Академический Документы
Профессиональный Документы
Культура Документы
MODULE 3:
WLAN/WiFi broadband access networks
Contents
WLAN/WiFi broadband access networks..............................................................1
3 Introduction ........................................................................................................3
3.1 IEEE 802.11 standard (2012)..........................................................................3
3.2 Broadband WLAN/WiFi: the IEEE 802.11n .....................................................9
3.3 WLAN network design ..................................................................................19
3.4 Quality of Service (QoS) and Security in WLAN ...........................................34
3.5 WiFi hotspot solutions...................................................................................41
3.6 4G mobile data traffic offloading to WLAN (from LTE/LTE-Advanced, and
from Mobile WiMAX) ...........................................................................................45
3.7 Cognitive resource management in future wireless networks .......................48
3.8 Business and regulatory aspects of WLAN/WiFi...........................................52
3.9 Reference list ................................................................................................54
3 Introduction
Wireless Local Area Networks (WLANs) represent a broadband access
technology which provides high data rates on limited coverage, with great fidelity.
That is why WLAN is usually seen as a complement technology to LTE or
WiMAX used to serve hot-spots or locations where the demand for network
capacity is extraordinarily high. The most proliferated WLAN technology is the
one based on IEEE 802.11 standard, also known as WiFi (Wireless Fidelity).
Considering its successful history and proved reliability, WiFi broadband access
networks are still an active and evolving technology, which deserves significant
attention among the plethora of wireless broadband technologies.
This third module of the course discusses the latest moments of the WiFi
technology evolution. We will start with the analysis of the newest standard
edition IEEE 802.11 (2012), and its latest and most famous amendment 802.11n.
This module also involves discussions regarding some inevitable aspects of
WLAN network design, Quality of Service (QoS) and Security in WLAN. We also
analyze the modern trends in WiFi hotspot solutions and 4G mobile data traffic
offloading to WLAN. Finally Module 3 provides some visions of the cutting-edge
developments in WLAN technologies represented by cognitive resource
management in future wireless networks and the business and regulatory
aspects of WLAN/WiFi technology.
Figure 1 - Changes in clause numbers and annex letters from 2007 revision to
2012 revision
The IEEE 802.11-2012 standard has wide range of purposes. In particular, the
standard:
Describes the functions and services required by an IEEE 802.11compliant device to operate within independent and infrastructure
networks as well as the aspects of STA mobility (transition) within those
networks.
Describes the functions and services that allow an IEEE 802.11-compliant
device to communicate directly with another such device outside of an
independent or infrastructure network.
Defines the MAC procedures to support the MAC service data unit
(MSDU) delivery services.
Defines several PHY signaling techniques and interface functions that are
controlled by the IEEE 802.11 MAC.
Permits the operation of an IEEE 802.11-conformant device within a
wireless local area network (WLAN) that may coexist with multiple
overlapping IEEE 802.11 WLANs.
Describes the requirements and procedures to provide data confidentiality
of user information and MAC management information being transferred
over the wireless medium (WM) and authentication of IEEE 802.11conformant devices.
Defines mechanisms for dynamic frequency selection (DFS) and transmit
power control (TPC) that may be used to satisfy regulatory requirements
for operation in any band.
Defines the MAC procedures to support local area network (LAN)
applications with quality-of-service (QoS) requirements, including the
transport of voice, audio, and video.
Defines mechanisms and services for wireless network management of
STAs that include BSS transition management, channel usage and
coexistence, collocated interference reporting, diagnostic, multicast
diagnostic and event reporting, flexible multicast, efficient beacon
mechanisms, proxy ARP advertisement, location, timing measurement,
directed multicast, extended sleep modes, traffic filtering, and
management notification.
Defines functions and procedures aiding network discovery and selection
by STAs, information transfer from external networks using QoS mapping,
and a general mechanism for the provision of emergency services.
Defines the MAC procedures that are necessary for wireless multi-hop
communication to support wireless LAN mesh topologies.
