There is also a TVWS amendment to 802.15.4 that is nearing completion, for those that are interested.

And an additional remark: FCC rules and OfCom as proposed allow for a device that is not directly connected to the database to operate through a cooperating peer that can connect and proxy for the device.

Using the example of a WiFi smart phone, it could perform the role of "master" or "slave", although it seems more natural as the "slave" (802.11 STA). If my Android had a 802.11af radio, it could with the right app act as an AP while using the 4G network to contact the database, thus performing the "master" role.

-B



On 12/11/2013 1:36 PM, [email protected] wrote:
Just a small correction:
I did send the link to 802.11af chairs for distributions to that task group and 
invited comments from them.
Also, the PAWS progress is presented at every 802.11 plenary meeting, so 
interested folks should know about the document and its status.

- Gabor

-----Original Message-----
From: ext Rosen, Brian [mailto:[email protected]]
Sent: Wednesday, December 11, 2013 6:14 AM
To: Eliot Lear
Cc: Bajko Gabor (Nokia-CTO/SiliconValley); <[email protected]>
Subject: Re: [paws] wglc on 
https://datatracker.ietf.org/doc/draft-ietf-paws-protocol/

I'll take a stab at answering this:
On Dec 11, 2013, at 8:12 AM, Eliot Lear <[email protected]> wrote:

Hi Gabor,

I don't think you can call this a full review, but I do have a few
questions/issues.

Two general questions:

Could my cell phone or Wifi-enabled device be a Slave or Master Device
in order to make use of the database or is the intent that only base
stations be the target?
In most regulatory environments, the device that has the radio in the shared 
spectrum must contact the database.  You could imagine having a whitespace 
radio in a next get cell phone, but generally the answer to the question is no. 
 Having said that, a database could, if it wanted to, grant anyone access to 
the database.

Also, have we liaised this document to the IEEE 802.11 people and
do/would they care (see below about licensed/unlicensed)?
We have connected with the 802.22 folks, not 802.11.



4.1.  Database Discovery (and elsewhere):


4.1.  Database Discovery

   Different regulators may have different requirements for the approval
   and operation of databases, such as:

   o  A regulator may only allow a limited number of certified databases
      to operate.  It also may require the certification of each device-
      to-database pairing.
   o  A regulator may maintain a trusted website that lists all approved
      databases, known as the Listing Server.  It also may mandate how
      devices use the listing server.

   o  A regulator may allow each database to define its own terms of
      use, so that, for example, an approved device may not be able to
      access all approved databases.

The basis of this document is that the regulators are in direct
contact with the Master Device.
No.  The database is in contact with the device, not the regulators.  The 
regulators authorize the database, have access to it, but do not operate or 
manipulate it directly.

I have some concerns about that approach:

1.  It would seem to me computationally intensive on the part of the
regulator to compute a geometry/contour to determine which frequencies
are available.  As much as I would be worried about a single request, I
don't see why regulators would want to take such aggregate load.  Has a
regulator agreed to do so?  Or am I wrong about the computation?
The database does the computation.  The contour calculations can be done in 
advance, but would have to change as protected primary users change their use.  
The database operation locates the device within the set of precalculated 
protected contours to determine which ones reduce the spectrum available to the 
whitespace device.

2.  Much of this seems to be predicated on micro-auctions in secondary
spectrum.  Interesting idea and worth pursuing, however, the one week
period below seems to lead us to question what "micro" means in this
context.  See below for that
You are incorrect.  All secondary users (whitespace devices) in the same 
location get the same spectrum availability.  There is no mechanism to allocate 
or share that available spectrum.  There is some desire to provide that kind of 
service, but it is beyond our charter.

.

3.  I may be demonstrating my parochial nature, but there is a lot of
complexity in this document that is predicated on the assumption that
licensed use will be permitted.  That is- a specific station license is
required to transmit.  Wouldn't this protocol simplify considerably if
it focused on unlicensed use?  In fact, wouldn't it boil down to a file
transfer protocol and a database format as opposed to bouncing all of
these queries back and forth?  My question really is how the authors
came to this approach.  I can imagine some arguments, such as wanting to
track down bad actors, but I raise the issue because of the plethora of
PII that could end up getting shipped to regulators on a regular basis
over this.
You have an incorrect model.
There is a set of licensed, protected users.  The database knows about them, 
and calculates contours to assure their use is protected.  There is a set of 
unlicensed, but type-approved whitespace devices (which includes masters and 
slaves).  They are secondary users - they can use spectrum if none of the 
primary, licensed users use it.  The secondary, unlicensed users ask the 
database what spectrum is available at their location at that time.  The 
database calculates which primary users would be affected by a secondary 
transmitter at that location and remove the primary user's spectrum from the 
available secondary spectrum.  The database returns what is left (what spectrum 
is not used by any primary user at that location at that time).

All of this is provided in a regulated environment.  The regulator decides what 
the protections are, and what the unlicensed devices have to do to use the 
available spectrum.


Section 4.1.1:

   Within a regulatory domain that has a Database Listing Server, a
   Device MUST use it to determine the URLs of databases for the domain.
   The URI of the Listing Server for a regulatory domain MAY be
   preconfigured in the device.  Where allowed by the regulator, the
   Device MAY save the database list and SHOULD contact the Database
   Listing Server periodically to update its list.  The time between
   such updates MUST be no longer than one week, or any update interval
   required by the applicable regulatory domain, whichever is shorter.
I presume that in this paragraph, when you say "Device" you mean "Master
Device".  going further, it seems to me that the point should not be
whether or not such a device has direct Internet connectivity, but
whether or not it can receive updates.  Those updates could conceivably
come from many sources, including ones in which IP is not used.
This section is referring to the process by which the device (a master device 
if there are master/slave devices) locates the database.  Not every use has 
slaves.  In some countries, there is a listing service of multiple competing 
database operators.  Only a database on that list may be used.  This is the 
control the regulator has on de-authorizing databases.

The PAWS protocol is based on IP transports.  We don't consider models where 
there are alternatives to IP to access the listing service or the database.

Moreover, there seems to have been an arbitrary period of time chosen (1
week).  Why not state that in terms of the EventTime in AVAIL_SPECTRUM_RESP?
Again, this is the frequency at which the listing service must be requeried, 
not the database.  The frequency is normally set by the regulatory domain, and 
devices have to be built for one or more regulatory domains.   It's much less 
often than the spectrum query.  This basically determines how quickly a 
regulator can de-authorize a database.

Thanks,

Eliot

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws
_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to