Management of Enterprise Networks
Steve Weinstein NEC USA
Abstract: This informal discussion session is for far-reaching discussion on issues in managing enterprise networks in which media are mixing with traditional information retrieval functions, and the Internet has become a big part of the picture. The issues could include:

  • Managing organizational policies for differentiated traffic treatments (great service for the boss, minimal service for the summer intern)

  • Management of VPNs through the Internet (Security, resource utilization enforcement, implementation of traffic treatment policies, etc.)

  • Measuring and assuring end-to-end reliability in Extranets.

  • Will CORBA replace CMIP and SNMP?

  • Implementing MPLS in enterprise networks with heterogeneous switching facilities.

  • Cost-based routing strategies in Extranets.

  • Implications of wireless Internet access for management of enterprise networks

Brief (less than 10 minutes), provocative presentations are solicited.


Event Correlation
Robert E. Freitas, Freitas Consulting Inc.
Abstract: This session will begin by defining what is event correlation. It is not a single thing, as most people believe. There are three levels of event correlation:

  1. the object level,

  2. the network level,

  3. and the service level.

Each of these three levels will be described and explained in detail. Next, an architectural model of how event correlation can be introduced into the typical network management system will be developed. Naturally, this model will illustrate the three levels of correlation. In addition, there are a number of considerations, such as scalability, processing bottlenecks, throughput bottlenecks, resilience, redundancy, budget, in-house expertise, etc. These considerations will be discussed and elaborated upon from a practical experience point-of-view. Finally, the session will conclude with an exploration of the various tool options in the market.


Yellow Brick Road in OSS
Girish Pathak , GTE Laboratories
Abstract: The session should bring industry, as well as academic leaders to share ideas on how convergence, globalization, new technologies, and regulatory/market forces effect the way we (the operations & OSS technologists) support communication services. The purpose is to have discussion and develop consensus around four key themes (one each for tinman, strawman, lion, and the lost Dorothy) that resonate the shaping of the future operations and operations technologies.


Planning for Policy Based Networking
Chair: Walter Weiss, Lucent Technologies
Abstract: Pick up any networking magazine today and odds are that you will find an article dealing with Policy Based Networking. Whether covering the issue directly or as a part of discussing Directory Enabled Networking, Policy Based Networking is recognized as being one of the best ways to handle the many different service levels demanded by end users today. However, the promise of these technologies places additional burdens on network devices and support staff and changes the amount and type of planning that must be done to effectively deploy, manage and use policies. This session examines the issues that a Network Manager, CIO or CTO will need to be aware of to plan a successful implementation of Policy Based Networking and the planning steps that will help make policies do their job without unwanted, negative consequences.


Directory-Enabled Networking: From standards to products
Ritu Chadha, Telcordia Technologies
Abstract: There has been a great deal of momentum in the area of Directory-Enabled Networking (DEN) in the recent past. The goal of DEN is to provide a standards-based data model for representing various aspects of the network, ranging from network devices and their configurations to user and security information to network and service policies and resulting configuration actions. There are, currently, a number of working groups working more or less collaboratively to define pieces of the puzzle, including the DMTF CIM effort and the IETF Policy, RAP, and IPSec Policy working groups. At the same time, equipment vendors and operations support systems suppliers are scrambling to make their products "DEN-compliant." The purpose of this BOF is to bring together leaders in the DEN standards efforts, equipment vendors, and operations support systems suppliers, all of whom have a common interest in making the DEN vision become reality, and stimulate discussion of what can realistically be expected to result from DEN in both the near and long term, and what the different players need to do in order to ensure success.


A Customer Network Management System for Wide Area Networks
Zhenyu Li, Lucent Technologies
Abstract: Two recent trends are fueling the demand for Customer Network Management (CNM) offerings from service providers. The first trend is the rapid adoption of Virtual Private Network (VPN) in which private lines is being replaced by virtual circuits through public wide area networks. The second trend is bandwidth wholesaling in which a service provider such as a CLEC or an ISP buys bandwidth in big chunks from another service provider and then resale them to their own customers. A CNM system that gives a VPN customer or a bandwidth reseller a direct "view" into their portion of the public network is becoming a valuable service differenciator for some large service providers. A flexible and easy to configure model for customer resource partitioning and a fine grain control a customer's access to network management functions is essential. Other top requirements from service providers for such a CNM system is multiservice (i.e. FR/ATM/IP) capability, service level agreement (SLA), security, scalability and minimizing impact to network bandwidth and underlining element management systems. In this Bird of a Feather (BOF) session, we will discuss strategies to meet the above mentioned requirements. Lessons learned from products such as Lucent Technologies' NavisXtend CNM Gateway product will be highlighted.


Disaster Recovery: The Financials of Business Continuity
Michael Corby,  Netigy Corporation
Abstract: Disaster recovery will continue to be one of the greatest challenges for networking professionals as we enter the new millennium. It is often difficult to justify and quantify how much time and money should be spent on business continuity measures for disaster recovery. It is equally difficult to reach consensus on what needs to be protected and how to enable protection. A comprehensive business continuity plan will aim to protect investments in equipment, property and services; provide means to continue business operations and revenue generation; and maximize productivity of employees. This session discusses the methodology for developing financial justification for comprehensive business continuity, business interruption avoidance and disaster recovery.


Any questions or problems, please contact noms2000@comsoc.org