NANOG 78 Agenda

Agenda

Our 78th community-wide gathering was held February 10-12, 2020

Webcast

Watch all recorded talks on our YouTube + view the archived presentation decks.

View the Webcast

 

View the Webcast on YouTube

 

Sunday, February 9, 2020
Topic/Presenter
Full Abstract

Brought to you by Verizon Media with additional support from Tesuto, participants will have the opportunity to work with Panoptes (https://getpanoptes.io/), a global scale network telemetry ecosystem.

Learn more at: https://www.nanog.org/meetings/nanog-78/hackathon/

Sponsors:
Full Abstract

Kick off NANOG78 with EdgeConneX and its partners at #BeersWithPeers! Join us to network and enjoy complimentary cocktails, food and music at Barbarossa Lounge in San Francisco.

**NANOG Badge required for entry**
Location: Barbarossa Lounge
Address: 714 Montgomery Street, San Francisco, CA 94111

Monday, February 10, 2020
Topic/Presenter
Sponsors:
Sponsors:
L Sean Kennedy
Tom Daly - Fastly, Advisor
Vincent Celindro - Juniper Networks
Full Abstract

Join the NANOG Program Committee and Board of Directors Chairs, as well as our Conference Host Sponsor to kick off the 78th NANOG meeting.

Speakers
  • Speaker L Sean Kennedy
  • Tom Daly - Fastly, Advisor
  • Vincent Celindro - Juniper Networks
Full Abstract

The network is among the most critical components of any computing infrastructure. It is an enabler for modern distributed systems architecture with a trend toward ever-increasing functionality and offloads moving into the network. As such, it must continually be expanded and reconfigured to deploy compute and storage infrastructure. Most important, the network must deliver the highest levels of availability. Drawing from his experience with some of the largest networks at Google and driving vertical integration across large-scale compute, networking, and storage, Amin discusses the importance of network availability, the leading causes of failure, and the design principles key to delivering necessary levels of availability.

Amin Vahdat
Engineering Fellow and Vice President
Amin Vahdat is an Engineering Fellow and Vice President for Systems Infrastructure at Google. He has contributed to Google’s data center, wide area, edge/CDN, and cloud networking infrastructure, with a particular focus on driving vertical integration across large-scale compute, networking, and storage. In the past, he was the SAIC Professor of Computer Science and Engineering at UC San Diego and the Director of UCSD’s Center for Networked Systems. Vahdat received his PhD from UC Berkeley in Computer Science, is an ACM Fellow and a past recipient of the NSF CAREER award, UC Berkeley Distinguished EECS Alumni Award, the Alfred P. Sloan Fellowship, and the Duke University David and Janet Vaughn Teaching Award.

recorded
Full Abstract

In this talk we will present some highlights from recent research results on how the sizing of router buffers affects Netflix video traffic. Our results were published at the recent Workshop on Buffer Sizing at Stanford (link to paper: http://buffer-workshop.stanford.edu/papers/paper12.pdf).

In certain locations, Netflix streams video over TCP New Reno from racks of servers that are directly connected to large routers, which in turn directly peer with commercial ISPs. We varied the size of the router buffers during periods of persistent congestion, and logged metrics such as the number of rebuffering events, video quality, and video play delay. We observed buffers that are too small and too large, both of which worsen video QoE.

Our main takeaways are:
1. The effects of router buffers on TCP New Reno matches our intuition: packet loss increases and RTT decreases as buffers shrink.
2. Video performance has a sweet spot in terms of buffer size: buffers can be both too small and too large, and in both cases increase the number of rebuffers and decrease the video quality.
3. We learned some surprising things about the buffer architecture and scheduling policy in our VOQ-based chassis routers, and will discuss how this scheduling complicates–and potentially masks–our clear understanding of buffer sizing.

Bruce Spang: Bruce is a PhD student at Stanford, advised by Nick McKeown. His research is on a combination of internet networking and theoretical computer science
recorded
Speakers
  • Speaker Bruce Spang - Stanford University
David Temkin
Suzie Gleeson
Rami Rahim
Nick McKeown - Stanford University
Julia Stern
vijay gill - Google
Full Abstract

After the success of the panel at NANOG 77, the number one piece of feedback I received was that the discussion was great, but people wanted more actionable advice - what could THEY do?. When I originally asked for an hour, I was afraid that we would run out of things to talk about - what happened in reality, was that we were only scratching the surface of what's important to the operator community.

Part 2 of the panel focuses on what actionable things we can do - as leaders, as engineers, as partners, to include more people in our industry. We need to discuss what changes can we as people make, and what changes can we push our companies to make, to bring new, underrepresented faces in and help them flourish.

Moderator: Dave Temkin, VP of Network and Systems at Netflix
Panelists:
Suzie Gleeson, Founder of Womens Tech Forum and VP at Digital Realty
Rami Rahim, CEO of Juniper Networks
Nick McKeown, Professor at Stanford
Julia Stern, Program Manager - Inclusion at Netflix
Vijay Gill, SVP of Engineering at Databricks

recorded
Speakers
  • Moderator David Temkin
  • Panelist Suzie Gleeson
  • Rami Rahim
  • Nick McKeown - Stanford University
  • Julia Stern
  • vijay gill - Google
Full Abstract

SONiC (Software for Open Networking in the Cloud) has been evolving fast. Built on top of SAI (Switch Abstraction Interface), SONiC is truly platform agnostic, enables its user to take full advantage of hardware innovations and keep the investment in the management system intact. SONiC’s unique containerized architecture plus Redis for state transition brings excellent extensibility to its users to customize for their scenarios. In this talk, we will present a full picture of SONiC to the audience – how it originated from challenges in hyper scale cloud networking, design concerns behind it, how the eco system evolved in the last two years, how Microsoft operates it and the roadmap in the near future.

recorded
Speakers
  • Speaker Rita Hui - Microsoft
Andy Smith - Cisco
Full Abstract

This talk is an overview of the strategy and application in the architecture of modern cable networks. While some of this content is specific to cable operators, the larger themes of packet and optical integration, automation, distribution of IP and Ethernet are applicable to service providers of any type or scope. Subjects include a discussion of the definition of network architecture, network discipline, technical advancements in silicon and optics and the evolution of cable metro and access networks.

recorded
Speakers
  • Speaker Andy Smith - Cisco
Full Abstract

The DNS has been around for a long time. Over the last 35 years,
how the Internet and the DNS have been used (and abused) has changed.
As a vital part of accessing services, it is critical that DNS is
accurate, available, and reliable.

But like all technology, the DNS must evolve. More widespread use
of DNSSEC and split horizon, as well as new transports such as DoT
and DoH, make best current practices very much a moving target. To
make our lives even more complicated, lots of false or stale
information about how to best run DNS services makes informed
architecture decisions a continuous challenge.

This talk will cover some of the persistant bad information that
we can't seem to get rid of, as well as covering how more recent
changes have affected the DNS or will in the near future. Armed
with more accurate information, we can weigh all the tradeoffs and
come up with a design that meets our organizations' needs.

Paul Ebersman: Paul Ebersman has been involved with NANOG to varying degrees since the late 90s and has been working with TCP/IP networks since the mid 80s. Paul Ebersman works for Neustar as a DNS architect and as a technical resource, both internally and to the internet community. He first worked on the internet for the Air Force in 1984. He was employee number ten at UUNET and helped build AlterNET and the modem network used by MSN, AOL and Earthlink. He has maintained his roots in the internet and the open source community, with heavy involvement in organizations like NANOG, IETF, ICANN/SSAC and DNSOARC.
recorded
Speakers
  • Speaker Paul Ebersman - Neustar
Full Abstract

An increased demand for privacy in Internet communications has resulted in privacy-centric enhancements to the Domain Name System (DNS), including the use of Transport Layer Security (TLS) and Hypertext Transfer Protocol Secure (HTTPS) for DNS queries. In this paper, we seek to answer questions about their deployment, including their prevalence and their characteristics. Our work includes an analysis of DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) availability at open resolvers and authoritative DNS servers. We find that DoT and DoH services exist on just a fraction of open resolvers, but among them are the major vendors of public DNS services. We also analyze the state of TCP Fast Open (TFO), which is considered key to reducing the latency associated with TCP-based DNS queries, required by DoT and DoH. The uptake of TFO is extremely low, both on the server side and the client side, and it must be improved to avoid performance degradation with continued adoption of DNS Privacy enhancements.

recorded
Speakers
  • Speaker Casey Deccio - Brigham Young University
Mark Kosters - ARIN
Recordings
Files
Full Abstract

In this session, participants will learn about RPKI and the services offered by ARIN that support RPKI deployments. The workshop on Wednesday will offer hands-on lab exercises to create Route Origin Authorization objects (ROAs) within ARIN’s Operational Test & Evaluation Environment (OT&E).

recorded
Speakers
  • Speaker Mark Kosters - ARIN
Full Abstract

The forum provides time for attendees to meet and network with others in the peering community present at NANOG.

