Feeds

WiMAX summit: 'Standards-plus' could harm 802.16 roadmap

But which roadmap will be followed?

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

This would be bad news for vendors that have put significant investment already in to fixed WiMAX, and for those that believe the big customers are waiting for mobility - and may not make the WiMAX move at all until they see an easy route to 802.16e. Some argue that the OFDM 256 PHY must be preserved in order to make the 802.16-2004 a valuable platform. WaveSat, for instance - the first chipmaker to get 802.16 compliant silicon to market - is adamant that sub-channelization can be supported in OFDM 256 and that this would be as strong a basis for mobility as SOFDMA.

This decision needs to be made, one way or the other, in the near future before operators will have a clear picture of how they can move towards mobile WiMAX. Until they do this, they will remain confused and frustrated and are unlikely to make major investments without a clear route forward.

The 'd+' route

Some, of course, especially in the wireline community, are interested in adopting any flavor of WiMAX as early as possible in order to expand broadband services into new markets. For these, the capabilities of 802.16-2004 are what matters and they already have high - some would say inflated - expectations of what standards certified gear will deliver when it ships in the autumn. Aware of the danger of disappointing early adopters at a time when WiMAX is already facing something of a backlash, chipmakers and vendors are racing to build as much functionality as possible into the platform.

French chip start-up Sequans is one example, with what it calls its 'd+' platform. The company is seeking to differentiate itself from the larger silicon vendors with a focus on some key operator criteria such as advanced quality of service, and on a highly integrated system-on-a-chip (SoC) that will be suitable for low cost micro base stations and small consumer devices. Head of marketing Ambroise Popper knows that the real volume will come with 802.16e and the big OEMs, and the company has an 'e' development project underway, but he believes there is a two-year opportunity for d+ devices delivering services such as voice over IP and video on demand. Sequans also supports wider channels than Intel, up to 28MHz, which will be important for backhaul applications.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.