CS555: Distributed Systems [Fall 2019] Dept

Total Page:16

File Type:pdf, Size:1020Kb

CS555: Distributed Systems [Fall 2019] Dept CS555: Distributed Systems [Fall 2019] Dept. Of Computer Science, Colorado State University Frequently asked questions from the previous class survey CS 555: DISTRIBUTED SYSTEMS ¨ Difference in routing in the network space vs ID space [ BITTORRENT & DISTRIBUTED COMPUTING ECONOMICS] ¨ Can Gnutella be viewed as a semi-structured P2P system? Shrideep Pallickara Computer Science Colorado State University CS555: Distributed Systems [Fall 2019] L9.1 September 24, 2019 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.2 Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Topics covered in this lecture ¨ BitTorrent ¨ Distributed Computing Economics BITTORRENT CS555: Distributed Systems [Fall 2019] September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.3 September 24, 2019 L9.4 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Dept. Of Computer Science, Colorado State University Bit Torrent: Traffic statistics BitTorrent ¨ In November 2004 ¨ Designed for downloading large files ¤ Responsible for 25% of all Internet traffic ¨ Not intended for real-time routing of content ¨ February 2013 ¨ Relies on capabilities of ordinary user machines ¤ 3.35% of all worldwide bandwidth ¤ > 50% of the 6% total bandwidth dedicated to file sharing September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.5 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.6 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University SLIDES CREATED BY: SHRIDEEP PALLICKARA L9.1 CS555: Distributed Systems [Fall 2019] Dept. Of Computer Science, Colorado State University Bit Torrent: Key concepts Segmented file transfer [1/2] ¨ Instead of downloading a file from a single source server ¨ File being transferred is divided into fixed-size segments called ¤ Users join a swarm of hosts to upload-to/download-from simultaneously chunks (or pieces) ¤ Chunks are of the same size throughout a single download (10MB file: 10 ¨ Several basic commodity computers can replace large, customized 1MB chunks or 40 256KB chunks) servers ¤ Without compromising on efficiency ¨ Chunks are downloaded non-sequentially and rearranged into the ¤ In fact, lower bandwidth usage with swarms prevents large internet traffic correct order by BitTorrent spikes September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.7 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.8 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Segmented file transfer [2/2] BitTorrent: Protocol summary ¨ Advantages: ¨ Splits files into fixed-sized chunks ¤ File transfers can be stopped at any time and resumed ¨ Chunks are then made available at various peers across the P2P n Without loss of previously downloaded content network ¤ Clients seek out readily available chunks, rather than waiting for an unavailable (next in sequence) chunk ¨ Clients can download a number of chunks in parallel from different sites ¤ Reduces the burden on a particular peer to service the entire download September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.9 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.10 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University The BitTorrent protocol Advantages of hashing chunks ¨ When a file is made available in BitTorrent, a .torrent file is ¨ Each chunk has a cryptographic hash in the torrent descriptor created ¨ Modifications of chunks can be reliably detected ¤ Holds metadata associated that file ¤ Prevents accidental and malicious modifications ¨ Metadata ¤ The name and length of the file ¨ If a node starts with an authentic/legitimate torrent descriptor? ¤ Location of a tracker (URL) ¤ It can verify the authenticity of the entire file that it receives n Centralized server that manages download for that file ¤ Checksum n Associated with each chunk n Generated using the SHA-1 algorithm September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.11 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.12 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University SLIDES CREATED BY: SHRIDEEP PALLICKARA L9.2 CS555: Distributed Systems [Fall 2019] Dept. Of Computer Science, Colorado State University The swarm or torrent for a particular file includes Trackers ¨ Tracker ¨ The use of trackers, compromises a core P2P principle ¨ Seeders ¤ But simplifies the system ¨ Leechers ¨ Trackers are responsible for tracking the download status for a particular file September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.13 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.14 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University The roles of participants in BitTorrent: Seeder The roles of participants in BitTorrent: Leechers ¨ Peer with a complete version of a file (i.e. with all its chunks) is known ¨ Peers that want to download a file are known as leechers as a seeder ¤ A given leecher, at any given time, contains a number of chunks for that file ¨ Peer that initially creates the file, provides the initial seed for file ¨ Once a leecher downloads all chunks for a file, it can become a distribution seeder for subsequent downloads ¤ Files spread virally based on demand September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.15 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.16 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University When a peers wants to download a file Incentive mechanism: Quid pro quo ¨ Contacts the tracker ¨ Gives downloading preference to peers who have previously uploaded to the site ¨ Is given a partial view of the torrent ¤ Encourages concurrent uploads/downloads to make better use of bandwidth ¤ The set of peers that can support the download ¤ The tracker does not participate in scheduling the downloads ¨ A peer supports downloads from n simultaneous peers by unchoking n Decentralized these peers ¨ Chunks are requested and transmitted in any order ¤ Decisions based on rolling calculations of download rates September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.17 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.18 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University SLIDES CREATED BY: SHRIDEEP PALLICKARA L9.3 CS555: Distributed Systems [Fall 2019] Dept. Of Computer Science, Colorado State University Scheduling downloads How BitTorrent differs from a classic download ¨ Rarest first scheduling policy BitTorrent Classic download ¨ Peer prioritizes chunk that is rarest among its set of connected peers Connections Many small data requests ¨ Ensures that chunks that are not widely available, spread rapidly One TCP connection over different IP connections to one machine to different machines Download Order Random or “rarest Sequential first” to ensure high- availability ** Allows BitTorrent to achieve lower cost, higher redundancy, and resistance to abuse September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.19 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.20 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University BitTorrent: Advantages BitTorrent: Shortcomings ¨ Advantages ¨ Downloads can take time to rise to full speed ¤ Lower costs, greater redundancy, higher resistance to abuse or “flash ¤ May take time to enough peer connections to be established crowds” ¤ Takes time for a node to receive data to become an effective uploader ¨ Shortcomings ¨ Regular (non-BitTorrent/traditional) downloads on the other hand: ¤ Non-contiguous download precludes progressive download ¤ Rise to full speed very quickly and maintain this speed throughout ¤ No streaming playback n Beta BitTorrent Streaming protocol was made available for testing in 2013; this was not successful n New service BitTorrent Live was released as Public Beta in Spring 2019. September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.21 September 24, 2019 CS555: Distributed Systems [Fall 2019] L9.22 Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University Professor: SHRIDEEP PALLICKARA Dept. Of Computer Science, Colorado State University But how do you find a torrent? Support for trackerless Torrents ¨ Browsing the web or by some other means ¨ Azureus (now Vuze) supported this first ¤ Open it with a BitTorrent client ¨ Mainline BitTorrent provides a DHT based implementation ¨ Client connects to trackers in the torrent file and finds peers ¤ Mainline DHT ¤ If swarm contains only the initial seeder, client connects directly to it and ¤ Kademlia-based Distributed Hash Table (DHT) used by BitTorrent clients begins to request pieces September 24, 2019 CS555: Distributed Systems [Fall 2019]
Recommended publications
  • Book of Abstracts Ii Contents
    CHEP 2016 Conference, San Francisco, October 8-14, 2016 Monday, 10 October 2016 - Friday, 14 October 2016 San Francisco Marriott Marquis Book of Abstracts ii Contents Experiment Management System for the SND Detector 0 .................. 1 Reconstruction software of the silicon tracker of DAMPE mission 2 ............ 1 HEPData - a repository for high energy physics data exploration 3 ............. 2 Reconstruction of Micropattern Detector Signals using Convolutional Neural Networks 4 3 Federated data storage system prototype for LHC experiments and data intensive science 6 ................................................ 3 BelleII@home: Integrate volunteer computing resources into DIRAC in a secure way 7 . 4 Reconstruction and calibration of MRPC endcap TOF of BESIII 8 .............. 5 RootJS: Node.js Bindings for ROOT 6 9 ............................ 6 C++ Software Quality in the ATLAS experiment: Tools and Experience 10 . 6 An automated meta-monitoring mobile application and frontend interface for the WLCG computing model 11 ..................................... 7 Experience of Google’s latest Deep Learning library, TensorFlow, with Docker in a WLCG cluster 12 ........................................... 8 Flexible online monitoring for high-energy physics with Pyrame 13 ............ 8 Simulation of orientational coherent effects via Geant4 14 .................. 9 Detector control system for the AFP detector in ATLAS experiment at CERN 15 . 10 The InfiniBand based Event Builder implementation for the LHCb upgrade16 . 11 JavaScript ROOT v4 17 ..................................... 12 The evolution of monitoring system: the INFN-CNAF case study18 . 13 Statistical and Data Analysis Package in SWIFT 19 ...................... 13 Analysis Tools in Geant4 10.2 20 ................................ 14 Online & Offline Storage and Processing for the upcoming European XFEL Experiments 21 15 Future approach to tier-0 extension 22 ............................. 15 iii Internal security consulting, reviews and penetration testing at CERN 23 .
    [Show full text]
  • Emerging Cyber Threats to the United States Hearing
    EMERGING CYBER THREATS TO THE UNITED STATES HEARING BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION FEBRUARY 25, 2016 Serial No. 114–55 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PUBLISHING OFFICE 21–527 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas CANDICE S. MILLER, Michigan, Vice Chair JAMES R. LANGEVIN, Rhode Island JEFF DUNCAN, South Carolina BRIAN HIGGINS, New York TOM MARINO, Pennsylvania CEDRIC L. RICHMOND, Louisiana LOU BARLETTA, Pennsylvania WILLIAM R. KEATING, Massachusetts SCOTT PERRY, Pennsylvania DONALD M. PAYNE, JR., New Jersey CURT CLAWSON, Florida FILEMON VELA, Texas JOHN KATKO, New York BONNIE WATSON COLEMAN, New Jersey WILL HURD, Texas KATHLEEN M. RICE, New York EARL L. ‘‘BUDDY’’ CARTER, Georgia NORMA J. TORRES, California MARK WALKER, North Carolina BARRY LOUDERMILK, Georgia MARTHA MCSALLY, Arizona JOHN RATCLIFFE, Texas DANIEL M. DONOVAN, JR., New York BRENDAN P. SHIELDS, Staff Director JOAN V. O’HARA, General Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES JOHN RATCLIFFE, Texas, Chairman PETER T.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Machine-To-Machine Communication in Rural Conditions: Realizing Kasadakanet
    Machine-to-machine communication in rural conditions: Realizing KasadakaNet Fahad Ali VU Amsterdam [email protected] Supervised by Victor de Boer ABSTRACT the explored concepts is using Semantic Web technologies Contextual constraints play an important role in ICT for De- to facilitate knowledge sharing in rural areas (Gu´eret et al., velopment (ICT4D) projects. These ICT4D projects include 2011). those whose goal is to enable information and knowledge sharing in rural areas while keeping constraints such as lack One of the resulting products that came out of this research of electricity and technological infrastructure or (technical) is the Kasadaka2, a low-resource Raspberry Pi-based device illiteracy of end-users in mind. The Kasadaka project offers that provides an infrastructure on which voice-based appli- a solution for locals in rural areas in Sub-Saharan Africa to cations can be built and deployed locally. These applica- share knowledge. Due to a lack of technological infrastruc- tions for the Kasadaka are usually custom-built for specific ture, networks and internet connections are often not avail- needs and use cases. New applications can also be created able. Therefore, many ICT implementations in those areas fairly easily, making the platform ideal for rapid prototyping are not able to share data among each other. This paper (Baart, 2016). Essentially, these Kasadaka's are deployed on explores the possibilities of a machine to machine communi- a one-per-village basis, giving each village access to its own cation method to enable information sharing between geo- little piece of technology that facilitates local information graphically distributed devices.
    [Show full text]
  • 38 Bittorrent Software and Usage Justin Mckinney
    ARTICLE BITTORRENT SOFTwaRE AND USAGE Justin McKinney Mark Simon Haydn 1. Abstract: While the circulation of cultural material outside of official channels is not new, the scale and infrastructure afforded by digital networks and peer-to-peer protocols has drastically changed its dynamics. Focusing on private trackers and online, members-only communities dedicated to sharing difficult to find and “gray-area” cinema content, our paper discusses new digital re- positories and their connection to the traditional film archive. With discussion of the types of materials held, user participation, and custodial efforts to restore or improve cultural material, we will discuss the activities of a contemporary private tracker community. Additionally, the paper will interrogate the legality and copyright issues surrounding these activities and ex- plore recent, licit adoption of the infrastructure that has been developed for online circulation. Discussion will conclude with attention to cases in which pirated material has resurfaced in a rights-holding context, and an assessment of what these developments mean for custodians of film material working in a traditional film archive context. As a combination of discussion, case study, and argument, the paper will serve as a topical primer on a pressing and under- researched area of interest in this field, building on a panel presented at last year’s Association of Moving Image Archivists conference in Georgia. 2. BitTorrent Software and Usage BitTorrent is a software protocol developed in 2001 and designed to aid the practice of peer- to-peer file sharing on the Internet. The primary advantage of BitTorrent is that it allows for segmented downloading, which is the coordinated transmission of a file sourced from multiple servers to a single destination.81 This protocol allows for the rapid sharing of large amounts of data by allowing a user to download a file from multiple sources that are uploading the file at the same time.82 This allows for more efficient and faster downloading than the traditional client-server model.
    [Show full text]
  • Networks & Communications
    PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Objectives 1. Discuss the importance of computer networks. 2. Compare different types of LANs and WANs. 3. List and describe the hardware used in both wired and wireless networks. 4. List and describe the software and protocols used in both wired and wireless networks. 5. Explain how to protect a network. Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Objective 1: Overview From Sneakernet to Hotspots 1. Define computer network and network resources 2. Discuss the importance of computer networks 3. Differentiate between peer-to-peer networks and client-server networks Key Terms § Client § Peer-to-peer network § Client-server network § Server § Computer network § Workgroup § Homegroup § Network resource Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Networks § Computer network § Network resources § Two or more § Software computers § Hardware § Share resources § Files § Save time § Save money § Increase productivity § Homegroup § Simple networking feature § Used to network a group of Windows computers Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Network Types § Peer-to-peer (P2P) § Each computer is equal § Client-server network § At least one central server Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Network Types Peer-to-Peer (P2P) § Each device can share resources § No centralized authority § Each computer belongs to workgroup § Do not need to connect to the Internet § Most found in homes and small businesses § Simplest type of network § Do not need network operating system § All computers must be on to access resources Visualizing Technology Copyright © 2014 Pearson Educaon, Inc.
    [Show full text]
  • Pirate Philosophy Leonardo Roger F
    Pirate Philosophy Leonardo Roger F. Malina, Executive Editor Sean Cubitt, Editor-in-Chief Closer: Performance, Technologies, Phenomenology , Susan Kozel, 2007 Video: The Reflexive Medium , Yvonne Spielmann, 2007 Software Studies: A Lexicon , Matthew Fuller, 2008 Tactical Biopolitics: Art, Activism, and Technoscience , edited by Beatriz da Costa and Kavita Philip, 2008 White Heat and Cold Logic: British Computer Art 1960–1980 , edited by Paul Brown, Charlie Gere, Nicholas Lambert, and Catherine Mason, 2008 Rethinking Curating: Art after New Media , Beryl Graham and Sarah Cook, 2010 Green Light: Toward an Art of Evolution , George Gessert, 2010 Enfoldment and Infinity: An Islamic Genealogy of New Media Art , Laura U. Marks, 2010 Synthetics: Aspects of Art & Technology in Australia, 1956–1975 , Stephen Jones, 2011 Hybrid Cultures: Japanese Media Arts in Dialogue with the West , Yvonne Spielmann, 2012 Walking and Mapping: Artists as Cartographers , Karen O’Rourke, 2013 The Fourth Dimension and Non-Euclidean Geometry in Modern Art, revised edition , Linda Dalrymple Henderson, 2013 Illusions in Motion: Media Archaeology of the Moving Panorama and Related Spectacles , Erkki Huhtamo, 2013 Relive: Media Art Histories , edited by Sean Cubitt and Paul Thomas, 2013 Re-collection: Art, New Media, and Social Memory , Richard Rinehart and Jon Ippolito, 2014 Biopolitical Screens: Image, Power, and the Neoliberal Brain , Pasi Väliaho, 2014 The Practice of Light: A Genealogy of Visual Technologies from Prints to Pixels , Sean Cubitt, 2014 The Tone of Our Times: Sound, Sense, Economy, and Ecology , Frances Dyson, 2014 The Experience Machine: Stan VanDerBeek’s Movie-Drome and Expanded Cinema , Gloria Sutton, 2014 Hanan al-Cinema: Affections for the Moving Image , Laura U.
    [Show full text]
  • Sneakernet on Wheels: Trustworthy NFC-Based Robot to Machine Communication
    Sneakernet on Wheels: Trustworthy NFC-based Robot to Machine Communication Thomas Ulz, Thomas Pieber, Christian Steger Sarah Haas, Rainer Matischek Institute for Technical Informatics Development Center Graz Graz University of Technology Infineon Technologies Austria AG Graz, Austria Graz, Austria fthomas.ulz, thomas.pieber, [email protected] fsarah.haas, rainer.matischekg@infineon.com Abstract—Wireless communication technologies such as WiFi, controlled accessories could potentially operate in the ZigBee, or Bluetooth often suffer from interference due to many 2:4 GHz range [3]. The alternative 5 GHz range for WiFi devices using the same, unregulated frequency spectrum. Also, is also already used by other devices such as cordless wireless coverage can be insufficient in certain areas of a building. At the same time, eavesdropping a wireless communication out- phones, radar, and digital satellites [4]. Due to many de- side a building might be easy due to the extended communication vices operating in the same frequency range, interference range of particular technologies. These issues affect mobile robots will occur and affect wireless communication. and especially industrial mobile robots since the production 2) Insufficient Coverage: Due to certain objects in build- process relies on dependable and trustworthy communication. ings that dampen or even shield wireless communication Therefore, we present an alternative communication approach that uses Near Field Communication (NFC) to transfer confiden- (e.g. walls or large production machines) it is costly tial data such as production-relevant information or configuration to provide good wireless coverage for every part of updates. Due to NFC lacking security mechanisms, we propose a certain area. For IAMRs this is a problem due to a secured communication framework that is supported by dedi- the non-deterministic behavior when navigating on a cated hardware-based secure elements.
    [Show full text]
  • Bitcoin 2: Freedom of Transaction
    Bitcoin 2: Freedom of Transaction Sid Angeles and Eric Gonzalez [email protected] AF76 05E5 EB15 2B00 AB18 204C 11C9 1C8B EA6C 7389 [email protected] 3A85 7ABC 9453 96E4 B9DB 2A11 7370 E15E 8F60 2788 Donations: 1btctwojvohHSLaXaJAHWebZF2RS8n1NB Revision 2 July 23, 2013 Abstract We propose a set of changes to the original Bitcoin protocol (called Bitcoin 2) that allows Bitcoin to evolve into a system that is future-proof against developing threats to its original vision – an alternative, decentralized payment system which allows censorship-resistant, irreversible transac- tions. Bitcoin 2 strives to be a minimal set that lays the foundations for a long-lived system capable of delivering the original Bitcoin vision, with enough room for growth to layer additional im- provements on top of it. These changes include a sliding blockchain with fixed block sizes, the redistribution of dead coins with an unforgeable lottery, enforced mixing, and miner ostracism. The proposed changes require a proactive fork of the original Bitcoin block chain, but they allow final transfers of existing coins into Bitcoin 2 and a reuse of the existing Bitcoin infrastruc- ture. 1 Introduction The Bitcoin peer-to-peer electronic cash system [11] was introduced in 2009 and it proved to be a remarkable piece of work which found widespread adoption. The system was started with the explicit goal of providing a completely alternative payment system without a single point of failure that allows anonymous, but not untraceable, transactions. However, certain shortcomings in the original protocol and unforeseen developments inside and outside of the growing Bitcoin ecosystem threaten these very goals and there is good reason to believe that Bitcoin could develop into a system that is a complete perversion of the original vision – a com- pletely transparent payment system with very few points of control which has been totally absorbed by the established financial and regulatory environment.
    [Show full text]
  • Terabyte Sneakernet: the Carry-On Data Center by Drew Hamre
    December 2007 Terabyte SneakerNet: The Carry-on Data Center By Drew Hamre I recently helped relocate a data center for a US government agency, moving system images from Virginia to a consolidated facility in Minnesota. During ‘cutover’ weekend, production systems in Virginia were dropped and remained unavailable until data could be refreshed at the Minnesota data center and the new systems could be brought online. To minimize downtime, the time allotted for refreshing data across locations was extremely brief. email This data transfer was daunting for two reasons: the amount of data being moved was large (as much as two-terabytes would be moved during cutover weekend), and the network between the two sites was slow. Portable media were the only viable alternative, but these devices would need to meet extremely difficult requirements. They would need to be fast (due to the brief transfer window), inexpensive (no hardware funds were budgeted) and portable (devices needed to be hand-carried by agents to meet security mandates). Ideally, the team needed to find fast, cheap transfer devices that could be stowed in an airliner’s overhead bin. This paper reviews alternatives for the transfer, focusing on the latest generation of commodity Network Attached Storage (NAS) devices that allowed agents to transfer as much as 12-terabytes in a single carry-on duffle bag. Background: Transitioning Data Centers At the time of the transition, both data centers were fully functional: Virginia supported production, while Minnesota (a parallel environment running pre-staged system images on new hardware) supported acceptance testing. Minnesota’s parallel environment included a full snapshot of Virginia’s file system and databases (roughly 10-terabytes in total).
    [Show full text]
  • Crowd Powered Media Delivery: Facilitating Ubiquitous Device-To-Device File Transfers
    Crowd Powered Media Delivery: Facilitating Ubiquitous Device-To-Device File Transfers Colin Scott Microsoft Research India ABSTRACT latent desire for content that is not available from immedi- Device-to-device file transfers are pervasive in many emerg- ate friend groups: users would like to discover and transfer ing markets, but users typically only share content with close content within their geographic vicinity, and may even be friends or informal media vendors. We seek to facilitate willing to pay others to transport content to them. We seek ubiquitous device-to-device file transfers beyond one's im- to facilitate this `crowd powered' delivery of media, by pro- mediate social network. This extended abstract outlines the viding services such as a geo-tagged content directory and a research challenges we need to address and our initial plans remuneration system for transportation of content. for addressing them. Realizing our goal requires us to address several research challenges. Are users willing to travel physical distances to share content, and if so, what is the most appropriate re- 1. INTRODUCTION muneration model? How should metadata be distributed to It is widely acknowledged that demand for Internet con- devices in offline and poorly connected areas? What is the tent exceeds the available supply of bandwidth in emerging most understandable interface for naming and authenticat- markets. Internet companies have launched numerous ven- ing content? Can we devise a sustainable business model? tures to address this shortage, ranging from fiber installa- Can we arrange an agreeable relationship between copyright tions [9] to low Earth orbiting satellites [13], solar powered holders and consumers of (often pirated) content? drones [8], and high altitude balloons [10].
    [Show full text]
  • Terascale Sneakernet: Using Inexpensive Disks for Backup, Archiving, and Data Exchange
    TeraScale SneakerNet: Using Inexpensive Disks for Backup, Archiving, and Data Exchange. Jim Gray, Wyman Chong, Tom Barclay, Alex Szalay, Jan Vandenberg May 2002 Technical Report MS-TR-02-54 Microsoft Research Advanced Technology Division Microsoft Corporation One Microsoft Way Redmond, WA 98052 TeraScale SneakerNet: Using Inexpensive Disks for Backup, Archiving, and Data Exchange. Jim Gray, Wyman Chong, Tom Barclay, Alex Szalay, Jan Vandenberg May 2002 The Problem: How do we exchange Terabyte datasets? We want to send 10TB (terabytes, which is ten million megabytes) to many of our colleagues so that they can have a Table 1. Time to send a TB private copy of the Sloan Digital Sky Survey 1 Gbps 3 hours (http://skyserver.sdss.org/) or of the TerraServer data 100 Mbps 1 day (http://TerraServer.net/). 1 Mbps 3 months The data interchange problem is the extreme form of backup and archiving. In backup or archiving you are mailing the data to yourself in the future (for restore). So, a data interchange solution is likely a good solution for backup/restore and for archival storage. What is the best way to Table 2: The raw price of bandwidth, the true price is more move a terabyte from place than twice this when staff, router, and support costs are to place? The Next included. Raw prices are higher in some parts of the world. Raw Generation Internet (NGI) Speed Rent Raw $/TB Time/TB promised gigabit per Context Mbps $/month $/Mbps sent days second bandwidth desktop- home phone 0.04 40 1,000 3,086 6 years to-desktop by the year home DSL 0.6 70 117 360 5 months 2000.
    [Show full text]