Bootstrapping node explained

A bootstrapping node, also known as a rendezvous host,[1] is a node in an overlay network that provides initial configuration information to newly joining nodes so that they may successfully join the overlay network.[2] [3] Bootstrapping nodes are predominantly found in decentralized peer-to-peer (P2P) networks because of the dynamically changing identities and configurations of member nodes in these networks.

Overview

When attempting to join a P2P network, specific discovery or membership protocols (or other configuration information) may be required, and, if a newly joining node is unaware of these protocols, the newly established joining node will not be able to communicate with other nodes and ultimately join the network.[3] Furthermore, these protocols and configuration requirements may dynamically change as the infrastructure and membership of the P2P network evolves.[1] Therefore, there is a need to be able to dynamically inform a newly joining node of the required protocols and configurations.[2]

Identifying a bootstrapping node

Several methods may be used by a joining node to identify bootstrapping nodes:

Configuration information provided

The objective of the bootstrapping node is to provide newly joining nodes with sufficient configuration information so that the new node may then successfully join the network and access resources, such as shared content.[1] Discovery protocol information can instruct the new node how to discover peers on the network.[1] Membership protocol information can instruct the new node how to request-to-join and subsequently join peer groups on the network.[2] Other configuration information, such as overlay network dependent instructions, may be provided.[1] [4] An example of overlay dependent instructions is instructing a new node how to obtain a zone of a CAN.[4] Further configuration information may be designed for P2P network admission control, used when joining a network that supports trust management, and include such things as encryption/signature protocols or admission policies.[3]

Networks that use bootstrapping nodes

See also

Notes and References

  1. Yoid: Extending the Internet Multicast Architecture . www.aciri.org . Francis, Paul . 2000-04-02 . 2008-12-24.
  2. Web site: US Patent 7,065,579 . 2008-12-23 . Traversat . 2006-06-20. etal.
  3. Admission Control in Peer-to-Peer: Design and Performance Evaluation . In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2003 . Saxena . 2003 . 2008-12-24. etal.
  4. A Scalable Content-Addressable Network . In Proceedings of ACM SIGCOMM 2001 . Ratnasamy . 2001 . 2008-12-23 . etal . dead . https://web.archive.org/web/20080807172254/http://berkeley.intel-research.net/sylvia/cans.pdf . 2008-08-07 .