Wi-Fi. Metro Part 1. Metropolitan based Wi- Friend or Foe?

Similar documents
Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless technology Principles of Security

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless# Guide to Wireless Communications. Objectives

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Guide to Wireless Communications, Third Edition. Objectives

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Chapter 10: Wireless LAN & VLANs

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Technical Introduction

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless# Guide to Wireless Communications. Objectives

Overview of Wireless LANs

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

Wireless Technologies

Wireless Communication and Networking CMPT 371

Alternate PHYs

1. INTRODUCTION. Wi-Fi 1

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors

802 Wireless Access Techniques Overview

Wireless Networking Basics. Ed Crowley

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Network+ Guide to Networks 6 th Edition. Chapter 8 Wireless Networking

IEEE Romel Rudyard J. Lucentales, ECE 5

Wireless Local Area Network (IEEE )

Wireless networking with three times the speed and five times the flexibility.

Wireless Local Area Networks. Networks: Wireless LANs 1

The Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004

Chapter 3.1 Acknowledgment:


Wireless Networks

MSIT 413: Wireless Technologies Week 8

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Wireless LAN USB Super G 108 Mbit. Manual

C H A P T E R Overview Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Mac OS OL

Wireless LAN -Architecture

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

Wireless and Mobile Networks 7-2

Overview of IEEE Networks. Timo Smura

Wireless Communication and Networking CMPT 371

Product Brief: SDC-EC25N n ExpressCard Card with Integrated Antenna

DRAFT. Wireless Networking. Introduction

Feature. What exactly is WLAN? More reading:

Wireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.:

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

IEEE Wireless LANs

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

WIRELESS USB 2.0 ADAPTER. Manual (DN & DN )

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Wireless Standards a, b/g/n, and ac The family explained

Past, Present, and Future WiFi Standards and Technologies. Max Slater Davidson Academy of Nevada

Computer Networks. Wireless LANs

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Data and Computer Communications. Chapter 13 Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Purpose of this book. Chapter 1: Where to Begin

U S E R M A N U A L b/g PC CARD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

Everybody s connecting.

IEEE Overview (2)

Attack & Defense in Wireless Networks

Functions of physical layer:

Wireless Communications

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Hardware Capabilities. Product Brief: SDC-PC20G g PCMCIA Card with Integrated Antenna

IEEE Wireless LAN draft Standard

Product Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors

Product Brief: SDC-PC22AG a/g PCMCIA Card with Integrated Antenna

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

802.11g PC Card/USB Wireless Adapter

Wireless Local Area Networks (WLAN)

Subscriber Management -Billing data - Authentication NAP. Backhaul Access. Backhaul. Backhaul Access CCU BaseT CCU3000 B/U CCU3000

A Study Wireless Communication Domain

Local Area Networks NETW 901

Wireless Communication

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Mohammad Hossein Manshaei 1393

300M MIMO Wireless-N PCI-E Adapter

Data and Computer Communications

SEN366 (SEN374) (Introduction to) Computer Networks

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Wireless Local Area Networks (WLANs) Part I

Chapter 6 Wireless and Mobile Networks

What is wimax How is it different from GSM or others WiMAX setup Wimax Parameters-ranges BW etc Applns Where is it Deployed Who is the operator

Product Brief: SDC-MCF10G g Miniature CF Module with Antenna Connectors

3.1. Introduction to WLAN IEEE

COPYRIGHT & TRADEMARKS

Transcription:

Metro Part 1 Wi-Fi Friend or Foe? The number of municipalities getting into the Wi-Fi game has more than tripled in the past two years. Worried yet? Part 1 in a two-part series. By Christopher Skarica, Lindsay Broadband, and Chris Busch, Incognito Software Metropolitan based Wi- Fi networks using unlicensed spectrum are now deployed in a large number of major metropolitan centers with many more deployments upcoming. Millions of notebook PCs have Wi-Fi capability built in, and it is embedded in most, if not all, 22 september2007 new mobile computing platforms. More importantly, low cost, long range, indoor and outdoor fixed wireless customer premises equipment (CPE) devices that utilize Wi-Fi technology for network access have also emerged. With new technology developments that combine automated wireless CPE device provisioning and customer billing with outdoor Wi-Fi network hardware, the threat to the cable industry from competitive broadband providers is unmistakable. The choice facing cable telecommunications providers is stark. Use existing right of ways, HFC infrastructures and unlicensed spectrum to provide your own metro Wi-Fi networks, or risk being overbuilt by municipalities and/or

alternative service providers within your licensed service area. Unlicensed Wi-Fi technology, therefore, can be both friend and foe. For cable operators to befriend Wi-Fi, however, they must first understand it. They translates to every member of an operator s technical team. The first of this two-part technology discussion provides an education on the Institute of Electrical and Electronics Engineers 802.11 standard. Next month s installment will take a closer look at the available networking technology, the imminent threats and successful strategies. What is 802.11? Developed by the IEEE and ratified in 1997, 802.11 was the first wireless local area network (WLAN) standard. It was named after the working group assigned to it and is also commonly referred to as Wi-Fi (Wireless Fidelity). The 802.11 standard specifies over the air interfaces between wireless clients and a base station or access point (AP) or other wireless clients. It was initially intended to allow wireless connections of workstations to their base LAN using the unlicensed, 2.4 GHz ISM (industrial, scientific, medical) RF band. The original 802.11 standard targeted the case of both the workstation and the LAN being owned by the same entity, thereby providing a wireless extension to an existing wired LAN. The original 802.11 standard supported a maximum data rate of only 2 Mbps. Because of that slow speed, most ordinary 802.11 wireless products are no longer being manufactured. The original 802.11 standard has now been adopted on a large scale for providing broadband wireless access (BWA) to public LANs, where a service provider owns the base LAN and a subscriber owns the workstation. The 802.11 family The 802.11 standard provides specifications for WLANs that cover the data link (Layer 2) and physical (PHY, Layer 1) layers of the open system interconnection (OSI) model. The 802.11 family currently includes multiple over-the-air, physical, RF modulation techniques that all use the same data link data transfer protocol. The most popular techniques in use today are those defined by the 802.11 b, a, and g amendments to the original standard. Security was originally included and was later enhanced via the 802.11i amendment. 802.11b was the first widely accepted wireless networking standard, followed (somewhat counter-intuitively) by 802.11a and 802.11g. 802.11n builds upon previous 802.11 standards by the use of what is known as multiple-input multiple-output (MIMO) to further increase data throughput. The standard is still under development, although products based on draft versions of the standard are now being sold. Data link and networks The data link layer in 802.11 defines a set of rules governing the use of a shared physical medium. For primary data transfer, the 802.11 standard uses carrier sense multiple access/collision avoidance (CSMA/CA) as opposed to wired Ethernet, which uses CSMA/collision detection (CD.) The most important difference between the data link layer of WLANs and that of most wired networking protocols is the inability of WLAN devices to detect collisions. With a single antenna performing both receiving and transmitting functions in a half duplex manner, a wireless station is unable to see any signal but its own (when transmitting). As a result, a complete packet will be sent before the incorrect checksum reveals that a collision has occurred. In addition, it cannot be assumed that all stations can hear one another in a wireless network area, thereby violating one of the basic requirements of collision detection schemes. In order to avoid these problems, the 802.11 standard uses a collision avoidance mechanism combined with a positive acknowledgment scheme. The following defines the basic operation of the 802.11 CSMA/CA data transfer function: 1. Listen and wait for free wireless medium. 2. Wait a random time (backoff). 3. Listen again to ensure the wireless medium is still unused. 4. Transmit frame. 5. If a collision occurs, the transmitting station does not notice it. 6. Wait for an acknowledgement (ACK) from the AP. 7. No ACK returned indicates a collision occurred. Try again at step 1. As stated, the 802.11 data link layer is designed to enable communication over all defined physical layers and is primarily concerned with defining a set of rules for accessing the shared wireless medium. In addition to the data link layer CSMA/CA data transfer rule, the 802.11 standard also defines two primary network architectures: infrastructure and ad-hoc. An infrastructure network is an architecture that provides communication between wireless clients and wired network resources. Transition of data from the wireless to the wired medium is completed via an access point (AP). The AP and its attached wireless clients define the coverage area, with all devices forming a basic service set (BSS), which is defined by a BSS identifier (BSSID). If defined by a common extended service set (ESS), two adjoining BSSs are indicated with a common ESS identifier (ESSID). If a common ESSID is defined, a wireless client can roam from one BSS to another. This is illustrated in Figure 1 (on page 24). An ad hoc network is an architecture used to support wireless communication between clients. Created spontaneously and specifically designed for client-toclient wireless communication, an ad hoc network does not support access to wired networks. Therefore, ad-hoc networks do not require an AP. This is shown in Figure 2 (on page 24). The 802.11 standard spells out six primary service definitions for the data link layer. These include the following: Data transfer: Wireless clients use a CSMA/CA algorithm as the access scheme to the physical medium. Association: This enables the establishment of wireless links between wireless clients and APs in infrastructure networks. Re-association: This takes place when a wireless client moves from one BSS to another. If a common ESSID is defined, a wireless client can roam from one area to another. Although re-association is defined in the 802.11 standard, the mechanism that allows AP-AP coordination to handle roaming is not specified. september2007 23

Authentication: This is a process of proving a client identity, which takes place prior to a wireless client associating with an AP. By default, 802.11 devices operate in an open system where any wireless client can associate with any AP without the checking of credentials. True authentication is provided with 802.11 options known as wired equivalent privacy (WEP) and Wi-Fi protected access versions 1 and 2 (WPA and WPA2), where a shared encryption key is configured into the AP and its wireless clients. Privacy/security: By default, data is transmitted in the clear, and any 802.11-compliant device can eavesdrop on 802.11 traffic (with a similar PHY) that is within range. The WEP, WPA, and WPA2 options encrypt data before it is sent wirelessly using multiple bit encryption algorithms. Only devices with the correct shared encryption key used in authentication can decipher the data. Power management: Two power modes are defined. In the active power mode, a wireless client is powered to transmit and receive. In the power save mode, a wireless client cannot transmit or receive, but consumes less power. Wired LAN Medium IEEE802.11 AP transition point between wireless and wired Mobile Wireless Clients BSS AP ESS Mobile Wireless Clients BSS AP Adjoining BSSs form an Extended Service Set (ESS) if identified by a common ESS identifer (EDDID). If a commond ESSID is defined, a client can roam from one BBS area to another. Figure 1: IEEE802.11 infrastructure network architecture An Ad Hoc network is formed spontaneously, without structure Mobile Wireless Clients A Basic Service Set (BBS) includes the AP and all of its attached wireless clients. It is identified by a BSSID network identifier. Computers are brought together on the fly. There is no AP and all wireless clients can communicate with each other Physical layer The original 802.11 PHY layer defined both optical and radio technologies for the Layer 1 transmission of wireless signals through the air. The optical PHY layer for 802.11 is known as Diffused Infrared. The radio technologies defined in the original 802.11 standard use the unlicensed 2.4 GHz ISM frequency band and are based on spread spectrum transmission, which originated in the military. Two types of spread spectrum are defined for the 802.11 PHY layer. These include direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS). Spread spectrum uses more bandwidth but has lower power density than traditional digital transmission techniques. This is shown in Figure 3. Spread spectrum transmission provides many advantages, including: Low power density Inherent transmission security To maintain order in this type of network, algorithms elect one machine as the base station, all others being slaves. Figure 2: IEEE802.11 ad-hoc network architecture Signal Strength 0.1mW 0.3mW 6 MHz 22 MHz Frequency Conventional Digital Transmission Transmit Power is concentrated in a tight bandwidth Figure 3: Spread spectrum transmission DSSS Transmission. Overal Transmit Power is the same but is spread across a much wider spectrum 24 september2007

Resistance to interference from other radio sources Redundancy Resistance to multi-path interference and fading effects Ability to co-exist with other radio sources Because of their elegant behavior and tolerance for interference from other equipment using the same frequency bands, spread spectrum systems may be operated without the need for a license. This is why they were chosen by the IEEE 802.11 working group for licensefree WLAN and BWA operation using the ISM frequency band. 2.4 GHz ISM RF band The ISM radio bands were originally reserved internationally for the use of RF electromagnetic fields for ISM purposes other than communications. In general, communications equipment must accept any interference generated by ISM equipment. These bands are generally confined to the 900 MHz and 2.4 GHz range and are currently used by 802.11b, 802.11g and Bluetooth devices. They are also used by a variety of noncomputing devices, such as cordless phones, low-power light bulbs and microwave ovens. All in all, they are busy portions of RF spectrum. In the United States, ISM uses of the ISM bands are governed by Part 18 of the FCC rules, while Part 15 Subpart B contains the rules for unlicensed communication devices. The legacy 802.11 standard defines 14 fixed 22 MHz-wide channels in the 2.4 GHz ISM band as displayed in Figure 4 (on page 26). It should be noted that only the first 11 channels are available for use in North America by Wi-Fi devices. Therefore, only three, nonoverlapping channels can be achieved where multiple systems are collocated channels 1, 6 and 11. If more than three systems are collocated, their fixed bandwidth, 22 MHz channels will overlap, forcing users to share the spectrum, resulting in reduced data throughput. Actual behavior, as well as interference, is a function of overlapping channel size and signal strength. 802.11b In 1999, the IEEE expanded on the original 802.11 standard and created the 802.11b specification. 802.11b supports improved data rates of 5.5 Mbps and 11 Mbps, comparable to traditional wired Ethernet of the time. The data link layer definitions remained the same from the legacy 802.11 standard, and 802.11b also uses the same unlicensed RF band and ISM channel definitions 2.4 GHz/14 channels as the legacy standard. The major change occurred in the defined RF transmission scheme (complementary code keying, CCK, vs. DSSS) for achieving improved data rates. This is similar to DOCSIS and its support of multiple RF modulation formats to achieve higher data throughput in virtually the same amount of RF spectrum (for example, 64-QAM/27 Mbps vs. 256-QAM/38 Mbps in the same 6 MHz channel). 802.11b cards operate at 11 Mbps, but will scale back to 5.5 Mbps, then 2 Mbps, then 1 Mbps (also known as adaptive rate selection). The data rate and modulation format selected is dynamic and a function of both signal strength and quality. 802.11b was the first widely accepted wireless networking standard, followed by 802.11a, and is the most widely deployed to date. 802.11a In 1999 (at the same time as the 802.11b standard was created) the IEEE also expanded on the original 802.11 standard and created the 802.11a specification. The data link layer definitions remained the same from the legacy 802.11 standard, but 802.11a uses a different RF band from the original 802.11 standard and a different RF transmission scheme (that is, orthogonal frequency division multiplexing, OFDM). 802.11a supports data rates up to 54 Mbps in the unlicensed 5 GHz U- NII (Unlicensed National Information Infrastructure) frequency band. The data rate is adaptive and is dynamically reduced to 48, 36, 24, 18, 12, 9, then 6 Mbps if required based on signal strength and quality. The high data rate is achieved by combining september2007 25

many lower speed sub-carriers to create one high-speed channel, as with channel bonding in DOCSIS 3.0. One of four modulation formats binary phase shift keying (BPSK), quadrature phase shift keying (QPSK), 16-QAM (quadrature amplitude modulation) and 64-QAM is used on each sub-carrier to achieve different data rates. The one used is dynamically selected based on signal strength and interference. Because 802.11a and 802.11/802.11b utilize different frequencies, the two technologies are incompatible with each other. This is like the difference between AM and FM radio systems using different RF bands and different modulation formats. Some vendors offer hybrid 802.11a/b network gear, but these products simply implement the two standards side by side. A lot of companies use 802.11a systems for higher-throughput applications and for increased security, since this system operates separate from the more available 802.11b and 802.11g systems. While 802.11a (U-NII) offers a greater throughput than 802.11b (ISM) devices, 802.11a systems tend to suffer more when faced with line-of-sight obstructions. These can be office walls, cubicles, desks or other obstructions. 5.0 GHz U-NII RF band The U-NII band covers the higher 5.15-5.35 GHz and 5.725-5.825 GHz range, as displayed in Figure 5, and is designed to allow for higher data rates (up to 54 Mbps) via the 802.11a standard. The 802.11a standard defines 12 fixed, nonoverlapping channels for use in the 5.0 GHz U-NII band. 802.11g In 2003, the IEEE again expanded on the original 802.11 standard and created the 802.11g specification. 802.11g combines the best of both 802.11a and 802.11b with data rates up to 54 Mbps (using OFDM from 802.11a) in the 2.4 GHz ISM band (from 802.11b) providing greater range and resiliency. As with 802.11a, the transmission scheme used in 802.11g is OFDM for the data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. In addition, 802.11g devices will dynamically revert to (like 14 x IEEE802.11 fixed 22 MHz wide Channels, 2.4 GHz, DSSS Frequency in MHz 2400 1 2412 2 2417 3 2422 4 2427 5 2432 22 MHz 6 2437 7 2442 2447 2452 2457 83.5 MHz Total ISM Spectrum Figure 4: IEEE802.11 usage of 2.4 GHz ISM band 5150 36 40 44 48 52 56 60 64 52 149 52 153 157 161 52 5180 U-NII 1 23 dbm indoor 5200 5220 5240 5250 5260 U-NII 2 30 dbm MAX 5280 5350 8 9 10 Frequency in MHz 12 Non- Overlapping Figure 5: IEEE802.11a usage of 5.0 GHZ U-NII bands 802.11g OFDM + BPSK/ QPSK/ 16QAM/ 64QAM With CCK/ DSSS option 2.4GHz RF 54 Mbps/ 48 Mbps/ 36 Mbps/ 24 Mbps/ 18 Mbps/ 12 Mbps/ 9 Mbps/ 6 Mbps/ 11Mbps/ 5.5 Mbps/ 2.0 Mbps/ 802.11a OFDM + BPSK/ QPSK/ 16QAM/ 64QAM 5GHz RF 54 Mbps/ 48 Mbps/ 36 Mbps/ 24 Mbps/ 18 Mbps/ 12 Mbps/ 9 Mbps/ 6 Mbps 5300 5320 5470 U-NII 2 Extended Band 30 dbm MAX Extra 8-11 Channels 11 2462 12 2467 5725 13 5745 2472 Note: Tweleve non-overlapping channels within U-NII-1, UNII 2 and UNII 3. 802.11b 802.11 802.2 802.2 Logical 802.2 Logical Link 802.2 Logical Link Control Logical Control Link Link Control Control (LLC) (LLC) (LLC) (LLC) 802.11 802.11 MAC8 MAC 802.11 MAC (CSMA/CA) (CSMA/CA) (CSMA?CA)02.11 (CSMA/CA) (CSMA/CA) MAC Comp. Code Keying (CCK) With DSSS option 1/ 5.5 Mbps/ 2.0 Mbps/ Direct Sequence Spread Spectrum (DSSS) Frequency Hopping Spread Spectrum (FHSS) Diffused Infrared (DIR) 2.4 GHz 2.4 GHz ISM ISM RF RF 800-900nm 2.0 Mbbs/ Figure 6: IEEE802.11 and the OSI model 1.6 Mbps LED 2.0 Mbbs/ MAC PHY 5765 14 2477 U-NII 3 36 dbm MAX 5785 2483.5 OSI LAYER 2 (Data Link) OSI LAYER 1 (Physical) 5825 26 september2007

