DYSPAN

Tutorials

Tuesday, 6 April 2010
9:00 – 12:30
Room: Ocean 1

T1: Convex Optimization of Cognitive Radio Networks
Instructors: Chee Wei Tan, City University of Hong Kong
Siamak Sorooshyari, Bell Laboratories - Alcatel-Lucent

Abstract: It has been recognized that the radio spectrum is vastly underutilized, and an exciting paradigm has emerged that applies powerful aspects of optimization theory to the design and analysis of networks to efficiently utilize spectrum: Cognitive Radio Networks. Dynamic spectrum sensing via cognitive radio brings forth new intellectual and practical considerations. An optimization-theoretic approach has three distinctive characters. First, it unifies disparate problems and algorithms in wireless communication and networking and integrates various protocol layers. The approach thus enables cross-layering design from the physical layer to networking issues. Second, the watershed between efficiently solvable optimization problems and intractable ones has been recognized as convexity (instead of linearity as previously believed) thus opening up possibilities on nonlinear problems in cognitive radio network design. Third, some of the theoretical insights and tools are already being put into practice. These accomplishments have resulted in a keen interest from both academia and industry in systematically learning the new tools within the context of cognitive radio networks. This tutorial will provide a comprehensive treatment of recent results on convex optimization of cognitive radio networks.

Intended Audience
Faculty and graduate students working on communication theory and networking who areinterested incognitive radio and its applications.
Industry engineers and researchers involved in protocol developmentor network provisioning in thewireless sector.

Half-Day Tutorial Outline:
. Self-contained introduction to convex optimization and Lagrange duality
. Optimization decomposition and algorithms
. Spectrum sharing models and interference management problems incognitive radio
 networks
. Description of the caveats of radio resource management for cognitiveradio networks
 incomparisonto that of conventional legacy systems(i.e. cellular networks)
. Resource allocation models and distributed algorithms. Applicationsto
 congestioncontrol,efficiency-fairness tradeoff in cognitive radionetwork
. Power control optimization problems in cognitive radio networks
. Optimization-based cooperative protocols, relaying and routing incognitive radio
 networks

Biographies:

Chee Wei Tanis an Assistant Professor at the City University of Hong Kong. He received his B.S. from National University of Singapore and M.A. and Ph.D. degree from Princeton University all in Electrical Engineering. He was a Postdoctoral Scholar at the California Institute of Technology (Caltech) and was a Research Associate at Fraser Research Laboratory. His research interests are in wireless and broadband communications, networking and distributed systems, signal processing, information theory and nonlinear optimization.

Siamak Sorooshyari received his B.S. and M.S. degrees in electrical engineering from Rutgers University in 2000 and 2003, respectively. He is currently a Member of the Technical Staff at Bell Laboratories - Alcatel-Lucent where he is involved in the development of physical layer and link layer algorithms for next-generation wireless data networks. His current research has been focused on resource allocation for wireless networks, optimization and stochastic control of communication networks, and distributed algorithms for resource allocation.


--------------------------------------------------------------------------------

Tuesday, 6 April 2010
9:00 – 12:30
Room: Ocean 2

T2:International Standardization of Cognitive Radio Systems: ITU, IEEE and ETSI
Instructors:Stanislav Filin,Hiroshi Harada,Homare Murakami,Kentaro Ishizu
National Institute of Information and Communications Technology (NICT), Japan

Abstract:The current radio environment is characterized by its heterogeneity. Different aspects of this heterogeneity include: multiple operators and services, various radio access technologies, different network topologies, broad range of radio equipment, and multiple frequency bands.

Such environment has a lot of technical and business opportunities. The examples are: joint management of several radio access networks within one operator to balance load of these networks; detecting and using unused spectrum in the allocated frequency bands without interrupting the operation of the primary users of such frequency bands; spectrum trading between several operators.

To exploit such opportunities, the concept of cognitive radio system (CRS) has been developed. In general CRS can be characterized as �a radio system employing technology that allows the system: to obtain knowledge of its operational and geographical environment, established policies and its internal state; to dynamically and autonomously adjust its operational parameters and protocols according to its obtained knowledge in order to achieve predefined objectives; and to learn from the results obtained.

Given such definition many CRS usage scenarios and business cases are possible. This has triggered a lot of standardization activity on all levels, including ITU, IEEE, and ETSI, where each of this organizations consider multiple CRS deployment scenarios and business directions. This tutorial shows a big picture of all international standardization
of CRS performed at the moment. Understanding of these standardization activities is very important for both academia and industry in order to select important research topics and promising business directions.

