[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd...
From: |
Hermanni Hyytiälä |
Subject: |
[Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd... |
Date: |
Thu, 06 Feb 2003 07:44:13 -0500 |
CVSROOT: /cvsroot/gzz
Module name: gzz
Changes by: Hermanni Hyytiälä <address@hidden> 03/02/06 07:44:10
Modified files:
Documentation/misc/hemppah-progradu: progradu.bib
research_problems
Log message:
More open problems into the table
CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/progradu.bib.diff?tr1=1.66&tr2=1.67&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/research_problems.diff?tr1=1.48&tr2=1.49&r1=text&r2=text
Patches:
Index: gzz/Documentation/misc/hemppah-progradu/progradu.bib
diff -u gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.66
gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.67
--- gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.66 Thu Feb 6
04:39:18 2003
+++ gzz/Documentation/misc/hemppah-progradu/progradu.bib Thu Feb 6
07:44:09 2003
@@ -1592,7 +1592,7 @@
}
@misc{benja02urn5,
- author = {University of Jyv?skyl? Hyperstructure Group, Benjamin
Fallenstein},
+ author = {University of Jyväskylä Hyperstructure Group, Benjamin
Fallenstein},
title = {urn-5 namespace registration},
month = {Aug},
year = {2002},
@@ -1674,9 +1674,9 @@
url = {http://research.microsoft.com/~antr/PAST/reliability.pdf}
}
address@hidden,
- title = "Efficient Peer-To-Peer Searches Using Result-Caching",
address@hidden,
author = "Bobby Bhattacharjee and Sudarshan Chawathe and Vijay
Gopalakrishnan and Pete Keleher and Bujor Silaghi",
+ title = "Efficient Peer-To-Peer Searches Using Result-Caching",
booktitle = {The 2nd International Workshop on Peer-to-Peer Systems
(IPTPS'03)},
month = {February},
year = {2003},
@@ -1790,4 +1790,4 @@
publisher = {ACM Press},
}
-
address@hidden
Index: gzz/Documentation/misc/hemppah-progradu/research_problems
diff -u gzz/Documentation/misc/hemppah-progradu/research_problems:1.48
gzz/Documentation/misc/hemppah-progradu/research_problems:1.49
--- gzz/Documentation/misc/hemppah-progradu/research_problems:1.48 Thu Feb
6 04:45:06 2003
+++ gzz/Documentation/misc/hemppah-progradu/research_problems Thu Feb 6
07:44:09 2003
@@ -212,44 +212,46 @@
3) p2p open problems table:
- Problem description
Solutions Comments/Status
-Routing: Incorrect forwarding (hostile),
Query monitoring, crossc heck
- incorrect routing (hostile)
routing tables
+ Problem description
Solutions Comments/Status
+Routing: Incorrect forwarding (hostile),
Query monitoring, cross check
+ incorrect routing (hostile)
routing tables, verify routing tables
-DoS: Distributed, controlled burden againts
Client puzzles
- specific computer(s)
+DoS attack Distributed, controlled burden againts
Client puzzles, load balancing, traffic
+ specific computer(s)
measurements, traffic models
-Sybil: Single hostile entity present multiple
Resource demanding mechanisms for Not practically realizable
- entities
validating identities
+Sybil attack: Single hostile entity present multiple
Resource demanding mechanisms for Not practically
realizable,
+ entities
validating identities research focused on
persistence,
+
not on distincn
-Spam: Hostile entity creates false versions
- of data
+Spam attack: Hostile entity creates false versions
Do not trust to single entity,
+ of data
get information from multiple entities,
+
trust on majority
-Resource spoofing: Hostile entity gives wrong information
- about the data which entity is
responsible
- for/knows about
+Resource spoofing: Hostile entity gives wrong information
Do not trust to single entity,
+ about the data which entity is
responsible get information from multiple entities,
+ for/knows about
trusy on majority
-Sudden network partition: Sub network is isolated from other
network
- because of network disconnection
+Sudden network partition: Sub network is isolated from other
network Self-tuning, environment observatorion,
+ because of network disconnection
backup connections
-Searching: Efficient searching requires exploiting
- of previous queries
View trees, bloom filters
+Searching: Efficient searching requires exploiting
View trees, bloom filters
+ of previous queries
-Efficient data discovery: Find resources efficiently, if resource
- exists (broadcasting)
+Efficient data discovery: Find resources efficiently, if resource
Super nodes, node clusters,
+ exists (broadcasting)
caching
-Entity identification: Identify participating entities reliably
- and efficiently
+Entity identification: Identify participating entities
reliably Digital signatures Research
focused on persistence,
+ and efficiently
not on disti
Fail Stop: A specific faulty nodes is
deleted/isolated
from the system
-Byzantine faults: Faulty nodes may behave arbitrarily
+Byzantine faults: Faulty nodes may behave arbitrarily
Richness of queries: Query languages should be more powerful
-Robustness: How well system performs under hostile
- attacks/in the case of severe failure
+Robustness: How well system performs under hostile
Form of connectivity graph,
+ attacks/in the case of severe failure ?
backup links
Quality of Service, QoS: The system cannot promise the quality
of
service in all cases
@@ -277,7 +279,8 @@
Network proximity: Can we take account the underlying
network's properties better when forming
- overlay network ?
+ overlay network (network-awareness for
+ performance) ?
Locality: In the case on DHTs, can we take account
locality ?
@@ -290,11 +293,32 @@
searches
Programming guidelines: Set of programming
guidelines/frameworks
- is needed for better combatibility
between
+ is needed for better interoperability
between
different systems
-Access Control Can we define access control levels
+Access Control: Can we define access control
levels
in peer-to-peer network ?
+
+System in flux: Nodes join and leave system
constantly:
+ load balancing, efficiency ?
+
+Inconsistent behaviour: Hostile node could act
correctly with
+ its neighbors, but incorrectly with
other
+
+Hostile groups: Joining node may join parallel
network,
+ formed a group of hostile nodes
+
+External threats: Viruses, troijans, sniffers
+
+Overlay construction: Hostile node controls the construction
Cryptography
+ of the network
+
+at each hop, querier knows that the lookup is supposed to get "closer". The
querier should check this so that
+ this attack can be detected and backtrack as
necessary in routing path
+ -incorrect routing updates
+ -problem: an individual malicious node could corrupt
the routing tables of other nodes by sending incorrect updates
+ -solution: system maintains information of requirements
of correct routing tables (and verifies them)
+
* = In Kademlia, there is no action required when nodes leaves the system
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/05
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/05
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/06
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd...,
Hermanni Hyytiälä <=
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/07
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/10
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/14
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/17
- [Gzz-commits] gzz/Documentation/misc/hemppah-progradu prograd..., Hermanni Hyytiälä, 2003/02/19