Institute forProspectiveTechnological Studies
Mapping EuropeanWireless Trendsand Drivers
EUR 22250 EN
T E C H N I C A L R E P O R T S E R I E S
Synthesis Report
Themission of the IPTS is to provide customer-driven support to the EU policy-making process by researching science-based responses to policy challenges that have both a socio-economic as well as a scientific/technological dimension.
EUR 22250 EN
Mapping European Wireless Trends and Drivers
Synthesis Report
Editors:
E. Bohlin, S. Lindmark, C. Rodríguezand J-C. Burgelman.
DG JRC-IPTS
Authors:
P. Ballon, C. Blackman, E. Bohlin, S. de Munck, S. Forge, J. Heres, A. Kips, S. Lindmark, R. Tee, W.-P. van der Laan, M. van Staden and U. Wehn de Montalvo.
TNO
April 2006
European Commission
Joint Research Centre (DG JRC)
Institute for Prospective Technological Studies
http://www.jrc.es
Legal notice
Neither the European Commission nor any
person acting on behalf of the Commission is
responsible for the use which might be made of
the following information.
Luxembourg: Office for Official
Publications of the European Communities
ISBN 92-79-02035-8
Catalogue Nr.: LF-NA-22250-EN-C
© European Communities, 2006
Reproduction is authorised provided the
source is acknowledged
Printed in Spain
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
�
Preface
New wireless technologies like WiFi, WiMax, UWB as well as mesh and ad hoc networking are
spreading increasingly fast in Europe. Wireless technologies are now at a critical juncture because different
combinations of these could disrupt the existing mobile landscape, dominated at the moment by the GSM
and UMTS standards.
The future of the wireless communication system and the implications for Europe has been of growing
interest to the Institute for Prospective Technological Studies (IPTS).1 Since 2003, several studies on the
future of the wireless communication system have been published.
IPTS launched the present study for three reasons: to map the new wireless developments in Europe;
to analyze drivers of the same and provide policy and regulatory recommendations. To that end, the term
Alternative Wireless Technologies (AWTs) has been employed to collect the various new technologies
under one umbrella. This term is being increasingly used in the trade press as well. However, a major
conclusion of the report is that the new wireless landscape will involve several types of technologies,
interconnecting with one another, and not necessarily excluding the traditional cellular technologies, but
rather complementing and reinforcing them. To that end, the report has developed technology maps to
illustrate the scope and overlaps between the various technologies.
As the new wireless landscape emerges, the trend towards Ambient Intelligence (AmI) begins to
receive general recognition. Wireless technologies will support the future AmI networks, and this report
suggests that the new wireless landscape offers the potential for seamless connectivity over various types
of data ranges and distance coverage ratios. Therefore, it seems appropriate to suggest here that this report
not only identifies AWT in the above sense, but there will be a shift towards a new form of AWTs - Ambient
Wireless Technologies. The emerging landscape of Ambient Wireless Technologies is likely to become an
issue of increasing industrial and policy attention, providing momentum for future studies on AWTs in this
new sense.
Jean-Claude Burgelman
Head of the ICT Unit, IPTS
1 IPTS, based in Seville, Spain, is one of seven research institutes that make up the European Commission’s Joint Research Centre
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
�
Acknowledgements
A number of key individuals and organisations ensured the completion of this volume, and their
assistance has been essential.
Critical support and active advice have been provided by IPTS during the project and project
meetings by:
• Anna-Flavia Bianchi
• Marc Bogdanowicz
• Layos Nyiri
• Yves Punie
• David Osimo
• Martin Ulbrich
• Dieter Zinnbauer
The following partner organisations contributed to the report as follows:
• IMIT: Erik Bohlin (Project Manager) and Sven Lindmark (Synthesis Report, Editors of Annex 1-3)
• SCF Associates: Simon Forge and Colin Blackman (Annex 2-3)
• TNO: Pieter Ballon, Uta Wehn de Montalvo, Annemieke Kips, Mildo van Staden, Jeroen Heres,
Richard Tee, Silvain de Munck and Willem-Pieter van der Laan (Annex 1-2)
The whole team is grateful to the colleagues of DG INFSO who provided extremely valuable help
with validating the research results.
Note: This is the Synthesis Report of all the findings of MEWTAD project. The complete MEWTAD
Final Report consists of this Synthesis Report plus Annex 1-3, one for each work package (Annex 1-3,
corresponding to WP1-3). Annex 1-3 will only be available on the DG JRC-IPTS website (www.jrc.es) and
not published as printed paper copy. The findings presented herein are solely the personal opinions of the
authors, and should not be construed to represent the opinions of the European Commission.
�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sExecutive summary
Background
The European ICT sector has enjoyed
outstanding success in the second generation
(2G) of mobile telecommunications. Whilst the
European industry has developed 3G systems
largely as a generational successor to 2G, a
plethora of competing (and complementing)
wireless technologies and solutions, often
stemming from the computer industry, have
entered the scene. For short, these are denoted
alternative wireless technologies (AWTs). Such
AWTs create new growth opportunities but may
also constitute a disruptive threat to existing
networks and their supporting communities.
Hence, there is a strong and urgent need to
research the usage of AWTs, as well as the trends
and drivers currently catalysing their diffusion.
Objectives
The objectives of this study are to (1) map
wireless technologies in Europe and the current
trends in development; (2) analyse the drivers that
could support these emerging technologies, with
particular emphasis on safety and security and
mobile virtual communities (MVCs); (3) examine
the effect that the regulatory environment
will have on the evolution of these alternative
wireless technologies, identify policy options and
implications for European Union (EU) member
states (MS) and provide policy recommendations.
AWT Overview
For the purposes of this study, AWTs
cover all emerging wireless technologies with
the exception of traditional cellular mobile
technologies (2G, 3G). AWTs enable, in sum,
the provisioning of existing and new services to
mobile users and allow communications between
computers, PDAs, phones, consumer electronics
devices and appliances – in office, home, and/
or public environments. AWTs may operate in
licensed or unlicensed frequency bands, and can
be applied in a number of different topologies
such as mesh networks and ad-hoc networks. The
figure below identifies and maps out a number of
Wireless Technology Overview
�
Exec
utiv
e Su
mm
ary wireless technologies; the basic dimensions are
commonly agreed upon to determine of the types
of services and business models that they are able
to support – speed and mobility.
Here we note that the current crop of
AWTs is not the final set. The mobile and
wireless arena is an extremely dynamic scene in
which technologies are adapted, extended and
converging towards ever-increasing bandwidths
and mobility. The AWTs covered in this report
are either: (1) existing in the market today, and/
or (2) on their way towards standardisation or
in advanced R&D stages, and/or (3) potentially
presenting a challenge to traditional business
models in the mobile market. Specifically, we
consider the following types and technologies:2
• short-range protocols (such as WLAN /Wi-Fi,
UWB, NFC, ZigBee and Bluetooth)
• longer-range protocols (WiMax, Flash
OFDM, 3G enhancements such as UMTS-
TDD)
• mesh and ad-hoc networking
Mapping Availability and Usage in the EU
The report presents an analysis of the
availability and usage of a number of selected
AWTs – UWB, WiMax (802.16x), Flash-OFDM
(802.20x), Wi-Fi (802.11x), Meshed and Ad-
hoc Networks and UMTS TDD – in the EU. The
technologies were selected on the basis of their
potential for the provision of alternative non-
Country UWB WLAN (pre) WiMax Flash OFDM Mesh/Ad-hoc UMTS TDD
Austria commercial deployment useBelgium commercial commercial useCyprus commercial trialCzech Rep. commercial trial useDenmark commercial commercial useEstonia commercial trialFinland commercial trial useFrance commercial commercial commercial trialGermany commercial commercial commercial commercialGreece commercial useHungary commercial deploymentIreland commercial commercial deployment deploymentItaly commercial commercialLatvia commercial commercial commercialLithuania commercial trial deploymentLuxembourg commercialMalta commercialNetherlands commercial commercial trial usePoland commercial commercialPortugal commercial commercialSlovakia commercialSlovenia commercial commercialSpain commercial commercial useSweden commercial trial use deploymentUK commercial commercial commercial commercial
Overview of Selected AWT Activity in EU25
2 For the purposes of this report, satellite- and airship-based communications as well as broadcasting technologies (e.g. DVB) are excluded.
�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s(traditional) operator-centric access. The table
below brings together the observations in an
overview at country level of where these AWT
activities are taking place, along with an overview
of the phase of development.
Clearly the most dynamic markets, in terms
of the variety of AWTs being used or deployed,
are situated in Western Europe and Scandinavia.
France, Germany, Ireland, the Netherlands,
Sweden and the UK present the most diverse
European markets in terms of AWTs, with almost
all AWTs under review being deployed or used in
these countries.
The overview table also demonstrates that
while UWB and Flash OFDM are marginal or
non-existent on the EU market, (pre)WiMax,
Mesh/Ad-hoc technologies and UMTS-TDD
are available or being deployed in numerous,
or even most, of the EU member states. WLAN,
in the form of Wi-Fi, is by far the most mature
technology considered in this report. It has been
on the market for several years and is used by a
wide range of user groups.
We also investigate the type of operators and
their strategies regarding AWT initiatives. Clearly,
traditional operators have taken the lead in the
deployment and exploitation of AWTs throughout
most of Europe. This suggests that there are at
present constraints in Europe for AWTs being
used in a non- (traditional) operator-centric
manner, even though in some countries there
is some moderate or even strong non-operator-
centric activity.
Drivers and bottlenecks
In general, the following drivers and
bottlenecks for AWTs are mentioned most
frequently and highlighted as most important by
EU experts today.
Mobile Virtual Communities, Security and Safety and AWTs
The report explores the (potential) relationship
between mobile virtual communities (MVCs) and
AWTs. It was found that current and emerging
General AWT Drivers and Bottlenecks
Drivers Bottlenecks
- Poor fixed broadband infrastructure development in many small cities, towns, rural and remote areas across Europe.
- Government incentives, programmes and public-private partnerships to stimulate broadband connectivity.
- Competition in Wi-Fi markets, e.g. because of relatively low prices of Wi-Fi deployment, driving prices down and ensuring relatively high coverage in a number of countries.
- Success of private in-house WLANs, which might stimulate the usage of public WLANs.
- Emerging integration of AWT and mobile capabilities in dual mode handsets.
- Falling hardware prices and backhaul costs.
- Limited number of licensed operators in some markets, creating incentives for new stakeholders to enter national markets using AWTs.
- New applications and possibilities such as VoIP over wireless, deployment of AWTs on trains etc.
- Expected expansion of WiMax with mobility characteristics.
- Lack of interconnection and roaming agreements, especially between new AWT operators.
- Pricing models of public hotspot access in many EU countries still oriented towards occasional use, limiting scope of AWTs to business market.
- Licensing regimes in many EU countries imposing limitations on spectrum availability, deployment, handoff and integration of AWT cells, and generally allowing technical experiments with AWTs but no market experiments.
- Persistent standardisation problems.
- Lack of user-friendliness in access, authentication and billing procedures.
- Lack of structural advantages (in terms of speed or cost) over fixed broadband, and therefore a lack of incentives for AWTs in areas with well-developed fixed broadband infrastructure.
- Potential saturation and congestion of unlicensed spectrum in prime locations.
- Limited amount of terminals and other certified equipment in the market.
- Lack of customer education, i.e. in terms of differences between mobile and various AWTs.
- Lack of content applications.
10
Exec
utiv
e Su
mm
ary instances of MVCs are primarily related to mobile
cellular technologies (with voice and messaging
being strongly community-related). Voice over
Wireless IP has persistently been referred to as the
so-called killer application for AWTs. However,
there are still a number of barriers limiting the
market prospects (and thus community impact)
in the short to medium term. Currently, the main
development (at a modest level) is instead the
proliferation of wireless communities for the
joint deployment and operation of Wi-Fi hotspots
and clouds. Geographical and participatory
limitations of current AWTs are the main factors
hindering the development of AWT-based MVC
today.
AWT networks are finding major and
increasing usage in security, health care and
safety of everyday life. For security purposes,
AWTs lend themselves to providing police fire
and ambulance services, as well as security
services with extremely robust C4 (command /
control / communication / co-ordination) systems,
not least for alerts and disaster situations.
Safety of life and property using AWT
capability covers many areas, but two appear
particularly significant: (1) the use of wireless
sensor networks for detecting unsafe situations,
be they in a specific environment, a city, a
chemical plant, or tracking potentially hazardous
moving items such as containers; and (2) mobile
applications for vehicle and traffic management
hazards – termed telematics. AWT networks could
form the basis of a ‘second network’ to provide
the citizen with a dedicated alert channel, due
to their ubiquity, robustness and low cost relative
to other radio technologies such as mobile
cellular (as shown by a case study – WARN).
In addition, mesh forms of AWTs have inherent
resistance to attack due to their non-centralised
locus of control, and thus are attractive for this
application.
Despite the widespread use of AWTs in
emergency and security applications, perhaps
it is in the development of ubiquitous networks
for health care, including mental health, that
the greatest advances are to be seen. In health
care, AWTs can be used in several applications,
including (1) telemedicine where the ubiquity of
AWTs enables expertise and scientific monitoring
of care in the hospital to be transferred to care
in the home for aged and infirm people; (2)
numerous uses in hospital networks; (3) personal
and wearable health networks (Healthwear)
attached to the body of the patient will extend
care into the home from hospital, an area where
little success has been found so far with effective
telemedicine. These may be used for early
detection of failing mental as well as physical
conditions, by going into social interaction as
much as monitoring body parameters directly.
Finally, AWTs may be used in (4) ambulance
control and on-site support, where for instance
images can be transferred from first responders to
a moving ambulance to prepare its medicos for
the injuries and the general scene.
This report also pursues an analysis of security
threats created by AWTs including threats to the
person, personal details and data for emergency
and community services and services such as
m-commerce, including content distribution. A
summary of security challenges is shown in the
figure below.
Impacts could possibly be even greater than
the current nuisances of Internet threats, e.g.
emergency services could be brought down. New
services also bring a range of responsibilities and
vulnerabilities never seen before – the multimedia
handset equals the PC in intelligence and
programmability with Java-based applications, the
network becomes an IP packet-based transport
mechanism, with intelligent gateways and
service agents at its edges, while the IT content
server side expands in complexity and size. One
key difference in security architectures for AWT
networks, compared to previous radio networks
of cellular form, is that they may be non-operator-
centric, yielding major authentication issues.
Here we also would highlight a high-risk threat
to AWT market take-off. If such menaces get out
of control, the whole wireless market could be
undermined in the subsequent fall-out. Citizen
and consumer trust would be destroyed.
11
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
In sum, protection of AWT systems end-to-
end is a major challenge. To be effective across
the multimedia wireless environment, security
needs to be addressed as a key component of the
overall infrastructure, with a security platform to
protect all components (servers, networks and
handsets) designed in from the start – and not
bolted on at the end.
AWTs in Korea – a Case Study
This report summarises for policy-makers
certain key lessons that we may draw from the
Korea experience, a country which has made
major strides in ICT over the past three decades.
Globally Korea is probably the most advanced
AWT market, as indicated by more than 35%
of the world’s total Wi-Fi hotspots; industrial
AWT networks such as ZigBee for RFID and
industrial sensors being piloted; most terminal
and handset devices designed and manufactured
in Korea having short-range AWTs embedded
such as Bluetooth and RFID and, not least, with
the development of the ‘Portable Internet’ using
a home-grown AWT, WiBro. In addition, there
is a strong policy drive towards an increasingly
converged broadband network environment
termed the BCN.
The drivers behind this Korean success
cannot be understood without taking the
historical context in socio-economic terms into
consideration, as well as the social environment
it has created, the social drive to move forward
including the Korean view of technology in
society. With these background factors in mind,
government intervention and orchestration of the
private sector is perhaps the key factor. Over two
decades, the Korean government has orchestrated
support for ICTs with a series of interconnected
programmes, each with defined economic
aims. The latest of these programmes – IT 839 –
includes AWTs to a high degree. Also, the Korean
regulatory regime has created a fairly level
playing field in telecommunications competition,
Security Challenges of Wideband Multimedia Elements
Source: SCF Associates
12
Exec
utiv
e Su
mm
ary with restrictions on ownership for different types
of networks, allowing and even forcing the
sharing of infrastructures according to dynamic
financial models. In addition, it has cleverly used
its revenues from spectrum licences and taxes
on operators as a strategic re-investment fund for
telecommunications infrastructure and research.
A point also notable for policy setters, with a
clear-cut policy of picking-the-winners, is that
Korea often takes a contrarian view on standards
in order to be first in new technology. Education
for adults on a mass scale in the late 1990s
further strengthened Korea’s growth. Finally, on
the demand side, trust in the use of technology
and the expected absence of misuses means
that confidence and acceptance of widespread
usage and even intrusion into everyday life are far
higher than in other cultures.
Policy analysis and implications
This study has gathered evidence indicating
that AWTs are likely to become a major
technological development with important
economic implications for Europe, especially
once the non-operator-centric model is unleashed
and competitive. There is a strong argument in
favour of Europe adopting an integrated approach
to the policy and regulatory issues arising from
AWTs (e.g. spectrum policy and regulation;
competition policy and regulation; licensing
schemes, access and interoperability, network
rollout, security policy and regulation, privacy and
data protection, standardisation, IPR including
digital copyrights, R&D, funding, education
and promotion). However, these are sensitive
issues and care needs to be taken in striking the
right balance between command-style dirigiste
intervention, which would not fit with how the
European Union and the Member States interact,
and a repetition of the experience with previous
European programmes which have been long on
time to organise and get results from. In spite of
the difficulties, the key policy conclusion from
this study is that AWTs’ real significance in the
long term means that a comprehensive European
approach to AWTs is justified. The significance of
AWTs is likely to be downplayed if left to current
market forces and those players dominated by
interests in conventional fixed wire or 2G and 3G
cellular mobile technologies. Moreover, unless
Europe grasps the mettle on AWTs and acts
positively and quickly, it will be left behind by
both North America and Asia.
This policy analysis examines AWTs by
means of a summary SWOT analysis, from the
viewpoint of the EU citizen, summarised in the
table below.
From each strength, weakness, opportunity
and threat we assess the implications for policy
and regulation (see Annex 3). In this report we
instead state policy implications and measures
thematically. First, we conclude that there is a
need for setting a blueprint for AWT development
and usages, for the next 10 years, which covers
a broadband wireless infrastructure and its
applications, and includes converging and
competing technologies. To conclude, a European
policy for AWT take-up should revolve around
the following activity areas:
1. Spectrum allocation – be it in licensed or (new)
unlicensed bands. There is a need to rethink
policy for spectrum allocation at the highest
levels for Europe, Member States, and globally
to incorporate AWTs adequately. AWTs may
need to have frequency bands currently
taken by broadcast, mobile cellular, or the
military. By WRC-07, it would be judicious
to have reconsidered the current allocation
of spectrum in view of the economic benefits
of AWTs for Europe, and abandoning existing
frequency plans. Consideration of spectrum
policy for AWTs must take into account two
key factors: (1) spectrum availability must
be matched against technology type, where
we must balance the social and commercial
importance of existing services; and (2) the
form of spectrum allocation needs to be
decided.
1�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sSWOT Analysis of AWTs from the Perspective of the EU Citizen
STRENGTHSAWTs fill the gaps left by cellular
Lower costs than cellular in many applications
Fast to rollout compared with cellular
Bandwidth higher than 3G
Can cut costs and delays by eliminating large capacity backhaul lines in MAN installations
Cost and installation advantages add up to a way to provide municipalities with a chance to enhance their value with mobile Internet access
Can act in mobile roaming mode (e.g. mobile WiMax)
European industry – in a good position in design coming from cellular on chips, antennae, military electronics including radar, specialist chip manufacture, despite US lead today, as Europe does have mesh software providers
Europe’s collaborative approach experience and ability
WEAKNESSESNo real place today in European telecommunications and media, nor part of an overall plan for communications
Not understood by mass markets
AWT capabilities and positioning are still not well understood by EU industry and technical centres of expertise. More effort on basic radio research is needed.
More clarity is required on spectrum needed
European mobile incumbents are well entrenched; in contrast AWTs are in a weak market position, with no champions, promotion or financial muscle
Security problems abound
European industry has been a follower so far
All successful AWT standards so far are US (IEEE series)
Europe’s forced collaborative approach on decisions and new programmes makes all policy initiatives slow
OPPORTUNITIESDesigning and producing AWT technology and equipment with the aim of developing leadership in broadband wireless (e.g. multi-mode self-adaptive terminals according to performance/cost preferences)
Export opportunities of bringing Internet connectivity to the developing world (cf. Korea’s WiBro)
Expanding scope of European industry – new ventures in consumer and verticals, especially health including frail and mental health conditions
AWTs ideal for SME involvement and start-ups – could seed a whole new EU sector of SME chains
Offer Internet access to all of Europe at low cost (and VoIP) via public and municipal access networks
High broadband penetration via wireless will stimulate feeder industries (e.g. media) & user industries (e.g. medicine)
Economic impacts of better health/elderly care at lower cost
Set standards lacking in mesh networking software and processes, possibly via Open Source software routes
THREATS
Security threats due to pervasive coverage, increased band-width, new bodily proximity connectivity (BANs). Innocent and unaware user population: Threats include: (1) attacks on emergency services; (2) attacks on the core ICT infrastruc-ture; (3) identity theft from citizens; (4) privacy threats to citizens; (5) malware attacks of all kinds on citizens, attached machines and organisations, plus the new types of attack that will come with VoIP; (6) car telematics – accidents caused by malicious messages; (7) body area networks; (8) M-com-merce threats; (9) M-Banking threats, including EFT; and (10) security threats to industrial sensor networks.
Cellular mobile industry views AWTs as a major threat.
Cellular operators, challenged by AWTs, competing with a dif-ferent business model which may outstrip the mobile busi-ness model in value to the customer.
Wireless health issues are not yet understood for cellular and non-cellular access techniques. AWTs are often likely to be worn continually and the effects of low-power continuous ra-diation needs to be examined.
2. Competition policy and regulation. To create
an active AWT-based communications
market, it will be critical to form conditions
of freedom of market entry for new players
without restrictive practices, be it in
interworking – physical attachment, protocols
at network or at application level – or in
related areas such as media content or in
dependencies such as the software for ‘media
players’ and operating systems’. In principle,
Europe may need to reconsider competition
policy with regard to telecommunications
specifically to encourage the entry of new
services from new providers over AWTs.
