VT 2007, Period 3, 2G1330 Wireless and Mobile Network Architectures (Arkitekturer för trådlösa och mobila nätverk)

Last modified: 2007-03-21


Announcements

NOTE

Grades for all students who submitted their reports on time and have given their oral presentation have been entered in LADOK. As time permits the late reports will be read, commented upon, and graded.

The presentations on the 13th of March will take place in Aula - as scheduled. However, due to the number of students in the course, I've scheduled some extra times for presentations, these will take place at the seminar room Grimeton at Wireless@KTH (Isafjordsgatan 30B).

Presentation schedule


2G1330 Wireless and Mobile Network Architectures is a 5 point course designed for advanced undergraduates and graduate students; especially those in the Telecommunication Graduate Program or the International Masters Wireless program.

Advanced undergraduates should have completed the course 2G1305 (Internetworking) or 2G1701 (Advanced Internetworking) or an equivalent course. Students without one of these courses should obtain permission of the 2G1330 instructor.

Information is available on:


Aim

This course will give both practical and general knowledge concerning wireless and mobile network architectures. After this course you should have some knowledge of these architectures and understand the basic priciples behind them.

Learning Outcomes

Following this course a student should be able to:

This course should prepare you for starting an exjobb in this area (for undergraduate students) or beginning a thesis or dissertation (for graduate students).


Prerequisites

Students considering participating in this course should contact the instructor.


Contents

This course will focus on the network architectures that are used in wireless and mobile networks. In some cases we will dig deeper into the protocols used by such networks. The course should give both practical and more general knowledge concerning the these network architectures.

The course consists of 10 hours of lectures, and an assigned paper requiring roughly 50h of work by each student.


Examination Requirements

Grades: U, 3, 4, 5

To get a 4 you need to write a very good paper, i.e., it should be either a very good review or present a new idea; and you have to give a very good oral presentation.
To get a 5 you need to have an outstanding or excellent paper and give an outstanding oral presentation.

"komplettering" - students who do not pass can submit a revised version of their paper (or a completely new paper) - which will be evaluated.

Code of Honor and Regulations

KTH has a common code of honor and regulations (see Code of Honor and Regulations).


Literature

Main Text-Book

The textbook for 2007 will be: Yi-Bing Lin and Ai-Chun Pang, Wireless and Mobile All-IP Networks, John Wiley & Sons; 2005, ISBN: 0-471-74922-2. (some notes about the book)

The course was previously mainly based on the book Wireless and Mobile Network Architectures by Yi-Bing Lin and Imrich Chlamtac, John Wiley & Sons; 2001 ISBN: 0-471-39492-0 (a version published in Singapore is ISBN 9971-51-366-8).

Additional Reference Books

Lecture notes will be available on-line in PDF format.

Supplementary readings

To be added

Useful URLs


Schedule

Note that in the following "xx" means "xx:00", not "xx:15".

Dates for 2007:

DateTimeRoomNotes
Thursday 18-Jan-0710:00-12:00AulaFöreläsning 1
Thursday 18-Jan-0714:00-18:00AulaFöreläsning 2
Friday 19-Jan-0710:00-12:00Sal EFöreläsning 3
Friday 19-Jan-0714:00-18:00AulaFöreläsning 4

Note that Aula and Sal E are in the Forum building in Kista.


Lecture Plan and Lecture Material (OH slides)

Note that the lectures will occur in a very intensive fashion to accommodate graduate students coming from elsewhere in Sweden.

The lecture material for 2007(2.3 Mbytes) and a version with tags.

Additional material concerning RFID, appears with permission of the author.


Staff Associated with the Course


Registering

Use the normal process for registering. For most students this means you should speak with your study advisor (studievägledare.


Other on-line Course Material

An example of an outstanding paper on Intrusion Detection in Wireless Sensor Networks, it appears here with permission of the author.

An example of an outstanding paper on imode, it appears here with permission of the author.

An example of a paper examing the much lower layer issues of Handover Considerations in the Design of Multi-Standard Transceiver Front Ends, it appears here with permission of the author.

Another example paper: Wireless VPN: IPSec vs. SSL/TLS by Åsa Pehrson. It appears here with permission of the author.

An example of a paper examining multimedia messaging is that of Max Loubser, " User created content with MMS", it appears here with permission of the author.

An example of a paper and slides from the oral presentation (on 2006.03.14) concerning bypassing access control in semi-open wireless networks. The link to this paper appears with permission of the author.

The local MONACO GSM/GPRS system.


Sources for Further Information

Most GSM standards can be accessed from ETSI

Two papers about MANETs:

Steve Gibson and Leo Laporte's podcasts about WiFi security

http://vowlan.wifinetnews.com/

Mobilepipeline mobile related on-line news

For further information related to communications (especially conferences, publications, ...) contact one of the professional societies, such as the IEEE Communications Society, vendors, or use the WWW! [For access to the electronics library see KTHB e-library.]

Handsets poised to be commodities: "Microsoft, Intel Aim for High-End Phone", Wall Street Journal Europe, Tuesday, 19 Feb. 2002, page 1 and pg. A6, features an article, which describes how they are attempting to provide a platform for high-end phones so that they will be commodities just like PCs. The figure on A6 shows the basic components of a handset and lists the prices for the components and for licensing the design "framework":
color screen17 euro
printed circuit board9 euro
flash memory2 euro
radio chip and related electronics40 euro
baseband chip34 euro
battery29 euro
license for reference design for phone 7.50 euro
license of user interface software 3.40 euro
license for operating system software 5.70 euro

An footnote indicates that the last three items could be developed in house, but typically cost 15 euros from outside suppliers.

IEEE 802.15 Working group:
802.15.3 high performance requirements (upto 55Mbps)
802.15.4 low bandwidth (~250kbps), extra-low power MAC and physical devices

Working group IEEE P802.20, Mobile Broadband Wireless Access Systems

Qovia Inc. annouced software to block VoIP Spam in June 2004, as a module for their VoIP Monitoring and Management System.

Near Field Communication Forum

For those looking at power measurements, as useful reference is Joe Bardwell, Converting Signal Strength Percentage to dBm Values, Executive Summary, WildPackets, November 2002.

For information about the structure of the SIM file system see chapter 8: Pocket PC Phone Edition, in Steve Makofsky, "Pocket PC Network Programming", Addison-Wesley, 2004, ISBN 0-321-13352-8.

Georg Eidenschink, Elatic, Smart Card solutions for everyone, Elatec Vertriebs GmbH - a very nice introduction to smart cards and there use as SIM and USIM cards

Cisco has just made the source code for a number of GSM signalling protocols publically available - see their GSM Source Module Library (GSML)



Previous versions of the course

Page History

DateUpdate
2007.01.23added Claudia's RFID notes
2007.01.17added lecture notes for 2007
2007.01.11added some notes concerning the textbook for 2007
2006.12.02added new textbook for 2007
2006.11.05added course dates and rooms for 2007
2006.07.28further changes for 2007
2006.06.13first version for 2007

© Copyright 2004, 2005, 2006, 2007 G.Q.Maguire Jr. (maguire@it.kth.se)
All Rights Reserved.
Last modified: 2007-03-21

Valid HTML 4.01!