SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Course Name: Computer Networking – Class of 2006
Professor: Dr. Gertrude Levine

Name: Chaudhry Siddharth
Email: siddchaudhry@fdu.edu

Sub: Regarding the Byzantine General Problem
---------------------------------------------------------------------------------

  Reliable computer system must be able to deal with failure of one or
more of its components. Whenever a failed component exhibits a
type of behavior it is generally referred as Byzantine General
Problem. This type of behavior is often overlooked and involves
mainly sending conflicting information to different parts of system.

This research was supported in part by NASA and the Army
Research office and Ballistic Missile Defense.

Basic Goals of BGP

      1) All loyal generals decide on same plan of action
      2) A small number of traitors cannot cause a bad plan to be
         adopted.

To satisfy condition first all general use the same method of combing
information to come up with a plan.

Consider the formal definition with an army example

Assume that we have one commanding general and his subordinate
generals

Conditions to be assumed

 All loyal subordinate generals obey the same order.
 If the commanding general is loyal then every subordinate general
follows the order.
Problem
1) Oral message can be easily changed.
2) No Solution works unless more than 2/3rd of general are loyal
3) Even with 3 generals one traitor makes the protocol fail.

Understanding the Problem through Figures.
Solution for Oral Messages
We have assume the following conditions for Oral Messaging:

1) Every message which is sent is delivered correctly.

 We assume that traitor is not capable to interfere communication
between two generals

2) Receiver has knowledge of who have sent the message.

Traitors are not capable to confuse the message by sending extra
message

3) Absence can be detected

 Default message is “Retreat”

The ALGORITHM for Oral message is as follows:
What if we are not fully connected?




What are Practical Implications of this algorithm?
The Conclusion is as Follows




 Reference:

“http://homes.cerias.purdue.edu/~crisn/courses/cs590T/cs590T_lect4
_byzantine_generals.pdf”

Mais conteúdo relacionado

Semelhante a Byzantine General Problem - Siddharth Chaudhry

Chapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.pptChapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.pptHabib246314
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...IJTET Journal
 
Essay On Chaos Engineering
Essay On Chaos EngineeringEssay On Chaos Engineering
Essay On Chaos EngineeringChristina Berger
 
Data Communication Assignment
Data Communication AssignmentData Communication Assignment
Data Communication Assignmentashikul akash
 
fault tolerance1.pptx
fault tolerance1.pptxfault tolerance1.pptx
fault tolerance1.pptxrithika858339
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemAlexander Decker
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446IJRAT
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zonesvishnuRajan20
 
Fault tolerance review by tsegabrehan zerihun
Fault tolerance review by tsegabrehan zerihunFault tolerance review by tsegabrehan zerihun
Fault tolerance review by tsegabrehan zerihunTsegabrehan Am
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDijsc
 
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id  Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id ijsc
 
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Govt. P.G. College Dharamshala
 

Semelhante a Byzantine General Problem - Siddharth Chaudhry (20)

Chapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.pptChapter 7-Fault Tolerance.ppt
Chapter 7-Fault Tolerance.ppt
 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
 
Unit_4_Fault_Tolerance.pptx
Unit_4_Fault_Tolerance.pptxUnit_4_Fault_Tolerance.pptx
Unit_4_Fault_Tolerance.pptx
 
Adidrds
AdidrdsAdidrds
Adidrds
 
Swarming drones
Swarming dronesSwarming drones
Swarming drones
 
Essay On Chaos Engineering
Essay On Chaos EngineeringEssay On Chaos Engineering
Essay On Chaos Engineering
 
Data Communication Assignment
Data Communication AssignmentData Communication Assignment
Data Communication Assignment
 
fault tolerance1.pptx
fault tolerance1.pptxfault tolerance1.pptx
fault tolerance1.pptx
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Byzantine
ByzantineByzantine
Byzantine
 
Fault tolerance review by tsegabrehan zerihun
Fault tolerance review by tsegabrehan zerihunFault tolerance review by tsegabrehan zerihun
Fault tolerance review by tsegabrehan zerihun
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
 
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id  Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
Privacy Enhancement of Node in Opportunistic Network by Using Virtual-Id
 
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...
 
Dos unit 2
Dos unit 2Dos unit 2
Dos unit 2
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
G011123539
G011123539G011123539
G011123539
 

Último

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Último (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Byzantine General Problem - Siddharth Chaudhry

  • 1. Course Name: Computer Networking – Class of 2006 Professor: Dr. Gertrude Levine Name: Chaudhry Siddharth Email: siddchaudhry@fdu.edu Sub: Regarding the Byzantine General Problem --------------------------------------------------------------------------------- Reliable computer system must be able to deal with failure of one or more of its components. Whenever a failed component exhibits a type of behavior it is generally referred as Byzantine General Problem. This type of behavior is often overlooked and involves mainly sending conflicting information to different parts of system. This research was supported in part by NASA and the Army Research office and Ballistic Missile Defense. Basic Goals of BGP 1) All loyal generals decide on same plan of action 2) A small number of traitors cannot cause a bad plan to be adopted. To satisfy condition first all general use the same method of combing information to come up with a plan. Consider the formal definition with an army example Assume that we have one commanding general and his subordinate generals Conditions to be assumed All loyal subordinate generals obey the same order. If the commanding general is loyal then every subordinate general follows the order.
  • 2. Problem 1) Oral message can be easily changed. 2) No Solution works unless more than 2/3rd of general are loyal 3) Even with 3 generals one traitor makes the protocol fail. Understanding the Problem through Figures.
  • 3. Solution for Oral Messages
  • 4. We have assume the following conditions for Oral Messaging: 1) Every message which is sent is delivered correctly. We assume that traitor is not capable to interfere communication between two generals 2) Receiver has knowledge of who have sent the message. Traitors are not capable to confuse the message by sending extra message 3) Absence can be detected Default message is “Retreat” The ALGORITHM for Oral message is as follows:
  • 5. What if we are not fully connected? What are Practical Implications of this algorithm?
  • 6. The Conclusion is as Follows Reference: “http://homes.cerias.purdue.edu/~crisn/courses/cs590T/cs590T_lect4 _byzantine_generals.pdf”