Computer Science CS 553 Internet Services
Fall 2017
Times: Monday, 12:00 noon - 1:20PM, Thursday, 12:00 noon - 1:20PM
Place: CoRE building, room 110
Instructor: Richard Martin
The class work will consist of:
- Weekly papers to read and answers (as homeworks) for questions on them.
- A group project and presentation of the project to the class.
- A first draft of a position paper.
- A revised position paper based on feedback for the first draft.
Position Paper
The Position Paper assignment can be found here
Project
The project can be one of several types:
- Building a system or web-service and demonstrating it.
- Measuring the performance of an existing system.
- Measuring some aspect of human behavior related to Internet Services.
- Analyzing the behavior of some aspect of an Internet Service.
- Building and measuring a prototype of a small core routine of a larger service.
Introduction
Although over 40 years old, the Internet and its related services continue
evolving and expanding at a rapid pace. It's beginnings included
services such as file transfer, remote terminal, and email.
The 1990's saw the rise of hypertext linked documents, and
advertising supported search and retrieval. New services
continue to evolve, including recent ones centered on social networking,
cloud storage and computing, video streaming, and file sharing.
The design, construction, and deployment of modern Internet Services
requires a broad understanding and conceptualization of many areas
in Computer Science and related fields.
This course is thus a broad survey of many areas, including
values in design, dependabilty, Emerging Platforms,
Wearables, Security, Clouds, Big Data, Accelerators,
Topics:
- Overview
- Values in Design
- Reliability
- Security
- Cloud Processing
- Accelerators
- Video
- Storage
- Digital Currency
- Wearables and Mobile Applications
Reading Schedule:
Week | Week | Topics | Readings | Questions | Work |
number | Date | s | | (Sakai) | Due |
1 | Sept. 7nd | Introduction | none | none | Entrance Exam |
2 | Sept. 14th | Values in Design | friedman, Nissenbaum | TBD | Form Project Groups |
3 | Sept. 21st | Reliability | Avizienis, Oppenheimer,Pinheiro, Meza,
| | |
4 | Sept. 28th | Security | Panky,Mitchell, Bonneau, Florencio,Holz | | |
qu 5 | Oct 5th | Architecture | Brewer, ArmBrust, Nygren | | | |
6 | Oct. 12th | Energy | Verma, Manousakis | TBD | |
7 | Oct. 19th | System Design | Lampson, Gabriel | TBD | Project Idea Submissions |
8 | Oct. 26th | Accelerators | Han, Lim | TBD | Position Paper Idea submission |
9 | Nov. 2nd | Storage | Ghemawat,Chang | TBD | |
10 | Nov. 9th | Video | Bae,Huang | TBD | First Draft of Position Paper |
11 | Nov. 16th | Computing | Dean, Zaharia | TBD | Project reviews |
12 | Nov. 30th | Digital Currency | Nakamoto,Reid | TBD | Position Paper review |
13 | Dec. 7th | Project Presentations (1) | | --- | Project Presentations (1) |
14 | Dec. 14th | Project Presentations (2) | --- | --- | Project Presentations (2) Revised Position Papers |
Bibliography:
Values in Design
- Friedman, B., and Kahn, P. H., Jr. (2003). Human values, ethics, and design. In J. A. Jacko and A. Sears (Eds.), The human-computer interaction handbook, 1177-1201. Mahwah, NJ: Lawrence Erlbaum Associates. [Revised
second edition, 2008, pp. 1241-1266.] PDF
- Nissenbaum, H. "Will Security Enhance Trust Online, or Supplant It?" Trust and Distrust in Organizations: Dilemmas and Approaches. Roderick M. Kramer & Karen S. Cook, Editors Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004.
Reliability
- A. Avizienis, J.-C. Laprie, B. Randell,
Fundamental concepts in dependability,Proceedings of the Third Information Survivability Workshop,
October 2000. PDF
-
Oppenheimer, et. al. Why do Internet Services Fail,
What Can Be Done About It? USENIX USITS 2003,
PDF
-
J. Meza, Q. Wu, S. Kumar, O. Mutlum
A large-scale study of flash memory failures in the field, Sigmetrics 2015,
PDF
-
Eduardo Pinheiro, Wolf-Dietrich Weber, and Luiz Andre Barroso,
Failure Trends in a Large Disk Drive Population, USENIX 2007
PDF
-
Schroeder, B and Gibson, G.A.,
A large-scale study of failures in high-performance computing systems,
IEEE Transaction on Dependable and Secure Computing, Vol.7, Iss. 4, Feb. 2009.
