RIPE 52 Plenary Presentations Friday, 27 April 2006

Monday | Tuesday | Wednesday | Thursday | Friday

11:00-12:30

Title: National Broadband Government Think Tank (Sweden)
An example of technical policy development
Speaker: Patrik Faltstrom, Maria Hall
Abstract: A presentation of what Governments view being Public Policy and examples of how Governments work. The Swedish Government is used as an example, and the Swedish Government also present how the results of the RIPE NCC Roundtable Meetings have been used internally. Questions discussed in Sweden at the moment related to Network Neutrality are described so the audience understand what issues Governments are thinking of. (A slide set used at similar session is attached, even though the generic policy issues will be updated before the meeting.)

The Swedish Government took the initiative to this presentation as a step towards enhanced cooperation between governments are the operations community, as described in the WSIS agenda.


Title: Peering Planning Cooperation Without Revealing Confidential Information
Speaker: Thomas Telkamp
Abstract: For most Internet Service Providers the majority of their traffic enters or leaves the network via BGP enabled peerings or upstream provider(s).

Not only do these links need to have enough capacity during normal operation, they also need to provide redundant capacity during link failures. For the egress traffic (service provider to remote peer) this can be easily verified by simulating the rerouting under failure, as the topology of the network is completely known. The return traffic (remote peer to service provider) however can not be simulated, as the behaviour of the remote network is not known. This creates a gap in the planning process for external peering links.

We present a simple methodology for creating 'Failover Matrices' that describe the traffic redistribution under peering link failure conditions. The matrices provide a useful mechanism for sharing information and improving the mutual planning process without disclosing any proprietary information. We will describe the principles behind the process as well as walk through a real scenario.


Monday | Tuesday | Wednesday | Thursday | Friday