Tutorials
Tutorial 1 : Mobile Ad hoc Networks: Routing, MAC
and Transport Issues
(Monday, July 16th, Full day)
Speaker:
Nitin Vaidya
Texas A&M University
College Station, TX 77843-3112
vaidya@cs.tamu.edu
Abstract:
A mobile ad hoc network is a collection of mobile wireless nodes that
can dynamically form a network without necessarily using any pre-existing
network infrastructure. In general, routes between nodes in an ad hoc
network may include multiple hops. Due to the potential ease of deployment,
many practical applications have been conceived for ad hoc networks,
including personal area networking, home networking, search-and-rescue
operations, and battlefield applications.
When designing mobile ad hoc networks, several interesting and difficult
problems arise due to shared nature of the wireless medium, limited
transmission range of wireless devices, node mobility, and battery limitations.
This tutorial will present an overview of issues related to medium access
control (MAC), routing, and transport in mobile ad hoc networks, including
interaction between the different layers of the protocol stack. Techniques
proposed to improve performance of MAC, routing and transport protocols
will be discussed. The tutorial will include a discussion of approaches
for reducing energy consumption by nodes in a mobile ad hoc network.
Some security-related issues will also be considered. In addition, the
tutorial will discuss implementation-related problems, and mechanisms
for integrating a mobile ad hoc network with existing wired networks.
Finally, the tutorial will also present an overview of some standards
activities related to ad hoc networking.
Outline:
1. Introduction to mobile ad hoc networks
2. Medium Access Control Protocols for ad hoc networks
3. Unicast Routing Protocols for mobile ad hoc networks
4. Performance of TCP and UDP in mobile ad hoc networks
5. Multicast and geocast protocols for mobile ad hoc networks
6. Techniques to reduce energy consumption
7. Security-related issues
8. Implementation-related problems
9. Related standards activities
10. Conclusions and open problems
Intended Audience:
This tutorial is designed to provide an overview of the issues related
to design and implementation of mobile ad hoc networks. The tutorial
should benefit researchers as well as practitioners from industry and
academia, who are interested in areas related to wireless communications,
and mobile networking.
Speaker's Biography:
Nitin Vaidya received Ph.D. from the University of Massachusetts
at Amherst. He is presently an Associate Professor of Computer Science
at the Texas A&M University. He has held visiting positions at Microsoft
Research, Sun Microsystems and the Indian Institute of Technology-Bombay.
His current research is in the areas of wireless networking and mobile
computing, and he presently leads several funded research projects in
these areas. His research has been funded by various agencies, including
the National Science Foundation, DARPA, Microsoft Research and Sun Microsystems.
Nitin Vaidya is a recipient of a CAREER award from the National Science
Foundation.
Nitin has served on the program committees of several conferences and
workshops, and presently serves as the General Chair for the 2001 ACM
Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). He is
presently a speaker for the Distinguished Visitor Program of the IEEE
Computer Society. He is a senior member of IEEE Computer Society and
a member of the ACM. For more information, please visit http://www.cs.tamu.edu/faculty/vaidya
Tutorial 2: Supporting Multimedia
Services in UMTS Networks
(Monday July 16th, Full day)
Speakers:
M. Chuah
Technical Manager, Bell Laboratories
LUCENT TECHNOLOGIES
Holmdel, NJ, USA
chuah@bell-labs.com
O.Yue
Director, Bell Laboratories
LUCENT TECHNOLOGIES
Holmdel, NJ, USA
oyue@bell-labs.com
Abstract:
Universal Mobile Telecommunications System (UMTS) networks are scheduled
for widespread deployment in the next several years, starting in Japan,
followed by Europe and then in the rest of the world. One of the key
differentiators between UMTS and 2nd generation wireless systems, such
as GSM and GPRS, is its ability to offer new multimedia services efficiently.
These new services and applications are very important to wireless operators
since they represent potentially large revenue opportunities. In this
tutorial, we present the design challenges in supporting multimedia
services in UMTS networks.
