gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd...
Date: Thu, 06 Feb 2003 07:44:13 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/02/06 07:44:10

Modified files:
        Documentation/misc/hemppah-progradu: progradu.bib 
                                             research_problems 

Log message:
        More open problems into the table

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/progradu.bib.diff?tr1=1.66&tr2=1.67&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/research_problems.diff?tr1=1.48&tr2=1.49&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/progradu.bib
diff -u gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.66 
gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.67
--- gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.66   Thu Feb  6 
04:39:18 2003
+++ gzz/Documentation/misc/hemppah-progradu/progradu.bib        Thu Feb  6 
07:44:09 2003
@@ -1592,7 +1592,7 @@
 }
 
 @misc{benja02urn5,
-       author = {University of Jyv?skyl? Hyperstructure Group, Benjamin 
Fallenstein},
+       author = {University of Jyväskylä Hyperstructure Group, Benjamin 
Fallenstein},
        title = {urn-5 namespace registration},
        month = {Aug},
        year = {2002},
@@ -1674,9 +1674,9 @@
        url = {http://research.microsoft.com/~antr/PAST/reliability.pdf}
 }
 
address@hidden,
-        title = "Efficient Peer-To-Peer Searches Using Result-Caching",
address@hidden,        
        author = "Bobby Bhattacharjee and Sudarshan Chawathe and Vijay 
Gopalakrishnan and Pete Keleher and Bujor Silaghi",
+       title = "Efficient Peer-To-Peer Searches Using Result-Caching",
        booktitle = {The 2nd International Workshop on Peer-to-Peer Systems 
(IPTPS'03)},
        month = {February},
        year = {2003},
@@ -1790,4 +1790,4 @@
        publisher = {ACM Press},
 }
 
-
address@hidden
Index: gzz/Documentation/misc/hemppah-progradu/research_problems
diff -u gzz/Documentation/misc/hemppah-progradu/research_problems:1.48 
gzz/Documentation/misc/hemppah-progradu/research_problems:1.49
--- gzz/Documentation/misc/hemppah-progradu/research_problems:1.48      Thu Feb 
 6 04:45:06 2003
+++ gzz/Documentation/misc/hemppah-progradu/research_problems   Thu Feb  6 
07:44:09 2003
@@ -212,44 +212,46 @@
 
 3) p2p open problems table:
 
-                                       Problem description                     
        Solutions                               Comments/Status
-Routing:                               Incorrect forwarding (hostile),         
        Query monitoring, crossc heck
-                                       incorrect routing (hostile)             
        routing tables
+                                       Problem description                     
        Solutions                                       Comments/Status
+Routing:                               Incorrect forwarding (hostile),         
        Query monitoring, cross check
+                                       incorrect routing (hostile)             
        routing tables, verify routing tables
                                                                                
                                                
-DoS:                                   Distributed, controlled burden againts  
        Client puzzles
-                                       specific computer(s)
+DoS attack                             Distributed, controlled burden againts  
        Client puzzles, load balancing, traffic
+                                       specific computer(s)                    
        measurements, traffic models
                                        
-Sybil:                                 Single hostile entity present multiple  
        Resource demanding mechanisms for       Not practically realizable
-                                       entities                                
        validating identities
+Sybil attack:                          Single hostile entity present multiple  
        Resource demanding mechanisms for               Not practically 
realizable,
+                                       entities                                
        validating identities                           research focused on 
persistence,
+                                                                               
                                                        not on distincn
                                        
-Spam:                                  Hostile entity creates false versions
-                                       of data
+Spam attack:                           Hostile entity creates false versions   
        Do not trust to single entity,
+                                       of data                                 
        get information from multiple entities, 
+                                                                               
        trust on majority
                                        
-Resource spoofing:                     Hostile entity gives wrong information
-                                       about the data which entity is 
responsible
-                                       for/knows about
+Resource spoofing:                     Hostile entity gives wrong information  
        Do not trust to single entity,
+                                       about the data which entity is 
responsible      get information from multiple entities,
+                                       for/knows about                         
        trusy on majority
                                        
-Sudden network partition:              Sub network is isolated from other 
network
-                                       because of network disconnection
+Sudden network partition:              Sub network is isolated from other 
network      Self-tuning, environment observatorion,
+                                       because of network disconnection        
        backup connections
                                        
-Searching:                             Efficient searching requires exploiting 
-                                       of previous queries                     
        View trees, bloom filters
+Searching:                             Efficient searching requires exploiting 
        View trees, bloom filters
+                                       of previous queries                     
        
                                        
-Efficient data discovery:              Find resources efficiently, if resource
-                                       exists (broadcasting)
+Efficient data discovery:              Find resources efficiently, if resource 
        Super nodes, node clusters,
+                                       exists (broadcasting)                   
        caching
                                        
-Entity identification:                 Identify participating entities reliably
-                                       and efficiently                 
+Entity identification:                 Identify participating entities 
reliably        Digital signatures                              Research 
focused on persistence,
+                                       and efficiently                         
                                                        not on disti
 
 Fail Stop:                             A specific faulty nodes is 
deleted/isolated
                                        from the system 
 
-Byzantine faults:                      Faulty nodes may behave arbitrarily
+Byzantine faults:                      Faulty nodes may behave arbitrarily     
        
 
 Richness of queries:                   Query languages should be more powerful
 
-Robustness:                            How well system performs under hostile
-                                       attacks/in the case of severe failure
+Robustness:                            How well system performs under hostile  
        Form of connectivity graph,
+                                       attacks/in the case of severe failure ? 
        backup links
                                        
 Quality of Service, QoS:               The system cannot promise the quality 
of 
                                        service in all cases
@@ -277,7 +279,8 @@
                                        
 Network proximity:                     Can we take account the underlying
                                        network's properties better when forming
-                                       overlay network ?                       
        
+                                       overlay network (network-awareness for 
+                                       performance) ?                          
                                
 Locality:                              In the case on DHTs, can we take account
                                        locality ?
@@ -290,11 +293,32 @@
                                        searches
                                
 Programming guidelines:                        Set of programming 
guidelines/frameworks
-                                       is needed for better combatibility 
between
+                                       is needed for better interoperability 
between
                                        different systems
                                        
-Access Control                         Can we define access control levels
+Access Control:                                Can we define access control 
levels
                                        in peer-to-peer network ?
+                                       
+System in flux:                                Nodes join and leave system 
constantly:
+                                       load balancing, efficiency ?
+                                       
+Inconsistent behaviour:                        Hostile node could act 
correctly with 
+                                       its neighbors, but incorrectly with 
other
+                                                                               
+Hostile groups:                                Joining node may join parallel 
network, 
+                                       formed a group of hostile nodes
+                                       
+External threats:                      Viruses, troijans, sniffers
+
+Overlay construction:                  Hostile node controls the construction  
                Cryptography    
+                                       of the network
+
+at each hop, querier knows that the lookup is supposed to get "closer". The 
querier should check this so that
+                                  this attack can be detected and backtrack as 
necessary in routing path
+               -incorrect routing updates
+                       -problem: an individual malicious node could corrupt 
the routing tables of other nodes by sending incorrect updates
+                       -solution: system maintains information of requirements 
of correct routing tables (and verifies them)            
+                                       
 
 
 * = In Kademlia, there is no action required when nodes leaves the system




reply via email to

[Prev in Thread] Current Thread [Next in Thread]