CS395T: Wireless Networking



Course Information

Instructor: Lili Qiu, ACES 6.242, lili@cs.utexas.edu
Lecture: Monday & Wednesday 3:00 - 4:30 PM @TAYLOR 2.106
Instructor's office hour: Monday &Wednesday 4:30 - 5:30PM @ ACES 6.242
TA: Feng Wang, wangf@cs.utexas.edu, office hour: Tuesday 1-2pm & Thursday 2-3 PM, ESB 229, Desk #1
Class ID: 56650

Overview

Wireless networks have gone through an unprecedented growth in the past few years, and will continue to play an indispensable role in future data communication. In the first part of the course, you will learn fundamentals in wireless networks ranging from physical layer to application layer. In the second part of the course, we will discuss research challenges and state-of-art approaches in medium access, routing, transport protocols, topology control, location management, wireless network management and security. Through class lectures, homework, paper reading, and presentation, you will gain a broad understanding of  the current technology and research efforts in wireless networking, as well as further developing skill for oral presentation and writing research critiques. In addition, students are expected to accomplish a well-defined research project in a group of 2-3 to obtain experience in designing and evaluating protocols and/or techniques for wireless networks.

Grading

  • Mid-term (25%): This is the only exam we will have.

  • Homework (30%): All the homework are due before class. Homework takes one of the following three forms: (i) paper-pencil exercises, (ii) programming assignments, and (iii) paper reviews. For the second half of the class, we will discuss two papers per class. You are expected to read both papers, and write a detailed review for one paper of your choice for each class. Please use this review form template for your reviews.

  • Class participation (5%): You are expected to attend all the classes. If you cannot come to the class for some reason, please let me know in advance. Everyone is expected to contribute to class discussion, share opinions, and ask interesting questions.  

  • Course project (40%): A major component in this course is to accomplish a well-defined research project in the area of wireless networking. You can work in a group of 2 to define and complete a project. I will hand out a list of project ideas for you to choose from. You also have the option to come up with your own topic, which needs to be approved by me. You are expected to write a mid-point report, a final report, and also present your work in class. Your grade will be based on your project reports and oral presentation in terms of originality, quality of execution, and clarity of presentation. 

  • We will strictly enforce UTCS code of conduct.

Homework

Mailing List

Our course mailing list is cs395t-wireless2006@lists.cc.utexas.edu

  • To subscribe, send an email to listproc@lists.cc.utexas.edu with the following message in the email body:
            subscribe cs395t-wireless2006 YourFirstName YourLastName

  • To unsubscribe, send an email message to listproc@lists.cc.utexas.edu with the following message in the email body:
            unsubscribe cs395t-wireless2006
    The subject field of your messages is ignored.

Class schedule

Date Topics

Reading material

Part 1: Introduction to wireless networks
8/30 Course Overview and Physical Layer (ppt, pdf) Schiller Chapter 2
9/4

