Infocom 2004

will be held at
The Convention

and Exhibition Center
Hong Kong

 

 

Maps of Hong Kong

and South China
 

Tutorial Program

Tutorial Co-Chairs: Prof. W. J. Liao wjliao@cc.ee.ntu.edu.tw and Prof. Krishna M. Sivalingam krishna@cs.umbc.edu


Sunday, March 7, 2004, Afternoon

Title: Wi-Fi: a journey from theory to practice
Speaker(s): Pravin Bhagwat, Founder and CTO, Wibhu Technologies

Duration: Half-Day

Title: Traffic Grooming and Multigranular Switching in WDM Networks
Speaker(s): George N. Rouskas, NCSU

Duration: Half-Day


Monday, March 8, 2004

Title: Network Security: Internet Infrastructure and Wireless Networks
Speaker(s): G. Manimaran and A. Chakrabarti, Iowa State University, Ames

Duration: Full-Day

Title: Mobile Ad Hoc Networks: MAC, Routing and Transport Layer Issues
Speaker(s): Nitin H. Vaidya, University of Illinois at Urbana-Champaign

Duration: Full-Day

Title: Peer-to-Peer Networking
Speaker(s): Keith Ross, Polytechnic University and Dan Rubenstein, Columbia University

Duration: Full-Day

Title: BGP-Interdomain Routing: Today and Tomorrow
Speaker(s): Jia Wang, AT&T Research and Z. Mao, U.C. Berkeley/U. Michigan, Ann Arbor

Duration: Full-Day


Friday, March 12, 2004

Title: Wireless Sensor Networks: A Systems Perspective
Speaker(s): Ramesh Govindan, Univ. of Southern California

Duration: Full-Day

Title: Current Practice in Broadband Access Networks: Architectures, Protocols, and Services
Speaker(s): Prof. Reuven Cohen, Dept. of Computer Science, Technion

Duration: Full-Day


Sunday, March 7, 2004, 1.30p - 5.00p

Title: Wi-Fi: a journey from theory to practice
Speaker(s): Pravin Bhagwat, Founder and CTO, Wibhu Technologies
Duration: Sunday, March 7, 2004, 1.30p - 5.00p

Abstract: IEEE 802.11 (Wi-Fi) standard was designed as an indoor wireless replacement for Ethernet. With growing popularity, novel use of Wi-Fi are pushing the limits of technology. Examples include outdoor long distance links, metro scale deployments, high density enterprise networks and large scale industrial applications. Dynamic behavior of Wi-Fi networks in the above scenarios is not yet well understood due to complexity of modeling RF and MAC characteristics and lack of experimental studies. The speaker has recently rolled out the world's largest outdoor multi-hop Wi-Fi network and built tools for distributed monitoring of large scale Wi-Fi networks. This tutorial will present the lessons learned from analysis of RF signal and packet traces captured at several representative Wi-Fi deployments. These trace studies will illustrate that dynamic behavior of Wi-Fi networks needs further study and that currently known theoretical models are inadequate for predicting the behavior of large scale, high density Wi-Fi networks. The topics covered include:

  • Overview of 802.11 specifications
  • 2.4Ghz and 5Ghz channel characteristics
  • RF and MAC layer interactions
  • Wi-Fi case studies
    • Outdoor long distance links
    • Metro deployment
    • High density enterprise network
    • Factory, warehouses
    • Hot-spots
  • Theoretical models for throughput and capacity calculations
  • Experimental observations
  • Future directions and open issues

This tutorial is intended for researchers and practitioners who want to track new developments in Wi-Fi. Computer professionals who want to develop better understanding of technology trends and identify new market opportunities in the area of wireless networking will also benefit from this tutorial. Basic understanding of layered network architecture is expected. No background in analog radio, signal processing, or wireless communication is required. Researchers who want to identify open research problems in the area of wireless networking will also find this tutorial useful.

Biography: Pravin Bhagwat is an entrepreneur and a well-known researcher in the area of wireless and mobile networking. He is the Founder and Chief Technology Officer of Wibhu Technologies, a wireless networking startup with offices in Sunnyvale, CA and Pune, India. Pravin recently spearheaded the world's largest 802.11b outdoor deployment project along 85 Km corridor between Kanpur and Lucknow (two cities in North India). He also holds adjunct faculty appointments at computer science department, IIT Kanpur and at WINLAB, Rutgers University, New Jersey. Prior to founding Wibhu Technologies, Pravin worked as a technology consultant in the Networking Research group at AT&T Research. Pravin started his career at IBM Thomas J. Watson Research Center, New York. He was the chief architect of BlueSky, an indoor wireless networking system for palmtop computers, and the inventor of TCP splicing, a technique for building fast application layer proxies.

