4th  Workshop on  Applications and Services in Wireless Networks 

Boston University

Boston, Massachusetts, USA

August 8-11, 2004

IEEE TCPC

WWRF-WG2

Tutorials

Committees

Program

Call for Papers

Tutorials

Camera-ready Instructions

Sponsors

Registration

Logistics

Boston

Home

 

Sunday, August 8, 2004

08:30 - 12:00  Tutorial A (half day): Integrated Public Wireless Networks
                          Dr. Milind M. Buddhikot (Bell Labs)

01:30 - 05:00  Tutorial B (half day): Security in Public Wireless Networks
                          Dr. Milind M. Buddhikot (Bell Labs)

Tutorial A (half day): Integrated Public Wireless Networks

SPEAKER:  Dr.  Milind M. Buddhikot (milind@dnrc.bell-labs.com)
                      Lucent Bell Labs, USA

 SUBJECT AREA: Broadband Wireless Technologies, Integrated Public Access Networks

ABSTRACT

Local and wide-area wireless data networks are becoming increasingly important in providing ubiquitous seamless connectivity to end-users. Third generation wide-area networks such as CDMA-2000 and UMTS have been standardized and are gradually being deployed. In local-area wireless networks common in enterprises, home and public hot spots, the IEEE 802.11b standard is seeing explosive growth. This tutorial will provide detailed discussion of the state-of-the-art architectures, protocols, network elements, systems and open research questions in key broadband wireless technologies such as 802.11, CDMA2000, UMTS, 802.16 and emerging multi-hop all wireless mesh networks. Particular emphasis will be on the aspects of security and service integration between different technologies, as seamless inter-technology roaming and ubiquitous connectivity are perceived as the key to the success of broadband wireless.  The tutorial will include demonstrations that will use Verizon’s live 1XRTT or EV-DO network and key technologies developed in Bell Labs to illustrate various aspects of Integrated Public Wireless Networks.

TUTORIAL OUTLINE:

MODULE I:  Introduction and Outline

1.  Tutorial summary and what to expect

MODULE II : 802.11  WLANs

1.  Basic terminologies: Ad hoc, Infrastructure modes, ESSID, BSSID, DS etc.
2.  Overview of MAC and air interface protocols
3.  Authentication and association in IEEE 802.11 networks

1.  Basic 802.11 Open and Shared Key authentication
2.  Wireline Equivalence Privacy (WEP)

bullet

RC4 encryption in brief

bullet

Why WEP is broken? Various limitations and practical attacks

bullet

Shamir Result: “WEP unsafe at any key length”

3.  Dynamic authentication using 802.1x Port Access Control and 802.11i Standard

bullet802.1x Concepts, EAP-over-LANs (EAPOL) protocol
bulletExtensible Authentication Protocol (EAP) details
bulletAAA Concepts. RADIUS and EAP-over-RADIUS
bulletExample EAP-Methods
bullet

Short overview of TLS, Tunneled TLS (TTLS), PEAP
Comparative evaluation and relevance to new deployments

bullet

WEP Enhancements:

bullet

Temporal Key Integrity Protocol (TKIP)

bullet

Miachael MIC, WARP, AES

4.  WLAN Switching and centralized management of 802.11 networks

bulletCurrent trends, vendor approaches (Aruba, AirEspace, Trapeze)

5.  802.11e, WIMAX standard overviews
 

MODULE III : 3G wide-area networks

1.  CDMA 2000 architecture

bullet

Removable User ID Modules (R-UIM), BSC, RNC, PDSN

bullet

Basics of air interface, Radio Access Network, Core network

bullet

Simple IP, Mobile IP modes

bullet

Security architecture: Details of MIP options and authentication

2.  UMTS architecture

bullet

Basics of air interface, Radio Access Network, Core network

bullet

SIM/USIM, Node B, RNC, HLR, VLR

bullet

General Packet Radio Service (GPRS): Release 4, 5, 6
bullet

SGSN/GGSN details

bullet

Handling mobility

bullet

Security architecture

3.  Authentication, key exchange and billing in 3G networks

bulletGSM SIM authentication and encryption protocol
bulletUMTS AKA authentication and encryption protocol

 

MODULE IV : Integration of local-area and wide-area wireless networks

1.   Why do we need integration anyway?

bulletIntegrated Network Service models and requirements
bulletVoice and data services
bulletChallenges posed by integration
bulletConcepts of Roaming Agreements, AAA broker networks

