UNIVERSITY OF CRETE
COMPUTER SCIENCE DEPARTMENT
CS 554. Peer-to-Peer
Systems
Lectures (Fall 2006): Tuesdays and Thursdays 3:00-5:00 pm
Location: RA 203
Name
|
E-mail
|
Office
|
Office Hours
|
Instructor: Mema Roussopoulou
|
mema@eecs.harvard.edu
|
G 215
|
Tuesdays and Thursdays, 2:00-3:00 pm
|
Teaching Assistant: Harris Papadakis
|
adanar@csd.uoc.gr
|
To Be Determined
|
To Be Determined
|
Announcements
1) Please make sure you subscribe to the hy554
mailing list. We will use this list to make important announcements as
the semester proceeds. See directions below for how to subscribe.
Course Description
Peer-to-peer systems have recently gained a lot of attention in the
social, academic, and commercial communities. One of the early
driving forces behind the peer-to-peer concept is that there are many
PCs in homes and offices that lie idle for large chunks of time. Why
not leverage these idle resources to do something useful, like share
computation or share content? In fact, peer-to-peer systems have
become synonymous with file-sharing systems as systems like Napster,
Gnutella, Kazaa and BitTorrent have enjoyed explosive popularity over the last few
years.
While file-sharing has been very successful, peer-to-peer systems are
important and useful for more than just (illegal) sharing of song
files. In this class, we will study peer-to-peer systems in depth to
understand what they are, what they are good for, and how to improve
them. The class will be primarily based on discussions of recent
research papers on peer-to-peer systems. Topics include: routing,
search, caching, security, reputation and trust, incentives, and
applications.
This class is geared toward graduate students at all levels as well as
advanced undergraduates (Computer Science 345 and Computer Science 335
are required).
Assignments
This course will involve reading papers, writing reviews for papers, participating in class
discussions, presenting papers and leading class discussions, and a final exam.
Students will be required to write reviews for papers they read. Look
here to get information on how to write a
review. Reviews are due before each class by email. (Send these as a
single email with "Review for Day/Month" in the subject line, where Day/Month is
the current lecture
date. Send the email to
both the instructor (mema@eecs.harvard.edu) and the Teaching Assistant (adanar@csd.uoc.gr)
Please send reviews in plain text.)
Students will actively participate in class discussions. For each paper, we will study the
contribution of the paper, place this contribution in context of previous literature,
critique the methodology used and the evaluation presented. Be prepared to come
to class having read the paper carefully and ready to discuss questions or comments you have
in detail.
In addition, students will present one or more papers and lead the discussion in
the class. I will help you lead the discussion.
Note: NO LAPTOPS ALLOWED IN CLASS. You must have access to a printer so
you may download, print copies of the papers (available below), and bring them
to class for the discussions. I recommend you scribble directly on a paper any notes
or questions that arise as you are reading. In fact, taking detailed notes on the paper
and then reading through them before writing your review and before coming to class is
a good idea. You are also welcome to send any questions
about the paper to the staff before class if you feel shy asking about
a particular detail in the paper.
Class Mailing List
Class mailing list: hy554-list@csd.uoc.gr .
We will use this list to send out
any important announcements, so please be sure to subscribe.
You can subscribe to the mailing list by sending email to majordomo@csd.uoc.gr
with a blank Subject line and a single line of text in the Body of the email
stating:
subscribe hy554-list
Grading
Reviews: 30%
Paper presentations: 15%
Class Participation: 15%
Final Exam: 40%
Syllabus & Schedule
(bibliography)
Date
|
Topic
|
Readings
|
Presenter
|
3/10
|
Course Overview, P2P Overview
|
-- No reading --
|
Roussopoulou
|
5/10
|
Routing
|
A Scalable Content Addressable Network
|
Roussopoulou
|
10/10
|
Routing
|
Chord,
Serving DNS Using a Peer-to-Peer Lookup Service
|
Themistoklis Bourdenas
(presentation)
|
12/10
|
Applications: PAN,
Applications: Vivaldi
|
A Directory Service for Perspective Access Networks
Vivaldi: A Decentralized Network Coordinate System
|
Giannis Georgalis
(presentation)
|
17/10
|
No class due to elections
|
-- No Reading --
|
N/A
|
19/10
|
No class due to elections
|
-- No Reading --
|
N/A
|
24/10
|
Routing, Incentives
|
Making Gnutella-like P2P Systems Scalable
,
Designing Incentives for Peer-to-Peer Routing
|
Giorgos Markakis
(presentation)
|
26/10
|
Applications: Samsara
|
Samsara: Honor Among Thieves in Peer-to-Peer Storage
|
Michael Foukarakis
(presentation)
|
31/10
|
Measurement
|
Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
|
Antonis Bikakis
(presentation)
|
2/11
|
Applications: LOCKSS
|
Preserving Peer Replicas By Rate-Limited Sampled Voting
|
Katertzis Kostas
(presentation)
|
7/11
|
No class -- Instructor at OSDI. Backup class on 16/1.
