|
07.45 |
|
WELCOME AND COFFEE |
|
|
|
|
|
|
|
|
|
|
|
|
08.30 |
|
DEBATE |
|
|
|
|
The AAAA Records and DNS |
|
|
|
|
Service Providers are getting set to connect our homes and devices to IPv6, while content providers are getting servers ready for IPv6.
The glue between the two is the AAAA DNS record.
Who decides when a AAAA record is returned and to whom? |
|
|
|
|
|
|
|
|
|
|
CHAIRMAN
ALAIN FIOCCO
CISCO |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tore Anderson Redpill Linpro AS |
Erik Kline
Google |
Jason Livingood Comcast |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mat ford ISOC |
Andrew Yourtchenko Cisco |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10.00 |
|
COFFEE BREAK |
|
|
|
|
|
CHAIRMAN
ALAIN DURAND IETF Softwires Co-Chair JUNIPER NETWORKS |
|
|
|
|
|
|
|
|
|
|
session V TRANSITION ISSUES |
|
|
|
|
|
|
|
10.30 |
|
Telecom Italia: Transition Mechanisms to Support IPv4
in an IPv6 Network |
|
|
|
|
Discussing the transition mechanism to be introduced in the network and explaining how this choice could solve all the present issues for the initial phase of deployment of IPv6 and that could guarantee a long term solution for the coexistence of IPv4 and IPv6 protocols in the network.
- requirements for the introduction of the transition mechanism, starting from the initial
hypothesis of replication of the current offered services to the possibility to evolve towards
new services based only on IPv6
- steps needed for the implementation of the solution in the network and the way to smoothly
evolve towards an IPv6 only world.
Chiara Moriondo Fixed Access Broadband Innovation Telecom Italia |
|
|
|
|
|
|
|
11.00 |
|
From an IPv4 Global Internet to a Mix of IPv4 NATed and IPv6 World |
|
|
|
|
Discussing commonalities between various forms of NAT: NAT44, NAT444, NAT64 & DS-Lite. Presenting a new approach at IETF, known as PCP, to enable applications to become more nimble in the context of carrier grade NATs.
ALAIN DURAND IETF Softwires Co-Chair JUNIPER NETWORKS |
|
|
|
|
|
|
|
11.30 |
|
How to Evolve to IPv6 |
|
|
|
|
Providing an overview on how IPv6 should be introduced in the wire-less and wire-line network for residential subscribers and what are the transition techniques to deal with legacy IPv4 devices and application services. How to provide IPv6 services in line with 3GPP and BB-Forum.comparing different techniques (CGNAT, 6RD, DS-Lite, NAT64).
Wim Henderickx Director, Network Solutions & Consulting, IP Division Alcatel-Lucent |
|
|
|
|
|
|
|
12.00 |
|
IPv4/IPv6 Multicast Interoperation |
|
|
|
|
During the long co-existing period of IPv6 and IPv4, the interoperation between IPv6 network and IPv4 network is essential. Now, multimedia has been deployed widely, such as IPTV and video conference etc. They also face the IPv6 and IPv4 intercommunication issues. This presentation would cover IPv4/IPv6 multicast interoperation support during the IPv6 transition.
Sheng Jiang Senior Research Engineer Huawei Technologies |
|
|
12.30 |
|
LUNCH |
|
|
|
|
|
CHAIRMAN Prof Thomas Sheffler Beuth Hochschule für Technik Berlin
University of Applied Sciences |
|
|
|
|
|
|
|
|
14.00 |
|
IPv6 Migration in Cable Operator Networks |
|
|
|
|
Explaining how DOCSIS 3.0 prepares cable operators to offer IPv6 services. The different features of DOCSIS 3.0 with respect to IPv6 are explained and clarified. It is also shown how operators can use both IPv4 and IPv6 at the same time to allow a smoother migration.
Wim De Ketelaere CTO Excentis |
|
|
|
|
|
|
|
14.30 |
|
Managing the Dual-Stack Transition |
|
|
|
|
With IPv6 rollouts starting to expand, dual-stack networks are a favored methodology for making the v6 transition. However, just like introducing any other new routing protocol, moving to a dual-stack network poses real network management and operational challenges. As the changeover takes place, network engineers need to know that their new dual-stack network is operating as intended, that the right routers and links have IPv6 routing enabled, address blocks are being advertised where they are intended to be, redundancy is set up properly, and IPv6 network paths are functioning as expected.
Alex Henthorn-Iwane VP Products/Marketing Packet Design |
|
|
|
|
|
|
|
15.00 |
|
A Simple Framework for IPv6 Transition |
|
|
|
|
While technology support is one aspect of the transition, other equally important aspects include performance, stability and manageability of those technologies as they become widespread.
Chris Metz Principal Engineer Cisco |
|
|
|
|
|
|
|
15.30 |
|
The Role of Verification Tools in the Transition |
|
|
|
|
Explaining how service providers can implement IPv6 and how verification tools can be used to facilitate the migration from IPv4 to IPv6, and to authenticate device compliance with IPv6 standards.
Michael Haugh Ixia |
|
|
16.00 |
|
COFFEE BREAK |
|
|
16.30 |
|
Integrated BNG&CGN Solution |
|
|
|
|
How to create incentives for IPv6 adoption while ensuring IPv4 services continuity is the key issue. Presenting the integrated BNG&CGN solution to ease the IPv6 transition.
Suman Choudhary HUAWEI TECHNOLOGIES |
|
|
|
|
|
|
|
|
|
session VI SECURITY ISSUES |
|
|
|
|
|
|
|
17.00 |
|
Secure IPv6 Deployment |
|
|
|
|
A lot of business scenarios, like e-government, public safety or car-to-car currently deploy security architectures, which are focused on IPv4. In 2009 the European Commission launched a project, which investigates efficient security models for different business scenarios. This investigation also considers operational aspects as well as the migration phase from IPv4 to IPv6.
Wolfgang Fritsche Head of Internet Competence Center IABG InfoCom |
|
|
|
|
|
|
|
17.30 |
|
IPv6 Security – Opportunities and Challenges |
|
|
|
|
Researchers start to realise that certain features of the IPv6 protocol open up new attack vectors. Prominent examples are attacks on the Extension Header mechanism2 and the Address Autoconfiguration3 of IPv6.
• Secure Neighbor Discovery (SEND), Cryptographically Generated Addresses (CGA) and
the deprecation of Routing-Header-0.
• Tool support for testing, auditing, monitoring and protection of networks and hosts.
• IPv6-firewall policy example.
Prof. Thomas Scheffler Beuth‐Hochschule Berlin - Univ. of Applied Sciences |
|
|
|
|
|
|
|
18.00 |
|
Compliancy Requirement to the ISMS |
|
|
|
|
Focusing on security fundamentals and explaining how they are modified by the introduction of IPv6 within company networks, operating systems, and applications. Typically, one key point is the compliancy requirement to the ISMS (Information Security Management System – See ISO 27001) of each company. In parallel, several technical illustrations linked to the protocol itself are detailed.
Evelyne Lescuyer Security Consultancy Manager Quaelys |
|
|
18.30 |
|
END OF CONFERENCE DAY THREE |
|