During this session, people who have made the bricks to build the Internet in Poland will talk about how this huge building (which Polish Internet is) was constructed.
Deployment of IPv6 to enterprise networks can be very challenging. There are problems and mistakes that seem to be common across many such deployments. This presentation will survey some of these issues, and will provide lessons learned, as well as historical perspectives from over a decade of IPv6 deployments to various enterprise networks, including recent efforts in the U.S. Federal Government.
Resources of available IPv4 addresses are running out. Beacuse of the implementation of IPv6 addresses to the network, it is necessary to manage the allocation and use of these addresses. Is excel enough? Maybe the dedicated software, that will allow for the comprehensive management of IPv4 and IPv6 addressing, and DNS or DHCP should be used to achieve this goal? Maybe it is worth to automate the process of handling RIPE requests? During this session the main fuctional modules of EfficientIP will be disscussed, and SolidServer server configuration for address assignment (with applications to the RIPE test database) and DHCP, DNS will be shown on live.
OpenFlow and SDN are fueling the latest hype bubble in the networking industry, with many engineers wondering what’s really going on behind the scenes and how useful these technologies might be in real-life networks. The presentation will describe the basics of OpenFlow, its advantages and pitfalls, and the potential real-life use cases including a brief overview of some existing deployments.
EAPS technology was invented around year 2000 by Extreme Networks as technology for protecting ring topology based Metro Ethernet networks. EAPS was created as an alternative solution and possible replacement of very expensive SDH network with cost effective Ethernet networks giving at the same time similar recovery time in case of failure that was less than 50ms. After several years ITU created a recommendation G.8032 ERPS that allows different vendors to interoperate. Presentation will give a little bit more closer view on the new G.8032 standard and will compare it with well known and proven EAPS technology from Extreme Networks.
During the presentation will be present technical aspects of performance of the network address translation (NAT) within IPv4 and IPv6 protocols by using the Next Generation Firewall (NGF) in operators’ network. Fast firewalls that protect the edge of the service providers’ and companies’ network and confront the challenge to connect IPv4 and IPv6 worlds. In addition, in order to ensure the effective security, their tasks were extended by IPS and by application control, and sometimes by anti-virus protection. The New Generation Firewall has to deal with efficiency requirements and demonstrate effective protection and reliability.
During the presentation will be discussed the typical DoS / DDoS attacks and methods of detection and blocking. At the end of the presentation will be presented the solution that can stop the DDoS traffic of hundreds of gigabytes per second.
During the lecture, we will try to lift the curtain associated with the development of cloud computing management system, which is formed at the Institute of Nuclear Physics in Cracow. At the beginning we would like to show our audiences the general objectives pursued by the idea of cloud computing and the possibility of applying it among scientists and scientific institutions and universities. In the second part of the presentation will be present the issues related to the organization of the network in the cloud based on virtualization, as well as the problems and risks of such an installation.
During the lecture, I’ll talk about how the network for nazwa.pl has been developing over the past 7 years. I’ll also tell about the big changes that have occurred in our network in the last year and where we’re going next.
The IETF TRILL (Transparent Interconnection of Lots of Links) protocol provides a new paradigm combining the advantages of bridges and routers. It forwards Layer 2 frames transparently using least cost pair-wise path without configuration in multi-hop networks with arbitrary topology and link technology and safe forwarding even during temporary loops. TRILL supports multi-pathing of both unicast and multicast traffic, VLANs, and frame priorities. This talk will cover the TRILL Protocol including the latest developments in TRILL such as support for BFD, TRILL OAM, and methods to reduce or eliminate the needs for ARP and ND.
2. High volume SMTP AV scanning solution
AudioCodes products solve problems that bother enterprises and VoIP operators worldwide. During the presentation we will show how the business customer satisfaction can materialize. How difficult implementations and cost effective services can be done.
Security of IT infrastructure and computer network is a key point for any organization. Is it enough to deploy firewall and IDS/IPS system? Or is it necessary to do more? We will briefly go through available technologies for network monitoring & security and we will mainly focus on why network traffic monitoring (NetFlow) with NBA (Network Behavior Analysis) functionality is becoming essential part of ICT security. NBA not only detects threats against which standard signature based techniques are blind, but moreover with full network traffic visibility provides tool for more effective network traffic troubleshooting, reporting, data retention compliance and network cost optimization.
he IETF TRILL (Transparent Interconnection of Lots of Links) protocol provides a new paradigm combining the advantages of bridges and routers. It forwards Layer 2 frames transparently using least cost pair-wise path without configuration in multi-hop networks with arbitrary topology and link technology and safe forwarding even during temporary loops. TRILL supports multi-pathing of both unicast and multicast traffic, VLANs, and frame priorities. This talk will cover the TRILL Protocol including the latest developments in TRILL such as support for BFD, TRILL OAM, and methods to reduce or eliminate the needs for ARP and ND.
A few years ago it seemed that the transmission of 40G in DWDM networks is all that can be achieved. To the surprise of many people, after a few years the 100G DWDM / IPoDWDM solutions are put into the production. What is more interesting, the existing DWDM network in which are implemented the 100G solution, does not need improvement of optical links parameters… The aim of the session is the explanation of the mechanisms that made it possible to achieve this goal.
An Architecture for building Next Generation Packet Optical Networks for Internet Exchanges. Internet Exchanges are looking at more sophisticated and service oriented Packet infrastructure for offering members and clients deterministic service levels, optimal bandwidth utilization with a predictable behaviour during various networks failures. This presentation focuses on a recent case study based on a Packet Network infrastructure which was created for the London Internet Exchange during the 2012 olympics, and focuses on the seamless Migration procedure which was adopted for ensuring nil downtimes.
The presentation shows Ralph (http://ralph.allegrogroup.com/). It is the Software that was made internally by the Allegro Group and open sourced. The presentation is very interesting because of the software itself and also because of the case of open sourcing.
Creating an information society is one of the most important factors in the development of our country. Building awareness of the benefits of the use of knowledge, tools and services available on the Internet is essential for the development of the information society but also for telecom operators who are looking for ways to improve the profitability of their business through the implementation and promotion of new services based on broadband. When we today are speaking about the use of these networks we have in mind the multimedia services but we rarely remember about the whole range of value added services such as video monitoring, home automation, remote monitoring of alarm systems as well as the entire area of Home Area Network created today in our homes by many devices such as AGD, heating, lighting, etc. During the lecture will be presented examples of services that are and can be provided on the basis of broadband networks and HAN, for individual and institutional customers and local governments. We will present you the genesis of Home Area Network devices and operating systems in the broader context of “home network” and local networks. On the basis of individual cases we will show the profitability of Home Area Network services for telecommunications companies who are their suppliers.
Have you ever heard about the equally silly idea? We do not either. But as it happens in real life, the client had the pressure and the money in his suitcase, so we approached the topic in the way that “we do not handle it?” and we built 300m2 of server room in Tier-3 in a week. During the presentation we will show a lot of pictures of the process, and we will share our experiences of “never do those things”.
Based on Cisco VNI (Video Networking Index) Globally, Internet video traffic will be 55% of all consumer Internet traffic in 2016. Today, some polish service providers noticed that video excised half of total IP traffic. Following this trends importance of video content distribution effectiveness consequently increases. Session will provide discussion about new methodology of OTT content distribution and new features of Origin Server dedicated to Service Provider.
The presentation concerns the implementation of IPv6 in the network of Housing Association named “Winogrady” in Poznan. This local supplier provides Internet access for the residents of the district at Winogrady with the speed of 200Mbps/100Mbps Gigabit Ethernet technology, and since the beginning of 2012 it incorporates the DualStack. During the lecture the following topic will be presented:
preparation of the IPv6 addressing as recommended by RIPE
BGPv4, OSPFv3 protocols running
access service for the Internet user (including the implementation of the delegation of prefixes)
the problems occurred during the implementation
what we have in our plans
The main threats to security
The limitation of mroute registrations
Protection of multicast network edge
Sender’s/receiver’s security and trust
Problems with the dense mode fallback
Multicast in tunnels
The solutions of scalable and reliable mail cloud services operating in nazwa.pl will be presented during the presentation.
The presentation covers implementation of GETVPN technology for encrypting services within service provider network. Atfer short technology refresher, details of interesting deployment of both scalable and robust encrption system will be shown. We will discuss system architecture, hardware performance, network area segmentation, and inter-VPN traffic exchange using both “MPLS route-target madness” and firewalls. Not to mention PKI and certificates. No marketing rubbish – 100% technology.
This presentation shows how the personal hobby project came up with the idea and implementation of large and professional supervision system for (almost) all Data Center operating parameters. Following topics will be discussed: technical description of the architecture, used solutions and the problems. The presentation also contains the technical description of the interesting technology (such as MODBUS, RS-485 and others -> surprise) used in the project.
DNS is not just a random service offered on occasion of other services. Operators’ customers cannot operate without it. DNS services become the last piece of the puzzle that can affect the speed and quality services, during faster networks and increasing bandwidth services. The session will present current issues and challenges related to DNS Cache in operators’ networks. The presentation answers the question of what areas can be secured and optimized by proper implementation of the DNS Cache. Moreover this lecture gives examples of implementations from over the world – in terms of what, how and why it achieved the result. The mix of technology and business. Without marketing, products and without the company names etc.
22nd–23rd October 2012