Hi there,

I don't quite understand the source of the broadcasts - is there a
single node which will originate broadcasts and listens for requests
from effectively anonymous users?

Or can any node originate broadcasts based on a received request?

It sounds like you would be flooding all requests and broadcasts over
the network, is this correct?   If so, how do you prevent flooding
loops?

Bill

On 1/16/07, Andy Green <[EMAIL PROTECTED]> wrote:
Hi folks -

Sergeui Osokine suggested posting here about a quite unusual network
concept I have started working on.

The basic concept is that all those machines you see around you on your
wifi applet or iwlist wlan0 scan could participate together to form a
large and fast, if patchy network completely outside the Internet, using
addressless unencrypted broadcast packets, at the same time they remain
associated and using crypto for their internal traffic as usual.

I have written up the concept here:

http://penumbra.warmcat.com

The state at the moment is I am working on two Linux wifi drivers, for
zd1211rw and ipw3945 to add the Penumbra packet transfer stuff as a
proof of concept, and that the usermode daemon SSL and upload stuff is
done and under GPL.  So it is quite early days but there is progress.

The main questions remaining are about how to discover content and route
it around in such a strange network, where there are no addresses or
other identifying information about the stations, and anyone can inject
content anonymously.

I am very interested to hear peoples' ideas or questions!

-Andy
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers



--
Bill McCormick
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to