Feeds

HomeRF goes big on cordless phones

Endorses 802.11a

  • alert
  • submit to reddit

High performance access to file storage

The HomeRF Working Group today announced a revised messaging standard, reflecting a "new emphasis on voice".

The shift reflected in the upcoming HomeRF 2.1 specification, directs attention to cordless phones, a market which is 10 times bigger than WLAN, according to the working group. This emphasis is a differentiator from wireless data networks designed for enterprise offices, the HomeRF group says.

HomeRF 2.1 is not an either/or but is designed to complement other wireless standards, including 802.11.
And just because, HomeRF is concentrating on voice, this doesn't mean it can't do the application, entertainment, data apps convergence thing too, the working group says

For high-bandwidth entertainment apps, HomeRF is preaching 5 GHz, and it endorses 802.11a as the standard for this. The group will write application briefs, explaining how to bridge between 2.4 GHz and 5 GHz technologies, and how to handle QoS (Quality of Service) issues. The briefs are equally applicable to HiperLAN-2, 802.11h, and proprietary 802.11a extensions, the group says.

But if 802.11a is the wireless standard for high-bandwidth apps, why not go the whole hog and use it for all data apps? Cost, range, reliability and power consumption are the reasons why not.

Also HomeRF's incorporation of DECT technology for cordless phones is cheap and reliable. HomeRF 2.1 will increase the number of active handsets with same or better voice quality - v2.0 supports up to eight phone lines, eight registered handsets and four active handsets. 2.1 will also increase the 30m range through the use of wireless repeaters and it supports voice roaming. The use of frequency hopping will ensure effective security and interference immunity, the working group says. Adaptive frequency hopping on
the 2.4 GHz ISM band is currently illegal in the US, but the group notes proposals from the FCC to change this.

HomeRF 2.1 will also double data capacity, with increased speeds of up to 20Mbps. The group is "evaluating the need for such enhancements at 2.4 GHz in light of its planned support of 5 GHz". ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.