Design & Developers Forum
In additional to the technical symposia, IEEE Globecom 2005 will feature the 3rd Annual Design & Developers Forum and the Telecom Business Forum. The forums are designed to meet the needs of the industry and to provide attendees a broad interest programming focused on telecommunication industry participation and attendance. Both forums are included with the IEEE Globecom 2005 registration.

Tuesday, 29 November 2005, 10:30AM-12:15PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Modeling and Simulation Tools for Network Designers
Session Organizer/Chair:
Jack L. Burbank and William T. Kasch, Johns Hopkins University, USA
Speakers:
Jack Burbank, JHU/APL
Brian Haberman, JHU/APL
William Kasch, JHU/APL
Jon Ward, JHU/APL
Julia Andrusenko, JHU/APL

Session Overview:
This forum provides an overview of modeling and simulation (M&S) tools and techniques available to assist network designers and developers. M&S is a critical element in the design, development, and test and evaluation (T&E) of any network product or solution. In many cases, M&S provides the only method to gain insight into the performance of the eventual product or solution in a large-scale environment, and allows for more informed design trade studies. The goal is to provide attendees an overview of many of the M&S tools and techniques that are available to assist them in their projects.

Description:
The forum would nominally consist of six presentations in the following areas relevant to M&S:

  • Network M&S - This presentation would provide an overview of existing network M&S tools, such as OPNET, NS2, QualNet, and GloMoSim, contrasting the strengths and weaknesses.
  • Hardware-in-the-loop M&S - This presentation would provide an overview of hardware-in-the- loop (HITL) M&S methods, describing the appropriate applications of HITL applications, and providing novel examples of HITL techniques.
  • Distributed simulation - This presentation would provide an overview of distributed computing methods, and discuss the application of network M&S tools in a distributed environment in order to achieve high-powered M&S capabilities.
  • Waveform M&S tools - This presentation would compare and contrast existing waveform M&S tools, such as MATLAB, SimuLink, and SPW.
  • Propagation models - This presentation would compare and contrast existing propagation M&S tools, such as Wireless Insite.
  • M&S development tools - This presentation would focus on the tools that assist in the development of M&S tools, such as software configu ration management (SCM) tools.

Tuesday, 29 November 2005, 2:00PM-5:45PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Security and Manageability in Handheld Devices
Session Organizer/Chair:
Robert Hasbun, Intel Corp., USA

Presenters:
Robert Hasbun, Intel Corp., USA
Security and Manageability In Handheld Devices: Overview
Tony Walters, Certicom, USA
Mobile Cryptography Needs, Now, And Future
Rakesh Kushwaha, CTO mFormation, USA
Mobile Management And Configuration
Luosheng Peng, CEO Innopath
OTA Update Evolution In Mobile
Vincent Prunet, Director, Mobile & Trusted Devices, USA
Trusted Execution In Mobile

Session Overview:
The requirements and impacts of security & manageability on the handset will be reviewed in depth from a platform perspective. Platform trust, HW vs SW implementations, how to address piracy, theft and malicious code, and the need for an inherently manageable platform will be explored in the context of a cellular client.

Description:
Many new services & handset capabilities are being offered to subscribers as competition for the subscriber’s wallet continues to grow. These new services are driving an architectural shift from closed & proprietary handset architectures to architectures that are relatively open, interoperable, and updateable. New services such as music downloads, digital broadcasts, e-purchasing, and gaming have a common thread – they all require robust and coherent security on the handset. They also need the capability to remotely manage the handset to mitigate service costs, enable robust distribution, and ensure a quality experience for the user. The requirements and impacts of security & manageability on the handset will be reviewed in depth from a platform perspective. Platform trust, HW vs. SW implementations, how to address piracy, theft and malicious code, and the need for an inherently manageable platform will be explored in the context of a cellular client.


Wednesday, 30 November 2005, 10:15AM-12:15PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Ubiquitous Networks Design and Applications-I
Session Organizer:
Ryoichi Komiya, Multimedia University, Malaysia
Session Chair:  
Junichi Kishigami,  
NTT

Speakers:
Junichi Kishigami,
NITT
Overview of Unbiquitous Networks and Applications
Stan Moyer,
Telecordia,
Enabling and Managing Ubiquitous Services Ability
Hitomi Murakami
, KDDI
The Role of a Mobile Terminal in the Ubiquitous Network
Masashi Shimizu
, NDTT
A Practical Example of RFID use as Ubiquitous Devices

Enabling and Managing Ubiquitous Service Availability

This talk presents an approach for providing an administrable dynamic service environment in which service platforms supporting different capabilities can appear and disappear at will and without warning. This phenomenon is seen in mobile devices such as mobile phones, automobiles etc.... but the solution is also directly applicable to environments in which the capabilities can be used to offer reliability via redundancy and failover.

