Adam is on to the solution that is going to work!
Adam is extremely on target with his idea here … it’s one that my team and I have been working on for several years now … and we are getting closer!

WiFi Peering

WiFi, the popular name for 802.11b wireless network technology is a registered trademark of 3Com. Just found that out today while holding their latest pc card with slick-looking pop-out antenna in my hands.

I’ve been a WiFi user for almost 2 years, having purchased an experimental set from a Dutch company in 1999 with a catchy name: No Wires Needed. They no longer exist (acquired by BigCo), but I do recall quite vividly how frustrated I got trying to explain to their COO the possibilities of this magic technology. I even bought their fancy directional hi-gain setup and wired 2 miles of the Keizersgracht in Amsterdam. If you come to town, stay at the Pulitzer Hotel, which has shitty service guaranteed, but our WiFi reachees the canal side rooms easily. No password needed.

Many of these ad-hoc ‘Hippie Networks’ of peace, love and sharing have been cropping up everywhere. Not very surprising, there’s a lot of activity in this area taking place in San Francisco, known for technology and kind, sharing people.

This afternoon I reviewed a presentation we are giving to a chain-retail outlet in The Netherlands next week, one of the nicest slides in the flowerpoint was a comparison of wireless technologies. Conclusion: WiFi is fast, affordable and available now.

The big questions are obvious; will we be able to create the parasitic grid by opening our ADSL and Cable Modems to anyone who needs access in hope we receive the same courtesy when we need connectivity? Or will we wind up with over 500 WiFi subscriptions; lets see, what was my password for the starbucks network.. I’m sure Microsoft would love to ‘manage’ all your WiFi passwords in Passport.

Ofcourse we all want to hippie network to succeed, it’s the ultimate dream of any revolutionary. To bash the BigCo’s who thought, just because they could borrow billions of dollars to purchase UMTS and other 3d generation mobile licenses, they were guaranteed their ‘fair share’ of the wireless market. It would be poetic justice.

I believe the WiFi Matrix can be built, but we must base it on an exchange of something. I give, therefore I can receive.
In the networking world this type of exchange is typically called ‘peering’. Peering is what happens at the Internet exchange points, like MAE East in the US, Ams-ix in Amsterdam, Linx in London. All ISP’s connect to one or more exchanges in order to offer service to their customers. Through one of these exchanges is how data is routed from one network to another, you are reading this document because it traversed the network from our DataBarn to the Amsterdam Internet Exchange to a network with a presence at the ams-ix that either directly or indirectly connects to your ISP. This handoff is done from one network to another at the exchanges based on so called ‘peering agreements’. These agreements basically say that two networks, based on ‘equality’ will hand off data traffic to each other without ‘settlement’. Settlement is a BigCo telecomms word for payment and is based on counting minutes (of call time).

Peering agreements are great, especially if you have lots of them with important networks, because it costs nothing to transfer data to a network you peer with, otherwise you will have to purchase connectivity to that network through a network that does have appropirate peering. This is typically called ‘transit’. Already I’m getting a bit out of my league on all this stuff, but the bottom line is that the bigger the network you have and data you want to hand off at the exchange(s) the more peering agreements you can get and thus the more you can sell your connection to the exchange. It’s just like selling drugs, you keep cutting the stuff up until you’ve sold your basic pipeline 1000 time over. Oh, and it’s even more profitable if you make up some bullshit variable cost scheme to your customers..based on ‘burstable bandwidth’ and ‘top 5 percentile’ calculations.

The Really BigCo’s stay really big by peering with each other and refusing to peer with any of the smaller guys. There are only 9 or 10 Really BigCo’s, and they have a total lock on the market and the exchanges. You don’t peer with the BigCos, you purchase from them.

What I like about peering (yeah, there’s good news too) is that there really isn’t any counting of packets..AT&T doesn’t say to Sprint, “hey, you sent me less traffic than I sent you last month, pay up”. Nor do the smaller guys. Once you’re peering agreement is in place, it’s pretty much like a friendship ring. You belong to a club.

This would be the basic concept for phase one of the WiFi Matrix: A centralized peering database. You have connectivity available on 802.11b, register to peer with others when you need to use their network. Although far from trivial, centralized authentication must be possible with some simple software you download to your base-station that ‘talks’ to the central peering database.

But that’s only the start of the real revolution. Imagine we can build this Matrix, a grid that actually starts to overlap. If I can see your WiFi network from my house and you can see mine, we can then exchange up to 11Mb/s of data traffic. Very interesting if I’m on a different network that the other node. Create enough WiFi Pering points and we may find that our Wireless technology is best utilized for the getting data to the Home cheaply and perhaps even faster.

I find this scenario much more appealing than the current view on WiFi, which conjures images of semi-andorids roaming the streets with laptops, datagloves and eye-piece monitors.

:
We could actually beat the BigCos at their own game. Peer to Peer would have real meaning, desktop applications could control the entire networking grid. With the speed of the forthcoming 802.11a (45Mb/s) It could even sell transit services to those guys who used to have a monopoly at the exchanges…… [Adam Curry: CurryDotCom]

The next wireless network won’t be what we think …
Imagine that these folks are on the right track … and that the next global wireless network is going to be one that is more distributed than ever imagined! The Internet is creating the foundation for truly immense, distributed solutions … and I believe that we are getting close on the wireless front …

Unified Registry of Public and Private 802.11b Access Points Demonstrated. Company attempts to provide consistent interface to usable database [allNetDevices Wireless News]

Early recognition of wireless possibility …
I was working with the early 802.11 gear from NetWave Wireless in 1998 … and it appears that a number of us recognized then what was going to occur. It’s funny … I’ve pushed Novell for years to use their directory technology to make this a reality … and I have not been able to communicate the opportunity to them!

The term parasitic grid or parasitic network appears to originate from a single British Telecomm (BT) researcher named Peter Cochrane. He wrote two interesting papers with great foresight: one from 1999 on the general idea, and another with more contemporary references in 2000.

[80211b News]

Computers in cars … faster than they think!
The use of computers to enhance the automobile experience is going to increase, according to this report. I believe that it is going to increase at a much greater rate than what they believe …

Telematics Set to Shift Into High Gear: Study. Predicts explosive growth based on mutual consumer/manufacturer benefits [allNetDevices Wireless News]

Enslavement of the Human Race?
I really like the direction that Hawking is taking with his views about the evolution of the computer world and technology. At the end of this brief article, there is a sentence which includes a comment about the “enslavement of the” human race. This is a common perspective of how the future might evolve, however it is not one that I agree with and see as unlikely.

What Hawking talks about is the use of genetic engineering, and other new technologies, to provide more and more man-machine integration … to reduce the boundary between humans and the networks that we use to communicate and generate business. This is exactly where I believe the world is heading … towards a synthesis of humans and the non-human … the extending of human abilities with human created extensions.

One of core creations of evolution that is missed in most discussions is community and organizations … and particularly the modern versions of these. As humans we strive to create effective communities and organizations, and communications is the bond with which these are created and held together. All of the work in communications and computer technologies are oriented towards the improved effectiveness of communications, and the automation of human infrastructure tasks.

The “closer” that we can get to the network – that we created – the more effective we can be in the communities and organizations that we are a part of. The integration of technology with humans is the “natural” path that we are moving down. We are closing the “gap” between our intelligence, and the collective intelligence that we are creating.

Stephen Hawking On Genetic Engineering vs. AI [Slashdot]

A levelheaded viewpoint on 802.11b WEP security …
This is one of the first good articles that I have seen on the whole WEP security issue. Use the same technologies that you already use for wired networks! VPNs were designed to deal with this exact issue … and they work over wireless!

Internet Week: Security Flaw Isn’t Death Knell For WLANs. But instead of scrapping wireless networks, experts say, enterprises should extend authentication and encryption techniques used on wired networks, carefully examine access procedures and consider keeping sensitive data off the WLAN. [Tomalak’s Realm]

The pendulum swings extreme toward 3G …
I can understand where this author is coming from with his opinions on 802.11b, however I believe that he is missing the real solution. In my opinion, we will all end up having numerous wireless technologies that we will use, all depending on the location and purpose. I can see where my wearable computer is going to have Bluetooth, 802.11b, and CDPD in the near future … and I will only continue to add wireless connectivity solutions as new technologies emerge.

Red Herring pooh-poohs free wireless, sees 3G convergence: this piece is off base, dismissing coordinated efforts of volunteers as pointless. We’ll see; it’s how a lot of things on the Internet work, and it’s applicable to real infrastructure, too.

[80211b News]

People moving towards mobility … wearables are coming …
This is a very good article outlining the increasing interest in mobility and portable computing. It cites the growing purchases of notebook and laptop computers, and the increase of the size of that segment of computer sales. It also indicates that price is one of the key points attributed to these increased sales.

Wearable Computers are the next segment that will alter the direction of computing. These computers, when coupled with goggles that allow for augmented reality – overlaying our vision with tips and hints about the world around us – will extend the capabilities of humans forever.

Portable PCs carry new weight. A report shows notebooks are creeping up on desktops as the computer of choice. [CNET Tech News]

How to protect yourself in an “external” network world …
Recently there has been a lot of talk about the failure of WEP encryption in 802.11b to protect wireless users. This link is to a simple application which can quickly break the WEP keys. These types of tools have been around for years, and can be used on ANY network which is not physically secured!

The key to solving these issues is to look at the medium – wireless – as an “external” network. It is one which exists “outside” of your firewall! If you view it this way, you then can begin to solve the “problem” of security using standard off the shelf solutions.

The entire Virtual Private Network (VPN) market was created to solve this exact issue, and is the solution being used by networking companies such as Novell. Communications over wireless is no different than communications over any network that is outside of your control … and it requires a full end-to-end security solution. That is what a VPN is. Even if you were in a hotel, communicating over a wired network, your traffic could be intercepted and captured. Again, most companies would use a VPN for their employees in these scenarios …and so wireless is no different.

If you are considering deploying wireless for your employees … even for use at your company offices … install the wireless access points OUTSIDE your firewall, and use a VPN solution for them to communicate into the network. The benefit is that it will secure your corporate communications ANYWHERE!

This program breaks the WEP encryption and delivers the key: I have mixed feelings about posting a link to this software, but it’s necessary because it’s widely available. Running this software against anyone’s network except your own (or one that you have authorized, written permission to crack) could constitute illegal cracking in many jurisdictions worldwide. Simple ownership of this program might also be illegal in some countries. Note that cracking WEP encryption is not covered by the DCMA, which has resulted in charges against people cracking Adobe eBook and Hollywood DVD encryption. Those schemes are copyright-protection methodologies that include encryption; WEP is a general-purpose encryption system which is not design specifically to protect copyrighted materials.

[80211b News]