1-Ad Hoc Networks-Introduction-Lecture1
1-Ad Hoc Networks-Introduction-Lecture1
Dr Ljiljana Simić
iNETS, RWTH Aachen University
SS2016
Important
Note:
These
course
notes
may
contain
some
copyrighted
material.
The
copyright
of
this
material
covers
its
use
in
class
and
for
educa7onal
purposes,
but
you
are
not
allowed
to
distribute
this
course
material
freely.
Under
the
code
of
appropriate
use,
please
refrain
from
uploading
the
provided
source
files
or
documents
to
any
publicly
accessible
system
outside
RWTH
Aachen
University
without
prior
permission.
1
#
WELCOME TO THE COURSE!
The
course
should
be
fun
…
#
WELCOME TO THE COURSE!
…
and
hopefully
you
will
learn
something
during
it.
2
Teaching Staff
Lecturer:
Dr
Ljiljana
Simić
[email protected]‐aachen.de
TA:
Mr
Fei
Liu,
M.Sc.
(
[email protected]‐aachen.de
Logistics
3
Exam
§ oral
exam
- Tue
2nd
August
- Wed
3rd
August
- Thu
4th
August
§ if
you
have
a
CLASH
with
another
exam,
contact
TA
NOW
L2P
§ we
are
using
L2P
§ big
announcements
are
also
sent
by
email
§ in
principle
course
pages
include:
§ announcements
§ notes
on
the
homework
§ possibility
for
discussion
forum
§ lecture,
homework
&
extra
material
4
Check your RWTH email#
regularly!
5
How do I get 1.0 or A+?
§ prerequisites:
no
strict
ones
§ but
you
should
know
something
about
computer
networks
and
something
about
programming
§ we
expect
a
reasonable
amount
of
work,
but
also
credit
it
§ homework
assignments
(typically
w.r.t.
research
papers)
§ exam
(a.k.a.
“reality
check”)
6
Course material
§ no
textbook
–topic
is
combina7on
of
several
different
fields
and
no
perfect
textbook
exists
§ also
s7ll
in
the
R&D
phase
§ s7ll
emerging
area
–
no
“right
solu7ons”
§ we
encourage
open
discussion!
§ we
will
rely
on
lecture
slides
&
original
research
papers
Relevant textbooks
C.K.
Toh
(2002)
Ad
Hoc
Mobile
Wireless
Networks:
Protocols
and
Systems,
Pren7ce-‐Hall
§ nice
general
introduc7on
to
ad
hoc
networks,
but
does
not
cover
everything
we
want,
also
somewhat
“old”
C.
Perkins,
Ed.
(2001)
Ad
Hoc
Networks,
Addison-‐Wesley
§ essen7ally
‘just’
a
combina7on
of
ar7cles
on
rou7ng.
C.
Siva
Ram
Murthy
&
B.S.
Manoj
(2004)
Ad
Hoc
Wireless
Networks:
Architectures
and
Protocols,
Pren7ce-‐Hall
§ 850
pages.
probably
best
of
the
bunch…but
it
is
a
bit
heavy
Feng
Zhao
&
Leonidas
Guibas
(2004)
Wireless
Sensor
Netoworks:
Informa'on
Processing
Approach,
Morgan
Kaufman
H.
Karl
&
A.
Willig
(2007)
Protocols
and
Architectures
for
Wireless
Sensor
Networks,
Wiley
7
Material and orientation
§ working
somewhere
in
the
middle
of
Electrical
Engineering,
Computer
Science
and
Computer
Engineering
§ slides
contain
the
main
points
and
some
addi7onal
material
§ also
some
handouts
that
will
give
useful
background
informa7on
a
very
important
and
key
part
of
the
course
is
formed
by
original
research
arRcles
Goals
§ course
is
planned
to
make
sure
that
everyone
has
necessary
background
informa7on
on
this
field
§ but
it
will
not
make
you
an
expert,
yet
J
§ also
designed
to
teach
and
train
you
to
criRcally
read
research
papers
and
evaluate
ideas
§ transi7on
to
becoming
a
professional
engineer
§ this
also
means
reading
efficiently
and
quickly
§ in
small
part
it
will
also
teach
you
how
to
express
your
ideas
and
present
them
to
others
8
Strange devices
9
Rough Contents – Part II
§ MAC
Layer
for
Wireless
Networks
§ historical
evolu7on:
MACA,
MACAW,
CSMA/CA
§ hidden
terminal
problem
§ power-‐aware
MAC
§ MAC
with
direc7onal
antennas
§ ImplemenRng
Ad
Hoc
Networks
over
Wireless
§ radio
possibili7es
for
ad
hoc
networks
§ IEEE
802.11,
IEEE
802.15.4,
Bluetooth
hello
– Introduction
10
(R)evolution road to ad hoc networks
1. compu7ng
revolu7on
2. mobile
wireless
revolu7on
(cellular,
Wi-‐Fi)
3. Internet
revolu7on
The “Future” …
- telemedicine
- video phone
- smart watch
11
“Cool” Internet appliances
world’s smallest#
web server
http://www-ccs.cs.umass.edu/
shri/iPic.html
web-connected printer#
http://littleprinter.com/
Convergence? ...
First
Color
TV
Broadcast,
1953
HBO
Launched,
InteracRve
TV,
1972
1990
Telephone, 1876
PenRum
PC,
1993
Computer
First
PC
IBM
Apple
Apple
IBM
+
Modem
Altair,
PC,
Mac,
Powerbook,
Thinkpad,
1957
1974
1981
1984
1990
1992
Apple
Newton,
1993
HP
Palmtop,
1991
Red
Herring,
10/99
12
… divergence and competition
Atari
Home
Pong,
1972
PROLIFERATION OF DIVERSE#
END-DEVICES & ACCESS NETWORKS
Red
Herring,
10/99
Information appliances
§ different
design
constraints
based
on
intended
use,
enhances
ease
of
use
§ desktop
PC,
mobile
PC
§ desktop
“smart”
phone
§ mobile
telephone
§ tablet
§ set-‐top
box,
digital
VCR
§ in-‐car
naviga7on
§ implicaRons:
§ shio
from
computer
design
to
consumer
design
§ heterogeneous
“standards”
&
hybrid
networking
§ interacRve
networking,
access
on
demand,
QoS
13
New network beyond the PC
Internet
computers
500+
million
today’s
Internet
Internet
users
2+
billion
automobiles
663
million
telephones
embedded
ca.
5.2
billion
(4
billion
mobile)
networks
electronic
chips
30+
Billion
Internet of Things
§ by
2020,
predicRons
of
20-‐50
billion
devices
connected
to
Internet
14
Wireless data transmission
Fibre
op7c
Wired
IR
Mbps
100
MBR
-‐
Mobile
Broadband
Network
DSL
10
(LTE)
WLAN
1
UMTS
–
3G
Cordless
Phone
0.1
EDGE
–
2.5G
Mainframe
Minicomputer
year
15
Ubiquitous computing
§ Mark
Weiser’s
1996
hallmark
paper:
“Coming
Age
of
Calm
Technology”
16
aside: Xerox PARC
§ almost
mythical
laboratory
and
quality
in
the
systems
research
(see
e.g.
book
“Dealers
of
Lightning”)
§ Bob
Taylor
lead
CSL
(leo
PARC
later)
17
Internet of Things
§ by
2020,
predicRons
of
20-‐50
billion
devices
connected
to
Internet
Internet of Everything?
18
Internet of Everything?
19
Miniaturization and microelectronics
Itanium2
(241M)
MEMS
on
chip
Radios at present
20
What is an ad hoc wireless network?
§ ad
hoc
(La7n)
=
created
for
a
parRcular
purpose
§ wireless
=
mobile
hosts
(&
unreliable
links)
§ network
=
informaRon
sharing
two-‐way
communicaRon
mulR-‐hop
communicaRon
radio
signals
resource
sharing
network
cloud
physical
wireless
local
connecRvity
21
Explanation of a MANET
§ no
need
for
fixed
infrastructure
§ each
node
equipped
with
one
or
more
radios
§ radios
can
be
heterogeneous
§ each
node
free
to
move
about
while
communica7ng
§ paths
between
nodes
can
be
mulR-‐hop
Applications of MANETs
current
applicaRons
emerging
applicaRons
§ shared
whiteboard
§ electronic
payments
from
applica7on
(office
anywhere
workgroup)
§ habitat
monitoring
§ mul7-‐user
games
§ high-‐precision
agriculture
§ robo7c
pets
§ biomedical
§ PAN/home/office
wireless
§ earthquake
monitoring
network
§ industrial
automa7on
§ communica7ons
for
§ smart
home
emergency/disaster
relief
§ security
§ what you invent!
22
MANET Advantages & Disadvantages
§ dynamic
topologies
§ bandwidth
§ restricted
7me-‐bounded
service
(voice,
video)
§ loose
7me-‐bounded
service
(data)
§ energy-‐constrained
opera7on
§ limited
physical
security
23
And mobility…
24
Mobility means changes in …
§ hardware
- lighter
- more
robust
- lower
power
§ wireless
communicaRon
- can’t
tune
the
network
for
sta7onary
access
§ network
protocols
- name/address
changes
- delay
changes
- error
rate
changes
25
Mobility, in conclusion
generally,
mobility
stresses
all
resources
further:
- CPU
- power
- bandwidth
- delay
tolerance
- radio
spectrum
- physical
size
- loca7ons
for
device
placement
- constraints
on
peripherals
and
GUIs
- human
aren7on
Application
Transport
Network
Data Link
Physical
26
Design issues in Ad Hoc networks#
example: wireless sensor networks (WSN)
§ e.g.
WSN
MAC
protocol
puts
radio
transceivers
in
sleeping
mode
as
much
as
possilbe
to
save
energy
§
but
if
MAC
not
jointly
designed
with
rou7ng
algorithms,
poor
overall
performance
e.g.
excessive
packet
delay
Application
Transport
Network
Data Link
Physical
Application
Transport
Network
Data Link
Physical
27
Design issues in Ad Hoc networks#
MANETs: new networking paradigms
Application
Transport
Network
Data Link
Physical
Reading homework
historical
perspecRve
on
visions
of
future
technology
(on
L2P):
§ M.
Weisser
and
J.
Seely
Brown,
“The
coming
age
of
calm
technology,”
Xerox
PARC,
1996.
§ M.
Weisser,
“The
computer
for
the
21st
century,”
Scien'fic
American,
1991.
§ V. Bush, “As we may think,” The Atlan'c Monthly, 1945.
28
HP CoolTown
§ People,
Places,
Things:
Web
Presence
for
the
Real
World.
Cooltown
Project
at
HP.
In
WMCSA
2001
§ hnp://www.youtube.com/watch?v=U2AkkuIVV-‐I
Remember …
§ register
on
L2P
§ if
you
cannot,
email
Fei
Liu
and
he
will
add
you
§ reading
for
your
homework
will
be
posted
here
29
– How to NOT plagiarise
Plagiarism: DON’T!
30
Plagiarism: DON’T!
§ in
your
homework
assignments,
you
will
ooen
be
asked
ques7ons
on
exis7ng
original
work
§ to
help
you
answer,
you
are
also
encouraged
to
consult
other
sources
(i.e.
from
the
scien7fic
literature
&
in
some
(rare)
cases
white
papers,
company
websites,
blogs,
etc.)
§ BUT
you
have
to
answer
in
ALL
YOUR
OWN
WORDS
Plagiarism: DON’T!
§ in
general,
any
work
you
submit
in
your
name
must
be
in
ALL
YOUR
OWN
WORDS
31
In-text citations: HOW-TO
§ in
general,
provide
a
list
of
References
at
the
end
of
your
technical
wri7ng/engineering
report/thesis,
accompanied
by
explicit
in-‐text
citaRons
of
those
sources,
for
the
purpose
of:
§ credibility
(support
for
facts
you
are
giving,
how
reader
can
trust
your
report:
"says
who?")
§ acknowledgement
(of
source
of
idea
or
proposal
-‐
avoiding
plagiarism)
§ further
reference
point
for
reading
about
or
checking
a
given
fact
or
proposal.
§ e.g.
"This
is
the
best
prospect
of
allevia7ng
the
spectrum
crunch
[4,
15-‐17].”
§ note
that
in-‐text
cita7on
is
NOT
only
used
for
direct
quota7ons
or
defini7ons
of
terms!
§ whenever
an
idea
is
not
your
own,
you
must
clearly
iden7fy
the
source
of
the
idea/informa7on
32
– How to read a #
research paper
33
Why do you read a paper?
§ understand
and
learn
new
contribu7ons
§ BUT
-‐ not
all
papers
are
“good”
-‐ not
all
papers
are
“interes7ng”
-‐ not
all
papers
are
“worthwhile”
for
you
§ also
only
a
small
frac7on
of
papers
are
“easy
reading”
-‐ and
one
should
not
take
them
as
exemplars
of
English
prose
§ you
have
to
learn
to
iden7fy
a
good
paper
&
spend
your
7me
wisely
1. Breadth
2. Depth
3. React
34
How to read a research paper: breadth 1st
§ see
who
wrote
it,
where
it
was
published,
when
was
it
wriren
(credibility)
-‐
note
that
this
is
a
problema7c
thing,
but
credibility
is
there
to
take
in
account.
§ skim
References
to
see
if
the
authors
are
aware
of
relevant
related
work;
see
if
you
know
the
relevant
work;
see
if
you
know
a
relevant
work
that
they
didn’t
refer
to
35
How to read a research paper: depth 2nd
36
How to read a research paper: depth 2nd
§ examine
the
staRsRcs:
(there
is
truth,
lies,
and
then
there
is
sta7s7cs!)
§ were
appropriate
staRsRcal
tests
applied
properly?
§ did
they
do
proper
error
analysis?
§ are
the
results
staRsRcally
significant?
§ common
mistake:
“We
performed
our
experiment
once
at
4
am
and
no'ced
a
ten
fold
improvement.
Thus
we
conclude
that
our
system
is
beZer”
§ be
very
careful
with
percentages
§ Method
A:
0.01
seconds,
our
Method:
0.005
seconds
§ “our
method
shows
100%
improvement
over
method
A!”
37
How to read a research paper: react 3rd
38
How to write a research paper
§ write
it
such
that
anyone
who
reads
it
using
the
method
we
discussed
understands
your
ideas.
§ clearly
explain
what
problem
you
are
solving,
why
it
is
interes7ng
and
how
your
solu7on
solves
this
interes7ng
problem
§ be
crisp
-‐
explain
what
your
contribu7ons
are,
what
your
ideas
are
and
what
are
others’
ideas.
39