Hong Kong’s Mesh Networking

Mesh Networking

It’s been almost impossible to avoid news about the ongoing protests in Hong Kong in recent weeks. The population is demanding greater democracy and autonomy from China – something that was supposedly safeguarded for fifty years after the UK handed control of the principality to the Far Eastern giant in 1997.

What has been less-well covered is the way the demonstrations have been organised and conducted. Protesters’ ‘app of choice’ has been FireChat – a service advertised in the Google Play store as “a new way to chat off-the-grid”. The reason the service has been favoured by people on the streets of Hong Kong is that it uses mesh networking – a technology that gives protesters a way to communicate with risking either bringing down their cell phone networks or using a network that their Government could monitor, control, or shut down.

Mesh networking is an ad-hoc network infrastructure that can be set up by anyone. It wirelessly connects computers and devices to each other without the need to pass through a centralised organisation (such as an ISP or phone company). A mesh network has the ability to reconfigure itself according to the availability and proximity of bandwidth, storage, number of users etc – thus making it highly resistant to both disasters and outside interference. In fact, the only way to shut down a mesh network is to shut down every individual node in the network, a virtually impossible task.

This recognition of mesh networking as a useful service has the potential to bring great benefits to the ongoing growth of the internet of things. It’s something that the developers of Firechat – OpenGarden – have been keen to exploit. At the CTIA trade show in Las Vegas last month, they announced the launch of ‘The Open Garden Network’ – a software system specifically designed to help internet of things devices connect to each another via a mesh network. It will allow lots gadgets in close proximity to network together without the need to rely on, or consume, the bandwidth of other networks.

Companies are already taking advantage. Phone Halo – makers of TrackR (a service for finding valuable items such as keys, wallets, and bags by using GPS) is one such example. They cannot use cellular or Wi-Fi radios due to the amount of space and power required, so they were using a phone-based TrackR app. Now they can take advantage of The Open Garden Network’s app for online and offline communication, meaning the amount of TrackR tags in operation should swell to considerably more than the existing 250,000.

As awareness of mesh networking grows, so the acceptance of it as an efficient way to connect devices increases. The Hong Kong protests could prove to be a turning point in many ways for many people, but few expected it to be a turning point for the internet of things.

By Daniel Price

Kokumai

How to Enhance Security of Digital Identity

Enhance Security of Digital Identity Introduction The subject of this article is a fragile digital identity built with a weak password, which makes a grave ...
Steve Prentice

Episode 3: The Bottomless Cloud – An Interview with David Friend of Wasabi

Why data is not “the new oil” and why “cloud” means more than we think. In his new book, author David Friend refers to the ...
Or Lenchner

Seeing what consumers see: opening the internet with IPPN

Opening the internet with IPPN To remain competitive and profitable, all brands must be data-gatherers. This is part of any brand’s daily routine, but a ...
Mark Casey Apcela

Why CloudHubs are an Important Ingredient to Optimizing Performance of Cloud-based Applications

CloudHubs - Optimizing Application Performance It may seem hard to believe, but even in this day and age, there are still some enterprises that are ...
Best Wordpress Alternatives

Managed Cloud WordPress Hosting Services

Managed Hosting Providers Managed cloud servers are becoming especially popular among startups and other small businesses concerned about Web security. Prior to managed hosting services, ...
Sam Bowman

Medical Data Online: What Are the Risks?

Medical Data in the Cloud Executive-level healthcare leaders must have a thorough understanding of cloud-based security risks. Patient data can vary from simple information such ...
Mark Barrenechea

Security is Job 1: Machines vs. Machines

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee ...
Anita Raj

Will there be a normal to go back to after COVID-19?

The COVID-19 Aftermath Until November last year, not one of us would have expected life to take such a dramatic turn in as short as ...
Mark Kirstein

BitTitan Cloud Predictions and IT Migration Trends

IT Migration Trends The beginning of a new year is an ambitious time for people and businesses. Strategic initiatives are finalized, goals are set and ...
David Gevorkian

Website Accessibility: Compliancy, Laws and Best Practices

Key to Making Your Website Accessible The internet has changed the education sector in so many ways. With e-learning, more people around the globe are ...