‹ Back


IPv6 Deployment Strategies

Available IPv4 addresses are likely to run out in 2011IPv6 is THE new protocol. While the technical foundations of IPv6 are well established, significant work remains to deploy and begin using IPv6 capabilities. Orderly deployment of IPv6 is a critical next step in maintaining a rapidly expanding and evolving global Internet. It’s important that IPv6 deployment follow a path that avoids disruption or unnecessary detours along the road to a secure and healthy Internet. This session will help you navigate the multiple different IPv6 deployment strategies.  and decide which is the right one for your business.  What are the implications for low power networks?

Key takeaways:

  • An understanding of which is the right deployment strategy for your business
  • The implications for low power Networks


  • John Brzozowski, Chief Architect, IPv6 and Distinguished Engineer at Comcast Cable
  • Ralph Droms, Distinguished Engineer, Cisco Systems
  • Richard Jimmerson, Chief Information Officer, American Registry for Internet Numbers (ARIN)
  • Martin Levy, Director of IPv6 Strategy, Hurricane Electric

DNSSEC – What Next?

DNS security extensions (DNSSEC) have been IETF-defined for several years in support of a more-secure domain name system, which is a critical component of the global Internet.  In 2010, we have seen great progress in deployment of signed zones, especially at the root and TLD level. Now that the root is signed, what’s next? Running verification is necessary to take advantage of the added security that DNSSEC offers. This is not an easy task as there isn’t much operational experience yet. This session will deliver first hand deployment case studies from leading experts.

Key takeaway:

  • The do’s and don’ts of DNSSEC deployment.


  • Chris Griffiths, Senior Manager -Internet System Engineering at Comcast Cable

Realtime Applications

Traditional Internet applications were asynchronous in nature. In email, one sends a message and then hopefully gets a reply later. On the web, one makes a request for a document and some short time later your web page appears. Over the past 15 years, the IETF has been working on standardizing protocols for realtime applications, such as voice, video, industrial control, and instant messaging. This track includes speakers who have written and managed much of the work in this area.

Key takeaways:

    • An understanding of the philosophy behind the IETF RAI protocol suite
    • The components and interrelationship between the RAI protocols
    • How interoperability is achieved, and why that would be important for application developers
    • How to chose the right IETF protocol, rather than reinventing your own protocol for voice, video, chat, or control

What future work is underway in the RAI area, such as peer-to-peer, congestion management, and others

  • Hadriel Kaplan, VP Technology, Acme Packet
  • Richard Shockey, Chairman of the Board of Directors, SIP Forum
  • Mary Barnes, Principal Engineer, Polycom

TRILL – Why It’s Important

How do you achieve redundancy and avoid single points of failure not just for connectivity but also within your network? The new TRILL (Transparent Interconnection of Lots of Links) protocol allows multiple layer 2 connections without running into issues. In other words, TRILL is an IETF-developed advanced layer 2 routing/bridging protocol that provides for greater reliability and local network performance especially in high-availability data center environments. This session will focus on how TRILL works and why it’s needed.

Key takeaways:

  • Insights as to how early adopters have successfully deployed TRILL.


  • Andy Davidson, Technical Director at NetSumo Ltd
‹ Back