|
|
|

|

|
|
|
|
|
TUTORIAL
PROGRAMME |
|
|
|
|
|
November 16, 2004
|
Tuesday, 9am-5pm |
Tutorial 2,
3 |
November 19, 2004 |
Friday, 9am-5pm |
Tutorial 5 |
|
|
Registration for
tutorial 2 and 3 will be opened till: November 16, 2004
Registration for
tutorial 5 will be opened till: November 19, 2004
Tutorial
1 and 4 will not be run. |
|
|
|

|
|
Tutorial
2 |
|
|
Dr. Raj
Jain
Co-Founder
and CTO
Nayna
Networks (San Jose, CA, USA) |
|
|
Title
-
Broadband Metro and
Access Networks |
|
Instructor -
Dr Raj Jain (jain@acm.org)
is the Co-founder and Chief Technology Officer of Nayna
Networks, Inc - a next generation broadband access equipment
company in San Jose, CA. Dr. Jain is an Adjunct Professor at
Ohio State University in Columbus, a Fellow of IEEE, a Fellow
of ACM and is on the Board of Technical Advisors to Teradiant
Networks, San Jose, CA, Avatar Networks, Fremont, CA, and
Rhonet Systems, Columbus, OH. He has been a keynote speaker at
many conferences. Based on his active participation in the
computer industry, Dr. Jain was awarded 1999 SiliconIndia
Leadership Awards for Excellence and Promise in Business and
Technology. For his publications and talks, see http://www.cse.ohio-state.edu/~jain |
|
Synopsis
- This tutorial covers the key technological developments
in broadband networking in metro and access carrier networks.
The role of 10 Gigabit Ethernet standard in unifying the local
and wide area networks will be presented. The features that
make Next Generation SONET a tough competitor for Ethernet in
the carrier metro networks will be explained. The efforts
underway to make Ethernet suitable for carrier network
deployment will be described. Basics of DSL operation and
cable modems will be covered. Upcoming standards on Broadband
wireless access and mobile broadband wireless access and the
role of WiMAX in accelerating their deployments will be
explained. Optical Access using passive optical networks and
free-space optics will also be briefly
presented.
download
full synopsis
|
|
Back
to top |
|

|
|
Tutorial
3 |
|
|
A/Prof. Ray
Hunt
University
of Canterbury, New Zealand
|
|
|
Title -
Security in
Wireless and Mobile Network Architecture |
|
Instructor
-
A/Prof. Ray
Hunt is an
Associate Professor with the Department of Computer Science
and Software Engineering at the University of Canterbury, New
Zealand. He is well known for his expertise in network and
security and has provided numerous training courses, addressed
a variety of conferences and acted as a telecommunications
consultant for a number of telcos and other
companies. |
|
Synopsis -
This tutorial will cover a number of very pertinent topics of
interest in the area of Wireless LAN
and WAN security and examines some of the real security issues
facing Wireless LAN and Wireless WAN network users. The
tutorial commences by examining local and wide area lower
layer wireless and mobile infrastructure including the types
of threats that they face. It then proceeds to examine the
protocols and architecture that go to make up the security
infrastructure for these wireless and mobile networks. Finally
issues such as WLAN/WWAN (3G) integration and handoff, Quality
of Service performance, wireless profiled TCP and security
testing and evaluation procedures will be covered.
download
full synopsis |
|
Back
to top |
|

|
|
Tutorial
5 |
|
|
Dr. Radia
Perlman
Distinguished Engineer
Sun
Microsystems |
|
|
Title -
Principles of
Network Security Protocols |
|
Instructor -
Dr. Radia Perlman is known for her
contributions to bridging (spanning tree algorithm) and
routing (robust and scalable link state routing) as well as
security (sabotage-proof networks). Her current area of
research focuses on network security protocols, including
PKI models,
credentials download, strong password protocols, and
analysis and redesign of IPsec's authentication
protocol. She is one of the 25 people whose work has most
influenced the networking industry, according to Data
Communications Magazine. She has about 70 issued patents, an
S.B. and S.M in mathematics and a Ph.D. in computer science
from MIT and an honorary doctorate from KTH. |
|
Synopsis -
This
tutorial introduces the toolkit of tricks used by network
security protocols: cryptography, handshakes, and key
distribution. It concentrates on the system issues that are
not answered by the standards, such as the subtle differences
in functionality between systems based on public keys
(PKI-based) and
systems based on secret keys (e.g., Kerberos), and the real
challenges in building a chain of trust from a key you know a
priori to a target name. It talks about common mistakes people
make when designing or deploying security systems ("how to
build an insecure system out of perfectly good cryptography").
And it suggests areas for research.
download
full synopsis |
|
Back
to top |
|

|
|
|
| |
| |