Saturday, February 4, 2012
Topic/Presenter |
---|
Full AbstractBeing able to develop or customize tools using shell or Perl scripts is a skill all network operators should possess. This tutorial will provide a survey of scripting constructs from basic to advanced using real world examples throughout. While this tutorial is too short to comprehensively cover programming and the nuances of the tools available, newcomers can expect to come away with enough knowledge to start hacking their own useful tools, or to make use of the example scripts provided as a foundation towards something even more useful in their own real networks. Speakers |
Full AbstractYou know you're going to have to implement IPv6 at some point. But you don't have all the operational experience with it you have with IPv4. What's the same? What's different? What are you going to have to change in how you build and run your network? This session will break down what operational and protocol issues are going to affect you and tell you how to make a better, more robust network. Speakers |
Sunday, February 5, 2012
Topic/Presenter |
---|
RecordingsFull AbstractThis session is a brief introduction to DNSSEC and how it works. We'll discuss the motivations for its creation, what it does (and doesn't do), and how it works. We'll describe the new DNS resource records used by DNSSEC and how a DNSSEC validator uses them to verify the authenticity and integrity of DNS data. Basic knowledge of how DNS itself works is helpful but not strictly required. Speakers |
Full AbstractTop techniques, tools, and approaches that needs to be deployed before the crisis. Don’t wait for a security crisis before deploying the tools you need to protect your backbone, cloud, data center, mobile, or broadband infrastructure. There are proven tools, techniques, and approaches to security that is tuned for “Big Networks.†These tools in a “SP Security Toolkit†have proven to work in some of the biggest networks on the planet. This tutorial will review all these techniques – focusing on the how and why they need to be deployed along with usage examples. The hope is for operators attending the session to consider convincing their management that many of the tools in the toolkit need to be deployed before a crisis – to prepare the network to mitigate risk in the middle of a crisis. This session is an updated session from past SP Security and NSP-SEC Top Ten tutorials. It will be tuned to be a productive review for operators who deploy many of these techniques today while empowering new operators with the knowledge to return and make changes to their network. Speakers |
Full AbstractThis tutorial, the second in a series, builds on the introduction scripting tutorial by covering more advanced topics and real world coding solutions including database access, network programming, module development and references. While our time is too limited , we will learn about and implement these constructs by example. We will step through the process of creating our own network-based service application that implements modules, communicates with a database, handles command line arguments, writes logs to a syslog server and more. Participants can expect to come away with enough knowledge to start hacking their own advanced applications or make use of the example code provided as a foundation towards something even more useful in their own real networks. Speakers |
Full AbstractSoftLayer |
|
Full AbstractMore than 40% of the global routing table is polluted by more specific prefixes, according to the CIDR report. These more specifics affect ratio between transit and peering significantly in favor of the more expensive transit, which is real money for outbound-heavy networks. To avoid these unnecessary spendings is worth a thought. Speakers |
RecordingsFull AbstractKnowing what paths packets are taking within a network is crucial for several network management tasks. When the network is running OSPF, determining paths is supposedly straight-forward, since OSPF is basically a link-state protocol, and with link-state protocols, a packet follows the shortest path in terms of link weights from its source to the destination. However, OSPF allows a network to be divided into areas for scalability, and this makes it more than a link-state protocol. As a result, though packets still follow shortest paths within an area, this is not guaranteed to be the case across areas. In fact, paths followed by packets with areas can often be unexpected and non-intuitive. Some recent extensions to OSPF, namely multi-area adjacencies (RFC 5185) and alternative implementation of border routers (RFC 3509), have further exacerbated the situation. This presentation illustrates such cases with examples, while providing insights into why OSPF paths can look so strange with areas. Speakers |
Monday, February 6, 2012
Topic/Presenter |
---|
Full AbstractService provider security track which will focus on current issues in protecting the availability, integrity and resiliency of network infrastructures. Speakers |
RecordingsFull AbstractBCOP Track Speakers |
RecordingsFull AbstractIPV4 runout means new entrants will from the outset deploy techniques the present operators consider undesirable. On the vendor side CGN hardware is becoming a mature product space. Datacenter operators confront a similar set of problems both supporting outgoing and incoming connections. IPV6 should be appearing in new greenfield projects I would think. I have an internet content providers point of view, I am hopeful that some other participants with different vantage points will also be willing to talk. Speakers Charles Lee, Addrex |
