Yesterday, Today and Tomorrow
Welcome to QUESTnet2005
Speaker Abstracts & BiosIndex
Chris HancockChief Executive Officer, AARNet Pty Ltd
Chris Hancock was appointed to the position of Chief Executive Officer, AARNet Pty Ltd, from 1 February 2004.
Mr Hancock joined AARNet from Optus, where from 2002-2003 he held the position of Managing Director of the Wholesale Division. He was responsible for the leadership and growth of the Optus Domestic Wholesale Division, the "XYZed" DSL business and both the Australian and Regional Satellite business units.
From 2000 to 2002, Mr Hancock was Managing Director, Optus Business. In this role he was responsible for the leadership of the retail component of the Optus Business, servicing the corporate market throughout Australia.
Mr Hancock has also held senior executive roles at both Vodafone and the Seven Network.
Mr. Hancock holds a Bachelor of Arts (Social Science) from Charles Sturt University and an Executive MBA from the Australian Graduate School of Management. He has had more than twenty years experience in senior leadership and executive positions, including the last ten years in both the media and telecommunications sectors.
Don RobertsonDeputy CEO of AARNet Pty Ltd
As Deputy CEO of AARNet Pty Ltd, Don's role encompasses providing leadership and direction in the implementation of policy, and the operations and administration of AARNet. He represents AARNet and its stakeholders in communications, negotiations and general relationships with clients, suppliers and strategic partners. His role also includes the identification and development of opportunities to increase the value of service and product offerings to clients and stakeholders.
Don joined AARNet in 2001, prior to this he was Assistant General Manager, Networks, Information Technology Services, CSIRO. Don has an Associate Diploma of Engineering (Electronics).Transforming Research and Education in Australia with pervasive networking
The deployment of the AARNet 3 backbone and the resultant leaps in capacity and access are transforming the ways in which researchers, educators, administrators and students, discover, inspire, manage and learn.
The challenges are exciting as we enter a totally new era in communications across national, regional and international boundaries.
In Australia, AARNet 3 provides a fundamental shift from a “managed service “ environment to a world where operating and developing infrastructure becomes second nature and the challenges of security, quality of service, mobility and authentication are all fundamental to the delivery of high quality real time services.
The ultimate challenges will be to extend the range of services and applications available to Australian researchers and educators and to broaden the reach of our communities, so as to ensure maximum return on investment to our existing shareholders.
Dennis MedlowGlobal Product Manager - Command Support Systems, Saab Systems
Holding tertiary qualifications in Computer Systems and Engineering, Dennis Medlow has been active in the ICT industry for over 22 years - the latter 15 being in Defence related industries. Dennis has experience in a number of roles but specialised in networking and communications early on in his career, developing strategies to introduce one of the first local and wide area networks into Adelaide in 1985.
Dennis' work over the years has involved introducing common software and networking environments, developing local computer networks, and managing the voice and data network design for the Jindalee Operational Radar network. He moved to Queensland to work with Saab on the original Army digital C2 system which posed a series of engineering challenges regarding how information could be effectively distributed over the battlespace using the somewhat limited radio resources at hand. His team was able to demonstrate the first use of X.400 messaging over a tactical radio network.
Latterly, Dennis has been working on the successor to that system - the Battlefield Command Support System, and has been the C2 systems manager and later design manager for that project. Last year Dennis was appointed as the Global Product Manager for Command Support systems within the wider Saab organisation.Networking challenges in a hostile environment
Today's military forces are increasingly reliant on the timely gathering and distribution of information across the battlespace. The concept of the 'digitised force' has moved from idea to realisation in a number of countries. Australia has been one of the world leaders in adapting information technology for the warfighter and Saab has been working with the Australian Defence Force for over 10 years in providing this capability.
This presentation will examine some of the networking challenges for military systems in the hostile environment of the battlefield. This includes areas such as the need for comms in the digitised battlespace, remote and roming access, network identification and forming, challenges of narrowband radio links and use of commercial software in this environment.
Kewin Stoeckigt studied Computer science at the University of Leipzig, Goettingen and Auckland. In 2002 he received his BSc from the University of Goettingen and in 2005 his MSc from the University of Auckland respectively. For the last three years he worked for the Computing Center of Max-Planck Gesellschaft in Munich, where he is responsible for the security concepts of the videoconferencing infrastructure, which includes Gatekeepers and MCUs. His main research interest is focused on active and passive network measurement, real-time audio/video communication, Quality of Service, communication theory and network security. Kewin is a member of IEEE, ACM, GI and RSNZ.Overcoming Firewall & NAT problems in H.323 using OpenSource software
Firewalls and NAT cause problems with H.323 audio-/videoconferencing. This talk will introduce the problem, and it will show a solution based on OpenSource software. The talk explains the solution (proxy system), and it will shed some light on other features, such as authorization, billing, etc. It will also show how this 'free' solution could be integrated in an already existing H.323 infrastructure. The benefits for Universities, Schools and/or other (Research) Institutes will be briefly highlighted.
Andrew is a network engineer at AARNet located in Canberra. His responsibilities include the development and support of advanced network and grid collaboration services within AARNet, liaison with peer international advanced research networks, management of the ICON network, supervision of the ACT RNO, participation in the AARNet Video over IP Working Group and management of a variety of special projects and events.
Andrew is currently involved in a new project, ResearchChannel Global, in collaboration with the US Internet2 ResearchChannel. This focuses on developing technologies to support high-quality video capture, streaming and storage using IPv4, IPv6 and multicast networks.
Andrew also been involved in the formation of the APEC Emerging Infectious Diseases Network, facilitating regular video conferences as part of this initiative. He has also been involved in the establishment of a real time collaboration group coordinated by Dartmouth College (USA), and the facilitation of joint simulation exercises held between the Australian Navy and the US Navy.
Prior to joining AARNet in April 2002, Andrew owned and managed an ISP operating in regional NSW and VIC. His 22 years experience in the industry covers a wide range of technologies, languages and people.
George McLaughlin is the Director of International Developments for AARNet. He joined AARNet in 1995 initially overseeing the sale of AARNet's commercial customer base to Telstra. In 1997, he managed the process of establishing AARNet2, the second generation national network connecting Australia's universities and research organisations. He guided the establishment of AARNet Pty Ltd as a separate legal entity responsible for managing and developing the AARNet network; and has been the driver for positioning AARNet as one of the world's leading research and education network organisations.
George has been instrumental in establishing international connectivity from Australia to the global R&E networks. Starting with an indefeasible right to use (IRU) on a 155Mbps circuit between Australia, Hawaii and the US West coast in 2001, to the current dual 10Gbps circuits (SX TransPORT - Trans-Pacific Optical Research Testbed) and recent connection to Fiji. He serves on various national and international committees associated with telecommunications and advanced networking and has been recognized for his contributions to advancing telecommunications in Australia as recipient in 2003 of both the ATUG Chairman's award and the Sir Ernest Fisk award.
George is a graduate of the Royal Institute of Chemistry. He has worked in the chemical, pharmaceutical, engineering, precious metal and information technology industries, has authored more than 50 research papers, and has been elected as a Fellow of the Royal Society of Chemistry. He is one of the Vice-Chairs of APAN, the Asia Pacific Advanced Network consortium, evaluator to the European Commission's Framework Programs, and Affiliate member of the Internet Education Equal Access Foundation (IEEAF).
Mark Prior is the Chief Technology Officer at AARnet. He has been involved with the Internet in Australia since the late 1980's when as a member of staff at the University of Adelaide he was involved in the original technical discussions that resulted in the creation of AARNet. After 10 years with the University he left in 1996 to join connect.com.au, one of Australia's first commercial ISPs, as Network Architect (Backbone Engineering). Prior to joining AARNet in 2003 he spent a year working for a small network integration consultancy, iagu networks, which specialised in network security and SIP based voice over IP.
During his time at AARNet Mark has been leading the design of the AARNet3 network.
Mark is a graduate of the University of Adelaide and is a member of the ACM. He has had a long involvement with the Internet standardisation process as a member of numerous working groups of the IETF and served on the Nominations Committee in 1995/96 as well as hosting the March 2000 meeting in Adelaide.Connecting the World with Light
AARNet joint presentation by Andrew Howard, Coordinating Engineer, International Developments, AARNet Mark Prior, Chief Technology Officer, AARNet George McLaughlin, Director, International Developments, AARNet
This presentation will cover AARNet's involvement in a number of current global infrastructure and application initiatives, including the Global Lambda Infrastructure Facility (GLIF), the Trans-Eurasian Information Network (TEIN2), the Global Astronomy Initiative, development and implementation of immersive multimedia collaborations and e-VLBI. The role that SXTransPORT and User-Controlled Lightpaths will play will also be covered.High Definition Video/Research Channel - Andrew Howard
This presentation describes the current progress of the AARNet and ResearchChannel collaboration projects on uncompressed and compressed HD video over IP.
Overview of the equipment, production techniques and software used to participate in the Super Computing 2004 HD video demonstration.
Update on ResearchChannel projects and partnerships in Australia and report on National Association of Broadcasters event Apr-2005.
Dr. Rodney G. McDuffITS, The University of Queensland
Rodney McDuff is currently the Manager of the Strategic Technologies Group with the Information Technology Services at The University of Queensland. Whilst at ITS Rodney has also been responsible for the planning, implementation and maintenance of core IT infrastructure services, applications and systems at UQ. He has also previously worked as a Research Fellow at the Advanced Computation Modelling Centre.
Viviani PazAusCERT, The University of Queensland
Viviani Paz is the Security Assurance Manager for AusCERT (The Australian Computer Emergency Response Team) based at The University of Queensland. Prior to joining AusCERT in 1997, Viviani worked in a range of IT areas including: system and network security; system programming and administration; and software testing in the Commercial and Academic sectors.
The Australian Computer Emergency Response Team (AusCERT) provides a single, trusted point of contact in Australia for the Internet community to deal with computer security incidents and their prevention.Higher Education National Certificate Authority - Enabling secure interoperation
Australian Higher Education Institutions, like other research institutions around the world, need to collaborate with each other and with global research partners; however mechanisms for communication between such groups are often insecure. Insecure communication methods are of particular concern for research because of the need to protect intellectual property. Inter-institution identity management and access control to valuable resources such as access grids, computational grids, virtual observatories and digital repositories are also issues which can hinder collaboration.
A PKI implementation has the advantage of supporting and/or providing the principal elements of secure collaboration, such as identity, authentication, authorisation, data integrity, confidentiality and non-repudiation, whilst both enhancing and operating with existing authentication systems. Through PKI, an institution can issue digital 'certificates' which identify the owner and can be used for access control, encrypting emails or other documents, establishing secure communications and 'digitally signing' documents.
AusCERT in conjunction with CAUDIT has been working on a Public Key Infrastructure (PKI) Project to establish a National Certificate Authority for Australian and international universities and research groups interoperation. The first phase of this project will include the development of policies and standards and to implement a prototype certificate management system.
This presentation will look at some vital issues on how to enable secure interoperation amongst the Higher Education sector while drawing on the experience gained when implementing the first phase of this project.
Stephen TolhurstData Network Manager, The University of Sydney
Steve Tolhurst has been with the University of Sydney for the past 20 years and involved in a variety of IT roles. Steve is credited with building the Gigabit backbone network known as SydNet mark4. Steve was intimately involved in the construction of BushNet, an ATM Microwave Data network that extends to the city of Dubbo.
Rafik RazzoukManager, Videoconferencing Development & Implementation The University of Sydney
Rafik Razzouk is Manager Videoconferencing development and Implementation. For the past two and half years, Rafik has been with the University of Sydney building their Videoconferencing infrastructure. Rafik has had a variety of experiences in the commercial technology world working for companies such as Hewlett Packard, Optus and PictureTel.
Rafik has a Masters degree in Telecommunications from the University of NSW.Building a Video-over-IP Network for the University of Sydney
For years, video communication was prohibitively expensive not only in the cost of equipment but more importantly in the on-going charges of ISDN telecommunications costs.
A couple of years ago the University of Sydney embarked on building a video conferencing Network over the existing IP infrastructure. The first location to benefit from this initiative was the remote campus at Orange. A couple more have since benefited from this positive experience. As the demand for Videoconference for education and administration grew the installation of a videoconference Bridge was implemented to enable multi-point conferencing over IP. All this was made affordably possible thanks to a robust IP infrastructure and the foresight of the network designers to predict the use of broadband applications over the Data Networks.
This session will discuss the lessons learnt in building a Videoconference network over IP while catering for legacy system to serve the user community.
Alex ReidAARNet - Director - Middleware / e-Research;
Alex Reid joined AARNet in December 2004 on a part-time basis to coordinate a Middleware Action Plan for Australian universities and research organisations. Prior to that he was Head of IT Policy at the University of WA (where he is still a Fellow), and Chair of the AARNet Advisory Committee. He has been Director of IT at Oxford University, and at the University of WA, and has maintained a keen interest in networking since 1969.
James SankarAARNet - Network Engineer (Middleware)
James Sankar joined AARNet in April 2005 responsible for coordinating middleware projects within Australia and representing Australian interests in similar developments overseas. He previously worked for UKERNA (United Kingdom education and research networking association) as a development project manager responsible for deploying ADSL and two-way satellite technologies and then onto UKERNA's middleware development area. James was responsible for establishing a national wireless advisory group; he also co-chaired the TERENA mobility taskforce and managed eduroam deployments across the UK and continental Europe.Middleware Action Plan and Identity Management Survey
The first part of the presentation will be an update on the progress made since the Middleware Forum/Camp that took place in December 2004. In particular, Alex Reid will present a middleware action plan and will highlight the priority tasks taking place during 2005.
One item contained within the middleware action plan is to conduct a survey of identity management systems in Australian universities and research organisations. James Sankar will present the findings of this survey and some conclusions as to what the results mean for the development of middleware activities in Australia.
Mike HicksCompuware Asia Pacific
Mike Hicks is the Principal Consultant for Advanced Networking at Compuware. He has enjoyed a successful career providing support to complex corporate networks throughout Europe, North America, Asia and Australia. This included the Ford Motor Company, Cisco Systems, Singapore Airlines, ANZ Bank, Telstra and the European Space agency.
In addition, Mike works closely with many infrastructure vendors in the area of application profiling, and management. Mike is the author of 'Optimising Applications on Cisco Networks (Cisco Press2004)' and 'Managing Distributed Applications: Trouble shooting in a heterogeneous environment (Prentice Hall 2000)'; as well as many white papers on the subject of application delivery and optimisation.Understanding Network Awareness: Guarding the Guards
Today's business and uncertain geopolitical climate mean network security is a top priority for many companies and a simple search on the Internet will yield thousands of solutions that offer exactly that protection. With so many risks and so much at stake, companies large and small are looking for more ways to ensure the security of their networks.
Business leaders are starting to realize they can't rely on basic security measures if they want to assure compliance with customer privacy and protection regulations such as Sarbanes-Oxley, Basel II and HIPAA. In fact, analysts say it's no longer enough for IT to simply follow centralized policies outlined by ISO 17799, COBIT or COSO.
The general approach is to take the firewall and position it as a gateway (or in the case of personal security systems gateways) to scrutinize and alert to threats at strategic access points to the network. In general this system works well. However, given the importance of the data to the organisation, is it satisfactory to rely solely on these guards for your protection? What organizations often fail to realize is that they are chasing a ghost: one's virus and IDS definitions can be up-to-date, server and host based firewalls can be properly configured, patches and software versions current, and yet still be vulnerable to unknown viral exposure. The anti-virus is not a solution but a single preventive measure.
Wouldn't it be appropriate to provide some form of safe guard that would act as a policing system to ensure that any threat that compromises your ring fence is identified and tracked? Wouldn't it be wise to provide a guard for the guards? The most logical and often overlooked solution is network awareness.
Network awareness can be best described as a visualization of the living network from the user's perspective (i.e. realizing that each component of the network affects every other one). Network awareness should reflect the people, packets, machines, subnets, sessions, transactions, traffic, and any movement on the network on all layers.
The key to network awareness is information. By arming oneself with all available data, intelligent, well-formed decisions can be made. It is not the technology that will solve the problem; it is a shift in the overall approach to network management.
Having a clear picture of the network design empowers the administrators to make not only good decisions, and also to react quickly if the network falls under attack. By recognizing the threats, it enables organisations to isolate the problem, saving both time and money.
This session will discuss the basics of network awareness, its benefits to the network administrator, protection versus monitoring and using network awareness to reduce the impact of a security breech.
William MacDonaldVP of Marketing, Codian Inc
William MacDonald, is the General Manager of Codian's US operations. Codian is a company building infrastructure products for video conferencing, including Bridging, Recording and Streaming on both IP and ISDN. Prior to founding Codian he was Vice President of Marketing of Calista, a Voice over IP company which, he helped build from 1995 until it was acquired by Cisco Systems in 1999. He stayed on at Cisco and played a key role by utilizing the Executive Briefing Center to bring customer requirements back into product definition.
Prior to this he was the Manager of Systems Engineering at Madge Networks Inc. which was the role that brought him from the UK, where he was a software developer working on Token Ring device drivers and protocol stacks, to the USA where his focus switched from engineering to the customer side of the business. Will graduated from Cambridge University in 1987 with a 1st class Masters Degree in Computer Science.Interoperating with Video endpoints of Yesterday, Today and Tomorrow
William MacDonald will discuss how to overcome the challenges of having endpoints from different manufacturers (all supposedly complying with industry standards) talk to each other once they are implemented. The reality is that even though they comply with the required standards they still do not talk to each other. This is a real problem that videoconferencing administrators are finding every day, especially when upgrading to the new and highly desired H.239 standard. It will conclude with a discussion about ways of overcoming this.
Mark is Managing Director of Aussie Telecom Pty Limited. He has been in the IT industry for 20 years, studying Computing Science (BAppSci) at the University of Technology, Sydney (UTS). Mark worked at UTS for 6 years managing the computing centre at the Faculty of Design, Architecture & Building. He has been involved with high tech startups, information broking, stock market information systems (day trading centres) & venture funds. Mark also worked for 3 years at the Seven Network in Datacast services.
His company, Aussie Telecom Pty Limited, is the sole representative for both K2/KeyServer from Sassafras Software, and Deep Freeze/Faronics, within Australia/NZ.Technical Update - K2/KeyServer (Sassafras Software) & DeepFreeze/Anti-Executable(Faronics)
Both KeyServer & Deep Freeze are widely implemented software solutions within Australian Universities. The aim of this presentation is to provide a technical update on both products - to provide a general technical overview (with demonstrations) as well as where the products are headed. By the time of Questnet, V6.1 of K2 is expected to be shipping. Deep Freeze V5.4 has been released, as well as Deep Freeze for Servers - FreezeX is a new product from Faronics.
K2/KeyServer - An integrated Asset Management Suite for:
Deep Freeze is a software-only solution that instantly restores the pristine SOE upon every reboot. Deep Freeze is unrestrictive protection - allowing Users to do anything at all to the PC operating system (or any other file setting) - however, upon reboot, all those changes are completely removed.
FreezeX is a software-only solution which is restrictive solution which prevents any new or unknown application from being downloaded to the PC. FreezeX goes beyond existing anti-virus or spyware solutions - as most of these work on a black-list methodology. FreezeX utilises a unique whitelist technology to provide proactive protection against spyware, keyloggers, Trojans, viruses, or any other malware.
FreezeX works very well with Deep Freeze. Deep Freeze protects your core system settings, application settings and any Windows corruption. FreezeX blends its protection by not allowing any unauthorised installs to your desktops.
Many sites implement both KeyServer and Deep Freeze together on their networks.
Justin WhiteProduct Marketing Manager, Toshiba ISD Australia
Justin has worked with Toshiba for over 12 years, the last seven in Marketing, where he travels to Japan to find out the latest trends in technology and how these will be implemented into mobile computing. He will draw upon this experience to add insight throughout his presentation.Wireless Mobility, Intuitively!
Wireless connectivity allows us to work where we want and how we want while remaining connected to the rest of the world. The next step in productivity is to use wirelessly enhanced products that work more like we do. In this presentation you will see how using a wireless tablet can additionally improve on the benefits of wireless connectivity. See how easy it is to use and why the rest of the world is 'switching over'.
Justin will be presenting and demonstrating with the Toshiba M200 tablet, and a Toshiba TW90 (Wireless) Projector to show how productive users can be with an intuitive interface coupled with the benefits of Wireless connectivity. He will also show what the future holds for wirelessly connected mobile warriors!
Richard ConstantineCIO and Director, Information Technology Services, Swinburne University of Technology
Richard Constantine has over 18 years experience in the IT Industry and is currently the Chief Information Officer and Director of Information Technology Services at Swinburne University of Technology. He has extensive experience in education within the tertiary and TAFE sectors as well as in Industry as an IT Consultant and many years ago as a pre/post sales engineer.
His responsibilities include IT Strategy, Communications Technology Infrastructure, Applications and major IT projects for the University's operations across all of Swinburne's campuses.
Richard's qualifications include a post graduate diploma in Management Studies from Melbourne Business Schoool, The University of Melbourne and a Masters of Business Administration from Monash University in which he took a keen interest in Technology Management.
Richard is also the Chairperson of the board of Infoxchange - a not for profit, social justice organisation working to bring the benefits of technology to all, using multiple strategies to address societies' so called 'digital divide'.Network infrastructure at Swinburne University
The presentation will cover an overview of Swinburne University of technology including the number of students, staff, local and overseas campuses. Swinburne is also well regarded as being at the forefront in respect to the use of wireless technology.
Four years ago Swinburne received a great deal of publicity in going ahead and implementing a $4M 'state of the art' network. We will summarise what that project entailed and why it was critical to our business needs and why it now needs to be replaced.
Swinburne has just recently had approval by its University Council (April 2005 )to proceed with a significant investment far greater then the last time, as the previous network infrastructure has now been used for the past 4 years and is regarded as nearing obsolescence.
This presentation will highlight the approval process, including Swinburne's particular business case, the technology we will be implementing (ie., 10/100/1Gb to the desktop, all with inline power, Cisco's Security Agent and another 3000 VOIP handsets). The discussion will then highlight how this new technology from Cisco Systems will be used to enable our organisation to deliver excellence in relation to teaching, learning and research.
Finally, as part of the business drivers the financing of this project via Cisco Capital will be discussed. This lucrative financing approach will enable the organisation to completely replace the network infrastructure, gain quality of service across its three divisions, five campuses and all 18,000 network ports within five months will then enjoy the benefits of a world class network. This approach will be compared and contrasted with what is still a common approach of replacing 25 to 33 percent of a network annually to then gain complete quality of service in three or four years (in time to then start again).
Ian WatersSenior IT Programs Consultant, University of Technology, Sydney
Ian Waters has spent all his working life (of over 30 years) in organisations providing large-scale IT services.
He is currently Manager of the IT Security Office at UTS, a unit that has university-wide responsibility for security policy development, compliance reporting, consulting on security planning, IT risk assessment, security audits and vulnerability testing.
Prior to his current position, Ian Waters was responsible for the UTS central academic IT services, where he was accountable for strategic leadership and direction of academic computing at the University and for the delivery of IT services to academic staff, academic support staff and students.How Secure is the Network? Assessing Network Risk using a Formal Methodology
UTS has been developing and refining its IT security policy and procedures for over five years. These procedures include a formal methodology for assessing the risk of IT systems and resources. This methodology was first employed to perform a high level risk assessment of all major IT systems within the University, and the results of this assessment were used to prioritise systems for a more detailed risk assessment. Following its successful application to detailed risk assessments of a number of major corporate systems, the methodology was used to carry out a risk assessment of the network in 2004.
This presentation will describe the UTS risk assessment methodology, and how it was applied to the network. It will outline the steps involved - dividing the network into its core components, conducting risk assessment workshops on each, developing risk mitigation strategies, and then preparing a risk management plan. The final stage involves documentation of the whole process in an IT system security plan.
The presentation will describe UTS experience with performing the network risk assessment, the resources required and their sourcing, and the lessons learnt from the exercise.
Simon CarlsonSenior Pre-Sales Consultant
Simon brings over 14 years IT experience in both the UK and Australasian markets. With a firm technical design and consultancy background, Simon has worked in the vendor, system integrators and end user spaces. Simon has been involved in major design projects including the Olympic Park network for the Sydney 2000 games, along with solution design and consultancy for MSSP's.
Today Simon is considered a technical thought leader in the area of Neural Network based Anomaly Detection.
Greg O'BrienBusiness Development Manager
Greg has over 20 years experience in the IT industry. With a technical background in both software and hardware Greg has spent the last decade working specifically in networking and communications. Working for leading technology providers such as Fujitsu, 3Com and Scitec, Greg has been involved in the design and implementation of mainstream IP technologies for many of Australia's fortune 100 companies.
Greg believes that security is one of the largest problems facing the connected world today and that security models based on rule sets can only address part of this issue.
Esphion provides Adaptive network anomaly detection, utilizing Artificial Neural Network (ANN) technology. This behavioural-based network intelligence arms companies with the information required to protect their assets in an electronic world.Protecting data recovery resources and business-continuity
This presentation discusses some of the shortcomings of traditional manual and signature-based methods for data recovery resources, when confronted with mutating or previously unknown threats. Methods and technologies are presented, which can be used to protect business continuity even when attacked by zero-day worm outbreaks. Some case studies will be used.
The principle of 'network self-vaccination' is explained, a three-step process, which largely utilizes existing network infrastructure, combined with new technologies, to dynamically arm a network against zero-day threats.
The presentation is aimed at network security as well as operational staff and management. A brief introduction to the various technologies and concept will be given, to make the presentation accessible to a wider audience.
Paul DucklinHead of Technology, Asia Pacific, Sophos Labs
Paul Ducklin joined Sophos from the South African Council for Scientific and Industrial Research in 1995. He has held a variety of roles within the company including heading up programming and running Sophos' global technical support. One of the world's leading virus experts, Paul has given papers and presentations at many industry events including Virus Bulletin, ICSA and AVAR conferences. He has also written numerous articles on the virus threat and is a respected industry spokesperson. Paul has seen, though never actually touched, an Enigma.Researching Malicious Code
Researching malicious code involves a lot more than a large collection of yesterday's virus samples, spams, scams and phishes. (Of course, a well-organised historical collection is vital if you hope to understand what tomorrow's threats are probably going to look like, but it isn't enough on its own.) Analysing and understanding malware is a little like being a code breaker. Faced with the Enigma machine, the Allied code breakers of the Second World War might easily have given up the task as impossible. They needed not only to understand the device in theory, but also to design and build practical tools for cracking messages every hour of every day. Even more importantly, they had to face enhancements and changes which were deliberately introduced by the enemy to put their research out of date. Similar drive and intelligence is required by malicious code researchers, who need to be able to:
This talk looks at the history, and the likely future, of malicious code and our defences against it. We need to work ever smarter, as we face an enemy who is increasingly motivated by criminal reward, rather than merely by the 'counterculture one-up-manship' of the past.
Roy MeuronenNetwork Specialist, Networks & Communications, Division of Information The Australian National University
Roy Meuronen has worked in a system administration role for over 16 years in the government, private, and more recently, higher education sectors. Initially involved with Unix systems, he has been full-time networking now for over 3 years.
His current roll as Network Specialist with The Australian National University sees him involved with the day-to-day running of a large, converged campus network, as well as finding ways to implement "cool" stuff such as wireless access and TV reticulation.The ANU TV Convergence Project (work in progress).
ANU Networks and Communications have begun a project to replace existing TV reticulation infrastructure and expand the services beyond the current scope.
The intention of this presentation is to share our experiences so far in implementing this new technology, updating existing infrastructure to cope, and dealing with the associated vendors and stakeholders. It is a work in progress, so much of the detail will be filled out between now and July. This presentation will not contain any rocket science.
The university currently runs a television reticulation system that distributes video content from free to air satellite and terrestrial broadcasts to selected locations across campus via an analogue optical fibre network. This infrastructure is running at capacity. Our intent is to replace this ageing technology with a more scaleable and flexible solution.
A TV over IP solution will replace the existing analogue fibre infrastructure, with multicast digital video streaming and Set Top Boxes (STB) connected to the data network.
The TV reticulation solution can then be expanded to provide access to TV content at the desktop. The system should maximise the value of existing satellite receiver infrastructure, enable additional content sources, and provide an outlet for local content producers.
Issues covered will include:
Colin BlytheManager Networks, University of Melbourne
Colin Blythe has followed a career in telecommunications and IT. His career highlights have included: hardware and software design; system design and implementation projects; user support; and consulting roles with corporate and financial institutions, such as New Zealand Post, AWA, Unisys, Australia Post, Accenture and ANZ. Melbourne Uni is his first role in the education sector. He has a Bachelor of Engineering (Electrical) from the University of Canterbury.Networking Landscape at the University of Melbourne
2004 has been a year of intense planning in the network arena at the University of Melbourne, more so than a year of network change. During this time the University has developed a high level network strategy that had three main thrusts:
The presentation will discuss why these three are the core thrusts for networking at Melbourne, and what has been achieved in the journey so far, what has been learned and what has yet to be achieved.
Planning and scoping tends to identify other issues that need to be resolved simultaneously, and the issues that have arisen will also be introduced. These issues are not always technical in nature - in fact, there are many management and legal issues to contend with. What is network's role in these?
The EndPoint Management thrust is the vehicle to implement a key recommendation from Gartner Group (for the Network team to manage the entire network for the University). This will introduce change to the University that is both welcomed, and resisted - sometimes by the same people. The presentation will discuss the process the University will use to manage this introduction, and define a number of the subject areas that will need to be agreed before a managed network service can be implemented.
The university has not stood still - in fact a number of significant changes have been successfully implemented, that will form a strong foundation for the work ahead. Improvements such as the 'Rings' project have implemented network conduits around the campus, and have enabled a major upgrade of fibre capacity across the Parkville campus. Significant infrastructure improvements at regional campuses have modernised their network capabilities, allowing newer functionality such as video conferencing and wireless LANs to be introduced at the 11 campuses.
Finally the plans for the next three years will be outlined to demonstrate how the planning will develop into real deliverables, producing real change and value for the University.
Glynn RogersNetworking Research Leader, CSIRO ICT Centre
Originally a microwave systems engineer, Glynn Rogers conducted research in geophysical imaging with applications in mining before entering the world of communications networks. He played a major role in founding a networking research group in CSIRO initially focusing on ATM technology but soon switching to IP networks with particularly emphasis on IP QoS. He is currently Networking Research Leader in the new CSIRO ICT Centre and is on the Management Committee of the Centre for Networking Technologies (CeNTIE). Having a strong interest in Complex Systems Science and its application to large networks, he played a role in setting up the CSIRO Centre for Complex Systems Science and is a member of the Centre Executive.Virtual Private Networks - More, Much More than IPsec Tunnels
While in commercial parlance the term 'Virtual Private Network' is generally taken to refer to a construct based on IPSec tunnels, these are merely the tip of a very large iceberg. In fact the Virtual Private Network concept is much more general and powerful. The growing commercial offerings based on the BGP/MPLS VPNs defined in RFC2547 and the further technical development associated with RFC2547bis demonstrate that there is a great deal of interest in further evolution of the concept. Indeed the operation of two IETF Working Groups directly addressing this area, with two RFCs so far indicates that there is much more to come at the standards level.
Although much is happening at the networking level, we believe that the full power of VPN technology will only be unleashed when virtual networks can be created and operated at the user level. The Web/Grid Services paradigm promises a rich context in which to develop the required functionality and recent work within the Global Grid Forum is exploring this territory. From a networking perspective the control plane appears to be the right environment in which to develop the functionality to link the services paradigm and the VPN components as provided, for example, by RFC 2547. Indeed the emergence of sophisticated control plane functions in optical networks reinforces this view.
This presentation will provide an overview of these developments from an architectural perspective and discuss their potential application in high speed application areas such as Astronomy. I will then describe the research in this area being conducted within the CSIRO Information and Communications Technology Centre. The ideas will be illustrated by a particular VPN concept developed as part of the CeNTIE project. This was motivated by requirements in the Film and Television Post Production Industry revealed by CeNTIE's Media Focus Group but may well be present in other areas such as Supercomputing.
Mark Williams joined Juniper Networks in October 2003 as the research and education business development manager for the Asia-Pacific region. Williams has been working across the Asia-Pacific region in telecommunications from his base in China since June, 1998 and in that time has worked on the development of data networking solutions for both enterprise and carrier customers. Before moving to China, Williams spent more than 10 years working as a network engineer in the academic community, where he contributed to the architecture of both the first Internet backbone in Australia, AARNET, and its successor, AARNET-II. Williams has previously worked for The University of Queensland, Siemens, The University of Stuttgart, Bay Networks and Nortel Networks. He graduated with Honours in Electrical Engineering, Computer Science and Asian Languages from The University of Queensland in Australia.Cross-domain dynamic services and SLAs
It is hard enough to guarantee services within a domain that you control. How do you do bandwidth guarantees, service guarantees, dynamic L2 and L3 VPNs, etc. across multiple administrative domains? This talk talks about how you can do it with today's technology and has a look at how you might do it with future technologies. Very hot topic in Academic backbones today, especially with the advent of hybrid packet/optical networking.
