May 19 (Monday) 8:30am-12:30pm (break 10:15am-10:45am)
TU01: Cognitive Radio Networks
Room: 310 Instructor: Ian F. Akyildiz (Georgia Institute of Technology) Abstract: Today’s wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical variations in the utilization of assigned spectrum ranges from 15% to 85% with a high variance in time. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. This new networking paradigm is referred to as cognitive radio networks. In this tutorial, the novel functionalities and current research challenges of the cognitive radio networks are explained in detail. More specifically, an overview of the cognitive radio technology is provided and the network architecture is introduced. Moreover, the cognitive network functions such as spectrum management, spectrum mobility and spectrum sharing are explained in detail. The influence of these functions on the performance of the upper layer protocols such as routing and transport are investigated and open research issues in these areas are also outlined.
TU02: Ultrawide Bandwidth Systems
Room: 311-A Instructors: Moe Z. Win (Massachusetts Institute of Technology), Andreas F. Molisch (Mitsubishi Electric Research Labs, Lund University) Abstract: Ultra-wide bandwidth (UWB) transmission systems have gained increasing interest in the scientific, commercial, and military sectors over the last decade. Wide bandwidth provides fine delay resolution, making UWB a viable candidate for communications and accurate positioning in dense multipath environments. Currently, UWB transmission systems are being developed for communications, localization, and sensor networks because they potentially allow low-cost production and reuse of (already occupied) spectrum. UWB also has applications in military and homeland security operations because it provides low probability of detection as well as anti-jam capabilities.
Interest in UWB systems has intensified recently due to the ruling by the US Federal Communications Commission (FCC) concerning UWB emission masks. This ruling opens the way for coexistence with traditional and protected radio services and allows the potential use of UWB transmission without allocated spectrum. Standardization bodies (like IEEE 802.15) have started to develop standards for UWB systems and companies are announcing products. In this tutorial, we will give a technical overview that will allow the attendants to distinguish between commercial hype and the true technical possibilities.
TU03: VoIP Support for OFDMA Systems
Room: 311-B Instructors: Sean McBeath (Huawei Technologies), Anthony C.K. Soong (Huawei Technologies), Patrick Hosein (Huawei Technologies) Abstract: The wireless communications industry is, as more and more 3G systems are deployed worldwide, undergoing a profound transformation. It is changing from a system mainly oriented to voice services to one that can handle the tremendous requirements of high-speed data services. Two trends, however, have become evident during this transformation. The first is that, even as the deployment of 3G systems are gaining momentum, the main source of revenue for most operators, despite the growth of data services in recent years since, is still voice service. The second is the convergence to all IP (Internet Protocol) based services in communication networks. Consequently, there is great interest in the industry to provide efficient Voice over IP (VoIP) services over these newly developed systems.
Supporting VoIP in an OFDMA system provides several unique challenges, which have been addressed differently in recent wireless systems (LTE, UMB, and 802.16). In this tutorial, we will first provide an overview of the challenges associated with supporting VoIP for OFDMA systems. The first challenge deals with sharing the time-frequency resources of the system among multiple users, while controlling the associated control channel overhead. The second challenge deals with designing the overall system so that VoIP can be efficiently supported. Based on a thorough presentation of these challenges, we will then outline how VoIP is supported in the major wireless standards, together with simulation results. Next, we will describe resource management enhancements for VoIP. Finally, we will describe how VoIP performance can be further improved in future wireless systems.
TU04: Advances in Co-located and Distributed Multi-Functional MIMO-Aided Next-Generation OFDM And MC-CDMA Systems
Room: 311-C Instructor: Lajos Hanzo (University of Southampton) Abstract: This course is based on the lecturer's IEEE Press - Wiley monographs, arguing that multi-standard operation is an important requirement for the future generations of wireless systems. Hence a future-proof design framework will be introduced, adaptive coding and modulation will be combined with multi-functional MIMOs for mitigating the correlated fading introduced by shadow-fading and joint channel and data estimation will be employed for SDMA-aided multi-user MIMO-OFDM. Furthermore, powerful, near-maximum-likelihood (ML) sphere detectors (SD) and genetic algorithm (GA) assisted detectors, time- and frequency-domain (TFD) spreading, interleave division multiple access (IDMA), near-capacity layered steered space time codes and their cooperative counterparts will be reviewed.
