Common wireless sensor network acronyms.
Berkeley and other sensor network startups.
Instructor Office Hours |
Kristofer S.J. Pister |
|||
Required Text |
Karl & Willig, “Protocols and Architectures for Wireless Sensor Networks” |
|||
Reference Texts |
Tannenbaum, “Computer Networks” – great general purpose reference Callaway, “Wireless Sensor Networks” Haenselmann, “Sensor Networks” available free online Krishnamachari, “Networking Wireless Sensors” Pottie & Kaiser, “Principles of Embedded Networked System Design” Zhao & Guibas, “Wireless Sensor Networks” |
|||
Newsgroup |
Google group for class discussion |
|||
Grading |
|
|||
Homework |
Collaboration is encouraged! Cheating is not! |
|||
Project |
The
final project is TBD. |
|||
Lecture |
Date |
Topic |
Notes |
1.1 |
1/20 |
History, Startups, Applications, Definitions |
Reading: Ch. 1; Ch2, sections 2.1, 2.2 Smart Dust DSN1986 |
1.2 |
1/22 |
Challenges, Application requirements |
|
2.1 |
1/27 |
Data flows; Hardware: batteries |
|
2.2 |
1/29 |
Hardware: uP, radios |
|
3.1 |
2/3 |
dB, link margin, mote lifetime |
Reading: Ch3, Ch13 section 13.3.1 |
3.2 |
2/5 |
Protocol Stack, Headers, Antennas |
|
4.1 |
2/10 |
Antennas, propagation, and path loss |
Reading: Ch4 |
4.2 |
2/12 |
Digital radio communication |
|
5.1 |
2/17 |
Path loss, 2-ray model, others |
|
5.2 |
2/19 |
RF spectrum, modulation |
|
6.1 |
2/24 |
802.15.4 DSSS: chips, bits, & symbols |
|
6.2 |
2/26 |
DLL: CRC, MIC |
|
7.1 |
3/3 |
Aloha, CSMA, Slotted Aloha, RTS/CTS, ACKs |
|
7.2 |
3/5 |
GSM, SMACS, 15.4 superframes, TSCH |
|
8.1 |
3/10 |
Crystals, time synchronization |
|
8.2 |
3/12 |
Beacons, keepalives, preamble sampling |
|
9.1 |
3/17 |
15.4 frame format |
|
9.2 |
3/19 |
Routing overview (Thomas Watteyne) |
|
Spring Break!!!! |
|||
10.1 |
3/31 |
Routing: flood, AODV |
|
10.2 |
4/2 |
IP, ATM, MPLS |
|
11.1 |
4/7 |
Transport: UDP & TCP |
|
11.2 |
4/9 |
App layer; simplest networks |
|
12.1 |
4/14 |
Embedded processors: HW & SW |
|
12.2 |
4/16 |
Interrupts, Operating Systems |
|
13.1 |
4/21 |
Security: AES, cipher modes, key strength |
|
13.2 |
4/23 |
Replay, Access Control, ECC, Diffie-Hellman |
|
14.1 |
4/28 |
Authentication, Signatures, Certificates, Tesla |
|
14.2 |
4/30 |
6LoWPAN, RoLL |
|
15.1 |
5/5 |
Localization |
|
15.2 |
5/7 |
Applications |
Topics include: radio communication and propagation; link margin, communication range, and power consumption; theoretical and practical limits; information theory; medium access, ALOHA, CSMA, TDMA; 802.15.4; routing protocols; reliability; network management, diagnostics, quality of service; data management, databases, query processing, and scripting languages; scalability; encryption and security, certification, joining and binding, key management; time synchronization; ranging and localization; operating systems; over the air programming; sensor and actuator interfacing; feedback control; current and future platforms; energy sources and storage; applications and standards.