APRICOT 2003 Full Agenda  ( For meeting room information please click here)  [1]pLast update: Feb. 23, 2003

A. Workshops:Wednesday, February 19 - Sunday, February 23


09:00 - 17:30  A.1 Routing Workshop

Instructors:Phillip Harris, Vincent Ng, Ong Beng Hui
Introduction to OSPF and BGP, Introduction to BGP policy, Router Configuration Essentials, BGP Route Reflectors, Policy Routing. Participants should bring their own laptop if they have one.


09:00 - 17:30  A.2 DNS Workshop

Instructors:Bill Manning, Joe Abley, Ed Lewis and Olaf Kolkman
System fundamentals, Basic DNS (Server, Client, Dynamic Update, Upgrading, Adding Zones, Using Slaves), Advanced DNS (IPv6, DNSSEC, AD integration). Participants *must* have their own laptop computer and will have some homework pre-assigned.


09:00 - 17:30  A.3 BGP Multihoming Workshop

Instructors:Joel Obstfeld, Srinath Beldona, Wojciech Dec
Introduction to BGP, BGP Multihoming basics, More advanced multihoming practices, Case Study.


09:00 - 17:30  A.4 Network Management Workshop

Instructors:Gaurab Upadhaya, Ritesh Joshi, Paul Gampe
Evolution of Internet infrastructure, structure of the Internet, IP routing, Multi-Provider Issues, Peering, Capacity Management and Planning, Business and Pricing Models, Network Operations Management, Security, DNS, IP Address Registries.


09:00 - 17:30  A.5 ISP Security Workshop

Instructors:Evi Nemeth, Ned McClain and Merike Kaeo
Introduction to network security, System Security, Network Security, Dealing with DOS attacks.


Back to Top


B. APRICOT Tutorials:Monday, February 24


08:30 - 09:00 Registration


09:00 - 17:30 B.1.01 BGP Introduction and Deployment for Service Providers

Instructor:Philip Smith, Cisco Systems Inc.

This tutorial introduces service providers to BGP, including iBGP, eBGP and common attributes. It will then introduce some more advanced features of BGP, and look at the various scaling techniques available, when to use BGP instead of an IGP, and examine policy options available through the use of local preference, MED and communities.
The second half of the tutorial will then cover multihoming techniques, providing example strategies for configuring multiple connections to neighbouring ISPs, and finishing with a case study using many of the techniques covered in the tutorial.


09:00 - 17:30 B.1.03 Designing and Implementing a Secure Network Infrastructure

Instructor:Merike Kaeo, Merike, Inc.

This tutorial will provide a comprehensive view of the most widely deployed security technologies, and some newly emerging technologies. It will relate these technologies to features implemented in varying vendor equipment and through the use of specific configuration examples will show how to implement these features to secure the core and edge of your networks.


09:00 - 17:30 B.1.04 Introduction to Service Provider IP Routing

Instructor:Matt Kolon, Juniper Networks

The Introduction to Service Provider IP Routing workshop focuses on Internet router configuration, operation, and troubleshooting. This course also provides a brief review of the operational characteristics of common protocols, including OSPF, IS-IS, BGP, and Multiprotocol Label Switching (MPLS).

The tutorial combines lecture and labs, with significant time allocated for hands-on experience with Internet software configuration, operation, and protocol troubleshooting.

Tutorial Contents

Day One

* Review of introductory topics: IP concepts and addressing

* Hardware and software router architecture

* Command-line interface and configuration basics

* Protocol-independent route properties

* Routing policy

* Open Shortest Path First (OSPF) protocol


09:00 - 17:30 B.1.05 Generic Virtual Private LAN Services: Ethernet VPNS over an MPLS Backbone

Instructor:Mark Williams, Nortel Networks

Multi-protocol label switching (MPLS) is an emerging networking technology originally designed to give connectionless L3 protocols such as IP some of the advantages of connection-oriented operation while still allowing them to function as connectionless protocols from an end-system point of view. Early applications such as traffic engineering, the enhancement of quality of service (QoS) guarantees and the unification of L2 connection-oriented and L2 connectionless topologies are by now well-deployed if not as widely-deployed as at first expected.
There is a second class of application for MPLS, however, which promises to increase the deployment of MPLS in core networks considerably, and this is not necessarily tied to IP services. The recursive tunneling nature of MPLS makes it a natural candidate technology for the provision of virtual private networks (VPNs) when combined with a mechanism for the discovery and distribution of VPN topology and membership information. The first application of MPLS in this area was that defined in informational RFC RFC2547bis for the provision of IP VPNs. This approach, uses MPLS as a tunneling mechanism and multiprotocol BGP for membership discovery. Since these VPNs are provisioned on the provider backbone and not on customer premises equipment (CPE) it falls into the general category of provider-provisioned vpns (PPVPN).
The same approach can be used to provide of L2 frame services across an IP backbone. Only the content of the tunnel has changed - from IP packets to L2 frames that may contain IP packets or any other higher-layer protocol data units (PDUs).
This one-day tutorial starts with the basics of MPLS and its first "IP-services" applications such as traffic engineering and then goes on to introduce and explain the concept of MPLS-based PPVPNs. It then goes on to deal with the specific example of a PPVPN that offers an IEEE 802.1D compliant private bridged Ethernet service, known as a Generic Virtual Private LAN Service (GVPLS).

09:00 - 17:30 B.1.06 Metro Ethernet - the new first/last mile access technology

Instructor:Lim Wang; Wojciech Dec, Cisco Systems Inc.

Metro Network, with Ethernet as the last mile access technology, can deliver a variety of broadband services to the home and businesses. This tutorial discusses the architectural options for delivering high quality video, voice, and Internet services to the home; and how VPN services can be offered with tight Service Level Agreement to the businesses. What Metro technology, security and Quality of Service mechanism are needed to offer these services?


09:00 - 17:30 B.1.07 Security in Wireless and Mobile Network Architecture

Instructor:Ray Hunt, Department of Computer Science, University of Canterbury

The growth and development of wireless and mobile networks requires careful consideration be given to the security issues of these networks. In many situations the security architectures designed for fixed networks can be adapted for use in wireless and mobile networks. However there are some important differences to be considered.

In recent times we have seen the largest Distributed Denial of Service attacks, the largest virus attacks and some of the most dramatic web server attacks in the entire history of the computer-communications industry. Wireless and mobile data networks are equally vulnerable to these attacks and careful architectural design is necessary.

This tutorial will cover a number of very pertinent topics of interest in the area of Wireless LAN and WAN security. It will focus on some of the (unreasonable) hype and criticisms of WEP and look at some of the real security issues facing Wireless LAN network users.

This tutorial commences by examining local and wide area lower layer wireless and mobile infrastructure including the types of threats that they face. It then proceeds to examine the protocols and architecture that go to make up the security infrastructure for these networks.


09:00 - 17:30 B.1.08 Internet Bandwidth Management and Web Caching

Instructor:Gihan Dias, Lanka Education and Research Network

The high cost of Internet bandwidth, both international and national, continues to be a major constraint for users and service providers in this region.
Optimising the use of the available bandwidth while providing a good service to users is a prime concern of network managers. Since much Internet traffic is due to web access, web caching is a widely used solution. However, other types of traffic, such as multimedia and voice, are also important.
This tutorial will introduce caching systems and the Squid cache in particular. Participants will learn how Squid can be configured to optimise performance. We will show how to use Squid as a bandwidth manager, and the setting up of a set of inter-connected caches.
Network traffic can be categorised as real-time, on-line, and off-line, and this tutorial will show how to deal with each of these types of traffic to make the most of your Internet connections. We will also show how differentiated levels of service can be provided to different groups of users.

09:00 - 12:30  B.1.09 Technical Opportunities/Constraints of ISPs in Least Developed Countries

Instructor:Sonam Nuri Sherpa, Mercantile Communications (Pvt.) Ltd.

This workshop will cover the theoretical guidelines followed by technical hands-on on the establishment of different services required by an ISP.


09:00 - 12:30  B.1.10 Multimedia News Web Services

Instructor:Hisn Chia Fu, National Chiao-Tung University

This tutorial intends to present basic concepts as well as modern techniques of Multimedia News Web Services. The tutorial mainly contains three parts. ±[1]p Part I introduces basic concepts and standards, on multimedia information (text, image, audio, & video) processing, and some AI and soft-computing techniques such as neural networks, fuzzy and genetic computing. Part II then goes into the technical aspects of web service development. ±[1]p In this part, we will introduce modern development tools for web service programming, such as ASP, Visual Studio .net, .net Framework, C# etc,. Part III addresses case studies on Multimedia News Web Services. As the concluding remarks to this special topic, issues on wireless multimedia processing are addressed in the last section of this tutorial.


14:00 - 17:30  B.1.02 Availability for IP Data Networks

Instructor:Ross Callon, Juniper Networks

This 1/2 day tutorial will discuss methods for improving the availability and reliability of IP data networks. This will include network wide approaches to minimize the effect of link or equipment failures, as well as methods for improving the availability and reliability of network equipment.
Topics to be discussed include:

*Reliable Networks
*Dynamic routing
*MPLS Fast Re-Route

*Graceful Restart

*Reliable Platforms

*System architecture

*Software and protocol robustness

*Hardware redundancy
*Processor redundancy vs stateful mirroring
*Reliable Services


14:00 - 17:30  B.1.11 High Availability NSF/SSO

Instructor:Shankar Vemulapalli, Cisco Systems Inc.

This presentation is going to talk about the High Availability [HA] of a
Cisco Router during a failure scenario.  This includes Stateful Swith Over
[SSO] with Non Stop Forwarding [NSF] mechanisms.

SSO describes an approach to providing Route Processor redundancy
to provide state synchronization, fault recognition and containment, non-disruptive (or minimally-disruptive) swithover from the Active RP to redundant Standy RP, thereby providing an increase in both system and network availability.
NSF mechanism is the ability of a router to continue to forward traffic toward a router which may be recovering from a transient failure.  Also, the ability of a router recovering from a transient failure in the control plane to continue correctly forwarding traffic sent in by a peer.  This is in the form of extensions to the Routing protocols OSPF, IS-IS and BGP which are being standardized in the Internet Engineering Task Force [IETF].
This is a very useful feature in Internet Service provider (ISP) market as ISPs want to increase revenue by honoring Service Level Agreements (SLAs) with their customers.

Back to Top


B. APRICOT Tutorials:Tuesday, February 25


08:30 - 09:00 Registration


09:00 - 17:30  B.2.01 A Knowledge Base Framework for Innovative Change Approach when implementing Internet and Wireless Application System Development

Instructor:Poey Chin Lai, Phoenix International University

The tutorial presents a knowledge based framework to identify cultural specific needs and peculiarities that can be transformed and packaged as technology based applications. The development process draws upon the discipline of the innovative change approach of the technology, application system development and in particular of human factors. Wireless and mobile technologies are emphasized as the interconnection platform for emerging application systems and of the current technology business trend. A role-play session is included to identify, acquire and develop leverage knowledge from across every hierarchical level of the (participating local base) organization. This can innovate a conceptual product to exemplify knowledge utilization using the change approach.

The objectives of the tutorial are to present an insight on the innovative change approach in the knowledge development management specifically for application system developers. In addition, to exemplify knowledge utilization in creating internet and wireless application systems tailored to cultural specifics that are useable, functional, coherent, publicly acceptable, sustainable, profitable and more importantly successfully implemented using the innovative change approach.


09:00 - 17:30  B.2.02 BGP Best Current Practices and Troubleshooting Techniques for Service Provider

Instructor:Philip Smith, Cisco Systems Inc.

This tutorial follows on from the BGP Introduction and Deployment tutorial by Introducing some of the best current practices for ISPs, including how to configure external peering sessions and how to deploy BGP across ISP backbones.
The second half of the tutorial covers common problems ISPs have when deploying BGP within their network. It looks at problems with peer establishment, missing routes, inconsistent route selection, and convergence issues. It also looks at real world examples of common errors which are made when deploying BGP, both as iBGP and eBGP, in service provider networks.


09:00 - 17:30  B.2.03 DNS & BIND

Instructor:Paul Vixie, Vixie Enterprises


09:00 - 17:30  B.2.04 Threats to TCP/IP Networks and Intrusion Detection Systems

Instructor: Ray Hunt, Department of Computer Science, University of Canterbury

Internet/Intranet architectures are built upon a pair of protocols designed over 25 years ago and to which virtually no consideration was given to security. Although the IPv6 networking family has been designed to address this issue, the majority of existing network infrastructure is subject to substantial threats. This tutorial examines the current security risks resulting from using TCP/IP and classifies the type of attacks possible. These are largely centered on IP sniffing, IP spoofing, TCP hijacking and Distributed Denial of Service attacks. Although firewalls have been designed to provide protection for many of these services, it is now recognized that they can be broken and that IDS (Intrusion Detection Systems) are necessary to complete the TCP/IP security framework. This tutorial will examine IDS architectures and demonstrate the techniques by which TCP/IP vulnerability can be detected. The tutorial will include a live demonstration of a number of attacks on the TCP/IP protocol suit and show how such attacks can be detected by a well-designed IDS architecture.


09:00 - 17:30  B.2.05 Virtual Private Lan Services - Delivering Scalable Ethernet services over MPL

Instructor:Vach Kompella, TiMetra Networks

This tutorial will provide an in-depth technical overview of Virtual Private LAN Service (VPLS). This is the emerging standard for delivering Ethernet services to residential and business customers over an IP/MPLS network, as described in IETF draft-lasserre-vkompella. ( note: the Speaker is co-author of this draft). This tutorial will discuss the VPLS service architecture and the how it addresses the many issues facing service providers trying to build networks for Ethernet services, including: signaling, scaling, replication and Inter-metro services. The tutorial will compare VPLS with several alternative architectural approaches and examine the technical benefits that VPLS brings to the service provider and customer. The second half of the tutorial will discuss the operational and management (OAM) requirements for Ethernet services and the latest developments and standards work in this area, including MAC Ping and MAC Traceroute (note: the Speaker is also co-author of many relevant drafts in this area).


09:00 - 17:30  B.2.06 Introduction to Service Provider IP Routing

Instructor:Matt Kolon, Juniper Networks

The Introduction to Service Provider IP Routing workshop focuses on Internet router configuration, operation, and troubleshooting. This course also provides a brief review of the operational characteristics of common protocols, including OSPF, IS-IS, BGP, and Multiprotocol Label Switching (MPLS).

The tutorial combines lecture and labs, with significant time allocated for hands-on experience with Internet software configuration, operation, and protocol troubleshooting.

Tutorial Contents

Day Two

* Intermediate-System-to-Intermediate-System (IS-IS) protocol

* Border Gateway Protocol (BGP)

* Multiprotocol Label Switching (MPLS) concepts

* Static and signaled label-switched paths (LSPs)

* Resource Reservation Protocol (RSVP)

* Named paths Explicit Route Objects (ERO)


09:00 - 17:30  B.2.07 MPLS Tutorial

Instructor:Zaheer Aziz, Cisco Systems Inc.

09:00 AM - 12:30 PM MPLS Architecture, MPLS VPN using BGP and Advance topics on MPLS-VPN

Speaker would like to explain fundamentals of MPLS including its architecture and applications. Main focus would be on MPLS-VPN application. This section will cover Multi-Protocol BGP, Deployment scenarios of MPLS-VPN using simple and complex network examples from his past experience working with ISPs. Further advance topics like Carrier Supporting Carriers and Inter-AS MPLS-VPN will also be discussed.

14:00 PM - 17:30 PM MPLS Architecture, MPLS Traffic Engineering, Fault Tolerant and efficient Network design using MPLS Traffic Engineering
Speaker would like to explain fundamentals of MPLS including its architecture and applications. Main focus would be on MPLS based Traffic Engineering (TE). This will cover
RSVP, OSPF and IS-IS extensions, TE Tunnels. This section will describe best practices in designing fault tolerant networks with Link and Node protection using MPLS restoration techniques.

09:00 - 17:30  B.2.08 Building Internet Exchanges

Instructor:Bill Woodcock, Packet Clearing House

This tutorial will provide members of the Internet policy and operations community with the information necessary to build and optimize local and regional Internet exchanges. Bill Woodcock, research director of Packet Clearing House, will spend a half-day covering the organizational, technical, and financial issues which confront Internet service providers who wish to exchange local traffic locally. Specifically, we'll discuss problems like site qualification and selection, business model and financial planning, regulatory and legislative lobbying and compliance, organizational structure and governance, equipment selection, connection methods, requirements for BGP peering, and planning for sustainability. Depending upon the composition and backgrounds of the workshop attendees, we may also delve into issues of developing-country ISP operational economics and appropriate technologies.

09:00 - 17:30  B.2.12 Deploying and Debugging DHCP Services

Instructor:George Vernon Neville-Neil, Nominum Inc.

Abstract of Entry: Deploying a DHCP service in any organization requires a significant amount of effort.  DHCP doesn't just provide a set of addresses to clients, it is used to manage a large percentage of an installation's configuration information.  The service interacts with other critical network infrastructure such as the Domain Name System. New features in the latest versions of DHCP, in particular the fail over protocol, provide significant improvements over prior versions of the protocol but also add complexity to the configuration and deployment process.  This tutorial will provide practical information on deploying DHCP services including real world examples and information on how to debug problems. 

09:00 - 12:30  B.2.09 Comparative analysis of the OSPF and IS-IS

Instructor:Jeff Doyle, Juniper Networks

Network designers and operators are almost universally familiar with OSPF, but most are not as acquainted with IS-IS. As a result, networkers often wonder whether OSPF or IS-IS is the best IGP for their network. The objective of this tutorial is to provide designers and operators with the information necessary to make more informed choices between these two protocols. After a brief look at general link state routing issues, including an examination of how SPF calculations work, a side-by-side comparison of the two protocols is made. The comparisons range from each protocol's implementation of general link state functions and concepts such as database synchronization, designated routers, and areas, to design issues such as scalability, extensibility, and security.


14:00 - 17:30  B.2.11 Don't Copy That Bit

Instructor:Robin Gross, IP JUSTICE

In the wake of recent enforcement of strict new copyright laws, it is increasingly risky to build and distribute hard ware or software that plays digital media.  Russian computer programmer Dimitry Sklyrov spent six weeks in a US jail for writing software that reads Adobe Ebooks in 2001.  Princeton University Professor Edward Felten was threatened with a law suit by the recording industry for revealing the weaknesses in its technology for controlling digital music. All over the world, peer-to-peer software developers face law suits for copyright infringement the illegal uses of their products.  New US laws are working their way abroad to create legal liability for technology companies and their employees for the products they distribute.  This session explains the risks and legal liability for companies and computer programmers who make or sell equipment that copies or plays digital music, movies, books, and other types of intellectual property.




18:00 - 19:00 MANAGING ( THE .nz) SPACE

Chair:Tim John



Back to Top

APRICOT Conference:Wednesday, February 26


08:30 - 09:00 Registration




11:00 - 11:30 A Network Infrastructure that Hides IP Addresses

Keynoter:H. T. Kung, William H. Gates Professor of Computer Science and Electrical Engineering, Division of Engineering and Applied Science, Harvard University; Member of the National Academy of Engineering; Member of the Academia Sinica (in Taiwan)


11:30 - 12:00 Welcome Remarks


12:00 - 12:30 Challenges in Service Deployment

Keynoter:Fred Baker, Chair, ISOC¡ƒ[1]¦„[1]@s Board of Trustees;Cisco Fellow


Conference Tracks:


09:00 - 10:30  Tools and Techniques for Scalable Networks Track

Track Chair: Bill Manning


09:00 - 09:20  MPLS/PWE3/PPVPN Standardization Status

Speaker: Andrew Malis, Vivace Networks, Inc.