TU05: Wireless Network Information Theory
Room: 302 Instructor: Liang-Liang Xie (University of Waterloo) Abstract: How much information can a wireless network transport, and how should the nodes cooperate to transfer information? We are interested in the best throughput performance a wireless network can achieve. For this, one naturally turns to the field of information theory, and especially, network information theory that deals with channels of multiple source-destination pairs.
We briefly review some basics of network information theory, while our focus is on its recent development for wireless networks. On one hand, wireless networks brought both opportunities and challenges to information theory; on the other hand, information theory indeed can provide fundamental guidance to the operation of wireless networks.
We will discuss both upper bounds and achievability results. Specific topics include cut-set bound, relay, network coding, scaling laws, etc. For relay networks, we will focus on the decode-and-forward strategy with different coding schemes such as successive decoding, sliding-window decoding, and backward decoding, and discuss their relative advantages and drawbacks. We will expose the essential idea of network coding by introducing the classical technique of random binning, and demonstrate a natural way to extend to wireless network coding.
TU06: Digital Media Distribution: Trends, Challenges and Opportunities
Room: 303 Instructors: Sanjoy Paul (Convergence Technology Lab, Infosys Technologies Limited), Katherine Guo (Bell Labs) Abstract: This tutorial will focus on the details of architecture, protocols, and algorithms for delivering video over a hybrid multi-technology-wireless and wired network highlighting how the various technology trends may be used in an efficient manner to enable a service provider to deliver video at a very low cost/MB without sacrificing quality of experience for consumers and in the process, generating revenue from a range of video-based services. This tutorial will also provide in-depth knowledge of how Telecom service providers would deliver high quality video over IP networks in a cost-effective manner to compete with cable and satellite service providers. Moreover, the challenges for a mobile wireless service provider to deliver high quality video in a secure manner to customers anytime anywhere will be discussed together with potential solutions. In addition, topics, such as, scalable video on demand using a combination of smart scheduling technology, IP multicasting, and XML-based semantic routing will also be covered. Advances in video codecs will be briefly touched as well together with security issues and Digital Rights Management (DRM). Finally, the tutorial will cover a variety of research topics in the area of digital video distribution and also profile a number of prominent start-up companies in the space.
TU07: Next Generation Mobile Broadband Wireless Technologies: Cooperative Communications and Relaying
Room: 306 Instructors: Chia-Chin Chong (DoCoMo Communications Laboratories), Mike Hart (UK Broadband Ltd.), Yuefeng Zhou (NEC Europe) Abstract: Next generation mobile broadband wireless networks, such as 3GPP LTE, 3GPP2 UMB, WiMAX, etc. recently have gained tremendous momentum in the industrial and academic sectors. The advantages based on throughput, latency, spectral efficiency, and advanced antenna support, ultimately enabling them to provide higher performance than today's wide area wireless technologies.
Coverage improvement and capacity enhancement are always the essential requirements for wireless broadband networks in order to deliver cost-effective wireless services. Due to significant loss of signal strength along the propagation path especially at higher frequency and the transmit power constraint of mobile terminals, the sustainable coverage area for a specific high data rate is often of limited geographical size. In addition, blocking and random fading frequently result in areas of poor reception or even dead spot within the coverage region. Moreover, as the data rate demand of mobile applications increases, the effective coverage range given a fixed transmit power becomes less. Conventionally, this problem has been addressed by deploying base stations (BSs) in a denser manner. However, the high manufacturing, deployment and maintenance cost associated with BSs, and potential aggravation of interference, among others, render this approach less desirable.
Due to the higher demand for good quality multimedia applications, such as video streaming and video-on-demand, capacity enhancement is a must for the next generation cellular networks. However, continuous increasing the bandwidth to enhance the capacity is impractical because of the scarcity of spectrum availability. Advanced technologies, such as HARQ, MIMO, AAS (Advanced Antenna System), and FFR (Fractional Frequency Reuse) could be used to provide wider coverage and higher data rate. However, the achieved coverage gain and data rate improvement are very limited comparing to deploying more BSs in the network, and the cost of terminals will increased dramatically by using these technologies.
Recently, the areas of cooperative communications and relaying have received a lot of attention from both industrials and academic. It has been envisioned as a practical solution that can improve both the coverage and capacity of a system in a cost effective fashion. Recently, more industrial standards have started to include relaying and cooperative communication features. One evident example is that the first industrial multi-hop relay standard draft, namely, IEEE802.16j, which was recently issued to amend current mobile WiMAX standard in order to provide a complete multi-hop relay system solution. Cooperative communications has also been already included in mobile WiMAX, and is further emphasized in IEEE802.16j.
This tutorial will focus on the fundamentals, motivating applications, and peculiarities of multi-hop relaying and cooperative communications to improve the coverage and capacity in mobile broadband wireless networks. Other advanced technologies, such as HARQ, MIMO, AAS and FFR will also be discussed. A quantitative discussion on system performance will be provided to further elaborate the peculiarities of these advanced technologies.
TU23: A Crash-Course on Cooperative Wireless Networks
Room: 308 Instructors: Mischa Dohler (France Telecom), Hamid Aghvami (King’s College London) Abstract: The aim of this tutorial is hence to expose an industrial and academic audience to the cutting-edge challenges related to the analysis, design and deployment of such cooperative wireless communication networks. In particular, first, we will dwell on Application Scenarios to give some ideas about applicability and business opportunities of these techniques. Second, Definitions shall be given to make sure that people with different backgrounds harmonize on the understanding of cooperative systems. Third, Background & Milestones shall be dwelled on to show who has advanced what in this fast-moving field. Before diving into practical issues, we shall dwell on Capacitive and Outage Bounds for this type of networks, as well as discuss the scaling behavior of some chosen topologies. Then, we shall discuss Hardware Issues so as to eliminate myths on what can and cannot be done in reality. Important to network design is also Channel Modeling where in this context we will show that cooperative channel models are different from traditional ones. We then will commence with Physical Layer Algorithms, and in particular synchronous and lately emerging asynchronous transparent and regenerative single and multi-carrier relaying algorithms which are potentially applicable to WiMAX and LTE type systems. We then will discuss Medium Access Control Protocols and their applicability to cooperative networks; this part shall also include issues related to cross-layer design with PHY. We then show the Application and Economic Benefits of these techniques to incumbent and emerging wireless systems, including WiMAX and LTE derivatives, and we will also show the interest of companies like France Telecom in these approaches. Finally, Conclusions and Road Ahead shall be exposed as well as some thoughts about what is ripe and what is hype.
May 19 (Monday) 2:00pm-6:00pm (break 3:45pm-4:15pm)
TU08: Passive Optical Networks for Broadband Access
Room: 310 Instructor: Nirwan Ansari (New Jersey Institute of Technology) Abstract: With the recent advances in optical fiber technologies, a dramatic increase in bandwidth has been facilitated in the backbone network through the penetration of wavelength-division multiplexing (WDM) technology, which provides tens of Gbps per wavelength. At the same time, local area networks (LANs) have been scaled up from 10Mbps to 100 Mbps and are being upgraded to Gigabit Ethernet speeds. However, the access network in between only runs at low Mbps or even Kbps bandwidth speeds. As an inexpensive and scalable solution to the bottleneck problem of broadband access, passive optical networks PONs address the last mile of the communications infrastructure between the service provider’s central office (CO) and customer sites. After briefly reviewing the wired access technologies, including DSL and cable modem, this tutorial provides a comprehensive overview of PONs, including the network architecture and enabling technologies, as well as diverse versions of PONS and their corresponding protocols. A close examination of the resource management issue along with the state-of-art schemes over time division multiplexed PONs (TDM-PONs) will be presented. Moreover, a unified state space representation will be introduced to describe the management on TDM-PON upstream resource. Research directions are also highlighted for future exploration.
TU09: Cognitive and Cooperative Wireless Networks
Room: 311-A Instructor: Kwang-Cheng Chen (National Taiwan University) Abstract: Cognitive radio based on software defined radio has been considered as a key technology in future wireless communications, which fundamentally enhances the radio spectral efficiency. However, cognitive radio is not only a physical layer transmission technology, but also provides intellectual challenges to form cognitive radio network by cognitive radios. It shall supply the overall networking efficiency at given radio spectrum bandwidth. This tutorial gives a complete comprehensive introduction to audience, including state-of-the-art wireless communications and natures, spectrum sensing for cognitive radio “network”, cooperative communications, cognitive medium access control, network layer design issues of cognitive radio networks, trust and security, theoretical limitations, price & strategy for operators and users, and global regulations.
TU10: Multihop Cellular Networks and IEEE 802.16j: Technologies and Applications
Room: 311-B Instructors: Hung-Yu Wei (National Taiwan University), Jarogniew Rykowski (Poznan University), T. Russell Hsing (Telcordia Technologies) Abstract: Multihop Cellular Networks have become promising wireless networking architecture for future wireless access system. In this tutorial, we will present the multihop cellular networking architecture that integrates cellular network architecture with multihop wireless relay. The technique of augmenting cellular networks with multihop relay networks has been applied to different types of wireless network. Enhancing cellular coverage, increasing system throughput, balancing load within wireless access networks, providing flexible wireless network access are several key advantages of multihop cellular networking architecture. IEEE 802.16 WiMAX system also applies the multihop cellular design principle to its 802.16j Mobile Multihop Relay system. In this tutorial, both up-dated technologies development and potential service applications will be discussed. We will first give an technologies overview on Multihop Cellular Networks and design issues. Then IEEE 802.16j standard will be introduced. We will then discuss a few potentially killer application scenarios of using multihop cellular networks.
TU11: Peer-to-Peer Communications – Operational Aspects in Heterogeneous Networks
Room: 311-C Instructors: Wolfgang Kellerer, Zoran Despotovic (NTT DoCoMo European); Gerald Kunzmann, Stefan Zöls (Munich University of Technology) Absctract: Peer-to-Peer (P2P) systems can be regarded as decentralized and self organizing overlay architectures, independent of specific access networks. Self organization makes them robust and flexible to dynamic changes without provider interaction. Their main objective is to support lookup and use of distributed resources. P2P technologies have thus received an increasing interest in academia and also in industry in different application areas not only limited to file sharing but also in communication applications such as Skype. The potential of P2P is in the realization of novel applications (user generated content, community based services) and also in applying its principles to use existing resources in a more efficient way to save infrastructure cost. After a short introduction to P2P this tutorial goes beyond basic principles by presenting advanced issues regarding operational aspects targeting heterogeneous and mobile communication networks. In particular, we cover distributed monitoring and control of key P2P system characteristics such as network size and traffic distribution and their (cost-based) control. We further elaborate on P2P overlay cooperation related aspects such as trust and reputation management, incentives and security.
TU12: Cognitive Radio Communications and Networking
Room: 302 Instructors: Zhi Tian (Michigan Technological University), Georgios B. Giannakis (University of Minnesota,) Abstract: Radio frequency spectrum is a valuable and tightly regulated resource, but current wireless access technologies built on fixed spectrum allocation cause severe bandwidth underutilization. This scarcity-underutilization imbalance motivates the emerging paradigm of open spectrum access to provide ubiquitous wireless high-speed connectivity. Key to this paradigm are frequency-agile cognitive radios (CRs) that are aware of the radio environment and can dynamically program their parameters to efficiently utilize vacant spectrum without causing harmful interference to authorized users. Technological innovations in CR networks are anticipated to deliver unprecedented spectrum resource utilization efficiency and wireless service flexibility.
The envisioned radio agility gives rise to new technical challenges in realizing wireless radio cognition and adaptation at tractable complexity. While a key hindrance in programmable radio design has been the front-end circuit interface, the emerging open access paradigm brings up unique technical challenges to dynamically managing network resources in the presence of harsh time-varying wireless environments. Responding to the growing interest from industry, academia and government institutions, this tutorial overviews the state-of-the-art in cognitive radio networks, with emphasis on the unique features, challenges and research directions in spectrum sensing, programmable radio platforms and adaptive dynamic radio resource allocation. A by-product of the tutorial will be to enhance the interdisciplinary links among communications, signal processing, and networking research communities.
The contents of this tutorial are as follows. It first gives a brief overview on radio spectrum policies, spectrum sharing paradigms, and motivating applications for CRs. It then discusses system-level issues including the current and potential CR system frameworks and the system capacity of open access networks. The core part of this tutorial focuses on several major research issues in CR radio and network designs, including wideband spectrum sensing, frequency-agile waveform design and adaptation, multiple access and dynamic radio resource allocation, as well as cognitive MAC design. At the end, the tutorial discusses relevant implementation issues, open problems and challenges for future research and development.
TU13: Security and Dependability of Networked Information Systems
Room: 303 Instructors: David Tipper (University of Pittsburgh), Yi Qian (USA National Institute of Standards and Technology) Abstract: A consequence of the increased dependence on networked information systems has been the significantly heightened concerns regarding their security and dependability. In particular, the interconnections, interactions, and dependencies among networked information systems and other critical infrastructure systems can dramatically magnify the consequence of damages resulting from even simple security violations and/or faults. In this tutorial we explore the issues related to the integration of and interaction between approaches, models, architectures, etc., prevalent in the security and dependability areas. In particular, we view information assurance (IA) as a growing area that can form an umbrella to bring together the efforts in security and dependability areas, mainly because their primary goal is to provide an adequate level of assurance that the networked information systems and infrastructures can be relied upon and trusted. Furthermore, the interaction between the dependability and security is only beginning to be addressed in the research literature but is a crucial topic for successfully building IA into IT systems. The goal of this tutorial is to present a sample survey of dependability and security techniques followed by an in-depth look at how one can model these two components interacting in providing IA and what the challenges are for the assurance of emerging systems.
TU14: Beyond 3G: 3GPP Long Term Evolution, 3GPP2 Ultra Mobile Broadband, and WiMAX
Room: 306 Instructor: Hyung G. Myung (Qualcomm/Flarion Technologies) Abstract: The current 3rd generation cellular wireless systems are evolving into 4th generation. As a pathway to 4G, 3GPP is currently developing Long Term Evolution (LTE) standard and 3GPP2 is working on Ultra Mobile Broadband (UMB) standard. IEEE 802.16-based WiMAX is also gaining attention as a 4G solution. In terms of air interface techniques, all three systems use OFDMA-based multicarrier modulation, MIMO, and other advanced features to greatly improve the mobile wireless services. In this tutorial, we first survey the underlying techniques of the three beyond-3G systems such as OFDMA, SC-FDMA, MIMO, fractional frequency reuse (FFR), and advanced coding. Then, we give technical overviews of 3GPP LTE, 3GPP2 UMB, and WiMAX. Specifically, we describe the system architecure, physical layer, and MAC layer of each system.
TU26: Re-engineering the Technology Acquisition Process for Product and Process Development
Room: 308 Instructors: Tariq S Durrani (University of Strathclyde), Sheila Forbes (University of Strathclyde) Abstract: The evolution of global markets has been characterised by increased competition and rapid change. Product life cycles are becoming ever shorter, continuous process improvement is increasingly seen as the norm, and companies are placing greater emphasis on time to market considerations. In addition, globalisation of markets has lowered barriers to the transfer of technology across geographical boundaries. Technological innovation and incorporation of new technologies into products have become key competitive factors. In response, organisations have sought to improve and refine various aspects of their technology management. Thus identification, evaluation and acquisition of technologies from a variety of sources now play an important role in the effective management of technological resources. In this context, the capacity and capability for skilful acquisition, development and management of technology represents a key competitive edge to engineering organisations.
This tutorial will inform participants of the processes for successful technology acquisition. Participants will learn of optimal techniques for taking strategic decisions on the development or acquisition of technologies, through a formalised multi-stage approach. The options for acquiring technologies, for embedding in products and processes, range from (i) direct investment in technology or process development and the associated ramification on the core competencies of an organisation; (ii) technology development through external partnering or alliances and the associated issues of dependencies and reliance on partners; (iii) outright procurement and related tensions with suppliers, and other approaches. An assessment of these options will form part of the learning outcomes from the Tutorials.
Several exemplars from a variety of industrial sectors will be presented and discussed.
May 23 (Friday) 8:30am-12:30pm (break 10:15am-10:45am)
TU15: IP-Oriented QoS in the Next Generation Networks: application to wireless networks
Room: 310 Instructor: Pascal Lorenz (University of Haute-Alsace) Abstract: Emerging Internet Quality of Service (QoS) mechanisms are expected to enable wide spread use of real time services such as VoIP and videoconferencing. The "best effort" Internet delivery cannot be used for the new multimedia applications. New technologies and new standards are necessary to offer Quality of Service (QoS) for these multimedia applications. Therefore new communication architectures integrate mechanisms allowing guaranteed QoS services as well as high rate communications.