Wi-Fi Challenge and Opportunity Metropolitan based Wi-Fi networks using unlicensed spectrum are widely deployed, with more on the way. This constitutes a threat to the cable industry from competitive broadband providers, but also an opportunity. Cable operators can either use existing assets and unlicensed spectrum to provide their own metro Wi-Fi networks, or they can risk being overbuilt. In other words, unlicensed Wi-Fi technology can be either friend or foe. For cable operators to befriend Wi-Fi, however, they must first understand it. This first part of a two-part article provides information on the Institute of Electrical and Electronics Engineers 802.11 standard. Next month s installment will take a closer look at the available networking technology, the imminent threats and successful strategies. the 802.11b standard) CCK for 5.5 and 11 Mbps and DSSS for 1 and 2 Mbps, making 802.11g fully backward compatible with the 802.11b and 802.11 legacy standards. See Figure 6 for a view of the 802.11 family of standards and their relationship to the OSI model. Industry trends No one can doubt the ubiquity and increasing, daily acceptance of 802.11 technology. Ordinary people are becoming accustomed to wireless broadband access when they leave their homes. Why should it have to be from an alternative service provider? Metropolitan based Wi-Fi networks using unlicensed spectrum are now deployed in a large number of major metropolitan centers and strategic locations (airports, restaurants, coffee shops) with many more deployments committed to and upcoming. Visit www.muniwireless. com/reports/docs/june-1-2007summary. pdf to find out if your service area is, or is about to be, overbuilt by the municipality. The number of municipalities getting into the Wi-Fi game has grown tremendously, from 122 in July 2005 to 385 in July 2007. In July, AT&T announced free nomadic wireless access for their broadband subscribers to more than 10,000 Wi-Fi hotspots. Whereas cable operators have been kings of bundling services, they appear to be losing out at this game where nomadic Wi-Fi access is concerned. Yet with infrastructure and rights of way, as well as indoor and outdoor cablefriendly Wi-Fi technology available, why not compete? Or preempt the competition? Over the past two years, one Canadian cable operator has done just that by deploying more than 400 outdoor DOCSIS hotspots on its existing HFC rights of ways in the most strategic locations of several cities. The service model is clear: free nomadic Wi-Fi access for existing triple-play customers and fee-based access for all others. By utilizing the unlicensed Wi-Fi spectrum for itself and positioning devices at the most strategic locations in its service territory, the cable operator has severely damaged the business case of an alternative provider wireless overbuild, occupied the limited Wi-Fi public use spectrum, provided another sticky service to its customer base, and achieved a new revenue stream from fee-based wireless users. This is clearly a win-win-win-win strategy. The result is that alternate broadband service providers utility company, wireless Internet service provider (WISP), municipality, competitive local exchange carrier (CLEC), etc.-have not wirelessly overbuilt this operator in any area where it has employed this strategy. The same cannot be said for neighboring cable operators. The threat is clear for both rural, oneway cable operators and larger cable operators with two-way HFC plant in large metropolitan centers. On the flip side, the opportunity is also great. Wi-Fi is not going away any time soon. It can be both our friend and foe. It all depends on how the cable industry deals with this technology. Christopher Skarica is vice president, engineering, Lindsay Broadband. Chris Busch is vice president, broadband technologies, Incognito Software. Reach them at cskarica@lindsaybroadbandinc. com and cbusch@incognito.com. september2007 27