Summer
2011

 Peer-to-Peer Networks
(Seminar 2 SWS)


Computer Science Department
Systems Architecture Group

LEHREVALUATION    Deadline: 30.6.2011

Zum Online-Fragebogen: : https://evaluation.hu-berlin.de/evaluation/   (von dort bitte die Lehrveranstaltung suchen)

Authentisierungs-Token: eva11zuse

Ja: Mir ist bekannt, dass man Evaluationen mehrfach (beliebig viele) abgeben kann und dass beliebige Leute Evaluationen abgeben können.
Nein: Ich habe nichts zur Entschuldigung dafür vorzutragen :-(

 

 
Abstract: The goal of the seminar is to examine peer-to-peer technologies, systems and applications, and to identify key research issues and challenges that lie ahead. Famous projects/products will give us a sense of what actual peer-to-peer systems look like and how they behave.
 
Synopsis:
  • Seminar, Praktische Informatik, Hauptstudium / Master-Programm.
  • 1 meeting each week; for one semester (2 SWS).

Policies:

  • Attend regularly!
    • You are allowed to miss at most one seminar without prior and reasonable excuse.
  • Work in teams!
    • Each of the topics below should be investigated by a group of 2-3 students. This means that you have to join more than one group, i.e. investigate more than one topic, during the seminar.
    • Each group should meet outside class at least once to discuss findings, compare arguments and compose a presentation strategy.
  • Do your own investigations!
    • Use additional resources on the web - the suggested papers are only a jump start.
    • Try to find opposing arguments - this makes research interesting :-)
  • Present at least twice!
    • Members of an investigation group present their findings together, or, choose one speaker.
    • You can always improve your presentation style. Dare to experiment with different styles and choreographies. The audience will give you constructive feedback at the end of each seminar (Bewertungskriterien-Seminarvortrag).
    • Each student must present at least 2 times during the semester (i.e. 2 different topics) to obtain credits (Seminarschein).
    • A PowerPoint template can be obtained here.

Prerequisites:

  • Basic knowledge of network protocols, database systems and operating systems principles required.
  • Almost no programming skills required - but won't hurt either.

Wiki:


Topics:
 
1. Historical Perspective / Introduction
  • Peer-to-Peer Pioneers:
    • Napster (file sharing)
    • Seti@home (grid computing)
    • Skype (internet telephony)
       
  • A Network of Peers (pdf)
  • Peer-to-Peer Systems and Applications: What is p2p about? (pdf), Past and Future (pdf), Application Areas (pdf)
  • Centralized / Fully Distributed / Hybrid Peer-to-Peer Systems (pdf)
 
2. Grid Computing
  • SETI@home: An Experiment in Public Resource Computing (pdf)
  • Folding@home (http://folding.stanford.edu/)
  • BOINC: A System for Public-Resource Computing and Storage (pdf)
     
  • Distributed Computing – GRID Computing (pdf)
  • Screen Savers of the World Unite! (pdf)
 
3. Instant Messaging and Internet Telephony
  • Introduction to Instant Messaging (pdf)
  • Jabber -  book 'Peer-to-Peer' chapter 5 (pdf)
     
  • An analysis of the Skype peer-to-peer Internet Telephony Protocol (pdf)
  • An Experimental Study of the Skype Peer-to-Peer VoIP System. (pdf)
 
4. NAT Traversal
  • Peer-to-Peer Communication Across Network Address Translators (pdf)
  • IETF RFC 3489: STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (txt)
  • IETF draft-rosenberg-midcom-turn-08. Traversal Using Relay NAT (TURN) (txt)
 
5. Lookup in Structured p2p (DHT)                  [2x]
  • Overview: Difference lookup / search / query  (difference structured / unstructured p2p)
     
  • DHT - Distributed Hash Table (pdf)
     
  • Selected DHT Algorithms (pdf)
  • Comparing the performance of DHTs under churn (pdf)
     
  • Simple Load Balancing for Distributed Hash Tables (pdf)
  • Security: DHT Routing Using Social Links (pdf)
 
6. Information Retrieval (Search and Query)
  • BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to-Peer Search (pdf)
  • Algorithmic Aspects of Overlay Networks (pdf)
  • Schema-Based Peer-to-Peer Systems (pdf)
  • Supporting Information Retrieval in Peer-to-Peer Systems (pdf)
  • Hybrid Peer-to-Peer Systems (pdf)
 
7. Distributed Storage (File Sharing)
  • Gnutella
    • p2p file sharing technologies: Napster, Gnutella and beyond (pdf)
    • Improving the Gnutella Protocol (pdf)
    • Why Gnutella can't scale. No, really. (pdf)
    • Gnutella Network Case Study (pdf)
       
  • eDonkey
  • BitTorrent
    • Exploiting BitTorrent for fun (but not profit) [Liogkas06.pdf]
    • Do incentives build robustness in BitTorrent? (pdf)
  • Tribler
 
8. Content Distribution
  • Application-Layer Multicast (pdf)
  • ePOST (pdf)
  • ChunkCast: An Anycast Service for Large Content Distribution [Chun06]
  • Anatomy of a P2P Content Distribution system with Network Coding [Gkant]
 
9. Anonymity, Privacy
 
10. Censorship-Resistance
  • Freenet
    • Protecting Free Expression Online with Freenet (pdf)
    • Freenet: A Distributed Anonymous Information Storage and Retrieval System (pdf)
    • Using the Small-World Model to Improve Freenet Performance (pdf)
  • Eternity
    • The Eternity Service (pdf)
    • The Strong Eternity Service (pdf)
  • Publius
    • Publius: A robust, tamper-evident, censorship-resistant web publishing system (pdf)
  • Free Haven
    • Free Haven: Distributed Anonymous Storage Service (pdf)
    • Free Haven: Design and Deployment of an Anonymous Secure Data Haven (pdf)
 
11. Business Aspects        [0x]
  • Lottery Trees: Motivational Deployment of Networked Systems. (pdf)
  • Can Internet Video-on-Demand be Profitable? (pdf)
 
12 Security / Trust / Reputation
  • Security-Related Issues in Peer-to-Peer Networks (pdf)
  • Accounting in Peer-to-Peer-Systems (pdf)
     
  • Reputation Systems: Facilitating Trust in Internet Interactions (pdf)
  • Reputation in P2P Anonymity Systems (pdf)
  • Reputation Management in Peer-to-peer Systems (pdf)
  • Taxonomy of Trust: Categorizing P2P Reputation Systems (pdf)
  • PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities (pdf)
  • Poblano - A Distributed Trust Model for Peer-to-Peer Networks (pdf)
  • The EigenTrust Algorithm for Reputation Management in P2P Networks (pdf)
 
13.  Mobile and Ubiquitous Environments / Disruption Tolerant Networks (DTN)
  • DakNet- rethinking connectivity in developing nations (pdf)
  • Spontaneous Collaboration in Mobile Peer-to-Peer Networks (pdf)
  • Epidemic Data Dissemination for Mobile Peer-to-Peer Lookup Services (pdf)
  • Epidemic Routing for Partially-Connected Ad Hoc Networks (pdf)

 

Presentation assignments:

Date

Presenter 

Topic

Slides
19.04RedlichIntroductionpdf
26.04no class; read assigned papers
03.05.all 5-10 minutes for ea. group to introduce topic 
10.05.Dittler, RohrerTop 5: Lookup in Structured p2p (DHT)  
17.05.Minor, LelisTop 6. Information Retrieval (Search and Query) 
24.05Wedel, Stampe Top 3: Instant Messaging and Internet Telephony 
31.05Ritschke, SwiatekTop 4: NAT Traversal 
07.06Dewender, MüllerTop 7: Distributed Storage (File Sharing) 
14.06Dittler, RohrerTop 9: Anonymity, Privacy 
21.06Minor, LelisTop 10: Censorship-Resistance 
28.06Ritschke, SwiatekTop 12:Security / Trust / Reputation 
05.07Dewender, Müller

Top 8: Content Distribution

 
12.07Wedel, Stampe

Top 13:Disruption Tolerant Networks (DTN)

 

 

Further Readings (books):

  • Andy Oram. Peer-to-Peer : Harnessing the Power of Disruptive Technologies. O'Reilly; 2001. ISBN: 059600110X
  • Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer Systems and Applications. Springer; 2005. ISBN: 3-540-29192-X

Interesting Links:

 Links
MIT PDOS
Chord Project
Skype
P2P explained
Stanford Peers
Home Page
IPTPS 2007
6th Workshop
IPTPS 2008
7th Workshop

Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group.Contact: sar@informatik.hu-berlin.de .