Officially representing the MPLS Forum, the speaker will provide a survey
and status report of past, current, and future standardization work in the
Internet Engineering Task Force's MPLS, PWE3 (Pseudo-Wire Edge to Edge
Emulation) and PPVPN (Provider Provisioned Virtual Private Networks)
Working Groups, ITU-T Study Group 13, and the MPLS Forum, to inform the
audience on current standardization activities and predictions on future
activities and work completion.


09:20 - 09:40  Enabling Ethernet Based Multi-Protocol Label Switching Virtual Private Networks

Speaker: Randy Ottman, Metro Ethernet Forum

Service providers currently realize considerable revenue in providing customers with Layer 2 access circuits based on technologies like Frame Relay that serve to interconnect multiple sites.  Implementing Ethernet MPLS-based Layer 2 VPNs will enable service providers to offer similar Layer 2 services to customers over a common packet network.  From a customer¡ƒ[1]¦„[1]@s perspective the service is identical, however, the service provider is able to support VPN traffic together with other traffic, e.g. Internet, on a single infrastructure.  Additionally, the service provider is not responsible for the customer¡ƒ[1]¦„[1]@s routing topology and connectivity.

This presentation will examine the technology needed to enable service providers to build such an infrastructure today and will review the Ethernet MPLS-based VPN standards efforts that are currently underway with standards bodies, such as the IETF.

Attendees will learn:
*How the use of MPLS and enhanced Quality of Service (QoS) capabilities can provide Layer 2 VPN service over a single common packet core network at service levels equal to, or surpassing, the customer¡ƒ[1]¦„[1]@s experience with traditional Layer 2 VPNs.
*How network management platforms can ease the management burden of this architecture by enabling rapid provisioning and robust management of the network.
*How deterministic QoS will give service providers much more flexibility in rolling out VPNs than was previously possible.


09:40 - 10:00  MPLS Architectural Considerations for OAM

Speaker: Monique Morrow, Cisco Systems, Inc.

Focus of the presentation is a ¡ƒ[1]§tool box¡ƒ[1]¨ approach when managing MPLS-based networks. One tool does not fit all is the premise of the presentation itself. Presentation compares and contrasts MPLS, IP, ATM architectures as well as standards (emerging) such as ITU-T y.1711 and IETF MPLS LSP PING. Architectural topics include dynamic and static routing, equal-cost-multipath, label stacking and penultimate hop popping and relationship between control and data planes. The presentation explores tool applicability within MPLS networks and includes overview of MIBs, MPLS service MIBS and examines pseudowire MIB relationships.


10:30 - 11:00  Morning Tea


Back to Top


Conference Tracks:


14:00 - 15:30  Tools and Techniques for Scalable Networks Track


14:00 - 14:20  Dynamic routing in IPSec VPNs

Speaker:Ahed Alkhatib, Nortel Networks

The advantages of the Internet for business communications have become apparent to most enterprises and Service Providers delivering Managed IP VPN service solutions. ±[1]p While providing a standard and cost efficient means of communications, the Internet (and IP) presents its own set of challenges, especially when the need for secure communications is introduced.

Businesses concerned with delivering secure communications across the Internet or Service provider IP networks have deployed IP Virtual Private Networks (IP VPNs) in conjunction with firewalls and other security applications to protect their data carried via IP.

But the IPSec protocol that underlies these IP VPNs providing the encryption and tunneling services for secure end-to-end communications does not define a method for exchange of dynamic routing information across secure tunnels. ±[1]p This means that the dynamic routing protocols so important in making IP networks scalable and manageable cannot easily be overlaid onto an enterprise¡ƒ[1]¦„[1]@s secure IPSec network infrastructure.

This presentation will address the use of IPSec to secure communications of an IP network and address how the dynamic exchange of routing information between the sites of a VPN can significantly simplify the management and improve the scale of the VPN.


14:20 - 14:40  True Non-stop Forwarding for Routers

Speaker:Matt Kolon, Juniper Networks

This presentation focuses on the components required for routers to exhibit true non-stop forwarding in the face of maintenance intervals, component failure or software error. The concepts of protocol graceful restart (with reference to the details of the procedures for OSPF, ISIS, and BGP), hitless control plane failover, and forwarding engine mirroring are examined and combined to produce a model for high router availability.


14:40 - 15:00  Inter-Autonomous Systems

Speaker:Rajiv Asati, Cisco Systems

Inter-AS is one of the ways for (MPLS-VPN) Service Providers to provide seamless VPN connectivity to a VPN customer, that has sites located in the areas not served by a single Service Provider. Inter-AS has become highly important in today's time since lot of Service Providers have deployed MPLS-VPN and face a continuing challenge of satisfying their customers' requirements while working with other service providers

This presentation is aimed to demystify various ways of deploying Inter-AS and discussing the pros and cons of each. The presentation is broken down in the following -
*what is Inter-AS
*Building Blocks
*Deployment Techniques
*RT rewrite


15:30 - 16:00  Afternoon Tea


16:00 - 17:30  Tools and Techniques for Scalable Networks Track


16:00 - 16:20  MPLS Applications - experience from the field

Speaker:Roger Geerts, Juniper Networks

There is continuing growth in MPLS infrastructure throughout the region. Together with this, there is also an increasing number of  applications and features available. This sessions discusses some of the trends, challenges and design options that Service Providers face as they rollout these MPLS applications. With particular focus on -

* MPLS Traffic Engineering


* Layer 3 MPLS VPNs

* Layer 2 MPLS VPNs


16:20 - 16:40  Building Next Generation Networks Using L2TPv3 VPN Technology 

Speaker: Ray Irani, Cisco Systems, Inc.

¡ƒ[1]§Discuss the fundamental concepts and architectural design principles of Layer 2 Tunneling Protocol version 3 (L2TPv3) VPN which allows service providers and large enterprises to leverage their existing native IP core networks to offer high-speed Layer 2 tunneling or VPN services to end-user customers without further increasing their expenditure for capital equipment and quickly enabling new IP Services to be deployed.¡ƒ[1]¨


 16:40 - 17:00  Layer Two Carriage and Interworking over Packet Switched Networks

Speaker: Andrew Malis, Vivace Networks, Inc.

This talk will discuss ongoing and ground-breaking work in the Internet Engineering Task Force's PWE3 (Pseudo-Wire Edge to Edge Emulation) and PPVPN (Provider Provisioned Virtual Private Networks) Working Groups on carrying Layer 2 protocols (ATM, Frame Relay, Ethernet) over IP- and MPLS-based networks, including interworking between these Layer 2 protocols.  This work will allow service providers to provide Layer 2 services and VPNs using converged IP/MPLS-based infrastructures.  The talk will include background on Layer 2 VPNs and interworking, current work on layer 2 carriage and interoperation over IP/MPLS-based networks, and future work and outstanding issues that still need to be solved.


09:00 - 10:30  Content and Commerce

Tract Chair: Tom Vest


09:00 - 09:20  Convergence of Offline and Online ±[1]p Content Business Model and Service Architecture

Speaker:Joseph Kwon, Tech System Technology Ltd.


*Definition and Realities of current content on demand (COD) business

*Offline content on demand (COD) business models in Korea

*Online content on demand (COD) business models in Korea

*Comparison and contrast of offline and online content on demand (COD) business


*Definition and overview of convergent digital cinema (D-Cinema) in South Korea

*Service architecture of digital cinema (D-Cinema)-Lycos Cinema case study

*Technical challenges of creating commercial quality D-Cinema

*Business issues related with D-Cinema in the case of Lycos Cinema

*Future of digital cinema


09:20 - 09:40  Content, Applications, streaming and multimedia infrastructure

Case Study: Video over Broadband for residential customers

Speaker: Andy Miller, Juniper Networks

*Case Study for Video over Broadband deployment

*Case Study for Ethernet to the home and DSL technologies

*Learn about the protocols technologies involved

*Get a first hand look at the challenges involved and how they were addressed


09:40 - 10:00  The Radicalism of Peer-to-Peer Networking

Speaker:Jeff Doyle, Juniper Networks

The peer-to-peer model was one of the primary characteristics of the Internet as it was originally envisioned. Yet over the years, peer-to-peer has been almost completely replaced by the client-server model. Client-server was a better fit for traditional business models, in which centralized control is essential to success. Until recently client-server was also a better fit for technological realities in which relatively low-powered, low-memory PCs, connected over low-bandwidth access links, relied on the greater capabilities of servers. The present dominance of the client-server model is reflected in the World Wide Web model, asymmetric access technologies such as ADSL, and even in the way many modern service providers engineer their networks.

Napster, however, demonstrated the potential or peer-to-peer networking. Combining the best of both client-server and per-to-peer, Napster proved wildly popular. It also was perceived as a serious threat to traditional business models by putting content control into the hands of users. Traditional business has so far been successful in closing Napster down, but the lessons have been learned. With the CPU power and memory capacity of modern PCs, and with the growing availability of broadband access, peer-to-peer networking is poised to return the Internet to what it once was intended to be: an open, powerful set of distributed applications, distributed content, and distributed data processing.


