Next Article in Journal
Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers
Next Article in Special Issue
Vehicular Delay-Tolerant Networks with Image Recognition-Based Adaptive Array Antenna for Winter Road Surveillance in Local Areas
Previous Article in Journal
Software Defined Wireless Mesh Network Flat Distribution Control Plane
Previous Article in Special Issue
Distributed Uniform Streaming Framework: An Elastic Fog Computing Platform for Event Stream Processing and Platform Transparency
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System †

1
Computer Science, State University of New York Polytechnic Institute, Utica, NY 13502, USA
2
Network and Computer Security, State University of New York Polytechnic Institute, Utica, NY 13502, USA
*
Author to whom correspondence should be addressed.
This paper is an extended version of Parameterized Pulsed Transaction Injection Computation Model and Performance Optimizer for IOTA-Tango published in 3PGCIC-2018.
Future Internet 2019, 11(8), 167; https://doi.org/10.3390/fi11080167
Submission received: 31 May 2019 / Revised: 28 June 2019 / Accepted: 23 July 2019 / Published: 27 July 2019

Abstract

:
Latency is a critical issue that impacts the performance of decentralized systems. Recently we designed various protocols to regulate the injection rate of unverified transactions into the system to improve system performance. Each of the protocols is designed to address issues related to some particular network traffic syndrome. In this work, we first provide the review of our prior protocols. We then provide a hybrid scheme that combines our transaction injection protocols and provides an optimal linear combination of the protocols based on the syndromes in the network. The goal is to speed up the verification process of systems that rely on only one single basic protocol. The underlying basic protocols are Periodic Injection of Transaction via Evaluation Corridor (PITEC), Probabilistic Injection of Transactions (PIT), and Adaptive Semi-synchronous Transaction Injection (ASTI).

1. Introduction

Distributed systems provide convenience for dealing with online activities. With some enhanced techniques, such as cryptography, they provide secure and scalable architectures with a wide applicability. One of the most prominent examples is the crypto-currency system. In recent years, distributed crypto-currency systems have provided an architecture that offers transparency and enables a communication ecosystem that generates billions of transactions. For instance, Internet of Things (IoT) Tangle [1] is one architecture that uses a distributed Directed Acyclic Graph (DAG) structure. However, distributed systems might suffer from the lack of synchronization in databases. To overcome this disadvantage, a semi-synchronous architecture IOTA-Tango was introduced in [2] based on the basic architecture of IOTA-Tangle.
Synchronicity is achieved when the transactions for validation are picked by the validators without ever being idle. The goal is to minimize the average waiting time for transactions without ignoring any transactions. It is important that the waiting time for an average transaction is minimized and no transaction is ignored. To ensure the system is synchronous with respect to the new transactions, an assignment mechanism was designed for scheduling those transactions to the verifiers with these following characteristics
  • transactions are seen across the underlying ledger system;
  • first come first serve mode is used to release the transactions to the verifiers before they are sent to the controller;
  • the placement order of transactions in Tango is decided by the controllers.
Adjacent steps (processes) must be mutually synchronous.
In this paper, a brief review of our prior work on efficient injection protocols is provided. The Periodic Injection of Transaction via Evaluation Corridor (PITEC) was first introduced in [2]. The Probabilistic Injection of Transactions (PIT) was introduced in [3]. In this work, Adaptive Semi-synchronous Transaction Injection (ASTI) and Hybrid Adaptive Injection (HAI) protocols are further introduced. The rest of the paper is organized as follows. The reviews on PITEC and PIT are provided at Section 3 and Section 4, respectively. A discussion on the ASTI protocol is at Section 5. For ASTI, the injection amount and the pulse period are used as the parameters for regulating the injection process. The hybrid protocol is introduced in Section 6 and finally, our conclusions are presented in Section 7.

