• No results found

Mobile and Sensor Systems

N/A
N/A
Protected

Academic year: 2021

Share "Mobile and Sensor Systems"

Copied!
35
0
0

Loading.... (view fulltext now)

Full text

(1)Mobile and Sensor Systems. Lecture 1: Introduction to . Mobile Systems. Dr Cecilia Mascolo.

(2) About Me.

(3) In this course. • The course will include aspects related to general understanding of . – Mobile and ubiquitous systems and networks. – Sensor systems and networks. 3  .

(4) List of Lectures. • Lecture 1: Introduction to Mobile Systems.. • Lecture 2: Mobile Medium Access Control and Wireless Systems.. • Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks.. • Lecture 4: Sensor Systems and MAC Layer Protocols.. • Lecture 5: Sensor Networking Routing Protocols.. • Lecture 6: Sensor Systems Reprogramming and Mobile Sensing.. • Lecture 7: Mobile Phone Sensing.. • Lecture 8: Practical: Mobile Phone Programming.. 4  .

(5) Teaching Material . • No required textbook.. • Some suggested readings:. – Schiller, J. (2003). Mobile communications. Pearson (2nd ed.). . – Karl, H. & Willig, A. (2005). Protocols and architectures for wireless sensor networks. Wiley. . – Agrawal, D. & Zheng, Q. (2006). Introduction to wireless and mobile systems. Thomson.. • Specific lectures will reference research papers which can be used for additional reading.. 5  .

(6) In this lecture. • We will describe mobile systems and their applications and challenges.. • We will start talking about wireless networks.. 6  .

(7) Smart Phones:  the Computing Platform of the Future. 7  .

(8) Smart Phones: the Computing Platform. 8  .

(9) Some Numbers. • Number of worldwide mobile cellular subscribers increased from 34 million in 1993 to nearly 5.5 million subscribers by 2011.. • The number of cellular subscribers surpasses the number of wired phone lines.. 9  .

(10) Source:  The  Economist   10  .

(11) Location-based  Social Network Systems. 11  .

(12) Geographic Recommender Systems. Mirco  Musolesi  .

(13) 13  .

(14) Credit:  CNet  . 14  .

(15) Fundamental Challenges  in Mobile Computing. • Mobile devices are resource-constrained.. • Mobile connectivity is highly variable in performance and reliability.. • Mobile devices are inherently less secure.. 15  .

(16) Mobile Devices are Inherently Resource Constrained. • Mobile devices rely on batteries. . • Energy consumption due to:. – Computation (CPU, co-processors). – Display. – Communication. – Sensing. • Energy-efficient algorithms are needed. . 16  .

(17) Mobile Devices are Inherently Resource Constrained. • Computational constraints. – But, for example, in the Samsung Galaxy SIII you have1.4 GhZ quadcore Cortex A-9 +GPU. • Memory constraints. – But, for example, in the Samsung Galaxy SIII you have1GB or 2GB of RAM. 17  .

(18) Mobile Connectivity is Highly Variable in Performance and Reliability. • Various types of connectivity:. – Cellular (GSM, 3G, 4G, etc.). – WiFi. – Bluetooth. – Near Field Communication (NFC). – …. • Constraints related to:. – Coverage issues. – Trade-offs: energy consumption, throughput, costs. 18  .

(19) Mobile Devices are Inherently Less Secure. • Wireless not wired communication:. – Eavesdropping.. – Need for encrypted communication.. • Devices can be stolen:. – Devices might also be accessible by everyone (for example, sensors). . 19  .

(20) Ubiquitous and Mobile Computing. “The most profound technologies are those that disappear.”. Mark  Weiser  (1952-­‐1999)  . 20  .

(21) Copyright:  PARC  . Mirco  Musolesi  . 21  .

(22) Mirco  Musolesi  . 22  .

(23) Issues in Designing  Mobile Computing Systems. • Distributed systems issues:. – Remote communication. – Fault tolerance. – Remote information access. – Distributed security. • Networking issues:. – Wireless communication. – Transport layer for wireless channel. 23  .

(24) Issues in Designing  Mobile Computing Systems. • Databases issues:. – Disconnected operations. – Weak consistency . • Energy issues:. – Adaptation in terms of communication. – Intelligent uploading of data. – Hardware aspects. 24  .

(25) Issues in Designing  Mobile Computing Systems. • HCI issues:. – Limited interface. – Interaction with the devices (input, etc.). – Ergonomics. • Privacy issues:. – Location sharing. – Activity recognition. • Security issues:. – Encrypted communication. 25  .

(26) Wireless and Mobile Networks. Background: . • Number of wireless (mobile) phone subscribers now exceeds number wired phone subscribers!. • Number of wireless Internet-connected devices soon to exceed number of wired Internet-connected devices. – laptops, Internet-enabled phones promise anytime Internet access. • Two important (but different) challenges. – wireless: communication over wireless link. – mobility: handling the mobile user who changes point of attachment to network. 26  .

(27) Elements of a wireless network. network     infrastructure  . wireless  hosts   v laptop,  PDA,  IP  phone   v run  applicaQons   v may  be  staQonary  (non-­‐ mobile)  or  mobile   § wireless  does  not  always   mean  mobility  . 27  .

(28) Elements of a wireless network. network     infrastructure  .  base  staQon   v typically  connected  to   wired  network   v relay  -­‐  responsible  for   sending  packets  between   wired  network  and   wireless  host(s)  in  its   “area”   § e.g.,  cell  towers,     802.11  access  points    . 28  .

(29) Elements of a wireless network. network     infrastructure  .  wireless  link   v typically  used  to  connect   mobile(s)  to  base  staQon   v also  used  as  backbone   link     v mulQple  access  protocol   coordinates  link  access     v various  data  rates,   transmission  distance  . 29  .

(30) Characteristics of selected wireless link standards. Data rate (Mbps). 200 54 5-11. 802.11n 802.11a,g 802.11b. 4 1. 802.11a,g point-to-point. data. 802.16 (WiMAX) UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO. 3G cellular enhanced. 802.15. .384. 3G. UMTS/WCDMA, CDMA2000. .056. 2G. IS-95, CDMA, GSM. Indoor. Outdoor. 10-30m. 50-200m. Mid-range outdoor. Long-range outdoor. 200m – 4 Km. 5Km – 20 Km 30  .

(31) Elements of a wireless network. network     infrastructure  .  infrastructure  mode   v base  staQon  connects   mobiles  into  wired   network   v handoff:  mobile  changes   base  staQon  providing   connecQon  into  wired   network  . 31  .

(32) Elements of a wireless network. ad  hoc  mode   v no  base  staQons   v nodes  can  only  transmit   to  other  nodes  within   link  coverage   v nodes  organize   themselves  into  a   network:  route  among   themselves  . 32  .

(33) Wireless network taxonomy. single  hop   infrastructure   (e.g.,  APs)  . no   infrastructure  . host  connects  to     base  staQon  (WiFi,   WiMAX,  cellular)     which  connects  to     larger  Internet   no  base  staQon,  no   connecQon  to  larger     Internet  (Bluetooth,     ad  hoc  nets)  . mulQple  hops   host  may  have  to   relay  through  several   wireless  nodes  to     connect  to  larger     Internet:  mesh  net   no  base  staQon,  no   connecQon  to  larger     Internet.  May  have  to   relay  to  reach  other     a  given  wireless  node   MANET,  VANET  . 33  .

(34) Suggested Readings. • Mark Weiser. The Computer for the 21th Century. Scientific American. September 1991.. • Mark Weiser. Some Computer Issues in Ubiquitous Computing. Communications of the ACM.Vol. 36. Issue 7. July 1993.. • M. Satyanarayanan. Pervasive Computing: Vision and Challenges. IEEE Personal Communications. Vol. 8 Issue 4. August 2001.. • Chapter 6 of James F. Kurose and Keith W. Ross. Computer Networking. A Top Down Approach. 6th Edition. Pearson 2012.. 34  .

(35) Acks . • Some material for the slides of this course has been contributed by:. • Dr Christos Efstratiou, . • Dr Nicholas Lane, . • Dr Mirco Musolesi,. • Dr Sarfraz Nawaz.. 35  .

(36)

References

Related documents

A representative genomic 16S rRNA gene se- quence of strain Z-9701 T was compared using NCBI BLAST [4,5] under default settings (e.g., considering only the high-scoring

The aim of this observational real time study is to deliver exact data about physicians' work at hospitals of different ownership.. Methods: The consequences of different

The F 2 segregating groups were used in a bulk segregant analysis of the pooled DNAs for screening RAPD primers; three chemotype- associated markers are described, one of which has

oil drilling and agricultural activities such as use of agrochemicals in crop production, waste dumps in landfills are common sources of heavy metal contamination and

This paper presented a brief introduction to SOA and Web Services and used a Microsoft Visual Basic .NET example to explain how a client application invokes the Web methods of a

These include changing how C is allocated in fixed and dynamic schemes based on data from current forest syntheses and different parameterization of allocation schemes for

To achieve this objective, the mean perception scores obtained by mathematics teachers in mixed and gender streamed (girls’ and boys’ only) classes were used to ascertain

The effects of various parameters like sodium salicylate concentration, extractant concentration, shaking time, diluents and stripping agent on the extraction efficiency of