Klausur: |
1. Termin: Mittwoch, 13.08.2014 um 11:30 Uhr (Dauer: 80 Minuten) |
Vorlesung: |
Montags, 15:30 in Raum 46-210 |
Kontakt: |
Prof. Dr.-Ing. Jens Schmitt |
Diese Vorlesung soll die Aufgaben, der Aufbau und die Arbeitsweise moderner Kommunikationssysteme näher bringen. Insbesondere liegt dabei der Fokus auf der Architektur und den Protokollen, welche heute vor allem im Internet im Einsatz sind. Anhand eines Schichtenmodells, werden von Anwendungsprotokollen (z.B. HTTP, FTP, SMTP, ...) bis zu den Grundlagen der Datenübertragung (z.B. Signalverarbeitung, Kodierungstheorie) viele Aspekte vernetzter Systeme behandelt.
Der Vorlesungsaufbau ist dabei wie folgt:
Downloads zu dieser Vorlesung sind nur aus dem Universitätsnetz verfügbar (131.246.*). Um außerhalb des Universitätsnetzes auf das Material zugreifen zu können, nutzen Sie bitte Dienste wie VPN oder SSH.
Chapter | Title | Slides |
---|---|---|
0 | Organization | |
1 | Introduction | |
2 | Application Layer | |
3 | Transport Layer | |
4 | Network Layer | |
5 | Link Layer | |
6 | Physical Layer | |
X | Recap von Matthias |
Update: Die vorläufigen Ergebnisse des zweiten Termins findet ihr hier. Die Einsicht wird am Donnerstag, dem 9. Oktober um 10:00 Uhr in 36-438 stattfinden.
Die Nachklausur findet am 29.09.2014 um 9:00 Uhr in Gebäude 1, Raum 106 statt.
Die vorläufigen Ergebnisse der ersten Klausur findet ihr hier. Die Einsicht wird Montag, dem 25. August in 36-438 um 10:00 Uhr stattfinden.
Die erste Klausur wird am 13. August 2014 um 11:30 in der Sporthalle (Gebäude 28) stattfinden. Wie die Probeklausur wird diese über 80 Minuten geschrieben.
Zur Vorbereitung wird es zwei zusätzliche Termine geben. Zum einen wird Alina am 5. August um 13:00 Uhr in Raum 24-102 eine Sonderübung halten, bei welcher sie euch gerne eure Fragen zum Stoff beantworten wird.
Einen Tag vor der Klausur (am 12. August) wird Matthias euch eine kleine Wiederholungsvorlesung anbieten, in welcher oberflächlich noch einmal alle wichtigen Themen der Vorlesung wiederholt werden. Dort könnt ihr dann nochmal die letzten Unklarheiten aus der Welt schaffen. Diese Vorlesung wird um 14 Uhr beginnen und findet im gleichen Raum (24-102) statt.
Wie immer werdet ihr kurz vorher nocheinmal via Twitter daran erinnert :-)
Die Liste für die Zulassung zur Kommunikationssysteme Klausur findet ihr hier. Bitte überprüft diese. Sollte etwas nicht stimmen oder ihr noch die Zulassung von vorherigen Jahren haben, setzt euch bitte mit Matthias (This email address is being protected from spambots. You need JavaScript enabled to view it.) in Verbindung.
Übungsbeginn: | Dienstag, 6. Mai 2014 |
Registrierung: | https://131.246.19.102/register4cosy/ bis 30.04.2014 |
Turnus: | wöchentlich |
Zuteilung: |
Übung | Termine | Blatt | Alinas Spickzettel |
---|---|---|---|
1 | 6. Mai bis 19. Mai | ||
2 | 20. Mai bis 2. Juni | ||
3 | 3. Juni bis 16. Juni | ||
4 | 17. Juni bis 23. Juni | ||
5 | 1. Juli bis 14. Juli | ||
6 | 15. Juli bis 25. Juli |
Breaking Authentication in the Iridium Network | |
---|---|
Author: | Max Lill |
Form: | Master Thesis |
Advisor: | Eric Jedermann, Jens Schmitt |
Download: |
Security Analysis of Device-Authentication in the Iridium Satellite Network | |
---|---|
Author: | Michele Klein |
Form: | Master Thesis |
Advisor: | Eric Jedermann, Jens Schmitt |
Download: |
Generalized Process Sharing in the Stochastic Network Calculus | |
---|---|
Author: | Lukas Wildberger |
Form: | Bachelor Thesis |
Advisor: | Jens Schmitt, Paul Nikolaus |
Download: |
Application of Network Calculus in IEEE Time-Sensitive Networks: Modeling and End-to-End Analysis | |
---|---|
Author: | Anja Hamscher |
Form: | Master Thesis |
Advisor: | Jens Schmitt, Paul Nikolaus |
Download: |
Towards an Improved Performance Analysis of Deficit Round Robin in the Network Calculus | |
---|---|
Author: | Vlad-Cristian Constantin |
Form: | Bachelor Thesis |
Advisor: | Jens Schmitt, Paul Nikolaus |
Download: |
On Practical Considerations of the Statistical Network Calculus: Data Aggregation, Traffic Analysis, and Backlog Bounds | |
---|---|
Author: | Meris Honsic |
Form: | Bachelor Thesis |
Advisor: | Jens Schmitt, Paul Nikolaus |
Download: |
On Practical Considerations of the Statistical Network Calculus: Traffic Measurement, Distribution Fitting, and Backlog Bounds | |
---|---|
Author: | Ken Klapp |
Form: | Bachelor Thesis |
Advisor: | Jens Schmitt, Paul Nikolaus |
Download: |
Design of a secure e-bike control based on Bluetooth Low Energy | |
---|---|
Author: | Eric Jedermann |
Form: | Master Thesis |
Advisor: | Lukas Tremper (Sigma-Elektro Neustadt), Jens Schmitt |
Download: |
Cooperative Aviation Security Models for Unmanned Aerial Vehicles | |
---|---|
Author: | Johannes Jaeckel |
Form: | Master Thesis |
Advisor: | Carolina Nogueira, Jens Schmitt |
Download: |
Evaluation of Design Aspects of Data Link Layer Fingerprinting of Aircraft Transponders | |
---|---|
Author: | David Staub |
Form: | Master Thesis |
Advisor: | Matthias Schäfer, Jens Schmitt |
Download: |
Authentication and Integrity for ADS-B: Design and Implementation of a Security Model for Air Traffic Control Signals | |
---|---|
Author: | Markus Fögen |
Form: | Master Thesis |
Advisor: | Carolina Nogueira, Jens Schmitt |
Download: |
Deterministic Performance Analysis of FIFO-multiplexing Feed-forward Networks | |
---|---|
Author: | Alexander Scheffler |
Form: | Bachelor Thesis |
Advisor: | Steffen Bondorf, Jens Schmitt |
Download: |
Modelling and Analysis of Timing Constraints of an Industrial Control System | |
---|---|
Author: | Malte Schütze |
Form: | Bachelor Thesis |
Advisor: | Mathias Kreider (GSI Darmstadt), Jens Schmitt |
Download: |
Stochastic Performance Bounds for Independent Regulated Traffic in Queueing Networks | |
---|---|
Author: | Paul Nikolaus |
Form: | Master Thesis, jointly with the Department of Mathematics |
Advisor: | Ralf Korn, Jens Schmitt |
Download: |
DiscoWall: Design And Implementation Of A Firewall For Android Phones | |
---|---|
Author: | Brian Tewanima Löwe |
Form: | Bachelor Thesis |
Advisor: | Matthias Schäfer, Jens Schmitt |
Download: |
Design und Evaluierung eines mobilen ADS-B Empfängers | |
---|---|
Author: | Markus Gräb |
Form: | Bachelor Thesis |
Advisor: | Matthias Schäfer, Jens Schmitt |
Download: |
Applying Stochastic Network Calculus in Scenarios with Incomplete Knowledge | |
---|---|
Author: | Sebastian Henningsen |
Form: | Bachelor Thesis |
Advisor: | Michael Beck, Jens Schmitt |
Download: |
Design and Analysis of VeriFly - A Trajectory Verification Method based on RSS sampling | |
---|---|
Author: | Matthias Schäfer |
Form: | Master Thesis, jointly with the Department of Computer Science of the University of Oxford |
Advisor: | Ivan Martinovic, Jens Schmitt |
Download: |
Who do you sync you are? Smartphone Fingerprinting based on Application Behaviour | |
---|---|
Author: | Tim Stöber |
Form: | Master Thesis, jointly with the Department of Computer Science of the University of Oxford |
Advisor: | Ivan Martinovic, Jens Schmitt |
Download: |
Design and Implementation of an Android-based Botnet | |
---|---|
Author: | Andreas Borgwart |
Form: | Bachelor Thesis |
Advisor: | Jens Schmitt |
Download: |
Effects and Factors of Network Instability | |
---|---|
Author: | Daniel S. Berger |
Form: | Bachelor Thesis, jointly with the Networks and Distributed Systems Group, David R. Cheriton School of Computer Science, University of Waterloo |
Advisor: | Martin Karsten, Jens Schmitt |
Download: |
DISCOmfort: A Tool For Practical Security Analysis Of Mifare RFID Systems | |
---|---|
Author: | Markus Fuchs |
Form: | Bachelor Thesis |
Advisor: | Ivan Martinovic, Jens Schmitt |
Download: |
Efficient Wireless Traffic Classification using Software-defined Radio | |
---|---|
Author: | Gregor Dschung |
Form: | Bachelor Thesis |
Advisor: | Ivan Martinovic, Matthias Wilhelm, Jens Schmitt |
Download: |
Implementierung einer funkbasierten Schlüsselgenerierung für drahtlose Sensornetzwerke | |
---|---|
Author: | Matthias Schäfer |
Form: | Bachelor Thesis |
Advisor: | Matthias Wilhelm, Jens Schmitt |
Download: |
Implementation and Analysis of a Key Generation Protocol for Wireless Sensor Networks | |
---|---|
Author: | Matthias Wilhelm |
Form: | Diploma Thesis |
Advisor: | Ivan Martinovic, Jens Schmitt |
Download: |
Wireless Network Calculus - Modeling and Analyzing Retransmission-based Wireless Link using Network Calculus | |
---|---|
Author: | Hao Wang |
Form: | Master Thesis |
Advisor: | Jens Schmitt |
Download: |
Computation of Tight Bounds in Networks of Arbitrary Schedulers | |
---|---|
Author: | Andreas Kiefer |
Form: | Master Thesis |
Advisor: | Jens Schmitt |
Download: |
Please ask the members of DISCO Lab for additional topics! Note that the titles listed here are preliminary titles.
Completed theses can be found under Recently Completed Theses.
The seminar focuses on state-of-the-art research issues in the field of (wireless) communication networks. Instead of diverse titles, there will be one topic spanning the whole seminar. In recent years, with more and more mobile smart devices equipped, social network also becomes one "hot spot" research of the mobile computing domain. The topic for this semester is Social Network. Note, the scope of this terminology in this seminar mainly stands for the research domain of online social network. The social and behavioral science is not your main focus. In this seminar, you can practice to work original literature, present professional or scientific talks and your programming ability with a java applet. And what you are required are knowledge on computer networks and good english for reading.
This seminar focuses on research issues in the fields of distributed computing and computer networking. You will be able to practice working on current research literature, presenting a scientific topic of your interest, and your programming ability as all presentations have to be supported by a java applet (or HTML5.. at your choice). Skills required include basic knowledge on computer networks and English proficiency.
Department, Module ID | Computer Science (89) – 4111: Distributed and Networked Systems (Ba-Seminar) |
KIS-Entry | INF-41-11-S-4 |
presence hours, CP | seminar (2S), 4 CP |
Kick-Off Meeting: | May 12, 17:15 in room 36-438 |
Slides of the Kick-Off Meeting | |
Pick your papers: | May 14 |
Meet up with advisor: | May 28 |
Submission deadline for draft version of deliverables: | June 18 |
Final Submission deadline: | July 2 |
Presentation day: | July 9 in room 36-336 (third floor seminar room, not fourth floor) |
Contact: |
or follow us on Twitter |
Nr. | Title | Student | Paper | Presentation |
---|---|---|---|---|
1 | Lest We Remember: Cold Boot Attacks on Encryption Keys | Sebastian Dahnert | 10:40 AM | |
2 |
The Parrot is Dead: Observing Unobservable Network Communications |
Simon Birnbach |
11:30 AM | |
3 |
Queuing Network Models for Multi-Channel P2P Live Streaming Systems |
|||
4 | User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks | |||
5 | Dynamic Right-Sizing for Power-Proportional Data Centers | |||
6 | Whole-Home Gesture Recognition Using Wireless Signals | Tobias Krafft | ||
7 | Capacity of multi-channel wireless networks with random (c, f) assignment | |||
8 | Improving the Data Delivery Latency in Sensor Networks with Controlled Mobility | |||
9 | Efficient network flooding and time synchronization with Glossy | Sandor Dalecke | ||
10 | ParkNet: drive-by sensing of road-side parking statistics | Philipp Schon | 12:20 PM | |
11 | Multi-Resource Allocation: Fairness-Efficiency Tradeoffs in a Unifying Framework | |||
12 | On the Steady-State of Cache Networks | Lukas Görlach | 09:50 AM | |
13 | The K Factor: Inferring Protocol Performance Using Inter-link Reception Correlation | |||
14 | AVEKSHA: A Hardware-Software Approach for Non-intrusive Tracing and Profiling of Wireless Embedded Systems | |||
15 | TDMA-basierte Multicast-QoS-Routing-Ansätze für Ad-Hoc-Netze |
July 9 in room 36-336 (third floor seminar room, not fourth floor)
Student | Paper | Presentation |
---|---|---|
Johann Gebhardt | 08:45 AM | |
Lukas Görlach | 09:50 AM | |
Sebastian Dahnert | 10:40 AM | |
Simon Birnbach |
11:30 AM | |
Philipp Schon | 12:20 PM |
To ensure that your applet runs properly, make sure to keep to those guidelines:
Use the Sun runtime environment for testing. Alternative JREs like OpenJVM, GCJ, or Apple's implementation might have quirks that make them incompatible with the system used for the presentation.
The final applet should come as an HTML file that only embeds the applet with the proper size, and a JAR file containing all binaries, source code, and resources necessary to build and run the applet.
We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...