Top > JANOG21 Programs
General information about JANOG21
JANOG updateSpeaker
Summary
We really want to use IP!! - from TV Broadcasters' point of viewSpeakers
AbstractAs you know, broadcasters are an important segment of IP users and JANOG should have deeper involvement with them. We will ask them the following questions and try to deeply understand each other.
After discussions with them on the questions, we - IP operators will get new perspectives from their answers and thoughts. You’ve got be kidding! Asking about Japanese Domain Names at this late stage?Speaker
Abstract
Presentation pdf fileBogon filter countermeasures by applying non-sampling flow analysisSpeaker
AbstractWhen we start using new IP address blocks, there could be cases where these IP addresses do not have reachability to certain sites. This is the so called Bogon filter problem. This topic was discussed during JANOG 18 and RIRs have also continued their efforts to ease the situation. However, detecting Bogon filters actively is challenging due to the nature of the problem. We tried to detect Bogon filters before customers’ detected them by applying the method in this presentation, non-sampling flow analysis. We would like to introduce past case studies and applied tools and methods to have a discussion about confirming and securing reachability. Presentation pdf fileSecure CodingSpeaker
AbstractIn applications for which the equipment and software running in the Internet are suuposed to be safe, it's important for the code to be secure. But in practice, an error in the simplest program code may have a very serious vulnerability, causing a very serious risk on the network. JPCERT/CC in conjunction with CERT/CC in the U.S. is researching secure programming to avoid having such vulnerabilities in code. In this session, we will show a technique of secure coding using an example of actual network equipment. Presentation pdf fileWorking to detect traffic anomalies through threshold-triggered monitoringSpeakers
AbstractNetwork operators are always trying to find a better way to detect traffic anomalies and not to overlook those anomalies out of hundreds or thousands of ever-changing traffic graphs. One solution to this operational challenge which many operators are looking at is using threshold-triggered monitoring to detect traffic anomalies automatically. It is desired to allow operators to maintain their current level of network monitoring, or to make it even better, without overloading them with primitive routine work. We are going to focus on "threshold-triggered" monitoring in this session. RRDtool supports the Holt-Winters method. We will introduce the testing results of the effectiveness of this method, compare it with other anomaly detection algorithms, and discuss what needs to be considered in making a "feasible" threshold-triggered traffic monitoring tool. Let's discuss IP routing ‾Chair talks about the latest moves in the world and how to make the world happier‾Speakers
AbstractIt is fundamental for the Internet to function well that all involved organizations do correct routing. For the continuous future growth of the Internet, we believe it is important that we, operators, share the direction of Internet standardization and proper operational methods and implement them as required. In this session, we are going to introduce current global trends in routing, especially in BGP routing, and the current implementations of major router vendors along with their challenges and issues. SummaryWhere we are
Background of the growth
Memory on router
More about memory consumption on router
Reducing the number of routes on router
4 octet AS
IPv4 address exhaustion
Use of 240/4
IP routing: Simple is best
Non-recommended operations
IPv6 routing
Why don't you candidly think about NGN?Speaker
AbstractVarious activities in the NGN area are being done over several years. And, NTT-NGN, the restructuring system of the land-line phone system, will launch soon. However, the Internet seems to be indifferent to NTT-NGN. If NTT-NGN actually starts, it will have a big influence on the operators and ISPs. We want to discuss the prospects for the post-NTT-NGN world after delineation of NGN, and to think about the critical efects to the Internet by NTT-NGN by this session. Topics for discussion
Introduction of NOGs’ activities in the AP regionSpeaker
AbstractAPNIC is a Regional Internet Registry for the Asia Pacific region. APNIC maintains a close working relationship with JPNIC. I have had opportunities to participate other NOG’s meetings, to deliver training in conjunction with their meetings or to obtain information from people who participated in such meetings due to my work as APNIC's Training Officer. I have learned that topics covered and discussed in JANOG meetings are advanced and profound. I think that various research presentations provided in JANOG meetings would be appreciated by network operators at other NOGs. I would like to share with JANOG participants observations about other NOGs’ activities and hot topics discussed by them in this presentation. It would be great if my presentation can provide a catalyst for JANOG to start sharing and disseminating their research results related to Internet infrastructures and countermeasures to existing issues with other NOGs. Will P2P content delivery technology make us niconico(happy)?Speaker
AbstractThis is a program that pays attention to the P2P content delivery technology. Recently, the Internet backbone is faced with a critical bandwidth issue given the widespread use of streaming videos and bandwidth consuming content on the web. The P2P delivery technology is being focused on as a technology that could help in evading the crisis. In this program, we discuss the foundations and the needs of the technology, a use case in the business scene, and the requirements for a feasible delivery algorithm. This program does not take up copyright and security issues. The point is to discuss how engineers should tackle the bandwidth problem we are facing right now. Network operators! Can you live in the IPv6 world after IPv4 exhaustion?Speaker
AbstractThere are many discussions of IPv4 exhaustion and its impact in xSP networks and their services. But how about the environment where network operators work. Don't you use lots of global IPv4 addresses for internal operation purposes? Don't you need to change all the addresses for IPv4 exahustion, do you. To be ready, now it would be the time to think about how we can survive in such *operational* environment when we have to go into IPv6 world. We would like to ask the audience several questions:
Notes: We will not discuss right or wrong of IPv6 shift itself. Approaching the IPv4 address exhaustion - Considering what we can do! -Speaker
AbstractJPNIC issued the "Study Report on the IPv4 Address Space Exhaustion Issue" which described the issues of service and operation from an ISP view. http://www.nic.ad.jp/ja/pressrelease/2007/20071207-01.html The action items in ISP service and operation can often be different depending on the ISP's business model, their scale of service, and their degree of preparation for IPv6. In this program, we invite the access line provider, the cable internet service provider, and the hosting service provider as panelists, and discuss the issues in their operations based on the JPNIC report. [Special lecture on DC facility] How hot is your rack?Speaker
AbstractIf you are not sure about air conditioning systems in data centres, we will illustrate the fundamentals of them and how they work. If you are not familiar with "First law of thermodynamics" because you has an arts background, we will explain it more simply than wikipedia. If you've mounted servers without thinking about air flow so far, we will show you how to mount them for stable operation. If you don't figure out what's the problem of heat in data centres, we will tell you what's the cause of problem and the solution for it with practices. Let's attend this lecture! |