22nd LCN Technical Program: Expert Panel Sessions

Last update: 20 August 1997


Session 1: Electronic Commerce

Panel Chair: Professor Agnes Hui Chan, Northeastern University

Summary of Discussion: Along with the boom of the World Wide Web, comes the increased interest in using various forms of electronic payments, including the SET protocol for credit card payments, DigiCash, CyberCash, First Virtual and smart cards. The panelists will present their own experience and viewpoints on the different systems, pointing out issues concerning security, privacy and law enforcement regulations. They will also discuss the social and economic impact of electronic commerce.

Panelists:


Back to main conference schedule

Session 2: Various Approaches to IP over ATM

Panel Chairs: Dr. Rose Tsang, Sandia National Laboratories and Tim Salo, Minnesota Supercomputer Center

Summary of Discussion: Recently, there has been much activity and debate on various IP over ATM architectures. Standards-based approaches (e.g., LANE, MPOA, NHRP) from both the IETF and ATM Forum have been proposed. Claiming undue complexities in these standards-based protocols, at least two vendors have proposed proprietary IP over ATM solutions: IP Switching by Ipsilon Networks and Tag Switching by Cisco Systems. Both the standard-based approaches and the proprietary approaches provide advantages and disadvantages. Moreover both are in a state of flux and are continuing to evolve. This panel discussion presents experts who represent both the standards bodies (ATM Forum and IETF) as well as the vendors (Cisco and Ipsilon) who are providing the proprietary approaches.

Panelists:


Back to main conference schedule

Session 3: Current Issues in Network Security

Panel Chair: Dr. Ed Krall, Motorola SSTG

Summary of Discussion: In the last few years, the Internet has made possible the interconnection of the world in ways previously unimagined. The promise of ubiquitous electronic commerce and information access is dulled by the reality of the insecurities of computer and communication systems. The approaches to security range from the theoretical (ciphers, hashes, the "Orange Book") to the mundane (PGP plus a virus checker). Although this panel will discuss computer and network security architectures, it will concentrate on the practical: the tools, techniques and systems which assure secure networks.

Panelists:


Back to main conference schedule

Session 4: Always On, Always Connected (AOAC) - The Cost to Make it Possible

Panel Chair: Bikram Bakshi, Intel

Summary of Discussion: Infrastructure growth and user adoption rate of cellular telephony-based wireless communication has witnessed phenomenal growth in the last few years. The advent of digital wireless standards like GSM, IS-136 (TDMA), IS-95 (CDMA), etc. have propelled the development of a more "user-service-centered" wireless paradigm popularly known as Personal Communications Services (PCS). On a parallel front, Notebook PCs are becoming increasingly sought after business (and personal) tools because of their Desktop Equivalence and mobility. A key capability that is missing from the NB computers is the ability to stay connected to the network all the time. Mobile Users desire to be desktop equivalent in communications capability as well, i.e. to be Always On Always Connected even when they are on the move.

Making AOAC work with the current state of the art has some basic problems. Cellular phones can be used to maintain permanent connectivity but cost and network capacity considerations will push AOAC out of reach for most users. Wireless packet data services provide a cheaper alternative, but will severely limit the total available market because of the lack of deployed infrastructure. Also, current Operating Systems do not provide the support to switch seamlessly between communication media as and when cheaper and/or higher bandwidth connectivity becomes available; it would be inconvenient as well as cost-ineffective if we are forced to continue using a slower (and more expensive) cellular connection or are forced to restart our applications to make use of higher available bandwidth (like LAN/WLAN/POTS/ISDN etc.)

Panelists:


Back to main conference schedule