Saturday, May 19, 2001
Topic/Presenter |
---|
Full AbstractThis tutorial introduces service providers to some more advanced BGP features and techniques to aid with operating their networks within the Internet. After a brief recap of iBGP, eBGP and common attributes, the tutorial will look at the various scaling techniques available, when to use BGP instead of an IGP, and examine policy options available through the use of local preference, MED and communities. The tutorial will then briefly cover some basic multihoming techniques, before finishing with a look at some of the facilities available for debugging problems in BGP networks. Speakers |
Full AbstractThis session focuses on tools that will help small or rural ISPs with traffic engineering management for inbound and outbound flows. Tools to be covered include:
Speakers |
Sunday, May 20, 2001
Topic/Presenter |
---|
RecordingsFull AbstractThis tutorial covers all aspects of current ARIN (American Registry for Internet Numbers) policies and guidelines for obtaining IP address space and AS numbers. The session also explains the Policy Evaluation process, giving attendees who are interested in changing current ARIN policies or proposing new ones an opportunity to talk directly with members of the ARIN staff. Speakers |
Full AbstractSpeakers |
|
Full AbstractIPv4 address space is critical to the operation of today's Internet, and exhaustion of the IPv4 address space was once thought to be likely in the mid-nineties. Nonetheless, few systematic studies of the rate of IPv4 depletion have been undertaken in the past five years. ARIN recently took the lead, with active support from APNIC and RIPE NCC, in establishing a small "blue ribbon" team to do quantitative analyses and forecasts of consumption of the identifiers that the RIRs (the Regional Internet Registries ARIN, APNIC and RIPE NCC) maintain, and to assess their impact on the global Internet, in support of policymakers in the RIRs and elsewhere. To that end, we are also working to standardize the format and semantics of RIR allocation data, and to make them available to other external researchers. Speakers |
RecordingsFull AbstractSince summer 2000, six hands-on workshops have been held to test drive the DNS Security Extensions. One of these workshops followed NANOG 20. A number of software fixes, protocol issues, and operational issues have been identified and discussed. The presentation summarizes the lessons learned and future direction of the DNSSEC effort. Speakers |
Monday, May 21, 2001
Topic/Presenter |
---|
RecordingsFull AbstractThis tutorial provides an update on recent and contemplated improvements to the Internet Standard Management Framework based on the Simple Network Management Protocol (SNMP) and the Management Information Base (MIB).
Speakers |
Full AbstractThis tutorial is an introduction to current IP multicast practice, with an emphasis on inter-domain routing (especially inter-Autonomous System peerings.) The session will cover the M-BGP, MSDP, PIM Sparse Mode, and IGMP protocols, and how these protocols interoperate to provide scalable IP multicast service. Both the Any Source Multicast (ASM) and Source Specific Multicast (SSM) multicast service models will be discussed. Speakers |
Full AbstractStephen will present a slightly more detailed recap of the last NANOG's network policy BOF, hint at a tutorial session that might occur at the next NANOG, and then open the floor to discussion much like last time (stepping in on occasion to play Devil's Advocate or otherwise keep some form of debate going). Speakers |
Full AbstractCharlotte's Web Networks |
Full AbstractSpeakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractA few highly publicized incidents have demonstrated the threat posed by denial-of-service attacks, but the community has no current, quantitative data about how serious a problem this actually is. Moreover, collecting such information is complicated by the distributed nature of attacks and concerns about privacy. Speakers |
RecordingsFull AbstractThis presentation summarizes over a year of operational experience in tracking denial-of-service attacks across a large regional ISP. We present measurements and observations on attacks ranging from small floods targeting dorm-room IRC servers, to all out, well-coordinated attacks against elements of the backbone infrastructure. In collaboration with backbone operations/engineering staff, we deployed analysis and probe machines at the peering points and major customer access points in a Michigan provider's network. The measurement infrastructure combined Netflow collection with network topology statistics to identify attack ingress points and trajectories. The presentation will highlight some of the operational challenges we faced as well the successes. Speakers |