Full AbstractNTT America |
Full AbstractMeet and greet the NANOG community and start socializing Speakers |
RecordingsFull AbstractPanel with a RIR with runout, a RIR facing runout, a "broker" who operates in the grey market, and someone who's helping others figure out ways to do more with less. Speakers Geoff Huston, APNIC Joel Jaeggli, Zynga Charles Lee, Addrex |
Full AbstractNTT America/Coresite |
RecordingsFull AbstractMost of what we hear about OpenFlow or Software Defined Networking is very optimistic and abstract, with a "this will change the world" tone. But the market is still nascent, and there are few deployments in production today. How do we make sense of this dichotomy? The panelists will talk about OpenFlow from a hardware vendor, software vendor and network operator perspective followed by Q&A discussion. Speakers Curt Beckmann, Brocade Ed Crabbe, Google. |
RecordingsFull AbstractThrough Arbor's ATLAS initiative, we have views into widescale botnet activities, measuring traffic and botnet commands. We also have an annual survey we perform with ISPs around the world to look at attack trends and concerns. This talk will look at the growth in attacks, the tools and botnets in use, and how ISPs are responding. Speakers |
|
RecordingsFull AbstractSpeakers |
RecordingsFull AbstractOn 7 November 2011 at 14:13 UTC, large parts of the global Internet became unstable or unreachable for nearly half an hour, an event ultimately traced to a routing software vulnerability. We describe the hunt for the origin of this event in both BGP and traceroute-based active measurement data, describe the "BGP epidemiology" of similar events in recent years, and provide some hypotheses as to the origin of the BGP "trigger messages" that caused the November meltdown. Speakers |
Full AbstractOperators of high-profile DNS zones utilize multiple authoritative name servers for performance and robustness. We conducted a series trace-driven measurements to understand how current caching resolver implementations select and distribute queries among a set of authoritative name servers. Our results reveal areas for improvement in the “apparently sound†server selection schemes used by some popular implementations. In some cases, the selection schemes lead to sub-optimal behavior of caching resolvers, e.g. sending a significant amount of queries to unresponsive servers. We believe that most of these issues are caused by careless implementations, such as treating unresponsive servers as reachable, and using constant SRTT decaying factor which couples the decaying speed with the iterative query rate. For the problems identified in this work, we recommended corresponding solutions. Speakers |
Tuesday, February 7, 2012
Topic/Presenter |
---|
|
Full AbstractSpeakers |
|
RecordingsFull AbstractThe DNS Track is an opportunity for NANOG attendees with an interest in DNS to meet and share operational experiences and recent research activities. Attendees are welcome to contact the track moderator with presentations or ideas for discussion topics. Speakers |
Full AbstractMRV |
RecordingsFull AbstractSpeakers |
Full AbstractWith TCO reduction being a goal, managment of the network is more important today than ever before. This is because with convergence, comes less equipment on the one hand, but more functionality per device/system on the other – as a result, management of such systems and networks assumes greater importance, a single malfunction can impact multiple layers of operation (since packet, Ethernet and transport may all be resident in the same device now), wreaking havoc on an operator's network and services. Indeed, today’s large, dynamic, and complex IP networks must be reliable & secure, provide QoS for diverse applications, and need to comply with regulations (such as FISMA, HIPPA, and PCI DSS ). Thus, the cost to an operator (large or small) of not having a proper management framework in place can be substantial. Configuration and security loopholes and lack of a consolidated view of the network infrastructure can be very expensive! (Unnecessarily high opex, poor network and application/service performance, customer dissatisfaction and churn, and potential loss of revenue, are just a few of these expenses.) With the average cable, wireless, or global telco having between 2000-9000 lines of configuration code per device, and with over 4-5 critical errors per IP network device, the cost per network downtime incident can be as high as three-quarters of a million dollars! With a proper network management framework in place, the labor-cost (opex) saving and risk reduction becomes significant, even for operators with as few as 100 devices in the network, and could be in the millions of dollars for operators with 1000+ IP network devices. Thus, the purpose of this Panel is to explore, discuss, and debate a set of issues that focus on better management of the network to both operate a healthy network and reduce the operator’s cost of ownership. In particular, of the 3 key areas of network management -- network configuration/audit, network monitoring/measurement, and network tuning, we will focus, in this panel, on network configuration/audit and it's critical role in lowering operators' TCO. Speakers Colby Barth, Juniper Networks Robert Bender, CTS Telecom Bruce Katzel, Amartus Jay Moran, AOL Technology Operations Shawn Morris, NTT America |
