introduction to mobile computing -cse 535 fall 2010 sandeep k. s. gupta school of computing,...
TRANSCRIPT
Introduction to Mobile Computing -CSE 535 Fall 2010
Sandeep K. S. GuptaSchool of Computing, Informatics and Decision Systems EngineeringArizona State University
Mobile Computing?
• Computing enabled by presence of wireless enabled portable devices (PDAs, cell phones etc.)
• Many other names/overlapping computing paradigms:– Pervasive Computing– Ubiquitous Computing– Wireless Computing– Embedded Computing
Course GoalTo understand what are the fundamental
challenges in MC and what are some of the solutions towards solving these fundamental challenges
Course Goals - Indirect
• To get you a high-paying job• To enrich you with new ideas• To train you in (mobile) systems oriented
thinking• To prepare you for research/profession in
mobile computing – but more generally – in “adaptive” (next-generation) computer systems
Course Pre-req
• Knowledge of Computer Networks, Operating Systems
• Willingness to learn!
Course/Reference Book(s) + Material1. Fundamentals of Mobile and Pervasive Computing – F.
Adelstein, S. K. S. Gupta, G. G. Richard III, and L. Schwiebert – McGraw Hill.– Book Website – Link at bottom of http://impact.asu.edu
• Reference Books:– Principles of Wireless Networks – Pahlavan and Krishnamurty– Mobile Computing- Imielinski and Korth– Protocols and Architecture for Wireless Sensor Networks - Karl
and Willing– Wireless Sensor Networks – Raghavendra, Znati et al.
• Reading List – will be posted on the class web site.
Topics – Tentative List• Mobile and Pervasive Computing Application, Services and
Standards
– Mobile Info access and dissemination
– Mobility and Location Management
– Routing and Middleware
– Zigbee, Bluetooth, WiFi
• Wireless Sensor networking, applications and services
– Localization
– Energy-aware routing
• Mobile Security and Privacy– Mobile computing security– Sensor network security
Course Mechanics• Assignment + Exams + Quizzes: 20%
– Exams – take home– Assignment – written and programming– Quizzes – may be un-announced
• Paper presentation: 20%• Term Project: 40%
– Group– Self-defined (with help of instructor)– Involves analysis/implementation
• Extra: 10%– Self-directed presentation – related to this class
Class Format
• Lecture (5-75 min)– As class progresses the lecture time will decrease
(on average)• One or Two Paper presentation (1/2 hr each)
– Starting soon!• 5 min. mid-break – if desired• Note: slides of presenters should be provided
to Grader one day in advance.
Class Cyberpresence
• http://impact.asu.edu/cse535fa10.html– Class assignments– Slides– Reference material– Announcement
• Visit regularly for latest information
What can you expect from this course?
• Lots of in-class/ on-line interaction
• Interesting and challenging assignments and exam questions
• Reading technical papers – classical as well as state-of-art
• Technical Writing – critiquing, summarizing
• Help/Tutorials by instructor/Grader on difficult material
• And lot more!
Contacting Me or Grader• Instructor
– Email: [email protected]• Subject line: CSE535Fa07
– Office: BY 522– Phone: 5-3806– Office Hours: M W 3:30-5pm– Call me || come to my office hrs || Set up an appointment– http://impact.asu.edu
• Grader: Su Jin Kim– Email: [email protected]– Office BY517AD
• What do I do when I am not teaching? – Introduction to IMPACT – Mobile Computing
Lab
Goal:•Pervasive Health monitoring
•Evaluation of medical applications
Features:•Secure, Dependable and Reliable data collection, storage and communication
Sponsor:
Pervasive Health Monitoring
IMPACT: ResearchUse-inspired research in pervasive computing & wireless sensor networking
Goal:• Increasing computing capacity for datacenters
•Energy efficiency
Features:•Online thermal evaluation
•Thermal Aware Scheduling
Sponsor:
Thermal Management for Data Centers
Goal:•Evaluation of crisis response management
Features:•Theoretical model•Performance evaluation
•Access control for crisis management
Sponsor:
Criticality Aware-Systems
Goal:•Container Monitoring for Homeland Security
•Dynamic Supply Chain Management
Features:• Integration of RFID and environmental sensors
•Energy management•Communication security
Sponsor:
Goal:•Protect people’s identity & consumer computing from viral threats
Features:•PKI based•Non-tamperable, non-programmable personal authenticator
•Hardware and VM based trust management
Sponsor:
ID Assurance Intelligent Container
Goal:•Protocols for mobile ad-hoc networks
Features:•Energy efficiency•Increased lifetime•Data aggregation•Localization•Caching•Multicasting
Sponsor:
Mobile Ad-hoc Networks
Medical Devices, Mobile Pervasive Embedded Sensor Networks
BOOK: Fundamentals of Mobile and Pervasive Computing, Publisher: McGraw-Hill Dec. 2004
http://impact.asu.edu
What’s Next?• Chapter 1: Mobile Adaptive Computing