Tutorials

Sunday, 22 October 09:00 - 11:00

IPv6 Deployment in Cellular Networks
(also, IPv6-only in non-cellular networks)

Jordi Palet Martinez, The IPv6 Company

This tutorial will introduce reasons why Cellular networks – connecting either Smartphones, IoT devices or broadband subscribers – must use IPv6 instead of IPv4. It will also look at the possible approaches for doing that across different vendor platforms (iOS, Android, Windows, Linux, others).

Approaches to be presented include:
  • IPv6-only
  • IPv6-only+NAT64
  • IPv6-only+NAT64+DNS64
  • 464XLAT
  • Why other transition technologies aren’t being used
DNS64 implications for DNSSEC and possible solutions will also be introduced.

Finally, considerations in favour of using 464XLAT in non-cellular networks will be provided, so an operator with multiple access technologies (wired and wireless) can use a single transition mechanism across all the network, have only-IPv6 access links, but still provide dual-stack to customers.

Both business and technical aspects will be considered.

Where: Main Room
 

 

Sunday, 22 October 09:00 - 11:00

Decoding the IoT Ecosystem
Jad El Cham, RIPE NCC

The goal of this tutorial is to tackle the most common access technologies available today in the Internet of Things world. This will be done through identifying the different stages of the IoT ecosystem, starting from capturing the information and ending with data processing and storage. Some deployment scenarios will be addressed to show real-case installations of capture modules and data transfer models.

The tutorial will touch on some of the IoT Technical Enablers, along with the possible impact of 5G networks on the acceleration of adoption of large IoT deployments on a larger (i.e. national) scale.

The tutorial will also scratch the surface of IoT Security and will address some of the efforts, initiatives and best practices that different players are placing in that regards.

Where: Side Room
  

 

Sunday, 22 October 09:00 - 11:00

DDoS Attacks and the Rise of IoT Botnets
Khaled Fadda, Arbor Networks

Where: Tutorial Room

DDoS attacks are changing. The size of attacks, their frequency and their complexity are increasing. In this session, DDoS attacks and the latest DDoS attack trends will be discussed. An overview of the technology used for IoT botnets and how to defend against DDoS attacks will be introduced.

Agenda highlights:

  • DDOS attacks introduction
  • DDoS attacks types and some examples
  • DDoS weaponisation via Booters/Stressers
  • Vulnerable IoT devices and the rise IoT botnets
  • Latest DDoS attacks trends
  • DDoS attacks mitigation techniques