• Corpus ID: 15876418

# What is LTE actually used for? An answer through multi-operator, crowd-sourced measurement

@article{Malandrino2016WhatIL,
title={What is LTE actually used for? An answer through multi-operator, crowd-sourced measurement},
author={Francesco Malandrino and Scott Kirkpatrick and Danny Bickson},
journal={ArXiv},
year={2016},
volume={abs/1611.07782}
}
• Published 23 November 2016
• Computer Science
• ArXiv
LTE networks are commonplace nowadays; however, comparatively little is known about where (and why) they are deployed, and the demand they serve. We shed some light on these issues through large-scale, crowd-sourced measurement. Our data, collected by users of the WeFi app, spans multiple operators and multiple cities, allowing us to observe a wide variety of deployment patterns. Surprisingly, we find that LTE is frequently used to improve the {\em coverage} of network rather than the capacity…
3 Citations

## Figures and Tables from this paper

### How Does Spectrum Affect Mobile Network Deployments? Empirical Analysis Using Crowdsourced Big Data

• Computer Science
IEEE Access
• 2020
It is concluded that in dense urban environments, the available bandwidth, rather than propagation properties, determines the preferred band for network deployment by MNOs.

### Evolving mobile networks towards 5G. A framework to infer the state of connectivity infrastructure in dense urban areas

• Computer Science
• 2019
A methodology to infer the state of connectivity infrastructure and understand how Mobile Network Operators (MNOs) have combined spectrum resources and network densification to deploy 4G services is proposed, which draws on crowdsourced data from a mobile app.

### A predictive model for network intrusion detection using stacking approach

• Computer Science
International Journal of Electrical and Computer Engineering (IJECE)
• 2020
An ensemble approach for network intrusion detection using a concept called Stacking, which lies in its finesse to generate fewer misclassifications pertaining to various attack vectors considered in the study.

## References

SHOWING 1-10 OF 15 REFERENCES

### Efficient coverage through inter-operator infrastructure sharing in mobile networks

• Computer Science
2013 IFIP Wireless Days (WD)
• 2013
This work is considered as a first tractable attempt to describe large-scale inter-operator infrastructure sharing which may be the key to enabling appropriate coverage in currently under-served areas, with effects on the digital divide.

### A Sharing- and Competition-Aware Framework for Cellular Network Evolution Planning

• Economics
IEEE Transactions on Cognitive Communications and Networking
• 2015
Using real-world demand and deployment data, this paper finds that the ability to share infrastructure essentially moves capacity from rural, sparsely populated areas to urban ones, with significant increases in resource efficiency.

### Trajectory aware macro-cell planning for mobile users

• Computer Science
2015 IEEE Conference on Computer Communications (INFOCOM)
• 2015
This work considers a novel approach that factors in the trajectories of mobile users as well as the impact of city geographies and their associated road networks for macro-cell planning in cellular networks and shows that the proposed trajectory utility maximization problem is NP-hard.

### Content consumption cartography of the paris urban region using cellular probe data

• Computer Science
UrbaNe '12
• 2012
This paper document the content consumption in Orange cellular network for Paris metropolitan area and numerically and statistically quantify the geographical distribution of content consumption with per-service classifications.

### Planning UMTS base station location: optimization models with power control and algorithms

IEEE Trans. Wirel. Commun.
• 2003
Two randomized greedy procedures and a tabu search algorithm for the uplink (mobile to BS) direction which is the most stringent one from the traffic point of view in the presence of balanced connections such as voice calls are proposed.

### Optimized LTE Cell Planning With Varying Spatial and Temporal User Densities

• Computer Science
IEEE Transactions on Vehicular Technology
• 2016
This paper proposes a novel method for the cell planning problem for fourth-generation (4G) cellular networks using metaheuristic algorithms to satisfy both cell coverage and capacity constraints simultaneously by formulating an optimization problem that captures practical planning aspects.

### The Mobile Data Challenge: Big Data for Mobile Computing Research

• Computer Science
• 2012
This paper presents an overview of the Mobile Data Challenge (MDC), a large-scale research initiative aimed at generating innovations around smartphone-based research, as well as community-based

• Computer Science
IEEE Transactions on Vehicular Technology
• 2011
Novel algorithms for joint uplink/downlink UMTS radio planning with the objective of minimizing total power consumption in the network are proposed and an efficient elimination algorithm is developed for classifying BSs that are critical for network coverage and QoS.

### Data for Development: the D4D Challenge on Mobile Phone Data

• Computer Science
ArXiv
• 2012
The datasets are based on anonymized Call Detail Records of phone calls and SMS exchanges between Orange's mobile phone users in Ivory Coast and the purpose of this paper is to describe the four datasets.

### Reality mining: sensing complex social systems

• Computer Science
Personal and Ubiquitous Computing
• 2005
The ability to use standard Bluetooth-enabled mobile telephones to measure information access and use in different contexts, recognize social patterns in daily user activity, infer relationships, identify socially significant locations, and model organizational rhythms is demonstrated.