SANOG XXIII
13-21 January 2014, Thimphu, Bhutan
The venue
for SANOG XXIII is Thimphu, Bhutan. The event will be hosted by Bhutan Telecom. SANOG 23 will consists of Workshops, Tutorials and Conferences spread over 9 Days.
Call for Papers
Draft
Program schedule
Conference:
13-14 January 2014
Conference: 13th
January, 2014 (Day 1) |
|
|
|
|
14:00 - 16:00 |
Opening Session and
Keynote Address |
Chair: Jichen Thinley |
|
Opening
Address by SANOG Chair |
Tshering
NORBU, SANOG Chair &
Bhutan Telecom |
|
Address
by SANOG Founding Chair |
Gaurab
Raj Upadhay, Limelight
Networks |
|
Address
by SANOG 23 Chief Guest |
Dasho
Kinley Dorji -
Secretary, Ministry of
Information and
Communications |
|
SANOG 23
Keynote Address |
Raphael
Ho, Equinix |
|
|
|
16:00 - 16:30 |
Break |
|
|
|
|
16:30 - 18:00 |
Network Operations I |
Chair: Santanu Dasgupta |
|
Routing table and
deaggregation report |
Philip
Smith, APNIC |
|
ISP
Cache Nameservers and
BCP140 |
Yoshinobu Matsuzaki, IIJ |
|
Distributed Network
Fuction Virtualiaztion
(D-NFV) |
Yacov
Cazes, RAD |
|
|
|
|
|
|
Conference: 14th
January, 2014 (Day 2) |
|
|
|
|
09:30 - 11:00 |
Network Operations II |
Chair: Srinath Beldona |
|
T-Mobile USA and IPv6:
Why and how we deployed
464xlat |
Cameron Bryne, T-Mobile
USA |
|
Do and you - an
introduction to the
internet society
deployment &
operationalization (do)
team |
Chris Grundemann, ISOC |
|
Scaling
out a
monitoring/graphing
infrastructure |
Devdas
Bhagat, Booking.com |
|
|
|
11:00 - 11:30 |
Break |
|
|
|
|
11:30 - 13:00 |
Network Operations III |
Chair: Devdas Bhagat |
|
Security in an IPv6
world - myth and reality |
Chris Grundemann, ISOC |
|
SDN and
MPLS in the Data Center |
Sam
Aldrin, Huawei |
|
Prospects and problems
of fttx deployment in
bangladesh by GPON
technology |
Md. Hayder Ali,
Fiber@Home Limited |
|
|
|
13:00 - 14:00 |
Lunch
Break |
|
|
|
|
14:00 - 15:30 |
Regional Updates |
Chair: Gaurab Raj
Upadhaya |
|
APNIC update (20 min) |
Philip Smith, APNIC |
|
BDNOG
update (10 min) |
Fakrul
Alam |
|
JANOG
Update (10 min) |
Yoshinobu Matsuzaki, IIJ |
|
BDIX
Updates (10 min) |
GZ Kabir |
|
Peering
Discussions (40 min) |
Open |
|
|
|
15:30 - 16:00 |
Break |
|
|
|
|
16:30 - 18:00 |
Closing Session |
Chair: Philip Smith |
|
Week of
a "Network Engineer" |
Gaurab
Raj Upadhaya, Limelight
Networks |
|
SDH vs
Carrier Ethernet |
R
Subramanian, Cisco
Systems |
|
Closing
Address |
Tsering
NORBU / Govt Delegates |
|
SANOG 24
Host Address |
ISPAI
Representative |
Tutorials:
15-16 January 2014
Workshops:
17-21
January 2014
Track 1: Routing
(IPv4/IPv6) - Srinath
Beldona (Yashavi) , Philip Smith
(APNIC) Ram Krishna (Subisu), Kuenzang Dorji (BT)
synopsis :
This technical workshop is made up of
lectures and hands-on lab
exercise to teach basic routing
concepts, classifications of
different routing protocols,
Internet routing architecture,
Internet Exchange Point (IXP)
design, basic network
infrastructure design
principles, OSPF, BGP etc.
Presentations also cover
industry best practices. The
course also includes
considerable practical lab work
based using both IPv4 and IPv6.
Track 2: Virtualization
and Cloud -
Phil Regnauld
(NSRC), Brian Candler
(NSRC), GZ Kabir (BDCOM)
synopsis :
This track will provide an
overview of virtualization
technology with a series of
hands-on practical exercises, so
that participants will be able
to:
* Build desktop
virtualization with VirtualBox
* Build server virtualization
with KVM and libvirt * Use
file and block shared storage
and live VM migration * Build
redundant VM clusters with
Ganeti
There will also be
a coverage on "cloud"
infrastructure from the users'
and service providers'
perspective, with reference to
the Synnefo platform. All the
software used is open source and
free to use and distribute.
Track 3: Security Workshop -
Randy
Bush (IIJ), Steven Bellovin (Univ of Columbia), Matsuzaki Yoshinobu
(IIJ), Sheril Hermoso (APNIC),
Patrick Okui (NSRC), Fakrul Alam (bdHUB)
synopsis :
This Internet Security Workshop
will combine wide-ranging
high-level tutorials on theory
and mechanisms combined with
some hands-on labs. It will
cover
* Assets & Threat
Models * Threat Pragmatics
* Cryptography Theory and
Mechanisms * Cryptography
Applications such as ssh, VPNs,
TLS, pgp, ... * Protecting
Network Infrastructure such as
routers, switches *
Infrastructure Services * DNS
& DNSSEC * Protecting Servers
* Protecting End User Computers
* Inter-Host Protocols *
Planning * NOGs, CERTs, ...
* Law Enforcement
|