Overlay and P2P Networks
Exam
Year | Semester | Date | Period | Language | In charge |
---|---|---|---|---|---|
2014 | spring | 13.01-20.02. | 3-3 | English | Sasu Tarkoma |
Lectures
Time | Room | Lecturer | Date |
---|---|---|---|
Mon 14-16 | D122 | Sasu Tarkoma | 13.01.2014-20.02.2014 |
Thu 12-14 | D122 | Sasu Tarkoma | 13.01.2014-20.02.2014 |
Exercise groups
Time | Room | Instructor | Date | Observe |
---|---|---|---|---|
Wed 16-18 | B222 | Juhani Toivonen | 13.01.2014—21.02.2014 |
General
Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics:
- Currently deployed peer-to-peer systems and how they work
- Distributed Hash Tables as a base for structured peer-to-peer systems
- Peer-to-peer storage systems and their performance evaluation
- Performance issues, legal aspects, and privacy issues
- Peer-to-peer content distribution algorithms
Completing the course
Course grading will be based on the final exam and the assignments. The assignments are done working with a pair. The aim of the assignments are to introduce crucial development and evaluation techniques and illustrate the topics covered during the lectures.
Results
Results of the separate exam 25.4.2014.
Results of the 17.6.2014 exam.
Results of the 28.11.2014 exam.
Literature and material
Tentative Schedule
13.1. Overview and exercises. Exercise details. Introduction.
16.1. Unstructured networks I. (Overview of NATs, background material).
(Additional details on Skype circa 2006 here).
20.1. Unstructured networks II.
23.1. Bittorrent, modelling and evaluation (including additional slides).
27.1. Freenet and intro to power-law networks. (added clarifying text to Freenet SSK and KSK on 30.1).
(Background link: attacks on Opennet)
30.1. Power-law networks. (note new terminology summary slide).
3.2. Consistent hashing. Distributed Hash Tables (DHT) I.
6.2. DHT II. Lecture given by Dr. Samu Varjonen.
10.2. Applications I (Moved dynamo slides to the next slideset to avoid overlap).
13.2 Applications II (note Dynamo continued from 10.2.).
17.2. Advanced topics. SDN and evolution of overlay networks.
Exercises
Support material
Kademlia visualizer by Toni Ruottu
Slideset: Additional material on DHTs (not part of exam material).
Article: Theory and Practice of Bloom Filters for Distributed Systems. IEEE Surveys and Tutorials.
Slideset: Modeling and Analysis of Anonymous-Communication Systems. J. Feigenbaum. Presentation at WITS 2008. General idea of MIX and Onion Routing are part of the exam material, this presentation provides additional details on the security model (that are not part of the exam material).
Article: P. Savolainen et al. Windowing BitTorrent for Video-on-Demand: Not All is Lost with Tit-for-Tat. Globecom 2008. Background information on Video-on-Demand with BitTorrent, and simulation. Not part of exam material.
Article: R. Cohen et al. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 85, 4626–4628 (2000). Background info and derivation of the resiliency formula (power law slides). Additional details not part of exam material.
G. DeCandia et al. Dynamo: Amazon’s Highly Available Key-value Store. SOSP 2007.
Lectures are based on the following book:
S. Tarkoma. Overlay Networks: Toward Information Networking. 260 pages. CRC Press / Auerbach, February 2010.