Saturday, May 31, 2008
Topic/Presenter |
---|
RecordingsFull AbstractProgram Highlights: Business and Technical Drivers for Voice Peering; Voice Peering Architectures, Designs and Implementation Models; Bi-Lateral and Multi-Lateral Voice Peering; Technologies: Least Cost Routing (LCR), ENUM, SRV, Session Controllers; A look into the Voice Peering Fabric, its users and other statistics; Analysis of Voice Peering Operators, their Business Models & Strategies Speakers |
Full Abstract"Knowledge of the amount of traffic between source and destination pairs of a network is crucial to fundamental operational tasks such as capacity planning, traffic engineering, and peering management. Router vendors, third parties, academic researchers, and ingenious network engineers have devised multiple ways of collecting and estimating traffic matrices. This session presents an overview of applications of traffic matrices and operational experiences with the various approaches, including Netflow-based methods, mathematical estimation models, and MPLS (both RSVP and LDP) methods. Emphasis will be on practical experiences with each method." Speakers |
Full AbstractBGP Prefixes leaking today potentially have a much largers business impact than it did 10 years ago. While groups look at long term fixes, this tutorial will focus on what ISPs should be doing now. This will be a compilation of best practices for all modes of BGP prefix filtering - between the ISP and their customers, the ISP and their peers, and the ISP and their upstream. It will also review reaction tools - like Remote Trigger Black Hole (RTBH) - to demonstrate how layers of filtering is used to protect the interest of business and the Internet. Scaling and operational maintenance of the prefix filters will also be covered. Speakers |
Sunday, June 1, 2008
Topic/Presenter |
---|
Full AbstractSecurity incidents are a daily event for Internet Service Providers. Attacks on an ISP's customers, attacks from an ISP's customer, worms, BOTNETs, and attacks on the ISP's infrastructure are now one of many "security" NOC tickets throughout the day. This increase in the volume and intensity of attacks has forced ISP's to spend constrained resources to mitigate the effects of these attacks on their operations and services. This investment has helped minimize the effects of the attacks, but it has not helped stop them at the source. Stopping attacks at their source requires rapid and effective inter-ISP cooperation. Hence, these ISP Security BOFs are also used as a face-to- face sync up meeting for the NSP-SEC forum. Agenda: ISC SIE Update Paul Vixie/ISC ICANN SSAC Update Paul Vixie & Danny McPherson/SSAC DNS OARC Update/Meeting Pointers Keith Mitchell & Paul Vixie/OARC ISP Security POC Intros & Open Microphone Speakers Danny McPherson, Arbor Networks |
RecordingsFull AbstractAn introduction to the many freely available network measurement tools. This tutorial will give the attendees a good introduction to several tools as well as an idea of what resources are available. The tutorial will begin with a broad survey of available tools and then go in a bit more detail about four particular tools: Speakers Jon Dugan, ESnet |
RecordingsFull AbstractWe welcome all NANOG attendees to be part of the NANOG Community Meeting . Speakers |
Full AbstractThe next generation of cable internet access technology, DOCSIS 3.0, is being readied for deployment by cable operators and vendors around the world. What does this technology look like? When will it start being deployed? What data rates will cable operators likely offer to customers? How will this affect the landscape of residential broadband? This talk will provide some insights on these questions. Speakers |
Full AbstractSpeakers |
RecordingsFull AbstractSpeakers |
Full AbstractSpeakers |
RecordingsFull AbstractRcat is an eBGP root cause analysis tool developed by Anthony Lambert, PhD student at Orange Labs. It is publicly available at: http://rcat.rd.francetelecom.com/" TARGET="_blank">http://rcat.rd.francetelecom.com/ Speakers |
Monday, June 2, 2008
Topic/Presenter |
---|
RecordingsFull AbstractDiscuss a protocol that enhances traceroute to deal with flow level networking debugging. This becomes very important as today's network deal with LAGs, ECMPs, Policy based Routing and Access Control Lists. Will discuss the use cases and basic protocol operation. Will also introduce flow fan out mode of the protocol. Legacy network equipment interoperation requirement would be discussed. Speakers |
RecordingsFull AbstractWe developed the Atomic Routing Theory (ART) to model an AS's policy objectives and the route assignment process, as well as to derive the requirements for correctly realizing any policy. Applying ART to BGP shows that with modest, incrementally deployable changes to internal BGP (iBGP), we can ensure that an AS realizes its policy correctly, regardless of the physical topology. These changes rely on existing and new technologies such as VRF and ADD-PATH. In addition to realizing today's policy objectives, when new features are introduced to BGP in the future, ART can guide the design and implementation so as to ensure correctness of the implementation of new and existing features. Speakers |
RecordingsFull AbstractRicardo Oliveira is a Ph.D. student in Computer Science at University of California, Los Angeles. His main work has been about understanding and modeling the connectivity of different networks mainly at the inter-domain level; design of next-generation inter-domain routing architectures and traffic anomaly detection. He is going to be in the job market in Fall 2008. Speakers |
RecordingsFull AbstractRIPE NCC is a neutral coordination body offering support services to our members in Europe, the Middle East and parts of Asia. This presentation will provide an introduction to our portfolio of tools and services we provide which are of use to network operators in examining network incidents as well as monitoring normal day to day operations. Speakers |
Full AbstractAlcatel-Lucent |
Full AbstractNewcomer's Breakfast Speakers |
Full AbstractSpeakers |
Full AbstractAfter spending fifteen years operating and delivering network infrastructure services to content providers, Jay tells the story of what it's like to move to the other side, eat crow, and become one of his own customers. Topics include myths and realities of problem customers, what happens when you can't drink your own kool-aid, peering, ddos, latency, multi-homing, load balancing, racks and power, geographical distribution, active/active, video and CDNs, server environments, and more. Speakers |
Full AbstractWe review the recent Cogent-Telia de-peering, including the countries impacted and various conjectures about the underlying business motivations. Once the peering session came back up, we observe Telia selecting many more routes to Cogent and Cogent selecting many fewer from Telia, implying this disagreement was at least partially resolved by adjusting peering ratios. Finally, we observe the new peering sessions that were established during the outage by both combatants and shifts in routing to other players even once service was restored. Speakers Alin Popescu, Renesys Corporation Earle Zmijewski, Renesys Corporation |
Full AbstractThe presentation focuses on operating challenges of a large US-based WISP. Focus areas will include: brief business case of why the WISP business is here to stay, wireless technology (what's available today to use), the challenges (deployment, RF spectrum management, technology (hardware itself), site issues (access/security) security, and environmental issues), and the lessons learned over the past 8 years... lastly, what we might be able to expect with WiMax (802.16d). Speakers |
Full AbstractWe present Internet traffic and attack statistics from a two year study of 67 geographically and topologically diverse ISPs. Over the course of the study, each participating ISP anonymously contributed detailed time series and anomaly traffic datasets covering the majority of their inter-domain traffic to our central servers. Speakers |
|
Tuesday, June 3, 2008
Topic/Presenter |
---|
Full AbstractBGPlay is a successful web based service which gives information about traffic directed to a certain Internet destination form public BGP collectors operated by RIPE NCC (RIS project) and Oregon University (RouteViews project). iBGPlay is a new BGP routing visualization tool, derived form BGPlay (http://www.ibgplay.org/), that enables Internet Service Providers to graphically analyze the behavior over time of BGP paths collected from their own routers. It graphically provides information to relevant destinations selected by the users and chosen among the whole prefix set of the Internet. Among the other features, iBGPlay provide visualization highlighting of next-hops and internet exchange points, flexible prefix search, a aggregation of prefixes with the same behavior, dashboard with real time BGP event visualization, IPv6 support. ISPs can choose to adopt iBGPlay either as a service or as a software to be installed in the ISP's data center. The two options are functionally equivalent and are both free of charge. More than 12 ISPs (and ISP-like organizations) are currently using it. Speakers |
Full Abstract1) Cyclops: a detailed demonstration and discussion (continued) from the general session on Monday 2) Oregon Routeviews Project: discussion on the issues faced by the existing collectors and future plans Speakers Panelist - Ricardo Oliveira, UCLA |
Full AbstractA look into NYC Focused peering and the exchange fabrics' reach into buildings and participants across New York. During the presentation, each exchange operator will be asked to give an overall update as to membership, port speed counts and other technical information related to the exchange operation. Speakers |
Full AbstractThis presentation serves to guide current and new network operators through some of the technical challenges of peering. Various topics are covered such as routing policy, security, growth and other aspects of router configuration. The work covered here is based upon an upcoming IETF BCP draft on the same subject. Speakers |
Full AbstractWe present performance comparisons of existing and proposed new algorithms for BGP anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They differ in the anomaly situations which they attempt to alert or mitigate, and also in the type(s) of data they use. Some are based on registry data from RIRs/IRRS (e.g. Nemecis) and others (PHAS, PGBGP) are driven by BGP trace data. The trace data is obtained from RIPE-RIS, Route-views, or a BGP speaker where the algorithm operates. We propose a new algorithm that combines the use of both registry and trace data, and also makes some key improvements over existing algorithms. We have built an evaluation platform called TERRAIN (Testing and Evaluation of Routing Robustness in Assurable Inter-domain Networking) on which these algorithms can be tested and empirically compared based on real and/or synthetically incorporated anomalies in BGP updates. We will present a variety of preliminary results providing interesting insights into quality metrics of registry data and the comparative performance of the various BGP robustness algorithms. Our objective is to share these early insights and invite feedback from the community to refine the TERRAIN evaluation tool to generate further useful results in the future. Speakers |
Full AbstractTuesday Evening Party |
RecordingsFull AbstractPart 1. How are submarine cables funded. Participants: a consortium member and a private owner Speakers Panelist - Samia Bashoun, David Ross Group Panelist - Pau Kirwan, Tata Communications |
Full AbstractSpeakers |
RecordingsFull AbstractExchange points are so important infrastructure for the internet that providers always require higher availabilities to exchange point providers. This presentation proposes an availability model of exchange point, and describes the methods to increase availability adopted by JPNAP. Also it examines the real availability data of JPNAP and discusses the effect of the method. Speakers |
Full AbstractSpeakers |
Wednesday, June 4, 2008
Topic/Presenter |
---|
Full AbstractAlcatel-Lucent |
RecordingsFull AbstractThis presentation will report on three areas on IANA's recent work. First, we will provide an update on the progress ICANN has made in its ongoing work to quantify the scale and distribution of the used but unallocated IPv4 address space. Secondly, we will also describe recent changes to the IPv4 Address Space Registry, particularly the updates to whois information and the 'various registries' designations. Finally, we will provide an update on registry options for DNSSEC information, both via DNS and stored in GPG signed XML formats. Speakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractSpeakers |
Full AbstractSpeakers |
Full AbstractSpeakers |
|
Full AbstractThis panel will focus on the methods for and deployment of inter-domain route filtering. We'll discuss the technical barriers to more ubiquitous deployment, what, where and why route filtering is applied today, and potential incremental deployment models that aim to improve coverage. Discussions will include why folks don't filter, policies to mitigate route leakage, RIR allocation authentication, IRR routing policy specification, object update and security considerations, and routing infrastructure challenges. The goal of this panel isn't just to revisit why route filtering can't be done today, but to assess viability of bi-lateral or other incremental models that further enable wider deployment. Speakers |
Full AbstractSpeakers |