VT 2007, Period 3, 2G1330 Wireless and Mobile Network
Architectures (Arkitekturer för trådlösa och mobila nätverk)
Last modified:
2007-03-21
Announcements
NOTE
Grades for all students who submitted their reports on time and have given
their oral presentation have been entered in LADOK. As time permits
the late reports will be read, commented upon, and graded.
The presentations on the 13th of March will take place in Aula - as
scheduled. However, due to the number of students in the course, I've
scheduled some extra times for presentations, these will take place at
the seminar room Grimeton at Wireless@KTH (Isafjordsgatan 30B).
Presentation schedule
- Students who have a scheduling conflict with the dates and times
of the lectures should contact the instructor - since I know there
are at least 5 such students alternate arrangements are available
for these students.
- For your document, you should be sure to use A4
sized paper rather than US letter.
- For those using LaTeX, you can improve the look of the document by:
- switching to using PostScipt fonts
(instructions)
- You can also turn off hyphenation or at least limit its use
with "\hyphenpenalty=5000 \tolerance=1000"
2G1330 Wireless and Mobile Network Architectures is a 5
point course designed for advanced undergraduates and graduate
students; especially those in the Telecommunication Graduate Program
or the International Masters Wireless program.
Advanced undergraduates should have completed the course 2G1305
(Internetworking) or 2G1701 (Advanced Internetworking) or an
equivalent course. Students without one of these courses should
obtain permission of the 2G1330 instructor.
Information is available on:
Aim
This course will give both practical and general knowledge
concerning wireless and mobile network architectures. After this
course you should have some knowledge of these architectures and
understand the basic priciples behind them.
Learning Outcomes
Following this course a student should be able to:
- Understand the architecture of existing mobile and wireless networks
at a sufficient level to recognize the common features of such
networks in any mobile or wireless network.
- Based upon recognition of common features, the student
should be able to compare and contrast one network architecture with
another.
- Describe differences between different types of mobility (such as
user mobile, terminal mobility, session mobility) and understand how
each type of mobility can be supported.
- Understand the core network protocols and applications in third
generation mobile networks.
- Read the current literature at the level of conference papers in this area.
- While you may not be able to understand all of the papers in
journals, magazines, and conferences in this area - you
should be able to read 90% or more of them
and have good comprehension. In this area it is especially
important that develop a habit of reading the journals, trade papers,
etc. In addition, you should also be aware of both standardization
activities, new products/services, and public policy in the area.
- Demonstrate knowledge of this area both orally and in writing.
- By writing a paper suitable for submission
to conferences and journals in the area.
This course should prepare you for starting an exjobb in this area (for
undergraduate students) or beginning a thesis or dissertation (for
graduate students).
Prerequisites
- Telesys, gk or Datorkommunikation och datornät/Data and Computer Communications or
equivalent knowledge in Computer Communications; Internetworking;
and permission of the instructor
Students considering participating in this course should contact
the instructor.
Contents
This course will focus on the network architectures that are
used in wireless and mobile networks. In some cases we will dig deeper into
the protocols used by such networks. The course should give both practical and
more general knowledge concerning the these network architectures.
The course consists of 10 hours of lectures, and an assigned paper
requiring roughly 50h of work by each student.
Examination Requirements
- An assigned paper requiring roughly 50h of work by each student (5 p)
- Registration: Friday 02-Feb-07, to maguire@it.kth.se
with the "Subject: 2G1330 topics" giving:
- Group members, leader.
- Topic selected
- Written report
- The length of the final report should be ~10 pages (roughly
5,000 words) for each student; it should not be longer
than 12 pages for each student - papers which are longer than 12
pages per student will be graded as "U".
- The paper style should be that of a conference paper.
- Papers should not focus on physical and link layer issues as
this is not a course in radio communication systems, but rather
the papers should look at things which have an impact on the
architecture or upon which the architecture has an effect.
