EECS-345 Distributed Systems, Winter 2014

Announcements

Remember to check this regularly!

  • Tuesday Jan. 21th - We will meet at our regular time in L170
  • Note the link to the first "Question"
  • Friday Jan. 17th - Class meets in our regular classroom and time slot (11-12:20PM)
  • Monday Jan. 6th - Class cancelled!
  • Take the tour – http://tour.golang.org

Administrative Information

Professor

Fabián E. Bustamante
Technological Institute, L465
+1 847 491-2745
This email address is being protected from spambots. You need JavaScript enabled to view it.

TAs

Zach Bischof
Ford Design Building, 2-217
+1 847 467-3250
This email address is being protected from spambots. You need JavaScript enabled to view it.

Location and Time

Lectures: Mondays and Wednesdays 11:00-12:20PM
Tech. M128

Professor Office Hours: by appointment

TA Office Hours: TBA

Final Exam: TBA

Course Description

Distributed systems are collections of networked computers that coordinate their actions through message exchanges. Most computing systems you interact with everyday are indeed distributed (e.g. email, web, Google, Skype, Facebook ...) for a variety of reasons such as fault tolerance, performance, and the geographical nature of the requirements.

In this course, we will discuss some of the basic principles behind distributed systems as well as common approaches and techniques used to build them. We illustrate these ideas through case studies of widely used or seminal systems.

In compliance with Section 504 of the 1973 Rehabilitation Act and the Americans with Disabilities Act, Northwestern University is committed to providing equal access to all programming. Students with disabilities seeking accommodations are encouraged to contact the office of Services for Students with Disabilities (SSD) at +1 847 467-5530 or This email address is being protected from spambots. You need JavaScript enabled to view it. . SSD is located in the basement of Scott Hall. Additionally, I am available to discuss disability-related needs during office hours or by appointment.

Course Prerequisites

Communication Channels

There are a number of communication channels set up for this class:

  • We will use the course web site (http://aqualab.cs.northwestern.edu/classes/eecs-345-w14) to post announcements related to the course. You should check this regularly for schedule changes, clarifications and corrections to assignments, and other course-related announcements.
  • We will use the Google Group EECS 345 at Northwestern for class discussion. This particular channel is intended to foster communication among you, the students. You'll find that someone else in the class will have thought of the same problem that you have and will perhaps have some valuable insight that will prove helpful. The staff will be monitoring the discussion threads and will step in with guidance when appropriate. If you don't have a subscription already, you can request one:
    Email:
  • There is always email for questions that would be inappropriate to post on the newsgroup/discussion-board. When using email to contact the staff please start your subject line with "eecs345: helpful-comment" to ensure a prompt response.

Course Organization

The course is organized as a series of lecture and paper discussions, two five-week projects and a take home exam.

  • Lectures - A set of lectures on the core of the material. Most lectures will be organized in two parts. During the first part (approx. 35'), students will present and discuss as a group the assigned research paper for the day. After a short break, we will cover the lecture topic and necessary background material for the next paper reading and discussion.
  • Readings - Textbook and paper reading in preparation for (not substitution of) the lecture.
  • Projects - You will build at least one system that addresses issues, solves problems and exploits techniques from classroom discussions and readings.
  • Exam - A take-home, final given in the last week of class.

Grading

I use a criterion-referenced method to assign your grade; in other words, your grade will be based on how well you do relative to predetermined performance levels, instead of in comparison with the rest of the class. Thus, if a test has 100 possible points, anyone with a score of 90 or greater will get an A, those with scores of 80 or greater will get a B, those with scores of 70 or greater will get a C, and so on. Notice that this means that if everyone works hard and gets >90, everyone gets an A.

Total scores (between 0 and 100) will be determined, roughly, as follows:

  • Questions on reading assignments 20%
  • Class participation/presentation 20%
  • Project 40%
  • Exam 20%

Topics

  • Introduction
  • Networking and Internetworking
  • Remote invocation and indirect communication
  • Overlay networks and P2P
  • Distributed file systems
  • Name services
  • Time and global state
  • Coordination and agreement
  • Consistency and replication
  • Mobile distributed systems
  • Privacy, security and censorship

For each of the topics, we will first review introductory material before presenting and discussing a related research paper to help you better understand the main issues.

Week Date Topic
1 1/6/1/8 Introduction [PDF]

Reference:

1/13 Go, Go

Kademlia DHT [PDF]

2 1/13 Networking and Internetworking I [PDF]

Reference:

Paper:

1/15 Networking and Internetworking II [PDF]

Reference:

Paper:

3 1/20 Remote Invocation [PDF]

Reference:

Paper:

1/22 Overlay Networks and P2P [PDF]

Reference:

  • Chap. 4.5, 10

Paper:

4 1/27 2/3 Indirect Communication [PDF]

Reference:

Paper:

2/3 Distributed File Systems [PDF]

Reference:

Paper:

5 2/5 Name Services [PDF]

Reference:

Paper:

2/10 Content Distribution Networks [PDF]

Reference:

Paper:

6 2/11 Midterm Presentation (Second Project)
7 2/12 Time [PDF]

Reference:

Paper:

2/17 Global State [PDF]

Reference:

Paper:

8 2/19 Coordination

Reference:

Paper:

2/24 Consensus and Related Problems [PDF]

Reference:

Paper:

9 3/3 Consistency, replication and fault tolerance [PDF]

Reference:

Paper:

3/5 Mobile Distributed Systems [PDF]

Reference:

Paper:

10 3/10 Privacy and Security

3/12 Censorship and Censor Resistance
Finals Week 3/18 Take-home final and reports

Assignments

There are no homework assignments, only one (in two parts) team project and one take-home final exam.

That is not to say the course is easy! Students will work on teams of 2-3 on two projects over the quarter. In addition, every student will be responsible for presenting one paper from those assigned for discussion (either individually, for grad students, or in teams of two for undergraduate students. Last, ever student should submit their answer to one question I will post for each of the papers discussed.

Projects

For the project component of this course you will work in teams of 2-3 students (3 is the preferred number, 1 is not allowed), to implement a basic DHT (Distributed Hash Table) during the first half of the quarter, and build upon it/extend it during the second half.

The project will be done in Go, a language that was originally created within Google, but is now a fully open-source project. Go is garbage-collected and has built-in coroutines and channels, making it highly suited to building distributed systems. Its standard library is already pretty comprehensive. For example, take a look at the net and rpc packages.

Part 1

The first project - lasting five weeks - will focus on building the Kademlia DHT -- a very popular DHT first published in 2002. You will start from a minimal base, following the specification linked below. You must adhere to the following schedule:

  • Week 1: Familiarize yourselves with Go. We suggest writing a few toy programs before starting on the project proper.
  • Week 3: Meet with a member of the course staff to demonstrate your progress. By this point, you should have the structure of your DHT working - new peers should be able to join your network and exchange messages with each other. The only serious work left should be implementing the rest of the protocol.
  • Week 5: By 05:59 on Saturday, February 8, email a tarball containing your completed kademlia implementation to the the TA. Read onfor a definition of "complete".

Few distributed systems operate in homogeneous environments. Your project will be evaluated based on its ability to interoperate with other kademlia implementations: if everyone implements the requirements correctly, we will be able to run a single DHT that includes clients from every group. You will receive a reference implementation at least one week before the project is due to help you ensure your code will work.

To ensure compatibility, you must strictly adhere to both the the Xlattice project's kademlia spec (linked below) and the README in the project tarball. In addition, the handout provided should help get you started.

Part 2

During the last five weeks of the quarter, you will build on your Kademlia implementation to addresses issues, solve problems and exploit techniques from classroom discussions and readings. For example, you could enhance your DHT's ability to recover from peer churn, or you could build a consistent storage system on top of it. You should meet with the staff anytime before the fifht week (midterm) to decide on the topic of your second project.

Some additional reading before starting with your project.

Reading Papers

We will be reading two or more paper per week; you should have read the assigned paper before coming to lecture. During the first half of most class meetings one or more students will one or more papers and the class will discuss them in a round-table manner. To ensure lively discussions, you will be responsible for reading and answering a question I will post the day before.

When reading papers it is useful to write down a summary of about a page. Your summary should include at least:

  1. Paper title and its author(s).
  2. Brief one-line summary.
  3. A paragraph of the most important ideas: perhaps a combination of their motivations, observations, interesting parts of the design, or clever parts of their implementation.
  4. A paragraph of the largest flaws; maybe an experiment was poorly designed or the main idea had a narrow scope or applicability. Being able to assess weaknesses as well as strengths is an important skill for this course and beyond.
  5. A last paragraph where you state the relevance of the ideas today, potential future research suggested by the article, etc.

You may find the following documents useful:

Materials

Required

Very Useful