Seminar on Internet Technologies (Summer 2014): Difference between revisions

From NET Wiki
Jump to navigation Jump to search
 
(170 intermediate revisions by 8 users not shown)
Line 10: Line 10:
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|'''Please check our [[#Schedule]] for the arrangement of your presentations.'''}}


==Course description==
==Course description==


The seminar covers selected topics from the current popular technologies and research on computer networks. Each student will present one topic and write a report on it. There are no regular meetings for this seminar.
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. There are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.
 
The purpose of this seminar is to
* Familiarize the students with common and new technologies.
* Enable independent study of a specific topic.
* Train writing and presentation skills.


==Passing requirements==
==Passing requirements==
* Present the selected topic in the seminar (20 min. presentation + 10 min. discussion).
* Present the selected topic (20 min. presentation + 10 min. Q&A).
** This accounts for 40% of your grade.
** This accounts for 40% of your grade.
* Prepare a written report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).
* Write a report on the selected topic (12-15 pages) (Template:[ftp://ftp.springer.de/pub/tex/latex/llncs/latex2e/llncs2e.zip]).
** This accounts for 60% of your grade.
** This accounts for 60% of your grade.
* Please see [[#Schedule]] and adhere to it.
* Please check the [[#Schedule]] and adhere to it.


==Schedule==
==Schedule==
* '''April 25, 2014, Friday, 14:00''': Informational meeting
* '''June 26, 2014, Thursday, 23:59''': Deadline for registration
* '''July 3, 2014, Thursday, 14:00 - 18:00''': Presentation Session I (hosted by Ms. Yuan Zhang)
** 14:00-14:30: Jan Tönjes, "Virtual Machine Placement in Data Center", advised by Lei Jiao
** 14:30-15:00: Vijay Soppadandi, "Comparing Different Remote Desktop Solutions", advised by Yuan Zhang
** 15:00-15:30: Gipsa Joseph, "Pricing Model in Public Cloud", advised by Yuan Zhang
* '''July 11, 2014, Friday, 14:00 - 18:00''': Presentation Session II (hosted by Mr. Lei Jiao)
**​14:00-14:30: Pratima Kulkarni, "How does news travel in the online social networks: mining information diffusion patterns?", advised by Hong Huang
** 14:30-15:00: Rashmi Kodihalli, "Will emotion transfer? Mining emotion patterns in online social networks", advised by Hong Huang
** 15:00-15:30: Khaled Al-Taheri, "File Systems in Cloud Computing", advised by David Koll
** 15:30-16:00: Pushpendra Chaturvedi, "Large Network Sampling: A Survey", advised by Hong Huang
** 16:00-16:30: Oswald Yinyeh, "Recommender System: A Survey", advised by Hong Huang
** 16:30-17:00: Maiti Eeran, "Information Centric Networking", advised by Edo Monticelli
** 17:00-17:30: Christopher Menke, "ICN in Delay Tolerant Networks"​, advised by Edo Monticelli
* '''September 30, 2014, Tuesday, 23:59''': Deadline for submission of report


== Topics ==
== Topics ==
Line 34: Line 45:
|-
|-
|{{Hl2}} |'''Topic'''
|{{Hl2}} |'''Topic'''
|{{Hl2}} |'''Topic advisor'''
|{{Hl2}} |'''Topic Advisor'''
|{{Hl2}} |'''Initial readings'''
|{{Hl2}} |'''Readings'''
|-
|style="width: 70%;"|
<strike>Virtual Machine Placement in Data Center</strike> (''Assigned to'' Jan Tönjes)
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://www.cis.temple.edu/~jiewu/research/publications/Publication_files/Infocom-LiXin.pdf] [http://dclab.cs.nthu.edu.tw/~mjtsai/files/paper/INFOCOM%28April%202014%29.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6566850]
|-
| Using Auctions in Clouds and Grids
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://pages.cpsc.ucalgary.ca/~zongpeng/publications/sigmetrics14-weijie.pdf] [http://pages.cpsc.ucalgary.ca/~zongpeng/publications/sigmetrics14-grid.pdf]
|-
| <strike>Will emotion transfer? Mining emotion patterns in online social networks</strike> (''Assigned to'' Rashmi Kodihalli)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
| [http://onlinelibrary.wiley.com/doi/10.1111/j.1751-9004.2011.00365.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false]
|-
| Detecting emotion from gesture and pose via RF
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg/ Stephan Sigg]
| [http://www.cs.rit.edu/~axj4159/papers_march/report_1.pdf]
|-
| <strike>Context centric networking: Network-enhanced offline social networking</strike> (''Assigned to'' Pranay Tare)
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg/ Stephan Sigg]
|
|-
|-
| <strike>Recommender System: A survey</strike> (''Assigned to'' Oswald Yinyeh)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
|
|-
|-
|style="width: 60%;"|
| <strike>How does news travel in the online social networks:mining information diffusion patterns</strike> (''Assigned to'' Pratima Kulkarni)
'''NDN - A content centric networking proposal (selected by Hossein Salahi & Mohammad Abouzar & Eeran Maiti & Sripriya)'''
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
 
Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking.
 
By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN).
 
  - Topics available: Routing, Congestion control, network management, security, Mobile&vehicular, Evaluation strategy
  -- DTN: Hossein Salahi
  -- Routing: Mohammad Abouzar
  -- Congestion control: Sripriya
  -- Network Management: Prabhu Sharma
 
- [http://named-data.net/wp-content/uploads/2013/10/ndn-annualreport2012-2013.pdf NDN technical report]
- [http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf  ICN Base line scenarios]
 
| [https://www.net.informatik.uni-goettingen.de/people/edo_monticelli Edo Monticelli]
|For general introduction:
*[http://named-data.net/a-new-way-to-look-at-networking/ Video presenting NDN]
*[http://named-data.net/wp-content/uploads/Jacob.pdf First proposal on Content Centric Networking]
*[http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf  ICN Base line scenarios]


|-
|-
| <strike>Large Network Sampling: A survey</strike>("Assigned to" Pushpendra Chaturvedi)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
|
|
'''Random Matrix Theory for signal processing '''
|-
| <strike>Information Centric Networking</strike> (''Assigned to'' Eeran Maiti)
Information Centric Networking (ICN) is a new paradigm to replace the IP location-based communication model and to put '''data''' at the center. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the new possibities this model introduce. On the other hand problems like efficiency and scalability of the name-based routing, support of existing applications and new ones and the possibility to actually deploy this technology are still open and actively discussed, making ICN one of the most active research field in networking. NDN is a prominent ICN proposal and implementation.


Random matrix theory has numerous applications in physics, statistics and engineering.
By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into the problems and advantages introduced by named-based routing.
Although initially motivated by practical experimental problems, random matrices are now used in very diverse fields including physics, mathematics, but also neural networks, information theory and signal processing.
| [http://www.net.informatik.uni-goettingen.de/people/edo_monticelli/ Edo Monticelli]
The student will recapitulate the basic concepts of random matrix theory and summarise recent advances in this field with relation to signal processing, in particular in communications.
|
 
|-
| [http://www.stephansigg.de Stephan Sigg]
| <strike>ICN in Delay Tolerant Networks</strike> (''Assigned to'' Christopher Menke)
|For general introduction:
Delay Tolerant Networks (DTNs) are networks deployed in particularly challenging scenarios, where the absence of a persistent end-to-end path makes the architectures used in wired and ad-hoc networks impractical. DNTs are normally characterized by a high and unpredictable node mobility. The great advantage of DTN is that they require little or no infrastructure to work (i.e. no wired network, no Access Points, ...). Many researches envision the use of DTN for many different tasks, including bringing communication to remote/rural areas, interplanetary communication, decentralized communication among smartphones/mobile devices, emergency/disaster situations, etc.  
*[http://books.google.de/books/about/Random_Matrix_Methods_for_Wireless_Commu.html?id=_j7pT9HjKAUC&redir_esc=y]


The suggested readings will give you an overview of the most problematic aspects of DTNs and of the most prominent solutions proposed.
| [http://www.net.informatik.uni-goettingen.de/people/edo_monticelli/ Edo Monticelli]
|
|-
|-
|
| <strike>Comparing different remote desktop solutions</strike> (''Assigned to'' Vijay Soppadandi)
'''Software defined networking for an environment-reactive system behaviour (selected by Mostafizur Rahman)'''
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
 
| [https://www.osc.edu/files/staff_files/pcalyam/vdbench_cloudcom10.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5188870]
With the advancement of Software Defined Networking (SDN) research over recent years, network components have become accessible and controllable from the application layer.
With this flexibility, a network could now react on environmental stimuli.
Therefore, it might be possible to configure network parameters spontaneously
* to adapt to instantaneous needs
* for proactive network behaviour
* to maintain network operation in the case of disaster
* ...
The student will summarise the chances and challenges of Software Defined Networking with special focus on environment-reactive behaviour.
 
| [http://www.stephansigg.de Stephan Sigg]
|For general introduction:
*[http://bit.ly/LpV2lD]
 
|-
|-
|
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
'''Amazon Mechanical Turk, oDesk and others: The Use of Crowd-Sourcing in Research (selected by Alberto Riuera Diaz)'''
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
 
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://archive.openflow.org/documents/openflow-wp-latest.pdf]
| [http://user.informatik.uni-goettingen.de/~dkoll/ David Koll]
|For general introduction:
*[http://en.wikipedia.org/wiki/Crowdsourcing]
*[http://dl.acm.org/citation.cfm?id=1864504]
 
|-
|-
|
|<strike>Pricing Model in Public Cloud</strike> (''Assigned to'' Gipsa Joseph)
'''Community detection in Delay Tolerant Networks'''
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang/ Yuan Zhang]
 
| [http://i.cs.hku.hk/~fcmlau/papers/infocom2014.pdf] [http://www.chinacloud.cn/upload/2014-03/14032407153478.pdf] [http://publish.illinois.edu/alikhanafer/files/2013/06/KhanaferKodialamKPINFOCOM13.pdf]
| [http://user.informatik.uni-goettingen.de/~kzhu/ Konglin Zhu]
|For general introduction:
*[http://mcn.cse.psu.edu/paper/xiaomei-zhang/zhang-icnp13.pdf]
*[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.6879&rep=rep1&type=pdf]
 
|-
|-
|
| <strike>File Systems in Cloud Computing</strike> (''Assigned to'' Khaled Al-Taheri)
'''Virtual Machine Allocation (Selected by Thack, Nauyen)'''
| [http://www.net.informatik.uni-goettingen.de/people/david_koll/ David Koll]
 
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5496972&tag=1][http://dl.acm.org/citation.cfm?id=945450]
| [http://www.net.informatik.uni-goettingen.de/people/ Yuan Zhang]
|For general introduction:
*[http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6566848&tag=1]
*[http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6566850]
 
|-
|-
|
| <strike>Which routes pass through my network?</strike> (''Assigned to'' Asif Uddin Ahmad)
'''The Architecture of Mobile Crowd Sensing'''
| [http://www.net.informatik.uni-goettingen.de/people/narisu_tao/ Narisu Tao]
 
| [http://cs-people.bu.edu/goncag/papers/infVis-sigc12.pdf][http://cs-people.bu.edu/goncag/papers/imc12-rsd.pdf]
An emerging category of devices at the edge of the Internet are consumer-centric mobile sensing and computing
devices, such as smartphones, music players, and in-vehicle sensing devices. These devices will fuel the evolution of the Internet
of Things as they feed sensor data to the Internet at a societal scale. However, deploying mobile crowdsensing appli-
cations in real life is not a trivial task.
 
The student will gain a general knowledge of existing Crowdsensing Architectures and should summarise the chances and challenges
of exploiting the cloud or social relation for Mobile Crowdsensing.
 
| [http://www.net.informatik.uni-goettingen.de/people/ Lingjun Pu]
|For general introduction:
*[https://wiki.engr.illinois.edu/download/attachments/180846616/paper_fanye.pdf?version=1]
*[http://delivery.acm.org/10.1145/2510000/2505502/p25-tuncay.pdf]
*[http://www.hotmobile.org/2014/papers/full/1.pdf]
|-
|-
|}
|}
Line 139: Line 119:
==Workflow==
==Workflow==


The workflow of the seminar is as follows.
=== 1. Select a topic ===
A student picks a topic to work on. You can pick up a topic and start working '''at any time'''.


=== 1. Topic selection ===
=== 2. Get your work advised ===
Each student picks a topic to work on. '''You can pick a topic and start working at any time.''' Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.
For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.
 
=== 2. Topic advisor ===
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as ''you'' want, so don't hesitate to approach him for general advice or with any questions you might have. You must have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.


=== 3. Approach your topic ===
=== 3. Approach your topic ===


* Topic titles are rather abstract.
* By choosing a topic, you choose the direction of elaboration.
* You chose the direction of your elaboration.
* You may work in different styles, for example:
* For example:
**    Survey: Basic introduction, overview of the field; general problems, methods, approaches.
**    Survey style: Basic introduction, overview about the field, general     problems, methods, approaches.
**    Specific problem: Detailed introduction, details about the problem and the solution.
**    Specific problem: Selective introduction, detail the problem, introduce      solutions or approaches.
* You should include your own thoughts on your topic.
*Include your own thoughts: Evaluation section, outlook in the end.
*Remember: We are interested in the aspects related to ''Internet technologies''.


=== 4. Prepare a Presentation ===
=== 4. Prepare your presentation ===


'''TLDR version:'''
* Present your topic to the audience (in English).
* Give an overview of your topic to the audience.
* 20 minutes of presentation followed by 10 minutes discussion.
* 20 minutes of presentation followed by 10 minutes discussion.
* Slides should be in English.
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 25 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 35 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.


You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report.  
You present your topic to an audience of students and other interested people (usually the [http://www.net.informatik.uni-goettingen.de/ NET] group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.


Some hints you should keep in mind when preparing the presentation:
Hints for preparing the presentation:
* 20 minutes are too short to present a topic fully.
* 20 minutes are too short to present a topic fully.
* It is alright to focus just on one certain important aspect.
* Limit the introduction of basics (5 min.).
* Limit the introduction of basics (5 min.).
* Focus on the interesting parts of the topic.
* Make sure to finish in time.
* It is alright to focus just on one certain important aspect.
* Make sure to finish in time!


Suggestions for preparing the slides:
Suggestions for preparing the slides:
* No more than 20 slides.
* No more than 20 pages/slides.
* Get your audiences to quickly understand the idea of the presentation
* Get your audiences to quickly understand the general idea.
* Figures, tables and animations are better than wordy sentences
* Figures, tables and animations are better than sentences.
* Use example to explain complicated algorithms
* Summary of the topic: thinking in your own words.
* Short sentences
* Avoid complicated equations
* Summary of the topic: thinking/justification of the approach(es) in your own words


=== 5. Write the Report ===
=== 5. Write your report ===


'''TLDR version:'''
* Present the problem with its background.
* Comprehensively cover the topic.
* Detail the approaches, techniques, methods to handle the problem.
* Content:
* Evaluate and assess those approaches (e.g., pros and cons).
** Present the problem with its background.
* Give a short outlook on potential future developments.
** Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks.
** Evaluate and assess those approaches.
** Give a short outlook on potential future developments.
* Between 12 and 15 pages of content (usual thesis layout).
* Written in English according to common guidelines for scientific papers.
* '''Deadline: End of the semester.'''


The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.
The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).


=== 6. Block meetings ===
=== 6. Course schedule===
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.
There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the [[#Schedule]] to take appropriate actions.


[[Category:Courses]]
[[Category:Courses]]

Latest revision as of 22:21, 3 July 2014

Details

Workload/ECTS Credits: 120h, 6 ECTS (New); 4 ECTS (Old); 5 (ITIS)
Module: M.Inf.122/222: Seminar Telematik I/II -or- B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1124-or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
Lecturer: Prof. Dr. Xiaoming Fu
Teaching assistant: Lei Jiao
Time: #Schedule
Place: IFI Building, Room 3.101
UniVZ [1]


Imbox content.png Please check our #Schedule for the arrangement of your presentations.

Course description

This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. There are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.

Passing requirements

  • Present the selected topic (20 min. presentation + 10 min. Q&A).
    • This accounts for 40% of your grade.
  • Write a report on the selected topic (12-15 pages) (Template:[2]).
    • This accounts for 60% of your grade.
  • Please check the #Schedule and adhere to it.

Schedule

  • April 25, 2014, Friday, 14:00: Informational meeting
  • June 26, 2014, Thursday, 23:59: Deadline for registration
  • July 3, 2014, Thursday, 14:00 - 18:00: Presentation Session I (hosted by Ms. Yuan Zhang)
    • 14:00-14:30: Jan Tönjes, "Virtual Machine Placement in Data Center", advised by Lei Jiao
    • 14:30-15:00: Vijay Soppadandi, "Comparing Different Remote Desktop Solutions", advised by Yuan Zhang
    • 15:00-15:30: Gipsa Joseph, "Pricing Model in Public Cloud", advised by Yuan Zhang
  • July 11, 2014, Friday, 14:00 - 18:00: Presentation Session II (hosted by Mr. Lei Jiao)
    • ​14:00-14:30: Pratima Kulkarni, "How does news travel in the online social networks: mining information diffusion patterns?", advised by Hong Huang
    • 14:30-15:00: Rashmi Kodihalli, "Will emotion transfer? Mining emotion patterns in online social networks", advised by Hong Huang
    • 15:00-15:30: Khaled Al-Taheri, "File Systems in Cloud Computing", advised by David Koll
    • 15:30-16:00: Pushpendra Chaturvedi, "Large Network Sampling: A Survey", advised by Hong Huang
    • 16:00-16:30: Oswald Yinyeh, "Recommender System: A Survey", advised by Hong Huang
    • 16:30-17:00: Maiti Eeran, "Information Centric Networking", advised by Edo Monticelli
    • 17:00-17:30: Christopher Menke, "ICN in Delay Tolerant Networks"​, advised by Edo Monticelli
  • September 30, 2014, Tuesday, 23:59: Deadline for submission of report

Topics

Topic Topic Advisor Readings

Virtual Machine Placement in Data Center (Assigned to Jan Tönjes)

Lei Jiao [3] [4] [5]
Using Auctions in Clouds and Grids Lei Jiao [6] [7]
Will emotion transfer? Mining emotion patterns in online social networks (Assigned to Rashmi Kodihalli) Hong Huang [8]
Detecting emotion from gesture and pose via RF Stephan Sigg [9]
Context centric networking: Network-enhanced offline social networking (Assigned to Pranay Tare) Stephan Sigg
Recommender System: A survey (Assigned to Oswald Yinyeh) Hong Huang
How does news travel in the online social networks:mining information diffusion patterns (Assigned to Pratima Kulkarni) Hong Huang
Large Network Sampling: A survey("Assigned to" Pushpendra Chaturvedi) Hong Huang
Information Centric Networking (Assigned to Eeran Maiti)

Information Centric Networking (ICN) is a new paradigm to replace the IP location-based communication model and to put data at the center. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the new possibities this model introduce. On the other hand problems like efficiency and scalability of the name-based routing, support of existing applications and new ones and the possibility to actually deploy this technology are still open and actively discussed, making ICN one of the most active research field in networking. NDN is a prominent ICN proposal and implementation.

By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into the problems and advantages introduced by named-based routing.

Edo Monticelli
ICN in Delay Tolerant Networks (Assigned to Christopher Menke)

Delay Tolerant Networks (DTNs) are networks deployed in particularly challenging scenarios, where the absence of a persistent end-to-end path makes the architectures used in wired and ad-hoc networks impractical. DNTs are normally characterized by a high and unpredictable node mobility. The great advantage of DTN is that they require little or no infrastructure to work (i.e. no wired network, no Access Points, ...). Many researches envision the use of DTN for many different tasks, including bringing communication to remote/rural areas, interplanetary communication, decentralized communication among smartphones/mobile devices, emergency/disaster situations, etc.

The suggested readings will give you an overview of the most problematic aspects of DTNs and of the most prominent solutions proposed.

Edo Monticelli
Comparing different remote desktop solutions (Assigned to Vijay Soppadandi) Yuan Zhang [10] [11]
Context-aware Mobile Media (Assigned to Georg Roth-Kleyer) Yuan Zhang [12] [13] [14]
Pricing Model in Public Cloud (Assigned to Gipsa Joseph) Yuan Zhang [15] [16] [17]
File Systems in Cloud Computing (Assigned to Khaled Al-Taheri) David Koll [18][19]
Which routes pass through my network? (Assigned to Asif Uddin Ahmad) Narisu Tao [20][21]

Workflow

1. Select a topic

A student picks a topic to work on. You can pick up a topic and start working at any time.

2. Get your work advised

For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.

3. Approach your topic

  • By choosing a topic, you choose the direction of elaboration.
  • You may work in different styles, for example:
    • Survey: Basic introduction, overview of the field; general problems, methods, approaches.
    • Specific problem: Detailed introduction, details about the problem and the solution.
  • You should include your own thoughts on your topic.

4. Prepare your presentation

  • Present your topic to the audience (in English).
  • 20 minutes of presentation followed by 10 minutes discussion.

You present your topic to an audience of students and other interested people (usually the NET group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.

Hints for preparing the presentation:

  • 20 minutes are too short to present a topic fully.
  • It is alright to focus just on one certain important aspect.
  • Limit the introduction of basics (5 min.).
  • Make sure to finish in time.

Suggestions for preparing the slides:

  • No more than 20 pages/slides.
  • Get your audiences to quickly understand the general idea.
  • Figures, tables and animations are better than sentences.
  • Summary of the topic: thinking in your own words.

5. Write your report

  • Present the problem with its background.
  • Detail the approaches, techniques, methods to handle the problem.
  • Evaluate and assess those approaches (e.g., pros and cons).
  • Give a short outlook on potential future developments.

The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).

6. Course schedule

There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the #Schedule to take appropriate actions.