Top > JANOG25 Programs
JANOG25 General Onformation
JANOG25 RegistrationRegistration capacity
Fees
Want to register?The registration page is in Japanese only. So if you are interested in coming, please contact secretariat[at-mark]janog.gr.jp Hotel InformationThe following hotel is within walking distance from the venue and also has an english web page. Beware, the hotel has nothing to do with JANOG, so if you want to ask for directions, ask how to get to "Niigata Citizens Plaza". http://www.okura-niigata.com/english/index.html The following hotel is much cheaper, also has an English reservations page, but is three blocks from the venue. http://toyoko-inn.com/e_hotel/00186/index.html Time tableDay1 - Thursday, January 21, 2010
Day2 - Friday, January 22, 2010
Programmes: Day1 - 2010.01.21(Thu)Scripting on Routers -- How would the operator's job change?! --
AbstractMany operators are running various scripts on servers to automate router operations. If we could run these scripts on routers, would it be more effective?
Presentations
Title: 4-Octet-AS Capability Reminder
AbstractProblems where a router tears down a BGP session upon receiving a capability which it does not recognize have been known for quite a while. This talk is a reminder of what can happen when you do not realize how your router reacts to unknown capabilities. It can happen anywhere, anytime, and even on closed networks. This talk is just a reminder of something we all tend to forget but really need to remember. PresentationsTitle: Tools2 -- "Share the Secret"
AbstractWhen people talk about tools for network operations, English is the predominant language. Consequently, information about these tools is concentrated in native English speaking regions such as North America. Unfortunately, this leaves Japan behind in the exchange of information about networking tools. To overcome this, we have started a Wiki so that Japanese speakers can share information more easily. In this session, we introduce some useful tools and show some examples of Japanese customization, including unique usage of MRTG and IRRToolSet, how to build Looking Glass sites, etc. Feedback from the audience will be much appreciated. Presentations
Title: [Academic Session] A Trial Of Network Operation By Use Of Cardinality
AbstractWe have concerns about consuming bandwidth by P2P and network flow with unexpected high rate by DDoS or Worm in WAN network, so that there are many demands for Network Traffic Analysis Technology. We developed a method of Network Traffic Analysis by measurement of cardinality and applied it to campus network of University of Tsukuba. I present the results of the operation of the measurement appliance of cardinality in our network. PresentationsTitle: About providing and implementing IPv6 for existing users
AbstractPlanning and preparation to provide IPv6 environment for new users seems to proceed steadily, if not rapidly. On the other hand, such planning and preparation for existing users (users of existing ADSL, FTTH and DOCSIS 2.0 or earlier)does not seem to proceed so much. In this session, I present new technical trends for providing IPv6 connectivity from IPv4 in IETF standardization, some studies on the implementation and deployment methods, and I would like to discuss and sort out the IPv6 provision for existing users, especially for existing ADSL and FTTH users. PresentationsTitle: IP traceback deployment - Research results
AbstractAlthough IP traceback is a technique which has long been a research subject, there was never a real experiment on Japanese ISP networks because serious privacy and legal issues needed to be resolved as well as the technical planning. In 2005, an IP traceback study group was formed by six organizations under the sponsorship of the NICT. As well as solving the legal and privacy issues, the group conducted proof-of-concept experiments on real ISP networks, In this session, we wil talk about the five years of research results as well as the operational issues. In 2006, a legal operational model was established. In 2007, a three layer (hierarchical) operational model was developed. In 2008, a pre-experiment was conducted using five ISP networks, and the IP traceback development scenario was evaluated. In 2009, an experiment using 15 ISP networks was conducted. We completed the performance measurements, the evaluation of the operation process, and the management system. By January 2010, the operational issues of IP traceback will be explored and agreed through discussions among the ISPs. PresentationsTitle: APNIC Update
Abstract - Message from Paul WilsonIn the last 10 years, the Internet has been subjected to many changes and challenges. And now, as you know, we are facing a very big challenge IPv4 address exhaustion. In the Internet Community in Japan, we find JANOG for the technical side and JPNIC for the policy side work like two wheels of one cart to generate a substantial outcome, which also benefits in the APNIC Community in the end. The experience that Japanese Internet Community has had with the IPv6 transition will be the beacon by which the operators in the region will find their ways. I am very much delighted to have this precious opportunity to talk in person with such a community during JANOG25 Meeting As IPv4 address exhaustion approaches, and in the Internet in general which is encountering big changes, it will become more and more important for us to provide information that covers the Asia Pacific region’s concerns, both from technical and policy sides, but we also need to maintain our global point of view. I am looking forward to continued and more proactive involvement from the Japanese Internet community, and to strengthening our relationship with the Japanese Internet community. I hope I can illustrate APNIC’s current position and also its future directions through my presentation: “APNIC Update”. PresentationsTitle: Up-to-Date AS operation
AbstractInternet operational procedures change with the times. The operators of each AS need to stay up to date with the current operational practices and prepare to take the appropriate actions. For example, we should decide how we should plan to maintain the information in IR/IRR and to resonsd to complaints of malicious activities in the technologies we require for interconnection agreements. For another example, we could use more standardized frameworks for reciprocal inter-connection between AS operators. We all remember that iNOC-DBA was introduced to the JANOG community, but unfortunatelly we have not published the information in a standard and open way. Up-to-date information seems to be passed by word of mouth in a banquet. In this session, I'd like to sum up the tecnical and policy factors we should think about and discuss for future AS administrative operation. PresentationsLightening Talks
Programmes: Day2 - 2010.01.22(Fri)Cloud Hour Part I: Current Practice of Network design, Opereation and Monitoring of IaaS
AbstractEvolution of virtualization and cloud technologies has made a system building method dramatically changed. Especially virtualization needs seamless operation through network element and server element. We will discuss current problems and potential solutions for these operational changes from now on. PresentationsCloud Hour Part II: Mangement and Operation Techniques of Could Network
AbstractIP networks get more complicated by layered technologies. But methods of network management and operation have not changed from legacy network operations. A lots of network operators should monitor and manage so many items by appearance of cloud network computing and they are facing with more various troubles than before. We thought of better method to handle such problems and we present introduction of a operational method based on End-to-end and longitudinal monitoring and results of tests on this method. PresentationsCloud Hour Part III: Discussion of Virtualization
AbstractA panel part of the Cloud Hour which will discuss aspects and issues network operator will face in diffusion of network virtualized by cloud computing. Thinking of a new gTLD: (dot)NIIGATA
AbstractUnder ICANN's new gTLD rules, a domain for a city name from anywhere in world may apply, and a uniquely named gTLD will be accepted. In this session, the Japan Internet Domain Name Council (established Sep, 2009) will explain the result of the study about the the IDN usage guidelines for the ccTLD "dot NIPPON" (".xn--wgv71a" in Punycode) which was adopted by the MIC (Ministry of Internal Affairs and Communications). Then, the new company, which has been founded under the new gTLD rule, will talk about their plans for the new gTLD. In this session, we will also discuss operational issues and possible problems arising in the introduction of a new gTLD such as "dot NIIGATA" (".xn--efvn9s" in Punycode), and share them with operators. PresentationsThinking concretely about IPv6 network design and operation
AbstractAwareness of adopting IPv6 and actual implementation of IPv6 networks is gradually increasing. Interest toward IPv6 among JANOGers is also increasing. We assume that the number of people who are in middle of deploying IPv6 or planning to deploy IPv6 will increase by Jan 2010. It is important to give thought to “operational policy” during this phase. Such policy will define how to realise equipment configuration in the designed network topology. For example, we assume that many people are still wondering about the optimal way to assign IPv6 addresses to equipment. Although a presentation featuring “How to assign IPv6 addresses to different areas” was delivered at the last JANOG meeting, this point has not been discussed yet. We would like to explain how to define operational policy for IPv6 networks by referring to concrete subjects such as usage of filtering and network monitoring methods for IPv4 and IPv6 co-existing networks. PresentationsWhat you want to know about DNSSECPresenters
AbstractThe DNSSEC-enabled world is just around the corner. A concrete schedule of deployment was announced at RIPE 59 and at ICANN 36 Seoul. .JP is in the middle of various tests and trials, aiming to launch DNSSEC service in 2010. This session will discuss DNSSEC, mainly focusing on expected impacts on network operations which may be of concern to the operator community. PresentationsRouting and Security in the IPv6/IPv4 age.Presenters
AbstractThe exhaustion of IPv4 is coming soon. But even after the exhaustion of the IPv4 world will continue for a while, and there will be an IPv6 age like IPv4 has had and also a period of both IPv4 and IPv6. Looking back at the at what has been done with IPv4 during its time there are many things to carry over to IPv6 and things that could be improved. Especially for various problems such as BOGON filters, route table increases and routing security. Moreover to solve these problems the IPv6 routing protocol and related technologies are examined at the design stage but may not take in to account actual operator issues. The other day an ISOC workshop was held to discuss routing security in the future and has given Asia a chance to participate in the debate. At this JANOG I want to discuss with the community issues, shared IPv6/IPv4 challenges in the future, IPv6/IPv4 routing and security, best practices, or what will happen and happiness. Presentations |