Seminar on Internet Technologies (Winter 2015/2016): Difference between revisions
No edit summary |
|||
| (10 intermediate revisions by 4 users not shown) | |||
| Line 1: | Line 1: | ||
== Details == | == Details == | ||
{{Announcement|Note: | |||
Please register for the course ASAP (e.g. AI students in flexnow) in order to get your grade on time}} | |||
{{CourseDetails | {{CourseDetails | ||
| Line 27: | Line 30: | ||
* '''Oct. 29, 16:00ct''': Informational meeting '''([[Media:sitintro.pdf | Introduction Slides]])''' | * '''Oct. 29, 16:00ct''': Informational meeting '''([[Media:sitintro.pdf | Introduction Slides]])''' | ||
*'''Jan. 29, 2016''': Registration Deadline | *'''Jan. 29, 2016''': Registration Deadline | ||
* '''Feb. | * '''Feb. 5, 2016''' : Presentations (If not feasible for you, pls contact with your topic adviser to reschedule in Feb. 4) | ||
* '''March 1, 2016, 23:59''': Deadline for submission of report | * '''March 1, 2016, 23:59 (Extended to March 31)''': Deadline for submission of report (should be sent to the topic adviser!) | ||
==Final Presentation== | |||
{{Announcement|Note: | |||
Please register for the course ASAP (e.g. AI students in flexnow) in order to get your grade on time}} | |||
* Feb. 04, 2016 | |||
{| align="center" class="wikitable sortable" {{Prettytable}} | |||
|- | |||
|{{Hl2}} |'''Time Slot''' | |||
|{{Hl2}} |'''Student''' | |||
|{{Hl2}} |'''Topic Advisor''' | |||
|- | |||
|10:00-10:30 | |||
|Benjamin Leiding | |||
|Hong | |||
|- | |||
|10:30-11:00 | |||
|Pouya Saeedfar | |||
|Sameer | |||
|- | |||
|11:00-11:30 | |||
|Martin Schwarzmaier | |||
|Jie | |||
|- | |||
|} | |||
* Feb. 05, 2016 | |||
{| align="center" class="wikitable sortable" {{Prettytable}} | |||
|- | |||
|{{Hl2}} |'''Time Slot''' | |||
|{{Hl2}} |'''Student''' | |||
|{{Hl2}} |'''Topic Advisor''' | |||
|- | |||
|09:30-10:00 | |||
|Argianto Rahartomo | |||
|Hong | |||
|- | |||
|10:00-10:30 | |||
|Amir Reza Fazely Hamedani | |||
|David | |||
|- | |||
|10:30-11:00 | |||
|Dieter Lechler | |||
|David | |||
|- | |||
|11:00-11:30 | |||
|Alvaro Mario Veizaga Campero | |||
|Xu | |||
|- | |||
|14:00-14:30 | |||
|Mohammad Firoz Kabir | |||
|Jie | |||
|- | |||
|14:30-15:00 | |||
|Guido Martinez | |||
|Mayutan | |||
|- | |||
|15:00-15:30 | |||
|Marcus Thomas Khalil | |||
|David | |||
|- | |||
|15:30-16:00 | |||
|Qazi Asim Ijaz Ahmad | |||
|Xu | |||
|- | |||
|16:00-16:30 | |||
|Waqas Awan | |||
|David | |||
|- | |||
|} | |||
== Topics == | == Topics == | ||
{| align="center" class="wikitable sortable" {{Prettytable}} | {| align="center" class="wikitable sortable" {{Prettytable}} | ||
|- | |- | ||
| Line 84: | Line 157: | ||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | | [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | ||
| [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf] | | [http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p183.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p123.pdf][http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p139.pdf] | ||
|- | |||
| '''Security issues in Software-defined Networking''' (Assigned to Amir Fazely) | |||
The potential benefits of SDN are well-known and systems exploiting SDN are becoming omnipresent. While some of those exploit SDN features to improve the security of a service, | |||
little research has been executed to secure SDN-enabled networks themselves. This topic will study potential attack vectors and defense mechanisms. | |||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | |||
| - | |||
|- | |||
| '''Network Virtualization with SDN''' (Assigned to Marcus Khalil) | |||
| [http://user.informatik.uni-goettingen.de/~dkoll David Koll] | |||
| - | |||
|- | |- | ||
| '''Caching mechanisms in ICN-A survey'''(assigned to Firoz Kabir) | | '''Caching mechanisms in ICN-A survey'''(assigned to Firoz Kabir) | ||
| Line 119: | Line 202: | ||
|- | |- | ||
|'''Service Plane for Network Functions: Network Service Headers and Other alternatives (assigned to Tayyebe Emadinia)''' | |'''Service Plane for Network Functions: Network Service Headers and Other alternatives <s> (assigned to Tayyebe Emadinia) </s>''' | ||
Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. | Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions. | ||
| Line 127: | Line 210: | ||
|- | |- | ||
|'''Challenges and Opportunities in the Cloud - A survey (assigned to Sudhir Kumar Sah)''' | |'''Challenges and Opportunities in the Cloud - A survey <del> (assigned to Sudhir Kumar Sah) </del>''' | ||
Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof. | Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof. | ||