Outline:
1.Current UMTS Architecture
-Description of UMTS Access Network Elements and their functionalities
- Node B, RNC
-Description of UMTS Core Network Elements and their functionalities
- SGSN, GGSN
-Description of the relevant protocol stacks
2. Multimedia Services that are of interest to service providers
-Traffic characterization, QoS requirements and Signalling Requirements
of these services
3.Design Issues related to support such services
-Smooth Handoff Issues: Service Handoff, 2G/3G Intersystem handoff
-Efficient Bandwidth Usage: airlink scheduling/multiplexing
-Meeting QoS Requirement: radio resource management, admission control
(airlink capacity evaluation), core network QoS design
-Accounting Issues: cellular service charge/network charge
-Authentication Issues: cellular system/network layer
-Addressing Issues: one number for all services
-Policy Enforcement Issues: gold/silver services
4. Future UMTS Architecture
- an All IP network
-What are the challenges?
-Can we have one common core network for both UTRAN and ERAN?
-Can we support softhandoff in IP network?
-Do we really need SRNC Relocation?
-Interworking with Wired Network to support value added services
-Roaming issues
-IETF/ITU signalling protocols
Intended Audience:
The tutorial is targeted at both practicing engineers and researchers
who want to learn about how multimedia services can be supported in
UMTS networks. To the practicing engineers the tutorial will provide
a comprehensive treatment of how UMTS networks are designed. To the
researchers the tutorial will provide an opportunity to learn about
how UMTS networks work and the hot topics that arise due to the strong
interplay of physical, protocol layers between UTRAN, UMTS Core Network
and wired line networks.
Speakers' Biographies:
Mooi Choo Chuah is a technical manager in the Advanced Technologies
division of Bell Laboratories in LUCENT TECHNOLOGIES. Dr. Chuah has
over 25 publications covering topics in media access control, power
control algorithms, mobility management and TCP performance. She was
awarded 2 patents and has filed more than 40 patents. She joined Bell
Labs in 1991 after receiving her Ph.D. in ECE from the University of
California at San Diego.
On-Ching Yue is a director in the Advanced Technologies
division of Bell Laboratories in LUCENT TECHNOLOGIES. His department
is involved in the research and development of protocols and algorithms,
system and network architectures, design and evaluation methodologies,
all for the engineering and management of the wireless system performance
and reliability. Dr. Yue has over 50 publications covering topics in
spread spectrum communication (CDMA), media access control and scheduling
algorithms, ATM and IP networks, and TCP performance. He joined Bell
Labs in 1977 after receiving his Ph.D. in ECE from the University of
California at San Diego. He is a member of the Executive Committee of
ACM SIGMOBILE.
Tutorial 3: Short-Range Ad Hoc Point-to-Point
Wireless Communication: Standards from the Infrared data Association
(IrDA)
(Monday, July 16th, Morning)
Speaker:
Dr. Charles D. Knutson
Assistant Professor
Brigham Young University
knutson@cs.byu.edu
Abstract:
IrDA infrared communication is an inexpensive and widely adopted short
range wireless technology that allows devices to share data easily.
Key protocol features make IrDA suitable for mobile, resource-constrained
devices. This tutorial explores software aspects of integrating IrDA
into systems, including system analysis and usage scenarios, hardware
and software requirements, applicability of IrDA standards to particular
applications, and the operation of the required and optional protocol
layers.
Outline:
1. The world of short-range wireless
- IR versus RF
- IrDA and Bluetooth: Complementary or competitive?
2. The IrDA vision
3. High-Level Overview
- Physical layer
- Media Interface Specs
- Framer/Driver
- IrLAP (Link Access Protocol - Physical access)
- IrLMP (Link Management Protocol - Service access)
- TinyTP (Tiny Transport Protocol - Flow control and SAR)
- IAS (Information Access Service - Service registration and query)
4. IrDA Communication Process Overview
- Unique characteristics of Infrared
- Primary/secondary roles
- Communication foundations for IR
- Device discovery
- Link property negotiation
- Link connection
- Service query and selection
- Service connection
- Service disconnection
- Link disconnection
5. Additional IrDA Protocol Layers
- IrOBEX (OBject EXchange)
- IrCOMM (Serial port emulation)
- IrLPT (Parallel port emulation)
- IrLAN (LAN Access point)
- IrTran-P (Picture transfer)
- IrMC (Mobile Communications)
- RTCON (Real-Time Voice and CONtrol)
- JetSend (content negotation)
6. Embedded issues
- IrDA Lite
7. Frame Analysis Workshop
- Frame wrapping (XBOFs, BOF, FCS, EOF)
- IrLAP frame formats (Address and control, U, I and S frame types)
- IrLMP frame formats (Header and control fields)
- TinyTP frame formats (Credit and parameters)
8. IrDA Interoperability
- Usage Models and Application Profiles
- Point and shoot, sync, folder browsing, etc.
Intended Audience:
This tutorial is intended for researchers and practitioners interested
in Wireless Personal Area Networks and short-range ad hoc connectivity.
For practitioners it will help them understand the issues relevant in
evaluating and integrating IrDA protocols in mobile devices. For researchers
it will enable them to understand the ways in which infrared data communications
play a role in Wireless Personal Area Networks and harmonize with RF
technologies (such as Bluetooth).
Speaker's Biography:
Dr. Charles D. Knutson is an Assistant Professor of Computer
Science at Brigham Young University in Provo, Utah. He is the former
Vice President of Research and Development at Counterpoint Systems Foundry,
Inc., the world's leading provider of short-range wireless data communications
software and tools for embedded systems. He served for two years as
the Chair of the Test and Interoperability Committee of the Infrared
Data Association (IrDA). His articles have appeared in Portable Design
Magazine, Communication Systems Design, Embedded Systems Programming,
Byte, PC Computing, InfoWorld, and other industry and academic publications.
Dr. Knutson holds a Ph.D. in Computer Science from Oregon State University.
Tutorial 4: Security and Billing
for Mobile Networks
(Monday, July 16th, Afternoon)
Speaker:
Prof. Jean-Pierre
Hubaux Swiss Federal Institute of Technology Lausanne
jean-pierre.hubaux@epfl.ch
Abstract:
Security is becoming a major concern for the networking community, and
mobile networks appear to be particularly vulnerable. End users want
to rely on confidentiality, integrity, authentication, non-repudiation
and other sophisticated functions. Moreover, operators of mobile networks
have to charge their customers in an appropriate way. Both security
and billing functions are usually based on cryptographic techniques.
This tutorial will provide the "big picture" about security and billing
in cellular and mobile ad hoc networks. Instead of a boring (and necessarily
incomplete) overview of the related standards, the tutorial will describe
the fundamentals and explain the underlying mechanisms. Some examples
will be provided to illustrate these concepts, notably in GSM, UMTS
and Mobile IP.
Outline:
1.Introduction
- Architecture of mobile networks; cellular and mobile ad hoc networks
- Vulnerabilities and threats
- Security-related functions: availability, integrity, confidentiality,
authentication, non-repudiation; the challenge of billing in a mobile
network
2. Principles of cryptography
- Principles of cryptosystems
- Symmetric and asymmetric cryptosystems
- One way cryptofunctions
- Digital signatures and certificates
- Example: RSA
- Key establishment (Diffie-Hellman and related schemes)
3. Principles of security and billing for cellular networks
- The role of the operators
- Building blocks of a security architecture for a cellular network
- The concept of customer care agency
- The security of roaming
- Security issues in Mobile IP
- Study case: security and billing in some specific and upcoming cellular
networks (e.g., GSM/UMTS)
4. Principles of security for mobile ad hoc networks
- Reminder on mobile ad hoc networks
- Vulnerabilities of the basic mechanisms and of the security mechanisms
of mobile ad hoc networks
- Protecting the basic mechanisms: protection of routing, intrusion
detection, service enforcement
- Protecting the security mechanisms: identification of the requirements
of the system; emulation of a certification authority; key agreement
and mutual certification
- Study case: security of Bluetooth
Intended Audience:
This tutorial is intended for researchers and practitioners of the mobile
networking and computing community who are interested in security and
billing issues. No prior knowledge of security or cryptography is expected
from the participants, but a familiarity with protocols and mobile networking
is recommended.
