Wiki source code of Networks

Version 57.1 by Zenna Elfen on 2026/01/05 20:29

Hide last authors
Zenna Elfen 51.1 1 (% class="jumbotron" %)
2 (((
3 (% class="container" %)
4 (((
5 = Building Blocks of P4P Networks =
Zenna Elfen 52.1 6
Zenna Elfen 57.1 7 Making a P4P network is a bit different than traditional communication networks, namely because we side-step the traditional confinement of the internet layers and connect in a variety of means, from bluetooth to sneakernet and beyond. This is of course very nice in a variety of circumstances and to read more about the principles and capabilities of P4P networks, see the [[about>>doc:P4P.WebHome]] page.
Zenna Elfen 19.1 8
Zenna Elfen 56.1 9 To fully assemble a P4P network one needs a few different building blocks, below is an overview of 15 of those building blocks. This outline of 15 building blocks has been collaboratively developed. If you see something missing or would like to give feedback, please reach out to Zenna. Now, let's dive into the building-blocks which make P4P protocols.  
Zenna Elfen 51.1 10 )))
11 )))
Zenna Elfen 27.1 12
Zenna Elfen 51.1 13
Zenna Elfen 27.1 14
15
Zenna Elfen 56.1 16
17
Zenna Elfen 57.1 18
19
Zenna Elfen 47.1 20 (% class="row" %)
21 (((
Zenna Elfen 43.1 22 (% class="col-xs-12 col-sm-8" %)
Zenna Elfen 37.1 23 (((
Zenna Elfen 52.1 24 == 15 Building Blocks of P4P Networks ==
25
Zenna Elfen 53.1 26
Zenna Elfen 15.1 27 ==== **1. Data Synchronization** ====
Zenna Elfen 11.1 28
Zenna Elfen 13.1 29 > Synchronization answers **how updates flow between peers** and how they determine what data to exchange. This layer is about **diffing, reconciliation, order, causality tracking, and efficient exchange**, not persistence or user-facing collaboration semantics.
Zenna Elfen 11.1 30
Zenna Elfen 15.1 31 * //How do peers detect differences and synchronize state?//
32 * Examples: Range-Based Set Reconciliation, RIBLT, Gossip-based sync, State-based vs op-based sync, Lamport/Vector/HLC clocks, Braid Protocol
Zenna Elfen 11.1 33
34
35
Zenna Elfen 15.1 36 ==== **2. Collaborative Data Structures & Conflict Resolution** ====
Zenna Elfen 11.1 37
Zenna Elfen 13.1 38 > This layer defines **how shared data evolves** when multiple peers edit concurrently. It focuses on **conflict-free merging, causality, and consistency of meaning**, not transport or storage. CRDTs ensure deterministic convergence, while event-sourced or stream-driven models maintain a history of all changes and derive consistent state from it.
39
Zenna Elfen 15.1 40 * //How do peers collaboratively change shared data and merge conflicts?//
41 * Examples: CRDTs (Yjs, Automerge), OT, Event Sourcing, Stream Processing, Version Vectors, Peritext
Zenna Elfen 13.1 42
43
44
Zenna Elfen 15.1 45 ==== **3. Data Storage & Replication** ====
Zenna Elfen 13.1 46
47 > This layer focuses on **durability, consistency, and redundancy**. It handles write-paths, crash-resilience, and replication semantics across nodes. It is the “database/storage engine” layer where **data lives and survives over time**, independent of sync or merging logic.
48
Zenna Elfen 15.1 49 * //How is data persisted locally and replicated between peers?//
50 * Examples: SQLite, IndexedDB, LMDB, Hypercore (append-only logs), WALs, Merkle-DAGs (IPFS/IPLD), Blob/media storage
Zenna Elfen 13.1 51
52
53
Zenna Elfen 15.1 54 ==== **4. Peer & Content Discovery** ====
55
Zenna Elfen 13.1 56 > Discovery occurs in two phases:
57 > 1. **Peer Discovery** → finding _any_ nodes
58 > 2. **Topic Discovery** → finding _relevant_ nodes or resources
59 > These mechanisms enable decentralized bootstrapping and interest-based overlays.
