Wiki source code of Networks

Version 57.1 by Zenna Elfen on 2026/01/05 20:29

Show last authors
1 (% class="jumbotron" %)
2 (((
3 (% class="container" %)
4 (((
5 = Building Blocks of P4P Networks =
6
7 Making a P4P network is a bit different than traditional communication networks, namely because we side-step the traditional confinement of the internet layers and connect in a variety of means, from bluetooth to sneakernet and beyond. This is of course very nice in a variety of circumstances and to read more about the principles and capabilities of P4P networks, see the [[about>>doc:P4P.WebHome]] page.
8
9 To fully assemble a P4P network one needs a few different building blocks, below is an overview of 15 of those building blocks. This outline of 15 building blocks has been collaboratively developed. If you see something missing or would like to give feedback, please reach out to Zenna. Now, let's dive into the building-blocks which make P4P protocols.  
10 )))
11 )))
12
13
14
15
16
17
18
19
20 (% class="row" %)
21 (((
22 (% class="col-xs-12 col-sm-8" %)
23 (((
24 == 15 Building Blocks of P4P Networks ==
25
26
27 ==== **1. Data Synchronization** ====
28
29 > Synchronization answers **how updates flow between peers** and how they determine what data to exchange. This layer is about **diffing, reconciliation, order, causality tracking, and efficient exchange**, not persistence or user-facing collaboration semantics.
30
31 * //How do peers detect differences and synchronize state?//
32 * Examples: Range-Based Set Reconciliation, RIBLT, Gossip-based sync, State-based vs op-based sync, Lamport/Vector/HLC clocks, Braid Protocol
33
34
35
36 ==== **2. Collaborative Data Structures & Conflict Resolution** ====
37
38 > This layer defines **how shared data evolves** when multiple peers edit concurrently. It focuses on **conflict-free merging, causality, and consistency of meaning**, not transport or storage. CRDTs ensure deterministic convergence, while event-sourced or stream-driven models maintain a history of all changes and derive consistent state from it.
39
40 * //How do peers collaboratively change shared data and merge conflicts?//
41 * Examples: CRDTs (Yjs, Automerge), OT, Event Sourcing, Stream Processing, Version Vectors, Peritext
42
43
44
45 ==== **3. Data Storage & Replication** ====
46
47 > This layer focuses on **durability, consistency, and redundancy**. It handles write-paths, crash-resilience, and replication semantics across nodes. It is the “database/storage engine” layer where **data lives and survives over time**, independent of sync or merging logic.
48
49 * //How is data persisted locally and replicated between peers?//
50 * Examples: SQLite, IndexedDB, LMDB, Hypercore (append-only logs), WALs, Merkle-DAGs (IPFS/IPLD), Blob/media storage
51
52
53
54 ==== **4. Peer & Content Discovery** ====
55
56 > Discovery occurs in two phases:
57 > 1. **Peer Discovery** → finding _any_ nodes
58 > 2. **Topic Discovery** → finding _relevant_ nodes or resources
59 > These mechanisms enable decentralized bootstrapping and interest-based overlays.
60
61 * //How do peers find each other, and how do they discover content in the network?//
62 * Examples: DHTs (Kademlia, Pastry), mDNS, DNS-SD, Bluetooth scanning, QR bootstrapping, static peer lists, Interest-based routing, PubSub discovery (libp2p), Rendezvous protocols
63
64
65
66 ==== **5. Identity & Trust** ====
67
68 > Identity systems ensure reliable mapping between peers and cryptographic keys. They underpin authorization, federated trust, and secure overlays.
69
70 * //How peers identify themselves, authenticate, and establish trustworthy relationships?//
71 * Examples: PKI, Distributed Identities (DIDs), Web-of-Trust, TOFU (SSH-style), Verifiable Credentials (VCs), Peer key fingerprints (libp2p PeerIDs), Key transparency logs
72
73
74
75 ==== **6. Transport Layer** ====
76
77 > This layer provides logical connections and flow control. QUIC and WebRTC bring modern congestion control and encryption defaults; Interpeer explores transport beyond IP assumptions.
78
79 * //How do peers establish end-to-end byte streams and reliable delivery?//
80 * Examples: TCP, UDP, QUIC, SCTP, WebRTC DataChannels, Interpeer transport stack
81
82
83
84 ==== **7. Underlying Transport (Physical/Link Layer)** ====
85
86 > Highly relevant for **offline-first / edge networks**, device-to-device communication, and mesh networks and relates to the hardware which facilitates connections.
87
88 * //How does data move across the medium?//
89 * Examples: Ethernet, Wi-Fi Direct / Wi-Fi Aware (post-AWDL), Bluetooth Mesh, LoRa, NFC, Cellular, CSMA/CA, TDMA, FHSS
90
91
92
93 ==== **8. Session & Connection Management** ====
94
95 > Manages **connection lifecycle**, including authentication handshakes, reconnection after drops, and session continuation—especially important in lossy or mobile networks.
96
97 * //How are connections initiated, authenticated, resumed, and kept alive?//
98 * Examples: TLS handshake semantics, Noise IK/XX patterns, session tokens, keep-alive heartbeats, reconnection strategies, session resumption tickets
99
100
101
102 ==== **9. Content Addressing** ====
103
104 > Content addressing ensures **immutability, verifiability, and deduplication**. Identity of data = cryptographic hash, enabling offline-first and tamper-evident systems.
105
106 * //How is data addressed and verified by content, not location?//
107 * Examples: IPFS CIDs, BitTorrent infohashes, Git hashes, SHA-256 addressing, Named Data Networking (NDN)
108
109
110
111 ==== **10. P2P Connectivity** ====
112
113 > Connectivity ensures peers bypass NATs/firewalls to reach each other. 
114
115 * //How can two peers connect directly across networks, firewalls, and NATs?//
116 * Examples: IPv6 direct, NAT Traversal, STUN, TURN, ICE (used in WebRTC), UDP hole punching, UPnP
117
118
119
120 ==== **11. Session & Connection Management** ====
121
122 > Manages **connection lifecycle**, including authentication handshakes, reconnection after drops, and session continuation.
123
124 * //How are connections initiated, authenticated, resumed, and kept alive?//
125 * Examples: TLS handshake semantics, Noise IK/XX patterns, session tokens, keep-alive heartbeats, reconnection strategies, session resumption tickets
126
127
128
129 ==== **12. Message Format & Serialization** ====
130
131 > Serialization ensures **portable data representation**, forward-compatible schemas, and efficient messaging. IPLD provides content-addressed structuring for P2P graph data.
132
133 * //How is data encoded, structured, and made interoperable between peers?//
134 * Examples: CBOR, Protocol Buffers, Cap’n Proto, JSON, ASN.1, IPLD schemas, Flatbuffers
135
136
137
138 ==== **13. File / Blob Synchronization** ====
139
140 > Bulk data syncing has **different trade-offs** than small collaborative state (chunking, deduplication, partial transfer, resume logic). Critical for media and archival P2P use-cases.
141
142 //How are large objects transferred and deduplicated efficiently across peers?//
143 Examples: BitTorrent chunking, IPFS block-store, NDN segments, rsync-style delta sync, ZFS send-receive, streaming blob transfers
144
145
146 ==== **14. Local Storage & Processing Primitives** ====
147
148 > Provides durable on-device state and local computation (event sourcing, materialization, compaction). Enables offline-first writes and deterministic replay.
149
150 * //How do nodes persist, index, and process data locally—without external servers?//
151 * Examples: RocksDB, LevelDB, SQLite, LMDB, local WALs/append-only logs, embedded stream processors (NATS Core JetStream mode, Actyx-like edge runtimes), Kafka-like libraries
152
153
154
155 ==== **15. Crash Resilience & Abortability** ====
156
157 > Ensures P2P apps don’t corrupt state on crashes. Tied to **local storage & stream-processing**, and critical in offline-first and distributed update pipelines. Abortability is the updated term for Atomicity as part of the ACID abbreviation.
158
159 * //How do nodes recover and maintain correctness under failure?//
160 * Examples: WALs, idempotent ops, partial log replay, transactional journaling, write fences
161
162
163
164
165 )))
166
167
168
169
170
171
172 (% class="col-xs-12 col-sm-4" %)
173 (((
174 {{box title="==== **Contents** ====
175
176 "}}
177 {{toc depth="5"/}}
178 {{/box}}
179 )))
180
181
182 (% class="col-xs-12 col-sm-12" %)
183 (((
184 == Distributed Network Types ==
185
186
187 [[Flowchart depicting distributed network variants, under development. Building on work from Z. Elfen, 2024: ~[~[https:~~~~/~~~~/doi.org/10.17613/naj7d-6g984~>~>https://doi.org/10.17613/naj7d-6g984~]~]>>image:P4P_Typology.png||alt="Flowchart depicting typologies of distributed networks, such as Friend-2-Friend, Grassroots Networks, Federated Networks, Local-First, P2P and P4P Networks" data-xwiki-image-style-alignment="center" height="649" width="639"]]
188
189
190
191 == Overview of P4P Networks ==
192
193 {{include reference="Projects.WebHome"/}}
194 )))
195
196
197
198
199
200
201
202 )))