Categories
Technology

Next Generation P2P?

John Robb at Userland has defined a set of constraints for what he considers to be next generation of P2P. I appreciate that he’s put Userland architecture interests online — it generates conversation. However, I am concerned about the interpretation of “P2P”, for what is, essentially a lightweight server system.

Requirement one: The ability for individual users to create subnets where authorization is required before use is enabled.

It’s interesing that people talk about sub-nets and authorization. For true P2P security, the same rules of trust and security must be established with all peers, sub-net participants or not. Rather than create new authentication and security for each individual sub-net, the same security mechanisms and trust definitions must apply to all P2P nodes. Otherwise, any one P2P node that’s on a wire that has physical access to the secure sub-net is a point of vulnerability. And I guarantee that there will be one node that’s connected to the Internet, making all nodes insecure.

However, applying security measures across all possible P2P nodes is going to be a burden on a system — security takes bandwidth. And that’s not the biggest issue — security within P2P nodes implies control. Most forms of authentication and authorization are based on these functions being provided by a central server.

As we’ve seen recently with Morpheus, central points of entry make a P2P system vulnerable.

If this issue is straight user signon and authorization to access of services, then you’re not talking about P2P — you’re talking about a more traditional server/client application. A true P2P system must have a way for each peer to establish a secure connection and determine identity and accessibility without reliance on any specific server.

Yeah. “Gack” is right.

Requirement two: The ability to publish structured content such as a complete web site or web app to a multi-million person network without flooding the publisher’s PC.

I know where this one is going, and I’m sorry, but this is based on a flawed vision: pushing content out to an individual client rather than having the client connect to a centralized source. In addition, this isn’t really a requirement for P2P, but a specific application’s functional need. It’s important to keep the two separate as we discuss the requirement in more detail.

At it’s simplest, published content is nothing more than files, and any P2P file system will work, including Freenet and Gnutella. But in reality, with published content we’re talking about structure as well as files. In addition, the published content also implies an ability to access and re-access the same publication source again and again in order to get fresh content.

Traditional P2P file transfer systems are based on the concept that you’re after a specific resource, a single item — you don’t care where you get it. For published content, the source is a key factor in the peer connection.

As for the issues of scalability, again, traditional P2P networks don’t have an answer that will work in for this requirement because of that single port of content. This would be equivalent to a Gnutella network and only one node on that network has Michael Jackson’s Thriller. As relieved as we are about this, this does put some serious limitations on a P2P-based resource system.

However, once we get beyond the stretch to the P2P paradigm this requirement necessitates, the same concepts of store and forward of Freenet could work for this requirement, except that you’re not talking about intermediate nodes storing an MP3 file — you’re talking about the possibility of massive amounts of information being dumped on each individual intermediate node.

The only way for this to work would be to stripe the material and distribute the content on several nodes, basically creating a multi-dimensional store and forward. Ugh. Now, what was the problem with the web?

Requirement three: The ability to connect subscribed users in a given subnet to each other via Web Services in order to enable a new class of applications that share information (but don’t utilize centralized resources).

The whole principle behind P2P is connecting peers to each other. However, maintaining a true connection in order to successfully conduct a transaction, that’s the key. I once wrote the following functionality for a P2P transaction:

Transaction reliability — the old two-phase commit of database technology appears again, but this time in a more challenging guise.

Transaction auditing — a variation of the two-phase commit, except that auditing is, in some ways, more fo the business aspect of the technology.

Transaction security — we need to ensure that no one can snoop at the transaction contents, or otherwise violate the transaction playing field.

Transaction trust — not the same thing as security. Transaction trust means that we have to ensure that the P2P service we’re accessing is the correct one, the valid one, and that the service met some business trust criteria (outside of the technology realm with the latter).

Service or Peer discovery — still probably one of the more complicated issues about P2P. How do we find services? How do we find P2P circles? How do market our services?

Peer rediscovery — this is where the iron hits the cloud in all P2P applications I know of. You start a communication with another peer, but that peer goes offline. How do you take up the conversation again without the use of some centralized resource? Same could also be applied to services.

Bi-directional communication — This is a reference to HTTP’s asymmetric nature. Peers share communication; otherwise you’re only talking about the traditional web services model.

Interesting challenge. As far as I know, at no one has met it yet…at least nothing that can handle complex data with a single point of origin.

Outside of the listed requirements, John discusses that the next generation P2P systems needs some form of development environment. He states, “Notice, that in this system, the P2P transport is important but generic — it is just a pipe.” He also says “… this system it doesn’t have to be completely decentralized to avoid legal action.”

Last time I looked, decentralization was the basis of P2P. And can we all forget the damn copyright issues for once and focus on what P2P was meant to be: total enablement of each node within the Internet?

John, you have specified requirements of which some, but not all, can be met by P2P-based functionality. Let me emphasize that “some but not all” response again.

You’re really not packaging requirements for the next generation of P2P systems; what you’re packaging is the requirements for “Next Generation Radio”. It’s important not to confuse this with what’s necessary for P2P systems.

I am Superwoman. What makes me Superwoman? Because I meet all the requirements for being Superwoman. And what are the requirements for being Superwoman?

Being me.

It just doesn’t work that way.

Categories
Weblogging

Blogicon needs a new home

The Blogicon needs a new home.

The work to maintain it is minimal – add a new entry every once in a while (I have 3 pending now), using standard HTML. A better approach would be to have an application that allows people to add their own entries, so I’m hoping whoever will take it on has web development skills. I’d write the application myself, but with my move, I don’t have time.

The Blogicon gets a nice, steady flow of visitors – good way for you to meet new webloggers. I can set up a link with my content system to forward visitors on to your web site if they go to the current location.

My preference would be to have one of the University of Blogaria take on the page, but didn’t want to put anyone on the spot.

Send me an email if you’re interested and we’ll work out the details.

Update

Jason DeFillippo of Blogrolling fame has kindly offered to take on the care and feeding of Blogicon. Thanks Jason!

end of Update

Categories
Weblogging

R-E-S-P-E-C-T

A few days ago I wrote in a posting that I was taking a short break from weblogging. This is not a big deal. I take breaks, you take breaks, we all take breaks.

Weblogging isn’t a job or a marriage or parenthood whereby we’re committed to supporting it 100% of the time. Weblogging is a hobby. Something we do because it gives us pleasure, allows us to be heard, enables communication with others, sell books, products, services, explore technology – pick one.

If you’ve checked out the comments for this posting, titled “Burnt to a Crisp”, then you’ll see that some folks think I was taking a break because I expressed the views about the SFSU demonstration and the Blog Burst and then didn’t want to stay around to take the heat. I’ve commented back – most of which was pulled because I spoke from anger. A great deal of anger. Time to stop speaking from anger.

I was taking the break because I’m in the process of closing down a corporation I’ve had for over six years, as well as preparing for a move 2000 miles away. These are time consuming events, as is the book writing. In addition, I wanted to spend some time playing around the neighborhood so to speak – play tourist.

However, my reasons for wanting to take the break are not why I’m writing now. I’m writing now because I shouldn’t have to provide a reason why I’m taking a break. I feel I have to now because I’m kind of a proud person, and I really don’t like people believing that I would run from a fight. This was something I just couldn’t blow off.

Respect. It all comes down to respect.

This weekend I’ve been thinking a lot about respect. I’ve thought about some of the things people have told me in the last few months – some based on anger, some based on kindness, but all intertwined with this concept of respect.

Recently someone who I consider a very close friend told me that I wear my heart on my sleeve – meaning that whatever I think and feel goes online for all to see. Well, this is true to some extent. However, there is more to this iceberg than what shows above the water line, so to speak.

Regardless, this statement gave me pause – there’s that respect thing again. Am I coming across as this whiney thing that starts a fight, and then tells those who show up to stop picking on me? I would be appalled if this is true, because that’s not how I am. That’s not how I want to portray myself.

I’m stronger than that. I’m better than that. If I am portraying myself as this emotional wimp, then I’ve screwed up royally in how I communicate. And if I’ve lost respect because of what I write, then I have to seriously take a long look at my writing, and the value of this weblog.

Categories
Connecting

Control

Leaving the parking garage for my lunch appointment on Tuesday, I found the exit blocked, yet again, by the construction crew of the new condo across the street. I tapped my horn and when a couple of members of the crew turned towards me, I pointed to the pallets blocking the way. One of the guys holds up his finger in a gesture of “one moment”, walks over and moves the pallets — but not the huge truck behind them, basically giving me just barely enough room to turn the corner and not scrape the sides of my car.

As I fought to move the car around the obstacles, other construction crew members stopped working to watch and laugh at my efforts.

Last week when I took my car into the Ford service center, I missed the regular entrance and ended up driving through the actual center itself. At the center exit, a car blocked the way out, with a mechanic standing beside the car talking to another mechanic driving the car. I waited, not saying anything, not sounding the horn — I was a stranger in a strange land in this place. Eventually, the two guys finished their conversation, the car started to move, and I started to go…

…when I was stopped because the mechanic who had been standing by the car walked directly in front of me, slowly, looking at me, making sure I realized that he “owned” this territory, and that I pass by at his sufferance.

These two acts go beyond issues of courtesy. They were about power. These two individuals were the gatekeepers and I had to pay toll.

With the construction crew, my toll was to be humiliated as I tried my best to drive around the obstacles. At the service center, my toll was being made aware of the fact that I didn’t belong in this place, and I had best remember it.

There are well established (though often ignored) laws about driving to ensure we don’t kill each other. There are roads to enable driving from any point A to any point B. There is also a mapping and addressing scheme that works remarkably well in regards to location of same.

All of which can be arbitrarily shut down by one person who, in a moment of ultimate power, controls my only access to the organized but open system of the road.

Categories
Critters

A story of lasts

Two tales of extinction from Tasmania.

Earlier in May, I read about the efforts to clone the Tasmanian Tiger (Thylacine) an animal whose last known representative died in captivity in 1936 (see video at BBC).

I studied about the Tasmanian Tiger when I wrote a four-part story about cryptozoology, extinct and legandary animals, and the giant squid in Tale of Two Monsters. According to an article in ENN:

It took humans only some 70 years to make the Tasmanian tiger extinct, as farmers in the 1800s began shooting, poisoning, gassing, and trapping the animal, blaming it for attacking sheep. The last known Tasmanian tiger died in 1936, and it was officially declared extinct in 1986.

Today, Allan pointed to this sad tale of the return of pieces of the body of Truganinni, the woman who is considered “the last Tasmanian Aborigine”.(Descendants of the early aborigines have survived, though none are full-blooded.)

The British Royal College of Surgeons pilfered the pieces long ago for study, and only just discovered them again in January. Since the Tasmanian aborigines believe their bodies should lie in rest near their home, the pieces of Truganinni are being returned for ceremonial burial.

Accounts about the deliberate extermination of the Tasmanian aborigine bear a remarkable resemblance to those taken to exterminate the Tasmanian Tigers. According to Jared Diamond:

Tactics for hunting down Tasmanians included riding out on horseback to shoot them, setting out steel traps to catch them, and putting out poison flour where they might find and eat it. Sheperds cut off the penis of aboriginal men, to watch the men run a few yards before dying.

The final efforts to eliminate the aborigines occurred through that most efficient of destructive agents – religion. When only about 300 aborigines still lived, George Augustus Robinson a self styled preacher convinced the remnants to join him in a sanctuary created for them on Flinders Island. There he would convert them over to Christianity and “modern ways” while he protected them from further destruction. Unfortunately, the Island became a prison rather than a refuge, and Robinson helped complete the work started so enthusiastically by the other settlers.

Note: In the interest of disclosing possible bias, I should point out that here in the United States, we share much of the same efficiency as our Australian brethren when it comes to killing or displacing natives – human and otherwise.