- Intro to SDOs and SIGs that can influence enterprise networks by Barbara Stark
- Testing Wi-Fi performance by Lincoln Lavoie
- Device Management by Jason Walls
- Private 5G Network by Satish Jamadagni
Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The third day will include the following keynote presentations:
- Lightweight Mixnets by Martin Thomson
- Semantic Routing by Adrian Farrel
- Computation in the Network (COIN) by Dirk Trossen
Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The first day will include the following keynote presentations:
- IPv6 — past, present & future by Bob Hinden
- Going Dark — catastrophic security and privacy losses due to loss of visibility by managed private network operators by Dr. Paul Vixie
- TBD by Ron Bonica
Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The pre-event introduces participants to the IETF culture and how to contribute to IETF.
- Introduction to IETF at a high level – Dhruv Dhody
- Chat with long term IETFers – Adrian Farrel, Allison Mankin, Fred Baker, Praneet Kaur (Moderator)
- Chat with IETF participants from India – Tirumaleswar Konda, Abhijan Bhattacharyya, Gurshabad Grover, Ketan Talaulikar, Mohit Tahiliani (Moderator)
- Experience sharing from IETF Newcomers – Ameya Deshpande, Abhishek Kumar
- How to write internet drafts with Markdown/GitHub – Barbara Stark
Unwanted and illegal robocalls continue to be both one of the largest communications-related nuisances (particularly since many of us are home to get them all day…) and are commonly used to defraud victims using social security, warranty and other scams. Fighting these unwanted calls has proven to be hard and is likely to require a combination of approaches that may also hasten the end of the traditional circuit-switched public switched telephone network. I’ll describe why unwanted robocalls are probably harder to curtail than spam emails and what techniques may help. I’ll focus particularly on calling number authentication, standardized by the IETF and ATIS in the STIR and SHAKEN working groups. STIR/SHAKEN offer a good case study that protocol standards are necessary, but need to be augmented by additional organizational infrastructure and operational practices to be successful. However, calling number authentication combined with simple call filters may only offer a temporary respite from unwanted calls unless other holes in the call delivery chain are plugged that allow shady operators to place millions of calls.
Prof. Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D. from the University of Massachusetts in Amherst, Massachusetts. MTS at AT&T Bell Laboratories; associate department head at GMD-Fokus (Berlin), before joining the Computer Science and EE departments at Columbia University. He served as chair of Computer Science from 2004 to 2009 and as Engineering Fellow, Technical Advisor and Chief Technology Officer of the Federal Communications Commission (FCC) from 2010 until 2017.
Protocol standards co-developed by him, including RTP, RTSP and SIP, are now used by almost all Internet telephony and multimedia applications. Fellow of the ACM and IEEE.
This webinar will be taught by Michael Richardson and Dr. Anna Maria Mandalari.
Between the number and type of IoT devices that may be used by enterprises, in short order, there will not be enough people on the earth to administer them. New means of scale are required. Do old assumptions hold? Standards such as Manufacturer Usage Descriptions and CoAP are emerging.
Anna Maria’s talk:
The emerging complicated Internet of Things (IoT) ecosystem will not only rely on collection and processing of personal data, but also performs actuations in the real world and thus, have physical consequences. The potential harms to individuals and society are significantly more serious than privacy alone. This greatly increases the challenge in delivering public safety, acceptability and trust as identified in the large number of government and independent reviews and research findings.
We have been developing the opensource Databox Platform. Beyond its research impact, Databox is currently turning into a popular opensource platform for privacy-preserving data analysis. In this talk, I will explore what we are invisible trading in exchange for these devices, and discuss potential future mitigation through Databox.
Dr. Anna Maria Mandalari works as research associate in the Dyson School of Design Engineering at the Faculty of Engineering at Imperial College London. She was a Marie Curie Early Stage Researcher affiliated with the University Carlos III of Madrid, within the European project ITN METRICS. During her PhD she was research visitor at Telefonica I+D (Spain) and Simula Research Laboratory (Norway). Her research interests are related to IoT, privacy, large-scale Internet measurements, Internet measurement platforms, middleboxes and new Internet protocols.
Michael Richardson’s talk:
A critical part of managing privacy and authorization in enterprise networks involves managing identity. There is a rich field of identity management offerings from big and small. There are multiple identity management conferences one can attend (now going virtual). There are no dominant identity management mechanisms, and no dominant onboarding systems for IoT devices.
What kinds of devices should enterprises expect to deal with?
What should enterprises look for in feature sets of devices that they expect to acquire?
This is a interactive discussion dealing with the question of how enterprises can navigate managing identities for IoT, BYOD, and remote workers.
Michael Richardson is an open source and open standards consultant. An autodidact, he wrote mail transfer agents as a teenager, and in the 1990s, found his calling designing and building embedded networking products, in the security sector. Michael has built multiple IPsec systems, joining the FreeS/WAN team in 2001, and founding Xelerance in 2003. Since 2008 Michael has worked in and chaired the IETF ROLL working group, doing routing protocols for IoT mesh systems. Michael has authored a number of IoT related RFCs including RFC8366 and RFC7416. Michael currently works on IoT security systems in the 6tisch, ANIMA and ACE WG, specializing in the problem of initial bootstrap trust.
Peer-to-peer group communication has long been a necessity for usability in team coordination. However, the security of such systems has not been well understood or investigated in comparison to one-to-one secure messaging options (such as Signal or even TLS). Based on an ongoing IETF standardization initiative, this presentation will introduce participants to the basic concepts of group messaging security, end-goals, and threat models – including “self-healing” security – and will prepare them to ask critical questions regarding group communication security and implementations.
Britta Hale is an Assistant Professor of Computer Science at the Naval Postgraduate School working in cryptography and cybersecurity. Her specialization areas include analysis and design of cryptographic key exchange and authentication protocols. Hale is currently active in the design and IETF standardization of the MLS group messaging protocol, user-mediated protocol analysis, and hybrid post-quantum cryptography.
Recent papers include the first public research on detection of man-in-the-middle attackers in messaging protocols. Hale holds a PhD from the Norwegian University of Science and Technology and a Master’s in Mathematics of Cryptography and Communications from Royal Holloway, Univ. of London.
This talk will focus on the Path Computation Element (PCE) work in the Routing Area of the IETF. Dhruv will give a quick introduction to the technology and how it is being used to enable efficient path computation and traffic engineering of the network. It will also cover how the PCE work relates to the Software defined Networking (SDN) and some of the future work taken up the working group (WG).
Dhruv has been working in the networking domain for last 16 years with Huawei Technologies. His current designation is the Lead Architect for the Data Communications Business in India. Over the years, he has worked hands on the Huawei’s Routing Platform and controller. He is currently working with the research & standards team for various emerging technologies such as PCE, Segment Routing (SR) and Network Slicing.
He is an active IETF contributor in the area of Path Computation and Traffic Engineering with 26 RFCs as co-author and contributor. He is also serving as the PCE WG co-chair at IETF. He is also part of Routing Directorate and sergeant-at-arms for the IETF mailing list. He is a founding member and secretary for India Internet Engineering Society (IIESoc) & Industry Network Technology Council (INTC).
The vision of a quantum internet is to fundamentally enhance Internet technology by enabling quantum communication between any two points on Earth. While the first realizations of small scale quantum networks are expected in the near future, scaling such networks presents immense challenges to physics, computer science and engineering. In this session, Wojciech provides a gentle introduction to quantum networking and surveys the state of the art. He proceeds to discuss key challenges for computer science in order to make such networks a reality.
Wojciech Kozlowski received his MSci degree in theoretical quantum physics from the University of Cambridge in 2012 and a DPhil degree in theoretical quantum optics and many-body systems from the University of Oxford in 2017. He is currently a postdoctoral researcher at QuTech, an advanced research institute for quantum computing and networking in the Netherlands.
After his doctoral thesis on the competition between weak quantum measurement and many-body dynamics, Wojciech left academia to work as a software engineer in the network protocols unit at Metaswitch Networks in London, UK. As of 2019, he is combining his new expertise in networking technologies with his prior research experience developing a network architecture for the quantum internet.
Drones and other Unmanned Aircraft Systems (UAS) are proliferating rapidly. What are the needs for regulation?
Civil Aviation Authorities (CAAs) worldwide have initiated rule making for Unmanned Aircraft Systems (UAS) Remote Identification (RID). There is a Working Group proposed for this activity at the IETF. Bob Moskowitz and Stu Card will discuss the history and rationale for this proposed standards activity.
Robert Moskowitz has been working with computers since 1966 when, in 11th grade, his high school became perhaps the first in the nation to have in-classroom computer access (a teletype in the back of the room). He entered the programming profession in 1974 shortly after receiving a Bachelor of Science in Computer Science from Michigan State University (1972) along with a Bachelor of Science in Botany. Robert worked 19 years Automotive, in IT technical support, and for 17 years at ICSAlabs (now a division of Verizon Business) in network security research and is now an independent security consultant. He informed the FCC on Internet technology 2013-2016. Additionally, he has written or edited 61 RFCs since 1989. He has been active in the IETF since 1993 and IEEE 802 since 2001. His contributions there include the private IPv4 address space, IPsec, PKIX, HIP, DOTS, 802.11i, 802.1(X, AE, and AR), and 802.15.9. He is currently investigating better ways to address IoT devices and networks. This included designing the network security for ZWAVE 2.0. He is currently working on communications security for Unmanned Aircraft Systems (UAS). In his spare time he works with armv7 boards, assisting development of Fedora and CentOS for these platforms.
Stu Card’s Navy training included brief experiences operating aircraft, ships and submarines. His SU PhD research applied information theory to evolutionary algorithm based machine learning. He has over 30 years experience, designing airborne radar and neural network hardware, a broadband cable modem, fault-tolerant storage, airborne network protocols, cryptocurrency/blockchain applications, etc., and cofounding Central NY’s first consumer ISP. He now focuses on existential threats involving complex interdependent networks and autonomous cyber-physical systems, and supports the NYUASTS.
The IETF has documented most of the protocols used in the Internet below the application layer. This brief overview in intended to inform the audience about the IETF – what it is, what it does, who it is composed of, and how it works. It will also point out the IETF’s deficiencies; specifically, that constituencies that don’t participate often don’t find their issues resolved in those specifications, which often works against them in one way or another. Ideally, those constituencies will be motivated and guided in making an impact on the technologies that their businesses depend on.
Fred Baker has worked in the software engineering of computer networks since 1978, including Internet technology starting in 1986. He has chaired several IETF working groups on various topics; since 2005, he has chaired or co-chaired the IPv6 Operations working group. In addition, he chaired the IETF 1996-2001, and served on the Internet Architecture Board 1996-2002. He has also been a member of the board of the Internet Software Consortium, which runs one of the DNS root services, since 2008, and represents them in ICANN’s Root Server System Advisory Committee – which he has also chaired 2018-present. He is currently also the chair and primary editor in ITU Focus Group on Quantum Technology in Networking, in the sub-group related to the Implications of Quantum IT on Networks. He represented Cisco in BITAG, writing or contributing to many documents intended to inform the FCC on Internet technology 2013-2016. Additionally, he has written or edited 61 RFCs since 1989.