Learn more at: https://nanog.org/meetings/nanog-78/peering-forum/

Full Abstract

NANOG Social Event

Location: SPIN
Address: 690 Folsom Street #100, San Francisco, CA 94107

Sponsors: Fastly & Windstream Wholesale

**NANOG Badge required for entry**

Tuesday, February 11, 2020
Topic/Presenter
Sponsors:
Full Abstract

In the last several decades, we have seen massive changes to networking and networking technology. From the hardware-dependent, scale up networks of then, to the software defined networks of now, cloud companies, service providers, and enterprises across the world have been on an exciting networking journey.
In this talk, Bikash discusses three distinct eras in networking: Networking 1.0, 2.0 and 3.0. Each era of networking was shaped by a killer application. That killer application led to significant technological advancements that ultimately defined networking in that era. Bikash also makes a few predictions around what is in store for networking going forward.

Bikash Koley
VP, Global Networking
Bikash Koley is the Vice President of Global Networking at Google. His team is responsible for design, build, and operation of Google’s massive global network.

Prior to Google, he was the Executive Vice President and Chief Technology Officer of Juniper Networks. In this role, Koley charted Juniper’s technology strategy and led the execution of the company’s critical technology innovations. Specifically, he was responsible for Juniper’s telco cloud and virtualization, multicloud enterprise datacenter, and software-defined enterprise networking products and technologies.

Prior to Juniper, Koley spent close to ten years at Google, where he was a Distinguished Engineer and the Head of Network Architecture, Engineering, and Planning. Prior to Google, he was the CTO of Qstreams Networks, a company he co-founded. Koley also spent several years at Ciena Corporation in various technical roles developing DWDM and Ethernet technologies.

Koley is an industry-leading expert on network function virtualization, intent driven networking (IDN), multicloud networking, warehouse-scale computing, and hyperscale network infrastructures, and received a BTech from IIT, India; and MS and PhD degrees from the University of Maryland at College Park, all in Electrical Engineering.

recorded
Full Abstract

Indigenous Communities across Canada and the US are among the most underserved in terms of Internet access. It is well established that reliable Internet service is a key enabler of economic development, entrepreneurship and SMEs, as well as much needed health and education services.
Remote locations typical of Indigenous communities present critical challenges in delivering reliable and affordable Internet services.
In this presentation, the recent successful deployment in the community of Pu’uhonua o Waimanalo in Hawaii as a private LTE network with an optical fiber backhaul is described. Technical and policy training for members of the community will be outlined. In addition, upcoming deployment in the Northern Canadian community of Uluhokhtak will be covered. Critical lessons learned from these community network deployments will be shared.

Dr. Hosein Badran: Dr. Hosein Badran holds the position of Senior Director, Internet Growth and Trust, with the Internet Society, based in Ottawa, Canada. He represents the Internet Society at the ITU-T standardization organization, particularly SG11, SG13 and SG17, and invited member of the Canadian ITU-T National Study Groups NSG11, NSG13 and NSG17. Special focus in the standardization work is on topics related to the evolution of the Internet - proposals potentially resulting in the fragmentation of the Internet, like NewIP and related proposals. He is a member of the North American Network Operators Group (NANOG) Education Committee, and the Canadian Forum for Digital Infrastructure Resilience (CFDIR), established by Innovation, Science and Economic Development Canada (ISED). He is a co-author of the final report of the Canadian Multi-stakeholder Initiative on IoT Security: “Enhancing IoT Security: Final Outcomes and Recommendations”. He has been a member of the Steering Committee of the Arab IGF since its inception in 2010, overseeing the program content for the annual event, and was the Chair of the Program Committee of the Canadian IGF 2020. During his career of over 25 years as C-level expert, he spent 14 years with Cisco Systems as Distinguished Systems Architect and Regional Chief Technology Officer as a member of the Cisco CTO Office. Before joining the Internet Society, he spent three years as Director, Special Projects and Innovation, at Qatar Computing Research Institute (QCRI), a member of Qatar Foundation, in Doha, Qatar, where he led projects dealing with machine learning and data-driven optimization in different national socio-economic initiatives including smart transportation, e-health, aviation, and cybersecurity. He worked also with Nortel Networks in Ottawa, Canada, FORE Systems (now Ericsson) in Dubai, and Siemens AG in Munich, Germany. Dr. Badran holds a Ph.D. in Electrical Engineering from Queen’s University in Canada. https://www.linkedin.com/in/dr-hosein-f-badran-4b56941/
recorded
Speakers
  • Speaker Dr. Hosein Badran - Internet Society
Sponsors:
Full Abstract