- If there are multiple students in a project group, the
report may be in the form of a collections of papers,
with each paper suitable for submission to a conference or journal.
- Contribution by each member of the group - must be clear (in
the case where the report is a collection of papers - the role
of each member of the group can be explain in the overall
introduction to the papers.
- The report should clearly describe: 1) what you have done;
2) who did what; if you have done some implementation and
measurements you should describe the methods and tools used,
along with the test or implementation results, and your
analysis.
- Final Report: written report due Monday 26-Feb-07 at 23:59 + oral
presentations scheduled Tuesday 13-Mar-07 08:00-18:00 in Aula
- Send email with URL link to maguire@it.kth.se
- Late assignments will not be accepted. Papers which
are submitted after the deadline will be graded, but the grading
might not be completed before the end of the term.
- Note that it is pemissible to start working well in advance of the deadlines!
- Language: the report can be written in Swedish or English
(NB: I can provide better feedback if the report is written in English.)
- Oral presentations:
Each group should present their results for at most 20 minutes (note that
this is the upper limit on time - not a lower limit, thus an
individial doing a project might plan on 8-10 minutes), followed by
some discussion. You only need to attend the half-day you present.
The exact schedule into half-days will be made once I have received
the written reports.
Grades: U, 3, 4, 5
To get a 4 you need to write a very good paper, i.e., it should be
either a very good review or present a new idea; and you have to give a
very good oral presentation.
To get a 5 you need to have an outstanding or excellent paper and give an
outstanding oral presentation.
"komplettering" - students who do not pass can submit a revised
version of their paper (or a completely new paper) - which will be
evaluated.
Code of Honor and Regulations
KTH has a common code of honor and regulations
(see Code of Honor and Regulations).
Literature
Main Text-Book
The textbook for 2007 will be:
Yi-Bing Lin and Ai-Chun Pang, Wireless and Mobile All-IP
Networks, John Wiley & Sons; 2005, ISBN: 0-471-74922-2.
(some notes about the book)
The course was previously mainly based on the book
Wireless and Mobile Network Architectures by Yi-Bing Lin and Imrich
Chlamtac, John Wiley & Sons; 2001 ISBN: 0-471-39492-0 (a version
published in Singapore is ISBN 9971-51-366-8).
Additional Reference Books
- Mobile IP: Design Principles and Practices
by Charles E. Perkins, Addison-Wesley,
1998, ISBN 0-201-63469-4.
- Mobile IP: the Internet Unplugged by James
D. Solomon, Prentice Hall, 1998, ISBN 0-13-856246-6.
- Pervasive Computing: Technology and Architecture of Mobile
Internet Applications by Jochen Burkhardt, Dr. Horst Henn, Stefan
Hepper, Klaus Rintdoff, and Thomas Schäck, Addison-Wesley, 2002, ISBN
0-201-72215-1. This is a book about writing Java server applications
for PDA, WAP devices, PCs, ... .
- Wireless Internet Applications
and Architecture: Building Professional Wireless Applications
Worldwide by Mark Beaulieu, Addison-Wesley, 2002, ISBN
0-201-73354-4. This book gives provides some good descriptions of why
mobile applications are not like desktop applications.
- William C.Y. Lee, Mobile Cellular Telecommunications: Analog and
Digital Systems, Second Edition, 1995, ISBN 0-07-038089-9; all the
usual radio topics
- Ellen Kayata Wesel, Wireless Multimedia Communications: Networking
Video, Voice, and Data, Addison-Wesley, 1998, ISBN
0-201-63394-9. (This book is really about signal processing and means
to over come problems. Written by someone who works with satellite systems.)
- David J. Goodman, Wireless Personal Communication Systems,
Addison-Wesley, 1997, ISBN 0-201-63470-8. Greate coverage about the
link layer details and general architectures of AMPS, IS-41, North
American TDMA and CDMA, and GSM. Only very brief coverage of CT2,
DECT, PHS, and PACS. This is an exteremely well written book.
- Theodore S. Rappaport, Wireless Communications: Principles and
Practice, 2nd edition, Prentice-Hall, 2002, 736 pp., ISBN: 0-13-042232-0.
- H. Peter Alesso and Craig F. Smith, The Intelligent Wireless
Web, Addison-Wesley, 2002, ISBN 0-201-73063-4.
- K. Pahlavan and P. Krishnamurthy, Principles of Wireless
Networks, Prentice Hall PTR, 2002, ISBN 0-13-093003-2.
- WLAN
- Håkan Lindberg, Trålösa nätverl - WLAN, WEP
och WiFi, Studentlitterature, Lund, 2002, ISBN-91-44-02696-X
- Harold Davis and Richard Mansfield, The Wi-Fi Experience: Everyone's Guide to 802.11b Wireless Networking,
Que, Book and CD-ROM edition (December 21, 2001), 176 pages, ISBN: 0789726629
- Matthew S. Gast, 802.11 Wireless Networks: The Definitive Guide,
O'Reilly & Associates, 1st edition (April 2002), 464 pages, ISBN: 0596001835
- Jim Geier, Wireless LANS - Implementing High Performance IEEE 802.11 Networks,
Sams, 2nd edition (July 9, 2001), 360 pages, ISBN: 0672320584
- Lawrence Harte (Editor), Nancy Campbell, R. Dreher, Richard Dreher
(Illustrator), Steve Kellogg (Editor), Steven Kellogg, Tom
Schaffnit, Lisa Gosselin, Judith Rourke-O'Briant,
The Comprehensive Guide to Wireless Technology,
APDG Publishing; 1st edition (January 1, 2000), 278 pages, ISBN: 0965065847
- James LaRocca, Ruth Larocca, and Judy Bass, 802.11 Demystified: Wi-Fi Made Easy,
McGraw-Hill Professional, 1st edition (June 10, 2002), 291 pages, ISBN: 0071385282
- Daniel Minoli, Hotspot Networks: WiFi for Public Access Locations,
McGraw-Hill Professional, (September 4, 2002), 435 pages, ISBN: 0071409785
- Bob O'Hara and Al Petrick, The IEEE 802.11 Handbook: A Designer's Companion,
IEEE, 1 edition (December 1999), ISBN: 0738118559
- E. Ouellet, R. Padjen, A. Pfund, R. Fuller (Ed.), and T. Blakenship (Ed.),
Building a CISCO Wireless LAN,
Syngress Media Inc., 1st edition (June 15, 2002), 520 pages, ISBN: 192899458X
- Ron Seide, Neil P. Reid, Lyssa Wald (Illustrator), and Dave Molta, Wi-Fi (802.11) Network Handbook,
McGraw-Hill Osborne Media, (December 5, 2002), 363 pages, ISBN: 0072226234
- James Trulove (Editor), Build Your Own Wireless LAN (with Projects),
McGraw-Hill Professional, 1st edition (May 29, 2002), 351 pages, ISBN: 0071380450
Also as an e-book.
- Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely, and Andy McCullough,
Designing a Wireless Network,
Syngress Media Inc., 1st edition (June 15, 2001), 379 pages, ISBN: 1928994458
- IETF BoF Control and Provisioning of Wireless Access Points
(CAPWAP)
- WRAPIis a
Microsoft Windows XP software library that allows applications to query/set
information about an IEEE 802.11 network.
- Enrico Pelletta,
Maximum Throughput of IEEE 802.11 Access Points: Test Procedure and Measurements,
Masters Thesis, Department of Microelectronics and Information
Technology, Royal Institute of Technology (KTH), 10th August 2004.
- WLAN security
- Christian Barnes, Tony Bautts, Donald Lloyd, Eric Ouellet, Jeffrey
Posluns, David M. Zendzian, Neal O'Farrell (Editor), Erif
Ouellet, Hack Proofing Your Wireless Network,
Syngress Media Inc., 1st edition (February 28, 2002), 512 pages, ISBN: 1928994598
- Jahanzeb Khan and Anis Khwaja, Building Secure Wireless Networks with 802.11,
John Wiley & Sons, 1 edition (January 10, 2003), 320 pages, ISBN: 0471237159
- Stewart S. Miller, Wi-Fi Security,
McGraw-Hill Professional, (January 22, 2003), 309 pages, ISBN: 0071410732
- Randall K. Nichols and Panos C. Lekkas, Wireless Security: Models, Threats, and Solutions,
McGraw-Hill Professional, 1st edition (December 13, 2001), 657 pages, ISBN: 0071380388
- Cyrus Peikari and Seth Fogie, Maximum Wireless Security,
Sams, Book and CD-ROM edition (December 18, 2002), 408 pages, ISBN: 0672324881
- Bruce Potter and Bob Fleck (Editor), 802.11 Security,
O'Reilly & Associates, 1st Edition edition (December 2002), 208 pages, ISBN: 0596002904
- Russell Dean Vines, Wireless Security Essentials: Defending Mobile Systems from Data Piracy,
John Wiley & Sons, 1st edition (July 15, 2002), 320 pages, ISBN: 0471209368
- Bernard Aboba's
"Unofficial 802.11 Security Web Page"
- Community WLANs
- Rob Flickenger, Building Wireless Community Networks,
O'Reilly & Associates, 1st edition (December 15, 2001), 150 pages, ISBN: 0596002041
- Bluetooth
- Jennifer Bray and Charles F. Sturman, Bluetooth,
Prentice Hall PTR; 1st edition (December 15, 2000),
ASIN: 0130898406
- Brent A. Miller and Chatschik Bisdikian,
Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications,
Prentice Hall PTR; (September 25, 2000),
ISBN: 0130902942
- 802.16
- According to the IEEE standards web site a PDF and CD version of
802.16e has been released but the price is rather high. (The stardard
was ratified
in Dec. 2005).
- History of the drafts
- Individual access to the underlying 802.16 standard
- some articles about 802.16e
(a),
(b),
(c),
(d),
(e)
- Look at some of the companies active in the area
starting with:
- IETF and IAB activities regarding 802.16e include:
(a),
(b),
(c),
(d),
(e),
(f)
- low-power wireless sensor networks
- John Meurling and Richard Jeans, "The Mobile Phone Book: The
invention of the mobile telephone industry, Published by CommunicationsWeek
International on behalf of Ericsson Radio Systems, 1994, ISBN 0-9524031-0-2
- SIM related
- "linear 4G vision" vs. "concurrent 4G vision"
is described in
Erik Bohlin, Sven Lindmark, Joakim Björkdahl, Arnd Weber, Bernd
Wingert, and Pieter Ballon,
The Future of Mobile Communications in the EU: Assessing the
Potential of 4G, Carlos Rodriguez Casal, Jean-Claude
Burgelman, Gérard Carat (IPTS editors).
Foresight on Information Technologies in Europe (FISTE),
The
Institute for Prospective Technological Studies (IPTS)
EUR No: EUR 21192 EN,
Year: 2004, ISBN: 92-894-7872-1
Lecture notes will be available on-line in PDF format.
Supplementary readings
- Joseph Mitola III, "Software Radio Architecture: Object-Oriented
Approaches to Wireless Systems Engineering", John Wiley & Sons,
October 20, 2000, 568 pages, ISBN: 0-471-38492-5
- Joseph Mitola and Zoran Zvonar (eds.) "Software Radio
Technologies: Selected Readings", IEEE, 1st edition, 2001, 544 pages
ISBN: 0780360222.
- Markus Dillinger, Kambiz Madani, and Nancy Alonistioti (eds.),
"Software Defined Radio: Architectures, Systems and Functions", Wiley,
2003, ISBN 0-470-85164-3.
- Richard Blum, Network Performance Open Source Toolkit: Using Netperf,
tcptrace, NIST Net, and SSFNet, Wiley Publishing, 2003, ISBN: 0-471-43301-2
To be added
Useful URLs
-
Wireless in Everything
-
Near Field Radio for touch interfaces
-
Bluetooth in 5 x 4 x 1.1mm module
- Xilinx's Bluetooth tutorials
- IETF: Internet RFCs, Internet drafts, ...
- Sierra Wireless,
GSM/GPRS SDK AT Command Reference, Rev 1.0, 2130213, 2002;
gives a nice introduction to Hayes ATtention commands, with sections
on GSM, SMS, GPRS
- Sony Ericsson,
GPRS PC Card Modem GC75 AT-Commands Manual, Draft
P1C, date unknown.
- 4G at GaTech
- Defense
Advanced Research Projects Agency (DARPA) NeXt Generation (XG)
Communications program
-
New America Foundation, "Wave of the Future or Dead in the Water? The
Public Release of DARPA's XG Spectrum Sharing Technology", June 20,
2003, Washington, DC
- Shared Spectrum Company
- Dr. David Wake,
A Survey of Current and Emerging
Radio-Over-Fibre Technologies for Wireless Communications
Applications", Application Note, Microwave Photonics, Los Angeles,
CA, "extended and updated version of the invited paper given at the
International Topical Meeting on Microwave Photonics, 2002
(MWP2002)".
- Alcatel Telecommunications Review (ATR)
- Ericsson's Telecom Report
- Ollie Whitehouse,
"War Nibbling: Bluetooth Insecurity", @stake, Inc., October 2003
- Marcel Holtmann and Andreas Vedral,
Bluetooth programming for Linux,
Wireless Technologies Congress 2003, Sindelfingen, Germany, 2003
- William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta,
"Exploiting Open Functionality in SMS-Capable Cellular Networks",
In Proceeding the 12th ACM Conference on Computer and Communications Security
(CCS'05),
November 7-11, 2005, Alexandria, VA, USA,
preprint: September 2, 2005
Schedule
Note that in the following "xx" means "xx:00", not "xx:15".
Dates for 2007:
Date | Time | Room | Notes |
Thursday 18-Jan-07 | 10:00-12:00 | Aula | Föreläsning 1 | |
Thursday 18-Jan-07 | 14:00-18:00 | Aula | Föreläsning 2 | |
Friday 19-Jan-07 | 10:00-12:00 | Sal E | Föreläsning 3 | |
Friday 19-Jan-07 | 14:00-18:00 | Aula | Föreläsning 4 | |
Note that Aula and Sal E are in the Forum building in Kista.
Lecture Plan and Lecture Material (OH slides)
Note that the lectures will occur in a very intensive fashion to
accommodate graduate students coming from elsewhere in Sweden.
The lecture material for 2007(2.3 Mbytes)
and a version with tags.
Additional material concerning
RFID, appears with permission of the author.
Staff Associated with the Course
- Lecturer (kursansvarig, föreläsare): Prof. Gerald
Q. Maguire Jr. (maguire@it.kth.se)
- Teaching assistants: TBA
- Administrative Assistant -- for administrative questions: recording of grades, ...
contact
Registering
Use the normal process for registering. For most students this
means you should speak with your study advisor (studievägledare.
- Students who are not regularily enrolled can apply for the course
by filling out an
application
form -- please bring this form with you to class - so that I can
expedite its processing (since normally this application should be
submitted in advance of the course.
Other on-line Course Material
An example of an outstanding
paper on Intrusion Detection in Wireless Sensor Networks,
it appears here with permission of the author.
An example of an outstanding
paper on imode,
it appears here with permission of the author.
An example of a paper examing the much lower layer issues of
Handover Considerations in the Design of Multi-Standard Transceiver Front Ends,
it appears here with permission of the author.
Another example paper: Wireless VPN: IPSec vs.
SSL/TLS by Åsa Pehrson. It appears here with permission of the author.
An example of a paper examining multimedia messaging is that of
Max Loubser, "
User created content with MMS", it appears here with permission of the author.
An example of a paper and slides from the oral presentation (on
2006.03.14) concerning bypassing access control in
semi-open wireless networks. The link to this paper appears with
permission of the author.
The local MONACO GSM/GPRS system.
Sources for Further Information
Most GSM standards can be accessed from ETSI
Two papers about MANETs:
- Erik Nordström, Richard Gold and Per Gunningberg,
"Mythbusters: Whatever You Thought About MANET Routing, Think Again. . .",
Department of Information Technology, Uppsala University, Report 2005-039, 2005.
- S. Kurkowski, T. Camp, and M. Coagrosso,
"MANET simulation studies: the Incredibles", ACM SIGMOBILE Mobile
Computing and Communications Review, 9(4), October 2005.
Steve Gibson and
Leo Laporte's podcasts about WiFi security
http://vowlan.wifinetnews.com/
Mobilepipeline
mobile related on-line news
For further information related to communications (especially conferences,
publications, ...) contact one of the professional societies, such as
the IEEE Communications Society,
vendors, or use the WWW! [For access to the electronics library see
KTHB e-library.]
Handsets poised to be commodities: "Microsoft, Intel Aim for
High-End Phone", Wall Street Journal Europe, Tuesday, 19 Feb. 2002,
page 1 and pg. A6, features an article, which
describes how they are attempting to provide a platform for high-end
phones so that they will be commodities just like PCs.
The figure on A6 shows the basic components of a handset and lists the
prices for the components and for licensing the design "framework":
color screen | 17 euro |
printed circuit board | 9 euro |
flash memory | 2 euro |
radio chip and related electronics | 40 euro |
baseband chip | 34 euro |
battery | 29 euro |
license for reference design for phone 7.50 euro |
license of user interface software 3.40 euro |
license for operating system software 5.70 euro |
An footnote indicates that the last three items could be developed in
house, but typically cost 15 euros from outside suppliers.
IEEE 802.15 Working group:
802.15.3 high performance requirements (upto 55Mbps)
802.15.4 low bandwidth (~250kbps), extra-low power MAC and physical devices
Working group IEEE P802.20,
Mobile Broadband Wireless Access Systems
Qovia Inc. annouced software to block VoIP Spam in June 2004, as
a module for their VoIP Monitoring and Management System.
Near Field Communication Forum
For those looking at power measurements, as useful reference is Joe Bardwell,
Converting Signal Strength Percentage to dBm Values,
Executive Summary, WildPackets, November 2002.
For information about the structure of the SIM file system see
chapter 8: Pocket PC Phone Edition, in Steve Makofsky, "Pocket PC
Network Programming", Addison-Wesley, 2004, ISBN 0-321-13352-8.
Georg Eidenschink,
Elatic, Smart Card solutions for everyone, Elatec Vertriebs GmbH -
a very nice introduction to smart cards and there use as SIM and USIM cards
Cisco has just made the source code for a number of GSM signalling
protocols publically available - see their
GSM Source Module Library (GSML)
Previous
versions of the course
Page History
Date | Update |
2007.01.23 | added Claudia's RFID notes |
2007.01.17 | added lecture notes for 2007 |
2007.01.11 | added some notes concerning the textbook for 2007 |
2006.12.02 | added new textbook for 2007 |
2006.11.05 | added course dates and rooms for 2007 |
2006.07.28 | further changes for 2007 |
2006.06.13 | first version for 2007 |
© Copyright 2004, 2005, 2006, 2007 G.Q.Maguire Jr. (maguire@it.kth.se)
All Rights Reserved.
Last modified:
2007-03-21