Seminar on Internet Technologies (Winter 2016/2017): Difference between revisions
No edit summary |
|||
(48 intermediate revisions by 9 users not shown) | |||
Line 29: | Line 29: | ||
==Schedule== | ==Schedule== | ||
* '''Oct. 20, 16:00ct''': Introduction meeting | * '''Oct. 20, 16:00ct''': Introduction meeting | ||
* ''' | * '''Feb. 2, 2017''' : Deadline for registration | ||
* ''' | * '''Feb. 9 and Feb. 16''' : Presentations | ||
* '''Mar. 31, 2017, 23:59''': Deadline for submission of report (should be sent to the topic adviser!) | * '''Mar. 31, 2017, 23:59''': Deadline for submission of report (should be sent to the topic adviser!) | ||
==Final Presentation== | |||
{| align="center" class="wikitable sortable" {{Prettytable}} | |||
|- | |||
|{{Hl2}} |'''Time Slot (Feb 9, 2017)''' | |||
|{{Hl2}} |'''Student''' | |||
|{{Hl2}} |'''Advisor''' | |||
|- | |||
| 9:00AM -- 9:30AM | |||
| Ander Schiavella | |||
| Sripriya | |||
|- | |||
| 9:30AM -- 10:00AM | |||
| Fabio Sortino | |||
| Sripriya | |||
|- | |||
| 10:00AM -- 10:30AM | |||
| Hargun Sandhu | |||
| Enhuan | |||
|- | |||
| 10:30AM -- 11:00AM | |||
| Tran, Thi Ngoc Han | |||
| Abhinandan | |||
|- | |||
| 11:00AM -- 11:30AM | |||
| Yasir Sohail | |||
| Tao | |||
|- | |||
|} | |||
{| align="center" class="wikitable sortable" {{Prettytable}} | |||
|- | |||
|{{Hl2}} |'''Time Slot (Feb 16, 2017)''' | |||
|{{Hl2}} |'''Student''' | |||
|{{Hl2}} |'''Advisor''' | |||
|- | |||
| 1:00PM -- 1:30PM | |||
| Mojtaba Shabani | |||
| Osama | |||
|- | |||
| 1:30PM -- 2:00PM | |||
| Saidul Islam | |||
| Osama | |||
|- | |||
| 2:00PM -- 2:30PM | |||
| Abdul Hadi | |||
| Enhuan | |||
|- | |||
| 2:30PM -- 3:00PM | |||
| Alireza | |||
| Mayutan | |||
|- | |||
| 3:00PM -- 3:10PM | |||
| Break | |||
|- | |||
| 3:10PM -- 3:40PM | |||
| Georgios Kaklamanos | |||
| Mayutan | |||
|- | |||
| 3:40PM -- 4:10PM | |||
| Vaibhav Kasturia | |||
| Enhuan | |||
|- | |||
| 4:10PM -- 4:40PM | |||
| Kalyani, Rishita | |||
| Abhinandan | |||
|- | |||
| 4:40PM -- 5:10PM | |||
|Bhabajeet Kalita | |||
| Abhinandan | |||
|- | |||
|} | |||
== Topics == | == Topics == | ||
{| align="center" class="wikitable sortable" {{Prettytable}} | {| align="center" class="wikitable sortable" {{Prettytable}} | ||
|- | |- | ||
|{{Hl2}} |'''Topic''' | |{{Hl2}} |'''Topic''' | ||
Line 50: | Line 126: | ||
| [http://www.net.informatik.uni-goettingen.de/people/Hong_Huang Hong Huang] | | [http://www.net.informatik.uni-goettingen.de/people/Hong_Huang Hong Huang] | ||
| [https://research.googleblog.com/2016/09/a-neural-network-for-machine.html?utm_campaign=Revue%20newsletter&utm_medium=Newsletter&utm_source=revue] | | [https://research.googleblog.com/2016/09/a-neural-network-for-machine.html?utm_campaign=Revue%20newsletter&utm_medium=Newsletter&utm_source=revue] | ||
|- | |||
| '''Inferring social capital from big data (assigned to Bikash Chandra Karmokar)''' | |||
This study is to discover the state of art of social capital measuring, particularly, from big data perspective. | |||
| [http://www.net.informatik.uni-goettingen.de/people/Hong_Huang Hong Huang] | |||
| [http://science.sciencemag.org/content/350/6264/1073][http://www.sciencedirect.com/science/article/pii/S0378873314000033] | |||
|- | |||
|'''An overview on deep learning framework(assigned to Mohammad Wazed Ali)''' | |||
In this work, you will be asked to do a survey on all popular deep learning framework either in academe or industry, like tensorflow, caffe and so on. You shall elaborate their shortcomings and advantages. | |||
|[http://www.net.informatik.uni-goettingen.de/people/Hong_Huang Hong Huang] | |||
|[https://deeplearning4j.org/compare-dl4j-torch7-pylearn] | |||
|- | |- | ||
| '''Towards a Pricing Model in NFV (assigned to Saidul Islam)''' | | '''Towards a Pricing Model in NFV (assigned to Saidul Islam)''' | ||
One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is firstly identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful to NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work. Your work should investigate in some depth the exact relationship between different factors not only describing them. | One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is firstly identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful to NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work. Your work should investigate in some depth the exact relationship between different factors not only describing them. | ||
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | | [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | ||
| [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7243304][http://store.elsevier.com/Cloud-Data-Centers-and-Cost-Modeling/Caesar-Wu/isbn-9780128014134/][ | | [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7243304][http://store.elsevier.com/Cloud-Data-Centers-and-Cost-Modeling/Caesar-Wu/isbn-9780128014134/][https://wiki.net.informatik.uni-goettingen.de/wiki/List_of_Conferences_Journals] | ||
|- | |- | ||
| '''Legacy support in SDN networks(assigned to Dorna Amiri)''' | | '''Legacy support in SDN networks(assigned to Dorna Amiri)''' | ||
Supporting legacy network is an active research area in SDN. You should survey all techniques used up to date to solve this problem. Details may be provided later. | Supporting legacy network is an active research area in SDN. You should survey all techniques used up to date to solve this problem. Details may be provided later. | ||
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | | [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | ||
| | | Take a look at recent papers in well known conferences/workshops. | ||
|- | |||
| '''WiFi latest advances and Smart-wifi (assigned to Mojtaba Shabani)''' | |||
A new generation of Wireless Local Area Networks (WLANs) will make its appearance in the market in the forthcoming years based on the amendments to the IEEE 802.11 standards that have recently been approved or are under development. Examples of the most expected ones are IEEE 802.11aa (Robust Audio Video Transport Streaming), IEEE 802.11ac (Very-high throughput at < 6 GHz), IEEE 802.11af (TV White Spaces) and IEEE 802.11ah (Machine-to-Machine communications) specifications. You should investigate the latest advances made in WiFi and in its usage to support other type of networks as LTE and G5. | |||
| [http://www.net.informatik.uni-goettingen.de/people/osamah_barakat Osamah Barakat] | |||
| Take a look at recent papers in well known conferences/workshops. | |||
|- | |- | ||
| '''What is the current status and future of cloud related research? What are the main research problems that are currently being targeted? (assigned to Georgios Kaklamanos)''' | | '''What is the current status and future of cloud related research? What are the main research problems that are currently being targeted? (assigned to Georgios Kaklamanos)''' | ||
Line 66: | Line 157: | ||
| Take a look at recent papers in well known conferences/workshops. | | Take a look at recent papers in well known conferences/workshops. | ||
|- | |- | ||
| '''Sponsored Search Auctions in Internet (Online advertisements Google Ads)''' | | '''What is the current status of congestion control protocols in ICN? (assigned to Ali Reza)''' | ||
The aim of this work is to identify the congestion control related work in the ICN space. | |||
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai] | |||
| Take a look at recent papers in well known conferences/workshops. | |||
|- | |||
| '''Sponsored Search Auctions in Internet (Online advertisements Google Ads)(assigned to Han)''' | |||
Sponsored search auctions are widely used by search engines like Google, Microsoft, for displaying ads when an user perform keyword search in goole.com/bing.com. The application of sponsored search auctions in not only limited to search engine providers but also has popular with online markets like eBay. The goal is to perform survey on the latest advancements in this area. | Sponsored search auctions are widely used by search engines like Google, Microsoft, for displaying ads when an user perform keyword search in goole.com/bing.com. The application of sponsored search auctions in not only limited to search engine providers but also has popular with online markets like eBay. The goal is to perform survey on the latest advancements in this area. | ||
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan%20s_prasad Abhinandan S Prasad] | | [http://www.net.informatik.uni-goettingen.de/people/abhinandan%20s_prasad Abhinandan S Prasad] | ||
| [http://web.stanford.edu/~jdlevin/Econ%20285/Sponsored%20Search%20Auctions.pdf] [https://en.wikipedia.org/wiki/Sponsored_search_auction] | | [http://web.stanford.edu/~jdlevin/Econ%20285/Sponsored%20Search%20Auctions.pdf] [https://en.wikipedia.org/wiki/Sponsored_search_auction][http://dl.acm.org/citation.cfm?id=2668108] | ||
