Trojan Horse warning, as Cisco ‘gives away’ extensions to WLAN

Land Grab

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

The Register's Wireless LAN Channel

Cisco was accused today of attempting to create an alternative standard to WiFi in the wireless networking market, by creating a new "CCX compatible" logo.

The Cisco message is: "You need a smart 'edge' to the wireless Internet." But consultant Cees Links, a former vice-president at Agere, believes that the only people who definitely need that smart edge are Cisco people.

The giant networking company is anticipating the new Cisco WiFi architecture announcements next week, and has revealed that it is going to give away its CCX - Cisco Client Extensions - software standards to make the rival concept of "dumb edge networks" obsolete.

"This is the kind of big company play you can get away with if you dominate a market," said Links. "In effect, it will appear to give everybody access to high security features that Cisco alone has. But in fact, it will prevent other manufacturers of wireless access points - like Proxim and Symbol and so on - who won't have access to what CCX means."

Cisco Consultant Martin Cook said that his company fundamentally opposed the trend to centralised intelligence of wireless LANs, with a dumb edge. It made deployment and management more expensive, he claimed.

"When you're rolling out a WLAN and want to take some of the pain away from the difficult job of network deployment," said Cook. "If for example you take the business of managing the radio frequency problems - how are you going to do that, if you have a dumb edge? You have to have intelligence distributed around the network. We think you can't know anything about the RF environment if you have a dumb edge. We want intelligence in the AP."

Cook listed several silicon makers who produce WLAN chips, who have signed up for the CCX software. They include Intel, Atheros, Intersil, Texas Instruments, Atmel, Marvell and Agere, he said.

"Another example of the advantage of having intelligence distributed around the wireless LAN, would be fast roaming," Cook said. "If we have intelligence in the PC, in the access point, in the PDA, the handshakes that make up authentication don't have to take so much time; we can leverage the intelligence out there at the edge and improve performance. We can give our WLAN smarts to other people out there, so that the device can communicate as if it were a Cisco client, to the infrastructure."

Cees Links said: "The jury is out on whether a 'heavy' or a 'light' access point technology is best. But it almost certainly not in the best interest of the market to let Cisco dominate. What they're trying to do is to control the compatibility issues the way the WiFi Alliance controls them today."

The difference, said Links, is that the WiFi standard is open, but CCX is open only at the semiconductor level. "It's closed at the infrastructure level, so people like 3Com or Extreme or Symbol or Aruba or Trapeze would be unable to get access to CCX."

Cisco sees a need for a more intelligent infrastructure as key to its plans to sell mobile voice devices, using voice over Internet (VoIP) technology. And it believes it already has the key collaborator signed up in its push to claim dominance on WLAN technology.

"Who is going to be the key collaborator?" asked Cook rhetorically. "Intel. They will be out largest partner with respect to delivering; they are currently buying our access points, not as fast as Paul Ottolini at Intel would like because he doesn't have any money, he says - but they are already committed."

And Cisco believes that all Centrino based PCs will be CCX comformant.

Cees Links is the author of "Wireless LANs & Cisco's CCX: the Battle for Network Security" - a report looking at Cisco's role in developing secure networking.

Cees Links is President of Information Links B.V. He has been in the wireless LAN industry since it started in the 1980s. Most recently, he was Vice President of Wireless LAN Business for Agere Systems.

© Newswireless.net logo

Some recent NewsWireless.Net articles

Internet protocols come to the rescue of phone networks in Italy
Review of two (colour) Handspring Treos - one with phone, one without
Opinion: time to take action on phone masts

The Register's Wireless LAN Channel

Security for virtualized datacentres

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.