Tuesday Registration
|
Date/Time |
7:30 AM to 5:00 PM
|
Location |
Grand Registration |
back to meeting agenda.
|
Tuesday Extended Breakfast
|
Date/Time |
7:30 AM to 9:45 AM
|
Location |
Grand Ballroom North/Central |
Sponsors |
|
back to meeting agenda.
|
Tuesday Espresso Bar
|
Date/Time |
8:30 AM to 3:30 PM
|
Location |
Congressional Registration |
Sponsors |
|
back to meeting agenda.
|
Members Breakfast (Invite Only)
|
Date/Time |
9:00 AM to 9:45 AM
|
Location |
Grand Ballroom South |
back to meeting agenda.
|
Exploring the New Wave of Subsea Cables to North America
|
Date/Time |
10:15 AM to 11:00 AM
|
Location |
Renaissance Ballroom |
Presenters |
- Moderator
- Tim Stronge, TeleGeography
- Tim Stronge is Vice President of Research at TeleGeography. His areas of expertise include international voice traffic, terrestrial and submarine cable systems, and international bandwidth markets.
Since joining TeleGeography in 1996, Tim has served as a principal analyst in most areas of research, including network infrastructure, bandwidth demand modeling, cross-border traffic flows, and telecom services pricing.
He holds a Master's degree in International Economics from John Hopkins University and a B.A. from the College of William and Mary.
- Panelist
- NIgel Bayliff
- Erick Contag
- Brian Lavalle
|
Abstract |
Telegeography’s Tim Stronge will present an overview of the recent and upcoming subsea cables landing into North America. Tim will then be joined by an expert panel to discuss the technical and commercial impacts of these new systems. Topics to include the demand driving these new builds, the technology underpinning the massive capacity gains per system, the growing diversification of North American landing points, and the shift/implications of subsea cable ownership towards content providers. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Public Speaking Forum
|
Date/Time |
10:15 AM to 11:45 AM
|
Location |
Congressional AB |
Presenters |
- Speaker
- Christina Chu, NTT America
- Christina serves as the Director of IP Strategic Planning in NTT America, Inc. She has over 20 years of experience in the Internet industry and is passionate in building communities. She has served four years in the NANOG Program Committee. She currently serves the Global Peering Forum board. Having participated in Toastmasters provides her firsthand experience the benefit of constant practice in improving one’s public speaking skills. She would love to help NANOG put together this public speaking program to nurture the community’s interest in presenting on stage.
|
Abstract |
Public Speaking Forum provides a positive and supportive environment for participants to practice public speaking skills. All levels are welcome. The first hour starts with introduction, followed by individual presentations, and ended with table topics. The remaining 30 mins are networking time. If you are interested in improving public speaking skills, helping others improve, or networking, this activity is for you. Feel free to use this opportunity to dry run your next presentations. Six 4-min speaking slots are available. Sign up is required if you want a speaking slot. First come, first served. You can sign up via the following URL:
https://archive.nanog.org/meetings/nanog76/psf |
back to meeting agenda.
|
Transport Network Requirements and Architecture for 5G
|
Date/Time |
11:00 AM to 11:30 AM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Mikael Holmberg
- Mikael Holmberg is an experienced networking professional that has over 25+ years experience in Telecom and Networking industry, he is acting as a subject matter expert in networking architectures and technologies.
|
Abstract |
This talk will cover the core network requirements for 5G transport. I will cover the 5G architecture on high level pointing out that 5G services are all "softwarized" i.e. cloud native with NFV and SDN enabling flexibility in service deployments. This means that you still need to have a core network (wired) in place to get to your virtualized services like vRAN etc residing in a DC somewhere. Also MEC will be discussed with "micro DCs" closer to the user. This talk will walk the audience through things like network slicing, TSN, automation in relation to the new 5G services like Massive IoT, Mission Critical Services, /FixedMobile Broadband etc.
Link to this talk given at an other event: https://www.youtube.com/watch?v=f9ZpMorsXhU
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Crossing The Technology Desert - Rural and Tribal Broadband
|
Date/Time |
11:30 AM to 12:00 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Matt Rantanen, Arcadian Infracom / SCTCA
- Matthew Rantanen, Dir of Technology: Southern California Tribal Chairmen's Association & Director: Tribal Digital Village Network & Lead: Partnering & BizDev at ARCADIANINFRA.COM, a fiber infrastructure company, bringing fiber through rural USA, & Indian Country.
