Editor, Bureaucrats, Administrators
264
edits
m (→Schedule) |
|||
(49 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== Details == | == Details == | ||
{{Announcement|'''Due to the low number of participants, the written exam is replaced by oral examination.'''}} | |||
{{Announcement|'''Please register with FlexNow one week before the presentations.'''}} | |||
{{CourseDetails | {{CourseDetails | ||
|credits=120h, 6 ECTS (old PO), 6 ECTS (new PO) | |credits=120h, 6 ECTS (old PO), 6 ECTS (new PO) | ||
|module= | |module=M.Inf.1222.Mp, M.Inf.1223.Mp, M.Inf.221.3C1 | ||
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | |lecturer=[http://www.net.informatik.uni-goettingen.de/people/xiaoming_fu Prof. Xiaoming Fu], [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li], [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Dr. Florian Tegeler] | ||
|ta=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Dr. Florian Tegeler] | |||
|time=start: 19.04.2012, Thursdays 10-12 | |time=start: 19.04.2012, Thursdays 10-12 | ||
|place=3.101 | |place=3.101 | ||
Line 11: | Line 14: | ||
==Course description== | ==Course description== | ||
This lecture presents advanced concepts of computer networking. Preliminary topics are, for example, P2P, DHT, Cloud Computing, Social Networking, Mathematical Network Models, Content Centric Networking, Content Delivery Networks | This lecture presents advanced concepts of computer networking. Preliminary topics are, for example, P2P, DHT, Cloud Computing, Social Networking, Mathematical Network Models, Content Centric Networking, Content Delivery Networks | ||
In irregular intervals, optional exercises will be provided. | |||
==Schedule== | ==Schedule== | ||
Line 21: | Line 26: | ||
|{{Hl2}} |'''Slides''' | |{{Hl2}} |'''Slides''' | ||
|- | |- | ||
| align="right" | | | align="right" | 19.04.2012 | ||
| | | Introduction | ||
| | | [[Media:ACN_01_introduction.pdf | pdf]] | ||
|- | |||
| align="right" | 26.04.2012 | |||
| Girls Day | |||
| No lecture | |||
|- | |||
| align="right" | 03.05.2012 | |||
| P2P-Networks | |||
| [[Media:ACN_02_p2p.pdf | pdf]] | |||
|- | |||
|- | |||
| align="right" | 10.05.2012 | |||
| Distributed Hash Tables | |||
| [[Media:ACN_03_DHTs.pdf | pdf]] | |||
|- | |||
| align="right" | 17.05.2012 | |||
| Christi Himmelfahrt | |||
| No lecture | |||
|- | |||
|- | |- | ||
| align="right" | | | align="right" | 24.05.2012 | ||
| | | CCN/Cloud Computing | ||
| | | [[Media:ACN_04_CCN.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 31.05.2012 | |||
| Security in P2P Networks | |||
| [[Media:ACN_05_p2psec.pdf | pdf]] | |||
|- | |- | ||
|- | |- | ||
| align="right" | | | align="right" | 07.06.2012 | ||
| | | Social Networks 1 | ||
| | | [[Media:ACN_06_osn1.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 14.06.2012 | |||
| Social Networks 2 | |||
| [[Media:ACN_06_osn2.pdf | pdf]] | |||
|- | |- | ||
| align="right" | | | align="right" | 21.06.2012 | ||
| | | Presentations | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 28.06.2012 | ||
| | | Social Networks 3 | ||
| | | [[Media:ACN_07_osn3.pdf | pdf]] | ||
|- | |- | ||
| align="right" | 05.07.2012 | |||
| Social Networks 4 | |||
| [[Media:ACN_08_osn4.pdf | pdf]] | |||
|- | |- | ||
| align="right" | | | align="right" | 12.07.2012 | ||
| | | Decentralized OSNs | ||
| | | [[Media:ACN_09_decosn.pdf | pdf]] | ||
|- | |- | ||
| align="right" | | | align="right" | 19.07.2012 | ||
| | | Oral Examination | ||
| | | | ||
|- | |- | ||
|} | |} | ||
==Presentation Topics== | |||
Register informally via email. | |||
* Security in DHT Networks (may be based on Urdaneta et al., ACM Comput. Surv., Jan. 2011, [[Media:security_survey_dhts.pdf | pdf]]) | |||
* <strike>G-COPSS: A Content Centric Communication Infrastructure for Gaming, ICDCS 2012 (A workshop paper is also available in LANMAN 2011)</strike> Alex | |||
* InDepth BitTorrent - Fairness, Superseeding, Trackerless, Extensions | |||
* <strike>The little engine(s) that could: scaling online social networks. SIGCOMM 2010. http://ccr.sigcomm.org/online/?q=node/642</strike> Sonja | |||
* <strike>An analysis of social network-based Sybil defenses. SIGCOMM 2010. http://ccr.sigcomm.org/online/?q=node/643</strike> Sabyasachi | |||
* <strike>Link Analysis and Web Search, Chapter 14 of the book. David Easley and Jon Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010.</strike> Sebastian | |||
* PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing http://gridsec.usc.edu/files/publications/TPDS-0463-1105.R2-Final-June21.pdf | |||
* <strike>On Blind Mice and the Elephant -- Understanding the Network Impact of a Large Distributed System http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p110.pdf</strike> Sromona | |||
==Presentation Style== | |||
* 20-25 min presentation and short discussion | |||
* Focus on your topic (only like 3 slides general intro) | |||
* For your audience: Assume the knowledge of a typical M.Sc. Computer Science student that attended the lecture. | |||
==Textbook== | ==Textbook== | ||
* Christian Schindelhauer and Peter Mahlmann, Peer-to-Peer Netzwerke (german) | |||
* David Easley and Jon Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010. | |||
* Mark M. Meerschaert, Mathematical Modeling (3th Edition), Elsevier Academic Press, 2007. | |||
* Rajeev Motwani and Prabhakar Raghavan, Randomized Algorithms, Cambridge University Press, 1995 | |||
== Other Resources== | == Other Resources== |