Tim RaynerNetworks Team Leader at Charles Sturt University
Tim Rayner has a BE & BSc from UNSW, and experience in the telecommunications industry - prior to joining Charles Sturt Universities' networking team 12 years ago. During that time ha has overseen the development of CSU's network through a number of generations to the recent roll-out of new gigabit campus networks. He has an ongoing interest in charging for telephone and internet usage, and has designed and developed CSU's communications charge recovery systems over the last 10 years.CSU NetReg: The Why and How of registering computers and charging for network access at Charles Sturt University
CSU has recently implemented a new system for registering computers for access to our network. The system centralises registrations - based upon mac address - across all campuses - including student residences. Registered computers are levied a monthly access charge. Staff members are permitted to ad-hoc register computers for network access. Ad-hoc registrations are levied a daily access charge, but are prevented from communicating with most registered computers to prevent virus propagation.
The presentation will discuss the techniques used to implement this system and the lessons that we've learned along the way.
The system also provides an interface for budget managers to review, report on and modify registrations for computers or telephone extensions belonging to their account codes. This interface to the system will be covered briefly.
Ernie IanaceVice President of Security Sales for Asia Pacific and Latin America TippingPoint, a division of 3Com
Ernie Ianace is responsible for sales and business development in Asia Pacific and Latin America. Prior to his promotion to Vice President of Security Sales at 3Com, Ianace was the senior director of strategic accounts at TippingPoint. Before joining TippingPoint, Ianace was the senior director of sales for North America at Siemens. Siemens acquired Efficient Networks where Ianace was the senior director of sales for North America and Latin America. Ianace has also held various senior management roles in sales, marketing, and sales engineering at Nortel, VMX and Intelect Network Technologies.The Evolution of Security: Network Intrusion Prevention
Over the last 10 years, we have seen mainstream adoption of the Internet, opening opportunities for business as well as threats. In the arms race against threats, security products have evolved from traditional firewalls to deep packet inspection firewalls, anti-virus products and detection systems to proactive prevention systems that protect the vulnerability. Although the number of new threats is increasing and the vulnerability to exploit window is shrinking, intrusion prevention systems (IPS) are continually evolving and are constantly updated with the latest protection. We have reached a point of dependence upon our networks, and IPS is the convergence between networking and security.
Intrusion Prevention Systems have come a long way since they were first introduced by TippingPoint in early 2002. They were developed in response to a need for another layer of internal and external protection. Attacks were becoming more sophisticated, bypassing firewalls and alerting Intrusion Detection Systems. Since detection systems were reactive, prevention systems were designed to examine the packet in its entirety and block emerging attacks.
Today, Intrusion prevention systems have been successfully deployed in several of the Fortune and Global 1000 companies as well as universities, and are blocking millions of attacks. This session will help explain intrusion prevention systems. Because of their ability to deeply classify traffic, IPS's have evolved to manage traffic, shape bandwidth, and enforce policy. The audience will get to hear about some real world educational customer case studies on saved bandwidth, ROI, and blocked attacks. Future applications of Intrusion Prevention Systems are limitless.
Robert DolphinSenior Sales Engineer, ANZ, Nortel
A 20 plus year veteran in the telecommunications industry, Robert Dolphin commenced at Nortel in 1989 and has extensive experience in both data and voice networking for carrier and enterprise customers. Starting initially in carrier accounts, Robert has been involved in the deployment of national X. 25 networks in both Australia (Austpac) and Korea and has extensive experience with Carrier Frame Relay and ATM networks. Since the mid 90's Robert has worked in Nortel's Enterprise business and has specialised in the deployment of a number of Voice over ATM and Voice over Frame Relay networks for large corporations. He has, and is, playing a key role in the design and deployment of a number of modern converged networks.SIP Enabling Real World Multimedia Collaboration
With the recent proliferation of affordable IP broadband services the time is right for an increase in real-time multimedia communications, however connectivity is not the only requirement to achieving effective and convenient communication services. Protocols such as Session Initiation Protocol (SIP) and Session Description Protocol (SDP) are key to ensuring the seamless user experience that will lead to general uptake of emerging collaborative applications.
Understanding both the technologies driving real-time multimedia collaboration and the acceptance and use of these technologies through the experience of our own customers and employees, this presentation will show how these communications can enhance productivity, positively impact the bottom line, and improve the user's quality of life through more flexible work/business/study practices.
This presentation will discuss some of the key trends and technologies which enable the cost effective deployment of collaborative applications and the real-world benefits your students and academic & administrative staff could realise. Examples of applications and how the product is architected and deployed will be discussed. This will highlight some of the benefits and challenges of a network-centric architecture and point to some areas still requiring innovation. Real user experiences will also be presented to highlight both sides of the multimedia collaboration coin - technology and user experience.
Glen Turner is a network engineer with Australia's Academic and Research Network (see www.aarnet.edu.au). He was responsible for the design of the recently-superseded AARNet2 network. His major technical interest is network protocol performance. His major non-technical interest is advocating changes to Australia's intellectual property laws. His most recent publication is an update of the Linux Documentation Project's "Remote Serial Console HOWTO".Achieving high performance file transfers across gigabit networks.
Most un-tuned TCP/IP implementations cannot use 1Gbps of capacity for long distance file transfers. This presentation examines the common constraints and examines TCP/IP tuning parameters to partially overcome these constraints.
New transport-layer protocols and algorithms have been developed to overcome TCP/IP's limits on file transfer performance and this presentation looks at two: BIC TCP, which is integrated into Linux 2.6, and FAST TCP, a proposal currently before the IETF.
Finally, hardware performance issues are examined. A checklist of features is provided for use when acquiring computers for the purpose of long-distance file transfers.
Ross Cartlide graduated from the University of Sydney with a BSc(Hons) Computer Science in 1982. After graduation he continued at the University of Sydney developing one of the first optical fibre based networks succesfully deployed in Australia. After a short sojourn in private industry as a Unix Systems Engineer, he returned to the University of Sydney to help design and deploy their new CATV based IP network deployed in 1987. The University of Sydney was the NSW hub for the nascent Australian Internet (AARNet) and Ross became closely involved in the deployment and development of AARNet and AARNet 2. Ross joined Cisco Systems as a member of the newly formed "Internet Service Provider Expert Team" in 1999 and has continued to work with large Australian Service providers, helping them plan, design, implement and operate their networks. It is in this environment that his love mining the huge data sets generated by these networks began and developed.Yet Another Data Aggregator(YADA), an Oracle-free Oracle
Networks produce huge amounts of data. Data such syslogs, netflow-records, call-records, packet-traces and debugs can be generated in tens or even hundreds of millions of records per day. Within this data is contained incredibly useful information about the state of your network. The problem is, "How do you get this information out?" Traditional RDBMS are clumsy for the streaming nature of these records. Not only are they slow but they tend to absorb huge amounts of storage. And let's face it, who doesn't see their RDMS as a data prison sometimes.
YADA, is a set of *nix based tools to store, search, process and present you data while keeping them in the flat-land we know and love. It has familiarity of bash, more flexible than SQL and the speed of C - the "yada --world-peace" invocation is especially useful.
It has been used to process over half a billion phone records in a short amount of time and produced meaningful results. I will explore the methodology of its development and its application to real world data analysis problems.
Ruston HutchensNetwork Engineer, AARNet
Ruston Hutchens is a Network Engineer, for AARNet and is currently working on SIP voice and video service development, and assisting with the AARNet 3 network roll-out.
He has been a member of the AARNet IP-Tel Working Group Steering Committee since its inception, and is Secretary to the APAN (Asia-Pacific Advanced Network) SIP-H. 323 working group.
Ruston holds a B. Sc (HONS) from La Trobe University, where he worked for seven years.AARNet SIP-H.323 Gateway Project
Over the past few years we have seen competition for 'market share' between the IETF SIP [RFC: 2543, 3261] and ITU H.323 protocols for call control of voice and video over IP sessions (calls). Until recently the majority of deployment has been of H.323 based equipment. As a result, the interest in voice and video over IP based networks in recent years has resulted in a wide deployment of H.323 equipment. However, fundamental weaknesses in the H.323 protocol, and increasing vendor interest in SIP have resulted in an extraordinary take-up of SIP in the last twelve months.
AARNet has an H.323 network which connects in excess of 2,600,000 voice calls per year, as well as significant numbers of point-to-point, and point-to-multipoint video calls.
With the majority of current interest in voice and video over IP being SIP focussed, but with a huge deployment base of H.323 equipment, a way is needed to bridge between these two incompatible protocols.
This paper briefly outlines the relevant parts of the SIP and H.323 protocols, and how they are used for call control. It then discusses the aims and objectives of the AARNet SIP-H.323 gateway project. Details are given of the implementation methodology, and system configuration. Finally it outlines the performance of the implemented SIP-H.323 gateway, and discusses opportunities for use within the AARNet member community.
Craig RussellCSIRO ICT Centre
Craig Russell is a Network Design Engineer in the Centre for Networking Technologies for the Information Economy (CeNTIE), part of the CSIRO's ICT Centre. His role includes the design, implementation and operation of CeNTIE's high performance network testbed as well as liaising with various industry groups to develop new high bandwidth applications.
Prior to joining CSIRO Craig was a network engineer for the telecommunications carrier PowerTel and was involved in the design and construction of the company's national backbone ATM and SDH networks. Before that he worked for global IT services company Logica where he was a software engineer developing SCADA systems in the energy and utilities sector.
Craig's educational background includes undergraduate degrees in Engineering and Science and a PhD in applied mathematics.
James ArgyrosCSIRO ICT Centre
James Argyros started his career in Physics, specifically Astrophysics in which he gained a PhD, then migrating into scientific computing, and finally network programming; James has had a continuous involvement with networks and network management since the late 1980s. In this period, his work has ranged from using a dialup service into a mainframe to network programming for the Compact Array of the Australia Telescope, until finally he bought the first router for the CSIRO Marsfield site in 1990 - a Cisco CGS. Since that time, he has managed upgrades to the routers and the bandwidth from that site several times culminating in the MAN: MARSHNet that came on line in 1997. He was one of a team that designed and built MARSHNet using E3 microwave links to provide a high bandwidth ATM network integrating data, video and voice. Most recently, he has been involved in the design, building and operation of the CeNTIE networksHigh bandwidth applications development using the CeNTIE networks
The Centre for Networking Technologies for the Information Economy (CeNTIE) is a joint initiative between the Department of Communications, Information Technology and the Arts and the CSIRO through its ICT Centre. It demonstrates the value of advanced technology and applications to industry and the research community.
CeNTIE has developed an advanced network research testbed and a range of technologies and demonstration applications designed as a glimpse into the technologies that will power the future, information-based economy. These applications include the Virtual Tea Room, ViCCU® (Virtual Critical Care Unit), EoD® (Extranet on Demand) and Measuring the Network. Each of these systems has presented unique challenges in both the technical and human factor aspects of advanced networking.
One of the fundamental aims of CeNTIE's research program is to promote advanced networking technology to enable people to interact naturally with one another when they are physically separated. Conventional videoconferencing provides only a marginal improvement over the telephone. CeNTIE has addressed this need through the development of the Virtual Tea Room, an application that uses DV (digital video) over IP to provide an extensible and flexible telecollaboration environment. This environment exploits the high-bandwidth and multicast capabilities of the CeNTIE network to enable simultaneous multi-site conferencing.
ViCCU® is a system developed for the e-Health industry. It has built on the technology of the Virtual Tea Room to provide virtual critical care in rural hospitals that do not have specialist medical staff onsite. A pilot system linking The Blue Mountains District Hospital with Nepean Hospital over the CeNTIE network is now in its second year. It is used routinely to treat patients and has yielded some impressive clinical results.
Sydney has a dynamic media post-production industry. This industry is characterised by small companies simultaneously working collaboratively and competitively on a project-by-project basis in digital media creation. This presents enormous challenges to traditional telecommunications services and has led to the development of the EoD® prototype. Once again, a pilot system is in operation on the CeNTIE network linking several of Australia's leading post production companies.
Underlying all of these applications is the network infrastructure. Critical parameters of any network are throughput, latency, jitter and data loss. These become especially important in the context of audio and visual data streams. It is well known that it is better to lose a few frames of video rather than a single packet of audio. Before starting on a particular project it is essential to know what the network will support. As part of an ongoing effort to provide answers for new projects, Measuring the Network attempts to quantify these parameters.
Danny NgLeader Broadband Access, Asia Pacific, Nortel.
Danny Ng leads Nortel's Broadband Access business for Asia Pacific. In this capacity, he is responsible for the marketing, product introduction and management of Nortel's wired and wireless broadband access solutions into carriers and enterprise customers.
Danny has been active in the Data Communications industry for 19 years in System Engineering, Sales, Marketing and General Management in companies such as IBM Corporation, Proteon and Bay Networks. He holds the Bachelor of Science, Bachelor of Electrical Engineering with honours and Master of Engineering Science from the University of Sydney. Danny is a member of the Institute of Electrical and Electronics Engineers (IEEE).Enabling the Wireless Campus
Wireless Communications today encompass an increasingly wide cross section of technology, ranging from mobile technology such as EV-DO through to Wireless LAN and WiMax. The application of such technologies enables ubiquitous wireless coverage within and also beyond an educational campus environment. At the same time, the prospect of ubiquitous coverage also opens up new application possibilities such as surveillance, e-learning and peer-to-peer networking. This session considers the attributes of the different wireless technologies and illustrates their real world application with a number of case studies.
Andrew SimkusSolutions Architect, Dimension Data
Andrew Simkus is a Solutions Architect working in the Connectivity group at Dimension Data. Based in Brisbane. Andrew has over ten years' experience in networking and converged communications, working primarily with WAN, LAN and telecommunications technologies since obtaining his BSc - Computing degree from Bond University in 1994. Andrew has worked on major networking designs, their implementation and ongoing operational support, across a wide range of industries including education, health, mining, government, manufacturing, retail, telecommunications, finance and banking. Prior to joining Dimension Data in November 1999, Andrew was employed by CITEC (Queensland State Government Computing Bureau) in Brisbane as a Senior Networking Engineer with responsibilities as chief designer and architect in the data communications area. He has a diverse range of skills from network configuration and solutions design to technical consultancy and business continuity planning, with additional experience in voice, security, wireless, microwave and satellite technologies.Switching over to IP Telephony
This session discusses some of the challenges facing organisations switching over to IP Telephony. Over the last three years or so, we have really seen the pace of adoption for IP Telephony (IP Tel) picking up. This is largely due to the acceptance of IP Tel as a feasible technology and its tangible business benefits to the network, combined with 'end of life' approaching for circuit switching PABX systems. There are three key scenarios that organisations are faced with when switching over to IP Tel:
This session discusses the common and unique challenges represented in each of these scenarios, based on the objective that the end user's telephony experience should be improved by the move to this new technology.
Gary RuddyManager Optical Marketing - Academic and Research Centre, ANZ, Nortel
Gary Ruddy is responsible for Nortel's optical portfolio in the research and education sector in the ANZ market place. Gary has held this position for the last three years, prior to this he was the manager of optical systems engineering for the ANZ region.
Gary has over 10 years experience working with optical networks and before joining Nortel in 2000 he held the role of solutions manager for Ericsson in the UK, where he supported the BT Account. He has also held a number of senior engineering roles for Cable & Wireless UK and NYNEX.User Controlled Services - A Reality with Next Generation Optical Networks
A new breed of telecoms 'operator' is emerging and with them, a new vision of optical applications is being pioneered. Research and education sector service providers such as CANARIE, SURFNet and AARNet are at the forefront of this paradigm shift and optical infrastructure is the vehicle.
User-controlled ultra high bandwidth services is the goal and technologies such as Next Generation Modulation (NGM) and Automatically Switch Optical Networking (ASON) are key tools in making this achievable. This presentation will look at these technologies and others that are available now or in the near future that make user controlled optical services a reality.
Matthew Gast currently works for an advanced wireless network systems company in the Bay Area. Prior to that, he spent several years as an engineer for a series of network security companies. He is the author of 802.11 Wireless Networks: The Definitive Guide, Network Printing, and T1: A Survival Guide. You can more information about Matthew, and read articles he has written, at Orielly's website.
Chris Hessing works full time for the University of Utah Marriott Library, where he has been heavily involved in the deployment of wireless with 802.1X on campus. He is also the lead developer on the Open1x, Xsupplicant project, which provides an 802.1X supplicant for Linux. He was involved in the 802.1X interoperability test at Networld+Interop's iLabs in 2004. He also assisted in setting up 802.1X for the wireless network at IETF 60 in San Diego.Dot.X Wireless Security
As wireless LAN deployment has become increasingly widespread, 802.11 has become the medium of choice to provide network access visiting guests as well as mobile professionals. To help network managers construct networks that provide differentiated privileges to different user groups, the industry has developed a suite of protocols based on 802.1X.
Steve JohnstonManager, IT Infrastructure, Edith Cowan University
Steve Johnston is the Manager of IT Infrastructure at Edith Cowan University. Steve's role encompasses all aspects voice, video and data networks; systems operations; and middleware applications. Steve has been working for ECU for about seven years, following experience with Curtin University and a Bachelor's Degree in Computer Systems.
Steve has a strong technical background, and has come through the ranks network and laboratory support. In 1999 Steve was technical lead for the Network Upgrade Project - a project that is the basis for the success of server, video, voice, directory and data services within the University. Steve leads a small team providing an excellent service to the ECU community.Integrating voice, video and data networks
Edith Cowan University commenced the move towards VoIP and IP Telephony in 2003. A trial project was started, but the result concluded that VoIP was a venture that needed to be carefully considered - some products were relatively closed in their approach, and there was a danger of being 'locked-in' to a particular vendor or service.
After the AARNet SIP workshops in 2004, ECU revisited the VoIP/SIP arena. Careful product selection and a concentration on open and agreed standards resulted in an effectively converged set of IP-based telephony services and an extremely successful pilot programme. ECU has developed a strong platform for future development, with a current capability for providing anywhere, any-client voice/video service.The ECU Advantage: Ubiquitous computing enhancing teaching, learning and research
This presentation will cover the history and development of the Edith Cowan University Advantage program. This is a key strategy for ECU to improve its basic student services in C&IT, enhance online learning and create innovative environments for teaching.
ECU has a strategy to become a stronger University and enhance teaching through innovative research because of the University's excellence in collaboration and improved practice in the professional field of communications technologies. Pursuing this strategy, ECU signed a 10 year strategic alliance with IBM, and has a strategic alliance with Nortel for the provision of wireless networking technology.
ECU Advantage was forged out of the alliance with IBM and involved in stage one, the implementation of a pervasive wireless network and provision of over 100 laptops to students.
The initial aims of the program were as follows:
ECU Advantage was implemented in July 2004 and was externally and independently evaluated by Drs Towers and Hearn from the Faculty of Creative Industries and Applications Centre at Queensland University of Technology. Additionally, the academic staff engaged in the three pilot projects were required to submit research on the use of ubiquitous computing and wireless networks and their impact on learning. These evaluations will be synthesised and the key findings presented.
The technical preparations for this program have been vast and were based on visits to five international 'laptop' universities in North America and the United Kingdom and two global network vendors Cisco and Nortel. The planning, selection, installation and operation of the wireless network, and laptop technology has been thorough and case material will be presented on this process. ECU received world-wide publicity as it launched one of the first wireless mesh networks in the world. This unique technology has provided ECU with an expansive wireless network leading to further interesting developments.
Overall, this paper will have implications for the way courses are planned and delivered using mobile devices. The presentation will also take a technologist's view of the steps needed to configure the University network to handle the additional services and load. Behind the scenes work on testing, preparing and delivering robust laptop technology will also be covered, along with insights into how to build and sustain strategic partnerships with key suppliers when devising innovative teaching and learning strategies.
Pascal FantonAPAC Sales Director, Crannog Software
Pascal Fanton has 13 years of experience building & leading sales, marketing and operations for both start-up and established high-tech companies across EMEA and APAC regions. This includes companies such as Philips Communications, Quallaby, Ganymede, NetIQ and Crannog Software. He graduated with a master in Telecommunications and Networking, and has focused his past 8 years building business for Network and Application Management companies, analyzing market trends, evolutions of customer needs and studying the impact of new technologies.'Think outside the Box' - Network Management, capacity planning
The first part of the presentation explains the different markets of Network Management. It will include a discussion on:
The second part gives a brief overview of the negative side of network management and why many management tools end up as 'shelfware' ie. they sit on a shelf and never get used. Some Enterprise NMS systems cost the same or more than the network they were managing. Usually they present technical information geared to technical people with limited use for general network users, line managers and senior business managers. This usually requires several applications by different vendors to provide full functionality which means more training, more administration, and more headaches. This is usually difficult to set up and administer - which adds, moves and changes headaches.
The next part discusses what you need to know. It describes key information you must obtain to manage your network and prevent problems. With the convergence of security/application/network problems, we can see the emergence of a new standard Netflow/IPFIX. Such a cost-effective technology helps to get the complete understanding of what happens in your network infrastructure. But all information needs to be easy-to-access, easy-to-use and easy-to-read.
Finally the question is asked, who needs to know? Organisations only have networks because there is a business requirement. As technology progresses and makes everyone else's job easier its' complexities make the IT departments jobs considerably more difficult. From a business perspective, things like internal billing have become increasingly more important.
For the IT team to become a profit centre they have to be able to properly charge for their services. It's easy to allocate a cost to the PC's, servers, software and infrastructure used by a specific department but without the relevant information how do you charge them for network usage or service time.
Adam obtained a Computer Science degree from the University of New South Wales in 1991. He then spent the next eight years working at the University as first software engineer and later a network engineer. Four and a half years ago, he started working for Cisco Systems and is now a Consulting Systems Engineer. Adam has a wide range of interests, including Voice, Video and Data Integration as well as wireless technology, Storage and IP Multicast. He has presented at a wide range of technical forums including QUESTnet during the past five years.Wireless LAN Directions
Over the past few years there has been a widespread adoption of Wireless LAN (WLAN) in the University environment. Primarily these deployments have been for data services. There are many other services such as Wireless Voice, Security and Location Based Services (LBS) that are now starting to be layered on top of a WLAN.
This presentation looks at some of the emerging protocols and standards as a part of the WLAN suite. Applications such as Voice over WLAN (VoWLAN), Radio Frequency Identification (RFID) will also be discussed. It will also provide a brief summary of the future of WLAN, the high speed 802.11n protocol.
This presentation is for WLAN architects. It will be a medium level technical presentation.
Roland ChiaNational Business Manager, Dimension Data
Roland Chia is National Business Manager, Dimension Data Australia. He is responsible for business development of its Connectivity line of business. Roland joined Dimension Data in 1991 as a technical support specialist focusing on Novell's NetWare and providing SNA support. Following this, Roland was promoted in 1994 to technical services manager where he was responsible for managing over 30 engineers in Dimension Data's technical support team. Prior to his appointment as national business manager in 2000, Roland was a senior network consultant and chief architect for major network infrastructure projects in the banking and retail industries.Securing Enterprise IP Telephony
IP Telephony has not suddenly given rise to a new breed of security threat to voice communications - PABX hacking has been prevalent for decades. However, when you migrate a voice network to IP, a whole new set of vulnerabilities does arise. Each IP device becomes a potential target for hackers, and voice communications are prone to denial-of-service attacks and viruses. To address the specific threats to IP Telephony, organisations need to consider the overall security infrastructure, including processes for patch management, anti-virus protection, backup and data recovery, and operating system upgrades. This session outlines the major threats to converged IP networks and IP Telephony, the establishment and maintenance of a secure, converged infrastructure, and next generation security tools currently emerging.
Oliver DescoeudresNetStar Australia
Oliver Descoeudres is Director of Marketing for the NetStar Group, and has been with NetStar for five years. Prior to joining NetStar, Oliver was Marketing Manager at Memorex Telex, a network integrator and network management solutions provider. He has held technical marketing and sales management roles at Tech Pacific and the University of Sydney's Computing Services. Oliver is also a regular contributor to ZDnet's Technology and Business magazine. He graduated from the University of Sydney with a Bachelor of Economics degree.'Eggs in the Basket' - how convergence changes the security landscape
Convergence provides increased functionality and reduced support costs. It also changes the nature of threats and risks, increasing the need for real-time protection, detection and response. The proposed presentation discusses the changing nature of threats and risks and looks at how to mitigate these from a combined response. For example, the annual 2004 CSI/FBI Computer Crime and Security Survey identified Viruses ($55M), followed by Denial of Service attacks ($26M) as causing the greatest losses amongst the 300-odd respondents, well in front of Telco Fraud and Abuse of Wireless Networks. This has significant repercussions on IT managers who are considering moving to IP Telephony on the campus and don't have a 'bullet proof' network.
The presentation takes a high-level (rather than technical) view of the current market and drivers for IP Telephony, and analyses the security threats in both a traditional (TDM) and converged (IP Telephony) environment. Using the Confidentiality/Integrity /Availability framework, the presentation identifies the areas of greatest risk, and therefore where increased protection is required. It takes into account new technologies, such as Cisco's 'Self Defending Network' and the role this plays in securing against threats to IP Telephony. The need for 24x7 vigilance is also discussed.
Alex GatiragasProduct Manager, Enterprise Convergent Solutions, NEC Business Solutions
With over 15 years experience in the Enterprise communication market, Alex Gatiragas has worked with leading edge solutions including Unified Messaging, Computer Telephony Integration (CTI) and IP Telephony. Having worked in various technical and commercial roles, Alex's experience has been used to drive the market introduction of NEC's convergent solutions. Alex currently holds the role for Product Manager for Enterprise Convergent Solutions with NEC Business Solutions, focusing on the impact of voice and data convergence on Wireless Local Area Networks.VoIP and Beyond
The acceptance of Voice over IP has steadily grown to the point where it's now considered to have moved from leading edge to an established technology. NEC's Product Manager for Converged Solutions, Alex Gatiragas, will provide an insight into value-added solutions that move VoIP from a technology designed to reduce costs, through to a solution that enhances the way an organisation communicates.
Topics to be address include:
Jonathon GordonAllot Communications
Jonathon Gordon is an industry expert on Traffic Management and has been with Allot Communications for six years. He currently manages the A/NZ region for Allot Communications. Previous to his current posting in Australia, he held the position of Technical Support Director for Allot Communications in the company Headquarters in Tel-Aviv. As Technical Support Director he gained hands on experience at both Enterprise and ISP/Carrier level corporations throughout US, Europe and Asia.
Before joining Allot Communications, Jonathon had ten years experience in Network & Systems roles at Comverse Network Systems, Team Integration Systems & CCS Australia.Peer-to-Peer Phenomenon - How to be combat it now and in the Future.
P2P: it's amazing how one term can elicit such extreme reactions, depending on whom you're speaking to. There is the public denouncement of the billions of music and movie downloads as outright intellectual property 'theft,' impinging on every person's right to make a living in a capitalistic society; juxtaposed against an equally public outcry of 'freedom of speech.' For individuals, it's opened up a whole new world of communal file sharing, from music to videos to computer programs - all free and all accessible through hundreds of P2P applications, available to anyone with a computer and Internet access. For music industry moguls, it's the enemy, with declarations of illegality and pending lawsuits against 'offenders.'
For enterprises - especially in the University space, it can be a nightmare, as more and more students (and staff) snatch a significant amount of bandwidth for recreational P2P use - at the expense of academic-related applications. Even when Universities ban P2P use altogether on their networks, employees can circumvent the restrictions by using the illegal and security risky SoftEther-type tunneling applications, which enables users to bypass the corporate network security suite and allows unrestricted entry for potentially harmful content. Universities in Australia have long held to the myth of 'if we don't know what's happening then we shouldn't be held responsible.' It is not by accident that Australian Universities along with ISPs have been the target of Raids by Anti-Piracy groups.
Higher Educational Institutions and larger organisations, plagued by the same inability to discern P2P, watch as illegal files (including those with sexual or paedophilic content) are shared in the same manner as academic files being used in this intelligent distribution network. For service providers (ISPs), it is an epidemic, snatching 60% - 80% of their traffic day and night, because their network monitoring devices cannot identify P2P.
The presentation will go on to identify the size and future directions of P2P usage and effective ways of how to monitor and control/eliminate the P2P threat.
Peter MariniPatchLink - Sales Director, Australia and New Zealand
Peter Marini is responsible for the company’s sales, channel and alliance management within Australia and New Zealand
Prior to joining PatchLink in April 2005, he was the sales manager, security division, Ceanet. Peter has over 13 years experience in the IT industry with roles at Volante, Network Associates and Data#3 as a solutions and support engineer.Understanding and Applying the Five Ps of Security Patch & Vulnerability Management
Is there a simple way for businesses to develop and deploy an advanced security patch and vulnerability management strategy? This presentation will share with attendees how security and vulnerability patching has become one of the top concerns for IT managers worldwide, but has also left many IT teams fighting a losing battle as the job of patching competes with day-to-day system maintenance and security tasks.
The patching issue became a more prominent problem for businesses worldwide in 2003 when the Slammer worm was unleashed on the Internet. In the first minute after it started spreading, Slammer doubled the number of web servers it infected every eight seconds. Within 10 minutes, 90 percent of all vulnerable machines had been infected - leaving businesses with $1 billion bill to fix the havoc Slammer created. Yet the patch to fix the vulnerability that Slammer exploited had been available for six months. If the majority of those infected had patched their systems, Slammer would have been a minor blip.
So why aren't businesses catching on to patching? This presentation shares insights on how the bottom line resource and time problem. Just researching the 4,000+ vulnerabilities published by security monitoring body CERT in the last year would demand hundreds of man-hours. And although an IT staff may be online regularly to see what patches are released, they cannot be 100 percent sure that all systems are properly patched.
This presentation will also discuss the cost issue. Recent research from analysts at The Yankee Group found that it can cost as much as $1 million to manually deploy a single patch in a 1,000-node network environment. The costs include the manual labour involved in fixing problems and system downtime while patches are being applied.
Additionally, it will discuss how the interval between a vulnerability being discovered and exploited has shortened and why implementing a security patch management program is now a necessity for organizations of all sizes. The 2004 Blaster worm was released just 18 days after the vulnerability it exploited was discovered, and the pace is stepping up. So how should businesses respond effectively to this challenge? Gemassmer answers this question and more.
Through a detailed explanation of the Five Ps of Security Patch & Vulnerability Management - proper planning prevents poor performance - support IT security success, the presentation will provide attendees with not only an important business maxim, but also a strategic approach that supports improved network security.
Stephen KinghamAARNet - Network Engineer
Stephen Kingham is presently employed by AARNet to Manage the VoIP and VIDEO Services. Prior to that he has spent considerable time with CSIRO and OTC(A), as well as shorter times with DFAT, AQIS and Centrelink (roll out of the 2,000 end distributed call centres and 30,000 telephones.
Stephen is extremely active within Australia as well as Internationally. Some of his key projects today are:
He is the drive, design, and support behind AARNet's VoIP Toll Bypass Service and VIDEO Service provided to AARNet Members. A particularly innovative approach invented by Stephen has been a "QoS Admission" control that ensures VoIP calls are connected if QoS is in fact functioning which has a good chance of wider deployment. AARNet's IPTEL and very successful VIDEO Working Groups are a result of Stephen's initiative and he is a major contributor to these groups. He is a member of the steering committees for both.
Stephen Kingham represents AARNet in several international forums, some as a senior position:
Stephen has 20+ years experience in Voice, Data, and half that as SysAdmin. He is equally comfortable operating Voice networks as well as data networks and writing applications to make them work. He has several tertiary qualifications; BSc in Electronics/Physics; Masters in IT; (half completed) Masters in Computing; and Electronics and Communications Certificate.Future developments of the telephone service!
With the coming of age of IP Telephony spawned by the new technology of SIP there is a growing market for third party Telephone Carriers who provide their service using the Internet. Academics, students, staff and the general public are starting to use these services in preference to the telephone provided by the University. This trend will undoubtedly continue.
This talk reviews the trends occurring overseas, how the services work and why they are successful and what will the telephone service look like in the medium-term and what can Universities do to keep their clients.
Dr Mike SargentChair, eResearch Coordinating Committee
Dr Mike Sargent is a Director of M. A. Sargent & Associates, providing strategic corporate consulting services to industry, with a particular focus on the information technology, energy, environment and utilities sectors. Prior to this he was Chief Executive of Transfield Energy Group, and before that was Chief Executive Officer of ACTEW Corporation.
Mike has 40 years experience in the utility industry in Australia, USA and Canada. He is Chair of the Australian Research and Education Network Advisory Committee. He has been Chair of the National Infrastructure Taskforce, and a Member of the Australian Research Council. He is a member of the Board of Power & Water Corporation, and of the National Electricity Market Management Company. He is Deputy Chairman of epicorp Ltd, a high technology seed fund and incubator. He is Deputy Chancellor of the University of Canberra and Adjunct Professor of the University of Technology Sydney.
Mike has a degree in electrical engineering and a Doctor of Philosophy from the University of Queensland. He is active in professional and community matters. He is a Fellow of the Australian Institute of Company Directors, a Fellow of the Australian Academy of Technological Sciences and Engineering, Academician of the International Academy for Quality, and was President of The Institution of Engineers Australia in 1990. In recognition of his service to engineering he was made a Member of the Order of Australia in 1993 and a Centenary Medal in 2003.The eResearch Program - Making Networks Work for Researchers
The rapid evolution of digital, information and communications technologies has created an environment in which the paradigms of research have changed. Over the past few years a number of initiatives in Australia and overseas have been taken to ensure that these opportunities can be effectively exploited, including establishment of the Australian research and education network.
At the same time the evolution of the capability and sophistication of scientific instruments and facilities has seen an explosion in the quantum of data produced by experimentation, and the complexity of analyses conducted using this data.
Science, particularly that based on large instruments, increasingly involves distributed, global collaborations enabled by networks and using very large scale data collections, high performance computing resources, tele-science (remote access and control of instrumentation) and collaborative visualisation. Collectively this is referred to as e-Research.
e-Research involves an evolving new capacity for large-scale, distributed, global collaboration in research, providing a new level of scope, scale and detail. It entails harnessing the capacity of ICT systems, particularly the power of high-capacity distributed computing, and the vast distributed storage capacity fuelled by the constant dropping cost of memory, to study complex systems across the research landscape. It has a number of components:
These current Australian investments in e-Infrastructure: AREN, APAC, AARNET, GrangeNet, the ARIIC initiatives and investment in major physical infrastructure through the MNRF program and other funding programs, have placed Australia in a position to support e-Research activities that are comparable, and in certain aspects in advance, of that existing in the UK and USA. In addition, the collaboration frameworks established for Australian research provide a much stronger base for e-Research than existed in the UK at the time of initiation of the e-Science programme.
To ensure that its researchers remain globally relevant and competitive, and to ensure Australia maximises its return on investment from the new global research paradigms, the Australian Government has initiated a coordinated activity in e-Research, to build on and take advantage of recent investments in broadband networks, high performance computing, instrumentation, large experimental facilities, and information infrastructure. This initiative has a clear focus on strengthening multidisciplinary teams working in national priority areas by providing incentives, guided by policies, and participating in international research programs.
Sven NowickiCEO Netintact
Sven Nowicki is the CEO of Netintact.
Sven has worked within the IT industry for over 15 years and started Netintact in 2000 together with 4 colleges. Netintact today has business in Europe, Australia, USA, Chile, Canada, Israel, and Asia.
Sven started his first company in 1990 building computers and networks for small business and private customers.
Sven is the IT manager for The Federation of Private Enterprises, a non-government organisation for entrepreneurs and business owners. Sven is also a board member of NetAdmin Sweden AB - a provisioning development company in Sweden. He is an active member of S I B - The Swedish IT Security Industry council - platform for the Swedish IT and information security companies. Sven is also an active member of SIG Security in Sweden.
When not exploring business opportunities, Sven spends his time with friends and family and he burns energy out of work playing football. He is a board member of the football team FFF.Internet traffic patterns and user behavior / Yesterday - Today - Tomorrow
Today's networks are changing in scope and complexity at an ever-increasing rate. Much has changed since the days of web browsing on poor performance dialup connections. IP Traffic is growing exponentially, with new applications and protocols being deployed daily. Business models and infrastructure are struggling to keep pace with the transformation to an IP Based Economy.
Centre of attention:
Clive GoldEMC Australia and New Zealand
Clive Gold has over 20 years experience in the IT&T industry, having held senior positions in Services, Support and Marketing. His career spans a number of major IT players such as Hewlett Packard, Pyramid Technology, Dimension Data and EMC. Clive joined EMC Corporation five and a half years ago and is currently a Product Marketing Manager, and is primarily responsible for bringing new technologies to market within this region. Clive has a BSc. in Electrical Engineering as well as a Masters of Business Administration and is on the board of the Storage Networking Industry Association, Australia.Information Life Cycle Management - the new paradigm
Information Lifecycle Management has become a common term in the IT market, yet there are areas of the technology that are still under development.
Putting ILM in context of IT challenges, business goals and operational tasks is what EMC will cover in this presentation. Sharing practical examples and best practices from customers around the world, on how they have deployed ILM principles within applications such as Email, and Databases will also be discussed. From this base the presentation will look at new technologies being brought to market which will help achieve true, cross application, policy based, automated ILM.
Jeff BrainardDirector of Corporate & Product Marketing at Mirapoint
Jeff Brainard is an industry expert on the application of email and email-specific hygiene. Jeff is frequently quoted in the press and works closely with industry analysts at Gartner, IDC, Radicati, Meta and Yankee. Currently, Jeff is Director of Corporate & Product Marketing at Mirapoint, where he is actively involved in marketing the company, working with customers, as well as helping to shape the company's strategic product direction. Prior to joining Mirapoint, Jeff held product marketing, product management and strategic partnership roles at Airflash, a next-generation wireless messaging and location-sensitive applications company. Prior to Airflash, Jeff worked at Sun Microsystems, where he was involved in launching Sun's first Internet messaging product, as well as working on the product marketing strategy to align the Sun and Netscape messaging software product lines. Jeff has a Bachelors degree from Villanova University.Best Practices in Email Security: How to Handle the Rising Threat
Jeff's presentation will be titled 'Best Practices in Email Security: How to Handle the Rising Threat' and will focus on the challenges customers face from the ever-evolving security threat landscape. Whether it's protecting against viruses, spam, hacker attacks, phishing scams or future risks related to inappropriate content, policy controls or information leakage, customers have their hands full understanding the risks and finding ways to get effective, yet durable protection over their critical communications. Did you know?
Especially when it comes to online communication tools like email and messaging in higher education, security threats jeopardize critical interactions between students, alumni, faculty and staff that can directly impact online learning. Looking ahead, as the message network takes on an increasingly important role with the convergence of telephony and wireless applications, the security risks will compound and organizations unprepared will be at risk of productivity losses, financial and potentially legal risk. Jeff's presentation will overview this evolving threat landscape and provide an education on how attacks are being conducted today, how they are evolving, the types of threats customers should prepare for, as well as the solutions either through education or technology, that can best help customers make email good again.
Merv ConnellIT Manager Central Queensland University
Merv Connell is the Communications Manager at Central Queensland University responsible for Network infrastructure (Voice and Data) , High Performance Computing Infrastructure and Physical Environment provisioning. During his 19 years at CQU he has been involved in the installation of fibre optic networks in the mid 80's, multi state campus deployment in the early 90's and computer housing facilities during the last 3 years. Strategic positioning of infrastructure for organisational development is a primary interest.Data_Centre@CQU
This will discuss the UPS Fire at Central Queensland University in Nov 2003 and the ongoing events leading to the construction of a new purpose-built Data Centre.
What issues did CQU face because it was knocked out? How long did it take to come up? Why did a new data centre result? What did was learnt and how would we now do it differently.
These questions and more will be answered including reference to an Australian AS Standard that will surprise, and comment about who bothers about testing the windings of the external transformer to ensure it is within power rating spec.
Alan TaylorQueensland Health
Alan Taylor is currently Project Director Outbacknet and Northern.net Projects and Principal Telecommunications Engineer, Queensland Health. He is responsible for the Outbacknet and Northern.net projects which are providing broadband xDSL facilities in 80 outback communities in Queensland. He is also responsible for the strategic direction of communications and networks within Queensland Health including data, voice, video and telehealth networks. He previously initiated the Service Delivery Network for Queensland health which established a statewide broad band network linking 28 major hospitals. In his early career he conducted research on networked multimedia in education, including the technical and pedagogical requirements and issues for distance, flexible and open learning.
Alan's qualifications include a BSc (Hons) in Physics and Electronic Engineering Manchester University, a MSc. at Salford University in Sociology of Science, and CEng. MIEE.
Wayne KupferDepartment of Employment and Training
Henk VullersEducation Queensland
Henk Vullers has been working in the IT industry in both private and government organisations for the past twenty years. Henk first completed an Associate Diploma in Electrical Engineering in 1981 and commenced work as a technician in the computer industry. While working as a technician Henk completed his Bachelor of Electrical Engineering (majoring in Communications and Electronics) from the Queensland University of Technology. He specialises in large, systemic implementations of organisational networks. His first foray was to deploy the Australia Post network throughout Queensland. Following on from this was the implementation of the Queensland Police Service's first complete network. In 1997 Henk was seconded to the Department of Education as Manager, Network Services, to project manage the inaugural implementation of EdNet, the department's network linking 1 300 schools, regional offices and central office. The second rollout of EdNet has recently been completed and was used as the basis for the whole-of-government initiative, SmartNet.Outbacknet and Northern.net - Broadband to the Bush
Commonwealth funded Outbacknet@qld and Northern.net@qld projects worth $10 million are providing broadband xDSL available to about 80 rural communities in Queensland. Schools, hospitals, TAFE colleges, fire and ambulance stations are providing anchor tenancy for the new services.
The projects are delivering new teleradiology, paediatric, ophthalmology and orthopaedic services including diagnosis, second opinion, and pre/post admission consultations, largely via H.323 IP based videoconferencing. They are also delivering online access to learning and development opportunities and Virtual Schooling provide access online quality curriculum information to rural and remote schools, TAFE campuses, and distance education centres.
The presentation will:
Queensland is the largest, most de-centralised state in Australia which presents particular problems for strategies which aim to prevent exclusion of outback communities from the economy of the online world.
The presentation will also attempt to stimulate the creation of linkages with the high speed network initiatives in higher education, government service delivery and the development of broadband/high-speed networks within Queensland.
Kevin LittlejohnObsidian Consulting Group
Kevin Littlejohn has worked with Internet Billing for the past 10 years, at various levels of the ISP industry. His previous position was with Connect. com.au, developing and maintaining their wholesale billing system. Currently, he works for Obsidian Consulting Group, who develop a billing system which is sold primarily to organisations looking for tailored solutions to their billing issues. Jet is a distillation of lessons learnt over the past decade, and aims to be highly flexible and scalable, to suit the kinds of challenges existing in the University marketplace.Internet Quotas and charge-back in a tertiary environment
This is a presentation about integration issues for billing systems - the challenges involved in integrating a billing and user management system with existing infrastructure. This will cover collecting usage data from disparate systems such as Netflow, SSG, Radius; also, how to integrate your login procedures via systems such as Novell or the various network management platforms such as PacketLogic.
Chris MyersAdvanced Communication Services Coordinator, GrangeNet
Chris joined GrangeNet, in Canberra, in February 2004. Prior to this Chris was Senior Network Engineer in ITS at Swinburne University of Technology.
At GrangeNet, Chris' duties include delivery of new communication services, encouraging local and international collaborative research in advanced networking, and delivering training and training resources in advanced networking.
Chris is responsible for IPv6 and multicast service deployments on GrangeNet and also the Distributed Data Centre Mass Storage (DDCMS) Prototype Project and the Access Grid Storage System Project and the eduroam.edu.au project.Joining eduroam
EduRoam allows roving researchers to log-in, with their usual "user name/password", to a wireless networks at participating campuses around Australia and the World and gain access to resources at their home institution. The program, which is based on inter-institutional trust, originated in the Netherlands and is rapidly spreading across Europe, Australia and soon the USA.
This presentation will describe what is required to participate in this project, how to join the federation, what services you will receive and what the future holds for eduroam and its expanding services.
Greg WickhamNetwork Operations Manager, GrangeNet
Greg joined GrangeNet as the Network Operations Manager in July 2002. Previously he studied and worked at Deakin enjoying many varying roles always with programming and data networking a common theme. Initially tutoring and then lecturing in the School of Computing and Maths he was involved with Programming, Software Engineering and Data Networks. The next move was to transfer into Information Technology Services maintaining aspects of network monitoring. His final role at Deakin was as the Network Section Leader. The network section was unique within the Division as it had 9 staff distributed between 6 campuses maintaining the entire network infrastructure including PABXs and inter-campus WAN links. During his time in this role he created a vision that would provide core redundancy and homogeneity of networking to all staff desktops and student laboratories. He has a PhD in Computer Science.GrangeNet II
Due to the successes of the GrangeNet program a funding extension was granted until the end of 2006. As part of the funding extension a component was allocated for maintenance and refresh of the existing GrangeNet backbone equipment. In collaboration with Cisco an innovative network architecture was developed that permits unparalleled connectivity between researchers that have access to the existing GrangeNet POP sites. The new network supports layer 1, layer 2 and layer 3 services to the GrangeNet community.
Layer 1 services, commonly called Lightpaths, are dedicated connections between two endpoints that bypass all of the GrangeNet layer 3 routing and layer 2 switching infrastructure. Effectively the user will only see their device at both ends.
The Layer 2 service is a Local Area Network. Between any Grangenet POP site it is possible to configure the same VLAN. This can effectively create a LAN segment that spans between Brisbane and Perth and all GrangeNet POP sites in between.
The Layer 3 service is the traditional R&E routed traffic that GrangeNet has been carrying since inception.
This presentation will be used to describe the logical and architectural concepts that underpin the GrangeNet II network; provide a detailed examination of the interior workings of the new equipment; and provide examples on how researchers can best benefit from this new architecture.
David WhiteRegional SE Manager for South Asia Pacific , Foundry Networks
David White, Regional SE Manager for South Asia Pacific , Foundry Networks David White has worked for Foundry Networks for the last 5 years, where he holds the position of Regional SE Manager for South Asia Pacific. David has had significant experience with networking technology over the last 21 years, from the early days of thick and thin Ethernet, repeaters, transceivers and hubs, progressing to token ring and ATM, through the rapid development of 10 and 100 Mb Ethernet switching technology, and finally into the era of high performance Gigabit and ten Gigabit Ethernet networking. He has demonstrated expertise in all facets of network design, installation and troubleshooting across many brands of equipment and protocols and has designed and installed a number of large networks for corporate Australia. Prior to working for Foundry, David ran his own networking consultancy.Rapid failover alternatives for today’s High Speed Networks.
With requirements for Campus-wide VLAN’s, support for 802.1x with dynamic allocation of user policy. The use of a routed cores or 802.1D Spanning Tree just don’t meet the user requirements. This presentations discuss various technologies which provide smart alternatives & ways of overcoming Spanning Tree limitations.
Maree LoweCEO, ASI Solutions
Maree is CEO and Director of ASI Solutions, a privately Australian owned IT company since 1985. ASI has national sales and service branches and employs 185 staff.
In 1999, Maree was NSW Telstra Business Woman of the Year and the NSW Westpac Business Owner of the Year. In 2004, Maree was also elected as a Director on the Telstra Stadium Club Board. Maree is also on the AIIA NSW Committee and other industry peak bodies
She considers that in the IT world, it is no longer about ICT working as a separate department but rather as a part of the organisation's core activity and that ICT teams must have input into Strategic Planning, Finance and HR and other departments' roles. Her own role incorporates many of these aspects.
She describes her strength as "Her Hands on management style: Having worked on Contract submissions, negotiation and management, Customer Help Desk Service liaison and IT service outsourcing projects. Many of these involve major government contracts including Defence, Health, Education and Police.Wireless Security
This presentation will discuss detection, location and isolation of rogue devices. It will also describe the first wireless firewall.
As the need to access information everywhere dominates discussion, so to does the need for all users internal and external to know that the information is secure.
When wireless was released to the world it became one of the fastest growing areas of all IT equipment. When WEP (wired equivalence protocol) was found to be breakable the corporate market took note and stop buying. However the rest of the market continued to explore and grow their wireless investments as the productivity was improved. Since WEP the wireless manufactures have replaced WEP with WPA (wireless protected access) and WPA 2. Although this has fixed the WEP issue there are so many more vulnerabilities to the wireless infrastructure.
For organizations with wireless LAN networks, as well as those without, Wi-Fi brings a new set of security threats that cannot be protected against by your current firewall and VPN security systems. Placing your wireless LAN network outside of the corporate firewall doesn't help either.
Simple to install and low cost, Wi-Fi access points may be brought in and deployed by your own employees, usually with no intention of generating harm. These insecure deployments, called rogue APs, open up your network to unauthorized personnel, making vulnerable your most important asset - confidential information about your business, customers, products and services. Other threats, including denial of service attacks and your own misconfigured APs may lead to additional vulnerabilities.
This is where AirTight Networks has stepped in to offer the first wireless firewall. SpectraGuard Enterprise solves these problems and many more by providing a complete Wi-Fi firewall, delivering the same comprehensive protection as a wired firewall, but focused on your corporate airwaves.
Paul ParkynChief Information Officer, Blue Care
Paul Parkyn has 16 years international experience in IT strategic planning, development of IT architectures, project management and information systems development.
As the Chief Information Officer (CIO) for Blue Care, Paul is responsible for setting the IT/IS strategy and direction for the organisation. The role also involves determining how Blue Care can use IT to support business goals and deliver services more effectively.Wide area to wireless
Blue Care is one of the largest Community and Aged Care providers in Australia. It operates a large Wide Area Network across the state of Queensland. The network has 185 PoPs that cover 260 service locations. These stretch from Mossman in the North to Coolangatta in the South and Longreach in the West. A variety of data communications technologies are used to support information delivery to these locations. Recently Blue Care commenced an interesting point-of-care trial that enables clinicians to collect data using wireless tablet PCs. A geographically dispersed and technically unsophisticated user base present interesting business and IT challenges.
Paul will present an overview of Blue Care, what are the business drivers, what was their ultimate technical solution and what they would now do differently.
Ralph William BuchmaierNational Strategic Business Manager, Alphawest Services
Ralph has lived and worked for multi-national Information Technology organisations in Asia, Europe and the United States for over 15 years as well as a Global CIO for a large European shipping line. Ralph's strengths stem from his entrepreneurial attitude complemented by a strong management consulting background.
Ralph joined Alphawest in January after spending the past three years based in the US, where he spent the bulk of his time educating global sales and delivery teams on the way companies are forcing change to the way managed services are being proposed and ultimately, implemented.
Ralph is responsible for the further development of well established selective sourcing practice at Alphawest.Network Management - Effective management of the IT network - and your IT service providers
Todays' IT networks require a great deal of expertise and specialisation to keep them running - a challenge almost all IT managers face, every day. IT budgets are continually scrutinised and measured, however, the costs of retaining highly skilled staff, in-house, continues to creep upwards.
IT service providers have been endeavouring to wrestle inhouse IT management functions since the days of mainframe computing with the concept of whole scale IT outsourcing. Despite the many publicised failures of the past decade, there are those organisations that have seen great financial and efficiency benefits from such outsourcing models.
Conversely, those who have resolutely stood on an in-sourced IT model have managed to shield themselves from the horrific boom/bust times that signified the past 10 years of IT outsourcing. Perhaps they have even used the disastrous IT outsourcing cases to their advantage - as clear examples of what not to do - and they would have been justified in doing so. These organisations, however, have since been forced into outsourcing the areas of their network which are clearly utilitarian, serving little or no strategic value to the organisation (e.g. parts of network security, SPAM, WAN services, etc).
In fact, most organisations recognise that in today's network there is no single organisation, whether internal or external, that is truly capable of managing all facets of the network.
Further, with the enormous up-take of a myriad of IP connected mobile devices, the challenges of managing a network successfully are real and require urgent action.
The early adopters of whole scale outsourcing and the resolute complete in-sourcing organisations, seem to have reached a comfortable middle-ground. As we move into the next generation of managed network services many organisations, are turning away from both whole scale outsourcing or complete insourcing of their network to a more selective sourcing model to mitigate their risk and work towards their IT service providers strengths.
Benjamin Teh is Sales Director for South Asia and Country Manager for Australia and New Zealand. Prior to joining Fortinet, he was Country Manager (South Asia) for Watchguard with responsibilities for India, Malaysia, Singapore, Indonesia, the Philippines and Australia. Benjamin brings with him considerable sales experience from his extensive coverage of the Asia region. He has also previously worked for technology distributors and system integration companies, dealing with products from Shiva, Exabyte and Fore Systems.
He is a graduate of La Trobe University in Melbourne, Australia. He majored in computer science and communications engineering.Unified Threat Management
Unified Threat Management (UTM) refers to a category of network security products that integrates firewall, intrusion detection and prevention and anti-virus in one high-performance appliance. In a recent study (2004), IDC forecast that sales of UTM solutions will overtake sales of traditional VPN/Firewall products by 2008, with an expected CAGR of 80.1% for UTM products.
Fortinet offers UTM solutions for a wide range of customers, from small businesses to large multinationals and Managed Service Providers. The unique architecture of Fortinet's FortiGate series of antivirus firewalls features ASIC hardware-based acceleration that ensures that businesses get complete, real-time network protection without compromising performance. Automated push updates also reduce manageability issues for system administrators.
Peter Thomas is a Systems Engineer based in Brisbane. Peter has over 20 years experience in Networking and Communications. During his time with Cisco he has worked with government, financial, and commercial customers. Prior to joining Cisco, Peter was a Senior consultant with a Microsoft Solutions Provider, and the Manager of a State Government Network. For the past twelve years, Peter has specialised in Network Management, implementing and developing solutions for Microsoft and Cisco network environments.