gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu researc...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu researc...
Date: Tue, 11 Feb 2003 03:52:23 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/02/11 03:52:23

Modified files:
        Documentation/misc/hemppah-progradu: research_problems 

Log message:
        Finished first version of problems table

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/research_problems.diff?tr1=1.53&tr2=1.54&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/research_problems
diff -u gzz/Documentation/misc/hemppah-progradu/research_problems:1.53 
gzz/Documentation/misc/hemppah-progradu/research_problems:1.54
--- gzz/Documentation/misc/hemppah-progradu/research_problems:1.53      Mon Feb 
10 09:44:07 2003
+++ gzz/Documentation/misc/hemppah-progradu/research_problems   Tue Feb 11 
03:52:23 2003
@@ -170,6 +170,8 @@
 3) Overview of basic gnutella network
 4) Overview of gnutella network with some improvements (super nodes and 
clusters)
 5) Figure presenting k-ary tree (--> log n efficiency)
+6) Picture of xu-structure
+7) Picture of urn-5 (pointer) and immutable data
 
 Include following tables:
 
@@ -213,111 +215,125 @@
 3) p2p open problems table:
 
                                        Problem description                     
        Solutions                                       Comments/Status
-Routing:                               Incorrect forwarding (hostile),         
        Query monitoring, cross check                   Proposed solutions are 
working, 
-                                       incorrect routing (hostile)             
        routing tables, verify routing tables,          but increases system 
complexity
-                                                                               
        invariants
+Routing:                               Incorrect forwarding (hostile),         
        Query monitoring, cross check                   Increases system 
complexity
+                                       incorrect routing (hostile)             
        routing tables, verify routing tables,          
+                                                                               
        create routing table invariants
                                                                                
                                                
-DoS attack                             Distributed, controlled burden againts  
        Client puzzles, load balancing, traffic         
-                                       specific computer(s)                    
        measurements, traffic models
+DoS attack:                            Distributed, controlled burden againts  
        Client puzzles, load balancing, traffic         Only partial solutions, 
traffic
+                                       specific computer(s)                    
        measurements, traffic models, replication       models most effective
                                        
 Sybil attack:                          Single hostile entity present multiple  
        Identify all nodes simultaneously               Not practically 
realizable,
                                        entities                                
        across the system, collect pool of nodes        research focused on 
persistence,
                                                                                
        which are validated, distributed                not on distinction
                                                                                
        node ID creation        
                                        
-Spam attack:                           Hostile entity creates false versions   
        Do not trust to single entity,
-                                       of data                                 
        get information from multiple entities, 
+Spam attack:                           Hostile entity creates false versions   
        Do not trust to single entity,                  Efficient, easy to 
implement,
+                                       of data                                 
        get information from multiple entities,         creates more network 
traffic
                                                                                
        trust on majority's opinion
                                        
-Resource spoofing:                     Hostile entity gives wrong information  
        Do not trust to single entity,
-                                       about the data which entity is 
responsible      get information from multiple entities,
+Resource spoofing:                     Hostile entity gives wrong information  
        Do not trust to single entity,                  Efficient, easy to 
implement,
+                                       about the data which entity is 
responsible      get information from multiple entities,         creates more 
network traffic
                                        for/knows about                         
        trust on majority's opinion
                                        
-Sudden network partition:              Sub network is isolated from other 
network      Self-tuning, environment observatorion,
-                                       because of network disconnection        
        backup connections
+Sudden network partition:              Sub network is isolated from other 
network      Self-tuning, environment observatorion,         Creates more 
overhead/space
+                                       because of network disconnection        
        backup connections                              requirements per node
                                        
-Searching:                             Efficient searching requires exploiting 
        View trees, bloom filters
+Searching:                             Efficient searching requires exploiting 
        View trees, bloom filters                       Effective, but not 
flexible
                                        of previous queries                     
        
                                        
-Efficient data discovery:              Find resources efficiently, if resource 
        Super nodes, node clusters,
-                                       exists (broadcasting)                   
        caching techiques
+Efficient data discovery:              Find resources efficiently, if resource 
        Super nodes, node clusters,                     Morre effiecient, less 
network traffic,
+                                       exists (broadcasting)                   
        caching techiques                               not comparable to DHT's 
efficiency
                                        
-Entity identification:                 Identify participating entities 
reliably        Digital signatures                              Research 
focused on persistence,
+Entity identification:                 Identify participating entities 
reliably        Digital signatures, key infrastrucure           Research 
focused on persistence,
                                        and efficiently                         
                                                        not on distinction of 
identity
 
