Bitcoin Forum
July 24, 2017, 12:55:09 AM *
News: Due to BIP91, it would starting now be prudent to require 5 times more confirmations than usual before trusting transactions.
 
   Home   Help Search Donate Login Register  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 [37] 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 508 »
  Print  
Author Topic: IOTA  (Read 821269 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 19, 2015, 07:45:37 PM
 #721

Can Itoa client be installed in most of today's sensors in term of the hardware requirement or do most of today's sensors meet the minimum hardware requirement to install Itota client?

Full client can't run on MCUs with 64 KiB RAM, but lightweight part can.
1500857709
Hero Member
*
Offline Offline

Posts: 1500857709

View Profile Personal Message (Offline)

Ignore
1500857709
Reply with quote  #2

1500857709
Report to moderator
1500857709
Hero Member
*
Offline Offline

Posts: 1500857709

View Profile Personal Message (Offline)

Ignore
1500857709
Reply with quote  #2

1500857709
Report to moderator
1500857709
Hero Member
*
Offline Offline

Posts: 1500857709

View Profile Personal Message (Offline)

Ignore
1500857709
Reply with quote  #2

1500857709
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Tobo
Hero Member
*****
Offline Offline

Activity: 732


View Profile
November 19, 2015, 08:20:44 PM
 #722

Full client can't run on MCUs with 64 KiB RAM, but lightweight part can.

How many full clients does the network need to support all the operation of lightweigh clients (Is there an ideal ratio between the two)?
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 19, 2015, 08:36:17 PM
 #723

How many full clients does the network need to support all the operation of lightweigh clients (Is there an ideal ratio between the two)?

There is no dependency.
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 07:06:53 PM
 #724

Hi, may I ask some question:
How do you handle the messaging stuff?
Do you use a proprietary protocol from you Jinn software part or is it something common?
What kind of message architecture is planned (peer2peer one way pub => sub, multiplexing, ..., with middle ware)?
If the performance == message load scales well with increasing network this could be an really interesting part.
Do you expect some bottlenecks or maybe have some measurements from current tests?

NxT: 13574045486980287597
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 07:24:37 PM
 #725

Hi, may I ask some question:
How do you handle the messaging stuff?
Do you use a proprietary protocol from you Jinn software part or is it something common?
What kind of message architecture is planned (peer2peer one way pub => sub, multiplexing, ..., with middle ware)?
If the performance == message load scales well with increasing network this could be an really interesting part.
Do you expect some bottlenecks or maybe have some measurements from current tests?

We are planning to use https://en.wikipedia.org/wiki/User_Datagram_Protocol running on top of https://en.wikipedia.org/wiki/IPv6. Because of the small size of the packets https://en.wikipedia.org/wiki/Path_MTU_Discovery and https://en.wikipedia.org/wiki/IP_fragmentation are not required which simplifies networking to the max possible degree. Messages will look like transactions, they will secure the network by "paying" with PoW for their delivery to the majority of the nodes. Messages won't be preserved, only their hash will be, so the recipient will get a message only if he is online or one of the nodes decided to archive and retransmit the message after a special request which itself can be such a message.
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 08:30:17 PM
 #726

OK,  UDP seems really proper with low latency for what you are doing.
The message encryption is done by the publisher which is the POW part, right?
Than the publisher fan-out the message to all known endpoints and they store the hash only?
Do the nodes who receiving the message send them further to all endpoints they know, or the hash only?
(I guess this would be the validation process)

How do you handle serialization of all this many small packages?
Do you use protocol buffer or another queuing library?

Sorry for the many ?. But distributed apps are very fascinating (problems).

NxT: 13574045486980287597
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 08:42:47 PM
 #727

OK,  UDP seems really proper with low latency for what you are doing.
The message encryption is done by the publisher which is the POW part, right?
Than the publisher fan-out the message to all known endpoints and they store the hash only?
Do the nodes who receiving the message send them further to all endpoints they know, or the hash only?
(I guess this would be the validation process)

How do you handle serialization of all this many small packages?
Do you use protocol buffer or another queuing library?

Sorry for the many ?. But distributed apps are very fascinating (problems).

Message can be encrypted or in plaintext.
All nodes send the message, not the hash.
I didn't get the serialization of a packet part - all packets are serialized objects.
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 09:02:08 PM
 #728

 
... 
 
I didn't get the serialization of a packet part - all packets are serialized objects.

OK, that implies you use bytestream <=> Object conversion by JVM.
 

NxT: 13574045486980287597
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 09:07:29 PM
 #729


Message can be encrypted or in plaintext.
All nodes send the message, not the hash.
...

Does it means, all encrypted messages become encrypted again by receiving nodes
and than sent further?
(I try to get the POW part)

NxT: 13574045486980287597
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 09:14:40 PM
 #730

OK, that implies you use bytestream <=> Object conversion by JVM.

No, JVM is not involved, it's conversion of Iota objects.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 09:15:12 PM
 #731

Does it means, all encrypted messages become encrypted again by receiving nodes
and than sent further?
(I try to get the POW part)

No. Messages are retransmitted as is.
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 09:47:57 PM
 #732

OK, that implies you use bytestream <=> Object conversion by JVM.

No, JVM is not involved, it's conversion of Iota objects.

My assumption was that IOTA is in Java and you use java object serialization.
Could you give me a hint ;-)

NxT: 13574045486980287597
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 09:49:05 PM
 #733

Does it means, all encrypted messages become encrypted again by receiving nodes
and than sent further?
(I try to get the POW part)

No. Messages are retransmitted as is.

Is the POW concept explained in the paper?

NxT: 13574045486980287597
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 09:56:58 PM
 #734

My assumption was that IOTA is in Java and you use java object serialization.
Could you give me a hint ;-)

We use our own serialization, Iota works with trinary-based numbers.
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 09:57:17 PM
 #735

Is the POW concept explained in the paper?

No.
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 10:02:20 PM
 #736

My assumption was that IOTA is in Java and you use java object serialization.
Could you give me a hint ;-)

We use our own serialization, Iota works with trinary-based numbers.

OK, seems I need to be patient until the "Katze is aus dem Sack"
Thanks.

NxT: 13574045486980287597
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 10:05:10 PM
 #737

Is the POW concept explained in the paper?

No.

Phuu, seems I'm lucky not to go through all the math:)
Is the concept released anywhere or do I need to be patient?

NxT: 13574045486980287597
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 1652

Newbie


View Profile
November 20, 2015, 10:07:27 PM
 #738

Is the concept released anywhere or do I need to be patient?

Details will be known later.
smartwart
Full Member
***
Offline Offline

Activity: 170


View Profile
November 20, 2015, 10:14:27 PM
 #739

OK, many thanks!

NxT: 13574045486980287597
tolstoy
Member
**
Offline Offline

Activity: 89


View Profile
November 21, 2015, 04:20:11 AM
 #740

Loophole-free Bell test TU Delft crowns 80-years-old debate on nature of reality: Einsteins “spooky action” is real.
http://www.tudelft.nl/en/current/latest-news/article/detail/einsteins-ongelijk-delfts-experiment-beeindigt-80-jaar-oude-discussie/

Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 [37] 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 508 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!