Feeds

Boffins squeeze a mesh onto Android handsets

Mobile phone, or network relay?

Secure remote control for conventional and virtual desktops

Australian researchers have ported Wi-Fi mesh-networking onto the Android platform, potentially turning any Android handset into a relay able to extend network coverage into disaster areas.

The newly-demonstrated project is called Serval, after a kind of cat, and enables a standard Android handset to make voice calls (VoIP), which are relayed though one or more handsets back to the cellular network: it's not a new idea, but doing it with standard handsets makes it a great deal more practical.

The TETRA phone system, used by emergency services across Europe, is supposed to be able to do the same thing – every TETRA handset should be able to operate as a relay. In fact the functionality is limited to vehicle-mounted radios, but still useful to those called upon to attend remote regions without time to prepare something more suitable.

In Sweden TerraNet has spent the last few years trying to do much the same thing – with the laudable aim of bringing connectivity to the third world through spontaneous meshing at 2.4GHz, but with limited success.

More recently, we have Peep Wireless, which got loads of press a few weeks back and is now busy raising money on the back of promises to make every phone a relay using (according to its website) the entire electromagnetic spectrum. Without bothering to provide any details of how it's going to work this magic of course.

Unlike the chaps in Oz, who first demonstrated a working relay last year, and now have one running on Android. Admittedly the quality is suited to emergency situations, where no better alternative is available, but using standard kit makes the whole thing much, much, cheaper, and the group's commitment to providing the eventual software for free (and open sourced) could see mesh voice in all sorts of places. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.