Saturday, June 12, 2010
Topic/Presenter |
---|
Full AbstractService Providers using MPLS infrastructure want to offer Multicast Services to their customers using the same MPLS core network that are used to offer unicast services. One of the widely deployed solutions has been Multicast VPN or mVPN. However, deploying mVPN has always demanded re-engineering their core links to carry PIM traffic. Also, they could not leverage high service availability features of Fast-reroute for multicast traffic passing through MPLS core.
Speakers Utpal Mukhopadhyaya, Cisco Systems |
RecordingsFull AbstractThis session will go into details of which routing protocol should be chosen for a large and complex network. The two protocol OSPF & ISIS will be compared side by side based on its functionality, usage, scalability and convergence. These two protocols will be compared in the light of IPv6 deployment also. Speakers Faraz Shamim, Cisco Systems |
RecordingsFull AbstractA giant tutorial on how MPLS works, how ISPs can benefit from it, and techniques for using it. Speakers |
Sunday, June 13, 2010
Topic/Presenter |
---|
Full AbstractThe need for Label Multicast
- mLDP * Extensions to LDP ~ New Capabilities TLV ~ FEC Elements ~ Multicast FEC Element Encoding ~ p2mp mp2mp Operation -- Tree creation - p2mp-TE * Extensions to RSVP ~ SESSION_OBJECT ~ SENDER_TEMPLATE OAM Extensions for support for LSM
Speakers |
Full AbstractUnderstanding Optical Transport Network (OTN) is key for success in addressing the emerging needs of next generation transport networks now and in the future. As IP based services continue to grow, new OTN-based solutions provide efficient means of transporting those services globally. Take this opportunity to learn more about what OTN is and why it is important to next generation transport. Speakers |
RecordingsFull AbstractYou've been using tools like Puppet and cfengine to corral the complexity on your servers. You revel in the scalability, reliability, and ease of maintenance of doing it The Right Way. You don't fear the next change because you know the tools will just get it Right. But you still tremble at an 'enable' prompt, hoping you remembered all the bits that need to be twiddled, on all the networking devices everywhere. Is your DNS tied on straight - both ways? Is it all *really* being monitored by Nagios? As your network's complexity increases, so do the errors, inconsistencies, and omissions caused by manual configuration, and brokenness abounds. But wait - there's a way out of the swamp! Come hear Brent Chapman as he reveals methods and tools for automating the mind-numbing task of configuring network devices and services. Among other things, he'll talk about his cool new open source 'Netomata Config Generator', which addresses some of these problems. Speakers |
RecordingsFull AbstractAgenda: Speakers |
Full AbstractSilent Partner, Dyn |
RecordingsFull AbstractThe Internet is changing and so is ARIN. ARIN will provide an update on the current state of affairs. Additionally, ARIN is going to be Speakers |
|
RecordingsFull AbstractThe purpose of this panel is to encourage wide spread awareness of the Speakers Panelist - Allen Huotari, Cisco Panelist - Salah Nassar, Netgear. |
Monday, June 14, 2010
Topic/Presenter |
---|
Full AbstractTraffic matrices can greatly benefit key Service Provider activities like capacity planning, traffic engineering, better understand their traffic patterns and take meaningful peering decisions. Despite their importance, traffic matrices keep relatively behind the scenes and unspoken topic. Speakers |
Full Abstract4:30 - 4:45 Speakers |
RecordingsFull AbstractThe NANOG transition team along with Merit would like to have the opportunity to present the attendees: Speakers |
Full AbstractLiving Documents and Knowledge with Nowhere to Live! Speakers |
Full AbstractAlcatel-Lucent |
Full AbstractAll first-time NANOG attendees are invited to attend a special breakfast where committee members, Merit staff and long-time NANOGers will talk about the organization, the meeting, and how to make best use of both. Please attend to learn more about NANOG and to maximize your first meeting--we promise to make it both lively and informative! The breakfast will be moderated by Ren Provo of Comcast.Guavus |
Full AbstractWelcome to NANOG49 in San Francisco! Monday's program will begin with opening remarks from the NANOG Program Committee, Merit and our host, Netflix:
Speakers |
RecordingsFull AbstractWe discuss the data driven architecture for constructing very large Speakers |
RecordingsFull AbstractIn this talk we present some initial results from our analysis of data collected from the recently allocated 1/8 network block. There has been some concern regarding the usability of this block due to the presence of background traffic. We collected a 1 week long dataset consisting of all packets received at this block in the absence of any actual hosts. We then analyze this data in order to determine the origins of this data, the volume, how similar or different it might be from other newly allocated network blocks and finally whether there are some simple mechanisms that can help alleviate the problem. Speakers |
RecordingsFull AbstractGoogle is one of the few content providers that is embracing IPv6. This presentation will describe the reasons why, what Google has achieved in terms of IPv6 adoption, and what challenges had to be overcome along the way. It will briefly describe barriers to adoption and how Google is working to help the Internet community overcome them. It will show how networks can access virtually all Google services over IPv6 at production quality, how a number of substantial networks are already doing this today, and provide brief statistics of IPv6 deployment among Google users. Speakers |
RecordingsFull AbstractWe present a detailed comparison of the IPv4 and IPv6 routing tables: the autonomous systems that participate in each, the prefixes they advertise and transit, and the economic relationships that are encoded in the ASPaths. Many of the relationships evident in the growing IPv6 table are replications of existing relationships between IPv4 peers, but a surprisingly large percentage are novel. We attempt to read the tea leaves and figure out what the emerging structure of the IPv6 routing table implies for the near-term adoption curve, as IPv4 space becomes increasingly precious. Speakers |
RecordingsFull AbstractThis presentation will provide an introduction to the ongoing work on BGP prefix origin validation. As has been discussed in NANOG before and witnessed by several incidents in the past, prefix hijacking in BGP is a real issue. In conjunction with the SIDR working group at IETF, a framework has been designed and implemented to validate the origination AS of BGP routes. The slides will touch upon the implementation details and deployment models. Speakers |
|
RecordingsFull Abstract802.1aq Shortest Path Bridging is being standardized by the IEEE as an evolution of the various spanning tree protocols. 802.1aq allows for true shortest path routing, multiple equal cost paths, much larger layer 2 topologies, faster convergence, vastly improved use of the mesh topology, single point provisioning for logical connectivity membership (E-LINE/E-LAN/E-TREE etc), abstraction of attached device MAC addresses from the transit devices, head end and/or transit multicast replication all while supporting the full suit of 802.1 OA&M. This tutorial will give an overview of 802.1aq, how it works, some discussion of where it applies and then will conclude with a peek at a 30+ node network consisting of several real switches and an emulator. Using some generic graphical tools and a CLI we will explore the behavior visually and also textually in a bit of detail. Speakers |
Tuesday, June 15, 2010
Topic/Presenter |
---|
RecordingsFull AbstractThe speaker will discuss some of the challenges of designing and operating an enterprise grade QoS at one of the largest enterprise network with multivendor equipment peering with different MPLS providers with different contractual agreements. Speakers |
Full AbstractSpeakers |
Full AbstractYou are invited to visit the Vendor Collaboration Room during its open hours to learn about the support of IPv6 capabilities in a variety of networking equipment.A10 Networks |
RecordingsFull AbstractThe Research Form will include:
Speakers Amogh Dhamdhere, CAIDA Constantine Dovrolis, Georgia Tech. Bin Liu, Tsinghua Unversity Lixia Zhang |
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractThe talk will focus on roles of ASICs in the design of modern high performance routers. The benefits of ASICs will be discussed and contrasted with other technologies. The talk will highlight the various tradeoffs in ASIC system design including silicon technology, chip partitioning, and memory technology. The important steps in ASIC design and verification, from concepts to production, will also be presented. Speakers |
RecordingsFull AbstractAfter the earthquake that has destroyed Haiti on January 12, 2010, a lot of questions arise on how to get Internet infrastructure more resilient and reliable to survive and allow communications in emergency times. Right after the earthquake the newly settled IXP has survived and has allowed connectivity with the international Internet. That has permit people to use Facebook, twitter, Skype to communicate with their family locally or abroad. People under rubble have used mobile devices to send SOS messages.
Speakers Panelist - Max Larson Henry, OLPC-Haiti Project |
Full AbstractCORESITE, Hurricane Electric |
Full AbstractX.509 Certificates and Public Key authentication are a well known and wide spread technology for authentication. Speakers |
RecordingsFull AbstractA decade of research has been devoted to addressing vulnerabilities in BGP. The result is a plethora of BGP security proposals, each providing different types of security guarantees. To inform decisions about which of these protocols should be deployed in the Internet, we *quantify* and *compare* the ability of these protocols to blunt BGP "traffic attraction" attacks, namely, when an attacker manipulates BGP messages to blackhole traffic (e.g. prefix hijacks a la AS7007, Pakistan Telecom/YouTube), or intercept traffic (e.g. BGP man-in-the-middle attacks a la Pilosov & Kapela). We run simulations of traffic flow on maps of the Internet’s AS-level topology to determine and compare the impact of attacks on different BGP security protocols. The key implication of our work is that route filtering can be as effective as cryptographic routing protocols like Secure BGP (S-BGP) and secure origin BGP (soBGP). Speakers |
RecordingsFull AbstractPrefix hijacking, in which an unauthorized network announces IP prefixes of other networks, is a major threat to the Internet routing security. Existing detection systems either generate many false positives, requiring frequent human intervention, or are designed to protect a small number of specific prefixes. Therefore they are not suitable to protect data traffic at networks other than the prefix owner during on-going hijacks. Speakers |
Wednesday, June 16, 2010
Topic/Presenter |
---|
Full AbstractAlcatel-Lucent |
Full AbstractThis presentation will address planning and deployment for a 50Km link between the City of San Francisco's fiber network and the Farallon Islands off the coast of San Francisco in support of the scientist on the islands and the California Academy of Sciences project to provide a high quality live streaming camera on site. The presentation will cover the requirements for a very limited budget and power consumption, issues of remote deployments, long distance microwave links over the ocean, sensitivity to the largest breeding colony the contiguous United States. Speakers Tim Pozar, Independent |
Full AbstractJDSU has found that nearly 75% of all network issues have been a simple physical layer problem such as dirty connectors. Speakers |
Full AbstractGoGrid |
RecordingsFull AbstractSpeakers |
|
Full AbstractNetalyzr (netalyzr.icsi.berkeley.edu) is an edge network debugging and measurement tool. It combines a Java applet and associated Javascript run within the user's browser to perform active measurements to custom servers we operate at ICSI and Amazon EC2. Tests include basic outbound port filtering, NAT detection, native IPv6 capability, hidden HTTP proxies and caches, DNS behavior, fragmentation, latency, bandwidth, and in-network buffering. Speakers |
RecordingsFull AbstractSpeakers |