Feeds

Seattle plans library Wi-Fi network

Potential conflict with any City WLAN? WiMAX?

Maximizing your infrastructure through virtualization

Seven branches of the already-wireless central Seattle library are going Wi-Fi. The announcement focuses on warnings that "no technical help is available" - but further south, in the San Francisco Bay area, the Joint Venture Silicon Valley organisation is planning to cover 1,500 square miles with 802.11 signals. What happens when such projects collide?

According to Glenn Fleishman the Joint Venture group has yet to reveal any details - it hasn't even officially announced anything on its own website - but is organising a lobbying effort to local communities.

The group, headed by Intel, seems to be focusing on mobile, according to a local paper report, says Fleishman. That raises the real question of what the technical platform will be, because while Intel has done some work on mobile Wi-Fi, it is spending a lot of effort planning for mobile WiMax - a confusingly similar technology, which has yet to be defined by the IEEE.

Neither report, it seems, is talking of the inevitable spectrum conflict looming as domestic Wi-Fi proliferates, and City Wi-Fi spreads through the same areas.

The issue is discussed by ABI Research's senior analyst of wireless connectivity research, Philip Solis, who points out that the Qualcomm-Flarion merger has gone through, providing WiMAX with a possible competitor in 802.20.

Solis has contributed to a recent paper from the company on the status of WiMAX, now that the WiMAX Forum has announced that some suppliers have put equipment for WiMAX certification for 802.16-2004, and passed.

"There is a long queue of companies waiting to undergo the same certification process. Then, they can proceed to 'wave 2', covering security and quality-of-service, and when they too are certified, we can expect to see larger numbers of products actually reaching the market," was one comment. But Solis added:

"The picture is complicated, however, by a resurgence of rival wireless broadband access technology 802.20, based on frequency-division duplex technology developed by Flarion. With the closing last week of Qualcomm's acquisition of Flarion, 802.20 may get a new lease on life. Qualcomm will almost certainly attempt to rally support from other industry participants, but many companies had abandoned 802.20 to support 802.16e ."

 Tags: and

Copyright © Newswireless.net

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.