Wireless Networks That Build Themselves 56
ScienceDaily has an interesting article that looks at ad-hoc wireless networks and how they might be even more useful on a large scale. The RUNES project is featured as an example of software projects that might be able to make mobile devices that form self-organizing wireless networks to help promote this goal. "RUNES set out to create middleware: software that bridges the gap between the operating systems used by the mobile sensor nodes, and high-level applications that make use of data from the sensors. RUNES middleware is modular and flexible, allowing programmers to create applications without having to know much about the detailed working of the network devices supplying the data. This also makes it easy to incorporate new kinds of mobile device, and to re-use applications."
Comment removed (Score:4, Funny)
Re:Responsibility (Score:5, Funny)
Re: (Score:2, Insightful)
Re: (Score:3, Interesting)
Still, I was thinking encryption would be necessary for basic privacy...Something like Tor, where you don't know who is requesting what data. Otherwise it'd be too easy to figure out who was downloading what porn in your neighborhood.
Re: (Score:1)
Re: (Score:3, Interesting)
What's your point? The regular backbone is operated by the telecom industry, which has demonstrated willingness to open it up to the government even when that is in direct violation of existing law. Your unencrypted content isn't safe no matter who owns the network it travels over (unless you control bot
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re:Responsibility (Score:5, Interesting)
FTFA:Applications include emergency management, security, helping vulnerable people to live independently, traffic control, warehouse management, and environmental monitoring.
I really don't see this protocol, at first anyway, being used for consumer devices. I'm sure someone will find an application for it, but I don't see the need in the near term. And, I would assume, there would have to be some sort of identifier of the sender and ultimate receiver like TCP/IP has in its protocol.
Re:Responsibility (Score:5, Insightful)
The day when this becomes real will be the day that traditional ISPs die. The only way to reliably monitor the traffic will be some kind of "seeding" where the monitor-er will put out relays that monitor the traffic that passes across them.
I think this is really possible in the long run, but in the short run I don't think most things have sufficient computing or broadcast power to make it a reality. Cool that they're working on it though.
Re: (Score:2, Interesting)
Re: (Score:2)
Heh. No I have no idea; I'd imagine that repeaters would be set up in a lot of places, just to lighten the load on consumer devices. How they'd be funded, I have no idea. It'll all depend on the eventual power consumption, and what parts of the spectrum are used.
Re: (Score:2)
Re: (Score:2)
Ad-hoc routing doesn't get around the need for ISPs; someone has to have a gateway to the Internet. (And as long as ad-hoc routing doesn't scale up to networks of billions of nodes rather than hundreds or maybe thousands, we're going to have to peer with the Internet somehow.) ISPs may have fewer customers, since a lot of them will be leeching off of their neighbors, but most people who can afford it are probably going to go ahead and pay for their access, since it's faster (multihop wireless networks aren
Re: (Score:2)
The common carrier is an organization or enterprise that provides messaging services to the general public.
It is not about the tech.
It is not a defense against trade in pornography that you can claim by right.
You are a common carrier if - and only if - you meet the statutory definition and requirements and your conduct remains within the law.
The geek is far, far, too enamored with the idea that technical competence - technical innovation - puts him out of the reach of the law.
Re: (Score:1)
2.Give it a hardwired bandwidth so it dose not overwhelm the users bandwidth.
3.Give it two completely different network cards. One for the users needs and one for the wireless routers roll to secure the users or the network from being attacked or corrupted by each other.
4.Create appropriate legislation protecting information carriers from the actions of the distributors and producers of illegal content.
5.????
6.Profit
Re: (Score:2)
Re: (Score:1)
Wasn't the OLPC supposed to come with a wireless network that achieved this already? http://en.wikipedia.org/wiki/OLPC_XO-1#Wireless_mesh_networking [wikipedia.org]
Such a thing could easily be implemented by a piece of software running on everyones laptop, think of it like P2P only with FREE INTERNET!!!!
Hmmn, Seems I have found myself a coding project.
