Wireless and Mobile Networks

General Information:

Instructor: Katia Obraczka (katia@soe.ucsc.edu)

Office: E2 323
Lab: Internbetwork Research Group (i-NRG) E2 311 (http://inrg.cse.ucsc.edu)
Volunteer TA: Kevin Abas
E-mail: kabas@soe.ucsc.edu
Course Location: E2 506
Course Schedule: TTh 2 - 3:45

Class Description:

This class covers various topics relevant to wireless networking and mobile computing. It focuses on communication protocols for wireless networks from medium-access control to end-to-end transport and applications. The course requires extensive reading (especially research literature) and in-class presentations, participation and discussion. Programming proficiency is assumed since students will be required to complete a major class project.

Topics covered in the class include:

  • Medium access control
  • Unicast and multicast routing
  • Wireless internetworking
  • End-to-end protocols
  • Disruption tolerant networking
  • Mobility and location management
  • Power and topology management
  • Security
  • Recent architectures and paradigms


  • In-class presentation: 20%
  • Reading reports: 10%
  • Project: 40% 
  • Exam: 30%
Grades of C and below will be assigned to students who do not perform satisfactorily. You should not assume that you can receive a B simply because this is a graduate class.

Student Responsibilities:

Students enrolled in this class are agreeing to the following:

  • All work turned in as reports, project, and exam MUST be individual. If any work claimed by a student to be his/her own is found to be shared with other students, that will be considered a violation of academic integrity and will be handled accordingly. For more information on UCSC's academic integrity policies, visit http://www.ucsc.edu/academics/academic-integrity/index.html.
  • Students are responsible for reading the papers that will be covered in a specific lecture BEFORE the lecture. All papers must be read in detail even though not all details will be covered in class. A reading report on the papers read need to be submitted before the class meeting in which the papers will be discussed.
  • Students are also responsible for checking the class Web page frequently for updates, schedule changes, etc.
  • The course pre-requisite is CMPE 252A or equivalent. You can talk to the instructor if you do not have the required background. If a student has not taken CMPE 252A (or equivalent), it is the student's responsibility to acquire the corresponding background material.
  • As mentioned in the description of the course, students must be proficient (C, C++) programmers as a class project will account for a considerable portion of the grade.
  • Class attendance is mandatory. Because this is a graduate class, students are expected to participate actively in class, and that's hard to do if they do not attend class regularly. Attendance will not be recorded, but you cannot pass if you miss too many classes. If you need to miss a class, please let the instructor know (in advance if possible).
  • Much of the course material, including assignments and lecture notes, will be posted on the class Web page. However, students are responsible for all material covered in class, whether or not it appeared on the Web site.


No textbook is required. The book "Ad Hoc Wireless Networks: Architectures and Protocols" by C. Siva Ram Murthy and B.S. Manoj can be used as a reference.

Reading Reports:

Each student is expected to write one-page report that contains a brief summary of each paper before it is covered in class. Summaries are due before the start of the class when the paper will be covered. Summaries are to be submitted as an e-mail attachment (plain text or pdf) to cmpe257s15@soe.ucsc.edu.

The summary of each paper should include brief answers to the following questions: (1) what is the problem the authors are trying to solve? (2) why is the problem interesting, relevant, and/or important? (3) what other approaches or solutions existed at the time that this work was done? (4) how did the proposed approach contribute to the state-of-the-art, i.e., why existing approaches were not adequate? (5) what is the proposed approach and how does it compare to earlier approaches, in other words, what are the contributions of the proposed approach? (6) what are the main strengths and weaknesses of the paper/proposed approach?

Having a copy of your reports handy in class can help guide your participation.


Student must complete a project for the class. While project ideas will be posted on the class Web page, students are encouraged to propose their own project topics to be evaluated/approved by the instructor. Projects are individual; however, depending on the complexity of their complexity, projects can involve teams of up to 2 students. 

Students are required to submit a project proposal which will contain the following information: project title; brief motivation and description of related work; proposed approach; experimental methodology; demo plan and/or expected results.

Project deliverables include:project report, source code, project presentation/demo. A list of project ideas will be posted soon.

Student Presentations:

Students will present on a topic of their choice. Topics include: security in wireless networks, recent architectures and paradigms (DTN, ICN, SDN, hybrid networks, IoT, etc). Student presenters need to pick a topic of their interest among the ones suggested. Students can also propose a new topic (need instructor's approval). Once the topic is selected, students will choose 3 papers on the topic to be covered. Selected papers need approval from instructor.

Student presentations must provide a good overview of the topic through the papers selected (they should avoid describing the papers exactly). Presentations should provide insight and critical perspective on the state-of-the-art related to the topic being presented. Class discussion should be encouraged.

Reading List:

Every attempt will be made to post readings the weekend before they are due.

Timeless readings:

  1. Saltzer et al., End-to-end Arguments in System Design (pdf)
  2. Lampson, Hints for Computer System Design (pdf)
Introduction: (April 2)
  1. L. Kleinrock, "Nomadicity: Anytime, Anywhere In A Disconnected World", Invited paper, Mobile Networks and Applications, Vol. 1, No. 4, January 1996, pp. 351-357. (pdf)
  2. L. Kleinrock, "An Internet Vision: The Invisible Global Infrastructure", Ad Hoc Networks Journal, Vol. 1, No. 1, pp. 3-11, July 2003.(pdf
  3. M Weiser, "The Computer for the 21st Century", 1991. (pdf)
  4. M. Weiser, "Some Computer Science Problems in Ubiquitous Computing", Communications of the ACM, July 1993. (pdf)

Medium Access Control:

Set I: Basic Contention-Based Channel Access (April 7)

  • B. P. Crow and I. Widjaja and L. G. Kim and P. T. Sakai, "IEEE 802.11 Wireless Local Area Networks", 1997. IEEE Communications Magazine, 35(9):116-126. (PDF)
  • Vaduvur Bharghavan, Alan Demers, Scott Shenker, Lixia Zhang, "MACAW: A Media Access Protocol for Wireless for Wireless LANs", ACM Sigcomm 94. (PDF)
  • J. J. Garcia-Luna-Aceves and C. L. Fullmer, "Floor Acquisition Multiple Access in Single-Channel Wireless Networks," ACM MONET Journal, Special Issue on Ad Hoc Networks, Vol. 4, 1999, pp. 157-174. (PDF)

Set II: Schedule-Based Channel Access (April 9)

  • Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves. "DYNAMMA: A DYNAmic Multi-channel Medium Access Framework for Wireless Ad Hoc Networks", Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS). Oct 2007. Nominated for the best paper award. (PDF)
  • V. Rajendran, Katia Obraczka, and J.J. Garcia-Luna-Aceves, "Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks", ACM/Kluwer Wireless Networks (WINET), 2006. (PDF)
  • Djukic, P. and Mohapatra, P., "Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware", Proceedings of the INFOCOM 2009, 2009 (PDF)

Guest Lectures on Special Network Architectures:

Set I:  CCNs Spencer Sevilla (April 14)

  • Jacobson, Van, et al. "Networking named content." Proceedings of the 5th international conference on Emerging networking experiments and technologies. ACM, 2009.(PDF)
  • Ahlgren, Bengt, et al. "A survey of information-centric networking."Communications Magazine, IEEE 50.7 (2012): 26-36.(PDF)
  • Ghodsi, Ali, et al. "Information-centric networking: seeing the forest for the trees." Proceedings of the 10th ACM Workshop on Hot Topics in Networks. ACM, 2011.(PDF)

Set II:  DTNs: Aloizio  P. Silva (April 16)

  • Maurice Khabbaz and Chadi M. Assi and Wissam Fawaz. Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges. IEEE Communications Surveys and Tutorials 14(2): 607-640 (2012). (PDF)
  • Scott Burleigh and  Adrian Hooke and  Leigh Torgerson and  Kevin Fall and  Vint Cerf and Bob Durst and  Keith Scott and Howard Weiss. Delay-Tolerant Networking: An approach to interplanetary internet (2003) .IEEE Communications Magazine.(PDF)
  •  Aloizio P. Silva and Scott Burleigh and Celso M. Hirata, and K. Obraczka,"Congestion Control in Disruption-Tolerant Network: A Comparative Study for Interplanetary Networking Applications", ACM CHANTS 2014, Maui, Hawaii, USA, September 2014 (PDF)
Unicast Routing:
Set I (April 21)
  • Dynamic source routing in ad hoc wireless networks, David B. Johnson, David A. Maltz, in Mobile Computing, editor T. Imielinski and Hank Korth, Kluwer, 1996. (PDF)
  • An Implementation Study of the AODV Routing Protocol, Elizabeth M. Royer and Charles E. Perkins, Proceedings of the IEEE Wireless Communications and Networking Conference, Chicago, IL, September 2000. (PDF)
 Set II (April 23)
  • Optimized Link State Routing Protocol (OLSR), RFC 3626. (PDF)
  • Samir R. Das, Charles E. Perkins, Elizabeth M. Royer and Mahesh K. Marina. Performance Comparison of Two On-demand Routing Protocols for Ad hoc Networks. IEEE Personal Communications Magazine special issue on Ad hoc Networking, February 2001, pp. 16-28. (PDF)
Multicast Routing: (April 28)
  • Multicast Operation of the Ad hoc On-Demand Distance Vector Routing Protocol. Royer and Perkins, Proceedings of Mobicom, August 1999. (PDF)
  • On-Demand Multicast Routing Protocol. Lee, Gerla and Chiang, Proceedings of WCNC, September 1999. (PDF)
  • Robust and scalable integrated routing in MANETs using context-aware ordered meshes. Rolando Menchaca-Mendez and J. J. Garcia-Luna-Aceves, INFOCOM'10 Proceedings of the 29th conference on Information communications, San Diego, California, USA.(PDF)

