Distributed Systems Making Byzantine Fault-Tolerant Systems - - PowerPoint PPT Presentation

distributed systems
SMART_READER_LITE
LIVE PREVIEW

Distributed Systems Making Byzantine Fault-Tolerant Systems - - PowerPoint PPT Presentation

Distributed Systems Making Byzantine Fault-Tolerant Systems Tolerate Byzantine Faults Hubert Jaworski Byzantine system Copies of critical components Concurent replicas Response agreement Omission failure proof Robustness


slide-1
SLIDE 1

Making Byzantine Fault-Tolerant Systems Tolerate Byzantine Faults

Hubert Jaworski

Distributed Systems

slide-2
SLIDE 2

Byzantine system

 Copies of critical components  Concurent replicas  Response agreement  Omission failure proof  Robustness

slide-3
SLIDE 3

Byzantine failure

 Incorrectly working components  State corruption  Inconsistent responses

slide-4
SLIDE 4

Byzantine fault tolerance

replication systems:

 PBFT  Q/U  HQ  Zyzzyva  Aardvark

slide-5
SLIDE 5

Basic concept

 Accepting requests by primary  Broadcasting requests to replicas  Processing request by replicas  Replica-to-replica communication  Replying to client  Reaching consensus

slide-6
SLIDE 6

PBFT

 Practical Byzantine Fault Tolerance  Optimized gracious execution path  Message authentication codes  3-round quorum-based  Consensus over 3f+1 replicas

slide-7
SLIDE 7

Connection concept example

slide-8
SLIDE 8

PBFT communication patern

slide-9
SLIDE 9

Q/U

 Conflict-free Quorum-based BFT Protocol  Query/Update  Single-round quorum-based  Requires 5f + 1 replicas  Carefully optimized  Requires a significantly lower number of

messages

 No primary replica

slide-10
SLIDE 10

HQ

 Two-round quorum protocol  Requires 3f + 1 replicas  Quorum of 2f + 1  Better at resolving concurrency conflicts  No primary replica

slide-11
SLIDE 11

Zyzzyva

 Speculative Byzantine Fault Tolerance  3f+1 total replicas, 2f+1 replicas with state  MAC authentication  Agreement, view change, checkpoint

protocols

slide-12
SLIDE 12

Aardvark

 Robust BFT  Requires 3f+1 replicas  Gracious and uncivil executions  Traded some performace for robustness  Client-side signature generation  hybrid MAC-signature construct  separate network interface controllers  Regular view changes

slide-13
SLIDE 13

Aardvark

 Blacklisting  Caching responses  Round-robin client-based request scheduler 

slide-14
SLIDE 14

Efficiency

slide-15
SLIDE 15

Verifying client request

slide-16
SLIDE 16

Message from replica

slide-17
SLIDE 17

Faulty client

slide-18
SLIDE 18

Faulty replica

slide-19
SLIDE 19

Faulty primary

slide-20
SLIDE 20

The End

Thank you for your time