Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

hip 118 visualization data #418

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 68 additions & 0 deletions src/service/poc_mobile.proto
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,70 @@ import "mapper.proto";
import "hex_boosting.proto";
import "service_provider.proto";

message hex_usage_counts_req_v1 {
// H3 resolution 10 tile
uint64 hex = 1;
// Average count of unique helium mobile subscribers active in the hex during
// the previous 7 days ( inclusive of discovery mapping subscribers )
uint64 helium_mobile_subscriber_avg_count = 2;
// Average count of unique helium mobile discovery mapping subscribers active
// in the hex during the previous 7 days
uint64 helium_mobile_disco_mapping_avg_count = 3;
andymck marked this conversation as resolved.
Show resolved Hide resolved
// Average count of unique offload sessions active in the hex during the
// previous 7 days
uint64 offload_avg_count = 4;
// Average count of unique tmo cell tower sessions active in the hex during
// the previous 7 days
uint64 tmo_cell_avg_count = 5;
andymck marked this conversation as resolved.
Show resolved Hide resolved
// Unix timestamp in milliseconds of when the report was generated
uint64 timestamp = 6;
// Carrier pubkey from verification mapping service
bytes carrier_mapping_key = 7;
// Signed payload of the verification mapping service
bytes signature = 8;
}

message hex_usage_counts_res_v1 { string id = 1; }

message hex_usage_counts_ingest_report_v1 {
// Timestamp in milliseconds since unix epoch
uint64 received_timestamp = 1;
// the verified report
hex_usage_counts_req_v1 report = 2;
}

message radio_usage_counts_req_v1 {
// The onchain address of the hotspot
bytes hotspot_pubkey = 1;
// the cbsd id of the radio if it is a cbrs radio otherwise empty
string cbsd_id = 2;
// Average count of unique helium mobile subscribers which have connected to
// the radio during the previous 7 days ( inclusive of discovery mapping
// subscribers )
uint64 helium_mobile_subscriber_avg_count = 3;
// Average count of unique helium mobile discovery mapping subscribers which
// have connected to the radio during the previous 7 days
uint64 helium_mobile_disco_mapping_avg_count = 4;
// Average count of unique offload sessions which have connected to the radio
// during the previous 7 days
uint64 offload_avg_count = 5;
// Unix timestamp in milliseconds of when the report was generated
uint64 timestamp = 6;
// Carrier pubkey from verification mapping service
bytes carrier_mapping_key = 7;
// Signed payload of the verification mapping service
bytes signature = 8;
}

message radio_usage_counts_res_v1 { string id = 1; }

message radio_usage_counts_ingest_report_v1 {
// Timestamp in milliseconds since unix epoch
uint64 received_timestamp = 1;
// the verified report
radio_usage_counts_req_v1 report = 2;
}

message speedtest_req_v1 {
bytes pub_key = 1;
string serial = 2;
Expand Down Expand Up @@ -347,6 +411,10 @@ service poc_mobile {
returns (subscriber_verified_mapping_event_res_v1);
rpc submit_promotion_reward(promotion_reward_req_v1)
returns (promotion_reward_resp_v1);
rpc submit_hex_usage_counts_report(hex_usage_counts_req_v1)
returns (hex_usage_counts_res_v1);
rpc submit_radio_usage_counts_report(radio_usage_counts_req_v1)
returns (radio_usage_counts_res_v1);
}

message file_info {
Expand Down
Loading