60
Zenna Elfen 15.1 61 * //How do peers find each other, and how do they discover content in the network?//
62 * Examples: DHTs (Kademlia, Pastry), mDNS, DNS-SD, Bluetooth scanning, QR bootstrapping, static peer lists, Interest-based routing, PubSub discovery (libp2p), Rendezvous protocols
Zenna Elfen 13.1 63
64
65
Zenna Elfen 15.1 66 ==== **5. Identity & Trust** ====
Zenna Elfen 13.1 67
68 > Identity systems ensure reliable mapping between peers and cryptographic keys. They underpin authorization, federated trust, and secure overlays.
69
Zenna Elfen 15.1 70 * //How peers identify themselves, authenticate, and establish trustworthy relationships?//
71 * Examples: PKI, Distributed Identities (DIDs), Web-of-Trust, TOFU (SSH-style), Verifiable Credentials (VCs), Peer key fingerprints (libp2p PeerIDs), Key transparency logs
Zenna Elfen 13.1 72
73
Zenna Elfen 16.1 74
Zenna Elfen 15.1 75 ==== **6. Transport Layer** ====
Zenna Elfen 13.1 76
Zenna Elfen 15.1 77 > This layer provides logical connections and flow control. QUIC and WebRTC bring modern congestion control and encryption defaults; Interpeer explores transport beyond IP assumptions.
Zenna Elfen 13.1 78
Zenna Elfen 16.1 79 * //How do peers establish end-to-end byte streams and reliable delivery?//
Zenna Elfen 15.1 80 * Examples: TCP, UDP, QUIC, SCTP, WebRTC DataChannels, Interpeer transport stack
Zenna Elfen 13.1 81
82
Zenna Elfen 16.1 83
Zenna Elfen 15.1 84 ==== **7. Underlying Transport (Physical/Link Layer)** ====
85
86 > Highly relevant for **offline-first / edge networks**, device-to-device communication, and mesh networks and relates to the hardware which facilitates connections.
87
Zenna Elfen 16.1 88 * //How does data move across the medium?//
Zenna Elfen 15.1 89 * Examples: Ethernet, Wi-Fi Direct / Wi-Fi Aware (post-AWDL), Bluetooth Mesh, LoRa, NFC, Cellular, CSMA/CA, TDMA, FHSS
90
Zenna Elfen 16.1 91
92
Zenna Elfen 15.1 93 ==== **8. Session & Connection Management** ====
94
95 > Manages **connection lifecycle**, including authentication handshakes, reconnection after drops, and session continuation—especially important in lossy or mobile networks.
96
Zenna Elfen 16.1 97 * //How are connections initiated, authenticated, resumed, and kept alive?//
Zenna Elfen 15.1 98 * Examples: TLS handshake semantics, Noise IK/XX patterns, session tokens, keep-alive heartbeats, reconnection strategies, session resumption tickets
99
100
Zenna Elfen 16.1 101
Zenna Elfen 15.1 102 ==== **9. Content Addressing** ====
103
104 > Content addressing ensures **immutability, verifiability, and deduplication**. Identity of data = cryptographic hash, enabling offline-first and tamper-evident systems.
105
Zenna Elfen 16.1 106 * //How is data addressed and verified by content, not location?//
Zenna Elfen 15.1 107 * Examples: IPFS CIDs, BitTorrent infohashes, Git hashes, SHA-256 addressing, Named Data Networking (NDN)
108
Zenna Elfen 16.1 109
110
Zenna Elfen 15.1 111 ==== **10. P2P Connectivity** ====
112
Zenna Elfen 16.1 113 > Connectivity ensures peers bypass NATs/firewalls to reach each other. 
Zenna Elfen 15.1 114
Zenna Elfen 16.1 115 * //How can two peers connect directly across networks, firewalls, and NATs?//
Zenna Elfen 15.1 116 * Examples: IPv6 direct, NAT Traversal, STUN, TURN, ICE (used in WebRTC), UDP hole punching, UPnP
117
Zenna Elfen 16.1 118
119
Zenna Elfen 15.1 120 ==== **11. Session & Connection Management** ====
121
122 > Manages **connection lifecycle**, including authentication handshakes, reconnection after drops, and session continuation.