The new IEEE 802.11 release is the product of an evolutionary process that has
played out over five years and drawn on the expertise and efforts of hundreds of
participants worldwide. More than 300 voters from a sweeping cross-section of
global industry contributed to the new standard, which has roughly doubled in
size since its last published revision.
In general, many telecommunication experts claim that IEEE 802.11-2012
revision has been expanded significantly the WiFi technology towards supporting
communications between devices and networks that are faster and more secure,
while offering improved Quality of Service and, improved cellular network handoff. IEEE 802.11 standards already underpin wireless networking applications
around the world, such as wireless access to the Internet from offices, homes,
airports, hotels, restaurants, trains and aircraft around the world. The standards
relevance continues to expand with the emergence of new applications, such as
the smart grid, which augments the facility for electricity generation, distribution,
delivery and consumption with a two-way, end-to-end network for
communications and control, as well as applications dedicated to manufacturers,
healthcare workers and retail service providers around the world.
Regarding the technical novelties delivered by the new 802.11-2012 we can
emphasize several of them such as, new support for 3.65 and 3.7GHz bands, to
avoid clashing with 2.4GHz or 5GHz networks, as well as better support for direct
linking, faster cellular hand-offs, in-car networks, roaming and mesh networking.
802.11-2012 is also expected to provide 600Mbps throughput. The PHY
(physical layer) and MAC (a software layer) components of 802.11-2012 will be
reworked to provide that impressive speed. Those changes will also allow for
new
additions
like
"mesh"
networking,
changes
in
security,
broadcast/multicast/unicast data delivery and additional network management
features.
environments are full of surfaces that reflect a radio signal as well as a mirror
reflects light.
Imagine that all of the metallic surfaces, large and small, that are in an
environment were actually mirrors. Nails and screws, door frames, ceiling
suspension grids, and structural beams are all reflectors of radio signals. It would
be possible to see the same WLAN access point in many of these mirrors
simultaneously. Some of the images of the access point would be a direct
reflection through a single mirror. Some images would be a reflection of a
reflection. Still others would involve an even greater number of reflections. This
phenomenon is called multipath (see Figure 4).
a single antenna or even with transmit beamforming. One of the two significant
benefits of MIMO is that it dramatically improves the SNR, providing more
flexibility for the WLAN system designer.
transmitter, receiver, and other items in the environment are moving. The faster
things are moving the smaller the maximum frame size can be as the data rate is
reduced, i.e., the time for the transmission must be less than the channel
coherence time.
There are slight differences in the two aggregation methods that result in
differences in the efficiency gained. These two methods are described here.
MSDU (MAC Service Data Units) aggregation is the more efficient of the two
aggregation methods. It relies on the fact that an access point receives frames
from its Ethernet interface, to be translated to 802.11 frames and then
transmitted to a mobile client. Similarly, most mobile client protocol stacks create
an Ethernet frame, which the 802.11 driver must translate to an 802.11 frame
before transmission. In both these cases, the native format of the frame is
Ethernet, and it is then translated to 802.11 format for transmission.
Theoretically, MSDU aggregation allows frames for many destinations to be
collected into a single aggregated frame for transmission. Practically, however,
MSDU aggregation collects Ethernet frames for a common destination, wraps the
collection in a single 802.11 frame, and then transmits that 802.11-wrapped
collection of Ethernet frames (see Figure 10). This method is more efficient than
MPDU aggregation, because the Ethernet header is much shorter than the
802.11 header.
In all cases, it is highly advisable to test the target application and validate its
actual bandwidth requirements. Software designers are often required to pick just
one average number to represent the applications requirements when there are
actually many modes and deployment decisions that can make up a more
accurate number. It is also important to validate applications on a representative
sample of the devices that are to be supported in the WLAN. Additionally, not all
browsers and operating systems enjoy the same efficiencies, and an application
that runs fine in 100 kilobits per second (Kbps) on a Windows laptop with
Microsoft Internet Explorer or Firefox, may require more bandwidth when being
viewed on a smart phone or tablet with an embedded browser and operating
system.
Once the required bandwidth throughput per connection and application is
known, this number can be used to determine the aggregate bandwidth required
in the WLAN coverage area. To arrive at this number, multiply the minimum
acceptable bandwidth by the number of connections expected in the WLAN
coverage area. This yields the target bandwidth needed for the need series of
steps.
Design Point #2: Calculate the Aggregate Throughput Required for the
Coverage Area
If this course was for a wired rather than wireless network, calculating aggregate
throughput requirements would entail dividing the aggregate capacity by the
channel bandwidth available. Then, the number of channels would be
established and these would be plugged into a switch. But in a WLAN, a
channels speed is effected by multiple factors including protocols, environmental
conditions, and operating band of the adapter. Before calculating aggregate
throughput, several things must be considered.
In the aggregate throughput calculation, the connections instead of the seats
were used as the basis for calculation. The number of connections in a cell is
what determines the total throughput that will be realized per connection instead
of the number of seats. Most users today carry both a primary computing device
(such as a tablet computer, or laptop) as well as a second device (such as a
smartphone). Each connection operating in the high-density WLAN consumes air
time and network resources and will therefore be part of the aggregate bandwidth
calculation. An increase in numbers of device connections is one of the primary
reasons older WLAN designs are reaching oversubscription today.
Wi-Fi is a shared medium. Much like an un-switched Ethernet segment, it
operates as a half duplex connection. Only one station can use the channel at a
time and both the uplink and downlink operate on the same channel. Each
channel or cell used in a Wi-Fi deployment represents a potential unit of
bandwidth much like an Ethernet connection to a hub. In Ethernet, switching
technology was developed to increase the efficiency of the medium by limiting
the broadcast and collision domains of a user to a physical port and creating
point-to-point connections between ports on an as-needed basis, dramatically
increasing the overall capacity.
Users and applications also tend to be bursty (a measure of the unevenness or
variations in the traffic flow) in nature and often access layer networks are
designed with a 20:1 oversubscription to account for these variances. Application
and end user anticipated usage patterns must be determined and also accounted
for. Some applications, such as streaming multicast video, will drive this
oversubscription ratio down while others may drive this factor even higher to
determine an acceptable SLA for each cells designed capacity.
For 802.11 wireless networks or any radio network in general, air is the medium
of propagation. While there have been many advances in efficiency, it is not
possible to logically limit the physical broadcast and collision domain of an RF
signal or separate its spectrum footprint from other radios operating in the same
spectrum. For that reason, Wi-Fi uses a band plan that breaks up the available
spectrums into a group of non-overlapping channels. A channel represents a cell.
Using the analogy of Ethernet, a cell represents a single contiguous collision
domain.
How many users can access an AP comfortably? Hundreds. But the question
should not be how many users can successfully associate to an AP but how
many users can be packed into a room and still obtain per-user bandwidth
throughput that is acceptable.
802.11 Scalability: How much bandwidth will a cell provide?
To scale 802.11 networks to reliably deliver consistent bandwidth to a large
number of users in close proximity, it is important to examine certain WLAN
fundamentals under reasonably ideal conditions. Once the rules are understood,
the ways to manipulate them to maximum advantage will be presented.
In real WLANs, the actual application throughput is what matters to the end user,
and this differs from the signaling speed. Data rates represent the rate at which
data packets will be carried over the medium. Packets contain a certain amount
of overhead that is required to address and control the packets. The application
throughput is carried as payload data within that overhead.
Table 3 shows average application throughput by protocol under good RF
conditions.
Table 3 Average application throughput by protocol
A mixed cell containing both 802.11b and 802.11g traffic results in a throughput
rate that is less than double that of 802.11b alone and roughly half of 802.11g
alone. A similar effect was seen when 802.11n and legacy 802.11a/g rates were
compared. Until the inclusion of 802.11n, all advances in Wi-Fi technology have
come through incremental increases in encoding technology. 802.11n changed
the encoding and streamlined the logistics of bonding 20 MHz channels and
increasing the available channel bandwidth. In implementing new technology, it is
also necessary to provide a mechanism that allows the old and the new protocols
to coexist. It is this mechanism that reduces the overall efficiency of the channel
due to additional overhead. An 802.11b modem was not designed to speak
802.11g. In order to avoid collisions, the 802.11b radios must be informed that
the channel is needed by 802.11g for a period of time.
