baked
Your Thoughts ?
Don’t worry if they are not baked
18
Wireless MACWireless MAC
Improving reuse
Improving channel utilization• Piggybacked ACK, Opportunistic transmissions, Rx based
backoff
Exploiting wired infrastructure• Solve the exposed terminal issue (via wired coordination)• Hybrid TDMA/CSMA
Exploiting cross-layer diversity• MAC-layer anycasting, opportunistic forwarding
Cognitive networks• Adapt antenna beamforming based on WLAN traffic load• Adapt bandwidth based on load• AP assignment based on client distribution
19
Wireless MACWireless MAC
(Linux) Hacking project •Code routers, deploy sniffers, etc.•Characterizing traffic behavior, human usage
patterns
Heterogeneous antenna systems•Clients are omnidirectional, APs are beamformed•Many new issues - not studied earlier•Opportunities in security
20
Routing (Ad Hoc, Mesh)Routing (Ad Hoc, Mesh)
Routing protocols, metrics
Reliable (alternate-path) routing•Wireless channel unstable•Design metric that has more redundancy, high
reliability
S
b
c
zx
d
ef
D
w
a
h
Better repairability
21
Delay Tolerant NetworksDelay Tolerant Networks
Moving away from the ad hoc model Utilizing mobility for data transport Exploiting node density
22
Delay Tolerant NetworksDelay Tolerant Networks
Several new challenges
Broadcast• Crossing boundaries of clusters (w/o heavy overhead)• Terminating conditions unknown• Design algorithm to propagate packet to all, and then
terminate
Routing• No end to end path• How do you know who will meet whom (Ride Share App)• Can you exploit GPS location
Exploiting infrastructure• Can you deploy buffers in the network intelligently
23
Delay Tolerant NetworksDelay Tolerant Networks
Implement DTN on sensor motes•Distribute mote to students
•Collect human traces, contact patterns, reconnection time
•Execute your own algorithms
Designing new mobility models•From human traces
24
Sensor NetworksSensor Networks
Energy-awareness is key Sensed information aggregation,
dissemination MAC, Routing, Reliability Sink mobility
25
Sensor NetworksSensor Networks
Aggregation + Compression•Zip reduces packet-size, but prohibits aggregation
•Algorithm for zipping and aggregation
Data suppression•You cannot transmit all sensed data (under given
energy)
•Which subsets should you transmit– Minimize deviation
Coverage•No location should remain outside sensing range
•Do this without GPS information
26
Sensor NetworksSensor Networks
Think / Implement Coool Applications• 3D Google• Micro-Blog• Body networks• Smart Clothes
27
Wireless TCPWireless TCP
Loss discrimination• Technique to determine congestion vs transmission loss• Exploit intermediate buffering
Transport protocol for sensors• Reliable querying of a sensor node• Reliable event delivery (not message)
28
Human Networks: Privacy and SecurityHuman Networks: Privacy and Security
Location Privacy• Mobile phones need to report their locations for
applications• No one wants to disclose this information• Design algorithms that can achieve location privacy
– But not affect the requirements of algorithm
Duke Hospital Project• Statistical inferencing of group behavior• Without knowledge of individual information
Energy-aware localization on mobile phones• Multiplex between GPS, WiFi, GSM
29
Project GroupsProject Groups
Joseph + Jason Linda + Amrita Rahul + Souvik Xiong + Yanni + ? Matt + Ionut Asic Yi
30
Thanks for coming in
31
Virtual TelescopeVirtual Telescope
Internet, Cellular Networks
Internet, Cellular Networks
Visualization ServiceVisualization Service
Web ServiceWeb Service
Sensors
Phones
People
Physical SpacePhysical Space