<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.net.informatik.uni-goettingen.de/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shameed</id>
	<title>NET Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.net.informatik.uni-goettingen.de/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Shameed"/>
	<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/wiki/Special:Contributions/Shameed"/>
	<updated>2026-05-17T02:31:59Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2012)&amp;diff=1682</id>
		<title>Seminar on Internet Technologies (Summer 2012)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2012)&amp;diff=1682"/>
		<updated>2012-04-17T15:23:07Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1222.Mp&#039;&#039;-or-&#039;&#039; B.Inf.1207/1208&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]&lt;br /&gt;
|time=Please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=90024&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
{{Announcement|&#039;&#039;&#039;You can start this course at any time! Please check more information on this page and feel free to contact us if you are interested.&#039;&#039;&#039;}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).&lt;br /&gt;
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
* Please see [[#Schedule]] and adhere to it.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* Thursday, &#039;&#039;&#039;12th April 2012 and 19th April 2012, 16.15 - 17.00&#039;&#039;&#039;: Initial general meetings. Introduction to the course and open questions.&lt;br /&gt;
* Thursday, &#039;&#039;&#039;26th April 2012&#039;&#039;&#039;: Finalization of topic and deadline to meet the topic advisors.&lt;br /&gt;
* Sunday, &#039;&#039;&#039;1st July 2012, 23.59 (CET)&#039;&#039;&#039;: Submission of slides to topic advisor&lt;br /&gt;
** &#039;&#039;&#039;Mandatory to obtain a presentation slot&#039;&#039;&#039; &lt;br /&gt;
* Thursday, &#039;&#039;&#039;5th July 2012, 15.00 - 17.00&#039;&#039;&#039;: Presentation slot - I &lt;br /&gt;
* Thursday, &#039;&#039;&#039;12th July 2012, 15.00 - 17.00&#039;&#039;&#039;: Presentation slot - II &lt;br /&gt;
* Thursday, &#039;&#039;&#039;19th July 2012, 15.00 - 17.00&#039;&#039;&#039;: Presentation slot - III&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Voice Over IP - A Success Story?&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]&lt;br /&gt;
|-&lt;br /&gt;
| Business Models of the Underground Economy.&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware Detection in Networks - Anomaly Detection (multiple topics available)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=malware%20detection%20in%20networks&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CB4QFjAA&amp;amp;url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&amp;amp;ei=Rm2lTpTFHcrNswaijp2eAw&amp;amp;usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&amp;amp;cad=rja]&lt;br /&gt;
|-&lt;br /&gt;
| Relationship Classification in Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security in Near Field Communication (NFC) (assigned to Georg Jahn)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile phone networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Scaling and Partitioning Online Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]&lt;br /&gt;
| [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=5961377]&lt;br /&gt;
|-&lt;br /&gt;
| Routing strategies in Delay Tolerent Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 20 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 20 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 15 slides.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1595</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1595"/>
		<updated>2012-01-16T00:36:33Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Details */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor/Master/Student Thesis&lt;br /&gt;
|status= Open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
Altruism, trust or incentive studies are very related to what is happening in the field of behavior economy. People in that research field usually use games (popular prisoner&#039;s dilemma, dictator game) to test and observe the behaviors  of the participants when they encountering different choices. But these kind of games are very limited and artificial and many of the conclusion are very unreliable, for example from the dictator game, one may observe that a lot of participants are willing to share their money with their partners, but we cannot draw the conclusion that people are altruistic from it. The reason is that usually you recruit students to participate in the game  (usually happened in academic research), and under your supervision/observation (you are the professor), the students will tend to behave nicely. &lt;br /&gt;
&lt;br /&gt;
Using the DTN data forwarding (whether someone will forward data for others), we can explore the real altruistic/selfish behavior of the people. During this thesis we will use [http://user.informatik.uni-goettingen.de/~kzhu/goose.html Goose] as the experimental platform to evaluate the altruistic nature of smart phone users.&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Initial Reading ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.nber.org/papers/w15701 So you want to run an experiment, now what? Some Simple Rules of Thumb for Optimal Experimental Design]&lt;br /&gt;
*[http://rps-chicago.com/papers/101-25264884.pdf What do Laboratory Experiments Measuring Social Preferences Reveal About the Real World]&lt;br /&gt;
*[http://www.rps-chicago.com/papers/102-25784084.pdf On the Interpretation of Giving in Dictator Games]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1594</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1594"/>
		<updated>2012-01-16T00:36:01Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Details */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor/Master/Student Thesis&lt;br /&gt;
|status= Open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In &#039;&#039;&#039;iSATS&#039;&#039;&#039; we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS.&lt;br /&gt;
&lt;br /&gt;
* Bind sender‘s identity to the domains, making the misbehaving sender visible.&lt;br /&gt;
* Mail Server (MS) take ownership of the messages they transmit (sender authentication).&lt;br /&gt;
* Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users.&lt;br /&gt;
* MS at the receiver maintains local reputation of the sending MS.&lt;br /&gt;
* iSATS remains transparent to end users and operated at the SMTP time.&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2011/2012)&amp;diff=1534</id>
		<title>Seminar on Internet Technologies (Winter 2011/2012)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2011/2012)&amp;diff=1534"/>
		<updated>2011-11-14T14:59:43Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
&lt;br /&gt;
{{Announcement|&#039;&#039;&#039;First Meeting Thursday 27.10.2011 16:00 Room 3.101&#039;&#039;&#039;}}&lt;br /&gt;
&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
|time=please see [[#Schedule]] In general Thursdays 16:00.&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=90024&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).&lt;br /&gt;
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
* Please see [[#Schedule]] and adhere to it.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
First meeting: Thursday Oct. 27th at 16:00 in 3.101&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Voice Over IP - A Success Story?&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]&lt;br /&gt;
|-&lt;br /&gt;
| Business Models of the Underground Economy.&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware Detection in Networks - Anomaly Detection (multiple topics available)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=malware%20detection%20in%20networks&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CB4QFjAA&amp;amp;url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&amp;amp;ei=Rm2lTpTFHcrNswaijp2eAw&amp;amp;usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&amp;amp;cad=rja]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;Information Propagation in Social Networks&amp;lt;/s&amp;gt; &#039;&#039;(taken)&#039;&#039;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&amp;lt;/s&amp;gt;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf]&amp;lt;/s&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Relationship Classification in Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Data Center Techniques&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;Security and Privacy in Delay Tolerant Networks&amp;lt;/s&amp;gt;  &#039;&#039;(taken by Sromona Chatterjee)&#039;&#039;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&amp;lt;/s&amp;gt;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&amp;lt;/s&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Understanding Android Security&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768655&amp;amp;tag=1]&lt;br /&gt;
|-&lt;br /&gt;
| Security in Near Field Communication (NFC)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile phone networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Applications of Bloom Filter in Data Center Networking&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]&lt;br /&gt;
| [http://alex.fabrikant.us/papers/yfr09.pdf] [http://www.ce.sunysb.edu/~xwang/public/paper/ICNP_BF_Mcast.pdf] [http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Publikationen/201104_CN55_6__In-packet_Bloom_filters_-_Design_and_networking_applications.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Routing strategies in Delay Tolerent Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt; Mobile Cloud Virtualization&#039;&#039;&amp;lt;/s&amp;gt;(taken by Shanshi Yang)&#039;&#039;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Zhang Yuan]&amp;lt;/s&amp;gt;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0611/rW_MM_VirtualizedScreen.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5754008&amp;amp;tag=1] [http://dl.acm.org/citation.cfm?id=1741957]&amp;lt;/s&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 20 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 20 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 15 slides.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2011/2012)&amp;diff=1533</id>
		<title>Seminar on Internet Technologies (Winter 2011/2012)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2011/2012)&amp;diff=1533"/>
		<updated>2011-11-14T14:59:16Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
&lt;br /&gt;
{{Announcement|&#039;&#039;&#039;First Meeting Thursday 27.10.2011 16:00 Room 3.101&#039;&#039;&#039;}}&lt;br /&gt;
&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
|time=please see [[#Schedule]] In general Thursdays 16:00.&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=90024&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).&lt;br /&gt;
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
* Please see [[#Schedule]] and adhere to it.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
First meeting: Thursday Oct. 27th at 16:00 in 3.101&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Voice Over IP - A Success Story?&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]&lt;br /&gt;
|-&lt;br /&gt;
| Business Models of the Underground Economy.&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware Detection in Networks - Anomaly Detection (multiple topics available)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=malware%20detection%20in%20networks&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CB4QFjAA&amp;amp;url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&amp;amp;ei=Rm2lTpTFHcrNswaijp2eAw&amp;amp;usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&amp;amp;cad=rja]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;Information Propagation in Social Networks&amp;lt;/s&amp;gt; &#039;&#039;(taken)&#039;&#039;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&amp;lt;/s&amp;gt;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf]&amp;lt;/s&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Relationship Classification in Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Data Center Techniques&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://lcs.syr.edu/faculty/tang/Teaching/CSE791-Spring11/Papers/VL2-Sigcomm09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt;Security and Privacy in Delay Tolerant Networks&amp;lt;s&amp;gt;  &#039;&#039;(taken by Sromona Chatterjee)&#039;&#039;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&amp;lt;s&amp;gt;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&amp;lt;s&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Understanding Android Security&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768655&amp;amp;tag=1]&lt;br /&gt;
|-&lt;br /&gt;
| Security in Near Field Communication (NFC)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile phone networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Applications of Bloom Filter in Data Center Networking&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]&lt;br /&gt;
| [http://alex.fabrikant.us/papers/yfr09.pdf] [http://www.ce.sunysb.edu/~xwang/public/paper/ICNP_BF_Mcast.pdf] [http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Publikationen/201104_CN55_6__In-packet_Bloom_filters_-_Design_and_networking_applications.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Routing strategies in Delay Tolerent Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;s&amp;gt; Mobile Cloud Virtualization&#039;&#039;&amp;lt;/s&amp;gt;(taken by Shanshi Yang)&#039;&#039;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Zhang Yuan]&amp;lt;/s&amp;gt;&lt;br /&gt;
| &amp;lt;s&amp;gt;[http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0611/rW_MM_VirtualizedScreen.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5754008&amp;amp;tag=1] [http://dl.acm.org/citation.cfm?id=1741957]&amp;lt;/s&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 20 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 20 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 15 slides.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2011/2012)&amp;diff=1393</id>
		<title>Seminar on Internet Technologies (Winter 2011/2012)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2011/2012)&amp;diff=1393"/>
		<updated>2011-10-25T03:48:54Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
&lt;br /&gt;
{{Announcement|&#039;&#039;&#039;First Meeting Thursday 27.10.2011 16:00 Room 3.101&#039;&#039;&#039;}}&lt;br /&gt;
&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
|time=please see [[#Schedule]] In general Thursdays 16:00.&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=90024&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).&lt;br /&gt;
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
* Please see [[#Schedule]] and adhere to it.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
First meeting: Thursday Nov. 27th at 16:00 in 3.101&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Voice Over IP - A Success Story?&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Malware Detection in Networks - Anomaly Detection (multiple topics available)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=malware%20detection%20in%20networks&amp;amp;source=web&amp;amp;cd=1&amp;amp;ved=0CB4QFjAA&amp;amp;url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&amp;amp;ei=Rm2lTpTFHcrNswaijp2eAw&amp;amp;usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&amp;amp;cad=rja]&lt;br /&gt;
|-&lt;br /&gt;
| Information Propagation in Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://www.ccs.neu.edu/home/amislove/publications/Flickr-WWW.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Relationship Classification in Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]&lt;br /&gt;
| [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Understanding Android Security&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4768655&amp;amp;tag=1]&lt;br /&gt;
|-&lt;br /&gt;
| Security in Near Field Communication (NFC)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile phone networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Computation Offloading from Mobile Device to the Cloud&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]&lt;br /&gt;
| [http://berkeley.intel-research.net/bgchun/clonecloud-eurosys11.pdf] [http://research.microsoft.com/en-us/um/people/alecw/mobisys-2010.pdf] [http://people.inf.ethz.ch/oriva/pubs/riva_middleware09.pdf] [http://www.cs.vu.nl/~rkemp/papers/kemp-mobicase2010.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Routing strategies in Delay Tolerent Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&amp;amp;CFID=44287089&amp;amp;CFTOKEN=42866787&amp;amp;__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 20 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 20 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 15 slides.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1378</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1378"/>
		<updated>2011-10-24T08:17:29Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Social Networking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Mobile Networking ===&lt;br /&gt;
&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;[[iSATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] and [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[Implementation of Trusted Node Selection Protocol for Spam Free Communication]] (B/P)&lt;br /&gt;
* [[Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community]] (B/M/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
* [[Evaluation of Human Altruism with DTN based data forwarding]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]] (B/M/P)&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1377</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1377"/>
		<updated>2011-10-24T08:16:56Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Mobile Networking ===&lt;br /&gt;
&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;[[iSATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] and [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[LENS: LEveraging anti-social Networking for preventing Spam]] (M/P)&lt;br /&gt;
* [[Development of a Thunderbird Extension for Social Connection]] (B/P)&lt;br /&gt;
* [[Implementation of Trusted Node Selection Protocol for Spam Free Communication]] (B/P)&lt;br /&gt;
* [[Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community]] (B/M/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
* [[Evaluation of Human Altruism with DTN based data forwarding]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]] (B/M/P)&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1376</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1376"/>
		<updated>2011-10-24T08:15:58Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Mobile Networking ===&lt;br /&gt;
&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;[[iSATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Gemstone: Decentralizing Social Networks]] (B/M/P)&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[LENS: LEveraging anti-social Networking for preventing Spam]] (M/P)&lt;br /&gt;
* [[Development of a Thunderbird Extension for Social Connection]] (B/P)&lt;br /&gt;
* [[Implementation of Trusted Node Selection Protocol for Spam Free Communication]] (B/P)&lt;br /&gt;
* [[Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community]] (B/M/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
* [[Evaluation of Human Altruism with DTN based data forwarding]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]] (B/M/P)&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1282</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1282"/>
		<updated>2011-05-23T04:24:21Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Tobias Kloht)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In &#039;&#039;&#039;iSATS&#039;&#039;&#039; we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS.&lt;br /&gt;
&lt;br /&gt;
* Bind sender‘s identity to the domains, making the misbehaving sender visible.&lt;br /&gt;
* Mail Server (MS) take ownership of the messages they transmit (sender authentication).&lt;br /&gt;
* Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users.&lt;br /&gt;
* MS at the receiver maintains local reputation of the sending MS.&lt;br /&gt;
* iSATS remains transparent to end users and operated at the SMTP time.&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1281</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1281"/>
		<updated>2011-05-23T04:23:44Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Tobias Kloht)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In &#039;&#039;&#039;iSATS&#039;&#039;&#039; we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS&lt;br /&gt;
&lt;br /&gt;
* Bind sender‘s identity to the domains, making the misbehaving sender visible&lt;br /&gt;
* Mail Server (MS) take ownership of the messages they transmit (sender authentication)&lt;br /&gt;
* Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users&lt;br /&gt;
* MS at the receiver maintains local reputation of the sending MS&lt;br /&gt;
* iSATS remains transparent to end users and operated at the SMTP time&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1280</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1280"/>
		<updated>2011-05-23T04:23:22Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Tobias Kloht)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In iSATS we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS&lt;br /&gt;
&lt;br /&gt;
* Bind sender‘s identity to the domains, making the misbehaving sender visible&lt;br /&gt;
* Mail Server (MS) take ownership of the messages they transmit (sender authentication)&lt;br /&gt;
* Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users&lt;br /&gt;
* MS at the receiver maintains local reputation of the sending MS&lt;br /&gt;
* iSATS remains transparent to end users and operated at the SMTP time&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1279</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1279"/>
		<updated>2011-05-23T03:58:02Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Tobias Kloht)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In recent years several techniques [5, 6 and 7] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both extend spam protection beyond a user’s social circle and fundamentally prevent the transmission of spam across the network at the first place.  . The key idea of this paradigm in LENS is to select email users called Gatekeepers (GKs), from outside the user’s social circle and within pre-defined social distances. Unless a GK vouches for the emails of potential senders from outside the social circle of a particular recipient, those e-mails are prevented from transmission.&lt;br /&gt;
&lt;br /&gt;
The goal of this thesis is to design and implement a protocol for authenticating that the selected GKs (to vouch for spam free communication outside a user’s social circle) are legitimate and non-malicious GKs. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1278</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1278"/>
		<updated>2011-05-23T03:54:19Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Alexander Wolf)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
Altruism, trust or incentive studies are very related to what is happening in the field of behavior economy. People in that research field usually use games (popular prisoner&#039;s dilemma, dictator game) to test and observe the behaviors  of the participants when they encountering different choices. But these kind of games are very limited and artificial and many of the conclusion are very unreliable, for example from the dictator game, one may observe that a lot of participants are willing to share their money with their partners, but we cannot draw the conclusion that people are altruistic from it. The reason is that usually you recruit students to participate in the game  (usually happened in academic research), and under your supervision/observation (you are the professor), the students will tend to behave nicely. &lt;br /&gt;
&lt;br /&gt;
Using the DTN data forwarding (whether someone will forward data for others), we can explore the real altruistic/selfish behavior of the people. During this thesis we will use [http://user.informatik.uni-goettingen.de/~kzhu/goose.html Goose] as the experimental platform to evaluate the altruistic nature of smart phone users.&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Initial Reading ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.nber.org/papers/w15701 So you want to run an experiment, now what? Some Simple Rules of Thumb for Optimal Experimental Design]&lt;br /&gt;
*[http://rps-chicago.com/papers/101-25264884.pdf What do Laboratory Experiments Measuring Social Preferences Reveal About the Real World]&lt;br /&gt;
*[http://www.rps-chicago.com/papers/102-25784084.pdf On the Interpretation of Giving in Dictator Games]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1277</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1277"/>
		<updated>2011-05-23T03:53:45Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Alexander Wolf)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
Altruism, trust or incentive studies are very related to what is happening in the field of behavior economy. People in that research field usually use games (popular prisoner&#039;s dilemma, dictator game) to test and observe the behaviors  of the participants when they encountering different choices. But these kind of games are very limited and artificial and many of the conclusion are very unreliable, for example from the dictator game, one may observe that a lot of participants are willing to share their money with their partners, but we cannot draw the conclusion that people are altruistic from it. The reason is that usually you recruit students to participate in the game  (usually happened in academic research), and under your supervision/observation (you are the professor), the students will tend to behave nicely. &lt;br /&gt;
&lt;br /&gt;
Using the DTN data forwarding (whether someone will forward data for others), we can explore the real altruistic/selfish behavior of the people. During this thesis we will use [http://user.informatik.uni-goettingen.de/~kzhu/goose.html Goose] as the experimental platform to evaluate the altruistic nature of smart phone users.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Initial Reading ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.nber.org/papers/w15701 So you want to run an experiment, now what? Some Simple Rules of Thumb for Optimal Experimental Design]&lt;br /&gt;
*[http://rps-chicago.com/papers/101-25264884.pdf What do Laboratory Experiments Measuring Social Preferences Reveal About the Real World]&lt;br /&gt;
*[http://www.rps-chicago.com/papers/102-25784084.pdf On the Interpretation of Giving in Dictator Games]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1276</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1276"/>
		<updated>2011-05-23T03:46:01Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Alexander Wolf)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
Altruism, trust or incentive studies are very related to what is happening in the field of behavior economy. People in that research field usually use games (popular prisoner&#039;s dilemma, dictator game) to test and observe the behaviors  of the participants when they encountering different choices. But these kind of games are very limited and artificial and many of the conclusion are very unreliable, for example from the dictator game, one may observe that a lot of participants are willing to share their money with their partners, but we cannot draw the conclusion that people are altruistic from it. The reason is that usually you recruit students to participate in the game  (usually happened in academic research), and under your supervision/observation (you are the professor), the students will tend to behave nicely. &lt;br /&gt;
&lt;br /&gt;
I think using the DTN data forwarding (whether someone will forward data for others) , we can explore the real altruistic/selfish behavior of the people. If we find out that people are very willing to forward data then it is good for networking conference paper, if we find out that people are not really willing to forward data, we can have a paper to Journal of Economic Behavior and Organization or even to Science.  So overall, I believe we are doing very good and important research.&lt;br /&gt;
&lt;br /&gt;
Regarding experiment design, you may want to have a look at these papers. I can also scan a chapter of a book (superfreakonomics) by (http://pricetheory.uchicago.edu/levitt/index.html ) I have to send to you, which introduce the problem very well. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Initial Reading ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.nber.org/papers/w15701 So you want to run an experiment, now what? Some Simple Rules of Thumb for Optimal Experimental Design]&lt;br /&gt;
*[http://rps-chicago.com/papers/101-25264884.pdf What do Laboratory Experiments Measuring Social Preferences Reveal About the Real World]&lt;br /&gt;
*[http://www.rps-chicago.com/papers/102-25784084.pdf On the Interpretation of Giving in Dictator Games]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1275</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1275"/>
		<updated>2011-05-23T03:19:55Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Alexander Wolf)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
One possible interesting topic as a follow up is about evaluation of human altruism, which is very related to social network you studied in the LENS project. And can also use the Goose as experimental platform. So actually we more of less with all the codes ready and just need to change some of the user interfaces and then we can run the experiment. It is a very interesting topic and can have big impact and most important it will not take much time.&lt;br /&gt;
&lt;br /&gt;
What we are trying to do about testing altruism or trust or incentive etc are very related to what is happening in the field of behaviour economy. People in that research field usually use games (popular prisoners&#039; dilemma, dictator game) to test and observe the behaviours  of the participants when they encountering different choices. But these kind of games are very limited and artificial and I think many of the conclusion are very unreliable, for example from the dictator game, you may observe that a lot of participants are willing to share their money with their partners, but we cannot draw the conclusion that people are altruistic from it. The reason is that usually you recruit students to participate in the game  (usually happened in academic research), and under your supervision/observation (you are the professor), the students will tend to behave nicely. I think using the DTN data forwarding (whether someone will forward data for others) , we can explore the real altruistic/selfish behavior of the people. If we find out that people are very willing to forward data then it is good for networking conference paper, if we find out that people are not really willing to forward data, we can have a paper to Journal of Economic Behavior and Organization or even to Science.  So overall, I believe we are doing very good and important research.&lt;br /&gt;
&lt;br /&gt;
Regarding experiment design, you may want to have a look at these papers. I can also scan a chapter of a book (superfreakonomics) by (http://pricetheory.uchicago.edu/levitt/index.html ) I have to send to you, which introduce the problem very well. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Initial Reading ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.nber.org/papers/w15701 So you want to run an experiment, now what? Some Simple Rules of Thumb for Optimal Experimental Design]&lt;br /&gt;
*[http://rps-chicago.com/papers/101-25264884.pdf What do Laboratory Experiments Measuring Social Preferences Reveal About the Real World]&lt;br /&gt;
*[http://www.rps-chicago.com/papers/102-25784084.pdf On the Interpretation of Giving in Dictator Games]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1274</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1274"/>
		<updated>2011-05-23T03:18:30Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Alexander Wolf)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
One possible interesting topic as a follow up is about evaluation of human altruism, which is very related to social network you studied in the LENS project. And can also use the Goose as experimental platform. So actually we more of less with all the codes ready and just need to change some of the user interfaces and then we can run the experiment. It is a very interesting topic and can have big impact and most important it will not take much time.&lt;br /&gt;
&lt;br /&gt;
What we are trying to do about testing altruism or trust or incentive etc are very related to what is happening in the field of behaviour economy. People in that research field usually use games (popular prisoners&#039; dilemma, dictator game) to test and observe the behaviours  of the participants when they encountering different choices. But these kind of games are very limited and artificial and I think many of the conclusion are very unreliable, for example from the dictator game, you may observe that a lot of participants are willing to share their money with their partners, but we cannot draw the conclusion that people are altruistic from it. The reason is that usually you recruit students to participate in the game  (usually happened in academic research), and under your supervision/observation (you are the professor), the students will tend to behave nicely. I think using the DTN data forwarding (whether someone will forward data for others) , we can explore the real altruistic/selfish behavior of the people. If we find out that people are very willing to forward data then it is good for networking conference paper, if we find out that people are not really willing to forward data, we can have a paper to Journal of Economic Behavior and Organization or even to Science.  So overall, I believe we are doing very good and important research.&lt;br /&gt;
&lt;br /&gt;
Regarding experiment design, you may want to have a look at these papers. I can also scan a chapter of a book (superfreakonomics) by (http://pricetheory.uchicago.edu/levitt/index.html ) I have to send to you, which introduce the problem very well. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Initial Reading ==&lt;br /&gt;
&lt;br /&gt;
[http://www.nber.org/papers/w15701 So you want to run an experiment, now what? Some Simple Rules of Thumb for Optimal Experimental Design]&lt;br /&gt;
[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1273</id>
		<title>Evaluation of Human Altruism with DTN based data forwarding</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Evaluation_of_Human_Altruism_with_DTN_based_data_forwarding&amp;diff=1273"/>
		<updated>2011-05-23T03:09:39Z</updated>

		<summary type="html">&lt;p&gt;Shameed: Created page with &amp;quot;== Details == {{Project Description |supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] |duration= 6 months |type= Bachelor Thesis |statu...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Alexander Wolf)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade [1] has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering [3, 4], one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In recent years several techniques [5, 6 and 7] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both extend spam protection beyond a user’s social circle and fundamentally prevent the transmission of spam across the network at the first place.  . The key idea of this paradigm in LENS is to select email users called Gatekeepers (GKs), from outside the user’s social circle and within pre-defined social distances. Unless a GK vouches for the emails of potential senders from outside the social circle of a particular recipient, those e-mails are prevented from transmission.&lt;br /&gt;
&lt;br /&gt;
The single most important question in the whole design is how to ensure that the GKs are non-malicious (and not spammers themselves). Obviously, we cannot simply assume they are non-malicious simply based on the fact that they are in the social network. Otherwise we can simply whitelist the whole social network. &lt;br /&gt;
&lt;br /&gt;
The goal of this thesis is to design and implement a protocol for authenticating that the selected GKs (to vouch for spam free communication outside a user’s social circle) are legitimate and non-malicious GKs. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1272</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1272"/>
		<updated>2011-05-23T03:09:06Z</updated>

		<summary type="html">&lt;p&gt;Shameed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor Thesis&lt;br /&gt;
|status= In progress (Tobias Kloht)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade [1] has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering [3, 4], one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In recent years several techniques [5, 6 and 7] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both extend spam protection beyond a user’s social circle and fundamentally prevent the transmission of spam across the network at the first place.  . The key idea of this paradigm in LENS is to select email users called Gatekeepers (GKs), from outside the user’s social circle and within pre-defined social distances. Unless a GK vouches for the emails of potential senders from outside the social circle of a particular recipient, those e-mails are prevented from transmission.&lt;br /&gt;
&lt;br /&gt;
The single most important question in the whole design is how to ensure that the GKs are non-malicious (and not spammers themselves). Obviously, we cannot simply assume they are non-malicious simply based on the fact that they are in the social network. Otherwise we can simply whitelist the whole social network. &lt;br /&gt;
&lt;br /&gt;
The goal of this thesis is to design and implement a protocol for authenticating that the selected GKs (to vouch for spam free communication outside a user’s social circle) are legitimate and non-malicious GKs. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1271</id>
		<title>ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=ISATS:_Leveraging_Identity_Based_Sender_Authentication_and_Trust_for_Spam_Mitigation&amp;diff=1271"/>
		<updated>2011-05-23T03:08:43Z</updated>

		<summary type="html">&lt;p&gt;Shameed: Created page with &amp;quot;== Details == {{Project Description |supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] |duration= 6 months |type= Bachelor |status= In p...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration= 6 months&lt;br /&gt;
|type= Bachelor&lt;br /&gt;
|status= In progress (Tobias Kloht)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The explosive growth in the unsolicited email (spam) in the past decade [1] has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.&lt;br /&gt;
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering [3, 4], one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.&lt;br /&gt;
&lt;br /&gt;
In recent years several techniques [5, 6 and 7] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both extend spam protection beyond a user’s social circle and fundamentally prevent the transmission of spam across the network at the first place.  . The key idea of this paradigm in LENS is to select email users called Gatekeepers (GKs), from outside the user’s social circle and within pre-defined social distances. Unless a GK vouches for the emails of potential senders from outside the social circle of a particular recipient, those e-mails are prevented from transmission.&lt;br /&gt;
&lt;br /&gt;
The single most important question in the whole design is how to ensure that the GKs are non-malicious (and not spammers themselves). Obviously, we cannot simply assume they are non-malicious simply based on the fact that they are in the social network. Otherwise we can simply whitelist the whole social network. &lt;br /&gt;
&lt;br /&gt;
The goal of this thesis is to design and implement a protocol for authenticating that the selected GKs (to vouch for spam free communication outside a user’s social circle) are legitimate and non-malicious GKs. &lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* High motivation and ability to work independently and capability to learn quickly new concepts.&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1270</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1270"/>
		<updated>2011-05-23T02:52:15Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Other tpoics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
&lt;br /&gt;
=== Mobile Networking ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
&lt;br /&gt;
=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[iSATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation]]&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] or [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Social Interest based Peer-to-peer management and optimization]]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[LENS: LEveraging anti-social Networking for preventing Spam]] (M/P)&lt;br /&gt;
* [[Development of a Thunderbird Extension for Social Connection]] (B/P)&lt;br /&gt;
* [[Implementation of Trusted Node Selection Protocol for Spam Free Communication]] (B/P)&lt;br /&gt;
* [[Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community]] (B/M/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
* [[Evaluation of Human Altruism with DTN based data forwarding]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]] (B/M/P)&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1269</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1269"/>
		<updated>2011-05-23T02:52:06Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
&lt;br /&gt;
=== Mobile Networking ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
&lt;br /&gt;
=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[iSATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation]]&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] or [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Social Interest based Peer-to-peer management and optimization]]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[LENS: LEveraging anti-social Networking for preventing Spam]] (M/P)&lt;br /&gt;
* [[Development of a Thunderbird Extension for Social Connection]] (B/P)&lt;br /&gt;
* [[Implementation of Trusted Node Selection Protocol for Spam Free Communication]] (B/P)&lt;br /&gt;
* [[Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community]] (B/M/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
* [[Evaluation of Human Altruism with DTN based data forwarding.]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]] (B/M/P)&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1268</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=1268"/>
		<updated>2011-05-23T02:51:14Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Other tpoics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
&lt;br /&gt;
=== Mobile Networking ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
&lt;br /&gt;
=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] or [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Social Interest based Peer-to-peer management and optimization]]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[LENS: LEveraging anti-social Networking for preventing Spam]] (M/P)&lt;br /&gt;
* [[Development of a Thunderbird Extension for Social Connection]] (B/P)&lt;br /&gt;
* [[Implementation of Trusted Node Selection Protocol for Spam Free Communication]] (B/P)&lt;br /&gt;
* [[Authenticating the Legitimacy of Gate Keeper nodes to vouch for Spam free communication outside social community]] (B/M/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
* [[Evaluation of Human Altruism with DTN based data forwarding.]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]] (B/M/P)&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=1117</id>
		<title>Practical Course Networking Lab (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=1117"/>
		<updated>2011-03-08T11:01:27Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* First Viva Session */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] &lt;br /&gt;
|time=Friday, 29 October 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=67206]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from 1 Nov 2010 until 11 Feb 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between 14 Feb 2011 and 17 Apr 2011 (The course will be offered during SoSe 2011 too)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;14th Feb - 20th Feb&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;21th Feb - 6th Mar&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;7th Mar - 20th Mar&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;21th Mar - 3th Apr&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;4th Apr - 17th Apr&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Sven Emme, Julian Rüger&lt;br /&gt;
| {{BgRed}} | Sandro Knauß, Anna Eggers&lt;br /&gt;
| {{BgRed}} | Philipp Kachel, Florian Müller&lt;br /&gt;
| {{BgRed}} | Sven Reglitzki, David Goltzsche&lt;br /&gt;
| {{BgRed}} | Sebastian Hobert, Simon Nickel&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Viva Session ==&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Students&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Date&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Time&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| Steffen Zenker&lt;br /&gt;
| 24th March &lt;br /&gt;
| 14:00-14:20&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Wolf &amp;amp; Cesar Revilla&lt;br /&gt;
| 24th March &lt;br /&gt;
| 14:30-14:50&lt;br /&gt;
|-&lt;br /&gt;
| Sandro Knauß &amp;amp; Anna Eggers &lt;br /&gt;
| 24th March &lt;br /&gt;
| 15:00-15:20&lt;br /&gt;
|-&lt;br /&gt;
| Philipp Kachel &amp;amp;  Florian Müller &lt;br /&gt;
| 24th March &lt;br /&gt;
| 15:30-15:50&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Viva]]&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=1116</id>
		<title>Practical Course Networking Lab (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=1116"/>
		<updated>2011-03-08T10:54:59Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* First Viva Session */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] &lt;br /&gt;
|time=Friday, 29 October 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=67206]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from 1 Nov 2010 until 11 Feb 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between 14 Feb 2011 and 17 Apr 2011 (The course will be offered during SoSe 2011 too)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;14th Feb - 20th Feb&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;21th Feb - 6th Mar&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;7th Mar - 20th Mar&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;21th Mar - 3th Apr&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;4th Apr - 17th Apr&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Sven Emme, Julian Rüger&lt;br /&gt;
| {{BgRed}} | Sandro Knauß, Anna Eggers&lt;br /&gt;
| {{BgRed}} | Philipp Kachel, Florian Müller&lt;br /&gt;
| {{BgRed}} | Sven Reglitzki, David Goltzsche&lt;br /&gt;
| {{BgRed}} | Sebastian Hobert, Simon Nickel&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== First Viva Session ==&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Viva]]&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=1115</id>
		<title>Practical Course Networking Lab (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=1115"/>
		<updated>2011-03-08T10:53:23Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Course Materials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] &lt;br /&gt;
