Saturday, October 7, 2006
Topic/Presenter
Full Abstract

This tutorial introduces service providers to some of the features available in BGP to aid multihoming to the Internet. After an explanation of multihoming and the principles being followed in this tutorial, several examples involving different scenarios will be given. Configuration techniques for modifying inbound and outbound traffic flows are covered, as are some examples on how to use BGP communities in inter-AS relationships. The tutorial finishes by covering some common multihoming security issues.

Level: Introductory to Intermediate

Speakers
Philip Smith, Cisco Systems
Philip Smith joined Cisco Systems in January 1998. He is a member of the Service Provider Architectures Group of Consulting Engineering, within Corporate Development. His role includes working with many ISPs in the Asia-Pacific region and the rest of the world, specifically in network strategies, design, technology, and operations, as well as helping with network configuration and scaling. Other areas of interest also include Internet routing, Internet protocols, IPv6, and encouraging the growth of the Internet around the world. Prior to joining Cisco, he spent five years at PIPEX (now part of UUNET's global ISP business), the UK's first commercial Internet Service Provider. He was one of the first engineers working in the UK Internet, and played a fundamental role in building the modern Internet in the UK and Europe.

Philip is co-author of Cisco ISP Essentials, published by Cisco Press. He holds a Doctor of Philosophy and has a First Class Honours Degree in Physics. He lives in Brisbane, Australia.

Full Abstract

Zero downtime is one of the key principles in network design, in particular when building data-centers, where key applications and data need to be accessed at any given time. Content switches have traditionally been used to build scaleable and resilient data-centers offering local load balancing for the data-center front-end and multi-tier architectures. Over the past years enterprises and services providers around the world have started to utilize content switches (often in conjunction with other dedicated GSLB devices) to also provide redundancy across multiple distinct geographic locations. The session introduces Global Server Load Balancing (GSLB) concepts and terminology, like active-standby, active-active, and disaster recovery, before diving into a detailed description of the most common GSLB technologies, including DNS-based solutions, L3-based solutions (Route Health Injection) and HTTP-only mechanisms.

Speakers
Zeeshan Naseh, Cisco Systems
Zeeshan Naseh, CCIE (#6838), is a Technical Leader in Cisco's World Wide Data Center Networking Practice within Advanced Services. His primary responsibility have been supporting Cisco's major customers, including service providers, wireless service providers, large enterprises, and financial institution. As a design consultant, Zeeshan has focused on Content Switching and Data Centers. Zeeshan has authored several white papers and design documents that have been published on Packet Magazine, IETF and on CCO (www.cisco.com). Zeeshan is the author of the data center book titled Designing Content Switching Solutions (ISBN: 1-58705213x).

Sunday, October 8, 2006
Topic/Presenter
Full Abstract

Speakers
Philip Smith, Cisco Systems

Full Abstract

Experience with telcos, ISPs, and cable operators, especially rural, has shown a lack of familiarity with ensuring fault tolerance of critical components such as softswitches (Class 5 and 4), remote monitoring and problem intervention for remote sites, quality of service, as well as load sharing and server backup. Drawn from carriers of all sizes, this presentation will discuss requirements checklists and real-world fixes. Some preliminary work on an open source remote management platform will be discused.

Speakers
Howard C. Berkowitz

Full Abstract

  • SC Report
    • PC and MLC appointment processes
    • Elections process
  • PC Report

  • MLC Report

  • Financial Overview - link to presentation

  • Charter Amendment Proposals

  • SC Nominees who wish to speak will have five minutes each

Speakers
Randy Bush, IIJ

Full Abstract

Agenda ----------- 2:00-2:15 - Topic and Speaker, TBD 2:15-2:30 - Favorite Peering Routers - Discussion Facilitator: Tom Scholl This discussion will enumerate the top reasons Peering Coordinators prefer one router over another for the purposes of peering. We will have microphones circulating around the room so folks can chime in. 2:30-3:10 - The Great Debate - Should Consistent Announcements and a Backbone always be a requirement for multi-site Peering? The two debaters have agreed, regardless of their personal opinions, to present and defend the strongest arguments on both sides: Peter Cohen will be arguing that consistent announcements are indeed a rational requirement for multi-site peering. Aaron Hughes will be arguing that consistent announcements are not a valid peering requirement when peering with content that is duplicated/mirrored across multiple sites. The format is the same as previous debates: 2 minutes for each side to state their case 2 minutes each side to attack the others position and reinforce their position 2 minutes each to sum up their argument We will take an audience vote : Which side made the more compelling case? This will determine the winner of the debate. We will then open the floor to discussion, highlighting points that should have been made during the debate, points or questions that might highlight issues that might sway the audience to vote for which *argument* ultimately is stronger, after the audience discussions is over. We will take a final vote on the issue: "Should Consistent Announcements and a Backbone always be a requirement for multi-site Peering? 3:10-3:30 - Other topics that pop up from the community between now and the meeting and Peering Personals where Peering Coordinators can introduce themselves to the group, with the goal of initiating the peering negotiations.

Speakers
Bill Norton, Equinix, moderator
Bill Norton is Co-Founder and Chief Technical Liaison for Equinix. He focuses on research on large-scale interconnection and ISP peering, and in particular, scaling Internet operations using optical networking. Bill has published and presented his research in a variety of international forums. From 1987 to 1998, he served in several staff and managerial roles at Merit Network, directing national and international network research and operations activities and serving as NANOG coordinator. Bill received a B.A. in Computer Science and an M.B.A. from the Business School at the University of Michigan, and has been an active member of the Internet Engineering Task Force for the past 15 years.

Monday, October 9, 2006
Topic/Presenter
Full Abstract

Security incidents are a daily event for Internet Service Providers. Attacks on an ISP's customers, attacks from an ISP's customer, worms, BOTNETs, and attacks on the ISP's infrastructure are now one of many "security" NOC tickets throughout the day. This increase in the volume and intensity of attacks has forced ISP's to spend constrained resources to mitigate the effects of these attacks on their operations and services. This investment has helped minimize the effects of the attacks, but it has not helped stop them at the source. Stopping attacks at their source requires rapid and effective inter-ISP cooperation. Hence, these ISP Security BOFs are also used as a face-to-face syncup meeting for the NSP-SEC forum.

Speakers
Roland Dobbins, Cisco Systems
Danny McPherson, Arbor Networks

Recordings
Full Abstract

Opening Remarks

Speakers
Don Bertier, SAVVIS
Bill Darte, CAIT, Washington University
Steve Feldman, CNET
Ray Plzak, ARIN
Don Welch, Merit Network

Full Abstract

Every SONET, TDM and Optical device manufacturers use the TL1 language as its dominant management protocol for controlling non-routing / transmission telecommunication devices. A general explanation of TL1, how one configures devices via the TL1 language, how to use commercial and open source software for TL1 and a case study of integrating exclusively TL1 devices into SNMP monitoring systems will be provided in this presentation.

Speakers
Rachel K. Bicknell, Emdeon Business Services
Rachel Bicknell recently started working at Emdeon Business Services as a Senior Network Engineer. Prior to joining Emdeon, she was a Senior Member of Technical Staff at Switch and Data, running and supporting the multiple PAIX Internet exchanges across the United States.

Full Abstract

Ethernet services today are a viable alternative for businesses looking for private line connectivity among locations. One obstacle to the global deployment of such services is the limited reach of service providers offering such Ethernet services. Multi-provider Ethernet services are therefore important in ensuring mass-deployment and continued success of the Ethernet services market. In order to ensure operational success of multi-provider Ethernet services, the hand-off between providers needs to be sufficiently simple and flexible. This talk explores the viability of using a combination of VPLS and the recently standardized IEEE 802.1ad technologies as the underlying methodology for offering multi-provider Ethernet services. An overview of the methodology, benefits, potential challenges and comparison with alternative approaches will be covered in this talk.

Speakers
Ananda Rajagopal, Foundry Networks
Ananda Rajagopal is a Product Manager responsible for Service Provider Solutions at Foundry Networks. Prior to joining Foundry, he was the Director of Presales, Software and QA at Lucent Technologies’ Broadband Access Business Unit. He also served various engineering management roles during his stint at Ascend Communications and later, Lucent Technologies. Before Ascend, he consulted at Stratacom / Cisco Systems for over 4 years, where he led engineering teams responsible for developing frame relay and ATM WAN products, including the industry’s first inverse multiplexing over ATM product. He has also played key roles in standardization efforts at the ATM Forum and DSL Forum in the past.

Full Abstract

Speakers
Majdi Abbas, Lattice Networks

Full Abstract

In the hot-potato settlement-free peering world of today, there is an expectation that all peers play & advertise routes equally. However, in reality, some settlement-free peers may attempt to short cut and modify advertisements resulting in you hauling traffic a bit farther than needed. This presentation looks at ways this is done today, some specific examples of this as well as other interesting things you can learn by examining routes received (but maybe not accepted) at all points in a network.

