The following "Birds of a Feather" (BoF) sessions were held at the TERENA Networking Conference 2000.
Virtual and Persistent Presence is an interesting area of Internet development, which may be of great importance to the European research networking community. This BoF session presented ongoing work and plans, discussed the technical challenges, and aimed to identify those in the wider European community who are interested in technical development work or are already involved in such work. It is hoped that the BoF might lead to plans for new activities at a European scale.
The session was attended by 21 participants from seven countries and included presentations on:
Notes from this meeting are available.
This BoF session covered Log Anonymisation, Standard Log Format Descriptors and the Nature of Log Statistics. The session was attended by nine participants from seven countries.
Minutes from this meeting are available.
This informal presentation and Q&A session provided participants with an insight into the caching technology demonstrated by Novell in the conference Terminal Room.
Internet2, TEN-155 and TF-TANT activities have all successfully focused on deploying new technologies as they emerge and on acting as testbeds for these new capabilities. However these environments are primarily production networks and therefore do not readily lend themselves to supporting network research. The intent of this BoF was to identify and discuss network research topics and environments that are of interest to the international networking community, but specifically focusing on those research topics and areas that leverage Europe's network expertise.
Cisco's University Research Program (URP), managed by Bob Aiken is interested in engaging in a dialogue to identify research topics in networking that are of interest and importance to the European community and which may become potential candidates for support by Cisco's URP. Topics of particular interest include Mobile and Persistent Presence environments as well as ubiquitous computing - albeit focusing on the network capabilities necessary to support these areas. These nominally include Middleware such as accounting, authorisation, authentication, active directories, policy (security, QoS, VPNs) servers, locators / search engines, distributed database and caching technologies (e.g. to store status information) as well as network layer support for addressing and naming, and the monitoring, control, management and provisioning of network resources.