| Archive 1 Nov 2007 #64HIGH AVAILABILITY FROM THIN AIR: CELLULAR BACKUP FOR DATA LINKS By William Flanagan, Publisher We always get a chuckle from stories of cable cuts where the back up link was in the same bundle as the main link. Without diverse routing, which can be even more expensive, redundancy alone may not be worth the price of the second line. It depends on what you want to protect and protect against. Cellular networks offer connectivity that's always diverse from a land line. This form of wireless hasn't been exploited much in the past, perhaps because of the limited speeds, relatively high per-minute usage charges, and the need to use multiple channels to get the top throughput. =================== TRIPLE THREAT FOR YOUR WHITE PAPERS We have the technical knowledge, marketing experience, and business sense to make your next White Paper a powerful tool. Let's talk about it. Flanagan Consulting Ph: +1.703.242.8381 =================== The latest cellular standards set up dedicated data capability separate from the dialed voice channels--allowing carriers to drop the price of bandwidth significantly. Examples of services include EVDO, HSDPA, EDGE, and GPRS. Recent generations of cellular equipment boost the speed limit to more than a T-1 (in the direction from cell base station to end point). Upstream the services clock data at 800 kbit/s, but practical throughput tops out at half that. Work proceeds on services offering symmetrical throughput with uploads as fast as downloads. To keep the players straight you need more of a scorecard than we have room for here. To make things easy on you, the basic networks are all IP, today's lingua franca of communications. WAY TO GO Specialized routers are the way to take advantage of cellular data to back up your applications. You can get small routers with a variety of data interfaces: Ethernet, of course, and serial ports for all the legacy protocols (frame relay, SCADA, SDLC, ALC, X.25, etc.). Routers with serial interfaces either encapsulate the legacy frames in IP or spoof the protocol of the local device. Either way, the traffic becomes IP and therefore is routable on the Internet. The router's forwarding table typically makes the land line the primary or preferred route. If the primary is unavailable, packets take the secondary route via the cellular interface. No intervention by an operator is needed. Thus the remote site is protected from loss of local terrestrial connectivity, improving availability. The cellular antenna on the router is quite small, and may work fine. If the router is in a commercial wiring closet, it may be shielded by metal studs or lathe. The antenna alone may be relocated into a stronger signal by adding a thin coax cable between it and the router. One vendor offers a 6-foot extension as standard; runs up to 20 feet are possible. What about the central site? Because the cellular service connects directly to the Internet, no special equipment is needed at the central site. If the remote sites are "pure IP" then the central site is probably a server running an appropriate application, with Internet access. Connectivity over Ethernet does the job at both ends. You can see Fig. 64-1 at http://viewsletter.com/VLHAhtml/vlha64Fig1.html. Note that this scenario protects the remote site from loss of the data land line; it doesn't provide redundant access at headquarters--that's a separate issue. Legacy protocols offer "more interesting" scenarios--and may see even quicker paybacks on the investment. Where the remote router spoofs the protocol, the central site probably needs to "unspoof" it or convert it back to the original format for the central computer. The drawing at www.viewsletter.com/VLHAhtml/vlha64Fig2.html shows this for electric power distribution. Note that the solution does not require any change to either the central computer or remote SCADA equipment. Companies monitor and control switches, transformers, and other equipment using the decades-old Supervisory Control and Data Acquisition (SCADA) protocol. The central computer polls the remote sites, sending messages over serial interfaces designed for multi-drop modem links. A central router or data conversion unit appears to the computer as multiple leased or dial-up lines. Information actually moves over the IP network to the remote site, where it is converted back to SCADA format. The last major blackout increased the awareness of control functions for power transmission and triggered new regulations to improve reliability. SCADA was designed for modems and analog lines, which are quite reliable but vulnerable to a break in the line, either by weather or sabotage. Cellular can back up that land line with a connection that's much harder to bring down. If the cellular router is within range of more than one cell site, even better. Some "accessibility challenged" locations are hard to provision with any form of land line. Those sites benefit immediately from cellular connectivity, where available, as the primary or only connection. As cellular coverage spreads and data connections increase in speed, the service becomes more appealing for applications that formerly may have seen satellite as the optimum solution. Examples include point of sale devices such as credit card verification, lottery ticket sales, ATM (cash) machines, and updating of prices on gas pumps. Your feedback is always welcome: Publisher@ViewsLetter.com. ================================ How Can Flanagan Consulting Help You? We understand not only the technology of networks, but also the surrounding business processes: procurement, bid preparation/analysis, statements of work, financial analysis, consensus building, and more. We have current experience in litigation support for attorneys involved with patents or contracts related to networking or voice and data communications. Find out now: call +1.703.242.8381 ================================ Subscriptions to ViewsLetter Mailman, the Linux application, keeps the mailing list and posts messages. It is set up as a "read only" list. Because of the number of 'out of office' autoreplies, replies to this message are discarded. You can unsubscribe or subscribe at: http://lists.viewsletter.com/mailman/listinfo/vl2006 You will need a password to unsubscribe, but Mailman will send you one on demand. If you have a problem with the list, send an email to Publisher@ViewsLetter.com. ================================ Special thanks for supporting ViewsLetter to www.webtorials.com, your best source for communications tutorials and white papers. ================================ "Flanagan Consulting" www.flanagan-consulting.com and "ViewsLetter" www.viewsletter.com are Service Marks of W. A. Flanagan, Inc. ____________________________________________ Flanagan Consulting Ph: +1.703.242.8381 45472 Holiday Dr. #3, Sterling, VA 20166 USA "Beware of false knowledge; it is more dangerous than ignorance." --George Bernard Shaw _______________________________________________ VL2006 mailing list http://lists.viewsletter.com/mailman/listinfo/vl2006 "Flanagan
Consulting" and "ViewsLetter" are Service Marks of W. A. Flanagan, Inc.
|
![]() W. A. Flanagan, Inc. 45472 Holiday Drive, #3 Sterling, VA 20166 Ph: +1.703.242.8381 Fx: +1.703.242.8391 | In Converged Networking, We have the Experience Editor@ViewsLetter.com www.flanagan-consulting.com [directions] |