3. Harmonising Licensing Schemes. If a
regulated AWT market does arise, major
decisions will revolve around the forms
of licence, in terms of whether it is for
spectrum usage or a general licence to
operate with both service provision and AWT
infrastructure ownership, or a service over a
third party’s approved AWT infrastructure.
Major concerns here are the allocation
process for licences and types of licensing.
In summary, policy directions should revolve
around a lighter regulatory regime for the new
entrants, perhaps unlicensed, but with forced
interconnect to incumbents (see below).
1�
Exec
utiv
e Su
mm
ary EC recommendations to the regulators
in the MS would be to view the business
case differences as an opportunity to bring
competition to what may be an oligopolistic
market – while using AWT licensing,
if deemed necessary, firstly to promote
competition by ensuring that new entrants
have licences, and secondly to ensure that
security measures are implemented.
4. Access and Interoperability. A related area
for policy decision is on the assurance of
interconnection access by the new entrants
to existing networks. Issues of roaming,
interconnection and termination charges
must be considered, with cost-based
pricing to prevent monopolistic margins
on interconnect activity. AWTs could then
provide strong local loop competition.
Assuring connection of any-to-any covers
several areas including: (1) open access;
(2) mandated mobile exchanges; (3) pricing
models extending into interconnection and
the billing settlements, with termination
and roaming agreements; (4) naming and
addressing – ENUM (e-number) scheme
for mapping a PSTN telephone number
into a typical Internet Uniform Resource
Locator (URL); (5) universal service; and (6)
emergency number obligations.
5. Network Rollout. In AWT networks,
once network interconnection is assured,
network roll-out is not contaminated with
difficult issues. However, they pose a strong
competitive threat to incumbent technology
stakeholders who may complain to the
regulators that AWT operation undermines
their USO requirements, or that AWT
operators should be regulated by heavier
taxes due to the unfair competition, or
even banned as they may be operated
by municipalities and others who are not
licensed and regulated telcos.
6. Security. Protecting citizens and businesses
by ensuring that security measures are
adequate for the challenge of maintaining
users’ confidence. A complete reform of
Internet security backed by legislation and
policy measures is needed for what should
be allowed/prevented. AWTs need to have
a security layer built into their network
architecture, as their ubiquity becomes the
users’ vulnerability.
7. Privacy needs to be ensured through data
protection legislation and current policy
on the rights of the citizen. A balance
between privacy concerns and convenience,
security and utility of AWTs must obviously
be reached – to protect efficiently against
eavesdropping on conversations, identity
and any personal data theft, and personal
tracking. Privacy protection regulations
for AWT public services will follow those
envisaged for cellular mobile for aggregation
of personal data. For privately deployed
networks, confidentiality can only be assured
if the equipment has security measures built
in as standard.
8. Standards setting, with participation of
ETSI, building on the IEEE 802 standards
series at a basic communications protocol
level, and moving up e.g. the seven-layer
model to build complete systems that can be
easily integrated into a broadband wireless
network for intelligent adaptive network
operation, using mesh network architectures
with cognitive radio front-ends for self-
organising communications structures. The
security issue is far too important to be left
to the suppliers or to ad-hoc development;
its co-ordination is an ideal task for an EC
programme.
9. Patent and Copyright Policy. IPR from
R&D in the supported initiatives for
AWT networking, including security and
application environments (such as operating
systems and microbrowsers), should all be
under open source licence and no software
patents permitted, unless they are in the
public domain. In certain contexts of peer-
to-peer content creation, this Open Source
approach to copyright would extend to
content and media copyright protection so
1�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sthat DRM should be available in multiple
forms. For the future, the reciprocal of DRM
(digital rights management for commercial
media content) might have to be applied in
the far wider field of personal data available
through AWTs – the notion of ‘digital privacy
management’.
10. R&D Programmes. R&D encouragement is
needed through appropriate programmes.
The current R&D programmes do not
consider the opportunities and challenges
of AWTs, and especially their applications,
for specialist areas of emergency services,
health and care of the aged. They are largely
ignorant of these areas’ importance, perhaps
even of their existence. Programmes that
specifically examine and extend existing
AWTs, as well as research for new ones, with
support for standards are needed in three
major areas:
• first, basic radio technology to further
the understanding of AWT signal
propagation, signal processing, and
identification, especially for spectrum
sharing;
• second, exploration and resolution of
all security issues, with reformulation of
the Internet structure where needed for
secure ubiquitous environments for the
citizen;
• third, applications programmes in the
vertical segments of health care, telecare
for the elderly, logistics and retail and
emergency services.
We suggest a two-step approach to
strengthening European research in these
areas. First, a European Alternative Radio
Network Research Programme should
be established as a matter of urgency,
within a timeframe of months. Then,
we suggest the formation of a European
Radiocommunications Research Institute
– ERRI – as a further initiative to pursue
the full promise of the new directions in
radio. ERRI would be a European research
and development centre for AWT radio
technologies and networking architectures.
Jointly funded by industry, national
governments and the EC, the first phase
of rapid set-up and early growth could
be through a joint programme of projects
distributed across existing universities. This
would form a launch pad for the second
phase, of setting up a permanent institute
with its own faculty and facilities at one
site. ERRI would have twin research roles,
of primary and applied research, to form an
international centre of excellence.
11. Funding, Encouragement, Education and
Promotion.
• In view of the opportunity, a
funded programme for research
and demonstrator implementations
should be set up. Here, taking the
revenues from spectrum licences and
taxes on operators for a strategic re-
investment fund for telecommunications
infrastructure and research should be
considered. In addition, SMEs and new
ventures should be encouraged and
supported with capital, programmes
of research, supply contracts for
demonstrator projects etc. A programme
for setting up and incubating AWT start-
ups should also be a major priority.
• Awareness programmes will also be
necessary in Europe, to explain the
technology and its position against
other communications and media
technologies, to show what it can do.
It would also be useful to consider
education programmes.
• Test beds. It would be most useful to
build a range of European test beds at
a national (or EU) level, the aims being
to stimulate the economy by proving
technology and, most importantly, to
educate both the work force and society
in general. The large demonstrator
projects would revolve around four main
1�
Exec
utiv
e Su
mm
ary initiatives: (1) a pan-European wireless
broadband network infrastructure
(EWBNI); (2) a European citizen-alert
network (CAN), perhaps using a mesh
infrastructure; (3) a European Emergency
Services Infrastructure Network (EESIN)
only accessible by emergency services,
with an architecture for robust operation
in all situations; and (4) European
recovery network for attacks and
disasters (ERNAD), a temporary network
to be set up instantly whenever and
wherever infrastructure fails. Across
these horizontal networks may run
some specialised vertical demonstrator
projects, which are most likely to made
up of many small projects – for instance,
use of BANs in mental health for a
specific disabling condition – rather
than large horizontal networks. Health
and elderly care would also try to show
improvements in quality of care against
lowering the costs of their service. Each
demonstrator would be underpinned by
both temporary research projects and
long-term research in the ERRI institute
and in its predecessor distributed
research programme across several
research departments in leading
universities.
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
1�
Table of contents
Preface 3
Acknowledgements 5
Executive summary 7
Chapter 1. Introduction 211.1 Background 211.2 Objectives 211.3 Methodology 211.4 Work Packages and Annexes 21
1.4.1 WP1 – MappingtheExistingEuropeanWirelessLandscapeand CurrentTrends 21
1.4.2 WP2– Drivers 221.4.3 WP3 – ImplicationsofAWTsforEuropeandPolicy
Recommendations 221.4.4 WP4– SynthesisExercise 23
1.5 Structure of this Report 23
Chapter 2. AWT – Introduction and Overview 252.1 AWTs Defined 252.2 Overview of Technologies and Supporting Communities 252.3 AWT Descriptions 26
2.3.1 UWB(Ultra-Wideband) 262.3.2 WiMax(802.16x) 272.3.3 Wi-Fi(802.11x) 282.3.4 FlashOFDM(802.20) 282.3.5 MeshedandAd-hocNetworks 292.3.6 Bluetooth(IEEE802.15.1) 302.3.7 NFC(NearFieldCommunication) 302.3.8 ZigBee(IEEE802.15.4) 302.3.9 RFID 312.3.10 ExpectedenhancementsofUMTS 31
1�
Tabl
e of
con
tent
s
Chapter 3. AWT Availability and Usage in the EU 353.1 Summarising AWT Activities in Europe 353.2 Wi-Fi /WLAN 36
3.2.1 KeyObservations 363.2.2 MappingWLANAvailabilityinEurope 37
3.3 Other AWTs 393.3.1 UWB 403.3.2 (Pre-)WiMax 403.3.3 Mesh/Ad-hocNetworks 413.3.4 FlashOFDM 423.3.5 UMTS-TDD 43
3.4 (Non-) Operator Centricity of AWTs in Europe 443.5 Conclusions and Future Directions for AWTs in Europe 45
Chapter 4. Drivers – MVCs, Security and Safety 474.1 General Drivers and Bottlenecks 474.2 Mobile Virtual Communities 474.3 AWTs Enabling Safety and Security Applications 484.4 AWTs as a Security Threat 50
Chapter 5. AWTS in Korea – A Case Study 555.1 Korean ICT and AWT Market 555.2 Drivers for AWT Take-up 565.3 Main Future Research Areas and the Asian Context 59
Chapter 6. Policy Analysis and Recommendations 616.1 The New Radio Evolution 61
6.1.1 TheMapforEUPolicyonAWTs 616.1.2 CurrentPolicyandRegulationConcerningAWTs 626.1.3 AWTsinsupportofEuropeanInnovationandCompetitiveness 636.1.4 TheChallengesandOpportunitiesforEurope–SWOT 646.1.5 TowardsEuropeanIndustrialPolicyforAWTs 64
6.2 Resultant Policy Recommendations 646.2.1 SpectrumPolicyandRegulation 656.2.2 CompetitionPolicyandRegulation 666.2.3 HarmonisingLicensingSchemes 666.2.4 AccessandInteroperability 676.2.5 NetworkRollout 676.2.6 SecurityPolicyandRegulation 676.2.7 PrivacyandDataProtection 686.2.8 Standards 68
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
1�
6.2.9 DRM,IPR,ContentandMediaCopyrightPolicy 696.2.10 R&DProgrammes 706.2.11Funding,Encouragement,EducationandPromotion 71
6.3 Issues for Further Research 73
References 75
List of Abbreviations 77
Annex 1: Mapping the Existing European Wireless Landscape and Current Trends
(Available on the JRC-IPTS Website - www.jrc.es)
Annex 2: Drivers (Available on the JRC-IPTS Website - www.jrc.es)
Annex 3: Implications of Alternative Wireless Technologies for Europe and
Policy Recommendations (Available on the JRC-IPTS Website - www.jrc.es)
List of tablesTable 3-1 Overview of Selected AWT Activity in EU25 35Table 3-2 Aggregated Hotspot Data 38Table 3-3 Number of EU25 Countries with Selected AWT Activity 39Table 3-4 Operator Centricity of AWT Initiatives in Europe 44Table 4-1 General AWT Drivers and Bottlenecks 47Table 4-2 AWTs and Safety/Security Applications 49Table 5-1 Key AWT and Suppliers Status in Korea 56Table 6-1 SWOT Analysis of AWTs from the Perspective of the EU Citizen 65
List of figuresFigure 2-1 Wireless Technology Overview 26Figure 3-1 Growth Estimates of AWTs in EU25 Member States 45Figure 4-1 Security Challenges of Wideband Multimedia Elements 52Figure 5-1 Korean government ICT programmes 58Figure 5-2 Korea’s Latest Medium Strategy Plan for IT – 839 60Figure 6-1 Work Programme for Establishing European Success in AWTs 72
List of mapsMap 3-1 Hotspots per 100,000 Inhabitants in EU25 plus 4 (june 2005) 38Map 3-2 Geographical Spread of Hotspots over EU 25 plus 4 (March 2005) 39Map 3-3 WiMax Activities in Europe, June 2005 41Map 3-4 Mesh / Ad-hoc Network Activities in Europe, June 2005 42Map 3-5 UMTS TDD Activities in Europe, June 2005 43
21
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s1. Introduction
1.1 Background
The European telecommunications and
electronics industry has enjoyed outstanding
success in the second generation (2G) of mobile
telecommunications. In a relatively short time
period, European actors have established leading
positions in system, handset, and operator levels
of the actor system. As in all lucrative industries,
this lead will not be left unchallenged. In the
ongoing transition to third-generation (3G)
mobile communications, and perhaps even more
so in the coming fourth generation (4G), Asian
and American actors are going ahead with new
initiatives. Whilst the European industry has
developed 3G systems much as a generational
successor to 2G, a plethora of competing (and
complementing) wireless technologies and
solutions, often stemming from the computer
industry, have entered the scene. For short, these
are denoted alternative wireless technologies
(AWTs). In some areas, notably wireless LAN
applications for offices, homes and “hot spots”,
they have already reached substantial usage
and diffusion. Other alternative technologies
– including WiMax, UWB and meshed and ad-
hoc networks – show promising signs of fulfilling
existent and growing user needs. If AWTs succeed,
there is a risk that the leading European position
will be seriously challenged. Hence, there is a
strong and urgent need to thoroughly research the
usage of AWTs, as well as the trends and drivers
currently catalysing their diffusion.
1.2 Objectives
The objectives of this study are:
• To map wireless technologies in Europe and
the current trends in development
• To analyse the drivers that could support
these emerging technologies, with particular
emphasis on safety and security and mobile
virtual communities (MVCs)
• To examine the effect that the regulatory
environment will have on the evolution of
these alternative wireless technologies, and
identify policy options
• To understand the implications for European
Union (EU) member states and provide
policy recommendations
1.3 Methodology
The study uses a combination of
comprehensive mappings of the AWT usage in
Europe, and in-depth case studies. The main
sources include existing research reports, other
publicly available information sources, and expert
interviews.
1.4 Work Packages and Annexes
To structure the wide-ranging questions, the
project has been organised into several work
packages (WPs), each of which is focused on
some aspect of the whole problem set. WP 1-3
are reported in separate annexes (Annexes 1-3),
while WP 4 is reported here. Annex 1-3 are only
published on the JRC-IPTS website (www.jrc.es)
1.4.1 WP 1 – Mapping the Existing European
WirelessLandscapeandCurrentTrends
The objective of WP 1 is to map present-
day developments in Europe regarding AWT in
order to assess the extent to which these wireless
technologies are disruptive to the existing (fixed
and mobile) networks. Specifically, it focuses on:
which emerging AWTs are being implemented;
which stakeholders are involved; which services
they provide; and what the current trends and
drivers are.
WP 1 is reported in Annex 1, as follows.
First, it provides an overview of the most
significant AWTs, their general characteristics,
22
Intr
oduc
tion their technical performance characteristics
and constraints, and their expected impact in
the market of wireless and mobile broadband.
For a selection of these, penetration and usage
patterns throughout Europe are overviewed and
analysed. The findings from empirical research
among country experts and desk research are
summarised for each of the 25 EU countries
and for each technology. A geographical
representation of the significant alternative
wireless technologies in the EU is also provided.
By way of conclusion, emerging trends and
drivers as well as foreseeable developments in
the availability and usage of AWTs are analysed.
1.4.2 WP2–Drivers
The objective of WP 2 (reported in Annex 2)
is to explore safety and security as well as mobile
virtual communities as drivers for demand for
emerging alternative wireless technologies. WP 2
is divided into several themes:
• MVC as a driver of AWT
• Safety and security as a driver of AWT
• Korea AWT Status
First, there is an analysis of how MVCs
interact with and drive demand for AWTs. It is
carried out along two lines: (1) opportunities of
AWTs for MVCs, and (2) opportunities of MVCs
as a social platform for accelerated diffusion of
AWTs.
A second theme offers an analysis of safety
and security as a driver for AWTs, as well as the
security threats they pose. The theme is in turn
split into three parts:
• An investigation of enabling AWTs for safety
and security applications. This includes:
a number of scenarios or “vignettes”;
examination of capabilities and suitability
of AWTs in security, safety and health
applications; examination of a potential
structure for a citizens’ alert network and how
this would fit into a compound architecture
of AWTs for security and health; examples of
use of AWTs in each of the major application
domains, citing case studies of how the
technology is providing advances; and last, it
briefly examines the various business models
for the AWT networking industry.
• An analysis of security threats associated with
AWT. It provides an overview of AWT usages
and the threats they imply, and then offers an
in-depth threat analysis for those components
that have the highest vulnerabilities in the
end-to-end chain of AWT infrastructure, with
six examples of threats in everyday AWT
usage.
• Finally, a case study is presented on an
advanced application of AWT for safety and
security purposes – WARN, the Wireless
Accelerated Responder Network – a pilot
project mobile broadband network for
public safety and security for Washington
D.C. using Flash OFDM technology supplied
by Flarion.
Moreover, Annex 2 offers an in-depth case
study of AWT status in one leading market – Korea.
It includes a general overview of the Korean ICT
market, application services and the major players,
key technologies and their suppliers, the drivers for
AWT take-up in Korea (historical context, social
drivers, the important role of government support,
and the regulatory environment). Finally, the way
forward for Korea in terms of main research areas
and the Asian context, i.e. the cooperation with
China and Japan, is examined.
1.4.3 WP3–ImplicationsofAWTsforEurope
andPolicyRecommendations
Drawing on the output of WP 1 and WP 2, the
objective of WP 3 is to analyse the implications,
potential benefits and challenges of the different
technologies for the EU over the next 10 years,
in terms of the regulatory and policy situation
required for their evolution and competition, by
providing thoroughly researched and actionable
policy recommendations.
2�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sWP 3 is reported in a separate annex (Annex
3), as follows. First, it examines the significant
economic potential driven by AWTs and thus the
need for a suitable policy and its underpinning
in current EU policy directions, as well the
tools that could make up an appropriate policy.
Second, it sets out to answer two questions:
why an industrial policy is needed for AWTs,
and how we obtain take-up and buy-in for an
industrial policy. Third, a SWOT (Strengths,
Weaknesses, Opportunities and Threats) analysis
is conducted. From this, Annex 3 assesses the
implications for policy and regulation, as well as
the issues raised by policy/regulation, from the
point of view of the EU citizen. Then, resultant
policy recommendations are discussed under
eleven (11) main headings. Finally, the main
concepts and recommendations are summarised
in a European policy blueprint for AWTs.
1.4.4 WP4–SynthesisExercise
This report corresponds to WP 4. i.e. the
synthesis exercise covering all issues analysed
in the previous WPs, and including an executive
summary, references and list of abbreviations.
1.5 Structure of this Report
The major content items of the final report,
corresponding to the chapter outline, are:
• Chapter 2: Overview of AWTs
• Chapter 3: Overview of AWTs’ availability
and usage in the EU
• Chapter 4: Drivers: MVC, Security and Safety
and AWTs as a security threat
• Chapter 5: Case study – AWT Status in Korea
• Chapter 6: Implications for Europe and
policy recommendations
2�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
The objective of this chapter is to set the
stage for the subsequent ones by introducing
the concept of AWT and the main technologies
and standards involved. Section 2.1 introduces
and defines the concept of AWTs. Section 2.2
provides an overview of the most significant
AWTs and their general characteristics. Finally,
the main standards and technologies are reviewed
in Section 2.3.
2.1 AWTs Defined
In recent decades, mobile communications
have been dominated and shaped by 1G, 2G
and 3G cellular systems. From time to time,
alternative technologies have challenged these
systems, but largely failed in the market (satellite
systems such as Iridium and cordless technologies
such as Telepoint). As mobile communications
are becoming more data-capable and demand
for data communications services is increasing
following the growth of the Internet and local area
networks (LANs), new growth opportunities open
up, not only for cellular but for also for emerging
alternative technologies. Such alternatives are
here termed “Alternative Wireless Technologies”
(AWTs).
AWTs enable, in sum, the provisioning of
existing and new services to mobile users and
allow communications between computers,
PDAs, phones, consumer electronics devices
and appliances – in office, home, and/or public
environments. AWTs may operate in licensed or
unlicensed frequency bands and can be applied in
a number of different topologies such as meshed
networks and ad-hoc networks. In principle AWTs
cover all emerging wireless technologies with the
exception of cellular technologies. For the purposes
of this report, however, satellite- and airship-
based communications as well as broadcasting
technologies (e.g. DVB) are excluded.
2. AWT – Introduction and Overview
2.2 Overview of Technologies and Supporting Communities
Mobile and wireless technologies can be
characterised and categorised in a variety of ways.
However, it is commonly agreed that the basic
determinants of the types of services and business
models that they are able to support consist of
speed and mobility. While speed is a factor of the
bandwidth and latency characteristics of a particular
technology, the mobility provided is determined
by the cell range of the technology and the extent
to which seamless handover between cells is
possible. Technologies offering low data speeds
are often labelled narrowband technologies, as
opposed to broadband technologies offering high
data speeds. Technologies offering high mobility
are referred to as mobile technologies, enabling
the establishment of wide area or metropolitan
area networks; while technologies offering low
mobility constitute local or even personal area
networks, providing so-called fixed wireless
access or nomadic access.
The mobile and wireless arena is an extremely
dynamic scene in which technologies are adapted,
extended and converging towards ever-increasing
bandwidths and mobility. Most prominently,
there is a strong drive towards the development
and implementation of network technologies
offering increasing data speeds. This is fuelled by
the expectation that broadband technologies will
enable mass market uptake of innovative, rich
and user-friendly services and will allow a whole
range of market players to develop viable and
sustainable business models. Therefore, this report
focuses on new broadband technologies, offering
both high mobility and low mobility. The figure
below demonstrates the dynamic and converging
nature of mobile and wireless technologies
towards so-called fourth-generation (4G) mobile
broadband network technologies.
2�
2. A
WT
— In
trod
ucti
on a
nd O
verv
iew
The convergence of technologies implies the
convergence of different sectors and communities
supporting these technologies. While these
communities are frequently overlapping in
terms of stakeholders and their ambitions, they
are also often in conflict with different regional
and sectoral scope. Table 2-2 in Appendix 1
shows that there are EU, US as well as Asia-
centric standard bodies and consortia. Also,
communities often tend to be dominated by the
telecommunications industry or the IT and fixed
wireless industry. In addition and conjunction to
the technology development trajectories of these
industries, there is a thriving worldwide research
community working on very high-performing air
interfaces and other network technologies. Finally,
a number of proprietary technologies are already
on the market today, with the objective to set the
de facto standard in the field. These are often IP-
based technologies developed and promoted by
start-up vendors such as Flarion, Arraycomm, IP
Wireless, Redline Communications and Alvarion.
