Saturday, February 9, 2002
Topic/Presenter |
---|
Full AbstractLevel: intermediate The presentation discusses IS-IS deployment scenarios (L1-Only, L2-Only, L1 & L2 with route-leaking), design consisderations, and features that have been added recently to the IS-IS protocol, such as route-leaking, route-tags, and extensions to MPLS-TE. An outline follows:
Speakers |
Full AbstractThe Internet is a mesh of interconnected networks, each striving to control its network operating costs, optimize end-to-end performance for customers, and differentiate its IP services from those of competing providers. Increasingly, a provider's success will be determined by its ability to monitor and engineer its inter-domain traffic performance. Speakers Josh Wepman, Ixia |
Sunday, February 10, 2002
Topic/Presenter |
---|
Full AbstractThis tutorial will cover the important decisions that network operators and designers must make when building or expanding IP networks. The primary focus will be on routing policy, including:
Level: intermediate The intended audience is network engineers from large enterprises or small- to medium-sized carriers and ISPs. A basic knowledge of BGP and IP routing protocols is strongly suggested. Speakers |
Full AbstractThis session takes a detailed look at the protocols required for deploying IP multicast in a provider network, and how the protocols fit together. Also included is a breakdown of the how-and-why of IP multicast and the driving business models for deployment. Speakers |
Full AbstractThe past two years have seen explosive growth in peering between Tier-2 ISPs, content providers, and others. This new and powerful trend in peering has caused a great deal of innovation and cost reduction, as companies such as PAIX, Equinix, and other collocation providers adjust to the new market. Recently, however, there have been three events which are proving disruptive to the peering industry:
Speakers |
RecordingsFull AbstractThere has been continued growth and change in the North American NAP scene in the last two years, including new players and new exchange technology, with the mid/late-90's ATM fabrics being left behind for public exchange based on Gigabit Ethernet, and now some ventures using MPLS. Some exchanges are conducting experiments with multicast and IPv6 peering. There have also been some interconnections of different L2 exchanges, bringing a new set of challenges. Speakers Panelist - Tom Bechly, MAE Services |
RecordingsFull AbstractThis presentation describes recent and planned changes at the .com/.net/.org registry that will interest network operators. Topics include:
Speakers |
RecordingsFull AbstractThe root of the DNS distributed database is managed by 13 root nameservers. We passively measure the performance of one of them: F.root-servers.net. These measurements show an astounding number of bogus queries: from 60-85% of observed queries were repeated from the same host within the measurement interval. Over 14% of a root server's query load is due to queries that violate the DNS specification. Denial of service attacks using root servers are common and occurred throughout our measurement period (7-24 Jan 2001). Though not targeted at the root servers, DOS attacks often use root servers as reflectors toward a victim network. We contrast our observations with those found in an earlier study of DNS rootserver performance by Danzig et. al. Speakers |
Monday, February 11, 2002
Topic/Presenter |
---|
Full AbstractCurrent papers that propose new techniques and protocols often make assumptions about traffic characteristics that are simply not validated by real data. Hypotheses about the level of fragmented traffic, encrypted traffic, topology characteristics, traffic favoritism, path symmetry, DOS attack prevalence, address space utilization and consumption, directional balance of traffic volume, routing protocol behavior and policy, and distribution statistics of path lengths, flow sizes, packet sizes, prefix lengths, and routing announcements therefore yield questionable analytical results. Even in cases where analysis is based on data attainable by a researcher on his or her local campus, attempts to generalize typically lose integrity in the face of more complete or representative data sets. Speakers |
Full AbstractAvici Systems |
Full AbstractThis BOF gives the community an opportunity to provide input to VeriSign concerning requirements for its universal whois project (UWho). UWho, a non-centralized, administrative lookup service, is intended as a non-proprietary, open standard. Presently, VeriSign is seeking input for requirements and has presented two straw-proposals: one based on XML and the other based on LDAP (see the NANOG 23 UWho presentation for more information.)
Speakers |
Full AbstractSpeakers |
RecordingsFull AbstractSpeakers Susan Harris, Merit Network |
RecordingsFull AbstractThere have been many recent extensions to the routing and signalling protocols to increase network and node availability. These extensions are different for the IGPs, BGP, multicast, and MPLS signalling protocols because unicast, multicast and MPLS all have different network characteristics. Speakers |
Full AbstractThis BOF will provide an opportunity for updates on the RADB and exchange of information among the route registries. Please join us!
Speakers |
RecordingsFull AbstractBack in Q3 1999, Nextra (Switzerland) deployed a nationwide MPLS VPN service. In Q1 2001, this service was extended to all european Nextra companies (which have their own ASNs) in order to provide a seamless, pan-european MPLS VPN service. Speakers |
|
Full AbstractGlobal Crossing deployed MPLS in Q2 1999 to solve a variety of issues we faced while integrating various purchased networks, and migrating them to Frontier's fiber optic backbone. We built upon that foundation to later provide true MPLS-enabled VPNs. The presentation objectively reviews our experiences with MPLS, what it enables us to do, and the advantages it provides for us. I will do my best not to stray into the subjective, as I don't want to start a religous discussion about MPLS :) An outline of the talk follows:
Speakers |
Full AbstractCable & Wireless (AS 3561) implements a strict traffic engineering network underlying its IP transit networks. This network has existed in some form or other for the last six years, and has provided C&W a high level of determinstic behavior and stability. This presentation will cover the major elements of that traffic engineering architecture, as well as some of the considerations and trade-offs made in the implimentation of the architecture. Speakers |
|
Full AbstractSpeakers |
RecordingsFull AbstractNetwork operations centers are not equal - some do it better than others, some do it far better than others, and some just do it. What are the elements that go into an effective, productive, and well-oiled NOC? In addition, what are the essential components a NOC, regardless of scale? What are the concerns on your mind when managing or building your NOC? Are your people happy, is your security good, are your procedures solid? Is there a good framework for evaluating NOC performance?
Speakers |
Full AbstractIn this talk, the presenter will discuss real-world experience garnered doing automated configuration of network devices in the field using Tcl and Expect. What were the challenges? What was learned about exception handling and reliability? What are some strange discoveries made about common devices?
IV. Automated device manipulation techniques using Tcl and Expect
Speakers |
RecordingsFull AbstractSpeakers |
Tuesday, February 12, 2002
Topic/Presenter |
---|
Full AbstractRouting "convergence" time, or the delay to reroute, is often cited as one of the key limitations for currently deployed IP networks to provide new services and scale to larger sizes. In this talk, we present an analysis of ISIS routing protocol behavior in one ISP network to demonstrate where the problems lie and how to fix them. This analysis is based on ISIS packet traces collected over multiple week-long periods on several major ISP backbone networks. The analysis focuses on two aspects. Speakers Steve Casner, Packet Design |
Full AbstractEven today, with the widespread usage and critical importance of the Internet, basic routing protocols such as BGP are poorly understood. The important gaps in our understanding include: what causes BGP instability; what is the influence of policy changes on BGP instability; the impact of multi-homing with its blackholes in the routing hierarchy; BGP convergence rate; and the interaction of EBGP, IBGP, and other intra-domain routing protocols. Speakers |
RecordingsFull AbstractWe analyze the evolution of the global Internet interdomain routing system on AS, prefix and IP address level granularities, using snapshots of RouteViews BGP tables from 1997 to 2001. We introduce the notion of semiglobally routed prefixes, i.e., those present in the majority of backbone tables, and classify them into:
One advantage of using our notion of semiglobal prefixes is that they exhibit less churn than global prefixes (those prefixes common to all backbone tables) and as such allow for derivation of more robust macroscopic statistics about the routing system. We study route prefix instability at a medium time granularity for late 2001 using 2-hour snapshots of BGP tables, and find that half of all prefix reannouncements (flips) are contributed by 1% of all ASes, with government networks, telecoms in developing countries, and major backbone ISPs at the top of the list of instability contributors. Small ASes (those that originate only a few prefixes into the global routing system) do not contribute more than their fair share of either route entries or churn. We conclude that during 1999-2001 many Internet metrics were stable, even though the sets that they measure were changing rapidly, and that the routing system's growth and instability are mostly caused by large and medium-sized ISPs. See below for presentation slides: http://www.caida.org/~broido/nanog200202.egr.pdf">http://www.caida.org/~broido/nanog200202.egr.pdf Speakers |
|
Full AbstractThis presentation will highlight the development and experience gained during the introduction of native inter-domain multicast in the European research community on the TEN-155 network, as well as the decisions made for its successor network, GEANT. Speakers |
RecordingsFull AbstractEmulation of various layer 2 link types ("pseudo-wires") over IP presents an interesting and potentially valuable choice for service providers looking to consolidate disparate networks or provide new services over a common infrastructure. The Layer Two Tunneling Protocol (L2TP), defined by the IETF, provides a necessary basis for tunneling capabilities used in "pseudo-wire" emulation over IP. First used for emulation of PPP data links over IP. L2TP is being adopted for a number of new data link services, including Frame Relay, ATM, Ethernet, and others. Speakers |