ACCELER8OR

Aug 07 2012

Kudos To The DIY Drone Robot Capable Of Creating Wireless Mesh Network. Now, Try It With A Quadcopter

Share/Bookmark

Ever have one of those moments when you want to praise someone for sheer brilliance, and slap them for being an idiot at the same time? http://www.gizmag.com/wifi-robot/23471/ gave me just such a moment.

On the one hand, it’s a brilliant idea. Take a group of engineering undergrads, and let them loose. Result: one nearly indestructible drone robot able to traverse rugged terrain and build a wireless mesh network, using inexpensive parts and easy to obtain materials.  It can travel through debris in a disaster area, depositing the individual network nodes, and it’s controlled through an internet application that uses the very same network. It can even remember its location and backtrack to the nearest node if it loses the signal.  It was designed with off the shelf software, made with off the shelf supplies, and can be built by any robotics enthusiast with enough experience to build a “robot wars” type drone. It even has a custom designed track system made by a student with no mechanical engineering design experience using CAD software.

All in all, it’s a tribute to the ingenuity of amateurs, a remarkable job of “backyard” engineering which should act as proof of concept for the usefulness and ease with which mesh networks can be build. A couple of hundred of these drones let loose in Africa, dropping off solar powered nodes able to keep themselves charged for years, could build a wireless infrastructure in a matter of weeks for a fraction of the cost of building roads, power lines, cell towers, power plants, routing centers, etc. As I pointed out in “MondoNet Fights the Internet power”:

“I see mesh networks naturally evolving to become the dominant form of network over the next few decades, because it’s the most practical solution to a number of problems that will have to be solved in order to build the VR web as well as to connect the entire world to the internet. Centralized networks are only possible in highly developed countries with existing infrastructures like power and telephone grids, as well as roads. You can’t build a tower where you don’t have either power or access. For vast areas of the world, mesh networks will be the only feasible solution. As handheld devices get cheaper, smaller and use less power, and batteries become able to store weeks or month’s worth of power for them, they will become the world’s primary means to access the internet. As billions of devices begin attaching to the net, they will overwhelm any centralized system. At that point, it will be much simpler to use them in a mesh than it will be to try and build sufficient infrastructure to meet demand. A mesh network can grow as fast as you add a new device to it. And unlike traditional networks, it auto-updates itself as users discontinue using older devices and switch to new ones. It also will eliminate bandwidth issues as thousands of paths will allow data streaming at the limits of the devices own hardware. As we move past the multimedia age and into the VR age, the need for vast amounts of data to be transferred will force the abandonment of centralized systems that simply cannot handle the load for robust multispectrum wireless networks that are more akin to P2P torrents than today’s cellular networks. Technology advancement itself is going to ensure we will move to mesh architectures in the very near future.”

When you look at an item like this drone and see exactly how easy it could be to build a mesh network compared to a traditional infrastructure heavy system like our current one — and when you can see how delicate that infrastructure actually is in the face of an uncaring nature, it should be obvious that our infrastructure based networks are doomed. The mesh is the future, and it will be built by drones like this, using parts any semi-trained electronics enthusiast can obtain and build.

And yet, it’s still a moment for a facepalm and a shake of the head in despair at the sheer stupidity. Why? Because as genius as the entire thing is… as fantastic as the concept of automating construction units for building mesh networks in any environment is… it’s never going to see production. And not because of any opposition to the building of mesh networks. It’s just that a track-based land unit is pretty limited in comparison to a quadcopter. For all that genius on display, it’s already an obsolete device. That guidance system and custom track tensioner simply are not as agile as a set of rotors, nor can they navigate anywhere near as varied and rugged terrain as a quadcopter can. While I can certainly see such drones being useful in a limited set of conditions, like say, deploying a network under hurricane conditions, as a general purpose drone, which it’s designers appear to intend it as a working model for, it’s a dinosaur.

