Seminar on Internet Technologies (Summer 2014): Difference between revisions

From NET Wiki
Jump to navigation Jump to search
 
(63 intermediate revisions by 6 users not shown)
Line 10: Line 10:
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
|univz=[http://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=123577&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung]
}}
}}
{{Announcement|'''There is NO informational meeting. This web page contains all information about this course. Please e-mail Mr. [http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao] if you have questions.'''}}
{{Announcement|'''Please check our [[#Schedule]] for the arrangement of your presentations.'''}}
{{Announcement|'''To get enrolled to this course, you need to choose a topic out of the [[#Topics]] list. Please send an e-mail to the topic advisor and Mr. [http://user.informatik.uni-goettingen.de/~ljiao Lei Jiao].'''}}


==Course description==
==Course description==


This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. There are no regular meetings or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. There are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.


==Passing requirements==
==Passing requirements==
Line 25: Line 24:


==Schedule==
==Schedule==
* '''April 25, 2014, Friday, 14:00''': Informational meeting ('''Canceled''')
* '''April 25, 2014, Friday, 14:00''': Informational meeting
* '''May 2, 2014, Friday, 23:59''': Deadline for selection of topic
* '''June 26, 2014, Thursday, 23:59''': Deadline for registration
* '''June 26, 2014, Thursday, 23:59''': Deadline for registration
* '''July 3, 2014, Thursday, 14:00 - 17:00''': Presentation time slot I
* '''July 3, 2014, Thursday, 14:00 - 18:00''': Presentation Session I (hosted by Ms. Yuan Zhang)
* '''July 10, 2014, Thursday, 14:00 - 17:00''': Presentation time slot II
** 14:00-14:30: Jan Tönjes, "Virtual Machine Placement in Data Center", advised by Lei Jiao
** 14:30-15:00: Vijay Soppadandi, "Comparing Different Remote Desktop Solutions", advised by Yuan Zhang
** 15:00-15:30: Gipsa Joseph, "Pricing Model in Public Cloud", advised by Yuan Zhang
* '''July 11, 2014, Friday, 14:00 - 18:00''': Presentation Session II (hosted by Mr. Lei Jiao)
**​14:00-14:30: Pratima Kulkarni, "How does news travel in the online social networks: mining information diffusion patterns?", advised by Hong Huang
** 14:30-15:00: Rashmi Kodihalli, "Will emotion transfer? Mining emotion patterns in online social networks", advised by Hong Huang
** 15:00-15:30: Khaled Al-Taheri, "File Systems in Cloud Computing", advised by David Koll
** 15:30-16:00: Pushpendra Chaturvedi, "Large Network Sampling: A Survey", advised by Hong Huang
** 16:00-16:30: Oswald Yinyeh, "Recommender System: A Survey", advised by Hong Huang
** 16:30-17:00: Maiti Eeran, "Information Centric Networking", advised by Edo Monticelli
** 17:00-17:30: Christopher Menke, "ICN in Delay Tolerant Networks"​, advised by Edo Monticelli
* '''September 30, 2014, Tuesday, 23:59''': Deadline for submission of report
* '''September 30, 2014, Tuesday, 23:59''': Deadline for submission of report