Of Cree, Finnish, & Norwegian decent, a "cyber warrior for community networking." helping 20 SCTCA Tribes in technology vision. 2 Terms, FCC Native Nations Broadband Task Force (Genachowski & Wheeler). Appointed to FCC: Communications Security, Reliability and Interoperability Council 4. Former 2-term Chairman at Native Public Media, Vice-Chair & Treasurer. Co-Chair:Tech & Telecom Subcommittee: National Congress of American Indians. Drafting policy with Tribes for use with the Federal Government. Matthew speaks to support unserved/under-served communities, with local, state & Federal government departments. Speaking internationally at ICANN, Internet Governance Forum(UN)
Testified at FCC hearings, GAO and the California Public Utilities commission.
|
Abstract |
This presentation would address the current problems servicing rural and tribal areas, the reasons for, and new initiatives to fix these problems.
Rural and tribal broadband has been a problem since the first long-haul routes were built. The model of economic incentive at the time was not conducive to landing fiber in sparsely populated areas or where right-of-way owners caused delays or impasses. The divide between the haves (broadband, cell) and have-nots has now caused a socio-economic and cultural catastrophe that few could have imagined. There is a changing tide that is now allowing these routes to be built. The primary driver is the rise of the hyperscale content provider and their need for diversity and capacity that is allowing new routes to be built. We can capitalize from these routes by connecting the formerly bypassed areas that are along or near the new running lines. There are significant changes in tribal politics which are also providing access to trusted partners where none existing prior. Add the government economic incentives and the time is right to finally fix this inequity that we take for granted in heavily connected areas.
This presentation will not deep dive into the technical details of fiber. If specifics are desired, construction information can be presented, but that would most likely be better served with company specific information outside of this presentation. This presentation would discussing the changing climate and what it means to these affected areas, as well as present the benefit to the content providers, carriers, partners, and end users.
The presentation would be given by Matt Rantanen, Southern California Tribal Chairmen’s Association, Tribal Digital Village Network/Initiative, Chairman of the Board for Native Public Media, FCC Native Nations Broadband Task Force. Matt is of Cree ancestry and is involved with all aspects of empowering tribal lands through technology. He's also 6-'6", fully tattooed, and hangs out with Slayer. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Tuesday Lunch
|
Date/Time |
12:00 PM to 1:15 PM
|
Location |
Grand Ballroom North/Central |
Sponsors |
|
back to meeting agenda.
|
Women In Technology Lunch
|
Date/Time |
12:00 PM to 1:15 PM
|
Location |
Grand Ballroom South |
Presenters |
- Speaker
- Susan Forney, Hurricane Electric
|
Presentation Files |
|
Sponsors |
|
back to meeting agenda.
|
DNSSEC. What it is and what it isn't.
|
Date/Time |
1:30 PM to 2:15 PM
recorded
|
Location |
Congressional AB |
Presenters |
- Speaker
- Paul Ebersman, Neustar
- Paul Ebersman has been involved with NANOG to varying degrees since the late 90s and has been working with TCP/IP networks since the mid 80s. Paul Ebersman works for Neustar as a DNS architect and as a technical resource, both internally and to the internet community. He first worked on the internet for the Air Force in 1984. He was employee number ten at UUNET and helped build AlterNET and the modem network used by MSN, AOL and Earthlink. He has maintained his roots in the internet and the open source community, with heavy involvement in organizations like NANOG, IETF, ICANN/SSAC and DNSOARC.
|
Abstract |
DNS hijacking has become a mainstream technique for subverting websites, stealing login credentials, fraud and abuse. The DNS is a complex system with many attack surfaces. Defending the integrity of your DNS is more critical than ever but how?
DNSSEC is a useful layer of a defense in depth of your DNS but it isn't the only layer or technique. Learn in detail what DNSSEC can defend against and what else you need to do. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Hackathon Recap
|
Date/Time |
1:30 PM to 2:00 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Syed Ahmed
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Building an ISP in a box
|
Date/Time |
2:00 PM to 2:30 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Justin Kilpatrick, althea.org
- CTO and Lead developer for Althea.
Free software fanatic, Linux expert, former Red Hatter
|
Abstract |
Althea (althea.org) which is an open source 'distributed isp' or 'isp in a box', as such we perform traffic shaping, routing, encryption, and billing entirely on home wifi routers re-flashed with a open source OpenWRT image of our own design.
The goal is to eliminate the need for any sort of configuration or network engineering from the entire process of being an ISP, everything is as easy as plugging one device into the next. Or at least it should be.