2. Structure of Tango

Tango is a distributed ledger architecture that is similar to the Iota-tangle design as articulated in [1]. Transactions are released to a system for validation and subsequent affixation to Tango. The lifetime of a typical transaction has three types (1) unevaluated (2) evaluated, and (3) committed. Upon arriving to the system, the transactions are immediately visible to all the evaluators. In [2] the decentralized semi-synchronous pulse diffusion (DSPD) protocol was proposed to make the system more semi-synchronous. The DSPD protocol aims at providing a more synchronous arrival of transactions via scheduled injection. Interested readers can refer to that work.
While the transactions are inside the system awaiting verification, it is necessary to lower the latency of the system. PITEC, PIT and ASTI protocols help the controllers regulate injection of unevaluated transactions to the verifiers. The scheduling, both in terms of quantity and time, of the injections by the controllers determines how the system would reach stability (equilibrium). The injection/scheduling problems are quite similar to logistic problems in supply chain research [4,5].

3. PITEC Protocol

From the perspective of verification process, the major participants are controllers, Verifiers, and standby-ers. The depletion rate D is assumed to be constant in this protocol. The controllers regulate the traffic and are selected randomly among the participants. The user’s role changes as time evolves. The controllers regulate the traffic via periodically injecting unverified transactions to the verifiers. Associated with pulse period, T, there are a fixed cost A and a variable cost v per cycle. The fixed cost A is irrespective of the volume of injected transactions. The variable cost v is associated with exposing the transactions to any vulnerability. v is proportional to the time a transaction remains as a tentative before it joins the DAG as a leaf node. Let Q * be the cost-optimum volume of the total unverified transactions available at the beginning of each cycle. For a theoretical simulation purpose, the exponential smoothing approach is used. Exponential smoothing is a well-known technique for analysis of time-series data. It predicts the number of unverified transactions released into the system. Transactions that failed the verification or had to be returned represent at least an opportunity cost to the system. They must be reflected in the model.
The total cost, C, per unit time T is
C = A T + Q × v 2 ,
where 1 2 Q × T is the average volume of transactions vulnerable during the cycle. Since the total expected vulnerable time for Q transactions is ( 1 / 2 ) ( Q T ) , the expected total cost associated with vulnerability is ( 1 / 2 ) ( Q v T ) . Therefore, the total cost is
C t o t a l = A + 1 2 Q × v × T .
During the cycle time T and a fixed consumption rate D, the number of consumed transactions is Q = D × T . Therefore, the cost per unit time is
C = A × D Q + 1 2 Q × v .
This leads to
Q * = 2 A × D v , T = 2 A v × D .

4. PIT Protocol

For PIT [3], the expected depletion rate D is not constant. The rationale behind PIT is to resolve the shortage issue where PITEC might encounter. The core tasks to embed in the protocol design would be (1) the time to replenish and (2) the quantity of transactions to be replenished. Equilibrium finding within a cycle provides the solutions to the two tasks. To use the verifier resources, one must calibrate the optimum to replenish for the shortage scenarios. In PIT protocol, the randomization is invoked with a basic assumption. The basic assumption is that the expected average transaction validation rate is a stable constant, D, even though the underlying micro-level behavior is random as illustrated in Figure 1.
When a transaction level r is reached, this triggers the optimum level, Q * , of fresh transaction release. Let lead time, L, be the time it would take from the time level r is reached to the time fresh transactions are released. For this model, we have couple variable factors to consider. First L is random and is predicted by how fast controller could provide the supply. Second, the depletion rates at the evaluators are random. To simplify the analysis, PIT protocol assumes that each cycle is of fixed time length T. A typical layout of such a model may be found in [6] for inventory control system. The useful variables are summarized in Table 1.
With a fixed cycle time T, this immediately resolves the first task about when to replenish into the system. For the second task, what is left is how to predict the optimum pulsed batch size Q * . In this section, a sketch is provided. Interested readers should refer to the original article [3]. Let p ( y ) be a probability mass function that describes the random depletion of transactions. With probability p ( y ) , y is the number of transactions verified during the lead time T. The time movement profile of transactions and its random depletion rate is shown in Figure 2.
During the lead time L, let the average number of verified transactions be
M L = y = 0 p ( y ) y ,
and let the average volume of the unverified transactions be
1 2 ( r + y = 0 r ( r y ) p ( y ) ) .
The expected number of transactions available to the verifiers after a replenishment until the next reorder trigger is
1 2 ( ( r + Q M L ) transactions after replenishment + r transactions at reorder ) = ( 2 r + Q M L ) 2
Thus, between replenishment and reorder, the number of transactions consumed is
T r × D = ( Q + r M L ) r = Q M L ,
and it is known that
( T T r ) × D = M L .
During the lead time L, the expected number of deficient transactions is
y = r + 1 p ( y ) ( y r ) = S L .
while
y = 0 r p ( y ) ( r y ) = ( y = 0 y = r + 1 ) p ( y ) ( r y ) = r M L + S L ,
Let F be the transaction cost per cycle (with fixed and variable costs). Assume the unit shortage cost during L is c s . One can obtain
F = A + v 2 [ ( 2 r M L + Q ) T r + ( 2 r M L + S L ) ( T T r ) ] + c s × S L
from Equations (6), (7) and (11). The total cost per cycle per unit time is
C = A × D + c s × S L × D Q + v × M L 2 Q ( 2 r M L + S L ) + v 2 Q ( 2 r + Q M L ) ( Q M L )
because C = F / T , Q = D T and Equations (8) and (9). One can further rewrite Equation (13) as
C = A × D + c s × S L × D + v 2 × M L × S L Q + v × Q 2 + v ( r M L )
where Q * can be determined by solving d C d Q that
Q * = 2 A × D v ( 1 + c s × S L A + ( v 2 A × D ) M L × S L ) .

5. ASTI Protocol

The ASTI protocol [7] aims at predicting the injection volume based on past consumption records. It applies the technique smoothing factor, which is similar to reinforcement learning. One of the strategies ASTI uses is classifying transactions into various categories. For simplicity, let us assume it is transactions of θ type being processed while its corresponding batch size is q θ * and its periodicity is T θ * under the PITEC setting. Each class of transactions of type θ has its optimum performance that requires periodic injection of q θ * unverified transactions in every cycle.
Suppose the last cycle has a time lag of T l a s t while q l a s t transactions were injected in the last cycle. If the performance of the network remains the same as last cycle, one would need to adjust the injection volume that
q ( n e x t , θ ) = q ( l a s t , θ ) T θ * T ( l a s t , θ ) .
However, this is naive because one cannot simply predict the performance of the network based on only previous cycle that Equation (16) proposes. To consider effects from more earlier cycles for the performance prediction, one can do
q ^ ( n e x t , θ ) = γ q ( l a s t , θ ) T θ * T ( l a s t , θ ) + ( 1 γ ) q ^ ( l a s t , θ )
where 0 < γ < 1 with initial expectation value
q ^ ( l a s t , θ ) = q θ * , T ( l a s t , θ ) = T θ *
One can visualized the process as follows (Figure 3):
ASTI protocol can be further extended to multiple categories of transactions, based on the nature of the transactions. Some transactions might have more importance than others. This could be extended further as future work for another optimization scheme based on the importance of the types. Furthermore, initially when the unverified transactions are entered into the system, the representation of the system can be treated as a temporal graph. One can further improve the temporal graph by the Pregel-based approach in [8].

6. HAI Protocol

The previous three protocols are all under the same assumption of the system: a fixed cycle time T. In this section, it is assumed the system still uses a fixed cycle time T. If not, the system uses dynamic injection time where injection is triggered in the system upon the completion of the verification of the very last unverified transaction of the current batch. The system immediately injects another batch of a fixed number of unverified transactions into the system to be verified.
Under the fixed cycle time T constraint, let the optimal injection amount, based on its own scenario described in the protocol, be Q 1 for PITEC, Q 2 for PIT protocol and Q 3 for ASTI protocol. Denote the hybrid adaptive injection protocol (HAI). HAI injects Q 123 transactions into the system at the beginning of each cycle while the cycle time is T. The dynamics of PIT and ASTI are driven by the change of consumption rate D. The change of consumption rate can be identified with the existence of S L in PIT while it is via T θ * / T ( l a s t , θ ) in ASTI. For simplicity, let us simply use T / T l a s t for ASTI at the moment without specifying the transaction type. PIT immediately reacts to the unverified transaction shortage problem as it collapses to the PITEC instance when S L 0 . On the other hand, ASTI responds to both shortage problems and overflow problems (unfinished unverified transactions at the end of the cycle) as the volume of injection bundle is regulated by γ and T / T l a s t .
Considering the relation between Q 1 and Q 2 , one can interpolate between them via the ratio S L / M L . The ratio S L / M L indicates the severity of the shortage issue in PIT as indicated in Section 4. Similar to the smoothing factor technique, here the ratio works as a good smoothing factor that serves the purpose. Let the interpolated quantity be
Q 12 = ( 1 S L M L ) Q 1 + S L M L Q 2 .
This remedy has a quite strong reliance on the assumption that the consumption pattern in previous cycle will persist in the current cycle. One drawback is that Q 12 cannot reflect the scenario when there is an overflow issue in the system. It is necessary to incorporate the ASTI protocol. The key task is to identify the overflow indicator. It is clear that the ratio T / T l a s t can serve for that purpose. When 0 < T / T l a s t < 1 , it is an overflow issue. It is natural to inject significantly fewer transactions in order not to paralyze the system. For that reason, the PIT and the PITEC protocols should be avoided. Define the binary variable
δ = 0 if 0 < T / T l a s t < 1 , 1 if T / T l a s t 1 .
The HAI protocol will inject
Q 123 = ( δ ) ( ( 1 S L M L ) Q 1 + S L M L Q 2 ) + ( 1 δ ) Q 3
transactions to the system to be verified.

7. Conclusions

In this work, a brief introduction on the Tango system is given and reviews on PITEC, PIT, and ASTI protocols are provided. These protocols are designed for a fixed cycle time T of the system for scenarios with assumptions on the consumption speed. The three protocols vary in the assumption of the network ecosystem. PITEC assumes a constant consumption rate, while PIT takes a probabilistic approach while ASTI applies the smoothing factor technique (simple reinforcement learning) for prediction. Each protocol has its own assumptions regarding the traffic behavior of the network. Without assuming the condition of the consumption rate in the network, an HAI protocol is introduced. HAI is a linear combination of the three aforementioned protocols. Future work will involve the implementation of the hybrid model for obtaining the empirical data and fine tuning for finding a good smoothing factor γ .

Author Contributions

Conceptualization, S.S. and C.-F.C.; methodology, S.S. and C.-F.C.; validation, S.S. and C.-F.C.; formal analysis, S.S. and C.-F.C.; investigation, B.A., C.-F.C., S.S., J.N. and A.T.; writing—original draft preparation, C.-F.C.; writing—review and editing, S.S. and C.-F.C.; supervision, S.S.

Funding

This research received no external funding.

Acknowledgments

The authors gratefully acknowledge support from the State University of New York Polytechnic Institute.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PITECPeriodic Injection of Transactions via Evaluation Corridor
PITProbabilistic Injection of Transactions
ASTIAdaptive Sem-synchronous Transaction Injection
HAIHybrid Adaptive Injection