Labor Day

9/6 Introduction to MAC and IEEEE 802.11 (ppt,pdf) Suggested readings:
802.11 Wireless Networks: The Definitive Guide, Chapter 2 & 3
V. Bharghavan, A. Demers, S. Shenker , and L. Zhang. MACAW: A Media Access Protocol for Wireless LANs , In Proc. ACM SIGCOMM , London, U.K., September 1994, pp. 212-225.  
IEEE 802.11 standard [pdf]
9/8 Channel assignment and channel hopping (ppt,pdf) Suggested readings:
Arunesh Mishra, Vladimir Brik, Suman Banerjee, Aravind, Srinivasan, William Arbaugh. A Client-driven Approach for Channel Management in Wireless LANs. IEEE Infocom, Barcelona, Spain, 2006.
Victor Bahl, Ranveer Chandra, and John Dunagan. SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad-Hoc Wireless Networks  Proc. of ACM Mobicom 2004, Sept.-Oct. 2004.
9/11 Presentations by Mi Kyung Han and Eric Rozner
9/18 Power control and rate control (ppt,pdf) Suggested readings:
Roger Wattenhofer, Li Erran Li, Victor Bahl and Yi-Min Wang, Distributed Topology Control for Power Efficient Operation in Multihop Wireless Ad Hoc Networks. Proc. of IEEE INFOCOM, pages 1388-1397, April 2001.
Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, and Andrzej Duda. Performance Anomaly of 802.11b. In Proc. of IEEE INFOCOM, March 2003.
Starsky H.Y. Wong, Hao Yang, Songwu Lu, and Vaduvur Bharghavan. Robust Rate Adaptation in 802.11 Wireless Networks. In Proc. of ACM Mobicom, Sept, 2006.
9/20 Multi-radio (ppt,pdf) Suggested readings:
A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou, A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks, IEEE Conference on Broadband Networks (BroadNets), Oct. 2004.
Allen Miu, Hari Balakrishnan, and Can Emre Koksal. Improving Loss Resilience with Multi-Radio Diversity in Wireless Networks. In Proc. of ACM MobiCom 2005, Aug. - Sept., 2005.
E. Shih, P. Bahl, and M. Sinclair. Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices. In Proc. of ACM Mobicom, 2002.
9/22 Introduction to network layer, mobile IP, and naming (ppt, pdf) Suggested readings:
Schiller Chapter 8.1
Charles E. Perkins, "Mobile Networking through Mobile IP." IEEE Internet Computing, January 1998. Pages 58-69
Persistent Personal Names for Globally Connected Mobile Devices. Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, and Robert Morris. In Proc. of OSDI, Nov. 2006.
9/25 Routing in mobile networks
(Adopted from Nitin Vaidya's tutorial pdf)
Suggested readings:
David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, 1996.
Charles E. Perkins and Elizabeth M. Royer. Ad hoc On-Demand Distance Vector Routing. Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100.
Charles E. Perkins and Pravin Bhagwat,"Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers." Proc. of ACM SIGCOMM, August 1994, London, United Kingdom. 
10/2 Transport protocol in wireless networks (ppt,pdf) Suggested readings:
Hari Balakrishnan, Venkat Padmanabhan, Srinivasan Seshan, and Randy H. Katz. A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. IEEE/ACM Transactions on Networking, December 1997.
Hung-Yun Hsieh, Kyu-Han Kim, Yujie Zhu, and Raghupathy Sivakumar. A Receiver-Centric Transport Protocol for Mobile Hosts with Heterogeneous Wireless Interfaces. In Proc. of MobiCom 2003, Sept. 2003.
Part 2: Different types of wireless networks
10/4 Wireless mesh networks (ETX, WCETT, ExoR, XORs) Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris. A High-Throughput Path Metric for Multi-Hop Wireless Routing. Proc. of ACM Mobicom 2003.
Richard Draves, Jitendra Padhye, and Brian Zill. Routing in Multi-radio, Multi-hop Wireless Mesh Network. Proc. of ACM Mobicom 2004.
10/9
Sanjit Biswas, and Robert Morris. ExOR: Opportunistic Multi-Hop Routing for Wireless Networks In Proc. of ACM SIGCOMM, August 2005.
Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard, Jon Crowcroft. XORs in the Air: Practical Wireless Network Coding. In Proc. of ACM SIGCOMM, September 2006.
10/11 Sensor networks (GPSR, BVR) Brad Karp, and H. T. Kung. Greedy Perimeter Stateless Routing for Wireless Networks, In Proc. of MobiCom 2000, Aug. 2000.
Rodrigo Fonseca, Sylvia Ratnasamy, Jerry Zhao, Cheng Tien Ee, David Culler, Scott Shenker, Ion Stoica. BVR: Beacon Vector Routing Scalable Point-to-Point Routing in Wireless Sensor Networks. In Proc. of NSDI, May 2005.
