Proxim Wireless Outdoor Router Protocol
Wireless Outdoor Router Protocol, commonly known as WORP® is a Proxim Wireless protocol embedded in every Proxim Tsunami® outdoor product. WORP® is specifically designed and engineered from the ground up to optimize the performance of multi-stream traffic such as triple-play (voice, video, data) on outdoor wireless Point-to-Point (PtP) and Point-to-Multipoint (PtMP) links.
Proxim WORP® Performance Advantages
WORP® Guaranteed Quality-of-Service (QoS)
The Proxim WORP® protocol ensures all application data receives the QoS optomization required to operate properly. QoS in this instance means minimum and maximum data rates with programmable jitter and latency limits, and operating within the defined parameters for packet loss and data error rates. This traffic performance optimization is accomplished by conducting deep packet inspection on every packet, identifying the packet application type, and enforcement of the QoS rules defined for the traffic. Proxim WORP® based QoS includes three primary components:
- Deep Packet Inspection (DPI) and the application of Packet Identification Rules (PIRs) providing precise classification of the traffic
- Service Flow Classes (SFC) define which define priority, bandwidth, latency and jitter classification rules for different traffic types
- Quality-of-Service Classes (QoSCs) defining which SFC or PIR will be used for each traffic class.There is also a table defining which QoSC will be assigned to each particular Subscriber unit during registration for individual traffic path optimization.
The Proxim WORP® protocol is extremely efficient, much more so than WiFi or LTE. WiFi and LTE have limited efficiency, for every 100Mbps of over-the-air data available typically only about 50Mbps is available for Ethernet traffic. In the same scenario, the Proxim WORP® enabled system delivers 75Mbps of useable Ethernet traffic. Simply put, WORP® based solutions make up to 50% more bits available in the network.
WORP® Provides Unparalleled Security
Proxim WORP® technology offers a variety of features to ensure unparalleled security.
First, the protocol is not publicized or standardized, making it far less vulnerable to hackers than any standards based security method. To decode a WORP® signal, a WORP® enabled device must be used as the decoding system.
Second, WORP® requires the Subscriber unit (SU) to register on the Base Station unit (BSU) performing a mutual authentication with identification using an MD-5 secret string. Both the BSU and SU know their peer belongs to the network, avoiding both rogue Subscriber units and rogue Base Station units.
Third, WORP® implements 128-bit encryption on all data sent over the wireless link.
Fourth, Access Control (authentication) occurs locally or via a RADIUS server.
Finally, all remote management methods use secure password-protected SSH, HTTPS and SNMP v3 connections for remote management and access.
WORP® Highly Scalable Deployments
Outdoor point-to-multipoint solutions based on the WiFi 802.11 MAC protocol may connect from 5 to 10 remote nodes. In heavy traffic multi-node deployments, performance starts to suffer due to packet collisions, with as few as 2 remote nodes. A solution using the WORP® protocol can connect over 100 remote nodes without adversely affecting usable bandwidth, allowing more concurrent Subscriber units to be active in large scale wireless multipoint environment.
Scalability requires the system to adapt to higher traffic loads in terms of the number of subscribers while the total aggregate data available remains constant. For example, a WiFi 802.11 based network with only 2 to 5 Subscriber units, the expected aggregate data rate of all users will be close to 50Mbps. The same WiFi network with 50 end users, the expected aggregate data rate for all Subscriber units drops to about 25Mbps. This is a function of the WiFi MAC protocol.
In a WORP® based network, whether there are 2 or 5 or even 100 Subscriber units, the total aggregate data rate remains the same. From the example above, for an over the air rate of 100Mbps, with 75Mbps of useable data, for 2 to 100 Subscriber units, the total available bandwidth remains 75Mbps for each Subscriber.
WiFi Hidden Node Problem
WiFi was designed for short range indoor applications. Inherent to the WiFi MAC protocol is the assumption that all clients can “hear” each other. With this assumption WiFi operates on a Carrier Sense Multiple Access (CSMA) Collision Avoidance technique. Simply put, each client device listens to the radio waves, if it does not hear another device communicating it assumes the channel is clear and begins its own transmission.
For outdoor networks, the assumption that all Subscriber units can hear each other is not always true. It is often the case a Subscriber unit with a directional antenna and obscured by obstacles such as buildings and trees, will not “hear” the other subscriber units. As a result multiple Subscriber units will attempt to access the wireless medium at the same time, causing interference with each other, resulting in a large number of re-transmissions and having a large impact on network performance.
The Proxim WORP® protocol avoids the re-transmission problem by using the Base Station units as a single point of control over all communications in the wireless channel. A Subscriber unit will not transmit data unless the BSU gives it permission resulting in no collisions and no re-transmissions. For outdoor networks this centralized control is critical to ensuring optimized network performance.
WORP® - Connecting the Internet of Things