Proseminar Technische Informatik
(19510b)
Typ | Seminar |
---|---|
Dozent/in | Prof. Dr.-Ing. Jochen Schiller, Prof. Dr. Matthias Wählisch |
Institution | Institute of Computer Science Freie Universität Berlin |
Semester | SS 11 |
Veranstaltungsumfang | 2 |
Leistungspunkte | 3 |
Raum | Depends on meeting date |
Beginn | 10.02.2011 | 14:00 |
Zeit |
|
Schedule
-
10.02.2011:
- Organizational Meeting - 14:00 Uhr (c.t.), room 005, Arnimallee 3
- Read the literature linked below.
-
15.04.2011:
- Very last day to choose a topic via e-mail to Matthias Wählisch.
-
15.04.2011:
- Organizational Meeting - 10:00 Uhr (c.t.), room 055, Takustr. 9
- Prepare a list of journals, conferences, workshops, as well as online databases you would use for literature research w.r.t. your assigned topic (motivate your selection)
- Slides
-
06.05.2011:
- Hand in a preliminary outline and reference list to your advisor via e-mail.
-
10.06.2011:
- Final version of your report must be handed in to your advisor and Matthias Wählisch via e-mail.
-
17.06.2011:
- Final version of your slides must be handed in to your advisor and Matthias Wählisch via e-mail.
-
24.06.2011:
- 1st Part. The seminar will take place. Attendance is mandatory.
- 9:00 Uhr (s.t.), room 053, Takustr. 9
-
29.06.2011:
- 2nd Part. The seminar will take place. Attendance is mandatory.
- 10:00 Uhr (s.t.), room 137, Takustr. 9
Attention: Students that do not meet all deadlines listed in the timetable, will lose the right to take part in the final presentation.
The talks will be given according to this schedule:
Friday, 24.6.2011, Room SR 053: | ||
Session 1: Smart Grid & Green IT | ||
09:00 - 09:30 | Johann Strama | Smart Grid |
09:30 - 10:00 | Andreas Benzon | Stuxnet - the first cyberweapon |
10:00 - 10:30 | Felix Höffken | Green IT |
10:30 - 11:00 | Break | |
Session 2: Energy Harvesting & Novel Transmission Technologies | ||
11:00 - 11:30 | Christian Damm | Energy Harvesting |
11:30 - 12:00 | Vandyshev Sergey | WiFi? Oceanic communication systems |
12:00 - 12:30 | Tobias Albig | Whats next afte UMTS? |
Wednesday, 29.6.2010, Room KR 137: | ||
Session 3: Mobile & Multipath Communication | ||
10:00 - 10:30 | Christopher Pockrandt | Processors for mobile devices |
10:30 - 11:00 | Raphael Urban | One week in the life of the iPhone's Internet traffic |
11:00 - 11:30 | Dominik Weidemann | Multipath TCP |
11:30 - 11:45 | Break | |
Session 4: Inter-Vehicular Communication & Stochastic Petri Nets | ||
11:45 - 12:15 | Daniel Lopez | Inter-Vehicular Communication Sytems |
12:15 - 12:45 | Christoph Krüger | Introduction to Stochastic Petri Nets |
Conclusion | ||
12:45 - 13:00 | Matthias Wählisch | Summary |
Topics
Advisor: Stephan Adler
Stuxnet - the first cyberweapon?
Assigned to: Andreas Benzin (report, slides)
Energy harvesting - new approaches.
Assigned to: Christian Damm (report, slides)
Underwater WiFi? Oceanic communication systems.
Assigned to: Vandyshev Sergey (report, slides)
Advisor: Bastian Blywis
Naturinspirierte Algorithmen für Netzwerke
Assigned to: Sascha Gennrich
Advisor: Zakaria Kasmi
Fahrer-Assistenz-Systeme
Autos können ein WSN bilden, das die Autofahrer mit Verkehrsinformationen versorgen kann. Es können folgende Informationen ausgetauscht werden: Stau-, Unfallstellen-, Baustellenort. Es muss untersucht, ob es solche Systeme gibt und eventuell verglichen werden.
Assigned to: Daniel Lopez (report, slides)
Bewegungserkennung/Rehabilitation-System
Ein Sensornetz kann durch verteiltes Rechnen Bewegungen erkennen und melden. Ziel dieser Arbeit ist zu untersuchen, ob es Systeme im medizinischen Bereich gibt. Die für die Rehabilitation von Patienten eigesetzt werden. Es sollen mehrere Systeme gefunden werden und miteinander verglichen werden.
Assigned to: TBA
Advisor: Philipp Reinecke
Introduction to Discrete-Event Simulation
Discrete-event simulation is used in many incarnations throughout various research disciplines. Describe the fundamental assumptions and basic technology of a discrete-event simulator.
Assigned to: TBA
OMNeT++ vs. TimeNET
OMNeT++ is a discrete-event simulator, while TimeNET is a Petri net tool. Both are used in the evaluation of systems. Describe the tools, their respective application areas, and discuss their advantages and disadvantages for answering specific questions.
Assigned to: TBA
Introduction to Measurement Tools
Various tools exist to perform measurements in real systems and testbeds. Provide an overview of these, paying particular attention to the specific metrics that can be obtained and the application areas the tools are most suited to.
Assigned to: TBA
Introduction to Stochastic Petri Nets (SPNs)
Stochastic Petri nets are a common tool in performance, dependability, and performability modelling and evaluation. Introduce the basic concepts of the formalism, the underlying math, and suitable application areas.
Assigned to: Christoph Krüger (report, slides)
Basics of Performability Analysis
Meyer et al. have developed performability analysis as a framework for analysing the performance of degradable systems. Present an introduction to the basic framework and illustrate its application.
Assigned to: TBA
Advisor: Sebastian Trapp
Neue Bedrohungen - Welche Gefahren drohen Handhelds
Assigned to: TBA
One week in the life of the iPhone's Internet Traffic
Assigned to: Raphael Urban (report, slides)
Advisor: Jochen Schiller
Whats next after UMTS?
Evaluate and compare the new upcoming mobile phone standards LTE and LTE advanced with respect to their coverage, basic technologies, data rates, infrastructure etc.
Assigned to: Tobias Albig (report, slides)
What drives mobile devices?
Evaluate and compare operating systems for mobile devices, e.g. iOS, Android, Windows Mobile and their respective market place for applications.
Assigned to: Nicolas Patzelt
How vulnerable is my mobile phone?
Today’s mobile phones are low-power PCs with operating system, lots of applications etc. This also brings up the dangers of viruses, Trojan horses, malware, exploits, etc. How big is the danger? How does this affect privacy?
Assigned to: Jeremy Schelske
Processors for mobile devices
Evaluate and compare typical processors for mobile devices, such as tablets, mobile phones. What are the differences to PC CPUs, what are the trends?
Assigned to: Christopher Pockrandt (report, slides)
Real deployments of wireless sensor networks
Researchers discuss WSNs since more than 10 years. However, only very few real installations run longer than needed for simple experiments. Which big WSNs do really exist in the wild? What are the main challenges?
Assigned to: TBA
Spectrum reuse
Spectrum for wireless communication is rare – is it really or just artificially limited by legacy systems and politics? Discuss spectrum use today and tomorrow with respect to cognitive radios, software defined radios etc.
Assigned to: TBA
Smart Grid
The Smart Grid is an initiative that has the goal of achieving the modernization and optimization of the power grid so that it is more reliable, efficient, secure, and environmentally neutral. Discuss the Smart Grid and show communications aspects related to the Smart Grid initiative.
Assigned to: Johann Strama (report, slides)
Green IT
Yet another buzzword or really an initiative to make IT more resource friendly? Today, IT makes a major contribution to the power consumption of industries but also private homes. How does Green IT attack this issue?
Assigned to: Felix Höffken (report, slides)
Internet of Things revisited
Announced many years ago the IoT should change our everyday’s live. Today, we see some aspects of it while most of the promises and ideas never really took of. However, IoT is currently being discussed up to IoNanoThings… Evaluate and give a realistic picture of these ideas.
Assigned to: TBA
Advisor: Matthias Wählisch
VLAN-Induced sharing in Campus Network
Virtual LANs (VLANs) allows to create logical broadcast domains on switches. They provide flexibilty to separate networks. However, they introduce complexity with respect to the IP network on top. Based on a recently published measurement study at ACM IMC 2009, you should provide insights into "Characterizing VLAN-Induced Sharing in a Campus Network". How could you infer a layer-2 topology? How does the layer-2 topology depend on the IP network? What are the implications for network management tasks (e.g., planning for capacity or reliability)?
Assigned to: Dominik Weidemann (report, slides)
Towards a better understanding of BGP with C-BGP
The Border Gateway Protocol (BGP) is the de facto standard for dynamic Internet backbone routing. BGP routes used for data forwarding are selected based on a complex decision process that is defined by the protocol. Analysing, understanding, and enhancing the routing between Internet domains (e.g., different ISPs), thus, require not only a substantiated knowledge about BGP, but also tools to emulate BGP internals. C-BGP is aimed at computing the outcome of the BGP decision process in networks composed of several routers. It can be used as a research tool to experiment with modified decision processes and additional BGP route attributes. The goal of this work is to get familiar with BGP and to give an introduction about C-BGP. What are the great ideas and the limits of this software. You are highly encouraged to conduct practical tests.
Assigned to: Maximilian Krüger
Visualizing the Internet
The Internet can be modelled as a graph. Nodes may be represented by IP prefixes, Autonomous System numbers, or routers. Visualizing a network with the size of the Internet is an intricate task with respect to processing time and memory constraints, as well as a clear arrangement of the provided information. This work should analyze existing visualization projects and discuss their techniques to create a graphical representation of the Internet. Are there any other approaches in addition to a pure graph layout? Which data can be extracted from Internet measurements and used for visualization? Some of the existing tools are freely available, and you are encouraged to test some of them.
Assigned to: TBA
Advisor: Marco Ziegert
Autonomous Monitoring of Animal Behavior with Wireless Sensor Networks
Remotely monitoring animal behavior with Wireless Sensor Nodes without harming or disturbing them in their habitats eases gathering data and improves research results. Evaluate different approaches used by real deployments.
Assigned to: TBA
Literature
- Writing a good introduction by Jim Kurose (it may help as guideline)
- See AG CST Links on Technical Writing.