|time=Friday, 29 October 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=67206]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from 1 Nov 2010 until 11 Feb 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between 14 Feb 2011 and 17 Apr 2011 (The course will be offered during SoSe 2011 too)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;14th Feb - 20th Feb&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;21th Feb - 6th Mar&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;7th Mar - 20th Mar&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;21th Mar - 3th Apr&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;4th Apr - 17th Apr&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Sven Emme, Julian Rüger&lt;br /&gt;
| {{BgRed}} | Sandro Knauß, Anna Eggers&lt;br /&gt;
| {{BgRed}} | Philipp Kachel, Florian Müller&lt;br /&gt;
| {{BgRed}} | Sven Reglitzki, David Goltzsche&lt;br /&gt;
| {{BgRed}} | Sebastian Hobert, Simon Nickel&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== First Viva Session ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Viva]]&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2011)&amp;diff=1015</id>
		<title>Seminar on Internet Technologies (Summer 2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2011)&amp;diff=1015"/>
		<updated>2011-02-03T06:17:27Z</updated>

		<summary type="html">&lt;p&gt;Shameed: Created page with &amp;quot;== Details == {{CourseDetails |credits=120h, 4 ECTS |module=M.Inf.122/222: Seminar Telematik I/II &amp;#039;&amp;#039;-or-&amp;#039;&amp;#039; B.Inf.204/205: Proseminar I/II |ta=[http://www.net.informatik.uni-goett...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=67096&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* N/A: First general meeting. Introduction to the course and open questions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=978</id>
		<title>Practical Course Networking Lab (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=978"/>
		<updated>2011-01-17T13:56:12Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Lab Slots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] &lt;br /&gt;
|time=Friday, 29 October 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=67206]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from 1 Nov 2010 until 11 Feb 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between 14 Feb 2011 and 1 Apr 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;14th--20th Feb&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Sven Emme, Julian Rüger&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=977</id>
		<title>Practical Course Networking Lab (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=977"/>
		<updated>2011-01-17T13:55:47Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Lab Slots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] &lt;br /&gt;
|time=Friday, 29 October 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=67206]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from 1 Nov 2010 until 11 Feb 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgGreem}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between 14 Feb 2011 and 1 Apr 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;14th--20th Feb&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Sven Emme, Julian Rüger&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=976</id>
		<title>Practical Course Networking Lab (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Winter_2010/2011)&amp;diff=976"/>
		<updated>2011-01-17T09:27:54Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Lab Slots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] &lt;br /&gt;
|time=Friday, 29 October 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=67206]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from 1 Nov 2010 until 11 Feb 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Saturday&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Henning Thies, Markus Suhr&lt;br /&gt;
| {{BgRed}} | Alexander Wolf, Cesar Revilla&lt;br /&gt;
| {{BgGreen}} | &lt;br /&gt;
| {{BgRed}} | Steffen Zenker, Lei Jiao&lt;br /&gt;
| {{BgRed}} | Shining Wu, Cong Ding&lt;br /&gt;
| {{BgRed}} | Jiachen &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between 14 Feb 2011 and 1 Apr 2011&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;14th--20th Feb&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;...&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Sven Emme, Julian Rüger&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=883</id>
		<title>Seminar on Internet Technologies (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=883"/>
		<updated>2010-11-23T14:10:11Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=67096&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Announcement|Please register your topic with the corresponding topic supervisor and &#039;&#039;&#039;your preferred date for the presentation&#039;&#039;&#039; as soon as possible. We will cancel the presentations on 16 December 2010 if not at least two students register for this date before 30 November 2010.}}&lt;br /&gt;
{{Announcement|You can participate in the seminar even if you were not present at the informational meeting (please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information).}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* Thursday, &#039;&#039;&#039;4 November 2010, 16.15 - 17.00&#039;&#039;&#039;: First general meeting. Introduction to the course and open questions.&lt;br /&gt;
* Thursday, &#039;&#039;&#039;16 December 2010, 15.00 - 18.00&#039;&#039;&#039;: Presentations (pending)&lt;br /&gt;
** Topic TBA&lt;br /&gt;
** Topic TBA&lt;br /&gt;
** Topic TBA&lt;br /&gt;
** Topic TBA&lt;br /&gt;
* Thursday, &#039;&#039;&#039;6 January 2011, 15.00 - 18.00&#039;&#039;&#039;: Presentations (pending)&lt;br /&gt;
** Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
** Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
** Automated Security Protocol Analysis (AVANTSSAR)&lt;br /&gt;
** Fighting Spam in Social Networking Sites&lt;br /&gt;
* Thursday, &#039;&#039;&#039;13 January 2011, 15.00 - 18.00&#039;&#039;&#039;: Presentations (pending)&lt;br /&gt;
** Scalable Server Selection for Cloud Services&lt;br /&gt;
** Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
** A conceptual overview of mobile platforms&lt;br /&gt;
** Android programming: Concepts and limitations&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Traffic Localization in P2P Networks&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Modern Authentication Systems on the example of MS Geneva&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://avispa-project.org/]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Distributed Hash Tables - Usage, properties and future development&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Matrix Factorization Model based Network Coordinate System&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Fighting Spam in Social Networking Sites&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Security Design in Network Coordinate Systems&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Mobile and Wireless Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Scalable Server Selection for Cloud Services&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=882</id>
		<title>Seminar on Internet Technologies (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=882"/>
		<updated>2010-11-23T14:08:36Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=67096&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Announcement|Please register your topic with the corresponding topic supervisor and &#039;&#039;&#039;your preferred date for the presentation&#039;&#039;&#039; as soon as possible. We will cancel the presentations on 16 December 2010 if not at least two students register for this date before 30 November 2010.}}&lt;br /&gt;
{{Announcement|You can participate in the seminar even if you were not present at the informational meeting (please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information).}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* Thursday, &#039;&#039;&#039;4 November 2010, 16.15 - 17.00&#039;&#039;&#039;: First general meeting. Introduction to the course and open questions.&lt;br /&gt;
* Thursday, &#039;&#039;&#039;16 December 2010, 15.00 - 18.00&#039;&#039;&#039;: Presentations (pending)&lt;br /&gt;
** Topic TBA&lt;br /&gt;
** Topic TBA&lt;br /&gt;
** Topic TBA&lt;br /&gt;
** Topic TBA&lt;br /&gt;
* Thursday, &#039;&#039;&#039;6 January 2011, 15.00 - 18.00&#039;&#039;&#039;: Presentations (pending)&lt;br /&gt;
** Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
** Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
** Automated Security Protocol Analysis (AVANTSSAR)&lt;br /&gt;
** Topic TBA&lt;br /&gt;
* Thursday, &#039;&#039;&#039;13 January 2011, 15.00 - 18.00&#039;&#039;&#039;: Presentations (pending)&lt;br /&gt;
** Scalable Server Selection for Cloud Services&lt;br /&gt;
** Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
** A conceptual overview of mobile platforms&lt;br /&gt;
** Android programming: Concepts and limitations&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Traffic Localization in P2P Networks&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Modern Authentication Systems on the example of MS Geneva&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://avispa-project.org/]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Distributed Hash Tables - Usage, properties and future development&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Matrix Factorization Model based Network Coordinate System&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Fighting Spam in Social Networking Sites&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Security Design in Network Coordinate Systems&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Mobile and Wireless Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Scalable Server Selection for Cloud Services&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Development_of_a_Thunderbird_Extension_for_social_connection&amp;diff=754</id>
		<title>Development of a Thunderbird Extension for social connection</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Development_of_a_Thunderbird_Extension_for_social_connection&amp;diff=754"/>
		<updated>2010-10-11T18:23:22Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration=3 months&lt;br /&gt;
|type=Bachelor Thesis or Student Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The Computer Networks Group is researching ....&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* Thunderbird Extensions [https://developer.mozilla.org/en/Extensions/Thunderbird] [http://kb.mozillazine.org/Getting_started_with_extension_development] [https://developer.mozilla.org/en/Extensions] [http://blog.donaldorgan.com/2009/02/thunderbird-extension-development.html]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Development_of_a_Thunderbird_Extension_for_social_connection&amp;diff=753</id>
		<title>Development of a Thunderbird Extension for social connection</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Development_of_a_Thunderbird_Extension_for_social_connection&amp;diff=753"/>
		<updated>2010-10-11T18:10:50Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration=3 months&lt;br /&gt;
|type=Bachelor Thesis or Student Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The Computer Networks Group is researching ....&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* Thunderbird Extensions [https://developer.mozilla.org/en/Extensions]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Advanced_Networking_(Winter_2010/2011)&amp;diff=752</id>
		<title>Practical Course Advanced Networking (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Advanced_Networking_(Winter_2010/2011)&amp;diff=752"/>
		<updated>2010-10-11T18:08:41Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=M.Inf.805.6C: Fortgeschrittenenpraktikum Computernetzwerke&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
|time=please see #Schedule&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung&amp;amp;veranstaltung.veranstid=70188]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
We offer a couple of practical topics related to advanced computer networking.&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of computer networking. It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages). (50%)&lt;br /&gt;
* Present the selected topic and demonstrate your results in the seminar (30 min. presentation + 10 min. discussion). (50%)&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
Friday, &#039;&#039;&#039;5 November 2010, 16.15 - 17.15&#039;&#039;&#039;: First general meeting. Introduction to the course and open questions.&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Thunderbird Social Connector (TSC)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| []&lt;br /&gt;
| Coming soon&lt;br /&gt;
|-&lt;br /&gt;
| Make Twitter wider&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.winterwell.com/software/jtwitter/] [http://www.twitter.com/] [http://www.cl.cam.ac.uk/~ph315/publications/goose_final_socialComWorkshop.pdf]&lt;br /&gt;
| Twitter is a microblogging system which has millions of users. However, only people with Internet can share the information from Twitter. In this project, we use Bluetooth to help the information diffusion on Twitter ... [[detail]]&lt;br /&gt;
|-&lt;br /&gt;
| Develop a mobile social application&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.cl.cam.ac.uk/~ph315/publications/goose_final_socialComWorkshop.pdf]&lt;br /&gt;
| You may want to organize a party on weekends, but you do not want to call every friend of yours. This mobile social application helps you broadcast this party event to anyone you want to invite. It also share information (i.e., pictures, music) within a group that owns same interest ... [[more]]&lt;br /&gt;
|-&lt;br /&gt;
| Construct Your Own Large-Scale Distributed Applications&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://www.freepastry.org/PAST/overview.pdf] [http://www.freepastry.org/] [http://www.planet-lab.org/]&lt;br /&gt;
| Coming soon&lt;br /&gt;
|-&lt;br /&gt;
| Writing Your Own Internet Application Simulator&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://www.cc.gatech.edu/projects/gtitm/]&lt;br /&gt;
| Coming soon&lt;br /&gt;
|-&lt;br /&gt;
| Development and Data Collection using Facebook API&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://developers.facebook.com/docs/]&lt;br /&gt;
| Facebook is a social networking website launched in February 2004 that is operated and privately owned by Facebook, Inc., with more than 500 million active users in July 2010. In this project, you should build your own facebook application using the facebook API. Although the detailed topic is quite open (we can brainstorm about that), but there are the following three basic milestones: (1)Build an application on facebook with a good looking interface, like a online game, quiz, etc. As interesting as possible. (2)Attract more than 40 people to use it. (3) Collected the data (such as user behavior, corrsponding social graph, etc), and do the analysis.&lt;br /&gt;
|-&lt;br /&gt;
| Android development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://www.android.com/]&lt;br /&gt;
| &#039;&#039;&#039;Building a prototype application to use Android phones for authentication&#039;&#039;&#039;&lt;br /&gt;
The team will develop an application for the Android platform that allows a mobile phone to be used as an authentication token.&lt;br /&gt;
|-&lt;br /&gt;
| Firefox development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [https://developer.mozilla.org/en/Extensions]&lt;br /&gt;
|  &#039;&#039;&#039;Building a prototype plug-in to integrate Firefox into an external authentication system&#039;&#039;&#039;&lt;br /&gt;
The team will develop a plug-in for the Firefox web browser that enables the browser to be integrated as a client into an external authentication system.&lt;br /&gt;
|-&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Development_of_a_Thunderbird_Extension_for_social_connection&amp;diff=751</id>
		<title>Development of a Thunderbird Extension for social connection</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Development_of_a_Thunderbird_Extension_for_social_connection&amp;diff=751"/>
		<updated>2010-10-11T18:06:08Z</updated>

		<summary type="html">&lt;p&gt;Shameed: Created page with &amp;quot;== Details == {{Project Description |supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] |duration=3 months |type=Bachelor Thesis or Stude...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration=3 months&lt;br /&gt;
|type=Bachelor Thesis or Student Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The Computer Networks Group is researching ....&lt;br /&gt;
&lt;br /&gt;
== Required Skills==&lt;br /&gt;
* Basic understanding of computer networking&lt;br /&gt;
* Good programming skills&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* Mozilla Extensions [https://developer.mozilla.org/en/Extensions]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=750</id>
		<title>Theses and Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Theses_and_Projects&amp;diff=750"/>
		<updated>2010-10-11T18:03:10Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Social Networking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Open Theses and Student Project Topics ==&lt;br /&gt;
&lt;br /&gt;
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don&#039;t hesitate to [mailto:net@informatik.uni-goettingen.de contact us].&lt;br /&gt;
&lt;br /&gt;
* (B) Bachelor thesis&lt;br /&gt;
* (M) Master thesis&lt;br /&gt;
* (P) Student project&lt;br /&gt;
&lt;br /&gt;
=== Congestion Control ===&lt;br /&gt;
* [[A network friendly congestion control protocol]] (M)&lt;br /&gt;
* [[A study to improve video/voice distribution based on the congestion in the network]] (B/P)&lt;br /&gt;
* [[A study of the use of Admission control in MPLS networks]] (B/M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
** Current State of the art in Quality of Service [[[Media:mayutanqosweb.mp4]]]&lt;br /&gt;
&lt;br /&gt;
=== Mobile Networking ===&lt;br /&gt;
* [[Proxy Mobile IP Implementation and Evaluation in IEEE 802.11 Networks]] (B/M/P)&lt;br /&gt;
* [[Design and Implementation of a Sandbox Environment on a Mobile Phone]] (M/P)&lt;br /&gt;
* [[Implementation of a Routing and Forwarding Scheme for Coordinated Wide Area Mobility]]&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
&lt;br /&gt;
=== Peer-to-Peer ===&lt;br /&gt;
* [[Implementation and Deployment of Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/tianyin_xu Tianyin Xu]&lt;br /&gt;
&lt;br /&gt;
=== Security ===&lt;br /&gt;
* [[Development of a Firefox Extension for a Novel Authentication System]] (B/P)&lt;br /&gt;
* [[Development of an Android Application for a Novel Authentication System]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] or [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Social Networking ===&lt;br /&gt;
* [[Social Interest based Peer-to-peer management and optimization]]&lt;br /&gt;
* [[Implementation and Evaluation of a Decentralized Authentication System based on Social Groups]]  (B/M/P)&lt;br /&gt;
* [[LENS: LEveraging anti-social Networking for preventing Spam]] (M/P)&lt;br /&gt;
* [[Development of a Thunderbird Extension for social connection]] (B/P)&lt;br /&gt;
* [[User behavior study of microblogging systems]] (P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler], [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] or [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
&lt;br /&gt;
=== Trust and Reputation systems ===&lt;br /&gt;
* [[P2P optimization: evaluation of different trust and reputation metrics]] (B/P)&lt;br /&gt;
* [[Robustness analysis and real world deployments]] (B/P)&lt;br /&gt;
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
&lt;br /&gt;
=== Other tpoics ===&lt;br /&gt;
* [[Emergency services: A context aware broadcast of an emergency warning]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
== Ongoing Topics ==&lt;br /&gt;
* [[Evaluation of the Routing Performance of various Mobility Solutions]] (B/M/P)&lt;br /&gt;
* [[Implementation and Evaluation of a Peer-to-Peer Network on the Android Platform]] (P)&lt;br /&gt;
* Design and implementation of a socio-aware layer for mobile phones&lt;br /&gt;
* Network Friendly TCP for P2P and other low priority traffic&lt;br /&gt;
* [[Securing Phoenix Network Coordinate System]] (M/P)&lt;br /&gt;
* [[Data crawling on Facebook]] (M/P)&lt;br /&gt;
&lt;br /&gt;
== Completed Topics ==&lt;br /&gt;
* [[Implementation and Evaluation of Decentralized Online Social Networking System]] (P)&lt;br /&gt;
* For a full list of older topics please go [http://www.net.informatik.uni-goettingen.de/student_projects here].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=749</id>
		<title>Seminar on Internet Technologies (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=749"/>
		<updated>2010-10-11T15:50:07Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=67096&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| Traffic Localization in P2P Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://avispa-project.org/]&lt;br /&gt;
|-&lt;br /&gt;
| Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Fighting Spam in Social Networking Sites&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]&lt;br /&gt;
|-&lt;br /&gt;
| Security Design in Network Coordinate Systems&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Mobile and Wireless Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=748</id>
		<title>Seminar on Internet Technologies (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=748"/>
		<updated>2010-10-11T15:23:52Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=67096&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| Traffic Localization in P2P Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://avispa-project.org/]&lt;br /&gt;
|-&lt;br /&gt;
| Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security Design in Network Coordinate Systems&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Mobile and Wireless Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=747</id>
		<title>Seminar on Internet Technologies (Winter 2010/2011)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Winter_2010/2011)&amp;diff=747"/>
		<updated>2010-10-11T15:21:54Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=67096&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| Traffic Localization in P2P Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://avispa-project.org/]&lt;br /&gt;
|-&lt;br /&gt;
| Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Malware propagation in mobile networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&amp;amp;rep=rep1&amp;amp;type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&amp;amp;type=pdf&amp;amp;coll=GUIDE&amp;amp;dl=GUIDE&amp;amp;CFID=108242768&amp;amp;CFTOKEN=61684608]&lt;br /&gt;
|-&lt;br /&gt;
| Security Design in Network Coordinate Systems&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Economics in Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Mobile and Wireless Peer-to-Peer Systems&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]&lt;br /&gt;
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Summer_2010)&amp;diff=623</id>
		<title>Practical Course Networking Lab (Summer 2010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Summer_2010)&amp;diff=623"/>
		<updated>2010-07-14T06:12:49Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Lab Slots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
|time=Friday, 9 April 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=60894&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from April 12, 2010 to July 9, 2010&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday(since 9AM)&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday(since 5PM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday(since 5PM)&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Mohammed Ibrahim, Tobias Kloht, Tobias Koller&lt;br /&gt;
| {{BgRed}} | Christian Georg Wehrberger &amp;amp; Georg Jahn&lt;br /&gt;
| {{BgRed}} | Xu Luo, Svetoslav Mihaylov&lt;br /&gt;
| {{BgRed}} | Michael Schaaf, Kevin Kramer&lt;br /&gt;
| {{BgRed}} | Yu Sheng, Ziqian Ju&lt;br /&gt;
| {{BgRed}} | Thorsten Mauß &amp;amp; Alexander Stahmann&lt;br /&gt;
| {{BgRed}} | Andreas Strey, Felix Schindler&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between xx and xx&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Jul. 12 - Jul. 23&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Jul. 26 - Aug. 6&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Aug. 9 - Aug. 20&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Aug. 23 - Sep. 3&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Sep. 6 - Sep. 17&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Sep. 20 - Oct. 1&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Kai Jakobsen &amp;amp; Sebastian Albert&lt;br /&gt;
| {{BgRed}} | Assigned&lt;br /&gt;
| {{BgRed}} | Bartosz Kohnke &amp;amp; Katarzyna Wasilczuk&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] &lt;br /&gt;
|&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|}&lt;br /&gt;
* &#039;&#039;&#039;Each group please send an e-mail to the responsible TA to let him know your e-mail address&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Everyday before you come to the lab, please go to the office of the responsible TA to get your key (9AM/5PM everyday)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Summer_2010)&amp;diff=607</id>
		<title>Practical Course Networking Lab (Summer 2010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Summer_2010)&amp;diff=607"/>
		<updated>2010-06-02T11:50:52Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Lab Slots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
|time=Friday, 9 April 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=60894&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from April 12, 2010 to July 9, 2010&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday(since 9AM)&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday(since 5PM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday(since 5PM)&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Mohammed Ibrahim, Tobias Kloht, Tobias Koller&lt;br /&gt;
| {{BgRed}} | Christian Georg Wehrberger &amp;amp; Georg Jahn&lt;br /&gt;
| {{BgRed}} | Xu Luo, Svetoslav Mihaylov&lt;br /&gt;
| {{BgRed}} | Michael Schaaf, Kevin Kramer&lt;br /&gt;
| {{BgRed}} | Yu Sheng, Ziqian Ju&lt;br /&gt;
| {{BgRed}} | Thorsten Mauß &amp;amp; Alexander Stahmann&lt;br /&gt;
| {{BgRed}} | Andreas Strey, Felix Schindler&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between xx and xx&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Jul. 12 - Jul. 23&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Jul. 26 - Aug. 6&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Aug. 9 - Aug. 20&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Aug. 23 - Sep. 3&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Sep. 6 - Sep. 17&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Sep. 20 - Oct. 1&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Kai Jakobsen &amp;amp; Sebastian Albert&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Bartosz Kohnke &amp;amp; Katarzyna Wasilczuk&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] &lt;br /&gt;
|&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|}&lt;br /&gt;
* &#039;&#039;&#039;Each group please send an e-mail to the responsible TA to let him know your e-mail address&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Everyday before you come to the lab, please go to the office of the responsible TA to get your key (9AM/5PM everyday)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Summer_2010)&amp;diff=606</id>
		<title>Practical Course Networking Lab (Summer 2010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Practical_Course_Networking_Lab_(Summer_2010)&amp;diff=606"/>
		<updated>2010-06-02T11:50:08Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Lab Slots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:teaching_lab1.png|200px|thumb|right|NET Teaching Lab where this course takes place.]]&lt;br /&gt;
This course offers students a hands-on approach to computer networking. The students are given practical tasks from the area of computer networks which they have to solve in a small team. The course aims to familiarize the students with practical issues of computer network setup, configuration, operation and maintenance.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=180h, 6 ECTS&lt;br /&gt;
|module=B.Inf.802/803/804: Fachpraktikum I/II/III&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
|time=Friday, 9 April 2010, 14.15-15.45 (organizational meeting)&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=60894&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Prerequisites==&lt;br /&gt;
This course requires fair overall knowledge of networking protocols. The exercises will be done using the Linux operating system and Cisco routers.&lt;br /&gt;
&lt;br /&gt;
It is &#039;&#039;recommended&#039;&#039; to have attended the following courses prior to taking this one:&lt;br /&gt;
*Telematik&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organization and Examination==&lt;br /&gt;
=== Informational meeting ===&lt;br /&gt;
At the beginning of a semester there will be an organizational meeting. Please see the schedule of the corresponding semester for the exact date. At the organizational meeting we will give an introduction to the lab course including a tour of the actual lab and form the lab teams.&lt;br /&gt;
&lt;br /&gt;
===Lab teams===&lt;br /&gt;
The students will conduct the practical course in small teams. A team normally consist of 2 students. Teams will be formed at the informational meeting at the beginning of the course.&lt;br /&gt;
&lt;br /&gt;
===Weekly exercises and written reports===&lt;br /&gt;
The course consists of weekly exercises related to computer networks. Each team is expected to complete those exercises and compile a short written report every week.&lt;br /&gt;
&lt;br /&gt;
===Lab Slots===&lt;br /&gt;
The Lab will be available exclusively to each team within allocated time slots. Please reserve a time slot for your team with the responsible Teaching Assistant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester:&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Weekly allocated lab slots from April 12, 2010 to July 9, 2010&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday(since 9AM)&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Monday(since 5PM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Tuesday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Wednesday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Thursday(since 5PM)&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Friday(since 9AM)&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Mohammed Ibrahim, Tobias Kloht, Tobias Koller&lt;br /&gt;
| {{BgRed}} | Christian Georg Wehrberger &amp;amp; Georg Jahn&lt;br /&gt;
| {{BgRed}} | Xu Luo, Svetoslav Mihaylov&lt;br /&gt;
| {{BgRed}} | Michael Schaaf, Kevin Kramer&lt;br /&gt;
| {{BgRed}} | Yu Sheng, Ziqian Ju&lt;br /&gt;
| {{BgRed}} | Thorsten Mauß &amp;amp; Alexander Stahmann&lt;br /&gt;
| {{BgRed}} | Andreas Strey, Felix Schindler&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;During the semester break (Blockkurs):&#039;&#039;&#039;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; {{Prettytable}}&lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; | &#039;&#039;Blocks of two weeks between xx and xx&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Jul. 12 - Jul. 23&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Jul. 26 - Aug. 6&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Aug. 9 - Aug. 20&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Aug. 23 - Sep. 3&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Sep. 6 - Sep. 17&#039;&#039;&#039;	&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Sep. 20 - Oct. 1&#039;&#039;&#039;	&lt;br /&gt;
|-&lt;br /&gt;
| {{BgRed}} | Kai Jakobsen &amp;amp; Sebastian Albert&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Bartosz Kohnke &amp;amp; Katarzyna Wasilczuk&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
| {{BgGreen}} | Available&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] &lt;br /&gt;
|&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]}&lt;br /&gt;
* &#039;&#039;&#039;Each group please send an e-mail to the responsible TA to let him know your e-mail address&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Everyday before you come to the lab, please go to the office of the responsible TA to get your key (9AM/5PM everyday)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Course Materials ==&lt;br /&gt;
&lt;br /&gt;
The course is based on the book &amp;quot;Mastering Networks - An Internet Lab Manual&amp;quot; by Jörg Liebeherr and Magda El Zarki. [http://www.tcpip-lab.net/ http://www.tcpip-lab.net/]&lt;br /&gt;
&lt;br /&gt;
You find all the relevant course material in the [https://wiki.net.informatik.uni-goettingen.de/lab/Main_Page &#039;&#039;&#039;Networking Lab Wiki&#039;&#039;&#039;].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2010)&amp;diff=592</id>
		<title>Seminar on Internet Technologies (Summer 2010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2010)&amp;diff=592"/>
		<updated>2010-04-19T09:35:10Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=59364&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Announcement|The seminar is ongoing but &#039;&#039;&#039;you can still take part&#039;&#039;&#039;. If you are interested in a topic please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* Thursday, &#039;&#039;&#039;8 April 2010, 16.15 - 17.15&#039;&#039;&#039;: First general meeting. Introduction to the course and open questions.&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Securing Media Transport Protocols&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| Congestion Exposure, A study of its pros and cons&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/]&lt;br /&gt;
|-&lt;br /&gt;
| Net neutrality: A study of fairness on the internet&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://bobbriscoe.net/projects/refb/draft-briscoe-tsvarea-fair-02.html]&lt;br /&gt;
|-&lt;br /&gt;
| LinkedIN: A study of the popular business oriented social networking site. &lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]&lt;br /&gt;
| [http://www.linkedin.com/]&lt;br /&gt;
|-&lt;br /&gt;
| Traffic Localization in P2P Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Twitter: a popular microblogging tool&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://portal.acm.org/citation.cfm?id=1348556] [http://an.kaist.ac.kr/~sbmoon/paper/intl-conf/2010-www-twitter.pdf] [http://www.iptps.org/papers-2009/sandler.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;User behavior in Online Social Networks&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Security threats of Online Social Networks&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf][https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security Design in Network Coordinate Systems&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2010)&amp;diff=502</id>
		<title>Seminar on Internet Technologies (Summer 2010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2010)&amp;diff=502"/>
		<updated>2010-02-25T11:42:23Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=59364&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* TBA&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Securing Media Transport Protocols&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| State-of-the-art and deployment scenarios for IPv6&lt;br /&gt;
| Mayutan Arumaithurai&lt;br /&gt;
