APRICOT 2006 Program > Conference
When: Wednesday
1 March 2006 9:00 - 10:30 |
Several proposals have but put forth for improving the security of routing in the public Internet, e.g., S-BGP, soBGP, and SPV. The ultimate goal of these proposals is to enable ISPs to verify the legitimacy of route advertisements received via BGP UPDATEs. A first step toward this goal is enabling an ISP to verify that an Autonomous System (AS) is authorized to originate routes to specified blocks of IP addresses. This presentation describes a PKI designed to support these goals, through the issuance of X.509 digital certificates to resource holders. It makes use of the certificate extension defined in RFC 3779, to represent address space and AS number allocations. The PKI parallels the existing organizational structure by which these resources are managed (RIRs, LIRs/NIRs, and ISPs), hence no new "trusted" entities are introduced. Unlike a conventional PKI, this one does not issue certificates to identify resource holders, but rather enables Route Origination Authorizations (ROAs) to be verified as having been digitally signed by the resource holder, whoever that may be. A repository system for distribution of the PKI data, and ROAs is also described. About the Speaker
|
When: Wednesday
1 March 2006 9:00 - 10:30 |
One of the more persistent themes of the communications industry is that of "convergence". The term has had a long and rich history, and in its most recent incarnation convergence is being associated with the delivery of voice, video and data services. IP is, of course, heavily implicated here as the foundation technology of a new generation of converged service providers. Is convergence truly a major force in today's industry, and what other pressures are shaping the future structure of our industry? It appears that convergence is not delivering on its promises, and while the industry is undergoing yet another transformation, this has less to do with convergence and much more to do with deregulation, fragmentation and associated pressures for role specialization within the industry. What is the future of the traditional monolithic carrier in tomorrow's unconverged world? About the Speaker
|
When: Wednesday
1 March 2006 11:00-12:30 |
At APRICOT2004 and APRICOT 2006 we highlighted the operations and peering challenges facing ISPs building into and within Asia, sharing the collective experiences of the Peering Coordinators in the room. In this session we will focus on evolution - in order to continue forward it is sometime useful to reflect on the past. A Historical perspective An Australian Historical Perspective Best Current Practices in Peer NOC-to-NOC Communications |
When: Wednesday
1 March 2006 14:00-15:30 |
This talk is based on recent research with the peering coordinator community and highlights the strongest arguments for and against using peering ratios to discriminate peering candidates. The audience will decide which side of the argument is stronger by a show of hands at the end of the talk. Peering from a Content Provider perspective The Folly of Peering Ratios? International Peering Dynamics |
When: Wednesday
1 March 2006 16:00-17:30 |
Bring your wireless-enabled laptop computers to interact with this new Interactive Peering Simulation! The Peering Simulation Game has been re-engineered so the players and the audience members fire up their java-enabled browsers and participate interactively with the newest incarnation of the Peering Simulation Game. Four players from the audience will bring up their laptops and play the role of Peering Coordinator, building out their networks, managing their transit commits, building into Internet Exchanges (if it makes financial sense) and neogitating *paid* peering. As the ISPs build out, and the peerings are established, all laptops are updated in real time. The audience plays the role of The Market, helping decide which players get bonus customers and traffic, which ones suffer equipment failures, etc. There is of course a twist or two in the game. First, the players now make their moves at the same tme, and all player and audience screens are updated in real time. Second, the audience has complete information - they can see the relative strengths of the players, as well as the players future rolls, but the players have only a limited view into the other players negotiating position. Third, the ISPs can steal each others customers! They can offer a lower price to sway the customers. ISPs can apply "Customer Care" to protect their customers from being stolen, which can be countered by applying "Taint" to help encourage a customer to leave a "bad" ISP. These peering and competitve dynamics mimic the real world coopetition that ISPs face every day. In the five years of evolution of this game, we have seen that the negotiations carried out in the game are strikingly similar to peering negotations in the real world. This is a not a presentation ! Aside from the 5-10 minute introduction to "What is Peering? and How do we play the Peering Simulation Game?", the players and audience members (along with the faciliator) will provide the content and discussion. This is a highly interactive and audience involved participation game that helps teach how peering really works.
|
When: Wednesday
1 March 2006 11:00-12:30 |
BOTNET
Activity & Mitigation |
When: Wednesday
1 March 2006 14:00-15:30 |
An open
discussion on antispam blocklists, from an operator perspective. |
When: Wednesday
1 March 2006 16:00-17:30 |
Tightening
the Net: A Review of Current and Next Generation Spam Filtering Tools Technical initatives to combat spam |
When: Wednesday
1 March 2006 11:00-12:30 |
IPv4
Address Exhaustion IP Addressing design Internet Resource Management - Past lessons and current policies in the Asia Pacific
|
When: Wednesday
1 March 2006 14:00-15:30 |
Broadband
Access Networks and Triple Play DSL deployment lessons learnt Design considerations for delivery of Triple Play Services
over Access Networks Metro Ethernet |
When: Wednesday
1 March 2006 16:00-17:30 |
Large
hotel wireless network deployment Mobile and Wireless Technologies for Service Providers Internet and Wifi Development on a Remote Island |
When: Wednesday
1 March 2006 18:00-19:00 |
Security incidents are a daily event for Internet Service Providers. Attacks on an ISP's customers, attacks from an ISP's customer, worms, BOTNETs, and attacks on the ISP's infrastructure are now one of many "security" NOC tickets through out the day. This increase in the volume and intensity of attacks has forced ISP's to spend constrained resources to mitigate the effects of these attacks on their operations and services. This investment has helped minimize the effects of the attacks, but it has not helped stop them at the source. Stopping attacks at their source requires rapid and effective inter-ISP cooperation. Hence, these ISP Security BOFs are also used as a face-to-face syncup meeting for the NSP-SEC forum. Additional information can be found here: https://puck.nether.net/mailman/listinfo/nsp-security If you would like to contribute to the BOF, please send email to danny [at] arbor.net |
When: Thursday
2 March 2006 9:00-10:30 |
DNSSEC
Implementation and Issues DNS Anycast Service Provision Best Practices The CODEV-NIC DNS registry software |
When: Thursday
2 March 2006 11:00-12:30 |
A technical and functional description of the SIP-IX framework that NeuStar is deploying. INOC-DBA (Inter-NOC Dial-by-ASN ) Current VoIP activities in NZ |
When: Thursday
2 March 2006 14:00-15:30 |
Softbank BB is a successful venture ADSL carrier who holds the most number of ADSL users in Japan with their brand-new full IP network. They have been really active in providing contents over their network. In this session their contents services are introduced. + BBTV Broadband Service About the Speaker
|
When: Thursday
2 March 2006 14:00-15:30 |
Myths
and Realities: How the government regulates what Australians see on
the internet In 1999, the internet industry in Australia, when first presented with the prospect of mandatory filtering of internet content to protect children, responded by develop three industry codes of practice. These were registered by the national regulator, the Australian Broadcasting Authority (ABA), and only after passing a strict adequacy test in relation to community safeguards. Co-regulatory legislation makes the Codes legally enforceable by the ABA and large penalties exist for non compliance. Under the Codes, ISPs must provide for use tools and information to enable customers to better control of content accessible in the homes. To further promote the empowerment solution, the IIA introduced the Family Friendly ISP scheme in 2003. This scheme has bipartisan political support. It entitles Code-compliant ISPs to display a ‘ladybird’ seal on their sites, signifying to families their entitlement to the kind of protection and assistance that the Codes mandate. Importantly, further revisions to the Codes currently in progress extend the basic model to cover content accessible through convergent mobile devices which are now coming into use. This paper considers the challenges to internet regulation based on
the Australian experience and expounds co-regulation framework as an
appropriate About the Speaker
|
When: Thursday
2 March 2006 16:00-17:30 |
The National University of Singapore Data Centre is a 24-hours non-stop high-availability nerve centre for the IT operation and communication backbone for the National University of Singapore. It is purpose-built with advanced temperature and humidity control, fire detection and suppression systems, UPS and standby power generators, access control security system, as well as a diverse routing of communications. With a nett floor area of 720m2 and a floor loading of 7.5kN/m2, NUS Data Centre hosts a total of more than 200 servers with 61 Terabytes of raw data storage as well as a core communication backbone with 24 Gigabits of aggregated bandwidth. The centre supports a myriad of IT services and applications like Internet, Email, e-Learning, wireless connectivity, video conferencing, student admission, course registration, student feedback, class timetabling, digital library, alumni portal, and many other human resource and financial related applications. Combined with an access controlled media library that is equipped with an independent temperature and humidity control, NUS Data Centre ensures that critical backups are safely secured and retrieved when needed. NUS Data Centre also provides the University with a globally connected campus via highspeed network connections to the Singapore Government Network (SGNet) and Internet-II networks in Australia, China, Japan and the United Kingdom. Each day, it serves hundreds of thousands of requests and transactions from students, staff and visitors from all over the world. NUS Data Centre…Connecting the Future… About the Speakers
