Yesterday, Today and Tomorrow
    Building IT, Managing IT and Extending IT.

   

Welcome to QUESTnet2005

 

Speaker Abstracts & Bios

Index
  • Argyros, James
  • Bhatti, Saleem
  • Blackney, Ken
  • Blythe, Colin
  • Brainard, Jeff
  • Buchmaier, Ralph William
  • Carlson, Simon
  • Cartlidge, Ross
  • Chia, Roland
  • Connell, Merv
  • Constantine, Richard
  • Descoeudres, Oliver
  • Dolphin, Robert
  • Ducklin, Paul
  • Fanton, Pascal
  • Gast, Matthew
  • Gatiragas, Alex
  • Gold, Clive
  • Gordon, Jonathon
  • Hacker, Mark
  • Hancock, Chris
  • Hicks, Mike
  • Howard, Andrew
  • Hutchens, Ruston
  • Hessing, Chris
  • Ianace, Ernie
  • Johnston, Steve
  • Kingham, Stephen
  • Kopparapu, Chandra
  • Kupfer, Wayne
  • Lansdown, Anne Marie
  • Littlejohn, Kevin
  • Lowe, Maree
  • Marini, Peter
  • MacDonald, William
  • McDuff, Rodney
  • McLaughlin, George
  • Medlow, Dennis
  • Meuronen, Roy
  • Myers, Chris
  • Ng, Danny
  • Nowicki, Sven
  • O'Brien, Greg
  • Parkyn, Paul
  • Paz, Viviani
  • Prior, Mark
  • Radford, Adam
  • Rayner, Tim
  • Razzouk, Rafik
  • Reid, Alex
  • Robertson, Don
  • Rogers, Glynn
  • Ruddy, Gary
  • Russell, Craig
  • Sargent, Mike
  • Sankar, James
  • Sheehan AO, Peter
  • Simkus, Andrew
  • Stoeckigt, Kewin
  • Taylor, Alan
  • Teh, Benjamin
  • Tolhurst, Stephen
  • Thomas, Peter
  • Turner, Glen
  • Waters, Ian
  • White, David
  • White, Justin
  • Williams, Mark
  • Yun, T. Charles
  • Vullers, Henk
  •  

    Chris Hancock

    Chief Executive Officer, AARNet Pty Ltd

    Chris Hancock was appointed to the position of Chief Executive Officer, AARNet Pty Ltd, from 1 February 2004.

    Mr Hancock joined AARNet from Optus, where from 2002-2003 he held the position of Managing Director of the Wholesale Division. He was responsible for the leadership and growth of the Optus Domestic Wholesale Division, the "XYZed" DSL business and both the Australian and Regional Satellite business units.

    From 2000 to 2002, Mr Hancock was Managing Director, Optus Business. In this role he was responsible for the leadership of the retail component of the Optus Business, servicing the corporate market throughout Australia.

    Mr Hancock has also held senior executive roles at both Vodafone and the Seven Network.

    Mr. Hancock holds a Bachelor of Arts (Social Science) from Charles Sturt University and an Executive MBA from the Australian Graduate School of Management. He has had more than twenty years experience in senior leadership and executive positions, including the last ten years in both the media and telecommunications sectors.

    Don Robertson

    Deputy CEO of AARNet Pty Ltd

    As Deputy CEO of AARNet Pty Ltd, Don's role encompasses providing leadership and direction in the implementation of policy, and the operations and administration of AARNet. He represents AARNet and its stakeholders in communications, negotiations and general relationships with clients, suppliers and strategic partners. His role also includes the identification and development of opportunities to increase the value of service and product offerings to clients and stakeholders.

    Don joined AARNet in 2001, prior to this he was Assistant General Manager, Networks, Information Technology Services, CSIRO. Don has an Associate Diploma of Engineering (Electronics).

    Transforming Research and Education in Australia with pervasive networking

    The deployment of the AARNet 3 backbone and the resultant leaps in capacity and access are transforming the ways in which researchers, educators, administrators and students, discover, inspire, manage and learn.

    The challenges are exciting as we enter a totally new era in communications across national, regional and international boundaries.

    In Australia, AARNet 3 provides a fundamental shift from a “managed service “ environment to a world where operating and developing infrastructure becomes second nature and the challenges of security, quality of service, mobility and authentication are all fundamental to the delivery of high quality real time services.

    The ultimate challenges will be to extend the range of services and applications available to Australian researchers and educators and to broaden the reach of our communities, so as to ensure maximum return on investment to our existing shareholders.

    [Index]

    Dennis Medlow

    Global Product Manager - Command Support Systems, Saab Systems

    Holding tertiary qualifications in Computer Systems and Engineering, Dennis Medlow has been active in the ICT industry for over 22 years - the latter 15 being in Defence related industries. Dennis has experience in a number of roles but specialised in networking and communications early on in his career, developing strategies to introduce one of the first local and wide area networks into Adelaide in 1985.

    Dennis' work over the years has involved introducing common software and networking environments, developing local computer networks, and managing the voice and data network design for the Jindalee Operational Radar network. He moved to Queensland to work with Saab on the original Army digital C2 system which posed a series of engineering challenges regarding how information could be effectively distributed over the battlespace using the somewhat limited radio resources at hand. His team was able to demonstrate the first use of X.400 messaging over a tactical radio network.

    Latterly, Dennis has been working on the successor to that system - the Battlefield Command Support System, and has been the C2 systems manager and later design manager for that project. Last year Dennis was appointed as the Global Product Manager for Command Support systems within the wider Saab organisation.

    Networking challenges in a hostile environment

    Today's military forces are increasingly reliant on the timely gathering and distribution of information across the battlespace. The concept of the 'digitised force' has moved from idea to realisation in a number of countries. Australia has been one of the world leaders in adapting information technology for the warfighter and Saab has been working with the Australian Defence Force for over 10 years in providing this capability.

    This presentation will examine some of the networking challenges for military systems in the hostile environment of the battlefield. This includes areas such as the need for comms in the digitised battlespace, remote and roming access, network identification and forming, challenges of narrowband radio links and use of commercial software in this environment.

    [Index]

    Kewin Stoeckigt

    AARNet

    Kewin Stoeckigt studied Computer science at the University of Leipzig, Goettingen and Auckland. In 2002 he received his BSc from the University of Goettingen and in 2005 his MSc from the University of Auckland respectively. For the last three years he worked for the Computing Center of Max-Planck Gesellschaft in Munich, where he is responsible for the security concepts of the videoconferencing infrastructure, which includes Gatekeepers and MCUs. His main research interest is focused on active and passive network measurement, real-time audio/video communication, Quality of Service, communication theory and network security. Kewin is a member of IEEE, ACM, GI and RSNZ.

    Overcoming Firewall & NAT problems in H.323 using OpenSource software

    Firewalls and NAT cause problems with H.323 audio-/videoconferencing. This talk will introduce the problem, and it will show a solution based on OpenSource software. The talk explains the solution (proxy system), and it will shed some light on other features, such as authorization, billing, etc. It will also show how this 'free' solution could be integrated in an already existing H.323 infrastructure. The benefits for Universities, Schools and/or other (Research) Institutes will be briefly highlighted.

    [Index]

    Andrew Howard

    AARNet

    Andrew is a network engineer at AARNet located in Canberra. His responsibilities include the development and support of advanced network and grid collaboration services within AARNet, liaison with peer international advanced research networks, management of the ICON network, supervision of the ACT RNO, participation in the AARNet Video over IP Working Group and management of a variety of special projects and events.

    Andrew is currently involved in a new project, ResearchChannel Global, in collaboration with the US Internet2 ResearchChannel. This focuses on developing technologies to support high-quality video capture, streaming and storage using IPv4, IPv6 and multicast networks.

    Andrew also been involved in the formation of the APEC Emerging Infectious Diseases Network, facilitating regular video conferences as part of this initiative. He has also been involved in the establishment of a real time collaboration group coordinated by Dartmouth College (USA), and the facilitation of joint simulation exercises held between the Australian Navy and the US Navy.

    Prior to joining AARNet in April 2002, Andrew owned and managed an ISP operating in regional NSW and VIC. His 22 years experience in the industry covers a wide range of technologies, languages and people.

    George McLaughlin

    George McLaughlin is the Director of International Developments for AARNet. He joined AARNet in 1995 initially overseeing the sale of AARNet's commercial customer base to Telstra. In 1997, he managed the process of establishing AARNet2, the second generation national network connecting Australia's universities and research organisations. He guided the establishment of AARNet Pty Ltd as a separate legal entity responsible for managing and developing the AARNet network; and has been the driver for positioning AARNet as one of the world's leading research and education network organisations.

    George has been instrumental in establishing international connectivity from Australia to the global R&E networks. Starting with an indefeasible right to use (IRU) on a 155Mbps circuit between Australia, Hawaii and the US West coast in 2001, to the current dual 10Gbps circuits (SX TransPORT - Trans-Pacific Optical Research Testbed) and recent connection to Fiji. He serves on various national and international committees associated with telecommunications and advanced networking and has been recognized for his contributions to advancing telecommunications in Australia as recipient in 2003 of both the ATUG Chairman's award and the Sir Ernest Fisk award.

    George is a graduate of the Royal Institute of Chemistry. He has worked in the chemical, pharmaceutical, engineering, precious metal and information technology industries, has authored more than 50 research papers, and has been elected as a Fellow of the Royal Society of Chemistry. He is one of the Vice-Chairs of APAN, the Asia Pacific Advanced Network consortium, evaluator to the European Commission's Framework Programs, and Affiliate member of the Internet Education Equal Access Foundation (IEEAF).

    Mark Prior

    Mark Prior is the Chief Technology Officer at AARnet. He has been involved with the Internet in Australia since the late 1980's when as a member of staff at the University of Adelaide he was involved in the original technical discussions that resulted in the creation of AARNet. After 10 years with the University he left in 1996 to join connect.com.au, one of Australia's first commercial ISPs, as Network Architect (Backbone Engineering). Prior to joining AARNet in 2003 he spent a year working for a small network integration consultancy, iagu networks, which specialised in network security and SIP based voice over IP.

    During his time at AARNet Mark has been leading the design of the AARNet3 network.

    Mark is a graduate of the University of Adelaide and is a member of the ACM. He has had a long involvement with the Internet standardisation process as a member of numerous working groups of the IETF and served on the Nominations Committee in 1995/96 as well as hosting the March 2000 meeting in Adelaide.

    Connecting the World with Light

    AARNet joint presentation by Andrew Howard, Coordinating Engineer, International Developments, AARNet Mark Prior, Chief Technology Officer, AARNet George McLaughlin, Director, International Developments, AARNet

    This presentation will cover AARNet's involvement in a number of current global infrastructure and application initiatives, including the Global Lambda Infrastructure Facility (GLIF), the Trans-Eurasian Information Network (TEIN2), the Global Astronomy Initiative, development and implementation of immersive multimedia collaborations and e-VLBI. The role that SXTransPORT and User-Controlled Lightpaths will play will also be covered.

    High Definition Video/Research Channel - Andrew Howard

    This presentation describes the current progress of the AARNet and ResearchChannel collaboration projects on uncompressed and compressed HD video over IP.

    Overview of the equipment, production techniques and software used to participate in the Super Computing 2004 HD video demonstration.

    Update on ResearchChannel projects and partnerships in Australia and report on National Association of Broadcasters event Apr-2005.

    [Index]

    Dr. Rodney G. McDuff

    ITS, The University of Queensland

    Rodney McDuff is currently the Manager of the Strategic Technologies Group with the Information Technology Services at The University of Queensland. Whilst at ITS Rodney has also been responsible for the planning, implementation and maintenance of core IT infrastructure services, applications and systems at UQ. He has also previously worked as a Research Fellow at the Advanced Computation Modelling Centre.

    Viviani Paz

    AusCERT, The University of Queensland

    Viviani Paz is the Security Assurance Manager for AusCERT (The Australian Computer Emergency Response Team) based at The University of Queensland. Prior to joining AusCERT in 1997, Viviani worked in a range of IT areas including: system and network security; system programming and administration; and software testing in the Commercial and Academic sectors.

    The Australian Computer Emergency Response Team (AusCERT) provides a single, trusted point of contact in Australia for the Internet community to deal with computer security incidents and their prevention.

    Higher Education National Certificate Authority - Enabling secure interoperation

    Australian Higher Education Institutions, like other research institutions around the world, need to collaborate with each other and with global research partners; however mechanisms for communication between such groups are often insecure. Insecure communication methods are of particular concern for research because of the need to protect intellectual property. Inter-institution identity management and access control to valuable resources such as access grids, computational grids, virtual observatories and digital repositories are also issues which can hinder collaboration.

    A PKI implementation has the advantage of supporting and/or providing the principal elements of secure collaboration, such as identity, authentication, authorisation, data integrity, confidentiality and non-repudiation, whilst both enhancing and operating with existing authentication systems. Through PKI, an institution can issue digital 'certificates' which identify the owner and can be used for access control, encrypting emails or other documents, establishing secure communications and 'digitally signing' documents.

    AusCERT in conjunction with CAUDIT has been working on a Public Key Infrastructure (PKI) Project to establish a National Certificate Authority for Australian and international universities and research groups interoperation. The first phase of this project will include the development of policies and standards and to implement a prototype certificate management system.

    This presentation will look at some vital issues on how to enable secure interoperation amongst the Higher Education sector while drawing on the experience gained when implementing the first phase of this project.

    [Index]

    Stephen Tolhurst

    Data Network Manager, The University of Sydney

    Steve Tolhurst has been with the University of Sydney for the past 20 years and involved in a variety of IT roles. Steve is credited with building the Gigabit backbone network known as SydNet mark4. Steve was intimately involved in the construction of BushNet, an ATM Microwave Data network that extends to the city of Dubbo.

    Rafik Razzouk

    Manager, Videoconferencing Development & Implementation The University of Sydney

    Rafik Razzouk is Manager Videoconferencing development and Implementation. For the past two and half years, Rafik has been with the University of Sydney building their Videoconferencing infrastructure. Rafik has had a variety of experiences in the commercial technology world working for companies such as Hewlett Packard, Optus and PictureTel.

    Rafik has a Masters degree in Telecommunications from the University of NSW.

    Building a Video-over-IP Network for the University of Sydney

    For years, video communication was prohibitively expensive not only in the cost of equipment but more importantly in the on-going charges of ISDN telecommunications costs.

    A couple of years ago the University of Sydney embarked on building a video conferencing Network over the existing IP infrastructure. The first location to benefit from this initiative was the remote campus at Orange. A couple more have since benefited from this positive experience. As the demand for Videoconference for education and administration grew the installation of a videoconference Bridge was implemented to enable multi-point conferencing over IP. All this was made affordably possible thanks to a robust IP infrastructure and the foresight of the network designers to predict the use of broadband applications over the Data Networks.

    This session will discuss the lessons learnt in building a Videoconference network over IP while catering for legacy system to serve the user community.

    [Index]

    Alex Reid

    AARNet - Director - Middleware / e-Research;

    Alex Reid joined AARNet in December 2004 on a part-time basis to coordinate a Middleware Action Plan for Australian universities and research organisations. Prior to that he was Head of IT Policy at the University of WA (where he is still a Fellow), and Chair of the AARNet Advisory Committee. He has been Director of IT at Oxford University, and at the University of WA, and has maintained a keen interest in networking since 1969.

    James Sankar

    AARNet - Network Engineer (Middleware)

    James Sankar joined AARNet in April 2005 responsible for coordinating middleware projects within Australia and representing Australian interests in similar developments overseas. He previously worked for UKERNA (United Kingdom education and research networking association) as a development project manager responsible for deploying ADSL and two-way satellite technologies and then onto UKERNA's middleware development area. James was responsible for establishing a national wireless advisory group; he also co-chaired the TERENA mobility taskforce and managed eduroam deployments across the UK and continental Europe.

    Middleware Action Plan and Identity Management Survey

    The first part of the presentation will be an update on the progress made since the Middleware Forum/Camp that took place in December 2004. In particular, Alex Reid will present a middleware action plan and will highlight the priority tasks taking place during 2005.

    One item contained within the middleware action plan is to conduct a survey of identity management systems in Australian universities and research organisations. James Sankar will present the findings of this survey and some conclusions as to what the results mean for the development of middleware activities in Australia.

    [Index]

    Mike Hicks

    Compuware Asia Pacific

    Mike Hicks is the Principal Consultant for Advanced Networking at Compuware. He has enjoyed a successful career providing support to complex corporate networks throughout Europe, North America, Asia and Australia. This included the Ford Motor Company, Cisco Systems, Singapore Airlines, ANZ Bank, Telstra and the European Space agency.

    In addition, Mike works closely with many infrastructure vendors in the area of application profiling, and management. Mike is the author of 'Optimising Applications on Cisco Networks (Cisco Press2004)' and 'Managing Distributed Applications: Trouble shooting in a heterogeneous environment (Prentice Hall 2000)'; as well as many white papers on the subject of application delivery and optimisation.

    Understanding Network Awareness: Guarding the Guards

    Today's business and uncertain geopolitical climate mean network security is a top priority for many companies and a simple search on the Internet will yield thousands of solutions that offer exactly that protection. With so many risks and so much at stake, companies large and small are looking for more ways to ensure the security of their networks.

    Business leaders are starting to realize they can't rely on basic security measures if they want to assure compliance with customer privacy and protection regulations such as Sarbanes-Oxley, Basel II and HIPAA. In fact, analysts say it's no longer enough for IT to simply follow centralized policies outlined by ISO 17799, COBIT or COSO.

    The general approach is to take the firewall and position it as a gateway (or in the case of personal security systems gateways) to scrutinize and alert to threats at strategic access points to the network. In general this system works well. However, given the importance of the data to the organisation, is it satisfactory to rely solely on these guards for your protection? What organizations often fail to realize is that they are chasing a ghost: one's virus and IDS definitions can be up-to-date, server and host based firewalls can be properly configured, patches and software versions current, and yet still be vulnerable to unknown viral exposure. The anti-virus is not a solution but a single preventive measure.

    Wouldn't it be appropriate to provide some form of safe guard that would act as a policing system to ensure that any threat that compromises your ring fence is identified and tracked? Wouldn't it be wise to provide a guard for the guards? The most logical and often overlooked solution is network awareness.

    Network awareness can be best described as a visualization of the living network from the user's perspective (i.e. realizing that each component of the network affects every other one). Network awareness should reflect the people, packets, machines, subnets, sessions, transactions, traffic, and any movement on the network on all layers.

    The key to network awareness is information. By arming oneself with all available data, intelligent, well-formed decisions can be made. It is not the technology that will solve the problem; it is a shift in the overall approach to network management.

    Having a clear picture of the network design empowers the administrators to make not only good decisions, and also to react quickly if the network falls under attack. By recognizing the threats, it enables organisations to isolate the problem, saving both time and money.

    This session will discuss the basics of network awareness, its benefits to the network administrator, protection versus monitoring and using network awareness to reduce the impact of a security breech.

    [Index]

    William MacDonald

    VP of Marketing, Codian Inc

    William MacDonald, is the General Manager of Codian's US operations. Codian is a company building infrastructure products for video conferencing, including Bridging, Recording and Streaming on both IP and ISDN. Prior to founding Codian he was Vice President of Marketing of Calista, a Voice over IP company which, he helped build from 1995 until it was acquired by Cisco Systems in 1999. He stayed on at Cisco and played a key role by utilizing the Executive Briefing Center to bring customer requirements back into product definition.

    Prior to this he was the Manager of Systems Engineering at Madge Networks Inc. which was the role that brought him from the UK, where he was a software developer working on Token Ring device drivers and protocol stacks, to the USA where his focus switched from engineering to the customer side of the business. Will graduated from Cambridge University in 1987 with a 1st class Masters Degree in Computer Science.

    Interoperating with Video endpoints of Yesterday, Today and Tomorrow

    William MacDonald will discuss how to overcome the challenges of having endpoints from different manufacturers (all supposedly complying with industry standards) talk to each other once they are implemented. The reality is that even though they comply with the required standards they still do not talk to each other. This is a real problem that videoconferencing administrators are finding every day, especially when upgrading to the new and highly desired H.239 standard. It will conclude with a discussion about ways of overcoming this.

    [Index]

    Mark Hacker

    Keyserver

    Mark is Managing Director of Aussie Telecom Pty Limited. He has been in the IT industry for 20 years, studying Computing Science (BAppSci) at the University of Technology, Sydney (UTS). Mark worked at UTS for 6 years managing the computing centre at the Faculty of Design, Architecture & Building. He has been involved with high tech startups, information broking, stock market information systems (day trading centres) & venture funds. Mark also worked for 3 years at the Seven Network in Datacast services.

    His company, Aussie Telecom Pty Limited, is the sole representative for both K2/KeyServer from Sassafras Software, and Deep Freeze/Faronics, within Australia/NZ.

    Technical Update - K2/KeyServer (Sassafras Software) & DeepFreeze/Anti-Executable(Faronics)

    Both KeyServer & Deep Freeze are widely implemented software solutions within Australian Universities. The aim of this presentation is to provide a technical update on both products - to provide a general technical overview (with demonstrations) as well as where the products are headed. By the time of Questnet, V6.1 of K2 is expected to be shipping. Deep Freeze V5.4 has been released, as well as Deep Freeze for Servers - FreezeX is a new product from Faronics.

    K2/KeyServer - An integrated Asset Management Suite for:

    • Automated Software Auditing & Inventory
    • Software License Management/Compliance
    • Software Metering/Usage Metrics
    • Extensive, built-in and customisable Reports

    Deep Freeze is a software-only solution that instantly restores the pristine SOE upon every reboot. Deep Freeze is unrestrictive protection - allowing Users to do anything at all to the PC operating system (or any other file setting) - however, upon reboot, all those changes are completely removed.

    FreezeX is a software-only solution which is restrictive solution which prevents any new or unknown application from being downloaded to the PC. FreezeX goes beyond existing anti-virus or spyware solutions - as most of these work on a black-list methodology. FreezeX utilises a unique whitelist technology to provide proactive protection against spyware, keyloggers, Trojans, viruses, or any other malware.

    FreezeX works very well with Deep Freeze. Deep Freeze protects your core system settings, application settings and any Windows corruption. FreezeX blends its protection by not allowing any unauthorised installs to your desktops.

    Many sites implement both KeyServer and Deep Freeze together on their networks.

    [Index]

    Justin White

    Product Marketing Manager, Toshiba ISD Australia

    Justin has worked with Toshiba for over 12 years, the last seven in Marketing, where he travels to Japan to find out the latest trends in technology and how these will be implemented into mobile computing. He will draw upon this experience to add insight throughout his presentation.

    Wireless Mobility, Intuitively!

    Wireless connectivity allows us to work where we want and how we want while remaining connected to the rest of the world. The next step in productivity is to use wirelessly enhanced products that work more like we do. In this presentation you will see how using a wireless tablet can additionally improve on the benefits of wireless connectivity. See how easy it is to use and why the rest of the world is 'switching over'.

    Justin will be presenting and demonstrating with the Toshiba M200 tablet, and a Toshiba TW90 (Wireless) Projector to show how productive users can be with an intuitive interface coupled with the benefits of Wireless connectivity. He will also show what the future holds for wirelessly connected mobile warriors!

    [Index]

    Richard Constantine

    CIO and Director, Information Technology Services, Swinburne University of Technology

    Richard Constantine has over 18 years experience in the IT Industry and is currently the Chief Information Officer and Director of Information Technology Services at Swinburne University of Technology. He has extensive experience in education within the tertiary and TAFE sectors as well as in Industry as an IT Consultant and many years ago as a pre/post sales engineer.

    His responsibilities include IT Strategy, Communications Technology Infrastructure, Applications and major IT projects for the University's operations across all of Swinburne's campuses.

    Richard's qualifications include a post graduate diploma in Management Studies from Melbourne Business Schoool, The University of Melbourne and a Masters of Business Administration from Monash University in which he took a keen interest in Technology Management.

    Richard is also the Chairperson of the board of Infoxchange - a not for profit, social justice organisation working to bring the benefits of technology to all, using multiple strategies to address societies' so called 'digital divide'.

    Network infrastructure at Swinburne University

    The presentation will cover an overview of Swinburne University of technology including the number of students, staff, local and overseas campuses. Swinburne is also well regarded as being at the forefront in respect to the use of wireless technology.

    Four years ago Swinburne received a great deal of publicity in going ahead and implementing a $4M 'state of the art' network. We will summarise what that project entailed and why it was critical to our business needs and why it now needs to be replaced.

    Swinburne has just recently had approval by its University Council (April 2005 )to proceed with a significant investment far greater then the last time, as the previous network infrastructure has now been used for the past 4 years and is regarded as nearing obsolescence.

    This presentation will highlight the approval process, including Swinburne's particular business case, the technology we will be implementing (ie., 10/100/1Gb to the desktop, all with inline power, Cisco's Security Agent and another 3000 VOIP handsets). The discussion will then highlight how this new technology from Cisco Systems will be used to enable our organisation to deliver excellence in relation to teaching, learning and research.

    Finally, as part of the business drivers the financing of this project via Cisco Capital will be discussed. This lucrative financing approach will enable the organisation to completely replace the network infrastructure, gain quality of service across its three divisions, five campuses and all 18,000 network ports within five months will then enjoy the benefits of a world class network. This approach will be compared and contrasted with what is still a common approach of replacing 25 to 33 percent of a network annually to then gain complete quality of service in three or four years (in time to then start again).

    [Index]

    Ian Waters

    Senior IT Programs Consultant, University of Technology, Sydney

    Ian Waters has spent all his working life (of over 30 years) in organisations providing large-scale IT services.

    He is currently Manager of the IT Security Office at UTS, a unit that has university-wide responsibility for security policy development, compliance reporting, consulting on security planning, IT risk assessment, security audits and vulnerability testing.

    Prior to his current position, Ian Waters was responsible for the UTS central academic IT services, where he was accountable for strategic leadership and direction of academic computing at the University and for the delivery of IT services to academic staff, academic support staff and students.

    How Secure is the Network? Assessing Network Risk using a Formal Methodology

    UTS has been developing and refining its IT security policy and procedures for over five years. These procedures include a formal methodology for assessing the risk of IT systems and resources. This methodology was first employed to perform a high level risk assessment of all major IT systems within the University, and the results of this assessment were used to prioritise systems for a more detailed risk assessment. Following its successful application to detailed risk assessments of a number of major corporate systems, the methodology was used to carry out a risk assessment of the network in 2004.

    This presentation will describe the UTS risk assessment methodology, and how it was applied to the network. It will outline the steps involved - dividing the network into its core components, conducting risk assessment workshops on each, developing risk mitigation strategies, and then preparing a risk management plan. The final stage involves documentation of the whole process in an IT system security plan.

    The presentation will describe UTS experience with performing the network risk assessment, the resources required and their sourcing, and the lessons learnt from the exercise.

    [Index]

    Simon Carlson

    Senior Pre-Sales Consultant

    Simon brings over 14 years IT experience in both the UK and Australasian markets. With a firm technical design and consultancy background, Simon has worked in the vendor, system integrators and end user spaces. Simon has been involved in major design projects including the Olympic Park network for the Sydney 2000 games, along with solution design and consultancy for MSSP's.

    Today Simon is considered a technical thought leader in the area of Neural Network based Anomaly Detection.

    Greg O'Brien

    Business Development Manager

    Greg has over 20 years experience in the IT industry. With a technical background in both software and hardware Greg has spent the last decade working specifically in networking and communications. Working for leading technology providers such as Fujitsu, 3Com and Scitec, Greg has been involved in the design and implementation of mainstream IP technologies for many of Australia's fortune 100 companies.

    Greg believes that security is one of the largest problems facing the connected world today and that security models based on rule sets can only address part of this issue.

    Esphion provides Adaptive network anomaly detection, utilizing Artificial Neural Network (ANN) technology. This behavioural-based network intelligence arms companies with the information required to protect their assets in an electronic world.

    Protecting data recovery resources and business-continuity

    This presentation discusses some of the shortcomings of traditional manual and signature-based methods for data recovery resources, when confronted with mutating or previously unknown threats. Methods and technologies are presented, which can be used to protect business continuity even when attacked by zero-day worm outbreaks. Some case studies will be used.

    The principle of 'network self-vaccination' is explained, a three-step process, which largely utilizes existing network infrastructure, combined with new technologies, to dynamically arm a network against zero-day threats.

    The presentation is aimed at network security as well as operational staff and management. A brief introduction to the various technologies and concept will be given, to make the presentation accessible to a wider audience.

    [Index]

    Paul Ducklin

    Head of Technology, Asia Pacific, Sophos Labs

    Paul Ducklin joined Sophos from the South African Council for Scientific and Industrial Research in 1995. He has held a variety of roles within the company including heading up programming and running Sophos' global technical support. One of the world's leading virus experts, Paul has given papers and presentations at many industry events including Virus Bulletin, ICSA and AVAR conferences. He has also written numerous articles on the virus threat and is a respected industry spokesperson. Paul has seen, though never actually touched, an Enigma.

    Researching Malicious Code

    Researching malicious code involves a lot more than a large collection of yesterday's virus samples, spams, scams and phishes. (Of course, a well-organised historical collection is vital if you hope to understand what tomorrow's threats are probably going to look like, but it isn't enough on its own.) Analysing and understanding malware is a little like being a code breaker. Faced with the Enigma machine, the Allied code breakers of the Second World War might easily have given up the task as impossible. They needed not only to understand the device in theory, but also to design and build practical tools for cracking messages every hour of every day. Even more importantly, they had to face enhancements and changes which were deliberately introduced by the enemy to put their research out of date. Similar drive and intelligence is required by malicious code researchers, who need to be able to:

    • Disassemble machine code;
    • Reverse-engineer proprietary file formats;
    • Prepare sacrificial networks which emulate the internet;
    • Remember the details of documented and undocumented OS functions;
    • Recall the makeup of thousands of existing viruses and Trojans;
    • Understand cryptography and compression algorithms;
    • Work under pressure without sacrificing accuracy;
    • Maintain an unrelenting respect for security and safety.

    This talk looks at the history, and the likely future, of malicious code and our defences against it. We need to work ever smarter, as we face an enemy who is increasingly motivated by criminal reward, rather than merely by the 'counterculture one-up-manship' of the past.

    [Index]

    Roy Meuronen

    Network Specialist, Networks & Communications, Division of Information The Australian National University

    Roy Meuronen has worked in a system administration role for over 16 years in the government, private, and more recently, higher education sectors. Initially involved with Unix systems, he has been full-time networking now for over 3 years.

    His current roll as Network Specialist with The Australian National University sees him involved with the day-to-day running of a large, converged campus network, as well as finding ways to implement "cool" stuff such as wireless access and TV reticulation.

    The ANU TV Convergence Project (work in progress).

    ANU Networks and Communications have begun a project to replace existing TV reticulation infrastructure and expand the services beyond the current scope.

    The intention of this presentation is to share our experiences so far in implementing this new technology, updating existing infrastructure to cope, and dealing with the associated vendors and stakeholders. It is a work in progress, so much of the detail will be filled out between now and July. This presentation will not contain any rocket science.

    The university currently runs a television reticulation system that distributes video content from free to air satellite and terrestrial broadcasts to selected locations across campus via an analogue optical fibre network. This infrastructure is running at capacity. Our intent is to replace this ageing technology with a more scaleable and flexible solution.

    A TV over IP solution will replace the existing analogue fibre infrastructure, with multicast digital video streaming and Set Top Boxes (STB) connected to the data network.

    The TV reticulation solution can then be expanded to provide access to TV content at the desktop. The system should maximise the value of existing satellite receiver infrastructure, enable additional content sources, and provide an outlet for local content producers.

    Issues covered will include:

    • Description of network topology
    • Satellite to IP gateways: Hardware, Video streams, Limitations
    • Set top boxes: Hardware, Configuration, Limitations
    • Multicast issues: Addressing, Performance, Scope, Traffic levels, Hardware issues
    • Non-technical issues: Broadcasting Act, What channels to distribute? Who gets access?
    • Other sources of content: Terrestrial digital television, TransACT, Internet multicast, Local content, Peering with neighbouring institutions
    • TV to the desktop: Client software
    • Looking to the future: Recording, Archival, Video on Demand

    [Index]

    Colin Blythe

    Manager Networks, University of Melbourne

    Colin Blythe has followed a career in telecommunications and IT. His career highlights have included: hardware and software design; system design and implementation projects; user support; and consulting roles with corporate and financial institutions, such as New Zealand Post, AWA, Unisys, Australia Post, Accenture and ANZ. Melbourne Uni is his first role in the education sector. He has a Bachelor of Engineering (Electrical) from the University of Canterbury.

    Networking Landscape at the University of Melbourne

    2004 has been a year of intense planning in the network arena at the University of Melbourne, more so than a year of network change. During this time the University has developed a high level network strategy that had three main thrusts:

    • Telephony Services - development of an overall telephony and voice services strategy
    • Core Network Renewal - the core network is approaching 5 years of age, and will need to be refreshed. What fundamental changes in capability and performance are needed to support the University through the next five years
    • EndPoint Management - a philosophical change for Melbourne - have the entire network managed by a centralised function. What does this mean at the coal face

    The presentation will discuss why these three are the core thrusts for networking at Melbourne, and what has been achieved in the journey so far, what has been learned and what has yet to be achieved.

    Planning and scoping tends to identify other issues that need to be resolved simultaneously, and the issues that have arisen will also be introduced. These issues are not always technical in nature - in fact, there are many management and legal issues to contend with. What is network's role in these?

    The EndPoint Management thrust is the vehicle to implement a key recommendation from Gartner Group (for the Network team to manage the entire network for the University). This will introduce change to the University that is both welcomed, and resisted - sometimes by the same people. The presentation will discuss the process the University will use to manage this introduction, and define a number of the subject areas that will need to be agreed before a managed network service can be implemented.

    The university has not stood still - in fact a number of significant changes have been successfully implemented, that will form a strong foundation for the work ahead. Improvements such as the 'Rings' project have implemented network conduits around the campus, and have enabled a major upgrade of fibre capacity across the Parkville campus. Significant infrastructure improvements at regional campuses have modernised their network capabilities, allowing newer functionality such as video conferencing and wireless LANs to be introduced at the 11 campuses.

    Finally the plans for the next three years will be outlined to demonstrate how the planning will develop into real deliverables, producing real change and value for the University.

    [Index]

    Glynn Rogers

    Networking Research Leader, CSIRO ICT Centre

    Originally a microwave systems engineer, Glynn Rogers conducted research in geophysical imaging with applications in mining before entering the world of communications networks. He played a major role in founding a networking research group in CSIRO initially focusing on ATM technology but soon switching to IP networks with particularly emphasis on IP QoS. He is currently Networking Research Leader in the new CSIRO ICT Centre and is on the Management Committee of the Centre for Networking Technologies (CeNTIE). Having a strong interest in Complex Systems Science and its application to large networks, he played a role in setting up the CSIRO Centre for Complex Systems Science and is a member of the Centre Executive.

    Virtual Private Networks - More, Much More than IPsec Tunnels

    While in commercial parlance the term 'Virtual Private Network' is generally taken to refer to a construct based on IPSec tunnels, these are merely the tip of a very large iceberg. In fact the Virtual Private Network concept is much more general and powerful. The growing commercial offerings based on the BGP/MPLS VPNs defined in RFC2547 and the further technical development associated with RFC2547bis demonstrate that there is a great deal of interest in further evolution of the concept. Indeed the operation of two IETF Working Groups directly addressing this area, with two RFCs so far indicates that there is much more to come at the standards level.

    Although much is happening at the networking level, we believe that the full power of VPN technology will only be unleashed when virtual networks can be created and operated at the user level. The Web/Grid Services paradigm promises a rich context in which to develop the required functionality and recent work within the Global Grid Forum is exploring this territory. From a networking perspective the control plane appears to be the right environment in which to develop the functionality to link the services paradigm and the VPN components as provided, for example, by RFC 2547. Indeed the emergence of sophisticated control plane functions in optical networks reinforces this view.

    This presentation will provide an overview of these developments from an architectural perspective and discuss their potential application in high speed application areas such as Astronomy. I will then describe the research in this area being conducted within the CSIRO Information and Communications Technology Centre. The ideas will be illustrated by a particular VPN concept developed as part of the CeNTIE project. This was motivated by requirements in the Film and Television Post Production Industry revealed by CeNTIE's Media Focus Group but may well be present in other areas such as Supercomputing.