Speaker's Biography:
Jean-Pierre Hubaux joined the Swiss Federal Institute of Technology
- Lausanne (EPFL) as an associate professor in 1990; he was promoted
full professor in 1996. He is co-founder and co-director of the Institute
for computer Communications and Applications. His current research is
focused on mobile networking with a special interest in self-organized
mobile ad hoc networks and their related security problems. He has recently
defined and initialized a long-term and ambitious project on this issue,
which involves around 20 faculty members in Switzerland and abroad and
is supported by a dozen leading international companies (see http://www.terminodes.org).
At the beginning of his activity at EPFL, he defined the
first curriculum in communication systems. In October 1999, he was elected
to become the first chairman of the newly created communication systems
department. Before joining EPFL, he spent 10 years with Alcatel in France,
where he was involved in R&D activities, notably in the area of switching
system design and real-time software. He has published more than 40
journal and conference papers and holds several patents; see http://icawww.epfl.ch
for more details.
Tutorial 5: Mobile IPv6 for Cellular
Telephony
(Monday July 16th, Morning)
Speaker:
Charles Perkins
Nokia Fellow, Nokia Research Center
charliep@iprg.nokia.com
Abstract:
Within the next year, it is expected that the total number of wireless
communication devices will exceed 1 billion. All of these devices will
become attached to the Internet at a very rapid pace, as customers discover
the power of "always-on" network access. As 3G standards are finalized
and deployed worldwide, Internet standards are considered to as an essential
component of the total system architecture. In particular, IPv6 has
already been specified as the underlying network-layer protocol because
it alone offers the huge address space needed for billions of Internet-attache
wireless devices. In this tutorial, I will describe IPv6 and Mobile
IPv6 and their relationship to 3G telephone networks, and beyond. Special
focus will be given to th IETF standardization efforts, with examples
given to show how they apply to 3G core networks and radio access networks.
Outline:
This tutorial will cover the following topics:
1. Relevant aspects of IPv6
-Stateless Address Autoconfiguration
-IP Security Headers
-Option Header structures, ordering, and processing rules "
-Type 0 Routing Headers
2. Mobile IPv6 -Protocol Overview
-Binding Update Destination Option for home agents and correspondent
nodes.
-Home Address Destination Option for Ingress Filtering
-Interactions with IPSec -Care-of-address handling
-Additional destination options -Renumbering features
3. Fast Handovers
-Network controlled vs. Mobile Controlled
-Layer 2 triggers
-Proxy Router Advertisement
- Handover Initiate, Handover Acknowledge
-Interactions with Binding Updates
-Bicasting and Buffering
-Interactions with Context Transfer
4. AAA (Authentication, Authorization, and Accounting)
-The new security model
-Porotcol Overview -Key Distribution
-Base AAA protocol
-Brokers
-Mobile IPv6 extensions for AAA
Intended Audience:
This tutorial is intended for systems engineers and project engineers
who need to understand network-layer protocols for next-generation telephone
networks. The participant is expected to have a clear understanding
of IP, and the role of UDP and TCP in the Internet today. The tutorial
should also benefit academicians who are interested in understanding
current directions in Internet standards and 3G telephony.
Speaker's Biography:
Charles E. Perkins is a Nokia Fellow in the Communication Systems
Laboratory at Nokia Research Center, investigating mobile wireless networking
and dynamic configuration protocols. He is the editor for several ACM
and IEEE journals for areas related to wireless networking. He is serving
as document editor for the mobile-IP working group of the Internet Engineering
Task Force (IETF), and is author or co-author of standards-track documents
in the mobileip, manet, IPv6, and dhc (Dynamic Host Configuration) working
groups. Charles has served on the Internet Architecture Board (IAB)
of the IETF and on various committees for the National Research Council.
