Alen Peacock wrote:

Hi Alen -

 Very cool project.  Seems to align closely with Negroponte's
"lilypond" vision
(http://www.wired.com/wired/archive/10.10/wireless.html), as well as

Thanks. Yes it looks like Negroponte was there long before me. But I didn't find any sign of consumer wireless network devices taking in or sending out unencrypted packets since that article five years ago: all the work is in locking them up tighter so they can't interoperate.

http://pdos.csail.mit.edu/roofnet/doku.php?id=interesting .  I found
the lack of correlation between distance and ability to communicate
somewhat surprising, and there's lots of interesting data from the
real world regarding choosing routes and routing algorithms, some of
which you may also find counterintuitive.

That was another interesting link too. I know from looking at monitor mode on the zd1211rw, which lets through packets that failed their CRC, that where I am at least packet corruption is a probability-based thing as well, even if I am not far from the AP.

Unfortunately with the identity-free packets, as far as I could understand it, there can be no routing, only a sort of destination-controlled magnetism such that the payload is guided towards where the requests are coming from. For example, the requests can have a TTL which the nodes randomly decide to decrement or not, the frequency of requests will increase as you get closer to the source of them.

-Andy
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to