• 沒有找到結果。

下一世代資訊通訊網路尖端技術與應用---子計畫三:後三代全IP無線網路技術(IV)

N/A
N/A
Protected

Academic year: 2021

Share "下一世代資訊通訊網路尖端技術與應用---子計畫三:後三代全IP無線網路技術(IV)"

Copied!
61
0
0

加載中.... (立即查看全文)

全文

(1)

I.COVER

Program for Promoting Academic Excellence of Universities((((Phase II))))

Final Report

子計畫三 子計畫三 子計畫三

子計畫三:::後三代全:後三代全後三代全 IP 無線網路技術後三代全 無線網路技術無線網路技術無線網路技術 Beyond-3G All-IP Wireless Network Technologies

Serial No.::::NSC-2752-E-009 -005- PAE

Overall Duration: Month 04 Year 2004 - Month 03 Year 2008 Report Duration: Month 04 Year 2004 - Month 03 Year 2008

National Chiao Tung University

(2)

II. (FORM1)BASIC INFORMATION OF THE PROGRAM

Program Title: Beyond-3G All-IP Wireless Network Technologies(後三代全IP無線網路技術)

Serial No.: NSC 96-2752-E-009 -005- PAE Affiliation

National Chiao Tung University

國立交通大學

Name Yi-Bing Lin 林一平 Name Rong-Hong Jan 簡榮宏

Tel: (03)5712121-31842 Tel: (03)5712121-31637 Fax: (03)5724176 Fax: (03)5724176 P ri n c ip a l In v e st ig a to r E-mail liny@cs.nctu.edu.tw P ro g ra m C o o rd in a to r E-mail rhjan@cs.nctu.edu.tw

Expenditures1 (in NT$1,000) Manpower2:Full time/Part time(Person-Months)

Projecte Actual Projected Actual

FY 2004 7,432 7,237.879 12/192 15/361**

FY 2005 8,856 7,170.027 12/200 24/410**

FY 2006 8,875 7,298.387 24/196 24/432**

FY 2007 9,168 8,251.2 24/200 24/342**

Overall 34,331 29,957.49 72/788 87/1,557**

Serial No. Project Title Principal

Investigator

Title Affiliation

Main Project

Advanced Technologies and Applications for Next Generation Information Networks (II)

下一世代資訊通訊網路尖端技術與應用(二) Wen-Tsuen Chen 陳文村 Chair Professor Department of Computer Science, NTHU Wen-Hsiang Tsai 蔡文祥 Chair Professor Department of Computer and Information Science,

NCTU

Sub-Project 1

High Speed Networking Technologies

高速網路交換技術 Cheng-Shang Chang 張正尚 Professor Institute of Communications Engineering, NTHU

Sub-Project 2 Optical Networking and QoS Technologies

光纖網路及服務品質保證技術

Maria C. Yuang

楊啟瑞 Professor

Department of Computer Science and Information Engineering, NCTU

Sub-Project 3 Beyond-3G All-IP Wireless Network Technologies

後三代全 IP 無線網路技術 Yi-Bing Lin 林一平 Chair Professor Department of Computer Science and Information

Engineering, NCTU

Sub-Project 4

Wireless Ad Hoc and Sensor Networking Technologies 無線隨意及感測網路技術 Wen-Tsuen Chen 陳文村 Chair Professor Department of Computer Science, NTHU

(3)

Sub-Project 5 Network Security 網路安全 Wen-Hsiang Tsai 蔡文祥 Chair Professor Department of Computer and Information Science,

NCTU Sub-Project 6 Techniques and Applications of Overlay Networks

疊蓋式網路之技術與應用 Chung-Ta King 金仲達 Professor Department of Computer Science, NTHU

Notes: 1,2 Please explain large differences between projected and actual figures.

** We hired more part time students with lower salaries. Therefore, the actual student number is larger than the projected student number.

(4)

III. (FORM 2) LIST OF WORKS, EXPENDITURES, MANPOWER, AND MATCHING SUPPORTS FROM THE PARTICIPATING INSTITUTES((((REALITY)).

Serial No.:NSC -2752-E-009 -005- PAE Program Title: Beyond-3G All-IP Wireless Network Technologies(後三代全 IP 無線網路技術) Expenditures (in NT$1,000) Manpower (person-month) Research Item

(Include sub projects)

Major tasks and

objectives Salary Seminar/ Conference-r elated expenses Project- related expenses Cost for Hardware & Software Total Principal Investigators Consultants Research/ Teaching Personnel Supporting Staff Total

Matching Supports from the Participating Institutes (in English & Chinese)

1. System design of B3G core networks 8,185.092 307.525 1,231.133 1,458.801 1,1182.551 72 0 567 43 682 1. ICL/ITRI NTD$1,000,000 2. JRC NTD$ 1,392,000 3. NTP NTD$ 8,024,564 4. NTP International Cooperation NTD$1,613,570 5. NTP B3G Platform Project NT$2,739,000

6. NTP Service IOT Project NT$8,373,000 7. NTP International Collaboration NT$1,613,57 8. ITRI/NCTU JRC Wireless Internet NT$ 1,138,500 Sub-Project3:Bey ond-3G All-IP Wireless Network Technologies 2. Broadband wireless access 5,399.787 216.069 679.267 1,199.692 7,494.815 53 0 415 36 504 1. III NTD$1,000,000 2. Intel Donation NTD$1,000,000

(5)

Applications and services in B3G networks: ITRI/NCTU JRC NTD$1,200,000 3. Applications and services in B3G networks 4,543.075 215.533 657.386 1,144.560 6,560.554 67 0 419 8 494 1. JRC NTD$1,200,000 2. Intel NTD$60,000

3. Institute for Information Industry (III) $839,960 4. ITRI/NCTU JRC Wireless Internet NT$ 1,411,500 SUM 18,127.954 736.127 2,567.786 3,803.053 25,237.920 192 0 1,401 87 1680

(6)

IV. (FORM 3) STATISTICS ON RESEARCH OUTCOME OF THIS PROGRAM

LISTING TOTAL DOMESTIC INTERNATIONA SIGNIFICANT1 CITATIONS2 TECHNOLOGY TRANSFER

JOURNALS 88 0 88 53 CONFERENCES 24 3 21 PUBLISHED ARTICLES TECHNOLOGY REPORTS PENDING 12 5 7 -PATENTS GRANTED 9 7 2

-COPYRIGHTED INVENTIONS ITEM

ITEM 30 25 5

WORKSHOPS/CONFERENCES 3

PARTICIPANTS

HOURS

TRAINING COURSES

(WORKSHOPS/CONFERENCES) PARTICIPANTS

HONORS/ AWARD 4 40 19 21

PERSONAL ACHIEVEMENTS

EDITOR FOR JOURNALS 30 1 29

ITEM

LICENSING FEE

TECHNOLOGY TRANSFERS

ROYALTY

INDUSTRY STANDARDS5 ITEM

ITEM - -

-TECHNOLOGICAL SERVICES6

SERVICE FEE - -

-1 Indicate the number of items that are significant. The criterion for “significant” is defined by the PIs of the program. For example, it may refer to Top journals (i.e., those with impact factors in the upper 15%) in the

area of research, or conferences that are very selective in accepting submitted papers (i.e., at an acceptance rate no greater than 30%). Please specify the criteria in Appendix IV.

2 Indicate the number of citations. The criterion for “citations” refers to citations by other research teams, i.e., exclude self-citations. 3

Refers to the workshop and conferences hosted by the program.

4 Includes Laureate of Nobel Prize, Member of Academia Sinica or equivalent, fellow of major international academic societies, etc. 5 Refers to industry standards approved by national or international standardization parties that are proposed by PIs of the program.

(7)

V. (FORM4) EXECUTIVE SUMMARY ON RESEARCH OUTCOMES OF THIS PROGRAM

1.

General Description of the Program: Including Objectives of the Program

In Beyond-3G environments, mobile and wireless networks will be integrated together under an all-IP core network to support global roaming and services. Issues such as mobile security, QoS, and mobility management need to be investigated. For mobile ad hoc and sensor networks, critical issues include power saving, routing, sensing, MAC, and integration with other mobile networks. In terms of application, context-aware services and environmental monitoring applications need to be developed. In PAEU-I, we have made several major contributions. For example, Prof. Y.B. Lin proposed novel 3G core network protocols for mobility management, authentication, fault tolerance, and mobile database overflow control. Due to these contributions, he was awarded IEEE Fellow and ACM Fellow in 2003. The works of Prof. Y.C. Tseng on routing, MAC, and power-saving protocols for ad hoc and sensor networks have been well recognized internationally. Based on this established research energy, in PAEU-II, we have developed B3G all-IP core and access networks, including HSS, CSCF and OSA, and to invent advanced location determination and energy conservation technologies. Specific goals include:

 Issues on IP Multimedia Core Network Subsystem such as Fault tolerance of IMS, design and implementation of OSA (service network for IMS), IMS services (including prepaid, Voice over IP, and wireless data), all-IP mobility (including location management and packet re-routing), application-level security (including identity-based cryptosystem and end-to-end security mechanisms for SMS), IMS session management, IMS-related architectures (including WGSN push mechanism, ad-hoc andinfrastructure dual-mode mobile networks, and softswitch).

 Issues on Access Networks (i.e., Ad hoc, WLAN/WiMax, and Cellular networks) including , topics on load balance, security and authentication, multi-channel or multi-antenna access points, QoS support for VoIP and location-sensing routing, MAC, power-saving have been investigated. We have also investigated critical issues, such as efficient contention protocols, fast handoff, and resource scheduling. In addition, suitable analytical methodologies for these works also required. By investigating these topics, we expect to make significant contributions to these issues. Due to the fast advance of VoIP services, we will develop novel multi-channel MAC protocols for multi-hop ad hoc networks, and study how to integrate ad hoc networks with mobile VoIP services.

(8)

 Issues on B3G applications include seamless IP/PLMN integration, P2P technologies, and novel mobile data applications. The integration of IP networks and PLMN has to be done on both the network and the service layers. We have focused on the integration on the service layer, which requires novel designs and has more profound impacts on the user experience. Skype has demonstrated how P2P technologies can be used to provide a world-wide VoIP communication platform. P2P technologies can also be used in other mobile data applications, such as multimedia communications, and device-to-device communications and collaboration.

2. Breakthroughs and Major Achievements

Technology State-of-the-Art Breakthrough

IMS Core Network Technology This technology is mainly developed by international mobile equipment manufacturers, such as Nokia and Ericsson. Few universities can conduct research regarding this technology.

 Propose One Pass

Authentication technology that reduces the IMS

authentication traffic by 50%.  Publish the book, Wireless

and Mobile All-IP Networks, and receive Academic

Publication Award of The Sun Yat-Sen Cultural Foundation, 2006.

A Push-Based VoIP Service for an Internet-Enabled MANET

VoIP services typically work in standalone MANET only, but not in Internet-enabled MANET.  An architecture to support VoIP services in an Internet-enabled MANET.  A push architecture to allow

the VoIP gateway to stay off-line.

Applications and Services in B3G Networks

 Design and Analysis of

Integrated GSM/GPRS prepaid service

(9)

Network System Design of the B3G Core Network

Figure 2.1 depicts the B3G network architecture. For the User Equipment (UE) research, we have proposed an analysis tool SIPv6 Analyzer and a PoC client-side design and implementation. For the Radio Access Network (RAN) research, we have proposed a random number generation method to model excess life of mobile user residence time. For the core network research, we have studied failure restoration of mobility database, authentication vector management, connection failure detection. For IP Multimedia subsystem (IMS) research, we have studied I-CSCF caching, credit reservation modeling, credit allocation for prepaid service, SIP mobility, prepaid application server modeling, and ID-based cryptography.

Figure 2.1 the B3G Network Architecture

Broadband Wireless Access Technologies

This part focuses on access technologies of broadband wireless networks. We have designed a multi-chain backoff (MCB) algorithm which provides high throughput and fair wireless access. We also developed a power-saving scheduling to extend the network lifetime and a hybrid routing method for multi-hop wireless LANs to improve the routing efficiency. The IEEE 802.11 standard defines multiple channels at the physical layer. However, most ad hoc networks assume that all nodes are operating under the same radio channel. To breakthrough the throughput limitation, we have proposed several multi-channel links layer protocols for multi-hop ad hoc networks. In

(10)

particular, a lightweight multi-channel MAC protocol characterized by location awareness capability has been proposed. It incurs no communication cost to conduct the channel assignment. Moreover, we have investigated optimization models and efficient algorithms to exploit the maximum channels reusability. In order to improve the network access efficiency and reduce roaming overhead, we have implemented a light-weight access protocol on a centralized WLAN server with thin access points. This centralized WLAN architecture reduces the handoff delay and cuts management overhead significantly. Finally, we have built a mobile ad hoc network across the NTHU and the NCTU campuses. The platform allows us to verify research ideas generated from the project. The ad hoc network is also connected to the core network we developed.

Applications and Services in B3G Networks

We have proposed an architecture to support VoIP services in an Internet-enabled mobile ad hoc network. To reduce power consumption, we have proposed a push mechanism to allow the VoIP gateway to stay off-line when there is no calling activity and to be “woken up” when necessary.

3. Categorized Summary of Research Outcomes. The criteria for top

conferences and journals should be given and introduced briefly in the

beginning of this section. In each research area, please give a brief summary

on the research outcomes associated with the area. Note that the summaries

should be consistent with the statistics given in Form3. Please list and number

each research outcomes in sorted order in Appendix II, and list all the

publications in top conferences and journals in Appendix III.

Network System Design of the B3G Core Network

Due to our fruitful results in both PPEAU-I and PPEAU-II, we were invited to guest editing an IEEE Wireless Communications special issue on Mobility and Resource Management published in 2004 [C.1]. By focusing on GPRS/UMTS research issues, we have developed a UMTS discontinuous reception mechanism for power saving [C.2]. We also developed a bandwidth-on-demand strategy for GPRS [C.4]. Based on the above studies, we developed a useful tool NCTUns 2.0 for wireless Internet simulation [C.6] (the major contributor is Prof. S.-Y. Wang in PPEAU-I). We investigated the UMTS short message mechanism and have invented a statistic approach for deriving the short message transmission delay distributions [C.7]. Based on the above study, we developed an efficient multicast mechanism for UMTS through

(11)

collaboration with ICL/ITRI, and received ROC Patent 205010 [patent1] (major work in PPEAU-I). In GPRS/UMTS mobility management, we have conducted signaling traffic analysis for multi-tier wireless mobile networks [C.5], and developed a per-user checkpointing for mobility database failure restoration [C.3]. To improve prepaid user experience and protect operator’s revenue, we presented a real-time charging method for prepaid users with integrated voice and data services. An analytic model has been developed to evaluate the performance [C.44].

In Wireless VoIP, we have developed the VoIP services for GSM circuit switched data, GPPRS, and UMTS environments [C.8][C.9]. Through collaboration with ICL/ITRI. We received a patent for wireless VoIP [patent 2] (major work in PPEAU-I). We proposed an effective VoIP call routing mechanism in WLAN and cellular integration [C.35]. To integrate existing VoIP protocols, we developed an integrated call agent that is capable of establishing calls between SIP, H.323, MGCP/MEGACO users [C.45]. In addition, we developed a novel method enable one-stage dialing from the PSTN to a private telephone network and/or an IP telephony network through a VoIP gateway and/or a PBX ([C.126]). We have developed a novel, simple method for a dual-mode device to register with a location registrar the device’s E.164 number and IP address ([C.128]).

By continuing PPEAU-I's work on WGSN, we have developed a mobile service platform using proxy technology [C.11], and a caching mechanism in I-CSCF of UMTS IP multimedia subsystem (IMS) [C.12]. Then we developed a GPRS-based WLAN authentication and auto-configuration for WGSN [C.13]. We further investigated the IMS authentication defined in 3GPP, and proposed an one-pass GPRS and IMS authentication procedure for WGSN. We developed the first connection failure detection mechanism of UMTS charging protocol [C.16], and the first checkpointing schemes for UMTS mobility database failure restoration [C.25]. We collaborated with ITRI to develop the first CORBA-based OSA service platform in Taiwan [C.18], devised the first credit allocation algorithm for UMTS services [C.19], and consistent wireless data access algorithms [C.36,C.37].We proposed a serving radio network controller relocation for UMTS all-IP network [C.20], investigated the impact of mobility on UMTS mobile telecommunications networks [C.21, C.23,C.24, C.26], and invented a novel random number generation for excess life of mobile user residence times [C.22,C.25]. We developed a fast identity-based cryptosystem mechanism for end-to-end mobile security [C.27] and applied this mechanism for SMS end-to-end security [C.28].

(12)

We designed and implemented a UMTS session management tool for he user equipment [C.29], and proposed new schemes for frame synchronization for UMTS HSDPA [C.30]. We also investigated IP connectivity for gateway GPRS support node [C.31].

In [C.58] we studied checkpointing and failure restoration of mobility database for Universal Mobile Telecommunications System (UMTS). By utilizing per-user checkpointing technique, individual Home Subscriber Server (HSS) records are saved into non-volatile backup storage form time to time. When a failure occurs, the backup record is restored back to the mobility database. We consider three per-user checkpoint schemes for the HSS. An analytic model is developed to investigate these schemes in terms of the probability that a HSS backup record is obsolete. This model is validated against simulation experiments. Our study provides guidelines for selecting an appropriate checkpoint scheme and parameters for various traffic conditions. In UMTS, the security function provides mutual authenticity and key agreement between the core network and the Mobile Station (MS). Specifically, the Serving GPRS Support Node (SGSN) in the core network obtains an array of Authentication Vectors (AVs) from the HSS/Authentication Center AuC), and consumes one AV for each mutual authentication. After the departure of the MS, the SGSN may keep the unused AVs for a time interval called the Reservation Timeout (RT) period. If the MS returns within the RT period, the SGSN uses the stored AVs for mutual authentication instead of obtaining new AVs from the HSS/AuC. Note that a long RT period results in fewer accesses to the HSS/AuC at the cost of extra AV storage in the SGSN. In [C.66], we proposed an analytic model to investigate the impact of the RT period on the system performance. Our study provides the guidelines for the mobile operators to select an appropriate RT period. The 3GPP defines IP Multimedia Core Network Subsystem (IMS) to support IP-based multimedia services. In IMS, any incoming call will first arrive at the Interrogating Call Session Control Function (I-CSCF). The I-CSCF queries the HSS to identify the serving CSCF (S-CSCF) of the called mobile user. The S-CSCF then sets up the call to the called mobile user. In [C.68], we investigated the performance of the IMS incoming call setup. We also proposed cache schemes with fault tolerance to speed up the incoming call setup process. Our study indicates that the I-CSCF cache can significantly reduce the incoming call setup delay, and checkpointing can effectively enhance the availability of I-CSCF.

In [C.88], we studied the optimum checkpointing interval of per-user checkpointing for mobility database failure restoration. The cost function that we consider includes the cost of checkpointing a user’s location record and the cost of

(13)

paging a user due to an invalid location record. Our results indicate that when user registration intervals are exponentially distributed, the user record should never be checkpointed if the expected checkpointing cost is more than the expected paging cost,. Otherwise, if paging costs more, the user record should always be checkpointed when a user registers.

IMS utilizes protocols such as IPv6, Session Initiation Protocol (SIP) and

Real-time Transport Protocol (RTP) to deliver the multimedia content. In [C.59] we

proposed an analysis tool called SIPv6 Analyzer to investigate the IMS-related protocols during IMS service deployment. The SIPv6 Analyzer not only dissects the protocol headers but also provides user-friendly functions such as message flow generation, and audio/video replay for IPv6, SIP and RTP. In IPv6-based IMS, a user equipment (UE) may not be allowed to roam or hand off from UMTS to a private-IPv4 GPRS network. In [C.65], we utilized SIP mobility and an automatic IPv6 tunneling mechanism, called Teredo, to support roaming/handoff of a UE between different networks. We have developed the first non-commercial Linux-based Teredo mechanism, and compared our solution with other Teredo implementations in the public domain. Our solution can reduce the tunneling overhead and transmission delay over two other implementations by 44%-74%. By tunneling IPv6 packets over IPv4 UDP, Teredo supports IPv4/IPv6 dual-stack nodes in private IPv4 networks behind Network Address Translation (NAT) to access IPv6 networks. However, the current Teredo protocol does not work with symmetric NAT. In [C.65] we proposed SymTeredo, an extension of Teredo with capability to traverse the symmetric NAT. Our extension preserves the Teredo architecture, and offers backward compatibility with the original Teredo protocol. The above results are utilized in an international collaboration with INT at France.

In [C.61] we proposed a client architecture for the Push to Talk over Cellular (PoC) service based on the Open Mobile Alliance (OMA) PoC specifications v1.0 release. We showed that most standard VoIP modules can be reused for the PoC client, and the VoIP software can be easily extended to support PoC service. A PoC client prototype has been implemented in the Industrial Technology Research Institute (ITRI) and National Chiao-Tung University (NCTU) Joint Research Center.

Through Recharge Threshold-based Credit Reservation (RTCR) mechanism, prepaid IMS services can be supported by the Online Charging System (OCS) in UMTS. In RTCR, when the remaining amount of prepaid credit is below a threshold, the OCS reminds the user to recharge the prepaid account. It is essential to choose an appropriate recharge threshold to

(14)

reduce the probability that the in-progress service sessions are forced-terminated. In [C.60] we developed an analytic model to investigate the performance of RTCR for OCS. Based on our study, the network operator can select the appropriate parameter values for various traffic conditions. In [C.62] we proposed a prepaid application server to handle both the prepaid calls and messaging services in IMS. When both voice and messaging are simultaneously offered, delivery of a message during a call may result in force-termination of that call due to credit depletion. To address this issue, we described a strategy to determine if a prepaid message can be sent out during a call session. We proposed an analytic model to investigate the performance of this strategy. Our study provides guidelines to select appropriate input parameters for the prepaid application server. In UMTS, a user may be engaged in multiple voice and/or data prepaid sessions at the same time. For such services, it is important to distribute appropriate amounts of prepaid credit units to simultaneously executed sessions of a user. [C.70] studied the credit allocation for the prepaid sessions. To simultaneously accommodate more prepaid sessions for a user, we proposed a credit reclaim mechanism called Prepaid Credit Reclaim (PCR). Analysis and simulation experiments are conducted to investigate the performance of our mechanism. Our study indicates that PCR can significantly improve the performance of the prepaid mechanism. In UMTS, the extension of GPRS tunneling protocol called GTP' is utilized to transfer the Charging Data Records (CDRs) from GPRS Support Nodes (GSNs) to Charging Gateways (CGs). To ensure that the mobile operator receives the charging information, availability for the GTP' transmission is essential. One important issue on GTP' availability is connection failure detection. It is desirable to select appropriate parameter values to avoid false failure detections (e.g., temporary network congestions) while to detect the true failures quickly. In [C.70], we proposed an analytic model to compute the false failure detection probability and the expected true failure detection time. Based on our study, the network operator can select the appropriate parameter values for various traffic conditions to reduce the probability of false failure detection and/or true failure detection time. The above results have been transferred to TL/CHT.

In a mobile telecommunications network, the period when an MS resides in a cell (the radio coverage of a base station) is called the cell residence time of that MS. The period between when a call arrives at the MS and when the MS moves out the cell is called the excess life of the cell residence time for that MS. In performance evaluation of a mobile telecommunications network, it is important to derive the excess life distribution from the cell residence times. This distribution determines if a connected call will be handed over to a new cell, and therefore significantly affects the call dropping probability of the network. In mobile telecommunications network simulation, generating the excess-life random numbers is not a trivial task, which has not been addressed in the literature. In [C.22], we showed how to

(15)

generate the random numbers from the excess life distribution, and developed the excess-life random number generation procedures for cell residence times with gamma, Pareto, lognormal and Weibull distributions. Our study indicated that the generated random numbers closely match the true excess-life distributions.

In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. In [C.28], we proposed an efficient ID-based encryption algorithm. We actually implemented the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our solution outperforms a previously proposed algorithm by 20 -- 35%.

Broadband Wireless Access Technologies

In the access technologies on WLAN, the IEEE 802.11 standard adopts the binary exponential backoff (BEB) for collision avoidance. This approach may significantly degrade the network performance if contention window size is dramatically changed after each successful transmission degrades the network performance. In [C.54], we proposed a multi-chain backoff (MCB) algorithm which explores the possibility of using multiple backoff chains with different minimum contention windows and considering collision events on the wireless channel as hints to choose a proper chain. With the capability of switching to different backoff chains, our study shows that MCB offers higher throughput than the existing protocols, such as GDCF, IEEE 802.11, MILD, EIED, and LILD, yet still provides fair access to the wireless channel. In [C.96], we have also proposed a Fast Handoff Mechanism for IEEE 802.11 and IAPP networks, which can significantly reduce wireless handoff latency in IEEE 802.11 WLANs. In addition, a new power-saving method for WLAN is also developed [C.40]. On the other hand, with the increasing popularity of voice over WLAN (VoWLAN) services, there is a need to guarantee QoS for voice calls while supporting as many calls as possible. In [C.95], we propose a call admission control (CAC) and a resource adjustment (RA) mechanism to solve the handoff and resource redistribution issues over IEEE 802.11e wireless networks. The proposed scheme is designed to dynamically adjust the resource distribution among existing calls according to the network condition. Our study shows better utilization of bandwidth, decreased

(16)

blocking rate for new calls, and less dropping rate for handoff calls have been achieved by the proposed mechanisms. In [C.103], we have showed how to integrate SIP and 802.11e to conduct call admission control and resource reservation to support VoIP’s QoS in IEEE 802.11e WLANs. We have also suggested some adjustments and MAC enhancements to 802.11e to facilitate VoIP traffics over WLANs. This work received the Best Paper Awards in NCS 2005 [C.216].

In terms of MANETs, we have further proposed a Multi-rate wireless Fair Queuing (MR-FQ) algorithm in [C.55], which allows a flow to transmit at different rates according to its channel condition and lagging degree. MR-FQ takes both time and service fairness into account. It not only guarantees fairness and bounded delays for packet flows but also increases the overall system throughput. In [C.64], we have proposed several cluster-based semi-asynchronous power-saving protocols for multi-hop MANETs. We showed how to cluster neighboring hosts such that synchronous power-saving protocols can be adopted within individual clusters, and asynchronous power-saving protocols can be adopted between clusters. In [C.27], we provides an analytic tool to evaluate the expected throughput of the route with spectral reuse, assuming that hosts move following the discrete-time, random-walk model by a given routing path. Because while many routing protocols have been proposed for MANETs based on different criteria, few have considered the impact of multi-rate communication capability that is supported by many current WLAN products. The derived result can also be added as another metric for route selection. We proposed a hybrid routing method that combines the advantages of Hierarchical Routing Tree (HRT) and Ad-hoc On-demand Distance Vector (AODV) routing for multi-hop wireless LANs [C.38]. A ring based information collection architecture were presented to improve the power efficiency for wireless ad hoc sensor networks [C.42]. In wireless ad hoc networks, constructing and maintaining a topology with lower nodes degrees is usually intended to mitigate excessive traffic load on wireless nodes. However, keeping lower nodes degrees often prevents nodes from choosing better routes that consume less energy. Therefore, a tradeoff is between the node degree and the energy efficiency. In [C.19], an adjustable structure, named the r-neighborhood graph, is proposed to control the topology. This structure has the flexibility to be adjusted between the two objectives To construct this structure, we have investigated a localized algorithm, named PLA, consuming less transmitting power during construction and execute efficiently in O(nlogn) time..

The wireless mesh network (WMN) attracts lots of interest as a new broadband Internet access technology. However, increasing throughput is still an open and

(17)

challenging research issue. One potential solution is to utilize multiple channels dynamically. However, most existing works do not consider the routing issue but use some popular single-path routing protocols, such as AODV and DSR. In [C.102], we propose a novel protocol named Joint Multi-channel and Multi-path control (JMM) to investigate the benefit of multi-path routing in multi-channel WMNs from the aspect of end-to-end throughput. By dividing the time into slots, JMM coordinates channel usage among slots and schedules traffic flows on dual paths. Our study shows that JMM efficiently decomposes contending traffics over different channels, different time, and different paths, and hence leads to significant throughput improvement (more than 240%). To the best of our knowledge, this is the first work discussing the joint design of multi-channel control and multi-path routing for WMNs. Single-channel medium access control (MAC) protocols are usually adopted for wireless communication among MSs. However, as the number of MSs increases, the performance of such protocols degrades quickly due to collision/contention. In [C.56], we developed a lightweight MAC protocol for a multi-channel MANET called GRID, which is characterized by location awareness capability. GRID incurs no communication cost to conduct the assignment. Our study indicates that GRID is effective under both the fixed-channel-bandwidth and the fixed-total-bandwidth wireless environments. In [C.48] and [C.56], we have proposed multi-channel MAC protocols for multi-hop ad hoc networks. We proposed a novel MAC protocol with on-demand channel assignment for multi-hop ad hoc networks [C.48]. We have developed an efficient MAC protocol for multi-channel mobile ad hoc networks based on location information [C.56]. Then an efficient reliable broadcasting protocol for wireless mobile ad hoc networks has been developed [C.57]. In [C.82], we consider the next-generation wireless mesh networks in which each node may be equipped with multiple radio interfaces, each capable of running in one of several modes, one of several channels, and each capable of supporting multiple modulations. The proposed methodology is based on linear programming with network flow principles and radio channel access/interference models. Given a network topology, traffic requirements, and gateway capacities, we show how to allocate network interface cards and their channels to fully utilize channel bandwidths. In addition, we consider a channel assignment problem for multi-channel multi-radio wireless mesh networks. In [C.99], we formally model the hybrid channel assignment scheme into an integer linear programming formulation. We provide the necessary as well as sufficient conditions of any feasible assignment. We also show that the approximability of the considered problem.

In [C.22], we study how to exploit spectral reuse in resource allocation in an IEEE 802.16 mesh network, which includes routing tree construction, bandwidth

(18)

allocation, time-slot assignment, and bandwidth guarantee of real-time flows to meet the need of wide-range broadband wireless access at low cost. The proposed spectral reuse framework covers bandwidth allocation at the application layer, routing tree construction and resource sharing at the MAC layer, and channel reuse at the physical layer. To the best of our knowledge, this is the first work which formally quantifies spectral reuse in IEEE 802.16 mesh networks and which exploits spectral efficiency under an integrated framework.

About the access technologies on cellar networks, we have developed an adaptive mechanism for soft handover in OVSF WCDMA systems in [C.47]. We are the first group to identify the importance of managing OVSF codes in WCDMA systems, which has significant impact on the utilization of the system. Several strategies, such as leftmost and crowded-first schemes, were proposed. [C.52] [C.53]. These works have been used and cited by several other researchers. As the General Packet Radio Service (GPRS) network begins to provide such as ”push-to-talk” (PTT) service, delay-sensitive packets should be given higher priority in transmission. In [C.21], we study two channel allocation schemes that implement priority queues for priority packets in the GPRS network: Bitmap Channel Allocation (BCA) and Uplink State Flag Channel Allocation (USFCA). Our study shows that the transmission delay of priority packets in the GPRS network can be better guaranteed using USFCA. We have also analyzed performance of multi-piconet Bluetooth networks. New analytical methodologies were developed, which can more accurately predict Bluetooth network performance [C.49]. In [C.15] and [C.70] we proposed original overflow control schemes for UMTS high speed downlink packet access. We are the first research team to identify and attack this problem. In order to handle the roaming problem in heterogeneous access technologies, we have proposed a mobility support for mobile host roaming between WLAN and GPRS networks via a handoff decision model to reduce the latency [C.39].

The access technologies can also help developing location systems. A two-phase localization algorithm was also developed for location sensing in wireless sensor networks [C.43]. One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. In [C.18], we present a GPS-less, outdoor, self-positioning method for wireless sensor networks. In the optimal transmitting power, the worst-case accuracy for all data points is within 28.87% of the separation-distance between two adjacent reference points (RPs) and the average accuracy is within 15.51%. We have implemented our positioning method on a sensor network test bed and the actual measurement show that the method can achieve average accuracy within 17.9% of the

(19)

separation-distance between two adjacent RPs in an outdoor environment. To alleviate Signal strength fluctuation problem in a fingerprint-based localization system, we propose a scrambling method to exploit temporal diversity and spatial dependency of collected signal samples in [C.84]. In wireless Internet applications, we proposed a web content adaptation model which is formulated as a linear multi-choice knapsack problem [C.41]. A dynamic programming method was designed for solving it.

Applications and Services in B3G Networks

Mobile Ad-hoc Network (MANET) is usually considered as a stand-alone network. In [C.14], we propose a two-tier MANET, in which the high-tier gateways are equipped with an additional cellular interface to connect to the Internet. This greatly improves the connectivity of MANET because cellular networks nowadays are almost globally available. To provide seamless roaming capability in private MANET, a modified Mobile IP is implemented in the gateways. We also propose a load-balancing routing protocol to relieve the bottleneck problem of the gateways. In addition, with slight modification, DHCP is adopted in the two-tier MANET to configure the addresses. Considering that connecting to the Internet using cellular interfaces incurs charges and power consumption, we propose a push mechanism to allow the VoIP gateway to stay off-line when there is no calling activities and to be “woken up” when necessary [C.30]. The push approach can save energy and call charges and prevent the MANET subsystem from losing incoming voice calls. In our architecture, we do not modify the SIP server or client architecture. In addition, with few cellular interfaces, the VoIP gateway can serve multiple users inside the MANET concurrently. In next stage, we will address the bandwidth management and call admission control issues for the VoIP gateway.

Prepaid personal communication service (PCS) user has outnumbered post-paid users. In [C.64], we studied the charging issues of an integrated GSM and GPRS prepaid service, where a single prepaid account provides a user both voice and data services. The call setup and charging procedures for GSM and GPRS are presented using the CAMEL network architecture. To reduce the probability of terminating both on-going voice and data calls, we suggest that no new call be admitted when the user credit is below a threshold. An analytic model has been developed to evaluate the performance of the approach. Computer simulations have also been used to verify the simulation results. The numeric results indicate that the forced termination probability can be signicantly reduced by choosing an appropriate threshold of the user credit.

(20)

designed a simple, flexible framework for this interworking function [C.23]. The framework is based on a half-call model where a call is controlled by two half-call finite state machines (FSMs), one representing the state of the caller and the other representing the state of the callee. The interworking function has been implemented such that the caller FSM of one VoIP protocol can interact with the callee FSM of any VoIP protocol. The development effort of the interworking function is minimized since only two half-call FSMs for each VoIP protocol are needed and they can be developed independently as long as the design conforms to the same interface specification. We have developed an integrated call agent (ICA) that contains the half-call FSMs of H.323, SIP and MGCP. Calls between devices using these VoIP protocols can be set up, maintained and terminated by the ICAs.

In [C.32], we proposed a UMTS and WLAN interworking solution called WLAN-based GPRS support node (WGSN), which allows a UMTS/WLAN dual mode MS to access heterogeneous wireless services. To reduce the power consumption of an MS, most WGSN applications are not activated at the MS, and MS-terminated services, such as incoming voice over IP (VoIP) calls, are not supported. To address this issue, a push mechanism called session initiation protocol (SIP)-based push center (SPC) was implemented in the WGSN node. For an incoming call to an MS, the SPC utilizes the UMTS short message service to activate the SIP User Agent of the MS. We studied the performance of the SPC. An analytic model was proposed to derive the expected number of lost calls during the activation period. The analytic results are validated against the simulation experiments. Our study quantitatively indicates how the SPC performance is affected by the activation time and the timeout period, and we also suggest how to select appropriate values of these two factors to optimize the SPC performance.

4. Program Management: the Mechanism for Promoting Collaboration and

Integration among the Institutes Involved

5. A Summary of the Post-Program Plan(

(Including the Detailed Description of

Budget and Plan Adjustment of the next year)

Technology 2000-2004 2005-2006 2007-2008

B3G Core

Network

OSA Platform and

Applications

One-Pass

Authentication

SIP-IMS

(21)

Technology Online Charging System Broadband Wireless Access Technologies Two-tier heterogeneous mobile ad hoc network architecture. Multi-channel MAC Protocols. Power-saving protocols in MANET. Multi-channel, multi-radio wireless mesh network. QoS scheduling over WiMAX Power-save mechanism over WiMAX

6. International Cooperation Activities (Optional)

 Conducting SIP VoIP Interoperability Test with Institut National des Télécommunications (INT), France

 Studying complex computer network with Russian Academy of Sciences, Russian

 Inviting porf. Jonathan Liu for short-term research, Florida University (客座來訪交通

大學: 01/2006~07/2006)

 Organizing the "Rice-Xilinx WARP Workshop at NCTU", 2006/12 (2006 年無線通訊

網路開放平台研討會,與美國 Rice University 共同籌辦).

 Collaborating with prof. Anish Arora, Ohio State University, 國科會國際合作計畫 “大型無線隨意感測網路上的覆蓋及省電協定設計及實測”

VI. APPENDIX I:MINUTES FROM PROGRAM DISCUSSION MEETINGS

Main Project:::

 2004/05/04 -- Program Integration Meeting

一、時間:93 年 05 月 04 日(二)12:00 二、地點:清大資電館 447 會議室

(22)

三、會議主席:陳副校長文村、蔡文祥副校長 四、與會人員:黃能富教授、馮開明教授、楊啟瑞教授、張明峰教授、曾煜棋教授、 陳耀宗教授、曾憲雄教授、陳良弼教授、金仲達教授、(張正尚教授、 林盈達教授、鄭聖慶博士、林一平教授、簡榮宏教授、許健平教授、 袁賢銘教授、許雅三教授請假) 五、會議記錄:黃齡照 六、決議 (一)各子計畫目前的人事規劃為 4~7 位教授。 (二)計畫績效評估方式,視國科會的規定後再議。 (三)行政管理 1. 每一季開會一次,安排半天的時間,請每個子計畫報告研究進度,並希望 每一位主持人都能出席參加。時間訂於 3 月、6 月、9 月與 12 月的月底, 下一次會議時間為 9 月。 2. 子計畫與跨子計畫間的協調會議請自訂時間。 3. 計畫定期於期中舉辦成果發表會,期末為國科會考評。(第一年成果發表 會訂於期末) 4. 建構總計畫與各子計畫網頁資料。

 2004/10/18 -- Program Integration Meeting

一、時間:93 年 10 月 18 日 (一) 中午 12 點整 二、地點:交大浩然圖書館八樓第一會議室 三、會議主席:蔡文祥 校長、陳文村 副校長 四、與會人員:蔡文祥校長、陳文村副校長、簡榮宏教授、金仲達教授、張正尚教授、 李端興教授、黃能富教授、楊啟瑞教授、林盈達教授、陳智弘教授、李 詩偉教授、鄭聖慶博士、林一平教授、張明峰教授、曾煜棋教授、曾憲

(23)