ARIN's CEO John Curran will briefly discuss what qualifies as Internet number resource fraud at ARIN, how to report cases of suspected fraud, and how ARIN handles the investigation of these reports and follow-on activities.

recorded
Speakers
  • Speaker John Curran - ARIN
Full Abstract

RPKI ROAs are created and published into a handful of top-level trust anchors. Relying Party software periodically retrieves ROAs from the RPKI, validates them, and makes them available in a local cache for routers. ROA measurement studies and monitors have helped us to understand the data being put into the RPKI. Recent studies have also tried to measure the extent to which ROV is actively being deployed to
influence routing tables based on these ROAs.

However, little is known about the population of RPKI cache servers including synchronization patterns to the trust anchors and whether they have a reasonably consistent and complete set of valid ROAs. We aim to help fill this knowledge gap through our research. We are analyzing trust anchor access logs, measuring cache server consistency, and conducting route announcement experiments to better understand how the cache server infrastructure behaves in the real world.

This talk will summarize our current progress to date, highlighting insights and challenges, as well as future directions. Most importantly, we are seeking network operator feedback and insight to help inform and improve our research.

John Kristoff: John is a PhD candidate in Computer Science at the University of Illinois Chicago studying under the tutelage of Chris Kanich. He is a principal analyst at NETSCOUT on the ATLAS Security Engineering and Response Team (ASERT). He currently serves as a research fellow at ICANN, sits on the NANOG program committee, and operates Dataplane.org. John’s primary career interests, experience, and expertise are in Internet infrastructure. He is particularly focused on better understanding and improving the routing system (BGP), the naming system (DNS), and internetwork security. John is or has been associated with a number of other organizations and projects involving Internet operations and research, some of which include: DNS-OARC, DePaul University, Dragon Research Group (DRG), IETF, FIRST, Internet2, Neustar - formerly UltraDNS, Northwestern University, nsp-security, ops-trust, REN-ISAC, and Team Cymru.
recorded
Speakers
  • Speaker John Kristoff - NETSCOUT / Dataplane.org
Full Abstract

Route servers are a convenience service that exists to lower the barrier to participate at an IXP. In the past, these route servers also distributed leaked routes from peers not participating and aggravated severe outages of the internet. Furthermore, the quality of BGP filters varies along IXPs. A few large operators implemented countermeasures like Peerlock but most other operators don't. With version 2.18.0, PeeringDB introduced a feature called “Never via route servers” for networks to indicate whether their routes should be reachable via route servers or not. This makes it possible to generate filters for all route server peerings and drop announcements containing AS numbers with “Never via route servers” flag in the AS path. Next to bogon filters, RPKI and IRR filters, this is another milestone in terms of automated routing security based on a central, authorized and well-maintained database. This talks explains how this can be easily used to generate filters by showing example API calls and router configuration.

recorded
Speakers
  • Speaker Theo Voss - ANEXIA Internetdienstleistungs GmbH
Full Abstract

On June 24th, 2019 a route leak occurred like no other route leak beforehand. A combination of route optimizers, faulty IP filtering, and a series of phone calls to an unwitting NOC caused a large amount of traffic to be dropped for no good reason.

This talk will show what happened and provide a good insight into how it could have been avoided.

Martin Levy: Roaming the planet; one packet at a time!
recorded
Speakers
  • Speaker Martin Levy - Cloudflare
Full Abstract

This session will detail network performance and connectivity architecture variations between public cloud providers AWS, Microsoft Azure, Google Cloud, Alibaba Cloud, and IBM Cloud. Data was collected from global vantage points to cloud regions, within cloud backbones (inter-AZ and inter-region) and between different clouds. The presentation will highlight network performance differences and underlying causes, why Asia has the most variation in performance across the 5 cloud providers, how connectivity to/from China affects performance, and more.

Angelique Medina: Research and writing on DNS, BGP, outages, and all things Internet-related @ThousandEyes.
recorded
Speakers
  • Speaker Angelique Medina - ThousandEyes
Full Abstract

It’s been 30 years since the famous meeting in a cafeteria where Kirk Lougheed and Yakov Rekhter used two napkins to sketch out the main feature of the BGP protocol. BGP was devised as an improved routing protocol able to fulfill the needs of an Internet that was about to take off. Yet as the architects themselves have admitted, security wasn't even on the table back then. And despite several security-driven protocol enhancements and BCPs over the past 30 years, thousands of companies and millions of end users are still affected by route leaks and hijack attempts that cause service disruptions and loss of revenue.

In this talk, Catchpoint BGP expert Luca Sani will focus on route leaks and hijacks – he will explain what the biggest security risks are, how and why they came to be, and how they've affected end-user experiences around the world over the past year. Using one of the most famous leaks of 2019 as a case study, Luca will cover what went wrong and how it could have been prevented, hoping that such an analysis could raise awareness in the NANOG community on how important is to secure your network policies regardless of the size of your organization.

recorded
Alex Latzko - DEFT.COM
Recordings
Files
Full Abstract

This is brief introduction to IPv6 for those who need a refresher or are new to IPv6. Due to time limitations, we cannot cover the full breadth of supported features, but hopefully this is enough information to get the attendees started on their IPv6 journey! The topics we will cover are addressing concepts, differences between IPv4 and IPv6, some operational examples and things to look out for.

recorded
Speakers
  • Speaker Alex Latzko - DEFT.COM
Full Abstract

When we refer to a major routing leak, we often describe it simply with a single number: the number of unique prefixes mistakenly announced. However, this one-dimensional view of a complex incident obscures the fact that not every leaked route is in circulation for the same amount of time or propagated by the same number of ASes. This talk will describe a new approach for analyzing routing leaks using an interactive 3-dimensional visualization that attempts to capture these nuances of an incident. This talk will review major routing incidents from recent years and illustrate what this new approach to analyzing routing incidents reveals.

Doug Madory: Doug Madory is the Director of Internet Analysis for Kentik where he works on Internet infrastructure analysis. The Washington Post dubbed him “The Man who can see the Internet" for his reputation in identifying significant developments in the structure of the Internet. Doug is regularly quoted by major news outlets about developments ranging from national blackouts to BGP hijacks to the activation of submarine cables. Prior to Kentik, he was the lead analyst for Oracle's Internet Intelligence team (formerly Dyn Research and Renesys).
recorded
Speakers
  • Speaker Doug Madory - Kentik
Full Abstract

What is the Intent Based Networking (IBN)?
At the highest level, intent is a declarative specification of the desired outcome. And the desired outcome is complete automation of the whole network service life-cycle, which consists of the following phases:
-design (intent consumption)
-build (intent modeling)
-deploy (intent instantiation)
-validate (continues intent validation)

Intent defines the “what” not the “how”.
Intent is dynamic, and a fundamental requirement of an IBN system is that it should be capable of ensuring that intent’s expectations are met in the presence of change.

In order to enforce that intent expectations are met, the IBNS has to be the single source of truth (regarding the intended state of both your infrastructure and your business rules) that one can programmatically reason about in the presence of change.
Taxonomy of IBN introduces 4 levels of maturity, from basic automation to self-operating networks.
Ability to constantly validate that the operational state is the intended state is fundamental for IBN to coherently provide full life cycle management, from design to deployment to operations.
This is to introduce the concept of IBA - Intent Based Analytics that are context and intent aware and gather only data that is relevant to the intent as the opposite to “big data fishing”.

Jeff Tantsura: Jeff Tantsura has been in the networking space for 25+ years and has authored/contributed to many RFC's and patents, worked in both, SP and vendor environments. He is co-chair of IETF Routing Working Group, chartered to work on New Network Architectures and Technologies, including protocol independent YANG models and Next Gen Routing Protocols as well as co-chair of RIFT (Routing in Fat Trees) Working Group chartered to work on the new routing protocol that specifically addresses Fat Tree topologies typically seen in the Data Center environment. Jeff serves the Internet Architecture Board (IAB). His focus has been on 5G transport and integration with RAN, IoT, MEC, Low Latency networking and Data modeling. He’s also a board member of SF Bay Area ISOC Chapter. Jeff is Sr. Principal Network Architect at Azure (Microsoft) focusing on new technologies with 5 years horizon as well as high performance networking in AI/ML clusters.
recorded
Speakers
  • Speaker Jeff Tantsura - Nvidia
Full Abstract

BGP policy misconfigurations have caused a number of headline grabbing outages lately. While there are some common sense improvements operators can make to help mitigate some of the causes, that is not enough. There is a need for comprehensive validation of routing policy at the peering edge. This is where Batfish comes into the picture.

Batfish is an open-source network validation tool that builds models of routing and forwarding behavior of the network from the device configurations. Batfish enables operators to understand the impact of any configuration change before deploying it to the network.

This talk will cover how Batfish works and demonstrate how an operator can validate a proposed change to BGP routing policy.

recorded
Rekha Rawat - Cisco
Mark Kosters - ARIN
John Kristoff - NETSCOUT / Dataplane.org
Nimrod Levy - AT&T
Doug Madory - Kentik
recorded
Speakers
  • Moderator Rekha Rawat - Cisco
  • Panelist Mark Kosters - ARIN
  • John Kristoff - NETSCOUT / Dataplane.org
  • Nimrod Levy - AT&T
  • Doug Madory - Kentik
Wednesday, February 12, 2020
Topic/Presenter
Sponsors:
Full Abstract

Thomas will describe in detail the structures inside optical transceivers. A Transmitter / Receiver Optical Sub Assembly (TOSA / ROSA) is no longer just a diode in a housing handling the light path to and fro to the fiber.
The performance increases from 10G to 100G onwards to 400G - are not only giant steps in bandwidth there are matching leaps in manufacturing.

How did the optical industry players around the globe make it possible to squeeze everything into the tiny form factors we see today? It is all about precision - a microscope with a calm and competent hand is no longer sufficient, now it is about; nano tolerances, testing, complex transceiver firmware and a shed load of money.

This is the high precision optical mechanical engineering revolution which fuels the hyper growth of data centers and optical networking worldwide…

If you face design issues with your current optical network design Thomas will give insights into the latest 40G to 400G transceiver developments (e.g. long distance 80km) which you can expect to see in the upcoming months. Hopefully this might save you some headaches.

As a small „one more thing" Thomas will dive into the basics of how FEC compensates for errors caused by PAM4 modulation.

presenter: Thomas Weible - Co-Founder and CTO of Flexoptix GmbH. He formerly lead the groundbreaking software development within the company. Thomas has moved more and more towards the field of transceiver technology and his so called „support with no levels and no bullshit“. Enthusiastic in everything he does, he gives realistic and practical answers to get transceivers working and operational. As speaker at several conferences around the globe he is able to target the needs of network engineers.

recorded
Speakers
  • Speaker Thomas Weible - Flexoptix
Speakers
  • Speaker Jon Worley - ARIN
Full Abstract

Network engineers understand that ASICs are the magical heart of what we do, but few of us understand how they work.

Without violating any NDAs, this talk will shine some light on what ASICs are, how they operate and what their strengths and limitations are.

We will briefly discuss single chip and multi-chip (chassis) systems and how they differ as well as the role buffers and table sizes play in the land of ASICs.

recorded
Full Abstract

With the introduction of 5G, IoT, Cloud infrastructure, and increased internet traffic demand, the network is going through a profound shift.  Emerging applications and services will bring explosive growth in traffic volume in the near term, followed by traffic demands that become increasingly dynamic and elastic and require higher network resiliency along with continuous SLA monitoring and optimization across all layers in a transport infrastructure.  The distinction between core, metro, and local area and treatment of traditionally siloed IP/Optical network layers will disappear over time.  Today’s static networks, which require manual intervention to adapt to changes in services, bandwidth, and protection, will need to evolve to become a single automated network fabric built from awareness and correlation of network resources across all transport layers for more optimal placement, dynamic optimization, and increased reliability of ever demanding service and application traffic.
 
This talk will cover the value of coordination across IP/Optical transport layers.  It will focus on customer derived use cases from a technology perspective; starting with a clear definition of the problem and gaps today, discuss the importance of awareness and correlation between these layers, followed by discussing real SDN use cases highlighting IP and Optical coordination with the goal of ensuring identified service or application SLA optimization constraints are met.

Filipe Correia: I am a Business Development Manager for Tier 1 service providers in North America, focused on Ribbon's IP, Optical, and Automation portfolio since 2021. In the past, I was also Regional Product Line Manager and Consulting Engineer in Nokia Networks’ IP & Optical Network Division, focused on IP portfolio, network automation and optimization solutions including Software Defined Network (SDN) Controllers for enterprise, web scale, and provider networks. I am a regular speaker at network and industry conferences. Currently based in Dallas, TX, and have more than 23 years of experience in telecommunications across Ribbon Communications, Nokia and Alcatel-Lucent as well as over 16 years focused in the IP division working on Enterprise and Service Provider IP/MPLS networks. Along the way, I've also lived and supported Asian Pacific accounts out of Melbourne, Australia, focused on IP/MPLS networks, which has given me a great view of network implementations across regions.
recorded
Speakers
  • Speaker Filipe Correia - Ribbon
Christina Chu - NTT
Full Abstract

The Public Speaking Forum at NANOG 78 provides a positive and supportive environment for anyone interested in sharpening their public speaking + presentation skills, or sharing insights to help others sharpen theirs. It's also the perfect opportunity to dry run your next talk.

Six 4-minute individual presentations will be given in the first hour of the forum, followed by table topics. The final 30 minutes are reserved for conversation + networking with other NANOG 78 attendees. Box lunches will be provided for the first 50 attendees.

All levels welcome. Speaking slots are limited + first-come, first-served. Sign up at https://nanog.org/meetings/nanog-78/public-speaking-forum/

Speakers
  • Moderator Christina Chu - NTT
Full Abstract

Three Purdue University Cybersecurity/Network Engineering Undergraduate Students share their in-class Networking experiences as well as their industry experiences. We hope to convey a message that will bridge the gap between industry and the classroom. It is imperative to note that times are changing and that the computing industry is moving at a much quicker pace that computing education. With this being said, this presentation should encourage businesses to interact with collegiate students in computing disciplines to better prepare the future workforce.

Presented by Tyler Peatman, John Phan and Ryan Tom
All are Teaching Assistants in Cybersecurity/Network Engineering and have had extensive industry experience.

recorded
Speakers
  • Speaker Tyler J Peatman
  • John Phan
Full Abstract

Short talk on BGP/BMP monitoring:
1) What should you monitor for?
2) How should you monitor?
3) What happens if you get an alert in monitoring this?

recorded
Speakers
  • Speaker Chris Morrow - Google
Full Abstract

At Deutsche Telekom we recently created RQspec as tooling for making full combined use of old style IRR/RPSL and new RPKI/ROA information to evaluate routing policy databases.
Not only for generating prefix filters but also offering variations of evaluation that highlight problematic
data on a web portal for analysis and diagnostics to allow cleaning of existing bad data.

recorded
Speakers
  • Speaker Ruediger Volk
Full Abstract

Network Automation has been a hot topic in the network industry for few years and yet we have very little data about the state of “network operations through automation" right now.
The goal of the Netdevops Survey is to collect information to understand how network operators and engineers are using automation to operate their network today. The survey is vendor neutral and is managed as an open source project on Github. All responses are anonymous and all results are public.

In October 2019, we collected ~300 responses from all types of network that gave us some unique insight regarding what network engineer are doing when to comes to network automation, what tools they are using and how they managed their journey to network automation. This was the second edition of the survey so this time we also have data to understand the evolution overtime.

This presentation will first present the results of the 2019 edition and share the most interesting data. In a second part, I’ll present the Netdevops Survey project, how to get involved, provide feedback and access the results

recorded
Speakers
  • Speaker Damien Garros - Network to Code
Full Abstract

From physical to virtual to the cloud (and now multi-cloud), networks are getting more diverse. For network professionals, managing across all of the diversity is a growing challenge. On top of that, SDN and SD-WAN are added architecture elements making the network stack even more difficult to holistically understand. Add virtualization, network overlays, and container networks to the mix, and you’ve got increasingly dynamic networks — i.e. networks that come and go — which make network visibility and management harder than ever to achieve. If you couple this with vendor-specific tools, the chore of managing a portfolio of network management software has become increasingly challenging.

What’s the answer to managing today’s networks? Automation. However, automation does not necessarily mean simplicity. Most network teams have countless automation tools, and many are adding more. As teams transition from custom tools to network configuration and change management (NCCM), fast forward to DevOps tools, and throw in the future promise of intent-based networking, how is a team to manage this level of complexity?

In his talk, former Gartner analyst Jonah Kowall, CTO of Kentik, will discuss the critical role that network teams play in automation. He will explain why the current promise (or “hype”) of network automation is centered around closed-loop automation (a combination of telemetry, analytics, and orchestration) to drive a future network which incorporates AIOps platforms to integrate different technologies in a more repeatable way to operate a network and facilitating self-healing and scaling networks. At the same time, he'll cover where we truly are: between the promise of automation and the baseline of ad-hoc coding of scripts for specific workflows. Additionally, Kowall will offer advice on what’s needed in order for the industry to make the leap from partial to full network automation.

