Overlay and P2P Networks

582615
5
Networking and Services
Advanced studies
Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics: Overlay and p2p algorithms and systems, currently deployed systems, resource location, data delivery, reliability and performance issues, and legal and privacy issues.

Exam

26.02.2014 16.00 A111
Year Semester Date Period Language In charge
2014 spring 13.01-20.02. 3-3 English Sasu Tarkoma

Lectures

Time Room Lecturer Date
Mon 14-16 D122 Sasu Tarkoma 13.01.2014-20.02.2014
Thu 12-14 D122 Sasu Tarkoma 13.01.2014-20.02.2014

Exercise groups

Group: 1
Time Room Instructor Date Observe
Wed 16-18 B222 Juhani Toivonen 13.01.2014—21.02.2014

General

 

Overlay networks and peer-to-peer technologies have become key components for building large scale distributed systems. This course will introduce overlay networks and peer-to-peer systems, discuss their general properties, and applications. The course will cover the following topics:

  • Currently deployed peer-to-peer systems and how they work
  • Distributed Hash Tables as a base for structured peer-to-peer systems
  • Peer-to-peer storage systems and their performance evaluation
  • Performance issues, legal aspects, and privacy issues
  • Peer-to-peer content distribution algorithms

Completing the course

Course grading will be based on the final exam and the assignments. The assignments are done working with a pair. The aim of the assignments are to introduce crucial development and evaluation techniques and illustrate the topics covered during the lectures.

 

Results

Spring 2014 course results

Results of the separate exam 25.4.2014.

Results of the 17.6.2014 exam.

Results of the 28.11.2014 exam.

 

 

 

Literature and material

Tentative Schedule

(iCalendar import)

 

13.1. Overview and exercises. Exercise details. Introduction.

 

16.1. Unstructured networks I.  (Overview of NATs, background material).

(Additional details on Skype circa 2006 here).

20.1. Unstructured networks II. 

23.1. Bittorrent, modelling and evaluation (including additional slides). 

27.1. Freenet and intro to power-law networks. (added clarifying text to Freenet SSK and KSK on 30.1).

(Background link: attacks on Opennet)

30.1. Power-law networks. (note new terminology summary slide).

3.2.  Consistent hashing. Distributed Hash Tables (DHT) I.

6.2.  DHT II.   Lecture given by Dr. Samu Varjonen.

 

10.2. Applications I (Moved dynamo slides to the next slideset to avoid overlap).

 

13.2 Applications II (note Dynamo continued from 10.2.).

 

17.2. Advanced topics. SDN and evolution of overlay networks. 

Conclusions and summary.

 

 

Exercises
Excercise set 1 (deadline 22.1. at 12:00) (Some answers)
Excercise set 2 (deadline 5.2. at 12:00) (Some answers)
Excercise set 3 (deadline 19.2. at 12:00) (Some answers)
 
Exercise points checklist (login with CS account)
 

Support material 

Kademlia visualizer by Toni Ruottu

Slideset: Additional material on DHTs (not part of exam material).

Article: Theory and Practice of Bloom Filters for Distributed Systems. IEEE Surveys and Tutorials. 

Slideset: Modeling and Analysis of Anonymous-Communication Systems. J. Feigenbaum.  Presentation at WITS 2008. General idea of MIX and Onion Routing are part of the exam material, this presentation provides additional details on the security model (that are not part of the exam material).

Article: P. Savolainen et al. Windowing BitTorrent for Video-on-Demand: Not All is Lost with Tit-for-Tat. Globecom 2008. Background information on Video-on-Demand with BitTorrent, and simulation. Not part of exam material. 

 

Article: R. Cohen et al. Resilience of the Internet to Random Breakdowns. Phys. Rev. Lett. 85, 4626–4628 (2000). Background info and derivation of the resiliency formula (power law slides).  Additional details not part of exam material.

 

G. DeCandia et al. Dynamo: Amazon’s Highly Available Key-value Store.  SOSP 2007.

Article: Weixiong Rao, Lei Chen, Pan Hui, Sasu Tarkoma. Move: A Large Scale Keyword-based Content Filtering and Dissemination System. ICDCS 2012. This article is not part of the exam material. It shows how to implement a scalable full text search based on a 1-hop DHT such as Dynamo.
 
 

Lectures are based on the following book: 

S. Tarkoma. Overlay Networks: Toward Information Networking. 260 pages. CRC Press / Auerbach, February 2010.