^ Top

NANOG 21 Agenda

Presentation File Key:

 

Windows Media video, requires Windows Media Player to view. 

 

Real Video, requires Real Player to view. 

 

PDF Document, requires Adobe Acrobat Reader to view/print. 

Sunday, February 18 2001
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
1:30pm - 3:00pmGeorgia Hall 1-2

Tutorial: Exterior Routing 201: The Full Picture

BGP is an essential part of ISP routing, but successful ISP routing includes far more than the protocol itself. Obtaining and managing address space, obtaining an AS number, and creating and registering routing policies are critical parts of operations. Understanding convergence requirements and other performance objectives for ISP routers also is important. This presentation will focus on BGP in the larger context, rather than being a basic protocol and configuration guide, as in Berkowitz\' previous NANOG tutorials.

View full abstract page.
Speakers:
  • Howard Berkowitz, Nortel.
pptExterior Routing 201(PPT)
3:00pm - 3:30pm Break
3:30pm - 5:00pmGeorgia Hall 1-2

Tutorial: Customer Satisfaction 201

The most important aspect of satisfying an ISP customer is to ensure the customer has realistic expectations, and then to satisfy those expectations. Many customer desires center around \"high availability,\" but there is an unfortunate tendency to focus on only one technology (e.g., multihomed BGP) to solve these problems.<BR> <BR> This tutorial reviews how to define your customer requirements with respect to availability and scalability. It identifies the capabilities and limitations of a wide range of complementary functions at multiple OSI layers, from physical diversity to virtual server farms. It also considers the issues of communicating with customers while problems occur. Previous related tutorials include Berkowitz\' NANOG14 tutorial on address management for ISPs and their customers (Atlanta, 1998).

View full abstract page.
Speakers:
  • Howard Berkowitz, Nortel.
pptCustomer Satisfaction 201(PPT)
3:30pm - 5:00pmGeorgia Hall 7-8

Tutorial: Understanding Standards Track IETF MIBs

This tutorial begins with an explanation of SNMP counters, where they are found, and how to obtain them efficiently for currently deployed technologies. The session then describes how standard IETF MIBs are organized, points out what useful data they contain, and how they fit together to provide a view of an operational network at layers 1, 2, and 3. <BR><BR> In particular, this introduction will review the following technologies: <UL> <LI> Layer 1 MIBs: Ethernet (fast/gig), SONET, Serial/DS1-3, Cable MODEM <BR><BR></LI> <LI> Layer 2 MIBs: Bridging/802.1q, Link Aggregation/802.3ad, RMON, FRAME-RELAY, PPP, ATM <BR><BR></LI> <LI> Layer 3 MIBs: IP protocol/forwarding tables, BGP, OSPF, VRRP, RMON2 <BR><BR></LI> </UL>

View full abstract page.
Speakers:

  • Chris Elliott, Cisco Systems
  • Chris Elliott, CCIE #2013 and author of \"Performance and Fault Management,\" has 25 years experience in the networking industry, starting with the ARPANET. He currently works for Cisco Systems as an escalation engineer for the Cisco Technical Assistance Center. For the last nine years he has concentrated on network management, including designing and managing a large network for SAS Institute, Inc.; writing network management applications, including a distributed SNMP polling system; supporting users of Network Management Applications; and assisting in the design of IETF standards for network management.

  • Mike MacFaden, Riverstone
  • Michael MacFaden, a graduate of California Polytechnic State University, has been a software engineer for the past 12 years, working in the field of applications and network management. At IBM, he helped to build out the internal 9/8 network to distribute marketing data to field personnel on top of the existing SNA VNET network. At Premisys Communications, he co-designed the UNIX-based element management system using IETF protocols, making the IMACS 800 channel bank completely telnet/snmp manageable. At Kalpana/Cisco systems, he contributed to CiscoView, Cisco Resource Manager, and Vlan Manager as well as contributed a modified SNMP++ library to the Adaptive Communications Environment (ACE) project of UC Irvine & Washington University in St Louis. At Riverstone Networks, he is responsible for overall implementation of device management as well as open source network management.
pptUnderstanding Standards Track IETF MIBs(PPT)
Monday, February 19 2001
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
9:00am - 9:15amCapitol BallroomWelcome, IntroductionsSpeakers:
  • Greg Hankins, Riverstone.
  • Susan Harris, Merit Network.
9:15am - 9:45amCapitol Ballroom

Multiservice Core Design

The technology and the economics behind some next-generation commercial IP networks are examined and an implementation of a backbone built on those principles is presented.

View full abstract page.
Speakers:

  • Jimmy Boyle, Level 3
  • Jim Boyle works for Level3 Communications, where he has worked on the teams that developed its ATM, and then MPLS, multiservice backbone networks. He is currently seeing if he can load IP software onto DACs and ADMs.

  • Vijay Gill, MFN
  • Positions held by Vijay Gill include systems development and analysis at University of Maryland, Baltimore County, and Senior Network Architect/Senior Member of the Technical Staff at UUNET. He is currently Senior Architect at Metromedia Fiber Networks.
9:45am - 10:15amCapitol Ballroom

Reasons Not to Deploy RED (or, \"On the Limits of Active Queue Management\")

Active queue management (AQM) refers to a family of packet-dropping mechanisms for FIFO queues that has been proposed to support end-to-end congestion control mechanisms in the Internet. We examine the performance of AQM mechanisms by varying two parameters: the queue size and the dropping function. AQM flavors considered include both the well known \"Drop from Tail\" (TD) and \"RED,\" as well as the more recently proposed \"Gentle RED\" and a previously unrecognized mechanism we call \"Gentle RED with instantaneous queue size\", or GRED-I.<BR> <BR> We use experimentation to analyze the four AQM mechanisms identified above. The major result observed is that from a TCP goodput and UDP loss standpoint, varying AQM parameters has a minor influence on performance. On the other hand, we observe an important sensitivity of AQM to traffic characteristics. We show that RED and GRED do not provide sufficient performance improvement compared to Tail Drop. In the case of consecutive losses, we show that RED can be harmful by dropping much longer bursts than Tail Drop.<BR> <BR> We conclude the presentation by discussing the feasibility of Fair Queueing as an alternative to Active Queue Management. Measurement data collected on the Sprint operational IP backbone will be used to advocate the deployement of Fair Queueing.

View full abstract page.
Speakers:

  • Christophe Diot, Sprint
  • Christophe Diot works with the Sprint Advanced Technology Laboratory, where he is in charge of the IP research group. Sprint ATL\'s charter is to analyze new mechanisms and protocols for the Internet. Current activities in the IP area address diffserv, RED, and PIM-SSM deployment. The IP group\'s major project is the passive monitoring of the Sprint IP backbone in order to study IP traffic characteristics.
pptChristophe Diot Presentation(PPT)
10:15am - 10:45amCapitol Ballroom

DDoS Attacks and Pushback

Link-flooding, as perpetrated by distributed denial of service attacks, is a serious threat to the Internet. We propose a pushback mechanism to defeat such attacks: routers experiencing sustained, massive congestion ask the upstream routers to drop the packets instead, thus freeing bandwidth for other traffic. This algorithm is applied recursively, pushing back to either an uncongested link or even the sources of the problem. Simulation results show that this scheme is indeed effective.

View full abstract page.
Speakers:

  • Steve Bellovin, AT&T
  • Steven Bellovin, the co-author of <I>Firewalls and Internet Security: Repelling the Wily Hacker</I>, does research at AT&T Labs on networks, security, and especially why the two don\'t get along.
pdfSteve Bellovin Presentation(PDF)
10:45am - 11:00am Break
11:00am - 11:30amCapitol Ballroom

Internet Outage Trends

(1) Over a dozen large carriers participate in activities to protect their networks from damage by backhoes and other hazards. What is the latest news from the backhoe damage prevention industry?<BR> <BR> (2) An analysis of network outages and events in the Year 2000 compared to previous years shows some changes in the types of outages, and their impact on network users. Are users being impacted by fewer events, or has the number of users grown, diluting the impact of network problems? With little hard data from providers, can we use other measurements of Internet performance to guage the effects?

View full abstract page.
Speakers:
  • Sean Donelan, Equinix.
pptSean Donelan Presentation(PPT)
11:30am - 12:00pmCapitol Ballroom

FlowScan

FlowScan is a freely-available traffic analysis and visualization tool used primarily with Cisco NetFlow. In this presentation and BOF, we will run FlowScan \"live\" - having it analyze the real network traffic from the NANOG meeting itself. While most FlowScan sites utilize Cisco NetFlow, we will demonstrate it utilizing the flow features of RiverStone and/or Juniper gear. The best time for attendees to see the demo will be during the Monday evening FlowScan BOF. <BR><BR> Furthermore, with sample graphs of real traffic from UW-Madison and other FlowScan sites, we will discuss operational uses of real-time flow-based analysis which include: <UL> <LI> detecting network abuse, such as Denial of Services attacks, </LI> <LI> correlating traffic measurements with network configuration management at points in time and, </LI> <LI> analyzing long-term IP traffic trends, including offered load sorted by peer and origin ASNs. <BR><BR></LI> </UL> For slide presentation, please see: <BR><BR> <A HREF=\"http://net.doit.wisc.edu/~plonka/nanog/\">http://net.doit.wisc.edu/~plonka/nanog/</A>

View full abstract page.
Speakers:

  • Dave Plonka, University of Wisconsin - Madison
  • Dave Plonka has developed a number of free software packages, many of which are network management tools. He works as a systems programmer doing network engineering within the Division of Information Technology (DoIT) at the University of Wisconsin - Madison. In the formative years of his working life he was a programmer in the commercial software industry focusing on the development of portable libraries and relational database applications under VMS and Unix. In 1991, he received a B.S. in Computer Science from Carroll College in Waukesha, Wisconsin.
12:00pm - 1:30pm Lunch
1:30pm - 2:00pmCapitol Ballroom

Single Source Multicast: The Multicast Broadcast Model

Multicasting is the most cost-effective means of delivering streaming media over the Internet, but its deployment has been limited by a number of technical and business problems. Within the last year, there have been several efforts to address these problems in the context of multicast one-to-many broadcasting. This is part of the general abandonment of the \"Swiss Army knife\" approach, where one multicast model was supposed to fit all possible uses, for multicast models tuned for specific applications.<BR> <BR> Single Source Multicast (SSM) uses the Internet Group Management Protocol (IGMP) version 3 and a subset of the capabilities of Protocol Independent Multicast - Sparse Mode (or PIM-SM) to implement a broadcast model where receivers know the IP address of the source (from, say, a web page), and join a specific (Source,Group) pair. This, besides greatly simplifying the operation of the protocol, means that multicast transmissions can be limited to specific IP addresses, and makes it harder to spoof or interrupt multicast transmissions. Other recent innovations include a tailoring of the Real Time Control Protocol to scale to large audience sizes, and the spread of multicast friendly Internet exchanges. In my talk I will describe the SSM protocol, its advantages, and the other work leading to a workable business model for multicast broadcasting.

View full abstract page.
Speakers:
  • Marshall Eubanks, Multicast Technologies.
pptMarshall Eubanks Presentation(PPT)
2:00pm - 2:30pmCapitol BallroomBlurring the Lines Between Circuits and Protocols: Plans to Re-Organize Sub-IP Technologies in the IETFSpeakers:
  • Scott Bradner, Harvard University.
pptScott Bradner Presentation(PPT)
2:30pm - 3:00pmCapitol Ballroom

BGP MED Oscillation

We have discovered a problem with the BGP decision algorithm that can led to an endless BGP convergence loop in certain topologies. So far, we know of two different types of \"The Churn.\" Type I occurs in networks that have a single tier of RRs or confederation Sub-ASs (please see <A HREF=\"http://www.cisco.com/en/US/ts/fn/100/fn12942.html\">http://www.cisco.com/en/US/ts/fn/100/fn12942.html</A> for more details). Type II churn occurs in a network that has more than one tier of RRs or confederations. Currently there is not a solution for Type II churn, but we are working on a change to the BGP spec that will fix this problem.

View full abstract page.
Speakers:

  • Daniel Walton, Cisco Systems
  • Daniel is currently on the Routing Protocols Deployment and Scalability team at Cisco, where he concentrates on BGP and ISIS. Previously, he worked in the Cisco TAC and ISP Expert team, where he focused on BGP and other routing protocols.
pptDaniel Walton Presentation(PPT)
3:00pm - 3:15pm Break
3:15pm - 3:35pmCapitol Ballroom

Dynamic Service Provisioning in Converged Network Infrastructure

The move towards a converged network architecture has brought about a new paradigm for service provisioning and delivery. Moreover, a class of applications which require a variety of quality of service levels from the network have emerged, which need to be provisioned on-demand in the network. The dynamic provisioning of network resources optimally is quite challenging in such an environment.<BR> <BR> In this presentation, we will talk about how IP and other services can be provisioned efficiently over a converged packet and optical network infrastructure. We will describe how myriad innovative services can be provisioned over these converged networks to harness the potential of integrated networks, and present techniques for allocating network resources intelligently and optimally based on the needs of the application services.

View full abstract page.
Speakers:

  • Muckai Girish, Atoga
  • Muckai Girish has been with Atoga Systems since 2000. Prior to joining Atoga, he was at SBC Technology Resources, Inc., working on IP and QoS. Before that he was with Cascade Communications in the Network Architecture and Performance Modeling group. He obtained his M.S. and Ph.D. degrees from Boston University and a B.Tech from the Indian Institute of Technology, Madras.
pptMuckai Girish Presentation(PPT)
3:35pm - 5:00pmCapitol Ballroom

Panel: Provider-Provisioned VPNs

Development and deployment of provider-provisioned VPNs is the latest VPN concept, having emerged during the past year. This panel will present the latest development of PPVPN technologies and models, and discuss ISP deployment status and experiences.

View full abstract page.
Moderators:
  • Jessica Yurcik, Cosine.
Panelists:
  • Luyuan Fang, AT&T.
  • Kireeti Kompella, Juniper Networks.
  • Alvaro Retana, Cisco Systems.
pptAlvaro Retana Presentation(PPT)
pptJessica Yu Presentation(PPT)
pptKireeti Kompella Presentation(PPT)
pptLuyuan Fang Presentation(PPT)
5:30pm - 7:30pmGeorgia HallBeer n Gear
  • Sponsors Atoga Systems; Brix Networks; Cisco Systems; Extreme Networks; Quarry Technologies; Pluris; Riverstone Networks; Unisphere Networks.
  • Sponsors
  • 7:30pm - 9:00pmGeorgia Hall 8

    AAA

    The IETF AAA Working Group is in the final stages of defining DIAMETER as a potential standard protocol to support network access applications, focusing on dial and mobile access. There are also a number of applications that are now using or planning to use COPS (Common Open Policy Service) for provisioning network services such as QoS. This BOF will include: <UL> <LI> a brief presentation on the status of work at IETF on DIAMETER, COPS, and policy, and in the AAAARCH (AAA Architecture) IRTF research group. <BR><BR></LI> <LI> a brief presentation on possible transition models from RADIUS to DIAMETER in a \"proxy\" environment <BR><BR></LI> <LI> a brief discussion of combining services supported by RADIUS or DIAMETER with services supported by COPS, such as edge router access and provisioning <BR><BR></LI> <LI> open discussion of use of DIAMETER and/or COPS in current and future service offerings </LI> </UL>

    View full abstract page.
    Moderators:
    • John Vollbrecht, Interlink.
    7:30pm - 9:00pmCapitol BallroomFlowScanModerators:
    • Dave Plonka, University of Wisconsin - Madison.
    7:30pm - 9:00pmGeorgia Hall 1-2

    Network Policy

    What do you require your customers and peers to do, and not do? Can the spam? Forge source addresses? Inject routes they don\'t own? If not, why not? What else? Come by and talk with your, um, peers about it and the results will be presented on Tuesday.

    View full abstract page.
    Moderators:
    • Paul Vixie, MFN.
    9:00pm - 9:30pmGeorgia Hall 1-2

    Data Center BOF II

    Internet Data centers provide a secure, high-capacity environment for communications companies and content providers to locate and host their Internet equipment. These centers provide the foundation for a variety of business models and Internet operations. The expertise involved in building and operating a network-focused facility are non-trivial. Even the low-end data center requires both an immediate cash draw and a recurring operations cost. The construction project itself requires months of planning and execution. Like most things, the first time one enters into a new arena, potentially costly mistakes are made.<BR> <BR> This BOF will explore the tradeoffs between building a data center and outsourcing the data center to a third party. The BOF will also continue some of the discussions that took place during the Data Center BOF at the 1999 Atlanta NANOG.<BR> <BR> One goal of this session is to create the framework to establish a list of \"public\" data centers, listing the services offered, the center\'s location, and any additional benefits the center offers its customers.

    View full abstract page.
    Moderators:

    • Michael Lucking, Epoch Internet
    • Over the past decade, Michael Lucking has worked with several companies building various-sized data centers. His work has included constructing POPs for regional and national ISPs, and large data centers for government organizations. Michael is currently working as a Sr. Network Engineer for Epoch Internet, Inc.

