73
WiMAX Clemens H. Cap http://wwwiuk.informatik.uni-rostock.de http://www.internet-prof.de http://www.wimax-prof.de © 2005 C. Cap

WiMAX - Wirelesswireless.ictp.it/school_2005/lectures/cap/WiMax-Cap.pdf · zIn a nutshell: Using Wimax is programming IP sockets Security is a seperate layer zRecognized by its own

Embed Size (px)

Citation preview

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

WiMAX

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.de

http://www.internet-prof.dehttp://www.wimax-prof.de

© 2005 C. Cap

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

For those believing in acronyms

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 3

The basic idea

Wireless Microwave Access

Wireless Metropolitan Access

The wireless backbone / MAN

Think of it as Wi-Fi on steroids. Business Week

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

For the pedestrian

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 5

Application Modes

In WLANAccess PointAd HocWireless Distribution / Mesh

In WiMAXBasestation Standard WiMAX way of life 802.16Mesh Optional WiMAX way of life 802.16aMobile Future WiMAX way of life 802.16e

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 6

WLAN Application ModeAccess Point

Access Point

Client Client

Client

All communication uses APAP may serve as bridge to wired worlAP may serve as firewallMay use different channels

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 7

WLAN Application ModeAd Hoc

Client Client

Client

Direct communicationMust use same channel

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 8

WLAN Application ModeWireless Distribution System / Mesh

Provide or establish inter-AP linksAtomated routing through the mesh

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 9

WiMAX Application ModeBasestation

Basestation

Subscriber Station Subscriber Station

Subscriber Station

All communication uses BSBS may serve as bridge to wired worlVery similar to access point mode

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 10

WiMAX Application ModeBasestation

Basestation

Differences to WLAN:• Its rather a larger area• Its rather sectored• Its rather more clients

Sector 1 Sector 2

Sector 3

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 11

WiMAX Application ModeMesh

Differences to WLAN:• Std: Mesh Nodes ::= nodes with ext. Connectiv• More complicated routing• More complicated MAC layer for air access

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 12

WiMAX Application ModeMobile

Properties:• Metropolitan Mobility: ~ 75 km / h speeds• Roaming between Basestations• Meshing with Subscriber Stations

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 13

Application Areas (1)

Broadband Access: T1 / E1 and better, but without wires, for high end usersOutdoor antenna on the roof, Clear Line of SightStationary applicationBasestation to Subscriber Station Traffic

Wireless Last Mile: Yet another consumer last mile solutionSold as W-DSL in combination with WLANAlso: Dropping WLAN, WiMAX to the home userIndoor antenna, Non Line of SightMeshing

Mobile Universal Serv.: Yet another mobile comm (phone) solutionCompetition for UMTSRoaming

802.16

802.16a

802.16e

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 14

Application Areas (2)

Dedicated radio link: Standardized technology for a classical problem

Developing Countries: Entry technology into high speed communicationsLow cost equipment, no infrastructure required„Low barrier“ technology

Emergency, Security and SurveillanceEasy, quick field deploymentBandwidth for video surveillance possible(Good ?) encryption includedDoes not require infrastructure operator

closed circuit operations possiblelow cost (only the equipment)

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 15

Factors for Application Areas

0

++

+

+++

+

+

Standard

+++

+++

+++

+

+++

++

Cost

+++

++

+++

+++

+

+++

Performance

InteroperableScaleability

Area

+++

+

+

++

++

+

0Emergency, Security and Surveillance

+DevelopingCountries

0DedicatedRadio Link

+++Mobile Universal Service

+++WirelessLast Mile

++BroadbandAccess

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

For the standards people

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 17

The families

PANPersonal Area Network

LANLocal Area Network

MANMetropolitan Area Network

WANWide Area Network

802.15

802.11

802.16

802.20

802.16e

802.16a

HiperPAN

HiperLAN

HiperMANHiperACCESS

GSMUMTS

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 18

Standardization Activities (1)

802.16 Original standard10 - 66 GHzLine of sight, Point to point

802.16a Extension to 2-11 GHzNon line of sight, Point to multipoint

802.16REVd Merger of 802.16 and 802.16aErrata andSystem Profiles

802.16e Extension for mobility for vehicular speedsExtension for roaming

802.16c Amendment for 10-66 GHz system profiles

802.21 Media independent handoff ( 802.3, 802.15, 802.11, 802.16 )

802.20 Mobile Broadband Wireless Access MBWA» Compares to 802.16e» Looks at high speed mobile user up to 250 km / h» Standardization lagging behing 802.16

