Feeds

Microsoft leads internet industry bid to fill up white space

US heavyweights eye spectrum gaps for mobile internet

Providing a secure and efficient Helpdesk

Microsoft says devices based on the coalition's platform and on Windows Mobile would be ready for commercial release early in 2009. At their heart will be a cognitive radio that can avoid interfering with other signals in nearby spectrum. Such technology is the core of most approaches to freeing up broadcast frequencies round the world in the 700-900MHz range, including the important IEEE 802.22 (or Wi- TV) standards effort, which started work two years ago on an "intelligent" air interface that could tap into unused spectrum within an occupied band.

It aims to create a standard for fixed wireless (up to 1W power) and nomadic embedded systems (up to 100mW), and potentially for mobility in future, using cognitive radio techniques to switch automatically to a clear area of the band, and to avoid interfering with other occupying devices.

The WiMAX community has been particularly keen to claim TV bands for its own, and in March 2004 when the 802.22 group was set up, the 802.16 faction was angered when its proposal that the cognitive radio work should be under its auspices, rather than in a separate group, was defeated. However, this has not halted its supporters, led by Intel, in their quest to turn the 802.22 efforts to their advantage.

It seems that, as in other areas, Microsoft and Intel are leaping ahead of the IEEE work to try to create a de facto standard that can be brought to market rapidly, and possibly presented to the standards body as a fait accompli at a later stage.

They have certainly moved quickly in the past few months. In October the FCC gave the green light to technologies to use unused TV frequencies, provided they could demonstrate non-interference. Just three months later the Microsoft coalition had outlined its technology and sent a statement of support to the FCC, and on February 5 the specifications for the machine were sent for testing to the regulator's Office of Engineering and Technology (OET).

A drawing of the cognitive radio's test set-up, included in the filing, indicates that it will be able to access white space signals for a UHF radio, a CR scanner, and a laptop computer attached to network processor through an Ethernet interface. Users would at first specify a TV channel for the device to pick up. The machine would search for other signals if that one was already taken.

In its January statement, the coalition asked the FCC to:

  • Authorise the use of "spectrum sensing" rather than geolocation technology (the main technique used in existing solutions, though not in 802.22, to find white space. The group argues that spectrum sensors do not need databases of available channels to function, and so are more flexible.
  • Recommend that such devices check whether the channel is being used by a TV broadcaster once a minute, rather than every 10 seconds as recommended by the commission's first proposal.
  • Avoid any delays in deployment of unlicensed devices. The FCC has provisionally okayed white space detecting devices to go on sale on February 18 2009, the day after all analog TV signals are due to cease.

Opposition to such demands will come not only from the broadcasters, which are still trying to delay the hour when they must vacate the spectrum, but also potentially from the telcos, facing yet more competitive threat, and the mobile giants, which will be keen to take the initiative themselves in mobile internet.

Qualcomm, for one, was quick to react, submitting remarks to the FCC urging it to insist that white space detection systems must be licensed. We'll now be on the look-out for the first sign of a cognitive radio internet device from Nokia, and then the battle really will begin.

Copyright © 2007, Faultline

Faultline is published by Rethink Research, a London-based publishing and consulting firm. This weekly newsletter is an assessment of the impact of the week's events in the world of digital media. Faultline is where media meets technology. Subscription details here.

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.