[45] in resnet
How to join a net through NET
daemon@ATHENA.MIT.EDU (Jerry Larivee)
Thu May 27 18:37:00 1993
Date: Thu, 27 May 1993 18:35:03 -0400
From: akajerry@watson.ibm.com (Jerry Larivee)
To: warlord@GZA.COM
Cc: resnet@MIT.EDU, ninjo@MIT.EDU, jh@flolab.mit.edu
In-Reply-To: Derek Atkins's message of Thu, 27 May 1993 18:02:43 -0400 <9305272202.AA09812@mary-chungs.aktis.com>
> I'd like to see what comes of this: I'd like to get IP in my home,
> assuming its cheap enough. As for the limit of usage of ISDN: I've
> never heard of that, and I don't think its even legal for the phone
> company to limit the usage to voice, since they are a common carrier
> and hense cannot "censor" the data going over their wires... This
> probably requires some investigation.
The phone company does sense when you're using a modem. They
need to in order to turn off echo surpression, which will screw up
your modem connection. For years it has been a possibilty that the
phone company might apply for a traffif to bill modem users a higher
rate, but they've never done it. Let's just hope they never do.
And yes the phone company does switch a few bits underneath
you. They use those bits for synconization. I've never heard it
mentioned as a problem for digital communication, either they do
something different for digital communication (similar to what they do
for modems) or they just rely on the fact that any digital
communication system can handle a few bad packets every so often.
Actually, this ISDN thing makes me think of something that
could be really fun to hack with. Laptops in the new resnet world.
If the laptop user gets too tied to his/her network connection then
they'll want to be able to plug into the network in their friends dorm
room, which might be on the other side of campus. What I mentioned
before about static names and dynamic numeric IP addresses could be
applied to laptops also. You could also put network drop in study
carols in the library, I know Columbia Law School's Library does this
(some lawyers I know are more addicted to laptops then hackers). I
wonder how they deal with addresses.
--Jerry