Picture

Tuesday Tutorial Descriptions [ Feb. 17, 1998 ]

Rectangle

| HOME | ABOUT APRICOT | SCHEDULE OF EVENTS | SPONSORSHIP | TUTORIALS  |CONFERENCE | SOCIALS |                | PHILIPPINES | about MAKATI | TOURS | HOTELS | REGISTRATION | APRICOT 97 | APRICOT 96 | LATEST NEWS |

Encryption and Firewalls

Instructor: Danny Smith

Who should attend?

Staff who are required to install firewalls and encryption tools.  In particular, any staff from organisations that are purchasing security solutions will benefit from this tutorial.

Topics will include:

  • Design of ciphers
  • Types of cryptosystems
  • Examination of popular ciphers
  • Cryptographic protocols
  • Speech encryption
  • Example use of PGP
  • What a firewall can and can't do
  • Firewall designs
  • Problems relating to firewalls
  • Location of firewall installations
  • Firewall maintenance

After completing this tutorial?

Attendees will have a better understanding of cryptographic algorithms, tools, protocols, and products.  Attendees will have a better understanding of the issues relating to the installation and maintenance of firewall and other boundary protection systems.

Rectangle

SPAM (in Mail and Usenet)

Instructor: Justin Newton

Who should attend?

Internet service provider postmasters and individuals operating mailing lists.

Description:

This tutorial will describe the tools and techniques useful in combating SPAM (unsolicited commercial electronic mail colloquially known as "spam").

Topics will include:

  • Overview: history; legal and financial issues
  • Preventing unintended relay by mail servers
  • High speed robotic spam detection and cancellation in
  • Usenet  servers
  • The MAPS RBL (mail abuse prevention system - real-time blackhole list)
  • Application layer filtering techniques
  • IP layer filtering techniques
  • Anti-UCE policies
  • Anti-UCE groups

After completing this tutorial:

Attendees will have the skills and technologies necessary to reduce or eliminate SPAM that would otherwise affect them or their users.

Rectangle

WWW Caching and Web Server Techniques

Instructor: Stewart Forster

Who should attend?

Current and future proxy web cache maintainers who are looking for ways to save money on bandwidth costs through web caching technology

Description:

This tutorial will focus on the 'care and feeding' of proxy web caches with a strong focus on the publicly available Squid proxy cache software. The implications for web caching are substantial savings (of up to 60%) of external Web based bandwidth costs as well as substantial speedups of Web transfers providing large benefits for companies attached to the Internet today. The tutorial will be of a fairly technical content and is recommended for those will be ACTIVELY involved in maintaining such software. Attendees should have some experience with general system management. There will be no hands-on training.

Topics will include:

  • An introduction to caching
  • The squid cache software
  • Squid's features and functionality
  • Rightsizing hardware for intended load
  • Optimizing of parameters
  • Problems that can arise
  • Security
  • Remote maintenance
  • Statistics gathering & reporting
  • Future trends in caching
  • A case study of the caching implementing at Connect.com.au

After completing this tutorial:

Participants will be fully equipped with the ability to set up and successfully maintain a proxy web cache of their own and be prepared for the issues that they will face in doing so.

Rectangle

Advanced Internet Routing

Instructor: Ron Masson

Who should attend?

Network engineers operating large networks and wanting to increase their advance network knowledge.

Description:

This tutorial will be in two sections, BGP4 and IP Multicast routing.

Topics will include:

OSPF

When should I use OSPF?  Why?             OSPF Protocol Overview

  • Link State vs Distance Vector Routing Protocols
  • How does it work?
  • Forming Adjacencies
  • OSPF Message Formats, etc.

Different Types of OSPF Networks

  • Broadcast, Point-to-Point, Point-to-Multipoint, NBMA
  • Hierarchical Routing - OSPF Areas
  • Stub Areas & Not So Stubby Areas (NSSA)

Different Types of OSPF Routers

  • Internal, Backbone, ABR, ASBR
  • Virtual Links

Advanced OSPF Concepts

  • Route Summarisation
  • Importing External Routes into OSPF
  • Route Policy Filtering
  • Multicast OSPF (MOSPF)
  • QOSPF

Trouble shooting Common OSPF Problems   Practical Session:  OSPF Design Scenario

 

BGP4

Do I need to use BGP4?                          Possible Design Scenarios

  • Single-Homed (Stub) AS
  • Multi-Homed Non-Transit AS
  • Multi-Homed Transit AS

BGP4 Protocol Overview

  • How does it work?
  • BGP Message Formats, etc.

IBGP vs EBGP

  • Tuning BGP4
  • Controlling BGP Routes with BGP Attributes
  • Route Filtering
  • BGP4 Aggregation & CIDR
  • Policy Routing

BGP4 Design Considerations

  • Interaction of BGP and Non-BGP routers
  • Route Dampening
  • Redundancy
  • Load Balancing

Techniques for Building Large Autonomous Systems

  • Route Reflectors
  • Confederations

Practical Session:  BGP4 Design Scenario

Depending on the interaction and audience participation in the OSPF and BGP4 sections of this tutorial,

IP Multicast Routing

What is IP Multicast?

  • Multicast Address Allocation
  • Multicast Forwarding vs Multicast Routing
  • Mbone Update

Overview of the Internet Group Management Protocol (IGMP)                                     Overview of Multicast Routing Routing Protocols                                                            Two Basic Types of Multicast Routing   Protocols:

  • Broadcast & Prune (Source-based Trees)
  • Shared Tree
  • Explicit vs Implicit Joining

 

Explore the Strengths & Weaknesses of the following protocols:

Distance Vector Multicast Routing Protocol (DVMRP)

  • Tunneling multicast traffic through unicast routers

Multicast OSPF (MOSPF)                       Protocol Independent Multicast

  • Dense Mode
  • Sparse Mode

Core Based Trees (CBT)

After completing this tutorial:

Attendees will have indepth knowledge on BGP 4 and IP Multicast routing and be able to undertake  advanced network configurations.

Rectangle

Switches and Routers

Instructor: Scott Bradner

Who should attend?

This tutorial is best suited for individuals involved in evaluating technologies used to build and interconnect networks.

Description:

Corporate and university data network design has evolved from bridged LANs to complex router- and switch-based internets.  The underlying technology has increased in speed to a hundred or more times what it was only a few years ago.  Network security has emerged as a major concern since these once stand-alone networks are now more often than not part of the global Internet.  Network management has become a very high priority activity because today's corporations depend on their data networks for their basic operations and even short outages can cause significant problems.  Network architecture must balance the requirements for high reliability and
availability against limited resources and unlimited expectations. Corporate management is beginning to plan on the merger of the existing voice, video and data networks, assuming the existence of technology to control the quality of service provided to the network users. At the same time the Internet has evolved from a restricted use research network connecting a few hundred computers to a global information infrastructure interconnecting millions of computers and struggling to support the ever growing demands of general commerce.

This tutorial is designed to address these changes in the role of data networks, and to provide an understanding of the design and management issues of modern data networks.  It will help set realistic expectations about the state of current technology and potential of the currently envisioned future technology.

Topics will include:

  • Network Technology: detailed operational descriptions of current networking
    technology including 10Mb, 100Mb, and gigabit Ethernet, ATM, frame relay,
    xDSL, token ring, ISDN, SONET and other WAN link protocols.
    Device Technology: descriptions of the design and operation of Ethernet and
    token ring frame switches, ATM switches, "level 3" switches and routers.
  • Management: Network management concepts and procedures including a
    description of the design and operation of SNMP, ticket systems, SNMP-based
    polling and statistics systems, some suggestions about real-world network
    operations techniques, and defensive network design to minimize the
    requirement for network management
  • Quality of Service: requirements for QoS in modern networks, descriptions of
    the IP (RSVP) and ATM QoS technologies and their operation and application

    Examples: Case studies of representative data networks including three
    universities, two corporations and a regional Internet service provider.

    Routing: Detailed descriptions of distance vector and link-state routing
    protocol operation and information about many of the currently used routing
    protocols including RIP, RIPv2, OSPF and BGP4.  Description and rational
    behind Classless Inter-Domain Routing (CIDR) addressing.

    Security: Data network security concepts and procedures including
    descriptions of the operation of symmetric and asymmetric encryption
    protocols, Kerberos, PGP, certificate systems, and web browser security.
  • Routers and gateways
  • Fast and gigabit Ethernet

After completing this tutorial:

Attendees will have detailed knowledge of the current state of the market with respect to the basic underlying building blocks of Internetworks.

Rectangle

Introduction to Internet Policy and Regulations

Instructor: Laina Raveendran Greene

Who should attend?

This tutorial is geared for techies, businessmen and lawyers unfamiliar with the Internet, to provide an introduction to policy and legal issues that may be relevant to them.

Description:

In today's commercialization of the Internet, policy and regulatory issues have become very intertwined with technical and business issues. Policies and regulations are still being made, often having great business and technological impact, and it has become increasingly important for techies and businessmen alike to familiarize themselves with this other dimension of the issues.

It is also imperative that if techies and businessmen alike want to have their say in policy and regulatory issues, that they do not consider these issues outside their purview of understanding and leave it to the lawyers to figure these issues out for them.

GetIT strongly believes that in this industry, it is imperative that a multi-disciplinary participation in policy and regulations making.  Should be pursued. GetIT is committed to empowering individuals with the tools of understanding to be more effective in making a difference. This tutorial is part of GetIT's efforts to encourage a greater voice for the Asia Pacific region in other policy-making forum such as in the US, as it has done through APPLe.

GetIT Pte Ltd. has gained much experience dealing with policy and regulatory issues of both the telecommunications and Internet world for the past 12 years. With convergence of technology, and with the advent of Internet voice, multimedia, etc it has become imperative to look at issues from a new perspective, yet learning from the experiences of both the telecom and the Internet world. Given the recent focus on applications of both technologies such as Electronic Commerce, it has also become important to understand many other formally unrelated areas of the law are becoming relevant, such as copyrights and trademarks.

Topics will include:

  • Overview of telecom regulations
  • Overview of Internet regulations
  • Internet Governance
  • Content regulation
  • Cross border enforcement of laws
  • Trademarks and Domain Names
  • The various Electronic Commerce Laws currently being proposed

After completing this tutorial:

Attendees will have a better understanding of how the various controversial issues fit together, how it may have any relevance to them and where they  can look to get more information. In short, the tutorial will provide a  framework of understanding policy and regulatory issues.

Rectangle

Promoting Routability

Instructor: Anne Lord and Philip Smith

Who should attend?

Anyone, such as network engineers and network operators, who is involved in aspects of the design, management or operation of an ISP network. Pre-requisite is a knowledge of basic Internet routing and terminology.

Description:

The tutorial introduces the concept of an Internet Routing Registry (IRR), what it is intended for, its usefulness in day to day operations, and how the IRR is vital to the functioning of the Internet. It will examine and demonstrate the many tools that are available to define and aid understanding of policy based routing. Routing netiquette issues of central importance to ISP's, such as dampening, filtering and CIDR are also covered.

Topics will include:

  • Routing Terms and Concepts
  • IP forwarding versus IP routing
  • Policy based routing (transit, multihoming)
  • Overview of the Internet Routing Registry (IRR)
  • History and Development.
  • Objects and Syntax (ripe-181, RPSL)
  • Registering and Updating Information.
  • Routing Registry tools for Network Operators
  • The RAToolset (aoe, roe, rtconfig, CIDRAdvisor, prtraceroute, etc)
  • Whois (RIPE enhanced)
  • Routing Etiquette
  • CIDR/aggregation and renumbering
  • Filtering policy (prefix and/or AS)
  • Stability and dampening
  • Future of the IRR
  • Direction
  • Improved usability
  • Universal adoption

After completing this tutorial:

Attendees will be able to use the Internet Routing Registry to register routing policy. They will also know how to simplify the management of routing information and configuration, and diagnose and solve routing problems more easily. They will be aware of some of the issues affecting the Internet today, and how they can make a useful contribution to the seamless functioning of the Internet.

Rectangle

Internet QoS and Traffic Management

Instructor: Paul Ferguson and Geoff Huston

Who should attend?

Network architects and engineers interested in investigating the use or potential of differentiated quality of service within their network.

Description:

This session provides an overview of various Quality of Service mechanisms, their effectiveness, and the roles that proper network design, architecture, and on-going traffic engineering play in effectively deploying a successful QoS strategy.

Topics will include:

  • The IETF's Integrated Services architecture (including RSVP)
  • Network Layer differentiated services
  • QoS and ATM
  • Traffic engineering
  • Capacity planning
  • Other related issues

After completing this tutorial:

Attendees will understand the issues and technologies involved in designing and implementing differentiated services over the Internet.

Rectangle

Unix Power Tools II

Instructor: Evi Nemeth

Who should attend?

Senior Systems Administrators and individuals with experience managing small Unix-based networks.

Description:

Following on from Monday this tutorial will discuss advanced UNIX tools and system configuration, security audit, automated network monitoring and in general how to maximize the performance of your UNIX system.

Topics will include:

  • Server Performance - Years ago, sinking more money into a bigger CPU was often the fix for performance problems. With CPUs outperforming many other aspects of machines today, performance problems most often appear in areas such as network bandwidth, software optimization, memory usage, and system configuration. Learn how to tune your modern UNIX box to get the most bang for your buck.
  • Security Auditing 101 - So, you've done everything the experts recommend and more to secure you site.  Now, how do you measure how secure your site really is?  We'll take you through the anatomy of a security audit from start to finish.
  • Network Monitoring - Bigger networks need bigger management tools. Until recently, automated network monitoring has been implemented as a mish-mash of home grown tools at most sites.  Now there are a number of "production" quality tools available both commercially and from the net.  We'll explain what these a number of these tools really do and show you a comparison between them.
  • Squid cache - The squid internet object cache is a very high-performance proxy caching system for web clients.  When deployed correctly, it can drastically improve the performance of your network and reduce the need to purchase external bandwidth.  We'll talk about how implement this hierarchical tool at your site in a practical manner.
  • Samba - Being invaded by PCs on your network?  This system can help you integrate both existing and future UNIX file-sharing and print-sharing systems with PCs on your network - without pain!  Learn how to plan, configure, and manage integrated PCs with Samba on your network.

After completing this tutorial:

Attendees will have the latest skills and techniques necessary to administer networks of Unix systems of any size.

DAILY SCHEDULE

MONDAY TUTORIALS [ Feb.16, 1998 ]

TUESDAY TUTORIALS [ Feb.17, 1998 ] 

INSTRUCTORS

| TOP |

• Last updated on Feb. 11, 1998 •