Crowdsourcing access network spectrum allocation using smartphones

Jinghao Shi, Zhangyu Guan, Chunming Qiao, Tommaso Melodia, Dimitrios Koutsonikolas, Geoffrey Challen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The hundreds of millions of deployed smartphones provide an unprecedented opportunity to collect data to monitor, debug, and continuously adapt wireless networks to improve performance. In contrast with previous mobile devices, such as laptops, smartphones are always on but mostly idle, making them available to perform measurements that help other nearby active devices make better use of available network resources. We present the design of Pocket-Sniffer, a system delivering wireless measurements from smartphones both to network administrators for monitoring and debugging purposes and to algorithms performing realtime network adaptation. By collecting data from smartphones, PocketSniffer supports novel adaptation algorithms designed around common deployment scenarios involving both cooperative and self-interested clients and networks. We present preliminary results from a prototype and discuss challenges to realizing this vision.

Original languageEnglish (US)
Title of host publicationProceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450332569
DOIs
StatePublished - Oct 27 2014
Externally publishedYes
Event13th ACM SIGCOMM Workshop on Hot Topics in Networks, HotNets 2014 - Los Angeles, United States
Duration: Oct 27 2014Oct 28 2014

Publication series

NameProceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014

Other

Other13th ACM SIGCOMM Workshop on Hot Topics in Networks, HotNets 2014
Country/TerritoryUnited States
CityLos Angeles
Period10/27/1410/28/14

Keywords

  • Crowdsourcing
  • Monitoring
  • Smartphones

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Crowdsourcing access network spectrum allocation using smartphones'. Together they form a unique fingerprint.

Cite this