| [http://www.cisco.com/en/US/docs/ios/solutions_docs/ipv6/IPv6dswp.html]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Traffic Localization in P2P Networks&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Twitter: a popular microblogging tool&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://portal.acm.org/citation.cfm?id=1348556] [http://an.kaist.ac.kr/~sbmoon/paper/intl-conf/2010-www-twitter.pdf] [http://www.iptps.org/papers-2009/sandler.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| User behavior in Online Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security threats of Online Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Security and Privacy in Delay Tolerant Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&amp;amp;rep=rep1&amp;amp;type=pdf][https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&amp;amp;rep=rep1&amp;amp;type=pdf]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and page of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2010)&amp;diff=501</id>
		<title>Seminar on Internet Technologies (Summer 2010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Seminar_on_Internet_Technologies_(Summer_2010)&amp;diff=501"/>
		<updated>2010-02-24T14:21:33Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{CourseDetails&lt;br /&gt;
|credits=120h, 4 ECTS&lt;br /&gt;
|module=M.Inf.122/222: Seminar Telematik I/II &#039;&#039;-or-&#039;&#039; B.Inf.204/205: Proseminar I/II&lt;br /&gt;
|ta=[http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
|time=please see [[#Schedule]]&lt;br /&gt;
|place=IfI 3.101&lt;br /&gt;
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&amp;amp;status=init&amp;amp;vmfile=no&amp;amp;publishid=59364&amp;amp;moduleCall=webInfo&amp;amp;publishConfFile=webInfo&amp;amp;publishSubDir=veranstaltung]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Course description==&lt;br /&gt;
&lt;br /&gt;
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.&lt;br /&gt;
&lt;br /&gt;
The purpose of this seminar is to&lt;br /&gt;
* Familiarize the students with common and new technologies that are being used in the Internet.&lt;br /&gt;
* Enable independent studying of a specific topic.&lt;br /&gt;
* Train writing and presentation skills.&lt;br /&gt;
&lt;br /&gt;
==Passing requirements==&lt;br /&gt;
* Prepare a written report on the selected topic (12-15 pages).&lt;br /&gt;
* Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).&lt;br /&gt;
* Presence and active participation during all meetings.&lt;br /&gt;
&lt;br /&gt;
==Schedule==&lt;br /&gt;
* TBA&lt;br /&gt;
&lt;br /&gt;
== Topics ==&lt;br /&gt;
&lt;br /&gt;
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you. &lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; class=&amp;quot;wikitable sortable&amp;quot; {{Prettytable}} &lt;br /&gt;
|-&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Topic advisor&#039;&#039;&#039;&lt;br /&gt;
|{{Hl2}} |&#039;&#039;&#039;Initial readings&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Securing Media Transport Protocols&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol]&lt;br /&gt;
|-&lt;br /&gt;
| State-of-the-art and deployment scenarios for IPv6&lt;br /&gt;
| Mayutan Arumaithurai&lt;br /&gt;
| [http://www.cisco.com/en/US/docs/ios/solutions_docs/ipv6/IPv6dswp.html]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;strike&amp;gt;Traffic Localization in P2P Networks&amp;lt;/strike&amp;gt;&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]&lt;br /&gt;
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]&lt;br /&gt;
|-&lt;br /&gt;
| Modern Authentication Systems on the example of MS Geneva&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]&lt;br /&gt;
|-&lt;br /&gt;
| Distributed Hash Tables - Usage, properties and future development&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
| [http://en.wikipedia.org/wiki/Distributed_hash_table]&lt;br /&gt;
|-&lt;br /&gt;
| Matrix Factorization Model based Network Coordinate System&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| Twitter: a popular microblogging tool&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://portal.acm.org/citation.cfm?id=1348556] [http://an.kaist.ac.kr/~sbmoon/paper/intl-conf/2010-www-twitter.pdf] [http://www.iptps.org/papers-2009/sandler.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| User behavior in Online Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]&lt;br /&gt;
| [http://an.kaist.ac.kr/~mycha/docs/imc126-benevenuto.pdf] [http://www2.research.att.com/~bala/papers/imc09-osnf.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/interaction-eurosys09.pdf]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Security threats of Online Social Networks&lt;br /&gt;
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
| [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Workﬂow==&lt;br /&gt;
&lt;br /&gt;
The workflow of the seminar is as follows.&lt;br /&gt;
&lt;br /&gt;
=== 1. Topic selection ===&lt;br /&gt;
Each student picks a topic to work on. &#039;&#039;&#039;You can pick a topic and start working at any time.&#039;&#039;&#039; Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.&lt;br /&gt;
&lt;br /&gt;
=== 2. Topic advisor ===&lt;br /&gt;
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as &#039;&#039;you&#039;&#039; want, so don&#039;t hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.&lt;br /&gt;
&lt;br /&gt;
=== 3. Approach your topic ===&lt;br /&gt;
&lt;br /&gt;
* Topic titles are rather abstract.&lt;br /&gt;
* You chose the direction of your elaboration.&lt;br /&gt;
* For example:&lt;br /&gt;
**     Survey style: Basic introduction, overview about the ﬁeld, general     problems, methods, approaches.&lt;br /&gt;
**     Speciﬁc problem: Selective introduction, detail the problem, introduce      solutions or approaches.&lt;br /&gt;
*Include your own thoughts: Evaluation section, outlook in the end.&lt;br /&gt;
*Remember: We are interested in the aspects related to &#039;&#039;Internet technologies&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== 4. Prepare a Presentation ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Give an overview of your topic to the audience.&lt;br /&gt;
* 30 minutes of presentation followed by 10 minutes discussion.&lt;br /&gt;
* Slides should be in English.&lt;br /&gt;
* &#039;&#039;&#039;Deadline (presentation slides): 1 week before the presentation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.&lt;br /&gt;
&lt;br /&gt;
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report. &lt;br /&gt;
&lt;br /&gt;
Some hints you should keep in mind when preparing the presentation:&lt;br /&gt;
* 30 minutes are too short to present a topic fully.&lt;br /&gt;
* Limit the introduction of basics (5 to 10 min.).&lt;br /&gt;
* Focus on the interesting parts of the topic.&lt;br /&gt;
* It is alright to focus just on one certain important aspect.&lt;br /&gt;
* Make sure to ﬁnish in time!&lt;br /&gt;
&lt;br /&gt;
Tips for preparing the slides:&lt;br /&gt;
* No more than 20 pages.&lt;br /&gt;
* Get your audiences to quickly understand the idea of the presentation&lt;br /&gt;
*Figures, tables and animations are better than wordy sentences&lt;br /&gt;
*Use example to explain complicated algorithms&lt;br /&gt;
*Short sentences&lt;br /&gt;
*Avoid complicated equations&lt;br /&gt;
*Summary of the topic: thinking/justification of the approach(es) in your own words&lt;br /&gt;
&lt;br /&gt;
=== 5. Write the Report ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;TLDR version:&#039;&#039;&#039; &lt;br /&gt;
* Comprehensively cover the topic.&lt;br /&gt;
* Content: &lt;br /&gt;
** Present the problem with its background (˜10%).&lt;br /&gt;
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).&lt;br /&gt;
** Evaluate and assess those approaches (˜30%).&lt;br /&gt;
** Give a short outlook on potential future developments (˜10%).&lt;br /&gt;
* Between 12 and 15 pages of content (usual thesis layout).&lt;br /&gt;
* Written in English according to common guidelines for scientific papers.&lt;br /&gt;
* &#039;&#039;&#039;Deadline: End of the semester.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The report is the main part of your work. It must be between 12 and page of content (not including table of content, bibliography and such) and comprehensively cover your topic.&lt;br /&gt;
&lt;br /&gt;
=== 6. Block meetings ===&lt;br /&gt;
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.&lt;br /&gt;
&lt;br /&gt;
[[Category:Courses]]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=LENS:_LEveraging_anti-social_Networking_for_preventing_Spam&amp;diff=469</id>
		<title>LENS: LEveraging anti-social Networking for preventing Spam</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=LENS:_LEveraging_anti-social_Networking_for_preventing_Spam&amp;diff=469"/>
		<updated>2010-02-22T14:55:22Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration=6 months&lt;br /&gt;
|type=Master Thesis or Student Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
In recent years several techniques have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both &#039;&#039;extend spam protection beyond a user’s social circle&#039;&#039; and &#039;&#039;fundamentally prevent the transmission of spam across the network at the first place&#039;&#039;. The goal of this thesis is to design and implement a prototype of LENS on mail transfer agent (MTA) as an email routing facility, and evaluate the system performances (e.g. delays, and overhead) on large scale tesbeds like PlanetLab.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [http://user.informatik.uni-goettingen.de/~shameed/LENS.pdf Thesis Description]&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=LENS:_LEveraging_anti-social_Networking_for_preventing_Spam&amp;diff=468</id>
		<title>LENS: LEveraging anti-social Networking for preventing Spam</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=LENS:_LEveraging_anti-social_Networking_for_preventing_Spam&amp;diff=468"/>
		<updated>2010-02-22T14:49:54Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration=6 months&lt;br /&gt;
|type=Master Thesis or Student Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
In recent years several techniques [1, 2 and 3] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both &#039;&#039;extend spam protection beyond a user’s social circle&#039;&#039; and &#039;&#039;fundamentally prevent the transmission of spam across the network at the first place&#039;&#039;. The goal of this thesis is to design and implement a prototype of LENS on mail transfer agent (MTA) as an email routing facility, and evaluate the system performances (e.g. delays, and overhead) on large scale tesbeds like PlanetLab [4].&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* S.Garriss, M.Kaminsky, M.J.Freedman, B.Karp, D.Mazi‘eres, and H.Yu. Re: Reliable email. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI’06), SanJose, CA, May 2006. []&lt;br /&gt;
* Android platform []&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=LENS:_LEveraging_anti-social_Networking_for_preventing_Spam&amp;diff=467</id>
		<title>LENS: LEveraging anti-social Networking for preventing Spam</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=LENS:_LEveraging_anti-social_Networking_for_preventing_Spam&amp;diff=467"/>
		<updated>2010-02-22T14:48:33Z</updated>

		<summary type="html">&lt;p&gt;Shameed: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]&lt;br /&gt;
|duration=6 months&lt;br /&gt;
|type=Master Thesis or Student Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
In recent years several techniques [1, 2 and 3] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both &#039;&#039;extend spam protection beyond a user’s social circle&#039;&#039; and &#039;&#039;fundamentally prevent the transmission of spam across the network at the first place&#039;&#039;. The goal of this thesis is to design and implement a prototype of LENS on mail transfer agent (MTA) as an email routing facility, and evaluate the system performances (e.g. delays, and overhead) on large scale tesbeds like PlanetLab [4].&lt;/div&gt;</summary>
		<author><name>Shameed</name></author>
	</entry>
</feed>