Seminar on Internet Technologies (Winter 2015/2016)

Revision as of 18:43, 4 November 2015 by Jli5 (talk | contribs)

Details

Workload/ECTS Credits: 5 ECTS (BSc/MSc AI); 5 (ITIS)
Module: M.Inf.1124 -or- B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
Lecturer: Dr. Xu Chen
Teaching assistant: Ms. Hong Huang
Time: Oct. 29, 16:00ct: Introduction Meeting
Place: IFI Building, Room 3.101
UniVZ [1]


Course description

This course covers selected topics on the up-to-date Internet technologies and research. Each student takes a topic, does a presentation and writes a report on it. Besides the introduction meeting on October 29, there are no regular meetings, lectures or classes for this course. The purpose of this course is to familiarize the students with new technologies, enable independent study of a specific topic, and train presentation and writing skills.

The informational meeting at the beginning of the course will cover some guidelines on scientific presenting and writing.

Passing requirements

  • Present the selected topic (20 min. presentation + 10 min. Q&A).
    • This accounts for 40% of your grade.
  • Write a report on the selected topic (12-15 pages) (LaTeX Template:[2]).
    • This accounts for 60% of your grade.
  • Please check the #Schedule and adhere to it.

Schedule

  • Oct. 29, 16:00ct: Informational meeting ( Introduction Slides)
  • Jan. 29, 2016: Registration Deadline
  • Feb. 4, 2016 : Presentations
  • March 1, 2016, 23:59: Deadline for submission of report

Topics

See Below.

Workflow

1. Select a topic

A student picks a topic to work on. You can pick up a topic and start working at any time. However, make sure to notify the advisor of the topic before starting to work.

2. Get your work advised

For each topic, a topic advisor is available. He is your contact person for questions and problems regarding the topic. He supports you as much as you want, so please do not hesitate to approach him for any advice or with any questions you might have. It is recommended (and not mandatory) that you schedule a face-to-face meeting with him right after you select your topic.

3. Approach your topic

  • By choosing a topic, you choose the direction of elaboration.
  • You may work in different styles, for example:
    • Survey: Basic introduction, overview of the field; general problems, methods, approaches.
    • Specific problem: Detailed introduction, details about the problem and the solution.
  • You should include your own thoughts on your topic.

4. Prepare your presentation

  • Present your topic to the audience (in English).
  • 20 minutes of presentation followed by 10 minutes discussion.

You present your topic to an audience of students and other interested people (usually the NET group members). Your presentation should give the audience a general idea of the topic and highlight interesting problems and solutions. You have 20 minutes to present your topic followed by 10 minutes of discussion. You must keep it within the time limit. Please send your slides to your topic advisor for any possible feedback before your presentation.

Hints for preparing the presentation:

  • 20 minutes are too short to present a topic fully.
  • It is alright to focus just on one certain important aspect.
  • Limit the introduction of basics (5 min.).
  • Make sure to finish in time.

Suggestions for preparing the slides:

  • No more than 20 pages/slides.
  • Get your audiences to quickly understand the general idea.
  • Figures, tables and animations are better than sentences.
  • Summary of the topic: thinking in your own words.

5. Write your report

  • Present the problem with its background.
  • Detail the approaches, techniques, methods to handle the problem.
  • Evaluate and assess those approaches (e.g., pros and cons).
  • Give a short outlook on potential future developments.

The report must be written in English according to common guidelines for scientific papers, between 12 and 15 pages of content (excluding the table of content, bibliography, etc.).

6. Course schedule

There are no regular meetings, lectures or classes for this course. The work is expected to be done by yourself with the assistance of your topic advisor. Please follow the #Schedule to take appropriate actions.

Topic Topic Advisor Initial Readings
What Will 5G Be? - A Survey (assigned to Veizaga Campero Alvaro Mario)

This study is to provide a comprehensive survey on the key enabling communication technologies for 5G networks.

Xu Chen [3]
What Will Smart Grid Be? – A Survey (assigned to Qazi Asim Ijaz Ahmad)

The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. This study is to provide a comprehensive survey on the key enabling technologies and services for Smart Grid.

Xu Chen [4]
What is the current status and future of SDN research? What are the main research problems of SDN? (assigned to Mahmoud Alzaitoun)

There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study what research problems exist and also identify promising solutions.

Mayutan Arumaithurai [5][6]
A survey of SDN standardization (assigned to Guido Martinez)

There is a lot of hype about SDN with industries, operators and Academia showing interest. The aim of this work is to study the standardization efforts ongoing in SDN.

Mayutan Arumaithurai [7]
All about Turing test (assigned to Benjamin Leiding)

The Turing test is a test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. Since Turing first introduced his test, it has proven to be both highly influential and widely criticised, and it has become an important concept in the philosophy of artificial intelligence.

Hong Huang [8]
Thinking into data bias and its solutions (assigned to Argianto Rahartomo)

Bid data becomes a hot topic in both research and industry field. However, the data we have got is somehow biased. What will conclusions be if the data is biased? How can we tackle this issue?

Hong Huang TBA
Network effects in service usage (assigned to Maryam afzal) Hong Huang [9][10][11]
Controllers in Software-defined Networks - A Survey (Assigned to Waqas Awan)

SDN introduces the concept of a logically centralized controller in charge of operating the network, while routers and switches are reduced to simple forwarding elements. In this topic, the student will provide a survey over the state-of-the-art in SDN controllers.

David Koll [12][13]
Advances in Datacenter Networking (Assigned to Dieter Lechler)

A lot of today's internet services are hosted in datacenters, which are basically a collection of thousands of hosts that are interconnected by up to thousands of networking devices. In this topic, the student should investigate recent advances in datacenter applications, networking technologies and topologies.

David Koll [14][15][16]
Caching mechanisms in ICN-A survey(assigned to Firoz Kabir)

As one key feature of ICN, in-network caching receives widespread research interest. where are the data copy need to be cached, and how to process the replacement problem become the key to improve ICN performance.

Jie Li [17][18]
Scalable routing in ICN -A survey

Routing scalability is a great challenge for ICN's feasibility. How to manage the huge namespace of ICN in a limited FIB without much effect on routing efficiency has drawn more and more attention.

Jie Li [19][20]
Application of Packet Sampling in Computer Security - A Survey (Assigned to Suhair Ahmed)

Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?

Abhinandan S Prasad [21][22][23]
Game theory based solutions in Computer Network Security - A Survey (Assigned to Awad Mukbil)

Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.

Abhinandan S Prasad [24][25][26][27][28]
Virtual Machine and Data Migration in Cloud computing (assigned to Pouya Saeedfar)

This topic requires to study and compare the state-of-the-art techniques employed in Virtual machine and data migration in Cloud Computing systems. Then try to propose new mechanisms and optimizations for carrying out the migration efficiently.

Sameer Kulkarni [29] [30]
Service Plane for Network Functions: Network Service Headers and Other alternatives (assigned to Tayyebe Emadinia)

Focus of this topic is to understand 'Service Function Chaining of Network Functions', the state-of-the-art proposals like Network Service Headers and related academic works. Reason and justify the need for service plane and then try to propose new mechanisms and design of the data plane to support network services, and the control plane functions necessary to manage these data plane functions.

Sameer Kulkarni [31] [32] [33]
Challenges and Opportunities in the Cloud - A survey (assigned to Sudhir Kumar Sah)

Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof.

Sameer Kulkarni [34] [35] [36] [37]