Winter
2006/07

 Wireless Mesh Project Seminar
(Project Seminar 2 SWS)

Instructor: Prof. Jens-Peter Redlich
Tuesday, 13:15 - 14:45
 


Computer Science Department
Systems Architecture Group

IMPORTANT: This is a draft. The final document may differ significantly from the current version.

 
Abstract: The Systems Architecture Group is engaged in numerous projects: Berlin Roof Net, Anonymous Reputation Management for Social Network Services, and Early Warning Systems for Seismic Activities. Each of these projects requires intensive research to make progress. In this project seminar, we will identify specific problems for each project, review prior art literature, discuss our findings, and regularly report about progress made on each issue. In addition to acquiring knowledge about the technologies that are relevant for each project, seminar participants will get hands-on experience with research techniques, including literature study, project planning, and result presentation / publication.
Synopsis:
  • Project Seminar, Praktische Informatik.
  • 2h each week, over one semester (2 SWS).
  • Target Audience: Students who are interested in writing their term paper or masters thesis at the Systems Architecture Group, as well as students who want to participate in one of the current projects (1) Berlin Roof Net, (2) Anonymous Reputation Management for Social Network Services, and (3) Early Warning Systems for Seismic Activities.

Credits and grading:

There are no grades for this project seminar.
In order to obtain credits (Seminarschein), participants are expected to:

  • Attend regularly (at least 90%).
  • Contribute to discussions and implementation/experiments.
  • Research an assigned subject; present major findings (45 min presentation; 30 min discussion).
  • Presentations may be given in English or German. All documents are in English (exceptions may be granted).

Prerequisites:

  • Successful completion of PI-1,2,3; involvement in one of the group's 3 projects.

Wiki:

External Events:

SPREE: A Community-based Information Exchange Network

Date: Wednesday, October 18, 2006, 12:00-13:00
Location: T-Labs, TEL 0010 (ground floor)

Spree's objectives include realizing an innovative engine (on a [web]server) which bridges users/experts with each other for exchanging information in real-time and a user interface based on latest Ajax technologies. During the research and development of the system we will investigate advanced scalable machine learning algorithms, underlying networking problems, and usability issues. A prototype is planned to demonstrate research results and to bring both the client- and server-side implementations together.

On the logical composition of file content

Date: Friday, October 20, 11:00-12:00
Speaker: Calicrates Policroniades from Telenor R&D
Location: T-Labs, Sputnik.

This talk will address the lack of ability in the file API to exploit the advantages of gaining access to the logical composition of file content. It will mainly argue that the trade-off between efficiency and ease of programmability of persistent code in the context of the file API is unbalanced. Therefore, the speaker will present two practical strategies to disclose structure and type in file data. In the first part of his talk, it will be shown to what extent it is possible to identify specific portions of file content in diverse data sets based on data redundancy detection techniques. After that, Datom is presented, a storage system API that departs from the view of file content as a monolithic object. The Datom API discloses a judicious degree of structure and type in the logical composition of files and makes the data access semantics of applications explicit through a minimal set of commonly-used abstract data types. Finally, an implementation of the Datom API is presented and its evaluation based on different criteria such as usability, impact at the source-code level, and performance.

Security and Cooperation in Wireless Networks

Date: Monday, November 13, 10:15-12:00
Speaker: Prof. Jean-Pierre Hubaux, EPFL, Switzerland
Location: T-Labs, Sputnik.

According to most technology pundits, progress in wireless and sensor networks will lead us into a world of ubiquitous computing, in which myriads of tiny, untethered sensors and actuators will communicate with each other. Information technology will thus deliver its most encompassing and pervasive accomplishment to mankind, promptly taking care of the needs and wishes of everyone.

Or maybe not. The described evolution is driven primarily by market forces and vastly ignores the users' intentions. Yet the recent history of the Internet has shown that these intentions can have devastating effects; for example, spam, viruses, "phishing" and denial of service attacks have unfortunately become commonplace. The misbehavior of a relatively small number of users is leading to a substantial inconvenience to the whole community. Similar or even worse misdeeds are and will be perpetrated in wireless networks.

This talk addresses the fundamental questions related to this problem, in particular:

  • How are users and devices identified?
  • How can a security association be established between two wireless peers?
  • How can packets be securely and cooperatively routed in a multi-hop network?
  • How can the fair share of bandwidth between nodes located in the same radio domain be guaranteed?
  • How do wireless operators behave, if they have to share a given chunk of the spectrum?
  • How can naturally selfish players be encouraged to behave cooperatively?
  • And, above all, how is privacy protected?

'Geometry' of Resource Allocation and Load Balancing in Computing/Communication Systems

Date: Monday, January 29, 10:30-11:30
Speaker: Prof. Nicholas Bambos, Stanford University
Location: T-Labs, Sputnik.

We consider a processing system having several parallel buffers, where classes of jobs/tasks are queued up, while awaiting execution. At each point in time, the system can be set to one of several available service modes; each queue then receives service at a mode-dependent rate. Modes correspond to feasible configurations of various processing resources.

The model unifies resource allocation situations in autonomic computing, wireless transmitter power control, packet switching and various networking problems, etc. Taking a 'geometric' perspective, we discuss some new general families of algorithms, which maximize the throughput by dynamically choosing service modes in response to observed buffer backlogs.

Papers:

AufzählungPractical synchronization techniques for multi-channel MAC
AufzählungA Coordinate-Based Approach for Exploiting Temporal-Spatial Diversity in Wireless Mesh Networks
AufzählungCoverage and connectivity in three-dimensional networks
AufzählungPacket-level diversity - from theory to practice. an 802.11-based experimental investigation
AufzählungDistributed channel management in uncoordinated wireless environments
AufzählungOn the complexity of scheduling in wireless networks
AufzählungEnabling Distributed Throughput Maximization in Wireless Mesh Networks A Partitioning Approach
AufzählungComponent based channel assignment in single radio, multi-channel ad hoc networks
AufzählungAnalysis and implications of student contact patterns derived from campus schedules
AufzählungIQU: practical queue-based user association management for WLANs
AufzählungOURS. optimal unicast routing systems in non-cooperative wireless networks
AufzählungRouting algorithms for delay-insensitive and delay-sensitive applications in underwater sensor networks
AufzählungLow-cost communication for rural internet kiosks using mechanical backhaul
AufzählungOn accurate measurement of link quality in multi-hop wireless mesh networks
AufzählungLong-distance 802.11b links. performance measurements and experience
AufzählungRobust rate adaptation for 802.11 wireless networks
AufzählungFreeze-TCP
AufzählungAAA - application-aware acceleration for wireless data networks
AufzählungBroadcast capacity in multi-hop wireless networks
AufzählungXORs in the air. practical wireless network coding
AufzählungA measurement study of vehicular internet access using in situ Wi-Fi networks
AufzählungMitigating attacks on open functionality in SMS-capable cellular networks
 Links
MIT
Roof Net (home page)
Berlin Roof Net
Project Home Page
Reputation 4SNS
Project Home Page
Early Warning
Project Home Page

Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group.Contact: sar@informatik.hu-berlin.de .