|
Tuesday
Tutorial Descriptions [ March 2, 1999 ] |
T2.1 |
Managing Acceptable Use |
Who should attend?
Staff system/network administrators and technical managers in Internet
Service Provider environments
Description:
This is a follow-on to the ISP System Administration tutorial. It has become
clear that "netiquette" is not longer sufficient to ensure everyone plays
nicely on the Internet. If something can be done, there appears to be some
user who wants to do it - using your network. Managing acceptable use is
much more than itemizing disallowed activities.
Topics will include:
-
Industry norms for acceptable use
-
Common violations
-
Usage tracking for charging
-
Security vulnerabilities
-
Profile of unsolicited commercial email
-
Ways to prevent unacceptable activities
-
Reasonable sanctions and how to enforce them
-
Tools to monitor and control use
-
Customer awareness and Policy
T2.2 |
Promoting Routability
-
BGP Routing for the Internet |
Who should attend?
Anyone, such as network engineers and network operators, who is involved
in aspects of the design, management or operation of an ISP network.
Pre-requisite is a knowledge of basic Internet routing and terminology.
Description
The tutorial introduces the terms and concepts used in Internet routing.
An introduction to the operation of BGP and internal routing protocols
in an ISP backbone is given. Routing netiquette issues of central importance
to ISPs, such as dampening, filtering, CIDR and the Internet Routing Registry
(IRR) are also covered.
Topics covered
* Routing Terms and Concepts
* Introduction to OSPF
* Basic and Advanced BGP for ISPs
* Routing design for ISPs using OSPF and BGP
* Routing Ettiquette and the Internet Routing Registry
After completing the Tutorial
Attendees will be better able to design and configure ISP backbone routing
protocols. They will know how to use the power and flexibility of BGP,
as well as how to efficiently and effectively configure BGP for connection
to other ISPs and Internet Exchange Points. They will also know how to
simplify the management of routing information and configuration, and diagnose
and solve routing problems more easily. They will be aware of some of the
issues affecting the Internet today, and how they can make a useful contribution
to the seamless functioning of the Internet.
T2.3 |
Voice and Telephony
over IP and the Internet |
Who should attend?
People who want to understand the technology and issues of using the Internet
for carring Voice and Telephony traffic.
Description:
(To be supplied)
T2.4 |
IPv6: The New
Version of the Internet Protocol |
Who should attend?
-
Internet protocol implementors
-
Internet service providers
-
Managers and planners of enterprise networks
-
Anyone wishing to learn how the Internet lower layers are evolving
Prerequisite: familiarity with the current version of IP
Description:
A new version of the Internet's core protocol, IP, has been developed by
the Internet Engineering Task Force (IETF) and is now in the early stages
of deployment and standardization. The new IP, known as IP version 6 or
IPv6, is designed to meet the scaling requirements imposed by the explosive
growth of the Internet, and to meet the demand for greater functionality
at the internet layer, including strong security, automated configuration,
and support for multimedia traffic. In this workshop, the lead designer
of IPv6 will present a detailed walkthrough of the protocol, describing
what it is, why it is, and what role it is expected to play in the evolution
of the Internet.
Topics will include:
-
why a new IP?
-
IPv6 addressing and routing architecture: unicast, multicast, support for
mobile hosts, dynamic selection of service providers, address allocation
and administration.
-
Extensibility: extension headers and options.
-
IPv6 security: source authentication, data integrity and confidentiality.
-
Support for real-time traffic flows and non-default qualities of service.
-
Autoconfiguration and reconfiguration of IPv6 nodes ("plug-and-play").
-
The effects of IPv6 on higher-layer protocols and APIs.
-
Interoperation with, and transition from, the current version of IP
T2.5 |
Network Management
Tools used at Digex and Verio |
Who should attend?
Network and System Administrators who would like to be exposed to direct
experience of th tools used at 2 major ISPs in the US.
Description:
(To Be Supplied)
Topics will include:
T2.6 |
Security in All
Seven Layers
TBD |
Who should attend?
The intended audience of this tutorial includes system and network administrators
at Internet sites as well as individuals from sites that are in the process
of connecting to the Internet. The tutorial is especially pertinent to
individuals from organizations who are, or who are planning to become,
Internet service providers since the security of their organization?s infrastructure
may affect the security of their customers.
Description:
According to international law enforcement officials, the majority of network
attacks (80%) go undetected. With this in mind we, as IT professionals
must rethink our methods of securing the business process if business is
to survive on the Internet.
The first portion of the tutorial will open the eyes of many people
who think they have secured their network, but have missed a few layers.
It will help you to develop a comprehensive understanding of vulnerabilities
beyond the ones everyone commonly thinks of.
The second half of this session we will discuss the anatomy of an attack,
and thus discover the nature of how to defend against the ever-changing
threat. Typically, the attempted intrusion is detected via ``attack signatures''.
These attack signatures are based on past events, and is susceptible to
more clandestine approaches. What needs to evolve is more of the ``one-strike
your out'' view for intrusion detection. This will be based on a combined
use of attack profiles as well as enterprise-wide correlation engines whose
sole purpose is to evaluate and classify potentialities ``on-the-fly''.
First session topics will include:
-
Applications that add security
-
Encryption
-
IP Sec
-
Access lists
-
Proxy Servers
-
Filtering MAC and IP addresses
-
Does EVERYONE need access?
Second half topics will include:
T2.7 |
Broadband Metropolitan Wireless Solutions
and
Cable Modem Protocols and Technology |
Who should attend?
Network Engineers and other interested in how to utilize Cable Modem Technology
as a last mile solution.
Description:
Topics will include:
-
What are the unique aspects of Cable Modem networks
-
What are the important standards and their status
-
What technologies ane equipment are used to build networks suitable for
Cable Modems
T2.8
|
APNIC Member Training: Address Policy & Administration
|
Who should attend?
The course is open to APNIC members only. The target audience is technical
personnel located in the Asia and Pacific Region, who have responsibility
for allocating and/or assigning IP addresses. For example, hostmaster employees
of network information centres or ISP's, network planners, designers and
network installation engineers.
Description:
Overview of Internet administrative structure and related APorganisations
Historical context and goals of the Internet Registry System (IPv4 address
depletion, CIDR)
APNIC policies for the management of IPv4 address space
Member and APNIC responsibilities
Guidelines for designing an addressing plan
Use of AS numbers and introduction to routing ettiquette
Registration and the APNIC database.
We stress that this course will *not* teach members how to run their
businesses or networks as Internet Service Providers. It is focussed on
APNIC policy and the interaction between APNIC and its members.
$Id: tuesdesc99.html,v 1.9 1999/02/17 12:14:33 rberger Exp $