ISOC Mission Statement

Working Party
RealVideo Broadcast
Mbone Broadcast
Conference and Program

Geneva and Palexpo
Call for Papers
Plenary Speakers
Evening Events
Internet Access Room
BOF Meetings
Pre-Post Tours
Chapter Activities
Internet Related Meetings
Reports From The   Conference

K-12 Workshop
Developing Countries Networking Symposium
Technical Tutorials
Network Training Workshops

Invitation to Sponsors
INET'98 Sponsors
Previous INET Sponsors
Sponsor Benefits
Exhibition Hall

Press Releases
Media Accreditation and Form
Official INET'98 Publications

Registration Information and Form
Hotel Information and Form
Tour Information and Form
Airline Travel


Organizations/Companies Displaying the INET'98 Logo


Technical Tutorials

20-21 July 1998
Palexpo Conference Center
Geneva, Switzerland
(additional fee required)
  • Accessible Web-Sites: Design and Construction
  • Web Resources: Critical Evaluation of Information and Overview of Power Searching Tools and Techniques
  • ATM Internetworking
  • Intranet Planning
  • Cryptography, Security and Privacy
  • Managing Internetworks: Where to Start
  • Java and Database Connectivity
  • Mobile IP: Adding Mobility to the Internet

The Internet Society is offering nine highly-focused tutorials conducted by industry experts from around the world. Chock full of in-depth, practical information on current and emerging technologies, they compliment the INET'98 Conference and can be an important part of your professional development. The tutorials will give you a greater understanding of theories, practices, real-world applications, and critical issues. Whatever your level of expertise, there's a course that will help you shorten a learning curve. You'll leave with new ideas, options, and plans to help you succeed in your job.


Accessible Web Sites: Design and Construction
Half-day, 09:00am - 12:30pm

Michael Burks, Chairman, Special Interest Group on Internet Accessibility for the Disabled, USA
Michael Paciello, Yuri Rubinsky Insight Foundation, USA
Leonard Kasday, ATT, USA
Chris Hizny, ATT, USA

With the ever increasing competition for attention for sites on the World Wide Web, it is essential to maximize the number of people who can access your site. This tutorial will describe simple techniques that will extend the accessibility of your site to people who may have difficulty with e.g. color, font size, images, audio, flickering, and fine mouse manipulation. This tutorial will explore the ways to design sites and present information so it can be accessed in a number of different ways. Further, it will seek to teach some ways to make sites usable by those who are not native to the culture that has produced them. Attendees will be taught how to construct and maintain sites that are usable by the largest number of people at the smallest cost. New technologies will be looked at and old techniques will be discussed. The tutorial will raise the awareness of Web-site designers so that they understand that users may not access the sites they design in the ways they originally envisioned. Attendees will be taught techniques to present information on a web in an efficient, effective manner.

Prerequisites: Desire to learn and familiarity with some HTML.

Intended Audience: Webmasters, Web designers and managers of information management projects seeking to present their information in the most efficient and effective manner.


Web Resources: Critical Evaluation of Information and Overview of Power Searching Tools and Techniques
Half-day, 09:00am - 12:30pm

Janis Bruwelheide, Montana State University, USA

Users are often frustrated about locating information and resources on the Web. Presentation of materials via the Web is so visually appealing that users may overlook the need to evaluate content as they would more traditional information sources. This tutorial will present the need to evaluate Web sources, sites, and pages and review the Super five approach to evaluating materials: currency, scope, objectivity, authority, and accuracy. Since information access depends on understanding and mastery of search tools the session will review major search categories and tools. It will present techniques for Power searching to maximize use and location of Web resources.

Prerequisites: Familiarity with basic Web navigation is required.

Audience and Format: This tutorial will contain two parts which work together: critical evaluation of information and use of search tools and techniques. It is presented for a general audience and not directed to specific subjects or disciplines.


ATM Internetworking
Full-day, 09:00am - 17:30pm
(Includes lunch)

Peter Elford, Cisco Systems, Australia

Asynchronous Transfer Mode (ATM) is one of the most significant networking technologies that has been developed in the last 10 years. Designed to support the integration of data, voice and video over a common physical infrastructure, ATM has been widely deployed in a number of production environments.

Learning Objectives:

  • To provide an understanding of the functional elements and operation of an ATM network, and to identify the major relevant ATM standards;
  • To explain the theory and operation of how ATM internetworks with other technologies, and to identify the major relevant standards that provide interoperability; and
  • To describe how ATM has been deployed in operational networks to meet business requirements.

Intended Audience: Network managers and technical IT managers with a basic understanding of network principles and the IP protocol.


Intranet Planning
Full-day, 09:00am - 17:30pm
(Includes lunch)

Gordon Howell, Internet Business Services Consulting, United Kingdom

This tutorial will introduce the key issues faced by corporations seeking to implement new IT systems using Internet technologies. Following the tutorial, attendees will be able to make a business case for use of Intranet in their organization, identify starting points and action plans for introducing Intranet, understand essentials of Intranet technologies and how they compare with proprietary approaches, identify key products and vendors for further product research.

