Access Keys:
Skip to content (Access Key - 0)

Workshop Program 2006

Systems and Server Consolidation and Virtualisation, 6-7 December 2006

Conducted at The University of Queensland, this two day workshop featured presenters from the universities and from industry. The program covered server virtualisation from VMWare and Microsoft, storage virtualisation from Hitachi, hardware virtualisation from Intel, and user experiences from Flight Centre, Karl Turnbull (Griffith), Scott Brewster (QUT), Luke Walford (SCU), Todd O'Connell (UQ) and Andrew Exley (UQ). Presentation slides are available at QUESTnet Documents. This workshop was sponsored by QUESTnet.

Business Continuity Planning / Disaster Recovery, 15 September 2006

A QUESTnet sponsored workshop, the program featured a presentation from Adam Lawrence, Director Terrorism Risk at Ross Campbell & Associates, providing a practical guide to Business Continuity Planning. The program continued with experiences and case studies from the universities, with presentations from Sudath Wijeratne (Griffith) on their BCP methodology, and Roy Gregory (CQU) on their threat assessment exercise. Delegates participated in the discussion are share their experiences. The workshop was hosted by The University of Queensland. Presentation slides are available at QUESTnet Documents.

Identity Management Architectures, 11 July 2006

Presented at the QUESTnet 2006 conference by Sun Microsystems The workshop was structured to provide a forum to demonstrate and share experiences around 3 key areas of Identity Management.

  1. Business focus for successful Identity Management projects
  2. 1. Enterprise focus to meet the dynamic requirements of provisioning, workflow and password management
  3. Federation focus to meet the growing needs of inter-organisational interaction for academic, e-research and student services.

The workshop delivery team included local and global experts, contributing their individual expertise around the focus areas mentioned above. The workshop was designed to be highly interactive with attendees contributing significantly their domain knowledge and experiences in relation to the topic. The workshop provided an opportunity to identify specific sector functional requirements and develop strategies to meet these requirements.

Eduroam Implementation, 11 July 2006

Presented at the QUESTnet 2006 conference by Grangenet, this workshop targeted implementers and network/wireless/campus engineers. The workshop was hands-on, delivering practical insights into wireless infrastructure models, eduroam service model, radius hierarchy in eduroam, radius configuration, AP configuration, security for guest wireless networks, IMS integration, and client configuration using SecureW2 on XP and on PDA's and Mac OSX.

Cisco Secure Architecture, 11 July 2006

Presented at the QUESTnet 2006 conference by Cisco, this session covered the principles and design aspects of identity based networking using CiscoSecure ACS. The foundation for network identity services is 802.1x, which allows enterprise network administrators to explicitly control who and what gets on their network. Identity services are a requisite technology to Network Admission Control (NAC). The workshop was run in two halves; the first half focusing on 802.1x based network admission control. The second half of the session focussed on alternative strategies and products around network admission control and remediation.

SIP and IP Telephony, 11 July 2006

Delivered by Nortel at the QUESTnet 2006 conference this workshop was divided into two major areas.

  1. The data infrastructure requirements for effective IP Telephony and Multimedia communication.
  2. A focus on two specific SIP based Multimedia Networking solutions, Nortel's Multimedia Communications Server (MCS) and Microsoft's Live Communications Server (LCS)

Topics covered included:

Data Infrastructure Requirements:

  • Network Resiliency
  • Quality of Service and the Diffserv Model
  • Power over Ethernet
  • Proactive Voice Quality Management
  • Network Audit
  • Security

Multimedia Communications using SIP:

  • Why SIP
  • Pure IP vs Hybrid approach
  • MCS Architecture
  • LCS Architecture
  • Practical implementation issues

BGP Techniques for Providers, 11 July 2006

The tutorial introduced service providers to some more advanced BGP features and techniques to aid with operating their networks within the Internet. After a review of iBGP, eBGP and common attributes, the tutorial covered the various scaling techniques available, when to use BGP instead of an IGP, and the policy options available through the use of local preference, MED and communities. The tutorial then covered common deployment scenarios as used in ISP networks, and some of the newer features available.

CiscoWorks, 8-9 June 2006

This two day hands-on CiscoWorks training workshop was a re-run of the 2005 workshop, presented by a Cisco Advanced Services Senior Systems Engineer at The University of Queensland. This workshop was sponsored by QUESTnet.