San Jose, Calif., June 22-25, 1999
Conference Workshops and Tutorials
Technical Facility Tours & Lectures New @INET99
New at INET99 is a behind the scenes look at the facilities of some of the technology leaders in Silicon Valley. This year we are pleased to offer tours to Cisco Systems, Inc., 3Com Corporation, and Sun Microsystems.
Buses will depart from the McEnery Convention Center and participants are requested to arrive 20-minutes prior to departure time. You must pre-register for these tours. Please see the Conference Registration Form.
Cisco Systems, Inc.
Monday, 21 June 1999
Tuesday, 22 June 1999
Cisco Systems tour will provide an overview from Cisco executives on technology and services for the Internet, including delivery of voice, video, and data.
Monday, 21 June 1999
Tuesday, 22 June 1999
A tour of 3Coms corporate headquarters will include demonstrations by 3Coms convergence and interoperability labs, as well as an overview by company executives on technology and Internet services.
Tuesday, 22 June 1999
Join Sun Microsystems executives at their Corporation Briefing Center in Menlo Park for presentation(s) and demonstrations of Suns hardware/software, Java, and JINI technologies.
Separate Fee required.
The Internet Society offers nine highly focused tutorials conducted by industry experts from around the world. The Tutorials, full of in-depth, practical information on current and emerging technologies, compliment the INET'99 Conference and can be an important part of your professional development. These educational programs will give you a greater understanding of theories, practices, real-world applications, and critical issues. (Tutorial fees include program, lunch and materials). See registration form at http://www.isoc.org/inet99/inetreg.shtml#form.
TUTORIAL 1: Securing the Internet
Instructor: Rolf Oppliger, Ph.D
The aim of this tutorial is to overview the security technologies that are available today to secure TCP/IP-based networks, and to discuss their advantages and disadvantages with regard to their deployment within the Internet or corporate intranet and extranet environments.
Prerequisite: Attendees should be familiar with the fundamentals of TCP/IP networking and have some basic understanding of cryptographic techniques.
Intended Audience: Security and communications protocol engineers, network administrators, and managers who are responsible for the design and implementation of network security products and corresponding solutions.
TUTORIAL 2: Adopting XML: Tomorrow¹s Web
Instructor: Simon Brooke
Learn about the key business, technical and management issues concerning the new XML (eXtensible Markup Language) standard. This tutorial gives an overview of the present state of development and future prospects for XML, the proposed new open standard for Web documents. The tutorial includes some technical material and hands-on elements.
Attendees will learn how XML fits into the architecture of the Web, and will have the resources to develop a strategy for incorporating XML into their organizations¹ Web presence, or for converting an existing Web presence entirely to XML. Attendees will receive Course Notes, Set of Online and Published references, XML Strategy Workbook.
Content of this tutorial will include: What is XML, Status of XML, Benefits of XML, Anatomy of an XML system, Extending an XML System, XML in your context, and Review of Tools and Technologies.
Prerequisite: Attendees should have a working knowledge of HTML.
Intended Audience: Web developers, Web development managers.
TUTORIAL 3: Getting the IMS
Standards for Distributed Learning Working for You
Instructor: Denis Newman
IMS is developing distributed learning standards that will enable instructors to use learning content in multiple ways, draw content from multiple vendors, obtain a wider variety of content, and integrate learning servers into their enterprise. Given the widespread industry support for these standards, any developer or publisher of educational content or tools will want to be familiar with how to build IMS-enabled software. This tutorial will cover the basics of the technical specifications while providing an introduction to the IMS organization and its development process. The scope of the IMS standards includes:
The tutorial will also address current open issues, areas of current development and opportunities for active participation.
TUTORIAL 4: Layer 3
Switching and Gigabit Routing: An Inside Look to Tomorrow¹s Routers
Instructor: Dante Malagrino
Up to some years ago, LAN design principles were extremely focused on details, like collision domains or the number of connected end-stations. Today, with structured cabling and desktop switching, design criteria are new: the SYSTEM as a whole has become more important than the detail, and we can talk about Design Theory for Switched LANs.
The latest change in the LAN design scenario has been the comparison of Layer 3 Switches. Those devices are functionally equivalent to classical routers, but offer excellent performance (in terms of throughput and latency) at the same level of flexibility.