Full AbstractVerisign |
RecordingsFull AbstractIn previous talks, we looked at the rapidly evolving "Hyper-Giants", or the 150 large content and hosting networks (e.g. Facebook, Google, etc.) that now contribute an amazing 50% of all Internet traffic globally. This talk looks at the other 50% of traffic. Specifically, FileSharing, P2P and adult traffic represent a massive and growing portion of Internet traffic globally (as well as a sizable economic activity). From first appearances, the universe of adult domain names, number of seed boxes / trackers and file sharing sites appears limitless and endlessly varied. But in this talk, we take a deeper look at the Internet infrastructure supporting these Internet industries. We show that a small number of companies manage these thousands of domain names and an even smaller number of specialized hosting, CDN, analytics and advertisement companies provide the infrastructure. In the case of file sharing, we show that four hosting companies provide the infrastructure for more than 80% of all file sharing traffic globally. Speakers |
Full AbstractTelex is a new approach to resisting state-level Internet censorship. Rather than attempting to win the cat-and-mouse game of finding open proxies, we leverage censors’ unwillingness to completely block day-to-day Internet access. In effect, Telex converts innocuous, unblocked websites into proxies, without their explicit collaboration. We envision that friendly ISPs would deploy Telex stations on paths between censors’ networks and popular, uncensored Internet destinations. Telex stations would monitor seemingly innocuous flows for a special “tag†and transparently divert them to a forbidden website or service instead. We propose a new cryptographic scheme based on elliptic curves for tagging TLS handshakes such that the tag is visible to a Telex station but not to a censor. In addition, we use our tagging scheme to build a protocol that allows clients to connect to Telex stations while resisting both passive and active attacks. We also present a proof-of-concept implementation that demonstrates the feasibility of our system, and encourage ISPs and interested researchers to talk to us about future collaboration. Speakers Eric Wustrow, University of Waterloo |
Wednesday, February 8, 2012
Topic/Presenter |
---|
Full AbstractStart your day with a vast selection of hot/cold food for all tastes! |
Full AbstractSpeakers |
RecordingsFull AbstractMark Kosters, Chief Technology Officer, will give the latest technical news about ARIN. He will update you on ARIN Online, including an overview of the new programming API's, billing/payment integration and upcoming releases. Speakers |
RecordingsFull AbstractWorld IPv6 Launch - This time it's for real. Major Internet service providers (ISPs), home networking equipment manufacturers, and web companies around the world are coming together to permanently enable IPv6 for their products and services by 6 June 2012. Organized by the Internet Society, and building on the successful one-day World IPv6 Day event held on 8 June 2011, World IPv6 Launch represents a major commitment to the global deployment of IPv6. As the successor to the current Internet Protocol, IPv4, IPv6 is critical to the Internet's continued growth as a platform for innovation and economic development. This panel will be a discussion of World IPv6 Launch and will include perspectives from the Internet Society as well as two of the residential access providers who are enabling IPv6 to paricipate in this event. Speakers Brooks Fitzsimmons, AT&T John Sweeting, Time Warner Cable |
Full AbstractNTT America |
Full AbstractIntroduce LINX and quick history / summary on the switch vendors historically in the IX marketplace Explain why we needed to upgrade the network and the reasons behind changing vendors Run through of what the migration programme looked like finishing with several war stories about the experience Speakers |
Full AbstractThe interim meeting will focus on two recent SIDR topics: replay/freshness protection and route leaks. The venue was chosen because many of the WG comments on both topics have concerned the operational impact. The hope is to get operator input into the discussion of both topics. The details of the meeting can be seen at http://trac.tools.ietf.org/wg/sidr/trac/wiki/InterimMeeting20120209 |
RecordingsFull AbstractPower consumption and efficiency continues to be a major challenge in the networking industry. Current-generation products are increasingly constrained by the availability of power in both the developed and developing markets. While the unit power consumption (i.e. functionality per watt) continues to decrease, the rate of decrease is much lower than the explosion of bandwidth. This presentation discusses a number of topics related to power consumption in high-end routing/switching systems, with the primary goals being: --educate network operators in the “physics†of system power consumption --identify which performance metrics and requirements do and do not drive increased power consumption --identify the mechanical/cooling impacts of system design --discuss system hardware design challenges around power and cooling --discuss the impact/costs of mechanical standards compliance (i.e. NEBS) Speakers |