10:00 - 10:20  Why your next phone system will be free(ly licensed)

Speaker:David Sugar, GNU Project

Original research and development in computer telephony and next generation telephone networks is being conducted today in Free Software as part of the GNU project under GNU Bayonne. The Internet itself was founded on the development of free software and open implementations of open protocols.  GNU Bayonne and related work can similarly revolution the way current and next generation telephony services are created and deployed both from the perspective of enterprises and commercial carriers.
As the principle author of GNU Bayonne and the GNU rtp stack for VoIP applications, I will introduce this project, how it relates other development in Free Software and the GNU project, and how it fits into the overall strategy of using free software and how to use GNU Bayonne with Free Software platforms such as GNU/Linux for developing enterprise and carrier class telephony solutions for current and next generation IP based telephone networks.
In addition, this talk will cover the practical aspects of what GNU Bayonne is, how it operates, and what the fundimental architecture is like.  GNU Bayonne is actually composed of three servers and each of these (Bayonne, Olorin, and Babylon) will be discussed in detail, including their architecture and how to configure, operate, and create applications for GNU Bayonne servers to produce real-world telephony
solutions on free operating systems.  The scripting language of GNU Bayonne will be covered, as well as how to integrate GNU Bayonne servers with traditional scripting languages such as tcl, Perl, Python, and Guile.

GNU Bayonne is used today to deliver real working solutions, whether we
are talking about cellular carriers using it for voice applications, a commercial carrier in the UK for volume debit card calling, or the effort to create European-wide -government services for the blind.  Most recently we have introduced the capability to use GNU Bayonne as a complete freely licensed small office telephone system.  For this reason, GNU Bayonne will be demonstrated live as part of this presentation so that people can see it is real, it works, and it can provide very real solutions.  Examples and scripted applications used for real world applications such as voice mail and debit calling will be presented.


10:30 - 11:00  Morning Tea


11:00 - 12:30  APRICOT Plenary


14:00 - 15:30  Content and Commerce


14:00 - 14:20  Internet Traffic Economics

Speaker:Bill Woodcock, Packet Clearing House

This session will focus on the economic transactions associated with peering and transit, from the point of view of Internet service provider and Internet exchange financial planning. ±[1]p Methods of performing cost/benefit comparison and optimization between traffic delivery methods will be discussed, as well as more general principles for the creation of sustainable business models within the turbulent Internet economy


14:20 - 14:40  The Design of Anti-SPAM Knowledge-Based System

Speaker:Chien-Liang Liu, Department of Computer and Information Science

As e-mail services become popular on Internet, general problems such as UBE/UCE and virus mails have occurred more and more. Many client-side facilities have been developed to help users deal with such problems. However, since most users do not have enough resources and expertise to track these abusing and make the necessary changes adaptively, few (if any) could benefit from applying these facilities. Different server environment and topology will lead to different results. Therefore, we need an intelligent system that can help us to reduce the load and complexity. Ontologies become an important mechanism to build information systems. The role of ontologies is to capture domain knowledge and provide a commonly agreed upon understanding of a domain. The advantages include the sharing and re-use of knowledge, and the better engineering of knowledge-based systems with respect to acquisition, verification and maintenance. In this paper, we adopt the METHONOLOGY methodology to build anti-SPAM tools ontology. Furthermore, we follow the ontology hierarchy, concept relationship, and constraints, etc., to design the GUI knowledge acquisition form to extract domain expert¡ƒ[1]¦„[1]@s knowledge. We have built a knowledge-based system prototype, which can be used to help system administrators choose appropriate anti-SPAM tools according to their environment.


14:40 - 15:00  APIX update

Speaker:Tom Vest, AOLTW


15:00 - 15:20  Internet Filtering: Implementations, Accuracy, and Best Practices

Speaker:Benjamin Edelman, Berkman Center for Internet & Society

Numerous governments already require Internet filtering within their respective territories, while others are considering the practice. This session will evaluate possible methods of complying with government demands to block objectionable content, considering case studies of filtering in China, Saudi Arabia, Singapore, and Vietnam, as well as Pennsylvania (in the United States). The session will consider the strengths and weaknesses of each method of filtering, including cost, complexity, reliability, and granularity. Special attention will be devoted to accuracy, error prevention and correction, and transparency


16:00 - 17:30  Content and Commerce


16:00 - 16:20  Revenue Assurance Solution Model for MMORPG(Massively Multiplayer Online Role Playing Game)

 Speaker:Simon Kim, Tech System Technology Ltd.


*Definition and Realities of MMORPG business & technology

*MMORPG business models in Korea

*Service Architecture of MMORPG

*Service Architecture of MMORPG - Case Study

*Technical issue for real-time usage data tracking

*Technical challenges of creating commercial quality - Case Study

*Business issues related with Revenue Assurance

*Future revenue assurance model for MMORPG service


16:20 - 16:40  Native Language Internet Address Solution

Speaker:Kang-Sik Cheon, Netpia.com, Inc.

*Definition of Internet Address: its requirements, influential factors and characteristics
* Development of Internet Address System
*Definition of Native Language Internet Address
*Significant Characteristics of NLIA: Generic solution based on DNS, Independence etc.
*Technical Service Flow
*Different models of application: e-mail, mobile solution, numeric Internet Address, etc.
*Native Language E-mail Address: service flow
*Case Study: Korea
*Conclusion and our suggestion regarding the future direction of Internet Address.

16:40 - 17:00  Pitfalls of Internationalized Domain Names
Speaker:David Lawrence, Nominum, Inc.

This talk will focus on the pitfalls to expect with the introduction of Internationalized Domain Names to the Internet.  It will cover the many, ways in which domain names are used and hence the areas where computer professionals will have to be acutely aware of how the introduction of IDNs are likely to impact them

17:00 - 17:20  The Development of a Monitoring & Measuring System for Video Streaming

Speaker:Stevenson Huang, Chunghwa Telecom Co., Ltd. 


09:00 - 10:30 First, Metro and Last Mile Technologies

Track Chair:Gigi Wang


09:00 - 09:20  Digital Subscriber Line (DSL) End-to-End Architecture

Speaker:Amante Alvaran, GlobeQuest

Digital Subscriber Line (DSL) is a technology that enables Telecommunication Companies and Internet Service Providers to deliver high-speed data access and a variety of services using the same copper pair facility used by our existing Public Switch Telephone Network (PSTN).  Like existing Internet infrastructures such as dial-up, cable, wireless, T1, and E1, DSL by itself is a transmission technology that can compete to provide end-users solution needs. Among its applications include services such as high-speed Internet access, Intranet, leased line, and voice, VPN, and video on demand; the technical and business aspect of which shall be discussed in brief.
This paper focuses on three primary aspect of this technology, (1) physical infrastructure, the how of setting-up the system to support various services, (2) operations management and support areas including helpdesk, fault management, and administration, (3) benefits to the end-users and the company.

09:20 - 09:40  DSL service models & architectures
Speaker: Simon Newstead, Juniper Networks

DSL service models & architectures

1/ Review of existing product & service models

2/ Technical discussion and comparison on VRs, L2TP tunneling, MPLS

3/ Detailed look at provisioning aspects, autoconfig/autosensing techniques

using RADIUS

4/ New directions; IPv6, IP-SEC access, EAP etc


09:40 - 10:00  Broadband first/last mile access technologies

Speaker:Simon Williams, Redback Networks Inc.

The growth of Internet users in the Asia Pacific market has been driven by the demand for broadband services and high-speed access. Intensifying competition among Internet service providers and telecommunication companies is driving the growth in broadband subscriptions in South Korea, Taiwan, Singapore, Hong Kong, Australia and New Zealand.

This leads to the significance of edge router technology in delivering IP services. Edge routers lower operating costs, delivering superior scalability and throughput to support a growing subscriber base and increasingly complex services. Edge router technology, such as Redback¡ƒ[1]¦„[1]@s SmartEdge platform, delivers IP-based services with carrier-grade reliability, security, and scalability.

Business benefits for carriers and service providers using edge router technology include: highly scalable deployment and configuration of IP services, high return on investment, reduced operating costs, reduced labor costs and better utilization of limited resources.

By the end of 2003, Asia will have more than 250 million Internet users with broadband services in 8.4 million Chinese households. By 2008, the market will grow to 36.7 million households in China alone.


This session will examine for service providers in the region how to improve their network architectures, specifically edge networks and how to increase their profit out of this part of networks.


10:30 - 11:00  Morning Tea


11:00 - 12:30  APRICOT Plenary


14:00 - 15:30  First, Metro and Last Mile Technologies


14:00 - 14:20  Wireless Packet Core Networks - Design considerations and Business requirements

Speaker:Andrew Roberts, Nortel Networks

Wireless service providers are confronted with a huge challenge: - constructing a network infrastructure to support their wireless networks today, which is evolvable to support new wireless access standards and applications in the future.

What are the issues and technologies that will take the circuit emulation services of today and drive them into the converged voice and data wireless networks of tomorrow? Resiliency and reliability, huge potential bandwidth growth, support for Quality of Service, support for new access interfaces, ATM to MPLS core evolution strategy and cost are but some of the challenges faced by wireless network operators.

This presentation will examine the requirements for core data infrastructures for support of wireless networks.  Core network requirements for wireless technologies including GSM and GPRS, CDMA and 1xRTT and third generation wireless technologies will be outlined.  Finally, considerations for equipment selection and network architecture will be detailed


14:20 - 14:40  Mobile and wireless technologies - Increasing mobility, performance and security

Speaker:Elektra Mararian, iPass Asia Pte Ltd.

Enterprise purchases account for a large percentage of laptops and PDA sales, as companies are tapping on mobile and wireless technologies to increase mobility and productivity of their employees. ±[1]p Nevertheless, statistics show that end-users are still skeptical in using these technologies, the main concern being security.

Today, there are different solutions in the market that allow enterprise customers to securely access applications located behind corporate firewalls, such as e-mail, corporate databases and internal Web applications, via third-generation (3G) CDMA2000 and UMTS wireless networks and wireless local area networks (WLANs) at both enterprise locations as well as public "hotspots". ±[1]p This presentation will discuss the technologies that enhance mobility of the enterprise, specifically WLAN technology. ±[1]p In addition, she will address security issues, cross-network authentication, the ability to rate networks and transaction settlements, firewalls, as well as meeting IT security and policy management requirements. ±[1]p She will conclude her discussion with some tips on how technical engineers can better choose the most suitable solutions for their companies.


