| Carl Friedrich Gauß Faculty | Department of Computer Science

Seminar Connected and Mobile Systems (Bachelor)

Module #INF-STD-18, ET-STD-05
Event #INF-KM-024
ProgrammesBachelor Elektrotechnik, Bachelor Informatik, Bachelor Informations-Systemtechnik, Bachelor Wirtschaftsinformatik
IBR GroupCM (Prof. Wolf)
PhotoProf. Dr.-Ing. Lars Wolf
+49 531 3913288
Room 138
PhotoYannic Schröder
Wissenschaftlicher Mitarbeiter
+49 531 3913249
Room 134
Time & Place

Auf Grund der Corona-Krise wird diese Veranstaltung in diesem Semester vorläufig online stattfinden. Bitte loggen Sie sich ein, um den Link zur Online-Veranstaltung zu sehen.

Please login to get more information here.

Certificates Schriftliche Ausarbeitung und erfolgreicher Seminarvortrag. Die Note wird abhängig von der aktiven Teilnahme am Seminar sowie der Qualität des Vortrages und der Ausarbeitung bestimmt.
Content In this seminar recent advanced scientific publications and implementation efforts in the area of Connected and Mobile Systems should be summarized and presented.
The material is only available to registered attendees. In order to register, you need either an IBR account or a self-activated IBR-y-account. Afterwards you can login to this site (with the function at the top of this page).
[ Newsfeed aller Formate ]
Folien der Themenvergabe
Konferenzsystem: Abgabe und Einreichung
Konferenzsystem: Review-Prozess
[ Subscribe Calendar | Download Calendar ]
19.10.2020, 16:00 UhrTreffen zur Vergabe der Einzelthemen im IBR BBB
16.11.2020, 23:59 UhrAbgabe einer ersten Gliederung (beim Betreuer)
14.12.2020, 23:59 UhrAbgabe der ersten vollständigen Ausarbeitung (beim Betreuer)
11.01.2021, 23:59 UhrAbgabe der vollst. Ausarbeitung (im Konferenzsystem)
18.01.2021, 23:59 UhrAbgabe der Reviews durch die Teilnehmer (im Konferenzsystem)
01.02.2021, 23:59 UhrAbgabe der finalen Ausarbeitung (im Konferenzsystem)
08.02.2021, 23:59 UhrAbgabe einer ersten Version der Folien (beim Betreuer)
11.02.2021, 12:00 UhrAbgabe der finalen Folien (per Mail bei Yannic Schröder)
12.02.2021, 09:00 UhrBlockveranstaltung im IBR BBB

Im World-Wide-Web gibt es verschiedene Hinweise zur Gestaltung von Seminarvorträgen. Als besonders beachtenswert gilt:

Für die Literaturrecherche könnten diese Links hilfreich sein:



Auch in diesem Semester wird es wieder eine gegenseitige Begutachtung der Ausarbeitungen durch die Teilnehmer des Seminars geben. Das bedeutet, dass jeder Teilnehmer nach der Abgabe der finalen Version seiner Ausarbeitung zwei Ausarbeitungen anderer Teilnehmer erhält, zu denen er ein kleines Gutachten (Review) schreiben muss. Dieses Review soll sowohl positive als auch negative Kritik enthalten und dazu beitragen, dass die Ausarbeitung weiter verbessert wird. Für den Review-Prozess und die Abgaben der eigenen Arbeit wird ein entsprechendes Konferenzsystem verwendet.


Die Ausarbeitung ist als PDF abzuliefern. Der Umfang der Ausarbeitung muss dabei 12 bis 15 Seiten umfassen, für den Vortrag selbst sind minimal 18, maximal 22 min. angesetzt. Jeder Teilnehmer des Seminars erhält Basisliteratur zu seinem jeweiligen Thema. Darüber hinaus sollte jeder Teilnehmer zusätzlich eine selbständig Recherche, z.B. im Internet durchführen. Die Betreuer stehen hierbei jederzeit gerne hilfreich zur Seite.

Aufgrund entsprechender Erfahrungen soll auch noch auf die Selbstverständlichkeit hingewiesen werden, dass die Ausarbeitung in eigenen Worten erfolgen muss und das durch den elektronischen Bezug von Literatur verleitete CopyPaste von Textpassagen ein Vergehen gegen die Prüfungsordnung darstellt.

