Pollen Mobile Docs
Search…
⌃K
💡

Key Network Concepts

Key concepts of the Pollen network include:
PollenCoin (“PCN”): A token built on the Solana blockchain according to the SPL token standard and utilized within the Pollen network for: 1) Data Credit purchases from the Foundation; 2) to compensate Flower owners for a) providing network coverage, and b) transferring data for end users; 3) to compensate Validators for validating Flower coverage; and 4) to reward end users for utilizing the network.
Initially, the value of one PCN will be pegged to the US Dollar (“USD”) at a value of 1 PCN : USD $0.10 for the purposes of purchasing Data Credits. The price of PCN may be changed in the future by Pollen Opco or the eDAO. (For the avoidance of doubt, PCN is not a “stablecoin”.)
The number of PCN minted is permanently fixed at 1,000,000,000 (one billion).
Data Credits (“DCs”): Beginning in Phase II of the network’s deployment, end users and Validators will use PCN to purchase Data Credits (“DCs”), each of which entitles a user to 1 GB of data transfer on the Pollen Network. The price of DCs are initially fixed at 1 DC : USD $0.50. The price of DCs may be changed in the future by Pollen Opco or the eDAO.
Pollen Hex (“Hex”): Pollen network coverage is measured on a hexagonal grid defined by the H3 hierarchical spatial index. Pollen utilizes Hex Level 9 as its primary Hex, which encompasses approximately 0.1 square kilometers or 0.04 square miles. Hexes are utilized for various purposes, including for calculating PCN payments to network participants (e.g., Flower coverage payments are tied to the number of unique daily combinations of Bumblebee-Hex connections) and placing Pollen Drops. Larger Hexes (e.g., Level 6 Hexes, which encompass 36.1 square kilometers or 13.9 square miles) may be utilized by Pollen for purposes of setting or calculating rewards, such as Geographic Boosts.
Internet Egress Privacy Service (“IEPS”): SIMs encrypt all user data traffic between user equipment (Hummingbirds), the radio network (Flowers), and the Mobile Core. Where the Mobile Core delivers traffic to the internet (called the internet egress point), user traffic can be monitored and intercepted by parties conducting network surveillance and traffic analysis, including Internet Service Providers and governments.