This course covers how wireless infrastructure shapes the architecture of embedded applications and wireless RF designs of WiFi, BlueTooth, ZigBee, and Thread. It will also cover low-power design considerations and techniques for mobile applications and enabling 10+ year product life cycles for mission critical and industrial equipment. Security attack surfaces will be discussed and what is required to prevent or make known security attacks. Economic models for Internet of Things solutions and services will be presented as these economic model affect product design.
Course materials include textbooks, papers, lecture slides, project guides, and other online materials.
The course grade will be based on in-class participation, homework assignments, quizzes, course projects, and 2 exams. The grade proportions are as follows:
A complete description of the honor code can be found here .
To summarize: "Violations of the Honor Code are acts of academic dishonesty and include but are not limited to plagiarism, cheating, fabrication, aid of academic dishonesty, lying to course instructors, lying to representatives of the Honor Code, bribery or threats pertaining to academic matters, or an attempt to do any of the aforementioned violations."