That was very well put. DHTs might seem fancy, but were not invented just to 
provide us geeks something to twiddle around. There are a lot of benefits out 
there, and you need to read the papers to get to know why they are so swell. I 
think the implementation complexity of a DHT (if you might call it so) can be 
hidden if the higher-level user interface is simple and intuitive. Laymen do 
not really need to know how the underlying DHT works. They just need to know 
how to use the most basic operations to do their stuff. (You don't need to know 
how a TV really works. All you need, is to know how to handle the remote. :))

Regards,
Ratul Mukhopadhyay


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Alen Peacock
Sent: Wednesday, June 13, 2007 9:57 AM
To: theory and practice of decentralized computer networks; [EMAIL PROTECTED]
Subject: Re: [p2p-hackers] announcing Allmydata-Tahoe v0.3

On 6/11/07, John Bäckstrand <[EMAIL PROTECTED]> wrote:
>
> This is very interesting. I have been looking for software that does
> this (the friends-backup use-case, that is) for a long time, but I never
> found anything that did what I wanted it to.
>
> It is still far from a perfect match though:

  Sounds like you are looking for something more like CrashPlan
(http://www.crashplan.com), perhaps?


> ... I guess its possible to setup a
> private cloud though. I was imagining a very simple system where I
> specify for each file stored how much availability I want it to have,
> minimum, and then just store it on that amount of nodes, no fancy FEC
> nor DHT at all. A good question of course is what happens when nodes go
> offline, but not a huge problem if you are actually using this together
> with a set of close friends.

  Theoretically, the simple replication you are talking about is just
FEC with an outrageous expansion factor and/or lowered reliability
(http://oceanstore.cs.berkeley.edu/publications/papers/pdf/erasure_iptps.pdf).

  I believe Tahoe uses an expansion factor of 4x (correct me if I'm
wrong zooko).  Suppose you have 8 friends who are willing to back up
your files.  For the same amount of space and bandwidth, you could
either use FEC and store bits of your file+parity on all 8 nodes, or
you could choose 4 nodes and store a complete copy on each.  In the
latter case, even when half of those friends are online, you may not
be able to retrieve your file (if they are the wrong 4 friends).  In
the former, you'll be able to recover your file even if only 2 (any
two!) of those friends are online.  If you are worried about
reliability and performance, the FEC route chosen by Tahoe seems
clearly better.


> ... I only care about having a few (2-10) mostly-trusted nodes,
> and not a whole lot about a DHT with the entire world which seems
> to be the point here: I feel both reliability and foremost performance
> will be much better in a smaller set of nodes with better connectivity.

  When you say "mostly-trusted nodes," what does that mean?  Do the
nodes have to belong to individuals who you personally know?  What if
you could find reliable nodes that are controlled by strangers, and
make them part of the set of nodes that you perform backup to?  Could
that really be any worse?  I mean, my best friend's internet
connection might be flaky, my mom's computer might be susceptible to
viruses, my computer at work might be squirreled away behind a
firewall, my brother might be prone to turn his computer off in the
evenings, etc.  Is it really any better to trust those computers than
it would be to find computers controlled by strangers who have
*demonstrably* reliable operation, and then harness enough of these so
that you are virtually guaranteed to be able to recover your data?

  The only way to determine reliability is to measure it directly. In
flŭd backup (http://www.flud.org), each node uses a localized trust
metric to determine reliability, and learns to prefer demonstrably
reliable nodes over time
(http://www.flud.org/wiki/index.php/LocalizedTrust).  Additionally,
flŭd treats storage resources as a type of currency, creating an
economic incentive for fairness and symmetry
(http://www.flud.org/wiki/index.php/Architecture#Storage_Layer).  I
believe that Tahoe uses some of these same techniques, but since I am
not intimately familiar, I'll let the Tahoe peeps address that.

  There's one more minus to using computers from people that you know:
they often exhibit poor geographic diversity.  It's a tired example, I
know, but if you happened to live on the Gulf Coast in 2005, and were
backing up mostly to other computers in the New Orleans region then
chances are that even an aggresive FEC scheme might not have helped
you...

Alen


The information contained in this electronic message and any attachments to 
this message are intended for the exclusive use of the addressee(s) and may 
contain proprietary, confidential or privileged information. If you are not the 
intended recipient, you should not disseminate, distribute or copy this e-mail. 
Please notify the sender immediately and destroy all copies of this message and 
any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient should 
check this email and any attachments for the presence of viruses. The company 
accepts no liability for any damage caused by any virus transmitted by this 
email.
 
www.wipro.com
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to