He is also associate editor for Mobile Communications and Computing
Review, the official publication of ACM SIGMOBILE, and is on the editorial
staff for IEEE Internet Computing magazine. Charles has authored and
edited books on Mobile IP and Ad Hoc Networking, and has published a
number of papers and award winning articles in the areas of mobile networking,
ad-hoc networking, route optimization for mobile networking, resource
discovery, and automatic configuration for mobile computers. See http://people.nokia.net/~charliep
for further details.
Tutorial 6: Mobile Commerce: Applications,
Technologies, Frameworks, and Emerging Issue
(Tuesday July 17th, Morning)
Speaker:
Professor Upkar Varshney
Department of CIS, Georgia State University
uvarshney@gsu.edu
Abstract:
In the last few years, e-commerce has attracted worldwide attention
that has led to significant progress in strategies, requirements, and
development of e-commerce applications. However, nearly all e-commerce
applications envisioned and developed so far assume fixed or stationary
users with wired infrastructure. This is likely to change as with the
emergence and wide spread adoption of wireless and mobile networks,
devices, and middleware, many new e-commerce applications will become
possible. These new applications, termed "wireless e-commerce" or "mobile
commerce", are beginning to receive tremendous interest in research
and development community. Various projections put worldwide number
of mobile devices to 1 billion in the next two years. According to estimates
by Gartner Group, by 2004, at least 40% of consumer-to-business e-commerce
will be initiated from smart phones supported by WAP (Wireless Application
Protocol). A study from the Wireless Data and Computing Service, a division
of Strategy Analytics, reports that the worldwide mobile commerce market
may rise to $200 Billion by 2004. The report predicts that transactions
via wireless devices will generate about $14 Billion a year. In many
European countries and Japan with significant wireless penetration,
the mobile commerce market is already taking off and reaching billions
of dollars a year. It is to be noted that mobile commerce may require
significantly different approaches in design, development, and implementation
of applications due to the inherent characteristics of wireless networks
and mobile devices. Many interesting and important challenges include
design and development of mobile commerce applications, networking requirements,
transactions and security issues, business models and strategies. This
next frontier of electronic commerce will also significantly benefit
from research in mobile devices, mobile middleware, and wireless network
infrastructure. The purpose of this tutorial is to address the important
research problems in mobile commerce.
Outline:
1.Mobile Commerce Applications
- Frameworks for mobile commerce
- Emerging applications (location and user sensitive mobile advertising,
mobile financial applications, mobile inventory, proactive service management,
wireless re-engineering, mobile auction, entertainment, mobile office
& distance education etc.)
- Design and development of mobile commerce applications
2. Mobile Commerce Technologies
- Networking infrastructure requirements for mobile commerce (quality
of service, location management, multicast, roaming across networks,
reliability)
- Devices, middleware, and operating systems support
- Security and transactions in mobile commerce
3. Business, Regulatory, and Implementation Issues
- Business models for mobile commerce
- Applications of mobility in supply chain management (M-SCM), customer
relationship management (M-CRM), Enterprise Applications Integration
(M-EAI), and Mobile devices in Enterprise Resource Planning (M-ERP)
- Role of carriers, developers, and regulators
- Diverse approaches to m-commerce due to technological, cultural, pricing,
and regulatory differences
Intended Audience:
The tutorial will be very useful to people working or planning to enter
in the areas of mobile commerce and wireless networks with interest
in technology or applications such as mobile commerce. Professors, graduate
students, and industry professionals may want to attend the tutorial.
Application developers and business strategist may also find this tutorial
useful.
Speaker Biography:
Prof. Upkar Varshney is on the faculty of Computer Information
Systems at Georgia State University, Atlanta. He received a Bachelor
of Engineering in Electrical Engineering with Honors from University
of Roorkee, MS in Computer Science and a Ph.D. in Telecommunications
& Networking, from the University of Missouri-Kansas City. His research
and teaching interests include mobile commerce, mobile and wireless
networking, wireless reliability, availability, and survivability. Professor
Varshney has written over 40 papers in these topics. Professor Varshney
is credited with some of the early research work on mobile commerce,
He has written several papers on mobile commerce for ACM Mobile Networks
and Applications (MONET), IEEE Computer, and prestigious journals in
Information Systems. He is the guest editor for ACM Mobile Networks
and Applications (MONET) special issue on Mobile Commerce. He is also
on the editorial board of IEEE Computer. He has been invited to deliver
several keynote speeches at major international conferences and corporations
dealing with mobile commerce in Canada, Germany, and Yugoslavia. He
delivered a keynote speech on M-commerce at NCR National Technology
Meeting. He has also been invited to conduct tutorials and workshops
at major international conferences, including HICSS 1998, 1999 and 2001
(m-commerce), IEEE WCNC 1999, and Mobicom 1999. He has received several
teaching awards/nominations including the prestigious Myrone T. Greene
Outstanding Teaching Award of Georgia State University in Oct. 2000.