Line 44: Line 52:
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://www.cis.temple.edu/~jiewu/research/publications/Publication_files/Infocom-LiXin.pdf] [http://dclab.cs.nthu.edu.tw/~mjtsai/files/paper/INFOCOM%28April%202014%29.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6566850]
| [http://www.cis.temple.edu/~jiewu/research/publications/Publication_files/Infocom-LiXin.pdf] [http://dclab.cs.nthu.edu.tw/~mjtsai/files/paper/INFOCOM%28April%202014%29.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6566850]
|-
| Using Auctions in Clouds and Grids
| [http://user.informatik.uni-goettingen.de/~ljiao/ Lei Jiao]
| [http://pages.cpsc.ucalgary.ca/~zongpeng/publications/sigmetrics14-weijie.pdf] [http://pages.cpsc.ucalgary.ca/~zongpeng/publications/sigmetrics14-grid.pdf]
|-
|-
| <strike>Will emotion transfer? Mining emotion patterns in online social networks</strike> (''Assigned to'' Rashmi Kodihalli)
| <strike>Will emotion transfer? Mining emotion patterns in online social networks</strike> (''Assigned to'' Rashmi Kodihalli)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
| [http://onlinelibrary.wiley.com/doi/10.1111/j.1751-9004.2011.00365.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false]  
| [http://onlinelibrary.wiley.com/doi/10.1111/j.1751-9004.2011.00365.x/abstract?deniedAccessCustomisedMessage=&userIsAuthenticated=false]  
|-
| Detecting emotion from gesture and pose via RF
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg/ Stephan Sigg]
| [http://www.cs.rit.edu/~axj4159/papers_march/report_1.pdf]
|-
| <strike>Context centric networking: Network-enhanced offline social networking</strike> (''Assigned to'' Pranay Tare)
| [http://www.net.informatik.uni-goettingen.de/people/stephan_sigg/ Stephan Sigg]
|
|-
|-
| <strike>Recommender System: A survey</strike> (''Assigned to'' Oswald Yinyeh)
| <strike>Recommender System: A survey</strike> (''Assigned to'' Oswald Yinyeh)
Line 54: Line 74:
|-
|-
| <strike>How does news travel in the online social networks:mining information diffusion patterns</strike> (''Assigned to'' Pratima Kulkarni)
| <strike>How does news travel in the online social networks:mining information diffusion patterns</strike> (''Assigned to'' Pratima Kulkarni)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
|-
| <strike>Large Network Sampling: A survey</strike>("Assigned to" Pushpendra Chaturvedi)
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang/ Hong Huang]
|
|
Line 60: Line 84:
Information Centric Networking (ICN) is a new paradigm to replace the IP location-based communication model and to put '''data''' at the center. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the new possibities this model introduce. On the other hand problems like efficiency and scalability of the name-based routing, support of existing applications and new ones and the possibility to actually deploy this technology are still open and actively discussed, making ICN one of the most active research field in networking. NDN is a prominent ICN proposal and implementation.  
Information Centric Networking (ICN) is a new paradigm to replace the IP location-based communication model and to put '''data''' at the center. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the new possibities this model introduce. On the other hand problems like efficiency and scalability of the name-based routing, support of existing applications and new ones and the possibility to actually deploy this technology are still open and actively discussed, making ICN one of the most active research field in networking. NDN is a prominent ICN proposal and implementation.  


By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into the problems and advantages introduced by '''named-based routing'''.
By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into the problems and advantages introduced by named-based routing.
| [http://www.net.informatik.uni-goettingen.de/people/edo_monticelli/ Edo Monticelli]
| [http://www.net.informatik.uni-goettingen.de/people/edo_monticelli/ Edo Monticelli]
|
|
Line 70: Line 94:
| [http://www.net.informatik.uni-goettingen.de/people/edo_monticelli/ Edo Monticelli]
| [http://www.net.informatik.uni-goettingen.de/people/edo_monticelli/ Edo Monticelli]
|
|
|-
| <strike>Comparing different remote desktop solutions</strike> (''Assigned to'' Vijay Soppadandi)
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [https://www.osc.edu/files/staff_files/pcalyam/vdbench_cloudcom10.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5188870]
|-
|-
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| <strike>Context-aware Mobile Media</strike> (''Assigned to'' Georg Roth-Kleyer)
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://www.net.informatik.uni-goettingen.de/people/yuan_zhang Yuan Zhang]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://archive.openflow.org/documents/openflow-wp-latest.pdf]
|-
|-
|<strike>Pricing Model in Public Cloud</strike> (''Assigned to'' Gipsa Joseph)
|<strike>Pricing Model in Public Cloud</strike> (''Assigned to'' Gipsa Joseph)
Line 82: Line 110:
| [http://www.net.informatik.uni-goettingen.de/people/david_koll/ David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll/ David Koll]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5496972&tag=1][http://dl.acm.org/citation.cfm?id=945450]
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5496972&tag=1][http://dl.acm.org/citation.cfm?id=945450]
|-
| <strike>Which routes pass through my network?</strike> (''Assigned to'' Asif Uddin Ahmad)
| [http://www.net.informatik.uni-goettingen.de/people/narisu_tao/ Narisu Tao]
| [http://cs-people.bu.edu/goncag/papers/infVis-sigc12.pdf][http://cs-people.bu.edu/goncag/papers/imc12-rsd.pdf]
|-
|-
|}
|}
Line 88: Line 120:


