Episode 25: Mesh Much?

Telecommunications, Topology, and Tokens

Meltem Demirors
Aug 16, 2019 · 12 min read

Most of us take our connectivity to the internet and other telecommunications networks for granted. But behind the simple and benign act of connecting to the internet lies an intricate maze of physical hardware, wires, and complex routing logic consisting of layers upon layers — and many curious parties sniffing your web traffic. In this episode, we discuss the origins of mesh networking topologies and innovations in using cryptocurrencies to enhance security, facilitate more complex logical ordering, and incentivize resource sharing in these new networks.

Special thanks to Daniel Onggunhao for helping us compile some of the research for this episode — follow him on Twitter!

Listen to the episode | Subscribe on iTunes or Spotify

Show notes and links for the episode 👇🏽 below

The year is 1962. The United States and the USSR are in the depths of the Cuban Missile Crisis, and both sides are building nuclear systems and figuring out how to use technology to ensure mutually assured destruction in case of an attack. US authorities, deep in their planning, were facing an interesting challenge — how would they communicate in the aftermath of a nuclear attack?

Paul Baran, a research at RAND, the private think tank, dreamed up a new system. He envisioned a network of unmanned nodes that would act as switches, routing information from one node to another to their final destinations. The nodes would use a scheme he called “hot-potato routing” or distributed communications. Furthermore, the information would be divided into “message blocks” before sending them out across the network. Each block would be sent separately and rejoined into a whole when they were received at their destination.

This was the foundation upon which the World Wide Web was built.

Baran’s work was published in 1962 and expanded upon in 1964. Using these foundations of packet routing, or as Baran called it “Hot Potato Routing”, and packet switching, ARPANET was launched in 1969. It was intended for scientists and researchers who wanted to share computers remotely. But within two years, the network’s users had turned it into something unforeseen: a high-speed, electronic post office for exchanging technical and personal information. By 1989, ARPANET became the “internet.”

This episode is about the architecture of networking technology, and the evolution of networking hardware, software, and networking models in the context of cryptocurrencies.

How Communication Works Today

When I go home and connect to my WiFi network — what actually happens behind the scenes?

Your phone has a radio in it, and it translates chunks of data into a radio signal which it transmits. Your router, which is plugged into your wall, has an antenna and receives these radio signals and decodes these into packets.

You may have heard people talk about TCP and IP. Transmission Control Protocols (TCP) are used to direct packets to specific applications on a computer using a port number. Internet Protocols (IP) are used to direct packets to a specific computer or server.

Our router connects to an Internet Service Provider (ISP) which gives us access to the Internet through a range of technologies. A single device is assigned an address when it connects to the Internet: an Internet Protocol (IP) address. This address distinguishes our device in the network from all other devices. It’s kind of like your router’s unique address.

However, our national ISP can only connect us directly to servers located in our country. If we want to connect to servers located in a different country, then we need that country’s ISP to connect us to those servers. In this way, the internet is a bunch of local networks joined together to form a larger, global network using internet protocols and standards.

In the digital world, every connection requires our device to send “packets of data”, which is quite similar to sending letters by post. In both cases, we need an address, a system which handles our letters and a letterbox. On the Internet, an example of an address we might want to “send letters to” is www.myshadow.org. Similarly to a post office, our IP address helps direct our “letters”, while the Transmission Control Protocol (TCP) disassembles and reassembles our “letters” into a single port, which can be compared with a letterbox.

So one simple interaction has a lot of moving parts, and a lot of different layers. We have our phones, our local networks (WiFi), our regional ISP’s, and Twitter’s servers. These layers are often referred to as network topology.

Our device’s data (such as our IP address and any browsing cookies) travel through so many nodes and layers in a network, which means that we can be tracked all along the way. In other words, when we access a website, all the intermediary parties included in the network are aware of it.

Now why does this matter? This architure we describe makes our communications and online behavior susceptible to a number of different flaws:

Now the reason things developed this and in all these layers is because centralization enables efficiency in planning — where to put towers, where to lay wire, where to build servers, etc and private companies can finänce it and charge for access to it.

