^ Top

NANOG Meeting Presentation Abstract

Tutorial: Introduction to MPLS
Meeting: NANOG19
Date / Time: 2000-06-11 1:30pm - 5:00pm
Room: Pavilion I-III
Presenters: Speakers:
Jeff Doyle, Juniper.
Chris Summers, Juniper Networks.
Abstract: A half-day, interactive tutorial that discusses and demonstrates the interaction between MPLS and the traditional IP routing protocols. The tutorial begins by examining the general requirements for traffic engineering and then presents how specific features of MPLS address these requirements. The tutorial then proceeds to address how advanced features of MPLS work in conjunction with BGP and the IGP (IS-IS or OSPF) to control network traffic. <BR><BR> During the tutorial, the presenters will augment the lecture material by demonstrating various MPLS features including the signaling of LSPs with RSVP, mapping routes to LSPs, configuring LSPs for transit and local traffic, and enabling advanced traffic protection features. <BR><BR> Topics to be covered include: <UL> <LI> Signaling LSPs with RSVP</LI> <LI> Constraint-based traffic engineering</LI> <LI> Extensions to IS-IS and OSPF</LI> <LI> Traffic Engineering Database</LI> <LI> Strict and loose routing</LI> <LI> Administrative groups (a.k.a. Colors)</LI> <LI> Hot-standby and Fast Reroute LSPs</LI> <LI> Applications and advanced features</LI> </UL>
Files: pptTraffic Engineering With MPLS(PPT)
mp4Traffic Engineering With MPLS(MP4)
Sponsors: None.
Tutorial: BGP Configuration From the IRR
Meeting: NANOG19
Date / Time: 2000-06-11 1:30pm - 5:00pm
Room: Enchantment A & B
Presenters: Speakers:

Cengiz Alaettinoglu, ISI

Cengiz Alaettinoglu works on the Routing Arbiter project at the USC Information Sciences Institute. He co-chairs the IETF Routing Policy System WG, which defined the Routing Policy Specification Language along with the protocols to enable a distributed, secure routing policy system.
Abstract: This tutorial introduces the Internet Routing Registry (IRR), the Routing Policy Specification Language, (RPSL) and the RtConfig router configuration tool. We explain how to register and query routing policy objects in the IRR. After a brief introduction to routing policies, we discuss RPSL, the language for specifying Internet routing policies in the IRR. We explain several policy examples currently practiced in the Internet and specify them using RPSL. These include as-path prepending, setting preferences and other metrics based on the community attribute, and access lists based on prefix and as-path expressions. <BR><BR> RtConfig is the focus of this tutorial. RtConfig can configure Cisco, Juniper, Nortel, Gated and RSd routers with BGP policies. The amount of configuration it performs is controllable; hence, the amount of information that needs to be published in the IRR is controllable as well. RtConfig can be used to only generate prefix access lists from the IRR, or to generate full-blown router configurations.
Files: None.
Sponsors: None.
Tutorial: Crafting Confederations
Meeting: NANOG19
Date / Time: 2000-06-11 7:30pm - 9:00pm
Room: Pavilion I-III
Presenters: Speakers:
Dan Golding, NetRail.
Miguel Dimayuga, Earthlink.
Abstract: The purpose of this tutorial is to present a framework for the construction of a BGP architecture for mid- to large-sized ISPs utilizing BGP confederations. The primary building block for this approach is the concept of the \"POP as Confederation\". While concentrating on theory, this session will also highlight the real world implementation of this approach on Cisco routers at Mindsping, and on Juniper routers at NetRail. Elements include: <UL> <LI> Meaningful MEDs for customers, as well as basic, non-MPLS traffic engineering. <BR><BR></LI> <LI> A well thought-out community structure to optimize route filtering and propagation. <BR><BR></LI> <LI> Special areas of interest include supporting wholesale dialup and broadband providers (OPN) and allowing customers the maximum possible control of their routing. <BR><BR></LI> </UL> With the rise of a new generation of service providers, many of which are based on broadband technologies, there is an opportunity to take a new look at service provider design. This session is designed to address the concerns of such emerging providers as they outgrow their current architectures and look for new approaches.
Files: mp4Crafting Confederations(MP4)
pptDan Golding Presentation(PPT)
Sponsors: None.
OSPF and IS-IS: A Comparative Anatomy
Meeting: NANOG19
Date / Time: 2000-06-12 9:15am - 10:15am
Room: Pavilion IV-VI
Presenters: Speakers:
Dave Katz, Juniper.
Abstract: The presenter provides an overview of the technical similarities and differences between the two protocols, and describes the cases where one might be preferable over the other.
Files: pptDave Katz Presentation(PPT)
mp4OSPF and IS-IS(MP4)
Sponsors: None.
Bellwether: Surrogate Services for Popular Content
Meeting: NANOG19
Date / Time: 2000-06-12 10:15am - 10:45am
Room: Pavilion IV-VI
Presenters: Speakers:
Ted Hardie, Equinix.
Duane Wessels, Equinix.
Abstract: The presenters will describe the architecture and performance characteristics of an open source surrogate system called \"bellwether,\" based on squid and zebra. This system implements an outward facing proxy (surrogate) that acts on behalf of a content source to handle requests for content that is experiencing a sudden spike in popularity due to a flash crowd or \"CNN event.\"<BR> As a brief overview, subscribed content sources activate a surrogate placed near a network border using a protocol based on NECP (Network Element Control Protocol). The surrogate then activates an overlay network, which uses standard IBGP and GRE tunnels to ensure that it is part of the data path for new requests for content.<BR> <BR> This system is designed to reduce both load on content servers and on the networks hosting those servers. The presenters will discuss both how an outward-facing proxy\'s focus on data already known to be popular can improve cache performance and present data for the specific cache replacement policies which have been tested.
Files: mp4Bellwether(MP4)
pptTed Hardie Presentation(PPT)
Sponsors: None.
IPv6 Update
Meeting: NANOG19
Date / Time: 2000-06-12 1:30pm - 2:00pm
Room: Pavilion IV-VI
Presenters: Speakers:
Bill Manning, ISI.
Michael O\'Neill, ARIN.
Abstract: Penetration Rate of Private Address Space<BR> <BR> Current Use of IPv6 Address Space<BR> <BR> ARIN IPv6 Delegation Status
Files: pptARIN IPv6 Delegation Status(PPT)
mp4IPv6 Update(MP4)
Sponsors: None.
Large Scale Packet Optimized Rings - Part II
Meeting: NANOG19
Date / Time: 2000-06-12 3:45pm - 4:15pm
Room: Pavilion IV-VI
Presenters: Speakers:
Marc Teichtahl, VersaTel Telecom.
Abstract: Furthering our presentation at NANOG 16, this talk will focus on the development and deployment issues of a 32-node international DPT/SRP backbone. We will examine SDH/DPT tradeoff issues, routing architectures for multi-access media backbones, and IGP and EGP constraints. A brief look at IP service integration technologies such as MPLS and optical switching will also be included.
Files: mp4Large Scale Packet Optimized Rings(MP4)
pptMarc Teichtahl Presentation(PPT)
Sponsors: None.
Peering BOF III
Meeting: NANOG19
Date / Time: 2000-06-12 7:30pm - 9:00pm
Room: Pavilion IV-VI
Presenters: Speakers:
Bill Norton, Equinix.
Abstract: Internet Service Providers interconnect in peering and transit relationships in order to provide their customers with access to the global Internet. This presentation and the resulting discussion is based upon operations research surrounding the current practices documented in the white paper Peering in the US, based upon the three phases of Internet peering: <UL> <LI> Identification of potential peer,</LI> <LI> Initial discussions, and</LI> <LI> Implementation <BR><BR></LI> </UL> The report is based upon interviews with about 50 ISP Peering Coordinators, and has been presented at US and non-US forums as well (initially presented at NANOG Peering BOF in Montreal, IEPG in Oslo, APRICOT in Seoul, Interconnect Accounting and Billing in London, and the ITU meeting in Rio de Janeiro) and has been updated to incorporate feedback from the European and Asia Pacific arenas.
Files: docPeering Decision Tree (Full paper in MS Word, updated 7/21/00)(DOC)
Sponsors: None.
Tier 2 - 5 Peering BOF
Meeting: NANOG19
Date / Time: 2000-06-12 9:00pm - 10:30pm
Room: Enchantment A & B
Presenters: Speakers:
Daniel Golding, NetRail.
Nathan Estes, NetRail.
Abstract: This BOF provides a forum for the discussion of: <UL> <LI> Methods of small peer interconnections</LI> <LI> Demand for Tier 2-5 peering</LI> <LI> Costing models</LI> <LI> Interaction of larger NSPs with smaller peers, including settlement based peering, and providing regional routes. <BR><BR></LI> </UL>
Files: None.
Sponsors: None.
DNS Security Extensions
Meeting: NANOG19
Date / Time: 2000-06-13 9:00am - 10:00am
Room: Pavilion IV-VI
Presenters: Speakers:
Edward Lewis, TISlabs.
Abstract: An overview of recent IETF work to add security to the Domain Name System. Topics covered include DNSSEC (RFC 2535), Query/Response security, using DNS as a server of security data, and securing dynamic update. In addition, material on how DNS security will impact operation is included.
Files: mp4DNS Security Extensions(MP4)
pptEdward Lewis Presentation(PPT)
Sponsors: None.
Is Your Network Available? (Or, Common Network Metrics)
Meeting: NANOG19
Date / Time: 2000-06-13 10:45am - 11:05am
Room: Pavilion IV-VI
Presenters: Speakers:
Nevil Brownlee, CAIDA.
Abstract: The CAIDA Metrics Working Group has produced a draft document, \'Network Measurement FAQ,\' intended for people who buy Internet service and make it available to others, e.g. corporate users and smaller ISPs. This presentation will introduce the FAQ, highlighting its section on \'the Most Common Metrics.\'<BR> <BR> Common Metrics such as latency, packet loss and availability often appear in service desccriptions published on the Web, but they are seldom clearly stated. The Working Group\'s definition of availability, and methods of measuring it, will be explained.
Files: mp4Common Network Metrics(MP4)
pptNevil Brownlee Presentation(PPT)
Sponsors: None.
Impact of CALEA on Network Operators
Meeting: NANOG19
Date / Time: 2000-06-13 11:05am - 12:00am
Room: Pavilion IV-VI
Presenters: Speakers:
Chip Sharp, Cisco Systems.
Abstract: This talk discusses the impact of the CALEA law on network operators. It covers such topics as: <UL> <LI> What is CALEA?</LI> <LI> The difference between CALEA and wiretapping.</LI> <LI> Definition of terminology used in CALEA</LI> <LI> What is a safe harbor standard?</LI> <LI> Compliance requirements on Service Providers and equipment vendors.</LI> <LI> Timeframes for compliance.</LI> <LI> Industry efforts</LI> </UL>
Files: pptChip Sharp Presentation(PPT)
mp4Impact of CALEA on Network Operators(MP4)
Sponsors: None.
Real-Time Visualization of IP over Connection-Oriented WANs
Meeting: NANOG19
Date / Time: 2000-06-13 2:15pm - 2:45pm
Room: Pavilion IV-VI
Presenters: Speakers:
Tim Salo, NetworkCS.
Abstract: We have developed a tool that creates a real-time, fine-grained, global visualization of a wide-area, connection-oriented, IP networks. While the tool is currently tailored to IP over ATM networks, the techniques are applicable to any network that has some sort of connections under IP (such as all-optical networks, MPLS, mobile IP and others). See <A HREF=\"http://www.msci.magic.net/visualization/\">http://www.msci.magic.net/visualization/</A> for more information. Our software is largely complete and we are now looking for production networks on which to run this tool.
Files: mp4Real-Time Visualization of IP(MP4)
pptTim Salo Presentation(PPT)
Sponsors: None.
Mail Metering, or How to Block Outbound Spam
Meeting: NANOG19
Date / Time: 2000-06-13 3:30pm - 4:00pm
Room: Pavilion IV-VI
Presenters: Speakers:
Robert Haskins, ZipLink.
Abstract: ZipLink is currently working on a technical solution to the problem of outbound spam. We are a wholesale dialup ISP, and as such, can be a source of spam. Our idea is to track, utilizing RADIUS accounting records fed into an Oracle database, the IP addresses and usernames of all customers logging into our dial up ports. Then, when a customer attempts to send email, their outbound mail connection is redirected to a mail relay which checks their current number of outbound messages against preset limits in the database. If they exceed any of the limits, the message is bounced/dropped. If they do not exceed the limit, the message is allowed to go through and their email counts in the database are updated to reflect their most recent activity.<BR> We have successfully prototyped this functionality in a lab environment, and are just now beginning limited POP testing before a full scale rollout to follow later this year.
Files: mp4Mail Metering, or How to Block Outbound Spam(MP4)
pptRobert Haskins Presentation(PPT)
Sponsors: None.

Back to NANOG19 agenda.

NANOG19 Abstracts

  • IPv6 Update
    Speakers:
    Bill ManningISI; .
    Michael O\'NeillARIN; .
  • IPv6 Update
    Speakers:
    Bill ManningISI; .
    Michael O\'NeillARIN; .

 

^ Back to Top