 

Jul 17 2011

MondoNet Fights The Internet Power: an Interview with Aram Sinnreich

If you’ve been paying attention to the news lately, I’m sure you’ve heard about the “Declaration of War” by Lulzsec and Anonymous. Regardless of what you think about their actions, it should be obvious that there has been a growing effort by large corporations and governments to recreate the internet in an image completely alien to its original intentions – that of a robust decentralized network which no amount of damage could bring down. DARPA’s original designs have been sidetracked by various groups trying desperately to eliminate a “free and open” network model in favor of centrally controlled, corporate owned, authoritarian “walled gardens” in which your every move is tracked, your every file is subject to the central authorities approval, and your every action with your own possessions is monitored to ensure you’re not doing something a company disapproves of. The corporations have no desire to allow the masses a future in which information is not monitored, metered, charged for, and always in the control of the corporations.

In order to do this, they need the networks to be centralized, run entirely through systems in which every bit of data transmitted back and forth from the end user to the internet is subject to their scrutiny and approval. Due to the manner in which the net has developed using existing infrastructure, there are many bottlenecks which have made this effort possible, from cell phone towers that ensure that smartphones are routed through bandwidth limiting servers that meter per second access and looks for ways to charge customers for “overuse” to broadband services who inspect every packet of information to prevent you from downloading movies and songs. Even the FBI wants the ability to search your computer remotely.

So while I am uncertain of the utility of “cyberterrorism,” I can certainly see the need for methods to prevent the “digital frontier” from becoming a “virtual prison” and to encourage a return to that robust decentralized vision created by DARPA.

That’s pretty much what these guys at MondoNet are about and I think their words say it pretty clearly:

“Although the Internet is highly decentralized in its communication and social patterns, its technical and regulatory foundations are extremely hierarchical, due to centralized control by organizations like ICANN and the oligopolistic ownership of the access business by a handful of broadband ISPs and wireless carriers (Wu, 2010). As a result of this centralization, digital communications are compromised by a degree of surveillance and censorship that would be unthinkable in traditional social arenas, threatening our cyberliberties and “e-speech” rights (Sinnreich & Zager, 2008).

“Seemingly disparate issues like network neutrality, intellectual property treaties and national security measures, taken in combination, threaten to produce a communications environment in which innovation is stifled and normative cultural behaviors are criminalized and punished by censorship, fines and/or imprisonment. One potential solution to this problem would be to create a new communications platform based on existing Internet protocols, but with a decentralized infrastructure free of the bottlenecks and chokepoints that plague the current system. Specifically, this new infrastructure would use mesh networking technologies to produce a stable, ad hoc global wireless network in which each peer is a router, server and client combined, and in which no single state or organization can effectively censor or surveil the population on a massive scale.”

If you’ve never heard of a mesh network, or don’t understand the technical jargon, it basically means that every “device” — be it a smartphone, computer, or other internet connected device — “talks” to every other device, instead of to a “tower” or to a “server.” In other words, instead of talking to an “ISP” or “Carrier” who stands between you and the internet, your device will simply be part of the internet.

In the current infrastructure, if you want to call your friend, your device can’t just call up your friend. First it has to call up to a centralized, corporate controlled network. Then it has to confirm that it is allowed on that network and receive approval to use that network. Then it has to ask permission to create a connection to your friend, and verify that your friend is allowed access to the network, has not been banned from the network, and is connected to the network instead of a different network. Then, it will finally be allowed to create a connection, subject to monitoring from the central network. In a mesh network, your device would simply go to the next nearest device and then on to the next, and so on until it made a connection to your friend, over hundreds of different paths that it would turn into a “virtual private network” in which everything you and your friend say is inaccessible to anyone but the two of you because your data would be being sent along too many different paths to intercept.

Mondo.net again does a fantastic job of summarizing the principles of such a network:
1. Decentralized
The network should not be operated, maintained, or in any way reliant upon a single or minimally differentiated set of entities or technologies. No individual, entity or group should be central to the network to the extent that their absence would measurably impact its functionality or scope. Network participation should not require access to fixed, physical infrastructure of any sort.
2. Universally Accessible
The requisite technology and expertise required to participate in the network should be available at minimal cost and effort to every human being on the planet. Furthermore, all users should be able to extend the network’s content and functionality to suit their own needs, or those of others. No aspect of the network’s functioning should be reliant upon proprietary technologies, information or capital.
3. Censor-proof
The network should be resistant to both regulatory and technical attempts to limit the nature of the information shared, restrict usage by given individuals or communities, or render the network, or any portion of it, inoperable or inaccessible.
4. Surveillance-proof
The network should enable users to choose exactly what information they share with whom, and to participate anonymously if they so desire. Users should only have access to information if they are the designated recipients, or if it has been published openly.
5. Secure
The network should be organized in a way that minimizes the risk of malicious attacks or engineering failure. Information exchanged on the network should meet or exceed the delivery rate and reliability of information exchanged via the Internet.
6. Scalable
The network should be organized with the expectation that its scale could reach or even exceed that of today’s Internet. Special care should be taken to address to the challenge of maintaining efficiency without the presence of a centralized backbone.
7. Permanent
The network’s density and redundancy should be great enough that, despite its ad hoc nature, it will persistently operate on a broad scale, and be available in full to any user within range of another peer.
8. Fast (enough)
The network should always achieve whatever speed is required for a “bottom line” level of social and cultural participation. At present, we assert that the network’s data transfer rate should, at a minimum, be enough for voice-over-IP (VoIP) communications, and low-bitrate streaming video.
9. Independent
While the network will have the capacity to exchange information with Internet users and nodes, it should be able to operate independently, as well. A large-scale failure or closure of Internet infrastructure and content should have minimal effect on the network’s operations.
10. Evolvable
The network should be built with future development in mind. The platform should be flexible enough to support technologies, protocols and modes of usage that have not yet been developed.

The question then is this: Why should you care?

And I’ll be honest here. I see mesh networks naturally evolving to become the dominant form of network over the next few decades, because it’s the most practical solution to a number of problems that will have to be solved in order to build the VR web as well as to connect the entire world to the internet. Centralized networks are only possible in highly developed countries with existing infrastructures like power and telephone grids, as well as roads. You can’t build a tower where you don’t have either power or access. For vast areas of the world, mesh networks will be the only feasible solution. As handheld devices get cheaper, smaller and use less power, and batteries become able to store weeks or month’s worth of power for them, they will become the world’s primary means to access the internet. As billions of devices begin attaching to the net, they will overwhelm any centralized system. At that point, it will be much simpler to use them in a mesh than it will be to try and build sufficient infrastructure to meet demand. A mesh network can grow as fast as you add a new device to it. And unlike traditional networks, it auto-updates itself as users discontinue using older devices and switch to new ones. It also will eliminate bandwidth issues as thousands of paths will allow data streaming at the limits of the devices own hardware. As we move past the multimedia age and into the VR age, the need for vast amounts of data to be transferred will force the abandonment of centralized systems that simply cannot handle the load for robust multispectrum wireless networks that are more akin to P2P torrents than today’s cellular networks. Technology advancement itself is going to ensure we will move to mesh architectures in the very near future. So why, really, should you care?

Because the sooner we begin working towards developing these peaceful, innovative, and practical solutions to the threats of authoritarian control of the worlds developing nervous system, the less need we will have for “Cyberterrorists” like Lulzsec and Anonymous to cause disruptive attacks that hurt the innocent and the guilty alike in a fight to preserve our freedom to access information. And that is a goal I think every side can agree on

Valkyrie Ice

RU SIRIUS:  John GIlmore famously said, “The Internet interprets censorship as damage and routes around it? True or not? And what’s missing from the Internet as it is, structurally, that requires an alternative creation for mass p2p activity?

ARAM SINNREICH: Gilmore was really talking about TCP/IP, and node-level routing. While it’s true that these protocols are inherently decentralized and therefore very resistant to censorship, the problem comes at the infrastructural level, which is far more centralized. The Internet may have a billion nodes now, but only a handful of companies control the Internet’s “backbone,” the broadband ISP market, and the wireless data services market (and two companies, AT&T and Verizon, are the dominant players in each of these sectors in the US). That means that no two Internet users in the US can communicate with one another without their data passing through the hands of one of these companies.

Unless the data is encrypted (in which case, it can be dumped if the companies choose), it is vulnerable to packet-sniffing or other forms of inspection. This is not a hypothetical situation; these companies have long histories of inspecting packets for the purposes of (a) commercially preferred treatment, e.g. non-neutral network operations; (b) commercial exploitation, e.g. consumer profiling; and (c) political censorship and surveillance, either at the behest of the federal government (think NSA wiretaps) or for reasons of corporate ideology (e.g. AT&T censoring an Eddie Vedder webcast critical of President Bush; Verizon blocking text messages between pro-choice groups and their members).

Thus, only a network that replicates the decentralization of nodes at an infrastructural level — or, to put it another way, one in which the nodes themselves are the backbones — can eschew the Internet’s vulnerability to censorship.

RU: There seems to be a lot of activity going on in a similar direction to MondoNet. Are you aware of other efforts and how does your plan differ?

AS: MondoNet was a germ of an idea in my mind from about 2004, when I first read Tim Wu’s work on Net Neutrality, and the idea of mesh networking as a democratizing force was something I discussed with my USC doctoral professor Francois Bar at the time. In fact, a video about mesh networking that Bar produced with my contributions in 2005-6 is available here (see the automata video). So this has been percolating for a while. However, it wasn’t until I started my tenure-track position at Rutgers in 2010 that I had the support to begin doing something with the idea. I taught a doctoral course in the fall called “Visions and Revisions of Cyberspace,” and two of my students in that class, Nathan Graham and Aaron Trammell, shared my enthusiasm for addressing the social and political dimension of network technologies. So at the end of the fall semester, we applied for a small grant to start MondoNet, and have been working on it ever since.

It’s been a gratifying surprise to see how much the concept of mesh networking has taken hold across disciplines and even in the mainstream press in the seven or eight months since we started our work. In January, 2011, OpenMesh launched their initiative, and we started sharing our work on MondoNet.org. In February, Hillary Clinton gave her “Internet freedom” speech, and a few days later, the Freedom Box initiative announced itself in the pages of the New York Times. In April, I announced MondoNet at my TEDxUSC talk.

Now, it seems every day we read a new article or hear about a new initiative along these lines. And what’s really cool is that all of these networking initiatives have started to network as well. We’ve gotten code-sharing offers from other projects, been invited to Google Groups uniting researchers in this field, and are even planning our own Rutgers mini-conference on the subject later this year.

Where I think we differ, and can offer some vital perspective, is in our theoretical orientation. Unlike most of the other initiatives out there, we’re not engineers or policy wonks. We’re critical information scholars, bringing perspectives from social science, political economy and even cultural studies into the mix. This is why my TEDx talk and our soon-to-be-published article in The Information Society begin with what we call “social specifications,” emphasizing the qualities that free society requires from a network, rather than the capacities that given technologies can offer us. Before we even start thinking about protocols and feature sets, we want to be perfectly clear about what we’re trying to accomplish. So today, wireless ad hoc networks might be the best solution to address these social specifications, but ten years from now, there may be other options. Either way, we’re wedded to the principles, not to the tech.

Of course, we’re just as interested in making free and open networked communications a reality as anyone else out there. Our immediate plan is to test a “virtual” version of MondoNet in three different types of community, and to operationalize our social specifications through a variety of different data measurements. Once we are confident that MondoNet will actually move the needle on these target goals (e.g. accessibility or resistance to censorship), we’ll start building actual MondoNet software to spec. And the more we can make use of other projects’ openly-licensed code in the process, the happier we’ll be.

RU: I wonder if this thing scales, or if you want it to.  For example, for all the horrors of Facebook, the charm is in the fact that there are like a billion people there.  I can go find my old high school buddy or my great aunt. And while smaller decentralized alternative networks might be an advantage to, say, revolutionaries in Egypt or wherever, in that the government would find it harder to shut it down, there’s the chance that it won’t reach a lot of the people.