The service level agreement with a mobile Internet user is hard to satisfy, since there may not be enough resources available in some parts of the network the mobile user is moving into. The emerging Internet QoS architectures, differentiated services and integrated services, do not consider user mobility. QoS mechanisms enforce a differentiated sharing of bandwidth among services and users. Thus, there must be mechanisms available to identify traffic flows with different QoS parameters, and to make it possible to charge the users based on requested quality. The integration of fixed and mobile wireless access into IP networks presents a cost effective and efficient way to provide seamless end-to-end connectivity and ubiquitous access in a market where the demand for mobile Internet services has grown rapidly and predicted to generate billions of dollars in revenue.
This tutorial covers to the issues of QoS provisioning in heterogeneous networks and Internet access over future wireless networks as well as ATM, MPLS, DiffServ, IntServ frameworks. It discusses the characteristics of the Internet, mobility and QoS provisioning in wireless and mobile IP networks. This tutorial also covers routing, security, baseline architecture of the inter-networking protocols and end to end traffic management issues.
TU16: Dynamic Spectrum Management in Cognitive Radio Networks
Room: 311-A Instructor: Ekram Hossain (University of Manitoba) Abstract: Cognitive radio networks based on dynamic spectrum access will be a significant component in next generation wireless systems. It is currently of big interest to researchers and practitioners involved in the design, analysis, and optimization of next generation wireless access systems and networks. Dynamic spectrum allocation and sharing among primary and secondary users and issues related to spectrum pricing, collectively referred to as Spectrum Management, is one of the most significant components in the design of cognitive radio systems. The objective of this tutorial is to introduce the major research challenges and discuss the possible solution approaches to the dynamic spectrum management problem in cognitive radio networks. Basic functionalities in a cognitive radio transceiver for dynamic spectrum access will be first reviewed. A survey on the medium access control protocols for cognitive radio networks will be presented. A friendly introduction to the basic game theory concepts and the important game models from microeconomic theory as well as the theory of auctions, which can be used to solve the dynamic spectrum management problem, will be provided. Applications of these models in IEEE 802.11, IEEE 802.16, and IEEE 802.22-based cognitive radio networks will be discussed.
TU17: WiMax Multimedia QoS and Radio Resource Management
Room: 311-B Instructors: Hossam Hassanein (Queen's University), Najah Abu Ali (United Arab Emirates University)
Abstract: The explosive growth of the Internet over the last decade has lead to an increasing demand for high-speed, ubiquitous Internet access. IEEE 802.16/WiMax is today’s most promising new technology for broadband wireless access to IP services. Over both licensed and unlicensed spectrum, WiMax can serve a wide range of applications including data, voice, gaming, and multimedia in different environments (fixed and mobile, and single and multihop). However, WiMax is challenged by meeting strict QoS requirements of these applications over a finite radio spectrum. This implies more complex network planning and resource management and requires sound new approaches to ensuring connectivity and QoS.
The objective of this tutorial is to provide a balanced blend of WiMax’s theoretical and practical aspects, along with current industrial capabilities, with the aim to shed light and press forward the work on QoS provisioning and Radio Resource Management (RRM) in WiMax networks. In this scope, network administrators and operators who are planning or operating a WiMax deployment are offered with engineering design and deployment issues to balance the requirement for service quality against operational cost, while, academics are presented with a comprehensive knowledge of the state-of-the-art RRM and QoS provisioning schemes, which are far from making optimum use of WiMax wireless resources.
We first offer an overview of the IEEE 802.16 standard in its main forms (Point-to-Multipoint, Mesh and Relay). We also describe the general requirements for RRM frameworks. We then turn our attention to RRM and QoS mechanisms and issues in PMP WiMax networks, including bandwidth allocation, traffic control and scheduling. Next, we discuss the RRM issues in WiMax mesh networks, including scheduling, channel assignment and routing. Finally, we conclude with identifying current challenges and outstanding issues.
TU18: The Next Generation CDMA Technologies
Room: 311-C Instructor: Hsiao-Hwa Chen (National Cheng Kung University) Abstract: Future wireless communication systems should be operating mainly, if not completely, on high-speed burst data applications. The need to support high-speed burst traffic has already posed a great challenge to all currently available air-link technologies based on either TDMA or CDMA. The traditional CDMA technology has been applied to both 2G and 3G mobile cellular standards. However, the recent researches have suggested that it is unsuitable for high-speed burst-type wireless applications, and there are many problems with the traditional CDMA technology, such as its low spreading efficiency, interference-limited capacity and its need for precision power control, etc.
This tutorial covers various important issues on the development of next generation CDMA technologies. It includes the topics from next generation CDMA system modeling to code design methodologies, starting with the basics and progressing to more advanced topics. It contains many original research results on innovative CDMA technologies, such as complementary coded CDMA, multi-dimensional space-time-frequency coding, OFDM-CDMA architecture, etc., which will be introduced in a step-by-step approach.
As an all-in-one tutorial on next generation CDMA technologies, it is a must for telecommunication engineers, advanced R&D personnel, undergraduate and postgraduate students, who will attend ICC 2008.
TU19: Peer-to-Peer Networking: State of the art and research challenges
Room: 303 Instructor: Raouf Boutaba (University of Waterloo) Abstract: The past few years have witnessed the emergence of Peer-to-Peer (P2P) systems as a means to further facilitate the formation of communities of interest over the Internet in all areas of human life including technical/research, cultural, political, social, entertainment, etc. P2P technologies involve data storage, discovery and retrieval, overlay networks and application-level routing, security and reputation, measurements and management.
This tutorial will give an appreciation of the issues and state of the art in Peer-to-Peer Networking. It will introduce the underlying concepts, present existing architectures, highlight the design requirements, discuss the research issues, compare existing approaches, and illustrate the concepts through case studies. The ultimate objective is to provide the tutorial attendees with an in-depth understanding of the issues inherent to the design, deployment and operation of large-scale P2P systems.
May 23 (Friday) 2:00pm-6:00pm (break 3:45pm-4:15pm)
TU20: Automotive Networking and Telematics Applications
Room: 310 Instructors: Tao Zhang (Telcordia Technologis); Wanjiun Liao, Phone Lin (National Taiwan University) Abstract: In the future, each automobile may serve as a mobile node in the global communications infrastructure, and many potential applications can be supported, including road safety, advanced traffic management, passenger infotainment, and resource management in transportation and telecommunications infrastructure. Significant industrial and governmental efforts have been undertaken to enhance “passive safety” to “active safety” by employing networking functions in vehicles and infrastructures. This tutorial course will describe how such a vast service and network system can be scaled, supported, and made secure, reliable and economical.
The unique features of automotive networking and telematics applications generate many interesting research interests and activities, and are expected to foster new transportation products and services. The wireless networking among vehicles and between vehicles and the infrastructure has different characteristics from other conventional wireless networking problems. For example, due to rapidly changing topology as vehicles move around, there are resemblances to mobile ad hoc networking scenarios. However, the constraints and optimizations are very different. One such example is that power efficiency is no longer an issue for vehicle communications as it is for traditional ad hoc networking. Vehicles in general are also constrained to move within roads (and within lanes most of the time) and with higher mobility. Automotive applications also demand stringent communications performance requirements that are not seen in conventional multi-hop wireless networks.
This tutorial course is designed to address important research challenges undertaken for automotive networking and telematics applications. The focus is on network protocols, emerging communications standards, and performance modeling for active safety, telematics, and infotainment applications enabled by a vehicular-to-infrastructure and vehicle-to-vehicle wireless communications technology. Topics of interest include:
- Vehicular networking: an overview
- Vehicular network architecture and protocols
- Vehicular ad hoc network MAC, routing, and data dissemination
- Security for automotive networking
- Enabling technogies for active safety applications
- Resource management and performance modeling in vehicular networks
TU21: VoIP Security and Anti-Hacking
Abstract:
Room: 311-A Instructor: Yuefei Xu (TELUS) Abstract: VoIP (Voice over IP) is becoming one of the most widely deployed applications across Telecom industry and Enterprises. VoIP not only inherits advantages of IP technology, but also brings in new and specific security challenges. Typical security threats like Call Eavesdropping, Service Fraud, Identity Theft, DoS and Spam are significant worries to developers, subscribers, service providers and enterprises.
This tutorial will help audience to learn systematic knowledge to compete the challenges of VoIP Security by know-why and know-how. Participants will learn typical VoIP threats, attacking methods and prevention options. Advanced VoIP hacking techniques and detection tools will be demoed with analysis how to mitigate the threats. A holistic Security Framework will be introduced with TRA (Threat and Risk Assessment) analysis applied to both of consumer and enterprise environments.
TU22: Security Issues in Sensor Networks
Room: 311-B Instructor: Yang Xiao (The University of Alabama) Abstract: Sensor networks have many applications, and security issues in some sensor applications are very important such as monitoring applications in the battle fields. Sensor networks differ from other traditional networks with many aspects such as limited energy, limited memory space, limited computation capability, etc. Therefore, sensor network security has some unique features which do not exist in other networks.
In this tutorial, we will provide an overview of the security issues and solutions of sensor networks including attacks, encryption, authentication, key managements, secure routing, secure aggregation, secure location, intrusion detection, privacy issues, security services, RFID security, Zigbee Security, lightweight ciphers, security in sensor and actuator networks, security in underwater sensor networks, etc.
TU24: Peer-To-Peer Multimedia Applications
Room: 303 Instructor: Jin Li (Microsoft) Abstract: In both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent, Skype and PPLive, have witnessed tremendous success among end users. And the P2P streaming applications, such as PPLive, UUSee, are on the rise. Recent statistics suggests that P2P traffic accounts for as much as 70% of Internet traffic. Unlike a client-server based system, peers bring with them serving capacity. Therefore, as the demand of a P2P system grows, the capacity of the network grows, too. This enables a P2P file sharing/streaming application to be cheap to build and superb in scalability. The purpose of the tutorial is to examine issues associated with the successful building and deployment of an efficient and reliable P2P file sharing and/or P2P streaming application. We start by examining some popular P2P applications, such as BitTorrent, Skype and PPLive. The study of these P2P applications helps us to understand the design principles of P2P applications in general. We then investigate a number of tools for building successful P2P applications, such as the overlay network, the scheduling algorithm, the erasure resilient coding, and NAT/firewall traversal. Finally, we move on to critical deployment decisions that make or break the P2P applications, such as P2P economy, security issues in P2P application, peer selection, monitoring and debugging utilities in P2P application.
TU25: Location Based Services for Mobile
Room: 305-C Instructors: Shu Wang, Jungwon Ming, Byung K. Yi, Soonyi Kwon (LG Electronics) Abstract: Location based services (LBS) for mobile are the services supported by cellular networks for providing mobile users with various location sensitive applications such as E911, Friendfinder, personalized advertisement, etc. LBS accelerate the convergence of 3C (computer, communication and consumer electronics). One aspect of LBS market is the rapid growth of GPS market, which is predicted to reach $28.9 billion by 2010 by GPS World. It is believed that LBS is bringing huge revenue opportunities for wireless network operators and service providers. The driving force behind of the growth of LBS market includes regulator’s mandates, the development of more efficient location technologies and the expanding of LBS from network operator to third service provider.
In this tutorial, the state of art of mobile location based services (LBS) will be explored in terms of technologies, standards and implementations. There are five major parts in this proposed tutorial. Within the first part, an introduction to LBS is presented along with an overview of the growing LBS market. Two examples of LBS, E911 and telematics, are emphasized. In the second part, LBS from a network operator perspective is discussed with a survey of wireless location technologies, the exploration of location management in cellular network, and LBS standards activities. The architecture and operation of the network-dependent LBS control plane of cdma2000 and UMTS networks are reviewed, respectively. In the third part, the IP-based LBS user plane is discussed from a service provide perspective. An overview of the related standards by OMA and 3GPP2 is given and the principles of LBS user plane are illustrated from multiple application scenarios. In the fourth part, several implementation issues of LBS are discussed as well as development examples. In the fifth part, the security and privacy issues of mobile LBS are discussed from an end user perspective along with related practices and regulations. Finally, the further works and standard activities for LBS are presented.
In summary, this tutorial is intended to provide a comprehensive overview of mobile LBS for a wide array of audiences, including LBS services providers, application developers, marketing managers and system researchers, etc. It includes not only the background information and standards activities but also some hand-on development examples.