Skip to main content
Rome  

ACM SIGMOBILE

The Seventh Annual
      International Conference on Mobile Computing and Networking

July 16-21, 2001, Rome, Italy

http://www.sigmobile.org/

Home
 
Organizing Committee
 
Program Committee
 
Call for Papers
 
Conference Program
 
Tutorials
 
Panels
 
Workshops
 
Venture Capital Session
 
Research Demos
 
Registration
 
General Information
 
Conference Expo
 
Social Events
 
Corporate Support

Tutorials 

July 16th (Monday) AM T1:Mobile  Ad Hoc Networks: Routing, MAC and  Transport Issues T2:Supporting Multimedia Services in UMTS Networks T3:Short-Range Ad Hoc Point-to-Point Wireless Communication T5:Mobile IPv6 for Cellular Telephony
PM T4:Security and Billing for Mobile Networks  
           
July 17th  (Tuesday) AM T6: Mobile Commerce: Applications, Technologies, Frameworks, and T7:Energy Efficiency in Mobile Computing and Networking T8:Bluetooth: Technology, Applications, Performance  

 

Tutorial 1 : Mobile Ad hoc Networks: Routing, MAC and Transport Issues  
       (Monday, July 16th,  Full day)

Speaker:

Nitin Vaidya
Texas A&M University
College Station, TX 77843-3112
vaidya@cs.tamu.edu

Abstract:
A mobile ad hoc network is a collection of mobile wireless nodes that can dynamically form a network without necessarily using any pre-existing network infrastructure. In general, routes between nodes in an ad hoc network may include multiple hops. Due to the potential ease of deployment, many practical applications have been conceived for ad hoc networks, including personal area networking, home networking, search-and-rescue operations, and battlefield applications.
When designing mobile ad hoc networks, several interesting and difficult problems arise due to shared nature of the wireless medium, limited transmission range of wireless devices, node mobility, and battery limitations. This tutorial will present an overview of issues related to medium access control (MAC), routing, and transport in mobile ad hoc networks, including interaction between the different layers of the protocol stack. Techniques proposed to improve performance of MAC, routing and transport protocols will be discussed. The tutorial will include a discussion of approaches for reducing energy consumption by nodes in a mobile ad hoc network. Some security-related issues will also be considered. In addition, the tutorial will discuss implementation-related problems, and mechanisms for integrating a mobile ad hoc network with existing wired networks. Finally, the tutorial will also present an overview of some standards activities related to ad hoc networking.

Outline:
1. Introduction to mobile ad hoc networks
2. Medium Access Control Protocols for ad hoc networks
3. Unicast Routing Protocols for mobile ad hoc networks
4. Performance of TCP and UDP in mobile ad hoc networks
5. Multicast and geocast protocols for mobile ad hoc networks
6. Techniques to reduce energy consumption
7. Security-related issues
8. Implementation-related problems
9. Related standards activities
10. Conclusions and open problems

Intended Audience:
This tutorial is designed to provide an overview of the issues related to design and implementation of mobile ad hoc networks. The tutorial should benefit researchers as well as practitioners from industry and academia, who are interested in areas related to wireless communications, and mobile networking.

Speaker's Biography:
Nitin Vaidya received Ph.D. from the University of Massachusetts at Amherst. He is presently an Associate Professor of Computer Science at the Texas A&M University. He has held visiting positions at Microsoft Research, Sun Microsystems and the Indian Institute of Technology-Bombay.
His current research is in the areas of wireless networking and mobile computing, and he presently leads several funded research projects in these areas. His research has been funded by various agencies, including the National Science Foundation, DARPA, Microsoft Research and Sun Microsystems. Nitin Vaidya is a recipient of a CAREER award from the National Science Foundation.
Nitin has served on the program committees of several conferences and workshops, and presently serves as the General Chair for the 2001 ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). He is presently a speaker for the Distinguished Visitor Program of the IEEE Computer Society. He is a senior member of IEEE Computer Society and a member of the ACM. For more information, please visit  http://www.cs.tamu.edu/faculty/vaidya


Tutorial 2: Supporting Multimedia Services in UMTS Networks
(Monday July 16th, Full day)