|
-- No Reading --
|
N/A
|
9/11
|
No class -- Instructor at OSDI. Backup class on 18/1.
|
-- No Reading --
|
N/A
|
14/11
|
Legal issues in P2P -- Papers moved to 21/11 and 5/12. See below for schedule adjustment
|
Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers
,
Are Contributions to P2P Technical Forums Private or Public Goods? - An Empirical Investigation
SPIES: Secret Protection Incentive-based Escrow System,
|
Markakis Giorgos,
(presentation)
Markakis Giorgos,
(presentation)
Giannis Georgalis
(presentation)
|
16/11
|
Security -- Paper moved to 23/11
|
A Survey of Peer-to-Peer Security Issues
|
Michael Foukarakis
(presentation)
|
21/11
|
Incentives
|
Incentives Build Robustness in Bit Torrent
Faithfulness in Internet Algorithms
SPIES: Secret Protection Incentive-based Escrow System,
|
Kondylakis Xarhs
(presentation),
Kondylakis Xarhs
(presentation),
Giannis Georgalis
(presentation)
|
23/11
|
Security
|
The Sybil Attack
,
Vigilante: End-to-End Containment of Internet Worms
A Survey of Peer-to-Peer Security Issues
|
Katertzis Kostas
(presentation)
, Kondylakis Xaris
(presentation),
Michael Foukarakis
(presentation)
|
28/11
|
Reputation -- Paper moved to 30/11.
|
Experience with an Object Reputation System for Peer-to-Peer File-Sharing ,
|
Vaggelis Mangas
(presentation)
|
30/11
|
Applications: FreeHaven
|
The Free Haven Project: Distributed Anonymous Storage Service
Experience with an Object Reputation System for Peer-to-Peer File-Sharing ,
|
Themistoklis Bourdenas
(presentation),
Vaggelis Mangas
(presentation)
|
5/12
|
Applications: Tor
Reputation
|
Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers
,
Are Contributions to P2P Technical Forums Private or Public Goods? - An Empirical Investigation
Tor: The Second-Generation Onion Router
Reputation in P2P Anonymity Systems
|
Giorgos Markakis
(presentation),
(presentation),
(presentation),
(presentation)
|
7/12
|
Incentives, Applications
|
Robust Incentive Techniques for Peer-to-Peer Networks
,
P2P Content Search: Give the Web Back to the People
|
Themistoklis Bourdenas
(presentation)
|
12/12
|
Applications: Skype
|
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
An Experimental Study of the Skype Peer-to-Peer VoIP System
|
Michael Foukarakis
(presentation)
|
14/12
|
Applications: Pub-Sub for the Web, File-sharing
|
Gossip-based Search Selection in Hybrid Peer-to-Peer Networks
,
Corona: A High Performance Publish-Subscribe System for the World Wide Web
|
Giannis Georgalis
(presentation),
(presentation)
|
19/12
|
Security
|
Eclipse Attacks on Overlay Networks: Threats and Defenses
,
NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation
|
Vaggelis Mangas
(presentation),
(presentation)
|
21/12
|
Applications: Information Retrieval
|
Mercury: Supporting Scalable Multi-Attribute Range Queries
|
Antonis Bikakis
(presentation),
|
9/1
|
Applications
|
Experiences in building and operating ePOST, a reliable peer-to-peer application
|
Vaggelis Mangas
(presentation)
|
11/1
|
Incentives, Applications
|
SWIFT: A System With Incentives For Trading
,
SmartSeer:Using a DHT to Process Continuous Queries over Peer-to-Peer Networks
|
Katertzis Kostas
(presentation),
(presentation)
|
16/1
|
Applications: Digital Libraries
|
OverCite: A Distributed, Cooperative CiteSeer
|
Kondylakis Xarhs
(presentation)
|
18/1
|
Exploring Design Spaces,
2 P2P or Not 2 P2P?
|
Exploring the Design Space of Distributed and P2P Systems
,
2 P2P or Not 2 P2P?
Last day of class.
|
Antonis Bikakis
(presentation)
|
Bibliography
- A Scalable Content Addressable Network.
