On Friday 12 November 2010 13:01:31 Volodya wrote: > On 12.11.2010 0:06, Gerard Krol wrote: > > Hello everyone, > > > > I've spent some nights trying to understand the way Freenet builds and > > maintains its opennet topology. The goal is to obtain a small world > > network (without hubs). The small average path (hop) length is good > > for performance, while the large degree of clustering makes it easy to > > find the node that has the exactly key we are looking for. > > > > The current system, as I understand it, has a chance to short circuit > > a path. This is called "path folding". When any data is sent a node > > will attach a noderef if it is interested in more peers. The data and > > noderef will be routed across the network to the same location as the > > data until it reaches a node that wants to have more peers and that > > rolls success on the "path folding dice". If so, the nodes will > > connect to each other and a shorter path is formed. > > > > I think this behavior will cause us to connect to *clusters* of peers. > > This is due to the path folding request traveling over already > > established routes. If those peers are close to us its not a problem, > > but we might end up with a few connections to a cluster of peers far > > away from our own location. Take a look at your "Peer Location > > Distribution" now and tell me if that is the case. > > > > My proposal is to change the way path folding works and make it less > > "path folding" and more "peer finding". If we need a connection we > > send our noderef to a random location chosen with chance proportional > > to 1/d, where d is the distance between us and the chosen location. If > > the final node on that location wants more peers we connect. This will > > force an 1/d distribution of our peers, which should be enough to > > obtain a small world network. > > > > The current peer disconnection algorithm looks OK to me. It will every > > once in a while drop the peer for who it is the longest ago that it > > was successful in fetching a key for us. > > > > Regards, > > > > Gerard > > How would you control an attacker who wants to dominate a specific area of the > keyspace then? Ok, you can have a die which decides whether or not to connect, > but an attacker can just keep flooding the particular space with requests and > wait for the eventual connection.
This argument holds to some degree against announcement... > > Note that you are not even giving an opportunity for the peers along the path > to > connect, you are talking about the final location. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: This is a digitally signed message part. URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20101112/da7c175e/attachment.pgp>