You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
define trust overlay for some subset of nodes in any network (image fluence and some corp nodes)
trust overlay is ability to define my trust over nodes i do not manage (via dht?)
start traversing these nodes from some relay (breadth first)
also traverse the nodes these nodes trust by some metric (trust value is larger than value or depth of recursion).
so even if overlay was not set explicitly, there is trust set by node managers, and my particles goes to this node
decrement counter of maximal debt (or increment increasing counter)
stop when some count of nodes or depth was traversed
for counters it may be ok to introduce increments and comparison to a number, not generics math, as specific features of aqua for such scattering and counting
also return random stream(some kind of sampling) of some value from dht which was set (this is goal of algorithm - traverse and set dht value in trusted nodes). .
return values to ui
as soon as it happens, traverse random paths depth first or start from returned nodes to validate values were really set set
also may allow to add access to particle ttl into particle, so that can burn time during traversing and stop when it probably burned to much, and return, instead of direct debt or other limitation.
how other way check particle worked well? do co callbacks during traverse? is it not good to jump on each recursion call to initial node? can we make co function call relative to some nodes (so it returns not to peer, but to some node at first, like accumulate some part of stream and push than that part into function, or string* -> ()).
In the end we get replica set id is set onto overlay of trust and trusted nodes of that overlay with specific service and node for discovery. And we know the quality of that overlay and can alert on it.
For now for sure can just make function which traverses kademalia, while it should traverse trust graph, I think.
The text was updated successfully, but these errors were encountered:
dzmitry-lahoda
changed the title
is aqua + trust graph are capable of this now (and how to do it)
is aqua + trust graph are capable of this now (and how to do it): trust overlay traverse
Oct 13, 2021
We call this use case "subnetworks". You can use TG + AquaDHT for that in conjunction, it will work for relatively small subnetworks (that fit into a predefined number of AquaDHT keys). More complex cases require advanced network traversing algos, like Kademlia. Full support for Kademlia in Aqua is planned, yet now it's blocked with fluencelabs/aquavm#149
If I have node A, B, C. Node A and C are above some threshold to be trusted. B is not trusted enough. But for some reason I can reach from A to C only via A (A->B->C). If my particle will jump from A to C via B. So B will return response claiming it reached C. Imagine deeper jumps or more nodes, than somehow if B was node through which many responses passed, somehow need to validate (or has some value) which allows me to evaluate how trusted that traverse was.
These intermediary nodes need no additional trust, as they don't make computations beyond the Op.noop() call for traversal, and they can't modify the results of previous computations as they're signed, and they can't affect the script. So not sure that trust needs to be checked there at all.
co
callbacks during traverse? is it not good to jump on each recursion call to initial node? can we makeco function call
relative to some nodes (so it returns not to peer, but to some node at first, like accumulate some part of stream and push than that part into function, orstring* -> ()
).In the end we get replica set id is set onto overlay of trust and trusted nodes of that overlay with specific service and node for discovery. And we know the quality of that overlay and can alert on it.
For now for sure can just make function which traverses kademalia, while it should traverse trust graph, I think.
The text was updated successfully, but these errors were encountered: