^ Top

NANOG 19 Agenda

Presentation File Key:


Windows Media video, requires Windows Media Player to view. 


Real Video, requires Real Player to view. 


PDF Document, requires Adobe Acrobat Reader to view/print. 

Sunday, June 11 2000
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
1:30pm - 5:00pmEnchantment A & B

Tutorial: BGP Configuration From the IRR

This tutorial introduces the Internet Routing Registry (IRR), the Routing Policy Specification Language, (RPSL) and the RtConfig router configuration tool. We explain how to register and query routing policy objects in the IRR. After a brief introduction to routing policies, we discuss RPSL, the language for specifying Internet routing policies in the IRR. We explain several policy examples currently practiced in the Internet and specify them using RPSL. These include as-path prepending, setting preferences and other metrics based on the community attribute, and access lists based on prefix and as-path expressions. <BR><BR> RtConfig is the focus of this tutorial. RtConfig can configure Cisco, Juniper, Nortel, Gated and RSd routers with BGP policies. The amount of configuration it performs is controllable; hence, the amount of information that needs to be published in the IRR is controllable as well. RtConfig can be used to only generate prefix access lists from the IRR, or to generate full-blown router configurations.

View full abstract page.

  • Cengiz Alaettinoglu, ISI
  • Cengiz Alaettinoglu works on the Routing Arbiter project at the USC Information Sciences Institute. He co-chairs the IETF Routing Policy System WG, which defined the Routing Policy Specification Language along with the protocols to enable a distributed, secure routing policy system.
1:30pm - 5:00pmPavilion I-III

Tutorial: Introduction to MPLS

A half-day, interactive tutorial that discusses and demonstrates the interaction between MPLS and the traditional IP routing protocols. The tutorial begins by examining the general requirements for traffic engineering and then presents how specific features of MPLS address these requirements. The tutorial then proceeds to address how advanced features of MPLS work in conjunction with BGP and the IGP (IS-IS or OSPF) to control network traffic. <BR><BR> During the tutorial, the presenters will augment the lecture material by demonstrating various MPLS features including the signaling of LSPs with RSVP, mapping routes to LSPs, configuring LSPs for transit and local traffic, and enabling advanced traffic protection features. <BR><BR> Topics to be covered include: <UL> <LI> Signaling LSPs with RSVP</LI> <LI> Constraint-based traffic engineering</LI> <LI> Extensions to IS-IS and OSPF</LI> <LI> Traffic Engineering Database</LI> <LI> Strict and loose routing</LI> <LI> Administrative groups (a.k.a. Colors)</LI> <LI> Hot-standby and Fast Reroute LSPs</LI> <LI> Applications and advanced features</LI> </UL>

View full abstract page.
  • Jeff Doyle, Juniper.
  • Chris Summers, Juniper Networks.
youtubeIntroduction to MPLS
pptTraffic Engineering With MPLS(PPT)
1:30pm - 5:00pmPavilion IV -VITutorial: IPv6: Why, What, When, Where?Speakers:

  • Steve Deering, Cisco Systems
  • Steve Deering is a Technical Leader at Cisco Systems , where he is working on the development and standardization of architectural enhancements to the Internet Protocol. Prior to joining Cisco in 1996, he spent six years at Xerox\'s Palo Alto Research Center, engaged in research on advanced internet technologies, including multicast routing, mobile internetworking, scalable addressing, and support for multimedia applications over the Internet. He is a member of the Internet Architecture Board, a present or past chair of numerous Working Groups of the Internet Engineering Task Force (IETF), the inventor of IP Multicast, and the lead designer of the new version of the Internet Protocol, IPv6. He received his Ph.D. from Stanford University.
pdfSteve Deering Presentation(PDF)
pptSteve Deering Presentation(PPT)
7:30pm - 9:00pmPavilion I-III

Tutorial: Crafting Confederations

The purpose of this tutorial is to present a framework for the construction of a BGP architecture for mid- to large-sized ISPs utilizing BGP confederations. The primary building block for this approach is the concept of the \"POP as Confederation\". While concentrating on theory, this session will also highlight the real world implementation of this approach on Cisco routers at Mindsping, and on Juniper routers at NetRail. Elements include: <UL> <LI> Meaningful MEDs for customers, as well as basic, non-MPLS traffic engineering. <BR><BR></LI> <LI> A well thought-out community structure to optimize route filtering and propagation. <BR><BR></LI> <LI> Special areas of interest include supporting wholesale dialup and broadband providers (OPN) and allowing customers the maximum possible control of their routing. <BR><BR></LI> </UL> With the rise of a new generation of service providers, many of which are based on broadband technologies, there is an opportunity to take a new look at service provider design. This session is designed to address the concerns of such emerging providers as they outgrow their current architectures and look for new approaches.

View full abstract page.
  • Miguel Dimayuga, Earthlink.
  • Dan Golding, NetRail.
youtubeCrafting Confederations
pptDan Golding Presentation(PPT)
Monday, June 12 2000
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
9:00am - 9:15amPavilion IV-VIWelcome, IntroductionsSpeakers:
  • John Brown, iHighway.
  • Susan R. Harris, Merit Network.
pptMeeting Introductions(PPT)
youtubeWelcome, Introductions
9:15am - 10:15amPavilion IV-VI

OSPF and IS-IS: A Comparative Anatomy

The presenter provides an overview of the technical similarities and differences between the two protocols, and describes the cases where one might be preferable over the other.

View full abstract page.
  • Dave Katz, Juniper.
pptDave Katz Presentation(PPT)
youtubeOSPF and IS-IS: A Comparative Anatomy
10:15am - 10:45amPavilion IV-VI

Bellwether: Surrogate Services for Popular Content

The presenters will describe the architecture and performance characteristics of an open source surrogate system called \"bellwether,\" based on squid and zebra. This system implements an outward facing proxy (surrogate) that acts on behalf of a content source to handle requests for content that is experiencing a sudden spike in popularity due to a flash crowd or \"CNN event.\"<BR> As a brief overview, subscribed content sources activate a surrogate placed near a network border using a protocol based on NECP (Network Element Control Protocol). The surrogate then activates an overlay network, which uses standard IBGP and GRE tunnels to ensure that it is part of the data path for new requests for content.<BR> <BR> This system is designed to reduce both load on content servers and on the networks hosting those servers. The presenters will discuss both how an outward-facing proxy\'s focus on data already known to be popular can improve cache performance and present data for the specific cache replacement policies which have been tested.

View full abstract page.
  • Ted Hardie, Equinix.
  • Duane Wessels, Equinix.
youtubeBellwether: Surrogate Services for Popular Content
pptTed Hardie Presentation(PPT)
10:45am - 11:00am Break
11:00am - 12:00pmPavilion IV-VITraffic Engineering PanelModerators:
  • Ed Kern, Digex.
  • Danielle Awduche, UUNET.
  • Jim Boyle, Level 3.
  • Brenda Friborg, Intermedia.
youtubeTraffic Engineering Panel
12:00pm - 1:30pm Lunch
1:30pm - 2:00pmPavilion IV-VI

IPv6 Update

Penetration Rate of Private Address Space<BR> <BR> Current Use of IPv6 Address Space<BR> <BR> ARIN IPv6 Delegation Status

View full abstract page.
  • Bill Manning, ISI.
  • Michael O\'Neill, ARIN.
pptARIN IPv6 Delegation Status(PPT)
youtubeIPv6 Update
2:00pm - 3:30pmPavilion IV-VIPanel: Operational Experience with IPv6Moderators:

  • Bob Fink, Lawrence Berkeley National Lab
  • Bob Fink is the Associate Department Head for Research for the Energy Sciences Network (ESnet) at Lawrence Berkeley National Laboratory. ESnet provides Internet services and advanced technologies to the US Dept. of Energy (DoE)-funded national research laboratories. Bob is a co-chair of the ngtrans IPv6 Transition working group of the IETF, and has led the 6bone IPv6 Testbed project since its inception. He also formed the international 6REN initiative to create worldwide IPv6 production network services by organizing Research & Education Networks worldwide, and led the project to create the first USA located-IPv6 peering point for production IPv6 networks (the 6TAP).
  • Bill Maton, Communications Research Centre.
  • Sean Mentzer, Qwest.
  • Greg Miller, MCI WorldCom
  • Greg Miller is the Director of Advanced Internet Technology at WorldCom. Greg\'s group is responsible for engineering and operating the vBNS network and for developing advanced IP services. In 1998, Greg designed and implemented a nationwide native IPv6 service on the vBNS backbone.

  • Rob Rockell, Sprint
  • As a backbone engineer with Sprintlink, Rob Rockell deployed IPv6 first as a toy, and second as a means to provide more valued service to the research-focused segment of the Sprint customer base. Testing has been done with Cisco, Bay, Solaris, Linux, and Microsoft platforms.
pptBob Fink Presentation(PPT)
pptGreg Miller Presentation(PPT)
pptRob Rockell Presentation(PPT)
pptSean Mentzer Presentation(PPT)
pptWilliam F. Maton Presentation(PPT)
3:30pm - 3:45pm Break
3:45pm - 4:15pmPavilion IV-VI

Large Scale Packet Optimized Rings - Part II

Furthering our presentation at NANOG 16, this talk will focus on the development and deployment issues of a 32-node international DPT/SRP backbone. We will examine SDH/DPT tradeoff issues, routing architectures for multi-access media backbones, and IGP and EGP constraints. A brief look at IP service integration technologies such as MPLS and optical switching will also be included.

View full abstract page.
  • Marc Teichtahl, VersaTel Telecom.
mp4Large Scale Packet Optimized Rings(MP4)
youtubeLarge Scale Packet Optimized Rings - Part II
pptMarc Teichtahl Presentation(PPT)
5:30pm - 7:30pmPavilion I-IIIBeer n Gear
  • Sponsors Akamai Technologies, Inc.; Cidera; Cisco Systems; Extreme Networks, Inc.; Nortel Networks; ISPSoft, Inc.; Tiara Networks.
  • Sponsors
  • 7:30pm - 9:00pmPavilion IV-VI

    Peering BOF III

    Internet Service Providers interconnect in peering and transit relationships in order to provide their customers with access to the global Internet. This presentation and the resulting discussion is based upon operations research surrounding the current practices documented in the white paper Peering in the US, based upon the three phases of Internet peering: <UL> <LI> Identification of potential peer,</LI> <LI> Initial discussions, and</LI> <LI> Implementation <BR><BR></LI> </UL> The report is based upon interviews with about 50 ISP Peering Coordinators, and has been presented at US and non-US forums as well (initially presented at NANOG Peering BOF in Montreal, IEPG in Oslo, APRICOT in Seoul, Interconnect Accounting and Billing in London, and the ITU meeting in Rio de Janeiro) and has been updated to incorporate feedback from the European and Asia Pacific arenas.

    View full abstract page.
    • Bill Norton, Equinix.
    docPeering Decision Tree (Full paper in MS Word, updated 7/21/00)(DOC)
    9:00pm - 10:30pmEnchantment A & B

    Tier 2 - 5 Peering BOF

    This BOF provides a forum for the discussion of: <UL> <LI> Methods of small peer interconnections</LI> <LI> Demand for Tier 2-5 peering</LI> <LI> Costing models</LI> <LI> Interaction of larger NSPs with smaller peers, including settlement based peering, and providing regional routes. <BR><BR></LI> </UL>

    View full abstract page.
    • Nathan Estes, NetRail.
    • Daniel Golding, NetRail.
    Tuesday, June 13 2000
    Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
    9:00am - 10:00amPavilion IV-VI

    DNS Security Extensions

    An overview of recent IETF work to add security to the Domain Name System. Topics covered include DNSSEC (RFC 2535), Query/Response security, using DNS as a server of security data, and securing dynamic update. In addition, material on how DNS security will impact operation is included.

    View full abstract page.
    • Edward Lewis, TISlabs.
    youtubeDNS Security Extensions
    pptEdward Lewis Presentation(PPT)
    10:00am - 10:30amPavilion IV-VIIP Traceback TechniquesSpeakers:
    • Stefan Savage, University of Washington.
    youtubeIP Traceback Techniques
    10:45am - 11:05amPavilion IV-VI

    Is Your Network Available? (Or, Common Network Metrics)

    The CAIDA Metrics Working Group has produced a draft document, \'Network Measurement FAQ,\' intended for people who buy Internet service and make it available to others, e.g. corporate users and smaller ISPs. This presentation will introduce the FAQ, highlighting its section on \'the Most Common Metrics.\'<BR> <BR> Common Metrics such as latency, packet loss and availability often appear in service desccriptions published on the Web, but they are seldom clearly stated. The Working Group\'s definition of availability, and methods of measuring it, will be explained.

    View full abstract page.
    • Nevil Brownlee, CAIDA.
    youtubeIs Your Network Available? (Or, Common Network Metrics)
    pptNevil Brownlee Presentation(PPT)
    11:05am - 12:00amPavilion IV-VI

    Impact of CALEA on Network Operators

    This talk discusses the impact of the CALEA law on network operators. It covers such topics as: <UL> <LI> What is CALEA?</LI> <LI> The difference between CALEA and wiretapping.</LI> <LI> Definition of terminology used in CALEA</LI> <LI> What is a safe harbor standard?</LI> <LI> Compliance requirements on Service Providers and equipment vendors.</LI> <LI> Timeframes for compliance.</LI> <LI> Industry efforts</LI> </UL>

    View full abstract page.
    • Chip Sharp, Cisco Systems.
    pptChip Sharp Presentation(PPT)
    youtubeImpact of CALEA on Network Operators
    12:00pm - 1:30pm Lunch
    1:30pm - 1:45pmPavilion IV-VIARIN UpdateSpeakers:
    • Richard Jimmerson, ARIN.
    youtubeARIN Update
    pptRichard Jimmerson Presentation(PPT)
    1:45pm - 2:15pmPavilion IV-VIMulticast Deployment StrategiesSpeakers:
    • Dave Meyer, Cisco Systems.
    youtubeMulticast Deployment Strategies
    2:15pm - 2:45pmPavilion IV-VI

    Real-Time Visualization of IP over Connection-Oriented WANs

    We have developed a tool that creates a real-time, fine-grained, global visualization of a wide-area, connection-oriented, IP networks. While the tool is currently tailored to IP over ATM networks, the techniques are applicable to any network that has some sort of connections under IP (such as all-optical networks, MPLS, mobile IP and others). See <A HREF=\"http://www.msci.magic.net/visualization/\">http://www.msci.magic.net/visualization/</A> for more information. Our software is largely complete and we are now looking for production networks on which to run this tool.

    View full abstract page.
    • Tim Salo, NetworkCS.
    mp4Real-Time Visualization of IP(MP4)
    youtubeReal-Time Visualization of IP over Connection-Oriented WANs
    pptTim Salo Presentation(PPT)
    2:45pm - 3:00pm Break
    3:00pm - 3:30pmPavilion IV-VINSI Registry Engineering & Operations UpdateSpeakers:
    • Aristotle Balogh, Network Solutions.
    pptArisotle Balogh Presentation(PPT)
    youtubeNSI Registry Engineering & Operations Update
    mp4NSI Registry Root/gTLD Update(MP4)
    3:30pm - 4:00pmPavilion IV-VI

    Mail Metering, or How to Block Outbound Spam

    ZipLink is currently working on a technical solution to the problem of outbound spam. We are a wholesale dialup ISP, and as such, can be a source of spam. Our idea is to track, utilizing RADIUS accounting records fed into an Oracle database, the IP addresses and usernames of all customers logging into our dial up ports. Then, when a customer attempts to send email, their outbound mail connection is redirected to a mail relay which checks their current number of outbound messages against preset limits in the database. If they exceed any of the limits, the message is bounced/dropped. If they do not exceed the limit, the message is allowed to go through and their email counts in the database are updated to reflect their most recent activity.<BR> We have successfully prototyped this functionality in a lab environment, and are just now beginning limited POP testing before a full scale rollout to follow later this year.

    View full abstract page.
    • Robert Haskins, ZipLink.
    youtubeMail Metering, or How to Block Outbound Spam
    mp4Mail Metering, or How to Block Outbound Spam(MP4)
    pptRobert Haskins Presentation(PPT)
    4:00pm - 4:15pmPavilion IV-VIClosing RemarksSpeakers:
    • Susan R. Harris, Merit Network.
    youtubeClosing Remarks
    pptClosing Remarks(PPT)


    ^ Back to Top