You should select a presentation topic of your choice.
There are some requirements and
A presentation should be approximately 25 minutes without interrupting
questions. (There may be unexpected clarification-type questions.)
You should manange your time well during your talk.
You will get penalty if your talk is too short or too long.
There will be 5 minutes for questions and answers after your talk.
Suggested Presentation Topics
The following is a list of suggested topics to give
students broad exposure on operating systems and networking technology.
More emphasis is given to practical aspects of system design,
implementation and operation than cutting-edge research issues.
The topics are grouped in the following areas:
- Linux boot process
- Linux file system layout
- Linux TCP/IP stack
- Kernel modules and device drivers
- Cross-platform development for embedded systems
- Embedded Linux: kernel and filesystem
- IP address topics (classes, subnets, NAT, DHCP, etc.)
- Interior routing protocols (RIP, OSPF, etc.)
- Border gateway protocol (BGP)
- BGP route oscillation
- TCP flow behavior
- Domain name system (DNS)
- Network debugging and management (SNMP)
- Network time protocol (NTP)
- Distributed Denial of Service (DDoS) -
(proactive defense only; also, please note that IP Traceback is
no longer an approved topic)
- OS fingerprinting
- Intrusion Detection
- Wireless Networks
- Overview of wireless LAN - IEEE 802.11
- IEEE 802.11 security
- IEEE 802.11 mesh networks
- IEEE 802.15.4 and Zigbee
- Ad hoc routing protocols
- Sensor Networks
- Overview of wireless sensor networks
- Operating systems for sensor networks
- Sensor network programming
- MAC protocols for sensor networks
- Routing in sensor networks
- Please do not present something that was presented as course
material in another class
(such as CS 530, CS 551, CS 555, CS 558L, CS 694a/b, etc.)
If you did a paper in another class, but you did not give a
talk about it, then this restriction does not apply.
- Please do not base your presentation on something that was published
long time ago. Your main reference should be published within the
past 10 years.
- In general, please do not present a very high level system description paper
and give a laundry list of system features or buzzwords (unless you can
make it very, very interesting).
You need to present something with some technical depth
(e.g., describe algorithms/protocols and present evaluations/studies of
- In general, please do not present a very low level system description paper
and give a laundry list of system details (unless you can
make it very, very interesting).
You need to present something interesting.
You should prepare your presentation slides and send them to
me via email at least two days before your presentation.
(Please do not send .pptx files.)
I will go over your slides, and may suggest some changes.
You should send me your final version before your talk.
If you don't send me your slides for comments before your talk,
you don't directly lose points.
However, you will be at the risk of missing important points
in your presentation, which will result in a lower score.
Please note that PowerPoint/PDF slides may be available
from some authors' web sites. You must avoid committing
plagiarism when you create your slides! Please refer to
the Academic Integrity policy
of this class. Please make sure that you come up with your
own slides! If you need to copy from other people's slides,
please cite is properly (e.g., "this figure is copied from Figure 5
of reference ").
Your slides should look professional and visually consistent.
(You do not need a lot of fancy graphics.)
Please make sure to include your main references by giving
full citation information in your slides.
After you have given your presentation, you must send the slides
you used for your talk to the instructor to be posted on the
lectures web page. The only acceptable
formats are PowerPoint (.ppt, please do not send .pptx)
and PDF only.
Here are some tips for preparing your slides and giving your talk:
Here is a list of other advice on the presentations:
- Cover all important concepts and ideas and ignore unimportant
details. This is the key to keep your talk within 30 minutes.
- If present multiple papers, try to present them in a systematic
way by adding your own comments and summay that connect
different papers together.
- Use examples effectively to clarify ideas that are not straightforward.
- Each slide should have a point. Details are used to support
the point rather than burying it.
- Do not steal slides posted to the Web by others!
You may use some materials (e.g. pictures), but you should
acknowledge the source in your slides (e.g. in a footnote).
- Put page numbers on slides, so that people can easily refer to them.
- You should have about 25 slides.
- Do not speak too fast even if you can cover more contents.
Your audience need a little time to think and follow your talk.
- You should rehearse your talk beforehand.
You should send your presentation topic selection to the instructor
via a text e-mail to the instructor
by 11:45pm, 9/15/2010.
In your e-mail, you should list the following:
Please note that
you get no points for submitting the presentation topic selection email,
but you will get a 25% deduction if you do not submit the email
with a qualified primary reference
by the presentation topic selection deadline.
- tentative title of your talk
- brief topic description (a few sentenses; should not be more than
- which published paper you will base your presentation on (with
full citation information).
(Please do not send the actual paper, just the citation.)
After you have submitted your presentation topic selection,
it is possible that the primary paper you have chosen does not
satisfy the requirements. In this
case, you have up to one week before your talk to nail down
a primary paper that satisfies the requirements. If you fail to do so,
you will get a 25% deduction off of your presentation score.
Once someone has selected a primary paper,
you may not use the same paper as your primary paper.
Below are the primary papers that have been approved by the instructor:
- J. Newsome, B. Karp, and D. Song.
Polygraph: automatically generating signatures for polymorphic Worms.
IEEE Symposium on Security and Privacy,
(Allan George <firstname.lastname@example.org> will present.)
- F. Ye, G. Zhong, S. Lu, and L. Zhang.
GRAdient Broadcast: A Robust Data Delivery Protocol for
Large Scale Sensor Networks.
In Proceedings of the 2nd International Conference on
Information Processing in Sensor Networks,
Palo Alto, California, 2005.
(Vaibhav Dhage <email@example.com> will present.)
- M. A. Vouk.
Cloud computing -- Issues, research and implementations.
In Proceedings of the ITI 2008 30th Int. Conf. on Information
Technology Interfaces, June 23-26, 2008, Cavtat, Croatia.
(Nikhil Aggarwal <firstname.lastname@example.org> will present.)
- A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis.
Secure Routing and Intrusion Detection in Ad Hoc Networks.
In Proceedings of the 3rd IEEE International Conference on
Pervasive Computing and Communications (PerCom 2005),
March 2008, Kauai Island, Hawaii.
(Pradeep Prabhu <email@example.com> will present.)
- Y. Xu, J. Heidemann, and D. Estrin.
Geography-informed energy conservation for Ad Hoc routing.
In Proceedings of the 7th Annual International Conference on
Mobile Computing and Networking,
2001, Rome, Italy.
(Aruna Padmanabhan <firstname.lastname@example.org> will present.)
- J. Dean and S. Ghemawat.
MapReduce: Simplified Data Processing on Large Clusters.
In Proceedings of the Sixth Symposium on Operating System Design and
Implementation (OSDI), San Francisco, California, December, 2004.
(Naveen Birru <email@example.com> will present.)
- D. X. Wei, C. Jin, S. H. Low, and S. Hegde.
FAST TCP: Motivation, Architecture, Algorithms, Performance.
IEEE/ACM Transactions on Networking, Vol. 14, No. 6, Pages 1246-1259,
(Hardik Desai <firstname.lastname@example.org> will present.)
- H. Zhang, A. Arora, and Z. Liu.
A Stability-oriented Approach to Improving BGP Convergence.
In Proceedings of the 23rd IEEE International Symposium on
Reliable Distributed Systems (SRDS'04), Florianpolis, Brazil, 2004.
(Pranayini Gudali <email@example.com> will present.)
- C. Karlof and D. Wagner.
Secure Routing in Wireless Sensor Networks: Attacks and
In Proceedings of the First IEEE. 2003 IEEE International Workshop on
Sensor Network Protocols and Applications, 2003.
(Abhiram Gajjala <firstname.lastname@example.org> will present.)
- D. Massey, L. Wang, B. Zhang, and L. Zhang.
A Scalable Routing System Design for Future Internet.
In Proceedings of the SIGCOMM 2007 Workshop on
IPv6 and the Future of the Internet, Kyoto, Japan, August 31, 2007.
(Udayan Banerji <email@example.com> will present.)
- P.C. van Oorschot, T. Wan, and E. Kranakis.
On interdomain routing security and pretty secure BGP (psBGP).
ACM Transactions on Information and System Security (TISSEC),
Vol. 10, No. 3, July 2007.
(Sriranjani Babu <firstname.lastname@example.org> will present.)
- H. Huang, J. H. Hartman, and T. N. Hurst.
Data-Centric Routing in Sensor Networks using Biased Walk.
In Proceedings of SECON'06, 2006, 3rd Annual IEEE Communications Society
on Sensor and Ad Hoc Communications and Networks, Reston, VA,
September 28th, 2006.
(Akhil Chauhan <email@example.com> will present.)
- G. A. Di Caro, F. Ducatelle, and L. M. Gambardella.
Swarm intelligence for routing in mobile ad hoc networks.
In Proceedings of the IEEE Swarm Intelligence Symposium,
January 2005, Visakhapatanam, India.
(Deborshi Saha <firstname.lastname@example.org> will present.)
- C. Dana, D. Li, D. Harrison, C.-N. Chuah.
BASS: BitTorrent Assisted Streaming System for Video-on-Demand.
In Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing,
October 30 2005, Shanghai, China.
(Rohit Jogaikar <email@example.com> will present.)
- R. K. Murugesan, S. Ramadass, and R. Budiarto.
Improving the Performance of IPv6 Packet Transmission over LAN.
In Proceedings of the 2009 IEEE Symposium on
Industrial Electronics and Applications (ISIEA 2009),
Kuala Lumpur, Malaysia, October 4-6, 2009.
(Rishi Kanth Alapati <firstname.lastname@example.org> will present.)
- P. Nikander, A. Gurtov, and T. R. Henderson.
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing,
Security, and Privacy over IPv4 and IPv6 Networks.
In EEEE Communications Surveys & Tutorials, Vol. 12, No. 2,
pages 186-204, April 2010.
(Rishi Vora <email@example.com> will present.)
- S. Bhandarkar, N. E. Sadry, A. L. N. Reddy, and N. H. Vaidya.
TCP-DCR A Novel Protocol For Tolerating Wireless Channel Errors.
In IEEE Transactions on Mobile Computing, Vol. 4, No. 5,
pages 517-529, August 2005.
(Vikas Ediga <firstname.lastname@example.org> will present.)
- S. Chen and N. Yang.
Congestion Avoidance Based on Lightweight Buffer Management in
In IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 9,
(Rakesh Sunki <email@example.com> will present.)
- C. Busch, M. Magdon-Ismail, F. Sivrikaya, and B. Yener.
Contention-free MAC Protocols for Wireless Sensor Networks.
In Proceedings of the 18th International Conference of Distributed
Computing (DISC), pages 245-259, 2004.
(Ashish Joshi <firstname.lastname@example.org> will present.)
- K. Xu, M. Gerla, L. Qi, and Y. Shu.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED.
In Proceedings of the 9th Annual International Conference on
Mobile Computing and Networking (MobiCom'03),
San Diego, California, 2003.
(Nishkam Agrawal <email@example.com> will present.)
- M. O. Nicholes and B. Mukherjee.
A Survey of Security Techniques for the Border
Gateway Protocol (BGP).
In EEEE Communications Surveys & Tutorials, Vol. 11, No. 1,
pages 52-65, March 2009.
(Kartheek Babu Kolla <firstname.lastname@example.org> will present.)
- F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows,
T. Ch, A. Fikes, and R. E. Gruber.
Bigtable: A Distributed Storage System for Structured Data.
In Proceedings of the 7th Conference on USENIX Symposium on
Operating Systems Design and Implementation (OSDI), 2006.
(Anupama Mann <email@example.com> will present.)
- Z. Yu, J. J. P. Tsai, and T. Weigert.
An Adaptive Automatically Tuning Intrusion Detection System.
ACM Transactions on Autonomous and Adaptive Systems,
Vol. 3, No. 3, August 2008.
(Arnab Dutta <firstname.lastname@example.org> will present.)
- D. H. Summerville, N. Nwanze, and V. A. Skormin.
Anomalous Packet Identification for Network Intrusion Detection.
In Proceedings of the 2004 IEEE Workshop on Information Assurance,
West Point, NY, June 2004.
(Chirabrata Senapati <email@example.com> will present.)
I will grade your presentation according to the following points:
- (70%) Technical content - coverage of important concepts, depth
- In order to get an A in this category, you need to present
something with good technical depth. This means
that you need to give detailed description of difficult-to-understand
concepts, algorithms, and/or protocols.
- (30%) Presentation - familiarity, fluency,
ability to present in easy-to-understand and interesting ways,
quality of slides
- Miscellaneous (possible deduction)
- Time management: the maximum time for a talk is 30 minutes
(if you go past 30 minutes, you will be asked to stop abruptly),
so you should time your talk between 20 and 30 minutes
- Interaction with audience, including listening to questions
and giving relavent answers
We will assign letter grades to various parts of your project.
The conversion from a letter grade to a numeric score
is done according to the following table:
[BC: paragraph added 9/23/2010]
|| || 4
|| || 0
Please note that this letter grade has nothing to do with the
overall letter grade you will receive for the class.
When the final grade is calculated,
only the numeric value of your score will be used.
After you have given your presentation, you should send your final
slides to the instructor as soon as possible so that they can be
posted on the lectures web page.
If the instructor does not receive your final slides by the end
of the last week of classes, you stand to lose a lot of points.
(If you have never sent any draft copies of your slides to the
instructor, you will receive a score of zero for your presentation.)