Peer-to-Peer Networks
(Seminar 2 SWS)

Instructor: Prof. Jens-Peter Redlich
Thursday, 13:15 - 14:45, RUD 25, Room 3.101

Computer Science Department
Systems Architecture Group

Abstract: The goal of the seminar is to examine peer-to-peer technologies, applications, and systems, and to identify key research issues and challenges that lie ahead. Famous projects/products will give us a sense of what actual peer-to-peer systems look like and how they behave. In the context of this seminar, peer-to-peer systems are characterized as being decentralized, self-organizing distributed systems, in which all or most communication is symmetric.
  • Seminar, Praktische Informatik, Hauptstudium.
  • 2h each week, over one semester (2 SWS).
  • Participants present a selection of recently published papers that will, through discussion, provide us with a deep understanding of the state-of-the-art in peer-to-peer network technology.

Credits and grading:

     In order to obtain credits for this seminar, participants are expected to:

  • Attend regularly (at least 90%).
  • Read each paper before the seminar, to be adequately prepared for discussion.
  • Research an assigned subject; present major findings (45 min presentation; 30 min discussion).
  • Presentations will be evaluated by two members of the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
  • Presenters summarize their presentation and relevant discussion on the Seminar's WIKI page within 2 weeks.
  • Presentations may be given in English or German. All documents are in English (exceptions may be granted). A PowerPoint template can be obtained here.


  • Successful completion of PI-1,2,3.


  0. Introduction
  • A Network of Peers - book 'Peer-to-Peer' chapter 1 (cached pdf)
  • What is Peer-to-Peer? (cachedd pdf)
  • Peer-to-Peer Research at Stanford - Overview (cached pdf)
  1. SETI@home
  • SETI@home: An Experiment in Public Resource Computing (cached pdf)
  • Public Computing: Reconnecting People to Science (cached pdf)
  • BOINC: A System for Public-Resource Computing and Storage (cached pdf)
  2. Napster
  3. Instant Messaging
  4. Skype
  5. Mixmaster Remailer
  6. Gnutella
  7. Freenet
  • Protecting Free Expression Online with Freenet (cached pdf)
  • Freenet: A Distributed Anonymous Information Storage and Retrieval System (cached pdf)
  • Using the Small-World Model to Improve Freenet Performance (cached pdf)
  8. Eternity, Publius, Free Haven
       A. Eternity

      B.  Publius

  • Publius: A robust, tamper-evident, censorship-resistant web publishing system (cached pdf)

      C. Free Haven

  • The Free Haven Project: Distributed Anonymous Storage Service (cached pdf)
  • The Free Haven Project: Design and Deployment of an Anonymous Secure Data Haven (cached pdf)
  9. Distributed Hash Tables (DHT)
  10. Chord
  11. Peer-to-Peer Searching
  12. NAT traversal
  13. Authentication
  14.  Reputation / Trust
  • Reputation Systems: Facilitating Trust in Internet Interactions (cached pdf)
  • Reputation in P2P Anonymity Systems (cached pdf)
  • Reputation Management in Peer-to-peer Systems (cachd pdf)
  • Taxonomy of Trust: Categorizing P2P Reputation Systems (cached pdf)
  • PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities (cached pdf)
  • Poblano - A Distributed Trust Model for Peer-to-Peer Networks (cached pdf)
  • The EigenTrust Algorithm for Reputation Management in P2P Networks (cached pdf)

Presentation assignments:

27.10.2005Butzek, Ertelt SETI@home[pdf]
03.11.2005Neumann, ArslanNapster[pdf]
10.11.2005Cabello,Schröder, Kozakiewicz Instant Messaging and Jabber[pdf.1][pdf.2][pdf.3]
17.11.2005Boesler, Matuszkiewicz Skype[pdf.1][pdf.2]
24.11.2005Pfeiffer, Nordhausen, SnurnikovMixmaster Remailer[pdf]
01.12.2005Arnold, TheodorescuGnutella[pdf]
08.12.2005Kruber, SchieschkeFreenet[pdf]
15.12.2005Goettsch, Kraemer Eternity 
05.01.2006Jaekel, Neukirchen Free Haven[pdf]
12.01.2006Carstensen, KellerDistributed Hash Tables (DHT) 
19.01.2006Tuschl, HermannChord[pdf]
26.01.2006Nagel, CremeriusPeer-to-Peer Searching[pdf]
02.02.2006Knobloch, Hein, MahrlaNAT Traversal[pdf]
09.02.2006Nielsen, Häusler Authentication[pdf]
16.02.2006Wanja, MoebiusReputation 


Further Readings (papers):

  1. Sloppy hashing and self-organizing clusters.
    Michael J. Freedman (NYU), David Mazieres (NYU) (pdf)
  2. Clustering in Peer-to-Peer File Sharing Workloads.
    F. Le Fessant (INRIA-Futurs and LIX), S. Handurukande (EPFL), A.-M. Kermarrec, L. Massoulie (Microsoft Research Cambridge) (pdf)
  3. Efficient Broadcast in Structured P2P Networks.
    Sameh El-Ansary, Luc Onana Alima, Per Brand, Seif Haridi (pdf)
  4. When Multi-Hop Peer-to-Peer Routing Matters.
    Rodrigo Rodrigues, Charles Blake (MIT) (pdf)
  5. Robust Distributed Name Service.
    Baruch Awerbuch, Christian Scheideler (Johns Hopkins University) (pdf)
  6. Lighthouses for Scalable Distributed Location.
    Marcelo Pias, Jon Crowcroft, Steve Wilbur, Tim Harris, Saleem Bhatti (pdf)
  7. Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays.
    Alan Mislove, Peter Druschel (Rice University) (

Further Readings (books):

  • Andy Oram. Peer-to-Peer : Harnessing the Power of Disruptive Technologies. O'Reilly; 2001. ISBN: 059600110X
Chord Project
P2P explained
Stanford Peers
Home Page
IPTPS 2003
2nd Workshop
IPTPS 2004
3rd Workshope

Legal disclaimer. .  © 2022 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group.Contact: .