(03) 9457 4488

1/1 Culverlands St, Heidelberg West 3081

DECT VERSUS VOIP OVER WI-FI

 

Background

 

 

It is currently estimated that up to 80% of workers are potentially mobile around their workplace and may have a need to access wireless voice communications onsite. The implementation of wireless LANs (predominantly based on 802.11b and 802.11g standards operating in the 2.4 GHz band) to carry data has lead some vendors to eagerly promote the idea that adding IP enabled wireless handsets to a data network is a relatively simple, inexpensive and reliable method of delivering voice over wireless LAN (VoWLAN). This has lead to declarations that DECT systems, traditionally used for wireless PABX, will not be able to survive in the medium term.

 

Despite this hype, the consensus of panellists at the Wi-Fi VoIP Futures Summit at the VON trade show held in Boston in September 2003 was that “…there are a number of challenges that must be met before voice over Wi-Fi goes mainstream….VoWLAN won’t see widespread adoption until certain technical hurdles are addressed.”1 This paper seeks to dispel some of the hype and highlight some of the limitations potential users should be aware of that are inherent in the 802.11 solutions being offered today.

 

 

 

Quality of Service

 

Since 802.11 networks were designed to carry data, not voice, 802.11 b/g standards have no Quality of Service (QoS) mechanisms built-in to tell the network to prioritise voice packets over data, so a surge in network traffic can disrupt voice calls.1 Since voice is a real time application, QoS control is essential and without it may lead to end-to-end delays, jitter, out of sequence errors, packet losses and contention (resulting in people talking over each other or the sound breaking up).3

  

 

 

External Interference and System Load

 

The 2.4 GHz band under which both 802.11 b/g operate is a completely open frequency shared with other wireless networks, Bluetooth devices, cordless phones, fixed-wireless broadband Internet access, amateur radio and even microwave ovens. It is for this reason that it has commonly been referred to as the “junk band”6 for several years, with the plethora of devices sharing this narrow bandwidth leading to serious degradation of WLAN performance for both voice and data in terms of radio coverage as well as QoS as more devices come into operation. Adding voice to a data network has a number of ramifications.

 

Wireless users share a fixed amount of data bandwidth available from the access point.7 It has also been demonstrated that even a single user with a slow connection to a wireless network can “…significantly degrade the overall service to everyone using the Wi-Fi access station”8 leading to problems with the delivery of voice. Major LAN supplier, 3Com, concurs, stating that “Current WLANs are not well designed for voice traffic. The slowest device on a WLAN access point slows down the entire traffic. Voice traffic often breaks up, devices get disconnected, and data connections are slowed down heavily.”3

 

In contrast to this, DECT operates in its own allocated protected frequency band (1880 -1900 MHz) and thus does not suffer from interference from competing technologies operating in the same band. This enables multiple DECT systems to operate in parallel and independently in the same area without interference or degradation of service.

 

 

 

Security

 

It is generally accepted that the security schemes commonly used for Wi-Fi handsets, Wireless Encryption Protocol (WEP) and MAC address authentication are insufficient.1 Aruba’s VP of product marketing notes “There’s a huge security hole for voice. Handsets and the technology today are a generation behind the state of the art….Static WEP is weak and can be broken and using a MAC address means that once that address is admitted, it can go wherever. Spoof that and it can send non-voice packets into the network to cause a disruption. ”13 In comparison, the DECT standard includes built-in 128-bit authentication and identification access security and built-in encryption based on derived or static 64 bits cipher keys transmission security14, eliminating eavesdropping and other security breaches.

 

 

 

Conclusions

 

The concept of simply adding Wi-Fi capable handsets to an existing WLAN to provide a commercial-grade wireless voice system has a lot of financial and technical appeal on the surface. This paper has attempted to identify a number of important questions that prospective users should be asking vendors offering this solution, including:

  • Is the system or components of the system proprietary, tying the user into a particular vendor?
  • How many users can the system support in total?
  • How many simultaneous voice calls can be held per access point?
  • How many additional access points will be required to provide blanket voice coverage?
  • Is the system operating in the 2.4 GHz “junk” band?
  • Does the system comply with security standards?
  • What is the measured delay in handover between access points? Is the handover protocol proprietary?

 

If these questions are not fully answered to prospective users’ satisfaction, they should give serious consideration to continue the search for more practical alternatives.

 

 

1. VoWLAN: Not Ready for Prime Time

Publication: Wi-Fi Planet

Author: Vikki Lipset

Published: 23/9/2003

 

3. Voice over IP + wireless LAN = ?

Publication: Technology & Business Magazine

Author: Steven Withers

Published: 27/11/2003

 

6. Broadband wireless eyes midspeed range

Publication: EETIMES

Author: Ann R. Thryft

Published: 2/10/2000

 

7. Management office equipment & technology special report

Publication: CFO Magazine

Author: Darren Horrigan

Published: 1/6/2003

 

8. Single slow user can throttle Wi-Fi network

Publication: New Scientist

Author: Will Knight

Published: 4/8/2003

 

13. Talking about securing VoWLAN

Publication: Wi-Fi Planet

Author: Eric Griffith

Published: 5/4/2004

 

14. Reliable wireless communication

Publication: DECT Forum website

Author: –

Published: –