Monday, 30 November 2009 ● 9:00 - 12:30
T1: Near-Capacity Wireless Multimedia Communications in the Iterative Detection Era
T2: Tracking Cyber Attacker
T3: Cooperative Wireless Networks
T4: Application Enablers for Challenged Networks
T5: PONs for Next Generation Broadband Access
T6: A Systematic Framework for Cross-layer Optimization
Monday, 30 November 2009ى● 14:00 - 17:30
T7: Security of Information and Communication Networks
T8: Architectures for the Future Networks and the NGI
T9: Multiple Antenna Systems from Optimum Combining to MIMO: Random Matrix Theory Analysis
T10: Broadband Video Networking
T11: Practical Steps in Techno-Economic Evaluation of Network Deployment Planning
T12: Cognitive Radio Networks
Friday, 4 December 2009 ● 9:00 - 12:30
T13: Performance Issues in Wireless Mesh Networksى(CANCELLED)ى
T14: Game Theory for Cognitive Radio Networks
T15: 3GPP Evolution to 4G Wireless: E-UTRAN and EPC
T16: Radio over Fiber: An Optical Technique for Wireless Access
T17: Coding for Cooperative Codfsdmmunications
T18: Principles of Network Security Protocolsى

Friday, 4 December 2009ىى● 14:00 - 17:30
T19: Indoor Geolocation Systems--Theory and Applications
T20: Enabling Technologies and Standardization Activities of IMT-Advanced
T21: Generalized DFT for OFDM Communicationsى
T22: Femtocells: Opportunities and Challenges
T23: MIMO Detection: Theory and Practice
T24: Nano-Sensor Networks using Molecular Communications
T25: Getting Your Point Across - Essential Communications for Engineers

Monday, 30 November 2009ى●ىى9:00 - 12:30

T1:ى ىNear-Capacity Wireless Multimedia Communications in the Iterative Detection Eraى
Instructor:ى Lajos Hanzo (University of Southampton, UK)ى

Location:ىى Sea Pearl Suite 1-3

Wireless multimedia communication devices are becoming ever more powerful and sophisticated, as seen on television. Nonetheless, the provision of realistic ``tele-presence'' services requires a further quantum leap from the current state-of-the-art represented by the popular mobile telephone. Based on the presenters monographs and papers ( the recent advances in this challenging field are reviewed, commencing with a portrayal of the related multimedia source codecs, advanced channel codecs and burst-by-burst adaptive modems, such as those used by the High-Speed Downlink Packet Access (HSDPA) mode of the third-generation (3G) wireless systems, including space time codecs and other MIMO systems.ى Commencing with a review of the Shannonian information-theoretic design principles, powerful system design examples will be presented, which are capable of approaching the channel capacity. The limitations of the Shannonian lessons in the context of realistic fading, rather than Gaussian channels will be detailed. To elaborate a little further, most multimedia source signals are capable of tolerating lossy, rather than lossless delivery to the human eye, ear and other human sensors. The corresponding lossy and preferably low-delay multimedia source codecs however exhibit unequal error sensitivity, which is not the case for Shannon's ideal entropy codec.

Numerous jointly optimised turbo transceiver designs capable of providing unequal error protection wireless video telephony and audio transmission will be highlighted, which exhibit a performance close to the channel capacity. Sophisticated multi-stage iterative detectors will be studied, which exchange extrinsic information across several detection stages, including the transceiver's demodulator, channel decoder and source decoder. These multistage turbo systems require the employment of the powerful iterative receiver design tools referred to as Extrinsic Information
Transfer (EXIT) Charts.

T2:ى ىTracking Cyber Attackerى
Instructor:ى Manu Malek (Stevens Institute of Technology, US)
Location:ىى Sea Pearl Suite 4-6

Organizations increasingly rely on the Internet for their operations. Although the use of this technology provides many advantages, the Internet poses a unique set of vulnerabilities. Worms and viruses, Denial-of-Service, ID theft, and espionage are examples of threats and attacks encountered daily by various institutions.

Against this backdrop, it is clear that security is one of the most important IT concerns today. Organizations need methods and tools to identify the attackers and document their activities with sufficient reliability to justify appropriate
technical, business, and legal responses.ىى

The objective of this tutorial is to provide an overview of security forensics and address some of the technological and legal issues involved. The discipline involves identification, preservation, and analysis of evidence of security attacks. Forensic activity takes place in a complex technical, legal, and social context which must be understood to fully appreciate its power and value. A few simple forensic tools and an example of tracking the attacker will be demonstrated.

The tutorial provides a basic understanding of security forensic tools and techniques.ى Potential audience would be anyone with at least a BS degree and basic understanding of the Internet.

T3:ىىىCooperative Wireless Networks > PDF
Instructors:ى Frank Fitzek (Aalborg University, DK)

ىىىىىىىىىىىىىىىىى Marcos Katz (VTT Technical Research Centre of Finland, FI)
Location:ىىىى Kahili Suite

Cooperation is known as an effective strategy in nature to achieve individual or common goals by forming cooperative groups. As the crossover between nature and engineering has always been fruitful, this tutorial is introducing cooperative concepts for wireless networks advocating mobile devices to cluster in a peer]to]peer fashion. In three lectures cooperation is advocated to overcome the most critical problems in mobile communication, known as energy consumption, security, and higher data rates. The first part will introduce the main rules for cooperation. Whether to cooperate or act autonomously has to be decided by each mobile device individually. Following the rule "The real egoistic behavior is to cooperate", mutual aid among mobile devices will be applied if and only if it is beneficial for all group members. The second part is presenting cooperation concepts at the different protocol layers from applications to the physical layer. In the last part topics such as social mobile networks, game theory and genetic programming are presented.

The scope of the tutorial is to give a wide overview of non]altruistic cooperation (which makes it fundamentally different to all tutorials given with the same label of cooperation).ى The tutorial will highlight the potential and applicability of non-altruistic cooperation in future networks. In order to spice up the tutorial, simple demonstrators will be presented and hands-on parts for the attendees will be available

T4:ىىىApplication Enablers for Challenged Networksى> PDFىى
Instructor:ى Roch Glitho (Concordia University, CA)ى
Location:ىىىHibiscus Suite

More and more networks that do not meet the Internet design assumptions are being deployed (e.g. deep space networks, mobile ad hoc networks and wireless sensor networks). These networks are known as challenged (or unusual, or non conventional) networks. This tutorial reviews applications enablers for challenged networks and discusses related research directions. A three dimensional taxonomy (challenged network type, involved layers, and application) is used as framework for the discussions. The tutorial starts by introducing the most widely deployed challenged networks.ى After that, we introduce the two challenged networks-agnostic application enablers (i.e. enablers that target all challenged networks), meaning the delay/disruption tolerant network (DTN) overlay of the IETF and the ambient control space (ACS) overlay from an EU 6FP project. The last part of the tutorial focuses on the challenged networks specific enablers (i.e. enablers that target a specific challenged network). In this category, the middleware approaches for wireless sensor networks are categorized and reviewed. The conferencing enablers for mobile ad hoc networks (e.g. signalling, media handling) are also discussed. Case studies such as engineering applications like E-mail, web access with DTN or opportunistic mobile ad hoc routing, in environments where conventional networks are not feasible (e.g. villages in India, nomadic Saami in Laplan), are used throughout the tutorial for illustration purpose.

This tutorial provides an overview of applications enablers for networks such as deep space networks, mobile ad hoc networks and wireless sensor networks that do not meet the assumptions underlying the Internet TCP/IP architecture (e.g. low error rate, continuous end to end path). It also discusses related research directions.

T5:ىىىPONs for Next Generation Broadband Access > PDFى
Instructor:ى Nirwan Ansari (NJIT, US)ى
Location:ى ىSouth Pacific Ballroom 1

With the recent development and advances in optical fiber technologies, a dramatic increase in bandwidth has been facilitated in the backbone network through the penetration of wavelength-division multiplexing (WDM) technology, which provides tens of Gbps per wavelength. At the same time, local area networks (LANs) have been scaled up from 10Mbps to 100 Mbps and are being upgraded to Gigabit Ethernet speeds.ى However, the access network in between only runs at low Mbps or even Kbps bandwidth speeds. As an inexpensive and scalable solution to the bottleneck problem of broadband access, passive optical networks PONs address the last mile of the communications infrastructure between the service provider's central office (CO) and customer sites. After briefly reviewing the wired access technologies, including DSL and cable modem, this tutorial provides a comprehensive overview of PONs, including the network architecture and enabling technologies, as well as diverse versions of PONS and their corresponding protocols. A close examination of the resource management issue along with the state-of-art schemes over time division multiplexed PONs (TDM-PONs) will be presented. Moreover, a unified state space representation will be introduced to describe the management on TDM-PON upstream resource. This tutorial will also cover the recently proposed candidate architectures for Next Generation Access 1 (NGA1) which has been proposed by FSAN as the first stage of next generation passive optical networks (PONs), and briefly describe the envisioned Next Generation Access 2 (NGA2). Research directions are also highlighted for future exploration.

This tutorial provides an overview on various existing access networks, and an in-depth survey/exposition on the evolution of passive optical networks for broadband access, ranging from APON, BPON, EPON, GPON, GEPON, to WDM PONS, and to the candidate architectures of Next Generation Access 1 (NGA1) which will be standardized soon.ى

T6:ىىىA Systematic Framework for Cross-layer Optimization > PDFى
Instructors:ى Mihaela van der Schaar (University of California, Los Angeles (UCLA), US)
ىىىىىىىىىىىىىىىىى Fangwen Fu (University of California Los Angeles, US)ى
Location:ىىى South Pacific Ballroom 2

Cross-layer optimization problems in wireless networks tend to be very complex, since they require the simultaneous optimization of a large number of algorithms and parameters within various layers of the protocol stack. Moreover, they need to explicitly consider the time-varying channels, networks and applications characteristics. Most existing solutions for cross-layer optimization rely on heuristic procedures to solve this problem. However, to obtain an optimal utility for the wireless user, the cross-layer optimization should be formulated rigorously as a sequential decision problem that takes into account the capability of the various layers to autonomously forecast their own locally experienced dynamics, and perform foresighted adaptation, without violating the current layered architecture of the protocol stack.

In this tutorial, we present a systematic framework for cross-layer optimization that allows each layer to make autonomous and foresighted decisions on the selected transmission strategies (e.g. protocol parameters and algorithms), while cooperatively maximizing the utility of the wireless user (e.g. multimedia quality) by determining the optimal information to be exchanged among layers. Specifically, this tutorial will focus on:

ىىىىىىىى .ىa systematic cross-layer optimization framework
ىىىىىىىى .ىa formal message exchange mechanisms among layers
ىىىىىىىى .ىon-line learning algorithms for the cross-layer optimization.

Monday, 30 November 2009ى●ىى14:00 - 17:30

T7:ى ىSecurity of Information and Communication Networks
Instructor:ى Stamatios Kartalopoulos (University of Oklahoma, US)

Location:ىى Sea Pearl Suite 1-3

The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts.

This short course covers the topics:

ىىىىىىىى . Overview of encryption methods and data privacy.
ىىىىىىىى . Modern network security issues, network security levels, and security layers in communicationىnetworks
ىىىىىىىىىىى (Information, MAC, Link layers).
ىىىىىىىى . A mathematical foundation for security; Prime numbers, mod arithmetic, GCD, and Random numbers.
ىىىىىىىى . Symmetric & asymmetric ciphers (RSC, DES, AES, RC4, elliptic curve, RSA).
ىىىىىىىى . Key distribution algorithms (Merkle, Shamir, Diffie-Hellman, ECC, Digital Signature, Key Escrow)
ىىىىىىىى . Quantum Cryptography and QKD (Polarization, Entangled-States, Teleportation).
ىىىىىىىى . Vulnerabilities and countermeasures in QC
ىىىىىىىى . Biometrics in communication networks, and
ىىىىىىىى . Chaotic processes in Security
ىىىىىىىى . Security in the Next Generation Optical Networks

T8:ىىىArchitectures for the Future Networks and the NGI > PDFى
Instructor:ى Raj Jain (Washington University in St. Louis, US)ى
Location:ى ىSea Pearl Suite 4-6

This tutorial on latest advances in future networking architectures is designed for researchers, engineers and managers involved in future networking product strategies. Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We survey a number of such research projects and activities in this direction. The topics covered include:

ىىىىىىىىى .ى Clean-Slate Research Programs Overview
ىىىىىىىىى .ى Internet 3.0
ىىىىىىىىى .ى Virtualization
ىىىىىىىىى .ى ID-Locator Separation
ىىىىىىىىى .ى Content Centric Networking
ىىىىىىىىى .ى OpenFlow
ىىىىىىىىى .ى Delay-tolerant networks

The tutorial covers several future networking architecture research developments, and technologies. Engineers, managers, and academic personnel, who want to keep track of the latest developments in networking will find the information useful.

T9:ىىىMultiple Antenna Systems from Optimum Combining to MIMO: Random Matrix Theory Analysis > PDFى ى
Instructors:ى Marco Chiani (DEIS, University of Bologna, IT)
ىىىىىىىىىىىىىىىىى Moe Win (Massachusetts Institute of Technology, USA)
ىىىىىىىىىىىىىىىى ى
Location:ىىى Kahili Suite

Multiple antenna systems can exploit the spatial resource to mitigate multipath, to reduce multiuser interference, and to increase spectral efficiency. This tutorial provides the basic principles and applications of multiple antenna systems, including MIMO and distributed MIMO, and their analysis based on random matrix theory. The effect of space and time correlation on the capacity of MIMO channels will first be presented for a point-to-point link. In network scenarios, where many users employ MIMO, we discuss how the capacity decreases due to the presence of MIMO interferers. Applications include wireless cellular systems, high-speed wireless LAN, WiMAX, as well as energy-constrained multi-node wireless systems.


Engineers that want to understand, from a system perspective, the role of multiple antennas in wireless systems; researchers that want to understand the connection between the theory of random matrices and MIMO systems, as well as the most recent advances on this topic

T10:ىىىBroadband Video Networking > PDF
Instructor:ى Benny Bing (Georgia Institute of Technology, US)ى
Location:ىى Hibiscus Suite

Streaming live and on-demand video content is becoming prevalent. In addition to broadband service providers, Web content providers have increasingly large volumes of video on their sites, and are making them more discoverable, helping drive usage and ad revenue. This tutorial focuses on the optimization of video transmission over broadband access networks and the Internet. Following an introduction to new video transport architectures, it will highlight the key challenge facing many service providers today: effective bandwidth management for supporting
high-quality video delivery. To meet this objective, we will describe new technologies that mitigate the impact of packet losses and minimize bandwidth consumption across the network. To deal with losses, error resilience methods such as flexible macroblock ordering and error concealment are covered. We then describe several bandwidth conservation
methods, in addition to H.264/VC-1 video compression. It will be shown that these methods achieve substantial bandwidth savings, reduce the probability of high packet losses, and improve video quality even during periods of poor link conditions or peak bandwidth demands. Experimental prototypes to illustrate the effectiveness of some of these methods will be demonstrated.

This tutorial will describe emerging video technologies that can significantly improve the quality of video transmission. Participants will learn how these innovations can jumpstart emerging online video streaming services and allow these services to achieve video quality levels comparable to that delivered over managed networks and proprietary set-top

T11:ىىىPractical Steps in Techno-Economic Evaluation of Network Deployment Planning > PDF
Instructors:ى Koen Casier (University of Ghent, BE)ى
ىىىىىىىىىىىىىىىىى Jan Van Ooteghem (Ghent University - IBBT, BE)ى
ىىىىىىىىىىىىىىىىى Bart Lannoo (Ghent University - IBBT, BE)
ىىىىىىىىىىىىىىىىى Sofie Verbrugge (Ghent University - IBBT, BE)
Location:ىى ىSouth Pacific Ballroom 1


The telecom market has become very competitive. Technical superiority is definitely not a guarantee for market success. Rather than a pure technical view, a true techno-economic approach towards network deployment planning is appropriate. The broad field of network planning includes a lot of sub-problems: bandwidth and user requirements,
technology choice, topology design, network dimensioning, routing problems, protection and resilience issues, etc. When considering the whole picture, also social, economic, regulatory and political sub-problems are playing an important role in network planning:ى demographic factors, expected customer adoption, value networks, competition models, regulation, etc. All these issues have a direct impact on the viability of the business case and could make or break the project.

This tutorial aims at giving an overview of the techno-economic planning process for network deployment, migration and/or service offerings. We will study the entire flow, starting with a description of the existing situation, subdividing the specific problems, modelling network, processes, costs and revenues and ending with an evaluation of the
relevant output parameters such as profitability. All steps are discussed indicating existing models and how they can be applied.ى Participants will learn to look into the network deployment problem from a techno-economic viewpoint. They will get to know how to focus on the main driving aspects first, while minimizing the chance to get lost in details. As opposed to some practices where one or more parts of the picture are neglected, we will emphasize the importance of the whole picture, choosing the required level of detail for the different parts.ىى Furthermore a detailed analysis will show how to use real options and game theory in telecommunication cases.ى By walking through a reference case based on a Fiber-to-the-Home (FTTH) deployment, participants will get some hands-on experience on how techno-economic models can be applied in the different steps of the planning process and how extended evaluation methods could be used to furthermore detail and enhance the overall results.

This tutorial provides a methodology for a techno-economic analysis of telecom projects. It discusses in detail the entire flow, from input gathering over modelling and up to evaluation (including game theory and real options). Finally this methodology is applied to a realistic case of an FTTH deployment.

T12:ى ىCognitive Radio Networksى > PDF
Instructor:ى Kwang-Cheng Chen (National Taiwan University, TW)ى
Location:ى ىSouth Pacific Ballroom 2

Cognitive radio based on software defined radio has been considered as a key technology in future wireless communications, which fundamentally enhances the radio spectral efficiency. In this tutorial, we extend the scope of cognitive radio technology from link level into network level, with great intellectual challenges by transporting packets through multiple cooperative opportunistic links in coexisting multiple-radio systems/networks. The final goal is to support the overall networking efficiency at given radio spectrum bandwidth for better user end-to-end QoS. This tutorial gives a complete comprehensive introduction to audience, including state-of-the-art wireless communications and natures, spectrum sensing for cognitive radio "network", cooperative networking, cognitive/cooperative medium access control, network layer design issues of cognitive/cooperative radio networks, trust and security in heterogeneous cooperative wireless networks, theoretical limitations, and price & spectrum management strategy for operators and users

T14:ىىىGame Theory for Cognitive Radio Networks > PDF
Instructors:ى Ekram Hossain (University of Manitoba, CA)ى
ىىىىىىىىىىىىىىىىى Zhu Han (University of Houston, US)ىىىى
Location:ىى ىSea Pearl Suite 5-6

"Cognitive radio" based on dynamic spectrum access is an emerging technique to improve the utilization of radio frequency spectrum in wireless networks. Game theory provides a rich set of mathematical tools to model and analyze situations where the cognitive radio entities have to make decisions on dynamic spectrum access which have possibly conflicting consequences. In this tutorial, an intensive (but friendly) introduction to the various game theory models, their fundamental concepts and properties, and their applications in designing dynamic spectrum access protocols for cognitive radio networks (CRNs) will be provided. At the beginning, the fundamental concepts behind cognitive radio technology, basic functionalities in a cognitive radio transceiver for dynamic spectrum access, and different spectrum sharing models will be described. Game theory models for power control, bandwidth allocation/sharing and routing will be illustrated. The important game models from microeconomic theory and the theory of auctions, which can be used for spectrum management and pricing in CRNs, will be presented. Applications of these models in IEEE 802.11, IEEE 802.16, and IEEE 802.22-based CRNs will be discussed.

The scope of this tutorial includes the technical aspects (rather than the regulatory and policy aspects) related to application of the game theory for designing spectrum sharing and management techniques. Physical layer, medium access control (MAC)/radio link layer, as well as network layer and some application layer aspects will be covered. For example, power control issues at the physical layer, dynamic spectrum access/sharing and bandwidth allocation issues at the MAC layer, and routing issues at the network layer will be addressed.

T15:ى ى3GPP Evolution to 4G Wireless: E-UTRAN and EPC
Instructors:ى Vijay Varma (Telcordia Technologies, US)ىى

ىىىىىىىىىىىىىىىىىىGregory P. Pollini (Telcordia Technologies, US)ى

Location:ىىىى Kahili Suite

The trend towards All-IP networks and increased demand for data services prompted the 3GPP to assess the implications for UMTS and High Speed Packet Access (HSPA) technologies.ى Even though these technologies will be highly competitive in the near term, to ensure competitiveness over a longer time frame, the 3GPP realized the need
for a long-term evolution of the radio-access technology and an optimization of the packet core network.ى Standardization activities in these areas resulted in the definition of Evolved UTRAN (E-UTRAN) and Evolved Packet Core (EPC) specifications.ىى While Verizon has already announced their intention to be the first one to deploy the E-UTRAN and EPC technologies, other service providers are gearing up for massive deployments to follow.ى The tutorial starts with the drivers and objectives for 3GPP's long term evolutionى and optimization of packet core network.ى This will be followed by a discussion of the E-UTRAN architecture and design to meet the demands of low latency and high speed connections.ى We will introduce the OFDMA physical layer and the key protocol layers over the air interface, and then discuss the S1 and X2 Interfaces within the E-UTRAN, including the S1 and X2 Application Protocols, and a presentation of the
continued and changing role of the GTP.ى We will continue with the architectural details of EPC capable of supporting not only E-UTRAN and legacy 3GPP radio access technologies, but also other radio access such as eHRPD (EvDO), WLAN, and WiMAX.ى This will be followed by the EPC design that enables QoS support for real-time services and seamless mobility within and across multiple radio access networks.ى We will conclude the presentation with a status of standardization in 3GPP as well as deployment and market projections for these technologies.

This tutorial provides an intermediate level study of E-UTRAN and EPC.

T16:ىىىRadio over Fiber: An Optical Technique for Wireless Access > PDFى
Instructor:ى Xavier Fernando, Ph.D., P. Eng., SMIEEE
Location:ىىى Hibiscus Suite

Optical fiber based wireless (Fi-Wi) access using radio-over-fiber (ROF) concept combines the flexibility of wireless with the capacity of fiber. Fi-Wi systems are rapidly deployable (potentially using existing dark/dim fiber) and they enable micro and Pico cellular networks at low-cost. Especially, ROF is a blessing for 4G networks that promise up to 1 Gb/s over air because ROF networks enable significantly short air interface, which is a primary requirement for truly broadband access. In addition, ROF can easily support mm-waves up to 60 GHz or more; ROF can provide wireless services along railway tracks and highways; it also covers hidden areas like tunnels, mines and subway stations. New breakthroughs in microwave photonics have made high-performance Fi-Wi networks a reality. However, the optical-wireless hybrid nature of ROF creates difficulties. Some issues are better addressed in the electrical domain while other issues are better done in the optical domain. Good knowledge of both optical and radio communication technologies is needed for overall understanding. This tutorial will explain the issues in both optical and wireless domains.

This tutorial will cover basic ROF link elements such as the fiber, receiver and various optical modulators. It will also cover cumulating noise issues; ROF nonlinearity combined with multipath dispersion issue; adaptive/fixed DSP compensation techniques, multisystem ROF networks and state of the art schemes for optically generating and processing microwave signals.

T17:ىىىCoding for Cooperative Communications > PDF
Instructors:ى Ali Ghrayeb (Concordia University, CA)ى
ىىىىىىىىىىىىىىىىى Tolga Duman (Arizona State University, US)ى
Location:ىىى South Pacific Ballroom 1

Future wireless communication systems deployment, including fourth generation (4G) cellular systems, wireless sensor networks, fixed broadband communications (WiMax), to name a few, will be based on the emerging technology of cooperative communications. The notion here is that the nodes comprising the network (referred to as relay nodes) will cooperate among themselves in transmitting data from a source to a destination, resulting in a virtual multipleinput
multiple-output (MIMO) system. This technology has significant advantages over conventional ones, including configuration flexibility, better coverage, higher capacity, improved performance, to name a few. This tutorial gives a complete overview of the various emerging coding techniques for cooperative communication networks. These include distributed spacetime coding, distributed concatenated coding and iterative decoding, combined network coding and channel coding, among others. The tutorial focuses on the construction and performance analysis of such coding schemes over various wireless channels. In addition, it addresses information theoretical limits for various configurations of cooperative wireless networks.ى Participants will also see comparisons between these coding schemes in terms of performance and complexity. Furthermore, various relaying strategies will be addressed. Practical issues such as antenna and relay selection and the effects of sub-channel correlation and channel estimation error on the system performance will also be considered.

T18:ىىىىPrinciples of Network Security Protocols > PDF
Instructors:ى Radia Perlman (Sun Microsystems Laboratories, US)ى
ىىىىىىىىىىىىىىىىى Charlie Kaufman (Microsoft, US)

Location:ىىى South Pacific Ballroom 2

Anyone designing network protocols of any type, or managing a network, needs to understand security. But it tends to be an abstruse science, where the academics focus on the mathematics of the cryptography and formal proofs, and standards-focused people stress the syntax of their particular standard. This tutorial demystifies the field, and focuses on a conceptual understanding of the pieces that someone who isn't wanting to specialize in cryptography, and yet does want to understand the implications of security on network protocols, needs to know. This tutorial gives an intuitive understanding of the basic cryptographic tools, and focuses on what their functional differences are. For instance, what is the difference between authentication systems based on secret keys, public keys, or identity providers? If one is adding cryptographic protection to a protocol, how can you handle changing keys without breaking a connection? How can you ensure that old packets from previous conversations, or when a sequence number wraps around, do not get mistaken for current packets? How would onesend encrypted electronic mail through a distribution list? What are the special issues of encrypting data at rest?