    • Bill Norton, Equinix
    • As Co-Founder and Director of Business Development at Equinix, Bill Norton focuses his attention on building strategic relationships among companies participating at the Internet Business Exchanges. Previously, he was the Chair of NANOG and Manager of the Internet Engineering Group at Merit, leading a variety of national and international network research and operations projects.
    pptData Center BOF II Presentation(PPT)
    Tuesday, February 20 2001
    Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
    9:00am - 10:30amCapitol Ballroom

    Panel: Global Routing System Scaling Issues

    With the rapid growth of the Internet routing table, providers are experiencing difficulty maintaining network stability, even with aggressive filtering policies in place. This panel will discuss the causes of routing prefix table growth, measures providers should take to curtail it, and alternate measures enterprises and service preoviders can take to ensure redundancy and load-balancing without announcing their prefixes into the global table. <BR><BR> <A HREF=\"ahuja/index.htm\">Abha Ahuja Presentation</A>

    View full abstract page.
    Moderators:

    • Cathy Wittbrodt, iVMG
    • Cathy Wittbrodt is VP for Architecture at iVMG. Prior to joining iVMG she was with [email protected], where she was responsible for network routing and IP addressing. Cathy is a member of the ARIN advisory council as well as the Address Supporting Organization (ASO) address council. She has been active in the Internet for 12 years. She began at Merit Network, Inc. where she worked on the NSFNET Backbone. Also while at Merit Cathy built CICNet, a network that connected the Big 10 universities. Following Merit, Cathy designed and implemented OSI/CLNP for the Energy Sciences Network. Although OSI/CLNP was never widely deployed, the experience has given greater insight into addressing and scaling issues. Cathy also spent three years in the engineering group of the Bay Area Regional Research Network, BARRNet, which was bought by BBN Planet. Cathy is on the Board of Directors of Panzer Motorcycle Works, USA, Inc. She has a B.S. in mathematics from Northern Arizona University.
    Panelists:
    • Abha Ahuja, Arbor Networks.
    • Enke Chen, Redback.
    • Vijay Gill, MFN.
    • Tony Li, Procket Networks.
    • Bill Woodcock, Zocalo.
    pptCathy Wittbrodt Presentation(PPT)
    pptEnke Chen Presentation(PPT)
    pptTony Li Presentation(PPT)
    10:30am - 10:45amCapitol BallroomBreak
    10:45am - 11:30amCapitol Ballroom

    IPv6 in Mobile Wireless Networking

    Mobile Wireless technologies are currently moving from circuit-based first-generation and 2G systems to packet-oriented 2.5 and 3G systems. We will discuss how the infrastructure and mobile devices will make the transition, while focusing on internet access for mobile services and opportunities for IP core service providers in 2.5 and 3G networks.

    View full abstract page.
    Speakers:

    • Dana Blair, Cisco Systems
    • Dana Blair joined Cisco Systems in 1995 and is currently a Technical Leader working on next-generation seamless mobile IPv6 technologies. Since 1999, he has been working on advanced architectures to transition mobile wireless networks toward an all-IP infrastructure with a particular focus on Voice over IP technology. From 1995 to 1999, he developed Cisco IOS Software for Network Access Servers, including Multilink PPP, IP Dial-up, and IP Dial-out. Dana has developed ISDN networking products, both hardware and software, at the IBM Network Hardware Division from 1989 to 1994 and at Hayes Microcomputer from 1994 to 1995. Prior to 1989, he worked for Motorola in semiconductor fabrication research. He is currently the Micro-mobility Design Team Leader in the IETF Context and Micro-mobility Routing (seamoby) Working Group.
    pptDana Blair Presentation(PPT)
    11:30am - 12:00pmCapitol Ballroom

    Network Policies: Current and Proposed (BOF Follow-Up)

    This presentation follows up Monday evening\'s Network Policy BOF.<BR> <BR> Do your peers and customers expect to be able to send spam over your network? If not spam, how about IP datagrams with forged source addresses, or BGP routes for prefixes they don\'t own? In the grand Internet tradition of closing the barn door after the horse has been barbequed, this session attempts to describe current practice and proposes some improvements.

    View full abstract page.
    Speakers:
    • Paul Vixie, MFN.
    12:00pm - 1:30pm Lunch
    1:30pm - 2:30pmCapitol Ballroom

    Florida Exchanges Facing South: NOTA and the MIX

    This panel discussion will begin with a brief discussion of network infrastructure developments in Columbia and other South American countries. Presentations will then be given by representatives of the two South Florida NAP initiatives: NAP Of the Americas and the Next Generation Internet Exchange, nicknamed the Florida MIX. The focus will be their architectural details, scopes, and positioning in the marketplace. A question-&-answer session follows the individual presentations.

    View full abstract page.
    Moderators:
    • Bill Manning, ISI.
    Panelists:
    • Dan Golding, Netrail.
    • Christian Kuhtz, BellSouth.
    pptChristian Kuhtz Presentation(PPT)
    2:30pm - 2:50pmCapitol Ballroom

    New Version of the RIPE Database

    Some time ago the RIPE NCC embarked in a project to completely rewrite the database software. The project is almost finished and the transition to the new database system will occur in the first half of 2001.<BR> <BR> One of the major changes in the new database is its support of RPSL (RFC 2622) and RPS-AUTH (RFC 2725) specifications. The new database also has additional functionality, which requires an extension of the query syntax.<BR> <BR> This presentation will discuss RPSL and RPS-AUTH features of the new software and how they will affect the community, give an update on the state of the RIPE IRR, and finally give an overview of IRR-related RIPE activities and rollout plans.

    View full abstract page.
    Speakers:

    • Andrei Robachevsky, RIPE-NCC
    • Andrei Robachevsky is manager of the database group at the RIPE-NCC, where he is responsible for all aspects of the database re-implementation project and RIPE database operations. He has been working in this position for the last year. Prior to this position he worked with the RIPE-NCC as a database software engineer developing software for the re-implementation project. Before he joined the RIPE-NCC in 1999 he was involved in academic network development in Russia.
    pptAndrei Robachevsky Presentation(PPT)
    2:50pm - 3:05pmCapitol Ballroom

    Very Short Reach OC-192/STM-64 Interfaces

    A large fraction of OC-192/STM-64 links are between equipment in a single central office (CO). The Optical Internetworking Forum (OIF) recently adopted two Very Short Reach (VSR) OC-192 interface Implementation Agreements to help reduce the cost of these intra-office OC-192 links. VSR-1 is 12 fibers at 1.25 Gbit/s each, using multi-mode ribbon fiber and reaching up to 300 meters. VSR-2 is 10 Gbit/s serial using single mode fiber (SMF) and reaching up to 600m.<BR> <BR> This pair was adopted because the parallel optics of VSR-1 will likely be substantially cheaper for the shortest reaches, where the ribbon fiber can be treated like any other patch cable. The serial solution of VSR-2 uses installed SMF and can reach across the largest COs while still offering some potential cost savings compared to SONET short reach (SR) interfaces. The input from the VSR BoF at NANOG-20 was instrumental in reaching this decision.<BR> <BR> VSR-1 reaches up to 300 meters and uses 12 lasers signaling at 1.25 Gbit/s. It leverages the 850 nanometer lasers and multi-mode fiber technology used in Gigabit Ethernet. The lasers can be combined in Vertical Cavity Surface Emitting Laser (VCSEL) arrays, and the fibers are joined in a 12-fiber ribbon with a MPO/MTP connector. 10 fibers carry the data, one fiber carries CRC error detection data, and the 12th fiber carries parity of the 10 data fibers. This enables hitless correction of errors on any single fiber, including the loss of a fiber. Field termination is supported, and the link electronics automatically compensate for either ribbon orientation so there is no such thing as a twisted ribbon or a connector put on upside down.<BR> <BR> VSR-2 reaches up to 600m and uses serial 10 Gbit/s serial signaling. It is based on ITU G.691 and uses a 1310 nanometer laser over single mode fiber (SMF). Compared to existing SONET Short Reach (SR) interfaces, it relaxes some optical parameters. It allows increased dispersion and reduced reach VSR-1 and VSR-2 are complementary. VSR-1 uses lower speed signals and will likely be the lowest cost OC-192 link for the shortest reaches, where the ribbon fiber can be treated like any other patch cable. VSR-2 uses installed SMF and can reach across very large COs.

    View full abstract page.
    Speakers:

    • Russ Tuck, Pluris
    • Russ Tuck chairs the OIF\'s Physical and Link Layer Working Group, which is developing VSR Implementation Agreements. He is Systems Architect at Pluris Terabit Network Systems, where he helps lead the development of scalable and reliable core routers. He previously architected scalable database servers at Pyramid Technology, and scalable supercomputers at MasPar. He earned a Ph.D. in Computer Science from Duke University and carried out his dissertation research at UNC Chapel Hill.
    pptRuss Tuck Presentation(PPT)
    3:05pm - 3:10pmCapitol BallroomClosing RemarksSpeakers:
    • Susan Harris, Merit Network.

     

    ^ Back to Top