Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583418
J. Pérez-Romero, A. Raschellà, O. Sallent, A. Umbert
The demand for higher data rates, capacity and better Quality of Service (QoS) is constantly growing; therefore, there is a pressing need for efficient use of wireless network resources. In this context, the application of Cognitive Radio (CR) principle has emerged as a solution to the problem of spectrum scarcity. In this respect, this paper presents an algorithm that enables multi-band spectrum selection for wireless applications under interference variations in the available spectrum blocks. The algorithm is formulated as a Partially Observable Markov Decision Process (POMDP) targeting the maximization of a reward function that captures how suitable each allocated spectrum block is for the data transmission in each radio link depending on the application bit rate requirements.
{"title":"Multi-band spectrum selection framework based on partial observations","authors":"J. Pérez-Romero, A. Raschellà, O. Sallent, A. Umbert","doi":"10.1109/WoWMoM.2013.6583418","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583418","url":null,"abstract":"The demand for higher data rates, capacity and better Quality of Service (QoS) is constantly growing; therefore, there is a pressing need for efficient use of wireless network resources. In this context, the application of Cognitive Radio (CR) principle has emerged as a solution to the problem of spectrum scarcity. In this respect, this paper presents an algorithm that enables multi-band spectrum selection for wireless applications under interference variations in the available spectrum blocks. The algorithm is formulated as a Partially Observable Markov Decision Process (POMDP) targeting the maximization of a reward function that captures how suitable each allocated spectrum block is for the data transmission in each radio link depending on the application bit rate requirements.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583390
Ali Gouta, Charles Hong, D. Hong, Anne-Marie Kermarrec, Yannick Le Louédec
HTTP Adaptive bitrate video Streaming (HAS) is now widely adopted by Content Delivery Network Providers (CDNPs) and Telecom Operators (Telcos) to improve user Quality of Experience (QoE). In HAS, several versions of videos are made available in the network so that the quality of the video can be chosen to better fit the bandwidth capacity of users. These delivery requirements raise new challenges with respect to content caching strategies, since several versions of the content may compete to be cached. In this paper we present analysis of a real HAS dataset collected in France and provided by a mobile telecom operator involving more than 485,000 users requesting adaptive video contents through more than 8 million video sessions over a 6 week measurement period. Firstly, we propose a fine-grained definition of content popularity by exploiting the segmented nature of video streams. We also provide analysis about the behavior of clients when requesting such HAS streams. We propose novel caching policies tailored for chunk-based streaming. Then we study the relationship between the requested video bitrates and radio constraints. Finally, we study the users' patterns when selecting different bitrates of the same video content. Our findings provide useful insights that can be leveraged by the main actors of video content distribution to improve their content caching strategy for adaptive streaming contents as well as to model users' behavior in this context.
{"title":"Large scale analysis of HTTP Adaptive Streaming in mobile networks","authors":"Ali Gouta, Charles Hong, D. Hong, Anne-Marie Kermarrec, Yannick Le Louédec","doi":"10.1109/WoWMoM.2013.6583390","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583390","url":null,"abstract":"HTTP Adaptive bitrate video Streaming (HAS) is now widely adopted by Content Delivery Network Providers (CDNPs) and Telecom Operators (Telcos) to improve user Quality of Experience (QoE). In HAS, several versions of videos are made available in the network so that the quality of the video can be chosen to better fit the bandwidth capacity of users. These delivery requirements raise new challenges with respect to content caching strategies, since several versions of the content may compete to be cached. In this paper we present analysis of a real HAS dataset collected in France and provided by a mobile telecom operator involving more than 485,000 users requesting adaptive video contents through more than 8 million video sessions over a 6 week measurement period. Firstly, we propose a fine-grained definition of content popularity by exploiting the segmented nature of video streams. We also provide analysis about the behavior of clients when requesting such HAS streams. We propose novel caching policies tailored for chunk-based streaming. Then we study the relationship between the requested video bitrates and radio constraints. Finally, we study the users' patterns when selecting different bitrates of the same video content. Our findings provide useful insights that can be leveraged by the main actors of video content distribution to improve their content caching strategy for adaptive streaming contents as well as to model users' behavior in this context.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130418706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583473
Karim Emara, W. Wörndl, J. Schlichter
Location privacy is one of the main challenges in vehicular ad hoc networks (VANET), which aims to protect vehicles from being tracked. Most of research work concerns changing pseudonyms efficiently to avoid linking messages through them. However, the sensitive information the vehicles send periodically in beacons make them vulnerable to tracking even if beacons are totally anonymous. In this paper, we used the nearest neighbor probabilistic data association (NNPDA) technique to track vehicles through information sent in anonymous beacons. We evaluated the implemented tracker against different vehicle densities, speeds, beacon rates, random noises and packet delivery ratios. The achieved tracking accuracy asserts the necessity of securing beacon messages from global observer attacks.
{"title":"Vehicle tracking using vehicular network beacons","authors":"Karim Emara, W. Wörndl, J. Schlichter","doi":"10.1109/WoWMoM.2013.6583473","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583473","url":null,"abstract":"Location privacy is one of the main challenges in vehicular ad hoc networks (VANET), which aims to protect vehicles from being tracked. Most of research work concerns changing pseudonyms efficiently to avoid linking messages through them. However, the sensitive information the vehicles send periodically in beacons make them vulnerable to tracking even if beacons are totally anonymous. In this paper, we used the nearest neighbor probabilistic data association (NNPDA) technique to track vehicles through information sent in anonymous beacons. We evaluated the implemented tracker against different vehicle densities, speeds, beacon rates, random noises and packet delivery ratios. The achieved tracking accuracy asserts the necessity of securing beacon messages from global observer attacks.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123877180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583363
V. Arnaboldi, M. Conti, Franca Delmastro, Giovanni Minutiello, L. Ricci
In this paper we present DroidOppPathFinder, a Mobile Social Network application designed to generate and share contents about paths for fitness activity in a city. The application is able to recommend the best path in a specific area by analyzing the user's preferences and real-time environmental characteristics collected by heterogeneous sensing devices and services through opportunistic sensing mechanisms. To this aim, DroidOppPathFinder is developed on top of our middleware CAMEO, which provides context- and social-aware functionalities to improve both the application's performances and the user experience. This work represents a real example of opportunistic sensing service as additional support to the development of MSN applications. In addition, it demonstrates an efficient management of heterogeneous sensing data and services on mobile devices in order to further enrich the context of both local and remote nodes.
{"title":"DroidOppPathFinder: A context and social-aware path recommender system based on opportunistic sensing","authors":"V. Arnaboldi, M. Conti, Franca Delmastro, Giovanni Minutiello, L. Ricci","doi":"10.1109/WoWMoM.2013.6583363","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583363","url":null,"abstract":"In this paper we present DroidOppPathFinder, a Mobile Social Network application designed to generate and share contents about paths for fitness activity in a city. The application is able to recommend the best path in a specific area by analyzing the user's preferences and real-time environmental characteristics collected by heterogeneous sensing devices and services through opportunistic sensing mechanisms. To this aim, DroidOppPathFinder is developed on top of our middleware CAMEO, which provides context- and social-aware functionalities to improve both the application's performances and the user experience. This work represents a real example of opportunistic sensing service as additional support to the development of MSN applications. In addition, it demonstrates an efficient management of heterogeneous sensing data and services on mobile devices in order to further enrich the context of both local and remote nodes.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583481
Axel Neumann, L. Navarro, Roger Baig, P. Garcia
Community wireless mesh networks are decentralized and cooperative structures with participation rules that define their freedom, openness and neutrality. The operation of these networks require routing algorithms that may impose additional unnecessary technical restrictions in the determination of routes that can restrict the freedom of community users. We propose a receiver-driven discretionary routing mechanism where each receiver (the intended destination of the packet) can freely specify delivery objectives and remain compatible with the collaborative approach of community networks. Each node has a unique identifier and can announce the description of its offer and also the description of its routing policy with preferences to deliver traffic to it. BMX6 provides a “hash-based profile propagation mechanism” to disseminate descriptions. This receiver-driven routing can be applied to express preferences for desirable nodes and paths, or to restrict traffic to trusted nodes enabling trust and security aware routing. We validate our contributions with a proof of concept implementation of key concepts, as an extension of the BMX6 routing protocol, that confirms its feasibility and scalability.