PDF (inside Rutgers)
PDF (from Sakai)
Security
-
Panky, Crypto Primer: Understanding encryption, public/private key, signatures and certificates,
HTML
-
John Mitchell, Cryptography Overview, PDF,
PPT
-
Bonneau, Joseph and Herley, Cormac and Oorschot, Paul C. van and Stajano, Frank
,The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,
,Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012,
HTML
-
Dinei Florencio and Cormac Herley, Paul C. van Oorschot,
An Administrator’s Guide to Internet Password Research, USENIX LISA 2014, PDF
-
Thorsten Holz,Moritz Steiner,Frederic Dahl,Ernst Biersack Felix
Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and
Emergent Threats, Article No. 9 PDF
-
Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster,
Dos and Don'ts of Client Authentication on the Web
PDF,
HTML
Service Architecture
-
Brewer. Lessons from Giant-Scale Services. IEEE
Internet Computing, July/August, 2001. PDF
-
Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing." Communications of the ACM 53, no. 4 (2010): 50-58. PDF
-
Barroso et al. Web Search for a Planet: The Google Cluster
Architecture. IEEE Micro, March/April, 2003. PDF
-
Verma, Abhishek, Luis Pedrosa, Madhukar Korupolu, David Oppenheimer, Eric Tune, and John Wilkes. "Large-scale cluster management at Google with Borg." In Proceedings of the Tenth European Conference on Computer Systems, p. 18. ACM, 2015. PDF
-
Nygren et al. The Akamai Network: A Platform for High-Performance Internet Applications. ACM SIGOPS Vol.44, No. 3, July 2010 PDF
System Design
-
Butler W. Lampson, Hints for Computer System Design,July 1983. PDF
-
Richard P. Gabriel,The rise is Worse is Better., 1989 HTML
Machine Learning for Services
26. V.N. Gudivada, M.T. Irfan, E. Fathi, and D.L. Rao, Cognitive Analytics: Going Beyond Big Data Analytics
and Machine Learning,
PDF
26. Abadi, et. al., TensorFlow: A System for Large-Scale Machine Learning., ODSI 2016,
PDF
27. Martin Abadi,Michael Isard, Derek G. Murray, A Computational Model for TensorFlow, An Introduction.
PDF
Hardware Accelerators
26. Jouppi, et. al., In-Datacenter Performance Analysis of a Tensor Processing Unit, ArXiv.org, Apr. 2017,
PDF
27. Putnam, et. al., A reconfigurable fabric for accelerating large-scale datacenter services, ISCA 2014,
PDF
-
Han, Sangjin, Keon Jang, KyoungSoo Park, and Sue Moon, PacketShader: a GPU-accelerated software router, In ACM SIGCOMM Computer Communication Review, 2010. PDF
-
Lim, Kevin, David Meisner, Ali G. Saidi, Parthasarathy Ranganathan, and Thoms F. Wenisch. "Thin servers with smart pipes: designing SoC accelerators for memcached." In ACM SIGARCH Computer Architecture News, vol. 41, no. 3, pp. 36-47. ACM, 2013. PDF
Energy Efficiency
-
Madhu Sharma, Kartik Arunachalam and Dharani Sharma,Analyzing the Data Center Efficiency by using PUE to make Data Centers More Energy Efficient by Reducing the Electrical
Consumption and Exploring New Strategies,Procedia Computer Science, Volume 48, 2015 PDF
-
Ioannis Manousakis, Sriram Sankar,Gregg McKnight, Thu D. Nguyen and Ricardo Bianchini, Environmental Conditions and Disk Reliability in Free-Cooled Datacenters, PDF
Identity Management
-
A Conceptual Model of Multiple Dimensions of
Identity Susan R. Jones Marylu K. McEwen
PDF
-
John R. Suler,
Identity Management in Cyberspace,
Journal of Applied Psychoanalytic Studies, Vol. 4, No. 4, October 2002 HTML
-
Meredith M. Skeels and Jonathan Grudin,
When Social Networks Cross Boundaries: A Case
Study of Workplace Use of Facebook and LinkedIn,Proceedings of the ACM 2009 international conference on Supporting group work, ACM, 2009
- Andrew Besmer and Heather Richter Lipford
Moving Beyond Untagging: Photo Privacy in a Tagged World
- Arvind Narayanan and Vitaly Shmatikov,
Robust De-anonymization of Large Sparse Datasets, PDF
Large-Scale Cloud Storage
-
Ghemawat et al. The Google File System. SOSP, 2003. PDF
-
Chang et al. Bigtable: A Distributed Storage System for
Structured Data. OSDI 2006. PDF
-
Candia et al. Dynamo: Amazon's Highly Available Key-value
Store. SOSP, 2007. PDF
-
Beaver et al. Finding a Needle in Haystack: Facebook's
Photo Storage. OSDI, 2010. PDF
Compute Models
-
Dean and Ghemawat. MapReduce: Simplified Data Processing
on Large Clusters. OSDI, 2004. PDF
-
Zaharia, Matei, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. "Spark: cluster computing with working sets." In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, vol. 10, p. 10. 2010. PDF
-
Christopher Olston, Benjamin Reed, Utkarsh Srivastava, Ravi Kumar, Andrew Tomkins,
Pig Latin: A Not So-Foreign Language for Data Processing. SIGMOD, 2008.
PDF
-
Barham et al. Xen and the Art of Virtualization. ACM SOSP, 2003. PDF
Digital Currencies
-
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Consulted 1.2012 (2008): 28.
-
Fergal Reid and Martin Harrigan,An Analysis of Anonymity in the Bitcoin System
PDF
Lifelogging and LifeStreams
-
Cathal Gurrin, Alan F. Smeaton, Aiden R. Doherty
LifeLogging: Personal Big Data
-
Sellen, Abigail J., and Steve Whittaker. "Beyond total capture: a constructive critique of lifelogging." Communications of the ACM 53, no. 5 (2010): 70-77.
Mobile Health
-
Feasibility of Popular m-Health Technologies for Activity Tracking Among Individuals with Serious Mental Illness
-
Naslund John A., Aschbrenner Kelly A., Barre Laura K., and Bartels Stephen J.. Telemedicine and e-Health. March 2015, 21(3): 213-216. doi:10.1089/tmj.2014.0105.http://online.liebertpub.com/doi/abs/10.1089/tmj.2014.0105
-
Deborah Estrin and Ida Sim, An Engine for Health Care Innovation, Science, Nov. 2010
PDF
-
Tomlinson et. al. mHealth: Where Is the Evidence?, PLOS Medicine, Feb, 2013
PDF
Video
- Bae, Sangwook, Dahyun Jang, and KyoungSoo Park, Why is HTTP adaptive streaming so hard?,
In Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015,
PDF
-
Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson,
A buffer-based approach to rate adaptation: evidence from a large video streaming service, in SIGCOMM, 2014
PDF
-
James D. Salehi, Zhi-Li Zhang, James F. Kurose, and Don Towsley,
Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing,
SIGMETRICS, 1996. PDF
Personal Storage
- Mun, Min, et al. "Personal data vaults: a locus of control for personal data streams." Proceedings of the 6th International Conference. ACM, 2010.
- Jiaqiu Wang and Zhongjie A Survey on Personal Data The Scientific World Journal, vol. 2014, Article ID 969150, 13 pages, 2014. doi:10.1155/2014/969150
http://www.hindawi.com/journals/tswj/2014/969150/cta
- Linked Data - The Story So Far
Christian Bizer (Freie UniversitBerlin, Germany), Tom Heath (Talis Information Ltd, UK) and Tim Berners-Lee (Massachusetts Institute of Technology, USA)
- User-Managed Access Control in Web Based Social Networks
Lorena Gonzalez-Manzano, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Arturo Ribagorda.
http://link.springer.com/chapter/10.1007/978-3-7091-0894-9_4
- A Critical Look at Decentralized Personal Data Architectures
Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh
- Comparison of software and protocols for distributed social networking
Distributed Systems
- Lamport. Time, Clocks and the Ordering of Events in a
Distributed Systems. CACM 21(7), 1978.
- Ousterhout. The Role of Distributed State. CMU Computer
Science: a 25th Anniversary Commemorative, 1991.
- Lamport. Paxos Made Simple. ACM SIGACT News 32(4),
2001.
- Burrows. The Chubby Lock Service for Loosely-Coupled
Distributed Systems. OSDI, 2006.
- Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy,
Arun Venkataramani, Do incentives build robustness in BitTorrent?