References

  1. Serguei Popov. The Tangle. Available online: https://www.iota.org/ (accessed on 23 July 2019).
  2. Andriamanalimanana, B.; Chiang, C.; Novillo, J.; Sengupta, S.; Tekeoglu, A. Tango: The Beginning—A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries. In Proceedings of the 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018. [Google Scholar]
  3. Andriamanalimanana, B.; Chiang, C.; Novillo, J.; Sengupta, S.; Tekeoglu, A. A Probabilistic Model of Periodic Pulsed Transaction Injection. In Proceedings of the 2nd Cyber Security in Networking Conference (CSNet), Paris, France, 24–26 October 2018. [Google Scholar]
  4. Christopher, M. Logistics & Supply Chain Management; Pearson: London, UK, 2016. [Google Scholar]
  5. Mangan, J.; Lalwani, C.; Lalwani, C. Global Logistics and Supply Chain Management; Wiley: Hoboken, NJ, USA, 2016. [Google Scholar]
  6. Karteek, P.; Jyoti, K. Deterministic and Probabilistic Models in Inventory Control; IJEDR: Visakhapatman, India, 2014; Volume 2. [Google Scholar]
  7. Andriamanalimanana, B.; Chiang, C.; Novillo, J.; Sengupta, S.; Tekeoglu, A. Parameterized Pulsed Transaction Injection Computation Model and Performance Optimizer for IOTA-Tango. In Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Taichung, Taiwan, 27–29 October 2018; Springer: Cham, Switzerland, 2018. [Google Scholar]
  8. Steinbauer, M.; Anderst-Kotsis, G. DynamoGraph: Extending the Pregel Paradigm for Large-scale Temporal Graph Processing. Int. J. Grid Util. Comput. 2016, 7, 141–151. [Google Scholar] [CrossRef]
Figure 1. Q on the Y axis is the number of transactions to be verified while X axis is the time. T represents the time for a cycle. D is the mean depletion rate (the dashed line) of random rates. When less than r transactions left unconsumed, the trigger is activated.
Figure 1. Q on the Y axis is the number of transactions to be verified while X axis is the time. T represents the time for a cycle. D is the mean depletion rate (the dashed line) of random rates. When less than r transactions left unconsumed, the trigger is activated.
Futureinternet 11 00167 g001
Figure 2. Q on the Y axis is the number of transactions to be verified while X axis is the time. T represents the time for a cycle. T r is the trigger time when r transactions are left unconsumed. The second plot shows a shortage situation. M L is the average consumption during L where T r + L = T .
Figure 2. Q on the Y axis is the number of transactions to be verified while X axis is the time. T represents the time for a cycle. T r is the trigger time when r transactions are left unconsumed. The second plot shows a shortage situation. M L is the average consumption during L where T r + L = T .
Futureinternet 11 00167 g002
Figure 3. The ASTI process: smoothing factor based.
Figure 3. The ASTI process: smoothing factor based.
Futureinternet 11 00167 g003
Table 1. Variables.
Table 1. Variables.
Variable Description
AFixed cost per cycle
CCost per cycle per unit time
FCost per cycle
LLead time: time elapsed between reorder and replenishment
M L Average volume of verified transactions during L
Q * Optimum batch size
QOptimum batch size level
S L Expected number of shortage transactions
TTime length of a cycle
T r Time elapsed between replenishment and reorder
c s Unit shortage cost during lead time
rTrigger threshold
vCost of carrying released but unverified transactions to next cycle per transaction per unit time

Share and Cite

MDPI and ACS Style

Sengupta, S.; Chiang, C.-F.; Andriamanalimanana, B.; Novillo, J.; Tekeoglu, A. A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System. Future Internet 2019, 11, 167. https://doi.org/10.3390/fi11080167

AMA Style

Sengupta S, Chiang C-F, Andriamanalimanana B, Novillo J, Tekeoglu A. A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System. Future Internet. 2019; 11(8):167. https://doi.org/10.3390/fi11080167

Chicago/Turabian Style

Sengupta, Saumendra, Chen-Fu Chiang, Bruno Andriamanalimanana, Jorge Novillo, and Ali Tekeoglu. 2019. "A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System" Future Internet 11, no. 8: 167. https://doi.org/10.3390/fi11080167

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop