Doesn't the potential & practicability of this idea depend on the capability of
wireless cards and drivers supporting them? Do we know if wireless network card
would allow node to be part of Infrastructure network and also transmit
broadcast packets on another channel / network? How much can a device driver
control the wireless network card? Can it control transmissions per packet
basis?
--Vikram
> Date: Tue, 16 Jan 2007 19:07:55 +0000> From: [EMAIL PROTECTED]> To:
> [email protected]> Subject: Re: [p2p-hackers] Penumbra Wifi
> Network> > Alen Peacock wrote:> > Hi Alen -> > > Very cool project. Seems to
> align closely with Negroponte's> > "lilypond" vision> >
> (http://www.wired.com/wired/archive/10.10/wireless.html), as well as> >
> Thanks. Yes it looks like Negroponte was there long before me. But I > didn't
> find any sign of consumer wireless network devices taking in or > sending out
> unencrypted packets since that article five years ago: all > the work is in
> locking them up tighter so they can't interoperate.> > >
> http://pdos.csail.mit.edu/roofnet/doku.php?id=interesting . I found> > the
> lack of correlation between distance and ability to communicate> > somewhat
> surprising, and there's lots of interesting data from the> > real world
> regarding choosing routes and routing algorithms, some of> > which you may
> also find counterintuitive.> > That was another interesting link too. I know
> from looking at monitor > mode on the zd1211rw, which lets through packets
> that failed their CRC, > that where I am at least packet corruption is a
> probability-based thing > as well, even if I am not far from the AP.> >
> Unfortunately with the identity-free packets, as far as I could > understand
> it, there can be no routing, only a sort of > destination-controlled
> magnetism such that the payload is guided towards > where the requests are
> coming from. For example, the requests can have > a TTL which the nodes
> randomly decide to decrement or not, the frequency > of requests will
> increase as you get closer to the source of them.> > -Andy>
> _______________________________________________> p2p-hackers mailing list>
> [email protected]>
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers