Saturday, February 17, 2001
Topic/Presenter
Full Abstract

BGP is an essential part of ISP routing, but successful ISP routing includes far more than the protocol itself. Obtaining and managing address space, obtaining an AS number, and creating and registering routing policies are critical parts of operations. Understanding convergence requirements and other performance objectives for ISP routers also is important. This presentation will focus on BGP in the larger context, rather than being a basic protocol and configuration guide, as in Berkowitz' previous NANOG tutorials.

Speakers
Howard Berkowitz, Nortel

Sunday, February 18, 2001
Topic/Presenter
Full Abstract

The most important aspect of satisfying an ISP customer is to ensure the customer has realistic expectations, and then to satisfy those expectations. Many customer desires center around "high availability," but there is an unfortunate tendency to focus on only one technology (e.g., multihomed BGP) to solve these problems.

This tutorial reviews how to define your customer requirements with respect to availability and scalability. It identifies the capabilities and limitations of a wide range of complementary functions at multiple OSI layers, from physical diversity to virtual server farms. It also considers the issues of communicating with customers while problems occur. Previous related tutorials include Berkowitz' NANOG14 tutorial on address management for ISPs and their customers (Atlanta, 1998).

Speakers
Howard Berkowitz, Nortel

Full Abstract

This tutorial begins with an explanation of SNMP counters, where they are found, and how to obtain them efficiently for currently deployed technologies. The session then describes how standard IETF MIBs are organized, points out what useful data they contain, and how they fit together to provide a view of an operational network at layers 1, 2, and 3.

In particular, this introduction will review the following technologies:

  • Layer 1 MIBs: Ethernet (fast/gig), SONET, Serial/DS1-3, Cable MODEM

  • Layer 2 MIBs: Bridging/802.1q, Link Aggregation/802.3ad, RMON, FRAME-RELAY, PPP, ATM

  • Layer 3 MIBs: IP protocol/forwarding tables, BGP, OSPF, VRRP, RMON2

Speakers
Chris Elliott, Cisco Systems
Chris Elliott, CCIE #2013 and author of "Performance and Fault Management," has 25 years experience in the networking industry, starting with the ARPANET. He currently works for Cisco Systems as an escalation engineer for the Cisco Technical Assistance Center. For the last nine years he has concentrated on network management, including designing and managing a large network for SAS Institute, Inc.; writing network management applications, including a distributed SNMP polling system; supporting users of Network Management Applications; and assisting in the design of IETF standards for network management.

Mike MacFaden, Riverstone
Michael MacFaden, a graduate of California Polytechnic State University, has been a software engineer for the past 12 years, working in the field of applications and network management. At IBM, he helped to build out the internal 9/8 network to distribute marketing data to field personnel on top of the existing SNA VNET network. At Premisys Communications, he co-designed the UNIX-based element management system using IETF protocols, making the IMACS 800 channel bank completely telnet/snmp manageable. At Kalpana/Cisco systems, he contributed to CiscoView, Cisco Resource Manager, and Vlan Manager as well as contributed a modified SNMP++ library to the Adaptive Communications Environment (ACE) project of UC Irvine & Washington University in St Louis. At Riverstone Networks, he is responsible for overall implementation of device management as well as open source network management.

Full Abstract

Multicasting is the most cost-effective means of delivering streaming media over the Internet, but its deployment has been limited by a number of technical and business problems. Within the last year, there have been several efforts to address these problems in the context of multicast one-to-many broadcasting. This is part of the general abandonment of the "Swiss Army knife" approach, where one multicast model was supposed to fit all possible uses, for multicast models tuned for specific applications.

Single Source Multicast (SSM) uses the Internet Group Management Protocol (IGMP) version 3 and a subset of the capabilities of Protocol Independent Multicast - Sparse Mode (or PIM-SM) to implement a broadcast model where receivers know the IP address of the source (from, say, a web page), and join a specific (Source,Group) pair. This, besides greatly simplifying the operation of the protocol, means that multicast transmissions can be limited to specific IP addresses, and makes it harder to spoof or interrupt multicast transmissions. Other recent innovations include a tailoring of the Real Time Control Protocol to scale to large audience sizes, and the spread of multicast friendly Internet exchanges. In my talk I will describe the SSM protocol, its advantages, and the other work leading to a workable business model for multicast broadcasting.

Speakers
Marshall Eubanks, Multicast Technologies

Full Abstract

Speakers
Scott Bradner, Harvard University.

Full Abstract

We have discovered a problem with the BGP decision algorithm that can led to an endless BGP convergence loop in certain topologies. So far, we know of two different types of "The Churn." Type I occurs in networks that have a single tier of RRs or confederation Sub-ASs (please see http://www.cisco.com/en/US/ts/fn/100/fn12942.html">http://www.cisco.com/en/US/ts/fn/100/fn12942.html for more details). Type II churn occurs in a network that has more than one tier of RRs or confederations. Currently there is not a solution for Type II churn, but we are working on a change to the BGP spec that will fix this problem.

Speakers
Daniel Walton, Cisco Systems
Daniel is currently on the Routing Protocols Deployment and Scalability team at Cisco, where he concentrates on BGP and ISIS. Previously, he worked in the Cisco TAC and ISP Expert team, where he focused on BGP and other routing protocols.

Full Abstract

The move towards a converged network architecture has brought about a new paradigm for service provisioning and delivery. Moreover, a class of applications which require a variety of quality of service levels from the network have emerged, which need to be provisioned on-demand in the network. The dynamic provisioning of network resources optimally is quite challenging in such an environment.

In this presentation, we will talk about how IP and other services can be provisioned efficiently over a converged packet and optical network infrastructure. We will describe how myriad innovative services can be provisioned over these converged networks to harness the potential of integrated networks, and present techniques for allocating network resources intelligently and optimally based on the needs of the application services.

Speakers
Muckai Girish, Atoga
Muckai Girish has been with Atoga Systems since 2000. Prior to joining Atoga, he was at SBC Technology Resources, Inc., working on IP and QoS. Before that he was with Cascade Communications in the Network Architecture and Performance Modeling group. He obtained his M.S. and Ph.D. degrees from Boston University and a B.Tech from the Indian Institute of Technology, Madras.

Monday, February 19, 2001
Topic/Presenter
Full Abstract

Development and deployment of provider-provisioned VPNs is the latest VPN concept, having emerged during the past year. This panel will present the latest development of PPVPN technologies and models, and discuss ISP deployment status and experiences.

Speakers
Moderators - Jessica Yurcik, Cosine.
Panelist - Luyuan Fang, AT&T
Panelist - Kireeti Kompella, Juniper Networks
Panelist - Alvaro Retana, Cisco Systems

Full Abstract

Atoga Systems

Full Abstract

Speakers
Dave Plonka, University of Wisconsin - Madison

Full Abstract

The IETF AAA Working Group is in the final stages of defining DIAMETER as a potential standard protocol to support network access applications, focusing on dial and mobile access. There are also a number of applications that are now using or planning to use COPS (Common Open Policy Service) for provisioning network services such as QoS. This BOF will include:

  • a brief presentation on the status of work at IETF on DIAMETER, COPS, and policy, and in the AAAARCH (AAA Architecture) IRTF research group.

  • a brief presentation on possible transition models from RADIUS to DIAMETER in a "proxy" environment

  • a brief discussion of combining services supported by RADIUS or DIAMETER with services supported by COPS, such as edge router access and provisioning

  • open discussion of use of DIAMETER and/or COPS in current and future service offerings

Speakers
John Vollbrecht, Interlink

Full Abstract

What do you require your customers and peers to do, and not do? Can the spam? Forge source addresses? Inject routes they don't own? If not, why not? What else? Come by and talk with your, um, peers about it and the results will be presented on Tuesday.

Speakers
Paul Vixie, MFN

Full Abstract

Speakers
Greg Hankins, Riverstone
Susan Harris, Merit Network

Full Abstract

Internet Data centers provide a secure, high-capacity environment for communications companies and content providers to locate and host their Internet equipment. These centers provide the foundation for a variety of business models and Internet operations. The expertise involved in building and operating a network-focused facility are non-trivial. Even the low-end data center requires both an immediate cash draw and a recurring operations cost. The construction project itself requires months of planning and execution. Like most things, the first time one enters into a new arena, potentially costly mistakes are made.

This BOF will explore the tradeoffs between building a data center and outsourcing the data center to a third party. The BOF will also continue some of the discussions that took place during the Data Center BOF at the 1999 Atlanta NANOG.

One goal of this session is to create the framework to establish a list of "public" data centers, listing the services offered, the center's location, and any additional benefits the center offers its customers.

Speakers
Michael Lucking, Epoch Internet
Over the past decade, Michael Lucking has worked with several companies building various-sized data centers. His work has included constructing POPs for regional and national ISPs, and large data centers for government organizations. Michael is currently working as a Sr. Network Engineer for Epoch Internet, Inc.

Bill Norton, Equinix
As Co-Founder and Director of Business Development at Equinix, Bill Norton focuses his attention on building strategic relationships among companies participating at the Internet Business Exchanges. Previously, he was the Chair of NANOG and Manager of the Internet Engineering Group at Merit, leading a variety of national and international network research and operations projects.

Full Abstract

The technology and the economics behind some next-generation commercial IP networks are examined and an implementation of a backbone built on those principles is presented.

Speakers
Jimmy Boyle, Level 3
Jim Boyle works for Level3 Communications, where he has worked on the teams that developed its ATM, and then MPLS, multiservice backbone networks. He is currently seeing if he can load IP software onto DACs and ADMs.

Vijay Gill, MFN
Positions held by Vijay Gill include systems development and analysis at University of Maryland, Baltimore County, and Senior Network Architect/Senior Member of the Technical Staff at UUNET. He is currently Senior Architect at Metromedia Fiber Networks.

Full Abstract

Active queue management (AQM) refers to a family of packet-dropping mechanisms for FIFO queues that has been proposed to support end-to-end congestion control mechanisms in the Internet. We examine the performance of AQM mechanisms by varying two parameters: the queue size and the dropping function. AQM flavors considered include both the well known "Drop from Tail" (TD) and "RED," as well as the more recently proposed "Gentle RED" and a previously unrecognized mechanism we call "Gentle RED with instantaneous queue size", or GRED-I.

We use experimentation to analyze the four AQM mechanisms identified above. The major result observed is that from a TCP goodput and UDP loss standpoint, varying AQM parameters has a minor influence on performance. On the other hand, we observe an important sensitivity of AQM to traffic characteristics. We show that RED and GRED do not provide sufficient performance improvement compared to Tail Drop. In the case of consecutive losses, we show that RED can be harmful by dropping much longer bursts than Tail Drop.

We conclude the presentation by discussing the feasibility of Fair Queueing as an alternative to Active Queue Management. Measurement data collected on the Sprint operational IP backbone will be used to advocate the deployement of Fair Queueing.

Speakers
Christophe Diot, Sprint
Christophe Diot works with the Sprint Advanced Technology Laboratory, where he is in charge of the IP research group. Sprint ATL's charter is to analyze new mechanisms and protocols for the Internet. Current activities in the IP area address diffserv, RED, and PIM-SSM deployment. The IP group's major project is the passive monitoring of the Sprint IP backbone in order to study IP traffic characteristics.

Full Abstract

Link-flooding, as perpetrated by distributed denial of service attacks, is a serious threat to the Internet. We propose a pushback mechanism to defeat such attacks: routers experiencing sustained, massive congestion ask the upstream routers to drop the packets instead, thus freeing bandwidth for other traffic. This algorithm is applied recursively, pushing back to either an uncongested link or even the sources of the problem. Simulation results show that this scheme is indeed effective.

Speakers
Steve Bellovin, AT&T
Steven Bellovin, the co-author of Firewalls and Internet Security: Repelling the Wily Hacker, does research at AT&T Labs on networks, security, and especially why the two don't get along.

Full Abstract

(1) Over a dozen large carriers participate in activities to protect their networks from damage by backhoes and other hazards. What is the latest news from the backhoe damage prevention industry?

(2) An analysis of network outages and events in the Year 2000 compared to previous years shows some changes in the types of outages, and their impact on network users. Are users being impacted by fewer events, or has the number of users grown, diluting the impact of network problems? With little hard data from providers, can we use other measurements of Internet performance to guage the effects?

Speakers
Sean Donelan, Equinix

Full Abstract

This panel discussion will begin with a brief discussion of network infrastructure developments in Columbia and other South American countries. Presentations will then be given by representatives of the two South Florida NAP initiatives: NAP Of the Americas and the Next Generation Internet Exchange, nicknamed the Florida MIX. The focus will be their architectural details, scopes, and positioning in the marketplace. A question-&-answer session follows the individual presentations.

Speakers
Moderator - Bill Manning, ISI.
Panelist - Dan Golding, Netrail
Panelist - Christian Kuhtz, BellSouth

Full Abstract

Some time ago the RIPE NCC embarked in a project to completely rewrite the database software. The project is almost finished and the transition to the new database system will occur in the first half of 2001.

One of the major changes in the new database is its support of RPSL (RFC 2622) and RPS-AUTH (RFC 2725) specifications. The new database also has additional functionality, which requires an extension of the query syntax.

This presentation will discuss RPSL and RPS-AUTH features of the new software and how they will affect the community, give an update on the state of the RIPE IRR, and finally give an overview of IRR-related RIPE activities and rollout plans.

Speakers
Andrei Robachevsky, RIPE-NCC
Andrei Robachevsky is manager of the database group at the RIPE-NCC, where he is responsible for all aspects of the database re-implementation project and RIPE database operations. He has been working in this position for the last year. Prior to this position he worked with the RIPE-NCC as a database software engineer developing software for the re-implementation project. Before he joined the RIPE-NCC in 1999 he was involved in academic network development in Russia.

Full Abstract

A large fraction of OC-192/STM-64 links are between equipment in a single central office (CO). The Optical Internetworking Forum (OIF) recently adopted two Very Short Reach (VSR) OC-192 interface Implementation Agreements to help reduce the cost of these intra-office OC-192 links. VSR-1 is 12 fibers at 1.25 Gbit/s each, using multi-mode ribbon fiber and reaching up to 300 meters. VSR-2 is 10 Gbit/s serial using single mode fiber (SMF) and reaching up to 600m.

This pair was adopted because the parallel optics of VSR-1 will likely be substantially cheaper for the shortest reaches, where the ribbon fiber can be treated like any other patch cable. The serial solution of VSR-2 uses installed SMF and can reach across the largest COs while still offering some potential cost savings compared to SONET short reach (SR) interfaces. The input from the VSR BoF at NANOG-20 was instrumental in reaching this decision.

VSR-1 reaches up to 300 meters and uses 12 lasers signaling at 1.25 Gbit/s. It leverages the 850 nanometer lasers and multi-mode fiber technology used in Gigabit Ethernet. The lasers can be combined in Vertical Cavity Surface Emitting Laser (VCSEL) arrays, and the fibers are joined in a 12-fiber ribbon with a MPO/MTP connector. 10 fibers carry the data, one fiber carries CRC error detection data, and the 12th fiber carries parity of the 10 data fibers. This enables hitless correction of errors on any single fiber, including the loss of a fiber. Field termination is supported, and the link electronics automatically compensate for either ribbon orientation so there is no such thing as a twisted ribbon or a connector put on upside down.

VSR-2 reaches up to 600m and uses serial 10 Gbit/s serial signaling. It is based on ITU G.691 and uses a 1310 nanometer laser over single mode fiber (SMF). Compared to existing SONET Short Reach (SR) interfaces, it relaxes some optical parameters. It allows increased dispersion and reduced reach VSR-1 and VSR-2 are complementary. VSR-1 uses lower speed signals and will likely be the lowest cost OC-192 link for the shortest reaches, where the ribbon fiber can be treated like any other patch cable. VSR-2 uses installed SMF and can reach across very large COs.

Speakers
Russ Tuck, Pluris
Russ Tuck chairs the OIF's Physical and Link Layer Working Group, which is developing VSR Implementation Agreements. He is Systems Architect at Pluris Terabit Network Systems, where he helps lead the development of scalable and reliable core routers. He previously architected scalable database servers at Pyramid Technology, and scalable supercomputers at MasPar. He earned a Ph.D. in Computer Science from Duke University and carried out his dissertation research at UNC Chapel Hill.

Full Abstract

Speakers
Susan Harris, Merit Network

Tuesday, February 20, 2001
Topic/Presenter
Full Abstract

With the rapid growth of the Internet routing table, providers are experiencing difficulty maintaining network stability, even with aggressive filtering policies in place. This panel will discuss the causes of routing prefix table growth, measures providers should take to curtail it, and alternate measures enterprises and service preoviders can take to ensure redundancy and load-balancing without announcing their prefixes into the global table.

Abha Ahuja Presentation

Speakers
Moderator - Cathy Wittbrodt, iVMG
Cathy Wittbrodt is VP for Architecture at iVMG. Prior to joining iVMG she was with Excite@Home, where she was responsible for network routing and IP addressing. Cathy is a member of the ARIN advisory council as well as the Address Supporting Organization (ASO) address council. She has been active in the Internet for 12 years. She began at Merit Network, Inc. where she worked on the NSFNET Backbone. Also while at Merit Cathy built CICNet, a network that connected the Big 10 universities. Following Merit, Cathy designed and implemented OSI/CLNP for the Energy Sciences Network. Although OSI/CLNP was never widely deployed, the experience has given greater insight into addressing and scaling issues. Cathy also spent three years in the engineering group of the Bay Area Regional Research Network, BARRNet, which was bought by BBN Planet. Cathy is on the Board of Directors of Panzer Motorcycle Works, USA, Inc. She has a B.S. in mathematics from Northern Arizona University.

Panelist - Abha Ahuja, Arbor Networks
Panelist - Enke Chen, Redback
Panelist - Vijay Gill, MFN
Panelist - Tony Li, Procket Networks
Panelist - Bill Woodcock, Zocalo

Full Abstract

Mobile Wireless technologies are currently moving from circuit-based first-generation and 2G systems to packet-oriented 2.5 and 3G systems. We will discuss how the infrastructure and mobile devices will make the transition, while focusing on internet access for mobile services and opportunities for IP core service providers in 2.5 and 3G networks.

Speakers
Dana Blair, Cisco Systems
1995 and is currently a Technical Leader working on next-generation seamless mobile IPv6 technologies. Since 1999, he has been working on advanced architectures to transition mobile wireless networks toward an all-IP infrastructure with a particular focus on Voice over IP technology. From 1995 to 1999, he developed Cisco IOS Software for Network Access Servers, including Multilink PPP, IP Dial-up, and IP Dial-out. Dana has developed ISDN networking products, both hardware and software, at the IBM Network Hardware Division from 1989 to 1994 and at Hayes Microcomputer from 1994 to 1995. Prior to 1989, he worked for Motorola in semiconductor fabrication research. He is currently the Micro-mobility Design Team Leader in the IETF Context and Micro-mobility Routing (seamoby) Working Group.

Full Abstract

This presentation follows up Monday evening's Network Policy BOF.

Do your peers and customers expect to be able to send spam over your network? If not spam, how about IP datagrams with forged source addresses, or BGP routes for prefixes they don't own? In the grand Internet tradition of closing the barn door after the horse has been barbequed, this session attempts to describe current practice and proposes some improvements.

Speakers
Paul Vixie, MFN