will be held at
Tutorial Co-Chairs: Prof. W. J. Liao email@example.com and Prof. Krishna M. Sivalingam firstname.lastname@example.org
Sunday, March 7, 2004, Afternoon
Title: Wi-Fi: a journey from theory to practice
Traffic Grooming and Multigranular Switching in WDM Networks
Monday, March 8, 2004
Title: Network Security: Internet Infrastructure and Wireless
Title: Mobile Ad Hoc Networks: MAC, Routing
and Transport Layer Issues
Title: Peer-to-Peer Networking
Title: BGP-Interdomain Routing: Today and Tomorrow
Friday, March 12, 2004
Title: Wireless Sensor Networks: A Systems Perspective
Title: Current Practice in Broadband Access Networks:
Architectures, Protocols, and Services
Sunday, March 7, 2004, 1.30p - 5.00p
Title: Wi-Fi: a journey from theory to practice
Abstract: IEEE 802.11 (Wi-Fi) standard was designed as an indoor wireless replacement for Ethernet. With growing popularity, novel use of Wi-Fi are pushing the limits of technology. Examples include outdoor long distance links, metro scale deployments, high density enterprise networks and large scale industrial applications. Dynamic behavior of Wi-Fi networks in the above scenarios is not yet well understood due to complexity of modeling RF and MAC characteristics and lack of experimental studies. The speaker has recently rolled out the world's largest outdoor multi-hop Wi-Fi network and built tools for distributed monitoring of large scale Wi-Fi networks. This tutorial will present the lessons learned from analysis of RF signal and packet traces captured at several representative Wi-Fi deployments. These trace studies will illustrate that dynamic behavior of Wi-Fi networks needs further study and that currently known theoretical models are inadequate for predicting the behavior of large scale, high density Wi-Fi networks. The topics covered include:
This tutorial is intended for researchers and practitioners who want to track new developments in Wi-Fi. Computer professionals who want to develop better understanding of technology trends and identify new market opportunities in the area of wireless networking will also benefit from this tutorial. Basic understanding of layered network architecture is expected. No background in analog radio, signal processing, or wireless communication is required. Researchers who want to identify open research problems in the area of wireless networking will also find this tutorial useful.
Biography: Pravin Bhagwat is an entrepreneur and a well-known researcher in the area of wireless and mobile networking. He is the Founder and Chief Technology Officer of Wibhu Technologies, a wireless networking startup with offices in Sunnyvale, CA and Pune, India. Pravin recently spearheaded the world's largest 802.11b outdoor deployment project along 85 Km corridor between Kanpur and Lucknow (two cities in North India). He also holds adjunct faculty appointments at computer science department, IIT Kanpur and at WINLAB, Rutgers University, New Jersey. Prior to founding Wibhu Technologies, Pravin worked as a technology consultant in the Networking Research group at AT&T Research. Pravin started his career at IBM Thomas J. Watson Research Center, New York. He was the chief architect of BlueSky, an indoor wireless networking system for palmtop computers, and the inventor of TCP splicing, a technique for building fast application layer proxies.
Pravin actively serves on program committees of networking conferences and has published numerous technical papers and patents in the area of mobile computing and wireless communication. He is the Associate Editor of IEEE Transactions on Mobile Computing and has also served as a guest editor of IEEE Network. Pravin has a B.Tech. in Computer Science from IIT Kanpur and an MS/PhD in computer science from the University of Maryland, College Park, USA.
Abstract: In this tutorial we will first motivate, introduce, and formally define a number of variants of the traffic grooming and multigranular switching problems in optical wavelength division multiplexed (WDM) networks. We will discuss the relationship of these problems to the more well-known logical topology design and routing and wavelength assignment problems. We will review the latest results on the complexity of the traffic grooming and multigranular switching problems, and we will discuss the implications of these results to the design of practical algorithms. We will then review a number of algorithms for traffic grooming in ring topologies (with applications to SONET/SDH), star and tree topologies (with applications to WDM access networks), as well as general network topologies (with applications to metro and backbone WDM networks). The tutorial will place emphasis on the design of efficient and practical algorithms with performance guarantees in terms of the network cost. The topics covered include:
This tutorial is for researchers, optical network engineers, network designers, and network managers, as well as anyone involved in the design and provisioning of optical networks, including SONET/SDH and WDM networks. The tutorial will be self-contained, and requires only a good knowledge and understanding of basic networking concepts.
George N. Rouskas is a Professor of Computer Science at North Carolina
State University. He received the Diploma in Computer Engineering from
the National Technical University of Athens, Greece, in 1989, and the
M.S. and Ph.D. degrees in Computer Science from the College of
Computing, Georgia Tech, in 1991 and 1994, respectively. In 2000-2001
he spent a sabbatical term at Vitesse Semiconductor, and he has been an
Invited Professor at the University of Evry, France.
He received the 2003 NCSU Alumni Outstanding Research Award, a 1997 NSF
Faculty Early Career Development (CAREER) Award, the 1995 Outstanding
New Teacher Award from NCSU, and the 1994 Graduate Research Assistant
Award from Georgia Tech.
He is an editor of the IEEE/ACM Transactions on Networking, Computer
Networks, and Optical Networks, and has served as co-guest editor of
IEEE JSAC. He is the Program Chair of LANMAN 2004, and Program Co-Chair
of Networking 2004. His research interests include network
architectures and protocols, optical networks, and performance
Abstract: The Internet has witnessed enormous growth over the last decade and has become ubiquitous. Most of the R&D efforts in the past had been on improving the performance, scalability, and information assurance over the Internet. Information assurance assumes that the network devices responsible for encrypting and routing packets are trustworthy. Researchers are now questioning these assumptions, as several instances of security breaches have taken place recently wherein the Internet infrastructure (e.g., routers, servers) were compromised to the advantage of the malicious adversaries. Moreover, the growing concerns for "cyber terrorism" have made policy makers and researchers realize the importance of Internet infrastructure security. The pervasive nature of the Internet is fueled primarily by the growth of infrastructure-based wireless network technologies, such as wireless LAN and Mobile-IP. There also exists infrastructure-less wireless networks, such as mobile ad-hoc networks and sensor networks, which find applications in homeland security, disaster management, and military environment. In all of these, security is of great importance as these networks are being used for critical applications.
The goal of this tutorial is to present the state-of-the-art research and practice in Internet infrastructure security and wireless network security, to its audience. The tutorial will broadly be divided into four modules: (1) A taxonomy of Internet infrastructure attacks, (2) Internet routing attacks and countermeasures, (3) Denial of Service (DoS) and DDoS attacks and countermeasures, and (4) Wireless network security which includes security issues and key solutions in wireless LAN (802.11), mobile ad-hoc networks, and sensor networks. Performance and practical issues associated with the various countermeasures will also be discussed. The outline of topics is as follows:
Biography: Dr. G. Manimaran is an Assistant Professor in the Department of Electrical and Computer Engineering at Iowa State University, since January 1999. He received his Ph.D degree in Computer Science and Engineering from IIT Madras, India, in 1998. His research expertise is in the areas of Trusted Internet encompassing QoS, infrastructure security, reliability focusing on routing, multicasting, and DDoS issues; and resource management in real-time systems. He has co-authored around 90 peer-reviewed research papers in international journals and conferences/workshops, of which two conference/workshop papers received the best paper awards. He is a co-author of the text "Resource management in real-time systems and networks," MIT Press, 2001. He served as guest co-editor for the IEEE Network special issue on "Multicasting: An enabling technology," Jan/Feb 2003. He is a founding co-chair of the Trusted Internet Workshop held in conjunction with HiPC. He has served as a member of technical program committee of several IEEE conferences including ICC 2003 and Infocom 2004. He is a member of the IEEE, IEEE Computer and Communication Societies, and ACM. http://www.ee.iastate.edu/~gmani.
Dr. Anirban Chakrabarti obtained his Ph.D degree from the
Department of Electrical and Computer Engineering at Iowa State
University, in Fall 2003. His research expertise is in the areas
of QoS and overlay multicasting, and secure routing and
multicasting. He is a co-author of the paper titled "Internet
infrastructure security: A taxonomy," published in IEEE Network
special issue Nov/Dec. 2002. He has co-authored several research
papers in secure routing and secure/QoS multicasting. In addition
to his academic research, Dr. Chakrabarti had worked as an
intern/co-op in NEC Network laboratories in Heidelberg, Germany
in the area of packet based UMTS systems, and collaborated with
Intel Research at University of Berkeley in security aspects of
delay-tolerant networks. http://www.public.iastate.edu/~anirban
Abstract: A mobile ad hoc network is a collection of mobile wireless nodes that can dynamically form a network without necessarily using any pre-existing infrastructure. Due to the potential ease of deployment, many practical applications have been conceived for ad hoc networks, including personal area networking, home networking, and sensor networking. When designing mobile ad hoc networks, several interesting and difficult problems arise due to shared nature of the wireless medium, limited transmission range of wireless devices, node mobility, and energy constraints. This tutorial will present an overview of issues related to medium access control (MAC), routing, and transport in mobile ad hoc networks, including interaction between the different layers of the protocol stack. Techniques proposed to improve performance of MAC, routing and transport protocols will be discussed. In addition, the tutorial will briefly discuss some implementation-related issues, and mechanisms for integrating a mobile ad hoc network with wired networks. Finally, the tutorial will present a brief overview of some standards activities related to ad hoc networking. The topics covered include:
The intended audience includes students, faculty and engineers interested in wireless networking. Prerequisite knowledge includes understanding of basics of computer networking.
Nitin Vaidya is an Associate Professor of Electrical
and Computer Engineering at the University of Illinois at
Urbana-Champaign. He has held visiting positions at
Microsoft Research, Sun Microsystems and the Indian Institute of
Technology-Bombay. His current research interests are in the area of
wireless networking. His research has been funded by various
agencies, including the National Science Foundation, DARPA,
BBN Technologies, Microsoft Research and Sun Microsystems.
Nitin Vaidya is a recipient of a CAREER award
from the National Science Foundation. He served as
program co-chair for the 2003 ACM MobiCom conference. He has served
as editor for several journals, including IEEE Transactions on
Mobile Computing and IEEE/ACM Transactions on Networking.
For more information, please visit http://www.crhc.uiuc.edu/~nhv/.
Abstract: By many estimates, P2P file sharing accounts for more than 60% of Internet backbone traffic today. P2P file sharing is not only used to share MP3s, but also videos, documents, images and software. The P2P file sharing architectures have become sophisticated, with peers acting as both file servers and mini hubs for keyword searches, and with extensive use of parallel downloading. As of October 2003, the KaZaA P2P file sharing system alone typically has more than 3 million simultaneously-connected peers which share over 3,000 terabytes of content. File sharing is not the only class of successful P2P applications, however. For example, many of the instant messaging systems can be classified as P2P since direct TCP connections are established between the communicating participants; even the presence-detection component may migrate to server- less architectures in the future. As another example, in recent years numerous large-scale P2P computing projects have been deployed, including SETI@home and AIDS@home. Also, fully distributed VoIP systems, such as Skype have recently become popular. In parallel to the successful large-scale deployments of "industrial" P2P systems, the research community has been intensely pursuing P2P systems over the past few years. One of the most promising developments is a set of proposals for P2P look-up services based on Dynamic Hash Tables (DHTs). The DHT-base schemes, which include Chord, Pastry, Tapestry and CAN, organize the peers into structured overlay networks, and assign each data item to a specific peer. For example, with N being the number of nodes, the Chord look-up service allows any peer to locate the data associated with any key in O(log N) time; and in the Chord overlay network, each node only needs to know of O(log N) neighbors. Many promising applications can potentially be built on top of the DHT-based look-up services. These applications include cooperative file systems, P2P caching, multicast, mobility management, and presence detection. In this tutorial, we will explore in detail the unstructured "industrial" P2P systems as well as the structured DHT-based P2P systems. The tutorial will also include an important mathematical analysis component, drawing on tools from probability theory, optimization, and algorithms. We will survey experimental observations of P2P performance. We also cover diverse issues including the free-rider problem, incentives, reputation systems, P2P economics, resource markets, NAT and P2P, and copyright law as it applies to P2P.
Biography: Keith Ross joined Polytechnic University as the Leonard Shustek Professor in Computer Science in January 2003. Before joining Polytechnic University, he was a professor for five years in the Multimedia Communications Department at Eurecom Institute in Sophia Antipolis, France. From 1985 through 1997, he was a professor in the Department of Systems Engineering at the University of Pennsylvania. He received a B.S.E.E from Tufts University, a M.S.E.E. from Columbia University, and a Ph.D. in Computer and Control Engineering from The University of Michigan.
Professor Ross has made significant research contributions to the
theory and practice of computer networking throughout his career,
including work in P2P systems, audio and video streaming, content
distribution, quality of service, traffic engineering, loss networks,
and Markov decision processes. His interests in streaming technologies
and eLearning lead to the creation in 1999 of Wimba, for which he is
the founding CEO. Wimba is a venture-capital funded start-up that
develops and markets asynchronous voice technologies, accessible both
through the Web and through mobile phones.
Dan Rubenstein has been an Assistant Professor of Electrical
Engineering and Computer Science at Columbia University since 2000.
He received a B.S. degree in mathematics from M.I.T., an M.A. in math
from UCLA, and a PhD in computer science from University of
Massachusetts, Amherst. His research interests are in network
technologies, applications, and performance analysis, with a recent
emphasis on resilient and secure networking, distributed communication
algorithms, and overlay technologies. He has received an NSF CAREER
Award, the Best Student Paper award from the ACM SIGMETRICS 2000
conference, and a Best Paper award from the IEEE ICNP 2003 Conference.
Abstract: The Internet consists of tens of thousands of individually operated networks - Autonomous Systems (ASes). Interdomain routing is critical to the stability and performance of the Internet. As the Internet evolves, the scalability and robustness requirement on the interdomain routing protocol increases. It is therefore critical to understand the current interdomain routing protocol - Border Gateway Protocol (BGP). This tutorial is intended to provide answers to these questions: How does BGP work? What are the current problems of BGP? How can one study protocol dynamics through measurement and analysis? What changes are necessary for BGP to adapt to our needs? This tutorial will tell you what we know and what we don't know about interdomain routing as well as clarify common confusion and misunderstanding about BGP. It starts with an introduction to BGP, followed by an illustration of how BGP is used and configured today by commercial ISPs, methods to study BGP through measurement, and future challenges facing the interdomain routing. BGP is the current Internet routing protocol to achieve reachability across multiple domains or Autonomous Systems. It is also used by service providers to perform traffic engineering to control inbound and outbound traffic across multiple location and links. This tutorial would cover:
The intended audience includes researchers who are interested in working on interdomain routing, in particular practical issues associated with BGP and what the current and future problems are; and technical staff who plan to use BGP to peer with upstream ISPs in load balancing and multihoming scenarios.
Biography: Jia Wang received Ph.D. degrees in Computer Science from the Cornell University, Ithaca, New York, USA, in 2001. She is currently a senior technical staff member of the IP Management and Performance Department in the Internet and Networking Systems Research Center at AT&T Labs - Research in Florham Park, New Jersey. Her research interests include network measurement, routing and topology analysis, traffic flow measurement, overlay networks and applications, network security and anomaly detection, Web performance, content distribution networks, and other Internet related research work. She has published over 20 research papers in leading journals and conferences including ACM/IEEE Transactions on Networking, ACM Sigcomm, IEEE Infocom, WWW, and USENIX. She also served on several Technical Program Committees (most recently IEEE Infocom 2004).
Z. Morley Mao will be an assistant professor at University of Michigan
at Ann Arbor starting January 2004. She received her PhD from
University of California at Berkeley. She has spent several summers
working for AT&T Labs-Research and one summer for Sprint Advanced
Technology Labs where she has gathered many operational experience of
how large ISPs manage and run their networks. Her research interests
include network measurements, Internet routing, network security, and
content distribution networks. She is one of the first to point out a
particular feature - Route Flap Damping in BGP aimed at maintaining
routing stability can have adverse effects on the Internet routing
convergence process and worsen the routing performance. This result
has been presented at various operational communities. Her thesis work
focuses on Interdomain routing dynamics.
Abstract: Sensor networks is an increasingly hot networking topic, yet, beyond the sensor networks community there is a lack of understanding of the problems the field is trying to solve. This tutorial will attempt to cut through the hype surrounding the subject and survey work done in the area till date. Presented from a systems and networking perspective, this tutorial will start with potential applications, and then cover the major subsystems in a sensor network, ranging from platforms and hardware up to application level support for network-level querying. The topics covered include:
Ramesh Govindan received his B. Tech. degree from the
Indian Institute of Technology at Madras, and his
M.S. and Ph.D. degrees from the University of California
at Berkeley. He is an Associate Professor in the
Computer Science Department at the University of
Southern California. His research interests include
Internet routing and topology, and wireless sensor networks.
Title: Current Practice in Broadband Access Networks:
Architectures, Protocols, and Services
Abstract: The dramatic changes in both consumer and business content production and distribution are attributed to the widespread availability of residential broadband access networks. New services, like voice over IP and Virtual Private Networks (VPNs), can now be delivered with the appropriate Service Level Agreements. Several technologies are competing to offer broadband access to residential users in the near and medium term future, among them are HFC (Hybrid Fiber Coax), ADSL (Asymmetric Digital Subscriber Loop) and Wireless MAN. The tutorial presents the current practice in residential broadband access networks, with an emphasis on architectures, protocols and services. It will address issues related to the MAC and upper layers, in the context of ADSL, Cable-Modem (DOCSIS) and Wireless MAN (802.16). Physical layer issues will not be addressed. The tutorial consists of the following parts:
This tutorial is targeted for R&D engineers, operators, service providers and researchers in the field. Knowledge of basic IP networking concepts and protocols is required.
Biography: Reuven Cohen Received the B.Sc., M.Sc. and Ph.D. degrees in Computer Science from the Technion, Israel Institute of Technology in 1986, 1988 and 1991 respectively. From 1991 to 1993, he was with IBM T.J.Watson Research Center, working on protocols for high speed networks. Since 1993, he has been with the Department of Computer Science at the Technion, Israel Institute of Technology, where he is now a professor and the head of the Lab of Computer Communication Networking (LCCN). Prof. Cohen has consulted to numerous companies, including Hewlett-Packard, ECI Telecom, Terayon and Innowave, mainly in the context of protocols and architectures for broadband access networks. Prof. Reuven Cohen serves as an editor of IEEE/ACM Transactions on Networking, and ACM/Kluwer Journal on Wireless Networks (WINET). He has been serving for many years in the Technical Program Committee of numerous conferences and workshops. Dr. Cohen is a senior member of IEEE. He is heading the Israeli chapter of the IEEE Communication Society.
Updated 03-03-2004 by Jack Lee and Jiangchuan Liu. For questions or comments about this website, please mail to email@example.com or firstname.lastname@example.org. For general or technical issues about Infocom'04, please contact Executive Committee.