YoVDO

Peer To Peer Networks

Offered By: Indian Institute of Technology Kanpur via Swayam

Tags

Computer Science Courses Public Key Cryptography Courses Peer-to-Peer Network Courses

Course Description

Overview

This course will discuss about the concepts and architecture of peer to peer networks. These systems are built as an overlay on the existing Internet. The idea is basically to build the collaboration between user machines to implement services like telephony, distribute resilient file system, messaging system and other collaborative computing services. Such systems do not require server or need them in very limited fashion. The course will discuss at length the various DHT algorithms and their implementation complexities, the mechanisms to implement resilience using replication factor, efficiency of storage using universal file system where sharing the content does not create additional copies, mechanisms to ensure that nodes with different storage capacities can be used. Further architecture of Briahaspati4 an ongoing p2p system opensource project will also be discussed. The basics taught here will form the foundation of formation of user cloud systems.


INTENDED AUDIENCE :
Computer Science and Engineering, Electronics and Communication, Electrical Engineering
PREREQUISITES : Preferably, Digital Communication Networks/Computer NetworksINDUSTRIES SUPPORT :Cisco, Lucent-Alcatel

Syllabus

COURSE LAYOUT

Week 1: P2P Networks – motivation. Basics – cryptographic hash, public key cryptography principles, security certificates, structured and unstructured p2p networksWeek 2: Inconsistent hashing, Consistent hashing, Rendezvous hashing, locality preserving hashing, Distributed hash tablesWeek 3: Chord, Finger Tables, Distance function, Finger table creation and managementWeek 4: Kadmilia, Tapestry, Pastry, Logarithmic portioning, Other geometric structures, Locality aware DHTWeek 5: P2P VoIP system, Transport – UDP, TCP, Http tunneling, ProxyingWeek 6: Distributed File System, DFS based Backup System, Universal File System.Week 7: Use case scenarios for P2P VoIP and DFS systems, Unstructured systems.Week 8: TOR routing (anonymous routing), Overlaid multicasting, Reslience of overlaid multicast, Generic Multiservice architecture of Brihaspati

Taught by

Prof. Y. N. Singh

Tags

Related Courses

Introduction to Connected Strategy
Wharton School of the University of Pennsylvania via edX
Comprendre l’économie collaborative
Institut Mines-Télécom via France Université Numerique
Distributed File Storage in Go - Full Course
freeCodeCamp
Internet Connection: How to Get Online?
Cisco via Coursera
Network Protocols and Architecture
Cisco via Coursera