|
When: Thursday
2 March 2006 16:00-17:30 |
Application optimization, high availability, scalability and security are the key requirements for today's Data Center network designs. This session presents several design options when deploying network based application optimization and security services. The session focuses on the integration of Content Switching (SLB), SSL off load and Firewall technologies within a Data Centers. Deployment examples will be based on the Content Switching Module, SSL Service Module, Firewall Service Modules on the Cisco Catalyst 6500. The advantages and disadvantages of each design approach and technology will be covered in detail together with some configuration example. The ideas of secure internal segments and significance application flow will be covered to understand the requirements of the enterprise. About the Speaker
|
When: Wednesday
1 March 2006 11:00-12:30 |
How to manage a network with 100+ million IP addresses in the next few years? When Net10 does not cut it anymore, the sensible answer for Comcast is IPv6. Comcast is one of the first operators to adopt IPv6 as a strategic activity with an aggressive roll-out plan. In its initial phase, this plan focus on the management and operation of Comcast operated devices, like cable modems and set-top boxes. Key architectural choices are made to reduce the complexity of the overall deployment. About the Speaker
|
When: Wednesday
1 March 2006 11:00-12:30 |
V6 routing will cover OSPFv3, ISIS enhancements to carry v6 routes and BGP changes. Protocol that is gone through a major rewrite is OSPF, we will look into OSPF how the changes affect the protocol and address the limitation of OSPFv2. We will also look at all the link states and how they are different then v2 plus new LSA types that are specific to V3 only. Presentation will cover ISIS new TLV's added to the protocol for v6. We will also look at MPBGP and how AF v6 works on top of MPBGP. About the Speaker
|
When: Wednesday
1 March 2006 14:00-15:30 |
In the past ten years a multitude of IPv6 transition terchnologies have been proposed. This presentation examines what technologiesd are gaining acceptance in the industry and which ones are being abandoned. The application of these technologies and the approaches to transition are also examined. About the Speaker
|
When: Wednesday
1 March 2006 14:00-15:30 |
"The most important stuff people should know about multicast today (but will have a hard time to figure out just from IETF specs), and some cool new stuff too that's also interesting for IPTV ... bot not everything ;-(" About the Speaker
|
When: Wednesday
1 March 2006 16:00-17:30 |
A presentation indicating recent advances in BGP protocol. Description of new BGP address families along with the functionality provided by them. New dynamic embedded tools for efficient and very flexible multihoming technics. Tools and recommendations to optimise network end to end convergence for both IPv4/v6 as well as vpnv4/v6 applications. About the Speaker
|
When: Wednesday
1 March 2006 16:00-17:30 |
This presentation will introduce what we've done to implement and operate IPv4/IPv6 network in large scale network, for the people who has some experience on designing/operating medium to large scale IPv4 network. This covers, IPv6 characteristics you have to think of when you design large scale IPv6 network, difference between IPv4 and IPv6 which appears when deploying IPv6 into existing IPv4 network with no service interruption, and practical issues on operating IPv6 network. About the Speaker
|
When: Wednesday
1 March 2006 16:00-17:30 |
For service providers, applications such as IPTV and VOIP are becoming increasingly important in Next Generation Converged Networks. For successful deployment of such applications, fast repair in case of network or link element failure is becoming a critical piece. This presentation will focus on different methods and design solutions,
which will help in network fast repair. In more details we will look
at: About the Speaker
|
When: Thursday
2 March 2006 9:00-10:30 |
Network administrators typically number (i.e., configure IP addresses on) all directly connected interfaces of an IPv4 router. This talk examines this practice, and assesses its pros and cons, and suggests some alternatives. As this practice is fairly deeply rooted, this talk challenges some of the assumptions and deliberately attempts to stir up thinking on this front. Open discussion is invited. Topics include: why number? why go unnumbered? when can one go unnumbered? what are some restrictions of going unnumbered? is there a middle ground? what other alternatives exist? what lies beyond going unnumbered? About the Speaker
|
When: Thursday
2 March 2006 9:00-10:30 |