What is Co-Channel Interference and Why is it Important in High-density
WLANs?
CCI is a critical concept to understand when it comes to understanding the
behavior and performance of 802.11 WLANs. It is a phenomenon where
transmissions from one 802.11 device bleed into the receive range of other
802.11 devices on the same channel, causing interference and reducing the
available spectrum and resulting performance. CCI can cause channel access
delays as well as collisions in transmissions that corrupt frames in transit. Figure
15 illustrates how APs on the same channel interfere with each other.
super cell covering the room with limited bandwidth and sporadic connections for
all.
In contrast to 2.4 GHz, 5 GHz has many more channels with which to work. As
many as 20 channels can be received in the United States and between five and
21 in the rest of the world. Most regions have between 19 and 21 channels. But
all 5 GHz channels are not created equally. Limitations on maximum power for
parts of the band are not of concern, but Dynamic Frequency Selection (DFS)
channels represent some challenges that must be addressed.
DFS was implemented so that APs and clients can share the band with radar
devices. DFS details how radar is detected and what should be done in the event
of detection. APs operating on DFS channels must first listen to a channel for 60
seconds to determine if there is a radar present before transmitting any energy. If
an AP is operating on a DFS channel and detects a radar (real or false) it must
shut down operations on that channel and abandon it for 30 minutes before that
channel can be evaluated again for use.
802.11n can operate in a 40 MHz channel by bonding two 20 MHz channels
together and this significantly increases throughput. However, this is reserved for
burst mode transfers only. It is only practical to do this in 5 GHz because 2.4
GHz is already limited by the number of channels available. If there are enough 5
GHz channels to achieve the WLAN goals using a bonded channel plan (9 in the
U.S. if using available DFS channels) to meet throughput goals, consider it. If
forced to reuse 5 GHz channels, more consistent results will be delivered using
strictly 20 MHz channels and avoiding loss of efficiency due to CCI.
The essential question for a high-density design is how many channels for each
band will be needed to match the client base? This can be a tricky question since
even dual band capable clients do not always select the faster 5 GHz band.
Since bandwidth in 2.4 GHz is going to be limited, 5 GHz must be relied on to
reach the goal. Dual band adapters have been shipping with most laptops for
some time. This does not mean that every laptop is a dual band client, but many
are. Simply having a dual band client does not guarantee that it will choose 5
GHz over 2.4 GHz. The Microsoft Windows operating system defaults to a Wi-Fi
channel search that starts with the 5 GHz channel 36 and continues searching
through all of the 5 GHz channels that the client is capable of. If no 5 GHz AP is
found then it will continue the search in 2.4 GHz starting at channel 1. Unless the
Windows default is changed or the user has chosen a third party Wi-Fi utility to
set spectrum preference to 2.4 GHz, the client radio will first try to associate to a
5 GHz AP. Apple Computers latest release for Atheros and Broadcom chipsets
also searches 5 GHz first.
Design point #4: Determine the Number of Channels and Cells Needed
A sample high-density WLAN project may include a design that yields 300 Mbps
consistently to support 300 concurrent users. Under optimal conditions, 802.11g
and 802.11a data rates yield 25 Mbps throughput. However, a high-density
environment will be less than optimal from a SNR standpoint. A better number to
use is 20 Mbps throughput. Table 5 provides a quick reference using 20 Mbps
per cell and per channel as the throughput value. Looking strictly at 5 GHz and
assuming no channel reuse at this point, it is clear that 1 Mbps per user with 15
channels and 15 cells can be easily supported.
Table 5 Reference guide for channels
Design Point #5: Account for and Manage all Energy within the Operating
Spectrum to Ensure all of it is Available for Use
The discussion until now has centered on a use case where every client in the
room will be competing for bandwidth simultaneously. This is the case when the
users in the room simultaneously access a resource on queue. However there
are many instances where the design requirement is to offer access to resources
or the Internet for casual use at an event or within a venue such as a sports
arena. Planning and sizing for these types of events can be quite different and
will be based on expected Client Duty Cycle.
At a sporting event, for example, there are certain areas that will require
ubiquitous and instant access during the entire event. Ticketing, vendor sales,
staff, and press areas will generally require the highest amount of access. Of
these, the press area is the only one that requires a high level of capacity in the
arena itself. For the fans attending the event, only a percentage will be active on
the WLAN at any one time. We see a 20 to 30 percent take rate with some well
defined peaks occurring during period breaks. During play, very few fans are
accessing the WLAN. However, this is changing as applications such as video
replay, instant stats, and concession orders from the seat become more
commonplace.
Observation and understanding of the requirements of WLAN users and
situational requirements will guide the development of reasonable design goals.
500 users in a room who require simultaneous access to a single resource is a
different design challenge than 1000 or 1500 users who only occasionally use
the wireless network. Also, be aware that user patterns can and do change with
time. This has been seen with the increase in the number of network clients per
user. Monitoring network access and keeping good statistics will allow wireless
engineers to stay on top of user trends on the university campus.
Often one of the biggest challenges in a high-density environment is access and
aesthetics. A large meeting hall is impressive because of its size and a great deal
goes into the aesthetics of the environment. The best approach to engineering a
specific space is to do a qualified sight survey. Once the APs are mounted,
physical adjustments become a lot more complex, so it is best to test while
installing and make certain that the coverage that has been defined in the design
is what is installed.
APs have evolved rapidly in short period of time. If an AP with external antenna
capabilities is to be used, it is essential that an antenna that was designed for
that AP also be used. MIMO or 802.11n APs need MIMO antennas to perform
properly. Even if HT rates are not being counted on, the antenna and the radios
are a system and the system is designed to perform with all of these elements.
Mounting APs or directional antennas directly overhead in an environment may
not be acceptable to the building owners. There are several ways to solve this
problem and, depending on the environment and restrictions imposed, several
methods may be used together.
By adjusting the downtilt of the antenna, it is possible to dial in " or add WLAN
coverage" to specific areas within the coverage zone. APs and RF energy
operate much like light cast by lighting fixtures. It is possible to light an entire
warehouse with a bare bulb on the ceiling, but the result is low levels of light in
some areas. But if there are multiple fixtures, including some with higher patterns
of luminosity to illuminate larger, the result is comprehensive overall lighting. RF
is invisible, so measuring the coverage and adjusting it appropriately requires
tools to measure the coverage. For each antenna placement, simply walking the
area below it and adjusting the antenna to change the pattern based on
Received Strength Signal Indication (RSSI) levels to match coverage
requirements is generally all that is required at the initial installation. Antennas
hear the same as they transmit.
If measuring and adjusting are done carefully, using consistent measurements
and tools, good results can be achieved. Any additional tuning can be managed
with power threshold adjustments through RRM. In all cases, a full site survey to
compare the results to the plan is required once all assets are installed.
AP Placement Options
The most common method of achieving even coverage is to evenly space the
APs directly over the clients they will serve. There are multiple options to
accommodate overhead mounting of the APs in an unobtrusive manner.
Although many people do not consider any AP to be a welcome stylistic addition
to a room, APs with internal antennas can be flush mounted to a variety of
surfaces and offer an option with less impact on a rooms aesthetics. In these
cases, a flush mount antenna can be much less obtrusive. External antennas
increase the cost and complexity of the installation slightly, but can be justified if
the end result is the ability to cover the room at a sufficient density and meet
aesthetic requirements. Once the decision is made to incorporate external
antennas, numerous options are opened for shaping the RF cell through the use
of directional antennas. Channel reuse in 2.4 GHz can be achieved in smaller
spaces by using directional antennas overhead. Ceiling height and antenna
choice will determine cell boundaries and taking measurements is required.
In Figure 18, assuming the room is 9000 square feet, using the internal antenna
enables AP nine channels of 5 GHz, and three channels of 2.4 GHz to be
provided comfortably. Using an external omnidirectional antenna, the results
would be much the same. Using omnidirectional antennas on 5 GHz and
directional antennas on 2.4 GHz, one, two, or three additional 2.4 GHz channels
could be added within this space. Throughput improvements would largely be
gained by more even client distribution and less resulting CCI at the client. Some
additional capacity will be gained, but only to the extent that CCI can be
eliminated between the cells and this will depend on ceiling height, antenna
pattern, and power levels in 2.4 GHz.
In the past, WLANs were mainly used to transport low-bandwidth, dataapplication traffic. Currently, with the expansion of WLANs into vertical (such as
retail, finance, and education) and enterprise environments, WLANs are used to
transport high-bandwidth data applications, in conjunction with time-sensitive
multimedia applications. This requirement led to the necessity for wireless QoS.
Several vendors have supported proprietary wireless QoS schemes for voice
applications. To speed up the rate of QoS adoption and to support multi-vendor
time-sensitive applications, a unified approach to wireless QoS is necessary. The
IEEE 802.11e working group within the IEEE 802.11 standards committee has
completed the standard definition, but adoption of the 802.11e standard is in its
early stages, and as with many standards there are many optional components.
Just as occurred with 802.11 security in 802.11i, industry groups such as the WiFi Alliance are defining the key requirements in WLAN QoS through their Wi-Fi
MultiMedia (WMM) ensuring the delivery of key features and interoperation
through their certification programs.
An example deployment of wireless QoS is shown in Figure 19.
WLAN Security
Security was the IT managers main concern in the past and the reason why
WLANs were not implemented. However, as the ubiquity of wireless devices
drove demand from end users, evolving wireless standards have solved these
security issues to the point where a properly implemented wireless network is
more secure than most wired networks. The following is a brief summary of the
previous issues and resolutions.
Wired Equivalent Privacy (WEP)
The original standard for wireless security was proven to be crackable. Now
standards are more secure. With the introduction of 802.11i in 2004, encryption
became effectively uncrackable in its current form; however, this can come with
some complexities. 802.1X is the strongest form of authentication, but it is more
expensive and difficult to set up and maintain.
Using a pre-shared key (PSK) can be strong, but using a single passphrase limits
security to its weakest link the human factor, and requires IT managers to
replace passphrases manually on a regular basis for security purposes. For best
user experience and in the interest of saving IT manager time with
troubleshooting and maintenance, it is important to consider a balance between
strong 802.1X and PSK. Dynamic PSK is the best balance for usability and
security in that it does not involve IT time and removes the user from handing out
their unique key. Figure 20 shows the WLAN security options.
Business travelers on the road can catch up with their email or download
important documents for their next sales meeting while having a break at a
motorway service area equipped with a wireless hotspot. Similarly, air travelers
can respond to that important email or work on their sales plans while sitting in
the airport lounge waiting for their flight.
Depending on the size and layout of the terminal, the wireless area can be
extended using wireless bridges so that users can roam from caf to restaurant
to lounge while still logged in to the single wireless gateway account. In this way,
longer sessions can be sold to users and more clients can share the same
services as shown in Figure 24.
get per day. So even with a modest number of customers using the facilities, the
investment soon pays for itself and leads to profit within a year.
Wireless networks have been available for many years. It is simple to set up an
open wireless network that can be used by anyone with a wireless card in the
vicinity. In fact many companies have set up open wireless networks without
realizing it. The key differences between a wireless hotspot and an open wireless
network are the following important features:
Only registered users are allowed to use the network and are charged for what
they use
The network must be secure and not allow users to see each others data or
access each others machines
The wireless network must be able to cover a large area and the reach of the
network should be controllable to prevent signal leakage
The network connection should not become a bottleneck as more users are
added or power users require more bandwidth
Free access to some sites should be allowed to allow clients to login and to
provide extra advertising opportunities
When a client first tries to access the Internet in a wireless hotspot, the clients
browser is redirected to a registration screen where they enter their login details.
