images/fruit4.gif
Tuesday Tutorial Descriptions [ March 2, 1999 ]
T2.1 Managing Acceptable Use
Instructor: Barbara L. Dijker

Who should attend?

Staff system/network administrators and technical managers in Internet Service Provider environments

Description:

This is a follow-on to the ISP System Administration tutorial. It has become clear that "netiquette" is not longer sufficient to ensure everyone plays nicely on the Internet. If something can be done, there appears to be some user who wants to do it - using your network. Managing acceptable use is much more than itemizing disallowed activities.

Topics will include:


Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.2 Promoting Routability - BGP Routing for the Internet
Instructor: Philip Smith
Who should attend?

Anyone, such as network engineers and network operators, who is involved in aspects of the design, management or operation of an ISP network.  Pre-requisite is a knowledge of basic Internet routing and terminology.

Description

The tutorial introduces the terms and concepts used in Internet routing.  An introduction to the operation of BGP and internal routing protocols in an ISP backbone is given. Routing netiquette issues of central importance to ISPs, such as dampening, filtering, CIDR and the Internet Routing Registry (IRR) are also covered.

Topics covered

* Routing Terms and Concepts
* Introduction to OSPF
* Basic and Advanced BGP for ISPs
* Routing design for ISPs using OSPF and BGP
* Routing Ettiquette and the Internet Routing Registry

After completing the Tutorial

Attendees will be better able to design and configure ISP backbone routing protocols. They will know how to use the power and flexibility of BGP, as well as how to efficiently and effectively configure BGP for connection to other ISPs and Internet Exchange Points. They will also know how to simplify the management of routing information and configuration, and diagnose and solve routing problems more easily. They will be aware of some of the issues affecting the Internet today, and how they can make a useful contribution to the seamless functioning of the Internet.
 
 


Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.3 Voice and Telephony over IP and the Internet
Instructor: Drew Freyman

Who should attend?

People who want to understand the technology and issues of using the Internet for carring Voice and Telephony traffic.

Description:

(To be supplied)

Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.4 IPv6: The New Version of the Internet Protocol
Instructor: Dr. Steve Deering

Who should attend?

Prerequisite: familiarity with the current version of IP

Description:

A new version of the Internet's core protocol, IP, has been developed by the Internet Engineering Task Force (IETF) and is now in the early stages of deployment and standardization. The new IP, known as IP version 6 or IPv6, is designed to meet the scaling requirements imposed by the explosive growth of the Internet, and to meet the demand for greater functionality at the internet layer, including strong security, automated configuration, and support for multimedia traffic. In this workshop, the lead designer of IPv6 will present a detailed walkthrough of the protocol, describing what it is, why it is, and what role it is expected to play in the evolution of the Internet.

Topics will include:


Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.5 Network Management Tools used at Digex and Verio

Instructors:

Randy Bush and Ed Kern

Who should attend?

Network and System Administrators who would like to be exposed to direct experience of th tools used at 2 major ISPs in the US.

Description:

(To Be Supplied)

Topics will include:


Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.6 Security in All Seven Layers

TBD

Instructors: Gene Deutsch and TBD

Who should attend?

The intended audience of this tutorial includes system and network administrators at Internet sites as well as individuals from sites that are in the process of connecting to the Internet. The tutorial is especially pertinent to individuals from organizations who are, or who are planning to become, Internet service providers since the security of their organization?s infrastructure may affect the security of their customers.

Description:

According to international law enforcement officials, the majority of network attacks (80%) go undetected. With this in mind we, as IT professionals must rethink our methods of securing the business process if business is to survive on the Internet.

The first portion of the tutorial will open the eyes of many people who think they have secured their network, but have missed a few layers. It will help you to develop a comprehensive understanding of vulnerabilities beyond the ones everyone commonly thinks of.

The second half of this session we will discuss the anatomy of an attack, and thus discover the nature of how to defend against the ever-changing threat. Typically, the attempted intrusion is detected via ``attack signatures''. These attack signatures are based on past events, and is susceptible to more clandestine approaches. What needs to evolve is more of the ``one-strike your out'' view for intrusion detection. This will be based on a combined use of attack profiles as well as enterprise-wide correlation engines whose sole purpose is to evaluate and classify potentialities ``on-the-fly''.

First session topics will include:

Second half topics will include:


Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.7 Broadband Metropolitan Wireless Solutions
and
Cable Modem Protocols and Technology

Instructors:

Dewayne Hendricks

Mark Laubach

Who should attend?

Network Engineers and other interested in how to utilize Cable Modem Technology as a last mile solution.

Description:

Topics will include:


Home
Tutorial Overview
Tutorial Monday
Tech Track 1
BOFS
Instructors
Tutorial Tuesday
Tech Track 2

T2.8

APNIC Member Training:  Address Policy & Administration

Instructors:

Anne Lord and Paul Wilson

Who should attend?

The course is open to APNIC members only. The target audience is technical personnel located in the Asia and Pacific Region, who have responsibility for allocating and/or assigning IP addresses. For example, hostmaster employees of network information centres or ISP's, network planners, designers and network installation engineers.

Description:

  • Overview of Internet administrative structure and related APorganisations
  • Historical context and goals of the Internet Registry System (IPv4 address depletion, CIDR)
  • APNIC policies for the management of IPv4 address space
  • Member and APNIC responsibilities
  • Guidelines for designing an addressing plan
  • Use of AS numbers and introduction to routing ettiquette
  • Registration and the APNIC database.

  •  

     
     
     
     
     
     
     

    We stress that this course will *not* teach members how to run their businesses or networks as Internet Service Providers. It is focussed on APNIC policy and the interaction between APNIC and its members.


    Home
    Tutorial Overview
    Tutorial Monday
    Tech Track 1
    BOFS
    Instructors
    Tutorial Tuesday
    Tech Track 2


     
    $Id: tuesdesc99.html,v 1.9 1999/02/17 12:14:33 rberger Exp $