Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

Become an ISOC Member

INET Conferences

INET 2004: Strengthening the Net: Building an Open and Trusted Internet

INET 04 - 10-14 May, Barcelona Spain

FIRA BARCELONA, May 10-14, 2004, Barcelona, Spain

Tutorials

On Monday, May 10th, 2004 ISOC is organising two special pre-conference tutorials giving attendees the opportunity to get a more in-depth look at some topical Internet technologies - Internationalized Domain Names and IPv6:

Internationalized Domain Names (IDN)

This ISOC workshop will address general internationalisation questions as well as specific IDN issues together with an overview of currently proposed solutions. The workshop is aimed at a broad audience and will be of particular interest to registries/registrars, national regulators and government representatives, application developers and users.

Brought to you by: The Internet Society

Internet Society

Supported by: Public Interest Registry

Public Interest Registry - .ORG

Workshop outline:

Internationalization versus Localization.

  • What is wanted, what is needed to get there

A brief history of character sets and standards.

  • ISO TC97, ISO/IEC JTC1, and ISO 646 family -- national-use variants
  • ISO/SI: Roman and one alternative, with state in character strings
  • The ISO TC46 efforts
  • The 8859 family
  • Difficulties with out of band identification of codings
  • ISO 2026 and explicit code-set switching / more state
  • ISO/IEC JTC1/SC2 and a "universal character set": origins of 10646
  • and Unicode

ARPANET and Internet Internationalization.

  • Hostnames, NVT ASCII, etc.: Avoid messing things up
  • Content and out of band identification of codings
  • The Kermit approach
  • The MIME effort and content type tagging
  • Rejection of stateful strings and ISO 2026
  • Moving past 8859 and national codings and toward 10646/Unicode

The Presentation Problem.

  • Coding in protocols versus presentation to the user
  • Internet avoidance of a real presentation layer
  • Coding, transliteration, translation, and user presentation

The domain name problem.

  • No plausible way to transmit out of band code identification
  • Resolution must have the same semantics worldwide, or the system becomes useless for unique resource identification.
  • "Binary coding" is problematic for applications not well-defined for existing types and class
  • The IDNA solution -- two primary elements
  • A mapping system for conflicting and prohibited characters
  • A coding system into "LDH"-type strings
  • Browsers, plugins, other protocols, and stack changes
  • Obnoxious transliterations versus obnoxious encodings
  • Translation of elements for localization
  • Registry restrictions, JET, variants, and reserved labels.

What lies ahead.

  • An internationalized Internet versus an English Internet with other scripts grafted on
  • The business card problem revisited
  • Local scripts and coding for homogeneous situations, ASCII for global interoperability?
The New Internet (IPv6)

The Internet is based on the end to end model, a basic and simple architecture to enable end-nodes to communicate between each other on a peering level.

This concept is eroding on the current Internet as Network Address Translation (NAT), private addressing and client-server models predominate, driven primarily by web applications that fit very well for this kind of model. This non end to end model serves very well non peer to peer applications, clearly demonstrated by the successful deployment of the worldwide Web as the prime large scale application vehicle.

Taking the Internet beyond the web is the next best thing that can happen to the Internet and the irony of this step and to take the Internet back to its original design and provide it with that simple end to end model in order to scale the Internet and provide the many applications deployed today in smaller scale to the size of the web and beyond.

The Internet model based on IPv6 would cater for ten more large scale applications even larger than the web of today. VoIP, Grid Computing, 3G, P2P ( gaming, file sharing, ..), Remote sensing, Smart Homes, Ad hoc networks, Mobile devices, Intelligent Transport Systems (ITS), Consumer Electronics, Home appliances and networked RFIDs are some of the applications that will see the light with IPv6 and dwarf current network concepts into oblivion.

Join this session and listen to the lessons learned from research and real life deployment from an expert panel on this exciting new
technology and arm yourself with the bigger picture on the New Internet in the making:

Workshop outline:

IPv6 Status Around The World
Latif Ladid, Panel Chairman, President IPv6 Forum, ISOC Trustee

IPv6 Task Force for Developing Nations
Rosa Delgado, ISOC Trustee

e-Nations, Fair worldwide Distribution of the Internet IP resource
Axel Clauberg, Cisco

Everyone and Everything on the NET, Benefits and IPv6 Ready programme
Patrick Cocquet, 6WIND

IPv6 and Grid
Piers O'Hanlon, University College London

New Internet Security and Privacy Models enabled by IPv6
Mat Ford, British Telecom

Bridging the Digital Divide with IPv6-enabled Power Line
Communications and Wireless LANs
Jordi Palet, Consulintel

The benefits of using IPv6 in the context of new Business
Environments
Bosco Fernandes, Siemens

RIRs and IPv6
Raymond A. Plzak, ARIN

Debate with all the panelists
- How can IPv6 achieve that "The Internet is For ALL"?
- Digital Society
- Digital Divide
- Societal Impact
- Business Impact
- Political Impact

Emerging Security technologies

A balanced tutorial from the experts in the field

Communication networks have become the backbone of modern society. Such networks enable citizens to be connected to their virtual ambient environment irrespective of location. Recently deployed wireless terminals (Mobile phone, PDA, laptops), networks (WLAN, GSM/GPRS/3G) and applications allow the users to access the Internet from just about anywhere and the possibilities to connect everything from printers to refrigerators to the Internet. However, the present networks still have limited security and require some detailed security knowledge from their users. Therefore users often feel insecure when using the Internet due to fear of viruses, intrusion attempts etc. In the near future, security requirements will become even more important as networking and computing develop further and become more ubiquitous. Managing security has turned out to be a difficult and complex task, as the user has to deal with the availability, integrity, authenticity, and confidentiality of data and services. Due to the complexity of technology, many components and actors must interoperate, and human behaviour has become a crucial factor.

The new generation network based on IPv6 will provide peer-to-peer connectivity with extended security. This will help to develop and expand the way people use the Internet..

Improving information security is critical to the operations, reputation, and economic stability of any organisation. As an organisation’s dependency on computers and network communications increases, so does its vulnerability to information security compromises. Almost every week the media reports on new computer crimes, system break-ins, malicious code attacks, and the ever-growing threat of cyber terrorism. Current research on network security shows three realities that organisations must consider:

  • Threats to computer systems and networks are increasing
  • Damage caused by malicious attacks is rising
  • Systems without appropriate security are easy targets for attackers

In addition to the legal ramifications of a security breach, it is well substantiated that malicious attacks result in actual financial costs, decreases in revenue, and have a severe negative impact on productivity. The security architecture that can help organisations to reduce incidents of security breach and to meet the requirements of new laws and regulations around the world is being addressed in many industrial and public organisations.

Every existing information systems rely on two families of technology:

  • End-to-end strong encryptioni, (IPsec)
  • Centralised keys distribution architecture (PKI)

and a worldwide mandatory usage of resource-wasting, uniform technology ruled by de-facto standards, diametrically opposed to real-life and its trust mechanisms.

The IPsec protocol has been defined to secure Internet communications. However, IPsec is not widely deployed in legacy networks. IPv6 protocol mandates the support of IPsec, to make the new generation Internet more secure. IPsec implementation in IPv6 provides security services such as data integrity, authenticity, confidentiality, and protection against spoofing and session replays. Furthermore, with IPv6, NAT boxes are no longer required, which allows a broad deployment of IPsec functionality.

These security services are provided using symmetric/asymmetric keying mechanisms. Hence there is a need for a security key management framework to truly enable end-to-end secure communication. Therefore, a Public Key Infrastructure (PKI) is required for wide scale deployment of a security infrastructure across the Internet. PKI, in combination with other key management systems, will function as an authoritative source for certified keys of hosts and services on the Internet and provide the possibility of interoperability with the Domain Name System (DNS) infrastructure.

The SEINIT FP6 Project proposes to extend the panel of security mechanisms by introducing new security models and to build a security framework to address this nomadic, pervasive, multi-players communication world.

Issues addressed in the tutorial: Emerging security technologies

Network security is a major concern for any user and organisation, independent of whether the network used is a LAN or a WAN, and whether it is connected to the Internet or not. This tutorial provides a practically focused perspective on network security and provides training on some emerging security technologies. Many of the advanced technologies are being developed at present.

Security concerns are presented with an eye towards useful, practical, applicable procedures and policies. Technologies for securing your network against threats from both inside your organization and outside intruders (including the Internet) will be discussed. The seminar covers preventative procedures, policies, and implementations. We discuss security systems, card keys, software, hardware, encryption, abstraction, authentication, and other security mechanisms.

The speakers will address

  • How to identify network security risks
  • How to define a security policy
  • How to develop security procedures

Topics to be covered include:

  • Threats and Security requirements in cyber space
    Prof. Stephen Hailes, UCL, U.K
  • Security Architecture, policies, Infospheres
    Prof. Michel Riguidel, ENST; France
  • Infrastructure security: PKI, IPsec, DNSsec, IPv6
    Dr. Antonio Skarmeta, Univ. of Murcia, Spain
  • Intrusion detection systems and Honeypots
    Mr. Jimmy McGibney , WIT, Ireland
  • Policy based network management
    Dr. Adrian Waller, TRT, U.K
  • Mobile authentication and access control: CGA, PANA, MIPv6 security
    Mr. Wolfgang Fritsche, IABG, Germany
  • Security products overview
    Ms. Frédérique Tastet, Thales, France
  • Operational issues, standards, privacy
    Mr. Mat Ford, BT, U.K.
  • Panel Discussions: Open discussion based on the issues raised by the participants

Audience

  • Systems programmers
  • Network Managers

Prerequisites

  • General knowledge of networking

Click here: http://www.isoc.org/mailman/listinfo/inet04 to sign up to the INET/IGC 2004 conference mailing list to be kept informed about registration information, the conference program, and other important updates to information on this web site.