123
Zenna Elfen 16.1 124 * //How are connections initiated, authenticated, resumed, and kept alive?//
Zenna Elfen 15.1 125 * Examples: TLS handshake semantics, Noise IK/XX patterns, session tokens, keep-alive heartbeats, reconnection strategies, session resumption tickets
126
Zenna Elfen 16.1 127
128
Zenna Elfen 15.1 129 ==== **12. Message Format & Serialization** ====
130
131 > Serialization ensures **portable data representation**, forward-compatible schemas, and efficient messaging. IPLD provides content-addressed structuring for P2P graph data.
132
Zenna Elfen 16.1 133 * //How is data encoded, structured, and made interoperable between peers?//
Zenna Elfen 15.1 134 * Examples: CBOR, Protocol Buffers, Cap’n Proto, JSON, ASN.1, IPLD schemas, Flatbuffers
135
Zenna Elfen 16.1 136
137
Zenna Elfen 15.1 138 ==== **13. File / Blob Synchronization** ====
139
140 > Bulk data syncing has **different trade-offs** than small collaborative state (chunking, deduplication, partial transfer, resume logic). Critical for media and archival P2P use-cases.
141
Zenna Elfen 16.1 142 //How are large objects transferred and deduplicated efficiently across peers?//
Zenna Elfen 15.1 143 Examples: BitTorrent chunking, IPFS block-store, NDN segments, rsync-style delta sync, ZFS send-receive, streaming blob transfers
144
Zenna Elfen 16.1 145
Zenna Elfen 15.1 146 ==== **14. Local Storage & Processing Primitives** ====
147
148 > Provides durable on-device state and local computation (event sourcing, materialization, compaction). Enables offline-first writes and deterministic replay.
149
Zenna Elfen 16.1 150 * //How do nodes persist, index, and process data locally—without external servers?//
Zenna Elfen 15.1 151 * Examples: RocksDB, LevelDB, SQLite, LMDB, local WALs/append-only logs, embedded stream processors (NATS Core JetStream mode, Actyx-like edge runtimes), Kafka-like libraries
152
153
Zenna Elfen 16.1 154
Zenna Elfen 15.1 155 ==== **15. Crash Resilience & Abortability** ====
156
157 > Ensures P2P apps don’t corrupt state on crashes. Tied to **local storage & stream-processing**, and critical in offline-first and distributed update pipelines. Abortability is the updated term for Atomicity as part of the ACID abbreviation.
158
Zenna Elfen 16.1 159 * //How do nodes recover and maintain correctness under failure?//
Zenna Elfen 15.1 160 * Examples: WALs, idempotent ops, partial log replay, transactional journaling, write fences
161
162
163
Zenna Elfen 49.1 164
Zenna Elfen 48.1 165 )))
Zenna Elfen 15.1 166
Zenna Elfen 11.1 167
Zenna Elfen 49.1 168
Zenna Elfen 55.1 169
Zenna Elfen 56.1 170
Zenna Elfen 57.1 171
Zenna Elfen 46.1 172 (% class="col-xs-12 col-sm-4" %)
173 (((
Zenna Elfen 57.1 174 {{box title="==== **Contents** ====
Zenna Elfen 56.1 175
176 "}}
Zenna Elfen 46.1 177 {{toc depth="5"/}}
178 {{/box}}
179 )))
180
Zenna Elfen 48.1 181
Zenna Elfen 47.1 182 (% class="col-xs-12 col-sm-12" %)
183 (((
Zenna Elfen 48.1 184 == Distributed Network Types ==
185
186
187 [[Flowchart depicting distributed network variants, under development. Building on work from Z. Elfen, 2024: ~[~[https:~~~~/~~~~/doi.org/10.17613/naj7d-6g984~>~>https://doi.org/10.17613/naj7d-6g984~]~]>>image:P4P_Typology.png||alt="Flowchart depicting typologies of distributed networks, such as Friend-2-Friend, Grassroots Networks, Federated Networks, Local-First, P2P and P4P Networks" data-xwiki-image-style-alignment="center" height="649" width="639"]]
188
189
Zenna Elfen 49.1 190
Zenna Elfen 35.1 191 == Overview of P4P Networks ==
192
193 {{include reference="Projects.WebHome"/}}
Zenna Elfen 47.1 194 )))
Zenna Elfen 11.1 195
196
Zenna Elfen 32.1 197
Zenna Elfen 33.1 198
Zenna Elfen 34.1 199
Zenna Elfen 48.1 200
Zenna Elfen 47.1 201
202 )))