Computer Science CS 553 Internet Services


Fall 2017


Times: Monday, 12:00 noon - 1:20PM, Thursday, 12:00 noon - 1:20PM
Place: CoRE building, room 110
Instructor: Richard Martin

The class work will consist of:

  1. Weekly papers to read and answers (as homeworks) for questions on them.
  2. A group project and presentation of the project to the class.
  3. A first draft of a position paper.
  4. A revised position paper based on feedback for the first draft.

Position Paper

The Position Paper assignment can be found here

Project

The project can be one of several types:
  1. Building a system or web-service and demonstrating it.
  2. Measuring the performance of an existing system.
  3. Measuring some aspect of human behavior related to Internet Services.
  4. Analyzing the behavior of some aspect of an Internet Service.
  5. Building and measuring a prototype of a small core routine of a larger service.

Introduction

Although over 40 years old, the Internet and its related services continue evolving and expanding at a rapid pace. It's beginnings included services such as file transfer, remote terminal, and email. The 1990's saw the rise of hypertext linked documents, and advertising supported search and retrieval. New services continue to evolve, including recent ones centered on social networking, cloud storage and computing, video streaming, and file sharing. The design, construction, and deployment of modern Internet Services requires a broad understanding and conceptualization of many areas in Computer Science and related fields. This course is thus a broad survey of many areas, including values in design, dependabilty, Emerging Platforms, Wearables, Security, Clouds, Big Data, Accelerators,

Topics:

  1. Overview
  2. Values in Design
  3. Reliability
  4. Security
  5. Cloud Processing
  6. Accelerators
  7. Video
  8. Storage
  9. Digital Currency
  10. Wearables and Mobile Applications

Reading Schedule: qu
Week Week Topics Readings Questions Work
number Date s (Sakai) Due
1 Sept. 7nd Introduction none none Entrance Exam
2 Sept. 14th Values in Design friedman, Nissenbaum TBD Form Project Groups
3 Sept. 21st Reliability Avizienis, Oppenheimer,Pinheiro, Meza,
4 Sept. 28th Security Panky,Mitchell, Bonneau, Florencio,Holz
5 Oct 5th Architecture Brewer, ArmBrust, Nygren
6 Oct. 12th Energy Verma, Manousakis TBD
7 Oct. 19th System Design Lampson, Gabriel TBD Project Idea Submissions
8 Oct. 26th Accelerators Han, Lim TBD Position Paper Idea submission
9 Nov. 2nd Storage Ghemawat,Chang TBD
10 Nov. 9th Video Bae,Huang TBD First Draft of Position Paper
11 Nov. 16th Computing Dean, Zaharia TBD Project reviews
12 Nov. 30th Digital Currency Nakamoto,Reid TBD Position Paper review
13 Dec. 7th Project Presentations (1) --- Project Presentations (1)
14 Dec. 14th Project Presentations (2) --- --- Project Presentations (2) Revised Position Papers

Bibliography:

    Values in Design

  1. Friedman, B., and Kahn, P. H., Jr. (2003). Human values, ethics, and design. In J. A. Jacko and A. Sears (Eds.), The human-computer interaction handbook, 1177-1201. Mahwah, NJ: Lawrence Erlbaum Associates. [Revised second edition, 2008, pp. 1241-1266.] PDF

  2. Nissenbaum, H. "Will Security Enhance Trust Online, or Supplant It?" Trust and Distrust in Organizations: Dilemmas and Approaches. Roderick M. Kramer & Karen S. Cook, Editors Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004.

    Reliability

  3. A. Avizienis, J.-C. Laprie, B. Randell, Fundamental concepts in dependability,Proceedings of the Third Information Survivability Workshop, October 2000. PDF

  4. Oppenheimer, et. al. Why do Internet Services Fail, What Can Be Done About It? USENIX USITS 2003, PDF

  5. J. Meza, Q. Wu, S. Kumar, O. Mutlum A large-scale study of flash memory failures in the field, Sigmetrics 2015, PDF

  6. Eduardo Pinheiro, Wolf-Dietrich Weber, and Luiz Andre Barroso, Failure Trends in a Large Disk Drive Population, USENIX 2007 PDF

  7. Schroeder, B and Gibson, G.A., A large-scale study of failures in high-performance computing systems, IEEE Transaction on Dependable and Secure Computing, Vol.7, Iss. 4, Feb. 2009. PDF (inside Rutgers) PDF (from Sakai)

    Security

  8. Panky, Crypto Primer: Understanding encryption, public/private key, signatures and certificates, HTML

  9. John Mitchell, Cryptography Overview, PDF, PPT

  10. Bonneau, Joseph and Herley, Cormac and Oorschot, Paul C. van and Stajano, Frank ,The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, ,Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012, HTML

  11. Dinei Florencio and Cormac Herley, Paul C. van Oorschot, An Administrator’s Guide to Internet Password Research, USENIX LISA 2014, PDF

  12. Thorsten Holz,Moritz Steiner,Frederic Dahl,Ernst Biersack Felix Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Article No. 9 PDF

  13. Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster, Dos and Don'ts of Client Authentication on the Web PDF, HTML

    Service Architecture

  14. Brewer. Lessons from Giant-Scale Services.  IEEE Internet Computing, July/August, 2001. PDF

  15. Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing." Communications of the ACM 53, no. 4 (2010): 50-58. PDF

  16. Barroso et al. Web Search for a Planet: The Google Cluster Architecture.  IEEE Micro, March/April, 2003. PDF

  17. Verma, Abhishek, Luis Pedrosa, Madhukar Korupolu, David Oppenheimer, Eric Tune, and John Wilkes. "Large-scale cluster management at Google with Borg." In Proceedings of the Tenth European Conference on Computer Systems, p. 18. ACM, 2015. PDF

  18. Nygren et al. The Akamai Network: A Platform for High-Performance Internet Applications. ACM SIGOPS Vol.44, No. 3, July 2010 PDF

    System Design

  19. Butler W. Lampson, Hints for Computer System Design,July 1983. PDF

  20. Richard P. Gabriel,The rise is Worse is Better., 1989 HTML

    Machine Learning for Services

    26. V.N. Gudivada, M.T. Irfan, E. Fathi, and D.L. Rao, Cognitive Analytics: Going Beyond Big Data Analytics and Machine Learning, PDF

    26. Abadi, et. al., TensorFlow: A System for Large-Scale Machine Learning., ODSI 2016, PDF

    27. Martin Abadi,Michael Isard, Derek G. Murray, A Computational Model for TensorFlow, An Introduction. PDF

    Hardware Accelerators

    26. Jouppi, et. al., In-Datacenter Performance Analysis of a Tensor Processing Unit, ArXiv.org, Apr. 2017, PDF

    27. Putnam, et. al., A reconfigurable fabric for accelerating large-scale datacenter services, ISCA 2014, PDF

  21. Han, Sangjin, Keon Jang, KyoungSoo Park, and Sue Moon, PacketShader: a GPU-accelerated software router, In ACM SIGCOMM Computer Communication Review, 2010. PDF

  22. Lim, Kevin, David Meisner, Ali G. Saidi, Parthasarathy Ranganathan, and Thoms F. Wenisch. "Thin servers with smart pipes: designing SoC accelerators for memcached." In ACM SIGARCH Computer Architecture News, vol. 41, no. 3, pp. 36-47. ACM, 2013. PDF

    Energy Efficiency

  23. Madhu Sharma, Kartik Arunachalam and Dharani Sharma,Analyzing the Data Center Efficiency by using PUE to make Data Centers More Energy Efficient by Reducing the Electrical Consumption and Exploring New Strategies,Procedia Computer Science, Volume 48, 2015 PDF

  24. Ioannis Manousakis, Sriram Sankar,Gregg McKnight, Thu D. Nguyen and Ricardo Bianchini, Environmental Conditions and Disk Reliability in Free-Cooled Datacenters, PDF

    Identity Management

  25. A Conceptual Model of Multiple Dimensions of Identity Susan R. Jones Marylu K. McEwen PDF

  26. John R. Suler, Identity Management in Cyberspace, Journal of Applied Psychoanalytic Studies, Vol. 4, No. 4, October 2002 HTML

  27. Meredith M. Skeels and Jonathan Grudin, When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn,Proceedings of the ACM 2009 international conference on Supporting group work, ACM, 2009

  28. Andrew Besmer and Heather Richter Lipford Moving Beyond Untagging: Photo Privacy in a Tagged World

  29. Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Sparse Datasets, PDF

    Large-Scale Cloud Storage

  30. Ghemawat et al. The Google File System. SOSP, 2003. PDF

  31. Chang et al. Bigtable: A Distributed Storage System for Structured Data. OSDI 2006. PDF

  32. Candia et al. Dynamo: Amazon's Highly Available Key-value Store.  SOSP, 2007. PDF

  33. Beaver et al. Finding a Needle in Haystack: Facebook's Photo Storage. OSDI, 2010. PDF

    Compute Models

  34. Dean and Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. OSDI, 2004. PDF

  35. Zaharia, Matei, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. "Spark: cluster computing with working sets." In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, vol. 10, p. 10. 2010. PDF

  36. Christopher Olston, Benjamin Reed, Utkarsh Srivastava, Ravi Kumar, Andrew Tomkins, Pig Latin: A Not So-Foreign Language for Data Processing. SIGMOD, 2008. PDF

  37. Barham et al. Xen and the Art of Virtualization. ACM SOSP, 2003. PDF

    Digital Currencies

  38. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Consulted 1.2012 (2008): 28.

  39. Fergal Reid and Martin Harrigan,An Analysis of Anonymity in the Bitcoin System PDF

    Lifelogging and LifeStreams

  40. Cathal Gurrin, Alan F. Smeaton, Aiden R. Doherty LifeLogging: Personal Big Data

  41. Sellen, Abigail J., and Steve Whittaker. "Beyond total capture: a constructive critique of lifelogging." Communications of the ACM 53, no. 5 (2010): 70-77.

    Mobile Health

  42. Feasibility of Popular m-Health Technologies for Activity Tracking Among Individuals with Serious Mental Illness

  43. Naslund John A., Aschbrenner Kelly A., Barre Laura K., and Bartels Stephen J.. Telemedicine and e-Health. March 2015, 21(3): 213-216. doi:10.1089/tmj.2014.0105.http://online.liebertpub.com/doi/abs/10.1089/tmj.2014.0105

  44. Deborah Estrin and Ida Sim, An Engine for Health Care Innovation, Science, Nov. 2010 PDF

  45. Tomlinson et. al. mHealth: Where Is the Evidence?, PLOS Medicine, Feb, 2013 PDF

    Video

  46. Bae, Sangwook, Dahyun Jang, and KyoungSoo Park, Why is HTTP adaptive streaming so hard?, In Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015, PDF

  47. Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson, A buffer-based approach to rate adaptation: evidence from a large video streaming service, in SIGCOMM, 2014 PDF

  48. James D. Salehi, Zhi-Li Zhang, James F. Kurose, and Don Towsley, Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing, SIGMETRICS, 1996. PDF

    Personal Storage

  49. Mun, Min, et al. "Personal data vaults: a locus of control for personal data streams." Proceedings of the 6th International Conference. ACM, 2010.

  50. Jiaqiu Wang and Zhongjie A Survey on Personal Data The Scientific World Journal, vol. 2014, Article ID 969150, 13 pages, 2014. doi:10.1155/2014/969150 http://www.hindawi.com/journals/tswj/2014/969150/cta

  51. Linked Data - The Story So Far Christian Bizer (Freie UniversitBerlin, Germany), Tom Heath (Talis Information Ltd, UK) and Tim Berners-Lee (Massachusetts Institute of Technology, USA)

  52. User-Managed Access Control in Web Based Social Networks Lorena Gonzalez-Manzano, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Arturo Ribagorda. http://link.springer.com/chapter/10.1007/978-3-7091-0894-9_4

  53. A Critical Look at Decentralized Personal Data Architectures Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh

  54. Comparison of software and protocols for distributed social networking

    Distributed Systems

  55. Lamport.  Time, Clocks and the Ordering of Events in a Distributed Systems. CACM 21(7), 1978.

  56. Ousterhout.  The Role of Distributed State. CMU Computer Science: a 25th Anniversary Commemorative, 1991.

  57. Lamport.  Paxos Made Simple. ACM SIGACT News 32(4), 2001.

  58. Burrows.  The Chubby Lock Service for Loosely-Coupled Distributed Systems.  OSDI, 2006.

  59. Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani, Do incentives build robustness in BitTorrent?