Feeds

Wi-Fi starts getting chummy with its peers

Sinks teeth into Bluetooth market

Boost IT visibility and business value

The Wi-Fi Alliance has started certifying devices as being compatible with the new Wi-Fi Direct protocol. The protocol allows devices to connect to each other without an access point.

The technically literate might cry that ad-hoc connections have been part of Wi-Fi since its inception, but this is different - although not very different. Using Wi-Fi Direct, users can browse nearby devices and connect to them at the push of a button, automatically encrypt those connections - and even bring other devices into a little group. It's just like Bluetooth, only faster.

But that's not how the Wi-Fi Alliance sees it of course. In the world of the Alliance there is no Bluetooth, and the things that Bluetooth is used for are just impossible without Wi-Fi Direct - as the promotional video demonstrates:

So now we have the first Wi-Fi-Direct-supporting Wi-Fi cards, and a couple of access points (which surely defeats the object, though who are we to say). But it will be a while before Wi-Fi Direct is ready to replace the incumbent Bluetooth.

Bluetooth leaps about the 2.4GHz band like a gnat on speed, while Wi-Fi of all flavours sit on a single channel and interference be damned. Bluetooth also has an extremely comprehensive sniffing protocol by which devices can be filtered by capability or familiarity, something that has been refined over many years. It now even allows devices to create an ad-hoc Wi-Fi connection, if speed is that important to them. Wi-Fi Direct leaves all that to the software, which risks presenting the user with an inconsistent experience.

But Bluetooth has never really taken off in the USA, partly because in Europe the phone shops demanded that operators gave support for Bluetooth in handsets ('cos the margin on a Bluetooth headset is so attractive). American shops didn't have such sway with the operators and even now Bluetooth isn't widely used.

Wi-Fi is a very respected brand, and that's worth a lot. Taking on Bluetooth directly does risk complicating the experience, and it will be a brave manufacturer who decides to drop Bluetooth support on the basis that Wi-Fi can now do everything. ®

Seven Steps to Software Security

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.