Hong Kong’s Mesh Networking

Mesh Networking

It’s been almost impossible to avoid news about the ongoing protests in Hong Kong in recent weeks. The population is demanding greater democracy and autonomy from China – something that was supposedly safeguarded for fifty years after the UK handed control of the principality to the Far Eastern giant in 1997.

What has been less-well covered is the way the demonstrations have been organised and conducted. Protesters’ ‘app of choice’ has been FireChat – a service advertised in the Google Play store as “a new way to chat off-the-grid”. The reason the service has been favoured by people on the streets of Hong Kong is that it uses mesh networking – a technology that gives protesters a way to communicate with risking either bringing down their cell phone networks or using a network that their Government could monitor, control, or shut down.

Mesh networking is an ad-hoc network infrastructure that can be set up by anyone. It wirelessly connects computers and devices to each other without the need to pass through a centralised organisation (such as an ISP or phone company). A mesh network has the ability to reconfigure itself according to the availability and proximity of bandwidth, storage, number of users etc – thus making it highly resistant to both disasters and outside interference. In fact, the only way to shut down a mesh network is to shut down every individual node in the network, a virtually impossible task.

This recognition of mesh networking as a useful service has the potential to bring great benefits to the ongoing growth of the internet of things. It’s something that the developers of Firechat – OpenGarden – have been keen to exploit. At the CTIA trade show in Las Vegas last month, they announced the launch of ‘The Open Garden Network’ – a software system specifically designed to help internet of things devices connect to each another via a mesh network. It will allow lots gadgets in close proximity to network together without the need to rely on, or consume, the bandwidth of other networks.

Companies are already taking advantage. Phone Halo – makers of TrackR (a service for finding valuable items such as keys, wallets, and bags by using GPS) is one such example. They cannot use cellular or Wi-Fi radios due to the amount of space and power required, so they were using a phone-based TrackR app. Now they can take advantage of The Open Garden Network’s app for online and offline communication, meaning the amount of TrackR tags in operation should swell to considerably more than the existing 250,000.

As awareness of mesh networking grows, so the acceptance of it as an efficient way to connect devices increases. The Hong Kong protests could prove to be a turning point in many ways for many people, but few expected it to be a turning point for the internet of things.

By Daniel Price

Kaylamatthews

New Security Regulation – Cybersecurity Maturity Model Certification (CMMC)

Cybersecurity Maturity Model Certification Changes are on the horizon for the Department of Defense (DoD) and its contractors. Late last year, the DoD announced the ...
David Friend

Tech Evolution – Why Multi-Cloud Will Win

Why Multi-Cloud Will Win When I was growing up in the 1970’s, IBM ruled the roost in corporate data centers. If you walked into a ...
Bigcommerce

Magento 1 Is Nearing Its End – Is It Time To Migrate To BigCommerce?

Time To Migrate To BigCommerce? Nearly three years ago, Magento declared that they would be ending support for their Magento 1 software. All versions of ...
Gilad David Maayan

Accessing (HPC) High Performance Computing

HPC in the Cloud Big data and Machine Learning (ML) can provide businesses with incredible insights and an innovative edge. However, to properly analyze the ...
Steve Prentice

Cloud-Based Financial Software Reinforces the 80/20 Rule of Business Management

Cloud-Based Financial Software Sponsored by Sage 50cloud Small businesses are known for being innovative and customer-focused in a way that their larger competitors cannot. This ...
Mark Barrenechea

Security is Job 1: Machines vs. Machines

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee ...
The Report.png