P.s. how do i start a new thread instead of always replying to first? :S n00b :P
Re: (Score:2)
Wasn't the OLPC supposed to come with a wireless network that achieved this already? http://en.wikipedia.org/wiki/OLPC_XO-1#Wireless_mesh_networking [wikipedia.org]
Such a thing could easily be implemented by a piece of software running on everyones laptop, think of it like P2P only with FREE INTERNET!!!!
Hmmn, Seems I have found myself a coding project.
/quote>
Since it has already been coded and is GPL, why do you want to recode it ??
Re: (Score:1)
Well that wouldn't be as fun, although i have to admit i overlooked that :P
I'll bet.... (Score:4, Interesting)
...that malware writers will LOVE this. Free propagation, just add mesh!
Re: (Score:2)
Re: (Score:2)
The idea of multiple propagation routes for malware of all types {and in which category I also lump viruses...} has already been done... [f-secure.com]
Re: (Score:2)
No mistake, in the long run we're going to have to have significant advances in security, because we won't be able to segregate every vulnerable machine behind a big security infrastructure.
in the words of bender.. (Score:1)
Recipe for Cash (Score:4, Insightful)
Re: (Score:2)
Though I guess people might just accept any old key that gets thrown their way, ignoring the warning that comes up...
Re:Recipe for Cash (Score:4, Interesting)
The great thing about public key crypto is that the key that is visible is meant to be.
Re: (Score:2, Informative)
Please consider... (Score:2)
Having said that, phishing is still described as highly successful, social engineering is usually described as highly effective, and there are probably a few places where ward
Re: (Score:1)
ISP-less internet topology (Score:3, Insightful)
Thus a natural progression to further decentralization is exactly what is happening. Expect to see ISP trying to pressure legislators to ban this kind of technology, and spreading FUD about.
Re: (Score:2)
A more correct statement would be: Due to the extremely high traffic loads some core links carry and the inability for backups to primary network paths to keep up with the growth rate of network traffic, the internet was designed to limp around shouting "ow, ow, ow!" around bottlenecks and network damage while IT staff groan about another sleepless night of babysitting outsourcing engagements whose bandwidth is
Re: (Score:2)
oh? everyone seems to still have access. Which incident are you referring to the brought down the internet?
RUNES Homepage (Score:5, Informative)
What a Wireless Sensor Node is: (Score:4, Informative)
It is designed for a distributed sensor platform, and not doing a lot of computation.
A picture of one is here [flickr.com], connected to a 14-foot USB cable.
Re: (Score:2)
The main problem with these sensor nodes right now is mainly that they are just way too expensive for what they are, at $140 each. Since any application of them is in large numbers to get around the 10-meter radio range, it gets very expensive quickly to do anything really useful with them. That is $140 for a device that doesn't have a screen, case, keyboard or external antenna.
The goal is to get the cost u
Whats in a name... (Score:2, Interesting)
Re: (Score:2)
I do not think that word means what you think it means.
Not so simple (Score:3, Interesting)
The article talks about everything from motes to handhelds, all on the same network. I work for a company that has a low-bandwidth low-power sensor node product, selling software to hardware makers, and hardware for prototyping purposes. The requirements vary so much from sensor-only devices to handhelds, that any product catering for both would be inherently compromised. Does your handheld want to work with a network that has a total bandwidth like modems from 20 years ago, shared between all the nodes? Is it really concerned with keep power emissions so low that it can stay on that network for 10 years, powered by batteries? how about a sensor attached to your radiator?
Techies tend to think about what CAN be done with a certain technology, but sometimes we try and generalise too far
Zigbee (Score:3, Interesting)
Some links (Score:1)
DSDV [wikipedia.org]
OLSR [olsr.org]
AODV [wikipedia.org]
Babel [jussieu.fr].
Terminator has to kill this concept (Score:1)
Peer to peer mesh networks are a dead end (Score:1)
nonzero bandwidth better than zero bandwidth (Score:2)