S. Ratnasamy, P. Francis, M. Handley, R. Karp and S. Shenker.
Proceedings of the ACM SIGCOMM 2001 Conference.
August, 2001. San Diego, CA.
- Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
I. Stoica and R. Morris and D. Karger and M. F. Kaashoek and H. Balakrishnan.
Proceedings of the ACM SIGCOMM 2001 Conference.
August, 2001. San Diego, CA.
- Serving DNS Using a Peer-to-Peer Lookup Service.
Russ Cox, Athicha Muthitacharoen and Robert T. Morris.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02).
March 2002. Cambridge, MA.
-
OpenDHT: A Public DHT Service and Its Uses. Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu. Proceedings of ACM SIGCOMM 2005, August 2005.
- Network-Aware Operator Placement for Stream-Processing Systems
Peter Pietzuch, Jonathan Ledlie, Jeffrey Shneidman, Mema Roussopoulos, Matt Welsh, Margo Seltzer, ICDE 2006, April, 2006.
- Middleboxes No Longer Considered Harmful.
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker.
OSDI 2004.
- Making Gnutella-like P2P Systems Scalable.
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, and Scott Shenker.
SIGCOMM 2003. August 2003. Karlsruhe, Germany.
- Designing Incentives for Peer-to-Peer Routing.
Alberto Blanc, Yi-Kai Liu, Amin Vahdat.
Workshop on Economics of Peer-to-Peer Systems. June 2004.
- Preserving Peer Replicas By Rate-Limited Sampled Voting.
Petros Maniatis, Mema Roussopoulos, TJ Giuli, David S. H. Rosenthal,
Mary Baker, and Yanto Muliadi.
Proceedings of the 19th ACM SOSP. October 2003. Bolton Landing, NY.
- Samsara: Honor Among Thieves in Peer-to-Peer Storage.
Landon P. Cox, Brian D. Noble.
Proceedings of the 19th ACM SOSP. October 2003. Bolton Landing, NY.
- Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload.
Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble,
Henry M. Levy, and John Zahorjan.
Proceedings of the 19th ACM SOSP. October 2003. Bolton Landing, NY.
- Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers.
Fred von Lohmann.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '03).
February 2003. Berkeley, CA.
- Are Contributions to P2P Technical Forums Private or Public Goods? - An Empirical Investigation.
Bin Gu and Sirkka Jarvenpaa.
Workshop on Economics of Peer-to-Peer Systems. June 2003. Berkeley, CA.
- 2 P2P or Not 2 P2P?.
Mema Roussopoulos, Mary Baker, David Rosenthal, TJ Giuli, Petros
Maniatis, and Jeff Mogul.
Proceedings of the Third International Workshop on Peer-to-Peer Systems (IPTPS '04).
February 2004. La Jolla, CA.
- The Sybil Attack.
J. Douceur.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02).
March 2002. Cambridge, MA.
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham,
Vigilante: End-to-End Containment of Internet Worms, SOSP 2005.
-
M. Castro, M. Costa, and A. Rowstron, Debunking some myths about structured and unstructured overlays, NSDI 2005.
- Kill the Messenger: A Taxonomy of Rational Attacks.
S. Nielson, S. Crosby, D. Wallach.
IPTPS 2005.
- Exploring the Design Space of Distributed and P2P Systems.
Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02).
March 2002. Cambridge, MA.
- The Free Haven Project: Distributed Anonymous Storage Service.
Roger Dingledine, Michael Freedman, and David Molnar.
Workshop on Design Issues in Anonymity and Unobservability. July 2000.
International Computer Science Institute (ICSI), Berkeley, CA.
- Cashmere: Resilient Anonymous Routing. Li Zhuang, Feng Zhou,
Ben Y. Zhao and Antony Rowstron, NSDI 2005.
- P2P Content Search: Give the Web Back to the People.
Matthias Bender, Sebastian Michel, Peter Triantafillou, Gerhard Weikum, Christian Zimmer IPTPS 2006.
-
Salman A. Baset and Henning Schulzrinne, An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol", IEEE Infocom 2006.
-
An Experimental Study of the Skype Peer-to-Peer VoIP System.
Saikat Guha, Neil Daswani, Ravi Jain.
- Chunkyspread: Multi-tree Unstructured Peer-to-Peer Multicast.
Vidhyashankar Venkataraman, Paul Francis.
- SPIES: Secret Protection Incentive-based Escrow System.
N. Margolin, M. Wright, B. Levine.
Workshop on Economics of Peer-to-Peer Systems. June 2004.
- A Survey of Peer-to-Peer Security Issues.
Dan S. Wallach.
International Symposium on Software Security. November 2002.
- Balances of Power on eBay: Peers or Unequals?.
Ben Gross and Alessandro Acquisti.
Workshop on Economics of Peer-to-Peer Systems. June 2003. Berkeley, CA.
- The Impact of DHT Routing on Resilience and Proximity.
K. Gummadi and R. Gummadi and S. Gribble and S. Ratnasamy and S. Shenker and I. Stoica.
SIGCOMM 2003. August 2003. Karlsruhe, Germany.
- Incentives Build Robustness in Bit Torrent.
Bram Cohen.
Workshop on Economics of Peer-to-Peer Systems. June 2003. Berkeley, CA.
- Faithfulness in Internet Algorithms.
Jeffrey Shneidman, David Parkes, Laurant Massoulie.
PINS 2004.
- ConChord: Cooperative SDSI Certificate Storage and Name Resolution.
Sameer Ajmani, Dwaine Clarke, Chuang-Hue Moh and Steven Richman.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02).
March 2002. Cambridge, MA.
- Network Measurement as a Cooperative Enterprise.
Sridhar Srinivasan and Ellen Zegura.
Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02).
March 2002. Cambridge, MA.
- Rationality and Self-Interest in Peer-to-Peer Networks.
Jeff Shneidman and David Parkes.
Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03).
February 2003. Berkeley, CA.
- Enforcing Fair Sharing of Peer-to-Peer Resources.
Tsuen-Wan Ngan, Dan Wallach, Peter Druschel.
Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03).
February 2003. Berkeley, CA.
- Reputation in P2P Anonymity Systems.
Roger Dingledine, Nick Mathewson, and Paul Syverson.
Workshop on Economics of Peer-to-Peer Systems. June 2003. Berkeley, CA.
- A Robust Reputation System for P2P and Mobile Ad-hoc Networks. Sonja
Buchegger and Jean-Yves Le Boudec. Proceedings of the 2nd Workshop on Economics
of Peer-to-Peer Systems. June 2004.
- Tor: The Second-Generation Onion Router. Roger Dingledine, Nick
Mathewson, and Paul Syverson. Proceedings of the 13th USENIX Security Symposium.
September 2004.
- Robust Incentive Techniques for Peer-to-Peer Networks. M. Feldman, K.
Lai, I. Stoica, and J. Chuang, ACM E-Commerce Conference (EC'04). May 2004.
- Splitstream: High-Bandwidth Multicast in a Cooperative Environment.
M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh. In
SOSP '03. Oct. 2003.
- Incentives-Compatible Peer-to-Peer Multicast. Tsuen-Wan "Johnny" Ngan,
Dan S. Wallach, and Peter Druschel. Proceedings of the 2nd Workshop on Economics
of Peer-to-Peer Systems. June 2004. Cambridge, Massachusetts.
- Defending against the Eclipse attacks in Overlay Networks. M. Castro,
A. Rowstron and P. Druschel. Proceedings of the 11th ACM SIGOPS European
Workshop. Sep 2004.
- Eclipse Attacks on Overlay Networks: Threats and Defenses Ngan et al., Infocom 2006.
- Mercury: Supporting Scalable Multi-Attribute Range Queries. Ashwin R.
Bharambe, Mukesh Agrawal, and Srinivasan Seshan. In SIGCOMM. August, 2004.
- SWIFT: A System With Incentives For Trading. Karthik Tamilmani, Vinay
Pai, and Alexander E. Mohr. Proceedings of the 2nd Workshop on the Economics of
Peer-to-peer Systems. June 2004. Cambridge, MA.
- SmartSeer:Using a DHT to Process Continuous Queries over Peer-to-Peer Networks. Kannan, Yang, Shenker, Sharma, Banerjee, Basu, Lee. Infcocom, April 2006.
- OverCite: A Distributed, Cooperative CiteSeer. Jeremy Stribling et al. NSDI 2006.
- Experience with an Object Reputation system for Peer-to-Peer Filesharing. Kevin Walsh and Emin Gun Sirer. NSDI 2006.
- Corona: A High Performance Publish-Subscribe System for the Web.
Venugopalan Ramasubramanian, Ryan Peterson, and Emin Gun Sirer, NSDI 2006.
- Vivaldi: A Decentralized Network Coordinate System. Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris. SIGCOMM 2004.
- NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation.
Venkat Padmanabhan, Sriram Ramabhadran, Jitendra Padhye. IPTPS 2005.
Previous Years at Harvard University
Spring 2006
Spring 2005
Spring 2004