Saturday, February 17, 2001
Topic/Presenter |
---|
Full AbstractBGP is an essential part of ISP routing, but successful ISP routing includes far more than the protocol itself. Obtaining and managing address space, obtaining an AS number, and creating and registering routing policies are critical parts of operations. Understanding convergence requirements and other performance objectives for ISP routers also is important. This presentation will focus on BGP in the larger context, rather than being a basic protocol and configuration guide, as in Berkowitz' previous NANOG tutorials. Speakers |
Sunday, February 18, 2001
Topic/Presenter |
---|
Full AbstractThe most important aspect of satisfying an ISP customer is to ensure the customer has realistic expectations, and then to satisfy those expectations. Many customer desires center around "high availability," but there is an unfortunate tendency to focus on only one technology (e.g., multihomed BGP) to solve these problems. Speakers |
Full AbstractThis tutorial begins with an explanation of SNMP counters, where they are found, and how to obtain them efficiently for currently deployed technologies. The session then describes how standard IETF MIBs are organized, points out what useful data they contain, and how they fit together to provide a view of an operational network at layers 1, 2, and 3.
Speakers Mike MacFaden, Riverstone |
Full AbstractMulticasting is the most cost-effective means of delivering streaming media over the Internet, but its deployment has been limited by a number of technical and business problems. Within the last year, there have been several efforts to address these problems in the context of multicast one-to-many broadcasting. This is part of the general abandonment of the "Swiss Army knife" approach, where one multicast model was supposed to fit all possible uses, for multicast models tuned for specific applications. Speakers |
Full AbstractSpeakers |
Full AbstractWe have discovered a problem with the BGP decision algorithm that can led to an endless BGP convergence loop in certain topologies. So far, we know of two different types of "The Churn." Type I occurs in networks that have a single tier of RRs or confederation Sub-ASs (please see http://www.cisco.com/en/US/ts/fn/100/fn12942.html">http://www.cisco.com/en/US/ts/fn/100/fn12942.html for more details). Type II churn occurs in a network that has more than one tier of RRs or confederations. Currently there is not a solution for Type II churn, but we are working on a change to the BGP spec that will fix this problem. Speakers |
Full AbstractThe move towards a converged network architecture has brought about a new paradigm for service provisioning and delivery. Moreover, a class of applications which require a variety of quality of service levels from the network have emerged, which need to be provisioned on-demand in the network. The dynamic provisioning of network resources optimally is quite challenging in such an environment. Speakers |
Monday, February 19, 2001
Topic/Presenter |
---|
Full AbstractDevelopment and deployment of provider-provisioned VPNs is the latest VPN concept, having emerged during the past year. This panel will present the latest development of PPVPN technologies and models, and discuss ISP deployment status and experiences. Speakers |
Full AbstractAtoga Systems |
Full AbstractSpeakers |
Full AbstractThe IETF AAA Working Group is in the final stages of defining DIAMETER as a potential standard protocol to support network access applications, focusing on dial and mobile access. There are also a number of applications that are now using or planning to use COPS (Common Open Policy Service) for provisioning network services such as QoS. This BOF will include:
Speakers |
Full AbstractWhat do you require your customers and peers to do, and not do? Can the spam? Forge source addresses? Inject routes they don't own? If not, why not? What else? Come by and talk with your, um, peers about it and the results will be presented on Tuesday. Speakers |
Full AbstractSpeakers |
Full AbstractInternet Data centers provide a secure, high-capacity environment for communications companies and content providers to locate and host their Internet equipment. These centers provide the foundation for a variety of business models and Internet operations. The expertise involved in building and operating a network-focused facility are non-trivial. Even the low-end data center requires both an immediate cash draw and a recurring operations cost. The construction project itself requires months of planning and execution. Like most things, the first time one enters into a new arena, potentially costly mistakes are made. Speakers Bill Norton, Equinix |
Full AbstractThe technology and the economics behind some next-generation commercial IP networks are examined and an implementation of a backbone built on those principles is presented. Speakers Vijay Gill, MFN |
Full AbstractActive queue management (AQM) refers to a family of packet-dropping mechanisms for FIFO queues that has been proposed to support end-to-end congestion control mechanisms in the Internet. We examine the performance of AQM mechanisms by varying two parameters: the queue size and the dropping function. AQM flavors considered include both the well known "Drop from Tail" (TD) and "RED," as well as the more recently proposed "Gentle RED" and a previously unrecognized mechanism we call "Gentle RED with instantaneous queue size", or GRED-I. Speakers |
Full AbstractLink-flooding, as perpetrated by distributed denial of service attacks, is a serious threat to the Internet. We propose a pushback mechanism to defeat such attacks: routers experiencing sustained, massive congestion ask the upstream routers to drop the packets instead, thus freeing bandwidth for other traffic. This algorithm is applied recursively, pushing back to either an uncongested link or even the sources of the problem. Simulation results show that this scheme is indeed effective. Speakers |
Full Abstract(1) Over a dozen large carriers participate in activities to protect their networks from damage by backhoes and other hazards. What is the latest news from the backhoe damage prevention industry? Speakers |
|
Full AbstractThis panel discussion will begin with a brief discussion of network infrastructure developments in Columbia and other South American countries. Presentations will then be given by representatives of the two South Florida NAP initiatives: NAP Of the Americas and the Next Generation Internet Exchange, nicknamed the Florida MIX. The focus will be their architectural details, scopes, and positioning in the marketplace. A question-&-answer session follows the individual presentations. Speakers |
Full AbstractSome time ago the RIPE NCC embarked in a project to completely rewrite the database software. The project is almost finished and the transition to the new database system will occur in the first half of 2001. Speakers |
Full AbstractA large fraction of OC-192/STM-64 links are between equipment in a single central office (CO). The Optical Internetworking Forum (OIF) recently adopted two Very Short Reach (VSR) OC-192 interface Implementation Agreements to help reduce the cost of these intra-office OC-192 links. VSR-1 is 12 fibers at 1.25 Gbit/s each, using multi-mode ribbon fiber and reaching up to 300 meters. VSR-2 is 10 Gbit/s serial using single mode fiber (SMF) and reaching up to 600m. Speakers |
Full AbstractSpeakers |
Tuesday, February 20, 2001
Topic/Presenter |
---|
Full AbstractWith the rapid growth of the Internet routing table, providers are experiencing difficulty maintaining network stability, even with aggressive filtering policies in place. This panel will discuss the causes of routing prefix table growth, measures providers should take to curtail it, and alternate measures enterprises and service preoviders can take to ensure redundancy and load-balancing without announcing their prefixes into the global table. Speakers Panelist - Abha Ahuja, Arbor Networks |
|
Full AbstractMobile Wireless technologies are currently moving from circuit-based first-generation and 2G systems to packet-oriented 2.5 and 3G systems. We will discuss how the infrastructure and mobile devices will make the transition, while focusing on internet access for mobile services and opportunities for IP core service providers in 2.5 and 3G networks. Speakers |
Full AbstractThis presentation follows up Monday evening's Network Policy BOF. Speakers |