Tutorials:
Overview |
By Day
(Sunday,
Monday, Tuesday) |
By Instructor | All in One File
M1 Network Design for High Availability NEW Vincent C Jones, Networking Unlimited, Inc. Who should attend: System and network designers and administrators who want to improve the availabiity of their network infrastructure and Internet access, and anyone looking for a survey of how IP networks can fail and techniques for keeping critical network services available despite failures. Attendees should already be familiar with basic network terminology and concepts, TCP/IP protocols, and the role of routers and switches. (This tutorial is designed to complement Tutorial S1, "Designing Resilient Distributed Systems--High Availability.") No matter how the price is measured, downtime impacts the bottom line. As organizations grow ever more dependent upon computers and their support networks, hardware and software failures that interfere with business operations are increasingly seen to be unacceptable. Availability has become a key network performance metric, commensurate with throughput and delay. We will discuss how to select and configure appropriate redundancy for common production network needs. The emphasis will be on how to take advantage of standard capabilities to make the network more reliable and to minimize the need for emergency manual intervention. Proven solutions based on open standards and protocols will be provided for a wide range of application requirements. Topics include:
Vincent C. Jones (M1)
is the founder and principal con sultant of Networking
Unlimited, Inc., a network design consulting firm specializing in network
performance and reliability enhancement. Vince has been applying the theory of
networking to the solution of real-world problems for almost three decades and
is the author of High Availability Network Design, to be published later
this year by Addison-Wesley.
Who should attend: Novice and advanced UNIX system and network administrators, and UNIX developers concerned about network performance impacts. A basic understanding of UNIX system facilities and network environments is assumed. We will explore techniques for tuning systems, networks, and application code. Starting from a single-system view, we'll examine how the virtual memory system, the I/O system, and the file system can be measured and optimized. We'll move on to Network File System tuning and performance strategies. Detailed treatment of network performance problems, including network design and media choices, will lead to examples of network capacity planning. Application issues, such as system call optimization, memory usage and monitoring, code profiling, real-time programming, and controlling response time will be covered. Many examples will be given, along with guidelines for capacity planning and customized monitoring based on your workloads and traffic patterns. Analysis periods for particular situations will be provided. Topics include:
Marc Staveley (M2)
recently left Sun Microsystems
Enterprise Services to join a start-up, where he is applying his 16 years of
experience with UNIX development and administration. Previously Marc was an
independent consultant and has held positions at NCR, Princeton University, and
the University of Waterloo. He is a frequent speaker on the topics of
standards-based development, multi-threaded programming, systems administration, and performance tuning.
Who should attend: System administrators who want to learn more about the sendmail program, particularly details of configuration and operational issues (this tutorial will not cover mail front ends). This will be an intense, fast-paced, full-day tutorial for people who have already been exposed to sendmail. This tutorial describes the latest release of Berkeley sendmail, version 8.11. We begin by introducing a bit of the philosophy and history underlying sendmail. Topics include:
Eric Allman
(M3, T9)
is the original author of sendmail. He is the
author of syslog, tset, the -me troff macros, and trek. He was the chief
programmer on the INGRES database management project, designed database user and application interfaces at Britton Lee,and contributed to the Ring Array
Processor project at the International Computer Science Institute. He is a
former member of the USENIX Board of Directors.
Who should attend: System administrators who are responsible for developing strategy for their sites, performing system reviews, planning improvements, or proposing expenditures to improve practices, and consultants wishing to develop their skills in planning work and communicating with clients. As a system administrator, you know when there is a problem. But how can you convince the higher-ups that something needs to be done? The audit is the most valuable tool in your arsenal when it comes to dealing with management, because it forces a rigorous assessment of the current situation, evaluates alternatives, and results in a document that cogently addresses the problems. Audits also have the side effect of uncovering problems you didn't even know existed! An audit enables you to prove your point and also cover your back. It should be your primary tool for:
Audits come in many shapes and sizes. They are a basic mechanism for system review and control over entropy. This tutorial introduces the concepts and principles of audits and will examine in detail how to conduct an audit, including interviews and system inspections, and how to present the results of that work to management in the form of a formal audit report. Topics include:
Geoff Halprin (M4)
is the principal consultant at The
SysAdmin Group. He has been a system administrator for the past 15 years and a
consulting system administrator for over 10. Geoff specializes in data security
and systems management disciplines and in the evaluation and improvement of
systems management practices. He has acted as consultant to a wide variety of
organizations, including government, large corporations, and several major ISPs. Geoff is also the vice-president of the System Administrators Guild of Australia (SAGE-AU) and is a member of the SAGE Executive Committee.
Who should attend: System administrators who are responsible for heterogeneous WinNT- and UNIX-based systems. Attendees should have user-level knowledge of both OSes, and, preferably, systems administration experience in at least one of them. Today's organizations choose computing solutions from a variety of vendors. Often, integrating the solutions into a seamless enterprise is a task left up to system administrators. This course covers specific issues in administering a mixture of NT and UNIX-based systems. The focus will be on practical solutions to real administration problems. Topics include:
For each of the areas we will cover:
Phil Cox
(M5, T2)
is a consultant for SystemExperts
Corporation, a consulting firm that specializes in system security and
management. Phil frequently writes and lectures on issues bridging the gap
between UNIX and Windows NT. He is a featured columnist in ;login;, the
USENIX Association Magazine and has served on numerous USENIX program
committees. Phil holds a B.S. in computer science from the College of
Charleston, South Carolina.
Who should attend: This tutorial is directed at system administrators who are planning on implementing a Linux solution in a production environment. Course attendees should be familiar with the basics of systems administration in a UNIX/Linux environment: user-level commands, administration commands, and TCP/IP networking. The novice administrator and the guru should both leave the tutorial having learned something. From a single server to a network of workstations, the Linux environment can be a daunting task for administrators knowledgeable about other platforms. Starting with a single server and ending with a multi-server 1000+ user environment, case studies will provide practical information for using Linux in the real world. Topics include (with a special emphasis on security):
Upon completion of the course, attendees should feel confident in their ability to set up and maintain a secure and useful Linux network. The tutorial allows for questions at all times.
Bryan C. Andregg
(S6, M6)
works for Red Hat, Inc. In the past three years Bryan has worked
in or with almost every position at the company, sometimes to a good end. His
current projects include Coffee Making 101 and Linux for Land Rovers. Prior to
Red Hat, Bryan was the systems and network administrator for an ISP. His current title is "Smoke Jumper."
Who should attend: UNIX and Linux system and network administrators and operations/support staff. After completing the tutorial, you should be able to establish and maintain a site that allows the benefits of Internet connectivity while protecting your organization's information. You will learn strategies to reduce the threat of Internet intrusions and to improve the security of your UNIX and Linux systems connected to the Internet, as well as how to set up and manage Internet services appropriate to your site's mission. Topics include:
Ed DeHart
(S13, M7)
is a former member of Carnegie Mellon University's CERT
Coordination Center, which he helped found in 1988. Ed has also owned an ISP,
Pittsburgh OnLine Inc., which operated several UNIX servers. Currently, Ed is
President of Prism Servers, Inc., a manufacturer of Internet firewalls and
UNIX-based Internet servers.
Who should attend: System administrators responsible for Windows servers. Topics include:
Aeleen Frisch
(M8, T6)
has been a system administra tor for over 15 years. She currently looks after
a very heterogeneous network of UNIX and Windows NT systems. She is the author
of several books, including Essential Windows NT System
Administration.
Who should attend: Administrators and programmers interested in the potential of the Lightweight Directory Access Protocol (LDAP) and in exploring issues related to deploying an LDAP infrastructure. This tutorial is not designed to be a how-to for a specific LDAP server, nor is it an LDAP developers' course. Rather, it is an evaluation of the potential of LDAP to allow the consolidation of existing deployed directories. No familiarity with LDAP or other Directory Access Protocols will be assumed. System administrators today run many directory services, though they may be called by such names as DNS and NIS. LDAP, the up-and-coming successor to the X500 directory, promises to allow administrators to consolidate multiple existing directories into one. Vendors across operating-system platforms are lending support. Topics include:
Gerald Carter
(S5, M9)
has been a member of the Samba Team since 1998 and is employed by VA Linux Systems. He is currently working with O'Reilly Publishing on a guide to LDAP for system administrators. He holds a master's degree in computer science from Auburn University, where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web-based magazines such as Linuxworld and has authored instructional course for companies such as Linuxcare. He acted as the lead author of Teach Yourself Samba in 24 Hours (Sams Publishing.)