=== 1. Select a topic ===
=== 1. Select a topic ===
A student picks a topic to work on. You can pick up a topic and start working at any time. Please contact the topic advisor for the initial information and literature about the topic.
A student picks a topic to work on. You can pick up a topic and start working '''at any time'''.


=== 2. Get your work advised ===
=== 2. Get your work advised ===
For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended that you schedule a face-to-face meeting with him right after you select your topic.
For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.


=== 3. Approach your topic ===
=== 3. Approach your topic ===
Line 130: Line 162:


=== 6. Course schedule===
=== 6. Course schedule===
There are no regular meetings or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the [[#Schedule]] to take appropriate actions.
There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the [[#Schedule]] to take appropriate actions.


[[Category:Courses]]
[[Category:Courses]]

Latest revision as of 22:21, 3 July 2014

Details

Workload/ECTS Credits: 120h, 6 ECTS (New); 4 ECTS (Old); 5 (ITIS)
Module: M.Inf.122/222: Seminar Telematik I/II -or- B.Inf.204/205: Proseminar I/II, (new Catalog:) M.Inf.1124-or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
Lecturer: Prof. Dr. Xiaoming Fu
Teaching assistant: Lei Jiao
Time: #Schedule
Place: IFI Building, Room 3.101
UniVZ [1]


Imbox content.png Please check our #Schedule for the arrangement of your presentations.

Course description

This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. There are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.

Passing requirements

  • Present the selected topic (20 min. presentation + 10 min. Q&A).
    • This accounts for 40% of your grade.
  • Write a report on the selected topic (12-15 pages) (Template:[2]).
    • This accounts for 60% of your grade.
  • Please check the #Schedule and adhere to it.

Schedule

  • April 25, 2014, Friday, 14:00: Informational meeting
  • June 26, 2014, Thursday, 23:59: Deadline for registration
  • July 3, 2014, Thursday, 14:00 - 18:00: Presentation Session I (hosted by Ms. Yuan Zhang)
    • 14:00-14:30: Jan Tönjes, "Virtual Machine Placement in Data Center", advised by Lei Jiao
    • 14:30-15:00: Vijay Soppadandi, "Comparing Different Remote Desktop Solutions", advised by Yuan Zhang
    • 15:00-15:30: Gipsa Joseph, "Pricing Model in Public Cloud", advised by Yuan Zhang
  • July 11, 2014, Friday, 14:00 - 18:00: Presentation Session II (hosted by Mr. Lei Jiao)
    • ​14:00-14:30: Pratima Kulkarni, "How does news travel in the online social networks: mining information diffusion patterns?", advised by Hong Huang
    • 14:30-15:00: Rashmi Kodihalli, "Will emotion transfer? Mining emotion patterns in online social networks", advised by Hong Huang
    • 15:00-15:30: Khaled Al-Taheri, "File Systems in Cloud Computing", advised by David Koll
    • 15:30-16:00: Pushpendra Chaturvedi, "Large Network Sampling: A Survey", advised by Hong Huang
    • 16:00-16:30: Oswald Yinyeh, "Recommender System: A Survey", advised by Hong Huang
    • 16:30-17:00: Maiti Eeran, "Information Centric Networking", advised by Edo Monticelli
    • 17:00-17:30: Christopher Menke, "ICN in Delay Tolerant Networks"​, advised by Edo Monticelli
  • September 30, 2014, Tuesday, 23:59: Deadline for submission of report

Topics

Topic Topic Advisor Readings

Virtual Machine Placement in Data Center (Assigned to Jan Tönjes)

Lei Jiao [3] [4] [5]
Using Auctions in Clouds and Grids Lei Jiao [6] [7]
Will emotion transfer? Mining emotion patterns in online social networks (Assigned to Rashmi Kodihalli) Hong Huang [8]
Detecting emotion from gesture and pose via RF Stephan Sigg [9]
Context centric networking: Network-enhanced offline social networking (Assigned to Pranay Tare) Stephan Sigg
Recommender System: A survey (Assigned to Oswald Yinyeh) Hong Huang
How does news travel in the online social networks:mining information diffusion patterns (Assigned to Pratima Kulkarni) Hong Huang
Large Network Sampling: A survey("Assigned to" Pushpendra Chaturvedi) Hong Huang
Information Centric Networking (Assigned to Eeran Maiti)

Information Centric Networking (ICN) is a new paradigm to replace the IP location-based communication model and to put data at the center. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the new possibities this model introduce. On the other hand problems like efficiency and scalability of the name-based routing, support of existing applications and new ones and the possibility to actually deploy this technology are still open and actively discussed, making ICN one of the most active research field in networking. NDN is a prominent ICN proposal and implementation.

By choosing this topic you will gain a general knowledge of the architecture proposed by the NDN researchers and will have to gain insight into the problems and advantages introduced by named-based routing.

Edo Monticelli
ICN in Delay Tolerant Networks (Assigned to Christopher Menke)

Delay Tolerant Networks (DTNs) are networks deployed in particularly challenging scenarios, where the absence of a persistent end-to-end path makes the architectures used in wired and ad-hoc networks impractical. DNTs are normally characterized by a high and unpredictable node mobility. The great advantage of DTN is that they require little or no infrastructure to work (i.e. no wired network, no Access Points, ...). Many researches envision the use of DTN for many different tasks, including bringing communication to remote/rural areas, interplanetary communication, decentralized communication among smartphones/mobile devices, emergency/disaster situations, etc.

The suggested readings will give you an overview of the most problematic aspects of DTNs and of the most prominent solutions proposed.

Edo Monticelli
Comparing different remote desktop solutions (Assigned to Vijay Soppadandi) Yuan Zhang [10] [11]
Context-aware Mobile Media (Assigned to Georg Roth-Kleyer) Yuan Zhang [12] [13] [14]
Pricing Model in Public Cloud (Assigned to Gipsa Joseph) Yuan Zhang [15] [16] [17]
File Systems in Cloud Computing (Assigned to Khaled Al-Taheri) David Koll [18][19]
Which routes pass through my network? (Assigned to Asif Uddin Ahmad) Narisu Tao [20][21]

Workflow

1. Select a topic

A student picks a topic to work on. You can pick up a topic and start working at any time.

2. Get your work advised

For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.

3. Approach your topic

  • By choosing a topic, you choose the direction of elaboration.
  • You may work in different styles, for example:
    • Survey: Basic introduction, overview of the field; general problems, methods, approaches.
    • Specific problem: Detailed introduction, details about the problem and the solution.
  • You should include your own thoughts on your topic.

4. Prepare your presentation

  • Present your topic to the audience (in English).
  • 20 minutes of presentation followed by 10 minutes discussion.

You present your topic to an audience of students and other interested people (usually the NET group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.

Hints for preparing the presentation:

  • 20 minutes are too short to present a topic fully.
  • It is alright to focus just on one certain important aspect.
  • Limit the introduction of basics (5 min.).
  • Make sure to finish in time.

Suggestions for preparing the slides:

  • No more than 20 pages/slides.
  • Get your audiences to quickly understand the general idea.
  • Figures, tables and animations are better than sentences.
  • Summary of the topic: thinking in your own words.

5. Write your report

  • Present the problem with its background.
  • Detail the approaches, techniques, methods to handle the problem.
  • Evaluate and assess those approaches (e.g., pros and cons).
  • Give a short outlook on potential future developments.

The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).

6. Course schedule

There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the #Schedule to take appropriate actions.