Assigned: Thursday, February 28, 2013
Due: Tuesday, April 25, 2013 before class starts
The main purpose of this assignment is to introduce you to hot topics in networking that we don’t have time to cover during the semester. For CS 555 students, this assignment will also require that you prepare and deliver a class presentation on your topic.
Assignment
You may choose from the following broad topics or suggest your own (to be approved by Dr. Weigle):
- Peer-to-Peer Applications
- Distributed Hash Tables
- IPv6
- BGP (Border Gateway Protocol)
- MPLS (Multiprotocol Label Switching)
- Bluetooth
- Cellular Internet Access
- LTE
- Mobility in Cellular Networks
- Multimedia Networking
- Dynamic Adaptive Streaming over HTTP (DASH)
|
- Voice over IP (VOIP)
- PGP (Pretty Good Privacy)
- SSL
- IPsec
- Securing Wireless LANs (WEP)
- Intrusion Detection Systems
- Simple Network Management Protocol (SNMP)
- Cloud Computing
- IP Traceback
- DNS Attacks
|
Your assignment is to write a report on one of these topics in your own words. You are expected to choose at least two articles for reference. (Many of these items are introduced or covered in our textbook, so that might be a good place to start. The textbook can count as one of your two required references.) Each article should be read, understood, and related with concepts discussed in class. In particular, look for articles that describe the real-world impact of the topic.
In the report, you should summarize what you have learned from the articles. Instead of providing a separate summary for each article that you have read, you should provide a single summary that integrates the concepts of each of the articles in a unified manner. Make sure to give background and describe the topic well enough that your summary of the articles can be understood.
It is not acceptable to reproduce sentences or paragraphs from the articles (even if you change a word or two in each sentence). Plagiarism will result in a grade of 0. See the "First Day Admin" lecture notes for more details on what I mean by plagiarism and ask if you have questions.
You must provide complete references to all referred articles (including URLs if the articles were found online). In addition to references to your main articles, provide references for any background information that you include and found somewhere other than the main articles.
Format
- Double-spaced, 1-inch margins, 4-6 pages (CS 455), 6-8 pages (CS 555)
- These page ranges represent the minimum and maximum. Do not include a title page or table of contents and do not put references on a separate page. References do not count in the page requirements (e.g., you must have at least 4 full pages of text for CS 455).
- 12-point font (either Arial, Helvetica, or Times New Roman)
- Instead of a title page, just put the title of your paper, your name, and either "CS 455, Spring 2013" or "CS 555, Spring 2013" at the top of the first page. See this short paper for an example. added 3/5/13 -MCW
- Include section headings and subsection headings. You must include Introduction, Conclusion, References, as well as other appropriate headings (such as Background, Problem, Approach, etc.). See this short paper for an example of the what I mean by section and subsection headings. edited 3/5/13 -MCW
- Format for References Section:
Authors’ names. Article Name. Magazine Name, vol. Volume, no. Number, (Month Year), pp. Pages.
Examples:
- Fall, K. and S. McCanne. You Don't Know Jack About Network Performance. ACM Queue, vol. 3, no. 4, (May 2005), pp. 54-59.
- Millman, R. Hackers take axe to Internet root servers. PC Pro News, (Feb 7, 2007), http://www.pcpro.co.uk/news/enterprise/104024/hackers-take-axe-to-internet-root-servers, accessed Mar 1, 2011.
- Kurose, J. and K. Ross. Computer Networking: A Top-Down Approach, 6th ed. Pearson, 2012. added 3/5/13 -MCW
- Format for Citing Inside the Paper: (Authors’ Last Names, Year)
Example: (Fall and McCanne, 2005)
Example for more than 3 authors: (Fall et al., 2005) added 3/5/13 -MCW
- Failure to follow the formatting guidelines will result in loss of points.
Resources
The campus library (http://www.lib.odu.edu/researchresources/databases/MandCS/index.htm), Magazines at ACM Digital Library, Magazines at IEEE Xplore, and the public libraries are good sources for trade journals. I also have a selection of Communications of the ACM, IEEE Spectrum, and IEEE Communications issues in my office. You’re welcome to come by during office hours and take a look at them.
You may use research papers, but I would encourage you to focus most of your reading on trade journals and magazines. At this level, we're interested in how these technologies are actually being (or soon will be) used.
Note that wikipedia is not an acceptable primary resource. You may use it for background information, but it does not count as one of your two required articles.
Milestones/Deadlines
- Mar 21 – topic chosen, papers selected
- The same topic may be chosen by multiple students.