{"title":"Receiver-driven routing for community mesh networks","authors":"Axel Neumann, L. Navarro, Roger Baig, P. Garcia","doi":"10.1109/WoWMoM.2013.6583481","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583481","url":null,"abstract":"Community wireless mesh networks are decentralized and cooperative structures with participation rules that define their freedom, openness and neutrality. The operation of these networks require routing algorithms that may impose additional unnecessary technical restrictions in the determination of routes that can restrict the freedom of community users. We propose a receiver-driven discretionary routing mechanism where each receiver (the intended destination of the packet) can freely specify delivery objectives and remain compatible with the collaborative approach of community networks. Each node has a unique identifier and can announce the description of its offer and also the description of its routing policy with preferences to deliver traffic to it. BMX6 provides a “hash-based profile propagation mechanism” to disseminate descriptions. This receiver-driven routing can be applied to express preferences for desirable nodes and paths, or to restrict traffic to trusted nodes enabling trust and security aware routing. We validate our contributions with a proof of concept implementation of key concepts, as an extension of the BMX6 routing protocol, that confirms its feasibility and scalability.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583367
Hessan Feghhi, P. Patras, D. Malone
As open-source WiFi device drivers are increasingly available, wireless equipment can be configured to disobey the 802.11 specification, with the goal of achieving performance gains, to the detriment of fair users.We demonstrate a practical implementation of a node policing scheme that combats such selfish behaviour, using commercial off-the-shelf hardware and a modified firmware. With a small testbed, we show that access points running our scheme can detect misbehaving stations, inflict punishment upon them and effectively restore fairness in the network.
{"title":"Practical node policing in 802.11WLANs","authors":"Hessan Feghhi, P. Patras, D. Malone","doi":"10.1109/WoWMoM.2013.6583367","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583367","url":null,"abstract":"As open-source WiFi device drivers are increasingly available, wireless equipment can be configured to disobey the 802.11 specification, with the goal of achieving performance gains, to the detriment of fair users.We demonstrate a practical implementation of a node policing scheme that combats such selfish behaviour, using commercial off-the-shelf hardware and a modified firmware. With a small testbed, we show that access points running our scheme can detect misbehaving stations, inflict punishment upon them and effectively restore fairness in the network.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583488
B. Apolloni, M. Fiasché, G. Galliani, C. Zizzo, G. Caridakis, Georgios Siolas, S. Kollias, M. Graña, F. Barriento, S. Jose
At a time when socialism as an economic option is variously questioned, very few people are against social instances of our life such as entertainment, customer assistance, and so on. This happens with the management of many things accompanying our life as well. We can find both the reason and the evidence for the viability of this trend in one very basic fact: things are social because they work better. However, also in this sphere social politics are highly questionable. Here we introduce the perspective adopted in the European project SandS within a framework of Internet of Things. In this case things are agents interacting on the network within a service centric approach where a sound hierarchy dispatches instructions. It is a complete ecosystem where the social network develops a collective intelligence subtending new concrete functionalities that are centered on the user willing and fostered by his/her feedbacks. The central role of the user reflects on all aspects of the ecosystem, from the family of things which are socially governed: the household appliances (the white goods) that affect our everyday life, up to the employed hardware and software: strictly open source.
{"title":"Social things - The SandS instantiation","authors":"B. Apolloni, M. Fiasché, G. Galliani, C. Zizzo, G. Caridakis, Georgios Siolas, S. Kollias, M. Graña, F. Barriento, S. Jose","doi":"10.1109/WoWMoM.2013.6583488","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583488","url":null,"abstract":"At a time when socialism as an economic option is variously questioned, very few people are against social instances of our life such as entertainment, customer assistance, and so on. This happens with the management of many things accompanying our life as well. We can find both the reason and the evidence for the viability of this trend in one very basic fact: things are social because they work better. However, also in this sphere social politics are highly questionable. Here we introduce the perspective adopted in the European project SandS within a framework of Internet of Things. In this case things are agents interacting on the network within a service centric approach where a sound hierarchy dispatches instructions. It is a complete ecosystem where the social network develops a collective intelligence subtending new concrete functionalities that are centered on the user willing and fostered by his/her feedbacks. The central role of the user reflects on all aspects of the ecosystem, from the family of things which are socially governed: the household appliances (the white goods) that affect our everyday life, up to the employed hardware and software: strictly open source.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124262376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583407
Bambang A. B. Sarif, M. Pourazad, P. Nasiopoulos, Victor C. M. Leung
Video sensor networks (VSN) offer an interesting platform for a distributed and flexible surveillance system. In such a system, video compression and wireless transmission are the major operations on each video node. For a battery-powered wireless video sensor, it is essential to maximize the power efficiency of these two operations. Currently, H.264/AVC is the most widely used ITU-T and ISO/IEC video coding standard. Previous works on determining the trade-off between compression and transmission that minimizes energy consumption consider oversimplified coding configurations, thus not taking full advantage of the flexibility and advanced features of H.264/AVC. Choosing the right configuration and setting parameters that lead to optimal encoding performance is of prime importance for video sensor network (VSN) applications, especially since VSN is constrained in terms of bandwidth and energy resources. This paper studies the relationship between the picture quality, the transmission rate, and the complexity of the encoder to expound the energy consumption trade-off between encoding and transmission in VSN. The results of our study can be used as guidelines in optimizing the overall power consumption of a VSN system as it detailed in the paper.
{"title":"Encoding and communication energy consumption trade-off in H.264/AVC based video sensor network","authors":"Bambang A. B. Sarif, M. Pourazad, P. Nasiopoulos, Victor C. M. Leung","doi":"10.1109/WoWMoM.2013.6583407","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583407","url":null,"abstract":"Video sensor networks (VSN) offer an interesting platform for a distributed and flexible surveillance system. In such a system, video compression and wireless transmission are the major operations on each video node. For a battery-powered wireless video sensor, it is essential to maximize the power efficiency of these two operations. Currently, H.264/AVC is the most widely used ITU-T and ISO/IEC video coding standard. Previous works on determining the trade-off between compression and transmission that minimizes energy consumption consider oversimplified coding configurations, thus not taking full advantage of the flexibility and advanced features of H.264/AVC. Choosing the right configuration and setting parameters that lead to optimal encoding performance is of prime importance for video sensor network (VSN) applications, especially since VSN is constrained in terms of bandwidth and energy resources. This paper studies the relationship between the picture quality, the transmission rate, and the complexity of the encoder to expound the energy consumption trade-off between encoding and transmission in VSN. The results of our study can be used as guidelines in optimizing the overall power consumption of a VSN system as it detailed in the paper.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129411314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583366
F. Giust, A. D. Oliva, C. Bernardos
In this demo we propose a novel architecture suitable for deployment in future mobile networks based on the distributed mobility management (DMM) paradigm. In DMM, the IP anchoring point gets closer to users, with the aim to flatten the architecture and to truly enable the fixed/mobile convergence. DMM allows operators to tackle the explosion of data traffic without burdening the core part of the network, offering a common IP framework for mobility and heterogeneous access. As a use case scenario, this demo has shown a possible deployment for a content delivery network's nodes, in order to exploit the DMM benefits.
{"title":"Mobility management in next generation mobile networks","authors":"F. Giust, A. D. Oliva, C. Bernardos","doi":"10.1109/WoWMoM.2013.6583366","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583366","url":null,"abstract":"In this demo we propose a novel architecture suitable for deployment in future mobile networks based on the distributed mobility management (DMM) paradigm. In DMM, the IP anchoring point gets closer to users, with the aim to flatten the architecture and to truly enable the fixed/mobile convergence. DMM allows operators to tackle the explosion of data traffic without burdening the core part of the network, offering a common IP framework for mobility and heterogeneous access. As a use case scenario, this demo has shown a possible deployment for a content delivery network's nodes, in order to exploit the DMM benefits.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-04DOI: 10.1109/WoWMoM.2013.6583369
Andreas Achtzehn, L. Simić, M. Petrova, P. Mähönen, V. Rakovic, P. Latkoski, L. Gavrilovska
The prospect of increasing wireless capacity via secondary access to spatio-temporally underutilized chunks of spectrum, so-called whitespaces, has been proposed as a central aspect of emerging radio systems in response to the imminent spectrum scarcity problem. In this demonstration we present a novel software tool that helps researchers, industry, and regulators in assessing the feasibility and value of secondary spectrum access beyond simple whitespace availability calculation. Whereas existing software applications merely provide visualization of estimated secondary spectrum over a geographic area, our tool uniquely enables a holistic evaluation of the realistic potential of whitespace technologies, by modelling the performance of entire secondary systems in the envisioned eco-system of dynamic spectrum access policy and technology. Our tool provides a unified and flexible software framework and assessment methodology to conduct such studies, and is composed of an extensive primary spectrum usage database, a graphical interface for user interaction, and an interface to an extensible MATLAB backend for numerical calculations. We showcase the deployment scenarios of cellular and Wi-Fi-like secondary networks in TVWS (TV whitespaces). We also compare the impact of employing FCC-type of regulatory rules (with a fixed power/no-talk distance configuration) against European WG-SE43 regulatory proposals (with probabilistic access and power control). The case studies we will demonstrate are based on real network configuration data of European and US TV networks.
{"title":"Software tool for assessing secondary system opportunities in spectrum whitespaces","authors":"Andreas Achtzehn, L. Simić, M. Petrova, P. Mähönen, V. Rakovic, P. Latkoski, L. Gavrilovska","doi":"10.1109/WoWMoM.2013.6583369","DOIUrl":"https://doi.org/10.1109/WoWMoM.2013.6583369","url":null,"abstract":"The prospect of increasing wireless capacity via secondary access to spatio-temporally underutilized chunks of spectrum, so-called whitespaces, has been proposed as a central aspect of emerging radio systems in response to the imminent spectrum scarcity problem. In this demonstration we present a novel software tool that helps researchers, industry, and regulators in assessing the feasibility and value of secondary spectrum access beyond simple whitespace availability calculation. Whereas existing software applications merely provide visualization of estimated secondary spectrum over a geographic area, our tool uniquely enables a holistic evaluation of the realistic potential of whitespace technologies, by modelling the performance of entire secondary systems in the envisioned eco-system of dynamic spectrum access policy and technology. Our tool provides a unified and flexible software framework and assessment methodology to conduct such studies, and is composed of an extensive primary spectrum usage database, a graphical interface for user interaction, and an interface to an extensible MATLAB backend for numerical calculations. We showcase the deployment scenarios of cellular and Wi-Fi-like secondary networks in TVWS (TV whitespaces). We also compare the impact of employing FCC-type of regulatory rules (with a fixed power/no-talk distance configuration) against European WG-SE43 regulatory proposals (with probabilistic access and power control). The case studies we will demonstrate are based on real network configuration data of European and US TV networks.","PeriodicalId":158378,"journal":{"name":"2013 IEEE 14th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132450198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}