On Sat, Nov 09, 2002 at 11:31:35AM +0100, Robert Bihlmeyer wrote:
> David Allen <mda at idatar.com> writes:
> 
> > On Wed, Nov 06, 2002 at 11:09:06PM +0000, Matthew Toseland wrote:
> > > Possible solution to the problem that you can see that a request has
> > > been initiated on a given node:
> > > Requests can have either HTL, or HTL|P, where P is a number between 0
> > > and 1 (this would be limited to a more realistic range by each node it
> > > passed through). If request only has HTL, it is processed normally. If
> > > request has HTL|P, there is a P chance that it is forwarded as is, and a
> > > 1-P chance that it is turned into an HTL only request. 
> > 
> > [...], or would it take, say, 2 random hops and become an HTL 13
> > query?
> 
> For the latter you'd have to count the random hops, which would render
> the whole point moot. (The first hop will see that the counter is zero.)
> 
> > Also, what's the method for changing P with random hops?  Life would
> > suck if I specified a P of 0.9999999999999999 and could get it
> > honored.  Ditto for P=0
> 
> See above ... "realistic range"
> 
> > > So depending on
> > > the value of P, which can be set at the client end, we have a variable,
> > > random number of hops before the main HTL starts. This should greatly
> > > reduce the vulnerability to nodes seeing that requests are at a fixed
> > > request HTL,
> 
> Why not make P a constant?
> 
> Or, on the other hand, do away with HTL and replace it with a
> forward probability selected by the user?
We've been through this. We could have a probability of forwarding, but
it would increase the standard deviation (the variability) of the
average path time by a factor of 6.
> 
> 50%-HTL p
> 0       0
> 5       0.87
> 10      0.933
> 15      0.955
> 20      0.966
> 25      0.973
> 30      0.977
> 
> Hmm, a combination seems better so that one can "guarantee" a minimum
> number of visited nodes.
> 
> -- 
> Robbe



-- 
Matthew Toseland
toad at amphibian.dyndns.org
amphibian at users.sourceforge.net
Freenet/Coldstore open source hacker.
Employed full time by Freenet Project Inc. from 11/9/02 to 11/11/02.
http://freenetproject.org/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20021109/5f1b6ae3/attachment.pgp>

Reply via email to