The idea of mesh networking — or changing the topology of networks to flatten the architecture — has been around for a long time. It just hasn’t been as fast or as cheap, and the right tools haven’t existed to incentivize people to contribute resources to the network until now.

Mesh 101

The goal for a mesh is to keep all components decentralized, so the only way to shut down or otherwise disrupt a mesh network is to shut down every node in the network. This makes them much more resilient to interference or other disturbances. To understand how meshes work — let’s touch quickly on one of my favorite things — network topology.

Physical topology pertains how the various components of a network (e.g., device location and cable installation) are placed, while logical topology illustrates how data flows within a network.

Graphic sourced from here

Physical topology is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunication circuits. A transmission medium is used to link devices in the physical topology of the network. Often, this is conductive or fiber optical cabling, and centralized parties plan the locations of nodes, and the links between the nodes and the cabling.

In contrast, logical topology is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network’s logical topology is not necessarily the same as its physical topology. Logical topologies are often closely associated with media access control methods and protocols. Some networks are able to dynamically change their logical topology through configuration changes to their routers and switches.

A mesh network is a local network topology in which the physical infrastructure, like nodes, bridges, switches, and other infrastructure devices connect directly, dynamically, and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data from/to clients.

Graphic sourced from here

This lack of dependency on one node allows for every node to participate in the relay of information. Mesh networks dynamically self-organize and self-configure, which can reduce installation overhead. The ability to self-configure enables dynamic distribution of workloads, particularly in the event that a few nodes should fail.

In future episodes, I hope we’ll discuss fog computing, which is an extension of cloud computing but focused on enabling infrastructure-less computing, and other innovations in hardware.

The History of Mesh

Like many innovation, mesh networks are by no means new. Mesh already exists on localized basis — as WiFi networks. There are was a wave of VC funding of devices that allow you to run a mesh locally on your WiFi network:

These meshes rely on connection to a master node, which is the router plugged into your ethernet or fiberoptic cable. But the problem with all of these is you’re still at the mercy of an ISP.

Despite their many benefits, mesh networks are still niche. This is partly because connecting to a mesh network is still far more difficult than just signing up for Internet service via an ISP and paying a monthly Internet bill.

Examples of existing mesh networks

Enter Bitcoin: Incentives in Mesh Networks

Meshes face a number of challenges that have historically been difficult to resolve:

And then you need:

Increasing Redundancy in the Bitcoin Network

Some projects have been focused on leveraging new networking architectures to make the bitcoin network more resilient as reducing dependency on ISPs. Some examples include:

Building Mesh Networks with a Crypto Incentive

Now mesh architecture isn’t just about making the bitcoin network more resilient. It is also about enabling new types of mesh networks using cryptocurrency as an incentive layer.

In 2017, the bitcoin community and mesh community started to intersect, and started experimenting withe public wifi access points with an app-based micro-payment system. This would theoretically incentivize network development by providing a profit incentive to invest in and share infrastructure.

However, some very real challenges exist:

Examples of Bitcoin-related Mesh Networks

Altcoin-based Networks

Conspiracy theories?

If meshing actually starts to work at scale, the entire world we have built comes crashing down — so many companies rely on keeping the existing power structure. I call this “the great flattening” as layers of fees and hierarchies get compressed down.

Either way — this topic is fascinating!

What Grinds My Gears

Welcome to What Grinds My Gears, a podcast about the world of cryptocurrency. Each week, we delve into one big idea, and examine through a broader financial, political, and cultural lens to learn from the past, understand the present, and explore the future.

Meltem Demirors

Written by

making benevolent mischief. investing @coinshares.

What Grinds My Gears

Welcome to What Grinds My Gears, a podcast about the world of cryptocurrency. Each week, we delve into one big idea, and examine through a broader financial, political, and cultural lens to learn from the past, understand the present, and explore the future.

More From Medium

More from Meltem Demirors

More from Meltem Demirors

More from Meltem Demirors

Drowning in Tokens

14.4K

More from Meltem Demirors

3.2K

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade