October 9, 2014

Hong Kong’s Mesh Networking

By Daniel Price

Mesh Networking It’s been almost impossible to avoid news about the ongoing protests in Hong Kong in recent weeks. The population is demanding greater democracy and autonomy from China – something that was supposedly safeguarded for fifty years after the UK handed control of the principality to the Far Eastern giant in 1997. What has […]

Mesh Networking

It’s been almost impossible to avoid news about the ongoing protests in Hong Kong in recent weeks. The population is demanding greater democracy and autonomy from China – something that was supposedly safeguarded for fifty years after the UK handed control of the principality to the Far Eastern giant in 1997.

What has been less-well covered is the way the demonstrations have been organised and conducted. Protesters’ ‘app of choice’ has been FireChat – a service advertised in the Google Play store as “a new way to chat off-the-grid”. The reason the service has been favoured by people on the streets of Hong Kong is that it uses mesh networking – a technology that gives protesters a way to communicate with risking either bringing down their cell phone networks or using a network that their Government could monitor, control, or shut down.

Mesh networking is an ad-hoc network infrastructure that can be set up by anyone. It wirelessly connects computers and devices to each other without the need to pass through a centralised organisation (such as an ISP or phone company). A mesh network has the ability to reconfigure itself according to the availability and proximity of bandwidth, storage, number of users etc – thus making it highly resistant to both disasters and outside interference. In fact, the only way to shut down a mesh network is to shut down every individual node in the network, a virtually impossible task.

This recognition of mesh networking as a useful service has the potential to bring great benefits to the ongoing growth of the internet of things. It’s something that the developers of Firechat – OpenGarden – have been keen to exploit. At the CTIA trade show in Las Vegas last month, they announced the launch of ‘The Open Garden Network’ – a software system specifically designed to help internet of things devices connect to each another via a mesh network. It will allow lots gadgets in close proximity to network together without the need to rely on, or consume, the bandwidth of other networks.

Companies are already taking advantage. Phone Halo – makers of TrackR (a service for finding valuable items such as keys, wallets, and bags by using GPS) is one such example. They cannot use cellular or Wi-Fi radios due to the amount of space and power required, so they were using a phone-based TrackR app. Now they can take advantage of The Open Garden Network’s app for online and offline communication, meaning the amount of TrackR tags in operation should swell to considerably more than the existing 250,000.

As awareness of mesh networking grows, so the acceptance of it as an efficient way to connect devices increases. The Hong Kong protests could prove to be a turning point in many ways for many people, but few expected it to be a turning point for the internet of things.

By Daniel Price

Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

AI at the Gate: Navigating the Future of Cybersecurity with SonicWall’s Bobby Cornwell

Navigating the Future of Cybersecurity In the face of the digital age’s advancements, AI’s role [...]
Read more

A.I. is Not All It’s Cracked Up to Be…At Least Not Yet!

Exploring AI’s Potential: The Gap Between Aspiration and Reality Recently Samsung releases its new Galaxy [...]
Read more
Metasploit-Penetration-Testing-Software-Pen-Testing-Security

Leading Cloud Vulnerability Scanners

Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn’t help with [...]
Read more

Lambda Cold Starts: What They Are and How to Fix Them

What Are Lambda Cold Starts? Lambda cold starts occur when AWS Lambda has to initialize [...]
Read more

Azure Free Tier vs. AWS Free Tier: Which Provides More Value?

Cloud computing has become a cornerstone for the digital transformation of businesses. From startups to [...]
Read more
Steve Prentice

Get Smarter – The Era of Microlearning 

The Era of Microlearning Becoming employable and then staying employable requires ongoing, up to date [...]
Read more

SPONSORS

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.