UNIVERSITY OF CRETE
COMPUTER SCIENCE DEPARTMENT
CS 554.
Peer-to-Peer Systems
Lectures (Fall 2007): Mondays 3:00-5:00 pm; Wednesdays 5:00-7:00 pm (Backup Classes,
if needed: Tues 3-5, Fri 11-1) 
Location: B211 (Mondays, Tuesdays, Fridays), RA 203 (Wednesdays) 
 
  | Name  | E-mail  | Office  | Office Hours  | 
 
  | Instructor: Mema Roussopoulou  | hy554@csd.uoc.gr | G 215  | Mondays and Wednesdays, 2:00-3:00 pm  | 
 
  | Teaching Assistant: Dimitris
  Antoniadis  | hy554@csd.uoc.gr | To Be Determined  | To Be Determined  | 
 
  | Teaching Assistant: Elias Athanasopoulos
   | hy554@csd.uoc.gr | To Be Determined  | To Be Determined  | 
 
Announcements 
1) Please make sure you subscribe to the hy554 mailing list. We will use this list
to make important announcements as the semester proceeds. See directions below
for how to subscribe. 
2) Please send us by Friday, Oct 5, three days on which you would like to present papers (one in October, 
one in November, and one in December.  Send your preferences to hy554-list@csd.uoc.gr
3) Due to instructor illness the schedule has been updated.  Please check below for latest
changes.
4) We will read in class a total of about 34 papers.  You are required to send in reviews
for 25 papers.  Any extra papers you write reviews for will be counted toward extra credit.
Reviews are due via email before class time on the day the paper is discussed in class.
5) Due to schedule changes, there are four papers, listed after the class schedule below
that we will not discuss in class.  You may read and send reviews for these four papers
for extra credit as well.  
6) The list of projects to choose from can be found here.Please form groups of two for the project.  Project choice due via email on Friday November 16.
 
Course Description 
Peer-to-peer systems have recently gained a lot of attention in the social, academic,
and commercial communities. One of the early driving forces behind the
peer-to-peer concept is that there are many PCs in homes and offices that lie
idle for large chunks of time. Why not leverage these idle resources to do
something useful, like share computation or share content? In fact,
peer-to-peer systems have become synonymous with file-sharing systems as
systems like Napster, Gnutella, Kazaa and BitTorrent have enjoyed explosive popularity over the last
few years. 
While file-sharing has been very successful, peer-to-peer systems are
important and useful for more than just (illegal) sharing of song files. In
this class, we will study peer-to-peer systems in depth to understand what they
are, what they are good for, and how to improve them. The class will be
primarily based on discussions of recent research papers on peer-to-peer
systems. Topics include: routing, search, caching, security, reputation and
trust, incentives, and applications. 
This class is geared toward graduate students at all levels as well as
advanced undergraduates (Computer Science 345 and Computer Science 335 are
required). 
Assignments 
This course will involve reading papers, writing reviews for papers,
participating in class discussions, presenting papers and leading class
discussions, and a final project. 
Students will be required to write reviews for papers they read. Look here to
get information on how to write a review. Reviews are due before each class by
email. (Send these as a single email with "Review for Day/Month" in
the subject line, where Day/Month is the current lecture date. Send the email
to hy554@csd.uoc.gr.  Please send reviews in plain text.) 
Students will actively participate in class discussions. For each paper, we
will study the contribution of the paper, place this contribution in context of
previous literature, critique the methodology used and the evaluation
presented. Be prepared to come to class having read the paper carefully and
ready to discuss questions or comments you have in detail.  Class participation is a portion of the
overall grade, and an easy way for you to gain points in the class.
In addition, students will present papers on one or more days and lead the
discussion in the class. The instructor will help you lead the discussion. 
Note: You must have access to a printer so you may download, print
copies of the papers (available below), and bring them to class for the discussions.  We recommend you scribble directly on a paper
any notes or questions that arise as you are reading. In fact, taking detailed
notes on the paper and then reading through them before writing your review and
before coming to class is a good idea. You are also welcome to send any
questions about the paper to the staff before class if you feel shy asking
about a particular detail in the paper. 
There are no dumb questions!!
Finally, students will be required to undertake
a major research project. Students are to work in groups of two or three (two
preferred). The goal is to tackle a problem that is not currently addressed in
the peer-to-peer literature, to propose a solution to the problem, and to
evaluate the solution using analysis, simulation, and/or experimental results.
At the end of the course, students will present their work with a short
demo/presentation.  Students will choose
the problem from a list of problem descriptions we provide.   The goal is to help students gain experience
in research and to produce a result that might lead to a publishable paper in
the future.  The list of projects from
which to choose will be posted here as the semester
progresses.  Many of these already have a
code base from which you can get started so you don’t have to start from
scratch.   
 
Class Mailing List
Class mailing list: hy554-list@csd.uoc.gr . We will use this list to send out
any important announcements, so please be sure to subscribe. You can subscribe
to the mailing list by sending email to majordomo@csd.uoc.gr
with a blank Subject line and a single line of text in the Body of the email
stating: subscribe hy554-list 
 
Grading 
Reviews: 10% 
Paper presentations: 20% 
Class Participation: 10% 
Final Project: 60% 
Syllabus & Schedule (tentative) 
(bibliography) 
 
  | Date
   | Topic
   | Readings  | Presenter
   | 
 
  | 1/10  | Course Overview, P2P Overview
 | -- No reading --  | Roussopoulou  | 
 
  | 3/10  | Routing  | A
  Scalable Content Addressable Network  | Roussopoulou  | 
 
  | 8/10  | Routing  | Chord,
  Serving
  DNS Using a Peer-to-Peer Lookup Service
 | Vassilis Lekakis  | 
 
  | 10/10  | Applications: PAN, Applications: Vivaldi
 | A
  Directory Service for Perspective Access Networks Vivaldi:
  A Decentralized Network Coordinate System
 | Vassilis Lekakis Emmanouel Kiriakakis  | 
 
  | 15/10  |  No class | -- No Reading
  --  | N/A  | 
 
  | 17/10  |  No class | -- No Reading
  --  | N/A  | 
 
  | 22/10  |    Class canceled   | -- No Reading
  --  | N/A  | 
 
  | 24/10  |   Class canceled   | -- No Reading
  --  | N/A  | 
 
  | 29/10  | Applications: CDNs, VoD | Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
 Peer-Assisted VoD:
  Making Internet Video Distribution Cheap | Georgios Tzenakis  | 
 
  | 31/10  | Applications: Samsara, Social Networks  | Samsara: Honor Among Thieves in Peer-to-Peer Storage    Exploiting Social
  Networks for Internet Search  | Stella Kopidaki Iason Polakis | 
 
  | 5/11  | Incentives | Implications
  of Selfish Neighbor Selection in Overlay Networks  | Efthimis Kartsonakis | 
 
  | 7/11  | Incentives | Egoist: Overlay 
  Routing using Selfish Neighbor
  Selection   Discuss projects. |    | 
 
  | Friday, 9/11  (11-1 pm) | Applications:  RSS Feeds & Blogs | Cobra:
  Content-based Filtering and Aggregation of Blogs
  and RSS Feeds Discuss projects. |  Emmanouel Kiriakakis    | 
 
  | 12/11  | Search | Making
  Gnutella-like P2P Systems Scalable    Finding Content in
  File-Sharing Networks When You Can’t Even Spell |   Haris Papadakis   | 
 
  | 14/11  | Applications: 
  Digital Libraries | OverCite: A Distributed,
  Cooperative CiteSeer   Discuss projects, if needed.  
   |  Emmanouel Kiriakakis   | 
 
  | 16/11  |  No class   | Project Choice Due,
  Groups Formed. |  --  | 
 
  | 19/11  | Incentives | Incentives
  Build Robustness in Bit Torrent   Faithfulness
  in Internet Algorithms  |    | 
 
  | 21/11  | Security  | The
  Sybil Attack , 
 
 Secure
  Routing for Structured Peer-to-Peer Overlay Networks  |  Georgios Tzenakis  Iason Polakis | 
 
  | 26/11  | Incentives | Do
  Incentives Build Robustness in BitTorrent? | George Baryannis  | 
 
  | 28/11  | Applications: FreeHaven, Security  | The
  Free Haven Project: Distributed Anonymous Storage Service 
 
 Verme:
  Worm Containment in Peer-to-Peer Overlays  | Haris Papadakis, Stella Kopidaki | 
 
  | (Friday) 30/11 |  No class | Proposals Due. | --- | 
 
  |  3/12 | Applications: PubSub, Search 
 | Corona:
  A High Performance Publish-Subscribe System for the World Wide Web    LIP: A Lifetime
  and Popularity Based Ranking Approach to Filter out Fake Files in P2P File
  Sharing Systems  | Efthimis Kartsonakis | 
 
  | 5/12  | Incentives, Search | Robust
  Incentive Techniques for Peer-to-Peer Networks ,    P2P
  Content Search: Give the Web Back to the People
 | George Baryannis | 
 
  | 10/12  | Measurement 
   | Measurement,
  Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload 
 
 Actively
  Monitoring Peers in KAD  |  George Baryannis, Haris Papadakis
 | 
 
  | 12/12  | Incentives, Applications: Digital Preservation | SPIES:
  Secret Protection Incentive-based Escrow System   Preserving
  Peer Replicas By Rate-Limited Sampled Voting  |   Iason Polakis | 
 
  | 17/12  | Security, Incentives | Eclipse
  Attacks on Overlay Networks: Threats and Defenses ,  SWIFT:
  A System With Incentives For Trading ,
 
 
 |  Georgios Tzenakis   Efthimis Kartsonakis | 
 
  | 19/12  | Search, 2 P2P or not?  | Mercury:
  Supporting Scalable Multi-Attribute Range Queries    2
  P2P or Not 2 P2P? Last day of class.
 |  Stella Kopidaki | 
^M
  | ^M21/12 | No class. | ^MStatus Reports Due. | ^M--- | 
^M
 
  | 7/1-24/1 | No class. |  Work on Projects. | --- | 
 
  | 25/1/2008 | No class. | Final Projects Due
  (code + paper). | --- | 
Extra Credit:  Feel Free to Read on your Own and Submit Reviews for the following papers 
  Information Slicing:
  Anonymity Using Unreliable Overlays
   
  HPTP: Relieving the
  Tension between ISPs and P2P
  
  
  An
  Analysis of the Skype Peer-to-Peer Internet
  Telephony Protocol 
  
  An
  Experimental Study of the Skype Peer-to-Peer VoIP System 
Class Paper Bibliography
(plus other interesting
papers)
 - A Scalable Content
     Addressable Network. S. Ratnasamy, P.
     Francis, M. Handley, R. Karp and S. Shenker.
     Proceedings of the ACM SIGCOMM 2001 Conference. August, 2001. San Diego, CA.
     
- Chord: A Scalable
     Peer-to-peer Lookup Service for Internet Applications. I. Stoica and R. Morris and D. Karger
     and M. F. Kaashoek and H. Balakrishnan.
     Proceedings of the ACM SIGCOMM 2001 Conference. August, 2001. San Diego, CA.
     
- Serving DNS Using a
     Peer-to-Peer Lookup Service. Russ Cox, Athicha
     Muthitacharoen and Robert T. Morris. Proceedings
     of the First International Workshop on Peer-to-Peer Systems (IPTPS '02).
     March 2002. Cambridge,
      MA. 
- OpenDHT:
     A Public DHT Service and Its Uses. Sean Rhea, Brighten Godfrey, Brad
     Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker,
     Ion Stoica, and Harlan Yu. Proceedings of ACM
     SIGCOMM 2005, August 2005. 
- Network-Aware Operator
     Placement for Stream-Processing Systems Peter Pietzuch,
     Jonathan Ledlie, Jeffrey Shneidman,
     Mema Roussopoulos,
     Matt Welsh, Margo Seltzer, ICDE 2006, April, 2006. 
- Middleboxes
     No Longer Considered Harmful. M. Walfish, J.
     Stribling, M. Krohn,
     H. Balakrishnan, R. Morris, S. Shenker. OSDI 2004. 
- Making Gnutella-like P2P
     Systems Scalable. Yatin Chawathe,
     Sylvia Ratnasamy, Lee Breslau, and Scott Shenker. SIGCOMM 2003. August 2003. Karlsruhe, Germany.
     
- Designing Incentives for
     Peer-to-Peer Routing. Alberto
     Blanc, Yi-Kai Liu, Amin Vahdat. Workshop
     on Economics of Peer-to-Peer Systems. June 2004. 
- Preserving Peer Replicas
     By Rate-Limited Sampled Voting. Petros Maniatis, Mema Roussopoulos, TJ Giuli,
     David S. H. Rosenthal, Mary Baker, and Yanto Muliadi. Proceedings of the 19th ACM SOSP. October
     2003. Bolton Landing, NY. 
- Samsara:
     Honor Among Thieves in Peer-to-Peer Storage. Landon P. Cox, Brian D.
     Noble. Proceedings of the 19th ACM SOSP. October 2003. Bolton
     Landing, NY. 
- Measurement, Modeling, and
     Analysis of a Peer-to-Peer File-Sharing Workload. Krishna
     P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, and John Zahorjan. Proceedings of the 19th ACM SOSP. October
     2003. Bolton Landing, NY. 
- Peer-to-Peer File Sharing
     and Copyright Law: A Primer for Developers. Fred von Lohmann. Proceedings of the First International
     Workshop on Peer-to-Peer Systems (IPTPS '03). February 2003. Berkeley, CA.
     
- Are Contributions to P2P
     Technical Forums Private or Public Goods? - An Empirical Investigation.
     Bin Gu and Sirkka Jarvenpaa. Workshop on Economics of Peer-to-Peer
     Systems. June 2003. Berkeley,
      CA. 
- 2 P2P or Not 2 P2P?. Mema Roussopoulos, Mary
     Baker, David Rosenthal, TJ Giuli, Petros Maniatis, and Jeff
     Mogul. Proceedings of the Third International Workshop on Peer-to-Peer
     Systems (IPTPS '04). February 2004. La
       Jolla, CA. 
- The Sybil Attack. J. Douceur.
     Proceedings of the First International Workshop on Peer-to-Peer Systems
     (IPTPS '02). March 2002. Cambridge,
      MA. 
- Vigilante: End-to-End
     Containment of Internet Worms, M. Costa, J. Crowcroft,
     M. Castro, A. Rowstron, L. Zhou, L. Zhang, and
     P. Barham, SOSP 2005. 
- Debunking some myths about
     structured and unstructured overlays, M. Castro, M. Costa, and A. Rowstron, NSDI 2005. 
- Kill the Messenger: A
     Taxonomy of Rational Attacks. S. Nielson, S. Crosby, D. Wallach. IPTPS
     2005. 
- Exploring the Design Space
     of Distributed and P2P Systems. Stefan Saroiu,
     P. Krishna Gummadi, and Steven D. Gribble.
     Proceedings of the First International Workshop on Peer-to-Peer Systems
     (IPTPS '02). March 2002. Cambridge,
      MA. 
- The Free Haven Project:
     Distributed Anonymous Storage Service. Roger Dingledine,
     Michael Freedman, and David Molnar. Workshop on Design Issues in Anonymity
     and Unobservability. July 2000. International
     Computer Science Institute (ICSI), Berkeley,
      CA. 
- Cashmere:
     Resilient Anonymous Routing. Li Zhuang, Feng Zhou, Ben Y. Zhao and Antony Rowstron,
     NSDI 2005. 
- P2P Content Search: Give
     the Web Back to the People. Matthias Bender, Sebastian Michel, Peter
     Triantafillou, Gerhard Weikum, Christian Zimmer
     IPTPS 2006. 
- Salman
     A. Baset and Henning Schulzrinne,
     An Analysis of the Skype Peer-to-Peer
     Internet Telephony Protocol", IEEE Infocom
     2006. 
- An Experimental Study of
     the Skype Peer-to-Peer VoIP
     System. Saikat Guha,
     Neil Daswani, Ravi
     Jain. IPTPS 2006.
- Chunkyspread:
     Multi-tree Unstructured Peer-to-Peer Multicast. Vidhyashankar
     Venkataraman, Paul Francis. IPTPS 2006.
- SPIES: Secret Protection
     Incentive-based Escrow System. N. Margolin,
     M. Wright, B. Levine. Workshop on Economics of Peer-to-Peer Systems. June
     2004. 
- A Survey of Peer-to-Peer
     Security Issues. Dan S. Wallach. International Symposium on Software
     Security. November 2002. 
- Balances of Power on eBay:
     Peers or Unequals? Ben Gross and Alessandro Acquisti. Workshop on Economics of Peer-to-Peer
     Systems. June 2003.
- The Impact of DHT Routing
     on Resilience and Proximity. K. Gummadi and
     R. Gummadi and S. Gribble and S. Ratnasamy and S. Shenker and
     I. Stoica.
     SIGCOMM 2003. 
- Incentives Build
     Robustness in Bit Torrent. Bram Cohen. Workshop on Economics of
     Peer-to-Peer Systems. June 2003. 
     
- Faithfulness in Internet
     Algorithms. Jeffrey Shneidman, David Parkes, Laurant Massoulie. PINS 2004. 
- ConChord:
     Cooperative SDSI Certificate Storage and Name Resolution. Sameer Ajmani, Dwaine
     Clarke, Chuang-Hue Moh and Steven Richman.
     Proceedings of the First International Workshop on Peer-to-Peer Systems
     (IPTPS '02). March 2002. Cambridge,
      MA. 
- Network Measurement as a
     Cooperative Enterprise.
     Sridhar Srinivasan and Ellen Zegura. Proceedings of the First International
     Workshop on Peer-to-Peer Systems (IPTPS '02). March 2002. Cambridge, MA.
     
- Rationality and
     Self-Interest in Peer-to-Peer Networks. Jeff Shneidman
     and David Parkes. Proceedings of the Second
     International Workshop on Peer-to-Peer Systems (IPTPS '03). February 2003.
     
- Enforcing Fair Sharing of
     Peer-to-Peer Resources. Tsuen-Wan Ngan, Dan Wallach, Peter Druschel.
     Proceedings of the Second International Workshop on Peer-to-Peer
     Systems (IPTPS '03). February 2003. 
     
- Reputation in P2P
     Anonymity Systems. Roger Dingledine, Nick
     Mathewson, and Paul Syverson. Workshop on
     Economics of Peer-to-Peer Systems. June 2003.
- A Robust Reputation System
     for P2P and Mobile Ad-hoc Networks. Sonja Buchegger
     and Jean-Yves Le Boudec. Proceedings of
     the 2nd Workshop on Economics of Peer-to-Peer Systems. June 2004. 
- Tor: The Second-Generation
     Onion Router. Roger Dingledine, Nick Mathewson,
     and Paul Syverson. Proceedings of the 13th
     USENIX Security Symposium. September 2004. 
- Robust Incentive
     Techniques for Peer-to-Peer Networks. M. Feldman, K. Lai, I. Stoica, and J. Chuang,
     ACM E-Commerce Conference (EC'04). May 2004. 
- Splitstream:
     High-Bandwidth Multicast in a Cooperative Environment. M. Castro, P. Druschel, A.-M. Kermarrec,
     A. Nandi, A. Rowstron,
     and A. Singh. In SOSP '03. Oct. 2003. 
- Incentives-Compatible
     Peer-to-Peer Multicast. Tsuen-Wan
     "Johnny" Ngan, Dan S. Wallach, and
     Peter Druschel. Proceedings of the 2nd Workshop
     on Economics of Peer-to-Peer Systems. June 2004. Cambridge, Massachusetts.
     
- Defending against the
     Eclipse attacks in Overlay Networks. M. Castro, A. Rowstron
     and P. Druschel. Proceedings of the 11th ACM
     SIGOPS European Workshop. Sep 2004. 
- Eclipse Attacks on Overlay
     Networks: Threats and Defenses Ngan et al., Infocom 2006. 
- Mercury: Supporting
     Scalable Multi-Attribute
      Range Queries. Ashwin R. Bharambe, Mukesh Agrawal, and Srinivasan Seshan. In SIGCOMM.
     August, 2004. 
- SWIFT: A System With
     Incentives For Trading. Karthik Tamilmani, Vinay Pai, and Alexander E. Mohr. Proceedings of the 2nd
     Workshop on the Economics of Peer-to-peer Systems. June 2004. Cambridge, MA.
     
- SmartSeer:Using a DHT to Process Continuous
     Queries over Peer-to-Peer Networks. Kannan,
     Yang, Shenker, Sharma, Banerjee,
     Basu, Lee. Infcocom,
     April 2006. 
- OverCite:
     A Distributed, Cooperative CiteSeer. Jeremy Stribling et al. NSDI 2006. 
- Experience with an Object
     Reputation system for Peer-to-Peer Filesharing.
     Kevin Walsh and Emin Gun Sirer.
     NSDI 2006. 
- Corona: A High Performance
     Publish-Subscribe System for the Web. Venugopalan
     Ramasubramanian, Ryan Peterson, and Emin Gun Sirer, NSDI 2006. 
- Vivaldi: A Decentralized
     Network Coordinate System. Frank Dabek, Russ
     Cox, Frans Kaashoek,
     Robert Morris. SIGCOMM 2004. 
- NetProfiler:
     Profiling Wide-Area Networks Using Peer Cooperation. Venkat Padmanabhan, Sriram Ramabhadran, Jitendra Padhye. IPTPS 2005.
     
- Implications of Selfish
     Neighbor Selection in Overlay Networks. Nikolaos
     Laoutaris, Georgios Smaragdakis, Azer Bestavros, John Byers. IEEE INFOCOM 2007.
- Cobra: Content-based Filtering and Aggregation
     of Blogs and RSS Feeds, Ian Rose, Rohan
     Murty, Peter Pietzuch,
     Jonathan Ledlie, Mema Roussopoulos, and Matt Welsh, NSDI 2007.
- Finding Content in File-Sharing Networks When You Can’t Even Spell, Matei A. Zaharia, Amit Chandel, Stefan Saroiu, and Srinivasan Keshav, IPTPS
     2007. 
- Do Incentives Build
     Robustness in BitTorrent? Michael Piatek, Tomas Isdal, Thomas
     Anderson, Arvind Krishnamurthy, Arun Venkataramani, NSDI
     2007.
- Ensuring Content Integrity
     for Untrusted Peer-to-Peer Content Distribution,
     Nicholaos Michalakis,
     Robert Soule, Robert Grimm, NSDI 2007.
- Actively Monitoring Peers
     in KAD, Moritz Steiner, Ernst W. Biersack, Taoufik Ennajjary, IPTPS
     2007.
- LIP: A Lifetime and Popularity Based Ranking Approach to Filter out
     Fake Files in P2P File Sharing Systems, Qinyuan Feng, Yafei Dai, IPTPS 2007.
- HPTP: Relieving the Tension between ISPs and P2P, Guobin
     Shen1, Ye Wang1;2, Yongqiang Xiong1, Ben
     Y. Zhao3, ZhiLi Zhang, IPTPS 2007.
- Exploiting Social Networks
     for Internet Search, Alan Mislove, Krishna P. Gummadi, Peter Druschel, HotNets
     2006.
- Verme: Worm Containment in Peer-to-Peer Overlays, Filipe Freitas,
     Rodrigo Rodrigues, Carlos Ribeiro, Paulo Ferreira, Luvs
     Rodrigues, IPTPS 2007.
- Secure routing for
     structured peer-to-peer overlay networks, Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, Dan
     S. Wallach, OSDI 2002.
- Information Slicing:
     Anonymity Using Unreliable Overlays, Sachin Katti, Jeff Cohen, and Dina Katabi,
     NSDI 2007.
Previous
Years 
Fall
2006
Spring
2006   (at Harvard
University)
Spring
2005   (at Harvard
University)
Spring
2004   (at Harvard University)