Module  |  | Peer-to-Peer-Systeme und Sicherheit (IN2194)  |  | 
|---|
 Lecture  |  | Peer-to-Peer-Systems and Security
   |  | 
|---|
 Language  |  | English  |  | 
|---|
 Lecturers  |  | Prof. Dr.-Ing. Georg Carle, Christian Grothoff Ph.D., Dr. Heiko Niedermayer  |  | 
|---|
 SWS   |  | 3V + 1Ü  |  | 
|---|
 ECTS Credits  |  | 5.0  |  | 
|---|
 Dates  |  | Mondays 10-12 and Thursdays 14-16 in the room MI 00.13.009A   |  |  | 
|---|
 Contents  |  | The lecture covers: 
  Chapter 1: Peer-to-Peer Systems (40 %)
  Chapter 2: Security (30 %)
  Chapter 3: Anonymity (30 %)
  Peer-to-Peer Systems and Overlay Networks cause a major part of the traffic on the Internet. The lecture presents the mechanisms and protocols of such networks and explains a set of selected systems. BitTorrent allows an efficient and cooperative transfer of large files. Structured Peer-to-Peer Systems like Distributed Hash Tables allow an efficient  lookup for index pointers or nodes in a scalable, efficient, and robust way. The security chapter focuses on advanced non-standard issues of network security. The primary focus is on security issues that are related to Peer-to-Peer Systems. The last chapter is about anonymity on the Internet and it discusses mixes and re-routers as well as systems like Tor and Gnunet.
 
  Dates  | No.  | Chapter / Section Name  | Version  | PDF 1up  |  | 
|---|
 16.4.  | 0   | Introduction  | 16.4.  | PDF  |  |  16.4.  | 1.1  | P2P Basics  | 16.4.  | PDF  |  |  26.4. - 3.5.  | 1.2  | P2P Unstructured Networks  | 16.4.  | PDF  |  |  3.5. - 21.5.  | 1.3  | P2P Structured Networks  | 2.5.  | PDF  |  |   |  |  |  |  |  |  31.5.  | 1.4  | P2P Other Issues  | 1.6.  | PDF  |  |  31.5.  | 1.5  | P2P General Aspects  | 1.6  | PDF  |  |  4.6., 18.6.  | 2.1  | Security Basics  | 1.6.  | PDF  |  |  21.6., 25.6.  | 2.2  | P2P-specific Security  | 27.6.  | PDF  |  |  28.6.  | 2.3  | Resistance  | 27.6.  | PDF  |  |  2.7. - 19.7.  | 3  | Anonymity (see page)  |  |  |  |   |  |  |  |  |  |  
  Slides on Electronic Money / BitCoin (not official part of lecture)
  |  | 
|---|
 Practical assigment  |  | Information on and registration for the practical assignment: see http://www.grothoff.org/christian/teaching/2012/2194/
  Lectures and Hands-on Session for practical assignment on 19.4. and 23.4.
 
 
 
   |  | 
|---|
 Exercises  |  | Exercise 1  (3.5., deadline 10.5., course 14.5.) Graph for assignment 1.5 (maybe helpful to simulate operations in graph) Solution 1
  Exercise 2 (21.5. deadline 31.5., course 4.6.) Solution 2
  Exercise 3 (21.6., deadline extended to 5.7.! , course 9.7.) Solution 3
  Exercise 4 (28.6., deadline extended to 9.7. 10 h before course! Please try to hand in on 5.7. if possible , course 9.7.) Solution 4
 
 
 
   | 
 
 
 
  | 
|---|
  |  |  |  | 
|---|
  
		
			 
	
		 
 | 
 
 
 |