Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Wireless Networking Books Media Businesses Book Reviews Hardware IT

WiMax Operator's Manual: Building 802.16 Wireless 99

Dozix007 (Kurt Kaylor) writes "Daniel Sweeney, a technical writer, business reporter, and industry analyst is coming full circle in his series of wireless related writings with his latest book WiMax Operator's Manual: Building 802.16 Wireless Networks. Sweeney brings the WiMax 802.16 standard into the context of a ISP solution for the masses. WiMax is a recent standard from the IEEE that is similar to conventional wireless technology, however WiMax supports higher data rates and longer distance transmissions than other standards from the IEEE. This book drifts away from the recent flood of wireless books by conveying all needed knowledge to establish, understand, operate and potentially profit from an 802.16 wireless network, rather than a specific look at one aspect of the technology. This book is not only for the business minded, but for a consumer looking to establish a quality long-distance wireless network of their own." Read on for the rest of Kaylor's review.
WiMax Operator's Manual: Building 802.16 Wireless Networks
author Daniel Sweeney
pages 240
publisher Apress
rating 9
reviewer Kurt Kaylor
ISBN 159059357X
summary This book serves as a guide for present and future entrepreneurs and it is intened to assist them in avoiding the experiments and false starts that proved so frustrating for the pioneers.

WiMax Operator's Manual: Building 802.16 Wireless Networks is primarily a utilitarian book rather than conceptual. It provides a background in broadband wireless fundamentals, packet data, and overall network operation and management to enable a network operator to set up a network with standards-based equipment and to run it profitably thereafter. Sweeney notes early in the book : "Nothing is particularly admirable about purism in terms of wireless technology, and if wire line technologies serve the same purpose better over some portion of the network footprint, then wise network operators will avail themselves of them." This theme of realism in relation to the application of a wireless network is prevalent though out the book.

Wired networks in the same footprint will almost always beat a wireless network in speed, reliability, and cost. This is primarily due to the previously created infrastructure available to Internet carriers. The goal that Sweeney promotes is to find an ideal region that has not yet been exploited by a wired service provider. These regions are ideal due to the low-cost setup for a wireless network compared to the cost of a wired network. Sweeney describes and informs the user of ways to find and establish these networks in an efficient manner to maximize profitability.

Sweeney also discusses network security in the later chapters of his book. He acknowledges the increasing need to secure the network's own infrastructure, the safety of its customers, and a nation itself. In relation to wireless networks, Sweeney notes "[Security] is becoming increasingly important in network operations today and cannot be considered optional at this point." To this end, the network security section is devoted to security policies, secure electrical systems, cyber warfare, and other information on safeguarding your network. Another concern also addressed is the Communications Assistance for Law Enforcement Act. CALEA is a complex piece of federal legislation that expands law enforcement's authority to conduct electronic surveillance, including surveillance over public networks. Sadly, as of yet there is no real way to combat this intrusive act.

WiMax Operator's Manual: Building 802.16 Wireless Networks is a great resource for businesses and individuals looking to establish their own 802.16 network. I enjoyed the foresight provided in this book for potential problems faced by network operators. The honesty in the practicality of an 802.16 network as a realistic network solution also made the book a great resource. There was no fantasy scenario or white lies to convince a user of the merit of a 802.16 network beyond what it can do.

The gripe I do have with this book is its complete utilitarian nature. A little more theory and insight into the standard itself would have been great. This book stands purely as an Operator's Manual, and not an exploration of WiMax as a standard, but rather a tool. Otherwise, this book was highly enjoyable and well written. I would recommend this book to anyone looking to establish a network beyond the standards commonly available (e.g. 802.11a - 802.11g). This book is unique in its topic and sheer honesty, and is one of the few references available on the specific subject.


You can purchase WiMax Operator's Manual: Building 802.16 Wireless Networks from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.

This discussion has been archived. No new comments can be posted.

WiMax Operator's Manual: Building 802.16 Wireless

Comments Filter:
  • Security... (Score:4, Interesting)

    by VvScythevV ( 796270 ) <efelch@NoSPAm.gmail.com> on Thursday October 21, 2004 @05:04PM (#10592834)
    We can only hope that the future of wireless networks will include encrypted or otherwise protected routers/access points. The number of open networks around my apartment is somewhat disturbing (in a good way, when I'm bored).
    • Re:Security... (Score:5, Insightful)

      by wankledot ( 712148 ) on Thursday October 21, 2004 @05:09PM (#10592875)
      The future? There's nothing keeping people from locking them down now. Combining not broadcasting an SSID, MAC access control, WEP, and IP address management can go a long ways. It's not perfect, but it's enough for most users. In the future there will still be stupid people with open access points. Technology has yet to outpace the idiot.
      • Combining not broadcasting an SSID, MAC access control, WEP, and IP address management can go a long ways.

        Are you kidding? I know how to set up exactly one of those techniques - and I'm a geek. What chance does Joe Public have of knowing how to make his network even remotely secure?
        • I know how to do all four. And 802.1x / RADIUS.

          No wonder so many geeks don't have jobs :-)
        • Re:Security... (Score:5, Insightful)

          by wankledot ( 712148 ) on Thursday October 21, 2004 @05:29PM (#10593048)
          But that's not a limitation of the technology, it's a limitation of the way it's implemented. With a new wireless standard it is likely to be the same. There will be ways to make things less secure, and most people will probably use it in that way.

          My point wasn't that securing a wireless network is simple, it was that new technology does not necessarily make things any more inherantly secure than it is now.

        • Re:Security... (Score:1, Informative)

          by Buelldozer ( 713671 )
          I'm not flaming you butttttt,I think you are more of an informed user, at least in the wireless arena.

          Seriously, if you can't do everything he mentioned you should learn, now. It isn't that difficult to understand or do.
          • It's not that it's difficult, Bob - it's that I just don't care. And I'm pretty sure most people don't.

            Which is my point, really. Make it so easy to secure, I can do it without caring - "Do you want to secure this?" "Yes" "Okay, type a password"
            • If all of the APS are "secured", using the same damn mac address filtering, ip scheme, and same subnet, its not very damn secure now is it? how is the firmware in the router sopposed to know which mac addresses are yours, and not a wardrivers? You have to put in some effort. This one click windows wizard security bullshit needs to stop.
        • With all due respect - you're no geek. Even the basic Linksys/DLink AP's cover this stuff in their user manuals and online docs. Come ON!

      • But don't use WEP. It's fairly easy to crack.

        See How To Crack WEP Encrypted Wireless Networks [hrp.com]
        • The page you refer to lists how "easy" - in terms of human effort - it is to run the cracking programs, but completely ignores how much computer effort it requires.

          A better article on this is in the current Security Journal page 9-13 [securityhorizon.com]. They concluded that even though it's flawed, it is still worth having turned on, as an ADDITIONAL layer of protection/deterrent for home use, not as an ONLY layer of protection...

      • It's no doubt that WiMax will be a target for hackers. Being able to get broadband access from 20 to 30 miles away (line-of-site I believe) can make any hacker drool with anticipation. If a good hacker wants something bad enough, this hacker will find a way to get it, no matter how long it takes. It will be owned.

        I fear for the companies that will be hosting WiMax access, but I also see ground for new wireless security technologies to emerge.


        • I'm very sympathetic to the general direction of your comment. If you build it, hackers will come.

          However, it is possible to design a secure system. My understanding is that VPN technology is secure, for example. I've asked around quite a lot, and no one I've talked to has heard of a vulnerability.

          • I should have made it clear I was talking about hardware VPN systems.
            • It's true that VPNs are pretty secure, but there are vulnerabilities in any system. Just do a search for "hardware VPN vulnerabilities" on Google and see what you get. If you are going to create a secure tunnel to access WiMax it is more secure for your data being sent over the connection, but secure data transfer isn't what I'm worried about. What I'm worried about is the ability for a hacker to gain unsolicited access to a WiMax system with or without a secure connection. Securing the data transfer ov

              • "Just do a search for "hardware VPN vulnerabilities" on Google and see what you get."

                I did a Google search: hardware+VPN+vulnerability [google.com]. There is nothing but some Cisco Concentrator vulnerabilities that I suppose Cisco fixed long ago.

                Are hardware VPN's generally invulnerable? It's difficult to imagine a vulnerability with a pre-shared key and total encryption. The weak point might be when the VPN is first established, but the pre-shared key seems to make that strong, too.
                • You make a very good point. But, the subject here isn't VPN. The subject is WiMax. It is possible to access a WiMax access point through VPN if the company or ISP providing WiMax access puts a VPN server in front of the access point. But why would they do that if they are selling access to it? It only secures the data across a connection which is good to prevent snooping, but creates overhead. I guess it is a good idea to put a VPN in front of the access point in order to prevent hackers from being ab

              • The point I was trying to make is not that VPN technology should be combined with WiMax, but that it is an example of well-designed technology that causes few problems. Ethernet is another example.