Speakers:

M. Chuah
Technical Manager, Bell Laboratories
LUCENT TECHNOLOGIES
Holmdel, NJ, USA
chuah@bell-labs.com


O.Yue
Director, Bell Laboratories
LUCENT TECHNOLOGIES
Holmdel, NJ, USA
oyue@bell-labs.com

Abstract:
Universal Mobile Telecommunications System (UMTS) networks are scheduled for widespread deployment in the next several years, starting in Japan, followed by Europe and then in the rest of the world. One of the key differentiators between UMTS and 2nd generation wireless systems, such as GSM and GPRS, is its ability to offer new multimedia services efficiently. These new services and applications are very important to wireless operators since they represent potentially large revenue opportunities. In this tutorial, we present the design challenges in supporting multimedia services in UMTS networks.

Outline:
1.Current UMTS Architecture
-Description of UMTS Access Network Elements and their  functionalities
- Node B, RNC
-Description of UMTS Core Network Elements and their functionalities
- SGSN, GGSN
-Description of the relevant protocol stacks
2. Multimedia Services that are of interest to service providers
-Traffic characterization, QoS requirements and Signalling Requirements of these services
3.Design Issues related to support such services
-Smooth Handoff Issues: Service Handoff, 2G/3G Intersystem handoff
-Efficient Bandwidth Usage: airlink scheduling/multiplexing
-Meeting QoS Requirement: radio resource management, admission control (airlink capacity evaluation), core network QoS design
-Accounting Issues: cellular service charge/network charge
-Authentication Issues: cellular system/network layer
-Addressing Issues: one number for all services
-Policy Enforcement Issues: gold/silver services
4. Future UMTS Architecture
- an All IP network
-What are the challenges?
-Can we have one common core network for both UTRAN and ERAN?
-Can we support softhandoff in IP network?
-Do we really need SRNC Relocation?
-Interworking with Wired Network to support value added services
-Roaming issues
-IETF/ITU signalling protocols

Intended Audience:
The tutorial is targeted at both practicing engineers and researchers who want to learn about how multimedia services can be supported in UMTS networks. To the practicing engineers the tutorial will provide a comprehensive treatment of how UMTS networks are designed. To the researchers the tutorial will provide an opportunity to learn about how UMTS networks work and the hot topics that arise due to the strong interplay of physical, protocol layers between UTRAN, UMTS Core Network and wired line networks.

Speakers' Biographies:
Mooi Choo Chuah is a technical manager in the Advanced Technologies division of Bell Laboratories in LUCENT TECHNOLOGIES. Dr. Chuah has over 25 publications covering topics in media access control, power control algorithms, mobility management and TCP performance. She was awarded 2 patents and has filed more than 40 patents. She joined Bell Labs in 1991 after receiving her Ph.D. in ECE from the University of California at San Diego.

On-Ching Yue is a director in the Advanced Technologies division of Bell Laboratories in LUCENT TECHNOLOGIES. His department is involved in the research and development of protocols and algorithms, system and network architectures, design and evaluation methodologies, all for the engineering and management of the wireless system performance and reliability. Dr. Yue has over 50 publications covering topics in spread spectrum communication (CDMA), media access control  and scheduling algorithms, ATM and IP networks, and TCP performance. He joined Bell Labs in 1977 after receiving his Ph.D. in ECE from the University of California at San Diego. He is a member of the Executive Committee of ACM SIGMOBILE.


Tutorial 3: Short-Range Ad Hoc Point-to-Point Wireless Communication: Standards from the Infrared data Association (IrDA)
(Monday, July 16th, Morning)

Speaker:

Dr. Charles D. Knutson
Assistant Professor
Brigham Young University
knutson@cs.byu.edu  

Abstract:
IrDA infrared communication is an inexpensive and widely adopted short range wireless technology that allows devices to share data easily. Key protocol features make IrDA suitable for mobile, resource-constrained devices. This tutorial explores software aspects of integrating IrDA into systems, including system analysis and usage scenarios, hardware and software requirements, applicability of IrDA standards to particular applications, and the operation of the required and optional protocol layers.

Outline:
1. The world of short-range wireless
- IR versus RF
- IrDA and Bluetooth: Complementary or competitive?
2. The IrDA vision
3. High-Level Overview
- Physical layer
- Media Interface Specs
- Framer/Driver
- IrLAP (Link Access Protocol - Physical access)
- IrLMP (Link Management Protocol - Service access)
- TinyTP (Tiny Transport Protocol - Flow control and SAR)
- IAS (Information Access Service - Service registration and query)
4. IrDA Communication Process Overview
- Unique characteristics of Infrared
- Primary/secondary roles
- Communication foundations for IR
- Device discovery
- Link property negotiation
- Link connection
- Service query and selection
- Service connection
- Service disconnection
- Link disconnection
5. Additional IrDA Protocol Layers
- IrOBEX (OBject EXchange)
- IrCOMM (Serial port emulation)
- IrLPT (Parallel port emulation)
- IrLAN (LAN Access point)
- IrTran-P (Picture transfer)
- IrMC (Mobile Communications)
- RTCON (Real-Time Voice and CONtrol)
- JetSend (content negotation)
6. Embedded issues
- IrDA Lite
7. Frame Analysis Workshop
- Frame wrapping (XBOFs, BOF, FCS, EOF)
- IrLAP frame formats (Address and control, U, I and S frame types)
- IrLMP frame formats (Header and control fields)
- TinyTP frame formats (Credit and parameters)
8. IrDA Interoperability
- Usage Models and Application Profiles
- Point and shoot, sync, folder browsing, etc.

Intended Audience:
This tutorial is intended for researchers and practitioners interested in Wireless Personal Area Networks and short-range ad hoc connectivity. For practitioners it will help them understand the issues relevant in evaluating and integrating IrDA protocols in mobile devices. For researchers it will enable them to understand the ways in which infrared data communications play a role in Wireless Personal Area Networks and harmonize with RF technologies (such as Bluetooth).

Speaker's Biography:
Dr. Charles D. Knutson is an Assistant Professor of Computer Science at Brigham Young University in Provo, Utah. He is the former Vice President of Research and Development at Counterpoint Systems Foundry, Inc., the world's leading provider of short-range wireless data communications software and tools for embedded systems. He served for two years as the Chair of the Test and Interoperability Committee of the Infrared Data Association (IrDA). His articles have appeared in Portable Design Magazine, Communication Systems Design, Embedded Systems Programming, Byte, PC Computing, InfoWorld, and other industry and academic publications. Dr. Knutson holds a Ph.D. in Computer Science from Oregon State University.  


Tutorial 4: Security and Billing for Mobile Networks 
(Monday, July 16th, Afternoon)

Speaker:

Prof. Jean-Pierre
Hubaux Swiss Federal Institute of Technology Lausanne
jean-pierre.hubaux@epfl.ch

Abstract:
Security is becoming a major concern for the networking community, and mobile networks appear to be particularly vulnerable. End users want to rely on confidentiality, integrity, authentication, non-repudiation and other sophisticated functions. Moreover, operators of mobile networks have to charge their customers in an appropriate way. Both security and billing functions are usually based on cryptographic techniques. This tutorial will provide the "big picture" about security and billing in cellular and mobile ad hoc networks. Instead of a boring (and necessarily incomplete) overview of the related standards, the tutorial will describe the fundamentals and explain the underlying mechanisms. Some examples will be provided to illustrate these concepts, notably in GSM, UMTS and Mobile IP.

Outline:
1.Introduction
- Architecture of mobile networks; cellular and mobile ad hoc networks
- Vulnerabilities and threats
- Security-related functions: availability, integrity, confidentiality, authentication, non-repudiation; the challenge of billing in a mobile network
2. Principles of cryptography
- Principles of cryptosystems
- Symmetric and asymmetric cryptosystems
- One way cryptofunctions
- Digital signatures and certificates
- Example: RSA
- Key establishment (Diffie-Hellman and related schemes)
3. Principles of security and billing for cellular networks
- The role of the operators
- Building blocks of a security architecture for a cellular network
- The concept of customer care agency
- The security of roaming
- Security issues in Mobile IP
- Study case: security and billing in some specific and upcoming cellular networks (e.g., GSM/UMTS)
4. Principles of security for mobile ad hoc networks
- Reminder on mobile ad hoc networks
- Vulnerabilities of the basic mechanisms and of the security mechanisms of mobile ad hoc networks
- Protecting the basic mechanisms: protection of routing, intrusion detection, service enforcement
- Protecting the security mechanisms: identification of the requirements of the system; emulation of a certification authority; key agreement and mutual certification
- Study case: security of Bluetooth

Intended Audience:
This tutorial is intended for researchers and practitioners of the mobile networking and computing community who are interested in security and billing issues. No prior knowledge of security or cryptography is expected from the participants, but a familiarity with protocols and mobile networking is recommended.

Speaker's Biography:
Jean-Pierre Hubaux joined the Swiss Federal Institute of Technology - Lausanne (EPFL) as an associate professor in 1990; he was promoted full professor in 1996. He is co-founder and co-director of the Institute for computer Communications and Applications. His current research is focused on mobile networking with a special interest in self-organized mobile ad hoc networks and their related security problems. He has recently defined and initialized a long-term and ambitious project on this issue, which involves around 20 faculty members in Switzerland and abroad and is supported by a dozen leading international companies (see http://www.terminodes.org).

At the beginning of his activity at EPFL, he defined the first curriculum in communication systems. In October 1999, he was elected to become the first chairman of the newly created communication systems department. Before joining EPFL, he spent 10 years with Alcatel in France, where he was involved in R&D activities, notably in the area of switching system design and real-time software. He has published more than 40 journal and conference papers and holds several patents; see http://icawww.epfl.ch for more details.  


Tutorial 5: Mobile IPv6 for Cellular Telephony
(Monday July 16th, Morning)

Speaker:

Charles Perkins
Nokia Fellow, Nokia Research Center
charliep@iprg.nokia.com

Abstract:
Within the next year, it is expected that the total number of wireless communication devices will exceed 1 billion. All of these devices will become attached to the Internet at a very rapid pace, as customers discover the power of "always-on" network access.  As 3G standards are finalized and deployed worldwide, Internet standards are considered to as an essential component of the total system architecture. In particular, IPv6 has already been specified as the underlying network-layer protocol because it alone offers the huge address space needed for billions of Internet-attache wireless devices.  In this tutorial, I will describe IPv6 and Mobile IPv6 and their relationship to 3G telephone networks, and beyond.  Special focus will be given to th  IETF standardization efforts, with examples given to show how they apply to 3G core networks and radio access networks.

Outline:
This tutorial will cover the following topics:
1. Relevant aspects of IPv6
-Stateless  Address Autoconfiguration
-IP Security Headers
-Option Header structures, ordering, and processing rules "
-Type 0 Routing Headers
2. Mobile IPv6 -Protocol Overview
-Binding Update Destination Option for home agents  and correspondent nodes.
-Home Address Destination Option for Ingress Filtering
-Interactions with IPSec -Care-of-address handling
-Additional destination options -Renumbering features
3. Fast Handovers
-Network controlled vs. Mobile Controlled
-Layer 2 triggers
-Proxy Router Advertisement
- Handover Initiate, Handover Acknowledge
-Interactions with Binding Updates
-Bicasting and Buffering
-Interactions with Context Transfer
4. AAA (Authentication, Authorization, and Accounting)
-The new security model
-Porotcol Overview -Key Distribution
-Base AAA protocol
-Brokers
-Mobile IPv6 extensions for AAA

Intended Audience:
This tutorial is intended for systems engineers and project engineers who need to understand network-layer protocols for next-generation telephone networks.  The participant is expected to have a clear understanding of IP, and the role of UDP and TCP in the Internet today.  The tutorial should also benefit academicians who are interested in understanding current directions in Internet standards and 3G telephony.

Speaker's Biography:
Charles E. Perkins is a Nokia Fellow in the Communication Systems Laboratory at Nokia Research Center, investigating mobile wireless networking and dynamic configuration protocols.  He is the editor for several ACM and IEEE journals for areas related to wireless networking.  He is serving as document editor for the mobile-IP working group of the Internet Engineering Task Force (IETF), and is author or co-author of standards-track documents in the mobileip, manet, IPv6, and dhc (Dynamic Host Configuration) working groups. Charles has served on the Internet Architecture Board (IAB) of the IETF and on various committees for the National Research Council. He is also associate editor for Mobile Communications and Computing Review, the official publication of ACM SIGMOBILE, and is on the editorial staff for IEEE Internet Computing magazine.  Charles has authored and edited books on Mobile IP and Ad Hoc Networking, and has published a number of papers and award winning articles in the areas of mobile networking, ad-hoc networking, route optimization for mobile networking, resource discovery, and automatic configuration for mobile computers.  See http://people.nokia.net/~charliep for further details.  


Tutorial 6: Mobile Commerce: Applications, Technologies, Frameworks, and Emerging Issue
(Tuesday July 17th, Morning)

Speaker:

Professor Upkar Varshney
Department of CIS, Georgia State University
uvarshney@gsu.edu

Abstract:
In the last few years, e-commerce has attracted worldwide attention that has led to significant progress in strategies, requirements, and development of e-commerce applications. However, nearly all e-commerce applications envisioned and developed so far assume fixed or stationary users with wired infrastructure. This is likely to change as with the emergence and wide spread adoption of wireless and mobile networks, devices, and middleware, many new e-commerce applications will become possible. These new applications, termed "wireless e-commerce" or "mobile commerce", are beginning to receive tremendous interest in research and development community. Various projections put worldwide number of mobile devices to 1 billion in the next two years. According to estimates by Gartner Group, by 2004, at least 40% of consumer-to-business e-commerce will be initiated from smart phones supported by WAP (Wireless Application Protocol). A study from the Wireless Data and Computing Service, a division of Strategy Analytics, reports that the worldwide mobile commerce market may rise to $200 Billion by 2004. The report predicts that transactions via wireless devices will generate about $14 Billion a year. In many European countries and Japan with significant wireless penetration, the mobile commerce market is already taking off and reaching billions of dollars a year. It is to be noted that mobile commerce may require significantly different approaches in design, development, and implementation of applications due to the inherent characteristics of wireless networks and mobile devices. Many interesting and important challenges include design and development of mobile commerce applications, networking requirements, transactions and security issues, business models and strategies. This next frontier of electronic commerce will also significantly benefit from research in mobile devices, mobile middleware, and wireless network infrastructure. The purpose of this tutorial is to address the important research problems in mobile commerce. 

Outline:
1.Mobile Commerce Applications
- Frameworks for mobile commerce
  - Emerging applications (location and user sensitive mobile advertising, mobile financial applications, mobile inventory, proactive service management, wireless re-engineering, mobile auction, entertainment, mobile office & distance education etc.)
- Design and development of mobile commerce applications 
2. Mobile Commerce Technologies
- Networking infrastructure requirements for mobile commerce (quality of service, location management, multicast, roaming across networks, reliability)
- Devices, middleware, and operating systems support 
- Security and transactions in mobile commerce 
3. Business, Regulatory, and Implementation Issues
- Business models for mobile commerce 
- Applications of mobility in supply chain management (M-SCM), customer relationship management (M-CRM), Enterprise Applications Integration (M-EAI), and Mobile devices in Enterprise Resource Planning (M-ERP)
- Role of carriers, developers, and regulators
- Diverse approaches to m-commerce due to technological, cultural, pricing, and regulatory differences

Intended Audience:
The tutorial will be very useful to people working or planning to enter in the areas of mobile commerce and wireless networks with interest in technology or applications such as mobile commerce. Professors, graduate students, and industry professionals may want to attend the tutorial. Application developers and business strategist may also find this tutorial useful. 

Speaker Biography:
Prof. Upkar Varshney is on the faculty of Computer Information Systems at Georgia State University, Atlanta. He received a Bachelor of Engineering in Electrical Engineering with Honors from University of Roorkee, MS in Computer Science and a Ph.D. in Telecommunications & Networking, from the University of Missouri-Kansas City. His research and teaching interests include mobile commerce, mobile and wireless networking, wireless reliability, availability, and survivability. Professor Varshney has written over 40 papers in these topics.  Professor Varshney is credited with some of the early research work on mobile commerce, He has written several papers on mobile commerce for ACM Mobile Networks and Applications (MONET), IEEE Computer, and prestigious journals in Information Systems. He is the guest editor for ACM Mobile Networks and Applications (MONET) special issue on Mobile Commerce. He is also on the editorial board of IEEE Computer.  He has been invited to deliver several keynote speeches at major international conferences and corporations dealing with mobile commerce in Canada, Germany, and Yugoslavia. He delivered a keynote speech on M-commerce at NCR National Technology Meeting. He has also been invited to conduct tutorials and workshops at major international conferences, including HICSS 1998, 1999 and 2001 (m-commerce), IEEE WCNC 1999, and Mobicom 1999. He has received several teaching awards/nominations including the prestigious Myrone T. Greene Outstanding Teaching Award of Georgia State University in Oct. 2000. He has organized and chaired sessions at major international conferences including IEEE WCNC, HICSS and others. He is a member of ACM and IEEE.


Tutorial 7: Energy Efficiency in Mobile Computing  and Networking
  (Tuesday July 17th, Morning)

Speaker:

Mani Srivastava
University of California, Los Angeles
mbs@ee.ucla.edu

Abstract:
Wireless systems, where the energy consumption for "communication" is dictated by the link budget, require going beyond low-power implementation techniques developed for "computing" systems. Higher layers of the system also need to be power aware and energy efficient. A comprehensive discussion of battery technology, sources of power consumption in computing and communication, and generic low-power hardware and software implementation techniques will be followed in the tutorial by a presentation of techniques such as low-power network protocols that are specific to wireless and mobile systems. Moreover, recently developed techniques that focus not just on low power but on power awareness via network wide power management with the goal of right power at the right place and the right time will be presented. Commercial trends such as low-power "mobile" processors and power-aware RTOS and APIs will also be described. With a balanced presentation of basic concepts, new ideas, real-life applications, and research trends, the tutorial should interest practicing engineers as well as researchers.

Outline:
1. Introduction   
- overview of the field, commercial and technology trends     
- sources of power consumption      
- battery technology
2. Generic low-power design techniques      
- voltage scaling, dynamic voltage/frequency      
- software: estimation, scheduling, data structures
3. Power consumption in radios      
- sources of power consumption, link budget      
- techniques for lower-power and power-aware radios      
- modulation scaling
4. Low-power network protocols      
- energy efficient link layer and wireless packet scheduling      
- low-power MAC protocols      
- power-aware routing      
- power-aware transport protocols
5. Application and OS level techniques      
- power awareness vs. low-power      
- CPU and subsystem shutdown, predictive shutdown      
- scheduling with dynamic voltage/frequency CPUs      
- energy-agile algorithms      
- explicit management of power by applications      
- power-efficient encryption
6. Commercial and research trends, tools      
- new "low-power" processor and radio technologies      
- APIs for OS level power management      
- ultra low-power wireless sensor networks      
- ambient power havesting and scavenging      
- relevant research programs (DARPA SensIT, PAC/C)      
- power modeling tools

Intended Audience:
The tutorial is targeted at both practicing engineers and researchers who want to learn about energy efficiency and design for low power across the various layers (physical, protocol, application) of mobile and wireless computing and networking systems. To the practicing engineers the tutorial will provide a comprehensive treatment of recent developments in design for low power at various layers in the system, and case studies of real-life applications incorporating ideas described in the tutorial. To the researchers the tutorial will provide an opportunity to learn about low power related research issues in mobile computing, and particularly problems that arise from the strong interplay of physical, protocol, middleware, and application level considerations that is typical of wireless systems. The tutorial is self contained with an extended bibliography to guide the interested participants to later delve into more details, and would be accessible to participants with typical EE and CS backgrounds. 

Speaker's Biography:
Mani Srivastava is an Associate Professor at UCLA. He received MS and Ph.D. degrees from Berkeley, and worked for several years in Networked Computing Research at Bell Labs. His research at UCLA is on networked and embedded systems, focusing particularly on power-aware computing and communications, low-power design, sensor-instrumented physical spaces, wireless sensor networking, wireless QoS, gigabit wireless routers, and wireless node architectures.  He leads DARPA and NSF funded projects in these areas. He has several patents, and has published extensively. His recent awards include ACM Design Automation Conference 2000 StudentDesign Contest Honorable Mention Award, the Okawa Foundation Grant, and the NSF CAREER Award.  


Tutorial 8: Bluetooth: Technology, Application, Performance
(Tuesday, July 17th, Morning)

Speakers:
Prof. Mario Gerla
University of California, Los Angeles
gerla@cs.ucla.edu

Per Joahnsson
Ericsson Research
per.johansson@ericsson.com

Abstract:
Today, most mobile professionals travel with cellphone and laptop, and often need to interconnect them to browse the web or send e-mail. After getting entangled with cables,  they soon appreciate the convenience of interconnecting all personal devices instantly and wirelessly in a personal LAN (PAN). This is the first type of application – cable replacement – that has driven the development of the Bluetooth wireless LAN, an extremely versatile, low cost network interface soon to be installed in all personal devices (from cellphone and cameras to earphones). From the initial cable replacement concept based on the Piconet, the range of Bluetooth applications has quickly expanded to more challenging scenarios including: ad hoc networking among several personal Piconets; access to the Internet (via a repeater on the wall), and; pervasive, “unconscious computing”, ie, interaction between mobile user and the environment, through devices such as parking  meters and airport check in counters.  This broad set of applications in part overlaps with those of several other wireless technologies (IEEE802.11, UMTS, HomeRF, DECT, IrDa, etc). It is thus of interest to understand how Bluetooth will replace/complement (or be integrated with) existing systems. To properly compare technologies, it will be necessary to develop performance models. One of the goals of this tutorial is to introduce Bluetooth performance models and simulation tools, and their application to representative scenarios. The tutorial will begin with a review of the Bluetooth technology with emphasis on lower layers (physical, MAC and network), that have the most impact on performance. It will identify representative scenarios for typical Bluetooth application areas (from cable replacement to unconscious computing) and derive the relevant performance measures. It will then introduce newly developed performance evaluation methods and (simulation) tools and apply them to simple case studies. 

Outline:
Part 1:
-Bluetooth Technology:
-lower protocol layers: radio, physical, MAC, Piconets, low power operation, 
-network layers: scatternets, discovery, ad hoc routing, handover 
-Bluetooth middleware
-State of standards (Bluetooth SIG); current implementations; test kits.
Part 2:
-Applications: identification of representative scenarios (eg, shopping center, exhibition hall, etc) and definition of relevant performance measures
-Bluetooth performance evaluation tools: simulation models (NS-2 and Parsec/Glomosim); 
-Case studies: indoor access to the Internet; ad hoc networking/scatternets; 

Intended Audience:
This tutorial will provide the background information and the performance methods and tools that can assist researchers, device manufacturers, wireless network operators, mobile applications developers and mobile users to evaluate the Bluetooth technology and assess its use in their applications.

Speakers' Biography:
Mario Gerla is a Professor in the Computer Science department at UCLA. He received his graduate degree in engineering from the Politecnico di Milano, in 1966, and his M.S. and Ph.D. degrees in engineering from UCLA in 1970 and 1973, respectively. He joined the Faculty of the UCLA Computer Science Department in 1977. His current research is in the area of analysis, design and control of communications networks. Ongoing projects include: the design and evaluation of QoS routing and multicast algorithms for IP domains; the design and evaluation of all-optical network topologies and access protocols; the design of wireless, mobile, multimedia networks for mobile computing applications, and; the development of measurement methods and tools for evaluating the performance of high speed networks and applications. 

Per Johansson is a senior researcher at Ericsson SwitchLab-an applied research laboratory within Ericsson Research. He holds Master of Science and Licentiate degrees in electrical engineering. He joined Ericsson in 1992 to work with traffic management and performance analysis of ATM networks, but later moved into research on wireless systems. Since 1998, his research has focused on ad hoc networks and in particular, on Bluetooth ad hoc networking.


IBM logo
WebMaster: Paridhi Verma
This Web site was hosted by IBM
Research.