Call for Participation
Contribute your ideas and be part of the research and education community as we reimagine, together, the words envision, collaborate, and innovate.
Proposal submissions are being solicited in the following areas of interest, and will be reviewed and selected by a Program Committee of distinguished representatives from the R&E community. We’re counting on your innovative contributions to make the 2015 Internet2 Technology Exchange an invaluable technical program.
Sessions are generally 50 minutes in length, and will be scheduled from Monday, October 5, 8:30 am through Wednesday, October 7, 5:00 pm. The Call for Session Proposals is now closed. More information on the meeting schedule will be available on this site as it develops.
Areas of Interest
The R&E community has traditionally been at the forefront of advanced networking, developing new and innovative ways to support emerging challenges in support of scientific research, network research, and distance education. In recent years, the complexity of advanced networks has exploded with the widespread introduction of software-defined networking (SDN), the integration of compute and storage, and the exponentially increasing requirements for data-intensive science.
The Advanced Networking track is organized around three themes; traditional networking issues, advanced networking challenges, and “far horizon” networking ideas.
Topic #1: Traditional Networking Issues – This topic area covers issues that the R&E networking community have dealt with for years, from IPv6 to performance monitoring to security. Topic areas include, but are not limited to:
- Campus networking architecture
- Network monitoring and performance assurance
- Tools and techniques for generating insights from network traffic flows, traces, and statistics
- Security and privacy
Topic #2: Advanced Networking Challenges – This topic area covers new and emerging challenges facing the R&E networking community, from SDN to Science DMZs to integration with Amazon Web Services. Topic areas include, but are not limited to:
- Bridging the gap between campus IT, domain researchers, and network researchers to create a campus cyber-infrastructure plan
- Integrating SDN into production R&E networks
- Implementing a Science DMZ in production R&E networking
- Integrating compute and storage into the campus network architecture
- Experiences in implementing a CC-NIE, CC-IIE, or CC-DNI grant
- Integration with cloud providers (e.g., Amazon Web Services)
- Deployment of data transfer nodes (e.g., Globus)
- Moving to 100G in the campus environment
- Big data and analytics
- The Internet of Things
Topic #3: “Far Horizon” Networking Ideas – This topic area covers ideas the network research community has been exploring that have just started appearing as areas for the R&E networks to address, from named data networking to virtual networks. This includes, but is in no way limited to:
- Changing the way we think of addressing (e.g., named data networking)
- Networks in a virtual age (e.g., instantiating virtual networks)
- Software Defined Exchanges (SDXs)
- Global Network Architecture (GNA) and its emerging impact on domain and network research
- Building testbeds for the next era of networking
- What’s next in the ever changing Internet of Things
The Security area focuses on both network and system security topics, including (but not limited to):
- Major security incidents recently experienced by the community, particularly incidents yielding significant “lessons learned”
- Distributed denial of service (DDoS) attacks, particularly amplification attacks involving spoofed NTP or DNS traffic and deployment of BCP38/BCP84 anti-spoofing mechanisms
- Malware-related challenges, including Cryptolocker outbreaks, “extortion-ware,” and malware on mobile devices
- Applied practitioner-level cryptography
- Cryptographic currencies and their impact on campuses and users
- Security of cloud-based services, including experiences assessing and hardening cloud software as a service (SAAS) and cloud infrastructure service offerings; also delivery of security services via the cloud, including remote penetration testing, cloud-based anti-spam/anti-malware filtering, cloud-based intrusion detection, etc.
- The unique challenges of network security at 10Gbps, 40Gbps, and higher speeds
- Security opportunities in OpenFlow and software-defined networking (SDN)
- Scalable deployment of multi-factor/multi-channel authentication (including lessons learned from large-scale deployments)
- In the context of IPv4 address space exhaustion, new security issues arising from commercial deployment of large-scale (aka “carrier grade”) NAT, or from accelerated deployment of IPv6
- Routing security (RPKI and BGP route hijacking analysis/mitigation, attacks against the routing infrastructure, control plane, etc.)
- DNSSEC deployment, particularly related to DANE (DNS-Based Authentication of Named Entities)
- Layer 2 Ethernet security (ARP/ND spoofing and related threats)
- IPSec deployment experiences
- Mobile device security, including experiences with BYOD and wireless security, as well as experiences supporting eduroam
- Security policy, risk and compliance, and IT governance, particularly online privacy and accessibility
- Supporting the research community’s unique IT security needs
- Physical security of advanced networking facilities
- Disaster recovery/business continuity
- Measuring success: security metrics and benchmarking
- New and promising network security tools, particularly tools for collaboratively sharing data about security incidents at scale
- Integrating threat intelligence into information security programs
- Reports on security-related work by community members
Trust & Identity
The Trust and Identity track provides a venue for identity architects, developers and implementers to explore and discuss topics of broad interest to the community. We invite your submissions, which may focus on such identity and access management topics as:
- New issues in managing campus identities
- Service provisioning, both locally and to the cloud
- Managing permissions
- Use and integration of group management
- Use and integration of multifactor authentication
- Use and integration of external identities
- Attribute release
- User consent
- Other areas of interest in identity and access management
Cloud Services (Systems Integration & Ownership)
Presentations should focus on projects, initiatives, and best practices related to development, deployment, and implementation of cloud services and applications within the R&E community, positioned within the Internet2 NET+ portfolio. Presentations may also cover the broader set of standards, policies, practices, and service offerings to support a rapidly expanding set of solutions needed for campus, individual, and service providers in a cloud-driven technical environment.
Submissions may include (but are not limited to):
- Cloud service integration and architecture
- Identity and middleware
- Risk mitigation
- Cloud contracting
- Cloud integration
- Cloud security
- Cloud applications
Topics of interest in this track include network research as well as presentations from those working in or closely with domain sciences where research relies heavily on high-performance computing (HPC), “big data” and networking, including:
- Developments in cyberinfrastructure for research
- National research computing resources (e.g., OSG, XSEDE, CloudLab, Chameleon Cloud)
- Network research
- Bridging from campus to national cyberinfrastructure
- Regional data innovation hubs
- Models of support for data and computing intensive research
- Domain-specific applications of cyberinfrastructure in cosmology, earth sciences, high-energy physics, genomics, life sciences, etc.
The goals of Research track presentations are to:
- Highlight advances in network research
- Discuss applications of advanced network technologies in basic science research
- Inform HPC and networking attendees about the challenges faced in particular areas of research
- Explore possible collaborations
The Call for Session Proposals is now closed. More information on the meeting schedule will be available on this site as it develops.
One of the many benefits of the 2015 Internet2 Technology Exchange is the opportunity to hold working meetings—working or advisory groups, birds-of-a-feather groups (BoFs), special interest groups (SIGS), etc.—in conjunction with other meeting activities.
Meetings relevant to topic areas will be given a level of preference conforming to the overall programmatic goals for the event. Internet2-sanctioned working and/or advisory groups will be given preference in scheduling. All other proposals will be accepted based on space availability and we will attempt to accommodate all requests on a first-come, first-served basis. Your flexibility with day/time selections and meeting duration will assist us in accommodating your request.
The Call for Working Meetings is now closed. More information on the meeting schedule will be available on this site as it develops.
2015 Internet2 Technology Exchange sponsorships offer your organization unmatched visibility and alignment with your most important constituencies. We expect this gathering to host over 800 information technology decision-makers and high-level influencers from the nation’s top universities, government and scientific research organizations. As a sponsor, your organization automatically earns a benefit package containing special privileges not available by any other means. No other vehicle can single out your organization so effectively before this important audience. Sponsorships are limited in number and available on a first-come, first-served basis.
See Technology Exchange Sponsorship for details. Please contact Holly Hein, Marketing & Communications Specialist at email@example.com or (720) 379-9674 to reserve your sponsorship or plan your organization’s entire annual participation at all Internet2 events.