Top > JANOG21 Programs

General information about JANOG21

  • Date
    • 24th&25th Jan 2008
  • Venue
    • Parea Hall, Kumamoto

JANOG update


  • Hiroaki Kanematsu - JANOG Committee


  • We reconsider what JANOG is..
    • Network Operators' community
    • peer production
      • a group consists of individuals gathered voluntarily to produce common useful outcome
    • welcome anyone if he/she has a will to contribute the community
    • never forced to join, absolutely voluntary
    • one can do what he/she would like to do
      • source: Wikinomics
  • Recently..
    • There are lots of communities
    • extremely specialized, deepening of technical knowledge
    • Don't you have such colleagues?
  • Stakeholders
    • a person or group that has an investment, share, or interest in something
    • There are new stakeholders
    • A lot of people are trying new ideas that we did not imagine
    • New Challenge for us!
  • JANOG as glue
    • to connect dispersed communities
    • to absorb new stakeholders
    • to overcome challenges in front of us and be happy, with wisdom of crowds
  • Well, accordingly..
    • Would you please contribute JANOG, with anything you can do!
    • We welcome any ideas and proposals, such as "I want to do foobar in JANOG", "How about we do ..."
    • WE WANT YOU!
    • contact to secretariat(at)
  • References
    • Wikinomics (Don Tapscott and Anthony D. Williams)
    • The World Is Flat (Thomas L. Friedman)
    • The Wisdom of Crowds (James Surowiecki)

We really want to use IP!! - from TV Broadcasters' point of view


  • Yasuo Igano - Verizon Business
  • Kazuhiro Yokota - tv asahi
  • Tomohisa Akafuji - Asahi Broadcasting Corp.
  • Yasuyuki Hamada - NTT Communications
  • Akira Honda - NTT Communications


As you know, broadcasters are an important segment of IP users and JANOG should have deeper involvement with them. We will ask them the following questions and try to deeply understand each other.

  • What do they want to do in their use of IP networks or the Internet?
  • What do they need in order to do this?
  • From an operational point of view, what do they need and what are any difficulties they encounter?
  • What have they done and what could they do?
  • What will they do?

After discussions with them on the questions, we - IP operators will get new perspectives from their answers and thoughts.

You’ve got be kidding! Asking about Japanese Domain Names at this late stage?


  • Masato Minda, JPRS
    • March 1988 Graduated from Electric and Communication University
    • April 1988 Joined Astec Corporation
    • April 1995 Seconded to Tokyo Internet Corporation. Involved with establishing and managing the ISP operation
    • March 1998 Joined Matsui Securities Corporation. Involved with establishing and managing their Online stock training system
    • June 2003 Currently working at Japan Registry Services


  • This presentation tries to explain the mechanisms by which Japanese Domain Names function, introducing some common cases of misunderstanding. It also introduces necessary tools and browsers that are required in implementing Japanese Domain Names.

Presentation pdf file

Bogon filter countermeasures by applying non-sampling flow analysis


  • Hiroshi Ashida, iTSCOM
    • BIO: Born in Kyoto, became familiar with the Internet through using the university’s campus network. April 1997, joined a start-up System Integration corporation, involved with database development and SI projects for enterprises. September 1998, moved to a Cable TV operator where he was involved with commercializing, establishing and managing the Internet connectivity services. 2002 – 2006 JPNIC IP address working group member (2003 Vice Chairman.; 2004 – 2005 Chairman) September 2003 - Current. Continuously involved with establishing and managing CATV Internet. I always put myself at the front line in operational fields and continue to make efforts for achieving better services.


When we start using new IP address blocks, there could be cases where these IP addresses do not have reachability to certain sites. This is the so called Bogon filter problem. This topic was discussed during JANOG 18 and RIRs have also continued their efforts to ease the situation. However, detecting Bogon filters actively is challenging due to the nature of the problem. We tried to detect Bogon filters before customers’ detected them by applying the method in this presentation, non-sampling flow analysis. We would like to introduce past case studies and applied tools and methods to have a discussion about confirming and securing reachability.

Presentation pdf file

Secure Coding


  • Masaki Kubo, JPCERT
  • Yozo Toda, JPCERT


In applications for which the equipment and software running in the Internet are suuposed to be safe, it's important for the code to be secure. But in practice, an error in the simplest program code may have a very serious vulnerability, causing a very serious risk on the network. JPCERT/CC in conjunction with CERT/CC in the U.S. is researching secure programming to avoid having such vulnerabilities in code. In this session, we will show a technique of secure coding using an example of actual network equipment.

