DSL Oversubscription Vs. 3G Capacity

A fierce competition is raging in Austria between DSL and 3G operators positioning 3G data cards as an alternative for DSL connectivity. Prices are interesting too, so many people are going wireless these days. Which leaves the question of how much capacity mobile networks could have compared to DSL.

Certainly not an easy question to answer so let’s take a couple of assumptions:

Austria has 4 HSDPA networks today. Let’s say in a city like Vienna the average cell inter distance is 1km. Usage is still in it’s early stages so only a single 5 MHz channel is used in a 3 sector cell. Per sector throughput is assumed to be 2.5 MBit/s. Since the cell covers an area of 1 km², the capacity in that area per operator is thus 2.5 * 3 = 7.5 MBit/s. All 4 operators together would thus create a capacity per km² of 30 MBit/s.

On the fixed line side I would say that DSL today offers a speed of on average of 4 MBit/s to housholds in cities like Vienna. Vienna has a a population density of 4000 inhabitants per km². Let’s say the average household has 3 people and DSL penetration is 40%. Thus there are (4000 / 3) * 0.4 = 533 DSL lines per km². With an average speed of 4 MBit/s per DSL line that would be 2.113 GBit/s. Sounds like a lot more than what the 3G calculation results in above. But wait, there’s a catch. The 4 MBit/s are only valid between a subscriber and the DSLAM (DSL Access Multiplexer). The connection to the core network is usually much smaller. I’ve heard the ‘oversubscription’ is anywhere between 1:20 and 1:50. Let’s assume the oversubscription is 1:30. As a result, the DSL capacity per km² would be 71 MBit/s.

30 MBit/s wireless vs. 71 MBit/s via DSL

The example stands or falls with the DSL oversubscription ratio. If you have more details on this please let me know!

More Wifi Layer 1 Tracing with Wi-Spy

Last week I reported on my new Wi-Spy analyzer that has gripped my imagination and is since scanning the ISM band used by Wifi, Bluetooth and other radio systems wherever I go. Today I’ve got a couple of additional traces which I think are spectacular enough to show around.

A3_mkdrf_with_file_transfer_topo_on
The first picture on the left shows how the ISM band looks like in my neighborhood. There’s one Access Point broadcasting away on channel 1. On channel 2 there are another two access points and probably a third one which is farther away and thus it’s amplitude is much lower than those of the other two. My own access point operates on channel 11 and sent a lot of data to my notebook when the trace was taken. Hence the access point emissions are shown in red. The notebook doesn’t send a lot of data but has a higher amplitude since the antenna is closer to the Wi-Spy probe. Since there is a notebook with an ‘old’ 802.11b network card in the network both the access point and my notebook send ‘Clear To Send’ packets with direct spread (DSSS) modulation. This shows quite nicely in the trace with the two side lobes to the left and right of the high main arch produced by the receiving notebook. The data packets itself are sent with 802.11g OFDM modulation which produces a much flatter main arch. The red space in the trace is actually a mixture of DSSS and OFDM modulation. Look closer and you will also see an access point transmitting on channel 9.

A6_hung_belkin_wlan_card_narrow_int
The second image on the left shows what happens when a Wifi card runs wild. Before I ran the test I remembered that I had a broken 802.11g network card which used to always work quite well for a couple of minutes before loosing the network. As can be seen in the figure, loosing the network actually means going completely wild. It looks like it completely looses modulation and after a short stint in the original band where it used to send and receive it moves down the bottom of the ISM band with the two main archs at 2410 and 2420 MHz. The peaks on the side are probably the side lobes. Looks like the wifi card is blasting away on full power throughout the band and I am sure it wracks havoc on any transmissions within reach… Looks like the wifi card is ready for the scrap yard.

So much for today. For more traces take a look at my previous entry, at the trace library over at Metageek either here or here.

A Question For a Wifi Ueber-Geek

I like when things work but I get a strange feeling it if I can’t explain why. Here’s a scenario that works perfectly well but I can’t figure out why. Maybe a Wifi Ueber-Geek can help:

I’ve used a Linksys WRT54 access point configured to AP client mode (bridged) to connect to a Siemens Wifi Access Point. Connected to the WRT54 are two notebooks, each via one Ethernet port. When the cable is plugged in both were assigned an IP address by the DHCP server running on the Siemens AP (192.168.40.20 and 192.168.40.73). Both can communicate with the Internet over the single wireless link just fine. What I wanted to test with this scenario was how the Ethernet MAC addresses of the two notebooks and the WRT54 access point are used on the wireless link.

To my great surprise the Siemens AP always uses the Ethernet MAC address of the WRT54 when packets are sent to one of the notebooks. But how does the WRT54 then know which notebook (which Ethernet port) it should deliver it to? On the notebook the incoming packet contains its MAC address. This means that the WRT54 must have changed the MAC address in the destination field. But why does it do that and how can it know which MAC address to use? I am thoroughly confused.

I’ve documented the result in the two pictures below. The first picture shows how the packet looks like when its received on the WRT54. The destination address in the 802.11 header is the WRT54 (Cisco-Li…, traced with Kismet on the WRT54). The same packet on the notebook (traced with Wireshark) suddenly contains the notebooks MAC address in the destination field of the of the Ethernet II header (Uniwil…). It’s not IP routing since the notebooks and the Siemens AP behind the wireless link are all in
the same subnet. It’s also not Layer 2 bridging since the MAC address
changes.

Does anyone have an explanation for this?

Wifi1b
Wifi2b


More Internet on Train: Thalys Starts Pilot Service

A number of train operating companies have started to offer Wifi Internet access in some of their trains over the past year or two like for example in the U.K. or in Germany. Now Thalys, a private train company that links Paris with Brussels and Cologne has started their pilot service for Wifi Internet access on trains. From train to ground data is transmitted via Satellite, UMTS and GPRS. Another company that has understood how to make people take the train instead of the car or plane. Hopefully an example that spreads.

Michael Mace looks at Ovi and Nokia Strategy

My boss today pointed me to an article written by Michael Mace over at his Mobile Opportunity Blog on Ovi, and Nokia strategy. While in my own article on the topic I’ve been concentrating on the potential struggles between Nokia and mobile network operators this move will probably provoke , Michael broadens the scope and puts Apple and the iPhone into the equation. A long article but a worthwhile read since it contains a lot of thought provoking observations.

Interestingly enough we come to the same conclusion in our articles: We both fear that the whole process could lead to another set of walled gardens. More colorful perhaps but still with walls. But then, a mobile phone can have more than one door…

The Cell Phone Network Hack Of The Decade

In 2005, the cell phone of the prime minister of Greece and those of 100 other people were secretly tapped by what in my opinion is the most extraordinary attack on a cell phone network that has been uncovered to date. The July 2007 issue of the IEEE Spectrum magazine has a very good summary of what happened, how the spy program was detected and the consequences. The article is also available online.

Here’s the elevator pitch:

  • Unidentified hackers design a secret patch for Ericsson Mobile Switching Centers and mange to insert the code into switches in the Vodafone Greece network.
  • The code checks all calls and taps conversations made over 100 selected phones. These conversations are in effect duplicated and forwarded to other mobile phones.
  • The hackers make a mistake when they update their spy program and logs are generated by the switch. This tips of Vodafone and Ericcson which then start an investigation.
  • And for the rest… read the article.

It’s one thing to program a virus or trojan horse for a Windows, MAC or Linux box. Secretly inserting code into a GSM Mobile Switching Center which does not run an off the shelf operating system, however, is quite another. It definitely shows why Cryptophones that encrypt a call from mobile to mobile are worth their money. I wonder, how many of those 100 people used one…

20 Years Ago The GSM MoU Was Signed

Both a long time and a short time, but 20 years ago on the 7th of September 1987 the GSM Memorandum of Understanding (MoU) was signed by 12 European nations on September the 7th. It took a bit after that but three and a half years later the first GSM network, today known as Elisa in Finland, opened its doors. Since then the mobile networks are constantly evolving and activities are still accelerating rather than slowing down.

For a long time, mobile networks were considered voice only networks and even SMS was only added to networks at the end of the 1990’s. Since then mobile data services have evolved in only a few years from speeds of a couple of bits per second to multi megabit 3.5G highspeed. Nevertheless, everything is still based on the GSM standards from back then, or 3GPP standards as they have been renamed to in the meantime.

The telecoms industry had a tremendous roller coaster ride during that time. For many people working in the industry the ride did not always go to the better side. After the .com burst at the beginning of this decade, tens of thousands of people in the telecom industry have lost their jobs. Today, unlike the IT industry which seems to have picked up steam again, the telecoms industry with some exceptions is still struggling and the turbulences are far from over. A challenging time for everyone in the industry which takes true determinism.

Looking at the user side it’s incredible to see the changes mobile networks have brought to the life of people in both rich and poor countries. Voice was the first revolution and today few people can still imagine a life without cell phones. Generation-C can probably not imagine it at all. After a number of iterations I can see mobile Internet access now also picking up with people around me and even some skeptics of yesterday are now using a Blackberry or HSDPA mobile data card in their notebook. Generation-C is next, pricing levels are close to become affordable for them!

Good sides, bad sides, but no matter happy birthday GSM!