Learning Objectives:

  • Business rationales for intranet and examples of best practice.
  • Intranet architectures and key technologies/relationship to Internet.
  • How to pinpoint cost-effective intranet applications.
  • Intranet procurement - platforms, products and key vendors.
  • Key future trends and issues facing intranet planners.

Prerequisites: System management/planning experience; basic Internet knowledge (what is URL, email, WWW, client/server architectures).

Intended Audience: IT managers, chief information officers, systems managers, networking managers, Internet/Intranet developers.


Cryptography, Security and Privacy
Full-day, 09:00am - 17:30pm
(Includes lunch)

Charlie Catlett, National Center for Supercomputer Applications, USA

This tutorial provides an overview of the basic elements of computer security and privacy, including the building blocks and protocols used to construct secure and private services and systems. An overview of existing and emerging technologies and implementations of secure and private systems will be given. This will include both current practice and technologies (Java, Kerberos, PGP, etc.) and their application in the real world for secure computing as well as newer capabilities (digital cash, digital signatures) supporting commerce on the Internet.

Prerequisites: Participants should be familiar with networked computing (the Internet, client/server applications, etc.) as well as basic mathematics and computer programming. This basic background information is essential to anyone involved in the Internet today, including technical staff as well as executives.


Managing Internetworks: Where to Start
Full-day, 09:00am - 17:30pm
(Includes lunch)

Martin Schulman, Cisco Systems, USA

This tutorial will provide practical guidance for creating an IP-based network management infrastructure for small to medium-sized Intranets and Internets.

Learning Objectives:

  • A structured approach to designing management systems based on the 5-part OSI Network Management Model;
  • An overview of the network and system elements, management subsystems, and protocols that bind them In a typical architecture;
  • A survey of commercial and shareware applications that can do the job within time and budget constraints.

Prerequisites: Attendees should grasp the basics of IP technology and have been exposed to some hands-on management.

Intended Audience: Managers who have to understand the issues to support projects, and for junior and senior level engineers who must implement management systems.


Java and Database Connectivity
Full-day, 09:00am - 17:30pm
(Includes lunch)

Bill Pringle, Internet Business Services Consulting, UK

This tutorial consists of two sessions: Session I: Introduction to Java and Session II: Java database connectivity. There is much more to Java than writing applets.

Session I describes:

  • Where it comes from
  • What it is
  • What it's good for
  • What it's not good for, and
  • Where it's going.

Learning Objectives:
Attendees will be able to write their own small Java programs and be able to make an informed decision as to whether it is the right tool for their requirements. Java database connectivity provides a common interface to a wide range of databases including Oracle, Informix, MS-SQL, and MSAccess. Combining the Platform independence of Java with the database independence of JDBC gives a very powerful design paradigm.

Session II covers:
JDBC overview and design philosophy, technical details of the JDBC and relevant portions of the Java Development Kit (JDK v1.1), Walkthrough of Connecting to a database with examples, use of Java development Environments, with examples from Symantec Visual Cafe Pro, basics of connecting to MS Access and example report generation, coming architectures using JDBC and key issues facing developers.


Mobile IP: Adding Mobility to the Internet
Full-day, 09:00am - 17:30pm
(Includes lunch)

Charles Perkins, Sun Microsystems, USA

The Internet is growing by leaps and bounds, and likewise mobile computers are becoming more and more popular. When mobile computers move, and attach themselves to new networks within the Internet, they can use mobile-IP as a means to achieve seamless roaming transparently to application software. In this situation, transparent means that the applications work just as before, and don't need to be recompiled or reconfigured. Seamless means that roaming from one place to another occurs without inconvenience to the user. As long as a physical path exists for communication, the user might not even be aware when a cell boundary has been crossed.

Learning Objectives: Lay out all the necessary protocol technology to allow mobile computers to use mobile-IP, and to describe the relevant operation of other protocols which can be used to aid mobility (such as DHCP and Service Location Protocol).

In this tutorial, aspects of mobile-IP and other standard protocols that further simplify the operation of mobile computers in the Internet will be explored, including:

  • Mobile Agent advertisements
  • Registration procedures
  • Tunneling mechanisms
  • The role of Security
  • Home Agents
  • Foreign Agents
  • How to set up a home network
  • Getting Care-of Addresses via DHCP
  • Route Optimization
  • Smooth handoffs
  • ls and filtering by border routers
  • IPv6 mobility support
  • Location Protocol
  • Finding printers, faxes, filesystems

Intended Audience: Anyone who is interested in learning about how to use mobile-IP, create a home network for mobile users within their organization, or explore new Internet protocols and mobile computing. This includes programmers, administrators, network managers, and mobile computer users who are already familiar with using the Internet.

To register for tutorials, go to INET'98 Registration.

About the Internet Society | Conference Overview | Pre-Conference Events | Sponsorship + Exhibition |

Registration, Housing, Travel | Media/Press | FAQs | Home


All graphics and content copyright ©1998 Internet Society.

The INET'98 Web-site was designed by Designright, Inc.