Wireless Internetworking: (April 30) 

  • A Mobile Host Protocol Supporting Route Optimization and Authentication, Andrew Myles, David B. Johnson, Charles Perkins, IEEE Journal on Selected Areas in Communications, special issue on Mobile and Wireless Computing Networks, 13(5):839-849, June 1995.(PDF)
  • Mobility Support in IPv6 , Charles E. Perkins and David B. Johnson. Proceedings of the Second Annual International Conference on Mobile Computing and Networking (MobiCom'96), November 1996.(PDF)
  • FLIP: A Flexible Interconnection Protocol for Heterogeneous Internetworking, Ignacio Solis and Katia Obraczka, in ACM/Kluwer Mobile Networking and Applications (MONET) Special on Integration of Heterogeneous Wireless Technologies.(PDF)
  • Optional: TCP Performance in Mobile-IP, Foo Chun Choong.(PDF) 

End-to-End Protocols:

Point-to-point Communication: 

  1. Infrasructure-Based Wireless Networks: (May 5th)
    • Improving TCP/IP Performance over Wireless Networks, Hari Bala krishnan, Srinivasan Seshan, Elan Amir, Randy H. Katz. Proc. 1st ACM Conf. on Mobile Computing and Networking, Berkeley, CA, November 1995. (PDF)
    • Delayed duplicate acknowledgements: a TCP-Unaware approach to improve performance of TCP over wireless, Nitin H. Vaidya, Milten N. Mehta, Charles E. Perkins, Gabriel Montenegro. (PDF)
    • I-TCP: indirect TCP for mobile hosts, 15th Int'l Conf. on Distributed Computing Systems (ICDCS), May 1995. (PDF)
  2. MANETs: (May 7th)
    • Analysis of TCP Performance over Mobile Ad Hoc Networks, G. Holland and N. H. Vaidya, Fifth Annual International Conference on Mobile Computing and Networking (MOBICOM), Seattle, August 1999.(PDF)
    • A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks, Thomas Dyer, Rajendra Boppana, Mobihoc 2001.(PDF)
    • Improving TCP Performance over Mobile Ad-Hoc Networks with Out-of-Order Detection and Response, F. Wand and Y. Zhang, Mobihoc 2002. (PDF)

Multi-point Communication: (May 14th)

  • Reliable Broadcast in Mobile Multihop Packet Networks, E. Pagani and G.P. Rossi, Proceedings of ACM/IEEE MOBICOM'97, Budapest, Hungary, Sep. 1997, pp. 34-42. (PDF)
  • Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks R. Chandra, V. Ramasubramanian, and K.P. Birman, Proceedings of IEEE ICDCS 2001, Mesa, AZ, Apr. 2001, pp. 275-283.(PDF)
  • Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, Sung-Ju Lee, Ken Tang and Mario Gerla , "Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-Hop Ad Hoc Networks," Proceedings of the Networking' 04, May 2004.(PDF)
  • Optional: Ken Tang, Katia Obraczka, Sung-Ju Lee and Mario Gerla , Reliable Adaptive Lightweight Multicast Protocol, Proceedings of IEEE ICC 2003, May 2003.(PDF)

Wireless propagation: (Sam; May 21st)

  • Sarkar, Tapan K., et al. "A survey of various propagation models for mobile communication." Antennas and Propagation Magazine, IEEE 45.3 (2003): 51-82.(PDF)
  • Kotz, David, et al. "Experimental evaluation of wireless simulation assumptions." Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems. ACM, 2004.(PDF)
  • Stepanov, Illya, Daniel Herrscher, and Kurt Rothermel. "On the impact of radio propagation models on MANET simulation results." Proceedings of 7th International Conference on Mobile and Wireless Communications Networks (MWCN 2005), 2005.(PDF)

