| Abstract:
The goal of the seminar is to examine
peer-to-peer technologies, systems and applications, and to identify
key research issues and challenges that lie ahead. Famous projects/products
will give us a sense of what actual peer-to-peer systems look like and how
they behave.
| Synopsis:
- Seminar, Praktische Informatik, Hauptstudium /
Master-Programm.
- 1 meeting each week; for one semester (2 SWS).
Policies:
- Attend regularly!
- You are allowed to miss at most one seminar without prior
and reasonable excuse.
- Work in teams!
- Each of the topics below should be investigated by a
group of 2-3 students. This means that you have to join more than one group,
i.e. investigate more than one topic, during the seminar.
- Each group should meet outside class at least once to
discuss findings, compare arguments and compose a presentation strategy.
- Do your own investigations!
- Use additional resources on the web - the suggested
papers are only a jump start.
- Try to find opposing arguments - this makes research
interesting :-)
- Present at least twice!
- Members of an investigation group present their findings
together, or, choose one speaker.
- You can always improve your presentation style. Dare to
experiment with different styles and choreographies. The
audience will give you constructive feedback at the end of each seminar (Bewertungskriterien-Seminarvortrag).
- Each student must present at least 2 times during the
semester (i.e. 2 different topics) to obtain credits (Seminarschein).
- A PowerPoint template can be obtained
here.
Prerequisites: -
Basic knowledge of network protocols, database systems and operating
systems principles required.
- Almost no programming skills required - but won't
hurt either.
Wiki:
Topics:
1. Historical Perspective /
Introduction |
- Peer-to-Peer Pioneers:
- Napster (file sharing)
- Seti@home (grid computing)
- Skype (internet telephony)
- A Network of Peers (pdf)
- Peer-to-Peer Systems and
Applications: What is p2p about?
(pdf),
Past and Future (pdf),
Application Areas (pdf)
- Centralized / Fully Distributed /
Hybrid Peer-to-Peer Systems
(pdf)
|
2.
Grid Computing |
- SETI@home: An Experiment in Public Resource
Computing (pdf)
- Folding@home (http://folding.stanford.edu/)
- BOINC: A System for Public-Resource Computing and
Storage (pdf)
-
Distributed Computing – GRID
Computing (pdf)
-
Screen Savers of the World Unite! (pdf)
|
3. Instant Messaging and
Internet Telephony |
- Introduction to Instant Messaging
(pdf)
- Jabber - book 'Peer-to-Peer' chapter 5 (pdf)
- An analysis of the
Skype peer-to-peer Internet Telephony Protocol
(pdf)
- An Experimental Study of the
Skype Peer-to-Peer VoIP System. (pdf)
|
4. NAT Traversal |
-
Peer-to-Peer Communication Across Network Address Translators (pdf)
-
IETF RFC 3489: STUN - Simple Traversal of User Datagram Protocol (UDP)
Through Network Address Translators (NATs) (txt)
-
IETF draft-rosenberg-midcom-turn-08. Traversal Using Relay NAT
(TURN) (txt)
|
5. Lookup in Structured p2p
(DHT)
[2x] |
-
Overview: Difference lookup / search / query (difference structured / unstructured p2p)
- DHT - Distributed Hash Table (pdf)
- Selected DHT Algorithms (pdf)
- Comparing the
performance of DHTs under churn
(pdf)
- Simple Load Balancing for Distributed Hash Tables (pdf)
- Security: DHT Routing Using
Social Links (pdf)
|
6. Information Retrieval
(Search and Query) |
- BubbleStorm: Resilient, Probabilistic, and
Exhaustive Peer-to-Peer Search (pdf)
- Algorithmic Aspects of Overlay
Networks (pdf)
- Schema-Based Peer-to-Peer Systems (pdf)
- Supporting Information Retrieval in
Peer-to-Peer Systems (pdf)
- Hybrid Peer-to-Peer Systems (pdf)
|
7. Distributed Storage (File
Sharing) |
- Gnutella
- p2p file sharing technologies: Napster,
Gnutella and beyond (pdf)
- Improving the Gnutella Protocol (pdf)
- Why Gnutella can't scale. No, really. (pdf)
- Gnutella Network Case Study (pdf)
- eDonkey
- BitTorrent
- Exploiting BitTorrent for fun
(but not profit) [Liogkas06.pdf]
- Do incentives build robustness in BitTorrent?