2.3 AWT Descriptions
The AWTs covered in this report are: (1)
existing in the market today and/or (2) on their
way towards standardisation or in (advanced)
R&D stages and/or (3) potentially presenting a
challenge to traditional business models in the
mobile market. Specifically, we consider the
following AWT types and technologies, each
described in the subsequent sections3:
• short-range protocols (such as WLAN /Wi-Fi,
UWB, NFC, ZigBee and Bluetooth)
• longer-range protocols (WiMax, Flash
OFDM, 3G enhancements such as UMTS-
TDD)
• meshed and ad-hoc networking
2.3.1 UWB(Ultra-Wideband)
Ultra-Wideband (UWB) is a wireless
communications technology that transmits
Figure 2‑1 Wireless Technology Overview
Sources: Adapted from Annexes 1 and 2
3 Please consult Annex 1-2 for further information and sources.
2�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sdata in short pulses which are spread out over
a very wide swath of spectrum. The technology
originated from military research and is
nowadays being standardised and developed
for civil application. UWB uses an extremely
wideband of spectrum to transmit the data. In
this way, the technology is able to transmit more
data in a given period of time than traditional
radio technologies. By using low power levels,
UWB has very little interference impact on other
systems. Due to the large bandwidth it is rather
insensitive itself to interference from other radio
sources. UWB allows ultra-high data rates (~
100s of Mbps) between devices, but due to the
power limitations, they must be close to each
other (at maximum ~ 20 m). Due to the strict
power limitations, UWB radios will be cheap
and consume low power. Two versions of UWB
exist, a time domain and an OFDM version.
There are several fora standardising UWB.
Within IEEE, the IEEE P802.15 Working Group
is the working group for Wireless Personal
Area Networks. The MultiBand OFDM Alliance
(MBOA) is working on standards for both the
physical and the MAC layers (IEEE 802.15.3a)
of UWB. The WiMedia Alliance is working on
developing a convergence layer that will allow
the UWB MAC layer to interface with a number
of standard protocols, such as USB, WUSB, IEEE
1394 and UPnP. Finally, protocols should be
developed take advantage of UWB. The WUSB
specification, developed through the Wireless
USB Promoter Group, and the specification of a
Protocol Adaptation Layer through the 1394 Trade
Association are examples of these.
The MAC and physical layer specifications
will be released to the MBOA member companies
at the end of 2004. Initial UWB-based products
are expected to be introduced in 2005 and it is
widely expected that substantial volumes will find
their way into consumer applications by 2006. Key
players are Intel, Agere, Intersil and USB product
vendors. TimeDomain, a very early start-up on the
time domain alternative of UWB, went broke and
vanished from the market.
2.3.2 WiMax(802.16x)
WiMax (Worldwide Interoperability for
Microwave access) is a longer-range wireless
access technology based on the IEEE 802.16
standard suite. The WiMax protocol suite consists
of a number of variants. The first version (802.16)
is primarily intended for use as fixed wireless
access, as it operates in the spectrum between 10-
66 GHz requiring line of sight. But later versions
also allow for nomadic access and even mobile
operation (802.16e). The WiMax forum certified
that shared bandwidths of around 40 Mbps and
cell radii of 3-10 km, and shared bandwidths of
15 Mbps and cell radii of around 3 km, can be
expected for fixed and portable, and for mobile
application, respectively. Note however that,
in practice, reach and bandwidth will strongly
depend on transmission power (much lower for
unlicensed than for licensed bands), antennas,
protocol overhead and propagation conditions.
E.g. in the case of mobile application (requiring
omnidirectional antennas) in unlicensed bands,
the range corresponding to 15 Mbps could be
reduced to only several hundreds of meters.
Regulations allow deployment of WiMax in the
licensed 2.5 GHz, 3.5 GHz and 26 GHz (non-
line-of-sight) bands, and in the unregulated
5.8 GHz bands. Note that the Dutch regulator
restricted the use of the licensed bands to fixed
wireless access only.
WiMax can be used for leased lines,
residential access, nomadic access (hotspot) and
wide-area broadband access. Currently, only fixed
wireless access is possible. Intel has announced
implementations of WiMax cards in PDAs and
laptops in 2006, allowing nomadic access. Mobile
implementations (in phones) are not expected
before 2008. Thus depending on the area of
deployment, WiMax could be an alternative to
xDSL and FttH access, WLAN hotspots or UMTS.
The WiMax standard suite is IEEE standards
(IEEE 802.16x). The WiMax forum assures
compatibility and interoperability between IEEE
802.16x implementations through testing and
certification of equipment. Vendors with (pre-
2�
2. A
WT
— In
trod
ucti
on a
nd O
verv
iew )WiMax equipment in their portfolio include:
Agere, Alcatel, Alvarion, Fujitsu, Lucent, Samsung
and Siemens. Examples of WiMax deployment in
Europe are BT and France Telecom. BT is trialling,
in four areas, pre-WiMax technology (Alvarion)
for wireless local loop. France Telecom is trialling,
in remote area of the Pyrenees, pre-WiMax
technology (Alvarion).
2.3.3 Wi-Fi(802.11x)
Among the Wireless LAN standards, IEEE
802.11 is the most mature wireless protocol in the
unlicensed band of 2.4 GHz. It has been tested
and deployed for years in corporate, enterprise,
private and public environments. In this family
of standards, there is a continuing trend towards
higher bandwidths. It started with a shared
bandwidth of 2 Mbit/s (IEEE 802.11), via 11 Mbps
(802.11b) to 54 Mbps (802.11a, 802.11g). The
IEEE 802.11n is a new wireless specification that
promises data throughput speeds of approximately
100 Mbps. The standard uses MIMO (multiple
input / multiple output) antenna configuration
technology to achieve this. The IEEE 802.11n
standard should become backward-compatible
with 802.11 a/g systems.
The 802.11 standards suite was developed
for use in the wireless local area network (WLAN).
The coverage area of 802.11 standards can be
enhanced to the range of metropolitan area
networks (several kilometres), using directional,
high-gain antennas or using meshed network
architectures. Note that this would restrict mobile
usage of the technology. IEEE 802.11n can be
deployed similarly to its predecessors (wireless
home network, office and public access points)
but achieving higher bandwidth. The impact of
IEEE 802.11n as alternative wireless technologies
in the sense of offering non-operator-centric
access is considered relatively high.
The 802.11a, 802.11b and 802.11g are
ratified IEEE standards. Regarding the 802.11n
standard, there are two alliances working on
the standard: TGn Sync and WWiSE. Companies
involved in TGn Sync are Intel, Agere, Atheros,
Sony, Philips. Companies involved in WWiSE are
Broadcom, Conexant, Texas Instruments, Airgo
and STMicroelectronics.
As mentioned above, the 802.11a, 802.11b
and 802.11g are ratified IEEE standards. A first
draft specification of 801.22n should be available
in mid-to-late 2005. The Wi-Fi 802.11n standard
should be ratified in 2006-2007. Currently, there
is no agreement yet on the channel bands. TGn
Sync proposes using 40 MHz channels in the 5
GHz spectrum (used by 802.11a), while WWiSE
prefers the use of 20 MHz channels in the 2.4 GHz
band (used by 802.11b/g). “Pre-N equipment”
came on the market by the end of 2004 (Belkin,
Agere, Atheros, etc.).
At this writing, July 18th, the European
Commission announced that all member states
have to make two frequency bands – 5159-5350
MHz and 5470-5725 MHz – available for Wi-Fi
services starting November 1, 2005. The creation of
an EU-wide Wi-Fi standard is designed to help the
technology grow and to help alleviate congestion
in the 2.4 GHz version of the technology.4
2.3.4 FlashOFDM(802.20)
Flash OFDM (Orthogonal Frequency
Division Multiplexing) is a longer-range AWT. The
IEEE 802.20 standard under development and
promoted by Flarion specifies a new mobile air
interface. Flash OFDM uses two paired 1.25 MHz
FDD channels within the 450 MHz, 700 MHz,
800 MHz, 1.99 GHz, 2.1 GHz and 2.3 GHz
bands. Flash OFDM promises typical average
shared bandwidths of 1 Mbps and 300 kbps
for the downlink and uplink, respectively. For
deployment in the 450 MHz band, typical average
cell radii between 2.5 km and 25 km, for indoor
urban coverage and outdoor rural coverage,
respectively, are claimed. For deployment in the
4 FierceWireless, July 18, 2005, www.fiercewireless.com
2�
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
shigher frequency bands, these will be smaller.
Flash OFDM claims low latency (~35 ms response
time), making it suitable for use for both real-time
and non-real-time services. Flash OFDM claims
to deliver these data rates, even when customer
speeds are on the order of 250 km per hour.
IEEE 802.20 can be deployed in a wireless
metropolitan area network. The impact of IEEE
802.20 as alternative wireless technologies in the
sense of offering non-operator-centric access can
become relatively high. Global acceptance of the
technology is still uncertain.
The standardisation is under responsibility
of the IEEE (802.20). The 802.20 standard is not
ratified yet and it is questionable whether this will
happen. Although the IEEE 802.20 is not a ratified
standard yet and may never be, a full equipment
portfolio (PC cards, desktop modems and radio
routers) is available from Flarion for deployment
in the 700 MHz, 800 MHz, 1.99 GHz, 2.1 GHz
and 2.3 GHz bands. Equipment for deployment
in the 450 MHz band is claimed to become
commercially available at Flarion in Q2 2005.
Netgear has agreed that it will add integrated Wi-
Fi and Flash OFDM functionality in its 802.11
b/g products line. Siemens expects a 450 MHz
terminal for Flash OFDM to become available on
the market in 2006. The first commercial trial with
Flash OFDM was started with Nextel in Q2 2004.
T-Mobile trialled Flash OFDM in Europe, Telstra
in Australia and Vodafone in Japan.
2.3.5 MeshedandAd-hocNetworks
In contrast with conventional wireless local
loop architectures in which CPEs (Customer
Premises Equipment) communicate with each
other via an access point, in the case of a meshed
network architecture the traffic can travel hop
by hop through the air via intermediate CPEs to
its destination. The CPE provides the combined
functionality for customer access. Further
advantages compared to conventional wireless
local loop architecture are the relatively low
emission powers and more frequency reuse.
Dynamic routing is used to adapt to changing
radio environment, traffic conditions or network
topology. Meshed networks are based on
proprietary protocols, or built on existing protocols
such as WLAN, WiMax, UWB or Zigbee.
Besides meshed networks with fixed nodes,
meshed networks in which the nodes themselves
are mobile exist. A meshed network with mobile
nodes is also referred to as ad-hoc network.
Wireless mesh networks are expected to resolve
the limitations and to significantly improve the
performance of ad-hoc networks, wireless local
area networks (WLANs), wireless personal area
networks (WPANs), and wireless metropolitan
area networks (WMANs).5
Deploying of (fixed) meshed network offers an
opportunity for cost-efficient roll-out of a wireless
local loop. Fewer Access Points will be required,
as CPEs outside the coverage of the Access
Point will be able to reach the access point via
intermediate CPEs. Deploying meshed networks
can also be useful indoors, alleviating the need
for cabling to connect the wireless LAN access
points, as fewer access points will be required.
As a consequence the impact of (fixed) meshed
networks as alternative wireless technologies in
the sense of offering non-operator-centric access
is relatively high.
(Mobile) ad-hoc networks (MANETs) are in
the short term mainly a complement to mobile
networks. Mobile ad-hoc networks can be offered
to certain niche markets, e.g. temporary event
networks. In the very long term they might become
a replacement for mobile networks.
Regarding OSI layer 2 and layer 3 functionality
for meshed networks, there are basically two
approaches to standardisation. IEEE standardised
two routing protocols for ad-hoc networking
(MANET group). These standards only focus
on the OSI layer 3 part of meshed networking.
5 Akyildiz et al. (2005).
�0
2. A
WT
— In
trod
ucti
on a
nd O
verv
iew Nowadays, it is believed that dedicated OSI layer
2 protocols are required in meshed networking
for efficiency reasons. The IEEE 802.11s standard
that Intel and Cisco started developing in 2004,
which is expected to be ratified in 2007, is an
example of this. Furthermore, a newly formed
group within IEEE 802.16 (WiMax), Task Force F,
will develop a meshed network variant of WiMax
(IEEE 802.16f).
Examples of companies offering meshed
network equipment are MeshNetworks, Ember,
MeshCast, Radiant Networks, Packethop, Zensys,
Belair, Firetide, Strix, Intel and Cisco. Although
stable commercial products exist, they are mainly
offered by small start-up companies. They are
non-standardised proprietary solutions. Operators
in the area of meshed networks are Roam AD,
HappyConnect Almere and Skypilot.
2.3.6 Bluetooth(IEEE802.15.1)
Bluetooth is a specification for wireless
personal area networks (WPANs), named after the
Danish king Harald Blåtand (Harold Bluetooth in
English), known for his unification of previously
warring Scandinavian tribes. Analogously,
Bluetooth was intended to unify different
technologies like computers and mobile phones.
The specification was first developed by Ericsson,
and was later formalised by the Bluetooth Special
Interest Group (SIG). The SIG was formed in the
late 1990s by Ericsson, IBM, Intel, Toshiba and
Nokia, and later joined by other companies.
Bluetooth is also standardised by IEEE 802.15.1.
Bluetooth is defined as operating in short-
range and mobile applications, in a personal
operating space (POS) of 10m radius. It is used in
a star configuration with one central routing and
control point, or in a single link, point to point,
as in Wi-Fi. Preferred operating frequency is in
the 2.4 GHz ISM unlicensed band, but others
are possible. It uses a complex protocol stack,
often customised for individual device profiles, so
interoperability can be a problem. The complexity
of the system implies that small numbers of devices
can be interconnected at one time.6
2.3.7 NFC(NearFieldCommunication)
Near Field Communication (NFC) includes
both a networking interface and a communication
protocol. The solution is targeted towards the
consumer electronics users, who will be able to
use a means of communication between various
devices without exerting much intellectual effort in
configuring a “network”. Using NFC, peer-to-peer
connections can be configured between devices at
a maximum of approximately 20 centimetres and
with bandwidths of 106, 212 or 424 kbps. NFC
operates in the unregulated RF band of 13.65 MHz.
With NFC in order to make devices communicate,
you bring the devices together or make them
touch. This will result in the configuration of the
peer-to-peer connection between the devices.
Eventually, once the configuration data has been
exchanged using NFC, the devices can set up and
continue communication for longer-range and
faster protocols like Bluetooth and Wi-Fi. Due
to the very short distance between the devices,
the communication is secured (avoidance of
unintended connections rather than protection
against malicious intent). NFC allows a device
to operate in power-saving mode (passive mode).
In passive mode, one side powers the complete
communication. Main promoters of NFC are
Philips, Sony and Nokia.
2.3.8 ZigBee(IEEE802.15.4)
ZigBee is a set of specifications built around
the IEEE 802.15.4 wireless protocol. The name
“ZigBee” is derived from the erratic zigzag
patterns many bees make between flowers when
collecting pollen. The standard itself is regulated
by a group known as the ZigBee Alliance, with
over 150 members worldwide, driven by promoter
6 Baker (2004, p. 21).
�1
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
scompanies The ZigBee Honeywell, Invensys,
Mitsubishi, Motorola, Samsung and Philips. As a
result of its simplified operations, which are one to
two full orders of magnitude less complex than a
comparable Bluetooth device, pricing for ZigBee
devices is competitive, with full nodes available
for a fraction of the cost of a Bluetooth node.7
Specification 1.0, released September 2004, is
intended for automation controls in personal health
care, industrial controls, consumer electronics,
residential and light commercial control systems,
building control, PCs and peripherals. It is
specified for license-free operation at 2.4 GHz for
up to 65,000 devices attached, with tens of metres
range up to 100 metres (400 metres achievable)
and with 250 kbps data rate.8
2.3.9 RFID
Radio Frequency Identification (RFID) is
more than the next generation of bar codes
– it is a variety of interfaces that can connect
computers directly to individual physical items,
and even to people. RFID tags have the potential
of containing anything from item location and
pricing information to washing instructions,
banking details and medical records. Range
varies by application from 7-15 cm for cards up
to 7.5 m for transport and logistics applications at
high power in the UHF range. RFID systems are
classified according to functionality of data carrier
– a transponder termed a ‘tag’. Transponders are
either active or passive, categorised according to
power source:
1. Passive tags: require no power source or
battery; use energy of radio wave as power
source; least expensive tag and prevalent
type.
2. Semi-passive tags: battery built into the tag
for performance of internal circuits but not to
emit radio waves.
3. Active tags: use batteries for the entire
operation, to emit radio waves, even in
absence of RFID reader.
RFID uses multiple frequencies – low, high
and ultra-high frequency. LF (125-134 MHz) and
HF (13.56 MHz) bands are harmonised globally,
but RFID uses at UHF are not. ETSI sets European
standards principally at 865-868 MHz, while USA
and Canada do so typically at 915 MHz – thus,
tags can be dual band and may have frequency
hopping.
2.3.10ExpectedenhancementsofUMTS
The state of affairs within UMTS is not static;
various extensions and enhancements are being
developed or are being considered, which may be
relevant to the assessment of the threat posed by
the alternative technologies. Therefore, we include
a brief overview of a number of developments
relevant to UMTS.
UMTS TDD
In UMTS, two modes of operation are
recognised, indicated as FDD (Frequency Division
Duplex) and TDD (Time Division Duplex). Duplex
relates to the two directions (uplink and downlink)
of communication between a base station and
a mobile terminal. In TDD the same frequency
(channel) is used for both directions. Separation is
achieved by time division, where transmitter and
receiver are used alternately. The fraction of the
capacity allocated to uplink and downlink can
thus be easily adapted to the demand.
There are many aspects which may lead
to favouring either of the two approaches. In
addition to technical considerations, also history
and political pressure have played a role for
recognition of FDD and TDD equally in the 3GPP
specifications. The end-effect of the technical
7 http://www.wisegeek.com/what-is-zigbee.htm [Accessed July 10, 2005]8 Egan (2004).
�2
2. A
WT
— In
trod
ucti
on a
nd O
verv
iew considerations is that FDD is favoured to provide
coverage in a large area and in situations with a
large number of users each requiring a relatively
low bit rate (e.g. voice users). TDD may be
favoured to cover a relatively small and isolated
area (e.g. a hotspot), serve a smaller number of
users with a high bit rate, and/or when the uplink/
downlink traffic pattern is highly asymmetric.
The current situation is that most manufacturers,
licensing authorities and operators (in particular
for the initial roll-out of the network) favour the
use of FDD. The technical advantage of TDD
may prevail when full coverage is achieved and
cells become smaller, and if cell capacity is still
a major issue.
Currently, FDD is operated in licensed bands
only. Major operators also acquired a license for
a frequency (5 MHz channel) allocated to TDD
use (in the bands 1910-1920 MHz and 2010-
2025 MHz). However, the authorities may declare
one or more of the frequencies for TDD use as
license-exempt. In that case, UMTS technology
may pose a threat to existing operators (including
UMTS operators), similar to the threat resulting
from alternative technologies.
Data-only TDD solutions from IPWireless
are commercially available now in the UMTS
unpaired band and in the 3.5 GHz band. End-
user devices in the form of PC cards and desktop
modems are available. Several operators in various
parts of the world are currently testing IPWireless
technology. IPWireless is likely to license its
technology to vendors who can take advantage of
manufacturing scale and ability to tackle system
integration tasks.9
The use of additional frequencies – UMTS
extension band
For future use, the band between 2.5 GHz
and 2.69 GHz has been designated as UMTS
extension band. CEPT recommended (September
9 Northstream (2005).10 The use of beam-forming antennas and/or MIMO ((Multiple Input, Multiple Output) may further increase data rates in UMTS.
(See Annex 1.)
2004) the allocation of 2 × 70 MHz for FDD use
(i.e. 14 paired frequencies/channels) and 50 MHz
for TDD use (i.e. 10 frequencies/channels). In
addition, CEPT recommends permitting only
technologies from the IMT-2000 family. If and
when these recommendations are followed
(which is expected to come into force from
January 2008), these frequencies will become
available to UMTS and unavailable for other
purposes such as WLL, 802.16a/WiMAX.
The use of HSDPA and enhanced uplink
Currently, most UMTS operators provide a
downlink data rate of at most 384 kbps, using one
of the downlink packet data capabilities defined
in 3GPP Release ’99. Since the 3GPP Release 5,
an additional physical channel has been defined
which allows a much more efficient use of the
spectrum and a higher maximum data rate. By
using adaptive modulation (up to 16-QAM),
adaptive coding and channel-based adaptive
scheduling, a High Speed Downlink Packet
Access (HSDPA) shared channel is provided
that makes the most of a given situation in terms
of propagation and interference conditions.
Depending on the conditions a shared capacity
can be provided with a maximum of 14 Mbps.
The high data rate will considerably enhance the
performance of best-effort, interactive and some
streaming services. Thus, the difference between
the maximum data rates available with UMTS
and with alternative technologies is narrowed
substantially. In addition, an ‘enhanced uplink’
has been specified, colloquially also known as
HSUPA.10
The development of a new radio interface –
OFDM and ‘Super 3G’
Anticipating formal 3GPP standardisation
activities for Release 7 and beyond, some
participants are considering enhancements to
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sthe UMTS radio interface, in particular aimed at
providing higher data rates than currently possible.
Most of the proposals use OFDM as modulation
technique, the same modulation principle as
used by IEEE 802.16(a). As some of the proposed
concepts are, to some extent, compatible with the
existing UMTS technology, its use is advocated to
fill the gap between the existing UMTS technology
and the next generation: 4G.
On December 7, 2004 a group of 26
companies, which also take part in the 3GPP
consortium, announced having agreed on
jointly working towards a significant upgrade
to the current 3G standards. The initiative is
provisionally termed ‘Super 3G’. The aims
are set high: to allow downlink bit rates on
the order of 30-100 Mbps, and to allow an
upgrade of the 3G infrastructure rather than a
replacement. The initiative is clearly a response
to the threat posed by WLAN technologies and
other AWTs. Currently, there is no indication
about the technology planned to be used to
achieve the ambitious goals. The time line is to
finalise the new standards by December 2006.
Implementation/introduction is not expected
before 2009.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
Country UWB WLAN (pre) WiMax Flash OFDM Mesh/Ad-hoc UMTS TDD Austria commercial deployment use
Belgium commercial commercial use
Cyprus commercial trial
Czech Rep. commercial trial use
Denmark commercial commercial use
Estonia commercial trial
Finland commercial trial use
France commercial commercial commercial trial
Germany commercial commercial commercial commercial
Greece commercial use
Hungary commercial deployment
Ireland commercial commercial deployment deployment
Italy commercial commercial
Latvia commercial commercial commercial
Lithuania commercial trial deployment
Luxembourg commercial
Malta commercial
Netherlands commercial commercial trial use
Poland commercial commercial
Portugal commercial commercial
Slovakia commercial
Slovenia commercial commercial
Spain commercial commercial use
Sweden commercial trial use deployment
UK commercial commercial commercial commercial
This chapter presents an analysis of the
availability and usage of the selected AWTs –
UWB, WiMax (802.16x), Flash-OFDM (802.20x),
Wi-Fi (802.11x), Meshed and Ad-hoc Networks
and UMTS TDD – in the EU. The technologies
were selected on the basis of their potential for
the provision of alternative non-(traditional)
operator-centric access.
The chapter starts with summarising key
observations and mapping the availability and
uptake of AWTs, first by providing an overview
(Section 3.1), then elaborating on public hotspot
Wi-Fi (Section 3.2) and the other AWTs (Section
3.3). Section 3.4 proceeds with an analysis of who
3. AWT Availability and Usage in the EU
provides AWT services in Europe. Finally Section
3.5 analyses implications for the future based on
observed growth trends and estimates.
3.1 Summarising AWT Activities in Europe
This section brings together the observations
regarding AWT activities in Europe from Annex 1.
Table 3-5 provide an overview at country level of
where these AWT activities are taking place, along
with an overview of the phase of development,
i.e. (market) trial, deployment, non-commercial
use and commercial availability.
Table 3‑1 Overview of Selected AWT Activity in EU25
��
3. A
WT
— A
vaila
bilit
y an
d U
sage
in t
he E
U Clearly the most dynamic markets, in terms
of the variety of AWTs being used or deployed,
are situated in Western Europe and Scandinavia.
France, Germany, Ireland, the Netherlands,
Sweden and the UK present the most diverse
European markets in terms of AWTs, with almost
all AWTs under review being deployed or used in
these countries.11
3.2 Wi-Fi /WLAN
3.2.1 KeyObservations
WLAN, in the form of Wi-Fi, is by far the most
mature technology considered in this report. It has
been on the market for several years and is used by
a wide range of user groups. This chapter focuses
on public hotspots, i.e. installations where access
is provided for either direct or indirect commercial
return.12 Overall, most hotspots in Europe are
commercially exploited and are resorting to direct
payment by end users. However, there is still
large diversity across individual member states. It
is possible to distinguish two models, according
to two of the leading EU countries in this field:
Estonia and the UK. In Estonia, well over 50% of
public hotspots are free to end users. In contrast,
in the UK it is estimated that only about 1% are
operated in a non-commercial manner. The various
pricing models that we have encountered include
free usage, ‘near-free’ usage (i.e. free under the
condition that a certain amount of money is
spent on other articles in the offering shop, bar or
restaurant), pay-per-hour and/or pay-per-24 hours,
and flat fee subscription, sometimes bundled with
fixed Internet or mobile subscription.
An emerging phenomenon that can be
witnessed in a number of European countries is the
establishment of wireless clouds or zones. Based
on Shamp (2004), we define them as follows:
• A Wi-Fi zone is an aggregation of cooperating
hotspots. However, the area covered by the
zone need not be continuous.
• Wi-Fi clouds offer continuous and unified
coverage over a significant portion of a city’s
or town’s geographic area, usually using
multiple hotspots.
Examples of Wi-Fi clouds and zones being
established in Europe today include Zonet, a
cooperative of Finnish WISPs that has established
Wi-Fi zones and clouds in nine cities in Finland.
Besides this, various municipal and community
initiatives have established or aim at establishing
Wi-Fi zones and clouds e.g. in Finland, Belgium,
Germany, Greece, Poland and the UK.
A cursory overview of Wi-Fi offerings
throughout Europe shows that Wi-Fi and
traditional telecommunications access are being
combined on a subscription level in at least
10 to 15 European countries. In around five
EU countries, this study has found evidence of
mobile (2G/2.5G/3G) and AWT connectivity
being combined on a technical level.
The main applications for WLAN are: (1)
WWW access; (2) access to webmail; and (3)
access to corporate intranets and applications
via VPN connections. In addition, but far more
marginally, some specific WLAN services are
being developed, mainly on a local level.13
11 A methodological note is in place here. WP 1 (see Annex 1) maps the extent of AWT diffusion for all 25 EU member states plus, in a more limited form, for the 4 candidate countries. Data sources for the targeted information were non-confidential, publicly available or publicly verifiable. To gather them, extensive desk research activity was carried out, involving academic and consultancy sources, official country- and region-specific data, the business press, specialised web information, and corporate information provided by the main AWT providers in each country. In addition, a series of in-depth telephone interviews were conducted with country experts for each of the EU25 countries. In the subsequent sections of this chapter, a further analysis and summary of all qualitative and quantitative material are presented, omitting the data on the diffusion of AWTs in the form of country fact sheets. For this we refer instead to Annex 1. In addition, detailed maps as well all background data have been made available to IPTS electronically.
12 Public hotspots are installations where access is provided for either direct commercial return (fee charged per use / atonement) or indirect returns as in the case of ‘free’ hotspots in public locations, such as hotels or cafes, to attract more customers to the core business. Free public hotspots are also often offered by municipalities, universities or communities of end users. With these types, access to the hotspot is free for the consumer at the expense of the hotspot owner.
13 Informal (2004).
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sThe primary target user group for public
hotspots is business travellers. Other major target
groups are tourists, students and other consumer
segments characterised by heavy (fixed) Internet
usage in general. Finally, some niche deployments
of public Wi-Fi (e.g. by municipalities) are
targeted to Small and Medium-sized Enterprises
(SMEs) and Small Office Home Offices (SOHOs)
in rural or remote areas, disadvantaged segments
of the population and so on. The predominance
of the target groups mentioned above is reflected
in the locations where Wi-Fi hotspots are being
deployed and used. Public hotspots in the EU
are rolled out primarily in cities and towns
(i.e. in hotels, restaurants, cafes and at public
institutions) and at transport hubs (i.e. at petrol
stations, airports, railway stations).
An interesting new application of Wi-Fi,
sometimes in combination with (pre)WiMax, is
the offering of wireless connectivity on public
transport vehicles, usually on trains. This is currently
being planned or deployed in countries such as
Belgium, France, Germany, Italy, the Netherlands
and the UK. Another interesting application is
wireless VoIP (sometimes also labelled Voice over
Wireless or VOW). Some analysts are persistently
referring to VOW as the so-called killer application
for AWTs. However, most observers agree that a
number of technological issues of using VOIP in
the air interface,14 as well as issues relating to
the availability of terminals and expectations of
end users in terms of QoS and mobility, limit the
market prospects of VOW services in the short to
medium term.
Based on the findings and estimations
uncovered in this study, it is clear that in general,
usage of Wi-Fi hotspots throughout Europe is
still generally below commercially sustainable
thresholds (estimated as 5-10 uses per day). In
March 2004, on average there was a usage of
0.5 session / hotspot / day in Italy. In spite of
currently not being commercially sustainable, a
number of European countries, such as Sweden
and Greece, have witnessed the announcement
of further large hotspot roll-out plans. A number
of analysts have supported this by claiming that,
even in more advanced countries in terms of
Wi-Fi penetration such as the Netherlands and
Sweden, the number of hotspots is still well
below thresholds that are needed to reach a
commercially sustainable service.
3.2.2 MappingWLANAvailabilityinEurope
Number of Hotpots per Country
Table 3-2 presents aggregated data on the
number of hotspots in the EU25, as well as in
the four candidate countries.15
From Table 3-2, it is apparent that, even
though in absolute terms most hotspots are
deployed in Western Europe, with peaks in the
UK, France and Germany, each of these countries
counting around 10,000 hotspots, in relative
terms, the diffusion is (somewhat) more equally
spread (see also Map 3-1). In relative terms,
Estonia is clearly the most developed hotspot
market in Europe with almost 40 hotspots per
100,000 inhabitants. Denmark, the UK, France
and Ireland constitute a second group of countries
with the most developed and dynamic hotspot
markets in the EU, counting over 10 hotspots per
100,000 inhabitants. Malta, Germany, Austria,
Finland, Latvia, Luxemburg, the Netherlands
and Sweden can be said to be in a third group
of countries with (in relative terms) substantial
hotspot coverage, all scoring above the European
average of 6.6 hotspots per 100,000 inhabitants.
A fourth group, comprised of countries that have
a basic hotspot infrastructure, but are below
the European average, is made up of Portugal,
14 See e.g. Northstream (2005).15 The mapping of WLAN availability is based on hotspot search engines, provider websites and expert interviews. For maps
relating to geographical spread as well as to comparisons over time, data from a single directory were used. However, in order to generate maps providing a complete overview of the (absolute as well as relative) size of hotspot deployments, an extensive analysis and compilation were performed of a large number of alternative hotspot directories and ‘local’ hotspot directories, i.e. those operating with a more national or regional focus, as well as informed expert estimates, business and operator websites. For methodological details concerning the rest of the data presented in this chapter, please consult Annex 1.
��
3. A
WT
— A
vaila
bilit
y an
d U
sage
in t
he E
U
Belgium, Hungary, Italy, Slovenia, Spain and
Greece. Finally, a fifth group of countries consists
of Poland, Slovakia, Croatia, Cyprus, Lithuania,
Turkey, Bulgaria, Romania, where hotspot
deployment is marginal or insignificant.
Geographical Spread of Hotspots over Europe
In order to visualise the geographical
spread of Wi-Fi hotspots across the EU, a
number of maps showing the location of
Table 3‑2 Aggregated Hotspot Data
Note: “Hotspots”: Total number of hotspots. “Relative”: Number of hotspots per 100,000 inhabitants.Sources: See Annex 1
Country Austria Belgium Bulgaria Croatia Cyprus Czech Rep.Hotspots 702 553 2 42 5 250Relative 8.6 5.3 0.0 0.9 0.6 2.4Country Denmark Estonia Finland France Germany GreeceHotspots 894 516 400 8,000 7,838 188Relative 16.5 38.5 7.7 13.2 9.5 1.8Country Hungary Ireland Italy Latvia Lithuania Luxemb.Hotspots 529 430 2,600 165 22 36Relative 5.3 10.8 4.5 7.2 0.6 7.8Country Malta Netherl. Poland Portugal Romania SlovakiaHotspots 39 1,300 346 650 10 50Relative 9.8 8.0 0.9 6.2 0.0 0.9Country Slovenia Spain Sweden Turkey UK TotalHotspots 55 1,072 600 161 9,689 37,144Relative 2.7 2.7 6.7 0.2 16.1 6.6
Map 3‑1 Hotspots per 100,000 Inhabitants in EU25 plus 4 (June 2005)
Source: TNO
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
shotspots within the European countries were
generated, Map 3-2 showing the spread for
EU 25 plus 4. Observe that concentrations of
dots on these maps indicate relatively high
availability of hotspots in the same area, rather
than continuous coverage.
3.3 Other AWTs
The availability and usage of AWTs other
than Wi-Fi in Europe is far more incidental.
However, despite the limited and fragmented
nature of the diffusion of these AWTs, there is
a certain dynamism related to them in many
countries. The following table shows the number
of EU25 countries where these AWTs are being
used. The overview table demonstrates that,
while UWB and Flash OFDM are marginal or
non-existent on the EU market, (pre)WiMax,
Mesh/Ad-hoc technologies and UMTS-TDD are
available or being deployed in many, or even
most, of the EU member states.
Source: TNO, based e.g. on JiWire
Table 3‑3 Number of EU25 Countries with Selected AWT Activity
Note: Every country is only counted once for each technology, i.e. if a specific AWT is being used commercially in a specific country, other activities such as non-commercial use, deployment or market trials are not counted for this country.
Technology Commercial availability Non-commercial usage Deployment (Market) Trial Total
UWB 0 0 0 0 0
(pre)WiMax 12 0 2 5 19
Flash OFDM 0 0 0 1 1
Mesh / Ad-hoc 3 9 1 1 14
UMTS-TDD 4 0 3 1 8
Map 3‑2 Geographical Spread of Hotspots over EU 25 plus 4 (March 2005)
�0
3. A
WT
— A
vaila
bilit
y an
d U
sage
in t
he E
U The following sections will detail the ways in
which these technologies are used, as well as the
extent of their deployment.
3.3.1 UWB
There are several national as well as EU-
wide research projects and trials with UWB,
demonstrating some interest in the concept
of UWB from both a civilian and a military
viewpoint. However, current deployment of
UWB in Europe is non-existent, in terms of
market trials or actual deployments (according to
current public knowledge). Reasons for this are
not just regulatory bottlenecks – deployment of
the technology is currently prohibited by most EU
regulators – but also the standardisation problems
facing UWB (see Chapter 2) and the reticence of
operators towards potential interference caused by
UWB. The public announcement, in May 2005, of
the Bluetooth SIG that it plans to integrate UWB
into its standard, may facilitate the entry of UWB
on the EU market, but most observers agree that
this is not likely to materialise in the short term.
3.3.2 (Pre-)WiMax
As ‘mobile WiMax’ has not been standardised
and is currently not permitted in most European
countries, so-called ‘pre-WiMax’ deployments
that are using early WiMax technology to deliver
Fixed Wireless Access (FWA) have been taken
into account for this study. As argued by Goldman
Sachs (2004), the more attractive spectrum bands
for mobile or wireless broadband are those used
by UMTS (WCDMA) and planned for UMTS
expansion, making actual available licences
scarce. Generally in Europe, the licences awarded
for use with wireless broadband technologies
restrict the service to portable but non-mobile
applications, preventing carriers from enabling
cell handovers and thus preventing them from
competing head-on with UMTS.
Our research has uncovered the following
typical uses for (pre)WiMax throughout Europe:
• Fixed wireless broadband Internet access
in rural or remote areas for consumers and
small businesses (sometimes marketed as
‘portable DSL’). In some countries such as
Austria, WiMax operators are also starting to
offer voice telephony to their consumers.
• Alternative wireless broadband connectivity
for consumers and small businesses in city
and town centres. Usually in this case, basic
Internet connectivity is being offered in
very densely populated areas at competitive
prices.
• WiMax as a solution to fill holes in Wi-Fi
hotspot coverage and thereby create wireless
broadband access clouds or zones and the
use of WiMax to enable wireless connectivity
on trains or buses.
• Wireless broadband connectivity for large
businesses or organisations, replacing fixed
leased-line capacity and/or offering corporate
services such as managed bandwidth services
and VPN access. This is mostly in and around
cities and sometimes only within a limited
time frame.
As a rule, WiMax is offered as a subscription
service. Usually plain (broadband) Internet
connectivity is offered, but there are also attempts
to offer other services (e.g. VoIP for the consumer
market, managed services for the business market).
Speeds typically range between 512 kbps and 2
Mbps downstream and between 128 kbps and
512 kbps upstream for the consumer and small
business market, and upwards from 2 Mbps for
the business market. For WiMax on trains, pay-
per-use schemes have also been announced.
Currently WiMax constitutes a small-scale,
niche market. Little usage is being reported,
typically a few hundred customers. However, this
scale is expected to grow considerably as large trials
and deployments on a regional or even national
scale have been announced in several countries,
following the allocation of 3.5 GHz licences
throughout most of Europe. Map 3-3 shows that
most current WiMax trials and deployments are
�1
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
going on in Western Europe16. In Eastern Europe,
many new developments appear to centre around
the 450 MHz band, which is more favourable to
low capacity, wide area voice and data services
than to mobile or wireless broadband.17
3.3.3 Mesh/Ad-hocNetworks
We have adopted a broad definition of
Mesh/Ad-hoc networking in this report. Different
distinctions are commonly made between meshed
networks18, including pure client meshes (in which
every device in the network, including laptops,
PDAs and smart phones, can pass along traffic to
other devices, and thus constitutes a ‘multi-hop’
node in the network), and infrastructure meshes
Map 3‑3 WiMax Activities in Europe, June 2005
Source: TNO
16 So while most analysts (e.g. Northstream, 2005) mention Eastern Europe as the most promising market for WiMax because of its general lack of fixed broadband infrastructure in many rural and remote areas, this is not immediately observable in WiMax deployments today.
17 See e.g. Goldman Sachs (2004).18 See e.g. Vance (2004).
(in which access points and wireless routers carry
the traffic back to the wired node). The majority
of meshes in Europe today seem to consist of
infrastructure meshes.
Mesh and ad-hoc technologies in Europe are
being used by wireless communities of individuals
linking and opening up their infrastructure on a
voluntary basis. We have found few particular
services being deployed within these networks
(see Map 3-4), or even Internet connectivity;
rather, they are mostly providing each other with
basic high capacity links to one another. Another
use of mesh and ad-hoc technologies is to create
more coherent wireless zones or clouds, for either
commercial exploitation or non-commercial
usage. This is done by specialised WISPs and/or
�2
3. A
WT
— A
vaila
bilit
y an
d U
sage
in t
he E
U
by municipalities, regional governments and
universities. Commercial exploitation, if any, is
on a subscription basis, typically with flat fees
of 10-30 € per month depending on data rates
(typically 128 kbps to 1 Mbps).
3.3.4 FlashOFDM
Not just in the US, but also in Europe, Flash
OFDM has been touted by analysts as one of the
most promising AWTs, citing its combination of
high throughput, high mobility, and low latency
as its major advantage. However, the deployment
of Flash OFDM is currently not permitted by
many, if any, European regulators. While most
observers have characterised Flarion’s strategy
as attempting to support operators and agencies
in Europe advocating a technology-agnostic
view of licensing19, some analysts are observing
a different European strategy, involving Flash
OFDM trying to establish itself as part of the
3GPP family of standards. In any case, it is
expected that there will be an uncertain and
lengthy process involved.
Meanwhile, we have found one first Flash
OFDM market trial on the European market
already.20 In September 2004, a Flash OFDM trial
in the Dutch city of The Hague was started by T-
Mobile. In Finland, Saunalahti, one of 7 current
bidders for 450 MHz frequencies in that country,
has announced plans to deploy a Flash OFDM
network if it should acquire a licence. Its primary
target market would be up to 150,000 users in
remote rural areas.
Map 3‑4 Mesh / Ad‑hoc Network Activities in Europe, June 2005
Source: TNO
19 See e.g. Dineen (2004).20 Hence no map is shown in this report.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
3.3.5 UMTS-TDD
Since recently, the trialling, deployment and
usage of UMTS-TDD in Europe are clearly on the
rise. The fact that the technology is admissible by
EU regulators because of its adherence to the 3GPP
family of standards is widely being regarded as the
main advantage of this technology compared to
other AWTs. In addition, many traditional mobile
operators in most of the European countries
have acquired UMTS-TDD frequency space
and licences at the time of the UMTS licensing
processes throughout Europe in 2000 and 2001.
UMTS-TDD is also being deployed by new
operators in other frequency bands, e.g. the 3.5
GHz band.
In contrast to some of the deployments of
WiMax and Mesh/Ad-hoc networks, the current
deployment and usage of UMTS-TDD in Europe
are primarily in city centres and urban areas.
While a number of offerings are aiming at the
enterprise market (e.g. the Orange trials in Lille),
most are aimed at the consumer market or at a
mixture of both (e.g. Airdata’s UMTS-TDD offering
in Germany). Some of these companies, including
Airdata, are rolling out UMTS-TDD networks with
the intention of subsequently using independent
WISPs as resellers. The proposition to the ISPs/
retailers is in this case to exclude the incumbent
from the customer relationship, as no fixed-line
connection is required any more for broadband
access.
Many operators are holding licences as well
as having roll-out plans for much larger areas than
city centres, including operators in Lithuania,
Portugal, Sweden and the UK. While coverage of
current UMTS-TDD networks is in many countries
on the order of tens of thousands of potential
customers, actual subscriber figures are on the
order of several hundreds of customers.
The main service currently offered is flat-
fee ‘portable DSL’, priced at 15 €/month and up
depending on data rates (128 kbps up to 1 Mbps).
Map 3‑5 UMTS TDD Activities in Europe, June 2005
Source: TNO
��
3. A
WT
— A
vaila
bilit
y an
d U
sage
in t
he E
U In addition to portable high-speed wireless
broadband access, various operators plan to
offer a voice service over wireless broadband
that can replace subscribers’ landlines. Map
3-5 summarises current UMTS TDD activities in
Europe.
3.4 (Non-) Operator Centricity of AWTs in Europe
The likelihood of AWTs actually constituting
a considerable threat to (traditional) operators’
positions is very much dependent upon the types of actors driving the service offering, as well as on their strategies. This section briefly reviews the main types of actors and strategies vis-à-vis AWTs encountered in the European market today, in Table 3-4.
Clearly traditional operators have taken the lead in the deployment and exploitation of AWTs throughout most of Europe. Obviously, this strongly limits the scope for AWTs being used in a non- (traditional) operator-centric
manner.
Table 3‑4 Operator Centricity of AWT Initiatives in Europe
Centricity Strategy/rationale Summary observation (relating to map)
Non-operatorsindividual provision of hotspots, and the establishment of (free) wireless zones and clouds
Communitarian: communities of individualsLocation-based: municipalities and universities wishing to increase the attractiveness of their location or siteCommercial: indirect returns from increased sales of other products or services (hotels etc.)
- “Light” or “Light to Moderate” activity in most countries, consistent with most analysts’ observations
- Moderate or even strong involvement (e.g. in Estonia, Spain, Poland and UK) likely related to a mixture of active local, regional or national governmental support for AWTs, active wireless communities, and individual commercial AWT offerings in which no operators are involved
Non-traditional / new operatorse.g. new generations of WISPs
Niche players:- in segments of the business
market; or- rural and remote coverage
(Potential) mass markets operators:
- serving consumer and small business markets in urban areas (cream-skimming or competing head-on with existing networks).
- serving consumer and business markets in large areas with underdeveloped existing telecommunications infrastructure.
Strategy:- All strategies found, no strategy clearly dominating
new. Strategy followed by new entrants appears to depend primarily on the state of the market, regulatory incentives and the particular characteristics of specific AWTs.
Activity:- “Moderate” in most countries, reflecting some
dynamism in AWT markets today as to new market entry, but also the limited (and in some cases declining) impact. I.e. new AWTs often introduced by new entrants, but in Wi-Fi consolidation by traditional operators has followed.
- A few countries (e.g. Ireland, Germany, Denmark and the UK) have a more significant presence of new operators.
Traditional operator Pre-emption strategy: often by the acquisition of small new entrants, in order to discourage or preclude entry by other operators.Non-cannibalisation strategy: deployment in small niches where no overlap exists with traditional activitiesIntegration strategy with small scope for AWTs: integration of AWTs into the overall operator offering (for niche use).Integration strategy with large scope for AWTs: integration of AWTs into the overall operator offering, with AWTs constituting a considerable part of the value proposition.
Strategy:- Pre-emption and non-cannibalisation strategies visible
amongst traditional operators in many countries.- Wi-Fi and traditional telecommunications access are
being combined on a subscription level in at least 10 to 15 countries.
- Cellular (2G/2.5G/3G) and AWT combined on a technical level in around 5 EU countries.
- Thus a number of traditional operators that are moving beyond defensive strategies.
Activity:- “Strong” or “Moderate to Strong” in almost all
countries. Thus traditional operators have taken the lead in the deployment and exploitation of AWTs throughout most of Europe, which strongly limits the scope for AWTs being used in a non- (traditional) operator-centric manner.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s3.5 Conclusions and Future Directions for AWTs in Europe
As an input to the debate on future scenarios
for AWTs in Europe, this section presents some
data on recent and expected growth rates. WP
1 compared the figures for each country on the
growth of hotspots from August 2004 to March
2005, and showed that growth rates are very
uneven, but can be quite impressive. While there
has been hardly any growth in most of the lagging
countries, other countries exhibit moderate but
steady growth rates of e.g. 100 hotspots per year
as in Estonia, and still others such as Germany
appear to have experienced very high growth
rates. In any case, judging by this data, there is
no reason to assume stagnation or levelling off of
investments in AWTs in Europe. In terms of future
developments, WP 1 reviews of expert estimations
for AWT growth in the short to medium term
showed mixed results. For 4 countries, little growth
is expected; for 8 countries, little to moderate
growth; and for almost half of the EU25 countries
(e.g. Austria, Estonia, Finland, Hungary, Italy,
Sweden and the UK), moderate growth. Only for
one country, i.e. Ireland, have moderate to strong
growth rates been estimated.
It was also illustrated that a considerable
number of current AWT service offerings are
not directly in competition with mobile or fixed
broadband, due to a lack of mobility features and
to a lack of clear price or data rate advantages
vis-à-vis fixed broadband, respectively. It was
demonstrated that, while Eastern Europe is
often mentioned as the most promising AWT
market because of a lack of fixed broadband
infrastructures in many areas, this is not visible
in the number and extent of AWT deployments
today. Estonia aside, most AWT dynamics currently
appear to be taking place in Western Europe and
Scandinavia, with the four candidate countries
scoring amongst the least developed countries in
terms of AWTs. Finally, regulatory conditions in
Figure 3‑1 Growth Estimates of AWTs in EU25 Member States
Source: TNO
��
3. A
WT
— A
vaila
bilit
y an
d U
sage
in t
he E
U Europe are generally still anchored around 3G,
even though some regulators seem to adopt a two-
tier approach which at the same time stimulates
AWT development (e.g. in Ireland). The active
role of governments and regulators in Estonia
(with the most hotspots compared to its number of
inhabitants) and Ireland (where growth estimates
for AWTs are highest), as well as the potential
role of UMTS-TDD as an ‘acceptable’ AWT to EU
regulators, are worthwhile highlighting.
In conclusion, there is still no definitive
answer to the question: “How alternative are
alternative wireless technologies in Europe?”
This chapter has shown that, currently, traditional
telecommunications operators are leading AWT
developments, while some additional market
dynamism is being created by new operators and,
in a limited number of countries, by non-operator-
centric initiatives. Given the fact that “no operator
wants to choose a non-orthodox migration path”
(Goldman Sachs, 2004), this might lead to rather
bleak prospects for AWTs in Europe. However,
some very compelling reasons to do so make
it not impossible for traditional operators to
embrace AWTs. UMTS-TDD might be an obvious
candidate, but especially traditional operators
without UMTS-TDD licences, operators with a
stake in certain other AWTs, operators wishing to
connect and integrate their present Wi-Fi hotspots,
and operators aiming to develop in a so-called
greenfield situation, may be inclined to consider
other AWTs as well. Thus, the market potential
offered by AWTs is likely to be much more
disruptive than present developments suggest,
which in turn raises critical policy challenges and
opportunities, to be discussed in Chapter 6.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
This chapter explores drivers in particular
safety and security, as well as mobile virtual
communities as drivers of demand for emerging
alternative wireless technologies. By way of
introduction, a Section 4.1 presents a generic
overview of present and near-future drivers
and bottlenecks for AWTs in Europe that were
encountered during the research. Section 4.2
summarises observations regarding mobile virtual
communities (MVCs) as drivers of AWTs. Section
4.3 investigates enabling AWTs for safety and
security applications (including a case study),
while Section 4.4 closely inspects one specific
bottleneck for diffusion of AWTs, namely the
security threats they give rise to.
4.1 General Drivers and Bottlenecks
Table 4-1 summarises general drivers and
bottlenecks at the level of general developments
in markets, technologies and regulations – as
4. Drivers – MVCs, Security and Safety
highlighted by nearly 30 country and technology
experts who were interviewed for this study.
4.2 Mobile Virtual Communities
This section explores the (potential)
relationship between mobile virtual communities
(MVCs) and alternative wireless technologies
(AWTs), based on a quick scan of relevant
literature as well as empirical evidence.
The concept of virtual communities is an
increasingly popular one for addressing various
forms of interaction in the information society
technology domain. We approach communities
with a broad definition, exploring the emergence
of all different kinds of (social) networks in relation
to alternative wireless technologies. These could
be communities (both physical and virtual) but
also other networks and interactions between
individuals and groups of individuals. We use the
term ‘communities’ as an overarching concept
Table 4‑1 General AWT Drivers and Bottlenecks
Drivers Bottlenecks
- Poor fixed broadband infrastructure development in many small cities, towns, rural and remote areas across Europe.
- Government incentives, programmes and public-private partnerships to stimulate broadband connectivity.
- Competition in Wi-Fi markets, e.g. because of relatively low prices of Wi-Fi deployment, driving prices down and ensuring relatively high coverage in a number of countries.
- Success of private in-house WLANs, which might stimulate the usage of public WLANs.
- Emerging integration of AWT and mobile capabilities in dual mode handsets.
- Falling hardware prices and backhaul costs.- Limited number of licensed operators in some
markets, creating incentives for new stakeholders to enter national markets using AWTs.
- New applications and possibilities such as VoIP over wireless, deployment of AWTs on trains etc.
- Expected expansion of WiMax with mobility characteristics.
- Lack of interconnection and roaming agreements, especially between new AWT operators.
- Pricing models of public hotspot access in many EU countries still oriented towards occasional use, limiting scope of AWTs to business market.
- Licensing regimes in many EU countries imposing limitations on spectrum availability, deployment, handoff and integration of AWT cells, and generally allowing technical experiments with AWTs but no market experiments.
- Persistent standardisation problems.- Lack of user-friendliness in access, authentication and
billing procedures.- Lack of structural advantages (in terms of speed or
cost) over fixed broadband, and therefore a lack of incentives for AWTs in areas with well-developed fixed broadband infrastructure.
- Potential saturation and congestion of unlicensed spectrum in prime locations.
- Limited amount of terminals and other certified equipment in the market.
- Lack of customer education, i.e. in terms of differences between mobile and various AWTs.
- Lack of content applications.
��
4. D
rive
rs —
MV
CS,
Sec
urit
y an
d Sa
fety for a wide range of more or less structured social
contacts and networks.
The (potential) relationship between MVCs
and AWTs can be contextualised within the
general discourse on the relationships between
communities, social capital and ICTs, and
on the distinctions between communities of
birth, communities of interest, communities of
practice and networks of practice. There is also
an emerging body of literature dealing with the
relationships between mobile technologies,
virtual communities and social capital in general,
which points at strong to even extreme mutual
influences.
It should be stressed that several current and
emerging instances of MVCs are related to mobile
cellular technologies. The primary applications of
mobile technologies in the consumer market, i.e.
mobile voice telephony, short messaging service
(SMS) and multimedia messaging service (MMS)
are strongly community- and network-related. Also
ringtone downloading, the primary third-party
content application for mobile telecommunications
worldwide, exhibits a community aspect. In
addition, a number of more advanced mobile
virtual community uses of mobiles have been
reported. These include mobile blogging, mobile
location-based multiplayer games, and mobile
picture-sharing communities. Still, these are only
embryonic indications of potentially far-reaching
developments in this field.
There are a number of potential ways for AWTs
to influence (and be influenced by) MVCs, due
to the reciprocal nature of MVCs and AWSs and
the different nature of current AWT deployments
vis-à-vis mobile cellular deployments (in
particular the cost-efficiency and flat-fee pricing,
adding value for MVCs when AWTs are used).
Voice over Wireless IP has persistently been
referred to as the so-called killer application
for AWTs. However, there are still a number of
barriers limiting the market prospects (and thus
community impact) in the short to medium term.
The development of specific mobile multimedia
content made accessible through AWTs is still
in its infancy, and its impact on mobile virtual
communities can also be expected to be limited
in the short to medium term.
Instead, currently the main development
in this respect is the proliferation (be it
predominantly at a modest level, nota bene) of
wireless communities for the joint deployment and
operation of Wi-Fi hotspots and clouds. Due to the
cost characteristics of many AWTs (individual base
stations and access points are relatively cheap to
deploy), their technical characteristics (potential
to be used in ad-hoc and meshed topologies), and
main stakeholders (as they are driven primarily by
hardware industry rather than by any community
of established service providers), a new breed
of wireless communities has been developing
rapidly. These are often grassroots amateurs
that quickly found themselves and organised
as communities to enjoy the benefits of shared
resources, interests, and activities. A typical
characteristic of these wireless communities is that
they are using AWTs in a non-operator-centric way,
more precisely according to the communitarian
rationale/strategy (see Table 3-4). Looking outside
Europe, sources indicate that in the US, wireless
communities have been much more active than
in Europe or elsewhere in the world. But even in
the US, wireless community activities appear to
be completely, or at least predominantly, centred
on the provisioning of AWTs themselves.
Finally, we point at the geographical
limitations of current AWTs (offering nomadic
rather than mobile access, and constituting
wireless hotspots, clouds and zones in a limited,
local area), and at participatory limitations (related
to the high expertise and income levels of current
participants) as the main factors hindering the
development of wireless communities today.
4.3 AWTs Enabling Safety and Security Applications
AWTs networks are finding major and
increasing usage in security, health care and safety
of everyday life. The range of security and safety
applications for AWT networks is as diverse as
their technologies. Table 4-2 examine the potential
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sTable 4‑2 AWTs and Safety/Security Applications
AWT Applications in security and safetyNFC (Near Field Communication)
- Card readers, linking devices into cooperating networks including access control.- Medical applications in the NFM (near field magnetics) form, with ingested or sub-cutinaceous responder
capsules.UWB(Ultra-Wideband)
Useful for high-speed short-range communications up to 20m including:- High-resolution video with multiple channels.- Applications requiring propagation characteristics that can make walls and obstructions seem
transparent.- Electrically noisy environments.- Large warehouses, in a low data rate version.
ZigBee - Sensor networks for chemical, nuclear and hazardous zones, including noxious leak detection in public places.
- Wireless monitoring of shipping containers while in transit (US Coastguard) for chemical and radiation detection with automatic alert to shore.
- Hotel and public building systems for detection of radiation and chemicals in air conditioning.- Remote control of safety devices and complete factories and vehicle, including ships, for robot
operations.- Pipeline control and monitoring including leakages, explosive gas build-up etc.- Reporting on perishable goods including foodstuffs for temperature and state.
RFID - RFID can be used to track people as well as goods with smart tags. The US military’s Joint Total Asset Visibility (JTAV) network built over the last ten years is one of the larger RFID networks in the world – with active RFID tags and GPS locators to globally track military supplies21 .
- Typical LF security and safety applications include access control, personnel tracking, vehicle immobilisation, health care applications, authentication, and point-of-sale applications.
- Typical HF applications include patient monitoring, product authentication, and the tracking of airline baggage and smart cards and shelves for item-level tracking.
- UHF bands are highly suited to supply chain RFID applications due to the greater range for transmission of data, so UHF RFID is used with the Electronic Product Code (EPC) standard in logistics.
- Safety in food can be monitored with RFID tags that contain a threshold temperature sensor to detect whether a food item has become warmed up at some point and is no longer safe to eat.
- The high-range band is also widely used for toll collection systems on highways, manufacturing applications, and access control, especially for vehicles, to restricted areas.
- Embedded RFID can be viable for tracking bank notes and verifying passports. RFID tags may also embedded under the human skin as authentication, location and for transactions.
- RFID tags are used as environmental sensors, using an energising signal from a scanner for their transmissions.
BluetoothIEEE 802.15.1, versions 1 and 2
Criticised for weak security, Bluetooth in mobile and PC devices has a history of eavesdropping and giving out personal details without the owner’s control.Suitable for:- machine-to-machine communications in home networks and industrial networks over short distances,
where ad-hoc links need to be set up on moving into range.- Applications in medical and all emergency situations where a short-range protocol is required for point-
to-point emergency personal networks and power supply is not a problem.Wi-Fi(IEEE 802.11a,b,g, n)
Although security problems with penetration and lack of access control are rife, its ubiquity and falling price lend it to securitisation via better access control and encryption, which may hit throughput performance.It may be used as:- a short-range system for data transfer including compressed video over its 11 Mbps channel for
medical and surveillance applications.- a low-cost platform using the mesh network software which employs its protocols (see below) for an
emergency services network across a municipality.Enhancements of UMTS’
Applications may exist in both interactive and alert broadcast networks. The need for mobility for emergency services may be a limit on enhanced data rates.
Flash OFDM (802.20 candidate)
Applications are in:- communications for the US national police services, municipal police and emergency services
command, control and surveillance systems in conventional cell structure, with handover, for a broadband solution (up to 1.5 Mbps).
- social work and medical communications systems for sending visual information to experts, and also access to 3D CAD for buildings for fire-fighters.
Proprietary Mesh networksLocustworld, Tropos, Firetide, Strix
- Mesh networks are useful for safety and security applications due to their resilience in a disaster or attack situation where new deployment and resistance through redundancy are required. They are also being installed as:
- low-cost municipal networks, as the density of base stations is far lower than cellular Land Mobile Radio (LMR) for emergency services. In the USA, municipal mesh networks have been installed for the police, ambulance and fire emergency services.
- They have also been used in robot management networks – a Tropos mesh network is used for space robots by NASA in its test labs.
WiMax (802.16x)Fixed, nomadic (portable) and mobile access
- Useful in the fixed wireless mode for surveillance and for broadcast of alerts.- In the mobile roaming form, can be used for broadband video for emergency services support.- May form the basis of low-cost communications, command and control systems for city-wide
emergency services.
21 Digital ID World (2003)
�0
4. D
rive
rs —
MV
CS,
Sec
urit
y an
d Sa
fety applications of AWTs in more detail. Clearly we
are currently still at the dawn of finding usages for
AWTs in the fields of security and safety. In sum,
the pervasiveness and ubiquity of AWTs lead to
new levels of sophistication in support (e.g. for
the elderly and frail) and for security (e.g. in giving
constant surveillance for hazards) and in medical
applications, where the field is being revised by
sensor networks and the co-ordination afforded by
broadband wireless networks for telemedicine.
The functional usages of AWT networks
in applications within the three classifications
of security, safety and care are reviewed. For
security purposes, AWTs lend themselves to
providing police fire and ambulance services, as
well as security services with extremely robust
C4 (command/control/communication/coordina-
tion) systems not least for alerts and disaster
situations.
Safety of life and property using AWT
capability covers many areas, but two appear
particularly significant: (1) the use of wireless
sensor networks for detecting unsafe situations,
be they in a specific environment, a city, a
chemical plant, or tracking potentially hazardous
moving items such as containers; (2) mobile
applications for vehicle and traffic management
hazards–termed telematics. As the hazards of
a large-scale disaster or attacks become ever
greater, we may need a way of alerting citizens
everywhere. AWT networks could form the basis
of a ‘second network’ to provide the citizen with
a dedicated alert channel, due to their ubiquity,
robustness and low cost relative to other radio
technologies such as mobile cellular (see the
case study in Box 4-1). In addition, mesh forms
of AWTs have inherent resistance to attack due
to their non-centralised locus of control, and
thus are attractive for this application.
Despite the widespread use of AWTs in
emergency and security applications, perhaps
it is in the development of ubiquitous networks
for health care, including mental health, that
the greatest advances are to be seen. In health
care AWTs can be used in several applications,
including (1) telemedicine, where the ubiquity of
AWTs enables expertise and scientific monitoring
of care in the hospital to be transferred to care in
the home for aged and infirm people; (2) numerous
uses in hospital networks; (3) personal and
wearable health networks (Healthwear) attached
to the body of the patient will extend care into the
home from hospital, an area where little success
has been found so far with effective telemedicine.
These may be used for early detection of failing
mental as well as physical conditions, by going
into social interaction as much as monitoring body
parameters directly. Finally, AWTs may be used in
(4) ambulance control and on-site support, where
for instance images can be transferred from first
responders to a moving ambulance to prepare its
medicos for the injuries and the general scene.
4.4 AWTs as a Security Threat
This section pursues an analysis of security
threats to mobile virtual communities through
AWTs, including threats to the person, personal
details and data for emergency and community
services and services such as m-commerce,
including content distribution. We can begin this
threat analysis by examining the various elements
of AWT wireless networks and their associated
security threats, in a form of standard breakdown
as illustrated below.
Taking instead the user’s view, we can
already see that there are fears about wireless
security, especially privacy, and that some AWTs
are already the subject of protest (especially those
associated with personal areas such as Bluetooth
and RFID). In the more advanced mobile markets,
the growing security threat in mobile cellular
already has a demand-side dimension that must
be assessed as part of this driver.
The national-level impacts possibly could be
even greater than the current nuisances of Internet
threats, if links into other telecommunications
networks are used to bring down the emergency
services, for instance in a Denial of Service (DoS)
attack. Liability would be attributed to security
weaknesses in the AWT network. So a key part
of the AWT applications can be expected to be
�1
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sBox 4‑1 Case Study – WARN (Wireless Accelerated Responder Network)
Since the disastrous events of 2001, government agencies in the USA have been examining the exchange of narrowband systems for mobile broadband service. The goal is to increase the speed and efficiency of emergency response, and equip public safety with more tools to detect, prevent and respond to events, and to improve effectiveness of public safety services and personnel (especially in mobile and remote environments). The Office of the Chief Technology Officer (OCTO) in Washington DC is an example of one such agency. The Wireless Accelerated Responder Network (WARN) project grew from the US capital’s need for mobile communication for public safety and security as part of the US Homeland Security and Public Safety requirement. It was considered that a new approach was now needed to enhance detection, prevention, and for response and recovery efforts. To avoid delay, the city of Washington decided to support the entire pilot internally. In February 2004, the district administration awarded a $3 million contract for a pilot network to Motorola, as prime contractor, with its subcontractor for the key technology being Flarion Technologies. Deployment began in 2004 for a pilot test implementation, which went operational in September 2004, with an experimental temporary licence from the FCC.
The objectives of the pilot project were to demonstrate the applications and benefits of broadband wireless networks and satisfy short-term critical needs for communications not met by current systems. The network system had to provide: (1) a broadband user experience – thus it must support full motion video back from the incident scene (which indicates at least 1.5 Mbps with a 300 kbps uplink), (2) interoperation with legacy-wired networks for end-to-end transport of IP and packet-switched information, (3) end-to-end security, from wired host to wireless client, (4) cost-effective solution, (5) priority access (QoS), (6) the capability of scalability, (7) support for full vehicular mobility across a wide service area, (8) Always-on access, (9) an architecture and interfaces system such that changes to existing applications or devices are not required. The solution chosen was Flash OFDM for the broadband wireless service. Broadband wireless solutions are bandwidth-intensive, and the solution chosen for Washington DC is 100 MHz bandwidth set at the 700 MHz frequency to give good range and lower the number of base stations required for the urban cityscape.
The main challenges overcome were: (1) construction of equivalent to PMR at lower costs; (2) obtaining buy-in of user groups and success in replacing their own networks, as they have the confidence to substitute a single new AWT solution for their existing separate networks; and (3) integrating the requirements from a diverse set of users on a single network solution.
As a result, today Washington DC has the first city-wide high-speed, wireless, broadband data network capable of handling real-time voice, data and video for public safety. WARN’s network originally employed a 10-cell site network to cover the city limits at the 700 MHz frequency. Due to needs of a new basketball stadium and other local requirements, the system was easily expanded and now has 12 base-station sites. The success of the OCTO WARN network pilot has largely come from five factors: (1) capacity to carry all network traffic without saturation; (2) costs which are a fraction of the conventional contender technology, (3) flexibility to meet diverse needs among several communities of users, with a broadband capability for video voice and high speed data, (4) security and reliability of connection in service, (5) return on investment – measured not just in pure in response capability for emergencies, but in factors such as reducing police paperwork and the ability to support the community socially by, for instance, reducing the incidence of crime.
The key lesson from the case study is that this AWT technology, Flash OFDM pre-standard IEEE 802.20, provides a viable and reliable basis to deliver broadband services citywide, at lower cost than 3G mobile or conventional (2G voice) LMR. It offers reliable roaming and cell handover for high-mobility vehicles such as helicopters, to match security requirements. Also the cost of maintenance for such a multi-purpose capability is far lower. One network is shared among several user organisations, rather than each having to set up and run a separate network. Such a situation would miss the effects of scale as each network has smaller capacities and user population, with different standards and networks. This inefficiency leads to higher Capex and Opex per user.
Main sources: OCTO (user) and Flarion USA (network supplier)
�2
4. D
rive
rs —
MV
CS,
Sec
urit
y an
d Sa
fety
a security platform to protect all components
(servers, networks and handsets), to ensure
coherent security with constant monitoring and
management of attacks.
However, the security field in AWTs is very
young. By the random nature of their development,
with the technology often appearing from start-ups,
we can see that security is still a ‘work in progress’.
A key difference in security architectures for AWT
networks, compared to previous radio networks
of cellular form, is that they may be non-operator-
centric – and more specifically, there may be no
centralised management. Networks may be ad-
hoc with mesh styles of operation in which new
users may join the network and even carry traffic
for others in certain technologies of mesh network.
Thus there are major authentication issues to
be resolved here, specifically of creating secure
transient security relationships22 perhaps through
multi-level integrity systems23. Moreover, Mobile
IPv6, which may be used in mesh networks,
enables mobile nodes to migrate from one access
point to another, raising a new set of security issues
in establishing authenticity and also protection of
communications as a relay for others, if the handset
is used as a node. The problem of knowing who
is the valid subscriber is multiplied for roaming
users from other networks.
