SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : The *NEW* Frank Coluccio Technology Forum

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Frank A. Coluccio who wrote (20775)4/12/2007 3:02:14 PM
From: Rob S.  Read Replies (1) of 46821
 
The mechanisms for doing handoffs by small base stations that can operate as localized networks or extensions are still being worked on within 802.16j. 802.16m and LTE efforts. The general scheme is to have a layering of 'distributed network intelligence' or smart networking. Most of the concepts are not new as they are used in wired or existing wireless networks. But the devil is always in the details as to how the various layers will play into the overall management of the system. There are trade offs between allowing discrete network extensions or localized networks have more authority to sign on users and set quality of service. The more authority given to smaller remote stations/routers, the more memory, processing power needed. That also complicates management, billing dispensing of services, particularly higher value content. And there are different types of hand-offs that can be supported with the more seamless being the more costly to implement in terms of processing and network management.

The more autonomous the remote stations are, the more resilient/redundant the network. The military and emergency services participants want the flexibility to be built into WiMAX to allow highly self-configuring, redundant and resilient networks to be dropped into place (in some cases literally) and up and running within minutes or hours. The extreme of this approach is the 'sea of sensors' and field communications networks in which the networks have all the intelligence needed to securely sign on users and allocate service without external management other than what has been pre-programmed or can be field configured. But that type of network is not suited to a public network which much set up and monitor usage be and are tied into established billing systems so that each user is charged accordingly for specific services and content they have subscribed or authorize to purchase.

So, it looks like the standards will be devised to accommodate several types of network deployment scenarios and mechanisms to provision and account for usage and payment, mostly dictated externally to the localized network. There will be flexibility to set up VPNs or specialized networks with discrete sets of subscribers and services: 'Bahama vacation channel - take advantage of our discounts at select merchants that appear on your Vacation Paradise device screen as you tour our grand Island.' I guess devices can also be made into wireless debit payment 'cards' but that can be a software service that is self-contained within the various subscriber units. But that enters up the issue of how service providers will get paid if the service is provided by eBay/PayPal, Google or other Internet provider that can run without provisioning by the operator.

Some of the description of how these networks can be deployed are still very fanciful ideas. But the system will be capable of fillings many types of uses, from mundane things like monitoring utility meters and traffic to unique applications that provide sets of services or entertainment to pockets of users. Several companies are working on various scale of base stations/routers that are designed to service various constituencies. The fundamental proposition is creating very cost effective, common development environment to enable the applications. The market will decide if each one makes sense or not.

- Robert Syputa
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext