Saturday, October 26, 2002
Topic/Presenter |
---|
Full AbstractMany of the largest IP network operators in the Internet rely on free software to keep their packets moving, and to allow their staff to sleep occasionally. The choice of free software over commercial alternatives is often a pragmatic one; the wide variety of policies, procedures, platforms and services in different networks require a degree of flexibility in deployment and integration that is often not available with off-the-shelf software.
Speakers Stephen Stuart, Internet Software Consortium |
Full AbstractThis tutorial looks at common problems ISPs face when deploying BGP within their network. We describe problems with peer establishment, missing routes, inconsistent route selection, and convergence issues. We also discuss real-world examples of typical errors made when deploying BGP, both as iBGP and eBGP, in service provider networks. Speakers |
Sunday, October 27, 2002
Topic/Presenter |
---|
Full AbstractThe Internet is a battleground, with ISP's and their customers right in the middle of the line of fire. What ISPs need to protect themselves are tools and techniques that work in the front lines, i.e., tools that fight DoS attacks and provide something other than a busy signal on the customer service line. Speakers |
Full AbstractSpeakers |
|
RecordingsFull AbstractThis session will lay the foundation for IPv6 by quickly reviewing the protocol's background, highlighting the technology differences from IPv4, and discussing v6's enhanced capabilities. It will also address some inaccurate perceptions and speculation about IPv6. Finally, the session will introduce the transition technologies that will be discussed in part 2 of this series, "IPv6 Deployment Concepts," which will be offered at NANOG 27. Speakers |
Full AbstractSpeakers |
RecordingsFull AbstractWe describe our findings, which show that route flap damping could suppress relatively stable routes, through both simulations and controlled experiments using BGP Beacons. A BGP Beacon is an unused prefix whose originating announcement and withdrawal occur at well-defined times. We describe interesting analysis results of public routing data from sites such as the RIPE-NCC and Route Views using two beacons that have been lit up in the last few months. Finally, we propose changes to route flap damping that would achieve a good balance of routing stability and fast convergence times. Speakers |
RecordingsFull AbstractThis presentation discusses elements of high-availability networking. Following an introduction to the elements of availability and availability definitions, the discussion moves to theoretical availability calculation and availability measurement for various network design choices. We look at the various ways service providers measure availability of their existing networks. We also explore the difficulty faced in quantifying software dependability. Speakers |
RecordingsFull AbstractOverprovisioning is a very common approach to providing quality of service in IP backbone networks. By ensuring the presence of enough capacity in the network so that demands are met, even at peak times and under failure conditions, significant queue buildup can be prevented. This assures that the three key IP QoS requirements, low delay, low jitter and low packet loss, are satisfactorily met. In today's economic climate efficiency has become a key aspect of building networks, and operators are looking for the minimum amount of overprovisioning to meet QoS requirements. Rules of thumb, such as a maximum link load of 50%, might not be an acceptable approach any more. In this presentation, we analyze some backbone traffic traces at different timescales. We show that aggregated traffic is well behaved, and present a methodology and simple empirical rule for capacity allocation on backbone links. Speakers |
Full AbstractFast ReRoute (FRR) presents network operators with an alternative for achieving sub-second recovery from link and node failures in the network. In this presentation, we will briefly cover the different high-availability (HA) mechanisms available today (including FRR), present the different approaches that vendors are pursuing to implement this technology, and discuss Qwest's motivation behind deploying FRR and some of the lessons learned. In conclusion, we make recommendations to other operators who might be considering the deployment of FRR in their networks. Speakers Richard Southern, Juniper |
Monday, October 28, 2002
Topic/Presenter |
---|
Full AbstractIncreasing demands and new service requirements have led to increasing complexity in Internet backbones. This panel will explore emerging concerns about complexity and its effects in production backbones. Topics include the complexity tradeoffs inherent in various backbone engineering and operations activities, such as:
Speakers Panelist - Randy Bush, IIJ Vijay Gill, AOL Time Warner Dave Ward, Cisco Systems |
Full AbstractAdlex |
Full AbstractThe software engineering process lends itself well to large, well-managed, multi-disciplinary teams producing well-defined products in response to detailed requirements analysis. As much fun as that sounds, sometimes what you really need is a short and simple answer to a short and simple question, preferably now.
Speakers |
RecordingsFull AbstractSpeakers Susan Harris, Merit Network Dave Meyer, Sprint/University of Oregon |
RecordingsFull AbstractSpeakers |
Full AbstractSecurity incidents are a daily event for Internet Service Providers. Attacks on an ISP's customers, attacks from an ISP's customer, and attacks on the ISP's infrastructure are now one of many "security" NOC tickets through out the day. This increase in the volume and intensity of attacks has forced ISP's to spend constrained resources to mitigate the effects of these attacks on their operations and services. This investment has helped minimize the effects of the attacks, but it has not helped stop them at the source. Stopping attacks at their source requires rapid and effective inter-ISP cooperation. The spirit of inter-ISP cooperation exists in the ISP Security ranks, but the problem is that ISP Security Teams from one ISP cannot find their colleagues amongst their peers. This ISP Security BOF models itself on the NANOG Peering BOFs, focusing on building the human Internet of ISP Security Engineers. We solicit ISP Security/NOC Teams (before the meeting), asking them to characterize their security tools and policies in general ways ("always help customers under attack" or "will trace the attack to the source" or "will work with law enforcement" or "black hole violators" or "implement common tools" etc.). From the answers, we will select a set of ISP Security Engineers to present a 5-to-10-minute description of their network, security tools, policies, how they would like to interact with other ISP Security Teams, and the identification/mitigation problems ISPs have had with existing technology/techniques. This presentation puts a face with the e-mail address at the ISP's Security/NOC Team. At the end of the BOF, representatives will have time to speak with ISP Security Engineers at ISPs with which they seek to deepen their interaction and cooperation. The expectation is that these interactions will lead to an effective, Internet-wide security incidence response --- plugging the attacks at their source and perhaps apprehending the perpetrators (using law enforcement to put a dent in the problem). Speakers |
Full AbstractThe ability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security of the Internet. Once subverted, these hosts can not only be used to launch massive denial of service floods, but also to steal or corrupt great quantities of sensitive information, and to confuse or disrupt use of the network in more subtle ways. We present an analysis of the magnitude of the threat. Speakers |
RecordingsFull AbstractSpeakers |
|
RecordingsFull AbstractDuring the last five years, the RIPE NCC has been working on two new services for the entire ISP community: TTM or Test Traffic Measurements, and the RIS or Routing Information Service. These projects were presented at the Winter 2000 NANOG meeting, but a large number of new features have been added during the last three years.
http://www.ripe.net/ris/" TARGET="_BLANK">Routing Information Service The RIS is now collecting BGP information from nine sites world-wide, with collectors in North America, Europe and Asia. Some 200 ISP's are participating by providing a BGP feed. New applications of the data since the project was presented at the winter 2000 NANOG include:
Speakers |
Full AbstractCAIDA is continuing efforts to analyze DNS root server performance. We are characterizing DNS clients that send large numbers of queries to root servers. Analysis of trace data from the two F root servers shows a number of interesting things. Most of the high-rate queries exhibit the strange behavior of only using 25% of the query ID range. A number of sources also transmit each query two or three times. We also notice hourly spikes in the number of clients contacting the root servers. The talk will include results of analyses of which applications/configurations are broken, and how to fix or upgrade them. Speakers |
Full AbstractDespite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior during one stressful period, the Code Red/Nimda attack on September 18, 2001. The attack was correlated with a 30-fold increase in BGP update messages at a monitoring point that peers with a number of Internet service providers. Our examination of BGP's behavior during the event concludes that BGP exhibited no significant abnormality, and that over 40% of the observed updates can be attributed to the monitoring artifact in current BGP measurement settings. Our analysis, however, does reveal several weak points in both the protocol and its implementation, such as BGP's sensitivity to transport session reliability, its inability to avoid the global propagation of small local changes, and certain implementation features whose otherwise benign effects are only amplified under stressful conditions. We also identify areas for improvement in the current network measurement and monitoring effort. Speakers |
|
Full AbstractBGP Route Oscillation Reduction and Deployment Considerations, by Enke Chen Speakers Panelist - Enke Che, Redback Panelist - John Scudder, Cisco Systems |
Full AbstractWe present Scriptroute, a new system that allows network operators and researchers to make measurements from remote vantage points. Speakers David Wetherall, Department of CSE, University of Washington. |
Tuesday, October 29, 2002
Topic/Presenter |
---|
RecordingsFull AbstractSpeakers |
Full Abstracthttp://www.space.net/~gert/RIPE/R43-v6-table/page02.html">Gert Doering's v6 routing table presentation Speakers |
Full AbstractSpeakers |
Full AbstractBackbone operators are facing new requirements for backbone data collection and analysis. New services such as VPN and CoS-based services, as well as various security concerns, all contribute to new demands on monitoring, measurement, and analysis infrastructures. Combined with the desire for increasingly fine-grained analyses of both Operational Expenditures (OPEX) and Capital Expenditures (CAPEX), these new services have served to put a new importance and urgency on an operator's ability to measure and monitor network traffic.
Speakers Panelist - Christophe Diot, Sprintlabs Panelist - Mujahid Khan, Sprint. Panelist - Jennifer Rexford, AT&T Research Panelist - Tony Tauber, Genuity |