Seminar on Internet Technologies (Winter 2015/2016): Difference between revisions

 
(33 intermediate revisions by 7 users not shown)
Line 1: Line 1:
== Details ==
== Details ==
{{Announcement|Note:
Please register for the course ASAP (e.g. AI students in flexnow) in order to get your grade on time}}


{{CourseDetails
{{CourseDetails
Line 13: Line 16:
==Course description==
==Course description==


This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting on October 23rd, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting on October 29, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.


The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.
The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.
Line 26: Line 29:
==Schedule==
==Schedule==
* '''Oct. 29, 16:00ct''': Informational meeting '''([[Media:sitintro.pdf‎ | Introduction Slides]])'''
* '''Oct. 29, 16:00ct''': Informational meeting '''([[Media:sitintro.pdf‎ | Introduction Slides]])'''
* '''Feb. 4, 2015''' : Presentations
*'''Jan. 29, 2016''': Registration Deadline
* '''March 1, 2015, 23:59''': Deadline for submission of report
* '''Feb. 5, 2016''' : Presentations (If not feasible for you, pls contact with your topic adviser to reschedule in Feb. 4)
* '''March 1, 2016, 23:59 (Extended to March 31)''': Deadline for submission of report (should be sent to the topic adviser!)
 
==Final Presentation==
 
{{Announcement|Note:
Please register for the course ASAP (e.g. AI students in flexnow) in order to get your grade on time}}


* Feb. 04, 2016
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Time Slot'''
|{{Hl2}} |'''Student'''
|{{Hl2}} |'''Topic Advisor'''
|-
|10:00-10:30
|Benjamin Leiding
|Hong
|-
|10:30-11:00
|Pouya Saeedfar
|Sameer
|-
|11:00-11:30
|Martin Schwarzmaier
|Jie
|-
|}
* Feb. 05, 2016
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Time Slot'''
|{{Hl2}} |'''Student'''
|{{Hl2}} |'''Topic Advisor'''
|-
|09:30-10:00
|Argianto Rahartomo
|Hong
|-
|10:00-10:30
|Amir Reza Fazely Hamedani
|David
|-
|10:30-11:00
|Dieter Lechler
|David
|-
|11:00-11:30
|Alvaro Mario Veizaga Campero
|Xu
|-
|14:00-14:30
|Mohammad Firoz Kabir
|Jie
|-
|14:30-15:00
|Guido Martinez
|Mayutan
|-
|15:00-15:30
|Marcus Thomas Khalil
|David
|-
|15:30-16:00
|Qazi Asim Ijaz Ahmad
|Xu
|-
|16:00-16:30
|Waqas Awan
|David
|-
|}