    [Index]

    Mark Williams

    Juniper

    Mark Williams joined Juniper Networks in October 2003 as the research and education business development manager for the Asia-Pacific region. Williams has been working across the Asia-Pacific region in telecommunications from his base in China since June, 1998 and in that time has worked on the development of data networking solutions for both enterprise and carrier customers. Before moving to China, Williams spent more than 10 years working as a network engineer in the academic community, where he contributed to the architecture of both the first Internet backbone in Australia, AARNET, and its successor, AARNET-II. Williams has previously worked for The University of Queensland, Siemens, The University of Stuttgart, Bay Networks and Nortel Networks. He graduated with Honours in Electrical Engineering, Computer Science and Asian Languages from The University of Queensland in Australia.

    Cross-domain dynamic services and SLAs

    It is hard enough to guarantee services within a domain that you control. How do you do bandwidth guarantees, service guarantees, dynamic L2 and L3 VPNs, etc. across multiple administrative domains? This talk talks about how you can do it with today's technology and has a look at how you might do it with future technologies. Very hot topic in Academic backbones today, especially with the advent of hybrid packet/optical networking.

    [Index]

    Tim Rayner

    Networks Team Leader at Charles Sturt University

    Tim Rayner has a BE & BSc from UNSW, and experience in the telecommunications industry - prior to joining Charles Sturt Universities' networking team 12 years ago. During that time ha has overseen the development of CSU's network through a number of generations to the recent roll-out of new gigabit campus networks. He has an ongoing interest in charging for telephone and internet usage, and has designed and developed CSU's communications charge recovery systems over the last 10 years.

    CSU NetReg: The Why and How of registering computers and charging for network access at Charles Sturt University

    CSU has recently implemented a new system for registering computers for access to our network. The system centralises registrations - based upon mac address - across all campuses - including student residences. Registered computers are levied a monthly access charge. Staff members are permitted to ad-hoc register computers for network access. Ad-hoc registrations are levied a daily access charge, but are prevented from communicating with most registered computers to prevent virus propagation.

    The presentation will discuss the techniques used to implement this system and the lessons that we've learned along the way.

    The system also provides an interface for budget managers to review, report on and modify registrations for computers or telephone extensions belonging to their account codes. This interface to the system will be covered briefly.

    [Index]

    Ernie Ianace

    Vice President of Security Sales for Asia Pacific and Latin America TippingPoint, a division of 3Com

    Ernie Ianace is responsible for sales and business development in Asia Pacific and Latin America. Prior to his promotion to Vice President of Security Sales at 3Com, Ianace was the senior director of strategic accounts at TippingPoint. Before joining TippingPoint, Ianace was the senior director of sales for North America at Siemens. Siemens acquired Efficient Networks where Ianace was the senior director of sales for North America and Latin America. Ianace has also held various senior management roles in sales, marketing, and sales engineering at Nortel, VMX and Intelect Network Technologies.

    The Evolution of Security: Network Intrusion Prevention

    Over the last 10 years, we have seen mainstream adoption of the Internet, opening opportunities for business as well as threats. In the arms race against threats, security products have evolved from traditional firewalls to deep packet inspection firewalls, anti-virus products and detection systems to proactive prevention systems that protect the vulnerability. Although the number of new threats is increasing and the vulnerability to exploit window is shrinking, intrusion prevention systems (IPS) are continually evolving and are constantly updated with the latest protection. We have reached a point of dependence upon our networks, and IPS is the convergence between networking and security.

    Intrusion Prevention Systems have come a long way since they were first introduced by TippingPoint in early 2002. They were developed in response to a need for another layer of internal and external protection. Attacks were becoming more sophisticated, bypassing firewalls and alerting Intrusion Detection Systems. Since detection systems were reactive, prevention systems were designed to examine the packet in its entirety and block emerging attacks.

    Today, Intrusion prevention systems have been successfully deployed in several of the Fortune and Global 1000 companies as well as universities, and are blocking millions of attacks. This session will help explain intrusion prevention systems. Because of their ability to deeply classify traffic, IPS's have evolved to manage traffic, shape bandwidth, and enforce policy. The audience will get to hear about some real world educational customer case studies on saved bandwidth, ROI, and blocked attacks. Future applications of Intrusion Prevention Systems are limitless.

    [Index]

    Robert Dolphin

    Senior Sales Engineer, ANZ, Nortel

    A 20 plus year veteran in the telecommunications industry, Robert Dolphin commenced at Nortel in 1989 and has extensive experience in both data and voice networking for carrier and enterprise customers. Starting initially in carrier accounts, Robert has been involved in the deployment of national X. 25 networks in both Australia (Austpac) and Korea and has extensive experience with Carrier Frame Relay and ATM networks. Since the mid 90's Robert has worked in Nortel's Enterprise business and has specialised in the deployment of a number of Voice over ATM and Voice over Frame Relay networks for large corporations. He has, and is, playing a key role in the design and deployment of a number of modern converged networks.

    SIP Enabling Real World Multimedia Collaboration

    With the recent proliferation of affordable IP broadband services the time is right for an increase in real-time multimedia communications, however connectivity is not the only requirement to achieving effective and convenient communication services. Protocols such as Session Initiation Protocol (SIP) and Session Description Protocol (SDP) are key to ensuring the seamless user experience that will lead to general uptake of emerging collaborative applications.

    Understanding both the technologies driving real-time multimedia collaboration and the acceptance and use of these technologies through the experience of our own customers and employees, this presentation will show how these communications can enhance productivity, positively impact the bottom line, and improve the user's quality of life through more flexible work/business/study practices.

    This presentation will discuss some of the key trends and technologies which enable the cost effective deployment of collaborative applications and the real-world benefits your students and academic & administrative staff could realise. Examples of applications and how the product is architected and deployed will be discussed. This will highlight some of the benefits and challenges of a network-centric architecture and point to some areas still requiring innovation. Real user experiences will also be presented to highlight both sides of the multimedia collaboration coin - technology and user experience.

    [Index]

    Glen Turner

    AARNet

    Glen Turner is a network engineer with Australia's Academic and Research Network (see www.aarnet.edu.au). He was responsible for the design of the recently-superseded AARNet2 network. His major technical interest is network protocol performance. His major non-technical interest is advocating changes to Australia's intellectual property laws. His most recent publication is an update of the Linux Documentation Project's "Remote Serial Console HOWTO".

    Achieving high performance file transfers across gigabit networks.

    Most un-tuned TCP/IP implementations cannot use 1Gbps of capacity for long distance file transfers. This presentation examines the common constraints and examines TCP/IP tuning parameters to partially overcome these constraints.

    New transport-layer protocols and algorithms have been developed to overcome TCP/IP's limits on file transfer performance and this presentation looks at two: BIC TCP, which is integrated into Linux 2.6, and FAST TCP, a proposal currently before the IETF.

    Finally, hardware performance issues are examined. A checklist of features is provided for use when acquiring computers for the purpose of long-distance file transfers.

    [Index]

    Ross Cartlidge

    Cisco

    Ross Cartlide graduated from the University of Sydney with a BSc(Hons) Computer Science in 1982. After graduation he continued at the University of Sydney developing one of the first optical fibre based networks succesfully deployed in Australia. After a short sojourn in private industry as a Unix Systems Engineer, he returned to the University of Sydney to help design and deploy their new CATV based IP network deployed in 1987. The University of Sydney was the NSW hub for the nascent Australian Internet (AARNet) and Ross became closely involved in the deployment and development of AARNet and AARNet 2. Ross joined Cisco Systems as a member of the newly formed "Internet Service Provider Expert Team" in 1999 and has continued to work with large Australian Service providers, helping them plan, design, implement and operate their networks. It is in this environment that his love mining the huge data sets generated by these networks began and developed.

    Yet Another Data Aggregator(YADA), an Oracle-free Oracle

    Networks produce huge amounts of data. Data such syslogs, netflow-records, call-records, packet-traces and debugs can be generated in tens or even hundreds of millions of records per day. Within this data is contained incredibly useful information about the state of your network. The problem is, "How do you get this information out?" Traditional RDBMS are clumsy for the streaming nature of these records. Not only are they slow but they tend to absorb huge amounts of storage. And let's face it, who doesn't see their RDMS as a data prison sometimes.

    YADA, is a set of *nix based tools to store, search, process and present you data while keeping them in the flat-land we know and love. It has familiarity of bash, more flexible than SQL and the speed of C - the "yada --world-peace" invocation is especially useful.

    It has been used to process over half a billion phone records in a short amount of time and produced meaningful results. I will explore the methodology of its development and its application to real world data analysis problems.

    [Index]

    Ruston Hutchens

    Network Engineer, AARNet

    Ruston Hutchens is a Network Engineer, for AARNet and is currently working on SIP voice and video service development, and assisting with the AARNet 3 network roll-out.

    He has been a member of the AARNet IP-Tel Working Group Steering Committee since its inception, and is Secretary to the APAN (Asia-Pacific Advanced Network) SIP-H. 323 working group.

    Ruston holds a B. Sc (HONS) from La Trobe University, where he worked for seven years.

    AARNet SIP-H.323 Gateway Project

    Over the past few years we have seen competition for 'market share' between the IETF SIP [RFC: 2543, 3261] and ITU H.323 protocols for call control of voice and video over IP sessions (calls). Until recently the majority of deployment has been of H.323 based equipment. As a result, the interest in voice and video over IP based networks in recent years has resulted in a wide deployment of H.323 equipment. However, fundamental weaknesses in the H.323 protocol, and increasing vendor interest in SIP have resulted in an extraordinary take-up of SIP in the last twelve months.

    AARNet has an H.323 network which connects in excess of 2,600,000 voice calls per year, as well as significant numbers of point-to-point, and point-to-multipoint video calls.

    With the majority of current interest in voice and video over IP being SIP focussed, but with a huge deployment base of H.323 equipment, a way is needed to bridge between these two incompatible protocols.

    This paper briefly outlines the relevant parts of the SIP and H.323 protocols, and how they are used for call control. It then discusses the aims and objectives of the AARNet SIP-H.323 gateway project. Details are given of the implementation methodology, and system configuration. Finally it outlines the performance of the implemented SIP-H.323 gateway, and discusses opportunities for use within the AARNet member community.

    [Index]

    Craig Russell

    CSIRO ICT Centre

    Craig Russell is a Network Design Engineer in the Centre for Networking Technologies for the Information Economy (CeNTIE), part of the CSIRO's ICT Centre. His role includes the design, implementation and operation of CeNTIE's high performance network testbed as well as liaising with various industry groups to develop new high bandwidth applications.

    Prior to joining CSIRO Craig was a network engineer for the telecommunications carrier PowerTel and was involved in the design and construction of the company's national backbone ATM and SDH networks. Before that he worked for global IT services company Logica where he was a software engineer developing SCADA systems in the energy and utilities sector.

    Craig's educational background includes undergraduate degrees in Engineering and Science and a PhD in applied mathematics.

    James Argyros

    CSIRO ICT Centre

    James Argyros started his career in Physics, specifically Astrophysics in which he gained a PhD, then migrating into scientific computing, and finally network programming; James has had a continuous involvement with networks and network management since the late 1980s. In this period, his work has ranged from using a dialup service into a mainframe to network programming for the Compact Array of the Australia Telescope, until finally he bought the first router for the CSIRO Marsfield site in 1990 - a Cisco CGS. Since that time, he has managed upgrades to the routers and the bandwidth from that site several times culminating in the MAN: MARSHNet that came on line in 1997. He was one of a team that designed and built MARSHNet using E3 microwave links to provide a high bandwidth ATM network integrating data, video and voice. Most recently, he has been involved in the design, building and operation of the CeNTIE networks

    High bandwidth applications development using the CeNTIE networks

    The Centre for Networking Technologies for the Information Economy (CeNTIE) is a joint initiative between the Department of Communications, Information Technology and the Arts and the CSIRO through its ICT Centre. It demonstrates the value of advanced technology and applications to industry and the research community.

    CeNTIE has developed an advanced network research testbed and a range of technologies and demonstration applications designed as a glimpse into the technologies that will power the future, information-based economy. These applications include the Virtual Tea Room, ViCCU® (Virtual Critical Care Unit), EoD® (Extranet on Demand) and Measuring the Network. Each of these systems has presented unique challenges in both the technical and human factor aspects of advanced networking.

