SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Course Name: Computer Networking – Class of 2006
Professor: Dr. Gertrude Levine

Name: Chaudhry Siddharth
Email: siddchaudhry@fdu.edu

Sub: Regarding the Byzantine General Problem
---------------------------------------------------------------------------------

  Reliable computer system must be able to deal with failure of one or
more of its components. Whenever a failed component exhibits a
type of behavior it is generally referred as Byzantine General
Problem. This type of behavior is often overlooked and involves
mainly sending conflicting information to different parts of system.

This research was supported in part by NASA and the Army
Research office and Ballistic Missile Defense.

Basic Goals of BGP

      1) All loyal generals decide on same plan of action
      2) A small number of traitors cannot cause a bad plan to be
         adopted.

To satisfy condition first all general use the same method of combing
information to come up with a plan.

Consider the formal definition with an army example

Assume that we have one commanding general and his subordinate
generals

Conditions to be assumed

 All loyal subordinate generals obey the same order.
 If the commanding general is loyal then every subordinate general
follows the order.
Problem
1) Oral message can be easily changed.
2) No Solution works unless more than 2/3rd of general are loyal
3) Even with 3 generals one traitor makes the protocol fail.

Understanding the Problem through Figures.
Solution for Oral Messages
We have assume the following conditions for Oral Messaging:

1) Every message which is sent is delivered correctly.

 We assume that traitor is not capable to interfere communication
between two generals

2) Receiver has knowledge of who have sent the message.

Traitors are not capable to confuse the message by sending extra
message

3) Absence can be detected

 Default message is “Retreat”

The ALGORITHM for Oral message is as follows:
What if we are not fully connected?




What are Practical Implications of this algorithm?
The Conclusion is as Follows




 Reference:

“http://homes.cerias.purdue.edu/~crisn/courses/cs590T/cs590T_lect4
_byzantine_generals.pdf”

Contenu connexe

Similaire à Byzantine General Problem - Siddharth Chaudhry

Chapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.pptChapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.ppt
Habib246314
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
IJRAT
 

Similaire à Byzantine General Problem - Siddharth Chaudhry (20)

Chapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.pptChapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.ppt
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
 
Unit_4_Fault_Tolerance.pptx
Unit_4_Fault_Tolerance.pptxUnit_4_Fault_Tolerance.pptx
Unit_4_Fault_Tolerance.pptx
 
Adidrds
AdidrdsAdidrds
Adidrds
 
Swarming drones
Swarming dronesSwarming drones
Swarming drones
 
Essay On Chaos Engineering
Essay On Chaos EngineeringEssay On Chaos Engineering
Essay On Chaos Engineering
 
Data Communication Assignment
Data Communication AssignmentData Communication Assignment
Data Communication Assignment
 
fault tolerance1.pptx
fault tolerance1.pptxfault tolerance1.pptx
fault tolerance1.pptx
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Byzantine
ByzantineByzantine
Byzantine
 
Fault tolerance review by tsegabrehan zerihun
Fault tolerance review by tsegabrehan zerihunFault tolerance review by tsegabrehan zerihun
Fault tolerance review by tsegabrehan zerihun
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
 
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id  Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
 
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...
 
Dos unit 2
Dos unit 2Dos unit 2
Dos unit 2
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
G011123539
G011123539G011123539
G011123539
 

Dernier

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Dernier (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Byzantine General Problem - Siddharth Chaudhry

  • 1. Course Name: Computer Networking – Class of 2006 Professor: Dr. Gertrude Levine Name: Chaudhry Siddharth Email: siddchaudhry@fdu.edu Sub: Regarding the Byzantine General Problem --------------------------------------------------------------------------------- Reliable computer system must be able to deal with failure of one or more of its components. Whenever a failed component exhibits a type of behavior it is generally referred as Byzantine General Problem. This type of behavior is often overlooked and involves mainly sending conflicting information to different parts of system. This research was supported in part by NASA and the Army Research office and Ballistic Missile Defense. Basic Goals of BGP 1) All loyal generals decide on same plan of action 2) A small number of traitors cannot cause a bad plan to be adopted. To satisfy condition first all general use the same method of combing information to come up with a plan. Consider the formal definition with an army example Assume that we have one commanding general and his subordinate generals Conditions to be assumed All loyal subordinate generals obey the same order. If the commanding general is loyal then every subordinate general follows the order.
  • 2. Problem 1) Oral message can be easily changed. 2) No Solution works unless more than 2/3rd of general are loyal 3) Even with 3 generals one traitor makes the protocol fail. Understanding the Problem through Figures.
  • 3. Solution for Oral Messages
  • 4. We have assume the following conditions for Oral Messaging: 1) Every message which is sent is delivered correctly. We assume that traitor is not capable to interfere communication between two generals 2) Receiver has knowledge of who have sent the message. Traitors are not capable to confuse the message by sending extra message 3) Absence can be detected Default message is “Retreat” The ALGORITHM for Oral message is as follows:
  • 5. What if we are not fully connected? What are Practical Implications of this algorithm?
  • 6. The Conclusion is as Follows Reference: “http://homes.cerias.purdue.edu/~crisn/courses/cs590T/cs590T_lect4 _byzantine_generals.pdf”