Speakers
Nathan Patrick, Sonic
Tom Scholl, AT&T Labs
Tom Scholl is a Senior Technical Consultant in the global IP core network design & routing group in AT&T Labs. He works on network design and routing architecture as well as the SBC network integration. Tom has spent his last several years at what was SBC and prior to that, Ameritech. When not working, Tom can be found on IRC discussing routing, networking hardware and the NINAF protocol.

Aman Shaikh, AT&T Labs
Aman Shaikh is a member of Network Performance and Engineering Department at AT&T Research where he works on IP route monitoring and several projects related to IP routing. His general research interests lie in the areas of IP routing and network management. Aman obtained his Ph.D. and M.S. from University of California, Santa Cruz.

Richard Steenbergen, nLayer Communications
Richard Steenbergen is the Co-Founder of nLayer Communications, where he currently serves as Chief Technical Officer and devotes a significant amount of time to the strategic management of peering relationships. Previously, he served as a Sr. Network Engineer for several large NSPs, and was the Sr. Software Engineer responsible for developing optimized routing technologies at netVmg, Inc.

Full Abstract

On todays Internet, BGP leaks between peers are commonplace. While many presentations have been done regarding how to filter this, people still do not apply these practices. One feature though is used quite well across almost every network: maximum-prefix. While maximum-prefix does "stop" a leak, it still has some negative side effects. This presentation outlines some alternative concepts as to how maximum-prefix works to keep traffic (and BGP) operating even in the event of a leak.

Speakers
Tom Scholl, AT&T Labs
Tom Scholl is a Senior Technical Consultant in the global IP core network design & routing group in AT&T Labs. He works on network design and routing architecture as well as the SBC network integration. Tom has spent his last several years at what was SBC and prior to that, Ameritech. When not working, Tom can be found on IRC discussing routing, networking hardware and the NINAF protocol.

Full Abstract

Speakers
Derek Gassen, Time Warner Telecom.
Craig Labovitz, Arbor Networks
Craig Labovitz is Chief Architect of Arbor Networks' service provider security and backbone engineering solutions. Before joining Arbor, Craig served as a research scientist at Microsoft Research and Merit Network, Inc. His research interests include the security and fault-tolerance of large-scale distributed systems. He is well-known for several important early papers on Internet routing dynamics and reliability. Craig received his PhD. and MSE from the University of Michigan.

Raul Lozano, Time Warner Telecom
Raul Lozano holds a BS in Electronic Systems Engineering from Tecnológico de Monterrey (ITESM). He has more than 10 years in data engineering and has held different positions in Network Engineering, Operations, Provisioning and Network Management. Currently he is at Time Warner Telecom as Network/Security Architect.

Danny McPherson, Arbor Networks
Danny McPherson is Chief Research Officer at Arbor Networks. He has over 14 years in the Internet network operations, security and telecommunications industry. Prior to joining Arbor, Danny was Director of Emerging Technology at Amber Networks. He has served as network architect for global Internet Service Providers such as Qwest, MCI and Genuity. Danny currently chairs the IETF PWE3 Working Group and is a member of several IETF Area directorates and Internet research groups.

Recordings
Full Abstract

Today IPv6 has routing issues that need to be resolved. One of these is IPv6 Multihoming and Traffic Engineering. This briefing addresses all the IPv6 Multihoming Solutions currently put forward by the Internet Community as a collective. While Multihoming is the focus of this discussion, Traffic Engineering is also considered in parallel with the possible solutions being considered. With this briefing, I hope to receive further input on what direction the Internet Community wishes to pursue in order to resolve IPv6 Multihoming.

Speakers
Marla Azinger, Frontier Communications

Full Abstract

IPv6 has seen relatively little adoption among service providers worldwide in recent years but that may be beginning to change. As fear of IPv4 address exhaustion looms and IPv6 is perceived to be maturing, roll-outs are increasing. This is bringing a series of conflicts between service providers and protocol architects. Service providers want to deploy IPv6 in a manner compatible with current IPv4 deployment, but this notably conflicts with desire to use IPv6 to solve the massive deaggregation and routing-table bloat seen in the IPv4 world. Clearly there are problems that need to be worked out. Nevertheless, a large group of IPv6 proponents has developed. These are people who think that IPv6 is more than ready for production deployment, even to end-users. They think it solves some problems for real networks (mostly related to IP number exhaustion, but there are others), and that the time for resistance, comment and criticism has come and gone. At the same time, a large and quiet body of people are (mostly) silently waiting for IPv6's demise so that we can start talking about a simpler protocol migration. These people tend to think that IPv6 is massively over-designed, fails to solve the location+identifier problem in routing scalably, and offers no backwards compatibility. They also tend to think that there is plenty of time to design and implement a better solution. IPv6 proponents, even those who think that the protocol needs work, obviously strongly disagree. What everyone agrees on is that IPv6 has not seen massive adoption and that there is a looming set of problems for IPv4 (the combination of address shortage and routing table bloat). This panel will finally unite the IPv6 naysayers and the IPv6 proponents in a single, constructive discussion. The idea is to combine people who think that IPv6 is workable but needs some fixing with those who think that it is fatally flawed in a useful, public debate. The panel also unites people whose experience is on the protocol design side, people who run large networks, and those who do research, analysis and tools for operators.

Speakers
Moderator - Todd Underwood, Renesys Corporation
Todd Underwood is in charge of operations and peering for Renesys. Before that he was CTO of Oso Grande, a New Mexico ISP. He has a background in systems engineering and security and has worked on a variety of systems architecture and scalability problems. Todd has presented work related to Internet routing dynamics and relationships at NANOG and various peering forums (LINX, S&D, NOTA).

Panelist - Daniel Golding, Tier 1 Research
Daniel Golding is Vice President and Senior Analyst at Tier 1 Research, covering the Hosting and Internet Infrastructure industries. Most recently, Daniel spent three years as a senior industry analyst at the Burton Group, covering enterprise internetworking. Daniel has served as Global Peering Manager at America Online, where he lead AOL's efforts to become a core Internet network. Daniel has also held senior engineering and architecture positions at a variety of major Internet Service Providers. Daniel has briefed the FCC on Internet policy issues and is a frequent speaker at industry events, including the North American Network Operator's Group (NANOG) and the Global Peering Forum. Daniel holds a BS from Auburn University and an MS from George Mason University, both in engineering.

Panelist - David Meyer, Cisco, University of Oregon
David Meyer is currently Director of Internet Architecture and Engineering at Cisco Systems. Prior to that he served as Senior Scientist and Director of IP Technology Development at Sprint. He is also Director of the Advanced Network Technology Center at the University of Oregon. Prior to working at Sprint, he worked at Cisco, where he was involved in software development, working both on multicast and BGP. He is active in the IETF, where he chairs the MBONED, GROW, and DNSOP working groups, as well as being a member of several IETF directorates and Internet Research Task Force research groups. He is also active in the operator community and in other standards organizations as the ITU-T, where he co-chairs FGNGN WG 7.

Jason Schiller, Verizon Business
Jason Schiller is a Senior Internet Network Engineer in the IP Network Engineering Department at UUNET / Verizon. He has been with the company for over seven years. His current role includes architecting, designing, evaluating, and qualifying networks for deployment in the UUNET network. Jason also completes field trials and acts as highest level of escalation for issues in the Americas continental networks and for multicast issues globally. He is also responsible for defining and maintaining global standards for each of the continental UUNET networks. Previous projects include designing the UUCast multicast network and the Latin American network. Current interests include Internet routing, multicast, and IPv6.

Tuesday, October 10, 2006
Topic/Presenter
Full Abstract

This session covers the functionality of the NetIO stack for Windows Vista and Windows Server Code-Name Longhorn, with a focus on its implications for network infrastructure and network operations. Case studies are presented to illustrate the opportunities and challenges associated with deploying significant new networking functionality, both in a broadly available consumer operating system and in a high volume server operating system. The session closes with some thoughts on improving the evolution of networking functionality through collaboration between software vendors and public network operators.

Speakers
Abolade Gbadegesin, Microsoft
Abolade Gbadegesin doubles as an Architect for both the Windows Networking and Device Technologies Division and the Windows Live Core datacenter architecture team. Most recently, he was responsible for leading the redesign and implementation of the Windows networking stack for Windows Vista, incorporating native support for IPv6, IPSec and hardware offload capabilities.

Full Abstract

Presenting progress on x.509 stuff. There is considerable progress, i.e. running code.

Speakers
Rob Austein, ISC.
Randy Bush, IIJ
Geoff Huston, APNIC
George Michaelson, APNIC

Full Abstract

Speakers
Steve Feldman, CNET

Full Abstract

Prefix hijacking events occur due to both unintentional configuration errors and intentional attacks. The talk introduces the Prefix Hijack Alert System (PHAS). PHAS is a simple, real time notification system that alerts prefix owners if the BGP origin for their prefix changes. The central goal of PHAS is to provide reliable and timely notification of origin AS changes. Although many origin changes are valid, the design of PHAS errs on providing notifications for all the prefix origin changes to maximize users detection power. PHAS notifications follow a standard format and are delivered to multiple mailboxes of prefix owners to maximize delivery reliability even in the face of effective route hijacking. An automated mail reader with a simple filter can quickly capture real route hijacks and ignore the rest messages, providing the network administrator with rapid notification and few (if any) false positives. In addition to origin changes, PHAS also notifies changes in sub-prefix sets and last hop sets. We are in the process of deploying PHAS, and prefix owners can now register their prefixes to receive alarms by email, or check the alarms for their prefixes on the web.

Speakers
Yan Chen, Colorado State University
Mohit Lad, UCLA
Dan Massey, Colorado State University
Lixia Zhang, UCLA
Beichuan Zhang, University of Arizona

Full Abstract

lacing voice traffic on the data network exposes it to the same attacks that plague the existing Internet infrastructure. Traditional perimeter security solutions cannot cope with the complexity of VoIP protocols at carrier-class performance. To be useful and economical for carrier deployments, SIP-based VoIP security solution must process carrier-class call volumes. Equally important, solution elements should scale independently, allowing operators to manage growing demand and manage costs. In a unique collaboration between network operator, vendor, and academia, Verizon Labs, CloudShield, and the computer science team at Columbia University have implemented a large-scale SIP-aware application layer firewall (ALG) combined with Denial-of Service detection and mitigation to provide robust protection of SIP-based VoIP infrastructures. The SIP ALG uses a rule-based approach for rate limiting the signaling channel traffic, and the DoS filtering function discriminates legitimate traffic from attack traffic by enforcing threshold and authentication policies. The developed firewall device was found to exceed testing capacity with SIP traffic filtering managing call volumes exceeding 30,000 concurrent calls, and SIP signal processing of up to 300 calls per second. This presentation will cover the following topics related to this research project - The challenges for carrier-class VoIP infrastructure protection; - Details of the scalable SIP-aware ALG - Details of the SIP filtering solution for detecting and mitigating DoS attacks - The testing and analysis tool and test bed designed to validate the research - Performance testing results of the implementation The net result of this research is that scalable, affordable solutions are possible with commercially available hardware platforms and appropriately architected applications software.

Speakers
David Helms, CloudShield Technologies
David Helms is a Senior Systems Engineer with CloudShield Technologies, Inc. and has led research efforts in applying deep packet inspection technologies in the areas of content monitoring, network security and traffic control. Prior to coming to CloudShield, Mr. Helms held the position of Director of Product Management for BioNetrix Systems, delivering biometric authentication solutions for computer and network security applications. Mr. Helms background also includes technical leadership roles at CheckPoint Software Technologies and Bay Networks, focused on network and security engineering for the enterprise and security provider markets.

Gaston Ormazabal, Verizon Labs
Gaston Ormazabal is a Distinguished Member of the Technical Staff at Verizon Laboratories. He holds a B.A from Harvard University and M.A., M. Phil., and Ph.D. degrees from Columbia University, all in Physics. While at Columbia he conducted research in particle physics at both the Fermi and Brookhaven National Accelerator Laboratories. Gaston has held positions at Bell Communications Research and was one of the founding members of NYNEX Science and Technology. He is presently responsible for Network Security Systems Integration and Testing, concentrating in areas of VoIP Security Protocols for SIP over FTTP and IP Multimedia Subsystems; and has been also involved in designing a Security Management Infrastructure for the Next Generation Network (NGN). Dr Ormazabal has previously managed other University Research Programs both at Columbia University (Softswitch technologies) and at the Center for Advanced Technology in Telecommunications (CATT) at Polytechnic University (Intelligent Automation tools for SS7 Quad Interoperability Testing) where he has been a regular featured speaker at the annual CATT Research Day, most recently on “Post 9/11 Security Strategies”. Dr Ormazabal has also been a participant in standards activities in ANSI committees and has nine patents (pending) on VoIP security.

Somdutt B. Patnaik, Columbia University.
Henning Schulzrinne, Columbia University
Prof. Henning Schulzrinne received his Ph.D. from the University of Massachusetts in Amherst, Massachusetts. He was a member of technical staff at AT&T Bell Laboratories, Murray Hill and an associate department head at GMD-Fokus (Berlin), before joining the Computer Science and Electrical Engineering departments at Columbia University, New York. He is currently chair of the Department of Computer Science. Protocols co-developed by him, such as RTP, RTSP and SIP, are now Internet standards, used by almost all Internet telephony and multimedia applications. His research interests include Internet multimedia systems, ubiquitous computing, mobile systems, quality of service, and performance evaluation. He is a Fellow of the IEEE

Eilon Yardeni, Columbia University

Full Abstract

Botnets---networks of (typically compromised) machines---are often used for nefarious activities (\eg, spam, click fraud, denial-of-service attacks, etc.). Identifying members of botnets could help stem these attacks, but {\em passively} detecting botnet membership (\ie, without disrupting the operation of the botnet) proves to be difficult. This paper studies the effectiveness of monitoring lookups to a DNS-based blackhole list (DNSBL) to expose botnet membership. We perform {\em counter-intelligence} based on the insight that botmasters themselves perform DNSBL lookups to determine whether their spamming bots are blacklisted. Using heuristics to identify which DNSBL lookups are perpetrated by a botmaster performing such reconnaissance, we are able to compile a list of likely bots. This paper studies the prevalence of DNSBL reconnaissance observed at a mirror of a well-known blacklist for a 45-day period, identifies the means by which botmasters are performing reconnaissance, and suggests the possibility of using counter-intelligence to discover likely bots. We find that bots are performing reconnaissance on behalf of other bots. Based on this finding, we suggest counter- intelligence techniques that may be useful for early bot detection. The paper referenced in the talk is available at: http://www.cc.gatech.edu/~feamster/papers/dnsbl.pdf" TARGET="_BLANK">http://www.cc.gatech.edu/~feamster/papers/dnsbl.pdf

Speakers
David Dagon, Georgia Tech University
Nick Feamster, Georgia Tech University
Nick Feamster is an assistant professor in the College of Computing at Georgia Tech. He received his Ph.D. in Computer science from MIT in 2005, and his S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT in 2000 and 2001, respectively. His research focuses on many aspects of computer networking and networked systems, including the design, measurement, and analysis of network routing protocols, network security, anonymous communication systems, and adaptive streaming media protocols. His honors include award papers at SIGCOMM 2006 (network-level behavior of spammers), the NSDI 2005 conference (fault detection in router configuration), Usenix Security 2002 (circumventing web censorship using Infranet), and Usenix Security 2001 (web cookie analysis).

Full Abstract

It's well known that the rise of peer-to-peer applications have had a major impact on the unprecedented increase in the Internet traffic worldwide. This phenomenon is very much particular in Japan due to popularity of fiber access services. An analysis was done on few interesting incidents that were observed in the past 6 months at JPNAP, a major IX in Japan. Before dawn on January 7 2006, a decline in aggregated traffic of about 20% at JPNAP was observed. We considered that quite a number of peer-to-peer windows machines rebooted automatically due to the emergency release of a Windows Update at that time. As a result a temporary traffic drop happened at JPNAP without any network troubles. Also, few interesting incidents happened at FIFA World Cup in June 2006. We could detect an anomalous traffic decline and recovery during World Cup matches in which the Japanese team was playing. These traffic trends were reported at the major ISPs' backbones in Japan, also. This phenomenon indicates that application behaviors of P2P machines and human activities in major social events could cause a huge impact on the Internet traffic. What does this mean to us network operators? There is a need to consider the possibility that such events could happen when we do network designs or scheduled maintenance work. If possible, we'd like to survey and compare the traffic statistics of other regions at the time of such events and to discuss the issue with operators.

Speakers
Yukiyasu Tarui, Internet Multifeed Co. / JPNAP
Yukiyasu Tarui is a network engineer at Internet Multifeed Co. In there, he has been developing and operating JPNAP service since 2000. He is responsible for a backbone architecture and traffic analyses of their networks. He's also involved as part of program committees at JANOG meeting.

Full Abstract

Speakers
Philip Smith

Full Abstract

Speakers
Anton Kapela

Full Abstract

Speakers
Geoff Huston

Full Abstract

Speakers
Alex Pilosov
Adam Rothschild

Full Abstract

Speakers
Larry Blunk

Full Abstract

Speakers
Peter Schoenmaker