|
Pre-Conference Workshops and Tutorials
Technical Facility Tours & Lectures New @INET99New at INET99 is a behind the scenes look at the facilities of some of the technology leaders in Silicon Valley. This year we are pleased to offer tours to Cisco Systems, Inc., 3Com Corporation, and Sun Microsystems. Buses will depart from the McEnery Convention Center and participants are requested to arrive 20-minutes prior to departure time. You must pre-register for these tours. Please see the Conference Registration Form. Cisco Systems, Inc. Monday, 21 June 1999 Tuesday, 22 June 1999 Cisco Systems tour will provide an overview from Cisco executives on technology and services for the Internet, including delivery of voice, video, and data. 3Com Corporation Monday, 21 June 1999 Tuesday, 22 June 1999 A tour of 3Coms corporate headquarters will include demonstrations by 3Coms convergence and interoperability labs, as well as an overview by company executives on technology and Internet services. Sun Microsystems Tuesday, 22 June 1999 Join Sun Microsystems executives at their Corporation Briefing Center in Menlo Park for presentation(s) and demonstrations of Suns hardware/software, Java, and JINI technologies. Technical TutorialsSeparate Fee required.
The Internet Society offers nine highly focused tutorials conducted by industry experts from around the world. The Tutorials, full of in-depth, practical information on current and emerging technologies, compliment the INET'99 Conference and can be an important part of your professional development. These educational programs will give you a greater understanding of theories, practices, real-world applications, and critical issues. (Tutorial fees include program, lunch and materials). See registration form at http://www.isoc.org/inet99/inetreg.shtml#form. TUTORIAL 1: Securing the
Internet Instructor: Rolf Oppliger, Ph.D The aim of this tutorial is to overview the security technologies that are available today to secure TCP/IP-based networks, and to discuss their advantages and disadvantages with regard to their deployment within the Internet or corporate intranet and extranet environments. Learning Objectives:
Prerequisite: Attendees should be familiar with the
fundamentals of TCP/IP networking and have some basic understanding of cryptographic
techniques. Intended Audience: Security and communications protocol
engineers, network administrators, and managers who are responsible for the design and
implementation of network security products and corresponding solutions. TUTORIAL 2: Adopting XML:
Tomorrow¹s Web Instructor: Simon Brooke Learn about the key business, technical and management issues
concerning the new XML (eXtensible Markup Language) standard. This tutorial gives an
overview of the present state of development and future prospects for XML, the proposed
new open standard for Web documents. The tutorial includes some technical material and
hands-on elements. Learning Objectives:
Attendees will learn how XML fits into the architecture of the Web,
and will have the resources to develop a strategy for incorporating XML into their
organizations¹ Web presence, or for converting an existing Web presence entirely to XML.
Attendees will receive Course Notes, Set of Online and Published references, XML Strategy
Workbook. Content of this tutorial will include: What is XML, Status of XML,
Benefits of XML, Anatomy of an XML system, Extending an XML System, XML in your context,
and Review of Tools and Technologies. Prerequisite: Attendees should have a working knowledge of
HTML. Intended Audience: Web developers, Web development managers. TUTORIAL 3: Getting the IMS
Standards for Distributed Learning Working for You Instructor: Denis Newman IMS is developing distributed learning standards that will enable
instructors to use learning content in multiple ways, draw content from multiple vendors,
obtain a wider variety of content, and integrate learning servers into their enterprise.
Given the widespread industry support for these standards, any developer or publisher of
educational content or tools will want to be familiar with how to build IMS-enabled
software. This tutorial will cover the basics of the technical specifications while
providing an introduction to the IMS organization and its development process. The scope
of the IMS standards includes:
Learning Objectives: The tutorial will also address current open issues, areas of current
development and opportunities for active participation. TUTORIAL 4: Layer 3
Switching and Gigabit Routing: An Inside Look to Tomorrow¹s Routers Instructor: Dante Malagrino Up to some years ago, LAN design principles were extremely focused
on details, like collision domains or the number of connected end-stations. Today, with
structured cabling and desktop switching, design criteria are new: the SYSTEM as a whole
has become more important than the detail, and we can talk about Design Theory for
Switched LANs. The latest change in the LAN design scenario has been the comparison
of Layer 3 Switches. Those devices are functionally equivalent to classical routers, but
offer excellent performance (in terms of throughput and latency) at the same level of
flexibility. What has made Layer 3 Switches possible, is not the introduction of
new protocols or forwarding schemes (such as those addressed as multi-layer routing or
switching); it is *only* the increased use (at low cost) of ASICs (Application Specific
Integrated Circuits). These chips have completely renewed routers (or layer 3 switches)
architecture, and this tutorial will explain (at least):
Of course, high speed routing (i.e., layer 3 switching) will not be
the only novelty of next generation campus networks. There are other issues to be
considered and analyzed: Quality Of Service (IEEE 802.1p, DiffServ and IntServ from IETF),
Multicasting (GMRP from IEEE 802.1Q), VLANs (802.1Q). All of these features will be
considered, and they will be related to the deployment of layer 3 switches. Learning Objectives:
TUTORIAL 5: Cryptography,
Security and Privacy Instructor: Charlie Catlett This tutorial provides an overview of the basic elements of computer
security and privacy, including the building blocks, cryptographic technologies, and
protocols used to construct secure and private services and systems. An overview of
existing and emerging technologies and implementations of secure and private systems will
be given. This will include both current practice and technologies (Java, Kerberos, PGP,
SSL, etc.) and their application in the real world for secure computing as well as newer
capabilities (digital cash, digital signatures) supporting commerce on the Internet. Prerequisite: Participants should be familiar with networked
computing (the Internet, client/server applications, etc.) as well as basic mathematics
and computer programming. This basic background information is essential to anyone
involved in the Internet today, including technical staff as well as executives. TUTORIAL 6: ATM
Internetworking Instructor: Peter Elford Asynchronous Transfer Mode (ATM) is one of the most significant
networking technologies that have been developed in the last 10 years. Designed to support
the integration of data, voice and video over a common physical infrastructure, ATM has
been widely deployed in a number of production environments. Learning Objectives:
Intended Audience: Network managers and technical IT managers
with a basic understanding of network principles and the IP protocol. TUTORIAL 7: Accessible Web
Sites: Design and Construction Instructor: Michael Burks With the ever increasing competition for attention for sites on the
World Wide Web, it is essential to maximize the number of people who can access your site.
This tutorial will describe simple techniques that will extend the accessibility of your
site to people who may have difficulty with e.g. color, font size, images, audio,
flickering, and fine mouse manipulation. This tutorial will explore the ways to design
sites and present information so it can be accessed in a number of different ways.
Further, it will seek to teach some ways to make sites usable by those who are not native
to the culture that has produced them. Attendees will be taught how to construct and
maintain sites that are usable by the largest number of people at the smallest cost. New
technologies will be looked at and old techniques will be discussed. Learning Objectives: The tutorial will raise the awareness of
Web-site designers so that they understand that users may not access the sites they design
in the ways they originally envisioned. Attendees will be taught techniques to present
information on a web in an efficient, effective manner. Prerequisites: Desire to learn and familiarity with some
HTML. Intended Audience: Webmasters, Web designers and managers of
information management projects seeking to present their information in the most efficient
and effective manner. TUTORIAL 8: Electronic
Commerce in Practice Instructor: Gordon Howell, Internet Business Services Consulting
Ltd., United Kingdom This tutorial is a pragmatic one-day seminar presenting a
step-by-step development plan for adoption of electronic commerce into their business. Electronic Commerce has been targeted by National Governments
worldwide (but especially the USA) as a strategic issue. Companies undertaking E-Commerce
because they can create new markets, new points-of-sale, automate trading relationships
and redesign their fundamental business operations. As such, the term is loosely defined
and subject to abuse. This course provides a general management and technical framework to
assist companies in planning their evolution to electronic commerce. Learning Objectives:
Course Content:
Intended Audience: Business development managers, IT systems
architects, consultants, electronic marketing specialists. TUTORIAL 9: IPv6 Primer
Instructor: Marc Blanchet, Florent Parent, Viagénie Inc,
Canada IPv6, the next generation IP protocol, is designed to improve
scalability, security, ease-of-configuration, and network management. IPv6 has been designed to allow a flexible address allocation where
no pre-defined prefix or netmask are used. A host can now use address autoconfiguration
where it discovers its network address and automatically configure its IPv6 address. This
is a key feature when it is necessary to renumber every host within an organization. The transition mechanisms have been designed to make it easy for
network administrators to upgrade to IPv6. The transition will involve dual-stack
IPv4/IPv6 hosts and routers and tunneling IPv6 in IPv4. The tutorial will give an overview of IPv6 with description of the
protocols and addressing involved. It will then give details on how to configure most
common implementations and how to deploy IPv6 over the corporate network and on the
Internet. At the end of the tutorial, the attendee will have a good understanding of IPv6
and how to deploy it. Intended Audience: Anyone interested in learning how to use, deploy
or integrate IPv6. IPv4 knowledge required. Topics Covered:
A separate fee is required. Workshop fee
includes program, lunch and materials. Please see registration form. A separate fee is required. Symposium fee
includes program, lunch and materials. See registration form for details. 13-20 June 1999 13-18 June 1999 | |||||||||||||||||||||||
This document
<http://www.isoc.org/isoc/conferences/inet/99/pre-conference.shtml>
|
||||||||||||||||||||||||