^ Top

NANOG 39 Agenda

All times listed below are Eastern Standard Time. 

Presentation File Key:

     Windows Media video, requires Windows Media Player to view. 

   Real Video, requires Real Player to view. 

     PDF Document, requires Adobe Acrobat Reader to view/print. 

Sunday, February 4 2007
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
4:00pm - 5:00pmSheraton Hall E

Newcomer Orientation and Reception

Welcome! If you\'re new to NANOG, or if you\'re an experienced attendee and just feel like hanging out, this orientation session and reception are for you. Join us to meet other newcomers as well as members of the NANOG Steering Committee, Program Committee, and List-admin team. We\'ll demystify the goings-on at NANOG, and also tell you a bit about the birth of the organization way back in the mists of time. Opening Remarks and Welcome - Steve Feldman, CNET NANOG History - Bill Norton, Equinix Merit Overview - Betty Burke, Merit Network Inc.

View full abstract page.
  • Betty Burke, Merit Network.
  • Steve Feldman, CNET.
  • Bill Norton, Equinix.
pdfBetty Burke Newcomers' Reception Presentation(PDF)
pdfSteve Feldman Newcomers' Reception Presentation(PDF)
5:00pm - 6:00pmSheraton Hall ENANOG Community MeetingSpeakers:
  • Joe Abley, Afilias Canada.
  • Betty Burke, Merit Network.
  • Steve Feldman, CNET.
  • Rob Seastrom, ServerVault.
pdfBetty Burke Community Meeting Presentation(PDF)
pdfJoe Abley Community Meeting Presentation(PDF)
youtubeNANOG Community Meeting
pdfRob Seastrom Community Meeting Presentation(PDF)
pdfSteve Feldman Community Meeting Presentation(PDF)
Monday, February 5 2007
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:00am - 9:00amOsgoode FoyerContinental Breakfast
9:00am - 9:15amOsgoode BallroomOpening RemarksSpeakers:
  • Steve Feldman, CNET.
  • Sylvie LaPerrière, Teleglobe - VSNLI.
  • Jon Nistor, TorIX.
pdfJon Nistor Presentation(PDF)
youtubeOpening Remarks
9:15am - 9:45amOsgoode Ballroom

Taiwan Earthquake Fiber Cuts: a Service Provider View

A succession of major earthquakes in the Luzon Strait on December 26, 2006 caused 7 out of 8 undersea ring-protected subsea cable systems to fail, interrupting the majority of voice, data and Internet communications in Southeast Asia. The physical subsea routes required to build an Internet backbone from the USA to Southeast Asia are depicted. Natural catastrophes remind service providers that physical route diversity planning over multiple subsea cable assets laid in close proximity (Luzon Strait) might not be enough. The severity of damages is shown and the adversity of cable repair conditions and timeline explained. The current growth of Internet traffic within the Asia Pacific region is creating economic incentives to build future cables on a westward route to Europe thus reducing dependency on the Luzon strait route.

View full abstract page.

  • Sylvie LaPerrière, Teleglobe - VSNLI
  • Sylvie LaPerrière is Director of Peering and Commercial Operations at Teleglobe, a VSNL International company. She is responsible for overseeing the company’s Internet expansion and market management worldwide. She is also Chair of the Teleglobe Peering Committee. Ms. LaPerrière joined the company in 1993 and launched Teleglobe’s first Internet service in 1995. Since 2002 she has been leading Teleglobe’s global Internet expansion into new markets. Ms. LaPerrière has 13 years of extensive experience in product management for telecommunication services. Ms. LaPerrière earned her Bachelor of Commerce in Marketing and Information Systems from École des Hautes Études Commerciales de Montréal.
pdfSylvie LaPerrière Presentation(PDF)
youtubeTaiwan Earthquake Fiber
9:45am - 10:15amOsgoode Ballroom

Quaking Tables: The Taiwan Earthquakes and the Internet Routing Table

Six large quakes hit Taiwan in rapid succession on Dec 26, 2006. As a result, at least six major cables were severed causing major disruption to Internet routing. Using internet routing data from 150+ sessions, we look at the effects of these events on routing. We look at instability and outages both, and find that over 19K networks were impacted by the event, including, at peak level, almost 4k networks unreachable. We find that the event is more complicated, and more interesting, than some previous disasters because of the compound nature of the underlying failure (six cables). In particular, the onset of the event is less clearly tied to the timing of the quakes, and the recovery is more complicated as well. Finally, we look at the winners and the losers in the event, from an autonomous system perspective and from a country perspective.

View full abstract page.

  • Alin Popescu, Renesys Corporation
  • Alin Popescu is a member of the engineering team at Renesys. His specialties include implementating statistical and learning algorithms and developping system architectures for BGP data analysis. Before joining Renesys, Alin earned a Ph.D. in Computer Science from Dartmouth College.

  • Todd Underwood, Renesys Corporation
  • Todd Underwood is in charge of operations, and peering for Renesys. Before that he was CTO of Oso Grande, a New Mexico ISP. He has a background in systems engineering and security and has worked on a variety of systems architecture and scalability problems. Todd has presented work related to Internet routing dynamics and relationships at NANOG and various peering forums (LINX, S&D, NOTA). Todd has a BA in Philosophy from Columbia University and a MS in Computer Science from University of New Mexico.

  • Earl Zmijewski, Renesys Corporation
  • Earl Zmijewski is responsible for Renesys\'s professional services. He has nearly 20 years of experience encompassing scientific computing and most areas of IT, with particular emphasis on networking and security. Before Renesys, Earl was IT Director at Fluent Inc., a computational fluid dynamics software company, where he was instrumental in establishing new offices throughout the US, Europe and Asia and in the promotion and implementation of Linux clustering technologies. He was also principal architect in the design of Fluent\'s networks and Internet security posture. Before that, Earl held various academic positions at Cornell University, University of California, and James Madison University. Earl has a PhD and MS in Computer Science from Cornell University and an MS and BA in Mathematical Sciences from The Johns Hopkins University.
pdfQuaking Tables(PDF)
youtubeQuaking Tables
10:15am - 10:45amOsgoode FoyerBreak
10:15am - 10:45amSheraton Hall FPGP Key SigningSpeakers:
  • Majdi Abbas, Lattice Networks.
10:45am - 11:15amOsgoode Ballroom

Follow-up analysis of J root anycast traffic

Since the controversy over \"stateless anycast\" refuses to go away--even if it\'s kept alive mostly by one person--we thought it would be interesting to reexamine some of the data we presented two years at NANOG in our \"Life and Times of J Root\" paper. In particular, we will again look at all anycast instances of J root to see which source IP addresses show up at multiple locations and how often. We will perform additional analysis to attempt to explain the results, whatever they may be. We will also reexamine the question we considered two years ago, \"Who is querying j.root-servers.net\'s old IP address and why?\", to see if the nature of the queriers has changed.

View full abstract page.
  • Piet Barber, None.
  • Mark Kosters, None.
  • Matt Larson, None.
pdfFollow-up analysis of J root anycast traffic(PDF)
youtubeFollow-up analysis of J root anycast traffic
11:15am - 11:30amOsgoode Ballroom

Protecting Users\' Privacy when Tracing Network Traffic

One of the current impediments in advancing the state of the art in Internet security research is the lack of scalable network tracing platform available to researchers. Given the complexity of today\'s attacks, packet-level tracing tools are inadequate; instead, today\'s tracing platforms must reconstruct traffic into application state and inspect it for suspicious or deviant behavior. Unfortunately, no such open-source network tracing software is available to researchers. In our project, we are building a highly scalable, open-source network tracing platform that offers adequate privacy and anonymity guarantees to the users whose traffic is monitored. Our tracing infrastructure is reconstructing traffic across several layers, from network to the application layer. We reassemble IP fragments into IP packets, TCP segments into TCP conections, and TCP connections into HTTP transactions. To protect users\' anonymity, our platform does not store any unanonymized data in stable storage. Instead, all work (including capturing and reassembly) is done in volatile memory at line speeds. In our presentation at NANOG, we focus on the privacy requirements for tracing the network traffic of a large Internet user population. We start by describing a list of attacks possible when collecting application-level information by network tracing. We argue that the only way to mitigate the privacy implications of all these attacks is to never store any un-anonymized data to stable storage when tracing. We then present a high-level overview of our open-source network tracing infrastructure. Our goal is to get the NANOG\'s community feedback on our anonymization and privacy protocol as well as their input in the design of our monitoring platform.

View full abstract page.
  • Troy Ronda, Computer Science, University of Toronto.
  • Stefan Saroiu, Computer Science, University of Toronto
  • Stefan Saroiu joined the Computer Science at the University of Toronto in 2005 after a brief hiatus at Amazon.com. Stefan received his Ph.D. in 2004 from the University of Washington where he worked with Steve Gribble and Hank Levy. Stefan\'s research interests span the range from operating systems to networking and distributed systems.
youtubeProtecting Users' Privacy when Tracing Network Traffic
pdfStefan Saroiu Presentation(PDF)
11:30am - 11:45amOsgoode Ballroom

A Technical Approach to Net Neutrality

A recent statement by AT\\&T CEO Ed Whitacre sparked considerable fear in the public that the Internet may not be open any more: the ISPs dictate which sites/applications flourish and which flounder. The statement triggered the heated debate on net neutrality and ignited the battle to enact net neutrality legislation. However, by the date of writing, all attempts to pass net neutrality laws have failed. This paper states our proposition on net neutrality: ISPs should not be able to discriminate against packets based on contents, application types, or packet sources or destinations that are not their own customers; but they are eligible to offer differentiated services to their customers. We present a technical design that aims to achieve this definition of net neutrality. Our design prevents an ISP from deterministically harming an application, a competing service, or singling out an individual innovator for extortion.

View full abstract page.

  • Xiaowei Yang, UC Irvine
  • Xiaowei Yang is an assistant professor in the Department of Computer Science at the University of California, Irvine. She received a Ph.D. in Computer Science from MIT in 2004, and a B.S. in Electronic Engineering from Tsinghua University, Beijing, China in 1996. Her research area is in networks and distributed systems, with an emphasis on protocol and architecture design.
youtubeA Technical Approach to Net Neutrality
pdfXiaowei Yang Presentation(PDF)
11:45am - 12:00pmOsgoode Ballroom

R-BGP: Ensuring Connectivity During BGP Convergence

Many studies show that when Internet links go up or down, the dynamics of BGP may cause several minutes of packet loss. The loss occurs even when multiple paths between the sender and receiver domains exist, and is unwarranted given the high connectivity of the Internet. Instead, we would like to ensure that Internet domains stay connected as long as the underlying network is connected. We present R-BGP, which ensures continuous path availability with minimal overhead by pre-computing a few strategically chosen failover paths. R-BGP provably guarantees that a domain will not experience any disconnectivity if a policy-compliant path exists after convergence. Surprisingly, this can be done using a few simple and practical modifications to BGP, and, just like BGP, requires announcing only one path per neighbor. Simulations using the current Internet graph show that R-BGP reduces the number of domains transiently disconnected by a down link, from 15% to zero.

View full abstract page.

  • Nate Kushman, MIT
  • Nate Kushman is pursing a PhD at MIT. His current research is in the area of reliable inter-domain routing. He recieved his B.S. and MEng degrees in Computer Science, in 1998 from MIT. He was a co-founder and Chief Technology Officer at UBUBU for 2 years, and then a senior architect at Akamai for four years until returning to MIT in 2005.
pdfR-BGP: Ensuring Connectivity During BGP Convergence(PDF)
youtubeR-BGP: Ensuring Connectivity During BGP Convergence
12:00pm - 12:30pmOsgoode BallroomDeaggregation ReportSpeakers:
  • Philip Smith, None.
youtubeDeaggregation Report
pdfPhilip Smith Lightning Talk(PDF)
12:00pm - 12:30pmOsgoode BallroomPower (In)Efficiencies in the Data CenterSpeakers:
  • Chris Street, None.
pdfChris Street Lightning Talk(PDF)
youtubePower (In)Efficiencies in the Data Center
12:00pm - 12:30pmOsgoode BallroomTraceifaceSpeakers:
  • John Kristoff, None.
pdfJohn Kristoff Lightning Talk(PDF)
12:30pm - 2:00pm Lunch
2:00pm - 3:30pmOsgoode Ballroom

Tutorial: Best Practices for Determining the Traffic Matrix in IP Networks

Knowledge of the amount of traffic between source and destination pairs of a network is crucial to fundamental operational tasks such as capacity planning, traffic engineering, and peering management. Router vendors, third parties, academic researchers, and ingenious network engineers have devised multiple ways of collecting and estimating traffic matrices. This session presents an overview of applications of traffic matrices and operational experiences with the various approaches, including NetFlow-based methods, mathematical estimation models, and MPLS (both RSVP and LDP) methods. Emphasis will be on practical experiences with each method. The tutorial has been slightly revised since previous versions. There will be less focus on NetFlow (only new advances will be covered), a more detailed description of how to build a traffic matrix from MPLS LDP counters, more coverage of measuring/estimating peering traffic (external in addition to internal traffic matrix). There will also be a discussion of the combination of traffic data with routing information.

View full abstract page.

  • Thomas Telkamp, Cariden Technologies, Inc.
  • Thomas Telkamp is responsible for deploying Cariden products, and guides product development. Previously, he worked for Global Crossing as Director of Network Engineering, Director of IP Global Architecture, and Director of Networking Research. Before joining Global Crossing, Thomas worked as a consultant at AT&T-Unisource Communications Services, SURFnet Expertise Centrum, SURFnet, DANTE, and Wunderman Cato Johnson. Thomas\' professional interests include network modeling and analysis, traffic characterization, and traffic engineering.
pdfBest Practices for Determining the Traffic Matrix in IP Networks(PDF)
youtubeBest Practices for Determining the Traffic Matrix in IP Networks
2:00pm - 3:30pmSheraton Hall E

ISP Security

Security incidents are a daily event for Internet Service Providers. Attacks on an ISP\'s customers, attacks from an ISP\'s customer, worms, BOTNETs, and attacks on the ISP\'s infrastructure are now one of many \"security\" NOC tickets throughout the day. This increase in the volume and intensity of attacks has forced ISP\'s to spend constrained resources to mitigate the effects of these attacks on their operations and services. This investment has helped minimize the effects of the attacks, but it has not helped stop them at the source. Stopping attacks at their source requires rapid and effective inter-ISP cooperation. Hence, these ISP Security BOFs are also used as a face-to-face sync up meeting for the NSP-SEC forum (see https://puck.nether.net/mailman/listinfo/nsp-security) <BR><BR> <STRONG>Defined topics to be discussed during this ISP Security BOF include:</STRONG> <BR><BR> The root of a log: Extracting Intelligence from the Woods <BR><BR> Botnet C&C: Extirpate or Infiltrate? <BR><BR> Defending the NANOG Network: How the local net is geared for security (Randy B. moderator) <BR><BR> Open Microphone <BR><BR> If you\'ve got items you\'d like to discuss, like to see discussed, or would prefer not be presented, please let me know ASAP. (Email Danny). If you\'d be interested in sharing your views, please let me know, although RSVP is not necessary. Slides are welcome but not required. Thanks in advance, see you in Toronto!

View full abstract page.
  • Danny McPherson, Arbor Networks.
3:30pm - 4:00pmOsgoode FoyerBreak
4:00pm - 5:30pmSheraton Hall E

Tutorial: IP Multicast/Multipoint for IPTV (and beyond)

This tutorial gives an overview of how IP multicast and (MPLS) multipoint technologies can be used in IPTV solutions and beyond. The presentation first sumamrizes such solutions and the resulting strategies to consider when deploying multipoint technologies. It then continues to present an architectural overview highlighting key functions of multipoint IPTV solution. In the remainder of the session those key functions are reviewed SSM, native IP multicast vs. mLDP and RSVP-TE/P2MP tree building, resiliency for multipoint (convergence, fast reroute, dualstream), Path selection for cost optimization, admission control and channel change issues and solutions.

View full abstract page.
  • Toerless Eckert, Cisco Systems.
youtubeIP Multicast/Multipoint for IPTV (and beyond)
pdfToerless Eckert Presentation(PDF)
4:00pm - 5:30pmOsgoode Ballroom

Tutorial: NetFlow to guard the Infrastructure

This tutorial aims to cover the uses of NetFlow to monitor an SP\' infrastructure, from the export, router-wise, to the collect and analysis, from a security perspective. While there is certainly a great deal of papers on the subject, there is room - and need, or so I hope - for a comprehensive coverage of NetFlow from theory to practical operations. The questions regularly popping-up in the operators\' forums about NetFlow uses, as well as the lack of visibility most operators have regarding attacks against their infrastructure may be good testimonials to support such a tutorial.

View full abstract page.
  • Yann Berthier, None.
youtubeNetFlow to guard the Infrastructure
pdfYann Berthier Presentation(PDF)
4:00pm - 5:30pmSheraton Hall B/C

Pushing the FIB limits, perspectives on pressures confronting modern routers

I\'m trying to put together a BOF to be held during the NAOG 39 meeting (Feb 4-7), that looks at when current router/switch architectures run out of TCAM or SRAM on the line-cards (depending on flavor) to hold the fib, and potentially what\'s being done about it. Part of the whole global routing scalability problem that\'s been fodder for a couple NANOG meeting now hinges on having the data you need in the fib. Comparatively buying more ram for or scaling your rp is a problem, but not immediately an intractable one by comparison. I\'m aiming to do this as a BOF rather than as part of the main program in the hope that vendors will be more free to talk specifically about their own products in a way that is not always appreciated in the main meeting, Feedback has been positive on this approach from the Program Committee... I would expect that this topic would have a significant audience with the NANOG crowd. If I\'ve reached the wrong person in your organization can you please help me find someone who might be interested because I think this topic has serious implications for operators and will probably shape purchasing decisions among other things over the coming year. Currently I\'ve solicited a couple router/switch vendors and a few (two) have already gotten back to me. I intend to also solicit presentations from the operator community, because I know for a fact that people are doing interesting things when confronted with this problem. A large regional ISP that I know in a non-principally-english speaking country is continuing to buy routers with 200k fib entries for example and counting on aggressive filtering and a potentially dramatically incomplete view of the internet to be sufficient.

View full abstract page.
  • Joel Jaeggli, Nokia.
pdfPushing the FIB limits - Atkinson(PDF)
pdfPushing the FIB limits - de Silva(PDF)
pdfPushing the FIB limits - Hankins(PDF)
pdfPushing the FIB limits - Introduction(PDF)
pdfPushing the FIB limits - Jaeggli(PDF)
pdfPushing the FIB limits - Ryan(PDF)
pdfPushing the FIB limits - Scudder(PDF)
pdfReport on NANOG 39 FIB BOF(PDF)
5:30pm - 7:30pmDominion Ballroom (2nd Floor)Beer n Gear
  • Sponsors Arbor Networks, Cariden, Cisco Systems, Google, Foundry Networks, Juniper Networks, Redback Networks, Transmode, VSNL International.
  • Sponsors
  • Tuesday, February 6 2007
    Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
    8:00am - 9:00amOsgoode FoyerContinental Breakfast
    9:00am - 10:00amOsgoode Ballroom

    Keynote: Video over the Internet: Can we break the Net?

    With the rise in consumer demand for video over the internet bandwidth usage will continue to climb significantly faster than subscriber counts. Should we be concerned with this or will capacity keep up with demand? Is it possible that a single event could cause significant issues for a large percentage of our audience?

    View full abstract page.

    • Mark Kortekaas, CTO - CBS Interactive
    • Mark Kortekaas serves as Chief Technology Officer, CBS Interactive for CBS Corporation. In this role he is responsible for overseeing the technology strategy and operations for the division. CBS Interactive is responsible for overseeing all consumer digital properties, in addition to exploring opportunities in the new media sector, including streaming of network programming, live shows produced exclusively for the Internet, podcasts and mob-isodes of CBS shows, among other features. The group consists of public sites such as cbs.com, cbsnews.com and cbs.sportsline.com.
    pdfKeynote Presentation(PDF)
    youtubeKeynote: Video over the Internet: Can we break the Net?
    10:00am - 10:30amOsgoode FoyerBreak
    10:00am - 10:30amSheraton Hall FPGP Key SigningModerators:
    • Majdi Abbas, Lattice Networks.
    10:30am - 11:00amOsgoode Ballroom

    4-Byte ASNs - The View from the Old BGP World

    The Regional Registries commenced allocation of 4-Byte AS numbers as of 1 January 2007. What are the implications of this for the existing 2-Byte AS BGP deployed base? What needs to change in the 2-Byte world and what stays the same? This presentation describes the transition mechanisms for 4-Byte AS numbers and the implications of this to the 2-Byte BGP world, both in terms of BGP configuration and the ISP\'s Operational Support Systems.

    View full abstract page.

    • Geoff Huston, APNIC
    • Geoff Huston is the Chief Internet Scientist at APNIC. He has been closely involved with the development of the Internet for many years, particularly within Australia, where he was responsible for the initial build of the Internet within the Australian academic and research sector. He served a ten year stint with Telstra in various operational and architectural roles. He is author of a number of Internet-related books. He was a member of the Internet Architecture Board from 1999 until 2005 and currently chairs three Working Groups in the IETF.
    youtube4-Byte ASNs - The View from the Old BGP World
    pdfGeoff Huston Presentation(PDF)
    11:00am - 11:30amOsgoode Ballroom

    Deployment of 32 bit AS Numbers

    This talk will consist of two parts: * A summary of the policy changes made in proposal 2005-12 (in the RIPE Region and similar in the ARIN region) and the consequences it has when applying for an ASN. * An overview of changes we have to make at the RIPE NCC in order to be able to handle 32-bit ASNs. This includes changes to our general infrastructure, documentation and supporting systems. The talk will give operators an idea of the work involved and, hopefully, trigger thought about how to approach this now, rather than wait until January 2009 when requests for an ASN will return a 32-bit number. This talk will be roughly based on what I said at RIPE 53 with the main difference being that the RIPE 53 talk was about a project that just started with lots of unknowns, while this talk is about a project that will be (almost) finished and where we hit (and hopefully) solved all the issues one encounters when implementing plans.

    View full abstract page.

    • Henk Uijterwaal, RIPE NCC
    • Henk Uijterwaal has been at the RIPE NCC since 1997. He is currently the Senior Project Manager. The SPM is responsible for large technical projects both inside and outside the organization.
    youtubeDeployment of 32 bit AS Numbers
    pdfHenk Uijterwaal Presentation(PDF)
    11:30am - 12:00pmOsgoode BallroomBGP MD5: Good, Bad, Ugly?Speakers:
    • Tom Scholl, AT&T Labs.
    youtubeBGP MD5: Good, Bad, Ugly?
    pdfTom Scholl Presentation(PDF)
    12:00pm - 12:15pm 

    Diagnosing Network Disruptions with Network-Wide Analysis

    To maintain high availability in the face of changing network conditions, network operators must quickly detect, identify, and react to events that cause network disruptions. One way to accomplish this goal is to monitor routing dynamics, by analyzing routing update streams collected from routers. Existing monitoring approaches typically treat streams of routing updates from different routers as independent signals, and report only the ``loud\'\' events (i.e., events that involve large volume of routing messages). In this paper, we examine BGP routing data from all routers in the Abilene backbone for six months and correlate them with a catalog of all known disruptions to its nodes and links. We find that many important events are not loud enough to be detected from a single stream. Instead, they become detectable only when multiple BGP update streams are simultaneously examined. This is because routing updates exhibit network-wide dependencies. This paper proposes using network-wide analysis of routing information to diagnose (i.e., detect and identify) network disruptions. To detect network disruptions, we apply a multivariate analysis technique on dynamic routing information, (\\ie, update traffic from all the Abilene routers) and find that this technique can detect every reported disruption to nodes and links within the network with a low rate of false alarms. To identify the type of disruption, we jointly analyze both the network-wide static configuration and details in the dynamic routing updates; we find that our method can correctly explain the scenario that caused the disruption. Although much work remains to make network-wide analysis of routing data operationally practical, our results illustrate the importance and potential of such an approach.

    View full abstract page.

    • Nick Feamster, Georgia Tech University
    • Nick Feamster is an assistant professor in the College of Computing at Georgia Tech. He received his Ph.D. in Computer science from MIT in 2005, and his S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT in 2000 and 2001, respectively. His research focuses on many aspects of computer networking and networked systems, including the design, measurement, and analysis of network routing protocols, network security, anonymous communication systems, and adaptive streaming media protocols. His honors include award papers at SIGCOMM 2006 (network-level behavior of spammers), the NSDI 2005 conference (fault detection in router configuration), Usenix Security 2002 (circumventing web censorship using Infranet), and Usenix Security 2001 (web cookie analysis).
    • Yiyi Huang, Georgia Tech University.
    • Anukool Lakhina, Guavus.
    • Jim Xu, Georgia Tech University.
    youtubeDiagnosing Network Disruptions with Network-Wide Analysis
    pdfNick Feamster Presentation(PDF)
    12:15pm - 12:30pmOsgoode BallroomA tool for assurance of BGP prefix filtersSpeakers:

    • Bill Woodcock, PCH
    • Bill Woodcock is research director of Packet Clearing House, a non-profit research institute dedicated to understanding and supporting Internet traffic exchange technology, policy, and economics. Bill has operated national and international Internet service provision and content delivery networks since 1989, and currently spends most of his time building Internet exchanges in developing countries.
    youtubeA tool for assurance of BGP prefix filters
    pdfBill Woodcock Presentation(PDF)
    12:30pm - 2:00pm Lunch
    2:00pm - 3:30pmOsgoode Ballroom

    Tutorial: BGP Troubleshooting Techniques (Part 1)

    This tutorial covers common problems ISPs have when deploying BGP within their network. It looks at problems with peer establishment, missing routes, inconsistent route selection, and convergence issues. It also looks at real world examples of common errors which are made when deploying BGP, both as iBGP and eBGP, in service provider networks.

    View full abstract page.

    • Philip Smith, Cisco Systems
    • Philip Smith has been with Cisco Systems since 1998 and is based in Brisbane, Australia. He is a Consulting Engineer, part of the Service Provider Architectures Group in Corporate Development. His role includes working with many ISPs in the Asia Pacific region, specifically in network strategies, technology, design and operations, configuration and scaling. As part of an ISP and Internet education initiative, Philip runs several Routing and Internet Technology Workshops in the Asia Pacific region. He also assists as co-instructor at similar events in many other parts of the world. Philip also is closely involved in regional activities, being chair of the APRICOT Management Committee, chair of APOPS, member of the organising and programme committees for SANOG and PacNOG, as well as chair of APNIC\'s Routing and Internet Exchange Point Special Interest Groups. Prior to joining Cisco, he spent five years at PIPEX (now integrated into MCI\'s global network business), the UK\'s first commercial Internet Service Provider. He was one of the first engineers working in the commercial Internet in the UK, and played a key role in building the modern Internet in Europe.
    pdfBGP Troubleshooting Techniques(PDF)
    youtubeBGP Troubleshooting Techniques PART 1
    2:00pm - 3:30pmSheraton Hall B/C

    IPv6 Network Operations

    This BOF is intended to be for those who either run an IPv6 network or are interested in doing so. It is NOT intended to be a place to argue the pros or cons of IPv6. Various issues to do with operating an IPv6 network will be discussed, including; transition methods, peering, tunnelling, filtering, support, network capacity and future issues.

    View full abstract page.

    • Stewart Bamford, Level 3 Communications
    • After receiving his B.Sc. in Computer Science from the University of East Anglia in 1995, Stewart started work in the ISP business, launching a small ISP in Norwich, England. In 1996, he joined PIPEX in Cambridge (UK), which was later known as UUNET, WorldCom, and then MCI. In 2004 he moved to Level 3 Communications, where he is currently employed as a Senior Engineer based in London. Stewart was the lead engineer in the deployment of IPv6 on the Level3 (AS3356) network. He is also also a Chartered IT Professional, a Chartered Engineer and a member of the British Computer Society.
    pdfKatsuyasu Toyama Presentation(PDF)
    pdfStewart Bamford Presentation(PDF)
    2:00pm - 3:30pmSheraton Hall E

    Peering BOF XIV (Part 1)

