7,324 research outputs found
Opportunistic Third-Party Backhaul for Cellular Wireless Networks
With high capacity air interfaces and large numbers of small cells, backhaul
-- the wired connectivity to base stations -- is increasingly becoming the cost
driver in cellular wireless networks. One reason for the high cost of backhaul
is that capacity is often purchased on leased lines with guaranteed rates
provisioned to peak loads. In this paper, we present an alternate
\emph{opportunistic backhaul} model where third parties provide base stations
and backhaul connections and lease out excess capacity in their networks to the
cellular provider when available, presumably at significantly lower costs than
guaranteed connections. We describe a scalable architecture for such
deployments using open access femtocells, which are small plug-and-play base
stations that operate in the carrier's spectrum but can connect directly into
the third party provider's wired network. Within the proposed architecture, we
present a general user association optimization algorithm that enables the
cellular provider to dynamically determine which mobiles should be assigned to
the third-party femtocells based on the traffic demands, interference and
channel conditions and third-party access pricing. Although the optimization is
non-convex, the algorithm uses a computationally efficient method for finding
approximate solutions via dual decomposition. Simulations of the deployment
model based on actual base station locations are presented that show that large
capacity gains are achievable if adoption of third-party, open access
femtocells can reach even a small fraction of the current market penetration of
WiFi access points.Comment: 9 pages, 6 figure
Experimental optimization of exposure index and quality of service in WLAN networks
This paper presents the first real-life optimization of the Exposure Index (EI). A genetic optimization algorithm is developed and applied to three real-life Wireless Local Area Network scenarios in an experimental testbed. The optimization accounts for downlink, uplink and uplink of other users, for realistic duty cycles, and ensures a sufficient Quality of Service to all users. EI reductions up to 97.5% compared to a reference configuration can be achieved in a downlink-only scenario, in combination with an improved Quality of Service. Due to the dominance of uplink exposure and the lack of WiFi power control, no optimizations are possible in scenarios that also consider uplink traffic. However, future deployments that do implement WiFi power control can be successfully optimized, with EI reductions up to 86% compared to a reference configuration and an EI that is 278 times lower than optimized configurations under the absence of power control
Every Cloud Has a Push Data Lining: Incorporating Cloud Services in a Context-Aware Application
We investigated context-awareness by utilising multiple sources of context in a mobile device setting. In our experiment we developed a system consisting of a mobile client, running on the Android platform, integrated with a cloud-based service. These components were integrated using pushmessaging technology.One of the key featureswas the automatic adaptation of smartphones in accordance with implicit user needs. The novelty of our approach consists in the use of multiple sources of context input to the system, which included the use of calendar data and web based user configuration tool, as well as that of an external, cloud-based, configuration file storing user interface preferences which, pushed at log-on time irrespective of access device, frees the user from having to manually configure its interface.The systemwas evaluated via two rounds of user evaluations (n = 50 users), the feedback of which was generally positive and demonstrated the viability of using cloud-based services to provide an enhanced context-aware user experience
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges
Vehicular Communication (VC) systems are on the verge of practical
deployment. Nonetheless, their security and privacy protection is one of the
problems that have been addressed only recently. In order to show the
feasibility of secure VC, certain implementations are required. In [1] we
discuss the design of a VC security system that has emerged as a result of the
European SeVeCom project. In this second paper, we discuss various issues
related to the implementation and deployment aspects of secure VC systems.
Moreover, we provide an outlook on open security research issues that will
arise as VC systems develop from today's simple prototypes to full-fledged
systems
HopScotch - a low-power renewable energy base station network for rural broadband access
The provision of adequate broadband access to communities in sparsely populated rural areas has in the past been severely restricted. In this paper, we present a wireless broadband access test bed running in the Scottish Highlands and Islands which is based on a relay network of low-power base stations. Base stations are powered by a combination of renewable sources creating a low cost and scalable solution suitable for community ownership. The use of the 5~GHz bands allows the network to offer large data rates and the testing of ultra high frequency ``white space'' bands allow expansive coverage whilst reducing the number of base stations or required transmission power. We argue that the reliance on renewable power and the intelligent use of frequency bands makes this approach an economic green radio technology which can address the problem of rural broadband access
- …