Mobile Wireless Networking

Prof. James P.G. Sterbenz <jpgs@eecs.ku.edu>
Department of Electrical Engineering and Computer Science
The University of Kansas

Course Description

EECS 882
3 credit hours

Comprehensive coverage of the disciplines of mobile and wireless networking, with and emphasis on architecture and protocols. Topics include cellular telephony, MAC algorithms, wireless PANs, LANs, MANs, and WANs; wireless and mobile Internet; mobile ad hoc networking; mobility management, sensor networks; satellite networks; and ubiquitous computing.

Prerequisites

EECS 780, 563 as an undergraduate at KU, or equivalent, or permission from the instructor. This course is intended for MS and PhD level students and is not open to undergraduates.

Computer Accounts

You must be able to use either your EECS or ITTC account for some of the exercises in this class. All students enrolled in this course will have an EECS account. If you have forgotten your userid or password you must get these within the first week of class, either from the EECS office or helpdesk, or by requesting from Hossein Saiedian <saiedian@ku.edu> if you prefer to get it from the Edwards Campus. If you have an ITTC account, you do not need to use your EECS account for this class.

Your life may be easier if you have a Unix-like shell environment on your personal computer or laptop. This is automatic with Linux and MacOS (bring up a terminal window). On Windows, the two options are to install a Linux virtual machine, or to install Cygwin; the latter is sufficient for less-sophisticated users who only need to run Unix shell commands and scripts.

Time and Location

Important Notice: The first meeting of the class will be the first scheduled lecture session. The discussion session will not meet until announced in class or in the schedule table.

EECS 882 meets one evening a week for three hours on the KU Lawrence campus with a video-conference link to the Edwards campus in the western Kansas City suburb of Overland Park. A session is scheduled on an additional evening and will meet as needed for class make-up. See the individual course offering pages for detailed time and room information.

Lawrence Location

For Kansas City residents, this is approximately 30 miles / 50 km west of the Edwards Campus, a 40 minute drive mostly along the K-10 freeway. If you are coming from the northern half of the Kansas City area, you probably want to drive the northern route to Lawrence along I-70 / Kans. Turnpike. At the corner of Crestline and Irving Hill Rd. you are in front of Nichols Hall, and will see a sign for the Information and Telecommunication Technology Center (ITTC). Parking is available on both sides of the buiding. A parking permit is not needed on the Lawrence Campus after 17:00; several parking meters are available in the left-side lot for daytime parking .

Edwards Location

For Kansas City residents, the Edwards location is 2.4 mi. south from the Quivera Road exit of the southwestern portion of the I-435 loop to 127th St. For Lawrence residents this is approximately 30 miles / 50 km east of the Lawrence Campus, a 40 minute drive mostly along the K-10 expressway. A parking permit is not needed on the Edwards Campus. The K-10 Connector bus is a service used by many students between the Lawrence and Edwards campuses.

Course Offerings

Detailed information about individual offerings of this course will be located on the following pages, including schedule and homework assignments.

Generic course information and the latest version of the lectures are located on this page below. Current and past 882 students, as well as other seriously interested parties are welcome to request to join the EECS 882 Facebook group.