Services in mobile environments will have to work in the presence of variable local facilities - either the services themselves have to be coded to accommodate this variability, or we must provide Service Enablers to do it on a more universal basis.  We need to be able to support services that:
   * Are portable across multiple devices
   * Are agnostic to the specific manufacturer and model of device on which they are executing
   * Can exploit (logically) local facilities
   * Meet traditional telecom goals of availability and dependability

The work described provides a managed environment in which novel services can be deployed and to enable these services to take best advantage of the capabilities of the devices in their logical vicinity...and then to 'rent' this environment out to third parties or to be responsible for its management.

The role of a mobile terminal in the Ubiquitous network

Ubiquitous network is a paradigm which provides a universal connectivity and opportunity for best suited services to users. We have been very active in the area of the development of Ubiquitous network. We believe that one of the key enablers of such paradigm is a mobile terminal. KDDI has been implementing a number of enablers in the terminal such as local interface (e.g., Bluetooth), GPS, navigation, music, mobile middleware (e.g., BREW).  Recently, KDDI released a trial RFID reader equipped mobile phone which can interact with the real objects with RFID tags. Thus the terminal may resolve the ID and get contents via network wherever appropriate. This could be a bridge between real object (world), human and virtual world. In the panel, we would like to discuss the potential applications with such a terminal and how this could contribute to ubiquitous services / network.  We would also like to discuss the evolution of network itself to support ubiquitous service and applications.

A practical example of RFID used as "Ubiquitous devices"

RFID are an interesting approach to accessing anything through the network.   The most commonly mentioned variant is the passive RFID, but it has several serious problems.   Passive tags demand high power readers and the link margins are poor. Metallic packages and liquid contents degrade the read rate.    We will describe some actual applications of passive RFID including demonstration experiments.   The results of these points out that RFID user require greater reading reliability.   Active tags need a battery and are more expensive than passive tags. However, they do have long communication range and sensor capability.   We focus on using active tags to realize "Ubiquitous communication".   This presentation will describe the following.

  1. Principle of passive tags.
  2. Real applications of RFID
  3. Active tag capability
  4. Frequency allocation
  5. RFID in future

Wednesday, 30 November 2005, 2:00PM-5:45PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Ubiquitous Networks Design and Applications-II
Session Organizer:
Ryoichi Komiya, Multimedia University, Malaysia
Session Chair:  
Junichi Kishigami,  
NTT

Presenters:
Mick Wilson, Fujitsu Laboratories of Europe
Ubiquitous Services to the Success of a Ubiquitous Network
Peter Yan,
Erlang Technologies
RapidIO Technology Overview and Applications
John Vincente,
Intel, USA
Wireless Mesh Networking: Moving Toward Ubiquitous Computing

Panel Discussion: Future R&D Direction of Ubiquitous Telecommunication Systems and Applications

Ubiquitous Services: Key to the success of a Ubiquitous Network
The emergence of the mobile, wireless and ubiquitous network has made it necessary to develop a highly dynamic and distributed infrastructure for ubiquitous services. To realise this, the challenge is to develop an architecture that takes into account both the emerging technical innovations and the business associations that are fundamental to the success of this new technology.

In our investigation, three significant technological concepts have been identified that support the notion of ubiquitous service:

•  Context Awareness and Management
•  Context Aware Services
•  Resource Management & Control

Assessing these technologies in conjunction with potential organisation models influenced the ubiquitous service architecture that was developed in Fujitsu Laboratories.

Three main roles associated with the concepts are the Service Provider, the Context Provider and Resource Operator.   These roles may be provided by separate organisations depending on the specific end-to-end Ubiquitous service.   The interactions between these parties are the key interfaces to enable an open and flexible deployment of CAS within these parties.

This paper will give an overview of that architecture and how it met the requirements of the targeted business models.   In addition the paper will describe the technology used to implement the architecture to realise two demonstration scenario; an office support system and a personal advertisement service.

RapidIO Technology Overview and Applications
RapidIO is a high-performance, packet-switched; interconnect technology which addresses the embedded, computing and communications industry's need for reliability, increased bandwidth, and Quality of Service in an intra-system interconnects. The RapidIO interconnect allows chip-to-chip and board-to-board communications at performance levels scaling from one to eighty Gigabits per second and beyond. New RapidIO specifications add essential capabilities for industry board standards such as VME's VITA 41, VITA 42, and for PICMG's Compact TCA and Advanced TCA (Telecommunications and Computing Architecture). The RapidIO Interconnect Architecture is designed to be compatible with the most popular integrated network processing units, communications processors, host processors, and networking digital signal processors. Starting out as a pet project for a high-speed, chip-to-chip interconnect technology in the late 1990s, who would have guessed that by 2005 hundreds of companies from all around the world would be contributing to an international open standard that has the potential to become the leading fabric in embedded, computing, and communications systems? Join us as we introduce RapidIO with its advanced features for reliable transmission, data streaming, and flow control enabling nonblocking switching and high Quality of Service.   Sample applications will be used to describe RapidIO's role in Ubiquitous Networks Design.

Wireless mesh networking: moving towards ubiquitous computing
This talk presents a direction towards ubiquitous computing through wireless mesh networks. Using overlay methods, stored predictability and autonomic techniques, the work proposes to enable self organizing, self-managed personal networking. ?

Panel Discussion:
There have been so many implementations and field trials of ubiquitous networks and applications in the world today. In this panel discussion, it is intended to seek the future R&D directions for the ubiquitous telecommunication systems and applications. There are still many open issues how the tiny sensors can be implemented in individuals, objects, environments, computers, etc.. and how these entities can promote person to person, person to object, object to object communications by using the ubiquitous technologies. These issues would be discussed between six panels and audience.  


Wednesday, 30 November 2005, 10:30AM-12:15PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Congestion Management in Packet Transport Networks
Session Organizer/Chair:
Jeremy Bicknell, Integrated Device Technology, Inc.

Presenters:
Gary Lidington, Xelerated
The First Carrier Ethernet Optimized NPU
Jeffrey L. Wise,
Motorola Computer Group
Congestion Management in System Fabrics
Marek Tlalka,
Ample Communications,
Congestion Management in Statistically Multiplexed Ethernet Applications
Alex Kloth, Staff Product Manager, NP Products, Hifn, Inc.

Description:

As packet transport technology and service provider industry practice converges on Ethernet access, one of the challenges to be met is the provision of a transport layer that can be used for both existing TCP/IP based traffic overlays as well as other existing and future applications that operate with low link utilization characteristics.
More and more, network equipment manufacturers are looking at Ethernet aggregation as a way to reduce the per-port cost of providing services. Intelligent oversubscription logic at the MAC layer allows processing costs to be distributed over a larger number of ports and with higher bandwidth utilization. However, care must be taken to ensure that only lower priority traffic gets affected by the inevitable periods of congestion.
These considerations are already well-know to chip designers and System architects and have prompted various ad-hoc and standard solutions to be proposed, so far with varying degrees of adoption. Such solutions generally involve schemes for first detecting congestion and then removing it by taking action based on an established traffic priority.
This forum examines state-of-the art hardware and a proposed update to Ethernet standards that promises to address congestion management head on.


Wednesday, 30 November 2005, 2:00PM-5:45PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Session Border Controller IP-IP Peering in VoIP Networks
Session Organizer/Chair:
Bernard Ku, SBC Laboratories, Inc.

Distinguished Experts:
Satish Parolkar, SBC Labs, USA
Why VoIP Carriers Need Session Border Controllers?
Martin Dolly
, AT&T Labs, USA
Carriers’ Requirements Of Session Border Controller
Kevin Klett
, Acme Packet, USA
Session Border Control for Service Provider Network Peering
Itzik Parnafes
, Kagoor Networks (now part of Juniper Networks), USA
Packet Gateways: Realignment of S/BC Functionality

Description:
Session Border Controllers (S/BCs) have become an important network element of modern VoIP networks as service providers are focusing on protecting the integrity of the networks and business models while offering diverse services to their customers. S/BCs are being recommended for deployment in several network configurations to establish secure and quality Voice communications over IP networks. These could potentially be deployed between (1) an Enterprise and the Carrier network, or between (2) two Carrier Networks, or (3) a Carrier and an Applications Provider Network. However, the vendor developments are not consistent and lack the needed definition to allow interoperability between vendors.

