Overlay and P2P Networks

582615
5
Networking and Services
Advanced studies
Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics: Overlay and p2p algorithms and systems, currently deployed systems, resource location, data delivery, reliability and performance issues, and legal and privacy issues.

Exam

27.02.2013 16.00 B123
Year Semester Date Period Language In charge
2013 spring 14.01-21.02. 3-3 English Sasu Tarkoma

Lectures

Time Room Lecturer Date
Mon 14-16 D122 Sasu Tarkoma 14.01.2013-21.02.2013
Thu 12-14 D122 Sasu Tarkoma 14.01.2013-21.02.2013

Exercise groups

Group: 1
Time Room Instructor Date Observe
Fri 14-16 D122 Toni Ruottu 21.01.2013—22.02.2013

Information for international students

General

 

Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics:

  • Currently deployed peer-to-peer systems and how they work
  • Distributed Hash Tables as a base for structured peer-to-peer systems
  • Peer-to-peer storage systems and their performance evaluation
  • Performance issues, legal aspects, and privacy issues
  • Peer-to-peer content distribution algorithms

Completing the course

Course grading will be based on the final exam and the assignments. The assignments are done as group work. The aim of the assignments are to introduce crucial development and evaluation techniques and illustrate the topics covered during the lectures.

 

 

 

Literature and material

Tentative Schedule

 

 

Support material 

Article: Theory and Practice of Bloom Filters for Distributed Systems. IEEE Surveys and Tutorials. (I updated link, the IEEE link had changed).

Slideset: Network Address Translation (ppt) (pdf). Only general NAT traversal issues covered in lecture slides are part of the exam material. (Skype uses solutions presented in the slides. If one node is behind a NAT, Skype uses Connection Reversal, if both are then Skype uses a relay node. More information here).

Slideset: Modeling and Analysis of Anonymous-Communication Systems. J. Feigenbaum.  Presentation at WITS 2008. General idea of MIX and Onion Routing are part of the exam material, this presentation provides additional details on the security model (that are not part of the exam material).

Article: P. Savolainen et al. Windowing BitTorrent for Video-on-Demand: Not All is Lost with Tit-for-Tat. Globecom 2008. Background information on Video-on-Demand with BitTorrent, and simulation. Not part of exam material. 

 

R. Cohen et al. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 85, 4626–4628 (2000). Background info and derivation of the resiliency formula (power law slides).  Additional details not part of exam material.

 

G. DeCandia et al. Dynamo: Amazon’s Highly Available Key-value Store.  SOSP 2007.

Weixiong Rao, Lei Chen, Pan Hui, Sasu Tarkoma. Move: A Large Scale Keyword-based Content Filtering and Dissemination System. ICDCS 2012. This article is not part of the exam material. It shows how to implement a scalable full text search based on a 1-hop DHT such as Dynamo.
 

Lectures are based on the following book: 

S. Tarkoma. Overlay Networks: Toward Information Networking. 260 pages. CRC Press / Auerbach, February 2010.