Searchโ€ฆ
๐Ÿ’ก
Key Network Concepts
Key concepts of the Pollen network include:
PollenCoin (โ€œPCNโ€): A token built on the Solana blockchain according to the SPL token standard and utilized within the Pollen network for: 1) Data Credit purchases from the Foundation; 2) to compensate Flower owners for a) providing network coverage, and b) transferring data for end users; 3) to compensate Validators for validating Flower coverage; and 4) to reward end users for utilizing the network.
Initially, the value of one PCN will be pegged to the US Dollar (โ€œUSDโ€) at a value of 1 PCN : USD $0.10 for the purposes of purchasing Data Credits. The price of PCN may be changed in the future by Pollen Opco or the eDAO. (For the avoidance of doubt, PCN is not a โ€œstablecoinโ€.)
The number of PCN minted is permanently fixed at 1,000,000,000 (one billion).
Data Credits (โ€œDCsโ€): Beginning in Phase II of the networkโ€™s deployment, end users and Validators will use PCN to purchase Data Credits (โ€œDCsโ€), each of which entitles a user to 1 GB of data transfer on the Pollen Network. The price of DCs are initially fixed at 1 DC : USD $0.50. The price of DCs may be changed in the future by Pollen Opco or the eDAO.
Pollen Hex (โ€œHexโ€): Pollen network coverage is measured on a hexagonal grid defined by the H3 hierarchical spatial index. Pollen utilizes Hex Level 9 as its primary Hex, which encompasses approximately 0.1 square kilometers or 0.04 square miles. Hexes are utilized for various purposes, including for calculating PCN payments to network participants (e.g., Flower coverage payments are tied to the number of unique daily combinations of Bumblebee-Hex connections) and placing Pollen Drops. Larger Hexes (e.g., Level 6 Hexes, which encompass 36.1 square kilometers or 13.9 square miles) may be utilized by Pollen for purposes of setting or calculating rewards, such as Geographic Boosts.
Internet Egress Privacy Service (โ€œIEPSโ€): SIMs encrypt all user data traffic between user equipment (Hummingbirds), the radio network (Flowers), and the Mobile Core. Where the Mobile Core delivers traffic to the internet (called the internet egress point), user traffic can be monitored and intercepted by parties conducting network surveillance and traffic analysis, including Internet Service Providers and governments.
Copy link