What has made Layer 3 Switches possible, is not the introduction of new protocols or forwarding schemes (such as those addressed as multi-layer routing or switching); it is *only* the increased use (at low cost) of ASICs (Application Specific Integrated Circuits). These chips have completely renewed routers (or layer 3 switches) architecture, and this tutorial will explain (at least):
Of course, high speed routing (i.e., layer 3 switching) will not be the only novelty of next generation campus networks. There are other issues to be considered and analyzed: Quality Of Service (IEEE 802.1p, DiffServ and IntServ from IETF), Multicasting (GMRP from IEEE 802.1Q), VLANs (802.1Q). All of these features will be considered, and they will be related to the deployment of layer 3 switches.
TUTORIAL 5: Cryptography, Security and Privacy
Instructor: Charlie Catlett
This tutorial provides an overview of the basic elements of computer security and privacy, including the building blocks, cryptographic technologies, and protocols used to construct secure and private services and systems. An overview of existing and emerging technologies and implementations of secure and private systems will be given. This will include both current practice and technologies (Java, Kerberos, PGP, SSL, etc.) and their application in the real world for secure computing as well as newer capabilities (digital cash, digital signatures) supporting commerce on the Internet.
Prerequisite: Participants should be familiar with networked computing (the Internet, client/server applications, etc.) as well as basic mathematics and computer programming. This basic background information is essential to anyone involved in the Internet today, including technical staff as well as executives.
TUTORIAL 6: ATM Internetworking
Instructor: Peter Elford
Asynchronous Transfer Mode (ATM) is one of the most significant networking technologies that have been developed in the last 10 years. Designed to support the integration of data, voice and video over a common physical infrastructure, ATM has been widely deployed in a number of production environments.
Intended Audience: Network managers and technical IT managers with a basic understanding of network principles and the IP protocol.
TUTORIAL 7: Accessible Web Sites: Design and Construction
Instructor: Michael Burks
With the ever increasing competition for attention for sites on the World Wide Web, it is essential to maximize the number of people who can access your site. This tutorial will describe simple techniques that will extend the accessibility of your site to people who may have difficulty with e.g. color, font size, images, audio, flickering, and fine mouse manipulation. This tutorial will explore the ways to design sites and present information so it can be accessed in a number of different ways. Further, it will seek to teach some ways to make sites usable by those who are not native to the culture that has produced them. Attendees will be taught how to construct and maintain sites that are usable by the largest number of people at the smallest cost. New technologies will be looked at and old techniques will be discussed.
Learning Objectives: The tutorial will raise the awareness of Web-site designers so that they understand that users may not access the sites they design in the ways they originally envisioned. Attendees will be taught techniques to present information on a web in an efficient, effective manner.
Prerequisites: Desire to learn and familiarity with some HTML.
Intended Audience: Webmasters, Web designers and managers of information management projects seeking to present their information in the most efficient and effective manner.
TUTORIAL 8: Electronic Commerce in Practice
Instructor: Gordon Howell, Internet Business Services Consulting Ltd., United Kingdom
This tutorial is a pragmatic one-day seminar presenting a step-by-step development plan for adoption of electronic commerce into their business.
Electronic Commerce has been targeted by National Governments worldwide (but especially the USA) as a strategic issue. Companies undertaking E-Commerce because they can create new markets, new points-of-sale, automate trading relationships and redesign their fundamental business operations. As such, the term is loosely defined and subject to abuse.
This course provides a general management and technical framework to assist companies in planning their evolution to electronic commerce.
Intended Audience: Business development managers, IT systems architects, consultants, electronic marketing specialists.
TUTORIAL 9: IPv6 Primer
Instructor: Marc Blanchet, Florent Parent, Viagénie Inc, Canada
IPv6, the next generation IP protocol, is designed to improve scalability, security, ease-of-configuration, and network management.
IPv6 has been designed to allow a flexible address allocation where no pre-defined prefix or netmask are used. A host can now use address autoconfiguration where it discovers its network address and automatically configure its IPv6 address. This is a key feature when it is necessary to renumber every host within an organization.
The transition mechanisms have been designed to make it easy for network administrators to upgrade to IPv6. The transition will involve dual-stack IPv4/IPv6 hosts and routers and tunneling IPv6 in IPv4.
The tutorial will give an overview of IPv6 with description of the protocols and addressing involved. It will then give details on how to configure most common implementations and how to deploy IPv6 over the corporate network and on the Internet. At the end of the tutorial, the attendee will have a good understanding of IPv6 and how to deploy it.
Intended Audience: Anyone interested in learning how to use, deploy or integrate IPv6. IPv4 knowledge required.
Educational Networking (K-12) Workshop
A separate fee is required. Workshop fee includes program, lunch and materials. Please see registration form.
Developing Countries Networking Symposium"Expanding Global Frontiers: Beyond the Limits"
A separate fee is required. Symposium fee
includes program, lunch and materials. See registration form for details.
13-18 June 1999