physical internet

2026-01-12 22:44:06

DOI:10.5281/zenodo.18222036
DOI: 10.5281/zenodo.18222036

2026-01-12 17:43:15

physical internet
Physical Internet
A Proposal for a Consent-Based Small-Parcel Delivery Infrastructure Using Utility-Pole Unit Networks
Author: Satoru Document type: Concept proposal (illustrated) 
Version: v3 | Date: 2026-01-07 
Note: The cover image is an AI-generated concept illustration. It does not represent the exact dimensions, scale, materials, transparency, or handoff positions of the real system.

2026-01-12 17:48:52

physical internet Table of Contents
Table of Contents

1. Introduction: Infrastructure as the real speed 
2. System Overview: Unit Network, Home Units, IMS, and Customs Gate (optional)
3. Physical Design: Pipes, Spherical Packets, Storage and Drop-Off Model Reference Figure: Electromagnetic Coil and Spherical Packet (Concept Image) 
  3.1 Packet Send/Receive Terminal (Inner Sphere + Outer Shell Sphere) 
  3.2 Water Delivery Terminal (Dedicated Outer Shell + Direct Tank Connection) 
4. Ledger (Memory) and Map (Topology) 
  4.0 Token-Based Reward Design and Ledger Control (Core of the Backbone Network) 
  4.1 Packet Identification and Tracking (Continuous Positioning and Delivery Assurance) 
  4.2 Congestion/Collision Avoidance via Cooperative Unit AIs (Non-Stop Operation Control) 
  4.3 Early Development and Simulation of Distributed Unit AI (Reachability Without Central Monitoring) 
  4.4 Multi-Layer Unit Placement (Layer Key) and 3D Route Expansion 
5. Delivery Protocol (Consent Required) 
6. Safety and Misuse Countermeasures (Hazard Blocking, Grey Isolation, Terminal Lock)   6.1 Anti-Theft: Monitoring, Detection, Evidence, Response 
  6.2 Evacuation Control for Abnormal Packets (Autonomous Decisions Inside Units) 7. Congestion Avoidance (Home Slots, Empty-Packet Repositioning, IMS Buffer) 
8. Routing (Least-Congestion = Effective Shortest Time) and Tracking 
9. Tokenomics and Governance (Investment, Rewards, Usage-Based Voting) 
10. Software L1/L2 (Two-Layer Architecture) 
11. No Backdoors and Open Core 
12. Integrated Operator AI (Monitoring-as-Deterrence Concept) 
13. Customs Gate (National Sovereignty Domain) 
14. Constraints and Future Work 
15. Conclusion

2026-01-12 19:27:03

physical internet 1. Introduction (Infrastructure as the real speed)
1. Introduction (Infrastructure as the real speed)

When people imagine a 'fast vehicle', they may think of a supercar rather than a compact car. But what is truly fast is not the vehicle - it is the road (infrastructure). This document proposes a concept for a 'Physical Internet': using existing utility-pole infrastructure as a scaffold to deliver small parcels (roughly 10 cm class) to households in minutes. The concept is not limited to any specific country. It can be applied wherever utility-pole networks exist or expand. The author, Satoru, first organized the concept in Japanese and aims to publish this English version to attract potential investors and operators.

2026-01-12 19:27:38

physical internet 2. System Overview (Unit Network, Home Units, IMS, Customs Gate)
2. System Overview (Unit Network, Home Units, IMS, Customs Gate) 

The system treats the pipe segment between utility poles as the basic unit and transports standardized spherical packets electromagnetically. It consists of (i) a utility-pole unit network, (ii) home units that act like household mailboxes, (iii) an Inspection & Maintenance Station (IMS) responsible for inspection, cleaning, isolation, collection, and repositioning, and (iv) an optional Customs Gate Unit (CGU) for cross-border delivery.



Figure 1. Overall architecture (concept). Home units and IMS connect to the utility-pole unit network; CGU is used only when cross-border routing is required. 

In this document, a '30 m unit' refers to a structural unit spanning roughly 30 meters between utility poles. The 30 m value is illustrative and can be adjusted based on local conditions and construction constraints. By modularizing into units, the structure, contracts, maintenance, and investment units become explicit, simplifying expansion, replacement, and settlement.



Figure 2. Minimum interface for a 30 m unit (concept): bidirectional endpoints and at least one branch. In principle, the node degree should be at least 3.








Reference Figure: Electromagnetic Coil and Spherical Packet (Concept Image)


This image is provided only to support conceptual understanding. It does not represent the exact dimensions, materials, transparency, or implementation details. (Supporting the explanation of electromagnetic-coil-based transport.)


2026-01-12 19:28:19

physical internet 3. Physical Design (Pipes, Spherical Packets, Storage and Drop-Off Model)
3. Physical Design (Pipes, Spherical Packets, Storage and Drop-Off Model)

The primary physical component is a pipe (approximately 15 cm in diameter) that connects between utility poles. Inside the pipe, a roughly 10 cm class metal sphere (the spherical packet) travels as the 'packet'. Assuming electromagnetic transport, the pipe houses coils, internal cameras, communication cables, power cables, edge AI terminals, and sensors. One structural option is a double-pipe design: an outer pipe of about 15 cm diameter contains a central inner pipe of about 10 cm diameter (the transport channel). The remaining annular space (roughly 2.5 cm per side) is used for coils and other equipment. Exact dimensions are left to detailed engineering; this document presents the basic concept.



Figure 3. Double-pipe cross-section (ASCII). The inner pipe (about 10 cm) is centered within the outer pipe (about 15 cm); the surrounding space hosts coils, sensors, communications, power, and edge AI.


A home unit receives the spherical packet and opens it at a designated position so that the contents drop into the mailbox area. While this model simplifies mechanisms, it cannot handle fragile items that cannot tolerate rolling, acceleration/deceleration, or drop impact. As a staged rollout, it is acceptable to start with receive-only home units for safety and cost reasons.




Figure 4. Home-unit drop-off model (ASCII). Fragile items are excluded in the initial specification.

As a future extension, the system could also transport liquids. For example, households could connect a tank unit; in regions where water is scarce, the network may carry only water in leak-proof packets. Because liquid mode requires quarantine, hygiene, and pressure management, it is positioned as a later expansion.

3.1 Packet Send/Receive Terminal (Inner Sphere + Outer Shell Sphere)

At each household or facility, the send/receive terminal accepts a user-provided foam spherical container (the inner sphere). When the user requests delivery via the app, a reusable metal sphere (the outer shell) arrives from the IMS. Inside the terminal, the outer shell encloses the inner sphere and the combined packet departs immediately. At the destination, the process is reversed: the outer shell is separated and recovered; only the inner sphere (the item side) is handed to the recipient. Outer shells circulate within the system and do not accumulate outside it. 
• Place the inner sphere (foam container) into the terminal. 
• Request delivery via the app. 
• An outer-shell sphere (metal) arrives from IMS, encloses the inner sphere, and departs. 
• At arrival, the outer shell is recovered and re-injected; only the inner sphere is handed over.





Concept illustration for the terminal and the inner-sphere/outer-shell mechanism (image includes conceptual labels).




 
3.2 Water Delivery Terminal (Dedicated Outer Shell + Direct Tank Connection)

For water delivery, the system uses dedicated metal spheres (outer shells) reserved for water. The source-side terminal is connected to a reservoir, and the metal sphere is filled directly inside the reservoir. The destination terminal is connected directly to a household or facility tank. After arrival, water is injected from the sphere into the tank and the sphere is recovered and re-injected into the system. The app continuously monitors tank level and can automatically request replenishment when it drops below a threshold. 
• Source terminal: connected to a reservoir; spheres are filled directly in the reservoir.
• App: monitors tank level and requests replenishment as needed. 
• Destination terminal: directly connected to a tank; injects water upon arrival. 
• Metal spheres: recovered after injection and circulate within the system.

2026-01-12 19:28:42

physical internet 4. Ledger (Memory) and Map (Topology)
4. Ledger (Memory) and Map (Topology)


4.0 Token-Based Reward Design and Ledger Control (Core of the Backbone Network)

The backbone of this delivery network is maintained by a crypto-asset token and its distributed ledger. Installation, operation, maintenance, and transport contributions of each unit are recorded on the ledger. Usage fees generated by deliveries are distributed as micropayments to the units that handled pass-through, relays, and maintenance (reward item). Each unit AI functions as an edge node that contributes to ledger validation and updates - similar in spirit to mining or staking - and provides network-maintenance functions such as state recording, audit logs, and local consensus with nearby units. Beyond settlement, the ledger is used as a control substrate that records unit health, route history, congestion levels, and inspection results at the Inspection & Maintenance Stations (IMS). Unit AIs consult the ledger to perform distributed route selection, merge control, and injection control. Token issuance is capped and released gradually in a way that remains consistent with the initial deployment plan. After the cap is reached, whether additional issuance is allowed - and changes to issuance or distribution rules - are decided through on-ledger voting (governance).

4. Ledger (Memory) and Map (Topology) - continued

Tokens are not treated merely as speculative assets. The ledger is used to 'remember' system-wide interactions such as delivery histories, consents, permissions/prohibitions, and adjacency relationships between units. At first installation, a unit obtains latitude/longitude (e.g., from GPS) and determines a stable point (GeoAnchor) through an observation period (e.g., three hours). Afterward, the site maintains its coordinates and records neighboring-unit information on the ledger. Because unit replacement at the same coordinates is expected, the system separates a SiteID (tied to the location) from a UnitID (tied to the physical device). During replacement, the ledger explicitly records expiration of the old UnitID and activation of the new UnitID, and forbids multiple active units under the same SiteID.



Figure 5. Separation of SiteID and UnitID, and a replacement event (ASCII). The ledger forbids 'multiple active units at the same site'.

4.1 Packet Identification and Tracking (Continuous Positioning and Delivery Assurance)

Each packet carries identifiers such as a barcode and short-range wireless tags (e.g., NFC). Units automatically read and verify these identifiers using internal cameras and sensors. Using the ledger history (timestamp, UnitID, latitude/longitude, etc.), the system maintains continuous visibility into the packet's current position and delivery progress. This enables early detection of delays, route deviations, mix-ups, and misdeliveries, and supports corrective routing or re-delivery decisions.

