Page Content
Peer-to-Peer Computing
Peer-to-peer computing is an interesting networking paradigm as it offers a high degree of scalability by exploiting the resources of the participants and avoids single-points of failures. Due to these desirable properties, peer-to-peer computing plays a crucial role in many networking applications beyond file-sharing, and the underlying ideas are also discussed as a design principle for the future Internet. Our research is concerned with the question of whether peer-to-peer is mature enough to step outside its "comfort zone". We conduct measurements of state-of-the-art peer-to-peer networks such as Kad and investigate the robustness, e.g., to Sybil attacks or selfish behavior. For example, we implemented the proof-of-concept BitTorrent client "BitThief [1]" which provides evidence that despite the tit-for-tat incentive mechanism, free-riding is possible in BitTorrent. We develop algorithms to improve the performance of peer-to-peer systems: we devise peer-to-peer networks which are robust to worst-case churn (see e.g., our IPTPS paper), which allow for efficient joins and leaves (see e.g., our SHELL system at ICALP), or which are robust to denial of service attacks (see e.g., our Chameleon system at SPAA). Some of these algorithms were successfully implemented in the online storage tool Wuala and the streaming tool Streamforge, two Swiss startups.
tefan/parameter/en/font2/maxhilfe/
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=209268&cHash=38ae244cbc0595512d80fd02f
65071bf
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=197406&cHash=a116e0a0782ac38bf7af7b961
7d73309
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=197447&cHash=c36b037a5a7af0fc38f0cec65
6a4a031
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=197448&cHash=3d85a662bb418a939d6e59e40
fe3c610
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=197446&cHash=2edc4c599d7098d105fbc2a3a
decfa74
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=197434&cHash=11feb4a533004bbbbe6021156
355e38a
/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bcon
tentelement%5D=tt_content%3A364075&tx_sibibtex_pi1%
5BshowUid%5D=197429&cHash=bb8efdef123a4ca80bf68363f
172f26a
p/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bco
ntentelement%5D=tt_content%3A364075&tx_sibibtex_pi1
%5BshowUid%5D=197428&cHash=1f8b078024a0c6ae26319873
b75dec90
p/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bco
ntentelement%5D=tt_content%3A364075&tx_sibibtex_pi1
%5BshowUid%5D=197427&cHash=d399054da3a044d39245fb87
d1a1fe74
p/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bco
ntentelement%5D=tt_content%3A364075&tx_sibibtex_pi1
%5BshowUid%5D=197422&cHash=4311090d2f1050cec7cb5469
9b9992f3
p/p2p/parameter/en/font2/maxhilfe/?tx_sibibtex_pi1%5Bco
ntentelement%5D=tt_content%3A364075&tx_sibibtex_pi1
%5BshowUid%5D=197416&cHash=53064b96b179f3433f8b0686
d92407cd