Sponsors - Thank You! University of Oregon Sprint Cisco IETF Secretariat The Measurement Factory Foundry Beer ‘n Gear: AdlexArbor Cisco Force10 Juniper.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Chapter Twenty Navigating the Internet. Objectives To learn about the history of the Internet To examine the infrastructure of our electronic world To.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
TECHNOLOGY GUIDE 5 Basics of the Internet and the World Wide Web.
CEG3185 Tutorial 7 Routers and Routing. IP Address An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer,
Chapter 5 - TRANSPORT and NETWORK LAYERS - Part 2 - Static and Dynamic Addressing Address Resolution Dr. V.T. Raja Oregon State University.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Configuring Linksys Wireless Ethernet Bridge Prof. Valencia Community College.
Basics Dayton Metro Library Place photo here August 10, 2015.
Windows 2003 and 802.1x Secure Wireless Deployments.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
1 The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its.
Darlene Redmond Fall  Main Web Page: ◦  ◦ 3.
What is the Internet? 11/27/07. Where did the Internet start?  Networked computers started by Military  ARPANET – 1969 experiment by the Defense department.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Welcome to NANOG18 February 6-8, 2000 San Jose CA Hosted by Exodus.
WELCOME !. Where We’re From Attendee Occupations 43 % 27 % 7 %
Nanog 14, Atlanta Interesting Peering Activities at the Exchange Points 1 Naiming Shen Cisco Systems.
The Internet. Network - Collection of computers and devices connected together via communications devices Internet - Worldwide collection of networks.
Operational Security Capabilities for IP Network Infrastructure
Discovery issues in atoca Brian Rosen. We need to handle several cases Some alerts are broadcast via some access network specific mechanism (multicast,
CS 447 Networks and Data Communication Department of Computer Science Southern Illinois University Edwardsville Fall, 2015 Dr. Hiroshi Fujinoki
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Session - Introducing OneNote Ambition in Action Agenda /What is OneNote? /Navigation – Notebooks, sections, pages /Adding content.
IETF 81: V6OPS Working Group – Proxy Mobile IPv6 – Address Reservations 1 Reserved IPv6 Interface Identifier for Proxy Mobile IPv6 Sri Gundavelli (Cisco)
DHS/NCS Priority Services By An Nguyen. Introduction: National Security/Emergency Preparedness (NS/EP) users rely heavily on public telecommunications.
1 Copyright © 2015 Pexus LLC Patriot PS Personal Server How to configure as a Mail server.
Craig Labovitz, Merit Network. NANOG14 Facilities NetRail Local Host –Internet Connectivity –Terminal Room –Logistics No lunch Tutorials last night BOFs,
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Welcome to NANOG17 October 3-5, 1999 Montreal CA Hosted by Nortel & Mlink Internet.
1 The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Summer Intern Showcase Hello, I am Utkarsh Goel Division: PDG Department: Foundry Web Experience Title: Research Engineer Hiring Manager: Moritz.
1 The Internet Introductory material. An overview lecture that covers Internet related topics, including a definition of the Internet, an overview of its.
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
Network Support for Video 1. QOS – It’s all about the quality Initially only on the WAN links Now marked at the edge (current best practice) –Video is.
NANOG 15 January 31 - February 2, 1999 Denver, Colorado Hosted by Qwest Communications.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
NANOG Hosted by Group Telecom (thank you Randy !) 525 attendees (445 in Miami) 17 countries Randy Neals.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
IT 390 Intrusion Detection and Incidence Response Randy House, PhD.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
IETF 58 OSPF WG Rohit Dube/Acee Lindem (Chairs) November, 2003 Rohit Dube/Acee Lindem (Chairs) November, 2003.
Lab 11 Overview Windows Server Last Labs wk14
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Internet Protocol Address
Module 3 (Ground Rules and Rules of Engagement)
Homework 4.
EA C451 Vishal Gupta.
Introduction 1 1: Introduction.
Wednesday, September 19, 2018 What Is the Internet?
WELCOME !.
Networx – Enterprise Services: Awarded May 31, 2007
Networx – Enterprise Services: Awarded May 31, 2007
Understanding Cisco Router Security
WELCOME !.
ISMS Information Security Management System
802.11b Wireless Network Security
Useful Note.
WELCOME TO NANOG 19 June 11-13, 2000 Hosted by iHighway.
Behind the scenes: How the Internet Works
Read this to find out how the internet works!
YANG Data Models for TE and RSVP draft-ietf-teas-yang-te-21 draft-ietf-teas-yang-rsvp-11 draft-ietf-teas-yang-rsvp-te-07 Tarek Saad, Juniper Networks Rakesh.
YANG Data Models for TE and RSVP draft-ietf-teas-yang-te-21 draft-ietf-teas-yang-rsvp-11 draft-ietf-teas-yang-rsvp-te-07 Tarek Saad, Juniper Networks Rakesh.
Presentation transcript:

Sponsors - Thank You! University of Oregon Sprint Cisco IETF Secretariat The Measurement Factory Foundry Beer ‘n Gear: AdlexArbor Cisco Force10 Juniper Packet Design Redback Seranoa

Eugene attendance++ Total attendance 520 Toronto 509 Miami 425 NAPs represented 8 Univ/college/schools 16 Asia/Pacific/Africa 36 Europe 17 Carribbean 1

Commercial vs. non-profit attendees

Vendors vs. ISPs vs. others

Organizations with largest attendance UO40 Cisco31 AT&T16 Sprint16 Juniper12 Merit12 ARIN 8 NTT 8

NANOG list Direct NANOG subscribers 5927 nanog-announce 533 nanog-post 4635 nanog-digest 809

Presentations are on the web Linked off the agenda page:

Intrusion detection system Info about Bro: No personally identifiable information, including IP addresses, domain names, or other identifiers gathered in the course of operating the NANOG/ARIN meetings network will be shared with third parties unless such disclosure is required by law. All copies of personally identifiable information gathered will be destroyed no later than five days after the end of the meetings.

Wireless (in)security Don’t use cleartext passwords End-to-end authentication needed (e.g., ssh)