skip to main content
research-article

Healthor: Heterogeneity-aware Flow Control in DLTs to Increase Performance and Decentralization

Published: 10 December 2022 Publication History

Abstract

Permissionless reputation-based distributed ledger technologies (DLTs) have been proposed to overcome blockchains’ shortcomings in terms of performance and scalability, and to enable feeless messages to power the machine-to-machine economy. These DLTs allow machines with widely heterogeneous capabilities to actively participate in message generation and consensus. However, the open nature of such DLTs can lead to the centralization of decision-making power, thus defeating the purpose of building a decentralized network.
In this article, we introduce Healthor, a novel heterogeneity-aware flow-control mechanism for permissionless reputation-based DLTs. Healthor formalizes node heterogeneity by defining a health value as a function of its incoming message queue occupancy. We show that health signals can be used effectively by neighboring nodes to dynamically flow control messages while maintaining high decentralization. We perform extensive simulations, and show a 23% increase in throughput, a 76% decrease in latency and four times increased node participation in consensus compared to state-of-the-art. To the best of our knowledge, Healthor is the first system to systematically explore the ramifications of heterogeneity on DLTs and proposes a dynamic, heterogeneity-aware flow control. Healthor’s source code (https://github.com/jonastheis/healthor) and simulation result data set (https://zenodo.org/record/4573698) are both publicly available.

References

[1]
Mohammad Alizadeh, Albert Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, and Murari Sridharan. 2010. Data center TCP (DCTCP). In Proceedings of the ACM SIGCOMM 2010 Conference.Association for Computing Machinery, New Delhi, India, 63–74. DOI:
[2]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference.Association for Computing Machinery, New York, NY. DOI:
[3]
Stephanos Androutsellis-Theotokis and Diomidis Spinellis. 2004. A survey of peer-to-peer content distribution technologies. Computing Surveys 36, 4 (2004), 335–371. 2050+DOI:
[4]
Venkat Arun and Hari Balakrishnan. 2018. Copa: Practical delay-based congestion control for the Internet. In Proceedings of the Applied Networking Research Workshop. ACM, Montreal QC Canada, 19–19. DOI:
[5]
Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, and Abdellatif Mezrioui. 2022. SOK: A comprehensive survey on distributed ledger technologies. In Proceedings of the ICBC 2022 : IEEE International Conference on Blockchain and Cryptocurrency. IEEE, Shanghai, China, 1–16. Retrieved from https://hal.archives-ouvertes.fr/hal-03609651.
[6]
Marianna Belotti, Nikola Bozic, Guy Pujolle, and Stefano Secci. 2019. A vademecum on blockchain technologies: When, which, and how. IEEE Communications Surveys and Tutorials 21, 4 (2019), 3796–3838. DOI:
[7]
Federico Matteo Bencic and Ivana Podnar Zarko. 2018. Distributed ledger technology: Blockchain compared to directed acyclic graph. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems.IEEE, Vienna, 1569–1570. DOI:
[8]
Juan Benet. 2014. IPFS - Content Addressed, Versioned, P2P File System. arXiv.
[9]
bitfly gmbh. 2020. Clients - Ethernodes.Org - The Ethereum Network & Node Explorer. (2020). Retrieved November 21, 2020 from https://ethernodes.org/.
[10]
Christian Cachin and Marko Vukolić. 2017. Blockchain Consensus Protocols in the Wild. arXiv.
[11]
Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, and Van Jacobson. 2017. BBR: Congestion-based congestion control. Communications of the ACM 60, 2 (2017), 58–66. DOI:
[12]
David Chaum, Amos Fiat, and Moni Naor. 1990. Untraceable electronic cash. In Proceedings of the Advances in Cryptology — CRYPTO’ 88.(, Shafi Goldwasser (Ed.), Lecture Notes in Computer Science, Springer, New York, NY, 319–327. DOI:
[13]
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nick Lanham, and Scott Shenker. 2003. Making gnutella-like P2P systems scalable. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Association for Computing Machinery, New York, NY, 407–418. DOI:
[14]
Bram Cohen. 2003. Incentives build robustness in BitTorrent. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems. Berkeley, CA, 68–72.
[15]
Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, and Roger Wattenhofer. 2016. On scaling decentralized blockchains: (A position paper). In Proceedings of the Financial Cryptography and Data Security.Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan Wallach, Michael Brenner, and Kurt Rohloff (Eds.), Vol. 9604, Springer, Berlin,106–125. DOI:
[16]
Scott A. Crosby and Dan S. Wallach. 2007. An analysis of BitTorrent’s two kademlia-based DHTs. Retrieved November 21, 2020 from https://hdl.handle.net/1911/96357.
[17]
Cullen Andrew, Pietro Ferraro, William Sanders, Luigi Vigneri, and Robert Shorten. 2020. Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach. arXiv.
[18]
W. Diffie and M. Hellman. 1976. New directions in cryptography. IEEE Transactions on Information Theory 22, 6 (1976), 644–654. DOI:
[19]
Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, and Aviv Zohar. 2022. Survey on blockchain networking: Context, state-of-the-art, challenges. Computing Surveys 54, 5 (2022), 1–34. DOI:
[20]
Ronald P. Doyle, Jeffrey S. Chase, Omer M. Asad, Wei Jin, and Amin M. Vahdat. 2003. Model-based resource provisioning in a web service utility. In Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems - Volume 4. USENIX Association, 5.
[21]
Cynthia Dwork and Moni Naor. 1993. Pricing via processing or combatting junk mail. In Proceedings of the Advances in Cryptology — CRYPTO’ 92.Ernest F. Brickell (Ed.), Lecture Notes in Computer Science, Springer, Berlin, 139–147. DOI:
[22]
Nabil El Ioini and Claus Pahl. 2018. A review of distributed ledger technologies. In Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences. Hervé Panetto, Christophe Debruyne, Henderik A. Proper, Claudio Agostino Ardagna, Dumitru Roman, and Robert Meersman (Eds.), Vol. 11230, Springer International Publishing, Cham, 277–288. DOI:
[23]
Jamie Ericson, Masoud Mohammadian, and Fabiana Santana. 2017. Analysis of performance variability in public cloud computing. In Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration.IEEE, San Diego, CA, 308–314. DOI:
[24]
Ethereum. 2020. Ethereum/Devp2p. GitHub (2020). Retrieved January 23, 2021 from https://github.com/ethereum/devp2p.
[25]
Ittay Eyal, Adem Efe Gencer, Emin Gün Sirer, and Robbert van Renesse. 2016. Bitcoin-Ng: A scalable blockchain protocol. In Proceedings of the USENIX NSDI. 45–59.
[26]
Matthias Fitzi, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2020. Proof-of-stake blockchain protocols with near-optimal throughput. ICryptology ePrint Archive. 2020 (2020), 37.
[27]
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer. 2018. Decentralization in bitcoin and ethereum networks. In Proceedings of the Financial Cryptography and Data Security.Sarah Meiklejohn and Kazue Sako (Eds.), Vol. 10957, Springer, Berlin, 439–457. DOI:
[28]
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the ACM CCS. 3–16. DOI:
[29]
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the ACM SOSP. 51–68. DOI:
[30]
Huaqun Guo and Xingjie Yu. 2022. A survey on blockchain technology and its security. Blockchain: Research and Applications 3, 2 (2022), 100067. DOI:
[31]
Sangtae Ha, Injong Rhee, and Lisong Xu. 2008. CUBIC: A new TCP-friendly high-speed TCP variant. ACM SIGOPS Operating Systems Review 42, 5 (2008), 64–74. DOI:
[32]
Stuart Haber and W. Scott Stornetta. 1991. How to time-stamp a digital document. In Proceedings of the Advances in Cryptology-CRYPTO’ 90.Alfred J. Menezes and Scott A. Vanstone (Eds.), Lecture Notes in Computer Science, Springer, Berlin, 437–455. DOI:
[33]
Vikas Hassija, Gaurang Bansal, Vinay Chamola, Neeraj Kumar, and Mohsen Guizani. 2020. Secure lending: Blockchain and prospect theory-based decentralized credit scoring model. IEEE Transactions on Network Science and Engineering 7, 4 (2020), 2566–2575. DOI:
[34]
Chenyu Huang, Zeyu Wang, Huangxun Chen, Qiwei Hu, Qian Zhang, Wei Wang, and Guan Xia. 2020. RepChain: A reputation based secure, fast and high incentive blockchain system via sharding. IEEE Internet of Things Journal 8, 6 (2020), 4291–4304. DOI:
[35]
ITU-T Focus Group on Application of Distributed Ledger Technology (FG DLT). 2020. Distributed ledger technology use cases. Retrieved November 20, 2020 from https://www.itu.int/en/ITU-T/focusgroups/dlt/Documents/d21.pdf.
[36]
Niclas Kannengießer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2020. Trade-Offs between distributed ledger technology characteristics. Computing Surveys 53, 2 (2020), 1–37. DOI:
[37]
Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Measuring ethereum network peers. In Proceedings of the Internet Measurement Conference 2018. ACM, Boston MA, 91–104. DOI:
[38]
Ana Klimovic, Heiner Litz, and Christos Kozyrakis. 2018. Selecta: Heterogeneous cloud storage configuration for data analytics. In Proceedings of the 2018 USENIX Conference on Usenix Annual Technical Conference. USENIX Association, 759–773.
[39]
N. Leibowitz, M. Ripeanu, and A. Wierzbicki. 2003. Deconstructing the kazaa network. In Proceedings of the 3rd IEEE Workshop on Internet Applications. IEEE Comput. Soc, San Jose, CA, 112–120. DOI:
[40]
Ang Li, Xiaowei Yang, Srikanth Kandula, and Ming Zhang. 2010. CloudCmp: Comparing public cloud providers. In Proceedings of the 10th Annual Conference on Internet Measurement - IMC’10. ACM, Melbourne, Australia, 1. DOI:
[41]
Qin Lv, Sylvia Ratnasamy, and Scott Shenker. 2002. Can heterogeneity make gnutella scalable? In Proceedings of the Peer-to-Peer Systems, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.), Vol. 2429, Springer, Berlin, 94–103. DOI:
[42]
Ashraf Mahgoub, Alexander Michaelson Medoff, Rakesh Kumar, Subrata Mitra, Ana Klimovic, Somali Chaterji, and Saurabh Bagchi. 2020. OPTIMUSCLOUD: Heterogeneous configuration optimization for distributed databases in the cloud. In Proceedings of the 2020 USENIX Annual Technical Conference. USENIX Association, 189–203. Retrieved from https://www.usenix.org/conference/atc20/presentation/mahgoub.
[43]
Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stutz, and Bernhard Haslhofer. 2020. All that glitters is not bitcoin – Unveiling the centralized nature of the BTC (IP) network. In Proceedings of the NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. IEEE, Budapest, Hungary, 1–9. DOI:
[44]
Juri Mattila. 2016. The blockchain phenomenon. Berkeley Roundtable of the International Economy (2016), 16.
[45]
Petar Maymounkov and David Mazières. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the Peer-to-Peer Systems.Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.), Lecture Notes in Computer Science, Springer, Berlin, 53–65. DOI:
[46]
Ralph C. Merkle. 1978. Secure communications over insecure channels. Communications of the ACM 21, 4 (1978), 294–299. DOI:
[47]