    One of the fundamental aims of CeNTIE's research program is to promote advanced networking technology to enable people to interact naturally with one another when they are physically separated. Conventional videoconferencing provides only a marginal improvement over the telephone. CeNTIE has addressed this need through the development of the Virtual Tea Room, an application that uses DV (digital video) over IP to provide an extensible and flexible telecollaboration environment. This environment exploits the high-bandwidth and multicast capabilities of the CeNTIE network to enable simultaneous multi-site conferencing.

    ViCCU® is a system developed for the e-Health industry. It has built on the technology of the Virtual Tea Room to provide virtual critical care in rural hospitals that do not have specialist medical staff onsite. A pilot system linking The Blue Mountains District Hospital with Nepean Hospital over the CeNTIE network is now in its second year. It is used routinely to treat patients and has yielded some impressive clinical results.

    Sydney has a dynamic media post-production industry. This industry is characterised by small companies simultaneously working collaboratively and competitively on a project-by-project basis in digital media creation. This presents enormous challenges to traditional telecommunications services and has led to the development of the EoD® prototype. Once again, a pilot system is in operation on the CeNTIE network linking several of Australia's leading post production companies.

    Underlying all of these applications is the network infrastructure. Critical parameters of any network are throughput, latency, jitter and data loss. These become especially important in the context of audio and visual data streams. It is well known that it is better to lose a few frames of video rather than a single packet of audio. Before starting on a particular project it is essential to know what the network will support. As part of an ongoing effort to provide answers for new projects, Measuring the Network attempts to quantify these parameters.

    [Index]

    Danny Ng

    Leader Broadband Access, Asia Pacific, Nortel.

    Danny Ng leads Nortel's Broadband Access business for Asia Pacific. In this capacity, he is responsible for the marketing, product introduction and management of Nortel's wired and wireless broadband access solutions into carriers and enterprise customers.

    Danny has been active in the Data Communications industry for 19 years in System Engineering, Sales, Marketing and General Management in companies such as IBM Corporation, Proteon and Bay Networks. He holds the Bachelor of Science, Bachelor of Electrical Engineering with honours and Master of Engineering Science from the University of Sydney. Danny is a member of the Institute of Electrical and Electronics Engineers (IEEE).

    Enabling the Wireless Campus

    Wireless Communications today encompass an increasingly wide cross section of technology, ranging from mobile technology such as EV-DO through to Wireless LAN and WiMax. The application of such technologies enables ubiquitous wireless coverage within and also beyond an educational campus environment. At the same time, the prospect of ubiquitous coverage also opens up new application possibilities such as surveillance, e-learning and peer-to-peer networking. This session considers the attributes of the different wireless technologies and illustrates their real world application with a number of case studies.

    [Index]

    Andrew Simkus

    Solutions Architect, Dimension Data

    Andrew Simkus is a Solutions Architect working in the Connectivity group at Dimension Data. Based in Brisbane. Andrew has over ten years' experience in networking and converged communications, working primarily with WAN, LAN and telecommunications technologies since obtaining his BSc - Computing degree from Bond University in 1994. Andrew has worked on major networking designs, their implementation and ongoing operational support, across a wide range of industries including education, health, mining, government, manufacturing, retail, telecommunications, finance and banking. Prior to joining Dimension Data in November 1999, Andrew was employed by CITEC (Queensland State Government Computing Bureau) in Brisbane as a Senior Networking Engineer with responsibilities as chief designer and architect in the data communications area. He has a diverse range of skills from network configuration and solutions design to technical consultancy and business continuity planning, with additional experience in voice, security, wireless, microwave and satellite technologies.

    Switching over to IP Telephony

    This session discusses some of the challenges facing organisations switching over to IP Telephony. Over the last three years or so, we have really seen the pace of adoption for IP Telephony (IP Tel) picking up. This is largely due to the acceptance of IP Tel as a feasible technology and its tangible business benefits to the network, combined with 'end of life' approaching for circuit switching PABX systems. There are three key scenarios that organisations are faced with when switching over to IP Tel:

    • Co-habitation of existing PABX and IP Tel
    • Pure IP Tel; and
    • Outsourced IP Tel, either through hosted or managed IP Tel

    This session discusses the common and unique challenges represented in each of these scenarios, based on the objective that the end user's telephony experience should be improved by the move to this new technology.

    [Index]

    Gary Ruddy

    Manager Optical Marketing - Academic and Research Centre, ANZ, Nortel

    Gary Ruddy is responsible for Nortel's optical portfolio in the research and education sector in the ANZ market place. Gary has held this position for the last three years, prior to this he was the manager of optical systems engineering for the ANZ region.

    Gary has over 10 years experience working with optical networks and before joining Nortel in 2000 he held the role of solutions manager for Ericsson in the UK, where he supported the BT Account. He has also held a number of senior engineering roles for Cable & Wireless UK and NYNEX.

    User Controlled Services - A Reality with Next Generation Optical Networks

    A new breed of telecoms 'operator' is emerging and with them, a new vision of optical applications is being pioneered. Research and education sector service providers such as CANARIE, SURFNet and AARNet are at the forefront of this paradigm shift and optical infrastructure is the vehicle.

    User-controlled ultra high bandwidth services is the goal and technologies such as Next Generation Modulation (NGM) and Automatically Switch Optical Networking (ASON) are key tools in making this achievable. This presentation will look at these technologies and others that are available now or in the near future that make user controlled optical services a reality.

    [Index]

    Matthew Gast

    Matthew Gast currently works for an advanced wireless network systems company in the Bay Area. Prior to that, he spent several years as an engineer for a series of network security companies. He is the author of 802.11 Wireless Networks: The Definitive Guide, Network Printing, and T1: A Survival Guide. You can more information about Matthew, and read articles he has written, at Orielly's website.

    Chris Hessing

    Chris Hessing works full time for the University of Utah Marriott Library, where he has been heavily involved in the deployment of wireless with 802.1X on campus. He is also the lead developer on the Open1x, Xsupplicant project, which provides an 802.1X supplicant for Linux. He was involved in the 802.1X interoperability test at Networld+Interop's iLabs in 2004. He also assisted in setting up 802.1X for the wireless network at IETF 60 in San Diego.

    Dot.X Wireless Security

    As wireless LAN deployment has become increasingly widespread, 802.11 has become the medium of choice to provide network access visiting guests as well as mobile professionals. To help network managers construct networks that provide differentiated privileges to different user groups, the industry has developed a suite of protocols based on 802.1X.

    [Index]

    Steve Johnston

    Manager, IT Infrastructure, Edith Cowan University

    Steve Johnston is the Manager of IT Infrastructure at Edith Cowan University. Steve's role encompasses all aspects voice, video and data networks; systems operations; and middleware applications. Steve has been working for ECU for about seven years, following experience with Curtin University and a Bachelor's Degree in Computer Systems.

    Steve has a strong technical background, and has come through the ranks network and laboratory support. In 1999 Steve was technical lead for the Network Upgrade Project - a project that is the basis for the success of server, video, voice, directory and data services within the University. Steve leads a small team providing an excellent service to the ECU community.

    Integrating voice, video and data networks

    Edith Cowan University commenced the move towards VoIP and IP Telephony in 2003. A trial project was started, but the result concluded that VoIP was a venture that needed to be carefully considered - some products were relatively closed in their approach, and there was a danger of being 'locked-in' to a particular vendor or service.

    After the AARNet SIP workshops in 2004, ECU revisited the VoIP/SIP arena. Careful product selection and a concentration on open and agreed standards resulted in an effectively converged set of IP-based telephony services and an extremely successful pilot programme. ECU has developed a strong platform for future development, with a current capability for providing anywhere, any-client voice/video service.

    The ECU Advantage: Ubiquitous computing enhancing teaching, learning and research

    This presentation will cover the history and development of the Edith Cowan University Advantage program. This is a key strategy for ECU to improve its basic student services in C&IT, enhance online learning and create innovative environments for teaching.

    ECU has a strategy to become a stronger University and enhance teaching through innovative research because of the University's excellence in collaboration and improved practice in the professional field of communications technologies. Pursuing this strategy, ECU signed a 10 year strategic alliance with IBM, and has a strategic alliance with Nortel for the provision of wireless networking technology.

    ECU Advantage was forged out of the alliance with IBM and involved in stage one, the implementation of a pervasive wireless network and provision of over 100 laptops to students.

    The initial aims of the program were as follows:

    • Supporting the use of notebook and wireless connectivity to assist students to achieve successful learning outcomes in an exciting and stimulating fashion
    • Developing students' confidence, knowledge and skills in the selection and application of technology appropriate to their field of scholarship
    • Achieving an institutional advantage over competitors by adding value to the teaching and learning experience
    • Expanding students' use of online resources and information at ECU (i.e. learning management systems, library etc)
    • Enhancing flexible delivery options for staff and students
    • Making better and more efficient use of space
    • Developing new teaching and learning models utilising mobile computing technologies
    • Integrating technology into the university experience for academic staff by providing educational design opportunities, infrastructure and support.

    ECU Advantage was implemented in July 2004 and was externally and independently evaluated by Drs Towers and Hearn from the Faculty of Creative Industries and Applications Centre at Queensland University of Technology. Additionally, the academic staff engaged in the three pilot projects were required to submit research on the use of ubiquitous computing and wireless networks and their impact on learning. These evaluations will be synthesised and the key findings presented.

    The technical preparations for this program have been vast and were based on visits to five international 'laptop' universities in North America and the United Kingdom and two global network vendors Cisco and Nortel. The planning, selection, installation and operation of the wireless network, and laptop technology has been thorough and case material will be presented on this process. ECU received world-wide publicity as it launched one of the first wireless mesh networks in the world. This unique technology has provided ECU with an expansive wireless network leading to further interesting developments.

    Overall, this paper will have implications for the way courses are planned and delivered using mobile devices. The presentation will also take a technologist's view of the steps needed to configure the University network to handle the additional services and load. Behind the scenes work on testing, preparing and delivering robust laptop technology will also be covered, along with insights into how to build and sustain strategic partnerships with key suppliers when devising innovative teaching and learning strategies.

    [Index]

    Pascal Fanton

    APAC Sales Director, Crannog Software

    Pascal Fanton has 13 years of experience building & leading sales, marketing and operations for both start-up and established high-tech companies across EMEA and APAC regions. This includes companies such as Philips Communications, Quallaby, Ganymede, NetIQ and Crannog Software. He graduated with a master in Telecommunications and Networking, and has focused his past 8 years building business for Network and Application Management companies, analyzing market trends, evolutions of customer needs and studying the impact of new technologies.

    'Think outside the Box' - Network Management, capacity planning

    The first part of the presentation explains the different markets of Network Management. It will include a discussion on:

    • The market trends, including an analysis of market studies such as by the Gartner Group
    • The factors driving management from 'Nice to have' to 'Must have' and analysis of various factors such as technology, security, business reliability, end user productivity
    • The key drivers for each market segment including SME, Enterprise, Managed Service Provider, Telco

    The second part gives a brief overview of the negative side of network management and why many management tools end up as 'shelfware' ie. they sit on a shelf and never get used. Some Enterprise NMS systems cost the same or more than the network they were managing. Usually they present technical information geared to technical people with limited use for general network users, line managers and senior business managers. This usually requires several applications by different vendors to provide full functionality which means more training, more administration, and more headaches. This is usually difficult to set up and administer - which adds, moves and changes headaches.

    The next part discusses what you need to know. It describes key information you must obtain to manage your network and prevent problems. With the convergence of security/application/network problems, we can see the emergence of a new standard Netflow/IPFIX. Such a cost-effective technology helps to get the complete understanding of what happens in your network infrastructure. But all information needs to be easy-to-access, easy-to-use and easy-to-read.

    Finally the question is asked, who needs to know? Organisations only have networks because there is a business requirement. As technology progresses and makes everyone else's job easier its' complexities make the IT departments jobs considerably more difficult. From a business perspective, things like internal billing have become increasingly more important.

    For the IT team to become a profit centre they have to be able to properly charge for their services. It's easy to allocate a cost to the PC's, servers, software and infrastructure used by a specific department but without the relevant information how do you charge them for network usage or service time.

