Antonio Machuco Rosa on Fri, 29 Nov 2002 21:28:41 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Memory and Control in the Architecture of the Internet



via geert lovink <[email protected]>

(translation of a lecture held at the Oeiras conference on surveillance
(near Lisbon), September 28, 2002. Posted to nettime with permission of
the author. /geert)

Memory and Control in the Architecture of the Internet Ant�nio Machuco
Rosa

The historical origins of the Internet.

>From packet switching to TCP/IP

The theoretical frame of classic rationality involves a well precise
concept of control, whose characteristics were initially approached by
physics and later became a paradigm for various disciplines of knowledge.  
One of these characteristics consists on the construction of models that
assure total predictability of future events, this made possible when a
global representation of a system can go local, meaning, the calculation
of the system s state in each point of its evolution. In its strict
formulations, this situation s called the principle of determinism, which
holds, effectively, a kind of omniscient state: the local structure is
deduced a priori from the global structure. In artificial systems, in
technology, the principle of determinism is conjugated with the principles
of global planning, modular and linear deconstruction of the technological
artefact, in a way that the interaction between its parts is as scarce as
possible, allowing for the prediction of its behaviour. These strategies
of technological design can be designated as centred, and they involve
certain central entities who are globally responsible for the functioning
of the artefact (ef. Machuco Rosa, 2002, for a more detailed analysis). As
we shall see, a clear example of this design strategy is given by the
modern digital computer, based on the existence of a CPU, a central clock
and a clear separation between data and instructions.

  If the architecture of the modern digital computer represents a centred
design strategy, it was an opposite design principle, the non - centred
design, that, historically, was in the origin of modern computer networks,
and in particular of the very first, Arpanet. This kind of design is
partly recovered by what was designated by self organization: a principle
based on the idea according to which the elements of a system interact
only locally, resulting in an emergent order whose formation does not
depend on any planning and globally organizing centre. In the case of the
first computer network, we can determine two levels within its
architecture, a distinction that is crucial for the general problem of
control and surveillance. From the historical point of view, these two
levels can be identified as the two investigation teams that contributed
for the original architecture of computer networks, sharing the fact that
both were influenced by the cybernetic movement (cf. Dupuy, 1994, for a
history of the cybernetic movement). In it one finds a tension between the
centred and the non centred principles of design, but it is clear that it
was cybernetics the first to theorize what we call non-centred principles.

  The first of the two mentioned investigation teams is practically
reduced to one person, Paul Baran. Working for RAND in the early sixties,
Baron created packet-switching, that would become the algorithm used for
the circulation of information in computer networks. This is a local and
non-centred algorithm. As Baran mentions, (Baran, 1960), it is an
algorithm that allows a commutation network to implement a policy of
self-learning (&) without the need for a vulnerable central point of
control . When inventing packet-switching, Baran was guided by the general
classification of systems. He opposed the traditional principles of
commutation based on the existence of a central commutation point through
which all information must pass to the principles of packet switching.

  Packet-switching is an algorithm according to which the network knots
send information to nearby knots, and so on, until the final destination,
without any knot gaining knowledge about the network s global structure.  
Without going into details (cf. Baran, 1960), this is possible because a
knot is able to direct information due to the knowledge it possesses
concerning the structure of a network s fragment. This knowledge was
generated by messages previously sent by other knots, to which it
responds, sending back information. In other terms, if a given knot, A,
receives a message from an intermediary knot, B, originated in a knot C,
this path is memorized, therefore if A then receives a message from a knot
D destined for knot C, it knows that it should send it to B in order for
this one to send it to C. Apart from that, packet-switching breaks the
message into several blocks; it is fragmented and doesn t travel as a
whole. Therefore, in this concept, information is transmitted locally in a
distributed and redundant way. Each knot is equal to any other, without
any central point that, controls traffic according to origin and
destination with global knowledge of the network.

  We will later see the importance that the kind of ideas implemented in
packet-switching had, concerning the problem of surveillance on the
Internet, as well as the importance they currently have regained. For the
moment, it matters to identify the historical origins of computer networks
in a more precise way, showing that their effective implementation
implicated the juxtaposition on the algorithm of information transmission
of an architecture that, perhaps necessarily, will open up the possibility
of partly eliminating its distributed nature. In fact it wasn t Baran but
a team of investigators from ARPA (defence connected research government
agency) who effectively implemented the first computer network, Arpanet.
 From them, stood out, in an early stage, J. Lickilider and C. Taylor,
also strongly influenced by cybernetics (ef. Machuco Rosa, 1998). The main
reason that led to the implementation of Arpanet had nothing to do with a
supposed soviet nuclear attack, but with the need to save money (cf.
Hafner & Mathew, 1996): in a time when computation was financially very
expensive, came the idea of sharing computational resources of a machine
with others, meaning that the concept of shared computation was in the
origin of Arpanet. This is however, a distributed computation that
operates on a different level from packet-switching: here, we deal with
the transmission of information, whereas there, we are dealing with
distributed sharing of computational memory. In order to fulfil this
objective, network architecture traced the separation between computers
working as points of commutation (the current routers) and host computers
(approximately the current servers). This architecture was also conceived
according to non-centred principles, for not only routers, but also all
hosts were alike, (peer computers), not existing any with centralizing
tasks. However, as we will see, this type of architecture involves the
possibility of evolving in a different direction from what was initially
intended, which will have important consequences from the control point of
view.

  It is true that control, on early stages of computer networks
development, was minimum, which is made clear by identifying the emergence
of what is now known as the Internet. The Internet is, in fact, a network
of networks that interconnected among themselves through the adoption of
common communication protocols. Each of the sub-networks of the
meta-network Internet also didn t have any dominant position in relation
to any other to start with. In fact, many of these sub-networks had
specific architectures that prevented them from communicating, when a
capital event took place, the creation and later adoption of the standard
TCP protocol, later called TCP/IP (Transmission Control Protocol / Intenet
Protocol) in 1973. This is a remarkable creation on different levels.

  Firstly because it is a public and open standard. Public in the sense
that it is not a proprietor s standard, owned by the state or by any
corporation or individual. In L. Lessig s words (Lessig, 2002), TCP/IP
belongs to the commons, to this public space that precedes the
public/private distinction in the State/private sense. It is also public
in the sense that its code source is open or accessible to anyone.
Concerning its function, TCP/IP is responsible for the reliable
transmission of packages, according to packet-switching, for it is based,
as we saw, on a principle of distributed circulation of information.

Secondly, TCP/IP has as main characteristic to satisfy a principle of
neutrality, also called end-to-end principle. The adoption of this
principle was undoubtedly greatly responsible for the explosive growth of
the internet, and it means that TCP/IP is neutral, indifferent in relation
to any application that runs over it. It cannot distinguish them and is
totally blind in relation to any kind of specific contents of each
application: for example, it does not tell an e-mail from a web page, an
MP3 file or any other application travelling in the network of networks,
the Internet. This protocol only sends the packages from end to end
according to the information s IP address of origin and destination, in a
reliable way. The packages distinction according to their content is left
for the networks knots, the servers and computers in general where
applications reside. From this comes a fundamental consequence: any device
of control and surveillance will not be exercised at TCP/IP level. Such a
fact must not hide an important point: when TCP/IP designers conceived
this protocol there was nothing that said that it should process
information in a distributed way, nor that it fully respected the
principle of neutrality.  The designers could have introduced
specifications that violated this principle. For instance, by
distinguishing file formats, this is, introducing routines in the software
that could filter a certain kind of information. For this it would be
enough that the circuit was not neutral and made the access points comply
with certain specifications. If this didn t happen, it was because the
network s pioneers didn t want it so. A standard such as TCP/IP
illustrates a major aspect of information technologies: from the values
point of view that they involve privacy and possibility of surveillance,
for instance these technologies don t possess any essence, they don t
convey in an essential way this or that opposed idea. The ideas they can
effectively come to convey depend on the architecture that we decide to
impose on the code-source that rules them (Lessig, 1999). What is written
on the code-source (filtering or not filtering information, for example)
is a free decision, conveying values, that does not depend on any
technological automatism. TCP/IP s architecture was created in a way to
assure effective intercommunication of several computer networks, which
had as non-intentional consequence the fact that the possibility of
control is, at its level, minimum. However, as we shall see, this doesn t
mean, that control cannot be practiced on another level, in the networks
knots. The level at which control is operated can be identified more
clearly if we quickly go over a set of ideas sustaining that the Internet
intrinsically holds a liberating value, preventing, also intrinsically,
any form of control and surveillance.



Electronic Frontier Foundation and surveillance

These types of ideas were often diffused during the past decade by one of
the first and main organizations of online activists, EFF (Electronic
Frontier Foundation), among others. In general terms EFF defends the model
of an Open Platform that is a global communication infra-structure
offering indiscriminate access, based on open, private standards, free
from asphyxiating regulation (In www.eff.org).

Open means that the code-source should be publicly accessible, and private
is not equivalent to proprietor, but rather public in the previously
mentioned sense of commons. TCP/IP has these characteristics, which assure
a certain visibility and transparency that undoubtedly - and we will come
back to this point can prevent certain camouflaged forms of control and
surveillance. However this point of view, that makes human freedom and
social regulation intervene, is next prolonged in a technological
automatism. As one of the founding members of EFF, John Gilmore, mentions:  
the electronic world, conceived to resist a nuclear attack, can equally be
indifferent to government regulation. Due to its global range and its
decentralized design it cannot be controlled by any police.