Friday, 4 December 2009 .ىى14:00 - 17:30

T19:ى ىIndoor Geolocation Systems--Theory and Applications
Instructor:ى Ilir Progri (Giftet Inc., US)ى
Location:ى ىSea Pearl Suite 1-3

The goal of this tutorial is to introduce and discuss indoor geolocation systems-theory and applications research and development processes for over 20 years.ى The first part of the tutorial is dedicated to the theory of indoor geolocation systems which consists of five sections.ى We introduce geolocation systems andى classify the state of the art radio geolocation systems with illustrations which include GPS and GLONASS.ى We identify issues with the state of the art indoor geolocation systems Giftet Inc, Locatalite, GPS repeaters, WPI Multicarrier Precision Locator, the Novariant pseudolite as to obtaining an observable or several observables for indoor geolocation systems.ىWe discuss the indoor geolocation channel and propose a mathematical model for the unified geolocation channel.

T20: ى Enabling Technologies and Standardization Activities of IMT-Advanced
Instructors:ى Hossam Hassanein (Queen's University, CA)ى
ىىىىىىىىىىىىىىىىى Najah Abu Ali (UAE University, AE)ى
Location:ى ى Sea Pearl Suite 5-6

This tutorial describes the requirements for IMT-Advanced candidate radio systems. We show how the candidate technologies for Broadband Wireless Access (BWA) are able to meet the requirements set by IMT-Advanced, taking into account both current advances in addition to those expected in the near future. The tutorial will focus on efforts made by the IEEE (through its candidate IEEE 802.16m) and 3GPP2 (pushing LTE-Advanced). The participants will be familiarized with these technologies which are about to be offered into the market, and will come out with a solid understanding for the physical and MAC layers. Furthermore, the tutorial will provide participants with a timely perspective on hot research topics relating to IEEE 802.16m and LTE-Advanced.

This tutorial provides information on BWA enabling technologies foreseen for IMT-Advanced, and will raise the understanding of their key aspects and standardization activities underway that aim to provide support for the deployment of IMT-Advanced services. The tutorial will also address technology topics that appear relevant to IMT-Advanced such as spectrum deployment and networking; access networks architecture and interfaces specifications; media access methods and duplexing; uplink and downlink physical layer technologies; MAC layer concepts; network topologies: single hop, relay and mesh; mobility and power management; industrial and academic test-bed trials; and performance evaluation.

T21: ىىGeneralized DFT for OFDM Communications
Instructor:ى Ali Akansu (NJIT, US)ى
Location:ىى Kahili Suite

Constant modulus orthogonal transforms have been widely used in many communications applications due to their power efficiency over varying power transforms. Discrete Fourier transform (DFT) has been the center piece of discrete multi-tone (DMT) and orthogonal frequency division multiplexing (OFDM) based communications technologies since it inherently offers the best frequency selectivity.ى In this tutorial, we will review the theoretical framework of recently introduced Generalized DFT (GDFT) as an extension to DFT exploiting the entire phase space where DFT with linear phase is a special solution. GDFT function sets with non-linear phase will be shown to yield significant improvements in auto- and cross-correlation metrics for the given signal constellation method offering better performance than DFT in OFDM communications techniques currently being developed. It will be presented that GDFT framework allows us to design constant amplitude basis sets adaptively mimicking channel variations and mitigating BER and RF power
degradations due to ISI, ICI and PAPR. Several practical design methods offering computationally efficient implementations of GDFT as minor modifications to FFT will be highlighted. We predict performance and system security improvements offered by adaptive GDFT over fixed DFT will find its place in the more intelligent OFDM communications systems of the future.

T22:ىىى Femtocells: Opportunities and Challenges > PDF
Instructors:ى Mark Reed (National ICT Australia, ANU, AU)
ىىىىىىىىىىىىىىىىى Zhenning Shi (Shanghai Bell - Alcatel Lucent, CN)
Location:ىى ىHibiscus Suite

Femtocells are low-power wireless access points that operate in licensed spectrum to connect standard mobile devices to a mobile operator's network using residential DSL or cable broadband connections. Femtocells have the ability to enable a much lower cost wireless deployment architecture allowing also for massive increases in overall data throughput. With the WCDMA femtocell market is expected to grow to approximately 20 million additions in 2013 alone the key market drivers are: . Improve Indoor Coverage . Increase Capacity . Reduce CAPEX/OPEX . Reduce User Churn This course offers an introduction to femtocells, the network architecture, the market, and the technical challenges associated with deploying the technology. The presentation will describe details of the players and the opportunity as well as real-world insights into the challenges associated with network operations and management and the radio air interface interference problems. A discussion on alternative fixed mobile convergence solutions and the cost-benefit trade-off will be performed as well as details of enterprise femtocells and the advantages of such a deployment.

T23:ى ى MIMO DETECTION: Theory and Practice
Instructor:ى John R. Barry (Georgia Tech, USA)ى
Location:ى ىSea Pearl Suite 3-4

Multiple-input multiple-output (MIMO) techniques enable high spectral efficiency and robustness to fading.ى Key to their success is the ability of the receiver to recover the symbols that were transmitted simultaneously from the multiple antennas, a process known as MIMO detection.ى In practice the MIMO detector is often the bottleneck for performance, or the bottleneck for complexity.ى Or sometimes, the bottleneck for both!ى This tutorial will present the basic principles of MIMO detection.ى We describe the fundamental problem, present an overviewىof MIMO detectors that are used in practice, and identify emerging trends and research in the area. Our coverage ranges from simple linear MMSE detectors to the optimal maximum-likelihood sphere detector. In between, we will examine successive cancellation, multistage detectors, the MMSE sphere detector, the Fano algorithm, the M-algorithm, the K-best algorithm, and list-based algorithms like the Chase algorithm. The role of lattice reduction preprocessing and column ordering will be described.ى Lastly we will quantify the performance-complexity tradeoff for a variety of detection strategies.ى This tutorial will benefit practicing engineers and researchers, particularly those engaged in the design of high-speed wireless systems.

T24: Nano-Sensor Networks using Molecular Communications
Instructor:ى Ian F. Akyildiz (Georgia Tech, USA)ى
Location:ىى South Pacific Ballroom 2

Nano-Sensor Networks. i.e., the interconnection of nano-sensors are expected to expand the capabilities of single nano-sensors by allowing them to cooperate and share information. Traditional communication technologies are not suitable for nano-sensor networks mainly due to the size and power consumption of transceivers, receivers and other components. The use of molecules, instead of electromagnetic or acoustic waves, to encode and transmit the information represents a new communication paradigm that demands novel solutions such as molecular transceivers, channel models or protocols for nano-sensor networks.

In this tutorial, first the state-of-the-art in nano-sensors, including architectural aspects, expected features of future nano-sensors, and current developments are presented for a better understanding of nano-sensor network scenarios. Moreover, nano-sensor network features and components are explained and compared with traditional communication networks. Furthermore, nano-sensor networks for short-range communication based on calcium signaling and molecular motors as well as for long-range communication based on pheromones are presented. Finally, open research challenges, such as the development of network components, molecular communication theory, and the development of new architectures and protocols, are presented which need to be developed in order to pave the way for the development and deployment of nano-sensor networks within the next couple of decades.

This tutorial is oriented to researchers and practitioners who are willing to engage themselves in the emerging field of nano-communications.

T25: Getting Your Point Across - Essential Communications for Engineers
Instructor:ى Celia Desmond (World Class Telecommunications, Ontario, Canada)
Location: ى Coral Ballroom 3

The most requested skill today, aside from technical competence, is strong communications skills. Companies are desperate for strong skills in the area of their business, and also for strong management skills, particularly the ability to create and communicate clear messages. At the same time, many innovative professionals have ideas for new products, services, working methodologies or processes which could be extremely beneficial to companies in search of new directions to stay competitive. However, too often these ideas remain dormant, simply because of the inability of the originator to create the information package that would convince management of the benefits of the idea.

This seminar addresses many of the areas which enable technical professionals to communicate effectively, orally and in writing, in different situations. The talk directly addresses basic skills of communications, such as preparing presentations, writing reports, and preparing resumes. Equally as important though, the talk addresses the environment in which the communications occur. Successful communications consider the receiver of the communications, ensuring that the message is presented in a form which will be attractive to the receiver.

Allow competent engineers to better sell their new ideas to communicate concepts in a way that these will be better understood and generally be more aware of the impact of their communications.