This talk will go into detail about the open source technologies used and problems encountered in creating an modern and reliable ISP where no one is in charge.
Main topics
* Babeld, a link detecting auto failover 'mesh' protocol that's reliable, stable, and easy to use.
* Wireguard, an ultra low overhead VPN protocol that provides incredible security at an overhead acceptable for even embedded devices
* Bufferbloat.net (http://bufferbloat.net/) (Specifically fq_codel and Cake) lag spikes are obsolete. There's no reason to be afraid of queue management anymore.
* Tales from the field, what operating and using a system like this is like.
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
BGP Route Security - Cycling to the Future!
|
Date/Time |
2:30 PM to 3:15 PM
recorded
|
Location |
Congressional AB |
Presenters |
- Speaker
- Alexander Azimov, Yandex
- Alexander Azimov is network expert at Yandex, where he focuses on the network monitoring, routing security and transport layer architecture. He is a frequent presenter at network operator events such as NANOG, RIPE, ENOG & APRICOT for over 5 years.
Alexander is active in the IETF where he co-authoring several Internet-Drafts.
|
Abstract |
The BGP routing protocol was designed to control traffic at interdomain routing level, but Its scalability and extensibility made it popular in other environments: FlowSpec, VPN, SD-WAN, and other technologies relies on underlying BGP transport. Unfortunately, this diversity of applications haven’t changed the BGP protocol itself – the protocol communications are built on trust, trust in good intentions of all parties, and the trust doesn’t scale that much.
In recent years there was a growing hacker activity in BGP with confirmed redirection to the fishing sites, lost of credentials, etc. The community has very limited technical opportunity to fight this threat: most of the filtering measurements are limited to detection of mistakes, others are hardly deployable. During this report, I will provide an overview of previous security mechanisms that were designed to detect malicious routes in BGP and present a novel approach called Autonomous System Provider Authorization (ASPA) that can fill the gap and significantly limit opportunities for attackers. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Predicting Network Behavior Using Machine Learning/AI
|
Date/Time |
2:30 PM to 3:00 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Srividya Iyer
- Srividya Iyer has over 15 years of experience in the networking industry. She has worked at Motorola Mobility in the areas of Metro Ethernet and Seamless Mobility. Prior to that she was at Telcordia Technologies working on Fault and performance management systems. Currently, she is involved in the Research and Development of Machine Learning solutions for networking and has received a National Science Foundation grant for researching Self adaptive Machine Learning models for event correlation.
|
Abstract |
Artificial Intelligence and the related field of Machine Learning is being increasingly used in applications to learn from data in diverse domains. This has been enabled in recent years by increased data availability and improved ML/AI techniques.
This talk will provide an overview of Machine Learning/Artificial Intelligence terminology and will look at different Machine Learning techniques that can be used to understand network behavior. It will specifically cover the Machine Learning techniques of classification, anomaly detection and prediction using real world examples. It will also look at the challenges in learning from network data and the benefits and limitations of Machine Learning applied to networking.
|
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Lightning Talk: BGP on the edge: making the internet withstand extreme weather events.
|
Date/Time |
3:00 PM to 3:10 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Scott Johnson, SolarNetOne, Inc.
|
Abstract |
Flooding, hurricanes, tornadoes, fires and other severe weather/environmental events can dramatically impact our ability to deliver IP based communications to end users, which can include emergency services. While the primary use of BGP is interconnection of ISP's, enterprise and government network users can also benefit from the ability to deploy BGP on the edge for multi-homing and redundancy purposes. A many-pathed network becomes significantly more robust for every participant. Direct carrier participation in paid, filtered peering arrangements can contribute to the solution, as can IXP based encrypted tunnel endpoints providing BGP sessions to the edge. With the increase in severe weather events effecting more and larger service areas, additional effort is required to ensure that our networks don't fail as a result of a more hostile, changing climate, just as packet switching ensured continued communications between key facilities in the event of nuclear attack. |
Video Files |
|
back to meeting agenda.
|
Lightning Talk: Open Source and Network Operations -- let's make it work!
|
Date/Time |
3:10 PM to 3:20 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Leslie Daigle, ThinkingCat Enterprises
|
Abstract |
N.B.: This would be best on Tuesday; I have to leave immediately following the lightning session on Wednesday, and I'd like to have time for feedback.
Abstract:
Networking and software have had a challenged relationship. While network operators could benefit from Open Source Software (OSS) going forward, OSS hasn’t traditionally met operator needs, and operators may not have the time or resources to contribute to it. This talk will introduce an information-gathering survey of network operators to gather information about:
+ Scoping – would there be interest in reference implementations for new and existing open standards? Horizontal implementation of networking suites to facilitate new development (e.g., IoT, whitebox routing)? Opportunistic development of specific network management and monitoring tools?
+ Support and uptake – what are the primary factors in ensuring uptake of the resulting software? (E.g., involvement in development, having paid support plans available, etc).
This lightning talk will introduce the survey, solicit input to help shape the questions to achieve a useful result, and help shape future OSS development for network operations. The survey itself is expected to run in August 2019. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Lightning Talk: IPv6 adoption is killing my throughput
|
Date/Time |
3:20 PM to 3:30 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Remco van Mook
|
Abstract |
With IPv6 adoption increasing on the content side, it's becoming more obvious that not all IPv6 implmentations are created equal - or are on par with IPv4.
In this particular case, it turns out that a lot of CPEs don't have hardware support for a common workaround to implement IPv6 on networks that don't natively support it. For internet connections over 100Mbps, which are becoming more common now, this causes hot CPEs and poor throughput of IPv6. |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
Tuesday PM Break
|
Date/Time |
3:30 PM to 4:00 PM
|
Location |
Grand & Renaissance Pre-Function |
Sponsors |
|
back to meeting agenda.
|
DDoS Mitigation Fundamentals
|
Date/Time |
4:00 PM to 6:00 PM
|
Location |
Congressional AB |
Presenters |
- Speaker
- Krassimir Tzvetanov, Fastly, Inc.
- Krassimir Tzvetanov is a security engineer at Fastly, a high performance CDN designed to accelerate content delivery as well as serve as a shield against DDoS attacks.
In the past he worked for hardware vendors like Cisco and A10 focusing on threat research, DDoS mitigation features, product security and best security software development practices. Before joining Cisco, Krassimir was Dedicated Paranoid (security) at Yahoo!, Inc. where he focused on designing and securing the edge infrastructure of the production network. Part of his duties included dealing with DDoS and abuse. Before Yahoo! Krassimir worked at Google, Inc. as an SRE for two missing critical systems, the ads database supporting all incoming revenue from ads and the global authentication system which served all of the company applications.
Krassimir holds Bachelors in Electrical Engineering (Communications) and Masters in Digital Forensics and Investigations.
|
Abstract |
In this tutorial the attendees will go over the basics of Denial of Service. It starts with coverage of the different parts of the stack that can be attacked and transitions into a discussion about the most prevalent types of DDoS: reflection attacks, SYN flood, Sloworis, etc.
While it covers different attack types, it supplements the attack descriptions with detailed technical explanation of the specific operating system components like sockets, buffers, etc.
The class is interlaced with a number of exercises allowing the attendees to manually configure different mitigations.
This tutorial focuses on the technologies and not on particular vendor implementation. The duration can be 60-90 minutes.
|
Presentation Files |
|
back to meeting agenda.
|
Extending Salt's capabilities for event-driven network automation and orchestration
|
Date/Time |
4:00 PM to 6:00 PM
|
Location |
Renaissance Ballroom |
Presenters |
- Speaker
- Mircea Ulinic, DigitalOcean
|
Abstract |
Salt is currently one of the largely used frameworks in automating network operations. Even though it has been firstly released over 8 years ago, the network community started to adopt Salt only after 2016 when the initial official support for automating network gear has been added into the official releases. NAPALM has been one of the first libraries fully integrated into the framework, and others followed later, now being able to automate a variety of platforms, including Juniper, Arista, Cisco IOS / IOS-XR / NX-OS, Palo Alto, Cumulus, as well as many other NAPALM plugins available through the parent library - see https://github.com/napalm-automation-community/.
Salt has been designed from the beginning as an event-driven pipeline, easily customizable and extensible in the user's environment. Thanks to Salt's maturity and the features added in the latest releases, it is now easier than ever to write yourself features for network automation by simply executing direct API calls, in just a few lines of Python code.
In this tutorial we well explore the available features in the latest Salt release 2019.2.0, and, step-by-step, we'll implement together various features for network operations, from the simplest examples to more complex ones.
To follow my steps together with me, you'll only need to have access to a machine where you can run Docker (see https://docs.docker.com/install/ to prepare in advance). |
Presentation Files |
|
Video Files |
|
back to meeting agenda.
|
NANOG 76 Beer n' Gear
|
Date/Time |
6:00 PM to 8:00 PM
|
Location |
Grand Ballroom |
Sponsors |
|
back to meeting agenda.
|