Sunday, June 11, 2000
Topic/Presenter |
---|
Full AbstractThis tutorial introduces the Internet Routing Registry (IRR), the Routing Policy Specification Language, (RPSL) and the RtConfig router configuration tool. We explain how to register and query routing policy objects in the IRR. After a brief introduction to routing policies, we discuss RPSL, the language for specifying Internet routing policies in the IRR. We explain several policy examples currently practiced in the Internet and specify them using RPSL. These include as-path prepending, setting preferences and other metrics based on the community attribute, and access lists based on prefix and as-path expressions. Speakers |
Full AbstractSpeakers |
RecordingsFull AbstractA half-day, interactive tutorial that discusses and demonstrates the interaction between MPLS and the traditional IP routing protocols. The tutorial begins by examining the general requirements for traffic engineering and then presents how specific features of MPLS address these requirements. The tutorial then proceeds to address how advanced features of MPLS work in conjunction with BGP and the IGP (IS-IS or OSPF) to control network traffic.
Speakers |
RecordingsFull AbstractThe purpose of this tutorial is to present a framework for the construction of a BGP architecture for mid- to large-sized ISPs utilizing BGP confederations. The primary building block for this approach is the concept of the "POP as Confederation". While concentrating on theory, this session will also highlight the real world implementation of this approach on Cisco routers at Mindsping, and on Juniper routers at NetRail. Elements include:
Speakers |
RecordingsFull AbstractPenetration Rate of Private Address Space Speakers |
Full AbstractSpeakers Panelist - Bill Maton, Communications Research Centre Panelist - Rob Rockell, Sprint |
Monday, June 12, 2000
Topic/Presenter |
---|
RecordingsFull AbstractFurthering our presentation at NANOG 16, this talk will focus on the development and deployment issues of a 32-node international DPT/SRP backbone. We will examine SDH/DPT tradeoff issues, routing architectures for multi-access media backbones, and IGP and EGP constraints. A brief look at IP service integration technologies such as MPLS and optical switching will also be included. Speakers |
Full AbstractAkamai Technologies, Inc. |
Full AbstractInternet Service Providers interconnect in peering and transit relationships in order to provide their customers with access to the global Internet. This presentation and the resulting discussion is based upon operations research surrounding the current practices documented in the white paper Peering in the US, based upon the three phases of Internet peering:
Speakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractThe presenter provides an overview of the technical similarities and differences between the two protocols, and describes the cases where one might be preferable over the other. Speakers |
Full AbstractThis BOF provides a forum for the discussion of:
Speakers |
Full AbstractThe presenters will describe the architecture and performance characteristics of an open source surrogate system called "bellwether," based on squid and zebra. This system implements an outward facing proxy (surrogate) that acts on behalf of a content source to handle requests for content that is experiencing a sudden spike in popularity due to a flash crowd or "CNN event." Speakers |
RecordingsFull AbstractSpeakers |
|
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractSpeakers |
Full AbstractWe have developed a tool that creates a real-time, fine-grained, global visualization of a wide-area, connection-oriented, IP networks. While the tool is currently tailored to IP over ATM networks, the techniques are applicable to any network that has some sort of connections under IP (such as all-optical networks, MPLS, mobile IP and others). See http://www.msci.magic.net/visualization/">http://www.msci.magic.net/visualization/ for more information. Our software is largely complete and we are now looking for production networks on which to run this tool. Speakers |
|
RecordingsFull AbstractSpeakers |
Tuesday, June 13, 2000
Topic/Presenter |
---|
RecordingsFull AbstractZipLink is currently working on a technical solution to the problem of outbound spam. We are a wholesale dialup ISP, and as such, can be a source of spam. Our idea is to track, utilizing RADIUS accounting records fed into an Oracle database, the IP addresses and usernames of all customers logging into our dial up ports. Then, when a customer attempts to send email, their outbound mail connection is redirected to a mail relay which checks their current number of outbound messages against preset limits in the database. If they exceed any of the limits, the message is bounced/dropped. If they do not exceed the limit, the message is allowed to go through and their email counts in the database are updated to reflect their most recent activity. Speakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractAn overview of recent IETF work to add security to the Domain Name System. Topics covered include DNSSEC (RFC 2535), Query/Response security, using DNS as a server of security data, and securing dynamic update. In addition, material on how DNS security will impact operation is included. Speakers |
RecordingsFull AbstractSpeakers |
Full AbstractThe CAIDA Metrics Working Group has produced a draft document, 'Network Measurement FAQ,' intended for people who buy Internet service and make it available to others, e.g. corporate users and smaller ISPs. This presentation will introduce the FAQ, highlighting its section on 'the Most Common Metrics.' Speakers |
RecordingsFull AbstractThis talk discusses the impact of the CALEA law on network operators. It covers such topics as:
Speakers |