Shopping Product Reviews

Mobile consumer ad hoc networks: the power of privacy

To anyone studying flows, it appears that the central and radial distribution system is alive and well. Much of this is due to the brilliance of Fred Smith, founder and chairman of FedEx, when he wrote a Harvard Business School report and business plan on the transfer of large Federal Reserve notes by air and their distribution. to the different banks. I think based on your infamous college report you only got a grade of C.

Although later, this concept of radio and center went on to become the FedEx distribution model, in the Memphis type. It is often cited in business books as ironic because, as we know, it became one of the greatest companies of all time, and FedEx has revolutionized the overnight shipping business and the entire distribution industry.

However, eventually FedEx also realized that getting packages to the Memphis Sort and back was not always the most efficient way to go once they had many regional offices. Instead, it made sense to send some of those packages directly to the next nearby regional office, bypassing the center. In doing so, they reverted some of their distribution to the point-to-point model, which has also re-established itself in recent years, perhaps the reason why Boeing is making 737s (backorders years in advance, in fact) still. . and Airbus opted for the A380, which can hold more people than a 747.

Now, let’s talk about how mobile phones are moved and distributed in data packets. When you are on your cell phone, you send that data to the closest cell tower, and in the cell tower the data goes to a landline phone and carries the information across the country, to its intended destination, which may be from another cell tower. to another. mobile user, or someone with a landline.

Okay, what if all the data went from your personal technology smart cell phone device to another personal cell phone device directly, bypassing the cell tower? What if there were other phones in the area and you were making a local call? They may jump three or four cell phones to get there, without ever going to the cell tower; like a walkie-talkie, instead of a trunked two-way radio.

That would make sense because most cell phone calls are local, and today people using their cell phone are calling or texting someone close to them in the same city within a 3 mile radius, and it turns out to be roughly the same radius for the cell towers. If you remember before 3G wireless technology, cell phone towers were 10 miles away and then 3 miles away.

But even if the person you are contacting was 15 miles away, the data packets could go from your cell phone, to someone else’s cell phone 3 miles away, to someone else’s cell phone 3 miles away. distance, and then to the cell phone you’re calling, and each time it would bypass the cell tower entirely, unless the intended recipient was on a landline. But why would you want to do that?

It really is simple, because you can put more users on the network, if you are using the cell phone towers less. Like 20 times more, and that’s a lot of data flow and a much more efficient model, for at least a good portion of the traffic. The significant cost savings are an understatement.

This could save tens of billions of dollars in the construction of new cell phone towers for the next 4 G and 5G wireless strategies that will be our future system in mobile technologies. Since mobile phones are already a sending and receiving device, this could easily be accomplished. And as long as everyone has extended the battery life of their personal communication devices, like iPads or smartphones, companies like Verizon, Sprint, and AT&T could make more money and have less capital expenditures.

This would be directly related to higher quarterly earnings and maybe a nice reduction in everyone’s cell phone bill. By doing this, it would give consumers more privacy, because their data would never go to a cell tower where it could be compromised or intercepted by those who wanted to access it. Like our government, for example, so let’s talk a little about that:

Whenever we leave back doors in our technology to allow the good guys to look at the data, or the information that flows through it, we inadvertently give the bad guys access, as they search the software code for those secret doors that allow our agencies to intelligence enter. , first.

By sending information data packets from one phone to another, where they will be accumulated by the receiving phone as they enter, each packet would be widely scattered, unreadable, or irrelevant in itself. However, all data packets that are bound at the receiving phone would display the message or voice phone message for the intended user.

There are pros and cons to not being able to monitor all that data, like this use of smartphone technology by; Smart mob protesters, local ELF terrorists or even terrorists planning an attack or planting bombs on the roads. This is because it would no longer be able to intercept the cell phone transmission by its electronic serial number or ESN on the cell tower as most of the traffic would be diverted.

Now let us consider the problems where a group of terrorists with machine guns tried to seize a hotel in Mumbai, since they were all using cell phones, the government of India could have intercepted that information in the cell tower and therefore could have done it. he caught them and avoided that chaos before the terrorists started. But, if cell phones also function like walkie-talkies on steroids and more like the Internet model by sending their packets of information everywhere, all together with any individual terrorist cell phone while communicating, they will be virtually unstoppable.

You can see that it is a serious problem, however you can see where it would be wonderful to be able to expand the number of users on a given cell phone network, free up frequencies, and have each of the phones communicate with each other by handing over the data as if they were a node or speck in a distribution system that uses cell phone towers at times, and peer-to-peer personal technology devices at other times, or a combination thereof. Actually redirecting traffic with whatever was best for the network at the time, which is pretty much how the internet works anyway, isn’t it? Almost, but not quite.

So if we use a point-to-point, plus hub and radio strategy, we get the best of all worlds and can increase network traffic as maybe 70-80% were released. Therefore, we could also take more data, allow more data transfer on board for video projection, holographic films, downloadable films on the go, etc. However, there are issues with this as well, which need to be addressed, along with increased efficiency and added privacy for the end user. Consider all of this.

Leave a Reply

Your email address will not be published. Required fields are marked *