Solved

will data still transmit if cell phone circuits  are overloaded

Posted on 2013-10-31
8
378 Views
Last Modified: 2013-10-31
I'm working on a disaster recovery plan and need to know in the event cell phone communication is overloaded will the data, such as email still get transmitted
0
Comment
Question by:jrsitman
  • 4
  • 3
8 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 150 total points
ID: 39615097
No.
0
 

Author Comment

by:jrsitman
ID: 39615170
not the answer I needed, but thanks.  :-(
0
 
LVL 82

Accepted Solution

by:
Dave Baldwin earned 250 total points
ID: 39615177
In disasters, it is common for all communications circuits to get overloaded and become difficult to send data or voice.  In addition, cell phone towers and telephone lines in the area of the disaster are subject to being damaged and not functioning any more.  I would imagine that 'disaster recovery' can't start until services are restored.

Note that emergency services bring in their own portable communications shelters that can provide radio and computer services in times of disasters.
0
 

Author Comment

by:jrsitman
ID: 39615279
are there other means of sending email if phones are unavailable?
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 
LVL 82

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 250 total points
ID: 39615377
Not that I know of.  But then it depends on the size of the disaster.  Super Storm Sandy and Hurricane Katrina pretty much wiped out everything in their paths.  But tornadoes in Oklahoma often leave everything beside their path untouched.  I suppose you could install satellite internet.  It's pretty expensive and slow and requires an outdoor antenna which could be damaged by the weather.
0
 

Author Closing Comment

by:jrsitman
ID: 39615652
Thanks for all the help
0
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 39615849
You're welcome.  Good luck with your planning.
0
 

Author Comment

by:jrsitman
ID: 39615858
Thanks.  Been working on it for months
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

If you are anything like me, you install many apps on your phone and have your life on it, sometimes literally.  When I bought my current phone, a Samsung Galaxy S5 from Verizon, they were only selling the versions with 16 GB internal.  I didn't rea…
I'm Dumb-phoned(ed) Last week, I noticed this message when adding events to my Google Calendar: On June 27th (2015), Google is removing SMS as a notification option for Google Calendar events.  Their assumption is that enough people have smart p…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now