4th International Summer School on Network and Service Management (ISSNSM 2010)The 4th summer school on network and service management takes place June 21-23 2010 in Zurich, Switzerland. This school combines class room lectures with hands on lab sessions and primarily targets PhD students working in the area of network and service management. It is organized by Burkhard Stiller, Cristian Morariu, and Martin Waldburger. June 21-23, 2010, University of Zurich, Switzerland ScopeThe EMANICS summer school will provide classes on a comprehensive suite of advanced topics in network management. The courses will be accompanied with practical hands-on labs in order to combine the theoretical background with some operational experience. The instructors are well known members of the academic and industrial community. OverviewCourses and associated practical labs will be organized by instructors who are well known experts. The courses introduce technologies, which are later further studied by the students in a series of exercises of lab experiments.
The labs will assume working experience with Unix/Linux systems and there might be further lab specific prerequisites. If participants bring personal notebooks (preferably with a CD-ROM), they are expected to know how to install software and how to administrate their system. We will also provide machines for the use in the practical excersises. More details will be provided by each lab instructor. AbstractsA Practical Introduction to 6LoWPAN: Programming IPv6 Wireless Sensor Networks with ContikiLow power wireless networks are finding increasing applications within areas of vehicular networks, sensor networks, mobile ad-hoc networks and even in the emerging area of smart grids there is a thrust towards deploying such networking devices. These networks are not only used for retrieving sensor data, but for management and control of devices as well, leading to the need for interoperability.Developing protocols for low power embedded devices poses a challenge also in the form of very limited computing power, low data rates and energy constraints. The 6LoWPAN standard was developed keeping in mind these challenges and provides a method for low power embedded devices to be networked using IPv6 over IEEE 802.15.4 networks. The aim of the tutorial is to introduce attendees to programming embedded devices using Contiki for setting up IPv6 enabled wireless sensor networks. Attendees will also be introduced to the 6LoWPAN standard. Using practical exercises attendees will learn the basics of programming with Contiki and will then be walked through setting up an IPv6 network using sensor network motes. Attendees will gain experience in developing their own custom applications by learning how to send and receive messages via the UDP protocol over the IPv6 network. Embedded Automation Systems & Device Manageability InstrumentationOperating network-based IT applications and services in a professional and timely manner has become an increasingly challenging task over the last few years. More and more business critical IT applications and services are being virtualized and deployed across a distributed, networked infrastructure. Increasing bandwidth requirements and higher capacity network links lead to ever-increasing numbers of transactions per seconds on those links. Contractual SLA obligations as well as legal requirements and industry standards impose further operational requirements. Furthermore user and application expectations are no longer static for weeks and months but vary on a per session, per transaction basis.Concepts of self-* and autnomic systems are finding their way from research and academia into the networking industry. Manageability and embedded automation capabilities with the network itself have evolved significantly. Network elements (routers, switches, firewalls, access points, etc.)today are different from what they were a few years ago and offer a plethora of functionality embedded inside the network elements which can be used to measure, detect, decide and act upon information from within the network. The above combined are leading to a paradigm shift where operational tasks are no longer exclusively seen as external to the network but Device Manageability Instrumentation and Embedded Automation Systems are being adopted to automate operational tasks within the network infrastructure. This session will use a combination of theory and practical hands-on examples to discuss the capabilities of Embedded Automation Systems. We will look at implications, benefits and challenges of using embedded automation. Technology examples used include Cisco IOSĀ® embedded manageability instrumentation such as IP SLA, Embedded Event Manager (EEM), Flexible NetFlow (FNF), Network Based Application Recognition (NBAR) and Embedded Packet Capture (EPC). Traffic Mining: Feel the Packets, be the PacketsThe IP network introduced a new quality of threat when real infrastructures such as telecom, electrical, transport and banking systems were infiltrated by the virtual world with its standard PC HW and SW. SW became an end in itself and a weapon. Unnecessary high complexity, instable behaviour and a new kind of criminal activity arose, the targeted IT warfare and the ignorance of the administrative management towards technical and human complexity issues. Nevertheless, we allowed and promoted the current situation violating the most basic principles of reliable design, testing and robustness. The general acceptance of product selection solemnly by economic and political factors demands now its toll.This workshop will address reasons for today's calamity and motivates the current civil and military research efforts to solve the most urgent problems on a short and long time scale. It will also supply a practical insight into the practice of Infrastructure Troubleshooting and Traffic Mining with regard to the danger of today's trust in tools instead of decent human knowledge. It will teach the audience the potential of the human brain, mining in IP data streams using KISS (Keep It Simple Stupid) tools on selected examples, such as Skype, but also on real world processed datasets in legal agreement with the owner. The positive magic of critical thinking, proper preprocessing and visually exploring of datasets will be demonstrated. Besides practical considerations also the dark side of the mining will be shortly discussed. All what you should not do: Churchill law, the negative magic of statistical spin doctors, insufficient preprocessing, heuristics versus facts, "wish you were here" or "get there effect", the tool - fool syndrome. InstructorsAnuj Sehgal - Bremen University
Anuj Sehgal is a PhD student of the Smart Systems graduate program at the School of Engineering and Science at Jacobs University Bremen. His research is currently focused on the topic of underwater acoustic communications under the supervision of Professor Dr. Juergen Schoenwaelder. He is also a member of the Computer Networks and Distributed Systems research group.
Bruno Klauser - Cisco
Bruno Klauser works at Cisco as a Consulting Engineer for Network Management and OSS in the European Pervasive Technologies Team and for the Innovation Consulting Engineering Team, based out of Zurich, Switzerland. Within this field he's focussing on Operations of MPLS Core and MPLS-based services and driving the adoption of Device Manageability Instrumentation (DMI) and self-management concepts. Key Deliverables include white paper and book chapter contributions, proof of concept demonstrations, transfer of information seminars and supporting development and architectural groups within Cisco and the industry.
Stefan Burschka - SwisscomPhysicist, studied quantum optics, microwave technology, optical communications, robotics and AI. After a long industry experience in hardware/software development, call center design, data mining and IP security, he currently heads the "Malware and Traffic Mining Lab" at Swisscom Strategy and Inovations. His team is working in the field of troubleshooting and IP network security, data mining. LocationISSNSM 2010 will take place at the campus of the
Department of Informatics of University of Zurich Please follow this link for further travel information. ScheduleThe summer school will start on Monday morning and close on Wednesday noon. During the summer school there will be a lunch break from 12:30 to 14:00 on campus. In addition, coffee breaks in the morning (10:30 - 11:00) and in the afternoon (15:30 - 16:00) take place close to the seminar room.
RegistrationThe number of participants is limited to 30, preference will be given to PhD students. Estimated registration fees (subject to change, please check again during the next days):
Local Infrastructure
Organizers
Registered Participants
|