|- | |- | ||
|'''Service Plane for Network Functions: Network Service Headers and Other alternatives''' | |'''Service Plane for Network Functions: Network Service Headers and Other alternatives (assigned to Zico Abhi Day)''' | ||
Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. | Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. | ||
Line 78: | Line 174: | ||
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6733615] [http://conferences2.sigcomm.org/acm-icn/2014/papers/p107.pdf] [https://tools.ietf.org/pdf/draft-quinn-sfc-nsh-07.pdf] | | [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6733615] [http://conferences2.sigcomm.org/acm-icn/2014/papers/p107.pdf] [https://tools.ietf.org/pdf/draft-quinn-sfc-nsh-07.pdf] | ||
|- | |- | ||
|'''NFV state-of-the-art and Future trends - A survey''' | |'''NFV state-of-the-art and Future trends - A survey <s>(assigned to Ishwarya Chandrasekaran)</s> withdrawn.''' | ||
Study and Understand Network Function Virtualisation (NFV), the real world use cases and deployment trends of NFV in the Datacenter, telecommunication, private networks. Survey on the reports by standardisation committees and open workgroups like IEFT/ETSI/OPNFV, primarily the specification and requirements for the NFV, and the NFV deployment models. Compare with the available open-source/commercial products if any in the market and make the study of NFV characteristics, the Key Performance Index(KPIs) for NFV and identify the open issues and challenges towards adopting to NFV. Student can choose to carry out either breadth or in-depth on particular aspect of NFV. | Study and Understand Network Function Virtualisation (NFV), the real world use cases and deployment trends of NFV in the Datacenter, telecommunication, private networks. Survey on the reports by standardisation committees and open workgroups like IEFT/ETSI/OPNFV, primarily the specification and requirements for the NFV, and the NFV deployment models. Compare with the available open-source/commercial products if any in the market and make the study of NFV characteristics, the Key Performance Index(KPIs) for NFV and identify the open issues and challenges towards adopting to NFV. Student can choose to carry out either breadth or in-depth on particular aspect of NFV. | ||
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni] | | [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni] | ||
| [https://portal.etsi.org/Portals/0/TBpages/NFV/Docs/NFV_White_Paper3.pdf] [https://datatracker.ietf.org/rg/nfvrg/documents/] [https://www.opnfv.org] [https://www.sdxcentral.com/reports/nfv-vnf-2016/vnf/] [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7350211] | | [https://portal.etsi.org/Portals/0/TBpages/NFV/Docs/NFV_White_Paper3.pdf] [https://datatracker.ietf.org/rg/nfvrg/documents/] [https://www.opnfv.org] [https://www.sdxcentral.com/reports/nfv-vnf-2016/vnf/] [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7350211] | ||
|- | |||
|- | |||
| '''Towards SDN and NFV Fault Management and High Availability (assigned to Shakik Ahmed Chowdhury)''' | |||
Network Function Virtualisation (NFV), is gaining rapid momentum, but are they reliable? can they conform with the Telecom operators latency and availability requirements of Fine Nines or Six Nines? The focus of this work is to first study and understand the concerns with NFV in terms of their failures, what amount of availability can they support. Second, study the state-of-the-art in terms of techniques that have been provided in the Cloud and Data Center networks for the traditional Virtual Machine based approaches and make the clear distinction of what aspects can and cannot be adapted? and what are the characteristics of NFV that make them differ from traditional VM based solutions? and aspects and solutions that can be adapted to achieve scalability, efficiency, and reliability in the NFV environments. | |||
| [http://www.net.informatik.uni-goettingen.de/people/sameer_kulkarni Sameer Kulkarni] | |||
| [http://www.etsi.org/deliver/etsi_gs/NFV-REL/001_099/002/01.01.01_60/gs_NFV-REL002v010101p.pdf] [https://portal.etsi.org/Portals/0/TBpages/NFV/Docs/NFV_White_Paper3.pdf] [https://datatracker.ietf.org/rg/nfvrg/documents/] [https://www.opnfv.org] | |||
|- | |- | ||
