MSIT 491 Peer-to-peer computing - Detailed Schedule
- (3/1) Introduction to distributed systems and P2P computing
- Introduction and history
Lecture slides: Introduction | Architecture | Processes | IPC .Reading: D. Clifford Neuman. Scale in Distributed Systems. In Casavant, T. and Singhal M. (eds.), Readings in Distributed Computing Systems, Los Alamitos, CA, 1994, pp 463-489.
- Processes and inter-process communication
Reading: V. Krishnaswamy, D. Walther, S. Bhola, E. Bommaiah, G. Riley, B. Topol, and M. Ahamad. Efficient Implementation of Java Remote Method Invocation (RMI). In Proc. of USENIX Conference on Object-Oriented Technologies and Systems (COOTS), Apr. 1998.
- Software architecture and architectural styles
Reading: P. Eugster, P. Felber, R. Guerraoui, and A-M. Kermarrec. The many faces of publish/subscribe. ACM Computing Survey, 35(2): 114-131 (2003).
- Systems architecture
Reading: H. Balarkishnan, M. Frans Kaashoek, D. Karger, R. Morris, and I. Stoica. Looking up data in P2P systems. Communication of the ACM, 46(2): 43-48 (2003).
- Self-management in distributed systems
Reading: J. Kephart and D. Chess. The Vision of Autonomic Computing. IEEE Computer 36(1): 41-50 (2003).
- (3/8) The appeal of P2P
- The P2P environment
Lecture slides: Naming | P2P Protocols | SOSR | Drafting .Reading: E.K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials, 7(2):72-93, Mar. 2005.
- The network is the computer - P2P example applications
Reading: M. Freedman, E. Freudenthal and D. Mazieres, Democratizing content publication with Coral, In Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI), March 2004.
Reading: K. Gummadi, Madhyastha, S. Gribble, H. Levy, and D. Wetherall. Improving the reliability of Internet paths with one-hop source routing. In Proc. of USENIX Symposium on Operating Systems Design and Implementation (OSDI), Dec. 2004.
- How P2P is changing/challenging the way we do business
Reading: Y. Benkler. The battle over the institutional ecosystem in the digital environment. In Communication of the ACM 44(2):84-90, Feb. 2001.
- P2P potentials and limitations
Reading: A. Su, D. Choffnes, A. Kuzmanovic, and F.Bustamante. Drafting Behind Akamai (Travelocity-Based Detouring). In Proc. of ACM SIGCOMM, Sep. 2006.
- (3/15) Challenges in P2P computing
- Decentralization and performance
Reading: Y. Qiao and F. Bustamante. Structured and Unstructured Overlays Under the Microscope - A Measurement-based View of Two P2P Systems That People Use. In Proc. of the 2006 USENIX Annual Technical Conference, Jun. 2006.
- Trust and censor resistance
Reading: M. Waldman, A. Rubin, and L. Cranor. Publius: A robust, tamper-evident, censorship-resistant web publishing system. In Proc. of USENIX Security Symposium, Aug. 2000.
- Pseudo anonymity and accountability
Reading: R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proc. of USENIX Security Symposium, Aug. 2004.
- Peers and their service providers
Reading: D. Choffnes and F. Bustamante. A practical approach to reducing cross-ISP traffic in peer-to-peer systems. Under submission. Feb. 2008.
- The unavoidable legal discussion
Reading: F. von Lohmann. Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers. In Proceedings of the International Workshop on Peer-to-Peer Systems, Berkeley, CA, Feb. 2003.
Defining distributed systems and their goals; basic hardware and software concepts; communication; instantiating and placing the software component of a distributed system; naming and locating entities.
Peer-to-peer computing key ideas, useful applications, potential and limitations.
A few of the challenges addressed by P2P and some of those it faces.