There are two arguments here: the first states that the Internet could not
be watched because it is a global network not based on physical
interactions. This is an argument with some credit, but one surely cannot
conclude that the Internet, due to being global, cannot be in any way
watchable. The second interests us more and states that the base
architecture of the Internet would make the network intrinsically
impossible of being watched. More precisely, Gilmore implicitly refers
that this is the architecture of TCP/IP and of the non-centred algorithm
that this protocol implements, packet-switching. The control, the
surveillance would become impossible due to the intrinsic nature of the
technology in question. The idea consists on the fact that a non-centred
structure would assure anonymity on its own.

However it is false to claim that the Internet has a supposed essence that
makes it uncontrollable and impossible of being patrolled. To visualize it
better, it is necessary to mention some aspects of the computer meta
network s architecture. TCP/IP is a neutral protocol in the sense that was
described in the previous section. But this doesn t imply that later
protocols situated above it have necessarily to be so. They can perfectly
introduce specifications that allow surveillance. Let us remember that
above TCP/IP other protocols are running, like MINE (Multipurpose Internet
Mail), SMPT (Simple Mail Transfer Protocol), FTP (File Transfer Protocol)  
and HTTP (Hypertext Transfer Protocol). These protocols share the original
vision of the Internet in the sense that they are public standards. But
nothing prevents that different proposals for its extension incorporate
surveillance and control mechanisms, or that new protocols incorporate
them from scratch. A good example is PICS[1]. PICS aims at being a
standard for the Internet and its objective is to allow an ordered
filtering and classification of information in a way as to block access to
certain sites (pornographic sites were the project s initial objective).
Only this same technique can perfectly be used to filter any kind of
information. PICS is therefore a good example of code-source with the
ambition to become a standard and it illustrates the fact that information
technologies in general involve values, being however indeterminate in
relation to specific values. In this way, as Lessig (Lessig, 1999)
mentioned, the Internet has nothing essential , necessary . There is no
technological automatism that guarantees the absence of control.

A protocol such as PICS doesn t fully respect the principle of neutrality.  
And we could perfectly imagine any other protocol that made all the knots
in the network to comply with their specifications. This means that
surveillance in the network will have the tendency to operate at knot
level where the applications reside, being these the ones that introduce
the specifications that assure control, resulting in a greater distinction
between the two types of computers present at Arpanet s initial
architecture: the distinction between routers and hosts. As we shall see,
this distinction has not ceased to increase, but for the moment it matters
to point out that it introduces the distinction between circulation and
memorization of the information. If control can hardly be done at
circulation level, it can naturally occur at Internet s memory structure
level, and one can refute that, if circulation is distributed, memory
architecture has evolved into (more and more) centralized strategies. In
this context, it is useful to briefly recall some characteristics of
memorization devices.



Memory and information storage

The structure of human memory is still greatly unknown. However, for a
long time modular conceptions of memory were advanced. (cf. Machuco Rosa,
2002, Chapter I). Caricaturing a bit, those conceptions sustain that
memorized contents are entirely located in relatively precise modules, and
that the access to these contents is carried out by a central entity a
homunculus who would hold the physical address of this place and thus
would update the stored memory in a facts base . Even being a caricature,
this structure is not too different from the architecture of the modern
digital computer:  there is a RAM memory, where data and instructions are
located, and a CPU that, among other things, locates these data by
physical address and then executes them. Expanded, this structure can be
found on certain programs of Classic Artificial Intelligence (Machuco
Rosa, 2002, Chapter I), where contents are also physically located and
resend, through pointers, to other addresses where other contents are also
residing in memory. Applied to great masses of data, this structure allows
building potentially huge relational databases allowing for an enormous
capacity to inventory, discriminate and control information. And it does
so automatically. It seems to be part of digital information s nature to
reside in memory and be related automatically.

  With the due modifications, the mentiond structure was in part
incorporated in the architecture of computer networks. Here information is
also constantly stored in servers. It usually even is automatically stored
in the server s access cache to the Internet and/or in the cache of the PC
itself. This memory architecture involves, as its main possibility, the
automatic relation of stored information, and such a possibility has
effectively been constantly implemented. In truth, it is perfectly known
that many of the main appliances for computer networks have precisely the
function of correlating data. This is what happens with search engines or
with the numerous programs used by corporations to draw the user / client
s profile. Identification is also physical, or more precisely, each
machine can be accessed and identified from its IP number. Using adequate
surveillance of an IP address, the information s content may not only be
known, but also sent to any central entity. Certain central entities,
probably using automatic mechanisms, could equally examine the mail s
content. As it was mentioned before, there is nothing that, in principle,
prevents certain standards from incorporating the most various types of
surveillance devices. Therefore, if control and surveillance is not made
on information circulation level, it can perfectly be carried out in the
network s knots: either on the servers or on an individual user s PC
itself. The information is memorized there more or less temporarily and,
even remotely, it is possible to keep an eye on many of the actions done
by a user.

