Skip to main content

How A Group of Residents Created Their Own Internet Service Provider

After a long list of unresolved complaints
regarding bad internet services, the residents of Orcas Island
in Washington state decided to create their own internet
service by forming an organization named DBIUA. Read this
article to know how they achieved this and what were the
obstacles faced by them.
ust like the basic amenities of food
and health, a good internet service
has become everybody's
requirement. If you live in some remote
area, getting a reliable internet access is
something to be thankful for.
But, what to do if all those
complaints about that unreliable internet
access go unanswered? The residents of
Orcas Island in Washington state were
facing troubled internet with
CenturyLink's service. Instead of choosing
the option of doing nothing, they decided
to build their own internet service.
Covering this interesting story, Ars
Technica writes that the residents just got
fed up with CenturyLink and decided to
rescue themselves. This initiative was
materialized in the form of nonprofit
organization Doe Bay Internet Users
Association (DBIUA) founded by Chris
Sutton, Chris Brems, and others. The
DBIUA is now a wireless network
provider on a portion of the island.
Everyone was asking, "what can we do?'"
resident Chris Brems recalls.
"Then [Chris] Sutton stands up and says,
'Well, we can do it ourselves."
This wireless network works with radios
installed on trees and houses in the Doe
Bay portion of Orcas Island. A microwave
tower across the water in Mount
Vemon (Washington) sends signals to
radios installed on the top of a water
tower on the island, which further
transmits the signal to the radios on trees.
DBIUA paid StarTouch Broadband
Services about $11,000 for getting this
microwave link to the water tower.
Sutton is a software developer and he's
amazed how rare such projects are as "it
wasn't that hard."
In 2013, the troublesome CenturyLink
service was supposed to provide download
speeds up to 1.5Mbps. The network failed
to deliver that and the service was totally
oversubscribed. Well, now the things are
changed as BIUA delivers 30-40Mbps and
it has never been below 20-25Mbps.
And here's the best thing about the
service, unlike your data provider, there's
no data cap for DBIUA users.
To measure the obstacles that could
hinder the wireless signals, DBIUA used a
drone to determine "whether a radio on a
treetop could reach other points of the
network".
The homes have a radio on the roof or
some other place that points to one of the
10 relay points that send the internet
signals. For the users, it's just like the
signals come to their tree and then to the
house.
All over the area, there are about 200
radios spread and each household has a
Wi-Fi router in the home to access the
internet.

Josidel Hosting
www.josiahdele.blogspot.com

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...