    [Index]

    Adam Radford

    Cisco

    Adam obtained a Computer Science degree from the University of New South Wales in 1991. He then spent the next eight years working at the University as first software engineer and later a network engineer. Four and a half years ago, he started working for Cisco Systems and is now a Consulting Systems Engineer. Adam has a wide range of interests, including Voice, Video and Data Integration as well as wireless technology, Storage and IP Multicast. He has presented at a wide range of technical forums including QUESTnet during the past five years.

    Wireless LAN Directions

    Over the past few years there has been a widespread adoption of Wireless LAN (WLAN) in the University environment. Primarily these deployments have been for data services. There are many other services such as Wireless Voice, Security and Location Based Services (LBS) that are now starting to be layered on top of a WLAN.

    This presentation looks at some of the emerging protocols and standards as a part of the WLAN suite. Applications such as Voice over WLAN (VoWLAN), Radio Frequency Identification (RFID) will also be discussed. It will also provide a brief summary of the future of WLAN, the high speed 802.11n protocol.

    This presentation is for WLAN architects. It will be a medium level technical presentation.

    [Index]

    Roland Chia

    National Business Manager, Dimension Data

    Roland Chia is National Business Manager, Dimension Data Australia. He is responsible for business development of its Connectivity line of business. Roland joined Dimension Data in 1991 as a technical support specialist focusing on Novell's NetWare and providing SNA support. Following this, Roland was promoted in 1994 to technical services manager where he was responsible for managing over 30 engineers in Dimension Data's technical support team. Prior to his appointment as national business manager in 2000, Roland was a senior network consultant and chief architect for major network infrastructure projects in the banking and retail industries.

    Securing Enterprise IP Telephony

    IP Telephony has not suddenly given rise to a new breed of security threat to voice communications - PABX hacking has been prevalent for decades. However, when you migrate a voice network to IP, a whole new set of vulnerabilities does arise. Each IP device becomes a potential target for hackers, and voice communications are prone to denial-of-service attacks and viruses. To address the specific threats to IP Telephony, organisations need to consider the overall security infrastructure, including processes for patch management, anti-virus protection, backup and data recovery, and operating system upgrades. This session outlines the major threats to converged IP networks and IP Telephony, the establishment and maintenance of a secure, converged infrastructure, and next generation security tools currently emerging.

    [Index]

    Oliver Descoeudres

    NetStar Australia

    Oliver Descoeudres is Director of Marketing for the NetStar Group, and has been with NetStar for five years. Prior to joining NetStar, Oliver was Marketing Manager at Memorex Telex, a network integrator and network management solutions provider. He has held technical marketing and sales management roles at Tech Pacific and the University of Sydney's Computing Services. Oliver is also a regular contributor to ZDnet's Technology and Business magazine. He graduated from the University of Sydney with a Bachelor of Economics degree.

    'Eggs in the Basket' - how convergence changes the security landscape

    Convergence provides increased functionality and reduced support costs. It also changes the nature of threats and risks, increasing the need for real-time protection, detection and response. The proposed presentation discusses the changing nature of threats and risks and looks at how to mitigate these from a combined response. For example, the annual 2004 CSI/FBI Computer Crime and Security Survey identified Viruses ($55M), followed by Denial of Service attacks ($26M) as causing the greatest losses amongst the 300-odd respondents, well in front of Telco Fraud and Abuse of Wireless Networks. This has significant repercussions on IT managers who are considering moving to IP Telephony on the campus and don't have a 'bullet proof' network.

    The presentation takes a high-level (rather than technical) view of the current market and drivers for IP Telephony, and analyses the security threats in both a traditional (TDM) and converged (IP Telephony) environment. Using the Confidentiality/Integrity /Availability framework, the presentation identifies the areas of greatest risk, and therefore where increased protection is required. It takes into account new technologies, such as Cisco's 'Self Defending Network' and the role this plays in securing against threats to IP Telephony. The need for 24x7 vigilance is also discussed.

    [Index]

    Alex Gatiragas

    Product Manager, Enterprise Convergent Solutions, NEC Business Solutions

    With over 15 years experience in the Enterprise communication market, Alex Gatiragas has worked with leading edge solutions including Unified Messaging, Computer Telephony Integration (CTI) and IP Telephony. Having worked in various technical and commercial roles, Alex's experience has been used to drive the market introduction of NEC's convergent solutions. Alex currently holds the role for Product Manager for Enterprise Convergent Solutions with NEC Business Solutions, focusing on the impact of voice and data convergence on Wireless Local Area Networks.

    VoIP and Beyond

    The acceptance of Voice over IP has steadily grown to the point where it's now considered to have moved from leading edge to an established technology. NEC's Product Manager for Converged Solutions, Alex Gatiragas, will provide an insight into value-added solutions that move VoIP from a technology designed to reduce costs, through to a solution that enhances the way an organisation communicates.

    Topics to be address include:

    • 2004 a year in review
    • VoIP Trends for 2005
    • Productivity enhancing applications
    • Wireless: the next frontier for VoIP

    [Index]

    Jonathon Gordon

    Allot Communications

    Jonathon Gordon is an industry expert on Traffic Management and has been with Allot Communications for six years. He currently manages the A/NZ region for Allot Communications. Previous to his current posting in Australia, he held the position of Technical Support Director for Allot Communications in the company Headquarters in Tel-Aviv. As Technical Support Director he gained hands on experience at both Enterprise and ISP/Carrier level corporations throughout US, Europe and Asia.

    Before joining Allot Communications, Jonathon had ten years experience in Network & Systems roles at Comverse Network Systems, Team Integration Systems & CCS Australia.

    Peer-to-Peer Phenomenon - How to be combat it now and in the Future.

    P2P: it's amazing how one term can elicit such extreme reactions, depending on whom you're speaking to. There is the public denouncement of the billions of music and movie downloads as outright intellectual property 'theft,' impinging on every person's right to make a living in a capitalistic society; juxtaposed against an equally public outcry of 'freedom of speech.' For individuals, it's opened up a whole new world of communal file sharing, from music to videos to computer programs - all free and all accessible through hundreds of P2P applications, available to anyone with a computer and Internet access. For music industry moguls, it's the enemy, with declarations of illegality and pending lawsuits against 'offenders.'

    For enterprises - especially in the University space, it can be a nightmare, as more and more students (and staff) snatch a significant amount of bandwidth for recreational P2P use - at the expense of academic-related applications. Even when Universities ban P2P use altogether on their networks, employees can circumvent the restrictions by using the illegal and security risky SoftEther-type tunneling applications, which enables users to bypass the corporate network security suite and allows unrestricted entry for potentially harmful content. Universities in Australia have long held to the myth of 'if we don't know what's happening then we shouldn't be held responsible.' It is not by accident that Australian Universities along with ISPs have been the target of Raids by Anti-Piracy groups.

    Higher Educational Institutions and larger organisations, plagued by the same inability to discern P2P, watch as illegal files (including those with sexual or paedophilic content) are shared in the same manner as academic files being used in this intelligent distribution network. For service providers (ISPs), it is an epidemic, snatching 60% - 80% of their traffic day and night, because their network monitoring devices cannot identify P2P.

    The presentation will go on to identify the size and future directions of P2P usage and effective ways of how to monitor and control/eliminate the P2P threat.

    [Index]

    Peter Marini

    PatchLink - Sales Director, Australia and New Zealand

    Peter Marini is responsible for the company’s sales, channel and alliance management within Australia and New Zealand

    Prior to joining PatchLink in April 2005, he was the sales manager, security division, Ceanet. Peter has over 13 years experience in the IT industry with roles at Volante, Network Associates and Data#3 as a solutions and support engineer.

    Understanding and Applying the Five Ps of Security Patch & Vulnerability Management

    Is there a simple way for businesses to develop and deploy an advanced security patch and vulnerability management strategy? This presentation will share with attendees how security and vulnerability patching has become one of the top concerns for IT managers worldwide, but has also left many IT teams fighting a losing battle as the job of patching competes with day-to-day system maintenance and security tasks.

    The patching issue became a more prominent problem for businesses worldwide in 2003 when the Slammer worm was unleashed on the Internet. In the first minute after it started spreading, Slammer doubled the number of web servers it infected every eight seconds. Within 10 minutes, 90 percent of all vulnerable machines had been infected - leaving businesses with $1 billion bill to fix the havoc Slammer created. Yet the patch to fix the vulnerability that Slammer exploited had been available for six months. If the majority of those infected had patched their systems, Slammer would have been a minor blip.

    So why aren't businesses catching on to patching? This presentation shares insights on how the bottom line resource and time problem. Just researching the 4,000+ vulnerabilities published by security monitoring body CERT in the last year would demand hundreds of man-hours. And although an IT staff may be online regularly to see what patches are released, they cannot be 100 percent sure that all systems are properly patched.

    This presentation will also discuss the cost issue. Recent research from analysts at The Yankee Group found that it can cost as much as $1 million to manually deploy a single patch in a 1,000-node network environment. The costs include the manual labour involved in fixing problems and system downtime while patches are being applied.

    Additionally, it will discuss how the interval between a vulnerability being discovered and exploited has shortened and why implementing a security patch management program is now a necessity for organizations of all sizes. The 2004 Blaster worm was released just 18 days after the vulnerability it exploited was discovered, and the pace is stepping up. So how should businesses respond effectively to this challenge? Gemassmer answers this question and more.

    Through a detailed explanation of the Five Ps of Security Patch & Vulnerability Management - proper planning prevents poor performance - support IT security success, the presentation will provide attendees with not only an important business maxim, but also a strategic approach that supports improved network security.

    [Index]

    Stephen Kingham

    AARNet - Network Engineer

    Stephen Kingham is presently employed by AARNet to Manage the VoIP and VIDEO Services. Prior to that he has spent considerable time with CSIRO and OTC(A), as well as shorter times with DFAT, AQIS and Centrelink (roll out of the 2,000 end distributed call centres and 30,000 telephones.

    Stephen is extremely active within Australia as well as Internationally. Some of his key projects today are:

    • introducing SIP based technology into VoIP and Video and Collaboration.
    • ENUM in Australia
    • Designing new SIP based Services for AARNet Members

    He is the drive, design, and support behind AARNet's VoIP Toll Bypass Service and VIDEO Service provided to AARNet Members. A particularly innovative approach invented by Stephen has been a "QoS Admission" control that ensures VoIP calls are connected if QoS is in fact functioning which has a good chance of wider deployment. AARNet's IPTEL and very successful VIDEO Working Groups are a result of Stephen's initiative and he is a major contributor to these groups. He is a member of the steering committees for both.

    Stephen Kingham represents AARNet in several international forums, some as a senior position:

    • Chair of the sip-h323 Working Group in APAN (http://www.apan.net/wg/sip.htm)
    • Invited member of the auspicious (closed) Internet 2 Real Time Communications Advisory Group.
    • Founding and active member of the Internet2 VoIP Working Group.
    • Active member of the PIC and SIP.edu Working groups.
    • NASM Member - Stephen runs one of the three International Root H.323 gatekeepers that link the worlds advanced Video Networks together using the GDS (Global Dialing Scheme) and is one of the key drivers behind doing the same for SIP based communications.

    Stephen has 20+ years experience in Voice, Data, and half that as SysAdmin. He is equally comfortable operating Voice networks as well as data networks and writing applications to make them work. He has several tertiary qualifications; BSc in Electronics/Physics; Masters in IT; (half completed) Masters in Computing; and Electronics and Communications Certificate.

    Future developments of the telephone service!

    With the coming of age of IP Telephony spawned by the new technology of SIP there is a growing market for third party Telephone Carriers who provide their service using the Internet. Academics, students, staff and the general public are starting to use these services in preference to the telephone provided by the University. This trend will undoubtedly continue.

    This talk reviews the trends occurring overseas, how the services work and why they are successful and what will the telephone service look like in the medium-term and what can Universities do to keep their clients.

    [Index]

    Dr Mike Sargent

    Chair, eResearch Coordinating Committee

    Dr Mike Sargent is a Director of M. A. Sargent & Associates, providing strategic corporate consulting services to industry, with a particular focus on the information technology, energy, environment and utilities sectors. Prior to this he was Chief Executive of Transfield Energy Group, and before that was Chief Executive Officer of ACTEW Corporation.

    Mike has 40 years experience in the utility industry in Australia, USA and Canada. He is Chair of the Australian Research and Education Network Advisory Committee. He has been Chair of the National Infrastructure Taskforce, and a Member of the Australian Research Council. He is a member of the Board of Power & Water Corporation, and of the National Electricity Market Management Company. He is Deputy Chairman of epicorp Ltd, a high technology seed fund and incubator. He is Deputy Chancellor of the University of Canberra and Adjunct Professor of the University of Technology Sydney.

    Mike has a degree in electrical engineering and a Doctor of Philosophy from the University of Queensland. He is active in professional and community matters. He is a Fellow of the Australian Institute of Company Directors, a Fellow of the Australian Academy of Technological Sciences and Engineering, Academician of the International Academy for Quality, and was President of The Institution of Engineers Australia in 1990. In recognition of his service to engineering he was made a Member of the Order of Australia in 1993 and a Centenary Medal in 2003.

    The eResearch Program - Making Networks Work for Researchers

    The rapid evolution of digital, information and communications technologies has created an environment in which the paradigms of research have changed. Over the past few years a number of initiatives in Australia and overseas have been taken to ensure that these opportunities can be effectively exploited, including establishment of the Australian research and education network.

    At the same time the evolution of the capability and sophistication of scientific instruments and facilities has seen an explosion in the quantum of data produced by experimentation, and the complexity of analyses conducted using this data.

    Science, particularly that based on large instruments, increasingly involves distributed, global collaborations enabled by networks and using very large scale data collections, high performance computing resources, tele-science (remote access and control of instrumentation) and collaborative visualisation. Collectively this is referred to as e-Research.

    e-Research involves an evolving new capacity for large-scale, distributed, global collaboration in research, providing a new level of scope, scale and detail. It entails harnessing the capacity of ICT systems, particularly the power of high-capacity distributed computing, and the vast distributed storage capacity fuelled by the constant dropping cost of memory, to study complex systems across the research landscape. It has a number of components:

    • Access to very large data collections,
    • Complex simulations,
    • High performance visualisation , and
    • Virtual research organisations involving researchers distributed geographically.

    These current Australian investments in e-Infrastructure: AREN, APAC, AARNET, GrangeNet, the ARIIC initiatives and investment in major physical infrastructure through the MNRF program and other funding programs, have placed Australia in a position to support e-Research activities that are comparable, and in certain aspects in advance, of that existing in the UK and USA. In addition, the collaboration frameworks established for Australian research provide a much stronger base for e-Research than existed in the UK at the time of initiation of the e-Science programme.

    To ensure that its researchers remain globally relevant and competitive, and to ensure Australia maximises its return on investment from the new global research paradigms, the Australian Government has initiated a coordinated activity in e-Research, to build on and take advantage of recent investments in broadband networks, high performance computing, instrumentation, large experimental facilities, and information infrastructure. This initiative has a clear focus on strengthening multidisciplinary teams working in national priority areas by providing incentives, guided by policies, and participating in international research programs.

    [Index]

    Sven Nowicki

    CEO Netintact

    Sven Nowicki is the CEO of Netintact.

    Sven has worked within the IT industry for over 15 years and started Netintact in 2000 together with 4 colleges. Netintact today has business in Europe, Australia, USA, Chile, Canada, Israel, and Asia.

    Sven started his first company in 1990 building computers and networks for small business and private customers.

    Sven is the IT manager for The Federation of Private Enterprises, a non-government organisation for entrepreneurs and business owners. Sven is also a board member of NetAdmin Sweden AB - a provisioning development company in Sweden. He is an active member of S I B - The Swedish IT Security Industry council - platform for the Swedish IT and information security companies. Sven is also an active member of SIG Security in Sweden.

    When not exploring business opportunities, Sven spends his time with friends and family and he burns energy out of work playing football. He is a board member of the football team FFF.

    Internet traffic patterns and user behavior / Yesterday - Today - Tomorrow

    Today's networks are changing in scope and complexity at an ever-increasing rate. Much has changed since the days of web browsing on poor performance dialup connections. IP Traffic is growing exponentially, with new applications and protocols being deployed daily. Business models and infrastructure are struggling to keep pace with the transformation to an IP Based Economy.

    Centre of attention:

    • IP Traffic patterns and trends; Yesterday, Today and Tomorrow
    • P2P - different technologies
    • How does P2P effect you network
      Committed bandwidth from End to End (QoS - different technologies)
    • Abuse
    • Security
    • Bandwidth consumption - should all pay for a few users "over consumption" Service and pricing models
    • Internet policy - how to build and implement
      One Provider for all IP services (Triple play)

    [Index]

    Clive Gold

    EMC Australia and New Zealand

    Clive Gold has over 20 years experience in the IT&T industry, having held senior positions in Services, Support and Marketing. His career spans a number of major IT players such as Hewlett Packard, Pyramid Technology, Dimension Data and EMC. Clive joined EMC Corporation five and a half years ago and is currently a Product Marketing Manager, and is primarily responsible for bringing new technologies to market within this region. Clive has a BSc. in Electrical Engineering as well as a Masters of Business Administration and is on the board of the Storage Networking Industry Association, Australia.

    Information Life Cycle Management - the new paradigm

    Information Lifecycle Management has become a common term in the IT market, yet there are areas of the technology that are still under development.

    Putting ILM in context of IT challenges, business goals and operational tasks is what EMC will cover in this presentation. Sharing practical examples and best practices from customers around the world, on how they have deployed ILM principles within applications such as Email, and Databases will also be discussed. From this base the presentation will look at new technologies being brought to market which will help achieve true, cross application, policy based, automated ILM.

    [Index]

    Jeff Brainard

    Director of Corporate & Product Marketing at Mirapoint

    Jeff Brainard is an industry expert on the application of email and email-specific hygiene. Jeff is frequently quoted in the press and works closely with industry analysts at Gartner, IDC, Radicati, Meta and Yankee. Currently, Jeff is Director of Corporate & Product Marketing at Mirapoint, where he is actively involved in marketing the company, working with customers, as well as helping to shape the company's strategic product direction. Prior to joining Mirapoint, Jeff held product marketing, product management and strategic partnership roles at Airflash, a next-generation wireless messaging and location-sensitive applications company. Prior to Airflash, Jeff worked at Sun Microsystems, where he was involved in launching Sun's first Internet messaging product, as well as working on the product marketing strategy to align the Sun and Netscape messaging software product lines. Jeff has a Bachelors degree from Villanova University.

    Best Practices in Email Security: How to Handle the Rising Threat

    Jeff's presentation will be titled 'Best Practices in Email Security: How to Handle the Rising Threat' and will focus on the challenges customers face from the ever-evolving security threat landscape. Whether it's protecting against viruses, spam, hacker attacks, phishing scams or future risks related to inappropriate content, policy controls or information leakage, customers have their hands full understanding the risks and finding ways to get effective, yet durable protection over their critical communications. Did you know?

    • 80% of viruses enter customers' networks via email; a typical infection costs up to $500,000-Gartner
    • About 450 viruses are discovered each month-IDC
    • In 2004, more than 8.8 billion spam messages were sent every day-IDC
    • Spam will cost companies $198 billion by 2007-Radicati Group
    • The Nigerian 'prisoner' scam extracts $200M from its victims a year-FBI
    • 51% of users have received pornographic spam messages-Queens University
    • Phishing accounted for $2.4 billion in fraud, or an average of $1,200 per victim, during 2004-Gartner

    Especially when it comes to online communication tools like email and messaging in higher education, security threats jeopardize critical interactions between students, alumni, faculty and staff that can directly impact online learning. Looking ahead, as the message network takes on an increasingly important role with the convergence of telephony and wireless applications, the security risks will compound and organizations unprepared will be at risk of productivity losses, financial and potentially legal risk. Jeff's presentation will overview this evolving threat landscape and provide an education on how attacks are being conducted today, how they are evolving, the types of threats customers should prepare for, as well as the solutions either through education or technology, that can best help customers make email good again.

    [Index]

    Merv Connell

    IT Manager Central Queensland University

    Merv Connell is the Communications Manager at Central Queensland University responsible for Network infrastructure (Voice and Data) , High Performance Computing Infrastructure and Physical Environment provisioning. During his 19 years at CQU he has been involved in the installation of fibre optic networks in the mid 80's, multi state campus deployment in the early 90's and computer housing facilities during the last 3 years. Strategic positioning of infrastructure for organisational development is a primary interest.

    Data_Centre@CQU

    This will discuss the UPS Fire at Central Queensland University in Nov 2003 and the ongoing events leading to the construction of a new purpose-built Data Centre.

    What issues did CQU face because it was knocked out? How long did it take to come up? Why did a new data centre result? What did was learnt and how would we now do it differently.

    These questions and more will be answered including reference to an Australian AS Standard that will surprise, and comment about who bothers about testing the windings of the external transformer to ensure it is within power rating spec.

    [Index]

    Alan Taylor

    Queensland Health

    Alan Taylor is currently Project Director Outbacknet and Northern.net Projects and Principal Telecommunications Engineer, Queensland Health. He is responsible for the Outbacknet and Northern.net projects which are providing broadband xDSL facilities in 80 outback communities in Queensland. He is also responsible for the strategic direction of communications and networks within Queensland Health including data, voice, video and telehealth networks. He previously initiated the Service Delivery Network for Queensland health which established a statewide broad band network linking 28 major hospitals. In his early career he conducted research on networked multimedia in education, including the technical and pedagogical requirements and issues for distance, flexible and open learning.

    Alan's qualifications include a BSc (Hons) in Physics and Electronic Engineering Manchester University, a MSc. at Salford University in Sociology of Science, and CEng. MIEE.

    Wayne Kupfer

    Department of Employment and Training

    Henk Vullers

    Education Queensland

    Henk Vullers has been working in the IT industry in both private and government organisations for the past twenty years. Henk first completed an Associate Diploma in Electrical Engineering in 1981 and commenced work as a technician in the computer industry. While working as a technician Henk completed his Bachelor of Electrical Engineering (majoring in Communications and Electronics) from the Queensland University of Technology. He specialises in large, systemic implementations of organisational networks. His first foray was to deploy the Australia Post network throughout Queensland. Following on from this was the implementation of the Queensland Police Service's first complete network. In 1997 Henk was seconded to the Department of Education as Manager, Network Services, to project manage the inaugural implementation of EdNet, the department's network linking 1 300 schools, regional offices and central office. The second rollout of EdNet has recently been completed and was used as the basis for the whole-of-government initiative, SmartNet.

    Outbacknet and Northern.net - Broadband to the Bush

    Commonwealth funded Outbacknet@qld and Northern.net@qld projects worth $10 million are providing broadband xDSL available to about 80 rural communities in Queensland. Schools, hospitals, TAFE colleges, fire and ambulance stations are providing anchor tenancy for the new services.

    The projects are delivering new teleradiology, paediatric, ophthalmology and orthopaedic services including diagnosis, second opinion, and pre/post admission consultations, largely via H.323 IP based videoconferencing. They are also delivering online access to learning and development opportunities and Virtual Schooling provide access online quality curriculum information to rural and remote schools, TAFE campuses, and distance education centres.

    The presentation will:

    • describe the development of the projects;
    • discuss the resulting issues for the development of broadband infrastructure in regional Queensland;
    • question the value of relying on market forces to provide cost effective broadband networks in regional Queensland;
    • emphasise the important of cross sector, cross disciplinary cooperation to aggregate network and service demands;
    • show the importance of integrating development of both infrastructure and services for broadband networks; and
    • Report on the achievements of the projects as they near completion.

    Queensland is the largest, most de-centralised state in Australia which presents particular problems for strategies which aim to prevent exclusion of outback communities from the economy of the online world.

    The presentation will also attempt to stimulate the creation of linkages with the high speed network initiatives in higher education, government service delivery and the development of broadband/high-speed networks within Queensland.

    [Index]

    Kevin Littlejohn

    Obsidian Consulting Group

    Kevin Littlejohn has worked with Internet Billing for the past 10 years, at various levels of the ISP industry. His previous position was with Connect. com.au, developing and maintaining their wholesale billing system. Currently, he works for Obsidian Consulting Group, who develop a billing system which is sold primarily to organisations looking for tailored solutions to their billing issues. Jet is a distillation of lessons learnt over the past decade, and aims to be highly flexible and scalable, to suit the kinds of challenges existing in the University marketplace.

