Apricot

Monday Tutorial Descriptions [ Feb. 16, 1998 ]

Rectangle

| HOME | ABOUT APRICOT | SCHEDULE OF EVENTS | SPONSORSHIP | TUTORIALS  |CONFERENCE | SOCIALS |                | PHILIPPINES | about MAKATI | TOURS | HOTELS | REGISTRATION | APRICOT 97 | APRICOT 96 | LATEST NEWS |

Internet Security

Instructor: Barbara Fraser

Who should attend?

The intended audience of this tutorial includes system and network administrators at Internet sites as well as individuals from sites that are in the process of connecting to the Internet.  The tutorial is especially pertinent to individuals from organizations who are, or who are planning to become, Internet service providers since the security of their organization’s infrastructure may affect the security of their customers.

Description:

The CERT Coordination Center has handled thousands of computer security incidents within the Internet community since its creation in 1988.  During that period of time, we have identified many essential computer security issues relevant to people trying to secure their information infrastructures.The main objective of this tutorial is to help system and network administrators understand what needs to be done to ensure that their computer systems and networks are as securely configured as possible when operating within the Internet community.

Topics will include:

  • Internet Security Threats
  • Security Policies
  • Ethics of Using the Internet
  • System Administration General Techniques
  • System Administration Tools
  • System and Service Configuration
  • Network Administration
  • Preparing for and Responding to Security Incidents

After completing this tutorial:

Attendees will have a greater understanding of the possible security threats, policies, techniques, and technologies, which can address those threats, and ways in which to respond to security incidents.

Rectangle

The Domain Name System and BIND

Instructor: Paul Vixie

Who should attend?

System and network administrators responsible for name server installation and maintenance and name server administrators and software developers who need a deeper understanding of the DNS protocol and the internals of BIND. Participants ought to have some familiarity with UNIX, Internet addressing, TCP, UDP and should be able to recognize C code when they see it (which they will).

Description:

This tutorial will teach you everything you need to know to install a new name server or to maintain an existing one and will survey the DNS protocol.  In addition, upcoming extensions to both DNS and BIND will be discussed and implementation issues in BIND will be examined.

Topics will include:   

  • DNS overview: nodes, RR’s, zones
  • which RR types are actually used?
  • delegating (creating) sub-domains
  • master and slave servers for a zone
  • creating and registering a new zone
  • tips for editing existing zones
  • tools for automatic zone editing
  • resolver (host) configuration
  • DNS without BIND: PC configuration
  • DNS message format
  • DNS resource record format
  • zone file format, and zone transfers
  • incremental zone transfer
  • dynamic update and deferred update
  • real time change notification
  • DHCP interaction
  • BIND current status

After completing this tutorial:

Participants will be qualified to act as “HOSTMASTER” for their sites, to allocate host names and addresses, to determine an appropriate sub-domain naming convention, design and implement a server topology and will know what the IETF has been up to lately and what to expect in upcoming BIND releases.

Rectangle

Internet Protocol Version 6

Instructor: Scott Bradner

Who should attend?

This tutorial is intended for network engineers and software developers interested in learning about IPv6 in depth.

Description:

IP Version 6 is the planned successor to the current version of IP running on today’s Internet. This tutorial will explain the status of work on IPV6, how it compares with current protocols, the problems it solves, and the challenges still to be faced.

Topics will include:

  • Why was a new version of IP needed?
  • Ipv4 lifetime & CIDR
  • Selection of ipv6 technology
  • What were the criteria used to evaluate IPng proposals?
  • How did the selection process work?
  • What lead to the selection of a 16 byte address?
  • Ipv6 overview & terms
  • Ipv6 header
  • Flow label
  • Hop-by-hop options header
  • Destination options header
  • Routing header
  • Ipv6 fragmentation & path MTU
  • LAN support
  • Icmpv6
  • Ipv6 address auto-configuration
  • Protocols effected by ipv6
  • Udpv6
  • Tcpv6
  • Addresses
  • Basic ipv6 addressing

 

  • Revised addressing proposal
  • DNS issues
  • Neighbor discovery
  • Transition from ipv4 to ipv6
  • Socket API
  • Security
  • Routing
  • Status of ipv6 effort
  • Ipv6 header
  • Flow label
  • Hop-by-hop options header
  • Destination options header
  • Routing header
  • Udpv6
  • Tcpv6ipv6 addresses
  • DNS issues
  • Ipv6 transition
  • Ipv6 LAN support
  • Icmpv6
  • Neighbor discovery
  • Ipv6ipv6 security
  • 8+8 proposal

After completing this tutorial:

Attendees will have a thorough understanding of the issues involved in the development of IPv6, the IPv6 architecture, and the current status of IPv6.

Rectangle

IP and ATM

Instructor: Gene Deutsch

Who should attend?

Network administrators and engineers contemplating the use of IP and ATM technologies separately or together.

Description:

This course surveys each of the technologies, characterizes their strengths and weaknesses, and explains the various ways IP and ATM can be integrated.

ATM is discussed as a both a conceptual long-term approach to internetworking and an emerging short-term approach that uses standards specified by the ITU, ATM forum, IETF, and other standards bodies. IP version 4 is currently the defining technology for internetworking and the global Internet; the proposed next generation, version 6, adds additional functionality.

The course considers ways that IPv4 is being used with ATM. It analyzes tradeoffs, and shows situations in which each combination is appropriate. The course examines the likely future as IP evolves to version 6, as more of the ATM promise is realized, and as alternative technologies such as Fast Ethernet and direct access to SONET evolve.

The course does not have any prerequisites.

Topics will include:

  • Overview of IP and ATM technologies: concepts, architecture and services.
  • Pure ATM services: arguments for and against replacing IP with ATM.
  • Permanent or switched ATM circuits as an IP link technology.
  • TCP over ATM: surprising performance anomalies
  • Classical IP over ATM: Logical IP subnets; ATMARP, InvATMARP
  • LAN Emulation and transmission of Multiple Protocols Over ATM
  • Comparison of pure IP, pure ATM, and combinations: flexibility & performance
  • Results from the field: progress reports from several leading-edge deployments.
  • Predictions of the future: what one might expect by 2000.

After completing this tutorial:

Attendees will have an understanding of ATM technologies, the techniques used to transmit IP based traffic over it, and the current and likely future
state of ATM deployment.

Rectangle

Introduction to Internet Routing

Instructor: Hugh Irvine

Who should attend?

Individuals responsible for designing, implementing and managing the routing system for a large or Internet connected network. Pre-requisites: basic knowledge of TCP/IP and routing.

Description:

This tutorial will cover the fundamentals of IP addresses and IP address reachability. Topics addressed will include classfull and classless IP addresses, routing theory, basic routing using static addresses, principles of dynamic routing, distance-vector and link-state protocols, and interior and exterior routing protocols.

Topics will include:

  • Interior routing protocols (OSPF and IS-IS)
  • BGP essentials
  • ISP network troubleshooting
  • Configuration management
  • Other topics basic to an ISP's network's operation and design

After completing this tutorial:

Attendees will be able to design, deploy, and manage the routing of a medium scale network

Rectangle

Unix Power Tools I

Instructor: Evi Nemeth

Who should attend?

System and network administrators interested in learning the latest tools and techniques for managing Unix systems.

Description:

System Administration Power Tools - Often times, system administrators are caught saying "if only I had time to learn how to use that nifty new program". Unfortunately, system administrators usually do so much firefighting that they don't have time to stop and try out the new administration tools. In this overview of readily-available UNIX system administration power tools, we'll discuss packages that are likely to save you time and are free.

Topics will include:

  • Discover features and usage of programs like flexfax(1), rc.config(5), addhost(8), amanda(8), adduser(8), sudo(8), glimpse(1), patch(1), cksendml(8), majordomo(8), top(1), tcpdump(1), and more.
  • Intro to expect - Perhaps the greatest system administration tool to come along since PERL, expect(1) is a high-powered interpreted dialogue language which can act like your hands on the keyboard to perform tricky tasks while you're away, asleep or at play. We'll talk about the basic constructs of the language and write some sample programs.
  • Syslog - Writing your programs so that they exploit the network-oriented logging protocol can greatly ease debugging and site maintenance. Modern BSD syslog includes facilities for forwarding selective error and debugging information to one or more other hosts. This section discusses how to configure a central syslog host for your network to assist SA's in monitoring the status of a variety of machines simultaneously.

After completing this tutorial:

Attendees will be able to manage small to medium scale networks of Unix systems.

Rectangle

Scaling Internet Services

Picture

Instructor: Bob Berger, Andrew Khoo, Butch Anton, Sam Ramadan

Who should attend?

Operators and architects of current and future Internet technology based networks.

Description:

The Internet is still very young. It promises to continue to grow and assimilate legacy WANs and application services as well as be the breeding grounds for entirely new services, marketplaces and industries.  This tutorial will cover trends and developments in high bandwidth network infrastructure,   high volume server farms and Value Added services that are being deployed in the US.

Topics will include:

Scalable Dedicated Access Services using xDSL, T1/E1, T3/E3, Frame Relay ATM and Gigabit Routing Core Backbone Infrastructure that can support high growth, next generation dedicated access services (with frame relay, ATM and POS over T3/E3 and SDH/SONET backbones)

  • Integrating Voice over IP into ISP infrastructure
  • Next Generation Transparent Caching, Special Purpose Proxy Servers, Web Replication and ServerFarm architectures that help you improve performance to customers and reduce load on your WAN/Backbone networks
  • How to incorporate International Roaming Services into your service offerings
  • Value Added Services integration and billing.

After completing this tutorial:

Attendees will have been exposed to the techniques and technologies used to scale the provision of Internet services as the demands for those services grow.

Rectangle

Sendmail

Instructor: Eric Allman

Who should attend?

Systems administrators who want to learn more about the sendmail program particularly details of the configuration file and operational issues. 

Description:

This tutorial will not cover mail front ends. This will be an intense, fast-paced, full-day tutorial intended for people who have already been exposed to sendmail. This tutorial describes the latest release of sendmail from Berkeley, version 8.8.

Topics will include:

  • The syntactic elements of the configuration file: mailers, options, macros,
    classes, headers, precedences and priorities, trusted users, key file
    definitions, and rewriting rules and rulesets.
  • The flow and semantics of rulesets, including hints about debugging.
    An introduction to SMTP and how sendmail operates in an SMTP environment.
  • Day-to-day management issues, including alias and forward files, "special"
    recipients (files, programs, and include files), mailing lists, command line
    flags, tuning, and security.
  • How sendmail interacts with the Domain Name System.
  • An introduction to the M4 configuration package included with Sendmail 8.

After completing this tutorial:

Attendees will be able to build, configure, and operate a Sendmail based email system.

Rectangle

System Administration for Internet Service Providers

Instructor: Barb Dijker

Who should attend?

Experienced technical staff and technical managers working in Internet Service Provider environments.

Description:

An ISP environment provides some specific challenges.  The user community
is highly dynamic and demanding, the security vulnerability is hostile, and the growth rate is astronomical.  This tutorial will illustrate the potential associated problems and will provide tips to meet these challenges specific to ISPs,  both technology and policy.  We'll discuss typical pitfalls in problems faced by ISPs and how they can be best avoided or solved.

Topics will include:

  • Account Management
  • Customer Service
  • Product/Service Planning
  • Network Planning
  • Security Vulnerabilities
  • Unacceptable Use (dealing with spam)
  • Usage Tracking for Charging
  • Billing Data Integration
  • Reliability and Redundancy Performance
  • Resource Availability
  • Training and/or Hiring Talent

After completing this tutorial:

Attendees will know the "tricks of the trade" for administering an Internet service provider

DAILY SCHEDULE

MONDAY TUTORIALS [ Feb.16, 1998 ]

TUESDAY TUTORIALS [ Feb.17, 1998 ] 

INSTRUCTORS

| TOP |

• Last updated on Feb. 4, 1998 •