SlideShare a Scribd company logo
© Predictable Network Solutions Ltd 2017 www.pnsol.com
Using the ∆Q calculus to model
blockchain scalability
Neil Davies, Predictable Network Solutions / Input Output HK
neil.davies@pnsol.com
neil.davies@iohk.io
© Predictable Network Solutions Ltd 2017 www.pnsol.com
Brief introduction to blockchains
© Predictable Network Solutions Ltd 2017
3
www.pnsol.com
What is a blockchain?
● Public distributed ledger
○ In full public purview
● Becomes increasingly immutable
○ Each ‘block’ references the previous block
■ Using cryptographic functions (signatures, hashes etc.)
○ A record of ‘history’ that is hard to change
■ Changing a block becomes harder the more time that passes - all subsequent
blocks would also have to be changed
● Blocks hold records of ‘transactions’
○ Whose validity can be checked by anybody
© Predictable Network Solutions Ltd 2017 www.pnsol.com
4Structure of blockchain growth
A new block is added (‘mined’ or ‘minted’)
by a ‘leader’, chosen either by:
● A race (e.g. to solve a hard problem),
or
● Random selection by consensus
This new block has to be communicated to the next
leader so that it can be referenced by the next block
● The next leader could be anybody, so the
block has to be ‘diffused’ to everybody
● This has to happen before the next block is
due to be added
(end of) block
arrived too late
Chain continues
to grow - but
reduces
performance
© Predictable Network Solutions Ltd 2017 www.pnsol.com
5Key performance metrics
Incorporate
new block
Mint
block
diffuse
transactions
Key performance metrics
• Time to “immutablity”
• Inclusion in block
• Chain growth of 2 to 10 blocks
• Transaction rate / work measures
• transactions per cycle
• Total data per cycle
• Cycle time
Exact number
depends on
use case
© Predictable Network Solutions Ltd 2017 www.pnsol.com
Extracting the performance - ∆Q
© Predictable Network Solutions Ltd 2017 www.pnsol.com
7Cycle of behaviour (expanded)
Mint
Block
Incorporate
Block
Diffuse
Send
Block
Receive
Block
“mempool”
local database
of blocks and
outstanding
transactions
Every20seconds
Need to get to
>99% of
(potential) slot
leaders “in time”
© Predictable Network Solutions Ltd 2017
8
www.pnsol.com
Diffusion - robustness and performance
• No hegemony
• No central decision making or control authority
• Have to assume “bad actors” exist
• And will exercise any influence that they can muster
• No fixed topology
• Participants changing over time (hourly, weekly etc)
• Nodes come and go, stake distribution changes etc
• Randomness needed to resist attacks by bad actors
• Standard routing approaches too restrictive
• They create (single) points of failure - overly reduce connectivity
• Too slow to converge after change - single BGP hop recovery is many slot intervals
• Too easy to disrupt through adversarial attack
© Predictable Network Solutions Ltd 2017 www.pnsol.com
9Implications - need more visibility and control
A B
D
H
I
J
G
F
E
C D
A
F
C
B
E
I
J
G
H
© Predictable Network Solutions Ltd 2017 www.pnsol.com
10Network topology
D
A
F
C
B
E
I
J
G
H
Multiple (potential) next-hops, “randomly” chosen
© Predictable Network Solutions Ltd 2017 www.pnsol.com
11Network topography
D
A FC
B
E
I
J
G
H
Topology does not
capture all essential
properties needed
for robustness and
performance - can’t
ignore geographical
effects.
© Predictable Network Solutions Ltd 2017 www.pnsol.com
12Network topography - global scale
D
A FC
B
E
I
J
G
H
© Predictable Network Solutions Ltd 2017 www.pnsol.com
13
∆QG→D
∆QE→D
∆QF→E
∆QE→C
∆QE→F
∆QC→E
∆QH→G
∆QG→H
∆QF→J
∆QJ→F
∆QG→F
∆QF→G
∆QB→J
∆QJ→B
∆QJ→I
∆QI→J
∆QH→I
∆QI→H
∆QI→A
∆QA→I
∆QH→A
∆QA→H
∆QD→C
∆QC→D
∆QA→B
∆QB→A
∆QC→B
∆QB→C
Topography = Topology + ∆Q
D
A
F
C
B
E
I
J
G
H
Adding in the salient effects of the real world
∆QD→G
∆QD→E
© Predictable Network Solutions Ltd 2017 www.pnsol.com
14Outcome-focused first-hop route choice
∆QA→I
∆QI→J
∆QJ→F
A
F
I
J
G
H
∆QA→H
∆QH→G
∆QG→F
∆QI→H
Which is the best first-hop from A to get to F for a block (of a given
size)?
- Four routes - two first hops
- There is both a ∆Q|G and a ∆Q|S component
Shortest number of hops does not imply earliest time to delivery
from A→F
Simplified for
illustration (third
first hop ignored)
∆QH→I
© Predictable Network Solutions Ltd 2017 www.pnsol.com
15
Global understanding from local
measurement
From/To A B C D ...
A B: 112/35 B: 199/77 H: 365/148 ...
B A: 112/35 - C: 87/42 C: 92/75 ...
C B: 199/77 B: 87/42 - D: 5/33 ...
D G: 365/148 E: 108/103 E: 21/71 - ...
... ... ... ... ... ...
Direct connects as measured
- Exploits ∆Q measurement
approach
Indirectly connected calculated
- Exploits ∆Q convolution
- First hop is chosen on basis of
best diffusion outcome
Resolves several existing issues, e.g
- Appropriate use of multiple paths
- Asymmetric bearersOptimum first hop for block may be dependent on actual block size:
- lower ∆Q|G / higher ∆Q|S link (e.g. DSL)
could be outperformed by
- higher ∆Q|G / lower ∆Q|S link (e.g. 3G/4G)
when diffusing larger block sizes
firsthop: G (ms) / S (µs/o)
[ one way - end to end]Indicative based on
measurement
Simple delay
measures not
sufficient
© Predictable Network Solutions Ltd 2017 www.pnsol.com
16Cooperative performance optimisation
Nodes calculate
per hop ∆Q
[local “measure”]
Nodes share this
information
regularly
Each node calculates
its own ∆Q matrix
[local “manage”]
Nodes change
“best first hop”
(with hysteresis)
[local “manipulate”]
Each iteration round this loop
can improve the performance of
the data diffusion.
Can be used to
assure / monitor
system health
© Predictable Network Solutions Ltd 2017
17
www.pnsol.com
Summary
• Using ∆Q (+ other maths) to do system performance design and analysis
• Using real time real world measurements to application outcome
performance
• As well as ongoing system integrity
• This creates basis for high integrity distributed systems with strong
performance assurances.
• Enables new ways of thinking about using the underlying network
resources

More Related Content

Similar to ∆Q and blockchain

Where Did All These Cycles Go?
Where Did All These Cycles Go?Where Did All These Cycles Go?
Where Did All These Cycles Go?
ScyllaDB
 
Evaluating Cloud Native Storage Vendors - DoK Talks #147
Evaluating Cloud Native Storage Vendors - DoK Talks #147Evaluating Cloud Native Storage Vendors - DoK Talks #147
Evaluating Cloud Native Storage Vendors - DoK Talks #147
DoKC
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
Jae-Yun Kim
 
Design, Verification and Emulation of an Island-Based Network Flow Processor
Design, Verification and Emulation of an Island-Based Network Flow ProcessorDesign, Verification and Emulation of an Island-Based Network Flow Processor
Design, Verification and Emulation of an Island-Based Network Flow Processor
Netronome
 
Rina advantages for large scale decentralized applications
Rina advantages for large scale decentralized applicationsRina advantages for large scale decentralized applications
Rina advantages for large scale decentralized applications
Predictable Network Solutions Ltd.
 
Luca Relandini - Microservices and containers networking: Contiv, deep dive a...
Luca Relandini - Microservices and containers networking: Contiv, deep dive a...Luca Relandini - Microservices and containers networking: Contiv, deep dive a...
Luca Relandini - Microservices and containers networking: Contiv, deep dive a...
Codemotion
 
Time-resource v&v for complex systems
Time-resource v&v for complex systemsTime-resource v&v for complex systems
Time-resource v&v for complex systems
Predictable Network Solutions Ltd.
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementAngel G Diaz
 
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
Indonesia Network Operators Group
 
OpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design SolutionsOpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design Solutions
Shane Gibson
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
Cohesive Networks
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current IssuesAli Usman
 
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
ContainerDay Security 2023
 
PEnDAR webinar 3
PEnDAR webinar 3PEnDAR webinar 3
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Open Networking Summit
 
XPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, Citrix
XPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, CitrixXPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, Citrix
XPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, Citrix
The Linux Foundation
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
Ryan Koop
 
Ceph QoS: How to support QoS in distributed storage system - Taewoong Kim
Ceph QoS: How to support QoS in distributed storage system - Taewoong KimCeph QoS: How to support QoS in distributed storage system - Taewoong Kim
Ceph QoS: How to support QoS in distributed storage system - Taewoong Kim
Ceph Community
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
Cointelligence
 
Introducing new Proof-of-Stake based networks - Why your network participatio...
Introducing new Proof-of-Stake based networks - Why your network participatio...Introducing new Proof-of-Stake based networks - Why your network participatio...
Introducing new Proof-of-Stake based networks - Why your network participatio...
Michael Ng
 

Similar to ∆Q and blockchain (20)

Where Did All These Cycles Go?
Where Did All These Cycles Go?Where Did All These Cycles Go?
Where Did All These Cycles Go?
 
Evaluating Cloud Native Storage Vendors - DoK Talks #147
Evaluating Cloud Native Storage Vendors - DoK Talks #147Evaluating Cloud Native Storage Vendors - DoK Talks #147
Evaluating Cloud Native Storage Vendors - DoK Talks #147
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Design, Verification and Emulation of an Island-Based Network Flow Processor
Design, Verification and Emulation of an Island-Based Network Flow ProcessorDesign, Verification and Emulation of an Island-Based Network Flow Processor
Design, Verification and Emulation of an Island-Based Network Flow Processor
 
Rina advantages for large scale decentralized applications
Rina advantages for large scale decentralized applicationsRina advantages for large scale decentralized applications
Rina advantages for large scale decentralized applications
 
Luca Relandini - Microservices and containers networking: Contiv, deep dive a...
Luca Relandini - Microservices and containers networking: Contiv, deep dive a...Luca Relandini - Microservices and containers networking: Contiv, deep dive a...
Luca Relandini - Microservices and containers networking: Contiv, deep dive a...
 
Time-resource v&v for complex systems
Time-resource v&v for complex systemsTime-resource v&v for complex systems
Time-resource v&v for complex systems
 
Lesson - 02 Network Design and Management
Lesson - 02 Network Design and ManagementLesson - 02 Network Design and Management
Lesson - 02 Network Design and Management
 
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
04 - IDNOG04 - Charles Chiu (Skipio) - The Latest In G Fast
 
OpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design SolutionsOpenStack Control Plane Architectures - Design Solutions
OpenStack Control Plane Architectures - Design Solutions
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
Database ,18 Current Issues
Database ,18 Current IssuesDatabase ,18 Current Issues
Database ,18 Current Issues
 
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
 
PEnDAR webinar 3
PEnDAR webinar 3PEnDAR webinar 3
PEnDAR webinar 3
 
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAMNext-gen Network Telemetry is Within Your Packets: In-band OAM
Next-gen Network Telemetry is Within Your Packets: In-band OAM
 
XPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, Citrix
XPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, CitrixXPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, Citrix
XPDS13: Xen and XenServer Storage Performance - Felipe Franciosi, Citrix
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
 
Ceph QoS: How to support QoS in distributed storage system - Taewoong Kim
Ceph QoS: How to support QoS in distributed storage system - Taewoong KimCeph QoS: How to support QoS in distributed storage system - Taewoong Kim
Ceph QoS: How to support QoS in distributed storage system - Taewoong Kim
 
Connecting The Block Cointelligence Academy by Dr Vince Ming
Connecting The Block   Cointelligence Academy by Dr Vince MingConnecting The Block   Cointelligence Academy by Dr Vince Ming
Connecting The Block Cointelligence Academy by Dr Vince Ming
 
Introducing new Proof-of-Stake based networks - Why your network participatio...
Introducing new Proof-of-Stake based networks - Why your network participatio...Introducing new Proof-of-Stake based networks - Why your network participatio...
Introducing new Proof-of-Stake based networks - Why your network participatio...
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

∆Q and blockchain

  • 1. © Predictable Network Solutions Ltd 2017 www.pnsol.com Using the ∆Q calculus to model blockchain scalability Neil Davies, Predictable Network Solutions / Input Output HK neil.davies@pnsol.com neil.davies@iohk.io
  • 2. © Predictable Network Solutions Ltd 2017 www.pnsol.com Brief introduction to blockchains
  • 3. © Predictable Network Solutions Ltd 2017 3 www.pnsol.com What is a blockchain? ● Public distributed ledger ○ In full public purview ● Becomes increasingly immutable ○ Each ‘block’ references the previous block ■ Using cryptographic functions (signatures, hashes etc.) ○ A record of ‘history’ that is hard to change ■ Changing a block becomes harder the more time that passes - all subsequent blocks would also have to be changed ● Blocks hold records of ‘transactions’ ○ Whose validity can be checked by anybody
  • 4. © Predictable Network Solutions Ltd 2017 www.pnsol.com 4Structure of blockchain growth A new block is added (‘mined’ or ‘minted’) by a ‘leader’, chosen either by: ● A race (e.g. to solve a hard problem), or ● Random selection by consensus This new block has to be communicated to the next leader so that it can be referenced by the next block ● The next leader could be anybody, so the block has to be ‘diffused’ to everybody ● This has to happen before the next block is due to be added (end of) block arrived too late Chain continues to grow - but reduces performance
  • 5. © Predictable Network Solutions Ltd 2017 www.pnsol.com 5Key performance metrics Incorporate new block Mint block diffuse transactions Key performance metrics • Time to “immutablity” • Inclusion in block • Chain growth of 2 to 10 blocks • Transaction rate / work measures • transactions per cycle • Total data per cycle • Cycle time Exact number depends on use case
  • 6. © Predictable Network Solutions Ltd 2017 www.pnsol.com Extracting the performance - ∆Q
  • 7. © Predictable Network Solutions Ltd 2017 www.pnsol.com 7Cycle of behaviour (expanded) Mint Block Incorporate Block Diffuse Send Block Receive Block “mempool” local database of blocks and outstanding transactions Every20seconds Need to get to >99% of (potential) slot leaders “in time”