(pdf)
- Tribler
|
8. Content Distribution |
- Application-Layer Multicast (pdf)
- ePOST (pdf)
- ChunkCast: An Anycast Service for
Large Content Distribution [Chun06]
- Anatomy of a P2P Content Distribution system with Network Coding [Gkant]
|
10. Censorship-Resistance |
- Freenet
- Protecting Free Expression Online with Freenet (pdf)
- Freenet: A Distributed Anonymous Information Storage and Retrieval
System (pdf)
- Using the Small-World Model to Improve Freenet Performance (pdf)
- Eternity
- The Eternity Service (pdf)
- The Strong Eternity Service (pdf)
- Publius
- Publius: A robust, tamper-evident, censorship-resistant web publishing
system (pdf)
- Free Haven
- Free Haven: Distributed
Anonymous Storage Service (pdf)
- Free Haven:
Design and Deployment of an Anonymous Secure Data Haven (pdf)
|
11. Business Aspects
[0x] |
- Lottery Trees: Motivational Deployment of
Networked Systems. (pdf)
- Can Internet Video-on-Demand be Profitable? (pdf)
|
12 Security / Trust /
Reputation |
- Security-Related Issues in
Peer-to-Peer Networks (pdf)
- Accounting in Peer-to-Peer-Systems (pdf)
- Reputation Systems: Facilitating Trust in
Internet Interactions (pdf)
- Reputation in P2P Anonymity Systems (pdf)
- Reputation Management in Peer-to-peer Systems (pdf)
- Taxonomy of Trust: Categorizing P2P Reputation
Systems (pdf)
- PeerTrust: Supporting Reputation-Based Trust for
Peer-to-Peer Electronic Communities (pdf)
- Poblano - A Distributed Trust Model for
Peer-to-Peer Networks (pdf)
- The EigenTrust Algorithm for Reputation
Management in P2P Networks (pdf)
|
13. Mobile and
Ubiquitous Environments / Disruption Tolerant Networks (DTN) |
-
DakNet- rethinking connectivity in
developing nations (pdf)
-
Spontaneous Collaboration in Mobile
Peer-to-Peer Networks (pdf)
-
Epidemic Data Dissemination for
Mobile Peer-to-Peer Lookup Services (pdf)
- Epidemic Routing for
Partially-Connected Ad Hoc Networks (pdf)
|
Presentation assignments:
Date |
Presenter(s) |
Topic(s) |
Slides |
16.04. |
Redlich |
Setup |
pdf |
23.04. |
KEIN VORTRAG – Sie lesen sich in Ihr Thema ein |
30.04. |
„Elevator-Speeches“ (5-10 Minuten je
Themengruppe) |
07.05. |
Jens Pöthig,
Markus Klepin |
Grid Computing (Thema 2) |
pdf |
14.05. |
Michael Bast |
NAT Traversal (Thema 4) |
pdf |
21.05. |
Gunnar Ruthenberg,
Robert Przewozny |
DHT, Performance-Analyse (Thema 5) |
pdf |
28.05. |
Martin Bertheau,
Frank Ewert |
Retrieval - Search and Query (Thema 6) |
|
04.06. |
Cornelia Krasniqi,
Rainer Rehak |
File Sharing (Thema 7) |
pdf |
11.06. |
„Elevator-Speeches“
2. Runde |
18.06. |
Robert Przewozny,
Michael Bast |
Anonymity, Privacy (Thema 9A) |
|
25.06. |
Martin Bertheau,
Frank Ewert |
Anonymity, Privacy (Thema 9B) |
|
02.07. |
Jens Pöthig,
Markus Klepin |
Censorship-Resistance (Thema 10A) |
|
09.07. |
Gunnar Ruthenberg |
Censorship-Resistance (Thema 10B) |
|
16.07. |
Cornelia Krasniqi,
Rainer Rehak |
Disruption Tolerant Networks (Thema 13) |
|
Further Readings (books):
- Andy Oram. Peer-to-Peer : Harnessing the Power of
Disruptive Technologies. O'Reilly; 2001. ISBN:
059600110X
- Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer
Systems and Applications. Springer; 2005. ISBN: 3-540-29192-X
Interesting Links:
|
|
|