Spectrum band and RAT selection for infrastructure governed opportunistic networks

Heli Sarvanko, Miia Mustonen, Marja Matinmikko, Marko Höyhtyä, Javier Del Ser

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

This paper presents a modular decision flow for the selection of radio access technique (RAT), carrier frequency, and bandwidth for opportunistic networks that are operator governed temporary extensions of mobile communication network infrastructures. In this study the emphasis is placed on finding an optimal (band, RAT) combination for each opportunistic network link so that adequate bit rate can be guaranteed for each user. The proposed algorithm considers realistic spectrum bands, namely, Industrial, Scientific and Medical (ISM), TV, and International Mobile Telecommunications (IMT) bands. The obtained results show that the bandwidth usage at each band can be balanced by using a modular decision flow so that the quality of service (QoS) for each data type is maintained.

Original languageEnglish
Title of host publication2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012
Pages36-40
Number of pages5
DOIs
Publication statusPublished - 2012
Event2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012 - Barcelona, Spain
Duration: 17 Sept 201219 Sept 2012

Publication series

Name2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012

Conference

Conference2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2012
Country/TerritorySpain
CityBarcelona
Period17/09/1219/09/12

Keywords

  • Spectrum allocation
  • dynamic spectrum use
  • opportunistic networks

Fingerprint

Dive into the research topics of 'Spectrum band and RAT selection for infrastructure governed opportunistic networks'. Together they form a unique fingerprint.

Cite this