2.  Network Architectures for Integrated Networks

bulletTight-integration and Loose-Integration architecture
bulletImplications on 3G network and client
bulletAdvantages and disadvantages of each architecture.
bulletLoose integration as a preferred approach
bulletStandards activities
bulletDiscussion of new network element – 802.11 Integration gateway and
protocols in two architectures

3.  Authentication Protocols in Integrated Networks

bulletSIM/U-SIM based protocols: EAP-SIM, EAP-AKA
bulletProtocol details, Identity privacy, Fast Re-auth, Key Derivation,
HLR communication options and overheads
bulletKnown attacks on EAP-SIM
bulletComparative evaluation of the schemes

4.  Design and Implementation of an Integration gateway

bulletFeature, service set and details on example implementation called IOTA
bulletPerformance numbers of a gateway implementation

5.  Design and Implementation of Integrated Network Access Client

bulletFeatures. Interface switching and Bounce protection algorithms.
bulletWindows XP/2000 implementation details
bulletPerformance numbers on network switching
bulletDemonstration

6.  “WI-Fi-On-Go”: Providing 802.11 access on Buses, Trains and Portable Hot-spots

bullet802.11 access integrated with 3G aggregation links to the internet
bulletDesign and performance of a gateway with 802.11 access interfaces
and 3G uplinks
bulletMIP, RADIUS issues.
bulletLink striping for fatter 3G uplinks
bulletDemonstration

7.  Managed Ad-hoc relays for 802.11 and 3G Range Extensions

bulletUsing 802.11a,b 802.16 ad-hoc multi-hop relays to extend 802.11 and
3G Range
bulletAdvantages of managed ad-hoc relays
bulletNetwork architecture with ad-hoc relays: Example implementation
bulletDemonstration

8.  Voice services: a special case

bulletIntegrating voice services: Service model, implementation options using
Home Base Stations (HBS)
bulletVOIP, QoS and signaling issues
bulletDemonstration

MODULE V : State-of-the-art in Systems and services

1.  Windows, Linux support for 802.11, 802.1x

2.  RADIUS, DIAMETER products and free-software

3.  UMTS, CDMA 2000 modems.

4.  SIM, USIM, R-UIM smart cards

5.  Current vendors for all components and services ReefEdge, Ecutel, IPUnplugged, Boingo, Telepath, Waypoint, Mobilestar, Verizon Express Network

CONCLUSIONS

 

POTENTIAL AUDIENCE:

For engineers, graduate students, executives, and practitioners in the field of 3G and 802.11 technologies.  Ideal for people who are getting introduced to these new exciting public wireless networks and aspects of their integration.


SPEAKER’S BIOGRAPHY RELEVANT TO THE TUTORIAL SUBJECT

The speaker has extensive experience in various aspects of wireless networks ranging from mobility management protocols, authentication and key exchange, design of wireless access gateways, and client and network software systems for wireless networks.

The speaker  is a co-architect of the Shared Key Exchange (SKE) scheme currently under consideration for standardization in IETF.  Dr. Buddhikot is currently the technical leader of the team responsible for implementing EAP-SIM, EAP-AKA and EAP-SKE authentication protocols in Lucent NAVIS AAA product.

Dr. Buddhikot was a key member of the team that developed Lucent Technologies’ 802.11+3G integration architecture strategy and built the 802.11/3G IOTA integration gateways.  The project titled IOTA  that he was part of addressed various aspects of high performance integration such as (1) network architecture for integration, (2) Design and implementation of new network element called integration gateway, (3) Client side OS and application support for handling mobility, (4) High speed access in mobile hot-spots, (5) Efficient authentication and key exchange,  (6) New mobility mechanisms that improve on MobileIP, and (7) Techniques for range extensions of 3G and 802.11 networks. The technology this team developed has been demonstrated to service providers and also in trade shows such CTIA 2003 in New Orleans. 

The speaker has 6 papers and 5 patents (pending) on various topics covering the area. The  IOTA team was awarded a prestigious Bell Labs President’s Silver Award for outstanding innovations and contributions in March 2003 and Bell Labs Team Award in Dec 2003.

 

RELEVANT PUBLICATIONS AND TALKS

  1. M. Buddhikot, G. Chandranmenon, S. J. Han, Y. W. Lee, S. Miller and L. Salgarelli, Integration of 802.11 and Third Generation Wireless Data Networks, Proceedings of IEEE Infocom 2003, San Francisco, April 2003.
  2. M. Buddhikot, G. Chandranmenon, S. J. Han, Y. W. Lee, S. Miller and L. Salgarelli, Design and Implementation of a WLAN/CDMA2000 Integration Architecture, Special Issue of IEEE Communications Magazine on 3G+802.11 Integration, Nov 2003.
  3. L. Salgarelli, M. Buddhikot, J. Garay. S. Patel, S. Miller, Efficient Authentication and Key Distribution in Wireless IP Networks, Special Issue of IEEE Wireless Communications Magazine, Nov 2003.
  4. M. Buddhikot, A. Hari, K. Singh and S. Miller,  MobileNAT: A New Technique for Mobility Across Heterogeneous Address Spaces Proceedings of First ACM International Workshop on Mobile Applications and Services in Hotspots (in conjunction with ACM Mobicom 2003), Sept 2003, San Diego Longer version invited for Special Issue of ACM/Kluwer Journal of MONET.
  5. Salgarelli, L, Buddhikot, M., Garay, J., Miller, M.,  EAP SKE Authentication and Key Exchange Protocol, IETF Internet draft, draft-salgarelli-pppext-802.11-auth-02.txt.
  6. Blumenthal, U., Buddhikot, M., Garay, J., Miller, S, Patel, S., Salgarelli, L., and D. Stanley, A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks, Bell Labs Technical Journal Special Issue on Wireless Networking, 7(2), pp. 37-48. 2002.
  7. Milind Buddhikot, “New Technologies for Integrated Public Wireless Networks,” (Invited Talk) OpenSig 2003, Columbia University, NY, Oct 9, 2003. Also, talk at Rutgers WINLAB, Nov 4, 2003, and WICAT Brooklyn Polytech, Jan 16, 2004.

IOTA Relevant details and publications can be found at URL

http://www.bell-labs.com/~mbuddhikot/IOTAProject/IOTA.htm

 

SHORT BIOGRAPHY OF THE SPEAKER

Milind M. Buddhikot is a Member of Technical Staff in the Center for Networking Research at Lucent Bell Labs. His research interests are in the areas of systems and protocols for public wireless networks, dynamic authentication and key exchange, multihop wireless and dynamic spectrum access. Milind holds a Doctor of Science  (D. Sc.) in computer science (July 1998) from Washington University in St. Louis. He has served on program committees of several conferences and currently serves as the Editor of IEEE/ACM Transaction on Networking (TON).  Milind is a key member of the team that developed Lucent Technologies’ 802.11+3G integration architecture strategy and built the 802.11/3G IOTA integration gateways.  The team was awarded the prestigious Bell Labs President’s Silver Award for outstanding innovations and contributions in March 2003 and Bell Labs Team Award in Dec 2003. Milind is also a co-architect of the Shared Key Exchange (SKE) scheme and a technical leader of the team responsible for implementing EAP-SIM/AKA and EAP-SKE protocols in Lucent NAVIS AAA product.

 

DETAILED BIOGRAPHY OF THE SPEAKER

Milind M. Buddhikot is a Member of Technical Staff in the Center for Networking Research at Lucent Bell Labs.  His research interests are in the areas of systems and protocols for public wireless networks, dynamic authentication and key exchange, multihop wireless, dynamic spectrum access, MPLS path routing, and multimedia messaging and stream caching. Milind holds a Doctor of Science  (D. Sc.) in computer science (July 1998) from Washington University in St. Louis, and a Master of Technology (M.Tech.) in communication engineering (December 1988) from the Indian Institute of Technology  (I.I.T.), Bombay.  At Washington University, Milind was a member of the Applied Research Laboratory (ARL), where he worked on his Doctoral Research project “Project MARS” funded by NSF’s National Grand Challenges grant aimed at building scalable Multimedia-on-Demand Services and Servers. He has authored over 22 research papers and 7 patent submissions in the design of multimedia systems and protocols, layer-4 packet classification, MPLS path routing, and authentication and dynamic key exchange. Milind currently serves at the Editor of IEEE/ACM Transaction on Networking (TON). He also served as a co-guest-editor of IEEE Network magazine's March 2001 Special issue on “Fast IP Packet forwarding and Classification for Next Generation Internet Services”.  He has served in the capacity of tutorial chair for IEEE LCN 94, 95, publicity chair for NOSSDAV97, program committee member of SPIE MMCN 2001, 2003, IEEE ICNP2002, 2003, 2004, IEEE LCN 93 to IEEE LCN 2000 and served as a reviewer for IEEE TON, IEEE JSAC, ACM Multimedia, IEEE Infocom, ACM SIGCOMM, and IEEE Multimedia magazine.

Speaker Web page: http://www.bell-labs.com/user/mbuddhikot/

 

Tutorial B (half day): Security in Public Wireless Networks
 

SPEAKER: Dr. Milind M. Buddhikot (milind@dnrc.bell-labs.com)
                      Lucent Bell Labs, USA

SUBJECT AREA:  Security, Broadband/Public Wireless Networks, 3G and 802.11 Networks

 ABSTRACT

Recent trends indicate that two complementary technologies, namely IEEE 802.11 Wireless LANs (1-54 Mbps, 100-300 feet range) and Third generation (3G) wide-area wireless networks (64Kbps to 2.4 Mbps, few kms range) such as CDMA2000 and UMTS will compete and co-exist to offer wireless Internet access to end-users.  One key aspect of these networks is the security architecture and associated protocols used to authenticate, encrypt and bill end user communication. The authentication phase is the first step that verifies user credentials, establishes required service class, derives session keys such as encryption and anonymization keys and commences billing before the user can access network services.

The performance and flexibility of wireless data services will be dramatically improved if users can seamlessly roam across the two kinds of networks. Given this, the Network Service Providers (NSP s) will integrate their networks using roaming agreements that allow such seamless roaming. Efficient, high performance authentication and re-authentication and derivation of session keys using a common profile shared among all NSPs will play a critical role in such integration.

This tutorial will focus on emerging stand-alone and integrated local and wide-area wireless networks such as 802.11, 3G1X, 1XEV-DO and UMTS.  It will provide in-depth knowledge of state-of-the-art security architectures, protocols, and network and client systems for user authentication, dynamic session key negotiation, encryption and accounting in these networking technologies.  It will also highlight known limitations, attacks, and security weaknesses.

TUTORIAL OUTLINE

 MODULE I (5 mins):  Introduction, Motivation and Outline

  1.  Tutorial outline and summary

MODULE II (TOTAL: 90 mins): Authentication, Key exchange and Encryption in 802.11 Networks

  PART 1 (10 mins): Basics of network architecture

1.  Basic network architecture:  Ad hoc, Infrastructure modes. Addressing, packet formats. Concepts of roaming, L2/L3 mobility and handoff

   PART 2 (20 mins): Authentication and Encryption in legacy 802.11 Networks

1.  Basic 802.11 Open and Shared Key authentication

bulletState m/c details. Limitations

2.  WEP RC4 encryption and its limitations

bulletBasic WEP problems and attacks
bulletShamir result: “WEP unsafe at any key length”

3.  Fixing 802.11 security problems

bulletWEPPlus, TKIP enhancements,  MIC, Re-keying concepts
bulletWireless Protected Access standards: WARP, WAP, AES
bullet802.11i standard

PART 3 (20 mins): Authentication and Key Exchange using 802.1x Port Access Control  

1.  802.1x Concepts

bulletEAP-over-LANs (EAPOL) protocol and state m/c

2.  Extensible Authentication Protocol (EAP) details:

bulletState machines, packet types and formats

3.  AAA Concepts

bulletRADIUS and EAP-over-RADIUS

4.  Caveats: Problems with 802.1x and 802.11 together!

  PART 4 (40 mins):  EAP Methods

1.  Certificate Based Schemes: Public Key Cryptography, Certificates, PGP, Transport Layer Security (TLS)

bulletEAP-TLS
bulletTunneled TLS (TTLS)
bulletProtected EAP (PEAP)

2.  CISCO LEAP

3.  EAP-SRP

4.  Comparison of these schemes

 

MODULE III (TOTAL: 30 mins): Authentication, Key exchange and Encryption in Wide-area Wireless Networks

PART 1 (10 mins): Basics of network architecture

1.  CDMA2000:  R-UIM, BSC, RNC, PDSN, Simple IP, Mobile IP modes

2.  GSM/UMTS:  SIM/USIM, Node B, RNC, SGSN/GGSN, HLR, VLR

PART 2 (20 mins): Authentication, key exchange and encryption

1.  Authentication entities

bulletSubscriber Identity Module (SIM), U-SIM/R-UIM smart cards
bulletHLR, VLR, AAA servers

2.  GSM SIM authentication and encryption protocol

3.  UMTS AKA authentication and encryption protocol

4.  CDMA2000 authentication and encryption protocols

bullet3G1X, 1XEVDO

 

MODULE IV (50 mins): Authentication and Key Exchange in Integrated Public Wireless Networks

PART 1 (10 mins): Network Integration Architectures

1.  Loose vs. Tight integration

1.  Wireless Public Access Gateways

bullet Authentication, Accounting, Seamless Mobility management,
QoS, Caching
bulletAccess to enterprise and voice services
bulletAuthentication in Mobile IP

2.  Comparison of two architectures for authentication overheads

 

PART 2 (30 mins):  Authentication protocols in integrated networks

1.  SIM/USIM based protocols:

bulletEAP-SIM, EAP-AKA
bulletProtocol details, Identity privacy, Fast Re-authentication,
Key Derivation, HLR communication options and overheads
bulletKnown attacks on EAP-SIM

2.  EAP –Shared Key Exchange  (EAP-SKE) protocol

3.  EAP-ARCHIE, EAP-CAVE protocol

4.  Single Pass Multi-layer Authentication Schemes

5.  Comparative evaluation of the schemes

6.  Example EAP-SIM implementation

 

PART 3 (10 mins):  Accounting

MODULE V (10 mins): State-of-the-art in systems and services

1.  Windows, Linux support for 802.11, 802.1x, EAP-SIM, TLS, TTLS, PEAP

2.  RADIUS, DIAMETER servers: Open source and commercial products. AAA brokers

3.  UMTS, CDMA 2000 modems and smart cards

4.  Current vendors for components and services Reef Edge, IPUnplugged, Vernier Networks Boingo, Telepath, Waypoint, Mobilestar, Verizon Express, Sprint PCSVision, Docomo FOMA

CONCLUSIONS (5 mins)

 

POTENTIAL AUDIENCE:

This tutorial is ideal for engineers, graduate students, executives and practitioners in the field of wide-area wireless (3G) and 802.11 LAN technologies. The level of this tutorial can be classified as Intermediate to Advanced.

SPEAKER'S BIOGRAPHY RELEVANT TO THE TUTORIAL SUBJECT:
 

The speaker has extensive experience in various aspects of wireless networks ranging from mobility management protocols, authentication and key exchange, design of wireless access gateways, and client and network software systems for wireless networks. The speaker is a co-architect of the Shared Key Exchange (SKE) scheme currently under consideration for standardization in IETF.  He is also the technical leader of the team responsible for implementing EAP-SIM/AKA and EAP-SKE protocols in Lucent NAVIS AAA product.

The speaker is a key member of the team that developed Lucent Technologies’ 802.11+3G integration architecture strategy and built the 802.11/3G IOTA integration gateways.  The technology this team developed has been demonstrated to service provider customers and also in trade shows such CTIA 2003 in New Orleans.  The team was awarded a prestigious a prestigious Bell Labs President’s Silver Award for outstanding innovations and contributions in March 2003 and Bell Labs Team Award in Dec 2003.

The speaker has co-authored 6 papers and 4 patents (pending) on various topics covering the area.

RELEVANT PUBLICATIONS AND TALKS

  1. M. Buddhikot, G. Chandranmenon, S. J. Han, Y. W. Lee, S. Miller and L. Salgarelli, Integration of 802.11 and Third Generation Wireless Data Networks, Proceedings of IEEE Infocom 2003, San Francisco, April 2003.
  2. M. Buddhikot, G. Chandranmenon, S. J. Han, Y. W. Lee, S. Miller and L. Salgarelli, Design and Implementation of a WLAN/CDMA2000 Integration Architecture, Special Issue of IEEE Communications Magazine on 3G+802.11 Integration, Nov 2003.
  3. L. Salgarelli, M. Buddhikot, J. Garay. S. Patel, S. Miller, Efficient Authentication and Key Distribution in Wireless IP Networks, Special Issue of IEEE Wireless Communications Magazine, Nov 2003.
  4. M. Buddhikot, A. Hari, K. Singh and S. Miller,  MobileNAT: A New Technique for Mobility Across Heterogeneous Address Spaces Proceedings of First ACM International Workshop on Mobile Applications and Services in Hotspots (in conjunction with ACM Mobicom 2003), Sept 2003, San Diego Longer version invited for Special Issue of ACM/Kluwer Journal of MONET.
  5. Salgarelli, L, Buddhikot, M., Garay, J., Miller, M., EAP SKE Authentication and Key Exchange Protocol, IETF Internet draft, draft-salgarelli-pppext-802.11-auth-02.txt.
  6. Blumenthal, U., Buddhikot, M., Garay, J., Miller, S, Patel, S., Salgarelli, L., and D. Stanley, A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks, Bell Labs Technical Journal Special Issue on Wireless Networking, 7(2), pp. 37-48. 2002.
  7. Milind Buddhikot, “New Technologies for Integrated Public Wireless Networks,” (Invited Talk) OpenSig 2003, Columbia University, NY, Oct 9, 2003. Also, talk at Rutgers WINLAB, Nov 4, 2003, and WICAT Brooklyn Polytech, Jan 16, 2004.

IOTA Relevant details and publications can be found at URL

http://www.bell-labs.com/~mbuddhikot/IOTAProject/IOTA.htm

 

SHORT BIOGRAPHY OF THE SPEAKER

Milind M. Buddhikot is a Member of Technical Staff in the Center for Networking Research at Lucent Bell Labs. His research interests are in the areas of systems and protocols for public wireless networks, dynamic authentication and key exchange, multihop wireless and dynamic spectrum access. Milind holds a Doctor of Science  (D. Sc.) in computer science (July 1998) from Washington University in St. Louis. He has served on program committees of several conferences and currently serves as the Editor of IEEE/ACM Transaction on Networking (TON).  Milind is a key member of the team that developed Lucent Technologies’ 802.11+3G integration architecture strategy and built the 802.11/3G IOTA integration gateways.  The team was awarded the prestigious Bell Labs President’s Silver Award for outstanding innovations and contributions in March 2003 and Bell Labs Team Award in Dec 2003. Milind is also a co-architect of the Shared Key Exchange (SKE) scheme and a technical leader of the team responsible for implementing EAP-SIM/AKA and EAP-SKE protocols in Lucent NAVIS AAA product.

DETAILED BIOGRAPHY OF THE SPEAKER

Milind M. Buddhikot is a Member of Technical Staff in the Center for Networking Research at Lucent Bell Labs.  His research interests are in the areas of systems and protocols for public wireless networks, dynamic authentication and key exchange, multihop wireless, dynamic spectrum access, MPLS path routing, and multimedia messaging and stream caching. Milind holds a Doctor of Science  (D. Sc.) in computer science (July 1998) from Washington University in St. Louis, and a Master of Technology (M.Tech.) in communication engineering (December 1988) from the Indian Institute of Technology  (I.I.T.), Bombay.  At Washington University, Milind was a member of the Applied Research Laboratory (ARL), where he worked on his Doctoral Research project “Project MARS” funded by NSF’s National Grand Challenges grant aimed at building scalable Multimedia-on-Demand Services and Servers. He has authored over 22 research papers and 7 patent submissions in the design of multimedia systems and protocols, layer-4 packet classification, MPLS path routing, and authentication and dynamic key exchange. Milind currently serves at the Editor of IEEE/ACM Transaction on Networking (TON). He also served as a co-guest-editor of IEEE Network magazine's March 2001 Special issue on “Fast IP Packet forwarding and Classification for Next Generation Internet Services”.  He has served in the capacity of tutorial chair for IEEE LCN 94, 95, publicity chair for NOSSDAV97, program committee member of SPIE MMCN 2001, 2003, IEEE ICNP2002, 2003, 2004, IEEE LCN 93 to IEEE LCN 2000 and served as a reviewer for IEEE TON, IEEE JSAC, ACM Multimedia, IEEE Infocom, ACM SIGCOMM, and IEEE Multimedia magazine.

Speaker Web page: http://www.bell-labs.com/user/mbuddhikot/

 

 

ASWN'04