Hi there, I don't quite understand the source of the broadcasts - is there a single node which will originate broadcasts and listens for requests from effectively anonymous users?
Or can any node originate broadcasts based on a received request? It sounds like you would be flooding all requests and broadcasts over the network, is this correct? If so, how do you prevent flooding loops? Bill On 1/16/07, Andy Green <[EMAIL PROTECTED]> wrote:
Hi folks - Sergeui Osokine suggested posting here about a quite unusual network concept I have started working on. The basic concept is that all those machines you see around you on your wifi applet or iwlist wlan0 scan could participate together to form a large and fast, if patchy network completely outside the Internet, using addressless unencrypted broadcast packets, at the same time they remain associated and using crypto for their internal traffic as usual. I have written up the concept here: http://penumbra.warmcat.com The state at the moment is I am working on two Linux wifi drivers, for zd1211rw and ipw3945 to add the Penumbra packet transfer stuff as a proof of concept, and that the usermode daemon SSL and upload stuff is done and under GPL. So it is quite early days but there is progress. The main questions remaining are about how to discover content and route it around in such a strange network, where there are no addresses or other identifying information about the stations, and anyone can inject content anonymously. I am very interested to hear peoples' ideas or questions! -Andy _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
-- Bill McCormick _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