4.2 Congestion/Collision Avoidance via Cooperative Unit AIs (Non-Stop Operation Control)

Unit AIs share state with nearby units and automatically adjust speed, spacing, and merge order to avoid collisions. Under congestion, packets are reassigned to detours based on congestion level; if no detour capacity exists, the system throttles new shipments through injection control to prevent gridlock. To avoid looped circulation caused by repeated detours, unit AIs consult ledger history and congestion levels and cooperatively guide packets toward routes with higher reachability and lower congestion.

4.3 Early Development and Simulation of Distributed Unit AI (Reachability Without Central Monitoring)

Because this delivery method relies on ledger reference and inter-unit cooperation rather than central monitoring, it should be validated in simulation before building physical devices. Unit AI software is implemented first, then tested in a simulator with many units and large packet volumes to evaluate reachability, delivery time, congestion, and loop behavior, iterating improvements. Once standard units are established, networks can be expanded by connecting units like LEGO blocks.

4.4 Multi-Layer Unit Placement (Layer Key) and 3D Route Expansion

Unit locations are identified by latitude/longitude, and a layer key is assigned at registration time. Initially, the network operates as a single layer at each coordinate using layer key 0. As an expansion option when traffic becomes dense, multiple route layers at the same latitude/longitude but different heights can be added (layer keys 1, 2, ...). Utility-pole networks can expand in the vertical direction; by detouring to less congested layers, the system can reduce stoppages. A spherical packet design is advantageous because it can move vertically and traverse three-dimensional branches, enabling detours that differ from ground transportation and targeting shorter arrival times. 
• Location ID = latitude/longitude + layer key (initially key 0). 
• As demand grows, add upper layers at the same coordinates (keys 1, 2, ...). 
• Unit AIs guide packets to less congested layers based on congestion level. 
• Spherical packets are well-suited to vertical movement and 3D detours.

2026-01-12 19:29:06

physical internet 5. Delivery Protocol (Consent Required)
5. Delivery Protocol (Consent Required)
A core property of this system is that it does not allow spam-like delivery (one-sided delivery without consent). A delivery becomes possible only after both the sender and the receiver approve it in advance. Operations are assumed to be performed via a dedicated smartphone application.


Figure 6. Delivery protocol (ASCII). After mutual consent, a packet is injected; hazards are blocked and grey cases are diverted to IMS.

2026-01-12 19:29:31

physical internet 6. Safety and Misuse Countermeasures (Hazard Blocking, Grey Isolation, Terminal Lock)
6. Safety and Misuse Countermeasures (Hazard Blocking, Grey Isolation, Terminal Lock) 

Hazard detection is based on the principle of 'not shippable by default'. If there are hazard indicators, injection is rejected. Ambiguous cases ('grey') are not delivered to the destination; instead they are routed to an IMS for inspection, cleaning, and diagnostics. Because spherical packets are reused, continuous cleaning and inspection stations are essential for hygiene and safety. For clearly violating users (e.g., repeated attempts to ship dangerous items or repeated policy violations), the system locks shipping capability from the corresponding terminal via the app to prevent early infrastructure misuse. 

6.1 Anti-Theft (Monitoring, Detection, Evidence, Response) 

All units include cameras, shock sensors, and damage sensors. Units continuously monitor status and record video locally; route units include both external and internal cameras. When an anomaly such as shock or damage is detected, recordings around the event are automatically uploaded to the IMS server. At the same time, sensor states (type, timestamp, UnitID, etc.) are recorded on the token ledger as immutable evidence. IMS continuously monitors anomalies and can coordinate police reporting, on-site checks, recovery/isolation, and repair/replacement. 

6.2 Evacuation Control for Abnormal Packets (Autonomous Decisions Inside Units) 

If a packet is suspected to be dangerous or abnormal (e.g., hazardous contents, damage, seal anomalies), the unit immediately reroutes it to a confirmed-safe route. Depending on the situation, the packet may reverse along the most recent path to return to a safer zone. These evacuation and route-change actions are decided and executed by the unit's onboard AI based on sensor values, passability, recent route history, and neighboring-unit state. The time, reason, selected route, and sensor context are reported to IMS and recorded on the ledger.

2026-01-12 19:29:54

physical internet 7. Congestion Avoidance (Home Slots, Empty-Packet Repositioning, IMS Buffer)
7. Congestion Avoidance (Home Slots, Empty-Packet Repositioning, IMS Buffer) 

Beyond inspection and maintenance, IMS is also central to congestion avoidance. If an empty spherical packet remains in a home unit, it is automatically forwarded to a nearby IMS after a time delay, freeing capacity for the next delivery. If a home unit still contains a packet with contents, the system does not allow the next shipment; the app warns the user to prevent local gridlock caused by occupied slots.



Figure 7. Home-unit slot control (ASCII). Empty spheres are automatically forwarded for repositioning; when a package remains, the next shipment is blocked.
1 2 Next >>