User Tools

Site Tools


telecommunications

This is an old revision of the document!


NOTE

This is a stub article for the time being. A rough outline is listed below, but should not be referenced for IC purposes until approved. - Hagaalaz

Telecommunications

Wireless Technologies

  • Smartphones and their progeny go here. Each planet has its own local wireless network, but communication between planets and solar systems is limited by the speed of light, making text messages/video messages/voicemail the medium of interplanetary/interstellar choice. “Traveller-style express boats” (or maybe automated systems on the uncia spaceliners) relay messages between systems, maybe?
  • Shipboard comm systems go here, too. Again, communications are limited by speed of light, so perhaps specify an OOC convention that ships use specific comsys.muf channels for each given system?

The Internet

Blurb about each major “planet” having its own network goes here, limited only by speed of light. See above blurb re: “Traveller-style express boats”?

Public Access Networks

  • Goggle, InfoDumpedia, FaceySpaces and TweetyPages go here… Anonymous access is permitted and encouraged.
  • E-commerce and banking systems also go here. Use of authenticator dongles and 'Real ID' encouraged, but depending on the company, may not be required. A secure subset of public access networks.
  • Public-facing information sites belonging to government agencies and megacorporations also go here, but they are isolated from the secure Private Networks listed below.

Private Networks

Megacorporate and government intranets, etc…

  • Access via secure terminal units:
    • Hardwired identity information (think “MAC address”).
    • Multiple redundant authentication systems, such as:
      • Biometric sensors
      • Authenticator dongles
      • “DoD Common Access Card”-style smart cards
  • Realtime AI system management of these networks:
    • Asset tracking of secure terminals/authenticators, and terminating access of “lost/missing” hardware.
    • File access tracking.
    • Information hygiene:
      • Detection and denial of access for unauthorized hardware.
      • Special permissions needed for removable storage media use.
    • Generally keeping the riff-raff out…).
  • Separate “AUTOVON/Red Phone”-style network instead of shared public-switched telephony-style network.
  • Protocols used for these networks are not compatible with protocols for Public Access Network.
telecommunications.1311443541.txt.gz · Last modified: 2011/07/23 17:52 by hagalaz