Lectures and Readings

EECS 882 Topics, Lectures, and Readings
Lecture Reading
Subject Key Protocols and Algorithms Required Optional  Presentations  EECS 780 Background
Administrivia, Ethics, and Preliminaries
MWN-AE
[print] [display]
 Ethics
 Citation
 [SRC1984]
 K:1
 S:2–2.2, 3–3.1.3
 lecture:
 [print] | [display]
Mobile Wireless Environment and
Physical Layer
MWN-MW
[print] [display]
 M:1
 [ARY1995]
 W:2.1, 3
 D:2
 [B2007]  S:5.1–5.1.1
 lecture:
 [print] | [display]
MAC Algorithms and Protocols
MWN-ML
[print] [display]
Aloha, Slotted Aloha
CSMA, CSMA/CD, CSMA/CA
MACA, MACAW, D-MAC
TDMA, TDD
FDMA, FDD, OFDMA
CDMA-DS, CDMA-FH
 M:2.3–2.3.4, 6
 [GL2000
 W:4.1–4.5
 D:3
 [KRD2006
 [BDSZ1994]
 [KSV2000]  K:5
 S:5.1.2–5.1.3
 lecture:
 [print] | [display]
Wireless LANs, PANs, and MANs
MWN-WN
Bluetooth, 802.15.1, 802.15.3 WPAN
IrDA, WUSB, WiMedia
802.11 WLAN, Wi-Fi
  802.16 WMAN, WiMAX, 802.22 WRAN  
 M:2, 3.9–3.11
 W:5,
      6–6.6, 6.8,
      7–7.6, 7.10
 [KT2007]
 [HDS+2010]
 W:7.8–7.9,
      8–9
 [AWW2005]
 [SC+2009]
 [NRT2004]
 ([VFC2013],
 [PG2011])
 [PW2010]
 [GOP2012]
 ([E2008],
 [WG+2008])
 K:6
Wireless Internet and
Transport Protocols
MWN-WI
 M:4, 9–9.6
 [KSE+2004]
 [KR2007]:3; 4–4.4
 [ST2001]:5.2–5.3.4; 5.4–5.5; 7–7.2.2
 lecture NL: [print] | [display]
 lecture TL: [print] | [display]
Mobility and Location Management
MWN-LM [print] [display]
random walk, random waypoint
Gauss-Markov
 [CBD2002]
 [RAH2007]
 [C2003]
 [V2003]
 [XW2008]
 [FK2006]
 [YLN2003]
 [BSH2003]
Cellular Mobile Telephony
MWN-MT
 M:3–3.8
Ad Hoc Networking
MW-AH
 M:5
MANET Routing Protocols
MWN-MR
 M:7
 [PRDM2001]
 [RS1996]
 [KR2007]:4.5–4.6
 [MR2007]
 lecture: [print] [display]
Energy Management
MWN-EM
 M:11
Sensor Networks
MWN-SN
802.15.4
ZigBee
 M:12
 [ASSC2002]
 [AK2004]
 [AY2005]
 [KW2005]
 [ZG2003]
 [QLT2007]
Satellite Links and Networks
MWN-SL
TCP (recommendations) (research)
PILC errors
SCPS SCPS-TP
 [PS2002]
 [WTJS2009]
Ubiquitous Computing and Communication
MWN-UC
Security, Survivability, Resilience
MWN-RS
 M:9.7–13
 [SKH+2002]
Network Simulation with ns-3
MWN-NS
[print] [display]
 [S2007]
 [S2008]
 ns-3 Web page 
 [WI2009]
 [FP2001]
 [HMK2001]
 Wireshark:
 [print] | [display
 sockets:
 [print] | [display
Introduction to Wireless Simulation with ns-3
MWN-SW
[print] [display]
 [KN+2004]
 ns-3 Wireless
 Tutorial
 
Introduction to Mobile Simulation with ns-3
MWN-SM
[print] [display]
 [BJS2010]
 ns-3 Mobility API

Reading assignments: M = Murthy & Manoj; W = Walke, Mangold, and Berlemann; D = Dahlman, Parkvall, and Sköld
Background reading: K = Kurose & Ross; S = Sterbenz & Touch

Required Textbooks

Signficant parts of these books will be required reading. In an attempt to provide a lower cost option, you may choose to check them out from Spahr or Edwards library reserve at the cost of the convenience of owning.

C. Siva Ram Murthy and B.S. Manoj,
Ad Hoc Wireless Networks: Architectures and Protocols,
Prentice-Hall Pearson, 2004.
This textbook covers most of the material in this class, and provides a base reference in addition to the survey papers assigned as the primary readings.

Bernhard H. Walke, Stefan Mangold, and Lars Berleman,
IEEE 802 Wireless Systems: Protocols, Multi-hop Mesh/Relaying, Performance and Spectrum Coexistence,
Wiley, 2006.
This textbook provides broad coverage of the 802.11 wireless protocols: 802.11 WLANs, 802.15 WPANs, and 802.16 WMANs.

Erik Dahlman, Stefan Parkvall, and Johan Sköld,
4G LTE / LTE-Advanced for Mobile Broadband,
Academic Press, 2011.
This textbook provides broad coverage of 3.9G LTE and future 4G LTE-A mobile telephony networks.

Required Readings

The readings are being restructured into required primary readings for each lecture and readings that will be presented by students.

The readings in this section are listed with the lecture to which they correspond, but do not need to be read before the lecture. At the end of each lecture, papers will be assigned to students to present to the class the following week, and all students must read the papers before then. Students may request a particular paper in advance by email. You must read the assigned sections before the corresponding lecture.

Student Presentations

The presenting student should construct a presentation that takes 20 minutes to deliver without questions, with a maximum of 10 content foils (excluding title, outline, and reference foils). If you are inexperienced, you must practise to a mirror or friend until you've got the timing right. Significant points will be deducted for presentations that are too long. You should read the presentation guidelines before you create your presentation, and use the template as a basis for your presentation. You must not use font sizes smaller than this template, and are strongly urged to turn off auto shrink to fit to avoid font size problems. If you are an experienced presenter with a PowerPoint style you are comfortable using, or if you wish to use other programs to create your presentation, you may do so with prior approval only after I have seen a sample, and this must be done well in advance of your first scheduled presentation. Otherwise, you must use the provided template. Presentations must be emailed the day before the scheduled delivery (by 23:59) in PDF (recommended) or PowerPoint source (necessary if you need animations) with a Subject: line beginning EECS882 - reading presentation:. You must also bring a USB memory stick to class containing your presentation. Once a presentation has been scheduled, it is not possible to reschedule for any reason other than emergency, to avoid disrupting the class schedule.

A one-half-hour time slot will be devoted to each presentation to allow for questions from other class members, which contributes to the participation grade.

