![]() |
||||||||
![]() |
![]() |
![]() |
![]() |
![]() |
|
Nokia cellular phones ![]() |
In January this year, mobile operator T-Mobile sent a report to the FCC describing how a certain Android IM client, created by an independent developer, caused "significant degradation of T-Mobile's cellular network. The reason was that the app was programmed to frequently open and close connections (constantly checking contact list statuses). This did not cause problems when the developer tested the program on the WiFi channel, but in the cellular network the activity of the application led to serious network congestion in places with a high density of subscribers, especially when the program became popular and many T-Mobile customers installed it. The operator estimated that the app alone caused a 1,200% increase in network load. T-Mobile representatives had to contact the program's developer directly to get him to fix his utility and release an update urgently. Engineers then had to revise the architecture of the radio network controllers (RNCs) so that the system could handle the new type of problem in the future. Unfortunately, T-Mobile did not provide details about the incident, including where and when it happened, or what specific software was to blame. But in any case, this story should demonstrate why it's so important for cellular carriers to overturn the principles of net neutrality and get the right to filter traffic on the network for each application and protocol at their own discretion. T-Mobile's network suffers not only from Android smartphones, but also from Apple iPhones. Although T-Mobile has no contract to sell these devices, there are a large number of hacked iPhones on the network. Last year, it was reported that we are talking about 300,000 iPhones. In another report to the FCC this April, T-Mobile complained that hacked iPhones were periodically sending PDP Context Activation signal packets to establish a connection and obtain an IP address. The effect of the signal packet stream was similar to a DoS attack and also caused problems on the network. |
![]()
|
|||
|
![]() ![]() |