sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] Peering against "pool.sks-keyservers.net"?


From: Jeffrey Johnson
Subject: Re: [Sks-devel] Peering against "pool.sks-keyservers.net"?
Date: Wed, 02 May 2012 13:51:17 -0400

On May 2, 2012, at 1:38 PM, Kim Minh Kaplan wrote:

> Jeffrey Johnson :
> 
>> On a somewhat related note (before I dig into OCAML), can anyone
>> state the retry loop algorithm that is currently implemented for
>> non-responding peers?
> 
> It's a long time since I worked on this but if I remember correctly, the
> current algorithm is to continuously repeat:
> 
>   - wait for recon_sync_interval
>   - randomly pick a member,
>   - randomly choose one of this member's IP address,
>   - do a single recon attempt with this IP address,
> 
> That is there is no specific retry for non-responding peers. They will
> eventually get retried at random.

Perfect. That's about what I would expect for a gossip protocol like SKS.

But its not too hard to put a stopwatch on a peering operation, scale
out issues like number of keys exchanged and perhaps bandwidth,
sum withcan exponential weight to get an approx mean/stddev "cost", and then
start into adaptive "preference" rescheduling/retries (whatever that
might mean: I haven't a clue, and gossip protocols are tricky).

I suspect I can even "wing it" with OCAML sufficiently to get some
simple descriptive statistics associated with a peer however. ;-)

73 de Jeff




reply via email to

[Prev in Thread] Current Thread [Next in Thread]