⬆️ ⬇️

Is one mobile application able to download a cellular network?

In January of this year, the mobile operator T-Mobile sent a report to the FCC describing how a certain IM client for Android, created by an independent developer, caused a “significant degradation of the T-Mobile cellular network”.



The reason is that the application has been programmed to open and close connections frequently (constant status checking in the contact list). This did not cause problems when the developer tested the program on the WiFi channel, however, in the cellular network, application activity led to a serious network overload in places with a high subscriber density, especially when the program became popular and many T-Mobile clients installed it.



According to the operator, only because of this application alone, the network load has increased by 1200%. Representatives of T-Mobile had to directly contact the developer of the program, so that he fixed his utility and immediately released an update.



Then, engineers had to revise the radio network controller (RNC) architecture so that the system could cope with a new type of problem in the future.

')

Unfortunately, T-Mobile did not provide detailed information about the incident, including where and when it happened, or what specific program was to blame. But in any case, this story should demonstrate why it is so important for cellular operators to cancel the principles of network neutrality and get the right to filter traffic on the network for each application and protocol at its discretion.



The T-Mobile network suffers not only from Android smartphones, but also from the Apple iPhone. Although T-Mobile does not have a contract to sell these devices, there are a large number of cracked iPhones on the network. Last year, it was reported that we are talking about about 300,000 iPhones. In April of this year, in another report to the FCC , T-Mobile complained that hacked iPhones periodically send PDP Context Activation signaling packets to establish a connection and obtain an IP address. The effect of the flow of signaling packets was similar to a DoS attack and also caused network problems.



via FierceWireless

Source: https://habr.com/ru/post/106260/



All Articles