The tutorial has three parts covering CRS concept overview, standardization, and implementation. The overview part is very important to understand the other parts. It gives introduction to CRS, including key technologies like Cognitive Pilot Channel, white space and spectrum sensing. The standardization part covers ITU, IEEE and ETSI activities on developing specifications for different deployment scenarios and components of CRS. The CRS implementation part of this tutorial describes several examples of the first CRS implementations.

Audience:This tutorial is expected to be of high interest for both academia and industry. Wide range of topics covered in the tutorial and strong relation to the IEEE DySPAN conference program should make this tutorial attractive to very wide audience.

Table of Contents
Abstract
Part I - Overview of CRS
 1 History and definitions
 2 Capabilities
 3 Types of CRS
 4 Key technologies
Part II - Standardization of CRS
 1 ITU
 a ITU-R WRC-12 agenda item on CRS
 b ITU-R WP 1B activities on regulatory aspects of CRS
 c ITU-R WP 5A activities on technical aspects of CRS
 2 IEEE
 a IEEE 802 LAN/MAN Standards Committee
 Including 802.22 for Cognitive Wireless RAN, 802.11af for TV White Spaces Operation, 802.21 for Media Independent Handover, 802.22.1 for Enhancing Harmful Interference Protection for Low Power Licensed Devices Operating in TV Broadcast Bands, and IEEE draft PAR P802.19.1 for TV White Space Coexistence Mechanisms
 b IEEE Standards Coordination Committee 41 on Dynamic Spectrum Access Networks
 Including 1900.4 for Distributed Decision Making for Optimized Radio Resource Usage in Heterogeneous Wireless Access Networks, 1900.4.1 for Interfaces and Protocols Enabling Distributed Decision Making, 1900.4a for Architecture and Interfaces for Dynamic Spectrum Access Networks in White Space Frequency Bands, and 1900.6 for Spectrum Sensing Interfaces and Data Structures
 3 ETSI
 a ETSI Technical Committee on Reconfigurable Radio Systems
 Including Functional Architecture for the Management and Control of Reconfigurable Radio Systems, Cognitive Pilot Channel, and CRS Concept
Part III - Implementation of CRS
 1 Heterogonous type CRS
 2 Spectrum sharing type CRS
 3 Cognitive Wireless Clouds on IMS
Conclusions
References

Biographies:

Stanislav Filinjoined Ubiquitous Mobile Communications Group in National Institute of Information and Communications Technology (NICT), Japan, in April 2007. He currently works in NICT as expert researcher. He holds PhD and MBA degrees. He is IEEE senior member. Stanislav Filin is currently serving as NICT representative in ITU-R WP 5A and WP 1B and in ETSI TC RRS. He is voting member of IEEE SCC 41 on Dynamic Spectrum Access Networks, IEEE 1900.4 WG, and IEEE 802.19 WG. In IEEE 1900.4 WG he has been serving as technical editor and chair of several subgroups. He was voting member in IEEE 1900.6 WG. He participated in IEEE 802 EC SG on TV White Space. He currently observes IEEE 802.11 WG and IEEE 802.22 WG activities related to TV White Space. Stanislav Filin is author of more than 70 conference papers, more than 20 journal papers, and several book chapters. He has served as TPC member and session chair on several international conferences. In 2009 he received IEEE SA SB award for contribution to the development of IEEE standard 1900.4-2009.

Hiroshi Haradais the director of the Ubiquitous Mobile Communication Group at National Institute of Information and Communications Technology (NICT) and is also the director at NICTs Singapore Wireless Communication Laboratory. He joined the Communications Research Laboratory, Ministry of Posts and Communications, in 1995 (currently NICT).
Since 1995, he has researched Software Defined Radio (SDR), Cognitive Radio, Dynamic Spectrum Access Network, and broadband wireless access systems on the microwave and millimeter-wave band. He also has joined many standardization committees and forums in United States as well as in Japan and has fulfilled important roles for them, especially IEEE 802.15.3c, IEEE 1900.4, IEEE1900.6. He has served currently on the board of directors of SDR Forum and the chair of IEEE SCC41 (IEEE P1900) since 2009 and the vice chair of IEEE P1900.4 since 2008. He moreover was the chair of the IEICE Technical Committee on Software Radio (TCSR) in 2005-2007 and vice chair of IEEE SCC41 in 2008. He is also involved in many other activities related to telecommunications. He is a visiting professor of the University of Electro-Communications, Tokyo, Japan, and is the author of Simulation and Software Radio for Mobile Communications (Artech House, 2002).

Homare Murakami received his B.E. and M.E. in Electronic Engineering from Hokkaido University in 1997 and 1999. He works in Communications Research Laboratory, Ministry of Post and Telecommunications since 1999, which is now reorganized to National Institute of Information and Communications Technology (NICT). He is currently a senior researcher at Ubiquitous Mobile Communications Group of NICT. He worked in Aalborg University from 2003 to 2005 as a visiting researcher. Homare Murakami is currently serving as Japan representative in ITU-R WP 5A and WP 1B. He is voting member of IEEE SCC 41 on Dynamic Spectrum Access Networks and IEEE 1900.4 WG.

Kentaro Ishizu received M.E. and Ph.D degrees from Kyushu University, Japan, in 2003 and 2005, respectively, with a major of computer science. Dr. Ishizu has been working for National Institute of Information and Communications Technology (NICT) since 2002. He has been engaged in R&D projects for heterogeneous wireless networks, distributed content delivery network, and cognitive wireless network.

 


--------------------------------------------------------------------------------

Tuesday, 6 April 2010
9:00  12:30
Room: Ocean 3

T3:Game Theory for Cognitive Radio Networks
Instructors:Luiz A. DaSilva, Trinity College Dublin / Virginia Tech
Allen B. MacKenzie, Virginia Tech

Abstract:Game theory is a field of applied mathematics that describes and analyzes interactive decisions. Its ability to model individual, independent decision makers whose actions potentially affect others makes game theory particularly suitable to studying the environments in which cognitive radios operate. In this half-day tutorial, we will describe some of the main applications of game theory to cognitive networks. These include: models of cooperation and coexistence among cognitive radios and between cognitive radios and legacy users; spectrum auctions and other economic models; and the modeling of partial or incomplete information in decision making.

Intended Audience: Game theory is one of the main tools in the rigorous analysis of interactions among cognitive radios. The intended audience for this tutorial includes postgraduate students, academic faculty, and industrial researchers who want to be able to read and understand published research that applies game theory to the analysis and design of cognitive networks, as well as those who are considering using game theory in their own research. The tutorial does not assume knowledge of game theory; basic concepts in cooperative and non-cooperative games will be introduced as they are used.

Topics:
 Motivation: a case for game theory in cognitive radio research
 Game theory basics
 Power control and interference games
 Distributed channel assignment and topology control games
 Cooperative models of dynamic spectrum access
 Real time spectrum markets
 Mechanism design: truth telling and incentive compatibility

About the Presenters: The presenters have long research experience in applying game theory to wireless communications problems and first proposed the concept of cognitive networks in 2005. They co-authored the book Game Theory for Wireless Engineersin 2006 and numerous papers on game theory modeling of cognitive radios, which have appeared in the Proceedings of the IEEE, IEEE Transactions on Wireless Communications, IEEE JSAC, etc. They have presented tutorials on cognitive networks at CROWNCOM, MobiCom, and TridentCom. Luiz A. DaSilva joined Trinity College Dublin in May 2009, where he holds the Stokes Professorship in Telecommunications. At the Centre for Telecommunications Value-Chain Research (CTVR), he is continuing his work on cognitive networks and resource management in wireless networks. Prof. DaSilva has also been a faculty member at Virginia Tech's Bradley Department of Electrical and Computer Engineering since 1998. He received his Ph.D. in Electrical Engineering from the University of Kansas and previously worked for IBM for six years. He has published over seventy refereed papers in journals and major conferences in the communications and computer areas. He co-authored two books on wireless networks and is an associate editor of IEEE Communications Letters and of Computer Networks. Prof DaSilva is a Senior Member of IEEE and a member of the ASEE and of ACM. In 2006, he was named a College of Engineering Faculty Fellow at Virginia Tech. Allen B. MacKenzie has been an Assistant Professor of Electrical and Computer Engineering at Virginia Tech since 2003. He joined Virginia Tech after receiving his Ph.D. in Electrical Engineering from Cornell University. Dr. MacKenzie's research focuses on wireless communication systems and networks. His current research interests include cognitive radio and cognitive network algorithms, architectures, and protocols and the analysis of such systems and networks. His current research sponsors include the National Science Foundation, the National Institute of Justice, and DARPA. Dr. MacKenzie is a member of the IEEE, ACM, and ASEE. In 2006, he received the Virginia Tech College of Engineering Dean's Award for Outstanding New Assistant Professor.

 


--------------------------------------------------------------------------------

Tuesday, 6 April 2010
13:30  17:00
Room: Ocean 1

T4:Security in Dynamic Spectrum Access Systems
Instructor:Douglas C. Sicker, University of Colorado, Boulder / FCC

 

Update: Dr. Timothy Newman from VA Tech will be joining Dr. Sicker to present recent work on Primary User Emulation, Spectral Honey Pot threats and DSA DoS threats as part of the Dynamic Spectrum Access Network Security tutorial.


Abstract:Cognitive Radios (CRs) are devices that can sense their external environment and change their operating parameters.㺍This ability, to sense and adapt, allows CRs to exploit novel spectrum access techniques. This approach to spectrum access defines a new paradigm called dynamic spectrum access (DSA) that leads to a more efficient use of the existing wireless spectrum. These DSA systems raise a number of interesting and important security issues.㺍One critical issue in DSA security is maintaining the spectrum etiquette within the network so that the CR devices do not violate the spectrum policies in the given region. This issue requires new types of security controls at both the device and the network level. Further, the security concerns of existing wireless networks need to be addressed by the CR as well. This tutorial identifies the security concerns and challenges that the developers of CR devices need to consider.㺍The tutorial also describes the solutions to the security challenges proposed by the existing body of research in this direction. Finally, the tutorial discusses the shortcomings of the proposed research and identifies future directions of research in CR network security.㺍This work emanates from work commissioned by Shared Spectrum Company (SSC) and the Defense Advanced Research Projects Agency (DARPA).

Topics:
Overview of security
Current state of DSA security
Challenges in DSA security
Basic concepts in DSA and CR
CR device security (threats and countermeasures)
CR system security (threats and countermeasures)
Current DSA and CR related security mechanisms and protocols
Future topics

Biography:

Dr. Douglas C. Sicker is currently a Senior Advisor to the Federal Communications Commission and an associate professor in the Department of Computer Science at the University of Colorado at Boulder with a joint appointment in the Interdisciplinary Telecommunications Program.Prior to this he was Director of Global Architecture at Level 3 Communications, Inc. Prior to this, Doug was Chief of the Network Technology Division at the Federal Communications Commission (FCC). Doug has also held faculty and industry positions in the field of medical sciences.Doug is a senior member of the IEEE, as well as a member of the ACM and the Internet Society.After leaving the FCC, he was the Chair of the Network Reliability and Interoperability Council steering committee, an FCC federal advisory committee that focuses on network reliability, wire line spectral integrity and Internet peering and interconnection.Doug also served on the Technical Advisory Council of the FCC.His research interests include cognitive radios, network security, technology based policy and telecommunications policy. His teaching interests include distributed systems, network security and telecommunications public policy.


--------------------------------------------------------------------------------

Tuesday, 6 April 2010
13:30  17:00
Room: Ocean 2

T5:How to Deal with Interference in Wireless Networks - Recent Insights from㺍Network Information Theory
Instructor:Syed Ali Jafar, University of California, Irvine

Abstract:Interference is the primary bottleneck on the capacity of wireless networks. Understanding how to optimally deal with interference is the holy grail of network information theory. In recent years, the renewed focus on this long standing open problem has produced remarkable progress. This tutorial will summarize the recent insights that have emerged from the capacity study of a variety of wireless network scenarios. The focus of the tutorial will be on intuitive understanding of the key information theoretic techniques for interference management such as interference alignment, interference forwarding, interference neutralization, interference avoidance, interference cancellation, and the so called reverse-carpooling ideas from network coding.

Topics:
1. 2 User Interference Channel
a. Strong Interference
b. Weak Interference
c. Generalized Degrees of Freedom
d. Approximate Capacity
2. K User Interference Channel
a. Fading Channel
i. Inseparability㺍
ii. Ergodic Capacity
b. Constant Channel㺍
i. Lattice alignment
ii. Rational dimensions
iii. Asymmetric signaling
c. Multiple Antennas
3. Other Networks
a. Cellular Networks
b. Multihop Networks
c. Bidirectional Relay Networks
4. The Role of Side Information
a. Limited㺍 (distributed or partial) Channel Knowledge
b. Cognitive transmitters and receivers
5. Selected Open Problems

Biography:

Syed Ali Jafar㺍received the B. Tech. degree in Electrical Engineering from the Indian Institute of Technology (IIT), Delhi, India in 1997, the M.S. degree in Electrical Engineering from California Institute of Technology (Caltech) , Pasadena USA in 1999, and the Ph.D. degree in Electrical Engineering from Stanford University, Stanford, CA USA in 2003. His industry experience includes positions at Lucent Bell Labs , Qualcomm Inc.㺍and Hughes Software Systems. He is currently an Associate Professor in the Department of Electrical Engineering and Computer Science at the University of California Irvine, Irvine, CA USA. His research interests include multiuser information theory and wireless communications in general and interference/cognitive-radio networks in particular.