Vorlagen und Hilfestellungen für LaTeX sind auf der Seite "IBR-CM-Vorlagen" zu finden. Die Verwendung von LaTeX ist verpflichtend.
Ein Beispiel einer Ausarbeitung im PDF-Format: Beispiel-Ausarbeitung

B1Transmission power control in wireless sensor networksJan Schlichter

Wireless sensor networks (WSNs) can be used in various scenarios like smart farming or Industry 4.0. The similarity between most WSNs is that the sensor nodes are subject to significant energy constraints.

There are multiple approaches to increase the lifetime of the sensor nodes by either harvesting energy from the environment or minimizing the energy consumption as far as possible. The most energy-consuming part of a typical duty cycle is the communication with other nodes. To minimize the energy consumption during communication different power control techniques have been proposed. What are the general concepts of those techniques? Give an overview about transmission power control techniques and describe one or two in detail.

B2Multi-Channel Approaches for Vehicular NetworkingKeno Garlichs

The market penetration of vehicular communication is still very limited. Also there is only a small amount of services using that technology and therefore spectrum. However, this will change in the future and the resources one communication channel can provide will not suffice anymore. Luckily, the frequency band allocated for vehicular commication includes more than one channel. Research and summarise approaches for multi-channel communication developed for specificly for vehicular communication and approaches from other fields which you deem suitable as well.

B3Current research state of Transiently Powered Computing and Intermittent ComputingRobert Hartung

The two terms Transiently Powered Computing (TPC) and Intermittent Computing (IC) describe a class of systems where energy is very limited. Systems are often powered for a short amount of time.

Define the two terms and present current research and highlight important open questions.

B4PHY and MAC layer approaches for UAV networksSven Pullwitt

UAV networks are an emerging technology in various fields, such as disaster management, smart farming, search and rescue and many others. A key challenge in these networks is reliable communication with regard to the specific requirements of a given application. In this seminar existing approaches for realizing UAV network communication shall be presented, analyzed and compared with special focus on the PHY and MAC layer.

B5Next-Generation Communication Technologies for V2X: From IEEE 802.11p to IEEE 802.11bdAlexander Willecke

Communication between vehicles opens up new possibilities in automated driving. In research as well as in the automotive industry new concepts and use cases are developed. Some of these new applications, such as cooperative maneuver planning, requires higher data rates than the current communication technology ITS-G5, which is based on IEEE 802.11p, cannot provide. Therefore, the IEEE is currently standardizing the successor technology IEEE 802.11bd to enable ITS applications with high demand.

Compare the both technologies. How do they work? What are their advantages and disadvantages? How does 802.11bd improve its predecessors?

B6Rust for MicrocontrollersDaniel Bräckelmann

Rust has gained a lot of traction lately and seems, due to its design as a systems level programming language, to be a possible contender for the currently mostly prevalent C and C++ in the MCU space.

As Rust has a lot of builtin guarantees regarding memory and thread safety, the language is a very promising candidate for devices that have to be highly reliable. Almost all of these promises are realised by compile time checks, so the performance hit is quite limited.
These obviously desirable qualities come with some drawbacks, e.g. as Rust heavily relies on the LLVM infrastructure, only hardware with a corresponding LLVM backend can be used as a target, currently most prevalent being ARM M-based MCUs like the STM32 lineup.

Sum up the current status of Rust as a programming language for microcontrollers and draw a conclusion if it would be worthwhile to use it for example for new sensor node projects.

B7Performance of real world IEEE 802.15.4 TSCH deploymentsSven Pullwitt

With the introduction of TSCH in IEEE 802.15.4e many of the limitations of traditional IEEE 802.15.4 networks have been addressed. Especially the robustness of networks in noisy environments should be improved by using channel hoping. Since the introduction of TSCH, some real world implementations have emerged, i.e. in Contiki-NG an OpenWSN. To gain an understanding of the current state of real world IEEE 802.15.4 TSCH deployments, relevant studies in the literature shall be researched and their evaluation methods and results presented and discussed.

B8V2X Communication Technologies: C-V2X vs. ITS-G5Alexander Willecke

The development of applications and services for V2X communication in Europe is harmonized by the ESTI, where members of the automotive industry and the research community meet and form consensus. But the choice for the access layer technology is still highly controversial. On one hand, the decentralized approach, called ITS-G5, is competing against the centralized one, named Cellular-V2X.

Compare the both technologies. How do they work? What are their advantages and disadvantages? Why can only one technology push through?

last changed 2020-10-19, 14:52 by Sven Pullwitt