50 likes | 140 Views
Opportunities in Wireless Networking. Edward Knightly. I. Access of Diverse and Unlicensed Spectrum. Vision: low-cost WiFi-like networking with flexible coverage (small cell to km-scale), capacity, and energy From Sub-GHz for coverage and penetration
E N D
Opportunities in Wireless Networking Edward Knightly
I. Access of Diverse and Unlicensed Spectrum • Vision: low-cost WiFi-like networking with flexible coverage (small cell to km-scale), capacity, and energy • From Sub-GHz for coverage and penetration • Up to 100 GHz for high capacity short range links
I. Access of Diverse and Unlicensed Spectrum • Vision: low-cost WiFi-like networking with flexible coverage (small cell to km-scale), capacity, and energy • From Sub-GHz for coverage and penetration • Up to 100 GHz for high capacity short range links • Problem: US spectrum allocated based on 1952 technology • Beach front spectrum for UHF TV • UHF TV used by < 10% of the population • 0 MHz left over in key locations • Repurposed spectrum is being auctioned
I. Access of Diverse and Unlicensed Spectrum Opportunities • New capabilities • Network-scale energy management via dynamic ranging • Hot spot mitigation via footprint flexibility • Mobile architectures for spectrum-aware access • Protocol and network design • Interference: the down-side of long range • Smart spectrum database • Demonstrate value of diverse unlicensed spectrum • New services and application scenarios • System-scale design w/o limits of standards • Proof of concept systems and trials (where?) • Impact spectrum policy (e.g., 100 MHz in UHF U.S. wide)
II. Robust and Secure Wireless • “Problem” - 1 Gb/sec wireless LANs (yawn) • The peak throughput race has been won • Fragile to topology and channel heterogeneity • Poor scaling to dense user population • Eavesdroppers, impersonators, and other attackers increasingly critical (e.g., health applications) • Goal: use the vast resources (antennas, spectrum, protocols, fiber backhaul, …) for designs focusing on • User scaling • Robust to operating eco-system • Multiple layers of security • Maximize peak PHY coding and modulation rate