Presentation pdf file

Working to detect traffic anomalies through threshold-triggered monitoring


  • Yukiyasu Tarui, INTERNET MULTIFEED, CO.
  • Wataru Tanitsu, KDDI CORPORATION
  • Shigeaki Harada, Nippon Telegraph and Telephone Corporation, NTT Service Integration Laboratories
  • Hiroshi Hirokawa, Nippon Telegraph and Telephone Corporation, NTT Information Sharing Platform Laboratories


Network operators are always trying to find a better way to detect traffic anomalies and not to overlook those anomalies out of hundreds or thousands of ever-changing traffic graphs. One solution to this operational challenge which many operators are looking at is using threshold-triggered monitoring to detect traffic anomalies automatically. It is desired to allow operators to maintain their current level of network monitoring, or to make it even better, without overloading them with primitive routine work.

We are going to focus on "threshold-triggered" monitoring in this session. RRDtool supports the Holt-Winters method. We will introduce the testing results of the effectiveness of this method, compare it with other anomaly detection algorithms, and discuss what needs to be considered in making a "feasible" threshold-triggered traffic monitoring tool.

Let's discuss IP routing ‾Chair talks about the latest moves in the world and how to make the world happier‾


  • Tomoya Yoshida, NTT Communications Corporation
  • Yoshinobu Matsuzaki, Internet Initiative Japan Inc.


It is fundamental for the Internet to function well that all involved organizations do correct routing. For the continuous future growth of the Internet, we believe it is important that we, operators, share the direction of Internet standardization and proper operational methods and implement them as required. In this session, we are going to introduce current global trends in routing, especially in BGP routing, and the current implementations of major router vendors along with their challenges and issues.


Where we are

  • Internet Growth
  • Can hit 400K when IPv4 address runs out
  • The more routes, the more consumption of memory on routers, the more time in convergence
  • Concern about a limitation at 256K
  • Really need to live with these many routes?

Background of the growth

  • Traffic engineering
  • Punching holes
  • Drastic growth in Asia
  • Proper aggregation can reduce the number of routes down to 150K
  • Should make a level of consensus before migrating to IPv6

Memory on router

  • Control plane maintains RIB, which could be reduced by utilizing route reflectors
  • Forwarding plane maintains FIB, which is increased by use of multi-path forwarding. Add more memory for the nonce

More about memory consumption on router

  • Straight solution is to add more memory modules.
    • Limitation on the max memory
    • No operational impact

Reducing the number of routes on router

  • Default to only those from upper tier AS
  • Reject routes with long prefixs
  • Side effect needs to be studied
    • non-routable packet is also forwarded
    • No best path selection by BGP
    • uRPF loose mode may discard packets unexpectedly
  • You may abandon BGP and let upper-tier do path selection if saving cost is priority
  • Punching a hole can create an unexpected transit path
    • Better not to use hole punching
    • If you have to, PA owner and advertising ISPs should negotiate

4 octet AS

  • AS_PATH UPDATE with 4 octet AS is being advertised
  • Typical operation and general practices need to be shared among operators to clarify issues
    • What you should do if your AS is 2 octet
    • What you should do if your AS is 4 octet

IPv4 address exhaustion

  • LISP - Locator ID separation protocol
    • Can introduce more complication
    • Under discussion

Use of 240/4

  • Not supported by Windows, Unix nor routers.

IP routing: Simple is best

  • Easy to grasp entire policies
    • Avoid mistakes when designing or shooting trouble
    • Easy to train new operator, easy to take over operation
  • Adaptive to changes
    • IPv6, 4 octet AS
    • Deploying new type/make of router

Non-recommended operations

  • Source address based routing
  • More specific routes
  • Multiple origin
  • Punching holes

IPv6 routing

  • Can get usable routers
    • Expensive routers / newly released routers have sufficient performance
    • Some more feature enhancements are required
  • More inter-connect
    • Inter ISP
    • ccTLD DNS

Why don't you candidly think about NGN?


  • Panel Chair
    • Yoshiki Ishida (Japan Internet Exchange Co., Ltd.)
  • Panelist
    • Ichiro Mizukoshi (Nippon Telegraph and Telephone East Corporation)
    • Toshiya Asaba (Internet Initiative Japan Inc.)


Various activities in the NGN area are being done over several years.

And, NTT-NGN, the restructuring system of the land-line phone system, will launch soon. However, the Internet seems to be indifferent to NTT-NGN. If NTT-NGN actually starts, it will have a big influence on the operators and ISPs.

We want to discuss the prospects for the post-NTT-NGN world after delineation of NGN, and to think about the critical efects to the Internet by NTT-NGN by this session.

Topics for discussion

  • What is the essence of NGN?
  • What does NGN bring to the xSP operators?
  • What are the issues which the xSP operators should be considering?

Introduction of NOGs’ activities in the AP region


  • Miwa Fujii, APNIC Training Officer (Research and Development)
    • Bio: Miwa has served as an APNIC trainer since 2002. During this period she has provided Internet resource management education and training to many people, countries and regions in the Asia Pacific. Miwa has developed and delivered, with her colleagues, training programs on IPv6, Internet security, and the Internet Routing Registry, among other topics.

      Before joining the Asia Pacific Network Information Centre (APNIC), Miwa worked at IBM Australia as operations manager, team leader and trainer for the IBM Asia Pacific Technical Support Centre. Previously, she served various organisations as a LAN administrator, including Jardine Fleming Securities and Warburg Investment Management. Miwa was educated in Japan and Australia and holds a master degree in eCommerce.


APNIC is a Regional Internet Registry for the Asia Pacific region. APNIC maintains a close working relationship with JPNIC.

I have had opportunities to participate other NOG’s meetings, to deliver training in conjunction with their meetings or to obtain information from people who participated in such meetings due to my work as APNIC's Training Officer. I have learned that topics covered and discussed in JANOG meetings are advanced and profound. I think that various research presentations provided in JANOG meetings would be appreciated by network operators at other NOGs.

I would like to share with JANOG participants observations about other NOGs’ activities and hot topics discussed by them in this presentation. It would be great if my presentation can provide a catalyst for JANOG to start sharing and disseminating their research results related to Internet infrastructures and countermeasures to existing issues with other NOGs.

Will P2P content delivery technology make us niconico(happy)?


  • Seiichi Kawamura (NEC Biglobe Ltd.)
  • Koichi Ise (livedoor Co., Ltd.)
  • Takahiro Kubo (KDDI Corporation)
  • Masato Yamanishi (SOFTBANK BB Corp.)


This is a program that pays attention to the P2P content delivery technology.

Recently, the Internet backbone is faced with a critical bandwidth issue given the widespread use of streaming videos and bandwidth consuming content on the web.

The P2P delivery technology is being focused on as a technology that could help in evading the crisis. In this program, we discuss the foundations and the needs of the technology, a use case in the business scene, and the requirements for a feasible delivery algorithm.

This program does not take up copyright and security issues. The point is to discuss how engineers should tackle the bandwidth problem we are facing right now.

Network operators! Can you live in the IPv6 world after IPv4 exhaustion?


  • Shingo Kudo (Softbank Telecom Corp.)


There are many discussions of IPv4 exhaustion and its impact in xSP networks and their services. But how about the environment where network operators work. Don't you use lots of global IPv4 addresses for internal operation purposes? Don't you need to change all the addresses for IPv4 exahustion, do you.

To be ready, now it would be the time to think about how we can survive in such *operational* environment when we have to go into IPv6 world.

We would like to ask the audience several questions:

  • Is it important for us to be ready for IPv6 as an network operators?
  • Should we go into IPv6 ready or not immediately , when the time has come.

Notes: We will not discuss right or wrong of IPv6 shift itself.

Approaching the IPv4 address exhaustion - Considering what we can do! -


  • Kuniaki Kondo (Cyber University Associate Professor, Mahoroba Kobo CEO)
  • Susumu Sato (Japan Network Information Center)
  • Kaihei Koyama (Kurashiki Cable Television)
  • Shin Shirahata (CLARA ONLINE, Inc.)
  • Masaya Okada (NTT Communications Corp. Broadband IP Service Business Division)


JPNIC issued the "Study Report on the IPv4 Address Space Exhaustion Issue" which described the issues of service and operation from an ISP view.

The action items in ISP service and operation can often be different depending on the ISP's business model, their scale of service, and their degree of preparation for IPv6.

In this program, we invite the access line provider, the cable internet service provider, and the hosting service provider as panelists, and discuss the issues in their operations based on the JPNIC report.

[Special lecture on DC facility] How hot is your rack?


  • Hiroshi Takada (Media Exchange, Inc.)
  • Ryoko Nakanishi (MKI Network Solutions, Ltd.)


If you are not sure about air conditioning systems in data centres, we will illustrate the fundamentals of them and how they work.

If you are not familiar with "First law of thermodynamics" because you has an arts background, we will explain it more simply than wikipedia.

If you've mounted servers without thinking about air flow so far, we will show you how to mount them for stable operation.

If you don't figure out what's the problem of heat in data centres, we will tell you what's the cause of problem and the solution for it with practices.

Let's attend this lecture!

Attach file: filejanog21-bogon-filter-en.pdf 3778 download [Information] filejanog21-jpndom-09-en.pdf 3516 download [Information]

Reload   New Lower page making Edit Freeze Diff Upload Copy Rename   Front page List of pages Search Recent changes Backup Referer     RSS of recent changes
Last-modified: (2875d)