gzz-dev
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz] hh gradu


From: Tuomas Lukka
Subject: [Gzz] hh gradu
Date: Mon, 24 Mar 2003 15:36:13 +0200
User-agent: Mutt/1.4i

4.3:

    SHA-1 2 cryptographic content hash [124] is used for creating...

"Creating"? it *is* the id...

    Additionally, SHA-1 [124] is used for verifying the integrity of Storm data 
blocks.

A different SHA-1? Sounds like that. The point is that id is
*directly* the verifier as well.

    Storm blocks have much in common with regular  les,

What exactly? They don't have names, and can't be changed. What's left?

    This mechanism creates a basis for

What mechanism? A very confusing paragraph so far, jumping around a lot.

Kuvaan 4.2 ei ole viittausta?
Kuvateksti 4.2 aivan riittämätön, luuletko lukijan tuosta tajuavan mitään?
Mikä on "stormOther"?

    Figure 4.3 illustrates simpli ed Storm storage model.

"simplified"? 4.3:ssa on pointteri, mutta sitä ei tekstissä vielä 
selitetty.

Olisi ehkä hyvä olla kuva ihan stormin yleisestä mallista, ilman
pointteri ym. monimutkaisuuksia.

    In addition to immutable data, Storm has a support for mutable data.

Ei ole totta. Support for immutable data is built on the immutable abstraction.

    In this paper, we discuss only pointers as they are part of the thesis' 
research problems.

Ei tarvitse silloin edes mainita diffejä... mut jos mainitset
sivumennen, PITÄÄ KUITENKIN SELITTÄÄ PARILLA SANALLA MITÄ NE ON.

    Pointer [79] is a semantic-free updatable reference to Storm data block, 
named as Storm scroll block. 

Artikkeli alkuun.
"named as Storm scroll block"????

Oleellista: pointteri *on* myös blokki!

    In practice, pointer is a random string, which resembles Univer- sal 
Resource Names (URN) [15].

Tä?

    Pointer itself doesn't contain any data,

Stranger and stranger...

    it is rather a concept of data.

I thought the previous was really strange. I was wrong. This is worse ;)

    Pointers are created automatically by Storm]

When? How? Why? 

    and each pointer is associated with a collection of pointer blocks.

Created at the same time as the pointer itself? What? 

    Pointer block has a single target for the pointer.

Inside itself it contains the target??

    Pointer block may contain zero or more obsoleted pointer blocks,

So pointer blocks are recursive and can get pretty long???

    i.e., when a new version of scroll block is created, it supersedes one 
older version which has been created in the past.

New version of scroll block????

    The most current pointer block will liobsoletell the pointer block 
targeting the super- seded version.

How?

    Next time, when the pointer is used for referring to a speci c scroll 
block, only the most recent pointer's block target is loaded.

What if I want to see yesterday's version? Impossible?


Eli... 4.3 vaatii *PALJON* työtä jotta lukija tajuaisi mistä
ylipäänsä on kysymys. Käsitteetkään ei näytä olevan ihan
selvillä, kun hypitään blokin, scroll blokin, urn:n jne välillä.
Tämä luku on gradulle hyvin tärkeä koska se on toinen puoli
sitä pointtia joka on gradun sisin. Jos lukija ei tajua,
niin luku 5 on TURHA.


5.

    In this chapter we evaluate Fen re in Peer-to-Peer environment. We
    start by giving a problem overview when considering Fen re in
    Peer-to-Peer environment. We de-  ne Fen re's special needs
    and evaluate existing Peer-to-Peer approaches in light of these
    requirements.

Montako kertaa tuo täytyy tuossa sanoa? Minusta yksi riittäisi ;)

    After that, we propose a system model for Fen re

"System model"?

    and present simple methods to perform data lookups in Peer-to-Peer 
environment.

Should say "required by alph" or something. This is too general a claim.

    As already mentioned in chapter 4, xanalogical document is a lsvirtual  
lelr, in
    which parts of the document are fetched from a global data repository. Thus,
    system imple- menting xanalogical storage model must support global data 
lookups
    ef ciently in order to assemble the lhvirtual  lelr from fragments of data.

Not exactly true. You can have virtual files without any global stuff,
you just always send the relevant scrollblocks along with the document!
Think again.

    In the Fen re system, data fragments are scroll blocks generated by Storm 
storage
    module.

data fragment = yksi merkkikin...
generated by Storm == puppugeneraattori?

    As we discussed

As discussed parempi

    In our scenario, fragments of data is distributed throughout the 
Peer-to-Peer
    overlay network.

Hyvin julma hyppy lukijalle näin äkkiä kesken kappaleen!
Lisäksi "fragments ... *are*".

    We want that user oper- ations in Fen re are location transparent. 

Kielioppi...

    Therefore, our task is to locate and fetch (i.e. obtain) all Storm scroll 
blocks,
    associated to a speci c lpvirtual  lelr from the Peer-to-Peer overlay as ef
    ciently as possible.

Onko? 

Eikös ennemmin niin että haetaan se virtual file ja sitten
sen mukana protokollassa laitetaan tulemaan tarvittavat blokit
jos on?

Tuntuu, että sinulla menee taas scroll block ja block sekaisin.

    In addition to the direct scroll block obtaining using globally unique 
identi er
    of Storm scroll block, we also must sup- port the indirect obtaining of 
Storm
    scroll block using the pointer blocks.

Nimittäin miksi koskaan olisi pointteri *scroll*-blokkiin????

    Our objectives are simple but yet hard to ful ll. First, as a prerequisite 
to
    imple- menting xanalogical storage model in Peer-to-Peer environment, a 
system
    support- ing data lookups must be able to perform global scale lookups. 
Thus, we
    must be able to obtain the Storm block, if it exists in the Peer-to-Peer 
overlay.
    Second, data lookups have to be ef cient, since constructing one lnvirtual  
lelr
    may need obtain- ing several Storm blocks, which are distributed randomly

Tämä tulee nyt uudestaan - rakenne mättää

    Lukka et al. use Freenet [33] as an example Peer-to-Peer system supporting
    globally unique identi-  ers. The work presented in this thesis extends 
their
    work by evaluating different Peer-to-Peer systems more extensively to Fen 
re's
    needs.

Tällä olisi voinut paremmin aloittaa tämän luvun. Tämä kertoo mistä tässä 
jutussa
on OIKEASTI kysymys.

5.2

    For Fen re's needs for locating data, an important advantage of the tightly
    struc- tured approach over the loosely structured approach is that tightly
    structured sys- tems use location-independent, globally unique identi ers 
for
    identifying data in the system.

Öö, eikös tämä ainakin sinun väitteittesi mukaan mene *toisin* päin: kyllähän
gnutellassa voitaisiin käyttää helposti guideja mutta tighteissä ei.
Eli tässä meni logiikka päälaelleen: *onneksi* meillä on guidit joten *voimme*
käyttää tiukkaa.

    Indeed, this feature is similar to Fen re's (and xanalogical storage 
model's) way
    of handling data.

Toistoa - muokkaa jotenkin edelliseen

    Another key feature of tightly structured overlays is that they are able to
    provide general purpose interface for Reference Resolution Services (RRS) 2 
[14].
    Authors argue that next generation RRS must be application- independent and
    references itself should be unstructured and semantically free.

Näistä ei muistaakseni ollut kunnon kuvausta luvuissa 2-3?
Pitäisi jossakin selittää, nyt on taas huono viittaus.

    Fi- nally, as said, with tightly structured systems it is feasible to 
perform
    global data lookups in the overlay.

Kuten sanottiin jo monta kertaa ja vielä kerran?

    To summarize, these aspects may be the most important fea- tures of 
Peer-to-Peer
    infrastructure with regard to Fen re as a distributed, location transparent
    hypermedia system. Thus, we see the tightly structured approach as the best
    alternative to locate data in Peer-to-Peer environment.

Paljon vohvelia....

    Once located, we can use regular TCP/IP-protocols, such as Hypertext 
Transfer
    protocol (HTTP) [54] for fetching Storm blocks from the overlay.

Huono lauserakenne - käännä ympäri

    Current implementation of Fen re uses stan- dard single source downloads 
(HTTP)
    and SHA-1 [124] cryptographic content hash for verifying the integrity of 
data by
    recomputing the content hash for a scroll block.

Current implementation -- eihän P2P vielä toimi, tuo kuulostaa siltä että 
toimisi.

Scroll block?

Kokonaisuudessaan tämä tulee jotenkin ihan kesken tätä juttua tämä siirtymä
downloadeihin... lukija hämääntyy.

Koko download-ongelman voisi sivuuttaa aluksi sanomalla, että kun tiedetään 
mistä
haetaan, niin haku on helppoa, ja siksi keskitytään paikantamiseen.

    However, we believe that these issues are solved,

Uskot, että ne on ratkaistu???

    First, Kademlia's XOR-based distance function is superior over distance 
functions
    of other systems (see section 2.4).

Tuota, tälle et ole missään esittänyt perusteluja, ainakaan kappaleessa 2.4!!!

    Second, there exist already deployed real-life sys- tems using Kademlia 
(e.g.,
    [127, 47, 87, 84]), which means that Kademlia's algorithm is simple and 
easy to
    implement.

Hyvä pointti, mut toinen lause kömpelö; esim. "Secondly, Kademlia is one of the 
only
tightly structured systems that has been deployed in real life([...])"

    On top of Kademlia, we propose the usage of Sloppy hashing [56] which is op-
    timized for the DOLR abstraction of tightly structured overlays.]

Kuvaus taas uupuu tuosta... ei ollut kunnolla siellä 2-3 -luvuissa joissa olisi
pitänyt olla...

    With the Sloppy hashing, we are able to reduce the generation of query hot 
spots.
    Sloppy hashing enables to locate nearby data without looking up data from 
distant
    peers. Moreover, authors' proposal for self-organizing clusters using 
network
    diameters may be use- ful, especially within small groups of working people.
    Thus, with Sloppy hashing we can provide locality properties for the Fen re
    system.

Ja siksi joudut selittämään sitä *tässä*, joka on aivan väärä paikka.

    For better fault tolerance and self-monitoring for Fen re, we propose 
techniques
    presented by Rowston et al. [104]. With these techniques, we can ensure the
    perfor- mance of the Fen re system in a highly adverse conditions, such as 
sudden
    network partition, or highly dynamic and heterogeneous environment.

Tuossa olisi ollut hyvä kuvata jo vaatimuksissa se, että "network partition" on
oleellinen.

    Finally, for more ef cient data transfer, we can use variable techniques 
for this
    purpose. For small amounts of data, HTTP can be used [54]. For big amounts 
of
    data, we can use multisource downloads for better ef ciency and reliability.
    Specif- ically, the technology based on rateless erasure codes [108] seems 
very
    promising.

Ja nyt vielä *UUDESTAAN* sama keskustelu kuin yllä???
Big -> large.

    5.3.2 Methods We use the DOLR abstraction of the tightly structured 
approach,
    i.e., each participating peer hosts the data

Kaikilla on sama data? ;)

    We decided to use the DOLR abstraction in our model, since DOLR systems 
locate
    data without specifying a storage policy explicitly [141].

DOLR toistuu liian monta kertaa - muokkaa edellisen lauseen kanssa.

    DHT-based storage systems, such as CFS [39] and PAST [145], may have severe
    problems with load balancing in a highly heterogeneous environment.

Viite ongelmiin?

    The problem is caused by peers which may not be able to store relatively 
large
    amount of data with a key-value pair, assigned randomly by the mapping 
function
    of the overlay.

Large amount of data with a key-value pair: tosi epäselvä. 
Mainitse, että large block olisi se ongelma.

    These systems waste both storage and bandwidth, and are sensitive to certain
    attacks (e.g., the DDoS attack).

Viite? Miten?

    Additionally, we emphasize that we prefer abstraction level analysis as very
    recently better and better tightly structured algorithms have been proposed.

Tä?

    Thus, we don't want to bind our system proposal to a speci c algorithm de
    nitively as we expect that this development continues.

Aaa... tämän *olisi* voinut mainita ennen kuin alkoi puhua kademliasta tms 
ollenkaan...

    In this model, we use Kademlia's [107] algorithm for locating data in the
    overlay.

In *WHICH* model.

Teksti pomppii aivan kamalasti.

    In the following subsections we assume that we know the structure of the en-
    lade before hand, i.e., when assembling the lhvirtual  lelr we know all the 
Storm
    blocks, which are required to complete the en lade.

Nyt en ymmärrä mitä ajat takaa

    Also, we don't respond to the security issues related to Peer-to-Peer 
systems,
    since there is no working solution available yet;

Tämä on kanssa tosi oudossa paikassa.

    we either assume that Fen re has a reliable technique for identifying 
individual
    entities, or there are no hostile entities among participating peers.

Tä? Miksi? Miten? Miten tämä vaikuttaa?

    In our method, each peer maintains the following data structures for local 
oper-
    ations:

Tällä pitäisi aloittaa uusi kappale siitä, *mitä* operaatioita nyt 
haluttiinkaan.
Ne on sivumennen mainittu jossakin. Lukija ei muista.

    a data structure for listing all key-value pairs which peer maintains; a 
data
    structure for listing all key-value pairs in the chronological order (the 
most
    recent block is topmost) which peer maintains.

peer -> the peer.

En ymmärrä tätäkään lausetta kunnolla.

    We use Storm blocks' identi ers as keys of the overlay.

Which overlay? What about pointers?

    Every key-value pair consists of either a hash of pointer random string 
(pointer
    blocks), or a hash of block's content (scroll blocks) as a key.

Hash of pointer random string????????

block's content (scroll blocks)

Tämä menee *tosi* sekavaksi.

    Finally, we assume that all local operations can be done in a constant time.

Vain sotkee; voi olettaa, että paikalliset operaatiot tehokkaita.

    2. Repeat until the pointer peer is found: each peer forwards the data 
lookup to
    a closer peer which hosts the given scroll block identi er.

Eikös sen DHT-abstraktion pitänyt hoitaa toi vaihe? Miksi se ylipäänsä on tossa?
Kunnon abstraktiotasot puuttuu.

Eli askeleet 2-3 olisivat yksinkertaisesti "query DHT1 for ..."

Kuva 5.1 on turha, koska se on ihan sama kuin dht-kuva aiemmin.

5.2 samoin.

Noista eri operaatioista voisi olla kuva mutta tämä kuvatyyli on huono koska se
toistaa. DHT pitäisi abstrahoida.

    Data lookup with a given pointer random string returning most recent scroll
    block. 

"Pointer random string"?

    5.3.3 Problems Perhaps the most biggest issue in Peer-to-Peer systems is 
the non-
    maturity of security technologies. For instance, online entities cannot be 
identi
    ed safely (e.g., the Sybil attack [46]).

Tota, nyt entities on tullut käytettyä monta kertaa eri merkityksissä...

    For the Fen re system, one security related prob- lem occurs when a user 
wants to
    perform a global data lookup with a given pointer random string; how the 
user is
    able to verify the correctness of the search results, i.e., how she or he 
knows
    which one is the correct Storm scroll block ? The Spam at- tack [117] is a
    variation of previously mentioned problem; data lookup is performed by a 
user,
    but there is no reply from the system. How are we able to know if this was 
a spam
    attack, or the data really doesn't exist in the system ? Another problem 
related
    to the Fen re's security is that if a user downloads data from the network 
to
    local computer and after a network disconnection, user wants to verify off 
line
    the authenticity of data. Obviously, optimal solution to all security issues
    would be that digital signatures are included to every message sent to the 
system
    therefore enabling peers to authenticate other peers safely. However, these
    problems are not only limited to the Fen re system as it concerns all
    Peer-to-Peer computer systems. As security technologies come more mature, 
we wish
    to apply these technologies with Fen re, if applicable.

Sekavaa; lauseet hyppii pahasti.

PKI ja certit jäi käsittelemättä...

    We point out that each of these sub-categories have number of open 
problems, in
    which there are no solutions yet, or solutions are only partial.

Aivan turha lause

    Then, we focused our attention to the Fen re system.

Samoin.

    In the last chapter, we evaluated existing Peer-to-Peer approaches with 
regard to
    Fen re's needs. We see that the tightly structured approach is the best
    alternative to Fen re's needs for the following reasons. First, Storm,
    xanalogical storage model and tightly structured systems use global unique 
identi
    ers for identifying data. Second, our Storm design uses semantic-free 
references
    (block identi ers and pointer random strings) for locating data in 
distributed
    networks. As the authors of [14], we also agree that references should be
    semantically-free in next-generation reference resolution services. Third, 
by
    using the DOLR abstraction of tightly structured over- lay, we can minimize 
the
    lack of locality in the tightly structured approach. Finally, we believe 
that
    issues related to tightly structured overlays are solved in the near future,
    because of wide and intensive co-operation among research groups.

Kuten yllä: toi eka ei ole syy

Määrittelitkö semantic-free:tä missään?

Minimize lack of locality - miten?

    In the following months, we will implement a Fen re Peer-to-Peer prototype.

Ei hyvä tyyli sanoa noin.













reply via email to

[Prev in Thread] Current Thread [Next in Thread]