SwiNOG - Swiss Network Operators Group

24th May 2018


· Home
· Charter
· Meetings
· Mailing list
· Press
· Resources
· Search
· Supporter
· Contact

· Twitter
· Facebook
· LinkedIn

Twitter Facebook
Linkedin XING

Online mailing list archive  




AGENDA - SwiNOG 22 - 9. may 2011, Berne
  • 8h15
    Registration, Coffee & Gipfeli
  • 9h00
    Welcome by Pascal Gloor, SwiNOG Organisation
  • 9h15
    Automatic Multicast without Explicit Tunnels (AMT) by Thomas Kernen (Cisco Systems)
    The primary goal of Automatic Multicast without explicit Tunnels (AMT) is to foster the deployment of native IP multicast by enabling a potentially large number of nodes to connect to the already present multicast infrastructure. The protocol specification can be deployed in a few strategically-placed network nodes and in user-installable software modules (pseudo device drivers and/or user-mode daemons) that reside underneath the socket API of end-nodes' operating systems.
    This presentation will explain the benefits of IP multicast technology and describe how it is used within the broadcasting industry today. It will then explain the current challenges to widescale video distribution using IP multicast. Finally it will explain how Automatic Multicast without explicit Tunnels (AMT) overcomes these challenges and briefly describe the status of this specification.
  • 09h45
    Main benefits of using a Content Delivery Network solution by Huba Szalay (T-Systems)
    Using a Content Delivery Network solution can significantly improve the end-user experience by shortening response times, improving reliability and increasing scalability of the hosted content. From the service provider point of view it can help to reduce server and network load thus measurable cost savings can be reached. In addition due to its nature CDN can provide effective protection against DDoS attacks as well.
  • 1015
    Morning Break
  • 10h45
    IPv6 Deployment at Swisscom by Martin Gysi (Swisscom)
    The introduction of IPv6 at Swisscom is starting to gain momentum. As first product, IPv6 Internet access for residential customers will be launched, based on 6rd. Other services and platforms will follow. The talk will explain the choice of 6rd for Internet access and outline a potential deployment roadmap for other IPv6-enabled services.
  • 11h15
    DE-CIX Update by Arnold Nipper (DE-CIX Management GmbH)
  • 11h25
    Swiss-IX Update by Marco Huggenberger (Swiss-IX)
  • 11h35
    Android controlled vending machine by Thomas Weible (flexOptix)
    In February/March of 2011 a skunkworks project at flexOptix built an android controlled vending machine for nuts & bolts, patch cables, transceivers etc. The 350 kg gearomat vending machine had several challenges compared to the usual 350g programming device we design & build. These included implementing a communication protocol from scratch for a 15 year old vending controller, persuading vendors that we were really building a vending machine for cage nuts & bolts. The challenges that were easier than expected included stainless steel metal work to install the controller, transceiver programmer, hand scanner, although the neighbours in the neighbouring hotel did ask what the noise at midnight was the following day. Making the gearomat colorful & shiny with an LED light show drew a regular crowd in the corridor. The only challenge we did not surmount was the size of doors in our building resulting in all the development work being carried out in the communal corridor. After 21 days we transported it back to Hannover for the CeBIT trade show where it attracted a lot of attention including a PO for the first production model.
  • 11h50
    Lunch break, Buffet
  • 14h00
    Practical use of Ethernet OAM by Joerg Ammon (Brocade)
    Overview of 802.3ah, Y.1731 and 802.1ag and their use for monitoring and operation of metro networks.
  • 14h30
    Network Forensics by Thorsten Dahm (Google)
    This talk is supposed to provide an overview about the topic of network forensics. Since many years engineers talk about security and how to secure a network. But there are not many talks about the worst case and what to do in case something bad happens. I will provide some tips on how to prepare for the worst case and how to handle such a situation. Based on many years of experience in this field I'd like to talk about what you can do if all your security measures have failed, how to detect the incident quickly and how to keep the harm at a minimum. I don't want to suggest using hardware or software from a special vendor, I want rather share my experience in this area with a wider audience. First I present some individual attacks and present afterwards some provisions.
  • 15h00
    Equinix Update by Vincent Rais (Equinix)
  • 15h30
    Afternoon break
  • 16h00
    Roundtable To end this event, we have organised a roundtable that will last about an hour and a half and will continue into the social event. Two topics will be discussed; first "How far (in terms of filtering/policing) can, will, should the FINMA go?" and second "What is the state of the new BÜPF law?".
    • Moderated by: Pascal Gloor
    • Marc Henauer, Federal Intelligence Service, Chief MELANI
    • Dr. Esther Kobel, FINMA, Leader Unauthorised institutions
    • Simon Schlauri, Sunrise Communications AG, Senior Legal Counsel / Regulatory
    • Nicolas Mayencourt, Dreamlab Technologies AG, CEO
    • Felix Ceccato, KKJPD/CCDJP, Vice-chairman Working-group Communication surveillance
    • Andre Oppermann, Internet Business Solutions AG, CEO
  • 17h30
    Social Event
  © 2002 Bytix AG