Suggested reading: Cheng Tien Ee, Rodrigo Fonseca, Sukun Kim, Daekyeong Moon, and Arsalan Tavakoli, David Culler, Scott Shenker, Ion Stoica. A Modular Network Layer for Sensornets. In Proc. of OSDI, Nov. 2006
10/16 Mid-term
10/18 Sensor networks (ppt, pdf) A. Kamra, V. Misra, J. Feldman, D. Rubenstein. Growth Codes: Maximizing Sensor Network Data Persistence. In Proc. of ACM SIGCOMM, Sept. 2006.
Cheng Tien Ee, Sylvia Ratnasamy, Scott Shenker. Practical Data-Centric Storage In Proc. of NSDI, May 2006.
10/23 Cellular networks (ppt, pdf) Schiller Chapter 4
Zhenyun Zhuang, Tae-Young Chang, Raghupathy Sivakumar, Aravind Velayutham. A3: Application-Aware Acceleration for Wireless Data Networks. In Proc. of ACM MOBICOM, Sept. 2006.
10/25 Delay tolerant networks Yong Wang, Sushant Jain, Margaret Martonosi, and Kevin Fall. Erasure Coding Based Routing for Opportunistic Networks. In Proc. of Workshop on delay tolerant networking and related networks.
A. Seth, D. Kroeker, M. Zaharia, S. Guo, and S. Keshav. Low-cost Communication for Rural Internet Kiosks Using Mechanical Backhaul. In Proc. of ACM Mobicom, Sept. 2006.
10/30 RFID and WiMax (ppt,pdf) Schiller Chapter 7.5
M. Kodialam and Thyaga Nandagopal. Fast and Reliable Estimation Schemes in RFID Systems. In Proc. of ACM Mobicom, Sept. 2006.
A. Ghosh, D. Wolter, J. G. Andrews, and R. Chen. Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential. IEEE Communication Magazine, Feb. 2005.
Part 3: Wireless network management and security
11/1 Localization Yu-Chung Cheng, Yatin Chawathe, Anthony LaMarca, and John Krumm. Accuracy Characterization for Metropolitan-scale Wi-Fi Localization. In Proc. of ACM MobiSys 2005, June 2005.
Saikat Guha, Rohan Narayan Murty and Emin Gun Sirer. Sextant: A Unified Framework for Node and Event Localization in Sensor Networks. In Proc. of MobiHoc 2005, May 2005.
11/6 Wireless network usage studies Magdalena Balazinska and Paul Castro. Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network. In Proc. of ACM MobiSys 2003.
Aditya Akella, Glenn Judd, Srinivsan Seshan, and Peter Steenkiste. Self-Management in Chaotic Wireless Deployments Proc. of ACM Mobicom 2005. Aug. - Sept. 2005.
11/8 Wireless network diagnosis Atul Adya, Victor Bahl, Ranveer Chandra, and Lili Qiu. Architecture and Techniques for Diagnosing Faults in IEEE 802.11 Infrastructure Networks. Proc. of DACM MOBICOM 2004, Sept. 2004.
Ranveer Chandra, Venkata Padmanabhan, Ming Zhang. WiFiProfiler: Cooperative Diagnosis in Wireless LANs. In Proc. of ACM MOBISYS, June 2006.
11/13 Y. Cheng, J. Bellardo, P. Benko, A. C. Snoeren, G. M. Voelker, and S. Savage. Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis. In Proc. of ACM SIGCOMM, Sept. 2006.
R. Mahajan, M. Rodrig, D. Wetherall, J. Zahorjan. Analyzing the MAC-level Behavior of Wireless Networks in the Wild  In Proc. of ACM SIGCOMM, Sept. 2006.
Anmol Sheth, Christian Doerr, Richard Han, Dirk Grunwald, and Douglas Sicker. MOJO: A Distributed Physical Layer Anomaly Detection System for 802.11 WLANs In Proc. of ACM MOBISYS, June 2006.
11/15 Wireless network security Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting Mobile Communications: The Insecurity of 802.11. Proc. of ACM Mobicom, 2001.
Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, and Brian Zill
Enhancing Security of Corporate Wi-Fi Networks Using DAIR. In Proc. of ACM MOBISYS, June 2006.
11/20 Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. The Feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of ACM MobiHoc 2005.
Maxim Raya, Jean-Pierre Hubaux, and Imad Aad. Domino: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots. Proc. of ACM MobiSys 2004.
11/22 Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly. Denial of Service Resilience in Ad Hoc Networks. In Proc. of ACM MobiCom 2004, Sept. 2004.
Ratul Mahajan, Maya Rodrig, David Wetherall, and John Zahorjan. Sustaining Cooperation in Multi-hop Wireless Networks. In Proc. of NSDI, May 2005.
Yih-Chun Hu, Adrian Perrig, and David Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proc. of ACM Mobicom, Sept. 2002.
11/27 Chuanxiong Guo, Helen J. Wang, and Wenwu Zhu. Smart Phone Attacks and Defenses. Proc. of HotNets III, 2004.
Patrick Traynor, William Enck, Patrick McDaniel, Thomas La Porta. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. In Proc. of ACM MOBICOM, Sept. 2006.
11/29 Project Presentation
12/4 Project Presentation
12/6 Project Presentation