sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] sks-keyservers.net: Calculation of SRV weights


From: Kristian Fiskerstrand
Subject: Re: [Sks-devel] sks-keyservers.net: Calculation of SRV weights
Date: Mon, 07 May 2012 23:31:21 +0200
User-agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20120312 Thunderbird/11.0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 07.05.2012 20:55, Kristian Fiskerstrand wrote:
> On 07.05.2012 20:44, Kristian Fiskerstrand wrote:
>> On 07.05.2012 19:49, Kristian Fiskerstrand wrote:
>>> On 06.05.2012 01:01, Kristian Fiskerstrand wrote:
> 

After playing around with the settings a bit, and in the process        
 * aggregating more data (measurements) so that the smoothing kicks in
a bit,
 * changing to use 2.5 stddev left skew
 * using top 15 rather than top 10,
 * Change R calculation numerator from 100 to 1 so that I can use
\beta_R to scale the results easier.

I'm starting to get something that looks like prudent results
(estimated traffic distribution based on weight / total weight, note
that the servers included in the pool is marked as green as well as
the estimated traffic distribution being shown as a tooltip if you
hover over it in [0])

keyserver.ccc-hanau.de          949     (14.85%)
key-server.org                  874     (13.68%)
pgp.uni-mainz.de                429     (6.71%)
keys.kfwebs.net                 421     (6.59%)
keys3.kfwebs.net                381     (5.96%)
sks.spodhuis.org                374     (5.85%)
keyserver.veloxis.de            328     (5.13%)
pgp.codelabs.ru                 307     (4.80%)
keyserver.fug.com.br            304     (4.76%)
keys.wuschelpuschel.org         301     (4.71%)
pgp.rediris.es                  298     (4.66%)
gpg.spline.inf.fu-berlin.de     296     (4.63%)
keyserver.durcheinandertal.ch   294     (4.60%)
zimmerman.mayfirst.org          285     (4.46%)
pks.aaiedu.hr                   281     (4.40%)
keyserver.siccegge.de           268     (4.19%)

R of the whole bunch (non-filtered data of online servers)
Array
(
    [stddev] => 1.0858829576667
    [var] => 1.179141797751
    [mean] => 2.7539298608993
    [count] => 80
)

and the top servers are getting R=
[keyserver.ccc-hanau.de] => 0.66231150630396
[key-server.org] => 0.65285853352063
[pgp.uni-mainz.de] => 0.97463948948769
[keys.kfwebs.net] => 2.3288338988743
[keys3.kfwebs.net] => 1.362997796423
[sks.spodhuis.org] => 1.3961342241923
[keyserver.veloxis.de] => 1.7305905561917

SRV calc is initialized as
$max_R = 200; // n in document
$error_adjustment = 3; //phi
$alpha = 150;
$beta_R = 200;
$beta_B = 1;
$beta_P = 1;
$rho = 100; // Addon for reverse-enabled server
$y = 2;

[0] http://keys2.kfwebs.net/status/

- -- 
- ----------------------------
Kristian Fiskerstrand
http://www.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Corruptissima re publica plurimæ leges
The greater the degeneration of the republic, the more of its laws
- ----------------------------
This email was digitally signed using the OpenPGP
standard. If you want to read more about this
The book: Sending Emails - The Safe Way: An
introduction to OpenPGP security is now
available in both Amazon Kindle and Paperback
format at
http://www.amazon.com/dp/B006RSG1S4/
- ----------------------------
Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=Lo36
-----END PGP SIGNATURE-----




reply via email to

[Prev in Thread] Current Thread [Next in Thread]