802.16 security: getting there?
โ Scribed by Bruce Potter
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 80 KB
- Volume
- 2004
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
The battle over the communications technologies used for the "last-mile" has been a long and strange trip.
Originally the market was dominated by dial-up circuits and leased lines (T1/E1). As technology advanced, DSL and cable service has become common and relatively cheap. However, infrastructure providers have had a difficult time meeting consumer demand. Over the last several years, wireless Internet service providers (WISPs) have popped up to provide high speed access to homes and communities throughout the world via radio transmission.
Until recently, there was no standardsbased, affordable wireless solution for WISPs. As part of the WiFi Alliance, many used the 802.11 protocol to deliver last mile bandwidth. 802.11, a local area network (LAN) protocol, is not designed to support a Metropolitan Area Network (MAN) architecture. But despite interference, bandwidth contention and security issues, WISPs chose WiFi because it exists and is inexpensive.
The Institute for Electrical and Electronic Engineers (IEEE), a standardsetting body for computer networking, created the 802.16 suite of protocols to fill the need for high-speed data communications in a MAN. 802.16 was designed for use in a carrier/provider environment where subscribers access the providers' core service via radio.
Unlike 802.11, 802.16 is not limited to just one set of unlicensed frequencies. Carriers who own their own frequencies can run 802.16 and provide wireless communications with much less interference. They can also transmit at much higher power levels, allowing communication at greater distance.
๐ SIMILAR VOLUMES
transfers to countries that lack adequate laws to protect personal information travelling over networks.