home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1997 December
/
Internet_Info_CD-ROM_Walnut_Creek_December_1997.iso
/
isoc
/
conferences
/
inet95
/
tutorials.txt
< prev
next >
Wrap
Text File
|
1995-03-08
|
11KB
|
261 lines
INET'95 Tutorial Program
===============================================================================
Courses and Speakers
1. Publishing with the World Wide Web
Peter Deutsch, Bunyip, Canada, peterd@bunyip.com
2. IPng: The next generation Internet Protocol
Steve Deering, Xerox PARC, USA, deering@parc.xerox.com
3. Internet: making the business case
Gordon Howell, Internet Business Services, UK, gordon@ibs.co.uk
4. Internetworking with ATM(Asynchronous Tranfer Mode)
Allison Mankin and Eric Hoffman, ISI, USA, {mankin, hoffman}@isi.edu
5. Internet security
Steve Crocker, CyberCash, USA, crocker@cybercash.com
-------------------------------------------------------------------------------
Announcement of the INET'95 Tutorial courses
Date: 9:00-17:00 Tuesday, June 27, 1995
Place: Sheraton Waikiki Hotel, Honolulu, Hawaii, USA
Courses: 5 full-day courses in parallel
Participants:50~150 people (each course)
Registration Fee: $150(early registration)/$170(late registration)
1. Publishing with the World Wide Web
P. Deutsch, Bunyip, Canada
About this course:
This course covers the selection and installation of the most popular
World Wide Web servers and clients, discusses security issues involved
with the Web, and provides detailed information about preparing data
for publication in the Web.
Who should attend?
Anyone who wishes to publish data in the World Wide Web.
What you will learn:
Detailed instructions on selection and installation of WhorldWideWeb clients
and servers, techniques for analyzing resource requirements, security
considerations, and the preparation of text and multimedia information
resources for publication in the Web.
Course Duration:
One day
Course Materials
Comprehensive course workbook/summary
Course Outline:
1: Introduction to the World Wide Web
2: Web server installation
3: Web client selection and installation
4: Resource requirements
5: Web Security
6: Representing text
7: Representing multimedia
8: Document preparation
9: Presentation management
10: User Interface issues
11: Coming attractions
2. IPng: The Next Generation Internet Protocol
Steve Deering, Xerox Palo Alto Research Center, USA
A new version of the Internet's core protocol, IP, has been developed by the
Internet Engineering Task Force (IETF) and is now entering the IETF Standards
track. The new IP, known as IPng or IP version 6, is designed to meet the
scaling requirements imposed by the explosive growth of the Internet, and to
meet the demand for greater functionality at the internet layer, including
strong security, automated configuration, and support for multimedia traffic.
In this tutorial, the lead designer of IPng will present a detailed walkthrough
of the protocol, explaining what it is, why it is, and what role it is expected
to play in the evolution of the Internet.
Outline:
- why a new IP?
- IPng addressing and routing architecture: unicast, multicast, support
for mobile hosts, dynamic selection of service providers, address
allocation and administration.
- extensibility: extension headers and options.
- IPng security: source authentication, data integrity and confidentiality.
- support for real-time traffic flows and non-default qualities of service.
- autoconfiguration and reconfiguration of IPng nodes ("plug-and-play").
- the effects of IPng on higher-layer protocols and APIs.
- interoperation with, and transition from, the current version of IP.
Prerequisite: familiarity with the current version of IP.
3. Internet: Making the Business Case
Gordon Howell, Internet Business Services, Scotland
In their year-end reports, both Newsweek and the US News and World Report
rated the Internet as one of the top 10 developments in 1994. The UK
Economist suggested that the internet will be an "indispensible tool" for
businesses in the late 90s.
The internet "gold rush" is on, but where are you likely to strike "pay
dirt"? Is it really possible for conventional, non-technical businesses to
take advantage of the new electronic media to enhance their business?
What are the emerging business "conventions" in use on the internet?
This tutorial looks at how conventional business processes can be enhanced
by the internet, and considers how to develop new lines of business
specifically to exploit the medium. Examples in areas such as customer
services, electronic publishing and direct marketing (shopping for users)
will be presented.
The tutorial will be of interest to two audiences:
1. Business and market development executives of non-IT companies
2. Entrepreneurs in the IT field seeking more insight into what markets
might exist and services offered related to the internet
The tutorial objective for both is simple: How do you make the business case?
Outline:
1. Internet for Business Part I: Business applications
- Overview: the Internet and the "Information Superhighway"
- Key business functions & examples
- Internet for communications, research, publishing, marketing & sales
2. Internet for Business Part II: Making the Case
- Assessing the business needs & opportunities
- Typical justifications for Internet - worked examples
- Internet business development strategies
3. Dealing with the Internet industry
- The Internet Industry model - who sells what
- Getting connected & your electronic identity - key considerations
- Integrating with other electronic services: Fax, Compuserve, X.400, etc.
- Key issues and developments to follow: security, electronic payments,
acceptable use policies
4. Discussion
4. Internetworking with ATM (Asynchronous Transfer Mode)
Allison Mankin and Eric Hoffman, ISI, USA
As more and more people start using the Internet, the traffic
increases and need arises for bandwidth. Generation of audio/video
data is becoming easier as PCs become ever more powerful, and
multimedia traffic will become ever more frequent. ATM technology at
155/612/2,400 Mbps (2.4Gbps) will be used for adding bandwidth to meet
these needs. Starting from what ATM is, we will give you insight into
how you can use ATM effectively in the Internet.
We will emphasize IP over ATM and end-to-end ATM transmission,
although other stacks are discussed. Signalling, the classical IP
approach, the Next Hop Resolution Protocol (NHRP), and addressing
and routing prospects are among the topics.
A portion of the tutorial will be devoted to practical
information on implementation and problem-solving for ATM segments
in internetworks today.
5. Internet security
Steve Crocker, CyberCash, USA
When companies join the internet, security is a major concern. To address
the problem, there are emerging security technologies such as firewalls,
proxy servers, PEM (Privacy Enhanced Mails) and a number of encryption
schemes such as secure Mosaic/HTTP and secure payment protocols. These new
technologies will be described in detail for business applications.
This tutorial is intended for everyone who needs to understand the security
issues associated with a connection to the Internet and what technology is
available to protect their resources.
Outline:
1. Internet security threats
2. Overview of methods of protection
3. The use of challenge-response systems
4. Firewalls
5. Brief introduction to public key cryptography and message digests
6. Security in the transport protocols
7. Security in mail protocols, PEM, PGP, etc.
8. Security in web protocols, S-HTTP and CyberCash
9. Security administration
------------------------------------------------------------------------------
Tutorial Instructor Information
1. WWW - Peter Deutsch
Peter Deutsch is one of the architects of the archie information
system and an active developer of Internet tools and services.
He is President of Bunyip Information Systems Inc of Montreal, a
company specializing in new Internet services and has been on
the Internet since 1987, when he helped bring the first link
into Eastern Canada. Mr. Deutsch holds an M.Sc. in Computer
Science and a B.Sc. in Mathematics and Computer Science from
McGill University and thinks that with the Internet he's
finally found what he wants to do when he grows up...
2. IPng - Steve Deering
Stephen Deering is a member of the research staff at Xerox PARC, engaged
in research on advanced internetwork technologies, including multicast
routing, mobile internetworking, scalable addressing, and support for
multimedia applications over the Internet. He is present or past chair
of numerous Working Groups of the Internet Engineering Task Force (IETF),
and a member of the IETF's IPng Directorate. He received his B.Sc.(1973)
and M.Sc.(1982) from the University of British Columbia, and his PhD (1991)
from Stanford University.
3. Internet: making the business case - Gordon Howell
Gordon Howell is a founding director of Internet Business Services Ltd, a
business consultancy and training organisation based in Scotland. He has
co-developed a series of seminars "Internet for Business" currently being
run throughout the UK and in other locations in Europe.
He is a consultant to various private and public sector bodies, including
the economic development agency in Scotland responsible for developing the
"Information Superhighway". Is the founder of the Scottish Internet
Business Club, and the Forum for Open Systems, and is a regular contributer
to public press and other publications. He has been on the 'net since
1982.
4. Internetworking with ATM - Allison Mankin and Eric Hoffman
Eric Hoffman is the principal developer of Vince, a publicly
available implementation of ATM and IP over ATM, which he created
in 1992. He worked on parallel algorithms, rendering software and
scientific visualization before turning to network research.
Allison Mankin serves on the Internet Engineering Steering Group, as
Area Director for Transport and was a Co-Director for IP Next Generation,
producing the recommendation that has lead to IPv6. She has been
a designer of Vince. Her published research includes router performance,
congestion control, and network measurement.
5. Internet security - Steve Crocker
Steve Crocker is a founder of CyberCash, Inc. and serves as senior vice
president, Development, responsible for security architecture and the
design and implementation of the CyberCash server systems.
He was previously a vice president at Trusted Information Systems, where he
led the development effort for the reference version of Privacy Enahnced
Mail and managed a variety of network security projects. In prior
positions, he was a program manager in the Advanced Research Projects
Agency (ARPA) and a senior researcher at USC Information Information
Services Institute. Dr. Crocker served as the area director for security
in the Internet Engineering Task Force for four years and is now a member
of the Internet Architecture Board. He has published numerous RFCs and
papers in networking and computer security. Dr. Crocker holds a Ph.D in
Computer Science from UCLA.
-------------------------------------------------------------------------------