Saturday, January 24, 2009
Topic/Presenter |
---|
RecordingsFull AbstractThis tutorial introduces the Locator/ID Seperation Protocol (LISP). After providing a survey of Loc/ID split concepts, the tutorial will explain the LISP data plane (LISP), the LISP control Plane (LISP+ALT), and how LISP sites talk with Non-LISP sites (Interworking). The tutorial will then review the current LISP deployment providing practical examples of how to configure, troubleshoot, and operate a LISP router. The tutorial will wrap up by reviewing an example of how LISP can be configured to Speakers David Meyer, Cisco Systems/University of Oregon |
Full AbstractMany people think they understand how to use and understand traceroute, yet the large number of traceroute based tickets at any sizable ISP proves that the vast majority of people do not. Even the ISPs themselves are frequently unable to come up with staff who are qualified to look at a traceroute and interpret it correctly. Speakers |
Full AbstractThis tutorial covers basic network operations practices, including what to do when a network breaks, how to manage changes and keep a network from breaking, documentation, customer and peer communication, and some very basic network architecture. It does not cover specific router or systems configurations, as there are lots of other tutorials that cover that sort of thing. Speakers |
Sunday, January 25, 2009
Topic/Presenter |
---|
Full AbstractAndree Toonk - Monitoring your prefixes with BGPmon Speakers Andree Toonk, BCNET |
Full AbstractThis talk is aimed at helping a multi-homed network grow from 1 or 2 routers at one POP to a more complex network topology. Speakers |
RecordingsFull AbstractSpeakers |
Full AbstractBuses arrive at 7 p.m. and depart at 7:30 p.m. for Columbus Square |
Full AbstractA formal invitation is forthcoming. In the interim, the Dominican government, through the Dominican Republic, Export & Investment Center (CEI-RD), is hosting a welcome party for all NANOG attendees at Columbus Square in the colonial district of Santo Domingo. This venue is surrounded by structures built as early as the 1400's. The national dancers will be performing along with traditional music, food and drink. Buses will leave the NANOG hotel at 7:30pm on Sunday the 25th (the journey is less than 10 minutes). This is something not to be missed!Dominican Government through the Dominican Republic Export & Investment Center (CEI-RD) |
Full AbstractVideo and content distribution will be the main bandwidth driver for access and metropolitan networks forcing network operators to upgrade transport capacity by an order of magnitude over the foreseeable future. To support such a massive build-out, 100Gbps will be required to lower both CAPEX and OPEX while adapting to demands of service domain interconnects. 100Gbps presents some unique challenges because transport technologies that have been used at 10Gbps and 40Gbps cannot be simply scaled to 100Gbps. In this talk, we will review some of the basic technology choices that have to be made for building cost effective, high performance, and reliable 100Gbps transport networks. We will start by reviewing the modulation formats for 100Gbps and discuss their cost and performance related trade-offs. As we will show, a coherent modulation, which is the optical equivalent to a FM car radio, presents the best choice for 100Gbps to have sufficient reach and be compatible with today’s 10Gbps/40Gbps Wavelength Division Multiplexing transmission (WDM) systems. While making 100Gbps affordable, yet without footprint penalty, the industry must adapt a new level of integration. We will show how Photonic Integrated Circuits (PIC) have the potential to achieve our goals. Furthermore, we will discuss the architectural impact of video in conjunction with 100Gbps technology. In particular, we will show an innovative architecture that take advantage of the unique characteristics of video traffic’s asymmetry and bursts. Speakers |
RecordingsFull AbstractTeam Cymru will review how to make best use of a new service that has been announced recently dubbed MHR (Malware Hash Registry). The MHR service allows you to query our database of many millions of unique malware samples for a computed MD5 or SHA-1 hash of a file. If it is malware and we know about it, we return the last time we've seen it along with an approximate anti-virus detection percentage. Speakers |
Full AbstractThe presentation will cover experiences and lessons learned during the test bed configuration and deployment which include signing of zones, distribution of Comcast public keys, the search for available public keys and keeping keys current. The presentation will also cover the flavors of test resolvers and how they performed with DNSSEC under load. Speakers Kevin Oberman, ESnet |
Monday, January 26, 2009
Topic/Presenter |
---|
Full AbstractPresenting real-world experiences of effective outbound load-balancing across multiple ISPs using BGP traffic engineering and what we call "the metric system." Primary audience is content or data hosting networks that connect to multiple ISPs. Focus is on actual techniques that have been used successfully in numerous installations for simple, effective, and reliable load balancing. This tutorial will show in-depth and specific configurations to achieve desired traffic engineering and will share real-world results. Speakers |
RecordingsFull AbstractPeering has evolved from being a routing optimization to a strategic intent. As traffic volume grows, peering becomes more interesting from both a performance and cost savings perspective. This 90 minute tutorial will introduce the terms, the motivations, the processes and the math behind Internet interconnection. Speakers Kevin Oberman, ESnet |
Full AbstractSecurity incidents are a daily event for Internet Service Providers. Attacks on an ISP's customers, attacks from an ISP's customer, worms, BOTNETs, and attacks on the ISP's infrastructure are now one of many "security" NOC events throughout the day. The continued increase in the volume and intensity of attacks has forced ISP's to expend constrained resources to mitigate the effects of these attacks on their operations and services. This investment has helped minimize the effects of the attacks, but it has not helped stop them at the source. Stopping attacks at their source requires rapid and effective inter-ISP cooperation. Hence, these ISP Security BOFs are also used as a face-to- face sync up meeting for the ISP Security Operations community. Speakers |
Full AbstractArbor Networks |
Full AbstractRen Provo, Comcast |
Full AbstractSpeakers |
RecordingsFull AbstractSpeakers |
Full AbstractThis talk surveys (very) recent events in the operation and deployment of IPv4 and IPv6, and what they mean for the "Internet Architecture." Speakers |
Full AbstractThis topic covers the basics of what BFD is and what problems it can solve now as it relates to rapid failure detection. It will also look at where is BFD in terms of actual deployment usage. Input from several operators will be included to give show if BFD is actually helpful or more of a headache when it comes to achieving rapid convergence. The final part of the presentation will highlight future improvements suggested for BFD that can fill in some gaps. Speakers |
RecordingsFull AbstractIn this talk, I will briefly review the sources of route instability, describe why modeling and forecasting route instability is difficult, and show how to measure, score, and rank ASNs Speakers |
Full AbstractSpeakers Panelist - Howard Kidorf, Pioneer Consulting Panelist - Philippe Perrier, Xtera Communications |
|
Full AbstractA review of the history and challenges associated with attempts to create an exchange point in Haiti. Since 1999 we started talks about setting up an Internet Exchange Point in Haiti to keep local traffic local. 10 years later we are unable to make it happen however all the stakeholders are convinced of the well being of an IXP. Speakers |
RecordingsFull AbstractDe-peering events are bad, but when the combatants involved are transit-free networks, they can be catastrophic to captive customers. Such events break the promise of One Internet by preventing single-homed prefixes in each of the de-peered parties' transit cones from exchanging traffic with each other. Speakers Clint Hepner, Renesys Corporation Alin Popescu, Renesys Corporation |
Tuesday, January 27, 2009
Topic/Presenter |
---|
Full AbstractIntro - Aaron Hughes, Cariden Speakers |
Full AbstractThis presentation is targeted at operators of networks of one to several routers, perhaps up to several POPs, and presents key operational concepts that have made a difference in the reliability and scalability of a small-medium network. Content has been updated and refined since the NANOG42 presentation. Speakers |
Full AbstractThis session is intended to provide an introduction to DHCPv6. DHCPv6 will be compared and contrast to DHCPv4 specific topics including redundancy will be discussed. Additional topics related to the evolution and future use of Speakers |
RecordingsFull AbstractTraceroute is the most widely used Internet diagnostic tool today. It is used to help identify routing failures, path inflation, and router misconfigurations. Researchers use it to map the Internet, predict performance, geolocate routers, and classify the performance of ISPs. However, traceroute has long had a fundamental limitation that affects all these applications: it does not provide the reverse path back from the destination to the source. Although various public traceroute servers across the Internet provide some visibility, no general method exists for determining a reverse path from an arbitrary destination, without control of that destination. Speakers |
Full AbstractIPv6 traffic levels have been the subject of discussions and reports at various networking conferences. Alas none of these previous talks have addressed real traffic levels within an operational global IPv6 backbone. This talk reviews IPv6 traffic levels within the Hurricane Electric backbone; shows where IPv6 peering works (and doesn’t work). The data is being collected throughout the backbone and will be presented in this talk. Speakers |
RecordingsFull AbstractThe BGP Monitoring Protocol, BMP, was recently proposed in the IETF GROW working group. BMP is intended to provide a more convenient interface for obtaining route views than the screen-scraping approach in common use today. The design goals are to keep BMP simple, useful, easily implemented, and minimally service-affecting. Speakers |
Full AbstractSpeakers |
RecordingsFull Abstract- Intro, what are 4-byte ASNs Speakers Chris Malayter, Switch and Data. |
Wednesday, January 28, 2009
Topic/Presenter |
---|
|
Full AbstractThe presentation show a brief history about LACNIC formation, which was a challenge. And some highlights about the current challenges we are seeing in the region and how we are helping to address them. Speakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractThis talk covers the planning and execution of our IPv6 rollout across a four-POP network. It's intended to offer a baseline for other operators looking to conduct a similar exercise, helping to provide a catalyst for the steps and sequence necessary. Speakers |
|
|
Full AbstractWe present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They differ in the anomaly situations which they attempt to alert or mitigate, and also in the type(s) of data they use. Some are based on registry data from Regional Internet Registries (RIRs) and Internet Routing Registries (IRRs), e.g., the Nemecis tool. Others such as the Prefix Hijack Alert System (PHAS) and the Pretty Good BGP (PGBGP) are driven by BGP trace data. The trace data is obtained from RIPE-RIS, Routeviews, or a BGP speaker where the algorithm operates. We propose a new algorithm that combines the use of both registry and trace data, and also makes some key improvements over existing algorithms. We have built an evaluation platform called TERRAIN (Testing and Evaluation of Routing Robustness in Assurable Inter-domain Networking) on which these algorithms can be tested and empirically compared based on real and/or synthetic anomalies in BGP messages. We will present a variety of results providing interesting insights into the comparative utility and performance of the various BGP robustness algorithms. Our objective is to share these early insights and invite feedback from the community to refine the TERRAIN evaluation framework and direct future analysis. Speakers |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractSpeakers |