![]() |
Department for Electrical and Communications Engineering | Networking Laboratory |
This seminar addresses communications in networking environments with unusual characteristics, i.e. properties that traditional design of communication protocols has not taken into account. Such "challenged networks" may exhibit, e.g., long communication delays, unpredictable link availability, and may not even provide an end-to-end path at all. These characteristics are partly inherent to certain link layer technologies (e.g. transmission error rate in wireless networks), but mostly stem from specific communication settings and system architectures (e.g. sensor networks connecting underwater equipment or planetary orbits). We will analyze numerous challenged networking environments and their communication characteristics. We will look at novel networking architectures dealing with such specific environments and investigate routing, service, and application aspects of delay-tolerant networking.
The seminar is suitable for postgraduate studies. We will be using papers from well-known conferences, mostly 2005 and 2006. Each topic will require studying, understanding, and synthesizing three papers to present an overview of this topic area and discuss the alternative, competing, and/or complementary views on and approaches to this subject area and compare them.
The requirements for passing the course are:
The language for the seminar is English.
The course will be 3 ECTS points. The grade will be determined based upon the handout and the presentation (50% weight each). The rough grading criteria are
As a rough guideline, the following criteria will be used to assess the quality of the presentation:
The slides should be submitted digitally in PowerPoint, PostScript, or PDF. They will be made available on the course web page after the seminar presentation.
The handout is meant to enable all participants to recap the contents of each of the presentations later on. It shall be useful stand-alone, i.e. without the slides or any of primary or secondary literature used in preparation of the presentation. In essence, this means that anybody fluent in the area of networking shall be able to obtain a quick overview of the subject area just from reading the summary.
The handout should be submitted digitally as PostScript or PDF at least one week before the presentation. In particular, it needs to be available to your opponent for preparation. It will later (possibly in a revised form) be made available on the course web page. Please use IEEE Proceedings style format (two colums, point size 10 or 11).
The course will be held in two or three blocks in the afternoon to also enable participation from people not spending all of their day at TKK. The number blocks and the number of presentations per block will be adjusted depending on the participation. All course sessions will be held in the lab meeting room (D302).
23.1.2008 | 16-18 | Introduction and Topic Signup |
---|---|---|
20.2.2008 | 16-19 | Presentation slot I |
27.2.2008 | 16-19 | Presentation slot II |
Topic | Presenter | Opponent |
---|---|---|
Performance Analysis | Jarno | Matti |
Security (Frag Auth) | Kari | Shengye |
Mobility Modeling I | Varun | Jarno |
Content Distribution | Shengye | Varun |
Storage and Retrieval | Matti | Kari |
An initial set of literature for all subjects will be provided (tentatively as shown below). Further background and supporting material (if needed at all) is up to you. Note that many of the links below will only work from the TKK network.
The handouts and the presentation slides will be made available on the web prior to the seminar sessions.