                The first USB version is an example of a badly designed technology. There were many devices that would not operate if they were more than 5 feet from the computer.

              • Comment removed based on user account deletion
                • Exactly! This is why I believe more secure technologies will be introduced to protect WiMax access points. WEP encryption can eventually be hacked given enough time. The newer encryption method WPA is more secure, but is it the best for WiMax?
                • well, you will need a valid mac address to connecto to a mac address filterd network. Without the mac, you wont be able to connect, or sniff for valid mac addreses.
                  • Just because YOU cant change the mac address in linux does not mean that its impossible. Read a little. ifconfig eth0 192.168.1.1 broadcast 192.168.1.255 netmask 255.255.255.0 hw ether 00:00:00:00:00:00:01 down ifconfig eth0 up
      • But why not allow anonymous access, not to your network (isolated throught a firewall), but to the internet? As soon as one sees someone abusing (like runing Kazaa or Emule on it), you just disconnect them.

        I really enjoy having wi-fi everywhere, just to browse the net, or checking my mails...

        • Comment removed based on user account deletion
          • Regarding the bandwidth, I have an 512kbps ADSL connection. Not much, but enough for me. I'm not into filling my hard drives with too much emule/kazza/whatever junk, anyway. So, I think I can manage to provide free access if it means reaching your email, checking newsgroups, browsing your favorites sites, or even downloading small amounts of data, when I'm not needing the bandwidth. Of course that, if I do need it, I'll claim it...

            I'm aware that, there are some guys that pass by, check the access to the in

      • Comment removed based on user account deletion
    • And yet even more people communicate over unencrypted network cable. You might think it's harder to sniff, but let's face it, you go to the neighbourhood's uplink point, you open the door (they key has to be available to hundreds of repairmen, so it is quite easy to get a hold of) and sniff an entire neighbourhood (probably including a few complacent geeks "knowing" that they do not send their data over an insecure network)
    • What's wrong with keeping these open? I say keep them open and secure your traffic. It'd be the idiot who gets their password sniffed. But tell me it's not nice to drive down a road in another town and not have to pay for it.
    • Re:Security... (Score:3, Insightful)

      by jonbrewer ( 11894 ) *
      We can only hope that the future of wireless networks will include encrypted or otherwise protected routers/access points. The number of open networks around my apartment is somewhat disturbing (in a good way, when I'm bored).

      What's wrong with an open WiFi network? If Internet bandwidth is near-free and the local network is firewalled off from the wireless, why bother restricting or encrypting? Security is the responsibility of the application, anyway. Email (AT&T Worldnet) uses SSL for POP3/SMTP, web
      • Comment removed based on user account deletion
      • Unfortunately, there are criminals and sexual deviants (think child porn) that will abuse a wireless network for their own uses.

        I've seen a couple of stores about folks sending death threats via someones home wireless connection and even one where the police caught a guy driving 2mph down the road, pantless, looking at child pron on kazaa.

        Sad but true.

  • Maybe I'm reading this page [wimaxforum.org] wrong, but does it say WiMax gets 268mbps each way? Gosh, maybe I will get this book!

    Of course, since most broadband connections are still stuck around 2-3mbps, I doubt many hotspots and businesses will upgrade. Who needs a connection that fast to check their email and listen to Eminem?

    On a personal level, though, I can't get "268" out of my head. ....268...268... Does anyone know how far the signal goes?
  • WiMax Networks (Score:3, Interesting)

    by Opticalsky ( 785289 ) on Thursday October 21, 2004 @05:07PM (#10592858)
    Chances are WiMax and Wifi will end up coexisting together, the new WiMax is pretty cool as it has about a 30 mile radius range, and the ability to go through walls and barriers better then wifi.
    • When WiMAX equipment makers talk about a "range" of 30 miles, you can't compare that directly to the "range" of a WiFi connection.

      For the purpose of computing these "30 miles", they usually assume a *roof-mounted antenna* in direct line of sight of the base station, with 1W of effective isotropic radiating power directed precisely towards the base station. The base station itself emits 1W in every direction and we're talking base stations worth several k$ each.

      802.16 equipment is going to be much more exp
    • like noted in the previous post, 30 mile ranges are under super optimal conditions. that doesn't take into account anything like urban canyons, etc. by the way, if the tower can transmit 30 miles, that means that whatever device you are using has to push out a signal that far and I am more then a little reticent about the thought of a radio that can transmit thirty miles sitting on my lap - if ya know what i mean!!
  • by zerdood ( 824300 ) <null@dev.com> on Thursday October 21, 2004 @05:08PM (#10592864)
    The gripe I do have with this book is its complete utilitarian nature. A little more theory and insight into the standard itself would have been great. This book stands purely as an Operator's Manual, and not an exploration of WiMax as a standard, but rather a tool.
    That was not the purpose of the book. If you want that, buy something else. This book has a specific, defined purpose. It even has "Operator's Manual" in the name.
  • interferance (Score:1, Interesting)

    by l33t m4st3r ( 672779 )
    isnt some satalite stuff in the 11ghz area? wouldnt that cause masive problmes?
  • Cost? (Score:2, Interesting)

    by Dop ( 123 )
    Can anyone with experience with this give me a cost estimate on what it would take to setup a point-to-point 802.16 connection? I'm looking at about 7 miles (well with in the supposed 30 mile limit).

    Is line-of-sight necessary?
    • Considering there isn't ANY commercial product available for this standard (YET), I'd say No.
      • by Dop ( 123 )
        I'm not interested in commercial products even if they were available. I guess I should have been more clear. I'm assuming people have built prototypes, I'm curious how much I can expect the hardware to run me if I built it myself.
        • Re:Cost? (Score:1, Funny)

          by Anonymous Coward
          Oh, you want to design your own ASICs? In that case, it should only run you $5-10M.
    • at 7 miles line of sight will almost certainly be required. You can do 7 miles now LoS at 54Mb without a problem. A couple of $2500 cisco 1400 bridges would do the trick. There are probably quite a few cheaper solutions, I'm only familiar with the cisco ones for a bridge of that type.
      • not sure but maybe one of those TroposNetworks 1 watt outdoor units might work for that. although it is only 11Mbs 802.11b so i'm not sure if thats enough bandwidth for you, as I have no idea what you're using this for.
    • $4k using Solectek's version of the current technology. 802.16 is technically NLOS; it uses a 256-carrier OFDM constellation. It sorta lives for multipath. Check out http://www.solectek.com/products/bridges-and-route rs/prod-sm5kBH-feat.html [solectek.com] for a look at their PtP solution.

      Note: Solectek advertises 72 Mb/s; as I read their ad, they're not exactly 802.16, but either close, or upgradable when the "real" chipsets come available. Several other vendors (Redline Communications...) claim to have 802.16 comp
  • WiMax Link (Score:5, Informative)

    by ThePlague ( 30616 ) * on Thursday October 21, 2004 @05:14PM (#10592919)
    Just in case you are like me and didn't know what WiMax was, this link from the WiMax forum [wimaxforum.org] gives a pretty good overview.

    In a nutshell, it looks like the max transmission is 268 mbps, but I couldn't find a quote for the range. It depends on implementation and frequency, whether it's single-to-multipoint or point-to-point.

  • by zogger ( 617870 ) on Thursday October 21, 2004 @05:24PM (#10592994) Homepage Journal
    ..I find this interesting as well, small copy/paste:

    " No one in the world has yet built an operational WiMax network that is available for public use."

    Hmmm

    wonder how much the gear costs, and is it really standarized yet? The potential in theory sounds really slick, but is this ready for deployment yet? As joe rural broadband user wannabe, I welcome our new wimax overlords, but only if they really show up. Is this stuff really there, or vaporware? The book is 30 clams for a paperback, sorta steep if it's really just vapor.
    • What about the Navini gear? (www.navini.com) There are plenty of WISPs using the Navini gear....
      • well, certainly looks like it's not vaporware. Thanks for the link, looks like it will be available pretty soon now with all those companies trying it out. Looks like it might make wifi be sort of passe, doesn't it?
    • and is it really standarized yet? .16d (limited mobility) is pretty much standardised as far as I know. .16e (handover etc) is nowhere near.
    • Q1 2006. Seriously. My employer has been looking into doing stuff with 802.16 but can't get prices on any hardware to test with.
      • ....deploy this for internal use, or are you going to set up a public WISP?

        I like this tech in theory, it would allow folks to do their own rural broadband. 802.11 whatever has too many limitations to be practical everywhere, it's under powered and needs line of sight, just ain't happening most places without a ton of access points and relays and repeaters and foolfarall. Around here two companies have tried it and they keep running into that, they just can't cover enoutgh people, every hill you need anoth
        • Maybe set up non-public WISPs. Or do quick 'n' dirty telco solutions in places with no infrastructure. We're a large USian arms merchant (not Halliburton) looking for alternatives to stringing cable or doing satellite bounces.

          Christ, if we could get some equipment to play with we could make some supplier very happy.

  • by FooAtWFU ( 699187 ) on Thursday October 21, 2004 @05:27PM (#10593031) Homepage
    "This book is not only for the business minded, but for a consumer looking to establish a quality long-distance wireless network of their own."

    Sounds like something my university's crazy technology program [wfu.edu] would just jump on, along with the $400 Cisco IP phones and their vision of the future where incoming students get a university-issue cell phone that does voice over IP on the campus network... so that they can later grab parts of the fees for long distance use...

  • http://www.wired.com/news/technology/0,1282,65297, 00.html/ [wired.com]

    That link there is a great article more about it, its also in the latest Wired.com magazine.
    • Sorry guys, wrong link. But it is in the latest issue of Wired.com check it out for more info. Here are some parts from it. Some wireless service providers are offering WiMAX in New york city, montana soon. Certified WiMax gear will also being arriving next spring. Yes it confirms my recent post about 30 mile maximum range. France and Britain are already testing them. thats some more information, but I recommand purchasing the October 2004 edition.
  • "The gripe I do have with this book is its complete utilitarian nature. A little more theory and insight into the standard itself would have been great. This book stands purely as an Operator's Manual, and not an exploration of WiMax as a standard, but rather a tool."

    Well it is aimed towards ISPs building wireless networks for the masses. I would sure hope that if you were in that position, you would know a heck of a lot about the standard already.

    Actually, what am I saying? Forget the book, pay a mult

  • by rufusdufus ( 450462 ) on Thursday October 21, 2004 @09:16PM (#10594506)
    This book is not only for the business minded, but for a consumer looking to establish a quality long-distance wireless network of their own.

    The jacket of the book explicitely states:

    The WiMax Operator's Manual will prove useful and accessable to any executive or manager interested in becoming a service provider and exploring the wireless options. The emphasis is on building the business case for wireless and achieving a positive cash flow.


    Nowhere does it talk about consumers setting up their own WiMax network. This is obviously because WiMax is not intended for consumer use. Again, as stated on the jacket:

    Designing and implementing 802.16 service networks is far from a trivial undertaking.

    Inside the book it explains the byzantine issues facing WiMax, not the least of which are the various problems with spectrum such as licensing, multipath interference and a host of niggling issues well beyond the scope of an individual consumer.

    As an analogy, if Wi-Fi is a walkie talkie, then WiMax is a radio station. WiMax was clearly envisioned by its creators as a tool for internet service providers with thousands of customers, not for individual people.

  • More fodder for us wardrivers, it will be nice to see some dense saturation -- ubiquitous computing.
  • by Netssansfrontieres ( 214626 ) on Thursday October 21, 2004 @11:41PM (#10595309) Journal
    WiMAX has the *potential* to be important. But that's it for now. That's why so many posters ask 'what's the range?' and 'what's the throughput?' Nobody knows, because there aren't any chipsets yet. First mature chipsets -- from Fujitsu and Intel and others -- are in 1Q05.
    This is important because nature is analog. There's no simulation tool, because nobody has any real relevant experience on how OFDM + all the other 802.16 subtechnologies work ... in this area, with trees, or in this other area, with rain, or ...
    And it's important because nobody knows how good the receivers will be. For example: will we have anemic receivers built into devices, 'centrino-style'? Or will we have window-mounted antennae? Or antennae aligned by skilled craftspeople?
    And it's important because the antennae are still being cooked: MIMO? MISO? SIMO? Difficult all of them. (MIMO = multiple input, multiple output ...) key, perhaps, for getting the extra few dB of receiver performance.

    Given these, I wonder why the book exists. You can't write a book on business cases for wireless unless you know what the ranges, throughputs, device costs (and availability) are ... at least to within a factor where the model makes some sense. OK, you can write the book, but it wouldn't be worth reading.
  • Comment removed based on user account deletion

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...