Therefore, and as it was pointed out many times, the relational nature of
information allows surveillance and control activities, unimaginable with
the use of any other technology. This possibility largely takes roots on
the architecture of memory that has just been described and that is
typical of information. The question that is then placed is to know
whether there are mechanisms, architectures, policies that allow to
counterpart the possibilities of surveillance involved in the concept of
digital information. There are at least three of these mechanisms and
architectures: cryptography, open code-source and computation between peer
computers.


Cryptography

The base concept of digital information cryptography, the concept of
public key, appeared amidst the opposition between centred and non-centred
systems. It was created in 1975 by W.Diffie motivated by ensuring the
effective privacy of computer data. At least outside the military sector,
protection of data was at the time assured by passwords managed by
computer systems administrators. As was said by S. Levy, this type of
protection represents an approach from top to bottom to the problem of
data privacy [2]. The non-centred approach would instead consist on two
individuals communicating without the need for an intermediary, or else on
the existence of a common private key that they would have to transmit to
each other. This final approach has become more and more diffused.

The concept of public key is based on the existence of two types of keys
possessed by each individual: a private key and a public key, the first
remaining secret, while the latter can be accessed by anyone. Without
going into subjacent mathematical algorithms, the idea consists on an
individual being able to send ciphered information to another, using the
destination s public key, while this is the only one with the ability to
decipher the message using the correspondent private key. This way, if A
wants to sent a ciphered message to B, he will search for B s public key
and use it to cipher the message. Receiving the message, B uses his
private key to decipher it, using a mathematical process that establishes
a correspondence between B s public and private keys ensuring that only he
can decipher any message that has been ciphered with his public key.
Obviously if B wants to reply to A, then the process is inversed: B
searches for A s public key and uses it to cipher the message that will be
deciphered by A using the private key that corresponds to his public key.
Based on this idea, it is possible to code messages with an extremely high
level of inviolability, the question being whether it is possible to
diffuse software that is adequate to that level of security[3]. Besides,
the concept of digital certification has been recently diffused, which
aims at assuring that it was in fact A (and not someone else) who used B s
public key in order to send him a message.

The use of this kind of technology as an ideological flag generated a
movement inside the broader movement of cyber culture, the so called
cyberpunks, who have in Tim May, author of The Crypto Anarchist Manifesto
and of Black Net, one of their leading representatives. In his
perspective, any individual s accessibility to sophisticated instruments
of cryptography shouldn t only serve the purpose of ensuring the privacy
of the data people constantly leave behind going through electronic
networks. On the contrary, cryptography should have a wider social effect,
it should change in a fundamental way the nature of corporations and
government interference in economic transactions (May, 1996). Still
according to May, crypto-anarchy is inevitable; even if there is no chance
of it being implemented by politicians , it will be implemented by
technology itself, which is already happening . In fact, political powers
have been gradually authorizing the use of sophisticated cryptography[4].
But this doesn t mean that ciphering is a technology that automatically
assures total privacy. In fact, as said before, cryptography should be
complemented by digital certificates, which have to be issued by a third
party, hired by the individual. On the other hand, proposals suggesting
that individuals would be complied to give a copy of their key to a
central entity the State are recurrent. In fact, since the utopia of a
cybernetic space completely outside the Nation/State is over, there is no
reason why the State could not formulate such a demand, when similar ones
are made concerning everyday activities. If so, and naturally without
minimizing the importance of cryptography as protector of privacy,
regulation ends up situating at State level, traditionally seen as a
constituting the frame of a public and democratic space of discussion and
decision.



Open Source

The open source movement defends that, in principle, software applications
should be accompanied by their code-source, and that it can be modified
under the condition that it must again be made available within the
software s public space. This is, at least, the movement s philosophy such
as it was theorized by its first great defender, Richard Stalmann[5]. It s
a thesis whose credits are difficult to evaluate and whose application is
limited by various factors. However there are two other conceptual
subjects raised by the open source movement that seem to be crucial.

  The first illustrates how open source software development is often
processed according to decentralized mechanisms, similar to the ones that
caused the appearing of some Internet networks. LINUX operative system is
perhaps the best well-known example. It began being developed in 1991 by
Linus Torvalds and rapidly, first hundreds, and then thousands of
programmers all around the world, using the Internet, started cooperating
in writing its code. The story of the project was well depicted by one of
the main mentors of the open source movement, Eric Raimond (Raimond,
1999), pointing out the way LINUX system has acquired more and more
functions and stability in a process he compares to a bazaar cacophony ,
this is, through the efforts of a very large number of people accompanied
by a very small central of coordination. It is a programming strategy
opposed to large programs with proprietor s code-source, and that,
however, apparently a miracle, not only works, but produces extremely
strong systems.

The public nature of code-source places another conceptual question that
goes beyond the supposed efficiency gained by non-centred design
strategies. It concerns the issue of standards, which gives a new
perspective over the problem of surveillance on computer networks.

The decisive importance of standards in information technologies is clear
for some time, but the recent case Microsoft / USA has stressed it even
more. We already pointed out the importance that the existence of
standards or open protocols had on the evolution of the Internet. On the
other hand, it is known that, for instance, for the PC there is an
operative system, Windows, that is not an open standard (the code-source
is not public) and has acquired a position of monopoly. The reason for
this last fact is also known, having been systematically theorized for the
first time by Brian Arthur (Arthur, 1994), who demonstrated that
information technologies are characterized by the existence of growing
scale resources. Without going into technical details, the main reason for
the existence of growing scale resources lies on the fact that information
technologies often demand strong external input, which means that the
bigger the number of users of a certain product, platform, etc., the
better the incentive for additional users to appear, in a motion that
leads the product in question to a dominant (monopoly) market position.
Summing-up, in the Windows case, this mechanism of positive retroaction
consists on the larger the number of programmers developing specific
applications for Windows, the bigger the incentive for users to join that
platform, which in turn generates new incentives for new applications
development, which attracts more users, and so forth, with the results we
all know.

One can argue, even without being an adept of advertising all type of
code-source, that programs working as standards and over which numerous
other applications will run, meaning, the programs in network susceptible
of strong external input, should have special treatment: they should be
public, same as most standards that exist on the infrastructures of the
physical world (from roads to electrical sockets) are public. One reason
for this point of view is that information technologies public standards
favour innovation in a decisive way, unlike what tends to happen with
private standards. This was precisely what happened with the Internet,
based on public open standards, and one can argue that attempts, like
Microsoft s, to impose standards on computer networks will lead to a
reduction of the level of innovation (Lessig, 2001).

But there is another argument that favours open standards. It concerns,
precisely, privacy and surveillance and confirms the importance of the
open standard movement s ideas. In fact, there is an increasing number of
software mechanisms that make the Internet extremely vulnerable to control
strategies, privacy invasion, freedom of speech limitation, etc. Routines
that exist in common programs like browsers filter, catalogue and select
information, often in a non-visible way to the eyes of the user. Thus, the
advantage of open code-source consists on making those mechanisms visible.  
This means that, on open programs, any mechanism of control will be
entirely exposed, and since one has the code-source it can be immediately
modified in a way that eliminates the undesired programming module. Public
standards share a certain ideal of transparency that has, precisely, the
effect of assuring privacy and individual autonomy. In other terms, what
is public and shared by all can t harm each one s freedom and
individuality.  So, the concept of open code-source implies that
surveillance regulation is implemented within the commons public space.



WWW and P2P

In the previous section we saw that the concept of distributed computation
was present in the mind of the early computer network architects. We also
saw how the networks evolution lead to the appearance of various forms of
centralization. This is, in particular, the case of the World Wide Web.
The WWW is a network based on the asymmetric and tendentiously centred
server/client mechanism. Like all others, this model was chosen, defined
as a characteristic of network architecture, despite being contrary to its
maker s, Tim Berners-Lee (Berners-Lee, 2000), original intentions. The
server/client model is in fact a centralized model, locally centralized,
in the sense that any request of information can be seen as a relation
between a server and a client, relation that exists independently from all
other requests.

Locally, the server/client model is a relation between a centre and a
periphery client of that centre. It has been imposed from the exterior as
architecture design, but implies, through the concept of link, a global
consequence, not explicitly imposed on architecture design. More exactly,
it unintentionally involves the appearance of a global centre, not only
local, with all the control related consequences that will follow. What
happens if, instead of considering every request from a client to a server
as independent from all the others, we analyze the global structure that
results from the various local interactions, based on tracing a link,
meaning, what structure results from the clients multiple requests to
servers? There is a consequence not intentionally inscribed in the model
server/client, which is a new form of centralization emerging from link
structure of the WWW. In fact it is possible to demonstrate theoretically
(Barab�si, Reka and Jeong, 1999), and acknowledge empirically, that the
WWW displays scales invariance, or in other words, there is a relatively
small amount of sites that are pointed by a vast number of links, and a
vast number of sites pointed by a small number of links, a phenomenon
whose cause apparently lies on a connection preference propriety: new
links are more likely to point to sites which many other links point to
already.  Therefore, there is an emergence of sites that will tend to be
larger and larger (more paths in their direction), and the bigger they
become they bigger they will get.  Therefore, Information will tend to
position itself in the direction of more visible sites. It is a mechanism
of positive retroaction with the inevitable consequence of the existence
of a small number of sites with enormous density of connections and an
enormous number of sites with weak connections density. One must not
underestimate the importance of that fact, not only because of the
existence of central points that make the net extremely vulnerable to
attacks that may deregulate it, but also due to the possibility of
gigantic information storage centres appearing, with the subsequent
control and surveillance consequences[6]. The existence of these centres
was not imposed as a system design principle; they emerged. We will see
how this kind of emergence can be again met in the peer-to-peer
computation models (P2P) that we now present.

  Around the late nineties, the computation model designated by P2P
started to get a lot of attention, which restores the initial idea of
distributed computation defended by some of the Arpanet founders as well
as the concept subjacent to packet-switching. Reasons like the PC s unused
computational capabilities were factors that lead to the development of
P2P[7]. But other reasons are equally related to a new attempt to
counterbalance the potential of control and surveillance that computer
networks have, in particular when they are based on the server/client
model. These socio-political motives were the inspiration guide of one
among the several P2P projects, Freenet, created by Ian Clark
(http://freenet.sourceforge.net/).

The main objective of the adaptive network Freenet is to assure total
anonymity, trying to eliminate to a minimum the possibilities of
surveillance that are implicit in the architecture of the computer
networks that make up the Internet. Its guiding idea is similar to the one
defended by the EFF: the idea according to which non-centred technologies
assure anonymity and privacy. However, and contrary to the opinion
sometimes sustained by members of the EFF, Ian Clark points out that
non-centred technologies don t characterize the architecture of the
current Internet, therefore it is necessary to create a new network that
definitely satisfies the non-centred design principles, breaking away
completely from the server/client model. This new network is the Freenet,
and in it each computer is a peer, meaning, all computers are equal, none
centralizes the network, both at circulation level and information storage
level. Besides, the principle of locality is respected, for each network s
computer/knot only has the information concerning the network knots in its
neighbourhood.  This is the philosophy of non-centred systems: each knot
only has a local vision, therefore any global representation of the
network is completely beyond their access. Instead of qualifying his
network as non-centred, Ian Clark, conveying this way the project s
ideological motivation, mentions that the Freenet is a perfect anarchy
(Clark, 2000).

Since the network seeks to be an information retrieval device, one could
think that, somehow, there would have to be something similar to a server
where a client obtains the desired information. However, and on the
contrary, the network s architecture imposes that every computer is,
indistinctively and at each moment, both server and client . More
specifically and without going into technical details, the Freenet allows
the attainment of memorized information in the following way (Clark,
1999):  computer A initiates an information request (to which corresponds
a certain key). Due to the past history of interactions, it sends that
request to one of the computers, say B that, with a certain degree of
probability, has that information. B possesses or not the information in
question. If it does, it sends it to A. If it doesn t, then it sends a
request to its neighbour computers, let s say C that, with a certain
probability, has the requested information. One should note that if the
client was initially A, it then became B, and then C. Let us suppose that
information is finally found on a computer D. D then resends the
information through the intermediary knots that had been previously
crossed (each of them was a client in the opposite direction, and is now a
server ) until it reaches A, the original source of the request.

One characteristic of Freenet s architecture lies on the fact that the
information returning from D to A is stored in cache, not only in D,
(where it was found) and in A (where it will stay), but also in C and in
B.  Therefore, on one hand, each knot is indistinctively a client and a
server , on the other hand, information is constantly being duplicated in
the network, this is, we are approaching, even if not in the complete
sense of the term, an architecture of distributed information. This
absence of any central point, of any server , immediately assures a high
level of anonymity, therefore any request originated in a certain knot is
replicated by the numerous intermediary knots where it may pass through,
the same way as memory is constantly being multiplied times n, according
to the n number of intermediary knots. Therefore, in principle, it is not
possible to identify the actual source of a request. It is surely not
possible to identify the requisition original source because, according to
our illustration, it is impossible to determine whether computer A was
originating a requisition or simply passing on a requisition originated in
some other knot in the network.

  We can now better understand how a computer finds the information in one
of its neighbours. With the propagation in memory of requisitions and of
information in cache, the density of connections grows progressively. Now
it is a generic outcome in the self-organization theories that, if that
density crosses certain critical thresholds, the probability of finding
the requested information through a relatively short path converges
rapidly towards 1 (for instance, Bundle and Havlin, 1995).

This result shows that the required information can be found through a
relatively short path and only based on the network s local structure. The
thing is that this result can be seen from a completely different
perspective whose possibility Clark doesn t seem to have noticed that goes
against the equalitarian philosophy subjacent to the project and that also
underlines the typical ambiguity of information technologies. Obviously
the memory stored in peer computers cache cannot grow indefinitely, having
Ian Clark implemented an algorithm in the network that establishes credits
of information removal. Looking closely at that algorithm, one can verify
that it translates the apparent obvious solution: the criteria of removal
will be determined by a principle of popularity. This way, the last
requisition received by a peer computer goes to the top of the memory,
while the previous ones go down one notch. Since every requisition has a
key identifying the requested information, the inevitable consequence is
that the most frequent requests, that is, those who request the same
information, will tend to remain on top, while the less popular subjects
will be progressively removed from the top until their complete exclusion
(no one requests them, therefore they don t show on the first levels).
This is a totally similar mathematical result to the one that leads to the
formation of sites centred on the WWW. In reality it translates an also
generic result in the processes of self organization in a positive
retroaction regime: the bigger the value of a connection, the larger the
attraction is for future users , in a process that leads to the
disappearance of possible alternatives. The positive retroaction mechanism
always involves fixed points in competition, and the updating of one of
them implies the creation of a monopoly (be it of ideas or of any other
kind) and the exclusion of another (Machuco Rosa, 2002).

Often, the defenders of non centred architectonical solutions are not
conscious enough of the monopolization processes that they can
inadvertently create. None of that takes value from Clark s arguments
concerning Freenet s anonymity guarantee (mainly if complemented with
cryptography). But it points out the fact that non-centred solutions end
up creating counter-productive effects not intentionally specified in the
system s design principles, and that they can even go against those same
principles. In Freenet s case, counter-productivity becomes particularly
clear. Freenet is based on the concept of equal computers, peers, gifted
with only a local knowledge. All of them are the same, as well as
anonymous, inside the network s global structure. It s just that
technologically assuring that equality and anonymity has the consequence
of making some of the network s users no longer being effectively equal,
because the network discriminates their information. For them the network
ceases to have any value. It s not necessary to have a central device, for
discrimination to occur. On some networks it can even be a natural
process.  And even if you try to eliminate these counterproductive effects
nothing assures that they won t reappear in some other form.

Either way, it is correct to state that, in the Freenet network,
information requisition is made in a tendentiously distributed way,
undoubtedly breaking away from the server/client model typical of the
World Wide Web. This distributed character is assured by the
multiplication times n of information. However, this is not yet a truly
distributed network in the sense that memory is fragmented and it doesn t
satisfy the integral location principle. A future task would consist on
starting to create network architectures that would definitely break away
with the information storage principle on certain modules (computers).
Networks that could implement algorithms truly operating over a
distributed memory, and that could make a distributed data processing
network emerge. This would be to create networks that would counterpoint
current network architectures in the exact sense that the concept of
neuronal computer or artificial neuronal network is opposed to the usual
architectures of the digital computer. Even if this is a possibility that
seems to be very far away, it is the only one that would drastically
eliminate the possibilities of exterior control (Machuco Rosa, 1999, for
an introduction to the concept of artificial neuronal network).


Conclusion: the desire for anonymity

The network of networks Internet was depicted by many as a new possibility
for emancipation. For some, like John Gilmore or Tim May, the networks
architecture such as it existed in the beginning of the last decade would
intrinsically assure the values of emancipation. For others like Ian Clark
this architecture would have to be replaced so that the liberating
potential of computer networks became an effective reality. In both cases,
the idea is that a certain type of technologies, the non-centred design
technologies, would assure anonymity and privacy. These positions involve
ambiguities. They insist in such a way in the effects generated by
technologic automatisms that they forget that technologies are a product
of freedom, in the sense clearly exemplified by the information
technologies:  the values that the program s code-source conveys are the
result of a decision not of any automatism -, and the factors regulating
that decision are also not automatic, rather they belong to the level of
discussion of ideas and policies. On the other hand, the error gets worse
when one fails to understand that centred technologies, instead of
necessarily generating equality , possess a life of their own that goes
beyond the instructions expressed on their design initial conditions. It
consists on the appearance of what we have designated as counterproductive
effects, which, in general, are effects that go against the philosophy
animating the movement that goes from EFF to Ian Clark.


What philosophy is that? Why the incessant worry with problems such as
surveillance? Why insisting on the necessity of assuring a level of
anonymity as ample as possible? The answer seems to become clear, at least
in general terms in the space of this conclusion, if you notice that the
movement of cyber culture represents a step ahead in enhancing the
characteristics of modernity (Machuco Rosa, 1996 for a more detailed
analysis). This is, equality equality of condition, as a person, not
necessarily material equality must grow more and more in a world that has
progressively dissolved all, once said natural, hierarchies. Internet will
have been seen by some as an extremely powerful tool that would finally
make all exteriorities transcendent to individuals go away. There lies the
project for searching for total anonymity, as one of the meanings of this
kind of anonymity is precisely that surveillance, and therefore
discrimination and the violation of the principle of individuality cannot
occur. The movement towards equality, as many have referred, is an
unstoppable tendency, but it is highly questionable that it can be fully
accomplished through automatism. In the desire that automatism brings
equality, seems to finally live the tendency to give back to an exterior
entity an automatism, precisely what is supposed to be an immanent task.  
The devolution towards something regulating from outside seems to always
reappear, but that the regulator is itself a machine is something that
fills the imaginary of modernity taken to its extreme.

---


Bibliographic References

  Arthur, W. B., (1987), Self-Reinforcing Machanisms in Economics , In The 
Economy as an Evolving Complex System, P. Anderson & al (eds), 
Addison-Wesley, Redwood, pp.9-32.

Arthur W. B., (1994), Increasing returns and Path dependance in the 
Economy, University of Michigan Press, Ann Arbour.

Barab�si, A., R�ka, A., Jeong. H., (1999), Mean-field theory for scale-free 
random networks , Physica A, 272, pp. 173-187.

Baran, P., (1964), Introduction to Distributed Communications Networks, 
RM-3240-PR, August, In: http://www.rand.org/ publications/ RM/baran.list.html.

Berners-Lee, T, (2000), Weaving the Web: The Original Design and Ultimate 
Destiny of the  World Wide Web,  HarperBusiness, N.Y.

Bunde, A., Havlin, S., (eds), (1996), Fractals and Disordered Systems, 
Springer, Berlin.

Clark, I., (1999), A Distributed Decentralised Information Storage and 
Retrieval System, Division of Informatics- University of Edinburgh, 
In:  http://freenet.sourceforge.net .

  Clark, I., (2000), The Freenet Project- Rewiring the Internet , In 
http://freenet.sourceforge.net.

  Hafner, K., & Mathew, L., (1996) Where Wizards Stay up Late, Simon and 
Shuster, New York.

Lessig, L., (1999), Code and Other Laws of Cyberspace, Basic Books, New York.

Lessig, L. (200), The Future of Ideias, Random House, New York.

Levy, S., (1993) Cripto rebels In P. Ludlow (ed.), High Noon on the 
Electronic Frontier, Mit Press, Cambridge, 1966.

Machuco Rosa, A.,  (1996) Ci�ncia, Tecnologia e Ideologia Social, E. U. 
Lus�fonas, Lisboa.

Machuco Rosa, A., (1998), Internet- Uma Hist�ria, E.U. Lus�fonas, Lisboa.

Machuco Rosa, A., (1999), Tecnologias da Informa��o - Do Centrado ao 
Acentrado , Revista de Comunica��o e Linguagens, 25, pp. 193-210.

Machuco Rosa, A., (2002a), Dos Mecanismos cl�ssicos de controlo �s redes 
complexas In Cr�tica das Liga��es na Era da T�cnica , J.B. Miranda and M. 
T. Cruz (org.,), Tropismos, Lisboa, pp. 133-153.

Machuco Rosa, A., (2002b), Dos Sistemas Centrados aos Sistemas Acentrados - 
Modelos em Ci�ncias Cognitivas, Teoria Social e Novas Tecnologias da 
Informa��o, Vega, Lisboa.

Machuco Rosa, A., (2002c), Redes e Imita��o , In A Cultura das Redes, M.L. 
Marcos e J.B. Miranda (org.), Revista de Comunica��o e Linguagens, 2002, 
no. extra, pp. 93-114.

May, T., (1996) Introduction to the Black Net , In P. Ludlow (ed.), High 
Noon on the Electronic Frontier, Mit Press, Cambridge, 1996.

Stalmann, R., (1992), Why Software Should Not Have Owners , In: 
http://www.stallman.org/.


Notes:

[1] Concerning PICS, look up http://www.w3w.org. W3W is a non-profitable 
consortium that proposes and develops standards for the World Wide Web.

[2] S. Levy, S., Crypto rebels in P. Ludlow (ed.), High Noon on the 
Electronic Frontier, Mit Press, Cambridge, 1996, p. 186.

[3] Absolutely safe methods of cryptography are achieved by 128 bits long keys.

[4] Look up http://www.ptivacyinternational.org for more details.

[5] Cf. Richard Stalmann, The GNU Project, in http://www.gnu.org

[6] When writing these lines, a spectacular confirmation of this 
possibility came forth with the Chinese government s banning of the Google 
search engine (www.google.com). Like the rest of the world, the Google 
search engine has been turning into the most popular search engine in 
China, also due to the fact that it stores in memory the pages of the 
Chinese servers that are blocked by the Beijing government. Chinese users 
could, thus, access these pages using Google. Something good some will say. 
But, on one hand, this huge memory could be used for precisely opposite 
purposes and, on the other hand the Chinese government naturally prohibited 
access to Google from Chinese servers.

[7] Look up htp://www.oreillynet.com/ for a complete and updated panoramics 
of the P2P projects.




#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: [email protected] and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: [email protected]