Pravin actively serves on program committees of networking conferences and has published numerous technical papers and patents in the area of mobile computing and wireless communication. He is the Associate Editor of IEEE Transactions on Mobile Computing and has also served as a guest editor of IEEE Network. Pravin has a B.Tech. in Computer Science from IIT Kanpur and an MS/PhD in computer science from the University of Maryland, College Park, USA.


Title: Traffic Grooming and Multigranular Switching in WDM Networks
Speaker(s): George N. Rouskas, NCSU
Duration: Sunday, March 7, 2004, 1.30p - 5.00p

Abstract: In this tutorial we will first motivate, introduce, and formally define a number of variants of the traffic grooming and multigranular switching problems in optical wavelength division multiplexed (WDM) networks. We will discuss the relationship of these problems to the more well-known logical topology design and routing and wavelength assignment problems. We will review the latest results on the complexity of the traffic grooming and multigranular switching problems, and we will discuss the implications of these results to the design of practical algorithms. We will then review a number of algorithms for traffic grooming in ring topologies (with applications to SONET/SDH), star and tree topologies (with applications to WDM access networks), as well as general network topologies (with applications to metro and backbone WDM networks). The tutorial will place emphasis on the design of efficient and practical algorithms with performance guarantees in terms of the network cost. The topics covered include:

  • SONET/SDH and MPLS/GMPLS technologies
  • Traffic grooming concept, and static vs. dynamic grooming
  • Electronic and optical multigranular switching technologies
  • Complexity, bounds, and practical traffic grooming algorithms for: ring, star, tree, and general network topologies
  • Challenges and future directions of traffic grooming and multigranular switching

This tutorial is for researchers, optical network engineers, network designers, and network managers, as well as anyone involved in the design and provisioning of optical networks, including SONET/SDH and WDM networks. The tutorial will be self-contained, and requires only a good knowledge and understanding of basic networking concepts.

Biography: George N. Rouskas is a Professor of Computer Science at North Carolina State University. He received the Diploma in Computer Engineering from the National Technical University of Athens, Greece, in 1989, and the M.S. and Ph.D. degrees in Computer Science from the College of Computing, Georgia Tech, in 1991 and 1994, respectively. In 2000-2001 he spent a sabbatical term at Vitesse Semiconductor, and he has been an Invited Professor at the University of Evry, France. He received the 2003 NCSU Alumni Outstanding Research Award, a 1997 NSF Faculty Early Career Development (CAREER) Award, the 1995 Outstanding New Teacher Award from NCSU, and the 1994 Graduate Research Assistant Award from Georgia Tech. He is an editor of the IEEE/ACM Transactions on Networking, Computer Networks, and Optical Networks, and has served as co-guest editor of IEEE JSAC. He is the Program Chair of LANMAN 2004, and Program Co-Chair of Networking 2004. His research interests include network architectures and protocols, optical networks, and performance evaluation.


Monday, March 8, 2004, 9.00 AM - 5.00 PM

Title: Network Security: Internet Infrastructure and Wireless Networks
Speaker(s): G. Manimaran and A. Chakrabarti, Iowa State University, Ames
Duration: Monday, March 8, 2004, 9.00 AM - 5.00 PM

Abstract: The Internet has witnessed enormous growth over the last decade and has become ubiquitous. Most of the R&D efforts in the past had been on improving the performance, scalability, and information assurance over the Internet. Information assurance assumes that the network devices responsible for encrypting and routing packets are trustworthy. Researchers are now questioning these assumptions, as several instances of security breaches have taken place recently wherein the Internet infrastructure (e.g., routers, servers) were compromised to the advantage of the malicious adversaries. Moreover, the growing concerns for "cyber terrorism" have made policy makers and researchers realize the importance of Internet infrastructure security. The pervasive nature of the Internet is fueled primarily by the growth of infrastructure-based wireless network technologies, such as wireless LAN and Mobile-IP. There also exists infrastructure-less wireless networks, such as mobile ad-hoc networks and sensor networks, which find applications in homeland security, disaster management, and military environment. In all of these, security is of great importance as these networks are being used for critical applications.

The goal of this tutorial is to present the state-of-the-art research and practice in Internet infrastructure security and wireless network security, to its audience. The tutorial will broadly be divided into four modules: (1) A taxonomy of Internet infrastructure attacks, (2) Internet routing attacks and countermeasures, (3) Denial of Service (DoS) and DDoS attacks and countermeasures, and (4) Wireless network security which includes security issues and key solutions in wireless LAN (802.11), mobile ad-hoc networks, and sensor networks. Performance and practical issues associated with the various countermeasures will also be discussed. The outline of topics is as follows:

  • Internet Infrastructure Attacks Taxonomy

      DNS Attacks

    • Routing attacks
    • DoS/DDoS attacks
    • WORMS
  • Secure Internet Routing Protocols
    • Proactive and Reactive mechanisms
    • Secure Link State Protocols
    • Secure Distance/Path Vector Protocols
    • Network Intrusion Detection
  • DoS/DDoS Attacks and Countermeasures
    • Direct, Reflector, QoS, and low-rate TCP DoS attacks
    • DoS attack dynamics (variable rate, multi-source, etc.)
    • IP Traceback, Packet filtering, Location hiding
    • Lightweight authentication, Load balancing
  • Wireless Network Security
    • 802.11 vulnerabilities and countermeasures
    • WEP (Wired Equivalence Privacy)
    • Secure routing in mobile ad-hoc networks
    • Security issues in sensor networks

Biography: Dr. G. Manimaran is an Assistant Professor in the Department of Electrical and Computer Engineering at Iowa State University, since January 1999. He received his Ph.D degree in Computer Science and Engineering from IIT Madras, India, in 1998. His research expertise is in the areas of Trusted Internet encompassing QoS, infrastructure security, reliability focusing on routing, multicasting, and DDoS issues; and resource management in real-time systems. He has co-authored around 90 peer-reviewed research papers in international journals and conferences/workshops, of which two conference/workshop papers received the best paper awards. He is a co-author of the text "Resource management in real-time systems and networks," MIT Press, 2001. He served as guest co-editor for the IEEE Network special issue on "Multicasting: An enabling technology," Jan/Feb 2003. He is a founding co-chair of the Trusted Internet Workshop held in conjunction with HiPC. He has served as a member of technical program committee of several IEEE conferences including ICC 2003 and Infocom 2004. He is a member of the IEEE, IEEE Computer and Communication Societies, and ACM. http://www.ee.iastate.edu/~gmani.

Dr. Anirban Chakrabarti obtained his Ph.D degree from the Department of Electrical and Computer Engineering at Iowa State University, in Fall 2003. His research expertise is in the areas of QoS and overlay multicasting, and secure routing and multicasting. He is a co-author of the paper titled "Internet infrastructure security: A taxonomy," published in IEEE Network special issue Nov/Dec. 2002. He has co-authored several research papers in secure routing and secure/QoS multicasting. In addition to his academic research, Dr. Chakrabarti had worked as an intern/co-op in NEC Network laboratories in Heidelberg, Germany in the area of packet based UMTS systems, and collaborated with Intel Research at University of Berkeley in security aspects of delay-tolerant networks. http://www.public.iastate.edu/~anirban


Title: Mobile Ad Hoc Networks: MAC, Routing and Transport Layer Issues
Speaker(s): Nitin H. Vaidya, University of Illinois at Urbana-Champaign
Duration: Monday, March 8, 2004, 9.00 AM - 5.00 PM

Abstract: A mobile ad hoc network is a collection of mobile wireless nodes that can dynamically form a network without necessarily using any pre-existing infrastructure. Due to the potential ease of deployment, many practical applications have been conceived for ad hoc networks, including personal area networking, home networking, and sensor networking. When designing mobile ad hoc networks, several interesting and difficult problems arise due to shared nature of the wireless medium, limited transmission range of wireless devices, node mobility, and energy constraints. This tutorial will present an overview of issues related to medium access control (MAC), routing, and transport in mobile ad hoc networks, including interaction between the different layers of the protocol stack. Techniques proposed to improve performance of MAC, routing and transport protocols will be discussed. In addition, the tutorial will briefly discuss some implementation-related issues, and mechanisms for integrating a mobile ad hoc network with wired networks. Finally, the tutorial will present a brief overview of some standards activities related to ad hoc networking. The topics covered include:

  • Introduction to mobile ad hoc networks
  • Wireless medium access control protocols (classification and examples)
  • Unicast routing protocols for mobile ad hoc networks (classification and examples)
  • Performance of TCP in mobile ad hoc networks, and techniques to improve TCP performance
  • Hybrid networks
  • Implementation-related issues
  • Related standards activities
  • Conclusions

The intended audience includes students, faculty and engineers interested in wireless networking. Prerequisite knowledge includes understanding of basics of computer networking.

Biography: Nitin Vaidya is an Associate Professor of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign. He has held visiting positions at Microsoft Research, Sun Microsystems and the Indian Institute of Technology-Bombay. His current research interests are in the area of wireless networking. His research has been funded by various agencies, including the National Science Foundation, DARPA, BBN Technologies, Microsoft Research and Sun Microsystems. Nitin Vaidya is a recipient of a CAREER award from the National Science Foundation. He served as program co-chair for the 2003 ACM MobiCom conference. He has served as editor for several journals, including IEEE Transactions on Mobile Computing and IEEE/ACM Transactions on Networking. For more information, please visit http://www.crhc.uiuc.edu/~nhv/.


Title: Peer-to-Peer Networking
Speaker(s): Keith Ross, Polytechnic University and Dan Rubenstein, Columbia University
Duration: Monday, March 8, 2004, 9.00 AM - 5.00 PM

Abstract: By many estimates, P2P file sharing accounts for more than 60% of Internet backbone traffic today. P2P file sharing is not only used to share MP3s, but also videos, documents, images and software. The P2P file sharing architectures have become sophisticated, with peers acting as both file servers and mini hubs for keyword searches, and with extensive use of parallel downloading. As of October 2003, the KaZaA P2P file sharing system alone typically has more than 3 million simultaneously-connected peers which share over 3,000 terabytes of content. File sharing is not the only class of successful P2P applications, however. For example, many of the instant messaging systems can be classified as P2P since direct TCP connections are established between the communicating participants; even the presence-detection component may migrate to server- less architectures in the future. As another example, in recent years numerous large-scale P2P computing projects have been deployed, including SETI@home and AIDS@home. Also, fully distributed VoIP systems, such as Skype have recently become popular. In parallel to the successful large-scale deployments of "industrial" P2P systems, the research community has been intensely pursuing P2P systems over the past few years. One of the most promising developments is a set of proposals for P2P look-up services based on Dynamic Hash Tables (DHTs). The DHT-base schemes, which include Chord, Pastry, Tapestry and CAN, organize the peers into structured overlay networks, and assign each data item to a specific peer. For example, with N being the number of nodes, the Chord look-up service allows any peer to locate the data associated with any key in O(log N) time; and in the Chord overlay network, each node only needs to know of O(log N) neighbors. Many promising applications can potentially be built on top of the DHT-based look-up services. These applications include cooperative file systems, P2P caching, multicast, mobility management, and presence detection. In this tutorial, we will explore in detail the unstructured "industrial" P2P systems as well as the structured DHT-based P2P systems. The tutorial will also include an important mathematical analysis component, drawing on tools from probability theory, optimization, and algorithms. We will survey experimental observations of P2P performance. We also cover diverse issues including the free-rider problem, incentives, reputation systems, P2P economics, resource markets, NAT and P2P, and copyright law as it applies to P2P.

Biography: Keith Ross joined Polytechnic University as the Leonard Shustek Professor in Computer Science in January 2003. Before joining Polytechnic University, he was a professor for five years in the Multimedia Communications Department at Eurecom Institute in Sophia Antipolis, France. From 1985 through 1997, he was a professor in the Department of Systems Engineering at the University of Pennsylvania. He received a B.S.E.E from Tufts University, a M.S.E.E. from Columbia University, and a Ph.D. in Computer and Control Engineering from The University of Michigan.

Professor Ross has made significant research contributions to the theory and practice of computer networking throughout his career, including work in P2P systems, audio and video streaming, content distribution, quality of service, traffic engineering, loss networks, and Markov decision processes. His interests in streaming technologies and eLearning lead to the creation in 1999 of Wimba, for which he is the founding CEO. Wimba is a venture-capital funded start-up that develops and markets asynchronous voice technologies, accessible both through the Web and through mobile phones.
Professor Ross is co-author (with James Kurose) of the leading networking textbook, "Computer Networking: A Top-Down Approach Featuring the Internet," which is being used by over 200 universities in North America and is being translated into several languages. Professor Ross is also the author of the book "Multiservice Loss Models for Telecommunication Networks," published by Springer in 1995.

Dan Rubenstein has been an Assistant Professor of Electrical Engineering and Computer Science at Columbia University since 2000. He received a B.S. degree in mathematics from M.I.T., an M.A. in math from UCLA, and a PhD in computer science from University of Massachusetts, Amherst. His research interests are in network technologies, applications, and performance analysis, with a recent emphasis on resilient and secure networking, distributed communication algorithms, and overlay technologies. He has received an NSF CAREER Award, the Best Student Paper award from the ACM SIGMETRICS 2000 conference, and a Best Paper award from the IEEE ICNP 2003 Conference.


Title: BGP-Interdomain Routing: Today and Tomorrow
Speaker(s): Jia Wang, AT&T Research and Z. Mao, U.C. Berkeley/U. Michigan, Ann Arbor
Duration: Monday, March 8, 2004, 9.00 AM - 5.00 PM

Abstract: The Internet consists of tens of thousands of individually operated networks - Autonomous Systems (ASes). Interdomain routing is critical to the stability and performance of the Internet. As the Internet evolves, the scalability and robustness requirement on the interdomain routing protocol increases. It is therefore critical to understand the current interdomain routing protocol - Border Gateway Protocol (BGP). This tutorial is intended to provide answers to these questions: How does BGP work? What are the current problems of BGP? How can one study protocol dynamics through measurement and analysis? What changes are necessary for BGP to adapt to our needs? This tutorial will tell you what we know and what we don't know about interdomain routing as well as clarify common confusion and misunderstanding about BGP. It starts with an introduction to BGP, followed by an illustration of how BGP is used and configured today by commercial ISPs, methods to study BGP through measurement, and future challenges facing the interdomain routing. BGP is the current Internet routing protocol to achieve reachability across multiple domains or Autonomous Systems. It is also used by service providers to perform traffic engineering to control inbound and outbound traffic across multiple location and links. This tutorial would cover:

  • Basic operation of BGP: How routing is done on today's Internet. Why BGP is used as the interdomain protocol? How do service providers use and configure BGP? We will give background information on interdomain routing.

  • BGP policy configuration: BGP's specification in the RFC is surprisingly simple. Its complexities arise from the large amount of flexibility operators have in configuring the routing policies in BGP. Understanding common configuration of BGP policies and their impact on routing behavior is very important. We also discuss some of the theoretical findings of problems that may occur due to configuring BGP policies independently at different networks without any coordination. An example of such finding is policy divergence.

  • Interdomain level forwarding paths: Given the BGP policy configuration, what is the forwarding path of data packets at interdomain level? Why do we care about it? Why cannot BGP accurately predict the forwarding path? How to identify the accurate forwarding path? We will answer these questions according to serve provider's operational practices as well as clarify common confusion and misunderstanding about BGP.

  • BGP dynamics: What are the challenges in interdomain routing? Is BGP the solution for interdomain routing? What problems do BGP have? Based on the experiments we have done and data we have collected across a number of large ISPs, we will give a network operator's view of BGP and explain its current problems and future challenges.

  • BGP measurement: BGP Beacons - controlled active measurement of BGP: we introduce a framework to study BGP updates through active measurement at various points on the Internet. We show analysis of BGP dynamics and explain how researchers how use this framework to study BGP.

The intended audience includes researchers who are interested in working on interdomain routing, in particular practical issues associated with BGP and what the current and future problems are; and technical staff who plan to use BGP to peer with upstream ISPs in load balancing and multihoming scenarios.

Biography: Jia Wang received Ph.D. degrees in Computer Science from the Cornell University, Ithaca, New York, USA, in 2001. She is currently a senior technical staff member of the IP Management and Performance Department in the Internet and Networking Systems Research Center at AT&T Labs - Research in Florham Park, New Jersey. Her research interests include network measurement, routing and topology analysis, traffic flow measurement, overlay networks and applications, network security and anomaly detection, Web performance, content distribution networks, and other Internet related research work. She has published over 20 research papers in leading journals and conferences including ACM/IEEE Transactions on Networking, ACM Sigcomm, IEEE Infocom, WWW, and USENIX. She also served on several Technical Program Committees (most recently IEEE Infocom 2004).

Z. Morley Mao will be an assistant professor at University of Michigan at Ann Arbor starting January 2004. She received her PhD from University of California at Berkeley. She has spent several summers working for AT&T Labs-Research and one summer for Sprint Advanced Technology Labs where she has gathered many operational experience of how large ISPs manage and run their networks. Her research interests include network measurements, Internet routing, network security, and content distribution networks. She is one of the first to point out a particular feature - Route Flap Damping in BGP aimed at maintaining routing stability can have adverse effects on the Internet routing convergence process and worsen the routing performance. This result has been presented at various operational communities. Her thesis work focuses on Interdomain routing dynamics.


Friday, March 12, 2004

Title: Wireless Sensor Networks: A Systems Perspective
Speaker(s): Ramesh Govindan, Univ. of Southern California
Duration: Friday, March 12, 2004, 9.00 AM - 5.00 PM

Abstract: Sensor networks is an increasingly hot networking topic, yet, beyond the sensor networks community there is a lack of understanding of the problems the field is trying to solve. This tutorial will attempt to cut through the hype surrounding the subject and survey work done in the area till date. Presented from a systems and networking perspective, this tutorial will start with potential applications, and then cover the major subsystems in a sensor network, ranging from platforms and hardware up to application level support for network-level querying. The topics covered include:

  • Introduction
  • Applications
  • Goals of Sensor Networking
  • Hardware: Devices, Sensors, Platforms
  • Operating Systems
  • Energy-efficient Medium-Access
  • Localization
  • Time-synchronization
  • Sensor coverage and sensor calibration
  • Routing
  • Storage
  • Querying
  • Tracking
  • Monitoring
  • Security

Biography: Ramesh Govindan received his B. Tech. degree from the Indian Institute of Technology at Madras, and his M.S. and Ph.D. degrees from the University of California at Berkeley. He is an Associate Professor in the Computer Science Department at the University of Southern California. His research interests include Internet routing and topology, and wireless sensor networks.


Title: Current Practice in Broadband Access Networks: Architectures, Protocols, and Services
Speaker(s): Prof. Reuven Cohen, Dept. of Computer Science, Technion
Duration: Friday, March 12, 2004, 9.00 AM - 5.00 PM

Abstract: The dramatic changes in both consumer and business content production and distribution are attributed to the widespread availability of residential broadband access networks. New services, like voice over IP and Virtual Private Networks (VPNs), can now be delivered with the appropriate Service Level Agreements. Several technologies are competing to offer broadband access to residential users in the near and medium term future, among them are HFC (Hybrid Fiber Coax), ADSL (Asymmetric Digital Subscriber Loop) and Wireless MAN. The tutorial presents the current practice in residential broadband access networks, with an emphasis on architectures, protocols and services. It will address issues related to the MAC and upper layers, in the context of ADSL, Cable-Modem (DOCSIS) and Wireless MAN (802.16). Physical layer issues will not be addressed. The tutorial consists of the following parts:

  • The architecture of ADSL, DOCSIS (cable-modem) and 802.16 (Wireless access network).
  • MAC services for shared medium broadband access networks (contention, polling, UGS etc.).
  • QoS in shared medium broadband access networks (DOCSIS and 802.16) and in ADSL.
  • Connecting users to their service providers. The distinction between the role of the access operator and the role of the access provider.
  • Building an access-VPN, using tunneling protocols like PPTP, L2TP, IPsec and PPPoE.
  • Other broadband services like VoIP and home networking.

This tutorial is targeted for R&D engineers, operators, service providers and researchers in the field. Knowledge of basic IP networking concepts and protocols is required.

Biography: Reuven Cohen Received the B.Sc., M.Sc. and Ph.D. degrees in Computer Science from the Technion, Israel Institute of Technology in 1986, 1988 and 1991 respectively. From 1991 to 1993, he was with IBM T.J.Watson Research Center, working on protocols for high speed networks. Since 1993, he has been with the Department of Computer Science at the Technion, Israel Institute of Technology, where he is now a professor and the head of the Lab of Computer Communication Networking (LCCN). Prof. Cohen has consulted to numerous companies, including Hewlett-Packard, ECI Telecom, Terayon and Innowave, mainly in the context of protocols and architectures for broadband access networks. Prof. Reuven Cohen serves as an editor of IEEE/ACM Transactions on Networking, and ACM/Kluwer Journal on Wireless Networks (WINET). He has been serving for many years in the Technical Program Committee of numerous conferences and workshops. Dr. Cohen is a senior member of IEEE. He is heading the Israeli chapter of the IEEE Communication Society.


comm-soc-logo.gif (2156 bytes)    

Updated 03-03-2004 by Jack Lee and Jiangchuan Liu. For questions or comments about this website, please mail to yblee@ie.cuhk.edu.hk or csljc@ieee.org. For general or technical issues about Infocom'04, please contact Executive Committee.