back to meeting agenda.

Tuesday Registration
Date/Time 7:30 AM to 5:00 PM
Location Grand Registration
back to meeting agenda.
Tuesday Extended Breakfast
Date/Time 7:30 AM to 9:45 AM
Location Grand Ballroom North/Central
Sponsors
Opengear
Seaborn Networks
Telstra
back to meeting agenda.
Tuesday Espresso Bar
Date/Time 8:30 AM to 3:30 PM
Location Congressional Registration
Sponsors
QTS Richmond NAP
back to meeting agenda.
Members Breakfast (Invite Only)
Date/Time 9:00 AM to 9:45 AM
Location Grand Ballroom South
back to meeting agenda.
Exploring the New Wave of Subsea Cables to North America
Date/Time 10:15 AM to 11:00 AM
Location Renaissance Ballroom
Presenters
Moderator
Tim Stronge, TeleGeography
Tim Stronge is Vice President of Research at TeleGeography. His areas of expertise include international voice traffic, terrestrial and submarine cable systems, and international bandwidth markets. Since joining TeleGeography in 1996, Tim has served as a principal analyst in most areas of research, including network infrastructure, bandwidth demand modeling, cross-border traffic flows, and telecom services pricing. He holds a Master's degree in International Economics from John Hopkins University and a B.A. from the College of William and Mary.
Panelist
NIgel Bayliff
Erick Contag
Brian Lavalle
Abstract Telegeography’s Tim Stronge will present an overview of the recent and upcoming subsea cables landing into North America. Tim will then be joined by an expert panel to discuss the technical and commercial impacts of these new systems. Topics to include the demand driving these new builds, the technology underpinning the massive capacity gains per system, the growing diversification of North American landing points, and the shift/implications of subsea cable ownership towards content providers.
Presentation Files
Video Files
back to meeting agenda.
Public Speaking Forum
Date/Time 10:15 AM to 11:45 AM
Location Congressional AB
Presenters
Speaker
Christina Chu, NTT America
Christina serves as the Director of IP Strategic Planning in NTT America, Inc. She has over 20 years of experience in the Internet industry and is passionate in building communities. She has served four years in the NANOG Program Committee. She currently serves the Global Peering Forum board. Having participated in Toastmasters provides her firsthand experience the benefit of constant practice in improving one’s public speaking skills. She would love to help NANOG put together this public speaking program to nurture the community’s interest in presenting on stage.
Abstract Public Speaking Forum provides a positive and supportive environment for participants to practice public speaking skills. All levels are welcome. The first hour starts with introduction, followed by individual presentations, and ended with table topics. The remaining 30 mins are networking time. If you are interested in improving public speaking skills, helping others improve, or networking, this activity is for you. Feel free to use this opportunity to dry run your next presentations. Six 4-min speaking slots are available. Sign up is required if you want a speaking slot. First come, first served. You can sign up via the following URL: https://archive.nanog.org/meetings/nanog76/psf
back to meeting agenda.
Transport Network Requirements and Architecture for 5G
Date/Time 11:00 AM to 11:30 AM
Location Renaissance Ballroom
Presenters
Speaker
Mikael Holmberg
Mikael Holmberg is an experienced networking professional that has over 25+ years experience in Telecom and Networking industry, he is acting as a subject matter expert in networking architectures and technologies.
Abstract This talk will cover the core network requirements for 5G transport. I will cover the 5G architecture on high level pointing out that 5G services are all "softwarized" i.e. cloud native with NFV and SDN enabling flexibility in service deployments. This means that you still need to have a core network (wired) in place to get to your virtualized services like vRAN etc residing in a DC somewhere. Also MEC will be discussed with "micro DCs" closer to the user. This talk will walk the audience through things like network slicing, TSN, automation in relation to the new 5G services like Massive IoT, Mission Critical Services, /FixedMobile Broadband etc. Link to this talk given at an other event: https://www.youtube.com/watch?v=f9ZpMorsXhU
Presentation Files
Video Files
back to meeting agenda.
Crossing The Technology Desert - Rural and Tribal Broadband
Date/Time 11:30 AM to 12:00 PM
Location Renaissance Ballroom
Presenters
Speaker
Matt Rantanen, Arcadian Infracom / SCTCA
Matthew Rantanen, Dir of Technology: Southern California Tribal Chairmen's Association & Director: Tribal Digital Village Network & Lead: Partnering & BizDev at ARCADIANINFRA.COM, a fiber infrastructure company, bringing fiber through rural USA, & Indian Country. Of Cree, Finnish, & Norwegian decent, a "cyber warrior for community networking." helping 20 SCTCA Tribes in technology vision. 2 Terms, FCC Native Nations Broadband Task Force (Genachowski & Wheeler). Appointed to FCC: Communications Security, Reliability and Interoperability Council 4. Former 2-term Chairman at Native Public Media, Vice-Chair & Treasurer. Co-Chair:Tech & Telecom Subcommittee: National Congress of American Indians. Drafting policy with Tribes for use with the Federal Government. Matthew speaks to support unserved/under-served communities, with local, state & Federal government departments. Speaking internationally at ICANN, Internet Governance Forum(UN) Testified at FCC hearings, GAO and the California Public Utilities commission.
Abstract This presentation would address the current problems servicing rural and tribal areas, the reasons for, and new initiatives to fix these problems. Rural and tribal broadband has been a problem since the first long-haul routes were built. The model of economic incentive at the time was not conducive to landing fiber in sparsely populated areas or where right-of-way owners caused delays or impasses. The divide between the haves (broadband, cell) and have-nots has now caused a socio-economic and cultural catastrophe that few could have imagined. There is a changing tide that is now allowing these routes to be built. The primary driver is the rise of the hyperscale content provider and their need for diversity and capacity that is allowing new routes to be built. We can capitalize from these routes by connecting the formerly bypassed areas that are along or near the new running lines. There are significant changes in tribal politics which are also providing access to trusted partners where none existing prior. Add the government economic incentives and the time is right to finally fix this inequity that we take for granted in heavily connected areas. This presentation will not deep dive into the technical details of fiber. If specifics are desired, construction information can be presented, but that would most likely be better served with company specific information outside of this presentation. This presentation would discussing the changing climate and what it means to these affected areas, as well as present the benefit to the content providers, carriers, partners, and end users. The presentation would be given by Matt Rantanen, Southern California Tribal Chairmen’s Association, Tribal Digital Village Network/Initiative, Chairman of the Board for Native Public Media, FCC Native Nations Broadband Task Force. Matt is of Cree ancestry and is involved with all aspects of empowering tribal lands through technology. He's also 6-'6", fully tattooed, and hangs out with Slayer.
Presentation Files
Video Files
back to meeting agenda.
Tuesday Lunch
Date/Time 12:00 PM to 1:15 PM
Location Grand Ballroom North/Central
Sponsors
Kentik
ThousandEyes
XKL
back to meeting agenda.
Women In Technology Lunch
Date/Time 12:00 PM to 1:15 PM
Location Grand Ballroom South
Presenters
Speaker
Susan Forney, Hurricane Electric
Presentation Files
Sponsors
Netflix
back to meeting agenda.
DNSSEC. What it is and what it isn't.
Date/Time 1:30 PM to 2:15 PM recorded
Location Congressional AB
Presenters
Speaker
Paul Ebersman, Neustar
Paul Ebersman has been involved with NANOG to varying degrees since the late 90s and has been working with TCP/IP networks since the mid 80s. Paul Ebersman works for Neustar as a DNS architect and as a technical resource, both internally and to the internet community. He first worked on the internet for the Air Force in 1984. He was employee number ten at UUNET and helped build AlterNET and the modem network used by MSN, AOL and Earthlink. He has maintained his roots in the internet and the open source community, with heavy involvement in organizations like NANOG, IETF, ICANN/SSAC and DNSOARC.
Abstract DNS hijacking has become a mainstream technique for subverting websites, stealing login credentials, fraud and abuse. The DNS is a complex system with many attack surfaces. Defending the integrity of your DNS is more critical than ever but how? DNSSEC is a useful layer of a defense in depth of your DNS but it isn't the only layer or technique. Learn in detail what DNSSEC can defend against and what else you need to do.
Presentation Files
Video Files
back to meeting agenda.
Hackathon Recap
Date/Time 1:30 PM to 2:00 PM
Location Renaissance Ballroom
Presenters
Speaker
Syed Ahmed
Presentation Files
Video Files
back to meeting agenda.
Building an ISP in a box
Date/Time 2:00 PM to 2:30 PM
Location Renaissance Ballroom
Presenters
Speaker
Justin Kilpatrick, althea.org
CTO and Lead developer for Althea. Free software fanatic, Linux expert, former Red Hatter
Abstract Althea (althea.org) which is an open source 'distributed isp' or 'isp in a box', as such we perform traffic shaping, routing, encryption, and billing entirely on home wifi routers re-flashed with a open source OpenWRT image of our own design. The goal is to eliminate the need for any sort of configuration or network engineering from the entire process of being an ISP, everything is as easy as plugging one device into the next. Or at least it should be. This talk will go into detail about the open source technologies used and problems encountered in creating an modern and reliable ISP where no one is in charge. Main topics * Babeld, a link detecting auto failover 'mesh' protocol that's reliable, stable, and easy to use. * Wireguard, an ultra low overhead VPN protocol that provides incredible security at an overhead acceptable for even embedded devices * Bufferbloat.net (http://bufferbloat.net/) (Specifically fq_codel and Cake) lag spikes are obsolete. There's no reason to be afraid of queue management anymore. * Tales from the field, what operating and using a system like this is like.
Presentation Files
Video Files
back to meeting agenda.
BGP Route Security - Cycling to the Future!
Date/Time 2:30 PM to 3:15 PM recorded
Location Congressional AB
Presenters
Speaker
Alexander Azimov, Yandex
Alexander Azimov is network expert at Yandex, where he focuses on the network monitoring, routing security and transport layer architecture. He is a frequent presenter at network operator events such as NANOG, RIPE, ENOG & APRICOT for over 5 years. Alexander is active in the IETF where he co-authoring several Internet-Drafts.
Abstract The BGP routing protocol was designed to control traffic at interdomain routing level, but Its scalability and extensibility made it popular in other environments: FlowSpec, VPN, SD-WAN, and other technologies relies on underlying BGP transport. Unfortunately, this diversity of applications haven’t changed the BGP protocol itself – the protocol communications are built on trust, trust in good intentions of all parties, and the trust doesn’t scale that much. In recent years there was a growing hacker activity in BGP with confirmed redirection to the fishing sites, lost of credentials, etc. The community has very limited technical opportunity to fight this threat: most of the filtering measurements are limited to detection of mistakes, others are hardly deployable. During this report, I will provide an overview of previous security mechanisms that were designed to detect malicious routes in BGP and present a novel approach called Autonomous System Provider Authorization (ASPA) that can fill the gap and significantly limit opportunities for attackers.
Presentation Files
Video Files
back to meeting agenda.
Predicting Network Behavior Using Machine Learning/AI
Date/Time 2:30 PM to 3:00 PM
Location Renaissance Ballroom
Presenters
Speaker
Srividya Iyer
Srividya Iyer has over 15 years of experience in the networking industry. She has worked at Motorola Mobility in the areas of Metro Ethernet and Seamless Mobility. Prior to that she was at Telcordia Technologies working on Fault and performance management systems. Currently, she is involved in the Research and Development of Machine Learning solutions for networking and has received a National Science Foundation grant for researching Self adaptive Machine Learning models for event correlation.
Abstract Artificial Intelligence and the related field of Machine Learning is being increasingly used in applications to learn from data in diverse domains. This has been enabled in recent years by increased data availability and improved ML/AI techniques. This talk will provide an overview of Machine Learning/Artificial Intelligence terminology and will look at different Machine Learning techniques that can be used to understand network behavior. It will specifically cover the Machine Learning techniques of classification, anomaly detection and prediction using real world examples. It will also look at the challenges in learning from network data and the benefits and limitations of Machine Learning applied to networking.
Presentation Files
Video Files
back to meeting agenda.
Lightning Talk: BGP on the edge: making the internet withstand extreme weather events.
Date/Time 3:00 PM to 3:10 PM
Location Renaissance Ballroom
Presenters
Speaker
Scott Johnson, SolarNetOne, Inc.
Abstract Flooding, hurricanes, tornadoes, fires and other severe weather/environmental events can dramatically impact our ability to deliver IP based communications to end users, which can include emergency services. While the primary use of BGP is interconnection of ISP's, enterprise and government network users can also benefit from the ability to deploy BGP on the edge for multi-homing and redundancy purposes. A many-pathed network becomes significantly more robust for every participant. Direct carrier participation in paid, filtered peering arrangements can contribute to the solution, as can IXP based encrypted tunnel endpoints providing BGP sessions to the edge. With the increase in severe weather events effecting more and larger service areas, additional effort is required to ensure that our networks don't fail as a result of a more hostile, changing climate, just as packet switching ensured continued communications between key facilities in the event of nuclear attack.
Video Files
back to meeting agenda.
Lightning Talk: Open Source and Network Operations -- let's make it work!
Date/Time 3:10 PM to 3:20 PM
Location Renaissance Ballroom
Presenters
Speaker
Leslie Daigle, ThinkingCat Enterprises
Abstract N.B.: This would be best on Tuesday; I have to leave immediately following the lightning session on Wednesday, and I'd like to have time for feedback. Abstract: Networking and software have had a challenged relationship. While network operators could benefit from Open Source Software (OSS) going forward, OSS hasn’t traditionally met operator needs, and operators may not have the time or resources to contribute to it. This talk will introduce an information-gathering survey of network operators to gather information about: + Scoping – would there be interest in reference implementations for new and existing open standards? Horizontal implementation of networking suites to facilitate new development (e.g., IoT, whitebox routing)? Opportunistic development of specific network management and monitoring tools? + Support and uptake – what are the primary factors in ensuring uptake of the resulting software? (E.g., involvement in development, having paid support plans available, etc). This lightning talk will introduce the survey, solicit input to help shape the questions to achieve a useful result, and help shape future OSS development for network operations. The survey itself is expected to run in August 2019.
Presentation Files
Video Files
back to meeting agenda.
Lightning Talk: IPv6 adoption is killing my throughput
Date/Time 3:20 PM to 3:30 PM
Location Renaissance Ballroom
Presenters
Speaker
Remco van Mook
Abstract With IPv6 adoption increasing on the content side, it's becoming more obvious that not all IPv6 implmentations are created equal - or are on par with IPv4. In this particular case, it turns out that a lot of CPEs don't have hardware support for a common workaround to implement IPv6 on networks that don't natively support it. For internet connections over 100Mbps, which are becoming more common now, this causes hot CPEs and poor throughput of IPv6.
Presentation Files
Video Files
back to meeting agenda.
Tuesday PM Break
Date/Time 3:30 PM to 4:00 PM
Location Grand & Renaissance Pre-Function
Sponsors
Charter Communications
Ixia, a Keysight Business
Pluribus Networks
back to meeting agenda.
DDoS Mitigation Fundamentals
Date/Time 4:00 PM to 6:00 PM
Location Congressional AB
Presenters
Speaker
Krassimir Tzvetanov, Fastly, Inc.
Krassimir Tzvetanov is a security engineer at Fastly, a high performance CDN designed to accelerate content delivery as well as serve as a shield against DDoS attacks. In the past he worked for hardware vendors like Cisco and A10 focusing on threat research, DDoS mitigation features, product security and best security software development practices. Before joining Cisco, Krassimir was Dedicated Paranoid (security) at Yahoo!, Inc. where he focused on designing and securing the edge infrastructure of the production network. Part of his duties included dealing with DDoS and abuse. Before Yahoo! Krassimir worked at Google, Inc. as an SRE for two missing critical systems, the ads database supporting all incoming revenue from ads and the global authentication system which served all of the company applications. Krassimir holds Bachelors in Electrical Engineering (Communications) and Masters in Digital Forensics and Investigations.
Abstract In this tutorial the attendees will go over the basics of Denial of Service. It starts with coverage of the different parts of the stack that can be attacked and transitions into a discussion about the most prevalent types of DDoS: reflection attacks, SYN flood, Sloworis, etc. While it covers different attack types, it supplements the attack descriptions with detailed technical explanation of the specific operating system components like sockets, buffers, etc. The class is interlaced with a number of exercises allowing the attendees to manually configure different mitigations. This tutorial focuses on the technologies and not on particular vendor implementation. The duration can be 60-90 minutes.
Presentation Files
back to meeting agenda.
Extending Salt's capabilities for event-driven network automation and orchestration
Date/Time 4:00 PM to 6:00 PM
Location Renaissance Ballroom
Presenters
Speaker
Mircea Ulinic, DigitalOcean
Abstract Salt is currently one of the largely used frameworks in automating network operations. Even though it has been firstly released over 8 years ago, the network community started to adopt Salt only after 2016 when the initial official support for automating network gear has been added into the official releases. NAPALM has been one of the first libraries fully integrated into the framework, and others followed later, now being able to automate a variety of platforms, including Juniper, Arista, Cisco IOS / IOS-XR / NX-OS, Palo Alto, Cumulus, as well as many other NAPALM plugins available through the parent library - see https://github.com/napalm-automation-community/. Salt has been designed from the beginning as an event-driven pipeline, easily customizable and extensible in the user's environment. Thanks to Salt's maturity and the features added in the latest releases, it is now easier than ever to write yourself features for network automation by simply executing direct API calls, in just a few lines of Python code. In this tutorial we well explore the available features in the latest Salt release 2019.2.0, and, step-by-step, we'll implement together various features for network operations, from the simplest examples to more complex ones. To follow my steps together with me, you'll only need to have access to a machine where you can run Docker (see https://docs.docker.com/install/ to prepare in advance).
Presentation Files
Video Files
back to meeting agenda.
NANOG 76 Beer n' Gear
Date/Time 6:00 PM to 8:00 PM
Location Grand Ballroom
Sponsors
Adva Optical Networking
Ciena
Corero
Extreme Networks
Fujitsu
IPv4.Global
Infinera
Juniper Networks
Netscout
Nokia
Precision Optical Transceivers
Windstream Wholesale
back to meeting agenda.