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 19

Certification (1)

Problem: IEEE 802.16 is yet another flawed standardVery broad and occasionally vagueOutlines messages and possibilitiesLacks algorithms, procedures, clear implementation guaranteesDoes not define compliance testsWill not automatically lead to interoperable systems

WiMAX Forum: Goal is „to ensure compatibility and inter operability“Trademark „WiMAX ForumTM Certified“Different from non protected „WiMAX Compliant“Certification Work Group defines interoperability standards & proceduresMore than 230 members (as of Q1 2005)Quarterly growth rate of more than 40%

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 20

Certification (2)

Certification Process of Wimax ForumFirst „WiMAX ForumTM Certified“ systems available in Q1 2005Ensure interoperability with ETSI HiperMAN standardsCetecom Lab in Spain selected as certification labRevised target date for first certification: July 2005

ProcessForum defines PICS (Protocol Implementation Conformance Statements)Forum defines Test SuitesLab conducts the tests

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

For the architecture and technical people

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 22

The three 802.16 Standards

1 – 3 miles3 – 5 miles, max 30 miles1 – 3 miles

Metropolitan MobilityRoaming

FixedFixed

15 Mbps75 Mbps32 – 134 Mbps

2 – 6 GHz2 – 11 GHz10 – 66 GHzNear Line of SightNear Line of SightLine of Sight

802.16e802.16a802.16

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 23

Compared to 802.11 (1)

ndwidthensing

alability

oor vstdoor

nge

riterion

High75 - 100 Mbps – 134 MbpsEfficiency 5 bps / Hz

Low to medium1 Mbps - 11 Mbps - 54 Mbps - 108 MbpsEfficiency 2,7 bps / Hz peak

Licensed and unlicensed bandsUnlicensed bands

ExcellentVariable bandwidth 1.5 MHz – 20 MHzOnly limit is available spectrum

PoorFixed bandwidth of 20 MHzFixed channelsCertain degree of channel overlap

Indoor (16a) Outdoor (16, 16e)PHY tolerateshigh multi-path delay spread (10 µsec = 3 kmTrees, buildings, persons

Preferably Indoor PHY tolerates only low multi-path delay spreads

Considerably largerOptimized for 7 – 10 kmUp to 50 km range

Very smallOptimized for 100 m

802.16802.11

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 24

Compared to 802.11 (2)

S

curity

AC Layer

riterion

Supposedly goodNevertheless flawed in principle3DES, AES

Mostly questionableVarious attempts on improvementsWEP, WPA

Grant based MACContention based MAC: CSMA / CA

Good QoS4 QoS classes for voice & video

No QoS802.11e upcoming

802.16802.11

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 25

Layer Architecture

Physical LayerModulationChannel and frequency selectionPower ControlTransmit & Receive

Security (Standard: Privacy) Layer

Main MAC Layer

MAC Convergence Layer

AuthenticationKey Exchange and Re-KeyingEncryption

FramingSlot ReservationFragmentation & PackingRetransmission (ARQ)Quality of Service (QoS)

ATMEthernet, VLANPPPIPv4, IPv6

Specific Service Access Point

MAC Service Access Point

PHY Service Access Point

User

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 26

Layer ArchitectureObservations

User will always use a convergence layerIn a nutshell: Using Wimax is programming IP sockets

Security is a seperate layerRecognized by its own right, which is good when compared to 802.11Is placed just above the PHY, which is a good place for encapsulationBut: It has a number of flawsOne of the problems: Many management messages are not encrypted

ProfilesFor every layer there are several variants defined by profiles5 PHY variants2 MAC variants

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 27

Layer ArchitectureExisting Profiles

MACPoint-to-MultipointMeshing

PHYWirelessMAN-SCWirelessMAN-SCaWirelessMAN-OFDMWirelessMAN-OFDMAWIrelessHuman

What we expect them to beFrom the introduction to this talk

Quite a number of intriguingDifferences regarding supported features

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

For the open networkers

community networkers

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 29

Open Source

Linux: We are doing our own operating systemGcc: We are doing out own compilerWiki: We are doing our own contentWikiNews: We are doing our own news

CopyLeft:Everyone has access to the state of the artEveryone can contribute, add and modifyOwn contribution, if distributed, is again „CopyLeft“

Effect:We all participate for our common benefitEveryone can participate on identical conditionsNoone can monopolize or block development

Sufficient proof that it can be d

And it can be done successfull

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 30

Open Net

OpenNet: We are doing our network

Idea:Every terminal node also is routing nodeEvery additional consumer device builds upon the infrastructureLet us assume a sufficient density of nodes

Result:We have a working network – without a providerWe are structurally autonomousNo bit-tax, no pay-per-use (but no space for illegal stuff as well !)

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 31

OpenNet and ClosedNet compared

The net belongs to the provider / carrierThe net belongs to its users

Monopolists and investors which must be regulated and watched carefullyNo monopolists, no investors, no market dominance

Commercial profiling of users, big brother is watching us, data harvesting on citizenNo centralized provider, less chance for big brother

Return on investment for the investorCreating and using value by the user

Communication as supervised, regulated and deregulated, commercialized goodCommunication by us all and for us all

Every bit pays (for the provider)Its out net, out infrastructure and our bits

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 32

Djursland.net

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 33

MIT Roofnet

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 34

BerlinBackbone

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 35

BrisbaneMesh

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 36

SidneyWireless

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 37

and of course at Rostock ☺www.opennet-forum.de (up)

www.opennet-initiative.de (to come)

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 38

Just a thought

Imagine WiMAX attached anonymous storage

For WLAN it‘s already there:Asus Spacelink 802.11g with 500 GB USB drive and anonymous ftp

Now add Freenet concepts encryption and anonymity

Question: How could one possibly & practically censor or „regulate“ this?

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 39

The big chance is Wimax

Yesterday: CableLarge investmentsLarge distancesLarge data rates

Today: WLANLow investmentsMedium distancesMedium data rates

Tomorrow: WIMAXLow investments (hopefully; shared)Large distancesLarge data rates

100,- Euro50 Km2 - 70 Mbit / sec

100,- Euro200 Meter2 - 54 Mbit / sec

2004: First prototy2005: Chipset by I2007: In every Lap

But not at the same time

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 40

What we can do (1)

Embrace technologyUnderstand standard (complicated & solid 900+ pages)Educate ourselvesMake experiences with base stations (not only with subscriber stations)Write OO model for APIDanger: WiMAX stays closed & controlled know how (such as in GSM & UMTS)

Develop applicationsVoice over WiMAXGames over WiMAX (use broadcast features)Community content over WiMAXFree, open, anonymous layers for WiMAXMust have many open source – open content applications

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 41

What we can do (2)

Regulatory discussionMust obtain sufficient open spectrum for meshing and roamingMust prevent further regulation of applications

eg: VoIP, key escrow, content censorshipMust deploy anonymous & free content networks (Freenet, Eternity service, etc.)

Opensource WiMAXExperiment with MAC and PHY APIsWrite OO model / simulator for MAC and PHY APILinux driver for WiMAX adaptersLinux enhanced WiMAX equipment (presently: FPGA & DSP, ASIC)WiMAX enabled Linux equipment

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 42

Just a thought

Imagine WiMAX attached anonymous storage

For WLAN it‘s already there:Asus Spacelink 802.11g with 500 GB USB drive and anonymous ftp

Now add Freenet concepts encryption and anonymity

Question: How could one possibly & practically censor or „regulate“ this?

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

Let us peek into the standard

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 44

PHY Layer

OFDMWhich is a topic by itself

Dynamic Frequency SelectionChose a channel to combat interferenceIn certain bands mandatory (military, radar)

Transmit Power ControlReduce EIRP so far as possible

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 45

Frequencies (1)

Not so easy– even if restricted to the US view

– and restricted to 2 – 11 GHz

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 46

Frequencies (2)

Licensed 2.5 GHzAlready allocated in US, Mexico, Brazil, AsiaOngoing efforts in other countries

License exempt 5 GHzLicense free in the USOngoing efforts for opening this in other countries

Licensed 3.5 GHzLicensed in more than 100 countriesGenerally requires license

Others to be harmonized soon

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 47

Frequencies (3)

Just what is a license?