"Service Control Technologies Peer-to-peer traffic in next generation networks", Lior Gendel, Oren Raboy, Mallik Tatipamula, Cisco systems; Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano, Toru Hasegawa, KDDI labs. Peer-to-peer (P2P) traffic consumes network resources without creating additional revenue. It is allegedly estimated that 70 percent or more of broadband bandwidth is consumed by downloads of music, games, video, and other content. Consumption will increase as P2P downloads multiply because of increases in subscriber adoption and file sizes. Identifying P2P applications is complex. Sophisticated P2P protocols can dynamically hop to different ports, making them difficult to detect, monitor, and control. Many existing devices and unsophisticated service control technologies lack the ability to detect changing P2P protocols, hampering a service provider's ability to cope with P2P application traffic. This paper discusses the problems associated with the growing popularity of P2P applications and presents two kinds of service control technologies. First one is deep packet inspection, which enables accounting and controlling traffic with application awareness to attain the bandwidth fairness among subscribers. This approach is effective but needs some consideration about the deepness of inspection not to infringe the privacy of communications. Second one is P2P cache inducing P2P traffic to local destinations, which can mitigate inter-domain traffic. This caching architecture is P2P protocol independent but provides only rough traffic control. We also address the possibility of harmonized service control architecture for next generation network infrastructure. About the Speakers
|
When: Thursday
2 March 2006 11:00-12:30 |
For most Internet Service Providers the majority of their traffic enters or leaves the network via BGP enabled peerings or upstream provider(s). Not only do these links need to have enough capacity during normal operation, they also need to provide redundant capacity during link failures. For the egress traffic (service provider to remote peer) this can be easily verified by simulating the rerouting under failure, as the topology of the network is completely known. The return traffic (remote peer to service provider) however can not be simulated, as the behavior of the remote network is not known. This creates a gap in the planning process for external peering links. In this talk we present a simple methodology for creating 'Failover Matrices' that describe the traffic redistribution under peering link failure conditions. the matrices provide a useful mechanism for sharing information and improving the mutual planning process without disclosing any proprietary information. We will describe the principles behind the process as well as walk through a real scenario. About the Speaker
|
When: Thursday
2 March 2006 11:00-12:30 |
IP Fast Reroute
technologies aim to provide traffic restoration within a few tens of
milliseconds. Similar technology has been already developed and deployed
using MPLS and now IPFRR delivers the same capability to IP networks
or IP+MPLS networks but where RSVP is not deployed. IPFRR also provides
protection for multicast traffic. This presentation gives an overview
on the current IETF proposals in terms of architecture as well as the
Cisco view on these technologies. The presentation covers multiple aspects
including: About the Speaker
|
When: Thursday
2 March 2006 14:00-15:30 |
In this talk we discuss a methodology and tool to construct an AS-level model of the Internet topology. The aim of this work is to be able to simulate the inter-domain routing system in such a way that we can predict the results of topology and/or policy changes. With such a tool operators could ask "what-if"-questions, for example: "What impact does a new (or cancelled peering) have on inter-domain traffic flows"? "To which peer/upstream should I connect, given a certain traffic profile"? "What impact has a change in the connectivity of transit networks on my AS"? To answer such questions we use large-scale simulations. Recent advances in simulation techniques allow us to compute Internet-wide routing models in reasonable time. As input to our simulation, we use BGP routing tables gathered at different vantage points. We start off with a simplified model that matches all observed paths without having to handle the coarser policies applied in the Internet that lead to the observed paths. From there we go on and use heuristics to correlate the information that is available using many observation points and many different prefixes. This gives us insights about how policies might affect routing in the Internet in general and at which granularity policies are actually applied at the AS-level. While our methodology is still work-in-progress, preliminary results show that we can expect to predict AS paths between two ASs with accuracy above 87%. To improve our methodology we seek feedback from the network community to understand what particular questions our tool should be able to answer. For more information about how we construct the inter-domain model, please see: http://home.in.tum.de/~muehlbaw/thesis.pdf About the Speaker
|
When: Thursday
2 March 2006 14:00-15:30 |
Pseudowire End to End Emulation (PWE3/PW) is gaining momentum. WAN deployments of PWE3 are currently enabling new Ethernet services and the opportunity to converge ATM, Frame Relay and other legacy services over a common MPLS core. The multi-service attributes of PWs and adaptability to different types of PSN tunnels are giving the technology strong consideration as a candidate to deliver convergence in metro access networks, either as an end to end service or as an aggregation for “new age” solutions: e.g. next generation optical transport, triple play, wireless backhaul. As PW technology moves from leading edge to mainstream and into the Metropolitan Area Network (MAN) a number of considerations are coming to the forefront: How can I keep my access network simple while deploying PWs? These requirements drive a need for a new breed of PWs that concatenates several PW segments together to form a Multi-Segment PW (MS-PW). This presentation starts by discussing the new requirements and motivations behind them with a particular focus on the need to provision and connect segments of a MS-PW in an operationally efficient manner. The presentation then discusses the mechanisms that provide solutions to the problem considering the latest IETF work and it concludes with an analysis of possible applications for these building blocks. About the Speaker
|
When: Thursday
2 March 2006 14:00-15:30 |
MPLS is no longer a technology just for Service Providers, and enterprise IT managers are beginning to be quite sophisticated consumers of it. Far from being a threat to Providers, this situation opens up a variety of possibilities for interesting hybrid service definitions, using MPLS capabilities in new and technically challenging ways. From enabling a customer's private network, to using inter-AS operations to peer with them at the MPLS NNI, to using carrier's carrier models to transport the MPLS backbone of a geographically disparate organization - there are many chances to offer customers excellent service helping them build a hybrid MPLS network. This presentation discusses the standards and practices you can use to build these networks, and offers practical advice and case studies from providers who have done it. About the Speaker
|
When: Thursday
2 March 2006 16:00-17:30 |
Network convergence naturally occurs to avoid the need for service specific infrastructures. However, as convergence occurs, the technology selected for the convergence layer (i.e. MPLS, IP, WDM, SDH, ATM) is influenced by the service mix that a carrier expects to carry in that particular portion of the network. This leads to different convergence technologies being chosen in different parts of the network. The selection of different convergence technologies doesn't change the fact that customers are still going to request services that traverse the entire network. Consequently, control plane mechanisms must support the routing of service requests through a series of regions using dissimilar convergence layers. To facilitate this, the control plane needs to understand the multi-layer structure of the network, and how services requests are routed. This talk will show how multi-layer routing methods can meet this requirement, and will include a discussion of the information necessary to represent the relationship between the resources in different layer networks. About the Speaker
|
When: Thursday
2 March 2006 16:00-17:30 |
Research into 18 months worth of BGP activity on an Australian ISP Backbone. This research shows a corrolation between the size of the routing table and the BGP updates created as the BGP table size increases. The reseach also investigates ways to minimise the effect of BGP updates on a core network, and attempts to determine what may happen if the BGP table continues to grow at it's current rate. About the Speaker
|
When: Thursday
2 March 2006 16:00-17:30 |
Today scaling layer 2 metro network is a challenge. Spanning Tree Protocol is not the most suitable means of deploying MAN. The speaker would discuss the problem he face while building MAN. He would also alternative using IP (layer 3) to address some of the issue. He would also share his experiences he encounter. He would quote case study and the direction his organization is moving ahead to achieve their goal of scaling MAN network. About the Speaker
|
When: Thursday
2 March 2006 11:00-12:30 |
SPs need tools, procedures, processes and training to survive today world of DOS, WORMs, VIRUSES, PHISHING, and BOTNETS. The presenter will review a SOC Starter Kit using freely available tools and techniques which would help an SP NOC, SOC, or Abuse Desk get an upper hands on today's threats. |
When: Thursday
2 March 2006 14:00-15:30 |
ISP Security
professionals encounter unique security incidents. Miscreants, extortion,
attacks on their infrastructure, law enforcement knocking on their doors,
rampant worms, botnets gone wild, and collateral damage that knocks
out multiple gig links are all types of incidents that an enterprise
security professional will never experience. "A Day in the Security
Life of an SP" is a new regular session given by service provider
security professionals to help the broader APRICOT operations community
learn about their colleagues' work, point out worries and concern in
the industry, and recommend actions that the community can take that
would make life easer. |
APRICOT 2006 |
|
|||||||||||||||||||||
|