Crates.io | maidsafe_vault |
lib.rs | maidsafe_vault |
version | 0.1.1 |
source | src |
created_at | 2015-03-12 12:21:49.790831 |
updated_at | 2015-12-11 23:54:10.497015 |
description | This is Pre alpha, and not useful, no code worth looking at. |
homepage | http://maidsafe.net |
repository | https://github.com/maidsafe/maidsafe_vault |
max_upload_size | |
id | 1560 |
size | 276,553 |
Primary Maintainer: Qi Ma (qi.ma@maidsafe.net)
Secondary Maintainer: Chandra Prakash (prakash@maidsafe.net)
Crate | Linux | Windows | OSX | Coverage | Issues |
---|---|---|---|---|---|
API Documentation - master branch | SAFE Network System Documention | MaidSafe website | Safe Community site |
---|
#Overview
An autonomous network capable of data storage/publishing/sharing as well as computation, value transfer (crypto currency support) and more. Please see below for a more detailed description of the operations involved in data storage.
#Todo Items
#Detailed documentation
The MaidSafe Network consists of software processes (nodes), referred to as vaults. These vaults perform many functions on the network and these functional components are referred to as personas. The underlying network, when linked with routing, is an XOR network and as such a node may express closeness or responsibility to any other node or element on the network, if the node is in relative close proximity to the target. In this summary the phrase NAE (Network Addressable Element) is used to refer to anything with a network address including data.
The vaults rely on routing to calculate responsibilities for NAE via the relevant API calls.
These calls allow us to calculate the network from the perspective of any NAE we may be responsible for. It cannot be stressed enough that the ONLY way to determine responsibility for an NAE is to see the network from the perspective on the NAE. If we sort the vector of nodes we know about and their close nodes (referred to as the group matrix) and we do not appear in the first K (replication count) nodes then we are not responsible for the NAE. This is a fundamental issue and the importance of this cannot be emphasised enough.
As the network is very fluid in terms of churn and vault capabilities the vault network must measure and report on individual vaults and importantly ensure all the personas of any vault are performing their tasks for the NAE they are responsible for. In event of any churn around a given network segment, a Matrix change object is created by Routing and passed on to Vault. This object contains list of old and new nodes in group matrix. Based on this information, it provides helper function to derive certain information related to any given NAE : If the node getting churn event is among first k nodes closest to provided NAE. If yes, which new node(s) need information related to the provided NAE. If not, delete any information stored related to the given NAE.
Churn, duplication of data and ensuring all members of a group agree is handled by a combination of Synchronisation, The Accumulator and group messages. This is a complex set of rules that requires significant attention to edge cases.
Nodes and data both live in the same XOR space which is addressed with a 512 bit key (2^512 possible addresses); a Network-Addressable-Element (NAE). A message flows from a NAE to a NAE. An operation can be performed on a message flow by a manager group.
A message flow from start to end can be represented by
< NAE_1 | manager | NAE_2 >
where the NAE can be a node (ie a vault or a client - Direct NAE) or a data element (Indirect NAE). The manager group operating on the message flow will act forward manager | NAE_2 >
under normal / successful conditions. The manager will act backwards < NAE_1 | manager
upon error.
If no operation is needed on the message flow then this special case is represented by
< NAE | NAE >
For a given message type ACTION
the functions shall be named
< A::ACTION | B::ActOnACTION | C::PerformACTION >
The function HandleACTION
is reserved for the VaultFacade. Currently these message types are Connect*, ConnectResponse*, FindGroup*, FindGroupResponse*, GetData, GetDataResponse, PutData, PostMessage, where message types with * are completed in routing and exempt from this naming convention.
For clarity, a message is passed through RoutingNode and VaultFacade upto Persona according to following abstraction
RoutingNode::MessageReceived {
Parse; Filter; Cache; SendOn; Relay; Drop; Sentinel;
Switch RoutingNode::HandleMessage(MessageType /* */) {
Completed in routing or
VaultFacade::HandleACTION {
Switch on Authority & template on DataType {
Persona::ActOnACTION or // Currently both named HandleACTION
Persona::PerformACTION
}
}
}
}
The triplet structure < A | B | C >
captures the general characteristic of every message flow. The structure is event-driven and the message id is preserved over the structure.
< .
corresponds to the creation of a new message flow. A single node or client can initiate a routing call where a random message id is generated by routing. It is noted that if a group starts a new message flow, the message id needs to be deterministically instantiated by routing.
. | .
represents the full routing action over intermediate XOR space, as stated above,
Parse; Filter; Cache; SendOn; Relay; Drop; Sentinel;
where Sentinel;
is the dominant logical contribution and as such . | .
is simply referred to as "sentinel".
. >
terminates the message flow, and is the successful end-state of the action. Only upon error is the flow reversed. From this it follows that the following functions should be implemented for a given action < A | B | C >
A::ACTION()
B::ActOnACTION()
B::ACTIONFailure()
C::PerformACTION()
Actions can be logically combined where the new start is identical to the preceding terminal,
< A | B | C > < C | D | E >
and the joint | C > < C |
can be considered a full consensus mechanism for an Indirect NAE C - for a Direct NAE C this consensus mechanism is trivial. In this sense the operator | C > < C |
transforms (a) message flow(s) into (a) new message flow(s). Note that this joint can be trivial and in such case does not require consensus.
Where before the message flow in the structure < A | B | C >
passes over different persona's, such messages are called "interpersona messages". The operator | C > < C |
introduces "intrapersona messages"; [ Should these be handled as a separate type of messages in routing ? ]
< MaidClient | DataManager > < DataManager | MaidNode >
< MaidClient | DataManager > < DataManager | PmidNode > < PmidNode | MaidNode >
Here | DataManager > < DataManager |
is a consensus mechanism to decide whether DataManager has the requested data in active memory or needs to continue the GetData request as new message flows from DataManager to the archiving PmidNodes. Note that based on Authority PmidNode can verify that the GetData request came from DataManager. In both lines only the final message flow is GetDataResponse.
If an explicit caching at DataManager on Get is desired the second line above can be replaced by
< MaidClient | DataManager > < DataManager | PmidNode > (< PmidNode | MaidNode > & < PmidNode | DataManager >)
where the two flows in parenthesis are both GetDataResponse. The DataManager simply adds the data to LRUcache again.
< MaidClient | MaidManager | DataManager > < DataManager | PmidManager | PmidNode >
Here | DataManager > < DataManager |
can store the data in LRUcache and without delay trivially select K closest to D.name PmidNodes for archiving the data.
very brief, assumes knowledge on the MPID implementation
Send out message:
< MPN_A | MPM_A > < MPM_A | MPM_B > < MPM_B | MPN_B >
Retrieve message:
< MPN_B | MPM_B > < MPM_B | MPM_A > < MPM_A | MPN_B > < MPN_B | MPM_B >
where the last flow deviates from the existing implementation, but would notify MPM_B that the message has been retrieved and the header can be dropped.
D data
H() Hash512
H^n() n-th Hash512
Manager{Address};
{Address} omitted where evident,
e.g. MaidManagers{MaidNode}