Seminar on Internet Technologies (Winter 2010/2011): Difference between revisions
(→Topics) |
|||
(50 intermediate revisions by 6 users not shown) | |||
Line 9: | Line 9: | ||
}} | }} | ||
{{Announcement|'''Don't forget to register with FlexNow!''' The final FlexNow registration deadline is 7 January 2011.}} | |||
{{Announcement|Please register your topic with the corresponding topic supervisor and '''your preferred date for the presentation''' as soon as possible. We will cancel the presentations on 16 December 2010 if not at least two students register for this date before 30 November 2010.}} | |||
{{Announcement|You can participate in the seminar even if you were not present at the informational meeting (please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information).}} | |||
==Course description== | ==Course description== | ||
Line 25: | Line 28: | ||
==Schedule== | ==Schedule== | ||
* Thursday, '''4 November 2010, 16.15 - 17.00''': First general meeting. Introduction to the course and open questions. | |||
* CANCELED - Thursday, '''6 January 2011, 15.00 - 18.00''': Presentations | |||
** CANCELED! | |||
** <strike>Automated Security Protocol Analysis (AVANTSSAR)</strike> <span style="color:#B22222">(canceled)</span> | |||
* Thursday, '''13 January 2011, 15.00 - 18.00''': Presentations | |||
** Scalable Server Selection for Cloud Services | |||
** Matrix Factorization Model based Network Coordinate System | |||
** A conceptual overview of mobile platforms | |||
** Android programming: Concepts and limitations | |||
* Thursday, '''20 January 2011, 15.00 - 18.00''': Presentations | |||
** Mobile and Wireless Peer-to-Peer Systems | |||
** Fighting Spam in Social Networking Sites | |||
** Modern Authentication Systems on the example of MS Geneva <span style="color:#B22222">(shifted from 6th of January)</span> | |||
** Distributed Hash Tables - Usage, properties and future development <span style="color:#B22222">(shifted from 6th of January)</span> | |||
== Topics == | == Topics == | ||
Line 53: | Line 69: | ||
| [http://www.linkedin.com/] | | [http://www.linkedin.com/] | ||
|- | |- | ||
| Traffic Localization in P2P Networks | | <strike>Traffic Localization in P2P Networks</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] | | [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] | ||
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering] | | [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering] | ||
|- | |- | ||
| Modern Authentication Systems on the example of MS Geneva | | <strike>Modern Authentication Systems on the example of MS Geneva</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx] | | [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx] | ||
|- | |- | ||
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa) | | <strike>Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://avispa-project.org/] | | [http://avispa-project.org/] | ||
|- | |- | ||
| Distributed Hash Tables - Usage, properties and future development | | <strike>Distributed Hash Tables - Usage, properties and future development</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://en.wikipedia.org/wiki/Distributed_hash_table] | | [http://en.wikipedia.org/wiki/Distributed_hash_table] | ||
|- | |- | ||
| Matrix Factorization Model based Network Coordinate System | | <strike>Matrix Factorization Model based Network Coordinate System</strike> | ||
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | | [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | ||
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] | | [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf] | ||
|- | |- | ||
| Security and Privacy in Delay Tolerant Networks | | Security and Privacy in Delay Tolerant Networks | ||
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | | [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | ||
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf][https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf][http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf] | | [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.71.8314&rep=rep1&type=pdf] [https://www.netlab.tkk.fi/opetus/s383151/articles/01659530.pdf] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.7450&rep=rep1&type=pdf] | ||
|- | |- | ||
| Security Design in Network Coordinate Systems | | Malware propagation in mobile networks | ||
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | |||
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf] | |||
|- | |||
| <strike>Fighting Spam in Social Networking Sites</strike> | |||
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed] | |||
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125] | |||
|- | |||
| <strike>Security Design in Network Coordinate Systems</strike> | |||
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | | [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | ||
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf] | | [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf] | ||
|- | |||
| Economics in Peer-to-Peer Systems | |||
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu] | |||
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf] | |||
|- | |||
| <strike>Mobile and Wireless Peer-to-Peer Systems</strike> | |||
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu] | |||
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] | |||
|- | |||
| <strike>Scalable Server Selection for Cloud Services</strike> | |||
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | |||
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [ftp://ftp.cs.princeton.edu/techreports/2009/868.pdf] | |||
|} | |} | ||
Latest revision as of 17:05, 20 January 2011
Details
Workload/ECTS Credits: | 120h, 4 ECTS |
Module: | M.Inf.122/222: Seminar Telematik I/II -or- B.Inf.204/205: Proseminar I/II |
Lecturer: | {{{lecturer}}} |
Teaching assistant: | Niklas Neumann |
Time: | please see #Schedule |
Place: | IfI 3.101 |
UniVZ | [1] |
Don't forget to register with FlexNow! The final FlexNow registration deadline is 7 January 2011. |
You can participate in the seminar even if you were not present at the informational meeting (please contact Niklas Neumann for future information). |
Course description
The seminar will cover selected topics from current research and technology approaches in computer networking. Each student will write a report on one topic and present it during the seminar. The seminar is held on a small number of block meetings where the students give their presentations. There will be no regular meetings.
The purpose of this seminar is to
- Familiarize the students with common and new technologies that are being used in the Internet.
- Enable independent studying of a specific topic.
- Train writing and presentation skills.
Passing requirements
- Prepare a written report on the selected topic (12-15 pages).
- Present the selected topic in the seminar (30 min. presentation + 10 min. discussion).
- Presence and active participation during all meetings.
Schedule
- Thursday, 4 November 2010, 16.15 - 17.00: First general meeting. Introduction to the course and open questions.
- CANCELED - Thursday, 6 January 2011, 15.00 - 18.00: Presentations
- CANCELED!
Automated Security Protocol Analysis (AVANTSSAR)(canceled)
- Thursday, 13 January 2011, 15.00 - 18.00: Presentations
- Scalable Server Selection for Cloud Services
- Matrix Factorization Model based Network Coordinate System
- A conceptual overview of mobile platforms
- Android programming: Concepts and limitations
- Thursday, 20 January 2011, 15.00 - 18.00: Presentations
- Mobile and Wireless Peer-to-Peer Systems
- Fighting Spam in Social Networking Sites
- Modern Authentication Systems on the example of MS Geneva (shifted from 6th of January)
- Distributed Hash Tables - Usage, properties and future development (shifted from 6th of January)
Topics
The following list of topics is constantly being expanded. If there is no topic that you like at the moment, please check back regularly for the most recent updates. You can also get in touch with us directly and we will try to find a topic that interests you.
Topic | Topic advisor | Initial readings |
Securing Media Transport Protocols | Niklas Neumann | [2] |
Congestion Exposure, A study of its pros and cons | Mayutan Arumaithurai | [3] |
Net neutrality: A study of fairness on the internet | Mayutan Arumaithurai | [4] |
LinkedIN: A study of the popular business oriented social networking site. | Mayutan Arumaithurai | [5] |
Niklas Neumann | [6] [7] | |
Florian Tegeler | [8] | |
Florian Tegeler | [9] | |
Florian Tegeler | [10] | |
Yang Chen | [11] [12] [13] | |
Security and Privacy in Delay Tolerant Networks | Sufian Hameed | [14] [15] [16] |
Malware propagation in mobile networks | Sufian Hameed | [17] [18] [19] |
Sufian Hameed | [20] | |
Yang Chen | [21] [22] [23] | |
Economics in Peer-to-Peer Systems | Tianyin Xu | [24] [25] [26] |
Tianyin Xu | [27] [28] [29] | |
Yang Chen | [30] [31] [32] |
Workflow
The workflow of the seminar is as follows.
1. Topic selection
Each student picks a topic to work on. You can pick a topic and start working at any time. Just approach the topic advisor and he will give you initial information and a time frame for the topic. Alternatively you can select a topic at the first session of a semester.
2. Topic advisor
For each topic a supervising tutor is available who is familiar with the topic. He is your contact person for questions and problems regarding the topic. The tutor supports you as much as you want, so don't hesitate to approach him for general advice or with any questions you might have. You should have at least one face-to-face meeting to discuss your outline and initial thoughts. It is recommended that you schedule a first meeting right when you select the topic you want to work on.
3. Approach your topic
- Topic titles are rather abstract.
- You chose the direction of your elaboration.
- For example:
- Survey style: Basic introduction, overview about the field, general problems, methods, approaches.
- Specific problem: Selective introduction, detail the problem, introduce solutions or approaches.
- Include your own thoughts: Evaluation section, outlook in the end.
- Remember: We are interested in the aspects related to Internet technologies.
4. Prepare a Presentation
TLDR version:
- Give an overview of your topic to the audience.
- 30 minutes of presentation followed by 10 minutes discussion.
- Slides should be in English.
- Deadline (presentation slides): 1 week before the presentation.
As a part of the seminar you have to present your topic to an audience of students and other interested people. Your presentation should give the audience a general idea of the topic and highlight interesting issues and problems. Try to explain the motivation behind your topic and the problems that are addressed as well as the solutions and open questions. You have 30 minutes to present your topic followed by 10 minutes of discussion. You must keep within the time limit of 30 minutes. The deadline for the slides you prepare for the presentation is one week before the actual presentation. Please send the slides to your topic advisor as soon possible though, so you have time to include any feedback you got.
You can chose on your own whether you want to prepare the presentation or write the report first. We recommend that you have a rough draft of the presentation as a basis to discuss your approach of the topic with your advisor before writing a lot of text. It is easier to exchange a couple of slides than a couple pages in the report.
Some hints you should keep in mind when preparing the presentation:
- 30 minutes are too short to present a topic fully.
- Limit the introduction of basics (5 to 10 min.).
- Focus on the interesting parts of the topic.
- It is alright to focus just on one certain important aspect.
- Make sure to finish in time!
Tips for preparing the slides:
- No more than 20 pages.
- Get your audiences to quickly understand the idea of the presentation
- Figures, tables and animations are better than wordy sentences
- Use example to explain complicated algorithms
- Short sentences
- Avoid complicated equations
- Summary of the topic: thinking/justification of the approach(es) in your own words
5. Write the Report
TLDR version:
- Comprehensively cover the topic.
- Content:
- Present the problem with its background (˜10%).
- Detail available approaches, techniques, methodologies to deal with this problem. What are their properties, advantages and drawbacks(˜50%).
- Evaluate and assess those approaches (˜30%).
- Give a short outlook on potential future developments (˜10%).
- Between 12 and 15 pages of content (usual thesis layout).
- Written in English according to common guidelines for scientific papers.
- Deadline: End of the semester.
The report is the main part of your work. It must be between 12 and 15 pages of content (not including table of content, bibliography and such) and comprehensively cover your topic.
6. Block meetings
There will be no general meetings for this seminar. The work for will be done by yourself with the assistance of your topic advisor. There will be a limited number of block meetings every semester. In general there will be one block meeting in the beginning of a semester to give an introduction to the course and a couple of dates for the presentations. Please see the schedule for the current semester for the exact dates. While the participation in the presentation meetings is mandatory, you are not required to participate in the organizational meeting. If you miss the general meeting or you want to start your work earlier (for example during the semester break), please contact the teaching assistants (see top of this page) or the topic advisor for your topic.