Figure 4‑1 Security Challenges of Wideband Multimedia Elements
Source: SCF Associates
22 Stajano and Anderson (2000). ‘Secure transient security relationships’ in the sense that a user may appear for a short commercial transaction, and then disappear, and may also be a user who has not been seen before – yet the whole transaction must be authorised, the communicating parties must be authenticated, and the information passed must remain intact and not intercepted. The relationship between buyer and seller, for instance, lasts only as long as the transaction, yet all must be secure.
23 ‘Multi-level integrity systems’ refers to the notion of security across the various layers of the network and into the application. For ad-hoc radio systems, security at the air interface level could be a physical level of data encryption with authentication of the user-handheld device and base station; whereas at the level of e-mail, integrity of the communication service could require verification of naming and addressing for source and destination as part of the integrity measures, as well as policing payload data corruption.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sIn the future, AWTs will offer more than a
major new communications channel, but just
as 3G and 2.5G mobile cellular do, they will
bring much richer services. However, the new
services also bring a range of responsibilities and
vulnerabilities never seen before – the multimedia
handset equals the PC in intelligence and
programmability with Java-based applications,
the network becomes an IP packet-based transport
mechanism with intelligent gateways and service
agents at its edges, while the IT content server
side expands in complexity and size.
Thus looking forward over the next decade,
the threats expand from those associated with
simple communications to those associated with
applications for advanced emergency services
support as well as commercial services in m-
commerce and the like, based on some form of
Internet, intranet or extranet access over a wireless
local loop. The dimensions and range of threat that
come with these new capabilities have not been
seen before in conventional computer networks
or the Internet, and certainly not in earlier mobile
cellular such as 2G mobile. Risks to everyday
community operations and business are spread
across all system elements: the networks (fixed
radio and mobile radio access as well as wireline
backhaul); the servers and databases connected,
including digital asset repositories as well as
citizen and customer data, and on the server side,
the applications and portals.
Types of risk include all the infamous
attacks seen in the Internet world, with added
vulnerabilities of an air interface. Moreover,
access is provided for malicious software to
telephony networks which may be important for
security of life, through the mobile telephony
APIs. Thus there are strong AWT market issues of
security, many of which have already appeared
first with Wi-Fi, largely to do with confidentiality
and privacy. Here we would highlight a high-risk
threat to AWT market take-off. If such menaces get
out of control, the whole wireless market could
be undermined in the subsequent fall-out. Citizen
and consumer trust would be destroyed. There is
a risk that the whole use of the AWT networks
could be set back for some years, just as the
Internet e-commerce world has been retarded by
similar incidents. The AWT consumer market will
be extremely vulnerable to fraud and malicious
software security lapses. Given a major scandal
with viruses, fraud, identity theft, affecting the
public emergency services by blocking, spam or
location-based privacy attacks, the whole AWT
consumer market could fold. It could leave 2G’s
plain vanilla circuit-switched voice as the only
service consumers would trust.
Protection of AWT systems end-to-end is a
major challenge. Although we do not investigate
solutions in detail here, we may suggest certain
guiding principles, especially that security cannot
just be bolted on. To be effective across the
multimedia wireless environment, security needs
to be addressed as a key component of the overall
infrastructure, designed in from the start – and not
attached at the end.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
This chapter summarises for policy-makers
certain key lessons that we may draw from the AWT
experience of the Republic of Korea (henceforth
Korea or South Korea). Section 5.1 overviews
some general features of the Korean ICT and, in
more depth, AWT market. Section 5.2 analyses
the main drivers of success, and hence lessons
to be learned for policy-makers elsewhere. The
chapter ends with a view of the future by probing
into the most recent R&D and policy agenda and
how the Korean direction fits into a broader Asian
context (Section 5.3).
5.1 Korean ICT and AWT Market
Korea has made major strides in information
and communication technologies over the past
three decades. From being a country with almost
no ICT access 30-40 years ago, Korea has become
one of the top three globally in access to ICT-
based services24. A basic ingredient of Korean
life is now the availability of communication,
information and entertainment from anywhere,
at anytime and from any form of terminal, most
usually a mobile handset. Today 16% of Korea’s
GDP and 30% of exports come from the ICT
sector25. Korea is best known for its remarkable
uptake in broadband Internet access, with
broadband penetration rates accounting for
almost 25% of Internet access.26 Broadband
connections are highly used – for instance, to
listen to CD-quality audio over the web.
In competition or perhaps in a complementary
role with AWTs are mobile cellular services with
well-developed data services. Korea was one of the
first countries worldwide to launch commercial
3G mobile services, so mobile cellular operators
offer not just voice but data transmission over
CDMA2000 1X EVDO networks at speeds up
to 2.4 Mbps, for a wide range of application
services.
Globally, the most advanced AWT market
is probably Korea. Over 18,000 Wi-Fi hotspots,
over 35% of the world total, were commercially
available nationally by 2004. Industrial AWT
networks such as ZigBee for RFID and industrial
sensors are also being piloted in Korea, while
most terminal and handset devices designed and
manufactured in Korea have short-range AWTs
embedded, such as Bluetooth and RFID. For
instance, SK Telecom’s Moneta service has more
than 470,000 point-of-sale terminals that accept
payments via RFID chips embedded in mobile
handsets.
For summarising purposes, all the main
AWTs that are either under consideration for
import and/or being produced locally, and their
current status, are given in Table 5-1. Besides these
developments, the striving towards a converged
broadband network environment, termed the
BCN or Broadband Converged Network, is worth
mentioning.
Korea’s ICT industry segment for AWTs grows
out of its telecommunications and consumer
device industries. The Korean industry structure
resembles that of Japan with a few large players
and many much smaller players, not all selling
under their own brand – such as SK Telech, a tied
supplier to SK Telecom. The major players are
Samsung and LG Electronics, both with advanced
AWT capabilities. Another advanced smaller
AWT player is Pantech & Curitel (investigated
24 Top three in the sense of Internet access (via mobile as well as fixed line) and voice telephony – the other two are the USA and Japan, and, depending on how it is measured, Korea is third. In terms of broadband access lines of all kinds per head of population, Korea may well come higher.
25 Fifield (2004).26 Ibid.
5. AWTS in Korea – A Case Study
��
5. A
WTS
in K
orea
— A
Cas
e St
udy
further in Appendix 2). There are also a few large
Korean integrated circuit fabricators, often using
designs from chip designers in other countries
under licence; but some of the large players such
as Hynix concentrate on silicon chip markets that
are only peripheral to AWT manufacture.
Korea is now bringing together “mobile” and
“broadband” with development of the “Portable
Internet” using a home-grown AWT, WiBro, as
its carrier infrastructure. Mobile subscribers with
a multi-mode handset can browse the Internet at
broadband data rates, download and stream audio
and video, and hold interactive video dialogues.
5.2 Drivers for AWT Take-up
This section identifies the main drivers for
AWT take-up in Korea and the key policy lessons
to be learned from the achievements so far. First,
the Korean ICT success cannot be understood
without understanding its historical terms and the
social environment it has created.
Korean society over the past 100 years has
experienced occupation, repression and war
during the first half of the period. But over the last
50 years, the Republic of Korea has discovered a
proven and successful growth model, resembling
and following that of Japan – rebuilding a
destroyed economy and moving from heavy
engineering, with shipbuilding exports, into
lighter manufacturing, progressively entering into
cars, domestic appliances, heavy construction
equipment, electronic goods, semiconductors
and ICTs such as mobile phones. After the
Korean War, the government favoured the model
of conglomerates controlled by one family,
Table 5‑1 Key AWT and Suppliers Status in Korea
Technology Status in Korea Suppliers
Wi-Fi (IEEE 802.11x) In production Samsung, LGE
WiMax (IEEE 802.16x) Under consideration as export tech-nology
LGE in alliance with Intel for consumer devices, de-veloping software and protocols, for Intel chips
Proprietary derivatives of IEEE 802.16 WiMax, specifi-cally WiBro
DevelopmentStrong drive under government sup-port aimed for 2006 mass rollout
Systems – SamsungHandsets – LGE, Samsung, Pantech & CuritelIntegrated circuits – Samsung Electronics
IEEE 802.20, or Flash OFDM Under consideration for import by operators (SK)
None – licences to manufacture considered
UWB (ultra-wideband) Under consideration – for far faster linking of video from cellphones and camcorders to other processors. In-dustry body (UWB Forum of Korea, set up. Currently, Samsung Elec-tronics is at the forefront worldwide in developing UWB technologies. Spectrum not decided in Korea.
Samsung Electronics and LGE in development for cellphones and other digital appliances. Samsung showcased a UWB hybrid wireless home network on 17 Jan 2005 at the US Consumer Electronics Show. Samsung has also demonstrated a giant high-defini-tion TV screen, with programs beamed from a media server. It expects to sell a top-end screen-server set, which looks like paintings on the wall, after the Ko-rean government allocates the spectrum for UWB.
ZigBee IEEE 802.15.4 and RFID – tags, chips and readers
In major developmentStrong drive from government sup-port based on ZigBee IEEE 802.15.4 for machine to machine communica-tions over unlicensed spectrum ISM bands at 868/915 MHz or 2.4 GHz, especially for sensor networks –be-ing taken seriously in Korea as need to catch up.
Systems and networks – LGE and Samsung Elec-tronicsHandsets – Pantech & Curitel, development by LGE and SamsungIntegrated circuits – Samsung Electronics
3G data enhancements – CDMA2000 enhance-ments including EVDO, and UMTS enhancements with HSPDA
In productionWorld leaders in CDMA 2000 EVDO technology in handsets
Systems: CDMA EVDO and W-CDMA (UMTS) HSP-DA – Samsung and LGEHandsets, EVDO and HSPDA – Pantech & Curitel, LGE and SamsungIntegrated circuits – Samsung Electronics
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sknown in Korea as the ‘Chaebol’27. Together with
government support for industry and the chaebol,
through cheap state credit, Korea gained a global
competitive edge. Government investment in the
education system produced Korea’s high-quality
workforce, skilled and well-educated but cheaper
than Japan’s for the chaebol. In the late 1990s the
Korean economy was challenged by the Asian
financial crisis and by low-cost competition from
China. The downturn effectively restructured
the Korean industry through the chaebol, away
from wide diversification, and also changed
the industrial direction nationally as Korea set
out to become a high-technology nation. The
profile of companies such as Lucky Goldstar and
Samsung changed, from being low-cost followers
in consumer goods, to being leaders both in
technology and most significantly in consumer
design, at a world level.
The intensity and psychological pressure of
the work ethic of Korea probably exceeds that
of Japan or China. Koreans work hard and have
sacrificed themselves to develop into a high-
income economy in a mere 50 years. With one
of the longest set working weeks (5.5 days) in the
industrialised world, Koreans seem destined not to
relax until they become the leading knowledge-
based IT economy. The cultural manifestation of
this pressure is referred to as the national cult of
“hurry hurry” or “Bballi Bballi” mentality that
permeates through all aspects of Korean life,
especially development of technologies such
as innovative telecommunications. Moreover,
Koreans possess a high regard for educational
achievement and see it as the goal of every
person, where education and the national goals
are inclusive. The cultural ideal of government,
government programs and society is the advance
of the whole nation, less of individuals. In
consequence IT programs, such as those for
broadband rollout, are aimed at the all the
nation – the remote villages as much as the main
population centres.
Now, with these background factors in mind,
government intervention and orchestration of
the private sector is a (perhaps the) key factor.
Government encouragement of broadband, since
the early 1990s through independent operators
and the national incumbent, has set the pace
for national renewal of the telecommunications
infrastructure. Access for broadband was initially
via a fixed infrastructure, with fibre optics, but
more recently has turned to wireless. Thus wireless
should be seen as one technology in the context
of a broadband policy which also employs fibre
installation, and DSL cabling of all types to the
home and office.
Over two decades, the Korean government
has orchestrated support for ICTs with a series
of programmes, as illustrated in the figure below
– a chain of interconnected Korean government
ICT programmes over twenty years. Note that the
strategy possesses defined economic aims. They
are tied to clear policy targets in terms of ‘Dollars
and cents’ - quite different to European or US
goals in long-term ICT programs. This point of
policy is worth noting.
The Korean regulatory regime has cleverly
used its revenues from spectrum licences and
taxes on operators as a strategic re-investment
fund for telecommunications infrastructure and
research. According to the ITU, such investments
have produced phenomenal results in Korea, for
instance establishing its position as the world’s
broadband leader. It is an example of how prudent
27 The Chaebol are large industrial conglomerate groups, based around one family, whose member companies are cemented together by complex cross-shareholdings. Their ownership structure allows the family to control through minimal shareholdings – for instance the head of Samsung, Lee Kun-hee, owns just 1.9% of stock of Samsung Electronics yet retains his management position. Their history is of being the motor for Korea’s push to developed industrial economy status, but through rapid expansion – sometimes too rapid: Daewoo’s implosion in the 1998 Asian crisis revealed debts of 14% of Korean GDP. The four largest chaebol control over 40% of the Korean GDP – they are Samsung with 62 companies, then Hyundai, Lucky Goldstar and SK – representing a total of some BUSD 287 in revenues. Although they are a Korean phenomenon, the chaebol are quite similar to Japanese conglomerate groups – especially the pre-war Zaibatsu rather than the contemporary Keiretsu. Their future is now subject to a power struggle between the government and the ruling families (Ihlwhan 2003, Jung-a 2005).
��
5. A
WTS
in K
orea
— A
Cas
e St
udy
use of spectrum fees and the right regulation in
terms of operator taxes on revenues can help
boost the overall economy, through connectivity
across society, to the benefit of the nation and of
the industry, rather than just taxing it.
A further factor is the Korean regulatory
system’s creation of a fairly level playing field
in telecommunications competition, with
an excellent example of how to ensure free
competition without dominance by the incumbent
operator. Its broadband position, which leads
the world, is driven by competition between
broadband providers. The mobile market also
exhibits vibrant market competition, with three
highly developed networks (SK Telecom, KT and
LG Telecom) while Hanaro also offers competition
from its AWT position in broadband wireless.
It is also useful for policy-makers to
understand that Korean government policy has
led to an increasingly converged broadband
network environment termed the BCN,
Broadband Converged Network. Such a
broadband converged network may be seen as a
model for similar networks around the world in
architecture and policy to bring it into being. The
policies that Korea is currently developing focus
on specific strategic industry moves and key
technologies, i.e. a policy of ‘picking winners’.
These include the creation of mandated mobile
exchanges, to integrate mobile operators’ access
to Internet services on behalf of the users, as
well as implementation of protocols like IPv6
and naming and addressing ENUM (for mapping
a PSTN telephone number into a typical
Internet Uniform Resource Locator (URL), that
is, an e-number). Note that this is necessary as
Korea’s mobile and broadband networks, while
advanced, have evolved separately; they differ
in their composition, network architecture, and
business models. Here, the key point is that the
government has pushed integration where single
operators or equipment suppliers would have
floundered in their different corporate strategies,
especially as there is no blueprint or precise
picture of the future network, only a dynamic
model to capture merging of two architectures
and communication sectors – Internet and
telecoms.
Korea’s initial experiences with these policies
show how operators of the future will need to be
regulated and the key issues. The major point may
be measures concerning restrictions on ownership
for different types of networks, allowing and even
forcing sharing of infrastructures according to
dynamic financial models, as contemplated in
the licences for the yet to be rolled out WiBro
Figure 5‑1 Korean government ICT programmes
Source: Reynolds et al. (2005)
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
snetworks – a key point for regulators and policy-
makers everywhere.
As can be seen from the above, the reasons
for Korea’s success draw heavily on its socio-
economic history in the shaping of a suitable
economic environment and the move to balanced
political structure, with the formation of industrial
groups with freedom to innovate but with a
lack of investment in ‘legacy’ infrastructure and
technologies. A key factor has been the lack of
dominance by the incumbent telecommunications
operator, only privatised in 2002 with no mobile
licence, forcing it into AWTs to reply to mobile.
There are also factors to consider on the
demand side, that of the customer. Trust in the
use of technology and the expected absence
of misuse by criminal elements, or by carriers
or content providers, means that confidence
and acceptance of widespread usage and even
intrusion into everyday life is far higher than in
other cultures, where early lessons have been
that some technologies (such as the Internet)
cannot be trusted and then technology take-up
suffers. This is the related Korean social context,
which is perhaps more effective at protection
and creating a law-abiding population than
Western cultures. The lesson to be learnt is that
early security measures are paramount for all
high-technology services, and specifically for
mobile services. A further demand-side factor in
ICT growth is disposable income. Korea’s GDP
per head is one of the highest in the Asian NICs
and this high income is distributed across much
of the population, so that the funds are available
to ordinary people to buy advanced ICT devices
and services, driving rapid R&D cycles in a
comparable manner.
A point also notable for policy setters is that
Korea often takes a contrarian view on standards
in order to be first in new technology. Thus the
technology and effort behind that of WiBro has
drawn some criticism both within Korea and
outside it, in that to some extent it pre-empts the
global coming standard in this area of broadband
wireless, WiMax, also based on IEEE 802.16.
WiBro might even dissuade outsiders from
investing in WiMax within Korea. However, the
CDMA mobile 2G and 3G choice has shown that
Korea’s policy setters want a test bed at a national
level to stimulate the economy by proving
technology and, most importantly, educating
both the work force and society in general,
in order to advance the knowledge base of the
economy. The experience gained places Korean
suppliers and operators two to three years ahead
of the rest of the world in such products and the
science behind them in terms of IPR and practical
rollout.
Korea has also used its respect for education
to escape the Asian financial crisis of 1997/8.
The crisis became a turning point for society in
Korea, transforming it for the first time into an
‘Information Society’ in some meaningful way. We
draw the lesson that only a discontinuity in the
economy can precipitate a fundamental change
of direction in society, culture and outlook – in
this case towards the ‘Information Society’. Adult
ICT education on a mass scale catalysed Korea’s
growth. Ultimately, over 10 million people
received IT training. Effectively moving the whole
population to a new level of IT sophistication
strongly increased the numbers of Koreans who
participate in the information economy, as after
training they had the knowledge and interest
to make use of it. The question remains – is it
only Korea, with its early culture of a planned
command economy and social experience of
striving for growth, where such a change can be
successful?
5.3 Main Future Research Areas and the Asian Context
AWTs are an important component of Korea’s
critical path for achieving a ubiquitous network
society (“U-Korea”), and for sustaining industrial
competitiveness – the “IT 839 Strategy”. Korea
sees its goals for the strategy in purely economic
terms, aiming for US$20,000 GDP per capita. The
IT 839 project is part of the government’s efforts
to consolidate the domestic IT industry’s world
leadership. The name “839” stems from the three
�0
5. A
WTS
in K
orea
— A
Cas
e St
udy
types of targets in terms of services, infrastructure
networks and technologies to be seeded. The
programme has long-term goals using measurable
deliverables on a route map of actions for mid-
to-long term milestones. Overall, its strategy is to
improve Korea’s international competitiveness,
using specific targets such as a minimum 5
per cent global market share in RFID chips by
2007, or second largest globally in embedded
software by 2010. All is carefully integrated – the
technologies and sectors chosen support the aims
for a ubiquitous network society, specifically the
three infrastructures chosen. As with all other
programmes, it is promoted through a partnership
between government and the private sector. This is
Figure 5‑2 Korea’s Latest Medium Strategy Plan for IT – 839
Source: Reynolds et al. (2005)
a policy of ‘picking winners’ through technology
assessment – though discredited elsewhere, it is
alive and well in Korea.
The development of AWTs in Korea is to
some extent linked to regional development,
often in pre-competitive projects on fundamental
standards and technology. The key directions
for research and commercial cooperation are
towards China, and also Japan, the ‘North-Eastern
Asia Trio’. This cooperation comes in various
forms, e.g. joint technology and standardisation
push in 4G, but also private-sector JVs such the
SK Telekom and China Unicom UNISK mobile
Internet service.
�1
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
The objective of this chapter, which is
based on WP 3, is to analyse the implications,
potential benefits and challenges of the different
AWTs for the EU over the next 10 years, in terms
of the policies required for their evolution and
competition, and to provide researched and
actionable policy recommendations.
The chapter is structured as follows. First in
Section 6.1 we examine the significant economic
potential, driven by AWTs, and thus the need for
a suitable policy and its underpinning in current
EU policy directions. Also we examine the tools
that could make up a policy appropriate to the
organic nature of the European Community of
Member States. We also examine AWTs by means
of a summary SWOT analysis. From this we assess
the implications for policy and regulation, as well
as the issues raised by policy/regulation, from
the point of view of the EU citizen. Section 6.2
goes into more detail on the questions of policy
and regulation, examined under eleven main
headings. Finally, in Section 6.3 some suggestions
for further studies are given.
6.1 The New Radio Evolution
6.1.1 TheMapforEUPolicyonAWTs
The rapid growth of AWTs means that focus
on a single wireless technology, which is just
on cellular mobile, at a policy, research and
industrial level, is not only inappropriate but is
also likely to result in Europe being left behind
by Asia and North America in these key enabling
technologies. Assuming a linear development
of successive generations of the one dominant
technology can no longer be a valid approach.
Rather, it is likely that a number of technologies
will co-evolve, and that many new operator
models will develop as well. As WP 1 has shown,
at present the operator-centric model dominates
the AWTs, but opportunities for future non-
operator-centric business models are likely to
grow, as competition will intensify. As the AWT
contenders enter the market, they broaden the
horizons of applications enormously as well as
multiplying the networks and access available
to the citizens, so that applications impossible
with cellular technology can be made available
ubiquitously.
Failure to firmly grasp the potential of
AWTs will leave Europe far behind in mobile
technologies, behind Asia and – unthinkable
two years ago – behind even the USA. In the
latter region, Wi-Fi and WiMax are drawing new
strengths in municipal networks and emergency
services networks, as well as being exploited in
research as the platforms for health and elderly
care. In the former region, government-led
promotions of AWTs are reformulating national
infrastructures and the market players.28
Instead, for Europe to remain competitive, a
systematic approach is needed, one which will be
appropriate to embracing all radio technologies
and considering how they fit together. Thus the
policy would not be implicitly oriented just
toward mobile cellular, with a few limited and
random efforts in areas such as RFID where
strong lobbying by industry groups makes them
known. We would have an explicit commitment
to examine all AWTs – because an AWT take-off
in Europe at an industrial level, to go beyond the
import of systems and equipment from overseas
for local service operations, will require a policy
of encouragement of innovative development
through the support of a multitude of technologies
and complementary solutions.
