Javascript Menu by Deluxe-Menu.com
     
 
upperside conferences
 
   
     
 
  V6 WORLD CONGRESS 2011 conference day THREE  FRIDAY 11 february 2011
 
     
 
  07.45   WELCOME AND COFFEE  
         
         
  08.30    DEBATE   
      The AAAA Records and DNS  
      Service Providers are getting set to connect our homes and devices to IPv6, while content providers are getting servers ready for IPv6.
The glue between the two is the AAAA DNS record.
Who decides when a AAAA record is returned and to whom?
 
         
     
Alain Fiocco
CHAIRMAN

 ALAIN FIOCCO
 CISCO
 
         
     
Tore Andersson Erik Kline Jason Livingood  
       
 Tore Anderson  Redpill Linpro AS  Erik Kline
 Google
 Jason Livingood
 Comcast
 
         
     
Phil Roberts Andrew Yourthenko    
       
 mat ford
 ISOC
 Andrew Yourtchenko  Cisco  
 
         
         
         
10.00   COFFEE BREAK  
     
Alain Durand
CHAIRMAN
 ALAIN DURAND  IETF Softwires Co-Chair  JUNIPER NETWORKS
 
         
      session V TRANSITION ISSUES  
         
  10.30   Telecom Italia: Transition Mechanisms to Support IPv4
in an IPv6 Network
 
      Discussing the transition mechanism to be introduced in the network and explaining how this choice could solve all the present issues for the initial phase of deployment of IPv6 and that could guarantee a long term solution for the coexistence of IPv4 and IPv6 protocols in the network.
- requirements for the introduction of the transition mechanism, starting from the initial
  hypothesis of replication of the current offered services to the possibility to evolve towards
  new services based only on IPv6
- steps needed for the implementation of the solution in the network and the way to smoothly
  evolve towards an IPv6 only world.

 Chiara Moriondo  Fixed Access Broadband Innovation  Telecom Italia
 
         
  11.00   From an IPv4 Global Internet to a Mix of IPv4 NATed and IPv6 World  
      Discussing commonalities between various forms of NAT: NAT44, NAT444, NAT64 & DS-Lite. Presenting a new approach at IETF, known as PCP, to enable applications to become more nimble in the context of carrier grade NATs.

 ALAIN DURAND  IETF Softwires Co-Chair  JUNIPER NETWORKS
 
         
  11.30   How to Evolve to IPv6  
      Providing an overview on how IPv6 should be introduced in the wire-less and wire-line network for residential subscribers and what are the transition techniques to deal with legacy IPv4 devices and application services. How to provide IPv6 services in line with 3GPP and BB-Forum.comparing different techniques (CGNAT, 6RD, DS-Lite, NAT64).

 Wim Henderickx  Director, Network Solutions & Consulting, IP Division  Alcatel-Lucent
 
         
  12.00   IPv4/IPv6 Multicast Interoperation  
      During the long co-existing period of IPv6 and IPv4, the interoperation between IPv6 network and IPv4 network is essential. Now, multimedia has been deployed widely, such as IPTV and video conference etc. They also face the IPv6 and IPv4 intercommunication issues. This presentation would cover IPv4/IPv6 multicast interoperation support during the IPv6 transition.

 Sheng Jiang  Senior Research Engineer  Huawei Technologies
 
  12.30   LUNCH  
     
Thomas Sheffler
CHAIRMAN
 Prof Thomas Sheffler  Beuth Hochschule für Technik Berlin
  University of Applied Sciences
 
         
  14.00   IPv6 Migration in Cable Operator Networks  
      Explaining how DOCSIS 3.0 prepares cable operators to offer IPv6 services. The different features of DOCSIS 3.0 with respect to IPv6 are explained and clarified. It is also shown how operators can use both IPv4 and IPv6 at the same time to allow a smoother migration.

 Wim De Ketelaere  CTO  Excentis
 
         
  14.30   Managing the Dual-Stack Transition  
      With IPv6 rollouts starting to expand, dual-stack networks are a favored methodology for making the v6 transition.  However, just like introducing any other new routing protocol, moving to a dual-stack network poses real network management and operational challenges.  As the changeover takes place, network engineers need to know that their new dual-stack network is operating as intended, that the right routers and links have IPv6 routing enabled, address blocks are being advertised where they are intended to be, redundancy is set up properly, and IPv6 network paths are functioning as expected.

 Alex Henthorn-Iwane  VP Products/Marketing  Packet Design
 
         
  15.00   A Simple Framework for IPv6 Transition  
      While technology support is one aspect of the transition, other equally important aspects include performance, stability and manageability of those technologies as they become widespread.

 Chris Metz  Principal Engineer   Cisco
 
         
  15.30   The Role of Verification Tools in the Transition  
      Explaining how service providers can implement IPv6 and how verification tools can be used to facilitate the migration from IPv4 to IPv6, and to authenticate device compliance with IPv6 standards. 

 Michael Haugh  Ixia
 
16.00   COFFEE BREAK  
  16.30   Integrated BNG&CGN Solution  
      How to create incentives for IPv6 adoption while ensuring IPv4 services continuity is the key issue. Presenting the integrated BNG&CGN solution to ease the IPv6 transition.

 Suman Choudhary  HUAWEI TECHNOLOGIES
 
         
      session VI SECURITY ISSUES  
         
  17.00   Secure IPv6 Deployment  
      A lot of business scenarios, like e-government, public safety or car-to-car currently deploy security architectures, which are focused on IPv4. In 2009 the European Commission launched a project, which investigates efficient security models for different business scenarios. This investigation also considers operational aspects as well as the migration phase from IPv4 to IPv6.

 Wolfgang Fritsche  Head of Internet Competence Center  IABG InfoCom
 
         
  17.30   IPv6 Security – Opportunities and Challenges  
      Researchers start to realise that certain features of the IPv6 protocol open up new attack vectors. Prominent examples are attacks on the Extension Header mechanism2 and the Address Autoconfiguration3 of IPv6.

• Secure Neighbor Discovery (SEND), Cryptographically Generated Addresses (CGA) and
  the deprecation of Routing-Header-0.
• Tool support for testing, auditing, monitoring and protection of networks and hosts.
• IPv6-firewall policy example.

 Prof. Thomas  Scheffler  Beuth‐Hochschule Berlin - Univ. of Applied Sciences
 
         
  18.00   Compliancy Requirement to the ISMS  
      Focusing on security fundamentals and explaining how they are modified by the introduction of IPv6 within company networks, operating systems, and applications. Typically, one key point is the compliancy requirement to the ISMS (Information Security Management System – See ISO 27001) of each company. In parallel, several technical illustrations linked to the protocol itself are detailed.

 Evelyne Lescuyer  Security Consultancy Manager  Quaelys
 
  18.30   END OF CONFERENCE DAY THREE  
 
     
     
   
logo ericsson logo cisco logo alcatel lucent Logo Juniper logo ip infusion logo ericsson logo cisco logo alcatel lucent ipv6 forum logo tinet Packet Design Cisco ipv6 forum logo tinet Packet Design Cisco ipv6 forum Packet Design Cisco ipv6 forum logo tinet Packet Design Cisco  
  © 1994-2011 Upperside Conferences. All rights reserved. ® V6 World Congress is a registered trademark