26.07.2013 Views

WiMax Operator's Manual

WiMax Operator's Manual

WiMax Operator's Manual

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 4 ■ SETTING UP PHYSICAL INFRASTRUCTURE 85<br />

infrastructure equipment to a handful of service providers, providing some commercial field<br />

experience, but the Finnish company has since ceased production of the radios. Finally,<br />

several service providers have set up wholly proprietary mesh architectures of which the nowdefunct<br />

Metricom Ricochet network with more than 30,000 subscribers was by far the largest.<br />

Whether these constitute real proof of concept is debatable because none of the service providers<br />

has survived.<br />

Mesh Networks: The Counterarguments<br />

While freely acknowledging the revolutionary potential of the mesh, you will see the following<br />

challenges facing those who utilize mesh architectures in full-scale metro deployments:<br />

Developing routing algorithms that maximize network efficiency and minimize congestion,<br />

unacceptable latencies, and “router flaps” where highly inefficient routing<br />

paths are inadvertently selected: Packet routers function imperfectly in public networks<br />

today and do not provide the same kind of wholly predictable network performance as do<br />

traditional circuit switches. Indeed, popular protocols for improving router predictability,<br />

such as Multiprotocol Label Switching (MPLS), DiffServ, and Reservation Protocol (RSVP),<br />

make the operation of the router notably more switchlike and set up fixed paths through<br />

the Internet that essentially ignore the basic mesh structure formed by the crossconnections<br />

among the major peering points.<br />

Securing the network against hacks and malicious code: If the basic neurons of the network<br />

are exposed, which they certainly are in any peer-to-peer arrangement, then it is<br />

difficult to protect the core management software. Advocates of grid computing have been<br />

preoccupied with network security, and rightly so, but really satisfactory solutions have<br />

not been developed to date. Essentially closed systems such as class 5 circuit telephone<br />

switches, ATM switches, and optical switches have generally been highly resistant to intrusion<br />

and compromise whereas IP routers are almost routinely subject to successful<br />

attacks. There are those who argue that nonhierarchical systems will be more resistant<br />

to attacks, and the effects of such attacks will be localized rather than catastrophic, but an<br />

absolutely convincing case has yet to be made for this position.<br />

Minimizing hops: The longer the chain of wireless routers going back to the Internet<br />

access point, the less bandwidth available to any given node for transmitting its own data,<br />

and this constraint ultimately limits the size of a mesh network. If a mesh network grows<br />

sufficiently large, nodes on the periphery will have to go through multiple intervening<br />

nodes, which severely limits throughput for any one node. This deficiency is exacerbated<br />

by the inability of most radios to transmit while they are receiving.<br />

Developing standards: Single-vendor solutions are the norm in mesh networking today, a<br />

state of affairs that, ironically, militates against the kind of pervasive deployments mesh<br />

advocates envision. Currently little comprehensive standards work is under way in the<br />

area of wireless meshes, and no major telecommunications infrastructure manufacturer is<br />

directly involved in mesh projects.<br />

Providing a strong first-mover advantage and a real ownership of the network for the<br />

network operator initiating the mesh: If the intelligence is in the subscriber terminal,<br />

there is really nothing to stop subscribers from forming loose cooperatives and dispensing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!