    Peering BOF Agenda Once again we will gather in the round to discuss and debate issues of relevance to the peering community. Peering vs. transit, peering contact information, capacity planning, transit purchase terms, international peering, and a historical view are all on the agenda during this double-slot NANOG Peering BOF session. Transit Survey - Dan Golding - Tier 1 Research - 10 minutes As an alternative to peering, it is helpful for the community to get a rough idea of the current market price for transit. As prices of transit drop, does it still make sense to peer away some of that traffic at the cost of transport and peering infrastructure? Dan has formatted a survey and has agreed to share the results with the group at the next Peering BOF. PeeringDB.com - TBD - 5 minutes The community resource peeringdb.com is a repository for peering contact information to aid in establishing and maintaining peering relationships. Of course, a database of this kind is only as valuable as its information is valid, and contact information becomes stale very quickly. So rather than having each IX host this contact information on their web site, and track or allow it to get out of date, peeringdb.com provides a single location for hosting this out of date information. This talk will provide an overview and walk through of the utility of the information. 100G ethernet status update -- Greg Hankins - Force 10 Networks - 10 minutes As the next wave of Internet Video traffic enters the US Peering Ecosystem, it is critical to plan for the scaling of the underlying infrastructure. Current backbones consist of bundles of 10G transport links which are quickly growing to unmanageable levels. The AMS-IX is saying that 2009 is far too late for 100G to help with the growth of its switching fabric. The IEEE is exploring specifications for 100G ethernet, so this talk will describe the progress to date and project the date of delivery. Open Peering is Dumb Discussion/Debate - 30 minutes This controversial title highlights a couple schools of thought in this community. The term \"Open\" peer refers to a company that will peer unconditionally with anyone who asks. The term \"Selective\" peer refers to a company that will peer but only with some prerequisites satisfied (multi-location peering, traffic volume minimum, out:in ratio maximum, etc.) This discussion/debate will explore the divide between these two philosophies. Transit Purchase Parameter Rationality Discussion. Denver Maddux - LimeLight Networks - 20 minutes Transit terms are rife with variables including commits, caps, reverse tiered burst pricing, etc. that some content heavy customers find onerous and problematic. The plea from one customer is to remove these terms and conditions from transit, and Denver will highlight what several of these terms signal to the marketplace. Of course, there are two sides to this discussion/debate, as transit providers need to manage their own backbone bandwidth, commits, ratios, 95th percentile tricks, etc. International Peering Experiences - Sylvie LaPerrière - VSNL - 20 minutes Even through the integration of TeleGlobe into VSNL over the past year, there has been great progress made expanding peering infrastructure into and throughout Asia. Sylvie will share with the group some of the challenges, surprises, trade offs, and observations from this recent experience. A view of Peering from Past to Present - facilitated by Chris Quesada (Switch & Data) -- 45 minutes The purpose of this mini-session is to bring together a panel of past and present peering coordinators to share their experiences in peering. Speakers will share their experiences on the following topics; Changes in Peering Geography, Challenges peering presents, and the Politics of Peering. The topics will be address from both sides to show both past and present perspectives and perhaps lend creditability to old adage of \"history repeating it self\". Anybody who has ever wondered what it was like to peer in the \"Good Ole Days\" or just wants to hear how they do it now will be most welcome to attend. -- Panelists: TBD Peering Personals - ALL In the remaining time, we will open the floor to the peering coordinators to introduce themselves, their AS#, their peering policy, peering locations, what they look for in a peer, and why companies should want to peer with them. Details such as transit volumes, traffic ratios, email address, etc. may also be shared. As we break for the evening, peering coordinators use this opportunity to meet interesting peers and hopefully establish additional peering sessions.

    View full abstract page.

    • Bill Norton, Equinix
    • Bill Norton is Co-Founder and Chief Technical Liaison for Equinix. He focuses on research on large-scale interconnection and ISP peering, and in particular, scaling Internet operations using optical networking. Over the last eight years, Bill has published over a dozen industry white papers and presented his research in a variety of international forums. From 1987 to 1998, he served in several staff and managerial roles at Merit Network, directing national and international network research and operations activities and serving as NANOG coordinator. Bill received a B.A. in Computer Science and an M.B.A. from the Business School at the University of Michigan.
    • Christopher Quesada, Switch & Data.
    pdfGreg Hankins Presentation(PDF)
    3:30pm - 4:00pmOsgoode FoyerBreak
    4:00pm - 5:30pmOsgoode BallroomTutorial: BGP Troubleshooting Techniques (Part 2)Speakers:
    • Philip Smith, Cisco Systems.
    4:00pm - 5:30pmSheraton Hall B/C

    How to Host a NANOG Meeting

    The purpose of this BOF is the demystification of NANOG hosting. Commonly thought to be a tremendously expensive and soul-destroying exercise, hosting a NANOG meeting can actually be a relatively affordable and effective way to spend your company\'s marketing budget, to say nothing of the money you can save in travel expenses by having your staff attend a local meeting instead of one far away. Previous meeting hosts will be available to share their experience, and Merit staff will also be on-hand to provide advice and commentary on requirements and logistics. Anybody who has ever wondered what it would take to host a NANOG meeting is most welcome to attend.

    View full abstract page.
    • Joe Abley, Afilias Canada.
    youtubeHow to Host a NANOG Meeting
    pdfJoe Abley BOF Presentation(PDF)
    4:00pm - 5:30pmSheraton Hall EPeering BOF XIV (Part 2)Speakers:
    • Bill Norton, Equinix.
    • Christopher Quesada, Switch & Data.
    Wednesday, February 7 2007
    Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
    8:00am - 9:00amOsgoode FoyerContinental Breakfast
    9:00am - 9:30am 

    Supporting Hybrid Services at an International Exchange Facility: The Experience of Pacific Wave

    Network infrastructure case study, recently presented to a research-focused audience (CANS 2006, Chicago, 8-Dec-06). Goals of the project included proof of concept for international facilitation of any-to-any connectivity without direct connection of layer-2 switching devices, encounters with shared and private VLANs intersite, in-region, across multiple states and more.

