Nodes Research Methodologies
Year | Semester | Date | Period | Language | In charge |
---|---|---|---|---|---|
2013 | spring | 11.03-26.04. | 4-4 | English | Lea Kutvonen |
Lectures
Time | Room | Lecturer | Date |
---|---|---|---|
Thu 10-12 | D122 | Lea Kutvonen | 11.03.2013-26.04.2013 |
Information for international students
Overview
The NODES research group coordinates the various research groups at the Department of Computer Science on the area of Networking and services. The NODES group interestes range from the effective organisation of Internet protocols and wireless communication to the new challenges of globally interoperating business services. The focus areas are networked systems and their enablers: interoperability (e.g., service and software platforms, interoperability management, contracting, trust management, privacy), mobility (technology and location independence, wireless computing), information networks, service networks, context awareness and ubiquitous computing. The group combines the departmental tradition of wireless and mobile computing to new research themes. The focus of the group has been extending for the last years from platform protocols to solving application layer challenges.
Schedule (subject to changes!)
-
Thu 14.3. 2013 Opening and overview
-
Lea Kutvonen: Opening
- Organisation of the course, method of passing the course
- Research process and categories of results and research methods
- Communication on research
-
NODES Research group introductions (area of study, research goals, research methods, highlights)
- Collaborative and Interoperable Computing (CINCO) (presented, slides)
- Collaborative Networking (CoNe) (to be presented, slides)
- Content-centric structures and networking (COSN) (presented, slides)
- Interactive Systems (presented, slides)
- Wireless Internet (WInt) (presented, slides)
- Secure Systems (presented, slides)
- Research assets: NODES Lab (presented, slides)
- This weeks exercise: find your favourite of the NODES research groups by studying their web pages. Use the google form here for submitting your responses. Exercise responses / cumulative learning diary entries are to be submitted each week separately, by the next meeting start time (as some solutions may be opened at the next session).
-
Lea Kutvonen: Opening
-
Thu 21.3. 2013
- We complete the overviews of the remaining research groups
- N. Asokan: Methodologies for designing secure systems
- Exercise of the week (learning diary entry, to be sent to Lea by email or through this weeks google form here) is expressed as a quiz on slide 24 in Asokan's slides above. Exercise responses / cumulative learning diary entries are to be submitted each week separately, by the next meeting start time (as some solutions may be opened at the next session).
-
Hint: El Gamal is not CCA-secure. Try to construct an adversary A who modifies c and c' to get a c'' in such a way that when he gets back its decryption m'' he can figure out if c was an encryption of m_0 or m_1
-
Thu 28.3. 2013 - Easter break
- .
-
Thu 4.4. 2013
- Toni Ruokolainen: Use of formal methods in distributed systems construction and analysis
- Teemu Kerola: Queuing networks
- Assignment for the cumulative learning diary entries:
- a) For what kind of research questions each of these techniques is applicable?
- b) What prequisite skills you need to obtain to successfully utilise these techniques? (e.g., parts of statistics ...)
- Please send any pending learning diaries by email to Lea as most of you have already done so.
-
Thu 11.4. 2013
- Markku Kojo: Protocol performance measurements
- Laila Daniel: Mathematical modeling and ns2-simulator
- Petri Savolainen: Simulation
- Learning diary entry: Consider the essential elements that you need to take into consideration when planning and doing performance measurements. Send learning diaries by email to Lea.
-
Thu 18.4. 2013
- Ilkka Kosunen, Giulio Jacucci: User and Interaction Research Methods (Ethnographic Field trials, qualitative and quantitative methods, Experiment Design in HCI)
-
Introduction of the discussion group topics for the course roundup and group formation
- To do preferrably today: Go to the shared, openly accessible google documents page, a) sign up with one of the groups for the next session b) add your suggestions for additional discussion topics, or detailed questions for the presenters on the course
-
Learning diary entry question for this week:
- What is the difference between qualitative and quantitative research? Why this differentiation is relevant in this context? What category the presented research belongs to why?
- will sqeeze the slides here after the lecture ...
- Opened the group discussions (groups 1,2,4 were active)
-
Thu 25.4. 2013 Discussion groups
-
Liang Wang: Emulation
-
Discussion topics and groups
- To do days before the session: Go to the shared, openly accessible google documents page, a) sign up with one of the groups for the next session b) add your suggestions for additional discussion topics, or detailed questions for the presenters on the course.