-Fail Stop:                             A faulty node stops working             
        Environment observatorion, informing
-                                                                               
        protocols
+Fail Stop:                             A faulty node stops working             
        Environment observatorion, informing            Creates more network 
traffics,
+                                                                               
        protocols                                       node's information can 
be outdated
 
-Byzantine faults:                      Faulty nodes may behave arbitrarily     
        Byzantine agreement protocols, 
-                                                                               
        trust on majority's opinion
-
-Richness of queries:                   Query languages should be more powerful 
        SQL-like queries
-
-Robustness:                            How well system performs under hostile  
        Self-tuning, backup links, use
+Byzantine faults:                      Faulty nodes may behave arbitrarily     
        Byzantine replication protocols                 Much research has been 
done on this field,                      
+                                                                               
                                                        practical solutions, 
decreases system's
+                                                                               
                                                        performance slighly
+
+Richness of queries:                   Query languages should be more powerful 
        SQL-like queries                                Hard to implement, 
increases system complexity,
+                                                                               
                                                        not much research has 
been done
+       
+Robustness:                            How well system performs under hostile  
        Self-tuning, backup links, use                  Working solutions
                                        attacks/in the case of severe failure ? 
        diverse routing paths
                                        
-Quality of Service, QoS:               The system cannot promise the quality 
of        If needed, use Network proximity 
-                                       service in all cases                    
        for better network performance
+Quality of Service, QoS:               The system cannot promise the quality 
of        Use Network proximity                           Increases system 
complexity, no real world 
+                                       service in all cases                    
        for better network performance                  experiences
                                                                                
        (bandwidth, latency, jitter, packet 
                                                                                
        loss)
                                        
-Data availability:                     Data might be temporary unavailable, or 
lost    Data caching, data replication
-                                       permanently
+Data availability:                     Data might be temporary unavailable, or 
lost    Data caching, data replication                  Working solutions, but 
creates more traffic
+                                       permanently                             
                                                        and overhead per node
                                        
-Data integrity/authenticity:           Integrity/originality of data is 
unknown        Cryptographic content hashes
-
-Anonymity:                             Anonymity cannot be provided in all     
        Remailers, pre-routing
+Data integrity/authenticity:           Integrity/originality of data is 
unknown        Cryptographic content hashes, key               For data 
integrity, there are working solutions,
+                                                                               
        architectures                                   for data authenticity, 
there are not working solutions/
+                                                                               
                                                        there are partial 
solutions, which are not practically 
+                                                                               
                                                        realizable
+                                                                               
                                                        
+Anonymity:                             Anonymity cannot be provided in all     
        Remailers, pre-routing                          Total anonymity cannot 
be provided yet
                                        cases
                        
-Malicious nodes:                       There are malicious nodes in the 
system,        Create invariants for node behaviour,
-                                       how we are able to discover them ?      
        verify invariants
+Malicious nodes:                       There are malicious nodes in the 
system,        Create invariants for node behaviour,           Partial 
solutions, self-certifying data most realiable
+                                       how we are able to discover them ?      
        verify invariants, self-certifying data
                                        
-Mutual distrust:                       Nobody trust anybody, this is a problem 
        Different reputation methods                    Resource demanding, not 
practical to
-                                                                               
                                                        implement       
-Lack of motivation to cooperate:       All participants do not behave          
        Different reputation methods                    Resource demanding, not 
practical to
-                                       like they should be, instead they go 
for                                                        implement
+Mutual distrust:                       Nobody trust anybody, this is a problem 
        Different reputation methods, key               Resource demanding, not 
practical to
+                                                                               
        infrastructures                                 implement/not working 
solutions, no real world
+                                                                               
                                                        experience in a wide 
scale
+                                                                               
                                                        
+Lack of motivation to cooperate:       All participants do not behave          
        Different reputation methods                    No real world 
experience in a wide scale
+                                       like they should be, instead they go 
for                                                        
                                        own profit
                                        
-Heterogeneity:                         There are different kind of nodes       
        Super peers, cluster (broadcasting),
-                                       in the system, in light of bandwidth    
        additional layer upn DHT, structural
-                                       and computing power                     
        simplicity (DHTs)
+Heterogeneity:                         There are different kind of nodes       
        Super peers (broadcasting), cluster,            Working solutions, 
increases system complexity
+                                       in the system, in light of bandwidth    
        (broadcasting) additional layer upn DHT,        (additional layer)
+                                       and computing power                     
        structural simplicity (DHTs)
                                        
-Network proximity:                     Can we take account the underlying      
        Global Network Positioning, Lighthouse
+Network proximity:                     Can we take account the underlying      
        Global Network Positioning, Lighthouse          Increases system 
complexity
                                        network's properties better when 
forming        technique, trianqulated heuristics
                                        overlay network (network-awareness for 
                                        performance) ?                          
                                
-Locality:                              In the case on DHTs, can we take 
account        Constrained Load Balancing, using
+Locality:                              In the case on DHTs, can we take 
account        Constrained Load Balancing, using               Working solutions
                                        locality ?                              
        network proximity for nearest
                                                                                
        neighbor selection
 
-Hotspots:                              What will happen if some resource       
        Caching, multisource downloads
-                                       is extremely popular and only
-                                       one node is hosting it ?
+Hotspots:                              What will happen if some resource       
        Caching, multisource downloads, replication,    For query hotspots, 
caching and multisource downloads
+                                       is extremely popular and only           
        load balancing                                  efficiently reduces 
hotspots, for routing hotspots,
+                                       one node is hosting it ?                
                                                        benefits are smaller
                                        
-Scalability:                           Broadcasting doesn't scale when 
performing      Super peers, peer clusters, mutual 
-                                       searches                                
        index caching
+Scalability:                           Broadcasting doesn't scale when 
performing      Super peers, peer clusters, mutual              Better 
scalability, but not comparable
+                                       searches                                
        index caching                                   to DHTs
                                
-Programming guidelines:                        Set of programming 
guidelines/frameworks        Common frameworks and APIs 
-                                       is needed for better interoperability 
between
+Programming guidelines:                        Set of programming 
guidelines/frameworks        Common frameworks and APIs                      
Common framework/API is still missing, a lot 
+                                       is needed for better interoperability 
between                                                   of proposal has been 
made
                                        different systems
                                        
-Access Control:                                Can we define access control 
levels             -                                               -
-                                       in peer-to-peer network ?
+Access Control:                                Can we define access control 
levels             -                                               Working 
solutions are missing, mainly
+                                       in peer-to-peer network ?               
                                                        because they are 
hard/not practically realizable
                                        
-System in flux:                                Nodes join and leave system 
constantly:         Half-life phenomenon (for analysis),
-                                       load balancing, efficiency ?            
        simple overlay and construction protocol
-                                       
-Inconsistent behaviour:                        Hostile node could act 
correctly with           Public keys, digital signatures                 Not 
practical approach
+System in flux:                                Nodes join and leave system 
constantly:         Half-life phenomenon (for analysis),            Initial 
theoretical anasysis has been created, but
+                                       load balancing, efficiency ?            
        simple overlay and construction protocol        not comprehensive model 
for analysing different
+                                                                               
                                                        system states
+                                                                               
                                                        
+Inconsistent behaviour:                        Hostile node could act 
correctly with           Public keys, digital signatures                 Not 
practical approach/working proposal created yet
                                        its neighbors, but incorrectly with 
other
                                                                                
-Hostile groups:                                Joining node may join parallel 
network,         Use trusted nodes, based on
+Hostile groups:                                Joining node may join parallel 
network,         Use trusted nodes, based on                     Not 100% sure 
if Centreal Authority is missing
                                        formed a group of hostile nodes         
        history information
                                        
-External threats:                      Viruses, troijans, sniffers             
        -                                               -
+External threats:                      Viruses, troijans, sniffers             
        Data integrity/authenticity, distributed        Not much research has 
been done on this
+                                                                               
        antivirus software
                                                                                
        
-Illegal overlay construction:          Hostile node(s) controls the 
construction       Cryptography                                    
+Illegal overlay construction:          Hostile node(s) controls the 
construction       Cryptography, key infrastructure                Not 
practical approach/working proposal created yet
                                        of the network
+                                       
+Comprehensive simulations/analysis     Ability to simulate whole p2p network's 
usage   Use same techniques as simulating/analysing     Only small subset of 
peer-to-peer networks has been
+of peer-to-peer network:               patterns, network traffics, flux state 
etc      the Internet                                    able to analyse, 
because of ad hoc properties of
+                                                                               
                                                        network, more poweful 
solutions needed
+                                       
 
 
 




reply via email to

[Prev in Thread] Current Thread [Next in Thread]