Feeds

Seattle plans library Wi-Fi network

Potential conflict with any City WLAN? WiMAX?

Beginner's guide to SSL certificates

Seven branches of the already-wireless central Seattle library are going Wi-Fi. The announcement focuses on warnings that "no technical help is available" - but further south, in the San Francisco Bay area, the Joint Venture Silicon Valley organisation is planning to cover 1,500 square miles with 802.11 signals. What happens when such projects collide?

According to Glenn Fleishman the Joint Venture group has yet to reveal any details - it hasn't even officially announced anything on its own website - but is organising a lobbying effort to local communities.

The group, headed by Intel, seems to be focusing on mobile, according to a local paper report, says Fleishman. That raises the real question of what the technical platform will be, because while Intel has done some work on mobile Wi-Fi, it is spending a lot of effort planning for mobile WiMax - a confusingly similar technology, which has yet to be defined by the IEEE.

Neither report, it seems, is talking of the inevitable spectrum conflict looming as domestic Wi-Fi proliferates, and City Wi-Fi spreads through the same areas.

The issue is discussed by ABI Research's senior analyst of wireless connectivity research, Philip Solis, who points out that the Qualcomm-Flarion merger has gone through, providing WiMAX with a possible competitor in 802.20.

Solis has contributed to a recent paper from the company on the status of WiMAX, now that the WiMAX Forum has announced that some suppliers have put equipment for WiMAX certification for 802.16-2004, and passed.

"There is a long queue of companies waiting to undergo the same certification process. Then, they can proceed to 'wave 2', covering security and quality-of-service, and when they too are certified, we can expect to see larger numbers of products actually reaching the market," was one comment. But Solis added:

"The picture is complicated, however, by a resurgence of rival wireless broadband access technology 802.20, based on frequency-division duplex technology developed by Flarion. With the closing last week of Qualcomm's acquisition of Flarion, 802.20 may get a new lease on life. Qualcomm will almost certainly attempt to rally support from other industry participants, but many companies had abandoned 802.20 to support 802.16e ."

 Tags: and

Copyright © Newswireless.net

Intelligent flash storage arrays

More from The Register

next story
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
Surprise: if you work from home you need the Internet
Buffer-rage sends Aussies out to experience road rage
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
MOST iPhone strokers SPURN iOS 8: iOS 7 'un-updatening' in 5...4...
Guess they don't like our battery-draining update?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.