These can be an existing pre-paid or billable account set up with the wireless
ISP. Alternatively, it can be a temporary account generated on purchase of the
access units required at the point of sale. Once the account details have been
authorized against the authentication database, the client is granted access to
the connection. The session is closed either when their pre-paid time has
elapsed or when the client closes the connection.
Security is essential for the successful operation of a wireless hotspot. There are
various aspects of security that have to be considered:
Protection of data: Most wireless receivers and transmitters can be set-up with
data encryption so that snoopers cannot eavesdrop on email or other peoples
conversations.
Prevention of unauthorized access: A wireless network should be secured
against unauthorized access by disabling the broadcast of the wireless station
beacon and by ensuring all clients are authenticated against the authorization
database.
Isolation of wireless clients: Wireless clients must be isolated so that they
cannot access other clients computers or see their data.
Protection from hackers and snoopers: The wireless hotspot should include an
industrial strength firewall between the wireless network and the internet
connection to prevent malicious access from external internet users. Internet
addresses should be hidden behind the firewall using the Network Address
Translation (NAT) protocol.
3.6 4G mobile data traffic offloading to WLAN (from LTE/LTEAdvanced, and from Mobile WiMAX)
With the advent of network technologies such as 3G and 4G (LTE/LTE advanced
and mobile WiMAX) mobile data traffic has been growing at an unprecedented
pace and increasingly outstripping the network capacity. The introduction of
smart-phones that offer ubiquitous internet access allied to a host of other
internet capable devices including tablets, consoles, laptops and navigators - all
becoming internet capable has been driving the data growth. The network
operators are also increasingly introducing data services as a result of data
increasingly contributing to the service revenues, but data traffic consumption is
outpacing the data revenue. The proliferation of these mobile broadband devices
along with the unlimited data bundles from the operators has led to network
congestion and deteriorating network quality.
Figure 26 presents the major data growth factors.
Conducted reports provide five year forecasts for mobile data offload and onload,
across eight regions of the world: North America, Latin America, Western
Europe, Central & Eastern Europe, Far East & China, Indian Sub-Continent, Rest
of Asia Pacific and Africa & Middle East. The forecasts within the full report cover
several aspects: total mobile data usage, data growth over the cellular network,
data offloaded via femtocells and WiFi, data onload from fixed to mobile.
As the mobile data to be offloaded from the operators cellular network depends
on the data that is primarily intended for the cellular network, we need to consider
the total data traffic generated by mobile devices whose primary usage is via the
operators cellular network. The following chart shows the forecast for total
mobile data traffic generated.
There are proposals for extending the scope of the cognitive radio research
towards more holistic approach. The idea is to introduce a framework for
cognitive resource manager (CRM) enabling autonomic optimization of the
communication stack as a whole, instead of focusing solely on the spectrum
problem and thus going well beyond simplistic RRMs (Radio Resource
Managers) and medium access control techniques. Thus section further
discusses the exchange of network information between the CRMs as a method
to avoid harmful interactions arising from local optimization methods leading into
globally unsatisfactory solutions. Communication between CRM instances could
finally be used to federate individual cognitive radios to become cognitive
wireless networks. This way the CRM would offer a systematic approach as a
framework for distributed cross-layer optimization.
In this section we discuss about the functions of the Cognitive Resource
Manager (CRM) with more details. Its conceptual architecture is shown in figure
29. We see the CRM as a multi-functional software entity that will primarily carry
out cross-layer optimization using a toolbox of advanced reasoning methods and
a great variety of information from the application layer, the underlying
networking and data link layer as well as the operating system. Based on the
collected knowledge the CRM can for example, optimally manage spectrum
resources, flexibly adapt MAC and link parameters and allow the best possible
settings for the applications running on top. In addition the CRM could consider
policies such as proposed by the DARPA XG project during all optimization
processes. Later on the CRM can return its recommendations for policy updates
based on experiences and observed behavior of other network nodes.
The CRM can also function as a connection manager deciding upon the
frequency channels as well as the type of communication technology to be used
(IEEE 802.11, Bluetooth, UMTS, etc.) in case a variety of interfaces and
networks are available. In this context, different services such as voice-call,
audio- and video-conferencing can experience higher quality if their specific QoS
requirements, e.g. in terms of delay and bit rate, are carefully taken into account.
Since the CRM will perform multidimensional optimizations using substantial
amount of data, the traditional numerical methods might not be fast and scalable
enough if applied to the full dataset. Accordingly, alternative approaches such as
genetic algorithms and simulated annealing are used inside a toolbox as
depicted in figure 29. These natural optimization methods are interesting
candidates since they are proven to be successful in solving problems with large
number of variables, can work with numerically generated or experimental data,
and so on.
In order to more efficiently handle the large amount of knowledge data (including
historical data), sorting and clustering of the available information used in the
CRM is required. Classical techniques like k-means can be considered, however
due to the high degree of data variety and dynamicity, more advanced algorithms
will be needed. Promising candidates include neural networks based approaches
such as self organizing maps (SOMs). SOMs have already been successfully
applied e.g., to perform unsupervised traffic pattern classification and estimation
without a priori information. Additionally, time series analysis can be used, for
example, in finding periodicity and compensating for the missing data to be able
to provide reasonable estimates.
In order to achieve a reliable operation of the CRM, quality of the data used in
the decision process should be ensured. Accordingly, data filtering techniques to
handle the linear and non-linear noise are required. Techniques such as
Bayesian reasoning and statistical learning theory can be deployed to deal with
uncertainty and ensure the reliability of the data and inference.
Although it is represented as a single block in the architecture, the CRM usually
has a modular and extensible structure. For example, the toolbox itself is not
limited to the enabling optimizing techniques mentioned above. Further methods
could be added in a plug-and-play fashion. In fact, from an implementation point
of view, the CRM could be seen as a micro kernel with additional software
modules where the scheduling and time synchronization mechanisms of different
optimization and reasoning processes are carried out. One of the key challenges
for CRM is its distributed structure.
Figure 30 presents a behavioral model of the cognitive radio and how the steps
are realized using a CRM.
Figure 30 - Behavioral model of the cognitive radio and how the steps are
realized using CRM
On the other hand, there may be obligations imposed on service providers on the
basis of other laws. For example in Italy, service providers must authenticate
users on the basis of the anti-terrorism law.
In the US the legal and regulatory framework is very different than in EU. The
latest revision of the Telecommunications Act of 1934, of 1996, separates
telecommunication services from information services.
The Act defines an information service as the offering of a capability for
generating, acquiring, storing, transforming, processing, retrieving, utilizing, or
making available information via telecommunications, and includes electronic
publishing, but does not include any use of any such capability for the
management, control, or operation of a telecommunication system or the
management of a telecommunication service. It underpins the US deregulatory
policy toward the Internet. The Internet should be viewed as an enhanced
service, and that the Internet consequently should not itself be subject to
significant regulation.
In the US regulators seem to lack authority and the people tend to trust the
companies more than the government at least when compared to Europe. The
American attitude to large companies has always been somewhat ambivalent
they worry about the power of large corporations wield, and yet at the same time
they appreciate the potential benefits associated with the economies of scale and
the scope that they command. It is not held to be a problem for a firm to possess
market power; rather the abuse of the market power is problematic.
FCC has a limited power to collect confidential information and it lacks the ability
to protect that information. Although regulation in the U.S. is multilevel with
federal, state and municipal bodies, the FCC has taken a position that the
Internet is interstate. Theres a huge interest in WLAN in the US and they are
cautious to introduce any laws that might jeopardize the growth of the wireless
network infrastructure. On the other hand the Americans are increasingly
concerned about cyber-security. They have noticed that the nature of connection
is very different from traditional LAN people can appear and disappear from
sight. As they are opening up an additional 255 megahertz of spectrum in the 5gigahertz band, the biggest concern is whether or not it could affect military
radars.
Table 8 Regulation comparison (US, EU)
Neither the US nor EU has taken public WLAN networks into deeper
consideration. In the Table 8 there are few major differences that affect the way
regulation is applied generally.