• Laadittu: 2004-09-08
  • Tekijä: I2P devs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all, sorry for being late...

* Index:

1) 0.4
2) Capacity and overload
3) Website updates
4) I2PTunnel web interface
5) Roadmap and todo
6) ???

* 1) 0.4

As I'm sure you've all seen, the 0.4 release came out the other day
and overall, its going pretty well.  Its hard to believe it was 6
months since 0.3 came out (and a year since the 1.0 SDK was
released), but we've come a long way, and y'all's hard work,
enthusiasm, and patience has done wonders.  Congrats, and thanks!

Like any good release, as soon as it hit the door we found some
problems, and over the last few days we've been accumulating bug
reports and patching like mad (you can watch [1] the changes as
they're fixed).  We do still have a few more bugs left to squash
prior to pushing out the next rev, but that should be done in
the next day or so.

[1] http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/history.txt?rev=HEAD

* 2) Capacity and overload

We've seen some fairly skewed allocations of tunnels for the last few
releases, and while some of those are bug related (two of those fixed
since 0.4 came out), there is still a general algorithm question out
there - when should a router stop accepting more tunnels?

A few revs back, we added throttling code to reject requests to
participate in a tunnel if the router was overloaded (the local
message processing time exceeds 1s), and that has helped
substantially.  However, there are two aspects to that simple
algorithm that aren't addressed:
 = when our bandwidth is saturated, our local processing time may
   still be fast, so we'd continue to accept more tunnel requests
 = when a single peer participates in "too many" tunnels, when they
   fail, it hurts the network more.

The first issue is dealt with fairly easily by simply enabling the
bandwidth limiter (since bandwidth limiting slows down the message
processing time in accordance to the bandwidth delay).  The second
is more complicated, and both more research and more simulation is
necessary.  I'm thinking something along the lines of
probabalistically rejecting tunnel requests based on the ratio of
tunnels participating in and tunnels requested from the network,
including some base "kindness factor", setting P(reject) = 0 if
we're participating in less than that.

But as I said, more work and simulation is necessary.

* 3) Website updates

Now that we've got the new I2P web interface, pretty much all of our
old end user documentation is obsolete.  We need some help going
through those pages and updating them to describe how things are
now.  As duck and others have suggested, we need a new 'kickstart'
guide above and beyond the http://localhost:7657/ readme -
something to get people up and into the system.

In addition, our new web interface has plenty of room for integrating
context sensitive help.  As you can see on the bundled help.jsp,
"hmm. we should probably have some help text here."

It'd probably be great if we could add 'about' and/or
'troubleshooting' links to the different pages, explaining what
things mean and how to use them.

* 4) I2PTunnel web interface

To call the new http://localhost:7657/i2ptunnel/ interface "spartan"
would be an understatement.  We need to do a lot of work to get that
closer to a usable state - right now the functionality is technically
there, but you really need to know whats going on behind the scenes
to make sense of it.  I think duck may have some further ideas about
this to bring up during the meeting.

* 5) Roadmap and todo

I've been slacking on keeping the roadmap [2] up to date, but the
fact of the matter is, we've got some further revision ahead of us.
To help explain what I see as the "big problems", I've put together
a new task list [3], which goes into some detail on each.  I think
we should be fairly open at this point at reviewing our options and
perhaps reworking the roadmap.

One thing I've forgotten to mention on that todo list is that when
adding the lightweight connection protocol [4], we can include
(optional) autodetection of the IP address.  This may be 'dangerous'
(which is why it'll be optional), but it will dramatically reduce the
number of support requests we get :)

Anyway, those issues posted on the todo list are ones we've had
slated for various releases, and most certainly will not all be in
1.0 or even 2.0.  I've sketched out a few different possible
prioritization / releases, but I'm not hard set on those yet.
However, if people can identify other big things down the path, it'd
be much appreciated, as an unscheduled issue is always a pain in the
butt.

[2] http://www.i2p.net/roadmap
[3] http://www.i2p.net/todo
[4] http://www.i2p.net/todo#connection

* 6) ???

Ok, thats all I've got for now (good thing too, since the meeting
starts in a few minutes).  Swing on by #i2p on irc.freenode.net,
www.invisiblechat.com, or irc.duck.i2p at 9p GMT to chat further.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBQT4ijhpxS9rYd+OGEQLGsQCg5nvwnBMw4nQaV6/d9loWZjWZhJkAoNxq
qS8j385jn3Xj4wIJCPimEX01
=jVx+
-----END PGP SIGNATURE-----