{"id":1462,"date":"2014-07-14T12:25:00","date_gmt":"2014-07-14T20:25:00","guid":{"rendered":"http:\/\/802world.org\/plenary\/?p=1462"},"modified":"2014-07-14T12:34:29","modified_gmt":"2014-07-14T20:34:29","slug":"tutorial-sessions-monday-july-14","status":"publish","type":"post","link":"http:\/\/802world.org\/plenary\/2014\/07\/14\/tutorial-sessions-monday-july-14\/","title":{"rendered":"Tutorial Sessions &#8211; Monday July 14"},"content":{"rendered":"<h3>All sessions will take place in Seaport FGH at the Manchester Grand Hyatt<\/h3>\n<p><span style=\"color: #ff0000\"><b>SECTION #1 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 6:00 to 7:30 PM<\/b><\/span><\/p>\n<p><b><\/b><b>TITLE : <\/b>Pervasive Surveillance of the Internet \u2013 Designing Privacy into Internet Protocols<\/p>\n<p><b><\/b><b>NAME OF PRESENTERS, THEIR\u00a0AFFILIATIONS\u00a0AND CONTACT INFO:<\/b><b>\u00a0<\/b><\/p>\n<div align=\"center\">\n<table width=\"533\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<p align=\"center\"><b>Presenter(s) Name:<\/b><b><\/b><\/p>\n<\/td>\n<td width=\"235\">\n<p align=\"center\"><b>Affiliation:<\/b><b><\/b><\/p>\n<\/td>\n<td>\n<p align=\"center\"><b>Email Address:<\/b><b><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Juan Carlos Zuniga<\/p>\n<\/td>\n<td width=\"235\">\n<p align=\"center\">InterDigital<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:JuanCarlos.Zuniga@InterDigital.com\">JuanCarlos.Zuniga@InterDigital.com<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Ted Hardie<\/p>\n<\/td>\n<td width=\"235\">\n<p align=\"center\">Google<\/p>\n<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Alissa Cooper<\/p>\n<\/td>\n<td width=\"235\">\n<p align=\"center\">Cisco<\/p>\n<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Lily Chen<\/p>\n<\/td>\n<td width=\"235\">\n<p align=\"center\">NIST<\/p>\n<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><b>\u00a0<\/b><\/p>\n<p><b>ABSTRACT<\/b><\/p>\n<p><b><\/b>Pervasive surveillance of Internet refers to bulk-data collection and massive monitoring. Standards Developing Organizations (SDOs) such as IETF and W3C consider pervasive monitoring similar to other security problems and they are currently working to strengthen Internet technologies to better defend against this problem.<\/p>\n<p>The objective of this tutorial is to create awareness of the latest developments in this area, initiate dialogue within IEEE 802 WGs, and raise questions that could potentially need further consideration and generate immediate and long-term action plans in the different IEEE 802 WGs.<\/p>\n<p><span style=\"color: #ff0000\"><b>SECTION #2 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 7:30 to 9:00 PM<\/b><\/span><\/p>\n<p><b><\/b><b>TITLE: <\/b>Spectrum Occupancy Sensing<\/p>\n<p><b><\/b><b>NAME OF PRESENTERS, THEIR\u00a0AFFILIATIONS\u00a0AND CONTACT INFO:<\/b><\/p>\n<p><b>\u00a0<\/b><\/p>\n<div align=\"center\">\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<p align=\"center\"><b>Presenter(s) Name:<\/b><b><\/b><\/p>\n<\/td>\n<td>\n<p align=\"center\"><b>Affiliation:<\/b><b><\/b><\/p>\n<\/td>\n<td>\n<p align=\"center\"><b>Email Address:<\/b><b><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Apurva Mody<\/p>\n<\/td>\n<td>\n<p align=\"center\">BAE Systems<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:apurva.mody@baesystems.com\">apurva.mody@baesystems.com<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Prof. Jeffrey Reed<\/p>\n<\/td>\n<td>\n<p align=\"center\">Virginia Tech<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:reedjh@vt.edu\">reedjh@vt.edu<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Prof. Sumit Roy<\/p>\n<\/td>\n<td>\n<p align=\"center\">University of Washington<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:roy@ee.washington.edu\">roy@ee.washington.edu <\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Ivan Reede<\/p>\n<\/td>\n<td>\n<p align=\"center\">AmeriSys<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:I_reede@amerisys.com\">I_reede@amerisys.com<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Dr. Chittabrata Ghosh<\/p>\n<\/td>\n<td>\n<p align=\"center\">Nokia<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:Chittabrata.ghosh@nokia.com\">Chittabrata.ghosh@nokia.com<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Denis Roberson<\/p>\n<\/td>\n<td>\n<p align=\"center\">Illinois Institute of Technology<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:robersond@iit.edu\">robersond@iit.edu<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><b>\u00a0<\/b><\/p>\n<p><b>ABSTRACT<\/b><\/p>\n<p>Recently, FCC, NTIA and other regulators have broadened their horizons for cooperative spectrum sharing approaches in order to optimize spectrum utilization. For example see the PCAST Report [1] &#8211; Realizing Full Potential of Government Held Spectrum. FCC\/ NTIA are in the process of opening new spectrum bands that specifically require multi-levels of regulated users to share the spectrum utilizing cognitive radio behavior. For our purposes, we define spectrum sharing as a mechanism that ensures that primary services are protected from interference while allowing other opportunistic devices to share the spectrum.<\/p>\n<p><span style=\"color: #ff0000\"><b>SECTION #3 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 9:00 to 10:30 PM<\/b><\/span><\/p>\n<p><b><\/b><b>TITLE: <\/b>NETCONF\/YANG Tutorial for the IEEE 802<\/p>\n<p><b><\/b><b>NAME OF PRESENTERS, THEIR\u00a0AFFILIATIONS\u00a0AND CONTACT INFO:<\/b><\/p>\n<p><b>\u00a0<\/b><\/p>\n<div align=\"center\">\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<p align=\"center\"><b>Presenter(s) Name:<\/b><b><\/b><\/p>\n<\/td>\n<td>\n<p align=\"center\"><b>Affiliation:<\/b><b><\/b><\/p>\n<\/td>\n<td>\n<p align=\"center\"><b>Email Address:<\/b><b><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p align=\"center\">Andy Berman<\/p>\n<\/td>\n<td>\n<p align=\"center\">YumaWorks<\/p>\n<\/td>\n<td>\n<p align=\"center\"><a href=\"mailto:andy@yumaworks.com\">andy@yumaworks.com<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><b>\u00a0<\/b><\/p>\n<p><b>ABSTRACT<\/b><\/p>\n<p>NETCONF is a standards track protocol developed in the IETF, and YANG is the associated data modeling language. Recently the IESG recommended the usage of NETCONF and YANG for new management work in the IETF that involves configuration management operations.\u00a0\u00a0 This 1.5 hour tutorial covers the NETCONF and YANG\u00a0 concepts.<\/p>\n<p>Taken into account that the IEEE has been developing its data models with SMIv2, this session will highlight the differences and advantages of YANG\/NETCONF over SMIv2\/SNMP.<\/p>\n<p>As an introduction, the basics will be covered (operations, datastore, capabilities, etc&#8230;), then some more advanced concepts such as NETCONF datastore editing, YANG constraints, YANG module reuse, NETCONF and YANG extensions, etc. The tutorial objectives are to trigger interest and provide some starting points to start developing data models with YANG.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All sessions will take place in Seaport FGH at the Manchester Grand Hyatt SECTION #1 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 6:00 to 7:30 PM TITLE : Pervasive Surveillance of the Internet \u2013 Designing Privacy into Internet Protocols NAME OF PRESENTERS, THEIR\u00a0AFFILIATIONS\u00a0AND CONTACT INFO:\u00a0 Presenter(s) Name: Affiliation: Email Address: Juan Carlos Zuniga InterDigital JuanCarlos.Zuniga@InterDigital.com Ted Hardie Google Alissa Cooper Cisco [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1,4],"tags":[],"class_list":["post-1462","post","type-post","status-publish","format-standard","hentry","category-to-delete","category-announcements","entry"],"_links":{"self":[{"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/posts\/1462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/comments?post=1462"}],"version-history":[{"count":2,"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/posts\/1462\/revisions"}],"predecessor-version":[{"id":1464,"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/posts\/1462\/revisions\/1464"}],"wp:attachment":[{"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/media?parent=1462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/categories?post=1462"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/802world.org\/plenary\/wp-json\/wp\/v2\/tags?post=1462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}