Overlay and P2P Networks

582615
5
Hajautetut järjestelmät ja tietoliikenne
Syventävät opinnot
Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics: Overlay and p2p algorithms and systems, currently deployed systems, resource location, data delivery, reliability and performance issues, and legal and privacy issues.

Koe

26.02.2014 16.00 A111
Vuosi Lukukausi Päivämäärä Periodi Kieli Vastuuhenkilö
2014 kevät 13.01-20.02. 3-3 Englanti Sasu Tarkoma

Luennot

Aika Huone Luennoija Päivämäärä
Ma 14-16 D122 Sasu Tarkoma 13.01.2014-20.02.2014
To 12-14 D122 Sasu Tarkoma 13.01.2014-20.02.2014

Harjoitusryhmät

Group: 1
Aika Huone Ohjaaja Päivämäärä Huomioitavaa
Ke 16-18 B222 Juhani Toivonen 13.01.2014—21.02.2014

Yleistä

 

Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics:

  • Currently deployed peer-to-peer systems and how they work
  • Distributed Hash Tables as a base for structured peer-to-peer systems
  • Peer-to-peer storage systems and their performance evaluation
  • Performance issues, legal aspects, and privacy issues
  • Peer-to-peer content distribution algorithms

Kurssin suorittaminen

Course grading will be based on the final exam and the assignments. The assignments are done working with a pair. The aim of the assignments are to introduce crucial development and evaluation techniques and illustrate the topics covered during the lectures.

 

Results

Spring 2014 course results

Results of the separate exam 25.4.2014.

Results of the 17.6.2014 exam.

Results of the 28.11.2014 exam.

 

 

 

Kirjallisuus ja materiaali

Tentative Schedule

(iCalendar import)

 

13.1. Overview and exercises. Exercise details. Introduction.

 

16.1. Unstructured networks I.  (Overview of NATs, background material).

(Additional details on Skype circa 2006 here).

20.1. Unstructured networks II. 

23.1. Bittorrent, modelling and evaluation (including additional slides). 

27.1. Freenet and intro to power-law networks. (added clarifying text to Freenet SSK and KSK on 30.1).

(Background link: attacks on Opennet)

30.1. Power-law networks. (note new terminology summary slide).

3.2.  Consistent hashing. Distributed Hash Tables (DHT) I.

6.2.  DHT II.   Lecture given by Dr. Samu Varjonen.

 

10.2. Applications I (Moved dynamo slides to the next slideset to avoid overlap).

 

13.2 Applications II (note Dynamo continued from 10.2.).

 

17.2. Advanced topics. SDN and evolution of overlay networks. 

Conclusions and summary.

 

 

Exercises
Excercise set 1 (deadline 22.1. at 12:00) (Some answers)
Excercise set 2 (deadline 5.2. at 12:00) (Some answers)
Excercise set 3 (deadline 19.2. at 12:00) (Some answers)
 
Exercise points checklist (login with CS account)
 

Support material 

Kademlia visualizer by Toni Ruottu

Slideset: Additional material on DHTs (not part of exam material).

Article: Theory and Practice of Bloom Filters for Distributed Systems. IEEE Surveys and Tutorials. 

Slideset: Modeling and Analysis of Anonymous-Communication Systems. J. Feigenbaum.  Presentation at WITS 2008. General idea of MIX and Onion Routing are part of the exam material, this presentation provides additional details on the security model (that are not part of the exam material).

Article: P. Savolainen et al. Windowing BitTorrent for Video-on-Demand: Not All is Lost with Tit-for-Tat. Globecom 2008. Background information on Video-on-Demand with BitTorrent, and simulation. Not part of exam material. 

 

Article: R. Cohen et al. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 85, 4626–4628 (2000). Background info and derivation of the resiliency formula (power law slides).  Additional details not part of exam material.

 

G. DeCandia et al. Dynamo: Amazon’s Highly Available Key-value Store.  SOSP 2007.

Article: Weixiong Rao, Lei Chen, Pan Hui, Sasu Tarkoma. Move: A Large Scale Keyword-based Content Filtering and Dissemination System. ICDCS 2012. This article is not part of the exam material. It shows how to implement a scalable full text search based on a 1-hop DHT such as Dynamo.
 
 

Lectures are based on the following book: 

S. Tarkoma. Overlay Networks: Toward Information Networking. 260 pages. CRC Press / Auerbach, February 2010.