- Send me an email with the subject “CS 455/555 – topic” to register your paper topic. The email must contain your topic and the citations of the articles you plan to use.
- Apr 4 – outline of paper - no submission requirement
- Apr 4 - CS 555 presentation group formed and topic chosen
- Send me an email with the subject "CS 555 - group" to register your group and topic.
- Apr 11 – first draft - no submission requirement
- Apr 25 – final version
Submission
Submit a hard-copy in class on the due date and submit an electronic version (PDF preferred) on Blackboard.
Paper Topic List
CS 455
- Calderon - LTE
- Cortina - VoIP
- Dailey - VoIP
- Goldberg - LTE
- Korgan - P2P Applications
- Matson - DNS Attacks
- Moss - IPv6
- Pierce - Cellular Internet Access
- Siegel - PGP
- Sims - IPv6
- Sufyani - SSL
- Vanderclay - DNS Attacks
CS 555
- Bokka - IPv6
- Burch - Multimedia Networking
- Chhura - DoS Attacks
- Creque - P2P Applications
- Diep - LTE
- Gervais - IPv6
- Ghazizadeh - Cloud Computing
- Govindarajulu - IPv6
- Guntaka - IP Traceback
- Jagarlapudi - Cloud Computing
- Jones - Network Intrusion Detection Systems
- Kolichelimi - IP Traceback
- Konduru - SSL
- Kriebel - DNS Attacks
- Kshirsagar - VoIP
- Owens - PGP
- Pitts - BitTorrent
- Putta - IPv6
- Swayne - Cellular Internet
- Walden - BGP
- Werner - BitTorrent
- Yarlagadda - IPv6
- Zeng - Network Intrusion Detection Systems
CS 555
Group Presentation
In addition to the paper, you must prepare a 10-minute lecture-style presentation on your topic. The idea is to teach your fellow students something. Presentations will be held on the following days (order of presenters will be chosen at random, but you should be prepared to
present on the first day of presentations):
- Thursday, April 18
- Tuesday, April 23
- Thursday, April 25
Because of the large number of CS 555 students this semester, presentations will be prepared and presented by groups of 2. Both group members must participate in the class presentation. The group members can decide which of the two topics to present. You may choose your own group, but there will be only one 1-person group. If you have a strong reason why you should be allowed to be the 1-person group, send me an email, and I will make a decision. Do not assume you will get the 1-person group assignment.
Although paper topics can be repeated by multiple students, presentation topics must be unique (i.e., only one presentation per topic). If your topic is popular, it might be useful to pair up with someone who has chosen the same topic. (I'll post a list of topics on this webpage.)
Presentation List
- Bokka/Konduru - SSL - Apr 25
- Burch/Gervais - Multimedia Networking - Apr 18
- Chhura/Kriebel - DNS Attacks - Apr 23
- Creque/Owens - PGP - Apr 25
- Diep/Swayne - Mobile Networks and LTE - Apr 18
- Ghazizadeh/Jagarlapudi - Cloud Computing - Apr 25
- Govindarajulu/Kshirsagar - VoIP - Apr 23
- Guntaka/Kolichelimi - IP Traceback - Apr 23
- Jones/Zeng - Network Intrusion Detection Systems - Apr 18
- Pitts/Werner - BitTorrent - Apr 18
- Putta/Yarlagadda - IPv6 - Apr 23
- Walden - BGP - Apr 25
Advice on Giving Presentations
Specific to CS 555
- 10-minute time limit - cover only the essential information, consider your audience
- lecture-style - goal is to teach your fellow students something
Slides
- First slide should always contain your title, your name, and your affiliation (ODU)
- Have an outline at the beginning and a summary at the end
- “Tell them what you’ll tell them, then tell them, then tell ‘em what you’ve told them”
- Proof-read your slides
- Check consistency in capitalization and font usage
- Keep slides clean and simple
- don’t use too many different fonts or colors
- don’t use distracting backgrounds
Content
- Consider the audience
- What’s the story you want to tell?
- what do you want the audience to walk away knowing?
- Keep in mind your time limit
- Don’t get bogged down in the details
- Start with motivation
- why is this topic important?
- Include helpful figures and illustrations.
- if you use a figure from another source, give attribution (author, paper title, year).
- Include enough background material that your audience will be able to follow your talk.
Delivery
- Practice! Practice! Practice!
- Having notes may be helpful, but don’t write out the entire talk
- Don’t try to memorize your talk
- Speak clearly and slowly
- Face the audience
More Presentation Tips