AS:  We definitely want it to scale — not just in terms of growth, but in terms of applicability within social milieus of any size. As you point out, it needs to work for small groups of dissenters within oppressive environments, but it also needs to provide a large-scale platform for an uncorruptible public sphere. In my ideal future, the entire globe will be covered with a stable, decentralized, peer-to-peer communications mesh, which can be used as a platform for public, closed-group, and person-to-person information exchanges.

As to Facebook’s “charm,” you’re certainly right that size matters when it comes to networks. I’m sure you’re familiar with Metcalfe’s law, which states that the value or power of a communications platform grows exponentially as the number of peers grows incrementally. And with MondoNet, this applies to an even greater extent, because users will rely on one another not only as senders and recipients of information, but as components of the network itself. All that being said, we’re not trying to replace or rival Facebook. In fact, we’d be delighted if Facebook chose to mirror its servers on MondoNet peers one day. We’re aiming to be pure infrastructure, simply a reliably secure and open alternative to the increasingly draconian and expensive broadband and wireless commercial networks.

RU:  I’m amazed that Rutgers is supporting this (so far.)  Certainly the government takes very seriously their abilities to surveil communications (going all the way back to the fight over the Clipper Chip in the mid-90s).  Do you expect a visit from some friendly folks at Homeland Security if this becomes viable?

AS: Yes, I’m sure that once we move from the talking phase to the doing phase, someone with national security concerns will come a-knocking. They’ll probably ask us to build in a “back door” to allow wiretaps and other forms of surveillance, just like they have for all the other network service operators. But the beauty of the technology we’re building is, such a back door would be impossible from an engineering standpoint. There’s no central backbone or other point of presence through which the majority of bits will flow. Furthermore, the platform will enable native peer-to-peer encryption (like PGP), which means that each individual node will have the ability to determine the visibility or obscurity of the information it sends. And, because the code is all open-source, even if we did create some kind of workaround back door, other developers could simply engineer it back out, and release an improved, higher-security version.

I’m not surprised that Rutgers is being supportive, though I am gratified — after all, free speech, social equality and technological innovation are key aims of our school, so we’re pretty much in line with the mission statement. However, it is a state university, so I suppose if federal regulators got a bee in their bonnet about the project, they could probably exert some political force to get the university to kibosh us. Hopefully, by the time that happens, we’ll have enough research, code, and project inertia to continue independently.

RU:  What sort of time frame do you think you’re looking at before this starts testing and how long after that do you think it might become viable for lots of people?

AS: As social scientists, we ask questions first and act second. So our first order of business will be to test the premises of MondoNet by creating a “virtual” version for field research. Will a peer-to-peer mobile mesh network actually address the social and political flaws of the existing Internet? Will it increase accessibility? Decentralize communications? Prove resistant to censorship and surveillance? We’re currently in talks with a mobile software developer to create this virtual MondoNet, and hopefully we will test it over the next year.

Once we determine whether our strategy actually does what we hope it does, then we can begin to develop the software itself. The good news is, many of the components (e.g. mesh networking protocols) are already developed or in development under open license elsewhere, so we don’t need to reinvent the wheel. We see our role more as integrating these back-end technologies, creating an easy-to-use and widely accessible user interface, and then shepherding the project development within the open source/free software community. Given that we will probably need to rely on grant money to do this, a realistic timeframe would be about 3 years till public release.

Coming from the business world, I realize that this might seem like a long development cycle, but we want to get it right the first time, and build a strong foundation for future development by ourselves and other coders and communities. If we do it right, the project should take on a life of its own, and the code will be adapted for uses and sociopolitical contexts we can’t predict at this point.

RU: Broadly speaking, there has been a lot of controversy over the years about the liberatory or revolutionary potential of the internet, ranging from technotopian imaginings to scathing indictments.  What’s your view?

