Alen Peacock wrote: Hi Alen -
Very cool project. Seems to align closely with Negroponte's "lilypond" vision (http://www.wired.com/wired/archive/10.10/wireless.html), as well as
Thanks. Yes it looks like Negroponte was there long before me. But I didn't find any sign of consumer wireless network devices taking in or sending out unencrypted packets since that article five years ago: all the work is in locking them up tighter so they can't interoperate.
http://pdos.csail.mit.edu/roofnet/doku.php?id=interesting . I found the lack of correlation between distance and ability to communicate somewhat surprising, and there's lots of interesting data from the real world regarding choosing routes and routing algorithms, some of which you may also find counterintuitive.
That was another interesting link too. I know from looking at monitor mode on the zd1211rw, which lets through packets that failed their CRC, that where I am at least packet corruption is a probability-based thing as well, even if I am not far from the AP.
Unfortunately with the identity-free packets, as far as I could understand it, there can be no routing, only a sort of destination-controlled magnetism such that the payload is guided towards where the requests are coming from. For example, the requests can have a TTL which the nodes randomly decide to decrement or not, the frequency of requests will increase as you get closer to the source of them.
-Andy _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