  • 8. © Predictable Network Solutions Ltd 2017 8 www.pnsol.com Diffusion - robustness and performance • No hegemony • No central decision making or control authority • Have to assume “bad actors” exist • And will exercise any influence that they can muster • No fixed topology • Participants changing over time (hourly, weekly etc) • Nodes come and go, stake distribution changes etc • Randomness needed to resist attacks by bad actors • Standard routing approaches too restrictive • They create (single) points of failure - overly reduce connectivity • Too slow to converge after change - single BGP hop recovery is many slot intervals • Too easy to disrupt through adversarial attack
  • 9. © Predictable Network Solutions Ltd 2017 www.pnsol.com 9Implications - need more visibility and control A B D H I J G F E C D A F C B E I J G H
  • 10. © Predictable Network Solutions Ltd 2017 www.pnsol.com 10Network topology D A F C B E I J G H Multiple (potential) next-hops, “randomly” chosen
  • 11. © Predictable Network Solutions Ltd 2017 www.pnsol.com 11Network topography D A FC B E I J G H Topology does not capture all essential properties needed for robustness and performance - can’t ignore geographical effects.
  • 12. © Predictable Network Solutions Ltd 2017 www.pnsol.com 12Network topography - global scale D A FC B E I J G H
  • 13. © Predictable Network Solutions Ltd 2017 www.pnsol.com 13 ∆QG→D ∆QE→D ∆QF→E ∆QE→C ∆QE→F ∆QC→E ∆QH→G ∆QG→H ∆QF→J ∆QJ→F ∆QG→F ∆QF→G ∆QB→J ∆QJ→B ∆QJ→I ∆QI→J ∆QH→I ∆QI→H ∆QI→A ∆QA→I ∆QH→A ∆QA→H ∆QD→C ∆QC→D ∆QA→B ∆QB→A ∆QC→B ∆QB→C Topography = Topology + ∆Q D A F C B E I J G H Adding in the salient effects of the real world ∆QD→G ∆QD→E
  • 14. © Predictable Network Solutions Ltd 2017 www.pnsol.com 14Outcome-focused first-hop route choice ∆QA→I ∆QI→J ∆QJ→F A F I J G H ∆QA→H ∆QH→G ∆QG→F ∆QI→H Which is the best first-hop from A to get to F for a block (of a given size)? - Four routes - two first hops - There is both a ∆Q|G and a ∆Q|S component Shortest number of hops does not imply earliest time to delivery from A→F Simplified for illustration (third first hop ignored) ∆QH→I
  • 15. © Predictable Network Solutions Ltd 2017 www.pnsol.com 15 Global understanding from local measurement From/To A B C D ... A B: 112/35 B: 199/77 H: 365/148 ... B A: 112/35 - C: 87/42 C: 92/75 ... C B: 199/77 B: 87/42 - D: 5/33 ... D G: 365/148 E: 108/103 E: 21/71 - ... ... ... ... ... ... ... Direct connects as measured - Exploits ∆Q measurement approach Indirectly connected calculated - Exploits ∆Q convolution - First hop is chosen on basis of best diffusion outcome Resolves several existing issues, e.g - Appropriate use of multiple paths - Asymmetric bearersOptimum first hop for block may be dependent on actual block size: - lower ∆Q|G / higher ∆Q|S link (e.g. DSL) could be outperformed by - higher ∆Q|G / lower ∆Q|S link (e.g. 3G/4G) when diffusing larger block sizes firsthop: G (ms) / S (µs/o) [ one way - end to end]Indicative based on measurement Simple delay measures not sufficient
  • 16. © Predictable Network Solutions Ltd 2017 www.pnsol.com 16Cooperative performance optimisation Nodes calculate per hop ∆Q [local “measure”] Nodes share this information regularly Each node calculates its own ∆Q matrix [local “manage”] Nodes change “best first hop” (with hysteresis) [local “manipulate”] Each iteration round this loop can improve the performance of the data diffusion. Can be used to assure / monitor system health
  • 17. © Predictable Network Solutions Ltd 2017 17 www.pnsol.com Summary • Using ∆Q (+ other maths) to do system performance design and analysis • Using real time real world measurements to application outcome performance • As well as ongoing system integrity • This creates basis for high integrity distributed systems with strong performance assurances. • Enables new ways of thinking about using the underlying network resources

Editor's Notes

  1. Having to deal with Function, Security, Integrity, Robustness and Performance all at the same time