AS: Great question. I actually teach a doctoral course on this topic (Nathan and Aaron — both project participants — took it last year). The short answer is, all technologies are inherently neutral. They can be used toward both emancipatory and totalitarian ends, and usually both apply. Through laws, regulations, architecture and social norms, different interests work to redefine the role of technology to achieve the social outcomes they seek. Right now, many regulatory and architectural developments are pushing the platform towards informatic totalitarianism, though emerging social norms continue to explore its emancipatory potential. We see MondoNet as an architectural intervention, reversing the “cable-ization” of the network and undermining the power of regulators to centralize control over information flow.

As a final word, I would also like to mention that this process of social reorganization through evolving communication technologies will never end. It will never reach a happy medium, a comfortable resting place, or a peaceable stasis. As the pace of technological innovation continues to accelerate relative to more organic human processes, communications networks will continue to play an increasingly central role in our politics, and the stakes will grow ever greater. Even if MondoNet is wildly successful, and we achieve our dream of a decentralized, universally distributed global mesh in 20 years, we can’t expect the story to end there.

Nanotechnology, quantum computing, and genetic science are just a few of the emerging fields that have far-reaching political and communication implications, and thus far these implications have been primarily addressed within the discourse of science fiction rather than research and advocacy. That’s why each of us needs to be aware of the power dynamics surrounding technological innovation, and to continually ask ourselves how we can intervene to help shape a future we’d want to live in.

Jun 30 2011

Building The True Decentralized Net

There is an evolutionary war going on around the world, one fought between the existing centralized networks and the decentralized web. It is a tug of war between a centralized system of hierarchal control systems and a vast, unstructured web in which every device is equally a router, a server, and a terminal. It’s a fight between a set of ideologies, an aging one in which gatekeepers hold the keys to information and a bright new one which wants a world in which there are no gates and all data is available to everyone. A battle between totalitarianism and liberty. It’s a war that has but one conclusion, as all evolutionary struggles do, with the supplanting of the entrenched and obsolete by the disruptive and more efficient newcomer. But it’s not a battle that will be won without scars on all sides.

There are four main forces arrayed against a future network of free and open data.

Content providers want to insure that their every product is not only the only thing you are allowed access to, but that you only access it in ways that insure that you pay for the privilege.

Data miners want your every move online to be traceable, your every desire at their fingertips, so they can sell you stuff.

The networks want every bit you access metered, measured, and your every transaction subject to scrutiny and control.

Various “elites” want to control what you think, what you say, and what you do, all to insure that you will never be a threat to their “power”

The good news is that they are doomed and much of their current activity is the desperate scrabbling of an elephant who’s already fallen off the cliff and is hanging by its trunk. Note the desperate efforts to litigate and control the government by groups like the MPAA, the RIAA, Investment bankers, and other corporate interests in an attempt to insure that only their methods of interchange and exchange are allowed, no matter how badly it hurts the public good or even their own future survival. These actions are the surest sign of how quickly they are approaching extinction. Their way worked during the industrial revolution, so they try to force it to work in the post industrial era. And they will do everything they can to try and make it work even as they pull the cliff down on top of them. There is no possible way that the aging centralized infrastructure model will be able to cope with the ever rising numbers of handheld networked devices that will arrive over the next decade. Sheer numbers will overwhelm them like a tsunami.

And as they are swept away by the flood of data they sought to keep contained, we will see a new model rise up, one of a vast decentralized mesh network of peer to peer devices, all of which act as a distributed parallel network, and which will simply absorb the web as we know it.

One of the more controversial and ambiguous areas of this new decentralized model is its privileging of  anonymity. On the one hand, anonymity is an unambiguous plus. It plays a vital role in protecting agents of change who seek liberty from the wrath of authoritarians.  In a world of maximum surveillance, anonymity is a weapon, one that protects an individual’s free will and his/her ability to exercise it. Yet like all weapons, it’s also a danger to a free and open internet and a fully transparent world in which accountability has been restored to all levels of society.  The contradictions between the liberating powers of anonymity and transparency will be an area of difficult conflict and negotiation for years to come.

There are many companies and projects working on the anonymous web:

Dynamic Internet Technologies is a company that is very active in creating anonymous censorship free internet access tools and making them available to users in many totalitarian or authoritarian nations around the world, particularly China. There Dynaweb’s system creates dynamic proxy webpages that bypass censors and provide easy access for users.  Users can access “channels” that give them an updated list of links to Dynaweb pages, foiling efforts to block domains or IPs. Alternatively, their Freegate software allows direct access to the Dynaweb backbone.

Freenet encrypts all data and routes through multiple nodes to create a private P2P network. This is far more than just a “file sharing system.”  Freenet also encrypts websites, forums, media distribution and email. It acts like a kind of “shadow internet” and has been around long enough to have a large userbase.

Phantom takes a slightly different route by creating a protocol (a basic network language) that encrypts and anonymizes data at the level of basic network traffic.

Tonika is working on a secure anonymous social network.

Tor is one of the better known Anonymizers, and uses a volunteer network to relay data into untraceable spiderwebs that prevent watchers from seeing where you go and which keep websites from knowing where you are physically. (Look for a future Acceler8or interview with Tor core member Jacob Applebaum.)

Ultrasurf also offers services similar to Dynaweb, and has been quite popular in subverting the Chinese censor wall.

Beyond anonymity, there’s a need to create robust, fault tolerant, and above all distributed network that doesn’t rely on the same infrastructure as the current net. As far too many post-apocalyptic movies have illustrated far too effectively, our current internet falls far short of the DARPA ideal — a network that would survive a nuclear war. It is also unsuitable for spreading the internet to those areas lacking industrial infrastructure. The highly centralized infrastructure of the modern internet is difficult to build without an existing power grid, roads, and many other aspects of industrial development, and yet the fastest growing segment of the internet is in those parts of the world in which no such development exists or will be possible for decades at least.

That’s where mesh networking comes in. A mesh network is one in which each individual device acts as both a server and a client, both acting as a end user’s access to the web, and as part of the web infrastructure itself. A mesh network doesn’t rely on centralized towers, or an industrial powergrid, and can grow as fast as new devices can be turned on.

The Mesh Potato and SolarNetOne are two systems seeking to jumpstart mesh networks by creating low cost, low power instant networks, while Commotion, Freedom Box, and Tonido seek to create a plug and play all in one unit that provides not just mesh network ability, but end to end anonymity.

On the software scene, the demands of decentralization has its own challenges, from file sharing, to social networking, to identity protection, to even such basics as search and virtual world building. There are far too many projects going on to cover even a few in a comprehensive fashion, so I’m simply going to highlight a few.

MondoNets principals of a mesh network describe the priorities of such a system exceptionally well, (Acceler8or interview with MondoNet coming soon)

Open BTS is a project designed to turn cellphones into mesh networks and provide telephone and net services for a fraction of the cost of the current centralized cell services.

Open Cobalt is a Virtual World project that is like a version of Secondlife that has no central servers, is open source, and which could become a model for the future VR web.

And then, for decentralized capital exchange there’s Bitcoin, the e-cash system that’s been in the news a lot recently.

The numbers of these projects grows constantly, and if you are interested in helping develop them further, the P2P Foundation is a good place to start.

The current centralized web model is not going to survive the tsunami of data that will continue to grow exponentially as we develop the next generations of smart web devices. As “Bandwidth” limits and the cost of building and maintaining the current infrastructure become prohibitive, these projects, or others like them, will rise and fill in the holes, and eventually simply absorb the existing nets. That’s not to say that the telecos, data miners, content providers and authoritarian “elites” won’t make every effort to prevent them, but they will become less and less relevant as ever increasing flows of data swamp their efforts, and finally sweeps them away.  As we move into a future in which nearly every device becomes connected to the web, and virtual worlds become inextricably merged with the real world via personal VR devices, centralized control becomes impossible. Robust, decentralized, and free peer to peer networks will become the only solution.