Internet of Things: (Anuj; May 21st)

  • ITU Internet Reports, "The Internet of Things", November 2005(PDF) [only chapter 2] 
  • Evan Welbourne, Leilani Battle, Garret Cole,Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, and Gaetano Borriello, "Building  the Internet of Things Using RFID. The RFID Ecosystem Experience", IEEE Internet Computing, May/June 2009.(PDF)
  • Zhijing Qin, Grit Denker, Carlo Giannelli, Paolo Bellavista, Nalini Venkatasubramanian, "A Software Defined Networking Architecture for the Internet-of-Things", IEEE NOMS 2014.(PDF)

User mobility: (Larissa; May 26th)

  • Ribeiro, Andrea, Rute Sofia, and SITI IAN. "A survey on mobility models for wireless networks." SITI, University Lusófona, Tech. Rep. SITI-TR-11-01 (2011).(PDF)
  • Kyunghan Lee; Seongik Hong; Seong Joon Kim; Injong Rhee; Song Chong, "SLAW: A New Mobility Model for Human Walks," INFOCOM 2009, IEEE , vol., no., pp.855,863, 19-25 April 2009(PDF)
  • Kim, Minkyong, David Kotz, and Songkuk Kim. "Extracting a Mobility Model from Real User Traces." INFOCOM. Vol. 6. 2006.(PDF)

Game theory in MANETs: (Armando; May 26th)

  • V. Srivastava et al., “Using Game Theory to Analyze Wireless Ad Hoc Networks,” IEEE Communications Surveys and Tutorials, Vol 7, Issue 4, pp. 46-56, 2005(PDF)
  • R. Menon et al., "A Game-Theoretic Framework for Interference Avoidance in Ad hoc Networks," IEEE Globecom, 2006(PDF)
  • L. Chen, T. Cui, S. H. Low, and J. C. Doyle, "A game-theoretic model for medium access control," in WICON '07, Austin, Texas, USA, 2007(PDF)

Location management and geocasting: (Daniel; May 28st)

  • Maihofer, C., "A survey of geocast routing protocols," Communications Surveys & Tutorials, IEEE, vol. 6, no. 2, pp. 32-42, Second Quarter 2004(PDF)
  • Camp, T.; Boleng, J.; Wilcox, L., "Location information services in mobile ad hoc networks," Communications, 2002. ICC 2002. IEEE International Conference on , vol.5, pp. 3318-3324, 2002(PDF)
  • Kuiper, E.; Nadjm-Tehrani, S., "Geographical Routing With Location Service in Intermittently Connected MANETs," Vehicular Technology, IEEE Transactions on, vol. 60, no. 2, pp. 592-604, Feb. 2011(PDF)


SDN: (Alan; May 28st)

  • Ali-Ahmad, Hassan, et al. "An SDN-based network architecture for extremely dense wireless networks." Future Networks and Services (SDN4FNS), 2013 IEEE SDN for. IEEE, 2013.(PDF)
  • Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks. IEEE Communications Surveys and Tutorials.(PDF)
  • Costanzo, S., Galluccio, L., Morabito, G., & Palazzo, S. (2012). Software defined wireless networks: Unbridling SDNs. In Proceedings - European Workshop on Software Defined Networks, EWSDN 2012 (pp. 1–6). (PDF)

Secure routing in MANETs (Ben; June 2)

  • Deng, Hongmei, Wei Li, and Dharma P. Agrawal. "Routing security in wireless ad hoc networks." Communications Magazine, IEEE 40.10 (2002): 70-75.(PDF)
  • Zapata, Manel Guerrero, and Nadarajah Asokan. "Securing ad hoc routing protocols." Proceedings of the 1st ACM workshop on Wireless security. ACM, 2002.(PDF)
  • Sanzgiri, Kimaya, et al. "A secure routing protocol for ad hoc networks." Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE, 2002.(PDF)

ICN: (Maziar; June 2)

  • Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... & Zhang, B. (2014). Named data networking. ACM SIGCOMM Computer Communication Review, 44(3), 66-73.(PDF)
  • Dabirmoghaddam, Ali, Maziar Mirzazad-Barijough, and J. J. Garcia-Luna-Aceves. "Understanding optimal caching and opportunistic caching at the edge of information-centric networks." Proceedings of the 1st international conference on Information-centric networking. ACM, 2014.(PDF)
  • Garcia-Luna-Aceves, J. J., and Maziar Mirzazad-Barijough. "Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network." Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems. IEEE Computer Society, 2015.(PDF)


Instructors and Assistants