S/BC deployment will require agreements on policies and procedures between carriers broadly in following areas: Service Reach, Security, Service Quality, Accounting, and Network Management.
Service Reach: To widen the service reach first and foremost peer networks need to agree on the signaling protocol used, secondly, on mechanism to locate subscribers in each others domains and thirdly, may require mechanisms to bridge calls between IP phones located in the private IP address space and the ones hosted on public IP address space.
Security: To ensure that security concerns of peer networks are met, agreements are needed on policies that help protect the VoIP infrastructure.
Service Quality: Service and Voice quality assurance requires agreements between peer networks on class of service definitions for interworking QoS and mechanisms to monitor the quality.
Accounting: Peer Networks need to agree on call details that need to be exchanged between network operators in a meaningful form for settlement and revenue assurance purposes.
Network Management: Tools and procedures need to be identified to track faults across network boundaries.

This D&D forum aims to provide different perspective of the S/BC functions as viewed by service providers and vendors. The distinguished experts assembled for this panel will discuss their visions and new ideas and to identify which functions are the most important for deployment of S/BC to support future VoIP applications.


Thursday, 1 December 2005, 10:30AM-12:15PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Success Strategies for Customer-Premise-Based IP Telephony Solution
Session Organizer/Chair:
Wayne Crolley, AES Engineering, USA

Presenters:
(Design)
John Breen, AES Engineering, USA
Steve Woods, SBC Engineering, USA

(Deliver)
Tony Stamper, National Data Organization- SBC, USA
Eric Sineath, Practice Lead- Advanced IP- Callisma, USA

(Manage)
Mike James, Datacomm Services Customer Care- SBC, USA

Description:
This half-day forum discusses strategies and methodologies used in the design and deployment of customer premise-based IP Telephony solutions. Because of the paradigm shift created by the introduction of soft switches into businesses and complexities associated with this technology, challenges facing the design and deployment of these solutions require new and innovative strategies to ensure success.
Presentations will be made by multiple disciplines including Marketing, Consulting, Design Engineering, Project Management, Field Engineering, and Customer Support. Discussions will center around how each discipline associated with this type of solution uses Best Practices and Agile Methodologies in the delivery of these solutions with a holistic approach.


Thursday, 1 December 2005, 2:00PM-5:45PM
Majestic Ballroom A / Level Two / Renaissance Grand Hotel
Enhanced Services for the Converged Wi-Fi and Wireless Networks
Session Organizer/Chair:
Seshadri Mohan, University of Arkansas, Little Rock, USA

Presenters:
Darek Smyk,
Software Systems, USA
John Waclawsky,
Motorola, USA
Wayne Crolley,
SBC, USA
Seshadri Mohan,
University of Arkansas at Little Rock, USA

Description:

With revenue from voice services flattening or falling off, wireless and wireline carriers are seeking new revenues from enhanced services facilitated by the convergence taking place in the wi-fi and wireless arenas. The wireless carriers are attempting to deploy enhanced services involving voice, data, picture, video, multimedia, messaging, conferencing, and others. The emergence of new enhanced services over wireless networks, that have hitherto been possible only in limited cases, is now possible due to the confluence of four evolving arenas: the disparate wireless networks involving TDMA, CDMA, GSM, GPRS, EDGE, and 3G; new smart handsets with open OS (Symbian, Mobile 2003, Linux), enhanced full color displays, multiple radio interfaces including wi-fi and power of processors that are ever increasing approaching that of laptops; the evolution in middleware such as .Net, Java, web services; open standards and architectures being discussed and developed in standards bodies such as IETF, ITU, 3GPP, and 3GPP2 as well as industry consortia efforts such as Open Mobile Alliance (OMA) and Unlicensed Mobile Access (UMA). This panel will explore the various facets of convergence and new services that are now possible due to the multi-faceted evolution process sweeping the industry.



For Additional Information Please Contact
· Dr. Roobik Gharabagi (Co-Chair), gharabr@slu.edu
· Dr. Norival Figueira (Co-Chair), norival@ieee.org
· Dr. Dilip Krishnaswamy (Vice-Chair), dilip.krishnaswamy@intel.com
· Dr. Seshadri Mohan (Vice-Chair), sxmohan@ualr.edu