雄教授、陳耀宗教授、張玉山副教授、王家祥教授 (請假:許健平教授、 袁賢銘教授、陳良弼教授、許雅三教授) 五、會議記錄:卓怡慧 六、決議 (一)行政管理 1. 下一次總計畫會議時間定於 12 月,兩校共同邀請學術界或法人單位擔任審查 委員進行成果展示發表會及相關績效評估。 2. 往後兩校總計畫聯合會議,以每季舉行一次為原則。報告內容除研究進度與成 果外,建議加入計畫相關的學術活動(邀訪學者)與產學合作等項目的報告。 3. 後卓越計畫相關智慧財產權歸屬性(專利權、著作權等) ,請事先諮詢學校法 務部門。 4. 請各子計畫注意經費運用進度;並請各子計畫助理隨時更新經費餘額,通知 並提醒主持人經費運用進度。

 2005/05/13 -- Program Integration Meeting

一、時間:94 年 05 月 13 日星期五 中午 12 點整 二、地點:交通大學電資大樓 203 會議室 蘭成廳 三、會議主席:蔡文祥 校長、陳文村 校長 四、與會人員:蔡文祥、陳文村、邱瀞德、李端興、馮明開、楊啓瑞(請假)、林盈達、 田伯隆、李詩偉、林一平、張明峰、簡榮宏、曾煜棋、陳耀宗、張玉 山、曾憲雄(林順傑代)、金仲達、吳宜鴻、蕭宏章 五、會議記錄:王慧敏 六、核閱: 七、決議: (一) 各分項計畫製作可技轉項目的說明單,格式可參考企業的產品或技 術簡介,並由金仲達教授與簡榮宏教授協調,訂定於 6 月底 ITRE 的時間舉辦說明會。 (二) 由於每季只舉辦一次兩校協調會議,請所有參與計劃的教授都來出 席開會。

(24)

(三) 開會投影片請各分項提早一周繳交,格式請儘量統一,以便彙整。

 2005/09/26 -- Program Integration Meeting

一、時間:94 年 09 月 26 日星期一 中午 12 點整 二、地點:清華大學資電館 447 會議室 三、會議主席:蔡文祥 校長、陳文村 校長 四、與會人員:張正尚教授、邱瀞德教授、許雅三教授、闕宏時、許育豪、吳自強博 士後、陳奕錡、 王慧敏、羅志鵬(代替楊啟瑞)、陳靜雯、林一平教授、 簡榮宏教授、曾煜棋教授、張明峰教授、施明婷、陳文村教授、黃啟 富、王瓊瑩、陳耀宗教授、蔡文祥教授、曾憲雄教授、葉秉哲博士後、 姚維民、林順傑、金仲達教授、林華君教授、廖文瑜 五、會議記錄:廖文瑜 六、討論議題: (一) 增加國際合作的機會,如:舉辦或多參加國際研討會、收取國外 的博士後研究員。 (二) 邀請專家學者來台短期訪問或演講時,可請他們做計劃的批評、 評論,如:10 月郭宗傑教授來訪、11 月游本中教授來訪時。 (三) 請金仲達教授及簡榮宏教授,根據以往審查委員的意見,列表出 該著重的項目,分配至各子計畫並加強其進度成果。 (四) 預定 11 月舉辦自評會議,邀請國外學者 2-3 位為審查委員。

(25)

 2005/12/16 -- Program Integration Meeting 一、時間:94 年 1 2 月 16 日(星期五)12:00 二、地點:交通大學電資大樓 203 會室蘭成廳 三、會議主席:陳文村校長、蔡文祥校長 四、出席人員:張正尚教授、黃能富教授、邱瀞德教授、吳仁銘教授、楊啟瑞教授、 林盈達教授、陳智弘教授、田伯隆教授、林一平教授、張明峰教授、 曾煜棋教授、簡榮宏教授、楊舜仁教授、陳志成教授、張志勇教授、 金仲達教授、陳良弼教授、李政崑教授、王家祥教授、陳宜欣教授、 及各子計畫相關研究助理人員等 五、會議記錄:何卉蓁 六、報告事項:總計畫及各分項計畫研究工作進度報告。 七、決議事項: (一)研發智財成果:請各分項計畫彙整所完成研發技術成果資料及專利 智財數據,舉凡技術移轉項目、專利智財、學術論文、 技術報告等。作為本年度國科會期中成果報告研發呈 現,並冀達成本計畫預期目標。 (二)技術移轉、產學合作:本計畫仍將繼續秉持創新科技研發、以達追 求學術卓越發展之目標,同時積極與產業界技 術合作交流,運用本計畫研發成果進行技術移 轉。 (三)擬訂於下次兩校計畫聯席會議時,再次檢討本計畫研發進度及產學 合作之執行狀況。

(26)

 2006/09/22 -- Program Integration Meeting 一、時間:95 年 09 月 22 日(五)14:00 二、地點:交通大學工程三館 345 會議室 三、會議主席:陳文村校長、蔡文祥校長 四、與會人員:金仲達教授、林盈達教授、張正尚教授、馮開明教授、楊啟瑞教授、 張明峰教授、曾煜棋教授、曾憲雄教授、楊舜仁教授、簡榮宏教授、 許健平教授、袁賢銘教授、陳宜欣教授、葉秉哲博後、詹振隆博後、 吳志強博後、曲衍旭博士、林君怡助理、林玫靜助理、沈上翔助理、 吳佳蓉助理、徐文靜助理、張巧涵助理、曹瑜珊助理 五、會議記錄:張巧涵 六、討論事項: (一)審查意見中,哪些是我們要改進的?哪些不用或無法改進? (二)如何增加內部技術對話與成功經驗分享? (三)如何增加國際知名度? (四)如何聚焦 challenging issues/impact/benchmark/state-of-the-art? 七、決議: (一)成果展現(前卓+後卓)技轉、paper 等參數並編 brochure。 (二)三大主題內部增加交流,內部交流時安排經驗傳承。 (三)各主題分開請專家(3~5 位)作一天的 review 和 comment(12 月之前)。 (四)請準備格式讓各子計畫寫報告來符合評審的期望(明年 2 月之前,今 年 12 月底初稿)。 (五)各子計畫的會議紀錄納入總計畫當檔案或附件。 (六)安排大約 4 月和 11 月各一次的經驗傳承研討會。 (七)下一次每三個月一次的報告分成三大主題。三大主題報告期前,三 大主題先個別開會、 整合,並依第 4 點的格式報告。 (八)後卓越計畫註冊申請網站:iWIN.org.tw 或 iWIN.edu.tw (iWIN.nthu.edu.tw 及 iWIN.nctu.edu.tw)

(27)

 2006/11/22 -- Program Integration Meeting 一、時間:95 年 11 月 22 日(三)14:00 二、地點:交通大學工程三館 345 會議室 三、會議主席:金仲達教授、林盈達教授 四、與會人員:蔡文祥校長、林一平教授、楊舜仁教授、卓傳育博後、吳志強博後、 闕宏時博士生、趙子萱博士生、許育豪博士生、梁睿琦博士生、何承 遠博士生、楊凱超博士生、李皇辰博士生、巫芳璟博士、賴婉婷碩士、 陳叡儀碩士生、鐘凱馨、吳至仁、陳建中、王宗志、 林君怡助理、林 玫靜助理、沈上翔助理、吳佳蓉助理、張巧涵助理、蔡靜怡助理 五、會議記錄:張巧涵 六、報告事項:林一平教授經驗傳承會議 七、傳承會議內容大綱: (一)寫作論文方面: 1.Writing style 很重要,其中要特別注意: (1)名詞定義 (2)文法用字用詞 (3)logic 2.Response to reviews 的態度: (1)constructive 意見要虛心接納

(2)遇到別人 reject 你的 paper 不用爭論。重要是要看看對方的意見,reject 不一定是負面的 3.如何讓你的 paper 被別人看,願意做 citation 的動作: (1)先上網被看,吸取別人意見,修改論文 (2)把你的 paper 寄給該領域的專家,請他們看看 (二)給教授的建議: 1.做研究最好是系列性的,例如:一系列 papers 2.如果你的學生有出國的機會,幫他作名片 3.當 reviewer 時,寫的 review 不要太隨便

(28)

