Seminar on Internet Technologies (Summer 2016): Difference between revisions

Jump to navigation Jump to search
 
(32 intermediate revisions by 7 users not shown)
Line 2: Line 2:


{{Announcement|Note:  
{{Announcement|Note:  
Please check the topic availability and register for the course with the topic supervisors directly via sending emails.}}
Please directly submit the report to your topic supervisor before 1st Oct. 2016!
 
For any general questions or grading issue, please contact Dr. Mayutan Arumaithurai.}}


{{CourseDetails
{{CourseDetails
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS)
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS)
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|lecturer=[http://www.net.informatik.uni-goettingen.de/people/xu_chen Dr. Xu Chen]
|lecturer=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Dr. Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/xu_chen Dr. Xu Chen]
|ta=[None]
|ta=[None]
|time=April 14, 16:00ct: Introduction Meeting
|time=April 14, 16:00ct: Introduction Meeting
Line 30: Line 32:


==Schedule==
==Schedule==
* '''April 29, 16:00ct''': Informational meeting  
* '''April 14, 16:00ct''': Introduction meeting  
* '''Aug. 04, 2016''' : Deadline for registration
* '''Aug. 04, 2016''' : Deadline for registration
* '''Aug. 11, 2016''' : Presentations
* '''Aug. 11&12, 2016''' : Presentations
* '''Sept. 30, 2016, 23:59''': Deadline for submission of report (should be sent to the topic adviser!)
* '''Sept. 30, 2016, 23:59''': Deadline for submission of report (should be sent to the topic adviser!)


==Final Presentation==
==Final Presentation==
To be determined
 
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Time Slot (August 11, 2016)'''
|{{Hl2}} |'''Student'''
|{{Hl2}} |'''Advisor'''
|-
| 2:00PM -- 2:30PM
| Md. Khalilur Rahman Khan
| Tao Zhao
|-
| 2:30PM -- 3:00PM
| Chencheng Liang
| Hong Huang
|-
| 3:00PM -- 3:30PM
| Alireza Amiri
| Osamah
|-
| 3:30PM -- 4:00PM
| Mohammad Sahihi Benis
| Osamah
|-
| 4:00PM -- 4:30PM
| Vidya Mohan Sathya
| Tao Zhao
|}
 
 
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Time Slot (August 12, 2016)'''
|{{Hl2}} |'''Student'''
|{{Hl2}} |'''Advisor'''
|-
| 10:00AM -- 10:30AM
| Rafail Ismayilov
| Sripriya
|-
| 10:30AM -- 11:00AM
| Tayyebe Emadinia
| Mayutan
|-
 
|}


== Topics ==
== Topics ==
Line 73: Line 119:


|-
|-
| '''What is the current status and future of cloud related research? What are the main research problems that are currently being targeted?  (assigned to Imaad Mohamed Khan)'''   
| '''What is the current status and future of cloud related research? What are the main research problems that are currently being targeted?  (assigned to Imaad Mohamed Khan (he quit mid-way))'''   
Cloud computing and cloud based services have become an integral part of the Internet. The aim of this work is to study what research problems exist and also identify promising solutions. Topics pertaining to Data Centers are also of relevance.  
Cloud computing and cloud based services have become an integral part of the Internet. The aim of this work is to study what research problems exist and also identify promising solutions. Topics pertaining to Data Centers are also of relevance.  
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
| [http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Mayutan Arumaithurai]
Line 83: Line 129:
| [https://deepmind.com/alpha-go.html]
| [https://deepmind.com/alpha-go.html]
|-
|-
| '''Web Scraping and  Anti-Scraping Technique (assigned to )'''   
| '''Web Scraping and  Anti-Scraping Technique (assigned to Chencheng Liang)'''   
A scraper site is a website that copies content from other websites using web scraping. The purpose of creating such a site can be to earn revenue, usually through advertising and sometimes by selling data. Scraper sites come in various forms, ranging from spammy content sites, to price aggregation and shopping sites, and also web search engines such as Yahoo and online maps such as Google Maps.
A scraper site is a website that copies content from other websites using web scraping. The purpose of creating such a site can be to earn revenue, usually through advertising and sometimes by selling data. Scraper sites come in various forms, ranging from spammy content sites, to price aggregation and shopping sites, and also web search engines such as Yahoo and online maps such as Google Maps.
| [https://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang ]
| [https://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang ]
Line 121: Line 167:
|-
|-


|'''Challenges and Opportunities in the Cloud - A survey '''
|'''Challenges and Opportunities in the Cloud - A survey (assigned to Christian Aschenbrenner)'''


Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof.  
Focus of this topic is to study the advancements that have happened over the last decade in Virtualization and Cloud computing. Develop an understanding towards the needs of Datacenter and Cloud computing service models, identify the challenges with Virtualization/VM's in Datacenter/Cloud and address some opportunistic prospects thereof.  
Line 129: Line 175:
|-
|-


| '''Caching mechanisms in ICN-A survey'''
| '''Caching mechanisms in ICN-A survey (assigned to Abdul Hadi)'''
As one key feature of ICN, in-network caching receives widespread research interest. where are the data copy need to be cached, and how to process the replacement problem become the key to improve ICN performance.
As one key feature of ICN, in-network caching receives widespread research interest. where are the data copy need to be cached, and how to process the replacement problem become the key to improve ICN performance.
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li]
| [http://www.net.informatik.uni-goettingen.de/people/jie_li Jie Li]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6883812] [https://www.ee.ucl.ac.uk/~gpavlou/Publications/Conference-papers/Chai-12a.pdf]
| [http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6883812] [https://www.ee.ucl.ac.uk/~gpavlou/Publications/Conference-papers/Chai-12a.pdf]
|-
|-
|'''Scalable routing in ICN -A survey '''
|'''Scalable routing in ICN -A survey (assigned to  Kalita Bhabajeet)'''


Routing scalability is a great challenge for ICN's feasibility. How to manage the huge namespace of ICN in a limited FIB without much effect on routing efficiency has drawn more and more attention.
Routing scalability is a great challenge for ICN's feasibility. How to manage the huge namespace of ICN in a limited FIB without much effect on routing efficiency has drawn more and more attention.
Line 142: Line 188:
|-
|-


|'''Urban Sensing Using Mobile Phone Network Data -A survey (assigned to Dorna Amiri) '''
|'''Urban Sensing Using Mobile Phone Network Data -A survey (assigned to Khan, Md. Khalilur Rahman)'''


The recent development of telecommunication networks is producing an unprecedented wealth of information. Mobile phone datasets offer access to insights into urban dynamics
The recent development of telecommunication networks is producing an unprecedented wealth of information. Mobile phone datasets offer access to insights into urban dynamics
Line 160: Line 206:




|'''Application of Packet Sampling in Computer Security - A Survey'''
|'''Application of Packet Sampling in Computer Security - A Survey (assigned to Sudhir Kumar Sah)'''  


Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?   
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?  
   
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [http://www.sflow.org/packetSamplingBasics/]
| [http://www.sflow.org/packetSamplingBasics/]
Line 169: Line 216:
|-
|-


|'''Game theory based solutions in Computer Network Security - A Survey'''
|'''Game theory based solutions in Computer Network Security - A Survey (assigned to  Florian Pätzold) '''  


Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.   
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.   
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [https://en.wikipedia.org/wiki/Game_theory]
| [https://en.wikipedia.org/wiki/Game_theory]
Line 206: Line 254:


Hints for preparing the presentation:
Hints for preparing the presentation:
* 20 minutes are too short to present a topic fully.
20 minutes are too short to present a topic fully.
* It is alright to focus just on one certain important aspect.
It is alright to focus just on one certain important aspect.
* Limit the introduction of basics (5 min.).
Limit the introduction of basics.
* Make sure to finish in time.
Make sure to finish in time.


Suggestions for preparing the slides:
Suggestions for preparing the slides:
* No more than 20 pages/slides.
No more than 20 pages/slides.
* Get your audiences to quickly understand the general idea.
Get your audiences to quickly understand the general idea.
* Figures, tables and animations are better than sentences.
Figures, tables and animations are better than sentences.
* Summary of the topic: thinking in your own words.
Summary of the topic: thinking in your own words.


=== 5. Write your report ===
=== 5. Write your report ===
229

edits

Navigation menu