The audience will walk away with a better understanding of the current automation strategies that can be applied within their own organizations, in addition to learning what’s ahead for network automation.

recorded
Full Abstract

In this talk, we would like to present a platform that we have been using in the last four years at ETH Zurich to teach our students how the Internet practically works. Our platform faithfully emulates the real Internet infrastructure and allows our students to operate their very own Internet infrastructure composed of hundreds of routers and dozens of Autonomous Systems (ASes). Their goal? Enabling Internet-wide connectivity.
We find this class-wide project to be invaluable in teaching our students how the Internet practically works. Our students have gained a much deeper understanding of the various Internet mechanisms alongside with their pitfalls. Besides students tend to love the project: clearly the fact that all of them need to cooperate for the entire Internet to work is empowering. We have designed the platform to be flexible and scalable so that it can easily be adapted to other networking courses, and have open-sourced it at https://github.com/nsg-ethz/mini_internet_project.
In a technical report (https://arxiv.org/pdf/1912.02031.pdf), we share our four year-long experience in teaching how the Internet works with the mini-Internet project. As we believe this platform can be useful for anyone who would like to understand or teach how the Internet actually works, we propose to introduce it during the next NANOG meeting.

Thomas Holterbach: Thomas Holterbach received the M.Sc. degree in computer science from Strasbourg University, France, in 2014. He is currently a fifth year PhD Student at ETH Zurich, in the Networked Systems Group. He is interested in Internet routing, measurements and now focuses on designing applications that run on programmable network hardware. At ETH Zurich, he is also a teaching assistant for several computer networks courses since 2016.
Speakers
  • Speaker Thomas Holterbach - ETH Zurich
Sponsors:
Full Abstract

Efficiently planning the wide area network (WAN) provides strategic value to the operator.
This planning has traditionally been done via general rules of thumb (which can be ineffective and/or inefficient) or commercial modeling software (which costs tens to hundreds of thousands of dollars).

The python3 Network Traffic Modeler (pyNTM) is an open source network simulation engine. Users with basic to intermediate python experience and a reasonable traffic matrix now have the ability to run simulations that allow them to gain understanding of their network and how to more efficiently grow it without overbuilding (stranding capital) or underbuilding (increased risk).

This talk will cover basic network modeling concepts, the strategic value of modeling the WAN, and how pyNTM facilitates effective planning and understanding of the WAN. It will also cover pyNTM's place in the modeling ecosystem and what types of organizations pyNTM will create value for.

Agenda:
- Problem statement
- Network modeling is strategic
- What is a network model?
- We need open source tools in this space
- What is pyNTM and why is it helpful?
- pyNTM features and roadmap
- Can pyNTM help you now?
- Next steps
- Demo

The demo will include
- Load model file
- Look at interface utilization
- Visualize network (beta feature)
- Get shortest path between 2 layer 3 nodes
- Fail interface
- Visualize network
- Look at interface utilization during failure
- Get demands on an interface
- Get path info for an ECMP demand

Tim Fiola: Tim Fiola started his career as a network engineer and has served in various roles, including the IP Test Lab at Level 3 Communications and as a Wide Area Network and Automation Consultant in Professional Services at Juniper Networks. During his time in Professional Services at Juniper Networks, he authored two books: This Week: Deploying MPLS and Day One: Navigating the Junos XML Hierarchy. In 2011, Time started a new role as a Sales Engineer at Cariden Networks. In that role, Tim learned the value that modeling the wide area network provides and how the mechanics of modeling and simulations work. Additionally, Tim also worked with several customers who were facing the challenges of scaling. He noticed that the organizations that were successfully overcoming those challenges were automating to overcome scale. With that, Tim dedicated himself to learning Python and automation in order to provide more value. When he finally found the networkx python package in 2018, he realized he had all he needed to create an open source model: networking knowledge, coding experience, and an efficient path-finding algorithm.
recorded
Speakers
  • Speaker Tim Fiola
Full Abstract

The SRv6 network programming model was first presented at IETF in March 2017. During the last two years, the ecosystem around the technology has made tremendous and successful implementation, deployment and standardization efforts.

In this talk, we will present the SRv6 ecosystem, standardization progress and the available implementations, both open source and commercial.

Then we will delve into the SRv6 deployed use-cases from (Softbank, Iliad) and planned deployments.

recorded
Vincent Celindro - Juniper Networks
Speakers
  • Speaker Vincent Celindro - Juniper Networks

Network Lounge: Netrality

Service Sponsors: ARIN, Cloudflare, ISC, ServerCentral