14:40 - 15:00  Wireless hotspots - service control infrastructure

Speaker:Simon Newstead, Juniper Networks

Wireless hotspots - service control infrastructure:

1/ Looks at mechanisms to deploy wholesale and retail services for 802.11 public hotspots

2/ Examines technical aspects & operation - DHCP, security, IP-SEC tunneling, RADIUS, COPS

3/ Discusses real world case studies and operational experiences

15:30 - 16:00  Afternoon Tea

16:00 - 17:30  First, Metro and Last Mile Technologies

16:00 - 16:20  Ethernet: More than Just Cheap Access

Speaker:Randy Ottman, Metro Ethernet Forum

During the height of the Internet boom, service providers heavily invested in the build out of their long-haul transport infrastructures. ±[1]p However, the exuberance spurred on by predictions of exponential data traffic growth overshot actual demand, resulting in rapid revenue and price declines and the failure of numerous service providers. ±[1]p Today, the reality is that service providers are under pressure to cut capital expenditures, increase profits, and offer new services to meet the increasing demand for lower cost - higher capacity services in the first mile. ±[1]p In response, service providers are rolling out metro Ethernet services. However, metro Ethernet has the danger of simply being considered just cheap access, resulting in commodity pricing and low service provider profits. The key is to provide enhanced services with metro Ethernet that allow better, faster, cheaper service for the customer while providing an important source of revenue, profit, and competitive differentiation for the service provider. ±[1]p

During this presentation, the speaker will discuss how the lack of bandwidth available at the edge stifled service demand despite the abundance of bandwidth in the core and the resulting economic impact on the market. The Speaker will also examine a new unified transport infrastructure that allows existing Frame Relay and ATM intranets to connect to endpoints on Ethernet services. Attendees will learn:

*How the compelling combination of speed, scalability, operational simplicity, and economics is driving Ethernet into metro networks.

*The market opportunity available with connecting existing Frame Relay and ATM networks to metro Ethernet networks.

*A battle plan for increasing service revenue and improving business and competitive stance in order to defend against low cost and emerging competitors.


16:20 - 16:40  Testing Challenges and Solutions for MPLS-based Metro Networks

Speaker:Samuel Woo, Agilent Technologies

Today, MPLS technology is becoming more widely accepted and deployed, and now being suggested for Metro Networks. As a result, Service Providers now have the opportunity to offer new revenue-generating services, as well as the ability to implement Service Level Agreements more accurately. ±[1]p Virtual Private Network service is one such key service and both Layer 3 and Layer 2 VPN services are gaining popularity. As Service Providers move towards deploying these services, it is essential to verify that the network equipment to be deployed can meet the functionality, scalability, reliability and interoperability needs of the Metro Networks. This presentation will explore the testing requirements of the network equipment used in Metro Networks and the techniques to verify the same.


16:40 - 17:00 Ethernet Access Technologies

Speaker:Craig Stevens, Nortel Networks

Ethernet technologies are becoming the access method of choice in next
generation service provider access networks.  The success of Ethernet can partly be attributed to its universal availability on network devices and its ease of operation.
Delivering a full service offering over Ethernet however can be a challenge for a service provider as the technology has evolved from campus networks. Customer separation, demarcation, scaling, authentication, authorization, accounting, service level assurance and service provisioning while common in traditional access technologies (i.e. ATM,

FR, and Leased Line) can be difficult to implement over an Ethernet access network.
This presentation will look at some of the technologies available now and in the future that enable a service provider to offer full services over Ethernet access networks.

Common technologies such as PPPoE will be discussed in terms of their benefits and disadvantages.  We will then go on to examine newer technologies like EAP and GVPLS and how they may be enhanced in the future to provide full services to the end user. For anybody contemplating or has already built an Ethernet access network this presentation should provide information that will be helpful in deciding what technologies they should use to implement a successful service.


17:00 - 17:20 Extending the metro LAN beyond the CBD ±[1]p

Speaker:Daryl Horsfall, Haliplex Communication systems

A technical presentation describing a multi vendor application of ITU X.86, Ethernet over SDH (LAPS) used to extend the fetaures and benefits of the metro-LAN beyond the CBD to SMEs in the regional areas utilising the SDH/SONET network infrastructure.


14:00 - 17:30 EPP and ENUM Operation Model


14:00 - 15:30 Case Study: Extensible Provisioning Protocol (EPP) for Domain Name Registry-Registrar Operation


Speaker:CNNIC: Jason Chen

Neteka:Edmon Chung



*Technical background and environment

*Data Integrity and Security

*Operation Efficiency

*Multilingual Capability

*Registry-Registrar Interactivity

*Future Outlook


15:30 - 16:00 Afternoon Tea


16:00 - 17:30 Past, Present and future development of ENUM in perspective regions


Speaker:Neustar: James Yu

KRNIC: Sungwoo Shin

TWNIC: Ching Chiao

JPRS: Hirofumi Hotta

*What had happened

*Work-in-Progress ±[1]p Report from Perspective Regions

*Technical Breakthrough

*Value-Added SIP Services

*Exploring Registry-Registrar Business Model

*Coming up in 2003





17:30 - 19:00 ICANN Regional At Large Organization Formation

Chair:Izumi Aizu


APRICOT Conference:Thursday, February 27




09:00 - 09:30 ICANN and the Global Internet: Looking Forward

Keynoter:Stuart Lynn, President and CEO of ICANN


09:30 - 10:00 Winning in Internet Era

Keynoter:Stan Shih, Chairman, CEO & Co-Founder of The Acer Group


09:30 - 10:00 Global Standards, Local Implementation

Keynoter:Masanobu Katoh, ICANN Board, IDN Committee Chair; Senior Group Vice President, Legal & Industry Relations Group, and Export Control Group, Fujitsu Limited


10:30 - 11:00 Morning Tea


Conference Tracks:


11:00 - 17:30  Tools and Techniques for Scalable Networks

Track Chair: Bill Manning


11:00 - 11:20  Guaranteeing QoS on IP services through router network and MPLS network

Speaker: Louis Chan, Juniper Networks

QOS is a topic, which has been discussed quite often, has yet widely implemented in large scale. This presentation will highlight the challenge, the consideration, and practical ways to implement QOS in a routed or MPLS enabled network


11:20 - 11:40  Providing Hard QoS and Service Level Agreements in IP/MPLS-based Networks

Speaker:Andrew Malis, Vivace Networks, Inc.

This talk discusses the requirements for providing hard ATM-style QoS and SLAs in IP/MPLS-based network infrastructures to support end user applications that currently require the use of Frame Relay and ATM networks, and the standards and mechanisms that can be used in IP/MPLS networks to make this possible.  The purpose is to allow stand-alone ATM
and Frame Relay networks to be replaced by converged IP/MPLS networks, or to allow IP service providers to offer services to their customers beyond just best-effort connectivity and Internet access.


11:40 - 12:00  IP CoS for Successful VoIP

Speaker:Matt Kolon, Juniper Networks

This presentation examines the demands that VoIP data and other challenging classes of traffic place on the network, and explains the protocol and router-based mechanisms by which IP traffic can be classed and treated according to service level. The paper then explains each of the steps necessary to evoke a specific class of service from the network infrastructure for a particular traffic flow. Finally, a brief case study will be presented that shows a real deployment scenario, complete with the configuration syntax that will support true multiple service delivery in an IP environment


14:00 - 14:20  Policy Based Network Management

Speaker:Ray Hunt, University of Canterbury, New Zealand

To successfully deploy applications, organisations need an intelligent network infrastructure and network systems management. With the advent of Policy Based Network Management (PBNM), organisations can bind policies to the allocation of network resources. Organisations require both signalled and provisioned Quality of Service (QoS) through policies to achieve an application-optimised network. PBNM describes and implements high-level policies to the entire network rather than managing each device individually. It deploys and automates a set of policies that further an organisation's network management objectives by dictating how users, applications, and organisations can access and use network resources. This paper features the PBNM architecture using common open policy service (COPS), various components and protocols to carry out the implementation.


14:20 - 14:40  A New Media Access Control Technology

Speaker: Shao-shi Yang, Chung-hwa Telecom. Labs

Statistical token is a random number produced by statistical token generator, which is a random number generator (RNG) of asymmetry. System using statistical token as the method of channel access, this system contains randomness and system¡ƒ[1]¦„[1]@s collision probability is lower. Statistical token generator contains adjustability, can produce varied distributions, result in system throughput exceedsthe throughput limit of traditional contention protocol system


14:40 - 15:00  Logical Provider Edge: A Decoupled PE approach to Provider-

Provisioned VPLS

Speaker: Craig Stevens, Nortel Networks

Generic virtual private LAN services (GVPLS) have become a hot topic in networking circles recently. ±[1]p In particular, a method has been proposed to provide IEEE 802.1D compliant bridged Ethernet services using an MPLS-based provider provisioned VPN (PPVPN) approach. Some very interesting challenges arise out of the dual equirements of providing a secure customer-facing demarcation at the edge and ±[1]p of scaling the network to support a very large, non-aggregatable MAC address space. A generic solution to this challenge has been proposed called "Decoupled Provider Edge". In essence, this approach splits the provider edge (PE) into two parts: a ustomer-facing demarcation device which stores and manages MAC addresses and service definitions; and a core PE device that manages core MPLS connectivity and reachability. The first implementation of this approach (Logical Provider Edge or LPE) is already available and has been shown to scale to hundreds of thousands of end-user services in its initial implementation.

This paper addresses the question "How does Logical Provider Edge (LPE) meet Service Provider requirements for Virtual Private LAN Services (VPLS)?". ±[1]p Service Provider requirements, as submitted to the IETF, are first detailed. ±[1]p The LPE implementation is reviewed, with emphasis on practical deployment implications, on service demarcation and on service provisioning. Comparisons with various VPLS approaches are provided, along with options for interworking and current work towards convergence in the IETF.

15:30 - 16:00 Afternoon Tea

16:00 - 16:20 Carrier Supporting Carrier (CsC)

Speaker: Rajiv Asati, Cisco Systems

Although Carrier Supporting Carrier (aka CsC) is not a new topic, it has become quite hot now-a-days as more and more MPLS/VPN service providers deploy CsC to insulate their backbones from unnecessary customer routes. CsC is also provides the framework for "Heirarchical VPN". This presentation is aimed to explain the nitty-gritty of CsC and various CsC deployment scenarios. I have broken down the presentation in the following sections

*World with/out CsC
*What do I need to do to enable CsC
*CsC Deployement techniques
*Sample Configs


16:20 - 16:40 Multilingual Domain Names: Deployment, Transition & Techno-policy Considerations

Speaker:Edmon Chung, Neteka Inc.

The IDN standards have recently been approved by the IETF. ±[1]p While this is an important milestone towards general availability of multilingual domain names, there is a common misconception among domain registries and registrars that once a proposed IETF standard (in the form of an RFC: Request for Comments) for Internationalized domain names (IDN) is published, registries will immediately be able to accept registrations and deliver a working multilingual domain names to end-users. ±[1]p In fact, the publishing of RFCs for IDN is but the beginning of a long transition towards a common and universal multilingual namespace.


This presentation will look into two of the often-overlooked issues about the deployment of multilingual domain names:

1)     Backwards compatibility with the existing installed base of DNS clients

2)     Character equivalence and techno-policy issues. ±[1]p Different approaches to the two issues along with current deployments at different registries will be presented and explained. ±[1]p What roles and responsibilities the domain registry should play technically would also be discussed.


16:40 - 17:00 Web Capacity Assessment of eService Platform

 Speaker:Gary Wong ±[1]p


Back to Top


11:00 - 17:30 Practical Infrastructure Experiences in Asia Pacific

Tract Chair:Kenny Huang


11:00 - 11:20 Asian Broadband Update

Speaker:Andrew Coward, Juniper Networks

An update on the Applications and services offered through Broadband in Asia Pacific.

This session will provide an update on the models and methods of broadband deployed in Asia today, including retail and wholesale. ±[1]p The session will cover how video, Multicast, IP telephony and IPv6 introduction is changing broadband deployment models, and how service providers are integrating DSL, Metro and wireless into common network infrastructure.


11:20 - 11:40 A Comparative Study of Broadband in Asia: Deployment and Policy

Speaker:Izumi Aizu, Asia Network Research

¡ƒ[1]§Broadband¡ƒ[1]¨ has become a buzzword in recent years. East Asia leads broadband penetration in the world. Korea, Hong Kong, Taiwan and Singapore are regarded as the leading ¡ƒ[1]§Asian Tiger¡ƒ[1]¨ countries with significant amounts of export by their electronics industry, and also as the ¡ƒ[1]§Net Tigers¡ƒ[1]¨ when it comes to the Internet. In the case of broadband, however, Korea is the sole front runner followed by Hong Kong, while Singapore and Japan are lagging behind. What factors exist behind these differences?

Level of economy is not the biggest factor to determine broadband development, nor does government policy to promote broadband have much influence. Rather, social factors such as political situation, people¡ƒ[1]¦„[1]@s mentality and cultural context may play more significant roles than economy and policy.

In Korea, bottom-up, grass-roots entrepreneurship and aggressive Netizenship contributed the most to its rapid explosion of broadband, coupled with accidental excess of bandwidth supply, fierce market competition and freedom-hungry citizens¡ƒ[1]¦„[1]@ activities. The conservative and rigid institutional frameworks of Singapore and Japan may be the biggest barriers that suppress the healthy development of broadband applications, services and the market.


11:40 - 12:00 Enabling a True "Blue" Pan-Asian Internet eXchange

Speaker:Keng Hian Chong, C2C INFOCOM CABLE (TAIWAN) LTD


14:00 - 14:20 Telecommunications and Economic Development. A Prospective Approach for Nigeria

Speaker:Olayinka Ayeni, Corporate Intelligence Ltd. / University of Lagos, Nigeria
Telecommunications formerly seen as a mere public utility has now been proved to be a catalyst for a thrust into the top ranks of global economy. In most developing countries, however telecommunications continue to fall short of demand. The essence of overcoming these pervasive shortfalls, particularly in Nigeria, is the focus of this research work.  Notably, a growing number of governments have been undertaking major reforms of the telecommunications sector.  Traditional state monopolies are giving way to more flexible market-oriented structures featuring increased competition and private sector participation. Quite unfortunately, there is continued shortage of sound analytical material and associated empirical data on the links between telecommunications and economic development.  Therefore, governments are still wrestling with the development significance of telecommunications, as such, have limited means of addressing and overcoming the shortcomings of this sector.

14:20 - 14:40 Alternate Connectivity Solution : Critical Challenge for Developing Countries

Speaker:Shahid Akbar, Information Communication & Technology Development Program, Bangladesh

Bangladesh, like many other developing countries has the infrastructure problem for promotion / utilization of ICT & related service for education and information dissemination. The infrastructure problems kept the major portion of population living in the rural areas far away from the new revolution of Internet and ICT facilities, both educational & Social / economic development perspective.


14:40 - 15:00 Simplifying Service Delivery over a Shared Infrastructure

Speaker:Andy Miller, Juniper Networks

.  Examine the challenges associated with service delivery across a shared infrastructure
.  Present an approach towards network design that simplifies service delivery
.  How this approach also allows "mass customization" while delivering guaranteed levels of service


15:30- 16:00 Afternoon Tea


16:00 - 16:20 Deployment of 10Gb/s IP/Optical backbone in SuperSINET: Technologies, Design, and Deployment Scenarios

Speaker:Mallik Tatipamula, Cisco Systems, Inc.

There is a growing need for high-speed, high capacity networks amongst the academic and research community, as grid applications become increasingly important. This paper presents the design, deployment and operation of 10Gb/s SuperSINET network. We also discuss some of the advanced concepts in next generation IP/Optical networking that are part of the early deployment in SuperSINET. We examine some of the applications, that are being addressed by SuperSINET


16:20 - 16:40 Service Provider Packetized Voice Infrastructures (focused on Asian SP)

Speaker:Salman Asadullah, Cisco Systems, Inc.

This sessions would cover SP packetized voice network architectures and it's components.  This session would also list some of the biggest SP packetized voice networks and what are the different applications they are deploying over their networks.  This session would also focus on what services these SPs are offering to their customers over their packetized voice networks



16:40 - 17:00 The operation model for the research and education infrastructure in Taiwan

Speaker:Simon C. Lin, Academia Sinica


Back to Top


11:00 - 17:30 Secure Scalable and Smoothly Operating Services

Tract Chair: Barbara Fraser


11:00 - 11:20 Evaluate network performance with Service Assurance Agent (SAA)

Speaker:Emmanuel Tychon, Cisco Systems, Inc.

SAA is a performance evaluation and monitoring function embedded into Cisco IOS. This presentation will focus on the functions of SAA that can be useful to monitor a Service Provider network, as well as some specificites related to performance, scalability and limitations. At the end, some best practice and design recommendations will shed some light on how to deploy it efficiently.
Sidenote: I made a similar tutorial at RIPE-43, and the feedback was excellent. The session was design for 3 hours. A detailed list of topics to be covered can be provided on request.


11:20 - 11:40 A Study on How to Enhance the Quality of Organizational Operations in the American Network Service Organizations

Speaker: Feng-Hsiung Hou, Department of Business Administration, Nanya Institute of Technology, Jungli, Taiwan.

The purpose of this research was to explore how to enhance the quality of organizational operations in American network service organizations. This study may offer important information about how to successfully enhance the quality of organizational operations for the American network service organizations. The research question was: What are the best ways for enhance the quality of organizational operations for the American network service organizations?


11:40 - 12:00 Security Architectures in Wireless and Mobile Networks

Speaker: Ray Hunt, University of Canterbury, New Zealand

The growth and development of wireless networks requires that careful consideration be given to security issues. The original WEP security architecture proposed for IEEE 802.11 networks suffers from significant limitations and recent developments with new layered security models such as IEEE802.1x, EAP, Wireless CHAP, LEAP, TLS, TTLS, WEP2 and others provides a more secure architecture for wireless networking. This paper discusses the implementation and operation of these new security architectures addressing in particular their performance, operational and management impact. The paper also provides a set of possible operating and management parameters



14:00 PM - 14:20 PM Implementing flexible billing plans for Internet and VPN services

Speaker: Ian Quinn, Juniper Networks

Billing is a critical component of ISP operations, providing the ability to:

*Match revenues and usage to the underlying cost of providing the service

*Target different market niches, fully benefiting from the value that different customer receive from services

*Compete effectively with other operators

With it's mix of local content and high costs of connecting to the US and Europe, Asia has it's own challenges and opportunities in the area of service creation and billing. ±[1]p This session will look at these issues and options for addressing them in today's IP infrastructure



14:20 - 14:40 EPP and its Implications on Domain Registry System Management & Operations

Speaker: Edmon Chung, Neteka Inc.

There are 3 main components of a domain registry system: i) Domain Registration (Provisioning); ii) Domain Resolution (DNS Servers); and iii) Administration & Management (WHOIS & Database Management). ±[1]p The EPP protocol really only directly impacts the Domain Registration or Provisioning portion, however, its indirect implications to systems management and data integrity considerations as well as transition concerns are broad and critical.

This presentation will provide a brief history of domain registry systems from exclusive registries to the more distributed structure, and its relevance to the EPP protocol and the management of Registry-Registrar architecture. ±[1]p Furthering the introduction, some basic challenges and experience in the deployment of EPP would be examined follow by discussions on the implications and considerations for other parts of the registry system, such as management interfaces and reporting.

Implications for the deployment of multilingual domain names, more specifically on the provision for reserved variances due to character equivalence issues (such as mapping between Simplified and Traditional Chinese) will also be discussed.


14:40 - 15:00 10GigaBit  Ethernet Standard Progress in Development and Deployment

Speaker: Gary Wong


15:30 - 16:00 Afternoon Tea


16:00 - 16:20 DNS & BIND

Speaker: Paul Vixie, Vixie Enterprise


16:20 - 16:40 Defending DDOS attack on large scale backbone

Speaker: Seo Boon Ng, Cisco Systems; Wei Wei, China Telecom

- Tracking and Monitoring DDOS
- Description of DDOS attack seen on Chinanet - Case study

- Method to effectively counter the attack
- Other possible solution that vendor can consider:
  * Possible enhancement to routing structure?        
  * Policy routing?                                                            
  * source address filter?                                                     
  * traffic engineering?


16:40 - 17:00 Overview of Securing IP Data Networks

Speaker: Ross Callon, Juniper Networks

This presentation will give an overview of ways that IP data networks
are vulnerable to attack, and network features which can be deployed
to improve the security of networks.
Topics to be discussed include:
* Denial of Service (DOS)
* Address Accountability -- preventing source address spoofing
* Protecting Access to the Router
* Security the routing protocols
* Protecting the Network user 


Back to Top


B.ap.01 APNIC Training Monday, February 24


Effective IP Address Management: Asia Pacific Policies and Procedures

Tutors:Nurani Nimpuno;Miwa Fujii;Srinivas Chendi;Narumon Sribudsayadee

This course is an important presentation of current APNIC policies, a guide to completing APNIC request forms successfully, and covers important sections such as preparing a network plan, APNIC database procedures, AS procedures, reverse DNS delegations and IPv6


Back to Top


B.ap.02 APNIC Tutorial:Tuesday, February 25


09:00 - 12:30 IRR
Tutors:Nurani Nimpuno;Champika Wijayatunga, APNIC

          This tutorial introduces the Internet Routing Registry, provides an overview of the APNIC Routing Registry (IRR) and describes the purpose and functionality of the APNIC IRR


14:00 - 17:30 RPSL

Tutor:Andy Linton, APNIC

As Internet backbone connectivity becomes more complex, it becomes more difficult to keep track of peering policies with providers and customers. By specifying routing details using RPSL in the public Internet Routing Registry (IRR) providers can use the information to check consistency and build router configurations.

This tutorial will introduce RPSL concepts, describe use of automated tools such as RtConfig to build router configurations and use a case study to examine the benefits of converting from manual configuration of BGP peering policy on routers.


Back to Top


Newcomers' orientation


18:00 - 19:00

Tutor:Miwa Fujii

First-time attendees to an APNIC meeting are encouraged to attend.

The newcomers' orientation will discuss the structure of the APNIC and explain the various sessions at the APNIC meeting. There will be ample time at the end for questions.


Back to Top


APNIC Policy Meeting:Wednesday, February 26



09:00 - 10:30

Chair:Xing Li

This SIG examines developments in the operation of APNIC's Whois database and discuss related policy issues affecting registration practices and database security.


Appointment of Co-chair

Chair:Xing Li


Operational Status report on whois DB

Speaker: Sanjaya, APNIC


RIPE DB Developments

Speaker: Olaf Kolkman, RIPE NCC


Proposal for data clean up in APNIC Whois

Speaker:Sanjaya, APNIC


         Requirements for running a local 'Whois'

Speaker:George Michaelson, APNIC


Rwhois technical Overview/ ARIN design initiative

Speaker:Tim Christensen, ARIN


Routing SIG


14:00 - 15:30

Chair:Philip Smith

This SIG examines important issues of Internet routing and policy in this region and globally, such as Internet routing table growth, de-aggregation of provider blocks, routing stability and flap damping and the Internet Routing Registry.


         Internet NOC Dial by ASN Project

Speaker:Bill Woodcock, Packet Clearing House


        The New APNIC Routing Registry

Speaker:Sanjaya, APNIC


        pInternet Routing Table Status Report

Speaker:Philip Smith, Cisco Systems Inc.


RPSLng Status Report

Speaker:Philip Smith, Cisco Systems Inc. ±[1]p


DNS operations SIG


14:00 - 15:30

Chair:Paul Gampe

This SIG examines developments in policies and procedures for DNS operations in the Asia Pacific region. It will include topics such as reverse delegations for IPv6 networks, dynamic updates, secure DNS, and legacy transfers from other databases.


         Election of Co-chair

Speaker:Paul Gampe, RedHat


Anycast views of the Root

Speaker:Paul Vixie, ISC


        Sweeping Lames

Speaker:George Michaelson, APNIC


        DNSsec - Signing the Reverse

Speaker:Olaf Kolkman, RIPE NCC


        DNS infrastructure attacks

Speaker:David Conrad, NOMINUM



Speaker:George Michaelson, APNIC


        IDN and Reverse DNS

Speaker:James Seng, IDN Working Group




16:00 - 17:30

Chair: Philip Smith

This SIG is a forum for sharing information about the status of Internet eXchange (IX) points in the region


        Peering Status in Australia

Speaker:Steve Baxter, RIPE Network


        NP-IX Nepal Status Report

Speaker:Gaurab Upadhaya, Lahai


Update on Singapore Open Exchange

Speaker:Kerk Chun Sing, NUS/SOX


Status Report on Mongolian Internet Exchange

Speaker:Batsukh Balgansuren, MIX


JPNAP Status Report

Speaker:Nobuhisa Miyake, Internet Multifeed Co.



NIR Meeting


16:00 - 17:30

Chair:Maemura Akinori

 The Open NIR meeting discusses issues relating to the operations, policies, and procedures of National Internet Registries, including reports from the cooperative efforts of the NIRs and APNIC. More information about the NIR meeting will be added soon.


        NIR Fee Structure and Voting

Speaker:Izumi Okutani, JPNIC


        NIR Operated IRR

Speaker:Kuniaki Kondo, Intec Netcore, Inc.


TWNIC Resource Management System

Speaker:David Chen, TWNIC


Back to Top




18:00 - 19:00

Chair: Philip Smith

Asia Pacific Operations Forum provides an opportunity for members of the Internet community with a shared interest to meet informally and exchange ideas.


SANOG Update

Speaker:Lahai, Gaurab Upadhaya


KIOW 2002 Report

Speaker:Yong Wan Ju, KRNIC


Status Report of .org and Public Interest Registry

Speaker:Andy Linton, Public Internet Registry


Status Report on New Zealand Internet

Speaker:Keith Davidson, InternetNZ


Back to Top


APNIC Policy Meeting:Thursday, February 27





11:00 - 17:30

Chair:Takashi Arano

This SIG is a forum for developing policies and procedures relating to the management and use of Internet address resources by APNIC, NIRs, and ISPs within the Asia Pacific region


        Policy Documentation Status Update

Speaker:Anne Lord/Gerard Ross, APNIC


        RFC2050 Update



        Documentation Review and Policy Processes

Speaker:Anne Lord/Gerard Ross, APNIC


        Large Space IPv4 trial Usage program for future IPv6 deployment

Speaker:Kosuke Ito, IPv6 Promotion Council of Japan


Back to Top


ICANN/ASO meeting


18:00 - 19:00

Chair: Kuo-Wei Wu

This session will provide an update on the ICANN and RIR contract negotiations and the status report on the activities of the Address Council.


Update on ICANN contract negotiations

Speaker:Geoff Huston, Telstra


AC Status Report

Speaker:Kenny Huang, TWNIC/AsiaInfra International Ltd.


Back to Top


IPv6 SummitTrack (The 1st Global IPv6 Summit in AP)


B.v6.01 IPv6 Tutorial:Monday, February 24, 2003


09:00 - 12:30 Introduction to IPv6

Instructor:Tony Hain & Mallik Tatipamula, Cisco Systems Inc.

14:00 - 17:30 Successful IPv6 Deployment

Instructor:Jeff Doyle, Juniper Networks


 IPV6 Conference:Tuesday, February 25


Opening Plenary and Keynotes

Chaired by Takashi Arano


09:00 - 09:05 Welcome Notes from the program committee

Mr. Takashi Arano,, IPv6 Promotion Council of Japan

09:05 - 09:10 Welcome Notes from the Advisory committee

Dr. Paul Bao-Shuh Lin, IPv6 Forum Taiwan


09:10 - 09:40 IPv6 Development Toward the Real-Space Internet

Speaker:Dr. Hiroshi Esaki, IPv6 Promotion Council of Japan


09:40 - 10:00 IPv6 Business Opportunity

Speaker:Mr. Owen Chan, Cisco Systems Inc.


10:00 - 10:30 Quality of IPv6 Services: To be considered

Speaker: Dr. Hyun-Kook Kahng, Korea University


Government Session

Chaired by Nen-Fu Huang


11:00 - 11:20 Roadmap to IPv6 - A case of Japan

Speaker: Director Mr. AOKI Eiji, MPTHPT


11:20 - 11:40 Prospective of IPv6 in the Next Generation Internet Development in Taiwan

 Speaker:Dr. Kao Kai-Sheng,  ±[1]pDGT


11:40 - 12:00 European Policy for IPv6

Speaker:Dr. Pascal Drabik, Information Society Directorate General, European Commission



Carriers' Strategies

Chaired by Kim Hyoung Jun


13:30 - 13:50 IPv6 services and carriers' strategies in Japan

Speaker:Mr. Kazuhiro Gomi, NTT Communications


13:50 - 14:10 IPv6 Activities and Future Strategies in Chunghwa Telecom 

Speaker:Mr. Fu-Keui Chung, Chunghwa Telecom


Research Network and Activities

Chaired by Kim Hyoung Jun


14:10 - 14:30 Internationalized Domain Name Protocol & Its Test Suite in IPv6

Speaker:Dr. Han, Sun-young and Dr. Keecheon Kim, Konkuk University


14:30 - 14:50 Towards IPv6 Network: Malaysia Initiative

Speaker:Mr. Raja Azlina Raja Mahmood, JARING


14:50 - 15:10 The implementation of 6TALK 

Speaker:Mr. Yong Geun Hong, ETRI


15:10 - 15:30 Academia research on IPv6 in Taiwan 

Speaker:Dr. Nen-Fu Huang, National Tsin-Hua University


New Applications and Business Opportunities

Chaired by Lim Choon Sai


15:40 - 15:55 Development of E-learning and VoIP over IPv6

Speaker:Dr. Ren-Hung Hwang, National Chung-Cheng University


15:55 - 16:10 Voice/Video with QoS over IPv6

Speaker:Dr. Winston Seah, Institute for Communications Research


16:10 - 16:25 New Applications trials on IPv6 network

Speaker:Mr. Lee Young-Ro, NCA


16:25 - 16:40 IPv6/IPSec chip for Home Network 

Speaker:Mr. Hyun Suk Choi, Samsung


16:40 - 16:55 IPv6 Industrial Applications by use of EMIT

 ±[1]pSpeaker:Mr. Noriaki Fujiwara, Matsushita Electric Works


16:55 - 17:10 New Enterprise Applications with IPv6 

Speaker:Mr. Akihiro Inomata, Fujitsu


17:10 - 17:25 IPv6 for Mobile and Wireless Internet 

Speaker:Mr. Alper E. Yegin, NTT DoCoMo USA


17:25 - 17:40 IPv6 over DSL - Deployment Scenarios

Speaker: Mr. Franck Leclercq, 6Wind


Back to Top


Joint APNIC IPv6 SIG and Global IPv6 Summit Session (Network Operation Experiences and Issues)

Wednesday, February, 26

Chaired by Kazu Yamamoto (APNIC IPv6 SIG chair)

 It reviews the status of IPv6 implementations around the region and raise various issues relating to IPV6, including its relevance to today's Asia Pacific Internet environment, hardware and software developments, operational experiences, IPv6 routing and multihoming issues, and deployment plans


09:00 - 09:15 APNIC IPv6 updates ±[1]p

Speaker:Mr. George Kuo, APNIC


09:15 - 09:30 Introduction to IETF v6ops

Speaker:Dr. Jun-ichiro itojun Hagino, IIJ Lab, WIDE project and Co-chair of IETF v6ops-wg


09:30 - 09:45 Deploying of IPv6 Networks

Speaker:Mr. Rajesh Gulani, Cisco


09:45 - 10:00 Is IPv6 Reverse DNS Delegation required?  

Speaker:Mr. Tomohiro Fujisaki, Internet Association of Japan


10:00 - 10:15 Euro6IX project

Speaker:Mr. Jordi Palet, Consulintel


10:15 - 10:30 Security consideration in IPv4 to IPv6 transition

Speaker:Mr. Mark Williams, Nortel Networks


Interoperability issues

Chaired by Mr. Mahizzan Mohd. Fadzil


13:30 - 13:45 IPv6 Testing activities in Taiwan

Speaker:Dr. Lung-Sing Liang, Chunghwa Telecom Labs


13:45 - 14:00 Conformance, Interoperability and Stress test methodologies for IPv6 Core Routers test bed

Speaker:Mr. Jerome Renner, Agilent Technologies


14:00 - 14:15 IPv6 Certification Program

Speaker:Mr. Hiroshi Miyata, TAHI project


14:15 - 14:30 IPv6 Test and Certification in Korea

Speaker:Mr. Jongjin Sung, Telecommunications Technology Association


Deployment Status and Scenario in AP Countries/Regions

Chaired by Hermanth Dattatreya


14:30 - 14:45 IPv6 Deployment Status in Taiwan

Speaker:Mr. Chia-Nan Hsieh, Taiwan Network Information Center


14:45 - 15:00 IPv6 Deployment Status in China 

Speaker:Dr. Xing Li, China Education & Research Network


15:00 - 15:15 IPv6 Deployment Status in Singapore 

Speaker:Mr. Lim Choon Sai, Singapore Network Information Center


15:15 - 15:30 IPv6 Deployment Status in Japan 

Speaker:Mr. Kosuke Ito, IPv6 Promotion Council of Japan


15:30 - 15:45 IPv6 Deployment Status in India 

Speaker:Mr. Hemanth Dattatreya, IPv6 Forum India


15:45 - 16:00 IPv6 Deployment Status in Malaysia 

Speaker:Mr. Mahizzan Mohd. Fadzil, JARING


16:00 - 16:15 IPv6 Deployment Status in Korea 

Speaker:Mr. Hyoung Jun KIM, IPv6 Forum Korea


Back to Top


Panel Discussion       Meeting Room 102, Taipei International Convention Center

16:30 - 17:30

Chaired by Takashi Arano 

1. Mr. Takashi Arano

IPv6 Promotion Council of Japan       


2. Dr. Han-Chieh Chao

National Dong-Hwa University


3. Dr. Xing Li     

China Education & Research Network    pChina


4. Mr. Lim Choon Sai

Singapore Network Information Center


5. Mr. Kosuke Ito

IPv6 Promotion Council of Japan


6. Mr. Young Ro Lee

National Computerized Agency


7. Mr. Hemanth Dattatreya

IPv6 Forum India


8. Mr. Mahizzan Mohd. Fadzil




Closing Address         Meeting Room 102, Taipei International Convention Center  

17:30 - 17:40 IPv6: New Internet & Beyond

Speaker:Mr. Latif Ladid, IPv6 Forum


Back to Top


APIA Forum:Monday, February 24

APIA and APOPS are joining our forces again to organize a full-day open forum that is informative and educational. ±[1]p Our forum provides comprehensive coverage of the latest Internet technology, policy, business, and operation issues. ±[1]p

Our approach is to find a practical solution to a problem through discussion, coordination, and collaboration by the stakeholders of the critical infrastructures in the Asia and Pacific regions. ±[1]p Also, we invite the experts from other regions to learn about their experiences. APIA-APOPS Open Forum provides great opportunities to gain invaluable insights about the subject, to exchange information about important issues, as well as to interact with the leaders of Internet industry.


09:00 - 10:30 Session (1) Internet Industry Country Status Reports


11:00 - 12:30 Session (2) Latest Internet Technology, Policy, Business and Operational Issues


14:00 - 15:30 Session (3) AP IX Operators Forum with APOPS


16:00 - 17:30 Session (4) APIA/APRICOT Annual Member Meeting (AGM)


Expected Attendees


All our sessions are open for everyone. ±[1]p However, Session (1) and (2) are perfect for someone who is interested in learning the latest issues, challenges, and advancement of Internet in the region. For Session (3), we expect the participants to be IX operators and the IX experts who would like to discuss the common problems and ideas for the continuous improvement of Internet traffic and routing efficiency at a regional level. At Session (4), the stakeholders of APIA and APRICOT will discuss business of our operation.


Back to Top


APSIRC Meeting:Monday, February 24

The Conference will bring together the participants for two days in Taipei to discuss collaborations among the CSIRTs in the Asia and Pacific region. The first day is open to all those interested in Incident response activities. The second day is a closed meeting for the AP region CSIRTs.


Open Session (Information Day)


09:00 - 09:05 Welcome

09:05 - 09:40 Keynote

09:50 - 10:20 Introduction of the APCERT

10:30 - 11:05 Incidents and Vulnerability trends in Asia Pacific region

11:10 - 11:40 Worm, Trojan, Virus - antivirus conversions with CERT operation

11:50 - 12:30 IRT Object

12:30 - 14:00 Lunch Break

14:00 - 14:50 Introduction to APEC

Alex Webling (Australian Government)

Hidetoshi Ohno (METI)

15:00 - 15:40 Introduction of Recent Training Activities and Requirement

15:50 - 17:00 Panel Discussion on the CSIRT's training, education


APSIRC Meeting:Tuesday, February 25

(Closed meeting only for the invitees - CSIRTs members)


Back to Top


E. Social Event:


E.01 APRICOT opening social:Tuesday, February 25

19:00 - 21:30

*Taipei City Hall

*1, Shih-Fu Rd., Taipei, 110, Taiwan

Back to Top


E.02 APNIC social event:Wednesday, February 26

19:30 - 21:30

*Red House Theater

*10 Chengtu Rd, Hsimen, Taipei

APNIC members and friends are invited to attend APNIC's social event being held at the historic Red House Theater in the Hsimen district of Taipei, a vibrant shopping and market precinct. Buses will be provided from the Taipei International Convention Center to the Red House Theatre and return. A return trip via the MRT is also possible with the Hsimen MRT station being close by for those wanting to enjoy the sights and sounds of Hsimen after the social.

To secure your ticket please check the box for the APNIC Social when you register using the APRICOT 2003 registration form.

The octagonal Red House Theater was originally used as a market after its construction in 1908. Many Taipei residents have fond memories of the theater when it was later converted to a traditional theater venue and cinema, becoming a popular meeting place. The Red House Theater, completely restored in 2002, now hosts Chinese opera and other traditional Chinese arts.


Back to Top


E.03 APRICOT closing social:Thursday, February 27

19:00 - 21:30

*National Concert Hall Lobby

*21 Chungshan South Road, Taipei


Back to Top