How to work The difference 2011-01-25

advertisement
2011-01-25
How to work
The difference
Traditional course

Specified scope,
scope course literature and goals

Straightforward exam
This course

You determine scope, course literature and precise goals

Almost like a ”learning contract”

Self written report and presentation to show what you learned
Self-written
This kind of course is a lot harder than one with a regular exam
2
Linköpings universitet
1
2011-01-25
The challenges
Planning your work

There is a lot to read and a lot to understand

It takes (calendar) time for things to sink in!
Learning

You need to evaluate the quality and scope of your sources

You need to determine when you have reached the right level
Writing

Selecting and organizing the material

Expressing your understanding of the topic
3
The process
Research
Reflect
Read
Write
Evaluate
4
Linköpings universitet
2
2011-01-25
Step 1: Research
Find out about the area (meta-level)

Understand the scope of the area as a whole

Find out what the most important topics in the area are

See who works in the area, and why, and who the authorities are

Learn about how publishing works in the area
Find sources of information

Be really careful about the quality of sources (more later)

Organize and prioritize sources of information

Look for gaps in coverage (topical and chronological)
5
Step 2: Read (and learn)
Learn about the area and the topic

Understand the topic you are concentrating on

Understand the topic in relation to the area as a whole

Learn about current and coming developments

Try to cover both theory and practice
The reading process

Use multiple sources of information

Contrast, compare and correlate

Make sure you understand what you read
6
Linköpings universitet
3
2011-01-25
Step 3: Evaluate
Evaluate what you have read/are reading

Which sources were particularly good

Which sources did not meet your expectations

What areas/topic did the sources not cover

What aspects did the sources not cover
Critically evaluating sources is important

Thi iis iinputt tto th
This
the nextt step
t and
d nextt iteration
it ti

This helps develop understanding of the topic
7
Step 4: Reflect
Reflect on the knowledge you have

What parts of the topic/area do you understand well

What parts of the topic/area do you still not understand

Did you discover new topics/areas/relationships while reading
Think about the next step

What kind of additional sources do you need

What additional topics do you need to study

Do you know enough to start writing (how much can you write)
8
Linköpings universitet
4
2011-01-25
Step X: Writing
Transfer your knowledge to paper

Never read and write at the same time – risk of plagiarism

Let the writing reflect your understanding

Let the writing reflect your mental model of the topic

Only write about things you really understand
Writing will take place several times

Outline – after you have a high-level
high level grasp of the area and topic

Draft – after the first few iterations of reading

Final – after several more iterations of reading
9
Purpose of the report

Show your understanding of the project topic

Show that you understand the context of the topic

Show that you can explain the topic in the infrastructure context

Show that you can organize information about the topic
10
Linköpings universitet
5
2011-01-25
Scope of study/scope of report
What you learn
What you put in the report
What you present
11
SOURCES
12
Linköpings universitet
6
2011-01-25
What constitutes a good source

Pair up and discuss!

Come up with the following (10 minutes)

What characterizes a good source?

What are warning signs for a bad source?

A list of typically good (kinds of) sources

A list of typically bad (kinds of) sources
13
Rate my source
In pairs, rate the following sources and explain why:

Xipeng Xiao,
Xiao A.
A Hannan,
Hannan B.
B Bailey,
Bailey L
L.M.
M Li
Li. Traffic engineering with MPLS in
the Internet. IEEE Network 2(14). Mar/Apr 2000.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=826369

Wi-Fi Alliance. Wi-Fi Protected Access: Strong, standards-based, interoperable
security for today’s Wi-Fi networks. Wi-Fi Alliance Whitepaper. 2003.
http://www.ans-vb.com/Docs/Whitepaper_Wi-Fi_Security4-29-03.pdf

Wireless Ethernet Bridges. On-line:
http://www.directindustry.com/prod/acksys/wireless-ethernet-bridge-8580405674.html

IEEE. CDMA/CD Access Method. Standard IEEE Std-802.3-2008.

Uyless Black. Second Generation Mobile and Wireless Networks. New Jersey:
Prentice Hall. 1998.
14
Linköpings universitet
7
2011-01-25
Examples of (usually) good sources
Peer-reviewed scientific journal papers
Peer-reviewed conference papers

Peer review means the content has been checked by experts

Scientific papers tend to be factual and unbiase

Journal papers are more complete than conference papers

Caveats: quality of the journal, age of the paper
Peer-reviewed workshop papers

Often work in progress or undeveloped ideas

There is often follow-up work which is better to read
15
Examples of (usually) good sources
Technical books on the subject

Books are often reviewed by technical experts

Books often give a more complete picture of an area

Caveats: long publishing cycle, publisher quality, target audience
Textbooks

Textbooks are usually fairly easy to read

Textbooks are usually complete with regard to basics

Caveats: textbooks tend to concentrate on theory and ignore reality

Caveats: long publishing cycle, often lack of depth
16
Linköpings universitet
8
2011-01-25
Examples of (usually) good sources
PhD theses

Very good technical depth,
depth but very narrowly focused

Caveats: can be hard to read, additional context is needed

Caveats: may over-state the importance of results, age of thesis
Standards, RFCs

Complete technical details in a specific area

Should always be used to confirm other sources (when possible)

C
Caveats:
contain only facts,
f
not context, revisions
17
Examples of (usually) bad sources
Product manuals or other technical documentation

Give only the view with respect to a specific product/vendor

Are often biased in favor of a specific vendor

Do not distinguish between vendor-specific and general

However: good to get a feel for practical concerns
Whitepapers from vendors

Purpose of whitepaper: sell product, not inform people

Are often biased in favor of a specific vendor

Highlights technology that the vendor is good at

However: are occasionally very good
18
Linköpings universitet
9
2011-01-25
Examples of (usually) bad sources
Student reports and MSc theses

Tend to have fairly low quality – there are better sources available

Are written by people who are not experts in the subject area

However: the occasional MSc thesis contains a good area review
Random websites

Provenance, accuracy, age of information is not known

Are often biased in favor of something (often not expressed)

However: can be useful as a starting point for further research

However: some things can only be found this way
19
What about Wikipedia
The good

Often good,
good fairly complete,
complete accurate and up-to-date
up to date information

Often very easy to read and understand
The bad

Anyone can edit Wikipedia, so accuracy is sometimes not good
What do do?

Use Wikipedia as a starting point for further research

Read Wikipedia for an overview, then references for research!
20
Linköpings universitet
10
2011-01-25
What about Wikipedia
The good

Often good,
good fairly complete,
complete accurate and up-to-date
up to date information

Often very easy to read and understand
The bad

Anyone can edit Wikipedia, so accuracy is sometimes not good
What do do?

Use Wikipedia as a starting point for further research

Read Wikipedia for an overview, then references for research!
21
Citing sources
In-text citation

Text should be readable even if citations are omitted

Place in-text citation after relevant text

Use a standard format (APA is recommended)
List of references

List of all cited sources, placed at the end of the text

Each reference must contain enough information to be identified

Use a standard format (APA is recommended)
22
Linköpings universitet
11
2011-01-25
Citing sources (examples)
In 1994, Perkins & Bhagwat (1994) introduced the DSDV protocol, a distance
vector routing protocol for ad
ad-hoc
hoc networks based on the distributed Bellman
Bellman-Ford
Ford
algorithm (Bellman, 1958; Ford and Fulkerson, 1962). DSDV was a forerunner in
the ad-hoc routing area, but never saw commercial use. Concepts in DSDV are
also used in AODV (Perkins, Belding, Royer and Das, 2003).
References
g
y , E.,, Das,, S. (2003).
(
) Ad-Hoc On-Demand Distance
Perkins,, C.,, Belding-Royer,
Vector (AODV) Routing. IETF. RFC 3561.
Perkins, C., Bhagwat, P. (1994). Highly Dynamic Destination-Sequenced Distance
Vector Routing (DSDV) for Mobile Computers. In Proceedings of SIGCOMM 94.
Association for Computing Machinery.
23
Quotation
Sometimes (rarely) the exact words of another person are important

In these cases,
cases use quotations with a citation

Excessive quotation is not acceptable (but not quite plagiarism)
In-text quotation
When Schneier (2000) says ”security is a process, not a product”, he means that …
Block quotation
p
the importance
p
of security
y as a p
process:
Schneier ((2000)) explains
Security is a process, not a product. Products provide some protection, but the
only way to effectively do business in an insecure world is to put processes in
place that recognize the inherent insecurity in the products.
By this he means that we cannot do security once, and then be done. Security is
something we always do, all the time.
24
Linköpings universitet
12
2011-01-25
PLAGIARISM
25
Plagiarism
Dictionary definition
[The] use
se or close imitation of the language
lang age and tho
thoughts
ghts of
another author and the representation of them as one’s own
original work
Random House Compact Unabridged Dictionary
Important
 Not just verbatim copying of large amounts of text
 Source
S
off the
th text
t t or ideas
id
d
doesn’t
’t matter
tt
26
Linköpings universitet
13
2011-01-25
Plagiarism and citations
It can still be plagiarism if you provide a citation
Example from last year:
A number of recirculating optical loops from some of the switch
output ports are fed back into then switch input port, as shown
is fig 3.6(b) . Recirculation buffering helps resolve contention at
the expense optical signal degradation since looped back
optical packet need to pass the delay units and space switch
more than once. [6]
27
Plagiarism and paraphrasing
It can still be plagiarism if you paraphrase heavily
Original
Mobile Hosts cause broken links as they
move from place to place. The broken link
may be detected by the layer-2 protocol, or it
may instead be inferred if no broadcasts have
been received for a while from a former
neighbor. A broken link is described by a
metric of 00 (i.e., any value greater than the
maximum allowed metric). When a link to a
next hop has broken, any route through that
next hop is immediately assigned an 00
metric and assigned an updated sequence
number. Since this qualifies as a substantial
route change, such modified routes are
immediately disclosed in a broadcast routing
information packet.
Plagiarized
Nodes are moving from one place to another
place because of broken links. Broken links
may be discovered by the layer 2 protocols.
Broken link is described by metric .Metric can
be defined as infinity symbol. Let us consider
if a link is broken to a next hop then any route
through the next hop is directly assigned an
infinity symbol as well as updated by the
sequence no .Since its OK as a sustaining
route changed, so changing routes are
directly to expose to view in a transmit of
routing data information .
28
Linköpings universitet
14
2011-01-25
Plagiarism and technical content
Student sez:
This is a technical area,
area and I can
can’tt simply change the facts.
facts I have to
present things like this, or the content would be wrong.
Teacher sez:

The facts in technical content have to be correct

But how you present it can and must be original

The more source material yyou have,, the easier it is!

You have to understand the topic very well to know what can and what
can’t be changed
29
Why do we care

We can’t judge your understanding of the project topic, only the
understanding
g of the p
person who actuallyy wrote the text

We can’t tell if you understand the context of the topic, only that you
found a source written by someone who did

We don’t know if you can explain the topic in the infrastructure context
(only that someone else could)

Y haven’t
You
h
’t shown
h
th t you can organize
that
i information
i f
ti about
b t the
th topic
t i
(just that someone else could)
30
Linköpings universitet
15
2011-01-25
Consequences of plagiarism
Academic suspension

May not participate in lectures

May not participate in labs

May not take exams

May not use lab facilities

May not use computer facilities

May not get help from teachers
Usually one month for first offence
31
THE RULES
32
Linköpings universitet
16
2011-01-25
This year’s rules
Deadlines are strict

Miss a deadline and you are struck from the course

Notify me ahead of time and we can negotiate
Every submission is part of examination

No progress since last submission: you fail the course

Quality below expectations: you have to submit a revision

Revision below expectations: you fail the course

Plagiarism detected at any point: automatic fail and disciplinary report
33
Why am I being an *******?
Because last year was a disaster

Lots of people missed deadlines at all stages

Quality and quantity of much of the work was very low

Fourteen people reported to the disciplinary board

One warning, one one-week and eleven one-month suspensions
Because I don’t have time to deal with a lot of problems

I teac
teach half-time
a t e sp
spread
ead o
over
e se
several
e a cou
courses
ses

I work half-time managing the university network and IT security

I head the network, IRT and telephony unit at the university
34
Linköpings universitet
17
2011-01-25
It’s not that difficult, really
Plan your work for the whole semester

This is a hard course and will require a lot of time

You have to work on the course the whole semester
Do the work to specification and on-time

Problems, questions, anything else? Talk to me!
Make sure y
you know how to do this kind of work

This seminar should help quite a bit

Don’t hesitate to e-mail questions or visit my IDA office

Don’t try to take shortcuts: they don’t work very well
35
www.liu.se
Linköpings universitet
18
Download