Feeds

Wireless comms and the end of civilisation

Surviving Survivors

Secure remote control for conventional and virtual desktops

Characters in the recent BBC remake of Survivors seem curiously ill-informed about how the UK's communications infrastructure would deal with the collapse of civilisation, so in an attempt to ensure Reg readers are better-equipped we present a wireless guide to the apocalypse.

For those who too young to remember the original, and too socially active to have seen the remake, Survivors posits a plague that kills off the vast majority of the population within a period of weeks - leaving a random selection of survivors to try and build a brave new world. The original series hints at a laboratory accident, and a well-travelled scientist, while the new version seems to have an altogether more sinister cause. The first episode of the remake was shown last week in the UK, the original series is available on DVD but please try to avoid watching beyond the first season - you'll only be disappointed.

In 1975, when the first version of Survivors was broadcast, it was permissible to ignore wireless communications, and to assume that fixed infrastructure would fall apart pretty quickly once people started dying. But these days our infrastructure is much more autonomous and robust, and extensive plans exist to keep things running even as the world falls apart around us.

Hand over that Ham radio right now

The original Survivors was broadcast before the transistor enabled cheap electronics everywhere - the only nod to radio communications was a school master running a receiver on a line of car batteries, who tells our hero that the rest of the world is equally screwed and promptly disappears. The next thing we know Gregg is talking about laying miles of wire between communities, though by the time that becomes possible the pox gets him.

The remake simply chooses to ignore decades of development which should ensure that communication is maintained long enough to allow centralised control of the remaining population. In addition to a telephone network with its own power generation and delivery infrastructure, we have mobile communications networks that are capable of operation well beyond the end of the world as we know it.

The UK government even has a policy on Resilient Communications, while BT employs 50 full-time staff looking at how the network would cope with social and physical breakdown. This is not to mention the various volunteers making up Raynet,- the wireless comms equivalent to the St John's Ambulance, and that's not including the military's capabilities.

The current TV series pretty much ignores radio, pausing only to establish that mobile phones aren't working any more, and in that at least the program is right. GSM base stations run on normal mains power, so will fail soon after the grid fails. Local batteries may allow an hour or two's grace and base stations in hospitals, or any place with its own generated power, will last as long as the local power does. However, the GSM standard is based on centralised control - the connections to which could easily disappear once the national power grid goes down.

Not that most of us will be able to make a call anyway: in an emergency the government will likely invoke ACCOLC (Access Overload Control), which limits outgoing mobile calls to those registered with the network operators by government agencies.

Fixed infrastructure should fare much better. Normal phones receive power down the phone line from the local exchange, and those automatically switch to batteries and/or generators, and should be operational for 14 days after the national grid disappears - or well into episode 3 of Survivors. BT also maintains a number of container-based mobile exchanges, which can be deployed outside a disaster area, though in this instance that's not going to help.

The UK government can also call on BT to activate the Government Telephone Preference Scheme (GTPS), a rather draconian measure that cuts off every telephone not previously registered with BT as being exempt. Unlike ACCOLC the GTPS blocks both incoming and outgoing calls - those cut off don't even get a dial-tone. GTPS is being replaced with a priority system as part of BT's next-generation network, but how advanced that will be when the plague strikes is anyone's guess.

Security for virtualized datacentres

More from The Register

next story
Net neutrality protestors slam the brakes on their OWN websites
Sites link up to protest slow lanes by bogging down pages
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Who us, SHARE infrastructure? Networks reject gov proposal
Execs pour scorn on 'national roaming' outline – report
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.