-
Results from the group work:
- group presents (a few minutes) the findings and opinions from the group discussion to the class, and we have a few minutes discussion at these reports;
-
joint learning diary entry from each of the groups (use the shared areas provided); deadline 7 days after the last session)
- Discussion 1: Processes around publications, journals and conferences, scientific organisations
-
Discussion 2: Challenges in applying standard research methods in adversarial settings
- Standard research methods for evaluating a system implicitly assume benign settings: i.e., failures or faults occur by accident and not intentionally. These may not work equally well in an adversarial setting, where an attacker is deliberately trying to circumvent the system. Think about some evaluation method you are familiar with (e.g., something you used or plan to use in your thesis) and see if it would perform differently if you consider an adversarial setting. (Further hints available on request)
-
Discussion 3: On network performance evaluation
- Consider the aspects that you need to take into account if your task is to compare the network performance of two Web browsers for typical web browsing. Try to list everything that may affect the performance and consider also tradeoffs with different alternatives you need to select in between. That is, do an initial planning for such a performance evaluation.
-
Discussion 4: On formal methods
-
Based on the paper
- Critical view: Ralf Kneuper, Limits of Formal Methods. Formal aspects of computing (1997) 3:1-000,
- discuss the question settings that are not appropriate for being studied on formal methods alone. What kind of methods would you combine with formal methods, or replace formal methods with, in such cases.
-
Based on the paper
-
Discussion 5: Massive scalability for Internet services
- Consider strategies for addressing Internet service scalability. A service needs to cope with flash crowds, sudden arrival of many clients, and incremental growth. In the former, the service temporarily requires more servers and network capacity. In the latter, the number of servers and network capacity need to be increased incrementally to meet with the demand. Important points include the runtime addition and removal of servers, server placement, and network utilization. How would you design and evaluate such a system to ensure that the system works with the anticipated workload (number of clients, usage patterns).
-
Discussion topics and groups
-
Liang Wang: Emulation
Materials and links (under construction)
- S. Keshav. How to Read a Paper. ACM SIGCOMM Computer Communication Review. Volume 37, Number 3, July 2007. http://ccr.sigcomm.org/online/files/p83-keshavA.pdf
- William Strunk Jr. and E. B. White. The Elements of Style. Longman, 4th edition, 2000.
Simulation Studies
- K. Pawlikowski et al. On Credibility of Simulation Studies of Telecommunication Networks. IEEE Communications Magazine, January 2002. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=978060&tag=1
- I. Stojmenovic. Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions. IEEE Communications Magazine. December 2008. http://www.site.uottawa.ca/~ivan/Simulations-CM.pdf
Wireless Experiments
- C. Tala et al. Guidelines for the accurate design of empirical studies in wireless networks. Tridentcom 2011. http://www-sop.inria.fr/members/Thierry.Turletti/tridentcom11.pdf
Secure systems
- Supplementary material for the lecture: Ivan Damgård, "A proof-reading" of some issues in Cryptography" http://www.daimi.au.dk/~ivan/positionpaper.pdf
- Pointers for further study - verification tools for security protocols:
Formal methods
- paper suggested on the slides
- Ralf Kneuper, Limits of Formal Methods. Formal aspects of computing (1997) 3:1-000.
User and Interaction Research Methods
Text book:
Rogers, Y., Sharp, H., & Preece, J. (2011). Interaction Design: Beyond Human Computer Interaction.
Queuing networks
- Read the introduction from the book mentioned below at: http://homes.cs.washington.edu/~lazowska/qsp/Images/Chap_01.pdf
Books:
- Edward D. Lazowska, John Zahorjan, G. Scott Graham , Kenneth C. Sevcik Quantitative System Performance: Computer System Analysis Using Queueing Network Models (available at http://homes.cs.washington.edu/~lazowska/qsp/)
- R. Jain, The Art of Computer System Performance: Analysis, Techniques for Experimental Design, Measurement, Simulation and Modeling, Wiley, New York, 1991. Lawrence W. Dowdy, Virgilio A.F. Almeida: Performance by Design: Computer Capacity Planning By Example, Prentice Hall, 1994
- Daniel A. Menasce,Lawrence W. Dowdy, Virgilio A.F. Almeida: Performance by Design: Computer Capacity Planning By Example, Prentice Hall, 1994