Full AbstractDistributed denial of service (DDoS) attacks are really network operations and performance problems, rather than strictly security events. To effectively address these attacks, the network infrastructure must be able to quickly identify unusual packet streams at high rates and help operators move closer to the packets' sources. Speakers |
Full AbstractNetwork operators have a fairly good idea about how well their networks are working on a macro level -- link downtime percentages, ping latencies, CPU utilization, etc. However, few have examined the fine-grained behavior of their networks. We have collected high-resolution (20 microseconds) jitter measurements on a wide-area backbone network for a duration of several weeks. Based on this data, we claim that today's wide-area backbone networks are ready to support applications such as circuit emulation over IP -- or they could be, as this example shows. Speakers Chia-Chee Kuan, Packet Design |
Full AbstractPlease see the following link for presentation slides: Speakers |
Tuesday, May 22, 2001
Topic/Presenter |
---|
Full AbstractThis talk describes a new work area recently defined by the http://www.ietf.org/">Internet Engineering Task Force. The Internet Engineering Steering Group, an IETF leadership council, has noticed an abundance of Internet Drafts related to MPLS and optical networking. Several hundred I-Ds were intended to be considered in the MPLS or 'IP over Optical' Working Groups, and were not within the charters for those WGs. In an attempt to return to sanity, the IESG formed a new work area with six WGs and has tried to divide the work among them. See the http://www.ietf.org/html.charters/wg-dir.html#Sub-IP_Area">IETF Web pages for descriptions of the new Working Groups. Operator input needed! Speakers |
Full AbstractMPLS has been viewed as an IP traffic engineering technology, yet it has another, more compelling application as a multi-service transport medium. This presentation will focus on how a service provider can offer layer 2 switched services, such as long-haul Ethernet, frame relay, and ATM, on an IP/MPLS network. It will explain one method of using LDP-DU (Label Distribution Protocol running in Downstream Unsolicited mode) as a signaling protocol to provision these services over traffic-engineered MPLS tunnels, and how a service provider can match the characteristics and SLAs of these services as they are offered on a switched network. Speakers |
Full AbstractVPNs may empower a mobile workforce with secure and flexible corporate network access, allow xSPs to accommodate inexpensive and rapid integration of new customers, or enable ASPs to deliver complex, mission-critical applications to their customers. However, with all of Virtual Private Networking's great promises comes a potentially significant price. The goal of this presentation is to shed some light on these challenges and highlight some of our key learnings and solutions. Topics to be covered include good NAT bad NAT, Internet performance issues, troubleshooting complexity, and the need for education and awareness. Speakers |
|
Full AbstractIn this talk, we explore the use of a wireless mesh network of up to 1 Gb/s directional Radio Frequency links. Such networks are rather agile and fragile. We outline techniques we plan to use to modify OSPF for this environment, such as rapid rerouting, QoS provisioning, radio link power, and impairment management. We are implementing multipath routing, IP encapsulation, and local fault management to handle local wireless link failures. A prototype effort is described, and some preliminary thoughts for a campus backbone at Arizona State University are proposed. Speakers |
RecordingsFull AbstractThe presenters are augmenting exchange facilities for IPv6, and will discuss:
http://www.isi.edu/~bmanning/nanog22-v6/v3_document.htm">http://www.isi.edu/~bmanning/nanog22-v6/v3_document.htm Please see the address below for Kato's presenation: http://www.wide.ad.jp/nspixp6/nanog22/nspixp6.html">http://www.wide.ad.jp/nspixp6/nanog22/nspixp6.html Speakers |
Full AbstractThe creation of Information Sharing and Analysis Centers (ISACs) to protect critical infrastructure is encouraged by "Presidential Decision Directive 63." ISACs exist now for the financial services, information technology, telecommunications, and electric utility industries. The Federal government has proposed legislation that would ensure the confidentiality of information collected by ISACs and would also provide antitrust and liability protection.
Speakers |
RecordingsFull AbstractSpeakers |