gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[lsd0004] 03/03: Reorder terminology alphabetically


From: gnunet
Subject: [lsd0004] 03/03: Reorder terminology alphabetically
Date: Fri, 23 Dec 2022 10:14:53 +0100

This is an automated email from the git hooks/post-receive script.

martin-schanzenbach pushed a commit to branch master
in repository lsd0004.

commit 5f42dddc2fed3a488be44f0317da77692ce91dfa
Author: Martin Schanzenbach <schanzen@gnunet.org>
AuthorDate: Fri Dec 23 18:14:26 2022 +0900

    Reorder terminology alphabetically
---
 draft-schanzen-r5n.xml | 158 +++++++++++++++++++++++++------------------------
 1 file changed, 80 insertions(+), 78 deletions(-)

diff --git a/draft-schanzen-r5n.xml b/draft-schanzen-r5n.xml
index 01649ee..3bcc45c 100644
--- a/draft-schanzen-r5n.xml
+++ b/draft-schanzen-r5n.xml
@@ -156,108 +156,76 @@
           when, they appear in all capitals, as shown here.
         </t>
       </section>
-      <section>
-        <name>Structure of This Document</name>
-        <t>
-            <xref target="terminology"/> gives an overview of the terminology 
used in
-           this document.
-           <xref target="architecture"/> then describes the overall 
architecture and
-           the scope of this specification.
-           <xref target="overlay"/> describes the application API, which 
clarifies
-           the semantics provided by R<sup>5</sup>N for applications
-           and thus is crucial as it motivates the rest of the design.
-           <xref target="underlay"/> describes the underlay interface. This is 
the
-           abstraction that applications must provide to R<sup>5</sup>N
-           and thus a prerequisite for using the DHT.
-           Before a DHT is usable, it must be bootstrapped.
-           Bootstrapping is described in <xref target="bootstrapping"/>.
-           Bloom filters, a key data structure used in various
-           places, are introduced in <xref target="bloom_filters" />
-           The central operation of a DHT is routing, which is
-           detailed in <xref target="routing"/>. The processing of the various
-           network messages is described in <xref target="p2p_messages"/>.  
Handling
-           of Blocks, including validation and storage are described
-           in <xref target="blockstorage"/>. General security considerations 
are detailed
-           in <xref target="security" />. IANA and GANA registry updates are 
listed
-           in <xref target="iana" /> and <xref target="gana"/>. The document 
concludes with test
-           vectors in <xref target="testvectors"/> and appendices with 
references.
-        </t>
-      </section>
-    </section>
-    <section anchor="terminology">
+      <section anchor="terminology">
       <name>Terminology</name>
       <dl>
-        <dt>Peer:</dt>
-        <dd>
-          A host that is participating in the overlay.  Peers are
-          responsible for holding some portion of the data that has been
-          stored in the overlay, and they are responsible for routing
-          messages on behalf of other hosts as needed by the Routing
-          Algorithm.
-        </dd>
-        <dt>Peer ID:</dt>
-        <dd>
-          The <tt>Peer ID</tt> is the public key which is used to authenticate
-          a peer in the underlay.
-         The Peer ID is the public key of the corresponding
-         Ed25519<xref target="ed25519" /> peer private key.
-
-        </dd>
-        <dt>Peer Address:</dt>
-        <dd>
-          The <tt>Peer Address</tt> is the identifier used on the Overlay
-          to address a peer.
-         It is a SHA-512 hash of the <tt>Peer ID</tt>.
-        </dd>
-        <dt>Key</dt>
+        <dt>Applications</dt>
         <dd>
-          512-bit identifier of a location in the DHT. Multiple 
<tt>Block</tt>s can be
-         stored under the same key. <tt>Peer Addresses</tt> are valid keys.
+          Applications are components which directly use the DHT overlay
+          interfaces. Possible applications include the GNU Name System
+          <xref target="I-D.draft-schanzen-gns"/> and the CADET transport 
system
+          <xref target="cadet"/>.
         </dd>
-        <dt>Neighbor:</dt>
+        <dt>Application API</dt>
         <dd>
-          A neighbor is a peer which is directly able to communicate
-         with our peer via the <tt>Underlay Interface</tt>.
+          The application API exposes the core operations of the DHT overlay
+          to applications.
+          This includes storing blocks in the DHT and retrieving blocks from 
the DHT.
         </dd>
-        <dt>Block:</dt>
+        <dt>Block</dt>
         <dd>
           Variable-size unit of payload stored in the DHT
          under a <tt>Key</tt>. Commonly also called a &quot;value&quot; when 
talking
          about a DHT as a &quot;key-value store&quot;.
         </dd>
+        <dt>Block Storage</dt>
+        <dd>
+          The <tt>Block Storage</tt> component is used to persist and manage
+          <tt>Block</tt> data by peers.
+          It includes logic for enforcing storage quotas, caching strategies 
and
+          data validation.
+        </dd>
         <dt>Block-Type:</dt>
         <dd>
           A unique 32-bit value identifying the data format of a 
<tt>Block</tt>.
-          Block-Types are either private or allocated by GANA (see <xref 
target="gana"/>).
