BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//NANOG 75 Event Calendar//nanog.org//
BEGIN:VEVENT
SUMMARY:NANOG 75 Hackathon
DTSTART;VALUE=DATE-TIME:20190217T163000Z
DTEND;VALUE=DATE-TIME:20190218T030000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1920
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Garden Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Sunday Meeting Registration
DTSTART;VALUE=DATE-TIME:20190218T000000Z
DTEND;VALUE=DATE-TIME:20190218T020000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1919
CONTACT:Valerie Wittkop
DESCRIPTION:\n\nTaking place in Market Street Foyer from 4:00pm to 6:00pm
LOCATION:Market Street Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hackathon Reception
DTSTART;VALUE=DATE-TIME:20190218T030000Z
DTEND;VALUE=DATE-TIME:20190218T040000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1921
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Garden Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Monday Meeting Registration
DTSTART;VALUE=DATE-TIME:20190218T153000Z
DTEND;VALUE=DATE-TIME:20190219T010000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1922
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Monday Extended Breakfast
DTSTART;VALUE=DATE-TIME:20190218T153000Z
DTEND;VALUE=DATE-TIME:20190218T174500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1923
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific B-K
END:VEVENT
BEGIN:VEVENT
SUMMARY:Monday Espresso Bar
DTSTART;VALUE=DATE-TIME:20190218T163000Z
DTEND;VALUE=DATE-TIME:20190219T003000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1925
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Market Street Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:NANOG 75 Conference Opening
DTSTART;VALUE=DATE-TIME:20190218T180000Z
DTEND;VALUE=DATE-TIME:20190218T183000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1924
CONTACT:L Sean Kennedy
CONTACT:Brad Raymo
CONTACT:Tina Morris
CONTACT:Edward McNair
CONTACT:Michael Devito
DESCRIPTION:Speaker: L Sean Kennedy\nSpeaker: Tina Morris\, Amazon Web Ser
 vices\nSpeaker: Edward McNair\, NANOG\nSpeaker: Michael Devito\, Digital R
 ealty\nSpeaker: Brad Raymo\, StackPath\n\n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Should I run my own RPKI Certificate Authority?
DTSTART;VALUE=DATE-TIME:20190218T183000Z
DTEND;VALUE=DATE-TIME:20190218T190000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1880
CONTACT:Alex Band
CONTACT:Martin Hoffmann
DESCRIPTION:Speaker: Alex Band\, NLnet Labs\nSpeaker: Martin Hoffmann\n\nS
 ince 2011\, the five RIRs have been offering Resource Public Key Infrastru
 cture (RPKI) systems\, aimed at making Internet routing more secure and re
 duce the risk of BGP hijacking. These systems allow members to log into we
 b-based portals to request an RPKI  certificate and use it to publish Rout
 e Origin Authorization (ROAs). In the hosted setup certificates\, and keys
 \, and signed products are all kept and published in the RIR infrastructur
 e.\n\nHowever\, four out of five RIRs also allow members to run their own 
 RPKI infrastructure as a so-called Delegated RPKI Certificate Authority. L
 ACNIC as the last RIR not to provide this option yet\, is committed to hav
 e this functionality available by the end of 2019.\n\nWhile a hosted set-u
 p serves many small ISPs well\, there may be good reasons to run your own 
 infrastructure instead. Possible use cases exist for:\n- Operators who req
 uire easier RPKI management that is integrated with their own systems in a
  more streamlined way\n- Operators who are security conscious and require 
 that they are the only ones in possession of the private key of a system t
 hey use\n- Operators who want to be operationally independent from the par
 ent RIR\, such as National Internet Registries (NIRs) or Enterprises\n- Op
 erators of global networks may wish to operate a single system\, rather th
 an maintain ROAs in up to five web interfaces.\n\nHowever\, running your o
 wn CA comes at a cost. The talk will discuss these as well as possible mit
 igation strategies. For instance\, providing the necessary availability ca
 n be managed by outsourcing publication to a cloud service provider.\n\nFi
 nally\, the talk will look into existing and upcoming options for deployin
 g a CA. \n\nAt the end of the talk\, interested users will have a better u
 nderstanding of which choice is best for their organization. 
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Overcoming challenges at the Oregon Country Fair
DTSTART;VALUE=DATE-TIME:20190218T190000Z
DTEND;VALUE=DATE-TIME:20190218T193000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1885
CONTACT:Jay Hennigan
DESCRIPTION:Speaker: Jay Hennigan\, Impulse Advanced Communications\n\nThe
  Oregon Country Fair is a three-day festival in a forested area with very 
 limited cellular coverage. Most of the area has no grid power. Over 900 ar
 tisans and 90 food vendors serve upwards of 40\,000 visitors during the Ju
 ly event. Providing payment card access to the nearly 1\,000 vendors has b
 een an ongoing challenge. The OCF IT crew has leveraged cable system techn
 ology to deploy a distributed wi-fi network throughout the fairgrounds. Ch
 allenges include powering the radio equipment\, good coverage in the folia
 ge\, limiting access to necessary services\, and environmental issues as t
 he area is a flood zone in winter. Using CMTS and coaxial cable trunk line
 s was the key. Wireless nodes are powered via the distribution cable. The 
 same network is also used for operational needs\, security\, etc. 
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Comparing the network performance of AWS\, Azure and GCP
DTSTART;VALUE=DATE-TIME:20190218T193000Z
DTEND;VALUE=DATE-TIME:20190218T200000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1909
CONTACT:Archana Kesavan
DESCRIPTION:Speaker: Archana Kesavan\n\nAmazon Web Services\, Microsoft Az
 ure and Google Cloud all significantly invest in their backbone networks a
 nd global regional data center presence to support performance requirement
 s. So how do these cloud networks actually behave and perform? This sessio
 n will discuss the network performance and connectivity architecture findi
 ngs gained from global measurements of Amazon Web Services\, Microsoft Azu
 re and Google Cloud\, collected from global vantage points to cloud region
 s\, within cloud backbones(inter-AZ and inter-region) and across clouds (m
 ulti-cloud). We’ll also share some interesting anomalies we observed in 
 connectivity and performance stability\, particularly in the Asia-Pacific 
 region
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Monday Lunch
DTSTART;VALUE=DATE-TIME:20190218T200000Z
DTEND;VALUE=DATE-TIME:20190218T211500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1926
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific B-K
END:VEVENT
BEGIN:VEVENT
SUMMARY:Newcomers Lunch (Invite Only)
DTSTART;VALUE=DATE-TIME:20190218T200000Z
DTEND;VALUE=DATE-TIME:20190218T211500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1927
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Bayview Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Next Gen Blackholing to Counter DDoS
DTSTART;VALUE=DATE-TIME:20190218T213000Z
DTEND;VALUE=DATE-TIME:20190218T220000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1898
CONTACT:Christoph Dietzel
DESCRIPTION:Speaker: Christoph Dietzel\, DE-CIX / TU Berlin\n\nNetwork att
 acks\, including Distributed Denial-of-Service (DDoS)\, continuously incre
 ase in terms of bandwidth along with damage (recent attacks exceed 1.7 Tbp
 s) and have a devastating impact on the targeted networks\, thus\, compani
 es/governments. Over the years\, mitigation techniques\, ranging from blac
 kholing to ACL filtering at routers\, and on to traffic scrubbing\, have b
 een added to our defense toolboxes. Even though these mitigation technique
 s provide some protection\, they either yield severe collateral damage\, e
 .g.\, dropping legitimate traffic\, are cost-intensive\, or do not scale w
 ell for Tbps level attacks.\nIn this talk we present our Next Generation B
 lackholing system\, developed and deployed at DE-CIX by combining availabl
 e hardware filters with a novel route server-based signaling mechanism. It
  builds upon the scalability of blackholing while limiting collateral dama
 ge by increasing its granularity.\nWe present the design fundamentals and 
 the building blocks while highlighting implementation challenges and perfo
 rmance evaluation.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Streaming Telemetry\, 3+ year Journey
DTSTART;VALUE=DATE-TIME:20190218T220000Z
DTEND;VALUE=DATE-TIME:20190218T223000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1902
CONTACT:Mike Korshunov
DESCRIPTION:Speaker: Mike Korshunov\, TME @ Cisco\n\nStreaming Telemetry i
 s a shift in paradigm to network monitoring & operations. End users decide
  to which models to subscribe\, the common interface\, such as OpenConfig 
 can be used. Data pushed out of the device\, increasing resource consumpti
 on efficiency. In this talk\, we will review the current state\, capabilit
 ies\, toolchain used in the stack\, latest developments & innovations such
  as gNMI and where to go next.  
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Public Speaking Forum
DTSTART;VALUE=DATE-TIME:20190218T220000Z
DTEND;VALUE=DATE-TIME:20190218T233000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1913
CONTACT:Christina Chu
DESCRIPTION:Speaker: Christina Chu\, NTT America\n\nPublic Speaking Forum 
 provides a positive and supportive environment in a small group for partic
 ipants to improve self-confidence and skills in public speaking through pr
 actice and peer feedback. We will offer fifteen seats in a group with six 
 4-min speaking slots. Space is limited. Sign up is required. First come fi
 rst served. If you sign up for a speaking slot\, please prepare for a 4 mi
 ns speech with a topic of your choice. You can sign up for a speaking slot
  at https://www.nanog.org/meetings/nanog75/psf
LOCATION:Bayview Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Uncovering Remote Peering Interconnections at IXPs
DTSTART;VALUE=DATE-TIME:20190218T223000Z
DTEND;VALUE=DATE-TIME:20190218T230000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1899
CONTACT:Christoph Dietzel
DESCRIPTION:Speaker: Christoph Dietzel\, DE-CIX / TU Berlin\n\nInternet eX
 change Points (IXPs) are Internet hubs that provide the switching infrastr
 ucture to interconnect networks and exchange traffic. While the initial go
 al of IXPs was to bring together networks residing in the same city or cou
 ntry\, and thus keep local traffic local\, we observe that this model is g
 radually shifting. Many networks connect to IXPs without having physical p
 resence at their switch(es). This practice\, called Remote Peering\, is ch
 anging the Internet topology and economy\, and has become subject of a con
 tentious debate within the network operators community. However\, despite 
 the increasing attention it is drawing\, the understanding of the characte
 ristics and impact of remote peering is limited. In this work\, we remove 
 the veil between remote peering and IXPs\, by introducing and thoroughly v
 alidating a methodology for discovering remote peers at IXPs. We (i) infer
  remote peers globally\, with high accuracy (>95%)\, (ii) study the evolut
 ion of remote peering in time\, and (iii) evaluate its impact on Internet 
 performance and resilience. We observe that remote peering is a significan
 tly common practice in all the IXPs studied\; for the largest IXPs\, remot
 e peers account for 40% of their member base. We also show that today IXP 
 growth is mainly driven by remote peering\, which contributes two times mo
 re than local peering.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:DNS Flag Day and beyond - how will it affect you?
DTSTART;VALUE=DATE-TIME:20190218T230000Z
DTEND;VALUE=DATE-TIME:20190218T233000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1918
CONTACT:Eddy Winstead
DESCRIPTION:Speaker: Eddy Winstead\, Internet Systems Consortium\n\nA numb
 er of DNS software and service providers have announced that we will all c
 ease implementing DNS resolver workarounds to accommodate DNS authoritativ
 e systems that don’t follow the EDNS protocol. Each vendor has pledged t
 o roll out this change in some version of their software by the ‘Flag Da
 y.’ \n\nDomains served by DNS servers that are not compliant with the st
 andard will not function reliably after February 1\, 2019\, and may become
  unavailable.\n\nIf your company’s DNS zones are served by non-compliant
  servers\, your online presence will slowly degrade or disappear as ISPs a
 nd other organizations update their resolvers. When you update your own in
 ternal DNS resolvers to versions that don’t implement workarounds\, some
  sites and email servers may become unreachable.\n\nThis talk will cover t
 he background of the changes\, potential affects on Internet users/provide
 rs and testing methodologies to ensure minimal impact.\n\n*** Please note 
 the following:  We in the DNS community thought we had provided plenty of 
 advance notice and forewarning of this flag day.  We did not originally in
 tend to give this talk at NANOG 75 as it is post flag day.  However\, we h
 ave received an alarming number of "OMG\, will my DNS will stop working?" 
 inquires in the past couple of weeks.  It appears auditors have just start
 ed running compliance checks.  As such\, we feel this will now be a timely
  talk.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Monday PM Break
DTSTART;VALUE=DATE-TIME:20190218T233000Z
DTEND;VALUE=DATE-TIME:20190219T000000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1928
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Using open source tools to validate network configuration
DTSTART;VALUE=DATE-TIME:20190219T000000Z
DTEND;VALUE=DATE-TIME:20190219T003000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1878
CONTACT:Daniel Halperin
DESCRIPTION:Speaker: Daniel Halperin\, Intentionet\, Inc.\n\nBugs in netwo
 rk configuration can lead to security breaches and significant downtime\, 
 which in turn leads to monetary losses and damages the organization’s re
 putation. At the same time\, network configuration is hard to get right be
 cause of the scale and heterogeneity of modern networks\, the low-level na
 ture of vendor configuration languages\, and the complexity of intended po
 licies. The emerging field of formal network validation is a direct respon
 se to this challenge. Researchers have recently developed a range of techn
 iques to scalably and comprehensively reason about the correctness of the 
 network configuration.\n\nI will present a network validation tool\, calle
 d Batfish (www.batfish.org)\, along with its new Python client library\, w
 hich is completely open source and has been used successfully inside many 
 large networks.  The talk will cover its software architecture\, provide a
  hands-on view of using it for common validation tasks\, and how the techn
 ology can be embed into the network’s lifecycle. The talk will include a
  detailed discussion of many bugs that Batfish has uncovered in real large
  networks.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Managing Network Device Properties as Code
DTSTART;VALUE=DATE-TIME:20190219T003000Z
DTEND;VALUE=DATE-TIME:20190219T010000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1879
CONTACT:Damien Garros
DESCRIPTION:Speaker: Damien Garros\, Network to Code\n\nDevice configurati
 on templates have simplified a lot of things for the network industry but 
 ​many networks are still managing their device properties (aka variables
 ) manually which is very tedious and error prone. This talk will present a
  new approach to generate and manage network device properties easily usin
 g infrastructure as code principles.​
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Peering Coordination Forum
DTSTART;VALUE=DATE-TIME:20190219T010000Z
DTEND;VALUE=DATE-TIME:20190219T023000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1929
CONTACT:Valerie Wittkop
DESCRIPTION:\n\nThe forum provides time for attendees to meet and network 
 with others in the peering community present at NANOG. Peering Representat
 ives\, who completed and submitted the form\, will have a dedicated table 
 for up to 2 representatives. They will be able to distribute business card
 s\, and provide a white paper or 1 sheet marketing page. Please note\, any
  other type of give-away is not allowed. There will also be a customized\,
  rotating slide deck on display during the forum.
LOCATION:Pacific D-G
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tuesday Meeting Registration
DTSTART;VALUE=DATE-TIME:20190219T153000Z
DTEND;VALUE=DATE-TIME:20190220T010000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1930
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tuesday Extended Breakfast
DTSTART;VALUE=DATE-TIME:20190219T153000Z
DTEND;VALUE=DATE-TIME:20190219T174500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1931
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific B-K
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tuesday Espresso Bar
DTSTART;VALUE=DATE-TIME:20190219T163000Z
DTEND;VALUE=DATE-TIME:20190220T003000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1932
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Market Street Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Members Breakfast (Invite Only)
DTSTART;VALUE=DATE-TIME:20190219T170000Z
DTEND;VALUE=DATE-TIME:20190219T174500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1944
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific L-O
END:VEVENT
BEGIN:VEVENT
SUMMARY:Control BGP state explosion in Scale-out peering
DTSTART;VALUE=DATE-TIME:20190219T180000Z
DTEND;VALUE=DATE-TIME:20190219T190000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1881
CONTACT:Rafal Szarecki
DESCRIPTION:Speaker: Rafal Szarecki\, Juniper Networks\n\n   Many large-sc
 ale service provider networks use some form of scale-out\n   architecture 
 at peering sites.  In such an architecture\, each\n   participating Autono
 mous System (AS) deploys multiple independent\n   Autonomous System Border
  Routers (ASBRs) for peering\, and Equal Cost\n   Multi-Path (ECMP) load b
 alancing is used between them.  There are\n   numerous benefits to this ar
 chitecture\, including but not limited to\n   N+1 redundancy and the abili
 ty to flexibly increase capacity as\n   needed.  A cost of this architectu
 re is an increase in the amount of\n   state in both the control and data 
 planes.  This has negative\n   consequences for network convergence time a
 nd scale.\n\n   In this session we describe how to mitigate these negative
 \n   consequences through configuration of the routing protocols\, both BG
 P\n   and IGP\, to utilize what we term the "Abstract Next-Hop" (ANH).  Us
 e\n   of ANH allows us to both reduce the number of BGP paths in the\n   c
 ontrol plane and enable rapid path invalidation (hence\, network\n   conve
 rgence and traffic restoration).  We require no new protocol\n   features 
 to achieve these benefits.
LOCATION:Bayview Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Open Networking (white box) in the Enterprise
DTSTART;VALUE=DATE-TIME:20190219T180000Z
DTEND;VALUE=DATE-TIME:20190219T183000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1911
CONTACT:Matt Turner
DESCRIPTION:Speaker: Matt Turner\n\nWhite box switches and open networking
  are no longer only for the hyper scale companies with giant IT organizati
 ons.  White box in the enterprise is possible\, given the right mindset\, 
 and a well thought out plan (after much lab testing)...  This session disc
 usses the pro's and con's\, challenges and pitfalls\, and eventual success
  of white box switch deployments at a medium size enterprise.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Four years of breaking HTTPS with BGP hijacking
DTSTART;VALUE=DATE-TIME:20190219T183000Z
DTEND;VALUE=DATE-TIME:20190219T190000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1892
CONTACT:Artyom Gavrichenkov
DESCRIPTION:Speaker: Artyom Gavrichenkov\, Qrator Labs CZ\n\nDuring the 20
 15 BlackHat conference\, the authors presented an approach which makes it 
 possible for an arbitrary attacker to use vulnerabilities in the Border Ga
 teway Protocol to obtain fraudulent certificates\, recognized by browsers 
 as valid ones\, for Web sites an attacker couldn't otherwise control.\n\nA
 s a result\, the overall security of Internet PKIX\, which we all rely on 
 daily while browsing our favorite social networks and banking systems\, wa
 s shown to be at risk.\n\nPlenty of time has passed since August 2015. Res
 earchers were digging into the issue\, certificate authorities kept an eye
  on it\, changes to Internet protocols were designed and implemented\, and
  black hats started to exploit the method after all.\n\nAs it is now almos
 t four years after the discovery of the initial issue\, it's a good time t
 o examine the outcome: what has been done\, what's yet to be done and how 
 long does it take for the Internet community to amend an Internet protocol
  even for the greater good.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Better routing security through concerted action
DTSTART;VALUE=DATE-TIME:20190219T190000Z
DTEND;VALUE=DATE-TIME:20190219T193000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1896
CONTACT:Andrei Robachevsky
DESCRIPTION:Speaker: Andrei Robachevsky\, Internet Society\n\nThere is nea
 rly universal agreement that the Internet routing system is vulnerable to 
 attack\, but thoughts on how to address the problem vary from better techn
 ology to peer pressure to business incentives. \n\nRouting security requir
 es voluntary actions from every network\, but there is little incentive fo
 r any individual network to take action. So what do we do? \n\nWe believe 
 there is enough incentive to implement the minimal\, absolutely essential 
 elements of routing security - especially if they are perceived as a commo
 n business expectation\, a norm. These norms many not necessarily bring ta
 ngible benefits to the individual network adhering to them\, but they bene
 fit society and the Internet as a whole. Norms can have wide societal supp
 ort and help expose those who do not adhere to them\, allowing for correct
 ive actions.\n\nIn this talk\, we will look at the Internet routing ecosys
 tem and identify three main categories of actors: ISPs\, IXPs\, and cloud/
 content providers. We will explore which actions can have the biggest impa
 ct on the security of inter-domain routing and look at some of the inciden
 ts from 2018 and how they could have been avoided.\n\nFinally\, we'll pres
 ent three minimum baselines for the respective categories and discuss how 
 they can become norms.\n\nTo make the discussion more interactive\, it wil
 l include real-time polling of the audience.\n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:RPKI: Legal Barriers and New Directions
DTSTART;VALUE=DATE-TIME:20190219T193000Z
DTEND;VALUE=DATE-TIME:20190219T200000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1900
CONTACT:Christopher Yoo
DESCRIPTION:Speaker: Christopher Yoo\, University of Pennsylvania\n\n2018 
 saw major growth in adoption of the Resource Public Key Infrastructure (RP
 KI) framework for routing security\, with NANOG 74 marking an inflection p
 oint. Over the year\, players like Cloudflare and NTT began participating 
 in the framework\; the five Regional Internet Registries engaged in effort
 s to make implementing RPKI easier\; programs like the Mutually Agreed Nor
 ms for Routing Security promoted RPKI around the world. At NANOG 74 in par
 ticular\, many talks and myriad hallway discussions pushed the RPKI effort
  forward. As a result\, RPKI use is higher than ever before. In Europe\, f
 or example\, over 40% of announced IP space is now covered by a Route Orig
 in Authorization—the attestation establishing who is permitted to publis
 h routing announcements for given IP space. Yet\, while North American num
 bers have increased\, they remain below 10%. To ensure continued RPKI grow
 th\, the NANOG community must pay sustained attention to the adoption effo
 rt.\n\n \n\nIn addition to describing industry-wide efforts to develop awa
 reness and better software tools to ease RPKI implementation\, this talk w
 ill present the recommendations of my team’s report\, published in Decem
 ber 2018\, concerning the legal structure supporting RPKI’s adoption\, w
 hich were heavily influenced by discussions at NANOG 74. Those discussions
  have already resulted in important changes to how RPKI resources are dist
 ributed by the American Registry for Internet Numbers (ARIN). ARIN further
  plans to consider a set of recommendations in the spring of 2019. The tal
 k will outline the reasons behind the recommendations in light of communit
 y dialogue after NANOG 74. Further\, the talk will raise an important new 
 possibility: Would it be valuable to establish an independent nonprofit or
 ganization devoted to publishing the North American RPKI repository? Such 
 an organization would require significant effort to create and operate\, b
 ut it may be more reliable and resilient when compared with the current st
 ructure for RPKI repository distribution.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tuesday Lunch
DTSTART;VALUE=DATE-TIME:20190219T200000Z
DTEND;VALUE=DATE-TIME:20190219T211500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1933
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific B-K
END:VEVENT
BEGIN:VEVENT
SUMMARY:Women In Technology Lunch
DTSTART;VALUE=DATE-TIME:20190219T200000Z
DTEND;VALUE=DATE-TIME:20190219T211500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1934
CONTACT:Mitchell Baker
DESCRIPTION:Speaker: Mitchell Baker\, Mozilla\n\nDon’t miss this opportu
 nity to hear one of TIME Magazine’s  “100 Most Influential People” s
 peak on her professional path and personal experiences as a woman working 
 in tech\, followed by a short Q&A.
LOCATION:Pacific L-O
END:VEVENT
BEGIN:VEVENT
SUMMARY:Trends in 400G Optics for the Data Center
DTSTART;VALUE=DATE-TIME:20190219T213000Z
DTEND;VALUE=DATE-TIME:20190219T220000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1883
CONTACT:Christian Urricariet
DESCRIPTION:Speaker: Christian Urricariet\, Finisar\n\nThe data center eco
 system is going through unprecedented growth and innovation as new players
 \, new business models and new technologies converge. One of the drivers i
 s the evolving landscape of fiber optics technologies enabling new archite
 ctures and enhanced levels of performance for both cloud service providers
  and enterprises. Data centers now require Ethernet switches supporting 40
 0 Gb/s data rates with high port count and low power dissipation. The talk
  covers the latest 400G industry trends in optics for the data center.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Building blocks in EVPN for multi-service fabrics
DTSTART;VALUE=DATE-TIME:20190219T213000Z
DTEND;VALUE=DATE-TIME:20190219T230000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1903
CONTACT:Aldrin Isaac
DESCRIPTION:Speaker: Aldrin Isaac\, Juniper Networks\n\nDespite its growin
 g use as a Metro Ethernet protocol\, EVPN was originally conceived to enab
 le highly flexible and scalable LANs.  In this tutorial RFC7432 co-author\
 , Aldrin Isaac\, will cover key building block functions and service model
 s with EVPN and how they might be leveraged to support diverse use cases i
 n LAN fabrics.  Focus will be more on the ways to use EVPN and less on the
  inner workings of the protocol itself.\n\nTopics covered:\n- Building blo
 ck functions and service types\n- Special use cases\n- Service chaining co
 ncepts\n- Overlay replication
LOCATION:Bayview Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:Demystifying SONET/OTN Service SLAs and how to Guarantee them over
  MPLS
DTSTART;VALUE=DATE-TIME:20190219T220000Z
DTEND;VALUE=DATE-TIME:20190219T224500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1870
CONTACT:Christian Schmutzer
DESCRIPTION:Speaker: Christian Schmutzer\, Cisco Systems\n\nFor many years
  optical transport networks have been deployed using TDM technologies such
  as PDH\, SONET and OTN providing highly performant and resilient services
  to voice and data networks. With recent advances in router/switch archite
 ctures\, embedded control plane protocols and central application software
  a single MPLS network layer can deliver any service that so far only PDH\
 , SONET or OTN could deliver. During this session we will talk about some 
 common "concerns" such as cost of transmission\, latency & jitter\, bandwi
 dth guarantees & loss\, service assurance & OAM and how they are no longer
  valid for a "neatly designed" MPLS transport network allowing network ope
 rators to remove the complexity of running many parallel networks. \n\nSub
 mitted for Christian Schmutzer\, Principal Engineer\, Optical Systems\, Ci
 sco \nBio: Christian Schmutzer is a Principal Engineer at Cisco Systems an
 d has been with the company since 1998. Early on Schmutzer worked primaril
 y on the design and deployment of large service provider backbones – wit
 h the focus on optical and routing technologies. Schmutzer then drove\, as
  the technical expert\, the product development and marketing strategy for
  the ASR 9000 and Cisco 7600 series router platforms. Since 2013 Schmutzer
  has been working on Packet/Optical network architectures and product deve
 lopment. He is the Principal Architect for Cisco's Transport Network Moder
 nization Architecture. As a speaker for technical tutorials worldwide\, he
  frequently shares his practical experience. He received his Masters from 
 the Fachhochschule Technikum-Wien\, Austria\n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:eBGP Flowspec Peering for DDoS Mitigation
DTSTART;VALUE=DATE-TIME:20190219T224500Z
DTEND;VALUE=DATE-TIME:20190219T230000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1887
CONTACT:Rich Compton
CONTACT:Taylor Harris
CONTACT:Pratik Lotia
CONTACT:Thomas Bowlby
DESCRIPTION:Speaker: Thomas Bowlby\nSpeaker: Rich Compton\, Charter Commun
 ications\nSpeaker: Taylor Harris\nSpeaker: Pratik Lotia\, Charter Communic
 ations\n\nDDoS Peering has been talked about a lot in theory but it's high
  time we started actual implementation. This talk intends to explain the p
 roof of concept\, we have developed at Charter Comm. and calls for action 
 from ISPs to participate in this so that we can mitigate DDoS attacks in a
  more effective way.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talk: RIS LIVE!
DTSTART;VALUE=DATE-TIME:20190219T230000Z
DTEND;VALUE=DATE-TIME:20190219T231000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1955
CONTACT:Jared Mauch
DESCRIPTION:Speaker: Jared Mauch\, Akamai\n\nRIPE announced a trial servic
 e called RIS Live which lets you monitor BGP data in realtime.  Monitoring
  BGP updates in realtime can provide important insights to your network an
 d operations.  
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talk: Dropping RPKI invalid routes in a service provider
  network
DTSTART;VALUE=DATE-TIME:20190219T231000Z
DTEND;VALUE=DATE-TIME:20190219T232000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1956
CONTACT:Nimrod Levy
DESCRIPTION:Speaker: Nimrod Levy\, AT&T\n\nA summary of AT&T's experience 
 deploying ROV.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talk: OpenConfig in reality
DTSTART;VALUE=DATE-TIME:20190219T232000Z
DTEND;VALUE=DATE-TIME:20190219T233000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1957
CONTACT:Chris Luke
DESCRIPTION:Speaker: Chris Luke\, Comcast\n\nMonday had a talk on streamin
 g telemetry where OpenConfig models and protocols featured and several of 
 the microphone questions/comments related to a demand for standards defini
 tion and adoption.\n\nComcast is actively working towards using OpenConfig
  to configure and monitor its core network. This lightning talk will be an
  overview of what we're getting up to\, including working with the OpenCon
 fig community and our vendors to maximize coverage for our use cases\, and
  where we're going with these models.\n\nIf there is interest we may be ab
 le to return at NANOG 76 with a full talk on our progress and challenges.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tuesday PM Break
DTSTART;VALUE=DATE-TIME:20190219T233000Z
DTEND;VALUE=DATE-TIME:20190220T000000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1936
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Security Track: LE Collaboration
DTSTART;VALUE=DATE-TIME:20190220T000000Z
DTEND;VALUE=DATE-TIME:20190220T020000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1764
CONTACT:Krassimir Tzvetanov
DESCRIPTION:Speaker: Krassimir Tzvetanov\, Fastly\, Inc.\n\nWorking with L
 E is something that many providers fear because of the unknown and and pot
 entially some history.\nHowever\, over the past decade the anti-abuse comm
 unity has come to appreciate working with LE and there has been a number o
 f really good examples of sucessfull collaboration. Mirai take-down\, the 
 Booter services take-down from Dec 2017\, etc.\nThe purpose of this track 
 is to bring in some case studies of combined commercial company and LE wor
 k to light.\n\n  * Elliott Peterson: Mirai take-down\n  * Gabriel Andrews:
  (undisclosed)\n  * Elvis Chan: (undisclosed)\n  * Case 4 (undisclosed)\n 
  * Panel discussion
LOCATION:Bayview Room
END:VEVENT
BEGIN:VEVENT
SUMMARY:P4 Tutorial
DTSTART;VALUE=DATE-TIME:20190220T000000Z
DTEND;VALUE=DATE-TIME:20190220T020000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1855
CONTACT:Antonin Bas
CONTACT:Andy Fingerhut
DESCRIPTION:Speaker: Antonin Bas\nSpeaker: Andy Fingerhut\, Cisco Systems\
 , Inc.\n\nThis tutorial includes hands-on exercises\; instructions for dow
 nloading the software is at https://p4.org/events/2019-02-19-nanog/\n\nDow
 nload all software prior to the tutorial. Attendees will learn how to expr
 ess conventional and novel data-plane applications in the P4 language\, an
 d how to compile\, execute\, and evaluate P4 programs. We will provide a V
 M image containing all the necessary packages and tools. The P4 specificat
 ion is publicly available at the P4 website under an Apache license. Key d
 evelopment tools are available as open-source tools (http://github.com/p4l
 ang).\n\nP4 (www.p4.org) is a programming language for describing how netw
 ork packets should be processed on a variety of targets\, ranging from gen
 eral-purpose CPUs to network processors\, FPGAs\, and custom ASICs. P4 was
  designed with three goals in mind: (i) protocol independence: devices sho
 uld not “bake in” specific protocols\; (ii) field re-configurability: 
 programmers should be able to modify the behavior of devices after they ha
 ve been deployed\; and (iii) portability: programs should not be tied to s
 pecific hardware targets. The P4 community maintains the language specific
 ations\, a set of open-source development tools\, and sample P4 programs w
 ith the goal of making it easy for P4 users to quickly and correctly autho
 r new data-plane behaviors. \n\nP4 continues to be a transformative techno
 logy in networking and an increasingly popular choice for developing data-
 plane designs. Well-known data-plane features typically realized in a fixe
 d-function logic are now being authored in P4\, allowing network owners to
  understand and even verify their network devices’ behavior in an unambi
 guous manner. Meanwhile\, new ideas are also being prototyped\, evaluated\
 , and productized in P4. We believe there are many opportunities for netwo
 rk operators to help evolve the design of the language\, discover new impl
 ementation techniques\, and develop their own custom use cases.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:NANOG 75 Beer n' Gear
DTSTART;VALUE=DATE-TIME:20190220T020000Z
DTEND;VALUE=DATE-TIME:20190220T040000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1937
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific Concourse
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tuesday Evening Social Event
DTSTART;VALUE=DATE-TIME:20190220T040000Z
DTEND;VALUE=DATE-TIME:20190220T070000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1938
CONTACT:Valerie Wittkop
DESCRIPTION:\n\nSponsored by: NANOG\, Salesforce\, and Iron Mountain\n\nTi
 me: 8:00pm - 11:00pm\n\nLocation: Exploratorium \n\nAddress: Pier 15 The E
 mbarcadero\, San Francisco\, CA 94111\n\nTransportation will be provided. 
 \n\n **NANOG Badge required for entry**
LOCATION:OFF-SITE: Exploratorium
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wednesday Meeting Registration
DTSTART;VALUE=DATE-TIME:20190220T153000Z
DTEND;VALUE=DATE-TIME:20190221T010000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1939
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wednesday Breakfast
DTSTART;VALUE=DATE-TIME:20190220T153000Z
DTEND;VALUE=DATE-TIME:20190220T174500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1940
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Pacific B-K
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wednesday Espresso Bar
DTSTART;VALUE=DATE-TIME:20190220T163000Z
DTEND;VALUE=DATE-TIME:20190221T003000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1941
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Market Street Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:NANOG 75 Community Meeting
DTSTART;VALUE=DATE-TIME:20190220T180000Z
DTEND;VALUE=DATE-TIME:20190220T183000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1942
CONTACT:Edward McNair
DESCRIPTION:Speaker: Edward McNair\, NANOG\n\n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:5G: An IP Engineer Perspective
DTSTART;VALUE=DATE-TIME:20190220T183000Z
DTEND;VALUE=DATE-TIME:20190220T193000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1875
CONTACT:Igor Giangrossi
DESCRIPTION:Speaker: Igor Giangrossi\, Nokia\n\nMobile networks typically 
 go through a transformation every 10 years\, with the new generation alway
 s bringing additional capacity and enhanced capabilities. This is not diff
 erent with 5G: it promises blazing speeds\, low latency\, and better suppo
 rt for deploying applications closer to the subscribers. But operators nee
 d to prepare their IP networks before they can deploy any new radio access
  technology. This session will describe the radio access network evolution
  from distributed to centralized architectures\, the innovations introduce
 d by 5G and how they impact the IP network requirements.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Minimizing Impact of ARIN policies upon the Operator Community
DTSTART;VALUE=DATE-TIME:20190220T193000Z
DTEND;VALUE=DATE-TIME:20190220T200000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1873
CONTACT:Leif Sawyer
DESCRIPTION:Speaker: Leif Sawyer\, GCI Communication\, Corp.\n\nAuthor nam
 e:  Leif Sawyer\nProfessional affiliation:  ARIN Advisory Council\, Vice-C
 hair\nEmail address: lsawyer.ak@gmail.com\nPhone Number: 907-351-1535\n\nA
 bstract:\nThis talk will start by summarizing the current ARIN policies un
 der discussion by the Advisory Council\, and how the proposals will impact
  the operator community.\n\nThe second half will focus on policies surroun
 ding database cleanup issues with regard to Point-of-Contact cleanup\, WHO
 IS\, law-enforcement objectives\, abuse monitoring and reporting\, and the
  challenges involved in ensuring accuracy while minimizing the impact on t
 he operators and the maintainers.\n\nARIN-2018-1     Allow Inter-regional 
 ASN Transfers\nARIN-2018-2     Clarification to ISP Initial Allocation and
  Permit Renumbering\nARIN-2018-3     Remove Reallocation Requirements for 
 Residential Market Assignments\nARIN-2018-4     Clarification on Temporary
  Sub-Assignments\nARIN-2017-12    Require New POC Validation Upon Reassign
 ment\nARIN-prop-255   NRPM Cleanup\nARIN-prop-256   Modify 8.3 and 8.4 for
  Clarity\nARIN-prop-257   Disallow Third-party Organization Record Creatio
 n\nARIN-prop-258   Clarify reassignment requirements in 4.2.3.7.1
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wednesday Lunch (On Your Own)
DTSTART;VALUE=DATE-TIME:20190220T200000Z
DTEND;VALUE=DATE-TIME:20190220T211500Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1943
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
END:VEVENT
BEGIN:VEVENT
SUMMARY:Re-Defining Core and Access: A New\, Two-Tier Network Model
DTSTART;VALUE=DATE-TIME:20190220T213000Z
DTEND;VALUE=DATE-TIME:20190220T220000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1876
CONTACT:Chris Grundemann
DESCRIPTION:Speaker: Chris Grundemann\, Myriad360\n\nIn the past\, when we
  designed\, built\, and operated networks as a collection of devices (rout
 ers\, switches\, and firewalls) we defined our network architecture in ter
 ms of physical layers. The three-tiered Core\, Aggregation/Distribution\, 
 and Access model is familiar to every network engineer. Server virtualizat
 ion and new application frameworks have forced us to reconsider this model
 . Instead of a multi-tier hierarchical design\, we have found folded-Clos 
 (spine-leaf) networks much more efficient at moving large quantities of pa
 ckets from anywhere to anywhere. In order to keep up with the speed of vir
 tualized compute and storage\, we’ve adopted virtualized networks that r
 un as an overlay (with the physical Clos network becoming an underlay). \n
 \nVisualizing the network in this way gives us a new 2-tier model. Instead
  of trying to conceptualize the physical network into an outdated hierarch
 y\, we can now look at the entire logical network platform as a two tier s
 ystem. The (spine-leaf) underlay is the Core layer switch and the overlay 
 is the Access layer router. This is super helpful when we want to decide w
 here network functions should live. The Core is still there to move packet
 s\, fast\, and the Access is there to handle routing and policy as well as
  to provide additional features and functions.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lossless Data Center Networks: Opportunities for NANOG Engagement 
 with IEEE 802 Nendica
DTSTART;VALUE=DATE-TIME:20190220T220000Z
DTEND;VALUE=DATE-TIME:20190220T223000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1901
CONTACT:Roger Marks
DESCRIPTION:Speaker: Roger Marks\, EthAirNet Associates\n\nNew standards i
 n support of improved data center efficiencies are emerging. In the IEEE 8
 02 Standards Committee\, the IEEE 802 "Network Enhancements for the Next D
 ecade" Industry Connections Activity (Nendica)\, which identifies industry
  requirements and trends\, has published its first report\, covering lossl
 ess networks for data centers. This report documents trends to reduce and 
 eliminate congestion that leads to packet loss and unacceptable latency in
  the modern data center. As a result of that study\, IEEE 802 has already 
 begun standardization on one solution\, based on congestion isolation as a
 n improvement to priority flow control. Nendica continues to seek user par
 tnerships to help steer future standardization in a productive direction. 
 In November 2018\, Nendica cooperated with IETF on the 802/IETF Data Cente
 r Workshop\, identifying many areas of potential cooperation and complemen
 tary opportunities. This NANOG presentation reviews some of the technologi
 es described in the IEEE 802 Nendica Report "The Lossless Network for Data
  Centers." It also proposes opportunities for cooperation with communities
  such as NANOG with an interest in networks and data centers.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Unleashing SR Traffic Engineering capabilities with SR Flexible Al
 gorithms
DTSTART;VALUE=DATE-TIME:20190220T223000Z
DTEND;VALUE=DATE-TIME:20190220T230000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1910
CONTACT:Jose Liste
DESCRIPTION:Speaker: Jose Liste\, Cisco Systems\n\nHave you ever wished yo
 u could tailor IGP computation to fit your own traffic engineering needs? 
 Such as by computing:\nPaths considering a subset of the routers in your n
 etwork? – a network plane or slice\nPaths that minimize cumulative delay
  to a destination based on measured per-link delay?\nPaths traversing only
  encrypted MACsec links? Both for primary and pre-computed backup paths\nP
 aths traversing only high speed interfaces\n\nAll the above use cases are 
 now possible.  And furthermore\, they are possible at scale and based on t
 he source routing paradigm. Meet SR Flexible Algorithms !!!\nSR Flexible A
 lgorithms (FA) is the latest standards-based tool in the SR TE toolkit. FA
  allows operators to tailor IGP SPF computation according to their own nee
 ds. An operator can define and assign new SR segments (prefix SIDs) to rea
 lize forwarding beyond SPF based on link cost. As a result\, FA provides a
  traffic engineered path from anywhere to anywhere automatically computed 
 by the IGP.\n\nThis presentation provides a technical overview of this new
  technology and its benefits for network operators\, including:\nFlexibili
 ty –operator defines algo\nSimplicity –single IGP process\, and single
  loopback with multiple SIDs\nScalability –single SID (instead of a labe
 l stack) can now be used to enforce traffic on the Flex-algo specific path
 \nRich functionality –optimum sub-50msec TI-LFA backup paths respecting 
 the same optimization objective and constraints as the primary path\nAutom
 ation –FA inherits all the scale and automation benefits powered by inte
 nt-based networking with on-demand SR policy instantiation and automated t
 raffic steering\n\nMore importantly\, presentation dwells into key use cas
 es that leverage this solution\; including:\nMulti-plane network designs\n
 Intent-based network slicing\nLow latency routing\nSecured Intelligent Tra
 nsport\n\nWhy is this session relevant to NANOG?\nFA is a new concept with
  large set of use cases. Thus\, we consider that this topic will be of int
 erest for the NANOG audience.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Building the 400G Internet - Trends\, Technologies\, and the Road 
 to 800G+
DTSTART;VALUE=DATE-TIME:20190220T230000Z
DTEND;VALUE=DATE-TIME:20190220T233000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1954
CONTACT:Christian Martin
DESCRIPTION:Speaker: Christian Martin\, Arista Networks\n\nIn this talk\, 
 Andy Bechtolsheim will share his vision for how the 400G and 800G transiti
 ons will manifest first in the DC and short haul interconnect build-outs\,
  and then extend to 100-1000km and beyond\, all based on next generation d
 igital coherent optical technology.  Advances in DSP and modulation techno
 logy make it possible to include 400G\, and soon\, 800G coherent optical t
 ransponders in standard OSPF and QSFP-DD packages that are capable of grea
 ter than 1000km transmission over commercially available fiber.  This tech
 nology makes it possible to build the next phase of intermediate and long 
 haul Internet backbones with low cost\, interoperable\, generally availabl
 e optics that leverage the same technology as short reach optics used in d
 atacenters\, thus minimizing cost by leveraging economies of scale.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wednesday PM Break
DTSTART;VALUE=DATE-TIME:20190220T233000Z
DTEND;VALUE=DATE-TIME:20190221T000000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1946
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Foyer
END:VEVENT
BEGIN:VEVENT
SUMMARY:Hackathon Recap
DTSTART;VALUE=DATE-TIME:20190221T000000Z
DTEND;VALUE=DATE-TIME:20190221T003000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1947
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talk: Misused Top ASNs
DTSTART;VALUE=DATE-TIME:20190221T003000Z
DTEND;VALUE=DATE-TIME:20190221T004000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1958
CONTACT:Anurag Bhatia
DESCRIPTION:Speaker: Anurag Bhatia\n\nThis talk covers the appearance of t
 op ASNs - AS1\, AS2 and AS3 in the global routing table. It shows the ASNs
  which "leaked" the noise as well as basic instructions to the network ope
 rators and the IXP admins to prevent those. \n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talk: Prefix Filter All the Peers
DTSTART;VALUE=DATE-TIME:20190221T004000Z
DTEND;VALUE=DATE-TIME:20190221T005000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1959
CONTACT:Chris Morrow
DESCRIPTION:Speaker: Chris Morrow\, Google\n\nI'd like to re-do (with upda
 tes) the presentation I did in Vancouver for the security track\, except d
 o it in the main session. Basically:\n  1) howdy! I'm going to start filte
 ring bgp peers\n  2) why? because .. someone turned into a transit network
  and now my customers.. wait\, I have customers??\n  3) how? With software
 ! (and some data and time)\n  4) I said this in Vancouver\, merry xmas! wa
 it\, I am late... Happy Spring Cleaning Time? (dates for execution update)
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lightning Talk: CaribNOG and Caribbean Networking
DTSTART;VALUE=DATE-TIME:20190221T005000Z
DTEND;VALUE=DATE-TIME:20190221T010000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1960
CONTACT:Stephen Lee
DESCRIPTION:Speaker: Stephen Lee\n\nThe Caribbean Network Operators Group 
 (CaribNOG) is a volunteer community dedicated to exchanging technical info
 rmation and experiences related to the management of communications networ
 ks in the Caribbean region. The group routinely deals with the issues of r
 outing\, IPv6\, cloud computing\, Internet exchange points and network sec
 urity. This talk will introduce attendees to CaribNOG and highlight 2019 a
 ctivities that would be of interest to the NANOG community.
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:NANOG 75 Conference Closing
DTSTART;VALUE=DATE-TIME:20190221T010000Z
DTEND;VALUE=DATE-TIME:20190221T013000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1948
CONTACT:Valerie Wittkop
DESCRIPTION:\n\n
LOCATION:Grand Ballroom
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wednesday Evening Social Event
DTSTART;VALUE=DATE-TIME:20190221T013000Z
DTEND;VALUE=DATE-TIME:20190221T050000Z
DTSTAMP;VALUE=DATE-TIME:20191029T155742Z
UID:1949
CONTACT:Valerie Wittkop
DESCRIPTION:\n\nSponsored by: Serro\n\nTime: 5:00pm - 9:00pm\n\nLocation: 
 SENS Restaurant \n\nAddress: 4 Embarcadero Center\, San Francisco\, CA 941
 11\n\nWalking distance from Hotel. \n\n **NANOG Badge required for entry**
LOCATION:OFF-SITE: SENS Restaurant
END:VEVENT
END:VCALENDAR