    View full abstract page.

    • Dave McGaugh, Pacific Northwest Gigapop
    • Dave McGaugh is part of the Network Architecture & Design group at University of Washington where his primary responsibilities include high-level design and technical direction for Pacific Northwest Gigapop (PNWGP) and Pacific Wave. This includes the PNWGP regional IP network, and the Pacific Wave international exchange facility for lightpath grooming and layer-3 interconnection. Current work includes testing and design of the PNWGP next generation network using MPLS VPNs, the TransitRail peering initiative, Pacific Wave GOLE enhancements, and regional Metro Ethernet deployments.
    pdfDave McGaugh Presentation(PDF)
    youtubeSupporting Hybrid Services at an International Exchange Facility
    9:30am - 10:00amOsgoode Ballroom

    Beyond 200 Gbps

    An overview of past scaling hurdles at AMS-IX (the Amsterdam Internet Exchange, a layer-2 platform interconnecting hundreds of ISPs, webhosters, content providers and other parties) and upcoming performance walls to scale.

    View full abstract page.
    • Niels Bakker, AMS-IX.
    youtubeBeyond 200 Gbps
    pdfNiels Bakker Presentation(PDF)
    10:00am - 10:30amOsgoode BallroomOpenCALEA: Pragmatic Cost-Effective CALEA complianceSpeakers:
    • Manish Karir, None.
    pdfManish Karir Lightning Talk(PDF)
    youtubeOpenCALEA: Pragmatic Cost-Effective CALEA compliance
    10:00am - 10:30amOsgoode BallroomSecuring the Routing Infrastructure - Status and Request for CommentsSpeakers:
    • Sandra Murphy, None.
    pdfSandra Murphy Lightning Talk(PDF)
    youtubeSecuring the Routing Infrastructure - Status and Request for Comments
    10:00am - 10:30amOsgoode BallroomThis weeks DDoS against the root and TLDsSpeakers:
    • Dave Knight, None.
    pdfDave Knight Lightning Talk(PDF)
    10:30am - 11:00amOsgoode FoyerBreak
    10:30am - 11:00amSheraton Hall FPGP Key SigningSpeakers:
    • Majdi Abbas, Lattice Networks.
    11:00am - 11:30amOsgoode Ballroom

    sFlow Why you should use it and like it

    sFlow is a standards based protocol for exporting flow information from routers and switches, for the purposes of external analysis. This presentation addresses some of the advantages of sFlow over various versions of competing protocols like NetFlow, and provides working code for a very efficient C library to parse sFlow messages.

    View full abstract page.
    • Richard A. Steenbergen, nLayer Communications.
    pdfsFlow - Why you should use it and like it(PDF)
    youtubesFlow Why you should use it and like it
    11:30am - 12:00pmOsgoode Ballroom

    Introduction to Fast Convergence with Bidirectional Forwarding Detection (BFD)

    Bidirectional Forwarding Detection (BFD) is becoming a must deploy feature for fast failure detection not only in internet access solutions but even more in hosted VPN services. BFD is for detecting faults in the bidirectional path between two forwarding engines with very low latency. This presentation will cover the motivations behind BFD, similar technologies, and the problems that BFD is supposed to solve (and not solve). Additionally, the application of BFD to various topologies (shared, point to point, sub-interfaces) and technologies (eg, Gracefull-restart) will also be covered. <BR><BR> An in-depth look of the packet flow for various types of BFD will be provided as well as sample configurations. The design of BFD is meant facilitate implementations tightly coupled with hardware, and therefore, various implementation design patterns will be discussed (ie distributed platforms etc).

    View full abstract page.

    • Aamer Akhter, Cisco Systems
    • Aamer Akhter, joined Cisco Systems, Inc. in 1998 after graduating from Georgia Tech with a Bachelor's of Science in electrical engineering. After joining the Technical Assistance Center (TAC), he has worked in various capacities for cisco supporting large service provider and enterprise customers, as well as testing, designing and deploying several large Layer 2 and MPLS/VPN networks. Mr. Akhter is currently working as a technical marketing engineer in the areas of Network Virtualization, Wan-Optimization and router instrumentation. He is CCIE number 4543.
    youtubeBidirectional Forwarding Detection (BFD)
    pdfBidirectional Forwarding Detection (BFD) Presentation(PDF)
    12:00pm - 12:30pmOsgoode Ballroom

    Foray into MPLS

    Discussing operational issues arising from architectural decisions made in an MPLS-TE enabled network.

    View full abstract page.
    • Guy Tal, Limelight Networks.
    youtubeForay into MPLS
    pdfGuy Tal Presentation(PDF)
    12:30pm - 12:45pmOsgoode BallroomClosing RemarksSpeakers:
    • NANOG Staff, None.
    youtubeClosing Remarks


    ^ Back to Top