Sunday, 11 September 2011

A Study of 'NETWORK PRACTICE'



 ‘information exchange such as BitTorrent suggest a general shift away from the traditional conception of the architect as master builder to one more in line with the collaborative remixing and patching tactics of the hacker.’

Design no long works on the bases of a linear process where information is passed up and down the line but in a realm of network where ideas are bounced by anyone in the circle.  

‘A darknet is a private virtual network benignly equated to friend-to-friend networks or… the domain of the digital resistance… Microsoft researchers…state that: ‘The darknet is not a separate physical network but an application and protocol layer riding on existing networks.’ Darknets are networks limited to a select group of users through encryption and structural security measures paradoxically built around logics of extreme distribution and flexibility.’

Different realms inside the digital world is already being created adding more layers to the dimension, this separation of people based on virtue intelligence is similar to that of politics in the real world-where the higher up you go the more access you have to a wide range of resources.

‘The SHM is comprised of a system of Antitank Landmines (ATLs), each of which has mobility, RF communications, ranging, and distributed computation subsystems. Upon deployment, the ATLs autonomously assemble a totally ad hoc wireless network via their frequency hopping spread spectrum (FHSS) radios. This peer-to-peer network, which is logically flat and does not rely on any predefined routing, rapidly detects and adjusts when an ATL leaves or enters the network.
 Activating the operational logics of networks, the SHM has the capacity to assess its own status and operate in one of three operational modes… The aim of the SHM is to literally heal itself once munitions have been expended and nodes drop from the network by autonomously redistributing the field of mines to seal any breech. Literally, each individual mine is a 2-kilogram, rocket-propelled node in a flat ad hoc network that recognizes the location of all the other mines in the field through a continual monitoring over a frequency-hopping spread spectrum radio with the capacity to jump as far as 12 meters in any direction to ensure field integrity.
The Self-Healing Minefield, fully tested in 2003, both exemplifies the collective intelligence of a synchronous network of agents, and is one of the first active environmental applications of the theories of network logics within the US military’s Network-Centric Warfare initiative.’

This embedded organizational intelligence is able to process data and think on their own without the aid of a human actor. The network itself contains floods of data that will automatically assemble and redistribute itself when needed. Our networks are thinking for us. 

No comments:

Post a Comment