-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #56 from dusk-network/fix-55
Add CHANGELOG and README
- Loading branch information
Showing
6 changed files
with
137 additions
and
27 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
# Architecture Layout | ||
|
||
This document explains the architecture of the library components. The low-level networking and threading infrastructure makes use of async [Tokio runtime](https://docs.rs/tokio). In the future, the code will be made modular so to allow the use of [different runtimes](https://rust-lang.github.io/async-book/08_ecosystem/00_chapter.html). | ||
|
||
The architecture follow the diagram below. For concrete usage examples please refer to the [crate's documentation](https://crates.io/crates/kadcast) | ||
|
||
![architecture](architecture.jpg) | ||
|
||
## Kadcast Peer | ||
The `kadcast::peer` is the entry point of the library and the only public API. It implements the Kadcast Network Peer. | ||
|
||
## Message Handler | ||
The `Message Handler` represents the core component of the library. It handles the incoming messages and replies according to the specification. | ||
|
||
## Mantainer | ||
The `Maintainer` performs the [initial bootstrap](../bootstrapping) as well as the `k-table` [maintenance](../periodic-network-manteinance). | ||
It keeps track of idle buckets and is in charge of triggering the routing nodes lookup. | ||
|
||
## Wire Network | ||
It is responsible to instantiate the UDP server that receives the messages from the network. It's also in charge of outgoing communication (UDP client). | ||
It performs message serialization/deserialization and applies the FEC encoding/decoding where appropriate. | ||
|
||
### RaptorQ Encoder | ||
The `RaptorQ Encoder` splits a single broadcast message in multiple chunks according to the RaptorQ FEC algorithm. | ||
|
||
### RaptorQ Decoder | ||
The `RaptorQ Encoder` joins the encoded chunks in a single decoded broadcast message. It keeps a cache to avoid processing brodcasted identical messages multiple times. | ||
|
||
## Channels | ||
### Inbound Channel | ||
Provides message passing between incoming UDP packets (deserialized by the WireNetwork) and Message Handler | ||
### Outbound Channel | ||
Channel dedicated to any message which needs to be transmitted to the network. | ||
### Notification Channel | ||
Successfully received broadcast messages are dispatched to the `Notifier` through the `Notification Channel`. This is done in order to safely forward messages to the user's callback without any risk for the latter to block any other thread. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
# Changelog | ||
|
||
All notable changes to this project will be documented in this file. | ||
|
||
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), | ||
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html). | ||
|
||
## [0.1.0] - 29-10-21 | ||
|
||
### Added | ||
|
||
- Kadcast Network protocol implementation | ||
- RaptorQ as Forward Error Correction. | ||
- Examples in `example` dir |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,63 @@ | ||
# kadcast | ||
Dusk-blockchain version of Kadcast | ||
# Kadcast | ||
Implementation of the Kadcast Network layer according to [the latest version of the paper to date (2021)](https://eprint.iacr.org/2021/996.pdf) | ||
|
||
## Overlay Construction | ||
Kadcast is an UDP-based peer-to-peer protocol in which peers form a structured overlay. | ||
|
||
> 💡 The specifications suggest that the protocol can be transport-agnostic, however this implementation uses the canonical choice of UDP. | ||
All peers have an unique ID generated upon joining the network, which is used as an identifier unique to them. | ||
|
||
> 💡 This implementation uses _128 bits identifiers_ generated from hashing the `<port>`|`<ip_octects>` concatenation truncated to the agreed 16 bytes. The hashing algorithm used is `Blake2`. | ||
Following the [Kademlia's specifications](https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf) for a structured network, the ID determines the peer position in a binary routing tree. | ||
|
||
Each peer mantains the routing state in a set of `k-buckets` containing the location of the location of each peer. The location is fully determined by the tuple `(ip_addr, port, ID)`. | ||
|
||
Each bucket comprises of a list of the `K` last recently seen peers, located at a given distance in relation to the peer. The distance is calculated as the `non-euclidean XOR metric` which represents: `d(x,y) = (x ^ y)`. | ||
|
||
This implies that `i` buckets contain `K` Peers which distance `d` follow the formula: `2^i <= d < 2^(i +1)`. | ||
|
||
> 💡 The factor `K` is a system-wide parameter which determines the routing state and the lookup complexity. | ||
- In case a bucket's peer list is full (i.e. `k` entries are already stored), new entries to that list may be inserted by dropping `LRU` (Least Recently Used) peers. | ||
|
||
- Before dropping an entry from the list, the peer will check whether the peer to be dropped is still reachable, by sending a `PING` message and waiting for a `PONG` response. In case the `PONG` won't be collected within pre-determined timeout, the check fails and the peer is dropped from the list. | ||
|
||
> 💡 By following a `LRU` policy, the protocol inherently is biased toward the older and more stable peers on the network. | ||
### Bootstrapping | ||
Upon joining the Kadcast network, a peer retrieves from the so-called `bootstrap nodes` the locations of other neighbour peers, so to fill its buckets. | ||
|
||
> 💡 From the specification: _When a peer first joins the network, it has to know the address of at least one bootstrapping node. It therefore sends `PING` messages to known peers to check whether they are actually online. Additionally, `PING` transmits the sending peer’s routing information to the recipient, thereby distributing its existence in the network._ | ||
The bootstrap node will reply with a `PONG` message which also contains its node info. | ||
|
||
### Network discovery. | ||
Starts just after the [bootstrapping](#bootstrapping) process. | ||
The main goal of this phase is to fill up the `k-buckets` with `k` different peers. | ||
- The process starts by sending a `FIND_NODE` message to the bootstraping nodes that have been added to the `k-bucket`s with the `PONG` messages received. | ||
- Then the *lookup process* starts: | ||
1) The node looks up the 𝛼 closest peers regarding the XOR-metric in its own buckets. | ||
2) It queries this 𝛼 peers for the ID by sending `FIND_NODE` messages and wait for the `NODES` reply. | ||
3) The queried peers respond with a `NODES` reply containing the set of `k` peers they believe are the closest to `ID`. | ||
4) Based on the info acquired, the node builds a new set of closest peers and repeats steps *1* to *3* until it no longer gets peers closer to those it got from previous iterations. | ||
|
||
> ⚠️ Note that like the bucket size, `𝛼` and `k` are global constants that will determine the redundancy and overhead of the network. The typical values are: `k = [20, 100]` & `𝛼 = 3`. | ||
#### Periodic Network Manteinance | ||
Each peer periodically refreshes every bucket with no activity. For each such bucket, it picks a random `ID` with appropriate distance, performs a look up, and populates its buckets with fresh routing information. | ||
|
||
### Improving Broadcast Reliability And Performance | ||
Instead of delegating the broadcast to one peer per bucket, we select `β` delegates. This is done to increase the probability of at least one honest peer to receive the message broadcasted. This is a measure intended to help with the inherently lossy nature of the UDP protocol without forcing the use of slow CRC checking procedures. | ||
|
||
Since each broadcast process is repeated on every hop (decreasing the height), it is imperative that the peers ignore duplicate `CHUNK` messages. Moreover, transmission failures have to be considered. Because of these factors, this implementation includes the use of *forward error connection schemes* based on [RaptorQ](https://tools.ietf.org/pdf/rfc6330.pdf) specifications and [related rust library](https://github.com/cberner/raptorq). | ||
The `FEC` overhead factor can be adjusted through the paramenter `f = (n-s)/s`. | ||
|
||
As shown in the benchmarks, we can get full network coverage even assuming a 12% packet-loss ratio with a `β = 3` & `f = 0,15` (Please refer to the benchmarks included with the library documentation). | ||
|
||
### Security | ||
The specification provides solutions for DOS, Sybil and Eclipse attacks, as well as obstruction of block delivery. All advices have been taken into consideration during the development. | ||
|
||
## Internal Architecture | ||
For more information related to the internal architecture please check [the architecture diagram](ARCHITECTURE.md). |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters