| Abstract: The goal of the seminar is to examine peer-to-peer technologies, systems and applications, and to identify key research issues and challenges that lie ahead. Famous projects/products will give us a sense of what actual peer-to-peer systems look like and how they behave.
| Synopsis:- Seminar, Praktische Informatik, Hauptstudium / Master-Programm.
- 1 meeting each week; for one semester (2 SWS).
Policies: - Attend regularly!
- You are allowed to miss at most one seminar without prior and reasonable excuse.
- Work in teams!
- Each of the topics below should be investigated by a group of 2-3 students. This means that you have to join more than one group, i.e. investigate more than one topic, during the seminar.
- Each group should meet outside class at least once to discuss findings, compare arguments and compose a presentation strategy.
- Do your own investigations!
- Use additional resources on the web - the suggested papers are only a jump start.
- Try to find opposing arguments - this makes research interesting :-)
- Present at least twice!
- Members of an investigation group present their findings together, or, choose one speaker.
- You can always improve your presentation style. Dare to experiment with different styles and choreographies. The audience will give you constructive feedback at the end of each seminar (Bewertungskriterien-Seminarvortrag).
- Each student must present at least 2 times during the semester (i.e. 2 different topics) to obtain credits (Seminarschein).
- A PowerPoint template can be obtained here.
Prerequisites: - Basic knowledge of network protocols, database systems and operating systems principles required.
- Almost no programming skills required - but won't hurt either.
Wiki: Topics: 1. Historical Perspective / Introduction | - Peer-to-Peer Pioneers:
- Napster (file sharing)
- Seti@home (grid computing)
- Skype (internet telephony)
- A Network of Peers (pdf)
- Peer-to-Peer Systems and Applications: What is p2p about? (pdf), Past and Future (pdf), Application Areas (pdf)
- Centralized / Fully Distributed / Hybrid Peer-to-Peer Systems (pdf)
| 2. Grid Computing | - SETI@home: An Experiment in Public Resource Computing (pdf)
- Folding@home (http://folding.stanford.edu/)
- BOINC: A System for Public-Resource Computing and Storage (pdf)
- Distributed Computing – GRID Computing (pdf)
- Screen Savers of the World Unite! (pdf)
| 3. Instant Messaging and Internet Telephony | - Introduction to Instant Messaging (pdf)
- Jabber - book 'Peer-to-Peer' chapter 5 (pdf)
- An analysis of the Skype peer-to-peer Internet Telephony Protocol (pdf)
- An Experimental Study of the Skype Peer-to-Peer VoIP System. (pdf)
| 4. NAT Traversal | - Peer-to-Peer Communication Across Network Address Translators (pdf)
- IETF RFC 3489: STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (txt)
- IETF draft-rosenberg-midcom-turn-08. Traversal Using Relay NAT (TURN) (txt)
| 5. Lookup in Structured p2p (DHT) [2x] | - Overview: Difference lookup / search / query (difference structured / unstructured p2p)
- DHT - Distributed Hash Table (pdf)
- Selected DHT Algorithms (pdf)
- Comparing the performance of DHTs under churn (pdf)
- Simple Load Balancing for Distributed Hash Tables (pdf)
- Security: DHT Routing Using Social Links (pdf)
| 6. Information Retrieval (Search and Query) | - BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to-Peer Search (pdf)
- Algorithmic Aspects of Overlay Networks (pdf)
- Schema-Based Peer-to-Peer Systems (pdf)
- Supporting Information Retrieval in Peer-to-Peer Systems (pdf)
- Hybrid Peer-to-Peer Systems (pdf)
| 7. Distributed Storage (File Sharing) | - Gnutella
- p2p file sharing technologies: Napster, Gnutella and beyond (pdf)
- Improving the Gnutella Protocol (pdf)
- Why Gnutella can't scale. No, really. (pdf)
- Gnutella Network Case Study (pdf)
- eDonkey
- BitTorrent
- Exploiting BitTorrent for fun (but not profit) [Liogkas06.pdf]
- Do incentives build robustness in BitTorrent? (pdf)
- Tribler
| 8. Content Distribution | - Application-Layer Multicast (pdf)
- ePOST (pdf)
- ChunkCast: An Anycast Service for Large Content Distribution [Chun06]
- Anatomy of a P2P Content Distribution system with Network Coding [Gkant]
| 10. Censorship-Resistance | - Freenet
- Protecting Free Expression Online with Freenet (pdf)
- Freenet: A Distributed Anonymous Information Storage and Retrieval System (pdf)
- Using the Small-World Model to Improve Freenet Performance (pdf)
- Eternity
- The Eternity Service (pdf)
- The Strong Eternity Service (pdf)
- Publius
- Publius: A robust, tamper-evident, censorship-resistant web publishing system (pdf)
- Free Haven
- Free Haven: Distributed Anonymous Storage Service (pdf)
- Free Haven: Design and Deployment of an Anonymous Secure Data Haven (pdf)
| 11. Business Aspects [0x] | - Lottery Trees: Motivational Deployment of Networked Systems. (pdf)
- Can Internet Video-on-Demand be Profitable? (pdf)
| 12 Security / Trust / Reputation | - Security-Related Issues in Peer-to-Peer Networks (pdf)
- Accounting in Peer-to-Peer-Systems (pdf)
- Reputation Systems: Facilitating Trust in Internet Interactions (pdf)
- Reputation in P2P Anonymity Systems (pdf)
- Reputation Management in Peer-to-peer Systems (pdf)
- Taxonomy of Trust: Categorizing P2P Reputation Systems (pdf)
- PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities (pdf)
- Poblano - A Distributed Trust Model for Peer-to-Peer Networks (pdf)
- The EigenTrust Algorithm for Reputation Management in P2P Networks (pdf)
| 13. Mobile and Ubiquitous Environments / Disruption Tolerant Networks (DTN) | - DakNet- rethinking connectivity in developing nations (pdf)
- Spontaneous Collaboration in Mobile Peer-to-Peer Networks (pdf)
- Epidemic Data Dissemination for Mobile Peer-to-Peer Lookup Services (pdf)
- Epidemic Routing for Partially-Connected Ad Hoc Networks (pdf)
|
Presentation assignments: Date | Presenter(s) | Topic(s) | Slides | 16.04. | Redlich | Setup | pdf | 23.04. | KEIN VORTRAG – Sie lesen sich in Ihr Thema ein | 30.04. | „Elevator-Speeches“ (5-10 Minuten je Themengruppe) | 07.05. | Jens Pöthig, Markus Klepin | Grid Computing (Thema 2) | pdf | 14.05. | Michael Bast | NAT Traversal (Thema 4) | pdf | 21.05. | Gunnar Ruthenberg, Robert Przewozny | DHT, Performance-Analyse (Thema 5) | pdf | 28.05. | Martin Bertheau, Frank Ewert | Retrieval - Search and Query (Thema 6) | | 04.06. | Cornelia Krasniqi, Rainer Rehak | File Sharing (Thema 7) | pdf | 11.06. | „Elevator-Speeches“ 2. Runde | 18.06. | Robert Przewozny, Michael Bast | Anonymity, Privacy (Thema 9A) | | 25.06. | Martin Bertheau, Frank Ewert | Anonymity, Privacy (Thema 9B) | | 02.07. | Jens Pöthig, Markus Klepin | Censorship-Resistance (Thema 10A) | | 09.07. | Gunnar Ruthenberg | Censorship-Resistance (Thema 10B) | | 16.07. | Cornelia Krasniqi, Rainer Rehak | Disruption Tolerant Networks (Thema 13) | |
Further Readings (books): - Andy Oram. Peer-to-Peer : Harnessing the Power of Disruptive Technologies. O'Reilly; 2001. ISBN: 059600110X
- Ralf Steinmetz, Klaus Wehrle (Eds). Peer-to-Peer Systems and Applications. Springer; 2005. ISBN: 3-540-29192-X
Interesting Links: | |
|