4.寫書是 promotion 效果最大的,尤其是技術性的教科書: (1)寫國際教科書,要找好的出版商(好的出版商:Prentice Hall、Wiley、 Academic Press) (2)好的出版商就有好的 editor,可以幫你修改你的文法;另外好的出 版商也有好的 channel (3)第一本書找有名學者合作(國際合作/co-author) (三)建議 for 博士生/ junior 教授: 1.博班學生帶名片、負責在 timely 給知名人士 2.conference 時可以見到很多人,要善用 3.很多人只看 SCI journals 4.投稿策略(類型. 先 try A 級) 5.多拿獎: (1)recognition (2)建階梯 for senior 教授,讓他們有依據往上爬 (3)拿獎可以證明你的成就,讓你有信心,相對的你對自己的要求也會 變高 (四)學生的論文 Quality Control:

1.一段時間 focus on 一個學生(pipelined 而不是 parallel),直到論文出去為止,

才再 focus on 第二個學生

2.要求學生自動看規格標準缺什麼

3.學生要把論文拿給老師看之前,要做最好的準備

(五)時間分配:

1.Email 而不是 conference,因為 conference 很花時間 2.Reuse 過去 efforts(第二本書 3 個月完成)

3.熱忱、善用剩餘時間、reorganize 相關事情 4.晚上與週末繼續玩研究

(29)

 2006/11/30 -- Program Integration Meeting 一、時間:95 年 11 月 30 日(四)10:00 二、地點:交通大學工程三館 412 會議室 三、會議主席:金仲達教授、林盈達教授 四、與會人員:卓傳育、許育豪、黃啟富、顏在賢、羅志鵬、蘇淑茵、林君怡、沈上 翔、張巧涵 五、會議記錄:徐文靜 六、報告事項: (一)針對 95 年 9 月 22 日總計畫會議中的決議事項,報告、投影片及網頁格式 之討論。 (二)95/09/22 會議決議事項 1. 成果展現(前卓+後卓)技轉、paper 等參數並編 brochure。 2. 三大主題內部增加交流,內部交流時安排經驗傳承。 3. 各主題分開請專家(3~5 位)作一天的 review 和 comment(12 月之前)。 4. 請準備格式讓各子計畫寫報告來符合評審的期望(明年 2 月之前,今年 12 月底初稿)。 5. 各子計畫的會議紀錄納入總計畫當檔案或附件。 6. 安排大約 4 月和 11 月各一次的經驗傳承研討會。 7. 下一次每三個月一次的報告分成三大主題。三大主題報告期前,三大 主題先個別開會、整合,並依第 4 點的格式報告。 8. 後卓越計畫註冊申請網站:iWIN.org.tw 或 iWIN.edu.tw (iWIN.nthu.edu.tw 及 iWIN.nctu.edu.tw) 七、決議事項: (一)、國科會所規定之報告內容主要部份

I. BASIC INFORMATION OF THIS SUB-PROJECT

II.EXECUTIVE SUMMARY ON RESEARCH OUTCOMES OF THIS PROJECT

1.GENERAL DESCRIPTION OF THE PROJECT:INCLUDING OBJECTIVES OF THE

PROJECT

(30)

3.CATEGORIZED SUMMARY OF RESEARCH OUTCOMES. 4.ASUMMARY OF THE POST-PROJECT PLAN

5.INTERNATIONAL COOPERATION ACTIVITIES

III.STATISTICS ON RESEARCH OUTCOMES OF THIS PROJECT

IV.LIST OF WORKS,EXPENDITURES,MANPOWER, AND MATCHING SUPPORTS FROM THE PARTICIPATING INSTITUTES

V.APPENDIX I VI.APPENDIX II

(二)、針對後卓越計畫的報告、投影片及網頁內容,有以下決議:

1. II.EXECUTIVE SUMMARY ON RESEARCH OUTCOMES OF THIS PROJECT

2. BREAKTHROUGHS AND MAJOR ACHIEVEMENTS 應附下表

Subproject Technology State-of-the-art

(technology researcher、 affiliation) Breakthroughs (verbal description on transfer、citation、 comparable project) RDM LDI W.Smith Berkeley 10G v.s 5G

3. II.EXECUTIVE SUMMARY ON RESEARCH OUTCOMES OF THIS PROJECT

4. A Summary of the Post-Project Plan 應附下表

2000~2004 2005~2006 2007~2008 Tech 1. Tech 2. Tech 3. 各子計畫的部份,針對 Breakthroughs 提出 2 個 technology(不超過 3 個),從過去到現在及未來作一個時間表的呈現,說明其中的連貫及發展。

(31)

3.決議 1 與 2 所提的 technology 以 2 個為原則,不超過 3 個。 4.投影片呈現內容與報告格式內容相同,包含 I~V 部分,其中 II 的第 2 節及第 4 節要先附上決議 1 及決議 2 的表格。 5.網頁:以公告性質為主 (1).保留總計劃的部份,並將英文格式更改成與中文格式相同。 (2).將過時的資訊移除。(將首頁的會議紀錄、學術活動刪除) (3).子計畫的網頁入口,應先由英文入口再轉換成中文。 (4).子計畫的網頁內容要包含 II、III、VI 的報告內容,且 VI 的部份要 有 URL 連結可下載資料。 (5).將所有資料歸納於總計劃的主機之下,以便管理,再由計畫助理負 責更新。 (6).網頁更新的部份於 2007/02/28 前,資料收集完成後,亦更新完成。

 2007/01/08 -- Program Integration Meeting

一、 時間:96 年 01 月 08 日(星期一)14:00 二、 地點:清華大學電資館 447 會議室 三、 會議主席:陳文村校長、蔡文祥校長 四、 出席人員:張正尚教授、黃能富教授、邱瀞德教授、馮開明教授、楊啟瑞教授、 林盈達教授、田伯隆教授、林一平教授、張明峰教授、曾煜棋教授、 簡榮宏教授、楊舜仁教授、陳志成教授、張志勇教授、金仲達教授、 陳耀宗教授、曾憲雄教授、袁賢銘教授、葉秉哲博士、金仲達教授、 陳宜欣教授、及各子計畫相關研究助理人員等 五、 會議記錄:徐文靜 六、 報告事項:總計畫及各分項計畫研究工作進度報告。 七、 決議事項: (一) 報告格式請統一,並附上 95/11/30 開會決議中應附之表格(請參照 95/11/30 會議紀錄)。

(32)

(二) 各分項計劃於一月 15 日之前繳交成果報告,以便總計畫彙整。 (三) 各計畫報告於一月底上傳至國科會。

 2007/04/20 -- Program Integration Meeting

一、時間:96 年 04 月 20 日(五)14:00 二、地點:交通大學工程三館 427 會議室 三、會議主席:陳文村校長、蔡文祥校長 四、與會人員:金仲達教授、林盈達教授、張正尚教授、馮開明教授、楊啟瑞教授、 張明峰教授、曾煜棋教授、曾憲雄教授、楊舜仁教授、簡榮宏教授、 許健平教授、袁賢銘教授、陳宜欣教授、葉秉哲博後、詹振隆博後、 曲衍旭博士、林君怡助理、林玫靜助理、何承遠助理、吳佳蓉助理、 徐文靜助理、楊耀萱助理、楊佳文助理、蔡靜怡助理 五、會議記錄:楊耀萱 六、計畫進度成果報告

 2007/10/12 -- Program Integration Meeting

一、時間:96 年 10 月 12 日(五)14:00 二、地點:清華大學資電館 4 樓 447 會議室 三、會議主席:陳文村校長、蔡文祥校長 四、與會人員:金仲達教授、陳耀宗教授、張正尚教授、馮開明教授、林華君教授、 楊啟瑞教授、張明峰教授、曾煜棋教授、曾憲雄教授、黃能富教授、 楊舜仁教授、簡榮宏教授、許健平教授、袁賢銘教授、葉秉哲博後、 詹振隆博後、施汝霖博後、陳柏諭博班生、田柏隆博班生、曲衍旭博 士、王竣聰、黃冠霖、林君怡助理、林玫靜助理、何承遠助理、徐文 靜助理、楊耀萱助理、楊佳文助理、蔡靜怡助理 五、會議記錄:徐文靜 六、計畫進度成果報告 七、討論事項:

(33)

(一).後卓越成果展時間及方式? (二)持續合作之議題?

八、決議:

(一)預計於 1 月初發表成果展,將技轉項目及自評合於成果展中。 (二)建議各計畫討論後,於下一次會議討論清、交未來合作議題。

(34)

VII. APPENDIX II:

1. PUBLICATION LIST(

(CONFERENCES, JOURNALS, BOOKS, BOOK

CHAPTERS, etc.)

Journal papers

[C.1] Y. Fang, P. Lin, and Y. -B. Lin, Mobility and Resource Management, IEEE Wireless Communications, 11(4): 4-5, 2004.

[C.2] S.-R. Yang, and Y.-B. Lin, Modeling UMTS Discontinuous Reception Mechanism. IEEE Transactions on Wireless Communications, 4(1), 2005.

[C.3] Y.-B. Lin, Per-user Checkpointing for Mobility Database Failure Restoration. IEEE Transactions on Mobile Computing, 4(2): 189-194, 2005.

[C.4] Y.-R. Haung, and Y.-B. Lin, A Bandwidth-on-demand Strategy for GPRS. IEEE Transactions on Wireless Communications, 4(4): 1394-1399, 2005.

[C.5] M. Fang, and Y.-B. Lin, Mobility Management and Signaling Traffic Analysis for Multi-tier Wireless Mobile Networks. IEEE Transactions on Vehicular Technology, 54(5): 1843-1853, 2005.

[C.6] S.-Y. Wang, and Y.-B. Lin, Wireless Internet Simulation Using NCTUns 2.0: An Innovative Network Simulator and Emulator. Wireless Communications and Mobile Computing, 5(8): 89-916, 2005.

[C.7] H.-N. Hung, Y.-B. Lin, M. -K. Lu, and, N. -F. Peng. A Statistic Approach for Deriving the Short Message Transmission Delay Distributions. IEEE Transactions on Wireless Communications., 3(6): 2345-2352, 2004.

[C.8] A.-C. Pang, and Y. -B. Lin, VoIP Services for Mobile Networks, Upgrade, the European Journal for the Informatics Professional, 5(1): 8-11, February, 2004. http://www.upgrade-cepis.org

[C.9] A.-C. Pang, and Y. -B. Lin, VoIP Services for Mobile Networks, Novatica, Redes I nalambricas: una nueva era en las Telecomunicaciones, 167, Jan. -Feb., 2004.

[C.10] Chen, M.F., Lin, Y.-B., Rao, R. C.-H., Wu, Q.C.A Mobile Service Platform Using Proxy Technology,Wireless Communications and Mobile Computing Journal, 6: 17-34, 2006. [C.11] Lin, Y.-B., Tsai, M.-H.Caching in I-CSCF of UMTS IP Multimedia Subsystem.IEEE

Transactions on Wireless Communications,5(1): 186-192, 2006.

[C.12] Y.-B. Lin, M.-H. Tsai, Caching in I-CSCF of UMTS IP Multimedia Subsystem. IEEE Transactions on Wireless Communications, 5(1): 186-192, 2006.

[C.13] Y.-B. Lin, M.-F. Chang, M.-T. Hsu,, and L.-Y. Wu, One-Pass GPRS and IMS Authentication Procedure for UMTS. IEEE Journal on Selected Areas in Communications, 23(6): 1233-1239, 2005.

(35)

[C.14] P. Lin, Y. -B. Lin, and Chlamtac, I. Module Count-Based Overflow Control Scheme for UMTS High Speed Downlink Packet Access. IEEE Transactions on Vehicular Technology, 53(2): 2004.

[C.15] P. Lin, Y. -B. Lin,, and Chlamtac, I. Overflow Control for UMTS High-Speed Downlink Packet Access. IEEE Trans. on Wireless Communications, 3(2): 524-533, 2004.

[C.16] H.-H. Chang, M.-F. Chang and C.-C. Tseng, “An Analysis of Location Record Checkpointing Interval for Mobility Database in PCS Networksm,” Accepted for publication, ACM Wireless Networks,

[C.17] S.-I. Sou, and Y.-B. Lin, Modeling of Mobility Database Failure Restoration using Checkpoint Schemes. IEEE Transactions on Wireless Commun (to appear).

[C.18] C.-M. Chou, S.-F. Hsu, H.-Y. Lee, Y.-C. Lin, Y.-B. Lin, and R.S. Yang. ICL OSA: A CORBA-based Open Service Access System. International Journal of Wireless and Mobile Computing (to appear).

[C.19] P. Lin, Y.-B. Lin, C.S. Yen, and J.-Y. Jeng, Credit Allocation for UMTS Prepaid Service, IEEE Transactions on Vehicular Technology (to appear).

[C.20] A.-C. Pang, Y.-B. Lin, H.-M. Tsai, and P. Agrawal, Serving Radio Network Controller Relocation for UMTS All-IP Network. IEEE Journal on Selected Areas in Communications, 22(4); 617-629, 2004.

[C.21] Y.-B. Lin, and A.-C. Pang, Impact of Mobility on Mobile Telecommunications Networks. Wireless Communications and Mobile Computing Journal (to appear).

[C.22] L.-W. Chen, Y.-C. Tseng, Y.-C. Wang, D.-W. Wang, and J.-J. Wu, "Exploiting Spectral Reuse in Routing, Resource Allocation, and Scheduling for IEEE 802.16 Mesh Networks", IEEE Trans. on Vehicular Technology, to appear. (SCI, EI)

[C.23] S.-R. Yang, and Y.-B. Lin, Performance Evaluation of Location Management in UMTS IEEE Transactions on Vehicular Technologies (to appear).

[C.24] Y. Xiao, M. Fang, and Y.-B. Lin, Hierarchical Implicit Deregistration with Forced Registrations in 3G Wireless Networks. IEEE Transactions on Vehicular Technologies (to appear).

[C.25] H.-N. Hung, P.-C. Lee, Y.-B. Lin, and N.-F. Peng, Modeling Channel Assignment of Small-Scale Cellular Networks. IEEE Transactions on Wireless Communications, 4(2): 646-652, 2005.

[C.26] Y.-C. Wong, T.-P. Wang, and Y.-B. Lin, Effects of Route Optimization on Out-of-Order Packet Delivery in Mobile IP Networks. Information Sciences, 169 (3-4): 263-278, 2005. [C.27] L.-W. Chen, W. Chu, Y.-C. Tseng, and J.-J. Wu, "Route Throughput Analysis with Spectral

Reuse for Multi-Rate Mobile Ad Hoc Networks", Journal of Information Science and Engineering, to appear. (SCIE, EI)

[C.28] J.-S. Hwu, S.-F. Hsu, Y.-B. Lin, and R.-J. Chen, End-to-end Security Mechanisms for SMS. International Journal of Security and Networks (to appear).

數據

Figure 2.1 the B3G Network Architecture

參考文獻

相關文件

【5+2產業】亞洲矽谷 電腦資訊技術類 物聯網自動灌溉與排水系統設計班. 【5+2產業】亞洲矽谷

 區域網路 (Local Area Network, LAN) 為規模最小 的網路, 範圍通常在 2 公里內, 例如:同一層樓的 辦公室, 或是同一棟建築物內的網路。...

分區技能競賽 資訊與網路技術. 正式賽

你是 Dora 公司裡的 IT Expert,日前收到Dora的委託架設內部 dora.local 網路,最近 Dora 公司業績長紅,Dora 的合作夥伴 Diego 想要拓展分公司,但是搗蛋鬼不相信你的技術所 以想要說服

[r]

機器人、餐飲服務、花藝、雲端運算、網路安全、3D 數位遊戲藝術、旅 館接待、行動應用開發、展示設計、數位建設

 Number of spectral averages:頻譜 平均的數量,設定為1。. 教育部資通訊科技人才培育先導型計畫

雜誌 電台 數碼廣播 期刊 漫畫 電影 手機短訊 圖書 手機通訊應用程式 即時通訊工具 網路日誌(blog) 車身廣告 霓虹燈招牌 電子書