Dr. Jafar received the NSF CAREER award in 2006 and the ONR Young Investigator Award in 2008. He received the UC Irvine Engineering Faculty of the Year award in 2006 and the UC Irvine EECS Professor of the Year Award in 2009, for excellence in teaching. He is a co-recipient of the DARPA ITMANET Young Investigator Team award. Dr. Jafar received the 2009 IEEE Information Theory Society best paper award. He served as Associate Editor for IEEE Transactions on Communications 2004-2009 and and for IEEE Communications Letters 2008-2009. He is the guest editor for a JCN special issue on cognitive radio networks, guest editor for a 2010 Information Theory Transactions special issue on interference networks, co-chair for the Communication Theory Symposium for IEEE GLOBECOM 2009, Finance chair for Information Theory Workshop 2010, Plenary speaker for IEEE Communication Theory Workshop 2010, and an Erskine Fellow to the University of Canterbury, New Zealand for 2010. He currently serves as Associate Editor for IEEE Transactions on Information Theory.


--------------------------------------------------------------------------------

Tuesday, 6 April 2010
13:30  17:00
Room: Ocean 3

T6:How to find/work-on technology problems relevant for policy issues
Instructor:Anant Sahai, University of California,㺍Berkeley

Abstract: Finding and formulating a good problem is often more than half of research. There are four basic categories of problems on the technology side of dynamic spectrum access:

1. Relevant problems inspired by the real needs of potential systems that use dynamic
spectrum access.(e.g. The kind of stuff that might influence thinking in a standard.)
2. Irrelevant problems that superficially look like they might be relevant to engineers
building systems.
3. Irrelevant problems that superficially look like they might be relevant to policy-makers
or economic considerations.
4. Relevant problems inspired by the real challenges and conceptual questions facing
potential regulators, lawyers, economists, and policy makers.

The dirty-little-secret is that the field is getting quite crowded in both (2) and (3), while (1) still has room for good research and (4) is largely open. This tutorial will give recipes to construct problems in all four categories, but will spend most of its time on the least understood category: #4. By the end of the tutorial, it is hoped that attendees will be able to construct problems in all categories or will at least know what they need to study in order to do so.

Intended audience:㺍 This talk is intended for researchers who are either already working in the DSA area or want to start doing so. The principle audience consists of people with a technical background although folks from a policy background might also find the tutorial very informative because it will help them to better engage with people on the technology side. Further on the technical side, people from a signal processing, communications theory, information theory, learning theory, game theory, and protocols background will get more out of this than people from the hardware side of things.

Topics:
A. The big picture: what are we trying to do in DSA and cognitive radio
B. The grand challenges on both the technology and policy side
C. Mix-and-match: a general strategy for constructing problems, how it can go horribly
wrong, and how to tell if this is happening to you.
D. Is good research always hard? That depends on what you mean by hard.
E. Case studies: good problems coming from spectrum sensing
F. Case studies: good problems coming from the regulatory side
G. Do you really want to do relevant research? The answer might surprise you.
H. Practical advice and lists of problems.

Biography:

Anant Sahai got his B.S. degree from the University of California at Berkeley in 1994, and his S.M. and Ph. D. degrees in 1996 and 2001 respectively from the Massachusetts Institute of Technology. He spent 2001 at a wireless startup Enuvis where he was the resident Research Scientist (affectionately known as "pencil and paper guy") who helped develop practical algorithms for extremely sensitive signal aquisition for GPS using software-defined radios. Since 2002, he has been on the faculty at Berkeley as a member of the Wireless Foundations Center and the Berkeley Wireless Research Center.

He has worked on a variety of topics including understanding the information theory of delay and feedback, limits to wireless localization, spectrum sensing for cognitive radios, distributed control, low-power communication, and developing a principled approach to understanding light-handed regulation in the DSA context. In the IEEE DySpAN context, he introduced a seminal paper in 2004 that helped launch the area of spectrum sensing and gave a very influential tutorial on the same topic in the first DySpAN in 2005. He has been active in the dynamic spectrum community ever since, and is one of the Technology Program Committee chairs for IEEE DySpAN 2010.

.