He has organized and chaired sessions at major international conferences
including IEEE WCNC, HICSS and others. He is a member of ACM and IEEE.
Tutorial 7: Energy Efficiency in
Mobile Computing and Networking
(Tuesday July 17th, Morning)
Speaker:
Mani Srivastava
University of California, Los Angeles
mbs@ee.ucla.edu
Abstract:
Wireless systems, where the energy consumption for "communication" is
dictated by the link budget, require going beyond low-power implementation
techniques developed for "computing" systems. Higher layers of the system
also need to be power aware and energy efficient. A comprehensive discussion
of battery technology, sources of power consumption in computing and
communication, and generic low-power hardware and software implementation
techniques will be followed in the tutorial by a presentation of techniques
such as low-power network protocols that are specific to wireless and
mobile systems. Moreover, recently developed techniques that focus not
just on low power but on power awareness via network wide power management
with the goal of right power at the right place and the right time will
be presented. Commercial trends such as low-power "mobile" processors
and power-aware RTOS and APIs will also be described. With a balanced
presentation of basic concepts, new ideas, real-life applications, and
research trends, the tutorial should interest practicing engineers as
well as researchers.
Outline:
1. Introduction
- overview of the field, commercial and technology trends
- sources of power consumption
- battery technology
2. Generic low-power design techniques
- voltage scaling, dynamic voltage/frequency
- software: estimation, scheduling, data structures
3. Power consumption in radios
- sources of power consumption, link budget
- techniques for lower-power and power-aware radios
- modulation scaling
4. Low-power network protocols
- energy efficient link layer and wireless packet scheduling
- low-power MAC protocols
- power-aware routing
- power-aware transport protocols
5. Application and OS level techniques
- power awareness vs. low-power
- CPU and subsystem shutdown, predictive shutdown
- scheduling with dynamic voltage/frequency CPUs
- energy-agile algorithms
- explicit management of power by applications
- power-efficient encryption
6. Commercial and research trends, tools
- new "low-power" processor and radio technologies
- APIs for OS level power management
- ultra low-power wireless sensor networks
- ambient power havesting and scavenging
- relevant research programs (DARPA SensIT, PAC/C)
- power modeling tools
Intended Audience:
The tutorial is targeted at both practicing engineers and researchers
who want to learn about energy efficiency and design for low power across
the various layers (physical, protocol, application) of mobile and wireless
computing and networking systems. To the practicing engineers the tutorial
will provide a comprehensive treatment of recent developments in design
for low power at various layers in the system, and case studies of real-life
applications incorporating ideas described in the tutorial. To the researchers
the tutorial will provide an opportunity to learn about low power related
research issues in mobile computing, and particularly problems that
arise from the strong interplay of physical, protocol, middleware, and
application level considerations that is typical of wireless systems.
The tutorial is self contained with an extended bibliography to guide
the interested participants to later delve into more details, and would
be accessible to participants with typical EE and CS backgrounds.
Speaker's Biography:
Mani Srivastava is an Associate Professor at UCLA. He received MS and
Ph.D. degrees from Berkeley, and worked for several years in Networked
Computing Research at Bell Labs. His research at UCLA is on networked
and embedded systems, focusing particularly on power-aware computing
and communications, low-power design, sensor-instrumented physical spaces,
wireless sensor networking, wireless QoS, gigabit wireless routers,
and wireless node architectures. He leads DARPA and NSF funded projects
in these areas. He has several patents, and has published extensively.
