AGENDA - SwiNOG 22 - 9. may 2011, Berne
- 08h15 Registration
- 09h00 Welcome
- 09h15 Automatic Multicast without Explicit Tunnels (AMT), Thomas Kernen
- 09h45 Main benefits of using a Content Delivery Network solution, Huba Szalay
- 10h15 Morning Break
- 10h45 IPv6 Deployment at Swisscom, Martin Gysi
- 11h15 DE-CIX Update, Arnold Nipper
- 11h25 Swiss-IX Update, Marco Huggenberger
- 11h35 Android controlled vending machine, Thomas Weible
- 11h50 Lunch
- 14h00 Practical use of Ethernet OAM, Joerg Ammon
- 14h30 Network Forensics, Thorsten Dahm
- 15h00 Equinix Update, Vincent Rais
- 15h30 Afternoon Break
- 16h00 Roundtable (BÜPF, FINMA)
- 17h30 Social Event
Registration, Coffee & Gipfeli
Welcome by Pascal Gloor, SwiNOG Organisation
Automatic Multicast without Explicit Tunnels (AMT) by Thomas Kernen (Cisco Systems)
The primary goal of Automatic Multicast without explicit Tunnels (AMT) is to foster the deployment of native IP multicast by enabling a potentially large number of nodes to connect to the already present multicast infrastructure. The protocol specification can be deployed in a few strategically-placed network nodes and in user-installable software modules (pseudo device drivers and/or user-mode daemons) that reside underneath the socket API of end-nodes' operating systems.
This presentation will explain the benefits of IP multicast technology and describe how it is used within the broadcasting industry today. It will then explain the current challenges to widescale video distribution using IP multicast. Finally it will explain how Automatic Multicast without explicit Tunnels (AMT) overcomes these challenges and briefly describe the status of this specification.
Main benefits of using a Content Delivery Network solution by Huba Szalay (T-Systems)
Using a Content Delivery Network solution can significantly improve the end-user experience by shortening response times, improving reliability and increasing scalability of the hosted content. From the service provider point of view it can help to reduce server and network load thus measurable cost savings can be reached. In addition due to its nature CDN can provide effective protection against DDoS attacks as well.
IPv6 Deployment at Swisscom by Martin Gysi (Swisscom)
The introduction of IPv6 at Swisscom is starting to gain momentum. As first product, IPv6 Internet access for residential customers will be launched, based on 6rd. Other services and platforms will follow. The talk will explain the choice of 6rd for Internet access and outline a potential deployment roadmap for other IPv6-enabled services.
DE-CIX Update by Arnold Nipper (DE-CIX Management GmbH)
Swiss-IX Update by Marco Huggenberger (Swiss-IX)
Android controlled vending machine by Thomas Weible (flexOptix)
In February/March of 2011 a skunkworks project at flexOptix built an android controlled vending machine for nuts & bolts, patch cables, transceivers etc.
The 350 kg gearomat vending machine had several challenges compared to the usual 350g programming device we design & build. These included implementing a communication protocol from scratch for a 15 year old vending controller, persuading vendors that we were really building a vending machine for cage nuts & bolts.
The challenges that were easier than expected included stainless steel metal work to install the controller, transceiver programmer, hand scanner, although the neighbours in the neighbouring hotel did ask what the noise at midnight was the following day. Making the gearomat colorful & shiny with an LED light show drew a regular crowd in the corridor.
The only challenge we did not surmount was the size of doors in our building resulting in all the development work being carried out in the communal corridor.
After 21 days we transported it back to Hannover for the CeBIT trade show where it attracted a lot of attention including a PO for the first production model.
Lunch break, Buffet
Practical use of Ethernet OAM by Joerg Ammon (Brocade)
Overview of 802.3ah, Y.1731 and 802.1ag and their use for monitoring and operation of metro networks.
Network Forensics by Thorsten Dahm (Google)
This talk is supposed to provide an overview about the topic of network forensics. Since many years engineers talk about security and how to secure a network. But there are not many talks about the worst case and what to do in case something bad happens. I will provide some tips on how to prepare for the worst case and how to handle such a situation. Based on many years of experience in this field I'd like to talk about what you can do if all your security measures have failed, how to detect the incident quickly and how to keep the harm at a minimum. I don't want to suggest using hardware or software from a special vendor, I want rather share my experience in this area with a wider audience. First I present some individual attacks and present afterwards some provisions.
Equinix Update by Vincent Rais (Equinix)
To end this event, we have organised a roundtable that will last about an hour and a half and will continue into the social event. Two topics will be discussed; first "How far (in terms of filtering/policing) can, will, should the FINMA go?" and second "What is the state of the new BÜPF law?".
- Moderated by: Pascal Gloor
- Marc Henauer, Federal Intelligence Service, Chief MELANI
- Dr. Esther Kobel, FINMA, Leader Unauthorised institutions
- Simon Schlauri, Sunrise Communications AG, Senior Legal Counsel / Regulatory
- Nicolas Mayencourt, Dreamlab Technologies AG, CEO
- Felix Ceccato, KKJPD/CCDJP, Vice-chairman Working-group Communication surveillance
- Andre Oppermann, Internet Business Solutions AG, CEO