[AB2007]
Fekri M. Abduljalil and Shrikant K. Bodhe,
“A Survey of Integrating IP Mobility Protocols and Mobile Ad Hoc Networks”
IEEE Communications Surveys and Tutorials,
vol.9 no.1, 1st quarter 2007, pp. 14–30

[ACFP2009]
Giuseppe Anastasia, Marco Conti, Mario Di Francescoa, and Andrea Passarella
Energy Conservation in Wireless Sensor Networks: A Survey
Ad Hoc Networks, Elsevier,
vol.7 iss.3, May 2009, pp. 537–568

[AK2004]
Jamal N. Al-Karaki and Ahmed E. Kamal,
Routing Techniques in Wireless Sensor Networks: A Survey
IEEE Wireless Communications,
vol.11 iss.6, December 2004, pp. 6–28

[ARY1995]
Jørgen Bach Andersen, Theodore S. Rappaport, and Susumu Yoshida,
“Propagation Measurements and Models for Wireless Communications Channels”,
IEEE Communications,
vol.33 no.1, January 1995, pp. 42–49

[ASSC2002]
Ian F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci,
Wireless Sensor Networks: A Survey
Computer Networks, Elsevier,
vol.38 iss.4, March 2002, pp. 393–422

[AY20005]
Kemal Akkaya and Mohamed Younis,
A Survey on Routing Protocols for Wireless Sensor Networks”,
Ad Hoc Networks, Elsevier
vol.3 iss.3, May 2005, pp. 325–349

[AWW2005]
Ian F. Akyildiz, Xudong Wang, and Weilin Wang,
Wireless Mesh Networks: A Survey
Computer Networks, Elsevier,
vol.47 iss.4, March 2005, pp. 445–487

[B2007]
Milind M. Buddhikot,
Understanding Dynamic Spectrum Access: Models, Taxonomy and Challenges
Proceedings of IEEE DySPAN 2007,
Dublin, April 2007, pp. 649–663

[BDSZ1994]
Vaduvur Bharghavan, Alan Demers, Scott Shenker, and Lixia Zhang,
MACAW: A Media Access Protocol for Wireless LAN's
Proceedings of ACM SIGCOMM 1994,
London, October 1994, pp. 212–224

[BJS2010]
Dan Broyles, Abdul Jabbar, and James P.G. Sterbenz,
Design and Analysis of a 3-D Gauss-Markov Mobility Model for Highly Dynamic Airborne Networks
Proceedings of International Telemetering Conference (ITC) 2010,
San Diego, 2010

[BMJ+1998]
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva,
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
Proceedings of ACM MobiCom 1998,
Dallas, October 1998, pp. 85–97

[BPC+2007]
Paolo Baronti, Prashant Pillai, Vince W.C. Chook, Stefano Chessa, Alberto Gotta, and Y. Fun Hu,
“Wireless Sensor Networks: A Survey on the State of the Art and the 802.15.4 and ZigBee Standards”,
Computer Communications, Elsevier,
vol.30, iss.7, May 2007, pp.1655–1695

[BPSK1997]
Hari Balakrishnan, Venkata N. Padmanabhan, Srinivasan Seshan, and Randy H. Katz,
A Comparison of Mechanisms for Improving TCP Performance over Wireless Links
IEEE/ACM Transactions on Networking (TON),
vol.5 iss.6, December 1997, pp. 756–769

[BSH2003]
Fan Bai, Narayanan Sadagopan, Ahmed Helmy,
The IMPORTANT framework for analyzing the Impact of Mobility on Performance Of RouTing protocols for Adhoc NeTworks
Ad Hoc Networks,
Elsevier, vol.1 iss.4, November 2003, pp. 383–403

[C2003]
Tracy Camp
Location Information Services in Mobile Ad Hoc Networks,
Colorado School of Mines Technical Report MCS-03-15,
October 2003

[CAG2008]
Vikram Chandrasekhar, Jeffrey G. Andrews, and Alan Gatherer,
Femtocell Networks: A Survey”,
IEEE Communications,
vol.46 iss.9, September 2008, pp.59–67

[CBD2002]
Tracy Camp, Jeff Boleng, and Vanessa Davies,
A Survey of Mobility Models for Ad Hoc Network Research”,
Wireless Communications and Mobile Computing, Wiley,
vol.2 iss.5, September 2002, pp.483–502

[CDM+2007]
Pi-Chun Chen, Ren Da, Chris Mooney, Yang Yang, Qinqing Zhang, Lily H. Zhu, and Jialin Zou,
“Quality of Service Support in 1x EV-DO Revision A Systems”
Bell Labs Technical Journal, Wiley,
vol.11 iss.4, March 2007, pp. 169–184

[CGK+2002]
Andrew T. Campbell, Javier Gomez, Sanghyo Kim, Chieh-Yih Wan, Zoltan R. Turanyi, and Andras G. Valko,
Comparison of IP Micromobility Protocols”,
IEEE Wireless Communications,
vol.44 iss.12, February 2002, pp. 2–12

[CCMM2009]
Luca Chiaraviglio, Delia Ciullo, Michela Meo, and Marco Ajmone Marsan,
Energy-Efficient Management of UMTS Access Networks”,
ITC 2009,
Paris, September 2009, pp.1–8

[CG2007a]
Marco Conti and Silvia Giordano,
“Multihop Ad Hoc Networking: The Theory”,
IEEE Communications,
vol.45 iss.4, April 2007, pp. 78–86

[CG2007a]
Marco Conti and Silvia Giordano,
“Multihop Ad Hoc Networking: The Reality”,
IEEE Communications,
vol.45 iss.4, April 2007, pp. 88–95

[CL+2006]
Peter W. C. Chan, Ernest S. Lo, Ray R. Wang, Edward K. S. Au, Vincent K. N. Lau, Roger S. Cheng, Wai Ho Mow, Ross D. Murch, and Khaled Ben Letaief,
“The Evolution Path of 4G networks: FDD or TDD?”,
IEEE Communications,
vol.44 iss.12, December 2006, pp. 42–50

[CMYP2009]
Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou,
“Sensor Network Security: A Survey”
IEEE Communications Surveys and Tutorials,
vol.11 no.2, 2nd quarter 2009, pp. 52–73

[DMT1997]
Robert C. Durst, Gregory J. Miller, and Eric J. Travis,
TCP Extensions for Space Communications”,
Wireless Networks, Baltzer / Springer
vol.3 no.5, October 1997, pp. 389–403

[E2008]
Kamran Etemad,
“Overview of Mobile WiMAX Technology and Evolution”,
IEEE Communications,
vol.46 iss.10, October 2008, pp. 31–40

[FF2008]
Kevin Fall and Stephen Farrell,
DTN: An Architecural Perspective”,
IEEE Journal on Selected Areas in Communications,
vol.26 no.5, June 2008, pp. 828–836

[FGA2008]
Fotis Foukalas, Vangelis Gazis, and NancyY Alonistiotis,
“Cross-Layer Design Proposals for Wireless Mobile Networks: A Survey and Taxonomy”
IEEE Communications Surveys & Tutorials,
vol.10 no.1, 1st quarter 2008, pp. 70–85

[FP2001]
Sally Floyd and Vern Paxon,
Difficulties in Simulating the Internet
IEEE/ACM Transactions on Networking (TON),
vol.9 no.4, August 2001, pp. 392–403

[G2006]
Liljana Gavrilovska,
“Cross-Layering Approaches in Wireless Ad Hoc Networks”
Wireless Personal Communications, Springer
vol.37 no.3&ndash4, 2006, pp.271–290

[GK+2008]
A. Greenspan, M. Klerer, J. Tomcik, R. Canchi, J. Wilson,
“IEEE 802.20: Mobile Broadband Wireless Access for the Twenty-First Century”,
IEEE Communications,
vol.46 iss.7, July 2008, pp. 56–63

[GL2000]
Ajay Chandra V. Gummalla, John O. Limb,
“Wireless Medium Access Control Protocols”,
IEEE Communications Surveys & Tutorials,
vol.3 iss.2, 2nd quarter 2000, pp. 2–15

[GOP2012]
Carles Gomez, Joaquim Oller, and Josep Paradells,
Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology
Sensors,
vol.12 iss.9, 2012, pp. 11734–11753

[HDS+2010]
Guido R. Hiertz, Dee Denteneer, Philips Lothar Stibor, Yunpeng Zang, Xavier Pérez Costa, and Bernhard Walke,
The IEEE 802.11 Universe
IEEE Communications,
vol.48 iss.1, January 2010, pp. 62–70

[HMK2001]
John Heidemann, Kevin Mills, and Sri Kumar,
Expanding Confidence in Network Simulations
IEEE Network,
vol.5 iss.5, September/October 2001, pp. 58–63

[J1994]
David B. Johnson,
“Routing in Ad Hoc Networks of Mobile Hosts”,
IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) 1994,
Santa Cruz, December 1994, pp. 158–163

[JRO+2009]
Abdul Jabbar, Justin P. Rohrer, Andrew Oberthaler, Egemen K. Çetinkaya, Victor S. Frost, and James P.G. Sterbenz,
Performance Comparison of Weather Disruption-Tolerant Cross-Layer Routing Algorithms
IEEE INFOCOM 2009, Rio de Janiero,
April 2009, pp.1143–1151

[JHSG2011]
Ki-Young Jang, Shuai Hao, Anmol Sheth, and Ramesh Govindan,
Snooze: Energy Management in 802.11n WLANs”,
ACM CoNEXT 2011, Tokyo,
December 2011, article 12

[JSAC2001]
Christine E. Jones, Krishna M. Sivalingam, Prathima Agrawal, and Jyh Cheng Chen
“A Survey of Energy Efficient Network Protocols for Wireless Networks”,
Wireless Networks, Kluwer,
vol.7, iss.4, August 2001, pp. 343–358

[KCC2005]
Stuart Kurkowski, Tracy Camp, and Michael Colagrosso,
“MANET Simulation Studies: The Incredibles”,
ACM Mobile Computing and Communications Review,
vol.9, iss.4, October 2005, pp. 50–61

[KK2005]
Vikas Kawadia and P.R. Kumar,
“A Cautionary Perspective on Cross-Layer Design”,
IEEE Wireless Communications,
vol.1, iss.1, February 2005, pp. 3–10

[KN+2004]
David Kotz, Calvin Newport, Robert S. Gray, Jason Liu, Yougu Yuan, and Chip Elliott,
Experimental Evaluation of Wireless Simulation Assumptions”,
Dartmouth Computer Science Technical Report TR2004-507, June 2004,
extended version of paper in
Proceedings of ACM/IEEE MSWiM 2004, Elsevier,
Venezia, October 2004, pp. 78–82

[KRD2006]
Sunil Kumar, Vineet S. Raghavan, and Jing Deng,
“Medium Access Control Protocols for Ad Hoc Wireless Networks: A Survey”,
Ad Hoc Networks, Elsevier,
vol.4, iss.3, May 2006, pp. 326–358

[KS2006]
Rajesh Krishnan and David Starobinski,
Efficient Clustering Algorithms for Self-Organizing Wireless Sensor Networks”,
Ad Hoc Networks, Elsevier,
vol.4 iss.1, January 2006, pp. 36–59

[KSE+2004]
Rajesh Krishnan, James P.G. Sterbenz, Wesley M. Eddy, Craig Partridge, and Mark Allman,
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks”,
Computer Networks, Elsevier,
vol.46 iss.3, October 2004, pp. 343–362

[KSV2000]
Young-Bae Ko, Vinaychandra Shankarkumar, Nitin H. Vaidya,
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks”,
Proceedings of IEEE INFOCOM 2000,
Tel-Aviv, vol.1, March 2000, pp.13–21

[KT2007]
Mehmet S. Kuran and Tuna Tugcu,
A Survey on Emerging Broadband Wireless Access Technologies
Computer Networks, Elsevier,
vol.51 iss.11, August 2007, pp.3013–3046

[LL2006]
Ka-Cheong Leung and Victor O.K. Li,
Transmission Control Protocol (TCP) in Wireless Networks: Issues, Approaches, and Challenges
IEEE Communications Surveys and Tutorials,
vol.8 no.4, 4th quarter 2006, pp.64–79

[LSP2009]
Michele Nogueira Lima, Aldri Luiz dos Santos, and Guy Pujolle,
A Survey of Survivability in Mobile Ad Hoc Networks”,
IEEE Communications Surveys and Tutorials,
vol.11 no.1, first quarter 2009, pp. 66–77

[MCCM2009]
Marco Ajmone Marsan, Luca Chiaraviglio, Delia Ciullo, and Michela Meo,
Optimal Energy Savings in Cellular Access Networks”,
IEEE ICC 2009 Workshops,
Dresden, June 2009, pp.1–5

[MPAF2004]
Arunesh Mishra, Nick L. Petroni, Jr., William A. Arbaugh, and Timothy Fraser
“Security Issues in IEEE 802.11 Wireless Local Area Networks: A Survey”,
Wireless Communications and Mobile Computing, Wiley InterScience,
vol.4 iss.8, December 2004, pp. 821–833

[MR1996]
F. Muratore and G. Romano,
“GSM versus CDMA: Performance Comparisons”,
Proceedings of IEEE GLOBECOM 1996,
London, vol.1, November 1996, pp.519–524

[NRT2004]
Qiang Ni, Lamia Romdhani, and Thierry Turletti,
A Survey of QoS Enhancements for IEEE 802.11 Wireless LAN”,
Wireless Communications and Mobile Computing,
Wiley, vol.4 iss.5, August 2004, pp. 547–566

[OSC+2013]
Antonio de la Olivia, Ignacio Soto, Maria Calderon, Carlos J. Bernados, and M. Isabel Sanchez,
The Costs and Benefits of Combining Different IP Mobility Standards”,
Computer Standards & Interfaces, Elsevier,
vol.35, iss.2, Feb. 2013, pp.205–217

[P2002]
Charles E. Perkins, ed.,
IP Mobility Support for IPv4,
Internet RFC 3344 (standards track),
August 2002

[PG2011]
Eldad Perahia, and Michelle X. Gong,
Gigabit Wireless LANs: an overview of IEEE 802.11ac and 802.11ad’
ACM SIGMOBILE Mobile Computing and Communications Review,
vol.15 iss.3, July 2011, pp. 23–33

[PR1999]
Charles E. Perkins, Elizabeth M. [Belding-]Royer,
Ad-hoc On-Demand Distance Vector Routing
IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) 1999,
New Orleans, February 1999, pp. 90–100

[PRDM2001]
Charles E. Perkins, Elizabeth M. [Belding-]Royer, Samir R. Sas, and Manesh K. Marina,
Performance Comparison of Two On-Demand Routing Protocols for Ad-Hoc Networks
IEEE Personal Communications,
vol.8 iss.1, February 2001, pp. 16–28

[PS2002]
Craig Partridge and Timothy J. Shepard,
“TCP/IP Performance over Satellite Links”
IEEE Personal Communications,
vol.11 iss.5, February 2001, pp. 44–49

[PW2010]
Maulin Patel and Jianfeng Wang,
“Applications, Challengges, and Prospective in Emerging Body Area Networking Technologies”
IEEE Wireless Communications,
vol.17 iss.1, February 2010, pp. 80–88

[QLT2007]
Yi Qian, Keijie Lu, and David Tipper,
A Design for Secure and Survivable Wireless Sensor Networks
IEEE Wireless Communications,
vol.14 iss.5, October 2007, pp. 30–36

[RAH2007]
A. Rahaman, J. Abawajy, and M. Hobbs,
“Taxonomy and Survey of Location Management Systems”
6th IEEE/ACIS International Conference on Computer and Information Science,
July 2007, pp. 369–374

[RJC+2011]
Justin P. Rohrer, Abdul Jabbar, Egemen K.Çetinkaya,Erik Perrins, and James P.G. Sterbenz,
Highly-Dynamic Cross-Layered Aeronautical Network Architecture
IEEE Transactions on Aerospace and Electronic Systems (TAES),
vol.47 iss.4, October 2011, pp.2742–2765

[RS1996]
S. Ramanathan and Martha Steenstrup,
A Survey of Routing Techniques for Mobile Communications Networks
Mobile Networks and Applications,
vol.1 iss.2, February 1996, pp. 89–104

[RT1999]
Elizabeth M. [Belding-]Royer and C.-K. Toh,
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”,
IEEE Personal Communications,
vol.6, iss.2, April 1999, pp.46–55

[S2007]
Paul J. Sánchez,
Fundamentals of Simulation Modeling”,
Proceedings of the 2007 Winter Simulation Conference,
Washington D.C., December 2007, pp. 54–62

[S2008]
David T. Sturrock,
Tips for Successful Practice of Simulation”,
Proceedings of the 2008 Winter Simulation Conference,
Miami, December 2007, pp. 85–90

[SC+2009]
C. Stevenson, G. Chouinard, Zhongding Lei, Wendong Hu, S. Shellhammer, W. Caldwell,
“IEEE 802.22: The First Cognitive Radio Wireless Regional Area Network Standard”,
IEEE Communications,
vol.47 iss.1, January 2009, pp. 130–138

[SHC+2010]
James P.G. Sterbenz, David Hutchison, Egemen K. Çetinkaya, Abdul Jabbar, Justin P. Rohrer, Marcus Schöller, and Paul Smith,
Resilience and Survivability in Communication Networks: Strategies, Principles, and Survey of Disciplines”,
Computer Networks, Elsevier,
vol.54 iss.8, June 2010, pp. 1245–1265

[SKH+2002]
James P.G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David Levin, Ram Ramanathan, and John Zao,
Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions”,
Proceedings of the ACM Wireless Security Workshop (WiSE) 2002 at MobiCom,
Atlanta GA, September 2002, pp. 31–40

[SM2005]
Vineet Srivastava and Mehul Motani,
“Cross-Layer Design: A Survey and the Road Ahead”,
IEEE Communications,
vol.43, iss.12, December 2005, pp. 112–119

[SMA2006]
Minho Shin, Justin Ma, Arunesh Mishra, and William A. Arbaugh,
“Wireless Network Security and Interworking”,
Proceedings of the IEEE,
vol.94 no.8, February 2006, pp. 455–466

[SRC1984]
Jerome H. Saltzer, David P. Reed, and David D. Clark,
End-to-End Arguments in System Design”,
ACM Transactions on Computer Systems,
vol.2, iss.4, November 1984, pp. 277–288

[SYY+2013]
Zhengguo Sheng, Shusen Yang, Yifan Yu, Athanasios V. Vasilakos, Julie A. McCann, and Kin K. Leung,
“A Survey of the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities”,
IEEE Wireless Communications,
vol.20, iss.6, December 2013, pp. 91–98

[SSK2002]
James P.G. Sterbenz, Tushar Saxena, and Rajesh Krishnan,
Latency-Aware Information Access with User-Directed Fetch Behaviour for Weakly-Connected Mobile Wireless Clients,
BBN Technologies Technical Report 8340, May 2002

[TRV1998]
N.D. Tripathi, J.H. Reed, and H.F. VanLandinoham,
“Handoff in Cellular Systems”
IEEE Personal Communications,
vol.5 iss.6, December 1998, pp. 26–37

[VFC2013]
Lochan Verma, Mohammad Fakharzadeh, and Sunghyun Choi,
WiFi on Steroids: 802.11ac and 802.11ad
IEEE Wireless Communications,
vol.5 iss.6, December 1998, pp. 26–37

[VC2013] Narseo Vallina-Rodriguez and Jon Crowcroft,
Energy Management Techniques in Modern Mobile Handsets”,
IEEE Communication Surveys and Tutorials,
vol.15, iss.1, 1st qurter 2013, pp.179–198

[V2003]
Upkar Varshney,
Location Management for Mobile Commerce Applications in Wireless Internet Environment”,
ACM Transactions on Internet Technology,
vol.3, no.3, August 2003, pp. 236—255

[WG+2008]
Fan Wang, A. Ghosh, C. Sankaran, P. Fleming, F. Hsieh, S. Benes,
“Mobile WiMAX Systems: Performance and Evolution”,
IEEE Communications,
vol.46 iss.10, October 2008, pp. 41–49

[WHC2005]
Tin-Yu Wu, Ching-Yang Huang, and Han-Chieh Chao,
A Survey of Mobile IP in Cellular and Mobile Ad-Hoc Network Environments”,
Ad Hoc Networks,
vol.3 iss.3, May 2005, pp. 351–370

[WI2009]
K. Preston White Jr. and Ricki G. Ingalls
Introduction to Simulation”,
Proceedings of the 2009 Winter Simulation Conference,
Austin, December 2009, pp. 12–23

[WYSG2005]
Ren Wang, Kenshin Yamada, M. Yahya Sanadidi, and Mario Gerla,
TCP with Sender-Side Intelligence to Handle Dynamic, Large, Leaky Pipes”,
IEEE Journal on Selected Areas in Communications,
vol.23 no.2, February 2005, pp. 235–248

[WPE2001]
Lloyd Wood, George Pavlou, and Barry Evans,
Effects on TCP of Routing Strategies in Satellite Constellations”,
IEEE Communications,
vol.39 iss.3, March 2001, pp. 172–181

[WTJS2009]
Ruhai Wang, Tarik Taleb, Abbas Jamalipour, and Bo Sun,
“Protocols for Reliable Data Transport in Space Internet”,
IEEE Communications Surveys and Tutorials,
vol.11 no.2, second quarter 2009, pp. 21–31

[YLN2003]
J. Yoon, M. Liu, and B. Noble,
Random Waypoint Considered Harmful”,
Proc. IEEE INFOCOM 2003,
March 2003, pp. 1–13

[ZAB1999]
M. Zeng, A. Annamalai, and V.K. Bhargava,
Recent Advances in Cellular Wireless Communications”,
IEEE Communications,
vol.37 iss.9, September 1999, pp. 128–138

[ZG2003]
Jerry Zhao and Ramesh Govindan,
Understanding Packet Delivery Performance in Dense Wireless Sensor Networks”,
Proc. ACM SenSys 2003,
November 2003, pp. 1312–1321

Background Textbooks

These books provide background material that should have been learned in a prerequisite introductory networking course, and may be consulted when needed.

[KR2007]
James F. Kurose and Keith F. Ross,
Computer Networking: A Top-Down Approach Featuring the Internet, fourth edition,
Pearson Addison Wesley, 2007.
(This is the most recent edition of the primary textbook used for EECS 780)

[GW2004]
Alberto Leon-Garcia and Indra Widjaja,
Communication Networks: Fundamental Concepts and Key Architectures,
2nd ed., McGraw-Hill, 2004.
(This is the textbook used for EECS 563)

[ST2001]
James P.G. Sterbenz and Joseph D. Touch,
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication,
John Wiley, New York, 2001.
(This book is also used for EECS 780 and EECS 881)

[MR2007]
Deepankar Medhi and Karthikeyan Ramasamy,
Network Routing,
Morgan Kaufmann, 2007.
(Detailed coverage of routing algorithms and protocols in the PSTN and Internet as well as IP router architecture)

Supplementary Textbooks

These books provide additional information and depth on topics covered in this class, and may be consulted to increases knowledge in particular areas. Most of them will be placed on reserve in the library early in the semester.

[S2005]
William Stallings,
Wireless Communications & Networks,
2nd edition, Prentice-Hall Pearson, 2005.

MANETs

[P2001]
Charles E. Perkins (ed.),
Ad Hoc Networking,
Addison Wesley, 2001.

[R2011]
Radhika Ranjan Roy,
Handbook of Mobile Ad Hoc Networks for Mobility Models,
Springer, 2011.
(available online through KU Libraries)

[LC2000]
Yi Bing Lin and Imrich Chlamtac,
Wireless and Mobile Network Architectures,
Wiley, 2000.

Wireless PANs, LANs, and MANs

[G2005]
Matthew S. Gast,
802.11 Wireless Networks: The Definitive Guide,
2nd ed., O'Reilly, 2005.
(Comprehensive coverage of 802.11 wireless LANs and protocols predating 802.11n)

[PS2008]
Eldad Perahia and Robert Stacey,
Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n,
Cambridge Univ. Press, 2008, reprinted with corrections 2010.
(Comprehensive coverage of 802.11n)

[PD2006]
Ramjee Prasad and Luc Deneire,
From WPANs to Personal Networks: Technologies and Applications,
Artech, 2006.
(Coverage of the various flavours fo 802.15)

[N2007]
Loutfi Nuaymi,
WiMAX: Technology for Broadband Wireless Access,
Wiley, 2007

[AGM2007]
Jeffrey G. Andrews, Arunagha Ghosh, and Rias Muhamed,
Fundamentals of WiMAX: Understanding Broadband Wireless Networking,
Prentice Hall, 2007

Wireless Internet

TBD

Mobile Telephony

Arunagha Ghosh, Jun Zhang, Jeffrey G. Andrews, and Rias Muhamed,
Fundamentals of LTE,
Prentice Hall, 2011. This textbook provides broad coverage of 3.5G LTE mobile telephony networks.

[DPSB2008] Erik Dahlman, Stefan Parkvall, Johan Sköld, and Per Bemming
3G Evolution: HSPA and LTE for Mobile Broadband,
Academic Press, 2nd ed., 2008.
(Earlier version of the 4G LTE/LTE-A book with coverage of 3G HSPA and 3.5G HSPA+ mobile telephony networks)

[E2004] Kamran Etemad
CDMA2000 Evolution: System Concepts and Design Principles,
John Wiley Interscience, 2004.
(Coverage of the CDMA branch of 3G technology)

Sensor Networks

[KW2005]
Holger Karl and Andreas Willig,
Protocols and Architectures for Wireless Sensor Networks,
Wiley, 2005.
(Comprehensive survey of sensor network architecture, protocols, and algorithms)

Satellite Networks

TBD


Grading

Grading is on a modified curve in which students are grouped (generally by modes in the distribution). Exams, homework, and class participation will receive numerical scores; the term project will receive a letter grade (with + and – discriminators) that will be converted to a numeric value for determining final weighted average. Final grades at KU do not have the + and – modifiers. Employer reimbursement and immigration status cannot be a consideration in the final grade. The threshold indicates the letter grade guaranteed for a given numerical score regardless of the curve. That is, a numerical average of 90% will get an A regardless of the curve. Note that the curve typically lies below this, that is an A will correspond to a grade below 90%.

EECS 882 Final Grade Modes
GradeMeaningThreshold
Aexceptional exam results and publishable project90
Bmastery of material and solid project80
Cslacking but know basic material and marginal project70
Dvery poor performance on exams or project60
Fnon-performance on exams or project, or academic misconduct in class

If you are having difficulty in the class I strongly recommended you discuss this early and not wait until exam time. Students are responsible for understanding course drop policies and deadlines.

The relative contribution of course assignments to the overall grade is given in the Grade Weight table.

EECS 882 Grading
weightcomponent
15%exam 1
15%exam 2
10%exam 3 (portion of final exam)
10%comprehensive portion of final exam
00%lab exercises and homework problems
20%paper presentation and class participation
25%term project report and presentation (extra credit for publishable paper)

If you are having difficulty in the class I strongly recommended you discuss this early and not wait until exam time. Students are responsible for understanding course drop policies and deadlines.


Assignments and Exams

ns-3 Laboratory Exercises and Homework Problems

Laboratory exercises using ns-3 permit the simulation of mobile-wireless networks in a controlled environment.

Specific assignments and dates are located in the course offering page for a given semester. Assignments will not be graded nor receive credit unless they follow the submission requirements.

Exams

Exams will be closed book and take approximately 1/2 of a class period. The exam information page contains detailed information on the requirements, structure, and grading of examinations for this course. You must also read the academic integrity page before taking an exam.

While you are responsible for all lecture and required readings, the following list outlines some of the most important topics likely to be covered on the exams for this course.

Exam 1: Fundamentals, MAC, Wireless Links and Subnetworks

Exam 2: Mobile and Ad Hoc Networks

Exam 3: Domain-specific networks and special topics

Final Exam (comprehensive portion)

Homework and Lab Exercises

There will be a few homework problems assigned from the book to help guage your understanding of the material and to get practics in solving problems.

There will be a series of laboratory assignments to be implemented using the ns-3 network simulation package. The laboratory sessions are intended to give you an introduction to ns-3 as well as help you get started with each exercise. The laboratory assignments provide the experience necessary to execute a project in ns-3. It is recommended that you install and run your simulations on your own computer if possible. For this you will need a Linux partition or virtual machine (unless you are in the ResiliNets group and wish to use your usual ns-3 build). It is possible to install ns-3 on cygwin, but the GTA will not provide support for such installations if there are problems. Generally we use the lastest release of ns-3, but be sure to either wait for the introductory ns-3 lecture or ask the GTA what release to use before installing on your own machine.

Paper Presentation and Class Participation

The class presentation and participation grade for each student will depend not only on the presentation, but also significantly on students asking insightful questions of the presentation that clearly demonstrate that the assigned papers have been read before class.

Project

Each student will complete a project (individual or group) and present to the class. Generally these will be ns-3 simulation projects that may lead to a MS thesis, project, or PhD dissertation topic. Details project topics, grouping, milestones, and submission guidelines are on the specific offering page.


Navigation: Up: coursesPrevious: EECS 881Next: EECS 983Top: James P.G. Sterbenz


Last updated 24 April 2016 – Valid XHTML 1.1Lynx inspectedW3C AAA Conformance
©2006–2016 James P.G. Sterbenz <jpgs@eecs.ku.edu>