+          Block-Types are either private or allocated by GANA (see
+          <xref target="gana"/>).
         </dd>
-        <dt>Block Storage</dt>
+        <dt>Key</dt>
         <dd>
-          The <tt>Block Storage</tt> component is used to persist and manage 
<tt>Block</tt> data
-          by peers. It includes logic for enforcing storage quotas, caching 
strategies and
-          data validation.
+          512-bit identifier of a location in the DHT. Multiple 
<tt>Block</tt>s can be
+         stored under the same key. <tt>Peer Addresses</tt> are valid keys.
         </dd>
-        <dt>Responsible Peer:</dt>
+        <dt>Message Processing</dt>
         <dd>
-          The peer <tt>N</tt> that is responsible for a specific key 
<tt>K</tt>, as defined by
-          the <tt>SelectClosestPeer(K, P)</tt> algorithm (see <xref 
target="routing"/>.
+          The Message Processing component processes requests from and
+         generates responses to applications and the underlay network.
         </dd>
-        <dt>Applications</dt>
+        <dt>Neighbor</dt>
         <dd>
-          Applications are components which directly use the DHT overlay
-          interfaces. Possible applications include the GNU Name System
-          <xref target="I-D.draft-schanzen-gns"/> and the CADET transport 
system
-          <xref target="cadet"/>.
+          A neighbor is a peer which is directly able to communicate
+         with our peer via the <tt>Underlay Interface</tt>.
         </dd>
-        <dt>Application API</dt>
+        <dt>Peer</dt>
         <dd>
-          The application API exposes the core operations of the DHT overlay
-          to applications.
-          This includes storing blocks in the DHT and retrieving blocks from 
the DHT.
+          A host that is participating in the overlay.  Peers are
+          responsible for holding some portion of the data that has been
+          stored in the overlay, and they are responsible for routing
+          messages on behalf of other hosts as needed by the Routing
+          Algorithm.
         </dd>
-        <dt>Message Processing</dt>
+        <dt>Peer Address</dt>
         <dd>
-          The Message Processing component processes requests from and
-         generates responses to applications and the underlay network.
+          The <tt>Peer Address</tt> is the identifier used on the Overlay
+          to address a peer.
+         It is a SHA-512 hash of the <tt>Peer ID</tt>.
+        </dd>
+        <dt>Peer ID</dt>
+        <dd>
+          The <tt>Peer ID</tt> is the public key which is used to authenticate
+          a peer in the underlay.
+          The Peer ID is the public key of the corresponding
+          Ed25519<xref target="ed25519" /> peer private key.
         </dd>
         <dt>Routing</dt>
         <dd>
@@ -265,6 +233,12 @@
           routing and peer selection logic. It facilitates the R<sup>5</sup>N 
routing
           algorithm with required data structures and algorithms.
         </dd>
+        <dt>Responsible Peer</dt>
+        <dd>
+          The peer <tt>N</tt> that is responsible for a specific key 
<tt>K</tt>, as
+          defined by the <tt>SelectClosestPeer(K, P)</tt> algorithm (see
+          <xref target="routing"/>.
+        </dd>
         <dt>Underlay Interface</dt>
         <dd>
           The Underlay Interface is an abstraction layer on top of the
@@ -273,6 +247,34 @@
           TCP, UDP and TLS or advanced protocols such as GNUnet, I2P or Tor.
         </dd>
       </dl>
+      </section>
+      <section>
+        <name>Structure of This Document</name>
+        <t>
+            <xref target="terminology"/> gives an overview of the terminology 
used in
+           this document.
+           <xref target="architecture"/> then describes the overall 
architecture and
+           the scope of this specification.
+           <xref target="overlay"/> describes the application API, which 
clarifies
+           the semantics provided by R<sup>5</sup>N for applications
+           and thus is crucial as it motivates the rest of the design.
+           <xref target="underlay"/> describes the underlay interface. This is 
the
+           abstraction that applications must provide to R<sup>5</sup>N
+           and thus a prerequisite for using the DHT.
+           Before a DHT is usable, it must be bootstrapped.
+           Bootstrapping is described in <xref target="bootstrapping"/>.
+           Bloom filters, a key data structure used in various
+           places, are introduced in <xref target="bloom_filters" />
+           The central operation of a DHT is routing, which is
+           detailed in <xref target="routing"/>. The processing of the various
+           network messages is described in <xref target="p2p_messages"/>.  
Handling
+           of Blocks, including validation and storage are described
+           in <xref target="blockstorage"/>. General security considerations 
are detailed
+           in <xref target="security" />. IANA and GANA registry updates are 
listed
+           in <xref target="iana" /> and <xref target="gana"/>. The document 
concludes with test
+           vectors in <xref target="testvectors"/> and appendices with 
references.
+        </t>
+      </section>
     </section>
     <section anchor="architecture" numbered="true" toc="default">
       <name>Architecture</name>

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]