Tag Archive for 5G

What is 4G Mobile Wireless

What is 4G Mobile WirelessWireless operators continue to roll out mobile networks built with acronym-heavy standards such as 4G, Long Term Evolution (LTE), IEEE 802.16 (WiMAX), or HSPA+. Stacey Higginbotham at GigaOM says it’s hardly a surprise that every press release is touting 4G, which presumably stands for the fourth generation wireless network. Only, according to InfoWorld, the truth is, neither WiMax nor LTE qualify as 4G technologies, according to the International Telecommunications Union Radiocommunication Sector (ITU-R). For a service to be called 4G by the ITU-R carriers will have to use one of two future mobile wireless technologies.

GigaOM reports that in October 2009, the ITU fielded 6 candidates that could meet the true definition of 4G mobile wireless. The main criteria required speed boosts, but more importantly, new technologies that make more efficient use of spectrum, as well as an ability to work with other radio access systems and fixed wireline networks. The standard also requires that equipment makers offer features that will help guarantee the quality of service on wireless networks. Of the 6 candidates, the ITU declared the upcoming called LTE-Advanced and WirelessMAN-Advanced – also known as IEEE 802.16m the only true 4G mobile wireless technologies.

True 4G wireless calls for peak speeds of 100 Mbps for mobile applications and 1 Gigabit per second for fixed networks. To do such speeds, operators will need five to ten times as much spectrum as most are using now to deploy LTE, as well as complex antenna configurations. The new 8×8 MIMO will need some new antennas at the tower and inside the mobile devices. Some operators won’t ever get to that point. Others might, but it’s going to take four or five years before people start rolling out anything like the ITU’s version of 4G mobile wireless according to the GigaOm article.

IEEE logoThe faux 4G we are getting now, comes in three flavors thanks to a bold marketing effort by T-Mobile writes Ms. Higginbotham. T-Mobile’s HSPA+ network is most assuredly 3G (or maybe 3.5G for some) but as its CTO, Neville Ray, argued with GigaOM founder Om Malik, its real-world mobile wireless speeds are better than those offered by WiMAX and are comparable to the real-world expectations of Verizon’s LTE network. The key to T-Mo’s experience lies in its spectrum resources. As a general rule, the more spectrum an operator has, the more lanes in its highway it can cram bits into. The blog says T-Mobile can use that spectrum to increase capacity or increase speeds. With plans to move from 21 Mbps to 42 Mbps speeds using HSPA+, T-Mo is going for speed to keep up with the wireless mobile Jones.

Laptop reports that other mobile wireless operators do not qualify as 4G either. “… Sprint and Clearwire’s Mobile WiMax (3 to 6 Mbps), T-Mobile’s HSPA+ (5 to 8 Mbps), and even Verizon Wireless’ LTE network (5 to 12 Mbps) don’t even come close to deserving the 4G moniker.

After all, marketers pushing LTE first starting waving the 4G mobile wireless flag several years ago, despite the ITU hadn’t yet decided if LTE was 4G. The first releases weren’t. We’ll have to wait for LTE-Advanced in about four or five years for true 4G. By then, it’s possible we’ll be dealing with 5G mobile wireless networks or something even better the marketers dream up. In the meantime, consumers will buy their faux 4G mobile wireless phones for their faux 4G mobile wireless networks and never sweat the difference GigaOm speculates.

The faux 4G networks are incremental improvements over 3G. As Tolaga Research analyst Phil Marshall told InfoWorld, these wireless mobile networks were designed from day 1 for data, and are all Internet protocol (IP) from end to end. That’s a huge improvement over 3G and it’s a marked change. Despite the improved architecture, Wi-Fi Net News asks if the spectrum is available to meet the 2015 rollout for real 4G. “It looks like the maximum speeds being discussed require extremely wide channels, like 100 MHz. That’s not impossible, but no U.S. carrier has 100 MHz in a chunk that it materializes. The FCC white-spaces rulemaking frees up a bunch of 6 MHz pieces, and that’s the last major realignment after DTV 700 MHz spectrum that I’m aware of. The definition of 4G may now be set, but the ability to roll out 4G at anything like the minimum speeds promised seems highly problematic even in five years.”

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Security Considerations for IPv6

Security Considerations for IPv6For those who missed the Internet Society (ISOC) announcement that World IPv6 Launch day arrived on June 6. (I blogged about World IPv6 day, back in March) Carl Herberger, VP of Security at Radware (RDWR) recently wrote at Help Net Security that he sees World IPv6 Launch day as much more hype than an operational change.

Internet Society logoMany high-profile organizations have hooked their plans on change over to the ISOC launch date. Supporters include Google (GOOG), Facebook (FB), Microsoft (MSFT) Bing, Yahoo (YHOO), and Akamai (AKAM).  Mr. Herberger points out that many companies have already leveraged IPv6 WAN connectivity. Most mobile providers who have adopted LTE 4G infrastructures have built them for mobile devices, Mobile devices will connect to the Internet with IPv6 addresses by default. He argues that since a 4G phone must also be 3G and IPv4 compatible, the 5G providers have not done much. The service providers have woven IPv6 into the existing IPv4 Internet much to the chagrin of the initial IPv6 designers.

IPv6 Pandora’s Box

Bottom line: Because IPv4 is not going away any time soon, we will essentially live in perpetuity with both designs. A new dawn? Or the beginning of the end? The Radware VP thinks it’s neither, he calls the interoperability issues between IPv4 and IPv6, a Pandora’s Box of opportunity for those of the nefarious persuasion.

So, what are the three main takeaways from World IPv6 Launch day?

Take away #1

Dog and catIPv6 will first be implemented on the WAN, IPv4 will continue to stay in the LAN for years to come – Google, Facebook, DNS, CDN providers, and many, if not most ISP’s are all moving to default IPv6 WAN connectivity. However, nearly no one has made the transition to IPv6 on the LAN. Mr. Herberger adds that rapid IPv6 deployment on the Internet WAN operations side and the very slow rollout of IPv6 on the LAN side will wreak havoc on perimeter security. He believes that there are huge problems associated with IPv4 and IPv6 cohabitating.

Take away #2

IPv6 & IPv4 don’t cohabitate well – IPv6 and IPv4 make insecure bedfellows. There are no predefined standards in the way to handle the cohabitation of IPv4 with IPv6.  The transition mechanisms to ease the transitioning of the Internet from its first IPv4 infrastructure to IPv6 have not been standardized yet. The Internet Engineering Task Force (IETF) has working groups and discussions through the IETF Internet-Drafts and Requests for Comments processes to develop these methods. Some basic IPv6 transition mechanisms have been defined; however, nothing has yet emerged as a proposed uniform standard. As such, the article states, the world is awash with a plethora of IPv4 to IPv6 (and vice versa) Transition Mechanisms such as:

  • Encapsulating IPv4 in IPv6 (or 4in6)
  • Encapsulating IPv6 in IPv4 (or 6in4)IPv6 tunnel
  • IPv6 over IPv4 (6over4)
  • DS-Lite
  • 6rd
  • 6to4
  • ISATAP
  • NAT64 / DNS64
  • Teredo
  • SIIT.

If you are familiar with network perimeter security devices, one of the things they do well is deep packet inspection and Stateful aware analysis. However, one of the dirty little secrets is that nearly none of today’s technologies have the capability to inspect encrypted traffic such as SSL  or the ability to inspect tunneling protocols such as L2TP, PPTP, etc. What IPv4 and IPv6 transition does is effectively exacerbate these “Achilles heels” in security detection capabilities by introducing a whole new class of nearly undetectable transmissions. The author warns Don’t be fooled by a vendor’s claim that they inspect a v4 packet in v6 or vice versa, because even if true for one or two methodologies, the ways to carry out this task are almost immeasurable today. This is really a true community-wide problem and one that must be addressed.

Take away #3

ConfusedMeet your old vulnerability – Same as the new vulnerability! Much of our defense is single-threaded, and should an adversary be able to pass through your perimeter defenses, many of the ‘older’ vulnerabilities would find a receptive home having passed through the ‘corporate scrubbers.’Moreover, just think of the new opportunities available to more nefarious organizations that don’t have your interests in mind. This ‘transition mechanism’ essentially becomes an effective ‘unscrubbed’ gateway or tunnel for all newly developed organized crime-designed, state-sponsored, and Hacktivist-motivated attacks.

Moreover, most of us will be largely blind to these realities unless we are acting now to make certain that our gateways are designed with all encapsulated traffic being detected and mitigated. Anomaly detection takes center stage here and signature tools will leave you wanting.

The Radware VP concludes that this problem requires action on behalf of security professionals to solve; you HAVE to do something different because the inertia path will leave you vulnerable.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.