|
Monday
Tutorial Descriptions [ March 1, 1999 ] |
T1.1 |
ISP System Administration |
Who should attend?
The intended audience of this tutorial includes system and network administrators
at Internet service providers.
Description:
An ISP environment provides some specific challenges. The usercommunity
is highly dynamic and demanding, the security vulnerability is hostile,
and the growth rate is astronomical. This tutorial will illustrate the
potential associated problems and will provide tips to meet these challenges
specific to ISPs - both technology and policy. We'll discuss typical pitfalls
in problems faced by ISPs and how they can be best avoided or solved.
Topics will include:
-
Reliability and redundancy
-
Performance (LAN, WAN and web server)
-
Resource availability
-
DNS BIND 8 migration
-
Caching
-
Support tools
-
Training and/or hiring talent
-
Product/service planning
After completing this tutorial?
Attendees will have a greater understanding of the tools, techniques and
responsibilities of running Unix server based services for an ISP
T1.2 |
Sendmail Configuration
and Operation
(Updated for Sendmail 8.9) |
Who should attend?
Systems administrators who want to learn more about the sendmail program,
particularly details of configuration and operational issues (this tutorial
will not cover mail front ends).
Description:
This will be an intense, fast-paced, full-day tutorial intended for people
who have already been exposed to sendmail. This tutorial describes the
latest release of sendmail from Berkeley, version 8.9.
Topics will include:
-
A bit of the philosophy and history of Sendmail
-
The basic concepts of configuration: mailers, options, macros, classes,
keyed files (databases), and rewriting rules and rulesets.
-
Configuring sendmail using the M4 macro package.
-
Day-to-day management issues, including alias and forward files, "special"
recipients (files, programs, and include files), mailing lists, command
line flags, tuning, and security.
-
How sendmail interacts with the Domain Name System.
After completing this tutorial?
Attendees will have a rich understanding of the architecture and configuration
issues of Sendmail for ISPs
T1.3 |
Internet QoS
and Traffic Management
and
Internet Exchanges: The State of the Art |
Who should attend?
Network architects and engineers interested in investigating the use or
potential of differentiated quality of service within their network.
Description:
This session provides an overview of various Quality of Service mechanisms,
their effectiveness, and the roles that proper network design, architecture,
and on-going traffic engineering play in effectively deploying a successful
QoS strategy.
Topics will include:
-
The IETF's Integrated Services architecture (including RSVP)
-
Network Layer differentiated services
-
QoS and ATM
-
Traffic engineering
-
Capacity planning
-
Other related issues
After completing this tutorial?
Attendees will understand the issues and technologies involved in designing
and implementing differentiated services over the Internet.
T1.4 |
Designing Scaleable
Ip Networks |
Who should attend?
Description:
This full day class will cover the information required to scale your IP
network, both in terms of bandwidth, number of POPs, as well as connected
hosts. Material covered includes IP allocation issues, IGP and EGP setup,
sizing routers, etc.
Topics will include:
(To be supplied)
T1.5 |
Optical Internetworking |
Who should attend?
Network engineers who are considering the use of Fiber Optic based networking.
Description:
Optical transmission is necessary to scale transmission links into 100s
of Mbps over long distances.
This tutorial will provide a framework for individuals to understand
the numerous technologies, terms, and choices in this field.
Topics will include:
-
Optical Emitters and Detectors
-
Fiber Optic Cables and Connectors
-
Amplifiers, Repeaters, and Regenerators
-
Wavelength Division Multiplexors
-
SONET
-
Issues With IP Over Glass
-
Test Equipment
T1.6 |
VoIP Standards Efforts |
Who should attend?
(To be supplied)
Description:
(To be supplied)
T1.7 |
Routing Policy Specification
Language and Analysis Tools |
Who should attend?
Network engineers who are interested in extending thier network management
to support policy based routing.
Description:
The APNIC, together with the USC Information Sciences
Institute and Qwest Communications will be organizing an in-depth tutorial
on Internet Routing Coordination.
In the tutorial, we will introduce the Internet
Routing Registry (IRR), explaining how to register and query routing policy
objects. After a brief introduction to routing policies (policies as used
in the Internet today and BGP mechanisms to implement those policies),
we will discuss the new Routing Policy Specification Language (RPSL), the
IETF proposed standard language for specifying Internet routing policy.
RPSL is currently being deployed by IRR participants and will replace RIPE-181,
the current IRR routing policy specification language. RPSL provides substantial
extensions to RIPE-181, making it possible to specify a much richer set
of routing policies. In addition we present and demonstrate several IRR
policy analysis tools, including RtConfig to configure routers, roe to
reconcile route objects with actual routes on the Internet, and aoe to
easily specify common policies.
Attendees should understand basic BGP operations,
but need not be familiar with the IRR.
Tutorial Materials:
www.isi.edu/ra/rps/trainin
T1.8
|
Deploying VPN's and Secure Extranets
|
Who should attend?
Network Architects and Planners wanting to understand
methods for the deployment of VPNs over IP networks.
Description:
This session will take an in-depth look at how a
service provider can deploy different types of VPNs to match customer requirements
and technology availability. Expanding from this subject, E-Commerce
and Extranet services and deployment will be covered from both a business
planning and service deployment perspective.
Topics will include
Establish a common working definition of VPNs
Look at the evolution of various telecommunication
services and their positioning verus VPNs
Look at the Business Case around VPNs - Pricing models
and cost to implement along with various VPN packaging strategies
In-depth discussion of Internet VPN tunneling technogoly
Discussion of VPN platforms - Routers, firewalls,
and VPN servers
Discussion of accessory services for VPNs
Authentication including
Token Systems, Public Key Infrastructure ; Naming,
addressing and directory services
Service Provider deployment topologies and models
billing, and service level agreements
After completing this tutorial:
Attendees will have the knowledge at there disposal
to plan for VPN, E-commerce and Extranet applications within their service
provider networks
(To be supplied)
$Id: mondesc99.html,v 1.10 1999/02/17 12:14:33 rberger Exp $