Radhika Mittal, David Zats, Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi, Amin Vahdat, Yaogong Wang, and David Wetherall. 2015. TIMELY: RTT-based congestion control for the datacenter. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication - SIGCOMM’15. ACM, London, United Kingdom, 537–550. DOI:
[48]
Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. May, http://www.bitcoin.org/bitcoin.pdf.
[49]
Gleb Naumenko, Gregory Maxwell, Pieter Wuille, Alexandra Fedorova, and Ivan Beschastnikh. 2019. Erlay: Efficient transaction relay for bitcoin. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, 817–831. DOI:
[51]
Serguei Popov, Hans Moog, Darcy Camargo, Angelo Capossele, Vassil Dimitrov, Alon Gal, Andrew Greve, Bartosz Kusmierz, Sebastian Mueller, Andreas Penzkofer, Bartosz Kusmierz, Sebastian Mueller, Andreas Penzkofer, et al. 2020. The coordicide. (2020). Retrieved from https://files.iota.org/papers/20200120_Coordicide_WP.pdf.
[52]
Chenhao Qu, Rodrigo N. Calheiros, and Rajkumar Buyya. 2016. A reliable and cost-efficient auto-scaling system for web applications using heterogeneous spot instances. Journal of Network and Computer Applications 65, C (2016), 167–180. DOI:
[53]
Elias Rohrer and Florian Tschorsch. 2019. Kadcast: A structured approach to broadcast in blockchain networks. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies. ACM, Zurich Switzerland, 199–213. DOI:
[54]
Fahad Saleh. 2020. Blockchain Without Waste: Proof-of-Stake. SSRN Scholarly Paper ID 3183935. Social Science Research Network, Rochester, NY. DOI:
[55]
Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. 2001. Measurement study of peer-to-peer file sharing systems. In Proceedings of the Multimedia Computing and Networking 2002. 156–170.
[56]
Devavrat Shah. 2007. Gossip algorithms. Foundations and Trends® in Networking 3, 1 (2007), 1–125. DOI:
[57]
Michael Bedford Taylor. 2017. The evolution of bitcoin hardware. Computer 50, 9 (2017), 58–66. DOI:
[58]
thetangle.org. 2020. Public IOTA Nodes. (2020). Retrieved November 21, 2020 from https://thetangle.org.
[59]
Florian Tschorsch and Bjorn Scheuermann. 23. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys and Tutorials 18, 3 (23), 2084–2123. DOI:
[60]
Alexandru Uta, Alexandru Custura, Dmitry Duplyakin, Ivo Jimenez, Jan Rellermeyer, Carlos Maltzahn, Robert Ricci, and Alexandru Iosup. 2020. Is big data performance reproducible in modern cloud networks? In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation.USENIX Association, Santa Clara, CA, 513–527. Retrieved from https://www.usenix.org/conference/nsdi20/presentation/uta.
[61]
Roger Wattenhofer. 2017. Distributed Ledger Technology: The Science of the Blockchain (2nd. ed.). CreateSpace Independent Publishing Platform, North Charleston, SC.
[62]
Shawn Wilkinson, Tome Boshevski, Josh Brandoff, and Vitalik Buterin. 2014. Storj A Peer-to-Peer Cloud Storage Network. Retrieved from https://storj.io/storj.pdf.
[63]
Gavin Wood. 2016. Polkadot: Vision for a heterogeneous multi-chain framework. (2016). Retrieved from https://pdfs.semanticscholar.org/12ea/67d037ddd0a5c7beb40fbd4a70bc90631644.pdf.
[64]
Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou. Second quarter 2020. A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys Tutorials 22, 2 (2020), 1432–1465. DOI:
[65]
Yunjing Xu, Zachary Musgrave, Brian Noble, and Michael Bailey. 2013. Bobtail: Avoiding long tails in the cloud. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation.USENIX Association, Lombard, IL, 329–341. Retrieved from https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/xu_yunjing.
[66]
Addy Yeow. 2020. Global Bitcoin Nodes Distribution. (2020). Retrieved November 21, 2020 from https://bitnodes.io/.
[67]
Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: Scaling blockchain via full sharding. In Proceedings of the ACM CCS. 931–948. DOI:
[68]
Qiheng Zhou, Huawei Huang, Zibin Zheng, and Jing Bian. 2020. Solutions to scalability of blockchain: A survey. IEEE Access 8 (2020), 16440–16455. DOI:

Index Terms

  1. Healthor: Heterogeneity-aware Flow Control in DLTs to Increase Performance and Decentralization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Distributed Ledger Technologies: Research and Practice
    Distributed Ledger Technologies: Research and Practice  Volume 1, Issue 2
    December 2022
    113 pages
    EISSN:2769-6480
    DOI:10.1145/3573310
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 December 2022
    Online AM: 25 August 2022
    Accepted: 17 July 2022
    Revised: 18 May 2022
    Received: 24 November 2021
    Published in DLT Volume 1, Issue 2

    Check for updates

    Author Tags

    1. Application-layer protocols
    2. network architecture
    3. flow control
    4. blockchain
    5. distributed ledger technologies

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 134
      Total Downloads
    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media