28 See Chapter 5 and Annex 2 on Korean AWT Status Report.
6. Policy Analysis and Recommendations
�2
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s 6.1.2 CurrentPolicyandRegulationConcerning
AWTs
It is of course first necessary to assess the
current situation on policy in the EU that will
affect AWTs, including regulation. Broadly
speaking, AWTs are still too new for the EC to
have developed a coherent or complete policy.
Nevertheless, policy is urgently needed, so we
review here what is pertinent in current EU policy
in the relevant areas. These are in short:
• Telecommunications policy – the principal
policy factor in the EU has been a
general stance since 1980 of opening
the telecommunications market to more
competition, However, there are major
disparities in degrees and types of regulatory
impact across Europe.29 AWTs tend to
support and extend this policy, and do not
conflict with it.
• Broadcast and electronic media – the current
regulation is highly germane to AWTs as a
broadband medium.
• Competition policy – be it for telecommuni-
cations or for convergence with media and
content, AWTs do not fundamentally change
the current issues in competition policy, and
there is no specific policy formulation at this
time.
• Digital Rights Management (DRM) and
copyright – digital media content property
rights are the basis for transferable wealth
in the Internet world and therefore have
direct economic impacts. At a policy level,
however, AWTs do not alter the basic issues
here.
• R&D policy – many of the advances in
useful ICT policy have been underpinned
by clear policy directives to research
into new technology and to formulate
standards. However, current EU projects and
programmes are heavy on cellular, operator-
centric proposals for beyond 3G. Research
into AWTs is largely unco-ordinated in
Europe, except for standards work.
• Education and promotion policy – the EU
has less at policy level here than in some
other regions as regards the awareness and
demand-generating activities that characterise
successful take-up of new technologies,
which may accompany rollout.
There are certain new areas of policy to be
added to the above categories, which become
clear later in this chapter. Turning to the various
areas of regulation that could impact AWTs,
the only area of existing telecommunications
regulation particularly relevant to AWTs applies
to spectrum usage, and most specifically
to interference with other users. Today the
current legislation is oriented toward operator-
centric operations of telecommunications.
Opening the range of service providers to
non-telecommunications operators – be they
municipalities, hotels or other organisations
– may require a change in both public interfaces
and business processes within the regulator, to
accommodate the more informal regimes that
AWTs promise. Also, the national regulator may
have to expand to services dealing with media
content from a stance of telecommunications
only, as well as the area dealing with Internet
Service Providers, who may provide their offerings
over an AWT path built and operated by another
entity. Thus both regulation and the regulator at a
national Member State level may have to change
to incorporate these new fields as AWTs become
more important, perhaps in the direction that
Ofcom in the UK has taken of incorporating five
regulatory bodies into one.
More generally, much of the EU’s legislation
(e.g. competition law, data protection, privacy
etc.) is clearly pertinent to AWTs. However,
sophisticated policy on regulation of competition,
access, security, and so forth, specific to AWTs
and the future AWT markets, especially in
services, has not been developed. To some
29 See for example ECTA (2005).
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sextent this is because AWTs are just too new, but
it is also because AWTs do raise new issues that
are not already treated, for instance, within the
existing framework for regulation of electronic
media or competition law. With regard to
content and media policy, for example, AWTs do
not raise new issues on media ownership, digital
rights, etc.
6.1.3 AWTsinsupportofEuropeanInnovation
andCompetitiveness
In view of the promise of AWTs and their
rapid development in the USA and Asia, but
also due to the impediments to their rollout, an
EU policy for Europe is called for. This is well
in line with current European policy on R&D,
which notes that European research needs to be
essentially strengthened and that a “European
industrial policy, in particular in highly competitive
sectors such as information and communication
technologies requires the integration of research
efforts at European level” – by establishing a
critical mass of resources, particularly in key
areas for growth such as microelectronics and
telecommunications, and by strengthening
excellence through competition at the European
level and transnational collaboration.30 Policy
support of AWTs falls into the category of replying
to this call for action on a new economy, because
the nature of AWTs makes them highly relevant
to the goals set out above in a number of ways:
• AWTs have the potential to make a major
contribution to the EU’s GDP in a similar
way to the impact of cellular mobile services
over the past decade. (€106 billion of GDP
in 2004, 1.1% of total GDP in the EU15,
generating over 400,000 high-value-added
jobs.)31
• Significant growth in employment (and even
maintenance of current levels) requires a
large internal market and significant exports.
• Such technologies require a highly skilled
society to produce them, and to use all their
capabilities – an economy which can move
on from the existing technologies is now
required – so we need to boost investment
in knowledge. AWTs have the potential to
bring a wide range of knowledge-based
employment, and their usage will be
instrumental in bringing high education at
low cost to large numbers of citizens.
• AWTs can reduce the costs of our social
support services while increasing economic
output. This is essential since new ways are
needed to support an ageing population,
with its increasing life expectancy, at reduced
costs with better care.
• AWTs can advance the health services for
higher quality while reducing the costs
– be they in hospital, with telemedicine or
for telecare at home (transferring hospital
monitoring and care into the home). AWTs
bring the new medical capabilities of in-body
sensor networks, of monitoring ubiquitously,
and thus of taking medical care based on
ICTs from the realms of physiology into the
behavioural areas of mental health.
• AWTs provide affordable security and
emergency services with communications
and control systems, and could also provide
a citizen’s warning system, resistant to
disasters and attack. After the 9/11 attacks
in the USA, no commercial mobile cellular
systems worked in the districts affected. Thus
AWT can contribute to physical and national
security.
• By offering broadband access at low cost
with ubiquitous coverage, AWTs could well
spur the take-off of Internet-based commerce
in Europe for all the population. Economic
impacts would be to accelerate business
while reducing fixed costs, making Europe
far more competitive globally.
30 CEC (2004).31 Lewin, D. (2004). In addition, 1.3 million jobs depend on the cellular mobile industry, with a further 1 million jobs depending
on expenditure generated by cellular mobile (the multiplier effect): ibid.
��
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s • Moreover, just as the new roads in the 1920s
acted as higher-access feeders to the existing
rail networks, so AWTs could have the effect
of driving traffic onto existing, backbone IP
networks, which are sometimes underused.
This might recoup their sunk costs faster. In
general, when interconnected with existing
backhaul facilities, AWTs can further
enhance the economies of scope and scale
of backbone IP infrastructures by enabling
novel mobile applications and also by
offering new, potentially more flexible and
cost-effective mechanisms for aggregating
the traffic coming from the last mile, for
conventional fixed-line broadband services.
One example might be cheap broadband
sharing within a housing complex through
an extended Wi-Fi cloud. Framing Wi-Fi
as a cost-effective demand aggregator for
broadband is perhaps a new view which
would incorporate Wi-Fi business models.
It helps to counter the negative perception
of Wi-Fi, that it may cannibalise existing
broadband services.
• AWTs also have the power of competition to
drive down basic telecommunications prices
in cost-based competition, and to challenge
effective monopoly or oligopoly further. They
can provide a real competitive infrastructure
to compensate for the lack of success in local
loop unbundling across the EU, providing
competition to the local loop, but with an
infrastructure of local loop broadband.
6.1.4 The Challenges and Opportunities for
Europe–SWOT
Below, we examine AWTs by means of a
summary SWOT analysis, from the viewpoint of
the EU citizen. From each strength, weakness,
opportunity and threat we assess the implications
for policy and regulation (see Annex 3). In Section
6.2 we will instead state policy implications and
measures thematically.
6.1.5 Towards European Industrial Policy for
AWTs
In view of the promise of AWTs, we conclude
that, of all the types of policy available, a specific
form of encouraging (rather than forcing) yet
interventionist policy is the way forward for these
reasons:
• The lessons from analysing past successes
and failures in the innovation of radio
technologies point towards the need for a
clear set of activities driven by realistic but
effectively market-shaking goals. If there is a
case study of development to follow, then it
is that of GSM; the case study of 3G teaches
us what to avoid.
• An EU-based initiative would avoid the limits
imposed by differences in success in national
systems of both innovation for research and
encouragement of AWT service deployments,
and thus harmonise the resultant differences
across the EU in rates of AWT rollout and
usage.
• An analysis of the past also teaches us that
the current players are unlikely to relinquish
their positions, especially in the face of a
technology which tends to bring mobile
telecommunications at far lower costs, with
the promise of much higher data rates up to
broadband levels. This focus on their own
market and interests by current players would
also have the effect of stifling development
of AWTs in specialist vertical applications,
such as emergency services.
6.2 Resultant Policy Recommendations
Naturally, the exact policy requirements of
each of the AWTs currently on the market can be
expected to differ, but we can form some general
concepts of what a European policy for AWTs
should contain. It would have to cover a wide
range of issues and we elaborate briefly on the
most significant ones below.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
6.2.1 SpectrumPolicyandRegulation
The first issue is a rethinking of policy for
spectrum allocation at the highest levels for Europe,
Member States, and globally to incorporate AWTs
adequately. And now is the time. These issues
are today under debate within the ITU forum.
However, this gradual slow process via the WRCs
is at a crisis point, and inadequate for the rapidly
evolving and increasing number of new wireless
technologies. For propagation distances to be
optimised, AWTs may need to have frequency
bands currently taken by broadcast, mobile
cellular, or the military. By WRC-07, it would
be judicious to have reconsidered the current
allocation of spectra in view of the economic
benefits of AWTs for Europe, and abandoning
existing frequency plans. Such a move requires
a socio-economic basis for planning,32 and work
so far points to a far wider usage in which AWTs
would form a major part.
To conclude, spectrum needs to be given
to AWTs as part of any policy to support them.
Otherwise they will stall in Europe, just as mobile
cellular did in the US.
32 See for example Forge et al. (2005).
Table 6‑1 SWOT Analysis of AWTs from the Perspective of the EU Citizen
STRENGTHSAWTs fill the gaps left by cellular
Lower costs than cellular in many applications
Fast to rollout compared with cellular
Bandwidth higher than 3G
Can cut costs and delays by eliminating large capacity backhaul lines in MAN installations
Cost and installation advantages add up to a way to provide municipalities with a chance to enhance their value with mobile Internet access
Can act in mobile roaming mode (e.g. mobile WiMax)
European industry – in a good position in design coming from cellular on chips, antennae, military electronics including radar, specialist chip manufacture, despite US lead today, as Europe does have mesh software providers
Europe’s collaborative approach experience and ability
WEAKNESSESNo real place today in European telecommunications and media, nor part of an overall plan for communications
Not understood by mass markets
AWT capabilities and positioning are still not well understood by EU industry and technical centres of expertise. More effort on basic radio research is needed.
More clarity is required on spectrum needed
European mobile incumbents are well entrenched; in contrast AWTs are in a weak market position, with no champions, promotion or financial muscle
Security problems abound
European industry has been a follower so far
All successful AWT standards so far are US (IEEE series)
Europe’s forced collaborative approach on decisions and new programmes makes all policy initiatives slow
OPPORTUNITIESDesigning and producing AWT technology and equipment with the aim of developing leadership in broadband wireless (e.g. multi-mode self-adaptive terminals according to performance/cost preferences)
Export opportunities of bringing Internet connectivity to the developing world (cf. Korea’s WiBro)
Expanding scope of European industry – new ventures in consumer and verticals, especially health including frail and mental health conditions
AWTs ideal for SME involvement and start-ups –could seed a whole new EU sector of SME chains
Offer Internet access to all of Europe at low cost (and VoIP) via public and municipal access networks
High broadband penetration via wireless will stimulate feeder industries (e.g. media) & user industries (e.g. medicine)
Economic impacts of better health/elderly care at lower cost
Set standards lacking in mesh networking software and processes, possibly via Open Source software routes
THREATS
Security threats due to pervasive coverage, increased band-width new bodily proximity connectivity (BANs). Innocent and unaware user population: Threats include: (1) attacks on emergency services; (2) attacks on the core ICT infrastruc-ture; (3) identity theft from citizens; (4) privacy threats to citizens; (5) malware attacks of all kinds on citizens, attached machines and organisations, plus the new types of attack that will come with VoIP; (6) car telematics – accidents caused by malicious messages; (7) body area networks; (8) M-com-merce threats; (9) M-Banking threats including EFT; and (10) security threats to industrial sensor networks.
Cellular mobile industry views AWTs as a major threat.
Cellular operators, challenged by AWTs, competing with a dif-ferent business model which may outstrip the mobile busi-ness model in value to the customer.
Wireless health issues are not yet understood for cellular and non-cellular access techniques. AWTs are often likely to be worn continually and the affects of low power continuous ra-diation needs to be examined.
��
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s 6.2.2 CompetitionPolicyandRegulation
Overall, the aim for a high-level policy for
AWTs would be to conserve free competition
among different segments as well as different
players – a concept of converging the related
industries (communications and media) under
a single policy. Such a policy would aim to
prevent market control by any one segment (or
any single player). Thus when we come down to
policy implementation, in competition regulation
for AWTs, we should cover the convergence of
telecommunications with media content creation,
aggregation and distribution, expanding models
to include financial industries, also considering
cross-ownership and verticalisation impacts.
In principle, Europe may need to
reconsider competition policy with regard to
telecommunications specifically to encourage
the entry of new services from new providers
over AWTs. To create an active AWT-based
communications market, it will be critical to
form conditions of freedom of market entry for
new players without restrictive practices, be it
in interworking – physical attachment, protocols
at network or at application level – or in related
areas such as media content or in dependencies
such as the software for ‘media players’ and
operating systems’. Regulation has to maintain
a level playing field for competition, in market
conditions where the world-class players are
seeking vertical integration. This means expanding
regulation models for the areas of:
• Media/broadcast-multicast and content in all
areas including protection of minors, digital
rights management, ownership of multiple
media, etc.
• Telecommunications
• Financial transactions and banking
One particular point is that the players who
are strong outside telecommunications may well
use AWTs as a way to enter the telecoms market,
offering a quadruple play of:
• Multi-channel TV
• Voice telephony of a ‘fixed’ nature but
nomadic within a building, at low cost as
VoIP voice telephony
• Mobile multi-media of all kinds, with games,
e-mail, MMS, interactive video, etc.
• High-speed Internet access, including radio
and TV – perhaps over mobile Internet
(the Portable Internet concept) rather than
broadcast
To this we may add that: (a) a converged
market model may require competition regulation
for AWTs that removes the legal barriers to cross-
ownership, where appropriate; and that (b)
the opening of AWT carrier networks to third-
party service providers should be a subject
for consideration. Also, balance is required
in the regulation between public interest and
competition considerations – the emergence
of content-sharing communities and groups,
and self-produced content, not originated by
commercial organisations, must be protected
from over-zealous copyright laws.33
6.2.3 HarmonisingLicensingSchemes
If a regulated AWT market does arise,
major decisions will revolve around the forms
33 In the systems interface area, we also need to see open interface standards published down to chipset level. For instance, Sandvig et al. 2004 note that access to development of mesh networking over Wi-Fi is now constrained by secrecy among manufacturers of network card chipsets, a highly concentrated industry. None of the dominant chipset suppliers in the Wi-Fi markets make available any interface specifications. This effectively bars any user-driven innovation, a central force for innovation in the area of mesh networking. More broadly, as radio and radio networks become increasingly defined in software, this presents a regulatory crisis. The basis for fixing spectrum allocation rules was formerly hardware, but the increasing configurability of radios may seem to create new drives among the supplier industry for interface secrecy and lock-in. Thus a new barrier to ubiquitous interoperability is raised by software interface secrecy. Competition policy will have to take this into account. A policy move towards open source software, as outlined in the IPR section, would seem to be the only logical solution that will avoid complex regulation.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sof licence, in terms of whether it is for spectrum usage or a general licence to operate with both service provision and AWT infrastructure ownership, or a service over a third party’s approved AWT infrastructure. Major concerns here are the allocation process for licences and types of licensing.
In summary, policy directions should revolve around a lighter regulatory regime for the new entrants, perhaps unlicensed, but with forced interconnect to incumbents (see below). EC recommendations to the regulators in the MS would be to view the business case differences as an opportunity to bring competition to what may be an oligopolistic market, while using AWT licensing, if deemed necessary, firstly to promote competition by ensuring that new entrants have licences, and secondly to ensure that security measures are implemented.
6.2.4 AccessandInteroperability
A related area for policy decision is on the assurance of interconnection access by the new entrants to existing networks – be they fixed or mobile with Internet access. Issues of roaming, interconnection and termination charges must be considered, with cost-based pricing to prevent monopolistic margins on interconnect activity. AWTs could then provide strong local loop competition. Assuring connection of any-to-any covers several areas including:
• Open access: Required also at application level with AWTs for mobile services.
• Mandated mobile exchanges: Ensure that operators of all kinds have common Internet access. Requires creation of mobile exchanges – a key element of a converged network to integrate AWTs – and would also open the way for mobile content competition.
• Ownership restrictions: For different types of networks, allowing and even forcing the sharing of infrastructures according to dynamic financial models.
• Pricing models: A major barrier to AWT introduction (especially by cellular mobile
operators) is their associated pricing model.
This extends into interconnection and the
billing settlements, with termination and
roaming agreements.
• Naming and addressing: Resolving naming
and addressing conflicts is a key aim for
open access. AWTs in Europe sit in the area
of three address spaces – Internet logical
addresses (URLs), fixed number plans and
mobile number plans. The latter two vary
by country but are usually differentiated.
Suggested solutions for mobile-Internet
access include the ENUM scheme for
mapping a PSTN telephone number into a
typical Internet Uniform Resource Locator
(URL), i.e. an e-number.
• Universal service: Providing universal service
of equal provision and access for all citizens
is open to question in a mobile broadband
world.
• Emergency number obligations: Many AWT-
based public services providing voice are
likely to have to comply with the requirement
for connection of the emergency services in
each MS.
6.2.5 NetworkRollout
In AWT networks, once network
interconnection is ensured, network roll-out is not
contaminated with difficult issues. However, they
pose a strong competitive threat to incumbent
technology stakeholders who may complain to
the regulators that AWT operation undermines
their USO requirements, or that AWT operators
should be regulated by heavier taxes due to the
unfair competition, or even banned as they may
be operated by municipalities and others who are
not licensed and regulated telcos.
6.2.6 SecurityPolicyandRegulation
Security of the Internet in a ubiquitous radio
access world is a major weakness and threat
to AWTs. This will require a complete reform
of Internet security backed by legislation, and
��
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s policy measures are needed for what should be
allowed/prevented. AWTs need to have a security
layer built into their network architecture, as
their ubiquity becomes the users’ vulnerability.
Thus, the policy questions are raised of how to
ensure this and to police it. They require an in-
depth study of the Internet current structure
and what form it would take in a mobile radio
world. This is a major effort in terms of research
and software development, and may require a
specific programme. The security issue is far too
important to be left to the suppliers or to ad-hoc
development; its co-ordination is an ideal task for
an EC programme. 34
One way to ensure that new security
measures are taken up is to institute them in
the proposed European demonstrator projects,
having developed them in European research
programmes. Long-term R&D follow-up would
come from one stream of research in a proposed
European institute for radio research (see below).
6.2.7 PrivacyandDataProtection
AWTs present major challenges to the
privacy of the citizen if the communications are
unprotected, in that AWTs could invade every
moment of a person’s life. A balance between
privacy concerns and convenience, security
and utility of AWTs must obviously be reached
– to protect efficiently against eavesdropping
on conversations, identity and any personal
data theft, and personal tracking. Rules on work
environments and privacy of the citizen come
into play here, as do the various guidelines for
protection of privacy following the 1981 EC
guidelines.35
For privately deployed networks,
confidentiality can only be assured if the
equipment has security measures built in as
standard. This will also require a dedicated
testing and type approval process for AWT
equipment. Privacy protection regulations for
AWT public services will follow those envisaged
for cellular mobile for aggregation of personal
data. This includes the default of opting out for
direct marketing and unsolicited (commercial)
messaging of all kinds, as well as location
tracking and surveillance of all types over mobile
networks, with the requirement for a citizen’s
aware consent to opt into such monitoring and
personal access. Moreover, the requirement for
MS to ensure that public service operators divulge
customer data and caller information for calls to
the emergency services (and security services so
authorised) would probably become mandatory
for their AWT-based communications, under the
Universal Service Directive (200/22/EC).
In conclusion, although security and privacy
are different subjects, the provisions for security
of AWT operation can be applied to give privacy
through access control following the authorisation
process by the citizen owner and authentication
challenges to those who claim to be authorised
to view the private information. The key to this is
enactment of the security functions enumerated
in Chapter 4, with the pressure of the current
EC Directives on Data Protection, privacy and
citizens’ rights to privacy behind it.36
6.2.8 Standards
For the AWT market appearing over the
next decade, far more than standards for simple
34 For specific security threats that need to be handled, we refer to Annex 2 and 3.35 EC specific recommendations include: medical databanks (1981); financial payments and transactions (1990); protection of
privacy of the Internet (1999); direct marketing (1983); communication of data to third persons by public institutions (1991); protection of data in the field of telecommunications (1995); protection of personal data collected and processed for statistical purposes (1997).
36 Such rights are principally endorsed by the Council of Europe’s Convention of 28 January 1981, enacted 01 October 1985, and the European Court of Human Rights, ECHR (particularly Article 8, paragraph 2 on personal communications) and to a lesser extent the Council of Europe’s Treaty 108.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sair interface and network-level protocols are
required if the applications that run over AWTs
are to interwork seamlessly.37 So far, our current
AWT standards have largely been formed in the
fora developing the IEEE 802 series (USA). A
simple policy of harnessing these air interface
and physical connection standards is perhaps to
be preferred for rapid industrial advance, which
will avoid unprofitable conflict, time and money
in redundant standards setting.
Building on the IEEE 802 standards series at
a basic communications protocol level, we can
illustrate useful standards-setting by moving up
the seven-layer model to build complete systems
that can be easily integrated into a broadband
wireless network. They may be selections of
existing standards in some cases. Domains to be
covered would include:
• Network Air interfaces, network protocols
and network operations, and the key network
entities and their operational behaviour.
• Handsets – any usefully defined software
characteristics such as operating system calls,
form and use of microbrowsers to display
content, etc.
• Session and application processes at the
Internet level for mechanisms and protocols.
• Content and media standards to enable
common distribution mechanisms for content
ingest and delivery.
• Security mechanisms and overall
architecture.
Building on the IEEE 802 series, European
standards efforts (in ETSI and other groups) could
also well be marshalled to attack a higher, more
sophisticated level of AWT operation. This would
enable European industry to go forward rapidly in
AWTs in the areas of: (1) a high-level, behavioural
model of the network architecture for mesh
networking, with strategies for use of participating
nodes, and for interworking with existing network
types; (2) definition of the main operations in a
self-organising or ad-hoc network for a mesh
architecture following the high-level model
– the processes and policies of management for
awareness and adaptive response, with choice of
existing standards where appropriate.
A security model and architecture to fit
with the high-level network model, which
runs end-to-end from content servers through
all network types into handsets, will also be
needed. However, standardisation of technical
developments for interworking is not enough.
There must be regulation to enforce standards
usage – for example, integrated naming and
addressing, and specifically security measures.
6.2.9 DRM,IPR,ContentandMediaCopyright
Policy
There are two problems that come with
ubiquitous networking: ubiquitous connection,
and the need for ubiquitous usage, that is, by
anyone. The strictures imposed by proprietary
standards and patents mean that both markets
and usages will be limited, but this is in the case
of a technology that needs by its very nature to
be universally accessible by all, through common
standards for interworking. The European
experience of promulgating open standards
has been quite successful in driving economic
development – the GSM example shows this, and
sets the scene for a move towards Linux and other
open software in next-generation radio systems.
It should also be noted that the AWT
network will depend on software. IPR from R&D
in the supported initiatives for AWT networking,
including security and application environments
(such as operating systems and microbrowsers),
should all be under open source licence with
no software patents permitted, unless they are
in the public domain. This is to prevent private
37 On a general note for standards policy, a key point has been made by Korea, which often takes a contrarian view on standards in order to be first in a new technology. This may be applied to the AWT standards scene in Europe.
�0
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s patenting with patent thickets38 which will block
rapid software development. In certain contexts of
peer-to-peer content creation, this Open Source
approach to copyright would extend to content
and media copyright protection so that DRM
should be available in multiple forms.
For the future, and although it is not yet taken
up as a legal concept, the reciprocal of DRM
(digital rights management for commercial media
content) might have to be applied in the far wider
field of personal data available through AWTs
– the notion of ‘digital privacy management’
– which covers both transmitted and stored data,
enacting a set of policy rules set out by the citizen
covering external data aggregators, regarding who
holds what and which permission they have, and
then tracking their usage of such data.
6.2.10R&DProgrammes
A suitably structured and EC-led funded
programme of research and demonstrator
implementations should be set up and mobilised
as a matter of urgency. The development of AWTs
in Europe will require multiple initiatives to
encourage innovation and diffuse that innovation
effectively to build a new industrial segment.
Two main avenues are considered here, the first
a transitional start-up phase, the second a more
permanent and structured entity (see also Figure
6-1).
A European Alternative Radio Network
Research Programme should be established as a
matter of urgency, within a timeframe of months.
It should cover several well-defined areas, with
study projects for university laboratories and
industrial pre-competitive consortia, with all
results being in the public domain. The release
of classified military research in this area should
be urgently sought for Europe’s advantage.
The programme’s main research lines should
include: (1) radio propagation analysis; (2)
networking processes and architectures for
interworking and interfacing to other (existing)
networks; (3) analysis of mesh networking
algorithms; (4) analysis of techniques for sharing
spectrum based on non-frequency-constrained
propagation; (5) cognitive radio systems for SDR;
(6) spatial and directional signal multiplexing
and enhancement; (7) human interface research
for rich capability but easy-to-use handsets and
terminal devices; (6) socio-economic analysis
of user demand for new services; (8) analysis of
handset operating systems for secure hosting of
multimedia applications;.(9) analysis of security
threats; (10) content and media transmission and
management; (11) tracking of AWT development
globally; and (12) self-organising operator-less ad-
hoc networks for disaster situations, with robust
self-configuration.39
Finally, we suggest the formation of a
European Radiocommunications Research
Institute – ERRI – as a further initiative to pursue the
full promise of the new directions in radio. ERRI
would be a European research and development
centre for AWT radio technologies and networking
architectures. Jointly funded by industry, national
governments and the EC, the first phase of rapid
set-up and early growth could be through a joint
programme of projects distributed across existing
universities. This would form a launch pad for the
second phase, of setting up a permanent institute
with its own faculty and facilities at one site. ERRI
would have twin research roles, of primary and
applied research, to form an international centre
of excellence. Primary research – with a longer-
term flavour – expecting results beyond two
years in many areas, which will form the basis of
products and services beyond 2010:
• Radio propagation – especially matching
spectrum to AWTs
38 See, for example, the Forge (2004).39 In addition, there are existing EC e-initiatives that could be harnessed to provide part of the above, in particular the eMobility
Technology Platform. If this is not possible, then an alternative high-level group specifically for AWT – a kind of European ‘skunk works’ to develop AWT – could be created. Moreover, the EU’s interest in broadband deployment could also be harnessed for certain AWTs, if any political barriers raised by xDSL incumbents to wireless access can be overcome.
�1
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s• Digital signal processing techniques for
adaptive signal identification/spectrum
sharing in a multimode environment
• New Alternative Wireless Technologies (i.e.
non-cellular) at the fundamental research
level of new operating principles and new
radio performance
• Socio-economic analysis of demand and
usages of radio technologies in future
lifestyles
• Business case analysis of AWT networks
• Health and safety aspects of AWTs and radio
propagation
• Assessment of the fundamental security
threats to radio networks
• Assessment of novel global information
structures for ubiquitous use
Applied research – more than just
communications in the applied science and
engineering covered – with short-term pilot
deployments in mind within 12 to 18 months:
• AWT security management for operational
networks, both new and already deployed,
including analysis of countering Internet
threats
• AWT management software – especially self-
organising mesh networks for immediate
deployment
• Standards and interworking for AWT
• R&D supporting AWT infrastructure projects
– citizens’ alert network etc.
• Novel AWT applications
6.2.11 Funding,Encouragement,Educationand
Promotion
Funding
In view of the opportunity, a funded
programme for research and demonstrator
implementations should be set up. Here, taking
the revenues from spectrum licences and taxes
on operators for a strategic re-investment fund for
telecommunications infrastructure and research
should be considered. In addition, SMEs and new
ventures should be encouraged and supported
with capital, programmes of research, supply
contracts for demonstrator projects etc.
Awareness and Education
One of the major drivers behind the advance
in AWT take-up in the USA and globally has
been the considerable investment in awareness
programmes by stakeholders. Such a programme
will also be necessary in Europe, to explain
the technology and its position against other
communications and media technologies, to
show what it can do in terms of its real utility,
and to show how users can obtain it and use it.
Taking awareness a stage further is required
if AWTs are to be taken up. It would useful to
consider whether education programmes similar
to the one established in Korea (see Chapter
5) could be seeded. In any case, we need to
increase public understanding of technology if
large numbers of people are to use it.
Large-Scale Demonstrator Projects for
Implementation
It would be most useful to build a range
of European test beds at a national (or EU)
level, the aims being to stimulate the economy
by proving technology and, most importantly,
to educate both the work force and society in
general. The intention would be to promote
the knowledge base of the economy. The large
demonstrator projects (size decided by the
number of MS participating at national and
local levels) would revolve around four main
initiatives (see also Figure 6-1). The first would
be a pan-European wireless broadband network
infrastructure (EWBNI). Its main function would
be to provide a robust broadband infrastructure
platform at low cost. Certain vertical application
networks could be based on EWBNI, as a
common broadband bus.
�2
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s Second is a European citizen-alert network
(CAN), acting as a citizen’s disaster alert
network (see Annex 2), perhaps using a mesh
infrastructure. The third is a European Emergency
Services Infrastructure Network (EESIN) only
accessible by emergency services, with an
architecture for robust operation in all situations.
Fourth, we propose a European recovery network
for attacks and disasters (ERNAD), a temporary
network to be set up instantly whenever and
wherever infrastructure fails, following a natural
or man-made disaster that wipes out existing
communications infrastructure.
Vertical Industry Projects and Other Promotional
Activities
Across these horizontal networks may run
some specialised vertical demonstrator projects,
which are most likely to made up of many small
projects – for instance, use of BANs in mental
health for a specific disabling condition – rather
than large horizontal networks. Health and
elderly care would also try to show improvements
in quality of care against lowering the costs of
their services.
Seeding start-ups: A programme for setting
up and incubating AWT start-ups should be
a major priority. With companies such as
LocustWorld, with a staff of two people making
global impacts using leveraged agents, the power
of the technology combined with the energetic
agility of a small company is evident.
Links to the R&D programmes: Each
demonstrator would be underpinned by both
temporary research projects and long-term
research in the ERRI institute and in its predecessor
distributed research programme across several
research departments in leading universities.
In conclusion, the suggested programme
schedule for the R&D and demonstrator projects
and initiatives, suggested in Sections 6.2.10 and
6.2.11, are shown Figure 6-1.
Figure 6‑1 Work Programme for Establishing European Success in AWTs
Source: SCF Associates
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s6.3 Issues for Further Research
By way of conclusion, this section briefly
reviews issues that would deserve further attention
in future studies with socio-economic dimensions
similar to the present ones. The suggestions build
for example on discussions by the project at the
Interim Meeting with IPTS, but are by no means
exhaustive or complete, only serving as some
final thoughts and reflections.
• This study has shown that AWTs are
potentially disruptive to existing dominant
technologies and their supporting actor
system.40 This disruptive threat /opportunity
needs to be analysed further, e.g. by studying
(1) determinants of how many alternative
technologies a market can support; (2)
determinants of success in a competition
between alternative technologies, (3) under
what circumstances emerging technologies
are disruptive (technology-wise, market-
wise, industry-wise). This would result in
a framework which could be applied to
current and future situations of mobile
communications.41
• This study identified standardisation as a
key issue for AWTs and proposed key areas
in which Europe could regain a leading
position. However, there are many unresolved
issues concerning standardisation, and in
need of further research before actionable
policy recommendation can be produced.
To exemplify: (1) Anticipatory standard-
setting, the need for collaboration between
standardisation bodies, and the concomitant
need for rapid standardisation have rendered
the traditional framework for standard-setting
obsolete – the efficiency of the emerging
regime being, however, highly questionable.
How can an alternative regime be designed?
(2) Influencing standards in order to align
them to the technological strengths and
strategies of a firm or a nation is an often-used
strategy, and a more or less explicit purpose
of industrial policy (used by some Asian
policy-makers). Should this be considered
also for European industrial policy? (3) Can
operators and other important actor groups
be provided with incentives to contribute
more to standardisation again? (4) The pros
and cons of gateway technologies (multi-
mode terminals, and in the long run SDR)
need to be further explored in order to avoid
immature standardisation decisions related
to AWTs and 4G.
• Diffusion of service over wireless
technologies. For any mobile technology
to be commercially successful, it is
crucial to unlock the barriers to diffusion.
However, factors driving diffusion are
poorly understood. Therefore a thorough
understanding of the mechanisms driving
diffusion is needed, a framework based
on earlier research (theory and historical
case studies) being developed and applied
to specifics of wireless communications,
at innovation level (i.e. numerous specific
products/services). Finally, barriers and
drivers of diffusion can identified and
addressed.
• Why is the traditional, operator-centric
business model still dominating in Europe?
What are the particular constraints and
40 We should not forget that AWTs are not a new phenomenon, and certainly not in mobile communications. In the early 1990s, 2G cellular was challenged primarily by satellite systems such as Iridium and cordless technologies such as DECT/CT2, where cordless technologies were claimed to provide better service at lower costs, in the home, in offices and in hotspots – at that time called Telepoints. These technologies more or less failed, partly due to the momentum behind cellular and the actors supporting it. What will happen this time depends on a number of factors which are at this stage unclear.
41 The disruptiveness could be hypothesized to be determined by a number of factors, such as the capabilities of AWTs vis-à-vis attractive services and applications, terminal performance, cost issues including possibilities to make gradual investments, industry support, spectrum availability, need for variety versus economies of scale (supply and demand side), lock-in effects among incumbents, etc.
��
6. P
olic
y A
naly
sis
and
Rec
omm
enda
tion
s bottlenecks in Europe? When will the non-
operator-centric model start to grow, and
under which conditions?
• There are finally a number of issues that
deserve to be confronted:
- long-range, space- and air-based
communications, and broadcasting based
on AWTs
- entertainment services and access
- logistics & retail and the use of AWTs
- impact on future health care based on
AWTs
- opportunities and challenges for e-
government based on AWTs
- AWTs and impact on industrial sectors
such as the automotive industry.
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
sReferences
- Akyildiz, I.; Wang, X.; Wang, W. (2005) “Wire-
less mesh networks: a survey”, Elsevier Com-
puter Networks, Vol. 47, pp. 445-487, March
2005.
- Baker, N. (2004) “Bluetooth strengths and
weaknesses for industrial applications”, IEE
Computing and Control Engineering, April/
May 2004, Vol. 16, Issue 2.
- Bohlin, E.; Lindmark, S.; Björkdahl, J.; Weber,
A.; Wingert, B.; Ballon P. (Editors: Rodríguez
Casal, C.; Burgelman, J.C. and Carat, G.) (2004)
“The future of mobile technologies in the EU:
assessing 4G developments”, IPTS Technical
Report prepared for the European Commis-
sion – Joint Research Center, EUR 21192 EN,
Seville, 2004; available online at: http://fiste.
jrc.es/
- CEC (2004) “Science and technology, the key
to Europe’s future – Guidelines for Future Eu-
ropean Union policy to support research”,
COM(2004) 353 Final, Brussels, 16 June 2004.
- Digital ID World (2003) “RFID and the Inter-
net of things”, November/December 2003.
- Dineen, R. (2004) “Flarion Technologies:
Ovum View”, OVUM Report, January 2004.
- ECTA (2005) “ECTA Broadband Scorecard
end of December 2004” available online at:
http://www.ectaportal.com/en/upload/File/
Broadband%20Scorecards/Q404/Broadband
%20Scorecard%20Q4%202004.pdf
- Egan, D. (2004) “The emergence of ZigBee”,
IEE Computing and Control Engineering, April/
May 2005, Vol. 16, Issue 2.
- Fifield, A. (2004) “Busan looks to a ubiquitous
future”, Financial Times, 22 April 2005.
- Forge, S. (2004) “Towards an EU policy for
Open Source Software”, IPTS Report, Vol.
85, available online at: http://www.jrc.es/
home/report/english/articles/vol85/ICT3E856.
htm#simon
- Forge, S.; Blackman, C.; Bohlin, E. (2005) “The
demand for future mobile markets and servic-
es in Europe”, IPTS Technical Report prepared
for the European Commission – Joint Research
Center, EUR 21673 EN, Seville, 2005, avail-
able online at: http://fiste.jrc.es/
- Goldman Sachs (2004) “Europe telecom serv-
ices: Wimax and family: threats and opportu-
nities”, Goldman Sachs Report, 7 September
2004.
- Ihlwan, M. (2005) “Freed from Daewoo, the
Daewoos thrive”, Business Week, 29 Decem-
ber 2003.
- Informal (2004) “The state of wireless Lon-
don”, available online at: http://informal.org.
uk/people/julian/publications/the_state_of_
wireless_london/#mesh
- Jung-a, S. (2005) “The Chaebols refuse to be
contained”, Financial Times, 4 July 2005.
- Lewin, D. (2004) “The economic contribution
of mobile services in the European Union be-
fore its 2004 expansion: a report to the GSM
Association”, Ovum, London, available online
at: http://www.gsmworld.com/esb/esb_docu-
ments/eu15_main.pdf.
- Northstream (2005) “Operator options beyond
3G”, Northstream White Paper, February 2005.
- Pellon, M. (2004) “Reconfigurability and B3G
systems: a Motorola view”, presentation at the
WWI Symposium, Brussels, 10 December 2004.
- Reynolds, T.; Kelly, T.; Jin-Kyu, J. (2005) “ITU
ubiquitous network societies: the case of Ko-
rea”, ITU, Geneva, March 2005.
- Sandvig, C.; Young, D.; Meinrath S. (2004)
“Hidden interfaces to ‘ownerless’ networks”,
paper presented to the 32nd Conference on
Communication, Information, and Internet Pol-
icy, Washington, DC, September 2004, avail-
able online at: http://www.spcomm.uiuc.edu/
users/csandvig/research/Hidden_Interfaces.
��
Ref
eren
ces - Shamp, S. (2004) “WiFi clouds and zones: a
survey of municipal wireless initiatives”, Mo-
bile Multimedia Consortium Paper, University
of Georgia.
- Stajano, F.; Anderson, R. (2000) “The resur-
recting duckling: security issues for ad-hoc
wireless networks”, in Christianson, B. et al.
(Eds.), Security Protocols, Springer, Berlin.
- Vance, J. (2004) “Mesh is good – but what
kind of mesh?”, TechWorld 17 August 2004,
available online at: http://www.techworld.com/
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
1G First generation (of cellular mobile)
2G Second generation (of cellular mobile)
2.5G Second and a half generation (of cellular mobile) with enhanced data communication capabilities represented by GPRS
3D Three Dimensional
3G Third Generation (of cellular mobile)
3.5G Third and a half Generation (of cellular mobile) with enhanced data communication capabilities
3GPP Third Generation Partnership Project
3GPP2 Third Generation Partnership Project 2
4G Fourth Generation (of mobile)
AES Advanced Encryption Standard
API Application Programming Interface
AWT Alternative Wireless Technology
B3G Beyond 3G – next generation of mobile after 3G
BAN Body Area Network
BCN Broadband Converged Network
BT British Telecom
C4 command /control /communication /co-ordination
CAD Computer Aided Design
CAN Citizens Alert Network
Capex Capital expenditure
CDMA Code Division Multiple Access
CEPT Conférence Européenne des Postes et Télécommunications
CES Consumer Electronics Show
Cm centimetre
CPE Customer Premises Equipment
DECT Digital Enhanced Cordless Technologies
DMB Digital Media Broadcasting
DoS Denial of Service
DRM Digital Rights Management
DSL Digital Subscriber Line
DVB Digital Video Broadcasting
EC European Commission, or European Community
ECHR European Court of Human Rights
EEC European Economic Community
EEISN European Emergency Services Infrastructure Network (proposed here)
EFT Electronic Funds Transfer
ENUM E-number – a universal communications identifier to unify telecommunications and Internet addressing
ERNAD European Recovery Network for Attacks and Disasters (proposed here)
ERRI European Radiocommunications Research Institute (proposed here)
ETSI European Telecommunications Standards Institute
List of Abbreviations
��
List
of
Abb
revi
atio
ns EU European Union
EVDO EVolution Data-Only (for CDMA 2000)
EWBNI European Wireless Broadband Network Infrastructure (proposed here)
FCC Federal Communications Commission (US federal regulator)
FDD Frequency Division Duplex
Flash OFDM AWT for broadband mobility – may come under IEEE 802.20
GHz Gigahertz
GDP Gross Domestic Product
GPRS General Packet Radio Service
GPS Global Positioning System
GSM Global System for Mobile communications, originally Groupe Spéciale Mobile
HF High Frequency
HSDPA High Speed Downlink Packet Access
HSUPA High Speed Uplink Packet Access
IBM International Business Machines
ICT Information and Communication Technology
ID Identity
IEEE Institute of Electrical and Electronic Engineers
IMIT Institute for Management of Innovation and Technology
IP Internet Protocol, also Intellectual Property
IPR Intellectual Property Rights
IPTS Institute for Prospective Technology Studies
IPv6 Internet Protocol version 6
ISM Instrumentation, Scientific and Medical (spectrum band)
ISP Internet Service Provider
IT Information Technology
ITU International Telecommunication Union
JTAV Joint Total Asset Visibility
JV Joint Venture
Kbps kilobits per second
Km kilometre
KT Korea Telecom (operator)
LAN Local Area Network
LF Low Frequency
LGE Lucky-Goldstar Electronics (supplier)
LMR Land Mobile Radio
MAC Media Access Control
MAN Metropolitan Area Network
MANET Mobile Ad-hoc NETwork
MBOA MultiBand OFDM Alliance
Mbps Megabit per second
MHz Megahertz
MIC Ministry of Information and Communication (in Korea)
MIMO Multiple Input Multiple Output
Mobile-Fi Mobile Fidelity, under IEEE 802.20 standards
��
Map
ping
Eur
opea
n W
irele
ss T
rend
s an
d D
river
s
MS Member State (of te EU)
ms millisecond
MVC Mobile Virtual Community
NASA National Aeronautics and Space Administration
NFC Near Field Communications
NFM Near Field Magnetics
NIC Newly Industrialized Country
OCTO Office of the Chief Technology Officer
OFDM Orthogonal Frequency Division Multiplexing
Opex Operational Expenditure
OSS Open Source software
OSI Open Systems Interconnection
PAN Personal Area Network
PC Personal Computer
PDA Personal Digital Assistant
PMR Private Mobile Radio
POS Personal Operating Space
PSTN Public Switched Telephone Network
Q(1,2,3,4) First, second, third, fourth Quarter of a year)
QAM Quadrature Amplitude Modulation
QoS Quality of Service
R&D Research and Development
RFID Radio Frequency IDentification
SDR Software Defined Radio
SIG Special Interest Group
SME Small and Medium-sized Enterprise
SOHO Small Office Home Office
SWOT Strengths, Weaknesses, Opportunities and Threats (analytical tool)
TDD Time Division Diplex
TGn Task Group N
TNO Nederlandse Organisatie voor toegepast-natuurwetenschappelijk onderzoek TNO, the Netherlands Organisation for Applied Scientific Research TNO.
TV Television
UHF Ultra High Frequency
UK United Kingdom
UMTS Universal Mobile Telecommunications System
UNISK JV between Chine Unicom and SK Telecom
UPnP Universal Plug-and-Play
URL Universal Resource Locator (Internet addressing)
US United States (of America)
USB Universal Serial Bus
USO Universal Service Obligation
USN Universal Service Network
UWB Ultra Wide Band
VoIP Voice over Internet Protocol
VOW Voice Over Wireless (IP-based)
�0
List
of
Abb
revi
atio
ns WARN Wireless Accelerated Responder Network
W-CDMA Wideband–Code Division Multiple Access
WiBro Wireless Broadband
Wi-Fi (WiFi) Wireless Fidelity, under IEEE 802.11x series
WiMax Worldwide Interoperability for Microwave Access, under IEEE 802.16x series
WISP Wireless Internet Service Provider
WLAN Wireless LAN
WLL Wireless Local Loop
WMAN Wireless MAN
WP Work Package
WPAN Wireless PAN
WRC World Radiocommunication Conference
WWiSE World Wide Spectrum Efficiency
WWW World Wide Web
WUSB Wireless USB
ZED ZigBee End Devices
Themission of the JRC is to provide customer-driven scientific and technical support for the conception, development,implementation and monitoring of EU policies. As a service of the European Commission, the JRC functions as areference centre of science and technology for the Union. Close to the policy-making process, it serves the commoninterest of the Member States, while being independent of special interests, whether private or national.