Who should attend: System or network administrators who have been exposed to the Domain Name System only as users. A basic understanding of the IP protocols, TCP and UDP, data encapsulation, and the seven-layer model will be beneficial. DNS, the primary method the Internet uses to name and number machines, is used to translate names like "www.usenix.org" into addresses like 131.106.3.253. Any site that is serious about joining the Internet community will need to understand how to configure and administer DNS. This tutorial will describe the basic operation of DNS and will provide instructions and guidelines for the configuration and operation of DNS on UNIX platforms using the BIND software distribution. This class is designed for the beginner and is intended to provide a foundation for the tutorial on "Intermediate Topics in Domain Name System Administration." Topics include:
William LeFebvre
(M10, M13)
has been using UNIX and
Internet technologies since 1983. He has written many articles on UNIX,
networking, and systems administration issues. Currently he writes the monthly
"Daemons & Dragons" column for UNIX Review. William is the editor of
the SAGE series "Short Topics in System Administration." He has taught tutorials since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS Training Institute, IT Forum, and Great Circle Associates, and he is a certified Cisco Systems Instructor. William is the primary programmer for the popular UNIX utility top and has contributed to several widely used UNIX packages, including Wietse Venema's logdaemon package. He can be reached at wnl@groupsys.com or via https://www.groupsys.com/.
Who should attend: Managers and prospective managers, people who deal with a large customer base, and anyone who is interested in how people communicate and how to communicate more effectively. When you communicate with people, do you wait for them to meet you halfway? Are you disappointed and feel at a loss if they don't? This course gives some simple-to-learn but powerful techniques to help you communicate better with everyone, even those who don't want to communicate with you. The techniques are easy and practical--we'll demonstrate them in class, then you can go practice during the conference. Topics include:
Stephen Johnson
(M11, M14, T11, T14)
has been a technical manager on and off for nearly two
decades, in both large and small companies. At AT&T, he is best known for
writing Yacc, Lint, and the Portable C Compiler. He served as the head of the
UNIX Languages Department at AT&T's Summit Labs. He has also been involved
in a number of Silicon Valley startup companies. He served for ten years on the
USENIX Board of Directors, four of them as president. He presented an invited
talk on management at LISA three years ago, he has taught USENIX tutorials on
technical subjects, and he has led management training seminars at LISA and the
USENIX Annual Conference, as well as at Transmeta.
Who should attend: System administrators supporting many UNIX hosts; network administrators with large, distributed networks; security architects looking for alternative ways to control secure devices; senior administrators looking for mentoring and collaboration tools, or just trying to do more with less. The serial console port on a host or device can give you valuable security data and allow configuration you cannot access via the operating system on most devices. Using standard equipment and the free Conserver application, you can provide your site with managed, secure remote access to the serial consoles of your hosts, network equipment, and even non-networked devices. This class will cover implementation models and Conserver installation and configuration. It will take the mystery out of hooking most serial devices up to your terminal servers. Topics include:
David K. Z. Harris
(M12)
has been a network plumber "for more than a decade," and he Who should attend: Network administrators with a basic understanding of DNS and its configuration, those whose need to learn how to create and delegate subdomains, and administrators planning to install BIND8. Attendees are expected either to have prior experience with DNS, including an understanding of basic operation and zone transfers, or to have attended the "Introduction to Domain Name System Administration" tutorial. Attendees will move beyond the basics into a more thorough understanding of the overall design and implementation of DNS. Topics include:
William LeFebvre
(M10, M13)
has been using UNIX and
Internet technologies since 1983. He has written many articles on UNIX,
networking, and systems administration issues. Currently he writes the monthly
"Daemons & Dragons" column for UNIX Review. William is the editor of
the SAGE series "Short Topics in System Administration." He has taught tutorials since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS Training Institute, IT Forum, and Great Circle Associates, and he is a certified Cisco Systems Instructor. William is the primary programmer for the popular UNIX utility top and has contributed to several widely used UNIX packages, including Wietse Venema's logdaemon package. He can be reached at wnl@groupsys.com or via https://www.groupsys.com/.
Who should attend: Anyone who needs to deal with difficult people on the job, especially managers and those who deal with difficult clients. Difficult co-workers may be clients, employees, peers, or managers. This tutorial will discuss what makes people difficult, and how you can deal more easily with them without knuckling under. Topics include:
Stephen Johnson
(M11, M14, T11, T14)
has been a technical manager on and off for nearly two
decades, in both large and small companies. At AT&T, he is best known for
writing Yacc, Lint, and the Portable C Compiler. He served as the head of the
UNIX Languages Department at AT&T's Summit Labs. He has also been involved
in a number of Silicon Valley startup companies. He served for ten years on the
USENIX Board of Directors, four of them as president. He presented an invited
talk on management at LISA three years ago, he has taught USENIX tutorials on
technical subjects, and he has led management training seminars at LISA and the
USENIX Annual Conference, as well as at Transmeta.
|
Need help? Use our Contacts page.
Last changed: 29 Aug 2000 bleu |
|