    Internet Quotas and charge-back in a tertiary environment

    This is a presentation about integration issues for billing systems - the challenges involved in integrating a billing and user management system with existing infrastructure. This will cover collecting usage data from disparate systems such as Netflow, SSG, Radius; also, how to integrate your login procedures via systems such as Novell or the various network management platforms such as PacketLogic.

    [Index]

    Chris Myers

    Advanced Communication Services Coordinator, GrangeNet

    Chris joined GrangeNet, in Canberra, in February 2004. Prior to this Chris was Senior Network Engineer in ITS at Swinburne University of Technology.

    At GrangeNet, Chris' duties include delivery of new communication services, encouraging local and international collaborative research in advanced networking, and delivering training and training resources in advanced networking.

    Chris is responsible for IPv6 and multicast service deployments on GrangeNet and also the Distributed Data Centre Mass Storage (DDCMS) Prototype Project and the Access Grid Storage System Project and the eduroam.edu.au project.

    Joining eduroam

    EduRoam allows roving researchers to log-in, with their usual "user name/password", to a wireless networks at participating campuses around Australia and the World and gain access to resources at their home institution. The program, which is based on inter-institutional trust, originated in the Netherlands and is rapidly spreading across Europe, Australia and soon the USA.

    This presentation will describe what is required to participate in this project, how to join the federation, what services you will receive and what the future holds for eduroam and its expanding services.

    [Index]

    Greg Wickham

    Network Operations Manager, GrangeNet

    Greg joined GrangeNet as the Network Operations Manager in July 2002. Previously he studied and worked at Deakin enjoying many varying roles always with programming and data networking a common theme. Initially tutoring and then lecturing in the School of Computing and Maths he was involved with Programming, Software Engineering and Data Networks. The next move was to transfer into Information Technology Services maintaining aspects of network monitoring. His final role at Deakin was as the Network Section Leader. The network section was unique within the Division as it had 9 staff distributed between 6 campuses maintaining the entire network infrastructure including PABXs and inter-campus WAN links. During his time in this role he created a vision that would provide core redundancy and homogeneity of networking to all staff desktops and student laboratories. He has a PhD in Computer Science.

    GrangeNet II

    Due to the successes of the GrangeNet program a funding extension was granted until the end of 2006. As part of the funding extension a component was allocated for maintenance and refresh of the existing GrangeNet backbone equipment. In collaboration with Cisco an innovative network architecture was developed that permits unparalleled connectivity between researchers that have access to the existing GrangeNet POP sites. The new network supports layer 1, layer 2 and layer 3 services to the GrangeNet community.

    Layer 1 services, commonly called Lightpaths, are dedicated connections between two endpoints that bypass all of the GrangeNet layer 3 routing and layer 2 switching infrastructure. Effectively the user will only see their device at both ends.

    The Layer 2 service is a Local Area Network. Between any Grangenet POP site it is possible to configure the same VLAN. This can effectively create a LAN segment that spans between Brisbane and Perth and all GrangeNet POP sites in between.

    The Layer 3 service is the traditional R&E routed traffic that GrangeNet has been carrying since inception.

    This presentation will be used to describe the logical and architectural concepts that underpin the GrangeNet II network; provide a detailed examination of the interior workings of the new equipment; and provide examples on how researchers can best benefit from this new architecture.

    [Index]

    David White

    Regional SE Manager for South Asia Pacific , Foundry Networks

    David White, Regional SE Manager for South Asia Pacific , Foundry Networks David White has worked for Foundry Networks for the last 5 years, where he holds the position of Regional SE Manager for South Asia Pacific. David has had significant experience with networking technology over the last 21 years, from the early days of thick and thin Ethernet, repeaters, transceivers and hubs, progressing to token ring and ATM, through the rapid development of 10 and 100 Mb Ethernet switching technology, and finally into the era of high performance Gigabit and ten Gigabit Ethernet networking. He has demonstrated expertise in all facets of network design, installation and troubleshooting across many brands of equipment and protocols and has designed and installed a number of large networks for corporate Australia. Prior to working for Foundry, David ran his own networking consultancy.

    Rapid failover alternatives for today’s High Speed Networks.

    With requirements for Campus-wide VLAN’s, support for 802.1x with dynamic allocation of user policy. The use of a routed cores or 802.1D Spanning Tree just don’t meet the user requirements. This presentations discuss various technologies which provide smart alternatives & ways of overcoming Spanning Tree limitations.

    [Index]

    Maree Lowe

    CEO, ASI Solutions

    Maree is CEO and Director of ASI Solutions, a privately Australian owned IT company since 1985. ASI has national sales and service branches and employs 185 staff.

    In 1999, Maree was NSW Telstra Business Woman of the Year and the NSW Westpac Business Owner of the Year. In 2004, Maree was also elected as a Director on the Telstra Stadium Club Board. Maree is also on the AIIA NSW Committee and other industry peak bodies

    She considers that in the IT world, it is no longer about ICT working as a separate department but rather as a part of the organisation's core activity and that ICT teams must have input into Strategic Planning, Finance and HR and other departments' roles. Her own role incorporates many of these aspects.

    She describes her strength as "Her Hands on management style: Having worked on Contract submissions, negotiation and management, Customer Help Desk Service liaison and IT service outsourcing projects. Many of these involve major government contracts including Defence, Health, Education and Police.

    Wireless Security

    This presentation will discuss detection, location and isolation of rogue devices. It will also describe the first wireless firewall.

    As the need to access information everywhere dominates discussion, so to does the need for all users internal and external to know that the information is secure.

    When wireless was released to the world it became one of the fastest growing areas of all IT equipment. When WEP (wired equivalence protocol) was found to be breakable the corporate market took note and stop buying. However the rest of the market continued to explore and grow their wireless investments as the productivity was improved. Since WEP the wireless manufactures have replaced WEP with WPA (wireless protected access) and WPA 2. Although this has fixed the WEP issue there are so many more vulnerabilities to the wireless infrastructure.

    For organizations with wireless LAN networks, as well as those without, Wi-Fi brings a new set of security threats that cannot be protected against by your current firewall and VPN security systems. Placing your wireless LAN network outside of the corporate firewall doesn't help either.

    Simple to install and low cost, Wi-Fi access points may be brought in and deployed by your own employees, usually with no intention of generating harm. These insecure deployments, called rogue APs, open up your network to unauthorized personnel, making vulnerable your most important asset - confidential information about your business, customers, products and services. Other threats, including denial of service attacks and your own misconfigured APs may lead to additional vulnerabilities.

    This is where AirTight Networks has stepped in to offer the first wireless firewall. SpectraGuard Enterprise solves these problems and many more by providing a complete Wi-Fi firewall, delivering the same comprehensive protection as a wired firewall, but focused on your corporate airwaves.

    [Index]

    Paul Parkyn

    Chief Information Officer, Blue Care

    Paul Parkyn has 16 years international experience in IT strategic planning, development of IT architectures, project management and information systems development.

    As the Chief Information Officer (CIO) for Blue Care, Paul is responsible for setting the IT/IS strategy and direction for the organisation. The role also involves determining how Blue Care can use IT to support business goals and deliver services more effectively.

    Wide area to wireless

    Blue Care is one of the largest Community and Aged Care providers in Australia. It operates a large Wide Area Network across the state of Queensland. The network has 185 PoPs that cover 260 service locations. These stretch from Mossman in the North to Coolangatta in the South and Longreach in the West. A variety of data communications technologies are used to support information delivery to these locations. Recently Blue Care commenced an interesting point-of-care trial that enables clinicians to collect data using wireless tablet PCs. A geographically dispersed and technically unsophisticated user base present interesting business and IT challenges.

    Paul will present an overview of Blue Care, what are the business drivers, what was their ultimate technical solution and what they would now do differently.

    [Index]

    Ralph William Buchmaier

    National Strategic Business Manager, Alphawest Services

    Ralph has lived and worked for multi-national Information Technology organisations in Asia, Europe and the United States for over 15 years as well as a Global CIO for a large European shipping line. Ralph's strengths stem from his entrepreneurial attitude complemented by a strong management consulting background.

    Ralph joined Alphawest in January after spending the past three years based in the US, where he spent the bulk of his time educating global sales and delivery teams on the way companies are forcing change to the way managed services are being proposed and ultimately, implemented.

    Ralph is responsible for the further development of well established selective sourcing practice at Alphawest.

    Network Management - Effective management of the IT network - and your IT service providers

    Todays' IT networks require a great deal of expertise and specialisation to keep them running - a challenge almost all IT managers face, every day. IT budgets are continually scrutinised and measured, however, the costs of retaining highly skilled staff, in-house, continues to creep upwards.

    IT service providers have been endeavouring to wrestle inhouse IT management functions since the days of mainframe computing with the concept of whole scale IT outsourcing. Despite the many publicised failures of the past decade, there are those organisations that have seen great financial and efficiency benefits from such outsourcing models.

    Conversely, those who have resolutely stood on an in-sourced IT model have managed to shield themselves from the horrific boom/bust times that signified the past 10 years of IT outsourcing. Perhaps they have even used the disastrous IT outsourcing cases to their advantage - as clear examples of what not to do - and they would have been justified in doing so. These organisations, however, have since been forced into outsourcing the areas of their network which are clearly utilitarian, serving little or no strategic value to the organisation (e.g. parts of network security, SPAM, WAN services, etc).

    In fact, most organisations recognise that in today's network there is no single organisation, whether internal or external, that is truly capable of managing all facets of the network.

    Further, with the enormous up-take of a myriad of IP connected mobile devices, the challenges of managing a network successfully are real and require urgent action.

    • How serious are these challenges and what are the solutions?

    The early adopters of whole scale outsourcing and the resolute complete in-sourcing organisations, seem to have reached a comfortable middle-ground. As we move into the next generation of managed network services many organisations, are turning away from both whole scale outsourcing or complete insourcing of their network to a more selective sourcing model to mitigate their risk and work towards their IT service providers strengths.

    • Will the increase in selective sourcing trend of the non-strategic IT network functions continue?
    • What areas should Network Managers be looking towards in their current in-house skill set to manage their entire network?
    • How are organisations around the world managing to working effectively with IT Service providers to provide acceptable level of service and security in so many hetergeneous IT networks?
    • What type of managers are companies looking towards to ensure their IT networks are safe, stable, resiliant, robust and cost effective?
    • Selective sourcing agreements - focusing on a risk/reward partnership, rather than an Service Level battle.
    • How much outsourcing is too much?

    [Index]

    Benjamin Teh

    Fortinet

    Benjamin Teh is Sales Director for South Asia and Country Manager for Australia and New Zealand. Prior to joining Fortinet, he was Country Manager (South Asia) for Watchguard with responsibilities for India, Malaysia, Singapore, Indonesia, the Philippines and Australia. Benjamin brings with him considerable sales experience from his extensive coverage of the Asia region. He has also previously worked for technology distributors and system integration companies, dealing with products from Shiva, Exabyte and Fore Systems.

    He is a graduate of La Trobe University in Melbourne, Australia. He majored in computer science and communications engineering.

    Unified Threat Management

    Unified Threat Management (UTM) refers to a category of network security products that integrates firewall, intrusion detection and prevention and anti-virus in one high-performance appliance. In a recent study (2004), IDC forecast that sales of UTM solutions will overtake sales of traditional VPN/Firewall products by 2008, with an expected CAGR of 80.1% for UTM products.

    Fortinet offers UTM solutions for a wide range of customers, from small businesses to large multinationals and Managed Service Providers. The unique architecture of Fortinet's FortiGate series of antivirus firewalls features ASIC hardware-based acceleration that ensures that businesses get complete, real-time network protection without compromising performance. Automated push updates also reduce manageability issues for system administrators.

    [Index]

    Peter Thomas

    CISCO

    Peter Thomas is a Systems Engineer based in Brisbane. Peter has over 20 years experience in Networking and Communications. During his time with Cisco he has worked with government, financial, and commercial customers. Prior to joining Cisco, Peter was a Senior consultant with a Microsoft Solutions Provider, and the Manager of a State Government Network. For the past twelve years, Peter has specialised in Network Management, implementing and developing solutions for Microsoft and Cisco network environments.

     

    Background
    Call for papers
    Venue and location
    Region
    program
    keynotes
    speakers
    workshops
    usagestats
    register
    getting there
    contact
    Sponsors
    previous
    Questnet