Austria: Auctioned License17 Frequency allocations (3.5 Ghz band)Held by 4 companiesAuctioning yields total amount of 464.000 Euros

Germany: Licensing LightNo auctioning (too expensive)No formalized process (too inflexible)In case of frequency conflict: Look for local, pragmatic solution

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 48

Modulation Schemes Used

hannelandwidths

t Rate

odulation

20, 25 and 28 MHzSelectable1.25 to 20 MHz

20, 25 and 28 MHz

< 15 Mbps at5 MHz Channelization

< 75 Mbps at20 Mhz Channelization

32 – 134 Mbps at28 MHz Channelization

QPSK16 QAM64 QAM

OFDM 256QPSK16 QAM64 QAM

QPSK16 QAM64 QAM

802.16e802.16a802.16

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 49

Downlink Frames

Downlink Frame consists of1. A preamble for synchronization2. A downlink map telling the subscriber which part of the payload is intended for it3. An uplink map telling the subscriber when it may access the air4. A payload

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 50

MAC Layer

Generic MAC HeaderPayload Optional CRC (32 bit CCITT standard)

Payload can containAdditional headers (depends on type field in Generic MAC Header)MAC management messagesUser Data

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 51

MAC LayerGeneric Mac Header

Distinguish from other headers

Payload encrypted?

MPDU Length (max 2047 Bytes)

Optional CRC present at end of PDU

Index of key to be used

Additional subheaders in payload?

Connection Id

Additional Header Checksum

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 52

MAC LayerOberservations based on Generic Header

MAC PDU length less than 2k BytesBut fragmentation and packing options are available

More than one encryption key can be activeWe have to say which one we want to useWe must change keys from time to timeBut during the change of one key we always have another valid keySo we do not spend (much) time on rekeying overhead

Basic item of management is the connectionCompare TCP: Connection ID is 4-tuple of (IP1, Port1, IP2, Port2)

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 53

MAC LayerBandwidth Request Header

Distinguish from other headers

Is never encrypted

Bandwidth Request inNumber of Bytes

Type of request0 incremental1 aggregate

Connection Id

Additional Header Checksum

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 54

MAC LayerObservations based on Bandwidth Request Header

Bandwidth requests come as a headerAs part of an empty payloadPiggyback as part of a payload (even of a different connection id to the same subscriber)

Bandwidth requests are never encryptedWhich is not a safe idea (and they are not authenticated either !)Which is more convenient since everyone sees the bandwidth requests

Note: A bandwidth request is given in bytes not in bytes per time unitWhich is an abuse of language, but otherwise fine

Request type can be incremental or aggregateincremental (what subscriber needs in addition)or aggregate (what subscriber needs in total)Choice makes life easier for the streaming people

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 55

MAC LayerPacking and Fragmentation

Fragmentation (Splitting MAC level packets)A MAC SDU can be broken into individual partsThe parts are transmitted independentlyIndication is done by a special subheader

Packing (Aggregating MAC level packets)Multiple MAC SDUs or even fragments can be packed into one SDUIndication is done by a special subheader

AdvantagesMore efficient use of available slotsBandwidth requests can be issued earlier

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 56

Network Entry

Getting access to the networkSubscriber scans for downlink from Base and synchronizes PHYSubscriber identifies free uplink slotSubscriber informs Base of its capabilities and presencePrimary management connections are establishedSubscriber provides proof of authorizationKey exchange protocols establish valid keysSecondary management connections are establishedAdaption layers are configured (eg: IP)

Keeping access to the networkPeriodic exchange of management messagesCheck channel conditionIf necessary, switch PHY or start handoff (for mobile users)

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 57

Security Sublayer

Identification of the SubscriberAsymmetric keys with PKI and certificate structure

Authentication Key AKSymmetric key for distributing and deriving further keys

Key Distribution Key KEKDerived from Authentication KeyUsed to distribute Traffic Encoding Key

Traffic Encryption KeyUsed to encrypt traffic

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 58

Double Layer Hybrid Approach

Problem 1: Asymmetric encryption takes too much CPU powerSolution 1: Encrypt symmetric key with asymmetric method

Symmetric methods are fasterOccasionally provide a new symmetric key

Problem 2: Providing a new symmetric takes too much CPU powerSolution 2: Introduce another layer of indirection

Key redistribution is fasterOccasionally provide a new key at both levels

ResultNeed a two layered key-distribution / re-keying approachThat is esenntially the contents of the Privacy sublayer

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 59

Problems left

Base not authenticated, allows man-in-the-middleMAC header not encrypted, allows attacks & fakes on MAC headersMAC Management Messages not encrypted, allows attacks & fakes on MessagesMain (or only?) focus is protection against theft of servicePermissions bound to MAC address of subscriber instead of to userSubscriber based production of certificates not described, allows attacks on

randomization scheme and key generatorSubscriber may have factory installed keys (which might be escrowed)Security generally is handled by the operator and by the base station

thus scheme requires trusting the operator and the base stationStandard is not fully clear and not sufficiently formally defined

There are not yet fully compliant and certified products... but there are already papers describing the weaknesses of the security

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 60

Angry remark concerning security

IEEE did not get WEP security rightIEEE did not get Wimax security rightNSA must love the security guys from IEEE,

since they make their work much easier

The newest standard documents in PDF format are sold for $$$and are protected by a node locked digital rights management

The department bought one for my computer at workThe department bought a second one after my motherboard went deadI bought a third for my first computer at homeI would need a fourth one to take along with my laptopAnd after a minor reconfiguration of my two PCs at home I spent 2 hours undoing the relevant changes to be able to read my third copy again

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 61

Why?

Why does a professional institution

living from the dues of their members

seem to

always

get the wrong things right

and the right things wrong

when it comes to security

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX

For the marketing people

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 63

Tons and tons of marketing studies

Found on the web:„Wimax presently is discussedin terms of dollars and marketopportunities, not in terms ofequipment or solutions“

Presently the best way to makemoney on Wimax is to publisha study on how to make moneyon Wimax

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 64

Why Wimax will be a success

Why Wimax will not be a success

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 65

Why Wimax will be a success

Good Standard: IEEE Standard and Wimax interoperablility Certification

Well regulated: Development accompanied by evolution of frequency regulation

Technics:Broadband speed for NLOSHigh number of simultaneous sessionsSupport for mobility, roaming and meshingHigh spectral efficiencyGood quality of service

DemandDemanded by carriersSolves last mile problemNew deployment models

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 66

Why Wimax will not be a success

No products: The products are coming too lateNo proof of product yet

Regulation: Is going on but no clear cut and reliable results yet

Counter demand:The UMTS guys and the license / auction fees they had to pay

Development: Yet another hype to break down early enough to ruin many?Expectations already risen too high? (NLOS to 70 km at 100 Mbits for 1$)

Unresolved issues:Free spectrum applications?High frequency devices (66 GHz)?Handoff into WLAN, UMTS, GSM

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 67

Market Expectationsfor wired broadband

World Wide Number of Broadband Wires

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 68

Market Expectationsfor wireless broadband

World Wide Revenues from Point to Multipoint Broadband Wireless Access

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 69

Market Expectationsfor number of subscribers

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 70

Equipment

Basestations and Subscriber StationsRedline Communications First Base StationAlvarion BreezeMAX ETSI HiperMAN compliant

ForthcomingChipset (Intel Rosedale / Centrino 2; Wavesat)AdaptersMotherboard ModulesMobile phones, laptops, PDAs

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 71

Alvarion

Product Line BreezeMAX

Base Station EquipmentModular concept: Several components for a 19“ rackOne component for every sector servedSeparation indoor access unit and outdoor amplifier unitMicro base station available for rural areas

Customer Premises Equipment (CPE)Broadband Data CPEBroadband Voice CPE

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 72

Redline Communications

30 series50 series

Pre 802.16 systen

100 seriesClaims to be first fully 802.16 compatible systemPresently only basestation

Clemens H. Caphttp://wwwiuk.informatik.uni-rostock.dehttp://www.internet-prof.de

WiMAX 73

Time Line

Q3 / 2004Outdoor installations for 802.16Spectrum discussions

2005Q1: WiMAX certification startsIndoor installations for 802.16aFirst implementations with 802.16eNomadic installation witout roamingIntel Chipset Rosdale and Centrino 2First USB / Cardbus adapters

2006Higher speeds for 802.16Roaming for 802.16eWiMAx Laptops and PDAs

2007WiMAx phones and appliances

Corporate, make money approachMay be bad for SME & community nets

NOT MET

NOT MET