== Topics ==
== Topics ==
Line 37: Line 111:
|{{Hl2}} |'''Initial Readings'''
|{{Hl2}} |'''Initial Readings'''
|-
|-
| '''What Will 5G Be? - A Survey'''   
| '''What Will 5G Be? - A Survey (assigned to Veizaga Campero Alvaro Mario)'''   
This study is to provide a comprehensive survey on the key enabling communication technologies for 5G networks.
This study is to provide a comprehensive survey on the key enabling communication technologies for 5G networks.
| [http://www.net.informatik.uni-goettingen.de/people/xu_chen Xu Chen]
| [http://www.net.informatik.uni-goettingen.de/people/xu_chen Xu Chen]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6824752]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6824752]
|-
|-
| '''What Will Smart Grid Be? – A Survey'''   
| '''What Will Smart Grid Be? – A Survey (assigned to Qazi Asim Ijaz Ahmad)'''   
The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. This study is to provide a comprehensive survey on the key enabling technologies and services for Smart Grid.
The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. This study is to provide a comprehensive survey on the key enabling technologies and services for Smart Grid.
| [http://www.net.informatik.uni-goettingen.de/people/xu_chen Xu Chen]
| [http://www.net.informatik.uni-goettingen.de/people/xu_chen Xu Chen]
Line 53: Line 127:
| [http://en.wikipedia.org/wiki/Software-defined_networking][http://arxiv.org/pdf/1406.0440v3.pdf]
| [http://en.wikipedia.org/wiki/Software-defined_networking][http://arxiv.org/pdf/1406.0440v3.pdf]
|-
|-
| ''' A survey of SDN standardization '''   
| ''' A survey of SDN standardization (assigned to Guido Martinez)'''   
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study the standardization efforts ongoing in SDN.   
There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study the standardization efforts ongoing in SDN.   
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
Line 68: Line 142:
| TBA
| TBA
|-
|-
| '''Controllers in Software-defined Networks - A Survey'''
| ''' Network effects in service usage (assigned to Maryam afzal)''' 
| [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
| [http://arxiv.org/abs/physics/0611177][http://www.nber.org/papers/w21313][http://fowler.ucsd.edu/social_contagion_theory.pdf]
|-
| '''Controllers in Software-defined Networks - A Survey''' (Assigned to Waqas Awan)
SDN introduces the concept of a logically centralized controller in charge of operating the network, while routers and switches are reduced to simple forwarding elements.
SDN introduces the concept of a logically centralized controller in charge of operating the network, while routers and switches are reduced to simple forwarding elements.
In this topic, the student will provide a survey over the state-of-the-art in SDN controllers.  
In this topic, the student will provide a survey over the state-of-the-art in SDN controllers.  
Line 74: Line 152:
| [https://www.sdxcentral.com/resources/sdn/sdn-controllers/][http://www.cs.yale.edu/homes/jf/nox.pdf]
| [https://www.sdxcentral.com/resources/sdn/sdn-controllers/][http://www.cs.yale.edu/homes/jf/nox.pdf]
|-
|-
| '''Advances in Datacenter Networking'''
| '''Advances in Datacenter Networking''' (Assigned to Dieter Lechler)
A lot of today's internet services are hosted in datacenters, which are basically a collection of thousands of hosts that are interconnected by up to thousands of networking devices.
A lot of today's internet services are hosted in datacenters, which are basically a collection of thousands of hosts that are interconnected by up to thousands of networking devices.
In this topic, the student should investigate recent advances in datacenter applications, networking technologies and topologies.
In this topic, the student should investigate recent advances in datacenter applications, networking technologies and topologies.
Line 80: Line 158:
| [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf]
| [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf]
|-
|-
|}
| '''Security issues in Software-defined Networking''' (Assigned to Amir Fazely)
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service,
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms.
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| -
|-
| '''Network Virtualization with SDN''' (Assigned to Marcus Khalil)
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll]
| -
|-
| '''Caching mechanisms in ICN-A survey'''(assigned to  Firoz Kabir)
As one key feature of ICN, in-network caching receives widespread research interest. where are the data copy need to be cached, and how to process the replacement problem become the key to improve ICN performance.
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li]
| [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6883812&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6883812][https://www.ee.ucl.ac.uk/~gpavlou/Publications/Conference-papers/Chai-12a.pdf]
 
|-
| '''Scalable routing in ICN -A survey'''
Routing scalability is a great challenge for ICN's feasibility. How to manage the huge namespace of ICN in a limited FIB without much effect on routing efficiency has drawn more and more attention.
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li]
| [http://named-data.net/wp-content/uploads/2014/08/ndn-tr-4-scaling-ndn-routing.pdf][http://www.ee.ucl.ac.uk/~uceeips/hashroute-icn13.pdf]
|-
| ''' Application of Packet Sampling in Computer Security - A Survey (Assigned to  Suhair Ahmed)''' 
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [http://www.sflow.org/packetSamplingBasics/][http://www.cse.unr.edu/~mgunes/papers/JNCA13.pdf][http://cs.uccs.edu/~jkalita/papers/2014/HoqueNetworkAttacksJCNA2014.pdf]
|-
| ''' Game theory based solutions in Computer Network Security - A Survey (Assigned to Awad Mukbil)''' 
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [https://en.wikipedia.org/wiki/Game_theory][http://dl.acm.org/citation.cfm?id=2480742][http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6238282][http://people.cis.ksu.edu/~sroy/hicss43.pdf][http://cs.uccs.edu/~jkalita/papers/2014/HoqueNetworkAttacksJCNA2014.pdf]
|
 
|-
 
|''' Virtual Machine and Data Migration in Cloud computing (assigned to Pouya Saeedfar)'''
 
This topic requires to study and compare the state-of-the-art techniques employed in Virtual machine and data migration in Cloud Computing systems. Then try to propose new mechanisms and optimizations for carrying out the migration efficiently.
 
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6558130] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6969026]
|-
 
|-
 
|'''Service Plane for Network Functions: Network Service Headers and Other alternatives <s> (assigned to Tayyebe Emadinia) </s>'''
 
Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions.
 
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6733615] [http://conferences2.sigcomm.org/acm-icn/2014/papers/p107.pdf] [https://tools.ietf.org/pdf/draft-quinn-sfc-nsh-07.pdf]
|-
 
|'''Challenges and Opportunities in the Cloud - A survey <del> (assigned to Sudhir Kumar Sah) </del>'''
 
Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof.
 
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni]
| [http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf] [http://arxiv.org/pdf/1312.4722v2.pdf] [http://media.johnwiley.com.au/product_data/excerpt/90/04708879/0470887990-180.pdf] [http://www-07.ibm.com/solutions/in/education/download/Virtualization%20in%20Education.pdf]
|-


==Workflow==
==Workflow==
229

edits