|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tuesday Tutorial Descriptions [ Feb. 17, 1998 ] |
|
|
|
|
|
|
|
| HOME | ABOUT APRICOT | SCHEDULE OF EVENTS | SPONSORSHIP | TUTORIALS |CONFERENCE | SOCIALS | | PHILIPPINES | about MAKATI | TOURS | HOTELS | REGISTRATION | APRICOT 97 | APRICOT 96 | LATEST NEWS | |
|
|
|
|
|
Encryption and Firewalls |
|
|
Instructor: Danny Smith |
|
|
|
Who should attend?
Staff who are required to install firewalls and encryption tools. In particular, any staff from organisations that are purchasing security solutions will benefit from this tutorial.
Topics will include: |
|
|
- Design of ciphers
- Types of cryptosystems
- Examination of popular ciphers
- Cryptographic protocols
- Speech encryption
- Example use of PGP
|
|
|
- What a firewall can and can't do
- Firewall designs
- Problems relating to firewalls
- Location of firewall installations
- Firewall maintenance
|
|
|
|
|
|
|
After completing this tutorial?
Attendees will have a better understanding of cryptographic algorithms, tools, protocols, and products. Attendees will have a better understanding of the issues relating to the installation and maintenance of firewall and other boundary protection systems. |
|
|
|
|
|
|
|
SPAM (in Mail and Usenet) |
|
|
Instructor: Justin Newton |
|
|
|
Who should attend?
Internet service provider postmasters and individuals operating mailing lists. |
|
|
|
Description:
This tutorial will describe the tools and techniques useful in combating SPAM (unsolicited commercial electronic mail colloquially known as "spam"). |
|
|
|
Topics will include:
- Overview: history; legal and financial issues
- Preventing unintended relay by mail servers
- High speed robotic spam detection and cancellation in
- Usenet servers
- The MAPS RBL (mail abuse prevention system - real-time blackhole list)
- Application layer filtering techniques
- IP layer filtering techniques
- Anti-UCE policies
- Anti-UCE groups
|
|
|
|
After completing this tutorial:
Attendees will have the skills and technologies necessary to reduce or eliminate SPAM that would otherwise affect them or their users. |
|
|
|
|
|
|
|
WWW Caching and Web Server Techniques |
|
|
|
|
|
|
|
Who should attend?
Current and future proxy web cache maintainers who are looking for ways to save money on bandwidth costs through web caching technology |
|
|
|
|
Description:
This tutorial will focus on the 'care and feeding' of proxy web caches with a strong focus on the publicly available Squid proxy cache software. The implications for web caching are substantial savings (of up to 60%) of external Web based bandwidth costs as well as substantial speedups of Web transfers providing large benefits for companies attached to the Internet today. The tutorial will be of a fairly technical content and is recommended for those will be ACTIVELY involved in maintaining such software. Attendees should have some experience with general system management. There will be no hands-on training. |
|
|
|
|
Topics will include:
- An introduction to caching
- The squid cache software
- Squid's features and functionality
- Rightsizing hardware for intended load
- Optimizing of parameters
- Problems that can arise
- Security
- Remote maintenance
- Statistics gathering & reporting
- Future trends in caching
- A case study of the caching implementing at Connect.com.au
|
|
|
|
|
After completing this tutorial:
Participants will be fully equipped with the ability to set up and successfully maintain a proxy web cache of their own and be prepared for the issues that they will face in doing so. |
|
|
|
|
|
|
|
|
Advanced Internet Routing |
|
|
Instructor: Ron Masson |
|
|
|
Who should attend?
Network engineers operating large networks and wanting to increase their advance network knowledge.
Description:
This tutorial will be in two sections, BGP4 and IP Multicast routing. |
|
|
|
Topics will include:
OSPF
When should I use OSPF? Why? OSPF Protocol Overview
- Link State vs Distance Vector Routing Protocols
- How does it work?
- Forming Adjacencies
- OSPF Message Formats, etc.
Different Types of OSPF Networks
- Broadcast, Point-to-Point, Point-to-Multipoint, NBMA
- Hierarchical Routing - OSPF Areas
- Stub Areas & Not So Stubby Areas (NSSA)
Different Types of OSPF Routers
- Internal, Backbone, ABR, ASBR
- Virtual Links
Advanced OSPF Concepts
- Route Summarisation
- Importing External Routes into OSPF
- Route Policy Filtering
- Multicast OSPF (MOSPF)
- QOSPF
Trouble shooting Common OSPF Problems Practical Session: OSPF Design Scenario |
|
|
BGP4
Do I need to use BGP4? Possible Design Scenarios
- Single-Homed (Stub) AS
- Multi-Homed Non-Transit AS
- Multi-Homed Transit AS
BGP4 Protocol Overview
- How does it work?
- BGP Message Formats, etc.
IBGP vs EBGP
- Tuning BGP4
- Controlling BGP Routes with BGP Attributes
- Route Filtering
- BGP4 Aggregation & CIDR
- Policy Routing
BGP4 Design Considerations
- Interaction of BGP and Non-BGP routers
- Route Dampening
- Redundancy
- Load Balancing
Techniques for Building Large Autonomous Systems
- Route Reflectors
- Confederations
Practical Session: BGP4 Design Scenario |
|
|
|
|
|
|
Depending on the interaction and audience participation in the OSPF and BGP4 sections of this tutorial, |
|
|
|
IP Multicast Routing
What is IP Multicast?
- Multicast Address Allocation
- Multicast Forwarding vs Multicast Routing
- Mbone Update
Overview of the Internet Group Management Protocol (IGMP) Overview of Multicast Routing Routing Protocols Two Basic Types of Multicast Routing Protocols:
- Broadcast & Prune (Source-based Trees)
- Shared Tree
- Explicit vs Implicit Joining
|
|
|
Explore the Strengths & Weaknesses of the following protocols:
Distance Vector Multicast Routing Protocol (DVMRP)
- Tunneling multicast traffic through unicast routers
Multicast OSPF (MOSPF) Protocol Independent Multicast
Core Based Trees (CBT)
|
|
|
|
|
|
|
After completing this tutorial:
Attendees will have indepth knowledge on BGP 4 and IP Multicast routing and be able to undertake advanced network configurations. |
|
|
|
|
|
|
|
Switches and Routers |
|
|
Instructor: Scott Bradner |
|
|
|
Who should attend?
This tutorial is best suited for individuals involved in evaluating technologies used to build and interconnect networks. |
|
|
|
Description:
Corporate and university data network design has evolved from bridged LANs to complex router- and switch-based internets. The underlying technology has increased in speed to a hundred or more times what it was only a few years ago. Network security has emerged as a major concern since these once stand-alone networks are now more often than not part of the global Internet. Network management has become a very high priority activity because today's corporations depend on their data networks for their basic operations and even short outages can cause significant problems. Network architecture must balance the requirements for high reliability and availability against limited resources and unlimited expectations. Corporate management is beginning to plan on the merger of the existing voice, video and data networks, assuming the existence of technology to control the quality of service provided to the network users. At the same time the Internet has evolved from a restricted use research network connecting a few hundred computers to a global information infrastructure interconnecting millions of computers and struggling to support the ever growing demands of general commerce.
This tutorial is designed to address these changes in the role of data networks, and to provide an understanding of the design and management issues of modern data networks. It will help set realistic expectations about the state of current technology and potential of the currently envisioned future technology. |
|
|
|
Topics will include:
- Network Technology: detailed operational descriptions of current networking
technology including 10Mb, 100Mb, and gigabit Ethernet, ATM, frame relay, xDSL, token ring, ISDN, SONET and other WAN link protocols. Device Technology: descriptions of the design and operation of Ethernet and token ring frame switches, ATM switches, "level 3" switches and routers.
- Management: Network management concepts and procedures including a
description of the design and operation of SNMP, ticket systems, SNMP-based polling and statistics systems, some suggestions about real-world network operations techniques, and defensive network design to minimize the requirement for network management
- Quality of Service: requirements for QoS in modern networks, descriptions of
the IP (RSVP) and ATM QoS technologies and their operation and application
Examples: Case studies of representative data networks including three universities, two corporations and a regional Internet service provider.
Routing: Detailed descriptions of distance vector and link-state routing protocol operation and information about many of the currently used routing protocols including RIP, RIPv2, OSPF and BGP4. Description and rational behind Classless Inter-Domain Routing (CIDR) addressing.
Security: Data network security concepts and procedures including descriptions of the operation of symmetric and asymmetric encryption protocols, Kerberos, PGP, certificate systems, and web browser security.
- Routers and gateways
- Fast and gigabit Ethernet
|
|
|
|
After completing this tutorial:
Attendees will have detailed knowledge of the current state of the market with respect to the basic underlying building blocks of Internetworks. |
|
|
|
|
|
|
|
Introduction to Internet Policy and Regulations |
|
|
Instructor: Laina Raveendran Greene |
|
|
|
Who should attend?
This tutorial is geared for techies, businessmen and lawyers unfamiliar with the Internet, to provide an introduction to policy and legal issues that may be relevant to them. |
|
|
|
Description:
In today's commercialization of the Internet, policy and regulatory issues have become very intertwined with technical and business issues. Policies and regulations are still being made, often having great business and technological impact, and it has become increasingly important for techies and businessmen alike to familiarize themselves with this other dimension of the issues.
It is also imperative that if techies and businessmen alike want to have their say in policy and regulatory issues, that they do not consider these issues outside their purview of understanding and leave it to the lawyers to figure these issues out for them.
GetIT strongly believes that in this industry, it is imperative that a multi-disciplinary participation in policy and regulations making. Should be pursued. GetIT is committed to empowering individuals with the tools of understanding to be more effective in making a difference. This tutorial is part of GetIT's efforts to encourage a greater voice for the Asia Pacific region in other policy-making forum such as in the US, as it has done through APPLe.
GetIT Pte Ltd. has gained much experience dealing with policy and regulatory issues of both the telecommunications and Internet world for the past 12 years. With convergence of technology, and with the advent of Internet voice, multimedia, etc it has become imperative to look at issues from a new perspective, yet learning from the experiences of both the telecom and the Internet world. Given the recent focus on applications of both technologies such as Electronic Commerce, it has also become important to understand many other formally unrelated areas of the law are becoming relevant, such as copyrights and trademarks. |
|
|
|
Topics will include:
- Overview of telecom regulations
- Overview of Internet regulations
- Internet Governance
- Content regulation
- Cross border enforcement of laws
- Trademarks and Domain Names
- The various Electronic Commerce Laws currently being proposed
|
|
|
|
After completing this tutorial:
Attendees will have a better understanding of how the various controversial issues fit together, how it may have any relevance to them and where they can look to get more information. In short, the tutorial will provide a framework of understanding policy and regulatory issues. |
|
|
|
|
|
|
|
Promoting Routability |
|
|
Instructor: Anne Lord and Philip Smith |
|
|
|
Who should attend?
Anyone, such as network engineers and network operators, who is involved in aspects of the design, management or operation of an ISP network. Pre-requisite is a knowledge of basic Internet routing and terminology. |
|
|
|
Description:
The tutorial introduces the concept of an Internet Routing Registry (IRR), what it is intended for, its usefulness in day to day operations, and how the IRR is vital to the functioning of the Internet. It will examine and demonstrate the many tools that are available to define and aid understanding of policy based routing. Routing netiquette issues of central importance to ISP's, such as dampening, filtering and CIDR are also covered. |
|
|
|
Topics will include:
- Routing Terms and Concepts
- IP forwarding versus IP routing
- Policy based routing (transit, multihoming)
- Overview of the Internet Routing Registry (IRR)
- History and Development.
- Objects and Syntax (ripe-181, RPSL)
- Registering and Updating Information.
- Routing Registry tools for Network Operators
- The RAToolset (aoe, roe, rtconfig, CIDRAdvisor, prtraceroute, etc)
- Whois (RIPE enhanced)
- Routing Etiquette
- CIDR/aggregation and renumbering
- Filtering policy (prefix and/or AS)
- Stability and dampening
- Future of the IRR
- Direction
- Improved usability
- Universal adoption
|
|
|
|
After completing this tutorial:
Attendees will be able to use the Internet Routing Registry to register routing policy. They will also know how to simplify the management of routing information and configuration, and diagnose and solve routing problems more easily. They will be aware of some of the issues affecting the Internet today, and how they can make a useful contribution to the seamless functioning of the Internet. |
|
|
|
|
|
|
|
Internet QoS and Traffic Management |
|
|
Instructor: Paul Ferguson and Geoff Huston |
|
|
|
Who should attend?
Network architects and engineers interested in investigating the use or potential of differentiated quality of service within their network. |
|
|
|
Description:
This session provides an overview of various Quality of Service mechanisms, their effectiveness, and the roles that proper network design, architecture, and on-going traffic engineering play in effectively deploying a successful QoS strategy. |
|
|
|
Topics will include:
- The IETF's Integrated Services architecture (including RSVP)
- Network Layer differentiated services
- QoS and ATM
- Traffic engineering
- Capacity planning
- Other related issues
|
|
|
|
After completing this tutorial:
Attendees will understand the issues and technologies involved in designing and implementing differentiated services over the Internet. |
|
|
|
|
|
|
|
Unix Power Tools II |
|
|
Instructor: Evi Nemeth |
|
|
|
Who should attend?
Senior Systems Administrators and individuals with experience managing small Unix-based networks. |
|
|
|
Description:
Following on from Monday this tutorial will discuss advanced UNIX tools and system configuration, security audit, automated network monitoring and in general how to maximize the performance of your UNIX system. |
|
|
|
Topics will include:
- Server Performance - Years ago, sinking more money into a bigger CPU was often the fix for performance problems. With CPUs outperforming many other aspects of machines today, performance problems most often appear in areas such as network bandwidth, software optimization, memory usage, and system configuration. Learn how to tune your modern UNIX box to get the most bang for your buck.
- Security Auditing 101 - So, you've done everything the experts recommend and more to secure you site. Now, how do you measure how secure your site really is? We'll take you through the anatomy of a security audit from start to finish.
- Network Monitoring - Bigger networks need bigger management tools. Until recently, automated network monitoring has been implemented as a mish-mash of home grown tools at most sites. Now there are a number of "production" quality tools available both commercially and from the net. We'll explain what these a number of these tools really do and show you a comparison between them.
- Squid cache - The squid internet object cache is a very high-performance proxy caching system for web clients. When deployed correctly, it can drastically improve the performance of your network and reduce the need to purchase external bandwidth. We'll talk about how implement this hierarchical tool at your site in a practical manner.
- Samba - Being invaded by PCs on your network? This system can help you integrate both existing and future UNIX file-sharing and print-sharing systems with PCs on your network - without pain! Learn how to plan, configure, and manage integrated PCs with Samba on your network.
|
|
|
|
After completing this tutorial:
Attendees will have the latest skills and techniques necessary to administer networks of Unix systems of any size. |
|
|
|
|
|
|
|
| TOP | |
|
|
|
• Last updated on Feb. 11, 1998 • |
|
|
|