Saturday, January 29, 2005
Topic/Presenter
Full Abstract

This tutorial covers common problems ISPs have when deploying BGP within their network. It looks at problems with peer establishment, missing routes, inconsistent route selection, and convergence issues. It also looks at real world examples of common errors which are made when deploying BGP, both as iBGP and eBGP, in service provider networks.

Speakers
Philip Smith, Cisco Systems
Philip Smith joined Cisco Systems in January 1998. He is a member of the Service Provider Architectures Group of Consulting Engineering, within Corporate Development. His role includes working with many ISPs in the Asia-Pacific region and the rest of the world, specifically in network strategies, design, technology, and operations, as well as helping with network configuration and scaling. Other areas of interest also include Internet routing, Internet protocols, IPv6, and encouraging the growth of the Internet around the world. Prior to joining Cisco, he spent five years at PIPEX (now part of UUNET's global ISP business), the UK's first commercial Internet Service Provider. He was one of the first engineers working in the UK Internet, and played a fundamental role in building the modern Internet in the UK and Europe. Philip is co-author of Cisco ISP Essentials, published by Cisco Press. He holds a Doctor of Philosophy and has a First Class Honours Degree in Physics. He lives in Brisbane, Australia.

Full Abstract

First-generation commercial Internet network engineers used key principles in the way they built, deployed, and operated their networks. The principles were derived and deployed from core theorems that proved to scale during times of exponential growth. Until the publication of RFC 3439, "Some Internet Architectural Guidelines and Philosophy," these principles were undocumented and rarely passed to the next generation of network engineers. This primer discusses in detail the core principles highlighted in RFC 3439 and reviews some of the assumed fundamentals of functional, hierarchical, and modular design that are core tools for today's network designs. http://www.1-4-5.net/~dmm/talks/NANOG33/designing/">http://www.1-4-5.net/~dmm/talks/NANOG33/designing/

Speakers
Barry Greene, Cisco Systems
Barry Raveendran Greene is a Senior Consultant in the Office of the CTO at Cisco. Barry's current topics of interest are ISP operations and security. He has been with Cisco since 1996, and is the co-coordinator for the Cisco ISP Workshop Program, designed to empower engineering talent in ISPs worldwide. Barry has more than 22 years experience in systems integration, security, operations, maintenance, management, and training on a variety of computer, internetworking, and telecommunications technologies.

Dave Meyer, Cisco Systems
David Meyer is currently Director of Internet Architecture and Engineering at Cisco Systems. Prior to that he served as Senior Scientist and Director of IP Technology Development at Sprint. He is also Director of the Advanced Network Technology Center at the University of Oregon. Prior to working at Sprint, he worked at Cisco, where he was involved in software development, working both on multicast and BGP. He is active in the IETF, where he chairs the MBONED, GROW, and DNSOP working groups, as well as being a member of several IETF directorates and Internet Research Task Force research groups. He is also active in the operator community and in other standards organizations as the ITU-T, where he co-chairs FGNGN WG 7.

Sunday, January 30, 2005
Topic/Presenter
Full Abstract

Fault management and diagnosis is a challenge in MPLS networks due to the separation of the control plane and data plane. Several tools are available in Cisco IOS to detect control and data plane failures. This toolset has been expanded to include data plane liveliness check for LDP, TE tunnels and pseudo wires LSPs. This presentation discusses IOS-embedded tools that help troubleshoot the control and data plane in MPLS networks. We review capabilities such as VRF-aware ping and traceroute, in addition to LSP ping, LSP trace, and VCCV for fault management and diagnosis of network elements.

Speakers
Moiz Moizuddin, Cisco Systems
Moiz Moizuddin joined Cisco Systems in August of 1999. Initially, he worked at the Technical Assistance Center - TAC. where his focus was routing protocols and MPLS. Later on, he moved to Advanced Services, where he worked on various SP accounts. Currently he is working as a Technical Marketing Engineer with primary focus on MPLS and related technologies. Moiz has extensive experience in designing SP and enterprise networks and has presented at various forums. He holds an M.S. in Electrical Engineering with specialization in Telecommunication from California State University Long Beach, and also has a CCIE in Routing/Switching.

Mukhtiar Shaikh, Cisco Systems
Mukhtiar Shaikh joined Cisco in October of 1996. Initially, he was a member of the ISP Expert Team providing technical support to Cisco's large ISP accounts. Now, he is part of the Central Engineering team within the Advanced Services Organization. His main areas of focus are IP routing protocols and MPLS technologies. In his current role, he provides design, consulting and escalation assistance to the Advanced Services accounts deploying MPLS networks. During the last couple of years, he has led various MPLS (L3/L2 VPN and TE) related projects and has been involved in the design and deployment of MPLS in enterprise as well as SP networks. Mukhtiar holds an M.S. degree in Electrical Engineering from Colorado State University.

Full Abstract

Speakers
Philip Smith, Cisco Systems

Full Abstract

All Las Vegas meeting attendees are invited to attend this special meeting, where we'll discuss NANOG coordination issues recently raised by the community. Our agenda will include:

  1. Merit's role in coordinating NANOG

  2. How the Program Committee reviews proposals and selects presentations

  3. Community concerns about the NANOG email list.

Please join us!

http://www.twincreeks.net/~feldman/NANOG/NANOG-PC.pdf">Steve Feldman Presentation

Speakers
Betty Burke, Merit Network
Steve Feldman, CNET
Dan Golding, The Burton Group
Martin Hannigan, VeriSign
Paul Vixie, ISC

Full Abstract

Looking glasses provide a view of routing tables that you wouldn't otherwise be able to access. This talk provides an overview of many publicly available looking-glasses. We then provide more detail about the Packet Clearing House looking-glass project, which collects peering routes from several exchange points around the world.

Speakers
Steve Gibbard, Packet Clearing House
Steve Gibbard is the Network Architect at Packet Clearing House. He runs a global research network and an anycast DNS network, hosts the top level domains for several countries as well as a root DNS server, and studies the interconnection of Internet networks around the world. In addition, he does network architecture and peering work as a consultant for several ISPs in the Bay Area and elsewhere. Steve is a former Senior Network Engineer at Cable & Wireless, and has held network engineering positions at Digital Island and World Wide Net.

Full Abstract

IP Fast ReRoute is an emerging technology trying to rapidly repair failure conditions in IP/MPLS networks. This presentation will give an overview of some of the different techniques that have emerged and provide a comparison with MPLS FRR. IP fast-reroute can provide resilience in the event of a failure by quickly (

Speakers
Alia Atlas, Avici
Alia Atlas is a Consulting Software Engineer and manager for Avici Systems. Her current interests include MPLS, QoS, and protection mechanisms for IP and MPLS. She is the project lead for the RAPID, Avici's implementation of IP/LDP Fast-Reroute. She is a co-author of several IP Fast-Reroute Internet-Drafts and the RSVP-TE Fast-Reroute Internet-Draft, and an active member of the IETF Routing Area Working Group design team on micro-forwarding loop prevention. Prior to joining Avici Systems, Alia was a network scientist in the GTE BBN Technologies Department of Internetwork Research. At BBN, she focused on router architectures for QoS and traffic engineering. Alia holds patents in the area of protection mechanisms for IP networks. She holds a B.S.E.E. from MIT and a Masters and Ph.D. in Computer Science from Boston University, where she focused on real-time systems.

Dave Ward, Cisco Systems
Dave Ward is a Distinguished Engineer and software geek at Cisco Systems. He is the software architect for IOS-XR, Cisco's next-generation operating system, and co-system architect of the CRS-1 multi-terabit router. Dave is also the chair of the IS-IS, HIP and BFD Working Groups at the IETF, and a member of the IETF-ITU ASON design committee. http://bgp.nu/~dward/IPFRR/IPFRR_overview_NANOG.pdf">http://bgp.nu/~dward/IPFRR/IPFRR_overview_NANOG.pdf

Full Abstract

The applicability of IP fast-reroute as applied to a particular core network is analyzed. This analysis considers loop-free alternates and U-turn alternates. The analysis examines both the effectiveness of the techniques on the various network topologies and the capacity planning implications of using IP fast-reroute.

Speakers
Gagan Choudhury, AT&T

Full Abstract

This presentation discusses the creation of an MPLS overlay network using an existing IP core to extend regionally based L2 VPN services.

Speakers
Scott Gross, MCI
Scott Gross is currently a Sr. Engineer with MCI MAE Engineering; prior to joining MAE Engineering in 2000, Scott provided 2nd and 3rd level support to the MFS Datanet/Worldcom NOC for Managed Frame and MAE Services beginning in 1996.

Monday, January 31, 2005
Topic/Presenter
Full Abstract

Speakers
Susan Harris, Merit Network
Rodney Joffe, UltraDNS

Full Abstract

ISP Security professionals encounter unique security incidents. Miscreants, extortion, attacks on their infrastructure, law enforcement knocking on their doors, rampant worms, botnets gone wild, and collateral damage that knocks out multiple gig links are all types of incidents that an enterprise security professional will never experience. "A Day in the Security Life of an SP" is a new regular session given by service provider security professionals to help the broader NANOG operations community learn about their colleagues' work, point out worries and concern in the industry, and recommend actions that the community can take that would make life easer. For this NANOG we have Don Smith, Security Operations at Qwest.

Speakers
Don Smith, Qwest
Donald Smith is a Security Engineer at Qwest and an Internet Storm Center handler (isc.sans.org). He began his computer career 28 years ago in the Army, on a "portable" analog computer. He worked for CDC and received his first security certification in 1995 (CISSR). He has contributed to various computer security groups, tools, and standards, including TIS-fw toolkit, AISSIM, NISPOM ch8, RFC3871, "Operational Security Requirements for Large ISP IP Network Infrastructure," and SANS NT security and incident handling guides.

Full Abstract

Bogons are network prefixes that should never appear in the Internet routing table. These networks are commonly used by miscreants for spam and DDoS attacks, and therefore filtering bogons at your perimeter is generally considered useful. However, these filters must be maintained as the list of unallocated subnets (bogons) changes from time to time. Team Cymru offers a variety of resources to help you maintain your filters, including the Bogon Route Server Project, which can automatically filter bogons on your routers via an eBGP peering session with us. This presentation will give you an overview of options available for automated filtering of bogons within your network.

Speakers
Dave Deitrich, Team Cymru
Dave Deitrich is a full-time member of Team Cymru and an employee of Cisco Systems. Prior to this he worked for Motorola, IBM, and Computer Sciences Corporation as a network architect, engineer, and troubleshooter. Dave has always had a strong interest in new methods of collection, analysis, and presentation of network performance data. Note that Dave is not related to Dave Dittrich of the University of Washington!

Full Abstract

We report on our experiences in adopting a hardware packet capture solution to improve the ability to capture (and discard) packets on both our existing IDS platform and new IDS solutions to protect our lively environment. The University of California at Santa Cruz School of Engineering is growing and traffic rates are overwhelming the existing IDS PC-based system. Gigabit ports are cropping up all over the department, and major traffic flows go to and from I2. We'll discuss our investigation into next-generation capture cards and our desire to continue to use Snort (www.snort.org) aligned with the discovery and use of some new, interesting technology.

Speakers
Paul Tatarsky, UCSC
Paul Tatarsky is a UNIX sysadmin and security consultant in the Midwest who has spent most of his 15 working years monitoring IDS systems at UCSC on the west coast. He also runs several compute clusters for the Human Genome Project at UCSC and tries to come up with better ways to protect his systems from attack and improve the way he monitors for such attacks.

Full Abstract

The purpose of this panel is to review the current state of the BGP Security Requirements draft being worked on in the IETF's Routing Protocol Security Requirements (RPSEC) Working Group. Our goal is to increase operator community awareness of the document and solicit the community's input.

Speakers
Blaine Christian, KMC Telecom Solutions
Danny McPherson, Arbor
Sandy Murphy, Sparta
Tony Tauber, MIT Lincoln Lab
A co-Chair of the RPSEC Working group in the IETF, Tony Tauber has many years of experience in the deployment and operation of ISP networks. Since begining with BBN running the NEARnet, BARRnet and SURAnet regional networks, he subsequently worked for that company through its name-changes as GTE, Genuity, and eventual acquisition by Level3. Currently at MIT's Lincoln Laboratory, Tony now builds networks in support of government research and development.