His recent awards include ACM Design Automation Conference 2000 StudentDesign
Contest Honorable Mention Award, the Okawa Foundation Grant, and the
NSF CAREER Award.
Tutorial 8: Bluetooth: Technology,
Application, Performance
(Tuesday, July 17th, Morning)
Speakers:
Prof. Mario Gerla
University of California, Los Angeles
gerla@cs.ucla.edu
Per Joahnsson
Ericsson Research
per.johansson@ericsson.com
Abstract:
Today, most mobile professionals travel with cellphone and laptop, and
often need to interconnect them to browse the web or send e-mail. After
getting entangled with cables, they soon appreciate the convenience
of interconnecting all personal devices instantly and wirelessly in
a personal LAN (PAN). This is the first type of application – cable
replacement – that has driven the development of the Bluetooth wireless
LAN, an extremely versatile, low cost network interface soon to be installed
in all personal devices (from cellphone and cameras to earphones). From
the initial cable replacement concept based on the Piconet, the range
of Bluetooth applications has quickly expanded to more challenging scenarios
including: ad hoc networking among several personal Piconets; access
to the Internet (via a repeater on the wall), and; pervasive, “unconscious
computing”, ie, interaction between mobile user and the environment,
through devices such as parking meters and airport check in counters.
This broad set of applications in part overlaps with those of several
other wireless technologies (IEEE802.11, UMTS, HomeRF, DECT, IrDa, etc).
It is thus of interest to understand how Bluetooth will replace/complement
(or be integrated with) existing systems. To properly compare technologies,
it will be necessary to develop performance models. One of the goals
of this tutorial is to introduce Bluetooth performance models and simulation
tools, and their application to representative scenarios. The tutorial
will begin with a review of the Bluetooth technology with emphasis on
lower layers (physical, MAC and network), that have the most impact
on performance. It will identify representative scenarios for typical
Bluetooth application areas (from cable replacement to unconscious computing)
and derive the relevant performance measures. It will then introduce
newly developed performance evaluation methods and (simulation) tools
and apply them to simple case studies.
Outline:
Part 1:
-Bluetooth Technology:
-lower protocol layers: radio, physical, MAC, Piconets, low power operation,
-network layers: scatternets, discovery, ad hoc routing, handover
-Bluetooth middleware
-State of standards (Bluetooth SIG); current implementations; test kits.
Part 2:
-Applications: identification of representative scenarios (eg, shopping
center, exhibition hall, etc) and definition of relevant performance
measures
-Bluetooth performance evaluation tools: simulation models (NS-2 and
Parsec/Glomosim);
-Case studies: indoor access to the Internet; ad hoc networking/scatternets;
Intended Audience:
This tutorial will provide the background information and the performance
methods and tools that can assist researchers, device manufacturers,
wireless network operators, mobile applications developers and mobile
users to evaluate the Bluetooth technology and assess its use in their
applications.
Speakers' Biography:
Mario Gerla is a Professor in the Computer Science department
at UCLA. He received his graduate degree in engineering from the Politecnico
di Milano, in 1966, and his M.S. and Ph.D. degrees in engineering from
UCLA in 1970 and 1973, respectively. He joined the Faculty of the UCLA
Computer Science Department in 1977. His current research is in the
area of analysis, design and control of communications networks. Ongoing
projects include: the design and evaluation of QoS routing and multicast
algorithms for IP domains; the design and evaluation of all-optical
network topologies and access protocols; the design of wireless, mobile,
multimedia networks for mobile computing applications, and; the development
of measurement methods and tools for evaluating the performance of high
speed networks and applications.
Per Johansson is a senior researcher at Ericsson
SwitchLab-an applied research laboratory within Ericsson Research. He
holds Master of Science and Licentiate degrees in electrical engineering.
He joined Ericsson in 1992 to work with traffic management and performance
analysis of ATM networks, but later moved into research on wireless
systems. Since 1998, his research has focused on ad hoc networks and
in particular, on Bluetooth ad hoc networking.