Management of Enterprise Networks
Chair: Steve Weinstein NEC USA
Abstract: This informal discussion session is for far-reaching discussion on issues
in managing enterprise networks in which media are mixing with traditional information
retrieval functions, and the Internet has become a big part of the picture. The issues
could include:
Managing organizational policies for differentiated traffic treatments
(great service for the boss, minimal service for the summer intern)
Management of VPNs through the Internet (Security, resource utilization
enforcement, implementation of traffic treatment policies, etc.)
Measuring and assuring end-to-end reliability in Extranets.
Will CORBA replace CMIP and SNMP?
Implementing MPLS in enterprise networks with heterogeneous switching
facilities.
Cost-based routing strategies in Extranets.
Implications of wireless Internet access for management of
enterprise networks
Brief (less than 10 minutes), provocative presentations are solicited.
Event Correlation
Chair: Robert E. Freitas, Freitas Consulting Inc.
Abstract: This session will begin by defining what is event correlation. It is not
a single thing, as most people believe. There are three levels of event correlation:
the object level,
the network level,
and the service level.
Each of these three levels will be described and explained in detail.
Next, an architectural model of how event correlation can be introduced into the typical
network management system will be developed. Naturally, this model will illustrate the
three levels of correlation. In addition, there are a number of considerations, such as
scalability, processing bottlenecks, throughput bottlenecks, resilience, redundancy,
budget, in-house expertise, etc. These considerations will be discussed and elaborated
upon from a practical experience point-of-view. Finally, the session will conclude with an
exploration of the various tool options in the market.
Yellow Brick Road in OSS
Chair: Girish Pathak , GTE Laboratories
Abstract: The session should bring industry, as well as academic leaders to share
ideas on how convergence, globalization, new technologies, and regulatory/market forces
effect the way we (the operations & OSS technologists) support communication services.
The purpose is to have discussion and develop consensus around four key themes (one each
for tinman, strawman, lion, and the lost Dorothy) that resonate the shaping of the future
operations and operations technologies.
Planning for Policy Based Networking
Chair: Walter Weiss, Lucent Technologies
Abstract: Pick up any networking magazine today and odds are that you will find an
article dealing with Policy Based Networking. Whether covering the issue directly or as a
part of discussing Directory Enabled Networking, Policy Based Networking is recognized as
being one of the best ways to handle the many different service levels demanded by end
users today. However, the promise of these technologies places additional burdens on
network devices and support staff and changes the amount and type of planning that must be
done to effectively deploy, manage and use policies. This session examines the issues that
a Network Manager, CIO or CTO will need to be aware of to plan a successful implementation
of Policy Based Networking and the planning steps that will help make policies do their
job without unwanted, negative consequences.
Directory-Enabled Networking: From standards to products
Chair: Ritu Chadha, Telcordia Technologies
Abstract: There has been a great deal of momentum in the area of Directory-Enabled
Networking (DEN) in the recent past. The goal of DEN is to provide a standards-based data
model for representing various aspects of the network, ranging from network devices and
their configurations to user and security information to network and service policies and
resulting configuration actions. There are, currently, a number of working groups working
more or less collaboratively to define pieces of the puzzle, including the DMTF CIM effort
and the IETF Policy, RAP, and IPSec Policy working groups. At the same time, equipment
vendors and operations support systems suppliers are scrambling to make their products
"DEN-compliant." The purpose of this BOF is to bring together leaders in the DEN
standards efforts, equipment vendors, and operations support systems suppliers, all of
whom have a common interest in making the DEN vision become reality, and stimulate
discussion of what can realistically be expected to result from DEN in both the near and
long term, and what the different players need to do in order to ensure success.
A Customer Network Management System for Wide Area Networks
Chair: Zhenyu Li, Lucent Technologies
Abstract: Two recent trends are fueling the demand for Customer Network Management
(CNM) offerings from service providers. The first trend is the rapid adoption of Virtual
Private Network (VPN) in which private lines is being replaced by virtual circuits through
public wide area networks. The second trend is bandwidth wholesaling in which a service
provider such as a CLEC or an ISP buys bandwidth in big chunks from another service
provider and then resale them to their own customers. A CNM system that gives a VPN
customer or a bandwidth reseller a direct "view" into their portion of the
public network is becoming a valuable service differenciator for some large service
providers. A flexible and easy to configure model for customer resource partitioning and a
fine grain control a customer's access to network management functions is essential. Other
top requirements from service providers for such a CNM system is multiservice (i.e.
FR/ATM/IP) capability, service level agreement (SLA), security, scalability and minimizing
impact to network bandwidth and underlining element management systems. In this Bird of a
Feather (BOF) session, we will discuss strategies to meet the above mentioned
requirements. Lessons learned from products such as Lucent Technologies' NavisXtend CNM
Gateway product will be highlighted.
Disaster Recovery: The Financials of Business Continuity
Chair: Michael Corby, Netigy Corporation
Abstract: Disaster recovery will continue to be one of the greatest challenges for
networking professionals as we enter the new millennium. It is often difficult to justify
and quantify how much time and money should be spent on business continuity measures for
disaster recovery. It is equally difficult to reach consensus on what needs to be
protected and how to enable protection. A comprehensive business continuity plan will aim
to protect investments in equipment, property and services; provide means to continue
business operations and revenue generation; and maximize productivity of employees. This
session discusses the methodology for developing financial justification for comprehensive
business continuity, business interruption avoidance and disaster recovery.