| '''Green Energy Aware Provisioning for Datacenters (assigned to Rishita Kalyani)''' | | '''Green Energy Aware Provisioning for Datacenters (assigned to Rishita Kalyani)''' | ||
Line 94: | Line 197: | ||
| [http://link.springer.com/article/10.1186/s13174-015-0041-5] [http://sloanreview.mit.edu/case-study/data-driven-city-management/] [http://sloanreview.mit.edu/article/six-lessons-from-amsterdams-smart-city-initiative/] [http://www.govtech.com/blogs/lohrmann-on-cybersecurity/making-the-top-smart-city-in-europe.html] [http://www.forbes.com/sites/peterhigh/2015/03/09/the-top-five-smart-cities-in-the-world/][https://www2.deloitte.com/content/dam/Deloitte/tr/Documents/public-sector/deloitte-nl-ps-smart-cities-report.pdf] | | [http://link.springer.com/article/10.1186/s13174-015-0041-5] [http://sloanreview.mit.edu/case-study/data-driven-city-management/] [http://sloanreview.mit.edu/article/six-lessons-from-amsterdams-smart-city-initiative/] [http://www.govtech.com/blogs/lohrmann-on-cybersecurity/making-the-top-smart-city-in-europe.html] [http://www.forbes.com/sites/peterhigh/2015/03/09/the-top-five-smart-cities-in-the-world/][https://www2.deloitte.com/content/dam/Deloitte/tr/Documents/public-sector/deloitte-nl-ps-smart-cities-report.pdf] | ||
|- | |- | ||
| '''Google | | '''New Technologies to Connect Internet: Google balloon and Facebook Drone (assigned to Vaibhav Kasturia)''' | ||
Project Loon | Project Loon and Facebook Drone are research and development projects being developed by Google X and Facebook respectively. Provide a comprehensive study on them. Investigate related approaches, techniques, methods, etc. | ||
| [https://www.net.informatik.uni-goettingen.de/people/enhuan_dong Enhuan Dong] | | [https://www.net.informatik.uni-goettingen.de/people/enhuan_dong Enhuan Dong] | ||
| [https://www.solveforx.com/loon/] | | [https://www.solveforx.com/loon/] | ||
|- | |- | ||
|'''ICN - Information Centric Networking ''' | | '''Commercial usage of Multipath TCP (assigned to Hargun Sandhu)''' | ||
MultiPath TCP (MPTCP) is an emerging extension for TCP and it is under discussion in IETF now. Study MPTCP protocol including architecture, data transmission, default congestion control, etc. Investigate how MPTCP is used in companies. | |||
| [https://www.net.informatik.uni-goettingen.de/people/enhuan_dong Enhuan Dong] | |||
| [https://tools.ietf.org/html/rfc6824][http://link.springer.com/chapter/10.1007%2F978-3-642-20757-0_35][https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/raiciu][http://dl.acm.org/citation.cfm?id=2342476][http://dl.acm.org/citation.cfm?id=2631977][https://www.usenix.org/legacy/event/nsdi11/tech/full_papers/Wischik.pdf][http://blog.multipath-tcp.org/blog/html/2015/12/25/commercial_usage_of_multipath_tcp.html] | |||
|- | |||
|'''ICN - Information Centric Networking (assigned to Mian Athar Naqash, Ahmed Towfique, Fabio Sortino and Ander Schiavella)''' | |||
Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking. | Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking. | ||
Line 105: | Line 213: | ||
By choosing this topic you will gain a general knowledge of the many architecture proposed for ICN and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN). | By choosing this topic you will gain a general knowledge of the many architecture proposed for ICN and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN). | ||
- '''topics available''': Routing and IoT with ICN | - '''topics available''': Routing and IoT with ICN, Security in IoT, Routing in IoT, ICN Architectures | ||
- [http://named-data.net/wp-content/uploads/2013/10/ndn-annualreport2012-2013.pdf NDN technical report] | - [http://named-data.net/wp-content/uploads/2013/10/ndn-annualreport2012-2013.pdf NDN technical report] | ||
- [http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf ICN Base line scenarios] | - [http://tools.ietf.org/pdf/draft-pentikousis-icn-scenarios-04.pdf ICN Base line scenarios] | ||
Line 121: | Line 229: | ||
|- | |- | ||
| '''Understanding and modelling individual human mobility''' | | '''Understanding and modelling individual human mobility (assigned to Tetiana Tolmachova)''' | ||
This study is to provide a comprehensive study of understanding and modelling individual human mobility. | This study is to provide a comprehensive study of understanding and modelling individual human mobility. | ||
| [http://www.net.informatik.uni-goettingen.de/people/tao_zhao Tao Zhao] | | [http://www.net.informatik.uni-goettingen.de/people/tao_zhao Tao Zhao] | ||
| Take a look at related papers in well known conferences/workshops/journals, e.g., [http://www.ccsb.dfci.harvard.edu/web/export/sites/default/ccsb/publications/papers/2010/Song--Barabasi_NatPhysics_10.pdf] | | Take a look at related papers in well known conferences/workshops/journals, e.g., [http://www.ccsb.dfci.harvard.edu/web/export/sites/default/ccsb/publications/papers/2010/Song--Barabasi_NatPhysics_10.pdf] | ||
|-|} | |||
|- | |||
| '''Recommendations in Location-based Social Networks - A Survey (assigned to Al Kafi Khan)''' | |||
This study is to provide a comprehensive study of recommendations in Location-based Social Networks. | |||
| [http://www.net.informatik.uni-goettingen.de/people/tao_zhao Tao Zhao] | |||
| [https://www.microsoft.com/en-us/research/publication/recommendations-in-location-based-social-networks-a-survey/] | |||
|- | |||
| '''Learning from Imbalanced Data (assigned to Oleh Astappiev)''' | |||
When building and training classifiers for classification problems, one commonly encountered problem is that of imbalanced data. For instance, in the case of a binary classifier, this means that one class is hugely overrepresented in the data available. Training classifiers for this kind of datasets has been a problem for some time. In this work, your task is to i) precisely introduce the imbalanced data problem, ii) discuss the state of the art of approaches for mitigating this problem (both from the perspective of learning algorithms and data manipulation techniques) and iii) find out what issues still remain open until today. Note that this topic requires a background in data science, and in particular in classification algorithms. Also, this topic requires a comparatively high reading effort. | |||
| [https://www.net.informatik.uni-goettingen.de/people/David_Koll David Koll ] | |||
| [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5128907&tag=1] | |||
|- | |||
| '''Deep Learning and its (possible) flaws (assigned to Sven Voigt)''' | |||
One recent trend in machine learning is 'deep learning', where neural networks are employed for solving a wide range of problems. One prominent example of such problems is image classification. While neural networks are in fact delivering sometimes great results, they may also have some weak spots. In this work, your task is to i) make yourself familiar with neural networks, ii) discuss the state-of-the-art in image classification, and iii) to investigate some possible flaws in neural networks. Note that for this topic a background in data science, and in particular in classification algorithms, is strongly recommended. Also, this topic requires a comparatively high reading effort. | |||
| [https://www.net.informatik.uni-goettingen.de/people/David_Koll David Koll ] | |||
| [http://arxiv.org/abs/1404.7828] | |||
|- | |||
| '''How do self-driving cars work? (assigned) ''' | |||
The topic title is pretty self-explanatory :) | |||
| [https://www.net.informatik.uni-goettingen.de/people/David_Koll David Koll ] | |||
| [http://cs.stanford.edu/people/teichman/papers/iv2011.pdf] | |||
|- | |||
| '''Tiered Pricing in Internet (assigned to Bhabajeet Kalita)''' | |||
ISPs sell transit connectivity bulk based on aggregate internet usage which is popularly known as blended rate pricing. Though blended rate pricing is simple, it is inefficient especially wrt resource allocation. Tiered pricing is one of the alternative. The goal of this work is to understand motivation for tiered pricing and discuss state-of-the-art in tiered pricing. | |||
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan%20s_prasad Abhinandan S Prasad] | |||
| [http://dl.acm.org/citation.cfm?id=2018459][http://netseminar.stanford.edu/past_seminars/seminars/11_03_11.pdf][http://dl.acm.org/citation.cfm?id=2096157][http://dl.acm.org/citation.cfm?id=2674854] | |||
|-} | |||
==Workflow== | ==Workflow== |
Latest revision as of 10:53, 16 February 2017
Details
Workload/ECTS Credits: | 5 ECTS (BSc/MSc AI); 5 (ITIS) |
Module: | M.Inf.1124 -or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies |
Lecturer: | Dr. Hong Huang |
Teaching assistant: | Tao Zhao |
Time: | Oct 20, 16:00ct: Introduction Meeting |
Place: | IFI Building, Room 3.101 |
UniVZ | [1] |
Course description
This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.
The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.
Passing requirements
- Actively and frequently participate in the project communication with your topic advisor
- This accounts for 20% of your grade.
- Present the selected topic (20 min. presentation + 10 min. Q&A).
- This accounts for 40% of your grade.
- Write a report on the selected topic (12-15 pages) (LaTeX Template:[2]).
- This accounts for 40% of your grade.
- Please check the #Schedule and adhere to it.
Schedule
- Oct. 20, 16:00ct: Introduction meeting
- Feb. 2, 2017 : Deadline for registration
- Feb. 9 and Feb. 16 : Presentations
- Mar. 31, 2017, 23:59: Deadline for submission of report (should be sent to the topic adviser!)
Final Presentation
Time Slot (Feb 9, 2017) | Student | Advisor |
9:00AM -- 9:30AM | Ander Schiavella | Sripriya |
9:30AM -- 10:00AM | Fabio Sortino | Sripriya |
10:00AM -- 10:30AM | Hargun Sandhu | Enhuan |
10:30AM -- 11:00AM | Tran, Thi Ngoc Han | Abhinandan |
11:00AM -- 11:30AM | Yasir Sohail | Tao |
Time Slot (Feb 16, 2017) | Student | Advisor |
1:00PM -- 1:30PM | Mojtaba Shabani | Osama |
1:30PM -- 2:00PM | Saidul Islam | Osama |
2:00PM -- 2:30PM | Abdul Hadi | Enhuan |
2:30PM -- 3:00PM | Alireza | Mayutan |
3:00PM -- 3:10PM | Break | |
3:10PM -- 3:40PM | Georgios Kaklamanos | Mayutan |
3:40PM -- 4:10PM | Vaibhav Kasturia | Enhuan |
4:10PM -- 4:40PM | Kalyani, Rishita | Abhinandan |
4:40PM -- 5:10PM | Bhabajeet Kalita | Abhinandan |
Topics
Workflow
1. Select a topic
A student picks a topic to work on. You can pick up a topic and start working at any time. However, make sure to notify the advisor of the topic before starting to work.
2. Get your work advised
For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.
3. Approach your topic
- By choosing a topic, you choose the direction of elaboration.
- You may work in different styles, for example:
- Survey: Basic introduction, overview of the field; general problems, methods, approaches.
- Specific problem: Detailed introduction, details about the problem and the solution.
- You should include your own thoughts on your topic.
4. Prepare your presentation
- Present your topic to the audience (in English).
- 20 minutes of presentation followed by 10 minutes discussion.
You present your topic to an audience of students and other interested people (usually the NET group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.
Hints for preparing the presentation: 20 minutes are too short to present a topic fully. It is alright to focus just on one certain important aspect. Limit the introduction of basics. Make sure to finish in time.
Suggestions for preparing the slides: No more than 20 pages/slides. Get your audiences to quickly understand the general idea. Figures, tables and animations are better than sentences. Summary of the topic: thinking in your own words.
5. Write your report
- Present the problem with its background.
- Detail the approaches, techniques, methods to handle the problem.
- Evaluate and assess those approaches (e.g., pros and cons).
- Give a short outlook on potential future developments.
The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).
6. Course schedule
There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the #Schedule to take appropriate actions.
Topic | Topic Advisor | Initial Readings |
Why deep learning is suddenly changing your life?- A survey (assigned to Sudhir Kumar Sah)
This study is to provide a comprehensive survey on the key enabling technologies for deep learning. |
Hong Huang | [3] |
Deep into Google Translate (assigned to Azadeh Amiri)
This study is to provide a comprehensive study of one of the Google products - Google translate and aim to understand the technologies behind it. |
Hong Huang | [4] |
Inferring social capital from big data (assigned to Bikash Chandra Karmokar)
This study is to discover the state of art of social capital measuring, particularly, from big data perspective. |
Hong Huang | [5][6] |
An overview on deep learning framework(assigned to Mohammad Wazed Ali)
In this work, you will be asked to do a survey on all popular deep learning framework either in academe or industry, like tensorflow, caffe and so on. You shall elaborate their shortcomings and advantages. |
Hong Huang | [7] |
Towards a Pricing Model in NFV (assigned to Saidul Islam)
One of the untouched research areas in Network Function Virtualization (NFV) is Accounting Management. Your task is firstly identify the current Management systems that used in Data centers and cloud computing environments and later to map what you think it might be useful to NFV area. You should support your statement with logical reasons so far. It is not required to conducted any empirical work. Your work should investigate in some depth the exact relationship between different factors not only describing them. |
Osamah Barakat | [8][9][10] |
Legacy support in SDN networks(assigned to Dorna Amiri)
Supporting legacy network is an active research area in SDN. You should survey all techniques used up to date to solve this problem. Details may be provided later. |
Osamah Barakat | Take a look at recent papers in well known conferences/workshops. |
WiFi latest advances and Smart-wifi (assigned to Mojtaba Shabani)
A new generation of Wireless Local Area Networks (WLANs) will make its appearance in the market in the forthcoming years based on the amendments to the IEEE 802.11 standards that have recently been approved or are under development. Examples of the most expected ones are IEEE 802.11aa (Robust Audio Video Transport Streaming), IEEE 802.11ac (Very-high throughput at < 6 GHz), IEEE 802.11af (TV White Spaces) and IEEE 802.11ah (Machine-to-Machine communications) specifications. You should investigate the latest advances made in WiFi and in its usage to support other type of networks as LTE and G5. |
Osamah Barakat | Take a look at recent papers in well known conferences/workshops. |
What is the current status and future of cloud related research? What are the main research problems that are currently being targeted? (assigned to Georgios Kaklamanos)
Cloud computing and cloud based services have become an integral part of the Internet. The aim of this work is to study what research problems exist and also identify promising solutions. Topics pertaining to Data Centers are also of relevance. |
Mayutan Arumaithurai | Take a look at recent papers in well known conferences/workshops. |
What is the current status of congestion control protocols in ICN? (assigned to Ali Reza)
The aim of this work is to identify the congestion control related work in the ICN space. |
Mayutan Arumaithurai | Take a look at recent papers in well known conferences/workshops. |
Sponsored Search Auctions in Internet (Online advertisements Google Ads)(assigned to Han)
Sponsored search auctions are widely used by search engines like Google, Microsoft, for displaying ads when an user perform keyword search in goole.com/bing.com. The application of sponsored search auctions in not only limited to search engine providers but also has popular with online markets like eBay. The goal is to perform survey on the latest advancements in this area. |
Abhinandan S Prasad | [11] [12][13] |
Service Plane for Network Functions: Network Service Headers and Other alternatives (assigned to Zico Abhi Day)
Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. |
Sameer Kulkarni | [14] [15] [16] |
NFV state-of-the-art and Future trends - A survey Study and Understand Network Function Virtualisation (NFV), the real world use cases and deployment trends of NFV in the Datacenter, telecommunication, private networks. Survey on the reports by standardisation committees and open workgroups like IEFT/ETSI/OPNFV, primarily the specification and requirements for the NFV, and the NFV deployment models. Compare with the available open-source/commercial products if any in the market and make the study of NFV characteristics, the Key Performance Index(KPIs) for NFV and identify the open issues and challenges towards adopting to NFV. Student can choose to carry out either breadth or in-depth on particular aspect of NFV. |
Sameer Kulkarni | [17] [18] [19] [20] [21] |
Towards SDN and NFV Fault Management and High Availability (assigned to Shakik Ahmed Chowdhury)
Network Function Virtualisation (NFV), is gaining rapid momentum, but are they reliable? can they conform with the Telecom operators latency and availability requirements of Fine Nines or Six Nines? The focus of this work is to first study and understand the concerns with NFV in terms of their failures, what amount of availability can they support. Second, study the state-of-the-art in terms of techniques that have been provided in the Cloud and Data Center networks for the traditional Virtual Machine based approaches and make the clear distinction of what aspects can and cannot be adapted? and what are the characteristics of NFV that make them differ from traditional VM based solutions? and aspects and solutions that can be adapted to achieve scalability, efficiency, and reliability in the NFV environments. |
Sameer Kulkarni | [22] [23] [24] [25] |
Green Energy Aware Provisioning for Datacenters (assigned to Rishita Kalyani)
With the advent of cloud computing especially Big data, service providers like Micorsoft, Google, etc are using more and more renewable energy in their data centers to minimize power cost and reduce carbon emission. It is one of the important area of research. The goal is to perform a survey on the state of the art technologies in this area. |
Abhinandan S Prasad | [26] [27] [28] |
Applications of Big Data and Smart Cities (assigned to Abdul Hadi)
Study how the applications of big data support smart cities. Investigate related applications. Study their benefits, challenges, approaches and technologies. Give a short outlook on potential future developments. |
Enhuan Dong | [29] [30] [31] [32] [33][34] |
New Technologies to Connect Internet: Google balloon and Facebook Drone (assigned to Vaibhav Kasturia)
Project Loon and Facebook Drone are research and development projects being developed by Google X and Facebook respectively. Provide a comprehensive study on them. Investigate related approaches, techniques, methods, etc. |
Enhuan Dong | [35] |
Commercial usage of Multipath TCP (assigned to Hargun Sandhu)
MultiPath TCP (MPTCP) is an emerging extension for TCP and it is under discussion in IETF now. Study MPTCP protocol including architecture, data transmission, default congestion control, etc. Investigate how MPTCP is used in companies. |
Enhuan Dong | [36][37][38][39][40][41][42] |
ICN - Information Centric Networking (assigned to Mian Athar Naqash, Ahmed Towfique, Fabio Sortino and Ander Schiavella)
Content Centric Networking (CCN) is a new ambitious proposal to replace the IP protocol. A better and faster content distribution, improved privacy, integrated cryptography and easy P2P communication are among the key elements of this architecture. On the other hand problems like efficiency and scalability of the name-based routing, support of existing application and new ones and the possibility to actually deploy this technology are still open and actively discussed, making CCN one of the most active research field in networking. By choosing this topic you will gain a general knowledge of the many architecture proposed for ICN and will have to gain insight into one of the problems like routing or security, or solutions (i.e. applications on top of NDN). - topics available: Routing and IoT with ICN, Security in IoT, Routing in IoT, ICN Architectures - NDN technical report - ICN Base line scenarios |
Sripriya Adhatarao (adhatarao@cs.uni-goettingen.de) | For general introduction: |
Large-Scale Mobile Traffic Analysis - A Survey (assigned to Yasir Sohail)
This study is to provide a comprehensive study of large-scale mobile traffic analysis. |
Tao Zhao | [43] |
Understanding and modelling individual human mobility (assigned to Tetiana Tolmachova)
This study is to provide a comprehensive study of understanding and modelling individual human mobility. |
Tao Zhao | Take a look at related papers in well known conferences/workshops/journals, e.g., [44] |
Recommendations in Location-based Social Networks - A Survey (assigned to Al Kafi Khan)
This study is to provide a comprehensive study of recommendations in Location-based Social Networks. |
Tao Zhao | [45] |
Learning from Imbalanced Data (assigned to Oleh Astappiev)
When building and training classifiers for classification problems, one commonly encountered problem is that of imbalanced data. For instance, in the case of a binary classifier, this means that one class is hugely overrepresented in the data available. Training classifiers for this kind of datasets has been a problem for some time. In this work, your task is to i) precisely introduce the imbalanced data problem, ii) discuss the state of the art of approaches for mitigating this problem (both from the perspective of learning algorithms and data manipulation techniques) and iii) find out what issues still remain open until today. Note that this topic requires a background in data science, and in particular in classification algorithms. Also, this topic requires a comparatively high reading effort. |
David Koll | [46] |
Deep Learning and its (possible) flaws (assigned to Sven Voigt)
One recent trend in machine learning is 'deep learning', where neural networks are employed for solving a wide range of problems. One prominent example of such problems is image classification. While neural networks are in fact delivering sometimes great results, they may also have some weak spots. In this work, your task is to i) make yourself familiar with neural networks, ii) discuss the state-of-the-art in image classification, and iii) to investigate some possible flaws in neural networks. Note that for this topic a background in data science, and in particular in classification algorithms, is strongly recommended. Also, this topic requires a comparatively high reading effort. |
David Koll | [47] |
How do self-driving cars work? (assigned)
The topic title is pretty self-explanatory :) |
David Koll | [48] |
Tiered Pricing in Internet (assigned to Bhabajeet Kalita)
ISPs sell transit connectivity bulk based on aggregate internet usage which is popularly known as blended rate pricing. Though blended rate pricing is simple, it is inefficient especially wrt resource allocation. Tiered pricing is one of the alternative. The goal of this work is to understand motivation for tiered pricing and discuss state-of-the-art in tiered pricing. |
Abhinandan S Prasad | [49][50][51][52] |