NANOG 67 Agenda
Sunday, June 12 2016
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
8:30am - 9:30am | Gold Room (2nd Floor) | Hackathon Breakfast | Sponsors:
| |
9:30am - 6:50pm | Rouge (Lobby Level) | Hackathon Join us for the NANOG 67 Hackathon -- a one-day event Sunday, June 12, 2016, at the Fairmont Chicago Millennium Park. The NANOG 67 Hackathon will bring network operators together in a room to develop new ideas and hacks for automating production internet networks. Tools and software beyond those provided by vendors and existing open-source projects are needed to keep those networks up and running. By gathering together at NANOG 67 to collaboratively hack on code or hardware, develop ideas, and documentation we can open the possibilities of holistic network management through automation. And we will have fun while doing it! Registration for the Hackathon is open on a space-available basis to all interested attendees of NANOG 67. All skill levels are welcome, but participants are expected to actively participate in the hacks. The theme of the Hackathon is holistic network management through automation. Proposals of hacks will be solicited from registrants and published prior to NANOG 67 to allow the forming of teams of 1-6 individuals to work on hacks. And several example hacks will be available for inspiration. A standardized hacking environment for prototyping will be provided or teams are welcome to use their own computing resources. At the end of the hack the teams will be given the chance to briefly present their ideas and hacks and judges will award token prizes to the top 3 teams. We expect to submit a lightning talk at to summarize the Hackathon experience and results for the larger NANOG 67 attendee base. Registration for the Hackathon is separate from the NANOG 67 conference. There is no fee to attend, but registration is required. View full abstract page. Additional information | Sponsors:
| Hackathon
|
12:30pm - 1:00pm | Rouge Room (Lobby Level) | Hackathon Lunch | Sponsors:
| |
4:00pm - 6:00pm | Imperial Foyer (B2 Level) | Registration | | |
Monday, June 13 2016
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
8:28am - 5:00pm | Imperial Foyer (B2 Level) | Registration | | |
8:29am - 4:30pm | Imperial Foyer (B2 Level) | Espresso Bar | Sponsors:
| |
8:30am - 11:00am | International (2nd Floor) | Extended Breakfast | Sponsors:
| |
10:00am - 10:30am

| Imperial Ballroom (B2 Level) | Conference OpeningWelcome to Chicago!
A word from our local Host and Connectivity Sponsors as well as the NANOG Board and Program Committee Leadership. View full abstract page. | Moderators:
- Daniel Golding, NANOG Board, Google
Daniel Golding is the senior manager of network infrastructure at Google, Inc. He has over 20 years of experience in the Internet, datacenter, and critical facilities fields. His experience ranges from financial and organizational to deeply technical. He has held executive positions at RagingWire Data Centers, DH Capital, and Tier 1 Research. In addition, Daniel has served as the conference chairman for the Hosting Transformation Summit and the Global Peering Forum, for four years in each case. Daniel has held a wide variety of positions across the Internet infrastructure sector: network engineering and peering; data center operations and engineering; financial and industry analysis; and executive management. Daniel has also been a sponsor and host of NANOG. Speakers:
- Jay Borkenhagen.
- Peter Jacoby, RCN.
- L Sean Kennedy, XO Communications
L Sean Kennedy is an active member of the Internet Engineering community and a Director of Network Engineering at XO Communications. He has been a member of the NANOG Program Committee since 2013. - Don MacNeil
Mr. MacNeil has over 25 years of experience in network architecture and design; network engineering, access and optimization; customer operations; product and more. Prior to EdgeConneX, he served as EVP, Chief Operating Officer at XO Communications (XO), where he was responsible for the customer experience and the alignment of the products and services with XO’s Go-to-Market strategies. While at XO, Don also served as CMO for two years and was Vice President of Carrier Services Operations for six years. In this role, Don was overseeing service delivery, service assurance, product management, and the customer experience for XO Carrier Services, the company’s wholesale services business unit. Joining XO in 2000, Don also held management positions in technology, operations and network engineering. Prior to XO, Don was an officer in the United States Navy, serving at-sea in operational leadership roles as well as various leadership roles in weapon system design and procurement.
| Conference Opening(PDF)
Conference Opening
|
10:30am - 11:15am

| Imperial Ballroom (B2 Level) | The Real Cost of Public IXPsOver the past 5 years, the market price of transit has dropped 80%, yet the average price of the top 6 IXPs in Europe has dropped only 27%. Were IXPs too cheap to start with or has their structure not evolved with the rest of the market? Are they steadily returning value to their members? I seek to answer this question. I’ll explore how IXPs make and spend money and what the hard impact of infrastructure cost changes are as well as the soft cost of things like currency fluctuation between markets. I will use real data and examples to prove my point. View full abstract page. | Speakers:
- David Temkin, Netflix
David Temkin is the Vice President of Network Strategy and Architecture at Netflix. He is responsible for the network architecture of Netflix's distributed content caching systems. Previously he managed the corporate Network Engineering teams as the Network Engineering Manager, responsible for global data and voice networks as well as CDN relationships. He has also held the position of Director of IP Product Development and Engineering at Telx. He was responsible for all Layer 2 & 3 product architecture, design, and deployment across the Telx portfolio of data centers. Previously, he spent time at Yahoo! as the Layer 4-7 Network Architect, responsible for network load balancing. He also designed and built out the global network for Right Media, an online ad serving startup that was later acquired by Yahoo!
| The Real Cost of Public IXPs(PDF)
The Real Cost of Public IXPs
|
11:15am - 11:20am

| Imperial Ballroom (B2 Level) | NANOG 67 Hackathon team black hole route monitorThe Hackathon co-2nd place finisher "team black hole route monitor" will briefly demonstrate the hack they developed at NANOG 67. View full abstract page. | Speakers:
- John Kristoff, DePaul University
John Kristoff is currently employed by DePaul University as a network architect and adjunct faculty. In the past, he has held positions with Team Cymru, the Dragon Research Group, UltraDNS/Neustar and Northwestern University. John is active in a variety of communities including NANOG, IETF, FIRST, ops-trust, nsp-security, Internet2 and REN-ISAC.
| NANOG 67 Hackathon team black hole route monitor
|
11:20am - 11:25am

| Imperial Ballroom (B2 Level) | NANOG 67 Hackathon team take-offThe Hackathon co-2nd place finisher "team take-off" will briefly demonstrate the hack they developed at NANOG 67. View full abstract page. | Speakers:
- Peter Hoose, Facebook, Inc.
Peter has spent the last fifteen years attempting to automate himself out of a job, thus far unsuccessfully. Rest assured, he’ll keep at it until the job is done. In his current role as Network Infrastructure Manager at Facebook, his teams combine the power of automation with solid network engineering to keep facebook’s global backbone, and datacenter networks running fast, reliably, and efficiently. Today, they are building the infrastructure to deploy wedge, six-pack and fboss, facebook’s open switching platform and network operating system. Prior to this, Peter worked as a Network Engineer at Facebook, and further in the past as Senior Network Engineer and Architect at NTT America where he built custom dedicated hosting solutions for customers large, and small. - Chris Woodfield, Twitter.
| NANOG 67 Hackathon team take-off
|
11:25am - 12:00pm

| Imperial Ballroom (B2 Level) | NCI TNG: NANOG, The Next GenerationWhat is NANOG doing to develop future generations of Network Operators, Engineers, and Architects? An overview of the NANOG College Immersion Program (NCI), feedback from participating professors and students, and a panel discussion about the role of NANOG in developing future leaders for the Network Operator community. View full abstract page. | Moderators:
- David Temkin, Netflix
David Temkin is the Vice President of Network Strategy and Architecture at Netflix. He is responsible for the network architecture of Netflix's distributed content caching systems. Previously he managed the corporate Network Engineering teams as the Network Engineering Manager, responsible for global data and voice networks as well as CDN relationships. He has also held the position of Director of IP Product Development and Engineering at Telx. He was responsible for all Layer 2 & 3 product architecture, design, and deployment across the Telx portfolio of data centers. Previously, he spent time at Yahoo! as the Layer 4-7 Network Architect, responsible for network load balancing. He also designed and built out the global network for Right Media, an online ad serving startup that was later acquired by Yahoo! Panelists:
- Kevin Epperson.
- Daniel Golding, NANOG Board, Google
Daniel Golding is the senior manager of network infrastructure at Google, Inc. He has over 20 years of experience in the Internet, datacenter, and critical facilities fields. His experience ranges from financial and organizational to deeply technical. He has held executive positions at RagingWire Data Centers, DH Capital, and Tier 1 Research. In addition, Daniel has served as the conference chairman for the Hosting Transformation Summit and the Global Peering Forum, for four years in each case. Daniel has held a wide variety of positions across the Internet infrastructure sector: network engineering and peering; data center operations and engineering; financial and industry analysis; and executive management. Daniel has also been a sponsor and host of NANOG. - Ronald Kovac
Dr. Ron J. Kovac is a professor with the Center for Information and Communication Sciences, which is a master’s degree program that prepares graduate students in the field of information and communication technology.
Previously, Dr. Kovac was the telecommunication manager for the State University of New York and a chief information officer and executive director for large information technology centers on the east coast.
Dr. Kovac’s previous studies include electrical engineering, photography and education. He is a prolific writer and has numerous publications (three books and over 50 articles), and he has completed numerous international consulting projects in both the educational and information technology field. Additionally, he is very successful with creative grantsmanship. He speaks worldwide on issues related to information technology, network security, and educational technology.
- Jesse Sowell, Stanford
Jesse Sowell is a Research Affiliate at MIT and runs DevOps and Measurement Visualization at the Markley Group. Jesse's PhD research was a study of institutional mechanisms and attendant forms of authority that support Internet infrastructure operations. In other words, what are the characteristics of the social glue that ensures interconnection among a private network of networks continues to cohere into the modern Internet? Jesse's current research interests comprise cost and risk models of Internet infrastructure, incentives in malware value networks, and the political challenges of developing joint capabilities between operational communities and conventional governance actors.
| NCI TNG: NANOG, The Next Generation
|
12:00pm - 1:30pm | Rouge/Cuvee (Lobby Level) | Newcomers Lunch (Invitation Only) | Sponsors:
| |
12:00pm - 1:30pm | International (2nd Floor) | Welcome Lunch | Sponsors:
| |
1:30pm - 2:00pm

| Imperial Ballroom (B2 Level) | Network Support for TCP Fast OpenLatency is the dominant factor for the user-experience of the Internet users.
TCP, the most widely used transport protocol involves a handshake before any
data can be sent over the connection. As round-trip-times between client and server
are often in the order of hundreds of milliseconds, TCP's handshake introduces
a significant delay until data can be sent.
TCP Fast Open (TFO) is a novel extension to TCP that allows to shortcut TCP's
handshake, by sending data on the SYN-segment and allowing the server to reply
before the handshake finished. The benefits are a much better user-experience
as the data reaches the client much faster. We at Apple have deployed TCP Fast
Open for a particular service, sending 100000 requests per second at peak times.
While TFO provides a huge benefit significantly improving the user-experience, we
also observed some major issues. Many middleboxes and firewalls in the operator
networks interfere with TCP Fast Open. In some cases, we have observed that
middleboxes are blacklisting clients that use TFO.
In this talk we give a detailed explanation of the behavior and benefits of
TCP Fast Open. We continue by providing examples of how firewalls interfere with
TFO according to our experience with its deployment. Our talk finishes with a
call to network operators and firewall vendors to take TFO into account in
the configuration of their equipment, so as TFO can operate efficiently and provide
the latency benefit to the end-users.
View full abstract page. | Speakers:
- Christoph Paasch, Apple
Christoph Paasch is a software engineer at Apple, working in the networking team.
Prior to joining Apple, he obtained his PhD, titled "Improving Multipath TCP", at the UCLouvain, under the supervision of Prof. Olivier Bonaventure. His work focused on improving Multipath TCP and its Linux Kernel implementation in real world scenarios.
He is passionate on all aspect of transport layer protocols and how they can be modified to improve the user-experience over the Internet.
| Network Support for TCP Fast Open(PDF)
Network Support for TCP Fast Open
|
2:00pm - 2:30pm

| Imperial Ballroom (B2 Level) | Elliptic curves to the rescue: tackling availability and attack potential in DNSSECOver the past decade, we have seen the gradual rollout of DNSSEC across the name space, with adoption growing slowly but steadily. While DNSSEC was introduced to solve security problems in the DNS, it is not without its own problems. In particular, it suffers from two big problems: 1) Use of DNSSEC can lead to fragmentation of DNS responses, which impacts the availability of signed domains due to resolvers being unable to receive fragmented responses and 2) DNSSEC can be abused to create potent denial-of-service attacks based on amplification. Arguably, the choice of the RSA cryptosystem as default algorithm for DNSSEC is the root cause of these problems. RSA signatures need to be large to be cryptographically strong. Given that DNS responses can contain multiple signatures, this has a major impact on the size of these responses.
Using elliptic curve cryptography, we can solve both problems with DNSSEC, because ECC offers much better cryptographic strength with far smaller keys and signatures. But using ECC will introduce one new problem: signature validation - the most commonly performed operation in DNSSEC - can be up to two orders of magnitude slower than with RSA. Thus, we run the risk of pushing workload to the edges of the network by introducing ECC in DNSSEC.
This talk discusses solid research results that show 1) the benefits of using ECC in terms of solving open issues in DNSSEC, and 2) that the potential new problem of CPU use for signature validation on resolvers is not prohibitive, to such an extent that even if DNSSEC becomes universally deployed, the signature validations a resolver would need to perform can easily be handled on a single modern CPU core. Based on these results, we call for an overhaul of DNSSEC where operators move away from using RSA to using elliptic curve-based signature schemes. View full abstract page. | Speakers:
- Roland van Rijswijk-Deij, SURFnet
I'm an external Ph.D. student in the Design and Analysis of Communication Systems (DACS) group at the Centre for Telematics and Information Technology (CTIT) at the University of Twente.
When I'm not working on my research in Twente, I am an R&D project manager at SURFnet, the National Research and Education Network (NREN) in The Netherlands. In my job I'm responsible for Internet innovation in the areas of network security and privacy.
| Elliptic curves to the rescue: tackling availability and attack potential in DNSSEC(PDF)
Elliptic curves to the rescue: tackling availability and attack potential in DNSSEC
|
2:30pm - 3:00pm | Imperial Foyer (B2 Level) | Break | Sponsors:
| |
3:00pm - 5:00pm

| Gold Room (2nd Floor) | Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational ExperienceMalicious BGP route hi-jacks and and accidental mis-originations continue to threaten the security and robustness of the global Internet. Over the last several years the IETF, RIRs, router vendors, and researchers have developed and implemented an approach to BGP origin validation based upon a global resource public key infrastructure (RPKI) that permits operators anywhere in the Internet to detect unauthorized route announcements and implement local polices to mitigate (e.g., filter) these events.
This track will examine the current state of RPKI Origin Validation (ROV) technologies: products, services, implementations, configurations, and tool sets that could be useful to operators in planning, deploying, and monitoring ROV use in their networks. Actual operational experiences with ROV deployment will be described as well as issues that need to be addressed to further operational deployment.
1. RPKI Introduction
Doug Montgomery / Sandy Murphy
2, RPKI hosted services
Mark Kosters, CTO ARIN
3. RPKI Implementations
Doug Montgomery / Sandy Murphy
4. Router Vendor Implementations
Cisco / Juniper / Alcatel Greg Hankins
5. RPKI Test, Training, Monitoring, Management tools.
Matthias Waelisch, Doug Montgomery, Sandy Murphy
6. Deployment Experiences Panel (30 min)
JR Mayberry/Microsoft, Tony Tauber/Comcast, Thomas King/DE-CIX View full abstract page. | Moderators:
- Doug Montgomery, National Institute of Standards and Technologies (NIST)
Manager of the Internet and Scalable Systems Metrology Group within the Information Technology Laboratory (ITL) of the National Institute of Standards and Technology (NIST). In that role I provide technical leadership to NIST's current research and standardization efforts in Internet Infrastructure Protection (e.g., Naming and Routing Security, Internet Protocol security); scalable addressing and routing technologies (e.g., IPv6, new routing architectures); and measurement, modeling and analysis of macroscopic behaviors (e.g., complex systems analysis) within the Internet system.
- Sandra Murphy, Parsons, Inc.
Sandra Murphy has been working in security for distributed systems, particularly routing systems, for two decades. She has been an active NANOG participant since NANOG33 and has been working on the RPKI based security solution for BGP in the IETF, NANOG, and RIR communities. She is co-chair of the SIDR working group in the IETF. Panelists:
- Greg Hankins, Nokia
Greg Hankins has been attending NANOG since 1998, first as a network
operator and now as a hardware vendor. He also attends APRICOT, Euro-IX,
various Peering Forums, RIPE, and regional operator conferences where
he frequently speaks on network technology and operational topics.
Greg currently works as a Senior Product Manager for Nokia. - Thomas King
Thomas King was Head of the Research & Development department at DE-CIX until the end of 2015. Since 2016, Thomas King has been promoted to the newly-created position of CIO of DE-CIX. - Mark Kosters, ARIN
Mark Kosters is the CTO of the American Registry for Internet Numbers
(ARIN), responsible for all engineering initiatives within the
organization, leading both development and operations. Mark has over
twenty-seven years of experience as an applications developer, networking
engineer, technical manager and executive.
Over the last twenty-two years, he has been a senior engineer at Data
Defense Network (DDN) NIC, chief engineer and Principal Investigator under
the NSF-sponsored Internet NIC (InterNIC), Vice President of Research at
VeriSign, and now CTO of ARIN. Over his career, Mark has been involved in
application design and implementation of core internet client/server
tools, router administration, UNIX system administration, database
administration, and network security. He has represented both network
information centers in various technical forums such as the IETF, RIPE,
APNIC, CaribNOG and NANOG. - Rick Mayberry, Microsoft
My passion is primarily around securing large networks and, for the majority of my career, I’ve worked for Internet Service Providers (ISP). My secondary interests are network engineering and network technology, cloud and virtualization, measuring security program effectiveness and enabling product teams to build secure products through repeatable processes, patterns and shared services (security architecture). I am not your typical counter-culture, paranoid, policy or compliance security professional. I believe security is just another delivery organization within larger IT/Engineering. I believe a security organization should deliver horizontal shared services that can be leveraged by other IT initiatives and accelerate product or service delivery. I also am a strong believer that security is a means to increased availability – especially within a service provider environment. - Keyur Patel, Cisco
Keyur Patel is a Distinguish Engineer at Cisco with focus on BGP routing. Keyur is the architect for the Cisco IOS BGP origin AS validation feature and a key contributor on the standardization process in the IETF. Keyur has 6 published RFCs and more than 30 working documents in this area. - John Scudder, Juniper Networks
John Scudder is a Distinguished Engineer at Juniper Networks. He has worked in the Internet industry since 1990, when he joined the Internet Engineering team at Merit Network, Inc, doing network engineering and support for the NSFNET. Since then he has worked at a variety of Internet companies, large and small. His interests include routing protocols, particularly BGP, and routing security. He co-chairs the IETF IDR (which standardizes BGP and its extensions) and SPRING (segment routing) working groups, and is a past co-chair of the IETF Routing Area working group. John's first NANOG was in 1990 or so, when it was still called Regional-Techs.
- Arjun Sreekantiah, Cisco.
- Henk Steenman, AMS-IX
Henk Steenman is CTO at AMS-IX since the end of 2001 - Tony Tauber, Comcast
In his role as Distinguished Engineer at Comcast, Tony focuses on Backbone and Core network architecture and engineering with particular attention to measurement, manageability, and automation. He also partners with the research and education communities on projects and currently chairs the NANOG Program Committee.
In the past Tony held senior network engineering positions at BBN, GTE Internetworking, Genuity, Level3, and MIT Lincoln Lab as well as served as co-chair of the Routing Protocol Security working group in the IETF. - Matthias Wählisch, Freie Universitaet Berlin
Matthias Wählisch a senior research scientist at Freie Universität Berlin, heading the research activities on Internet technologies. His research and teaching focus on efficient, reliable, and secure Internet communication. This includes the design and evaluation of networking protocols and architectures, as well as Internet measurements and analysis. His efforts are driven by transforming solid research into practice, trying to improve Internet-based communication. In addition to scientific contributions, Matthias is also involved in the IETF, where he co-authored several Internet drafts and six RFCs. He also co-founded several open source projects such as RTRlib and RPKI MIRO.
| Hankins (PDF)
King(PDF)
Kosters(PDF)
Mayberry(PDF)
Montgomery_Murphy (PDF)
Patel(PDF)
Scudder(PDF)
Steenman(PDF)
Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
Wählisch(PDF)
|
3:00pm - 5:00pm

| Imperial Ballroom (B2 Level) | Tutorial: Tutorial Everything You Always Wanted to Know About Optical NetworkingTopics include:
* How fiber works (the basics, fiber types and limitations, etc)
* Optical power (understanding dBm, loss, using light meters, etc)
* Working with optics (choosing the right type, designing optical networks, etc)
* DWDM (how it works, muxes, OADMs and ROADMs, amps, etc)
* Dispersion and other impairments (what is it, why do we care, how do we fix it)
* Optical Myths (can I hurt myself looking into fiber, can I overload my optic, etc)
* An update on the latest state-of-the-art optical technologies and trends. View full abstract page. | Speakers:
| Steenburgen_Everything(PDF)
Tutorial Everything You Always Wanted to Know About Optical Networking
|
5:30pm - 7:00pm | International (2nd Floor) | Peering Personals | Sponsors:
| |
Tuesday, June 14 2016
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
8:28am - 5:00pm | Imperial Foyer (B2 Level) | Registration | | |
8:29am - 4:30pm | Imperial Foyer (B2 Level) | Espresso Bar | Sponsors:
| |
8:30am - 9:30am | Rouge (Lobby Level) | Members Breakfast (Invitation Only) | Speakers:
| |
8:30am - 9:30am | International (2nd Floor) | Power Breakfast | Sponsors:
| |
9:30am - 11:00am

| Gold Room (2nd Floor) | BGP Made Easy | Speakers:
- John van Oppen
John van Oppen runs the technical operations, including design, engineering and planning, for Spectrum Networks, INC (AS11404). He lead support of newNOG originally and as a result, Spectrum Networks was a founding sponsor of what is now NANOG.
| BGP Made Easy
BGP Made Easy(PDF)
|
9:30am - 11:00am

| Imperial Ballroom (B2 Level) | DNS TrackThe DNS track at NANOG provides a forum for attendees to present
and discuss recent and relevant topics in DNS, including: operational
experience and advice, security incidents (ongoing or one-time),
recent protocol developments, and new research.
Kazunori Fujiwara is a Senior Researcher at JPRS (Japan Registry
Services Co., Ltd) working on DNS protocol and DNS measurement. He
will present DNS query trends seen at Root and JP, (the analysis
of packet capture data of root DNS servers and JP DNS servers).
Casey Deccio is a Senior Research Scientist at Verisign Labs working
on DNS measurement, diagostics, and deployment. He will present on
Multi-Vantage Point Diagnostics and Measurement using DNS looking
glass techniques.
Yacin Nadji is a postdoctoral researcher at Georgia Tech and
co-founder of Netrisk working on network-based device/service
identification and network risk analysis. He will present on how
to classify devices, and discover new ones, using streams of DNS
data.
Duane Wessels is a Principal Operations Engineer at Verisign. He
will moderate the track and present on Increasing the Zone Signing
Key Size for the Root Zone.
Edward Lewis is a Senior Technologist in the Office of the CTO at ICANN.
He will give a brief overview of the upcoming Root Zone KSK rollover.
View full abstract page. | Speakers:
- Casey Deccio, Verisign Labs
Casey Deccio is a Senior Research Scientist at Verisign Labs. Among his research and development interests and goals are DNSSEC deployment enhancements, DNS ecosystem tools/monitoring, and the measurement, modeling, and analysis of deployed Internet protocols, including DNS/DNSSEC and IPv6.
While a Principal Research and Development Cyber Security Staff member at Sandia National Laboratories, where he had been employed since 2004, and where he was responsible for network-related research and development, including DNSSEC and IPv6 deployment efforts. At Sandia he developed DNSViz, the widely used Web-based tool for DNS analysis and visualization.
Casey earned B.S. and M.S. degrees in Computer Science from Brigham Young University, and received a Ph.D. from UC Davis, in Computer Science. His dissertation was a study of dependencies in the DNS, which form a model for quantifying and improving DNS availability through careful deployment practices. - Kazunori Fujiwara, JPRS.
- edward lewis, ICANN.
- Yacin Nadji.
- Duane Wessels, Verisign
Duane Wessels became interested in web caching in 1994 as a topic for his master's thesis in telecommunications at the University of Colorado, Boulder. He worked with members of the Harvest research project to develop web caching software. After the departure of other members to industry jobs, he continued the software development under the name Squid. Another significant part of Duane's research with the National Laboratory for Applied Network Research has been the operation of 6 to 8 large caches throughout the U.S. These caches receive requests from hundreds of other caches, all connected in a "global cache mesh."
| Deccio(PDF)
DNS Track
DNS Track(PDF)
Fujiwara(PDF)
Lewis(PDF)
Nadji(PDF)
Wessels(PDF)
|
11:00am - 11:30am | Imperial Foyer (B2 Level) | Break | Sponsors:
| |
11:30am - 1:00pm

| Gold Room (2nd Floor) | DNSSEC TutorialEddie Winstead from ISC would give a 90 minute tutorial on DNSSEC. It would be an expanded version of what was presented at NANOG on the Road. View full abstract page. | Speakers:
- Eddy Winstead, Internet Systems Consortium
Eddy has over 20 years of DNS, DHCP and sysadmin experience. He was a systems analyst and hostmaster for the North Carolina Research and Education Network (NCREN) for over a decade. At ISC, Eddy has delivered DNS + DNSSEC consulting, configuration audits and technical training.
| DNSSEC Tutorial
DNSSEC Tutorial(PDF)
|
11:30am - 1:00pm

| Imperial Ballroom (B2 Level) | Security TrackThe NANOG security track explores the latest in current network security threats, defenses and research. Contact the track coordinator to reserve some time to lead a discussion or present a topic of interest. View full abstract page. | Speakers:
- Christoph Dietzel.
- Ryan Haley.
- John Kristoff, DePaul University
John Kristoff is a researcher with Team Cymru, an Internet security research firm and the Managing Director of the Dragon Research Group. John has worked at UltraDNS/Neustar as a network architect and held network engineering positions at both Northwestern University and DePaul University. John remains affiliated with Northwestern and DePaul as a collaborator, student and instructor. John is an active participant and in some cases a founder of a handful of network and security related communities, both private and public. - Jelena Mirkovic.
| Dietzel_Security Track(PDF)
Haley_Security Track(PDF)
Kristoph_Security Track(PDF)
Mirkovic_Security Track(PDF)
Security Track
|
1:00pm - 2:25pm | International (2nd Floor) | Lunch Break | Sponsors:
| |
2:25pm - 2:30pm

| Imperial Ballroom (B2 Level) | NANOG 67 Hackathon team PiConThe Hackathon first place finisher "team PiCon" will briefly demonstrate the hack they developed at NANOG 67. View full abstract page. | Speakers:
| NANOG 67 Hackathon team PiCon
|
2:30pm - 3:00pm

| Imperial Ballroom (B2 Level) | Avoiding Nation-State SurveillanceWhen Internet traffic enters a country, it becomes subject to those countries’ laws. As an increasing number of countries pass laws that facilitate mass surveillance, Internet users have more need than ever to determine---and control---which countries their traffic is traversing. To this end, we first conduct a large-scale measurement study to demonstrate that Internet paths often transit countries where laws may make users more vulnerable to surveillance than they would be in their home country. We investigate different options that give users the power to avoid certain countries, which could ultimately make them less vulnerable to state-level surveillance. Our measurement-driven evaluation shows that tunneling allows users in many countries to access many popular sites without traversing certain other countries. Our study focuses on five different countries: Brazil, Netherlands, India, Kenya, and the United States. We find that these different options increase clients’ (end-users’) abilities to avoid other countries, but no country can completely avoid all other countries. Our results also show how central the United States is to inter-domain routing, as clients in Brazil, Netherlands, India, and Kenya cannot avoid the United States when accessing a significant portion of the top domains. View full abstract page. | Speakers:
- Annie Edmundson, Princeton University
Annie is a Ph.D. candidate in the Security and Privacy Research Group at Princeton University. She is also a Graduate Student Fellow at the Center for Information Technology Policy, where she studies computer security and privacy, and its intersection with policy. Her prior work includes research on electronic voting machines and network-level adversaries on the Tor network, as well as being a member of the Application Security team at Twitter. - Roya Ensafi
Roya Ensafi is a Postdoctoral Research Associate and a fellow at the Center for Information Technology Policy (CITP) at Princeton University. Her research work focuses on computer networking and security, with an emphasis on network measurement. The primary goal of her current research is to better understand and bring transparency to network interference (e.g. censorship) by designing new tools and techniques. In her dissertation, which passed with distinction, Roya developed side channels to remotely measure TCP connectivity between two hosts, without requiring access to any of the hosts. Most of her latest research projects center around studying national firewalls, especially the Great Firewall of China (GFW). Her work studying how the Great Firewall of China discovers hidden circumvention servers received an IRTF Applied Networking Research Prize (ANRP) in 2016. - Nick Feamster.
- Jennifer Rexford.
| Avoiding Nation-State Surveillance
Edmundson_Avoiding Nation-State (PDF)
|
3:00pm - 3:30pm

| Imperial Ballroom (B2 Level) | Everyday practical BGP filtering Robust BGP filtering is a challenge in and of itself. In this talk
NTT offers unprecedented insight into how today's AS2914
filter-sausage is made.
We'll cover the concept of Peer Locking - (a not-so-widely-known
route leak blocking mechanism based on as-path filters), and basic
hygiene in terms of Bogon ASNs. View full abstract page. | Speakers:
- Job Snijders, NTT
Job Snijders is actively involved in the Internet community both in an operational capacity as well as founder of the NLNOG RING, Vice President of PeeringDB and Chair of the RIPE Database Working Group. Job has a passion for routing security and weapons-grade network automation.
Job holds a position at NTT Communications' IP Development Department.
| Everyday practical BGP filtering
Snijders_Everyday practical BGP(PDF)
|
3:30pm - 4:00pm

| Imperial Ballroom (B2 Level) | Peering Security and ResiliencyIn this presentation we'll talk about BGP peering security and resiliency challenges. First we'll show real-world peering observations from the perspective of a peering router at an IXP. Then we'll give an operational perspective on peering configuration challenges, with a focus on scale an automation. View full abstract page. | Speakers:
- Greg Hankins, Nokia
Greg Hankins has been attending NANOG since 1998, first as a network
operator and now as a hardware vendor. He also attends APRICOT, Euro-IX,
various Peering Forums, RIPE, and regional operator conferences where
he frequently speaks on network technology and operational topics.
Greg currently works as a Senior Product Manager for Nokia. - Job Snijders, NTT
Job Snijders is actively involved in the Internet community both in an operational capacity as well as founder of the NLNOG RING, Vice President of PeeringDB and Chair of the RIPE Database Working Group. Job has a passion for routing security and weapons-grade network automation.
Job holds a position at NTT Communications' IP Development Department.
| Hankins_Snijders_Peering Security(PDF)
Peering Security and Resiliency
|
4:00pm - 4:30pm | Imperial Foyer (B2 Level) | Break | Sponsors:
| |
4:30pm - 5:00pm

| Imperial Ballroom (B2 Level) | DNS-based censorship: theory and measurementsAs explained in RFC 7754, "Technical Considerations for Internet Service Blocking and Filtering", it is tempting for a censor to attack, not the direct traffic or servers, but the rendezvous systems, the most obvious one being the DNS. In Europe, but also in other places, several countries implemented a DNS-based censorship system, mandating the ISP to configure their DNS resolvers to lie (providing other answers than what the authoritative name server wanted).
I will explain the various choices and possibilities of DNS-based censorship, as well as the workarounds. Of course, switching to a non-lying resolver is easy. But we'll see it's not so easy and that it is only the start of a arms race, specially giving the fact that "alternative" resolvers are often not secured, and therefore can be hijacked.
I will show examples and statistics on the actual deployment, both of the censorship and of the workarounds. This will mostly be done with RIPE Atlas probes. They allow to perform detailed measurements of DNS data, even in countries where you've never been.
Note: this will be the continuation of this article: https://labs.ripe.net/Members/stephane_bortzmeyer/dns-censorship-dns-lies-seen-by-atlas-probes/ and this talk: https://ripe68.ripe.net/presentations/158-bortzmeyer-google-dns-turkey.pdf View full abstract page. | Speakers:
- Stphane Bortzmeyer, AFNIC
Stéphane Bortzmeyer works for AFNIC, the domain name registry for the .fr Top-Level Domain. He works in DNS, security, standardization, blockchains, etc. When not playing with RIPE Atlas probes, he participates in the IETF and is the author of two DNS RFCs.
| Bortzmeyer_DNS-based censorship(PDF)
DNS-based censorship: theory and measurements
|
5:00pm - 5:30pm

| Imperial Ballroom (B2 Level) | Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the WildDDoS attacks remain a serious threat not only to the edge of the
Internet but also to the core peering links at Internet Exchange Points.
Blackholing at IXPs is an operational technique that allows a peer to
announce a prefix via BGP to another peer, which then discards traffic
destined for this prefix. However, as far as we know there is only
anecdotal evidence of the success of blackholing. In this talk, we shed
light on the extent to which blackholing is used by the IXP members and
its impact on traffic, e.g., volumes or patterns. Within a 12 week
period we found that traffic to more than 7,864 distinct IP prefixes was
blackholed by 75 ASes. The daily patterns emphasize that there are not
only a highly variable number of new announcements every day but,
surprisingly, there is a consistently high number of announcements
> 1000. Moreover, we highlight case studies in which blackholing succeeds
in reducing the DDoS attack traffic. In addition we briefly present the
current state of blackholing standardization within the IETF. View full abstract page. | Speakers:
- Christoph Dietzel, DE-CIX / TU Berlin
Since June 2014, Christoph Dietzel is member of the DE-CIX Research and Development team and responsible for several research efforts and also involved in numerous projects funded by the public sector (EU, German Federal Ministries). Moreover, he is a PhD student in the INET group, advised by Anja Feldmann at TU Berlin, since the end of 2014.
His ongoing research interests focus on Internet measurements & security, routing, and traffic classification. Chris is also highly interested in IXP-related aspects of the Internet ecosystem.
Prior to his work at DE-CIX and his PhD studies he received BSc and MSc degrees in computer science from the Darmstadt University of Applied Sciences. Alongside his studies, Chris was employed by the Fraunhofer SIT and CASED as a student research assistant. In 2013, Christoph Dietzel was granted a scholarship to conduct research and study at the UMass (USA). In cooperation with Siemens CERT, he worked on dynamic malware analysis for Android in fulfillment of his Master’s Thesis.
| Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild
Dietzel_Blackholing (PDF)
|
5:30pm - 5:50pm

| Imperial Ballroom (B2 Level) | Lightning Talks | | Lightning Talks
Mullally_Lightning Talks(PDF)
Schaefer_Lightning Talks(PDF)
|
5:50pm - 6:00pm

| Imperial Ballroom (B2 Level) | NANOG 67 Hackathon Wrap-up | Speakers:
- David Swafford, Facebook
David Swafford is a Network Engineer on Facebook's Production Engineering team. Having coming to FB a few years back as traditional network engineer, he quickly shifted focus to the software side after realizing that there simply wasn't enough time in the day to do things the traditional way. That shift has paid off well for FB as the entire network team shifted in the same manner and now we focus on much more interesting problems together.
When nerding out the most, he loves to look deep into the things that make networking and large systems tick. Topics like routing protocols, TCP, and Linux fall into his favorite bedroom reading.
Outside of all this, he loves to to cook any and everything under the theme of Italian-American following in the footsteps of his favorite chef Scott Conant. He also loves being active with his dog Cocoa.
Best reached using [email protected], you can also find him regularly at the SF Python Meet-ups (www.meetup.com/sfpython/). Any and all levels are welcome!
| NANOG 67 Hackathon Wrap-up
Swafford_Hackathon Wrap-up(PDF)
|
6:00pm - 8:00pm | International (2nd Floor) | Beer n Gear | Sponsors:
- Arista, ADVA Optical Networking, Arbor Networks, Brocade, Ciena, Cisco Systems, Corero, DE-CIX, Fujitsu, Hilco Streambank, Infinera, Juniper, NOKIA, OSI Hardware, Packet Design, Singtel, Telia Carrier, Telehouse
| |
Wednesday, June 15 2016
Time/Webcast: | Room: | Topic/Abstract: | Presenter/Sponsor: | Presentation Files: |
8:28am - 5:00pm | Imperial Foyer (B2 Level) | Registration | | |
8:29am - 4:30pm | Imperial Foyer (B2 Level) | Espresso Bar | Sponsors:
| |
8:30am - 9:30am | International (2nd Floor) | Power Breakfast | | |
9:30am - 10:15am

| Imperial Ballroom (B2 Level) | TCP over IP Anycast - Pipe dream or Reality?The talk will focus on how to route our end users to the closest location serving content -- i.e. to the closest PoP. Traditionally LinkedIn used geo-location based load balancing (with help of DNS) but there are challenging areas with this approach that lead to bad performance for the end user and operational challenges for the LinkedIn site teams.
1. Sub-optimal routing due to the fact that geographical load balancing makes DNS mapping decisions based on an end users' name server IP as opposed to the client.
2. Geographical mapping of IPs to latitude/longitude and city-level mapping is not 100% accurate nor related to fiber and internet connectivity map.
3. Operational complexity. As we grow the number of PoPs, it will be increasingly difficult to scale the use of geographical load balancing.
The answer to the above challenge, was TCP anycast:
Anycast provides a distributed service via routing. Based on anycast routing, packet will arrive to the closest node depending on the location of source and hop-by-hop routing decisions.
In short the talk will discuss about how we improved our anycast implementation using bgp and how we measure the success rate:
How LinkedIn used TCP anycast and RUM to drive optimizations and make the site faster.
Measurements using RUM is demonstrated in the following presentation:
http://www.slideshare.net/rmaheshw/velocity-2015-pops-and-rum
blog post:
https://engineering.linkedin.com/network-performance/tcp-over-ip-anycast-pipe-dream-or-reality
Presenters:
Shawn Zandi and Ritesh Maheshwari View full abstract page. | Speakers:
- Ritesh Maheshwari, LinkedIn
Ritesh Maheshwari is a performance engineer at LinkedIn, working on making LinkedIn fast using his medley of skills in data and performance analysis, network optimization, and automation. Before LinkedIn, Ritesh was a performance engineer at Akamai. Ritesh holds a PhD in computer science from Stony Brook University, where he first became passionate about performance while working on computer networks. He is also an alumni of IIT Kharagpur. - Shawn Zandi, LinkedIn
Shawn Zandi is a lead infrastructure architect with LinkedIn, where he builds large scale data center, backbone and core IP networks. Shawn currently lives in San Francisco, California. He has worked as network and security architect for consulting firms from Dubai to Silicon Valley over the past 15 years. In addition to computer science degree, Shawn holds many industry certifications including CCIE in routing and switching, security and service provider as well as CCDE. http://linkedin.com/in/szandi.
| TCP over IP Anycast (PDF)
TCP over IP Anycast - Pipe dream or Reality?
|
10:15am - 11:00am

| Imperial Ballroom (B2 Level) | Suffering Withdrawal; an automated approach to connectivity evaluationToday’s routers generally make themselves more- or less-attractive to transit traffic through operator’s manipulation of their interfaces IGP metrics or overload status. This all-or-nothing method lacks granularity and does not take advantage of the wealth of connectivity and health-check information readily available at the router.
We propose the notion of “connectedness value”, and describe an approach that allows a router to take pre-configured actions depending on its current level of connectedness to the rest of the network. The “connectedness value” is derived from not only reachability information, but also from OAM data and other policy-based criteria. For each router, an operator can now define what “well-connected” means, and what should happen should the router becomes less than “well connected".
In this presentation we will discuss the concepts around defining and acting on connectedness value, we well as the prototyping we have done for several use-cases relevant to a content-provider network with lots of remote POP/cache facilities. We will seek feedback from the community on the usability of the proposed approach, as well as ideas for enhancements. View full abstract page. | Speakers:
- Micah Croff, GitHub
Responsible for architecting and implementing from the ground up a new "Service Provider" network to support rapid growth and functionality for both near and long term capacity to meet business demands. Deployed IS-IS, BGP, IPv6, MPLS, L3VPNs. - Tim Hoffman, Twitter
Following a decade of building telecommunications networks in New Zealand, Tim is lead engineer for Twitter's global backbone. - Bruce McDougall, Cisco Systems
Bruce McDougall is a Consulting Systems Engineer at Cisco and spends his days lobbying Cisco’s engineering organization on behalf of WebOTT and Service Provider technical and operational requirements. Prior to joining Cisco he spent a number of years in Network Engineering and Ops roles at Web and Service Provider organizations. - Nick Slabakov, Juniper Networks
Nick Slabakov is Chief Architect for the Web Services group, where he works with some of Juniper's most innovative customers on solutions to the challenges of scale, programmability, and efficiency in their networks. Nicks recent work and industry involvement spans the areas of MPLS-TE, SPRING, SDN, Cloud Networking, and Network Automation / Programmability. His previous roles in Juniper included various Systems Engineering positions supporting Tier 1 carriers. Prior to Juniper, Nick was a Principal Systems Engineer at Riverstone Networks, which followed 10 years of experience as a Network Engineer in Enterprise and Service Provider settings.
| Suffering Withdrawal(PDF)
Suffering Withdrawal; an automated approach to connectivity evaluation
|
11:00am - 11:30am | Imperial Foyer (B2 Level) | Break | | |
11:30am - 12:00pm

| Imperial Ballroom (B2 Level) | Measurement based inter-domain traffic engineering(draft slides are available here: https://www.dropbox.com/s/r7czxo7jefk147o/NANOG67__Measurement_based_Inter_domain_TE.pdf?dl=0)
This presentation concentrates on an inter-domain traffic engineering scenario for multi-homed stub ASes.
It involves making best use of the multiple egress transits that are available.
The idea is to dynamically choose the best egress transit for each potential destination based on network measurements.
We highlight the benefit of such scenario by showing the performance difference of different transit providers.
The building blocks and challenges in realising such a system is revealed.
Especially, how to deal with that huge amount of destination BGP prefixes is of crucial importance to the scalability of such design.
We aim at sharing our observations based on working traffic traces from networks of diverse profiles (e.g. ISP, content provider, etc.) located in different countries (USA and some other European countries.)
Our results show that we can predict prefixes that cover a satisfying amount of traffic with much simpler methods than those mentioned in previous studies.
Further, intelligently making route decision requires proper interpretation of network measurements, especially those on RTT.
First, we discovered that not all RTT measurements are eligible for inter-domain traffic engineering.
We propose to briefly demonstrate our approaches in revealing the origins of “extra” variations in RTT measurements.
Second, we demystify one common doubt on RTT measurements: do AS path changes cause major RTT variations?
We show that it is not necessary the case with recent measurement data from RIPE Atlas.
View full abstract page. | Speakers:
- WENQIN SHAO, Telecom ParisTech
Wenqin Shao is a PhD candidate at Telecom ParisTech, France. His thesis, in close cooperation with Border 6, aims at improving the building blocks of inter-domain routing optimisation platform.
He received his MSc from Telecom ParisTech in 2013, and his B.Eng. from Fudan University, China, in 2010. His current research interests include network measurement, traffic engineering and statistical learning.
| Measurement based inter-domain traffic engineering
Shao_Measurement (PDF)
|
12:00pm - 12:30pm

| Imperial Ballroom (B2 Level) | Utilizing Kea hook points for modern IP addressingKea is a new high performance, open source project for IPv4 and IPv6 addressing. Kea has hook points where you can add your own logic to parse incoming DHCP packets and modify them as you like right before they leave the server network interface. These hook points have given Kea traction in modern provisioning of large datacenters. Despite Kea’s relatively young age, Facebook has leveraged the hooks feature extensively to customize Kea to meet their production requirements. Easily extensible hooks can lead an organization to re-think how it might best address and provision its networks. Hook points include: packet received, subnet selected, lease renewed, lease released, and ready to respond. Using hooks, it is possible to control the assignment of options and even addresses from your own separate provisioning system. Hooks allow the developer to edit information such as the lease parameters (time to renew), the subnet, address or options to be delivered. View full abstract page. | Speakers:
- Eddy Winstead, Internet Systems Consortium
Eddy has over 20 years of DNS, DHCP and sysadmin experience. He was a systems analyst and hostmaster for the North Carolina Research and Education Network (NCREN) for over a decade. At ISC, Eddy has delivered DNS + DNSSEC consulting, configuration audits and technical training.
| Utilizing Kea hook points for modern IP addressing
Winstead_Utilizing Kea hook points(PDF)
|
12:30pm - 1:00pm

| Imperial Ballroom (B2 Level) | Lightning Talks | | Kaufman_Lightning Talks(PDF)
Lightning Talks
Roberts_Lightning Talks(PDF)
Thompson_Lightning Talks(PDF)
|
1:00pm - 2:30pm | | Lunch (On Your Own) | | |
2:30pm - 3:00pm

| Imperial Ballroom (B2 Level) | Ten Lessons From TelemetryStreaming telemetry data enables network operators to bring network monitoring out of the 20th century and into the rich space of big data analytics. Having spent the last two years co-developing telemetry features for the WAN with customers and partners, we've learned a lot about what works and what doesn't. In this talk, I will present ten practical lessons about telemetry performance, encoding, data models, transport and scope. Lessons include "It's not that hard to improve on SNMP", "You don't know what you love until you lose it", "Transports are all about tradeoffs", and "Data models are worth it." View full abstract page. | Speakers:
- Shelly Cadora, Cisco Systems
A long time Cisco veteran and CiscoLive Hall of Fame Distinguished Speaker, Shelly Cadora is currently a Technical Marketing Engineer for the Web & OTT, focusing on network monitoring, device data models and APIs. She has worked in development and marketing for a variety of products and solutions. She has a PhD from Stanford University and a CCIE in Routing and Switching.
| Cadora_Ten Lessons(PDF)
Ten Lessons From Telemetry
|
3:00pm - 3:30pm

| Imperial Ballroom (B2 Level) | Automating Maintenance NotificationsDespite all the recent progress around network automation, there's one aspect of our operations that for many remains stuck in a manual past. Most of us deal with maintenance notifications - both those we get and those we send - by throwing people at the problem. In this talk we'll provide an alternative approach. We'll start with an overview of Facebook's automation solution, how they built a network that automatically responds to maintenance notifications, the challenges they've overcome and the ones that remain. One difficult challenge is the sheer diversity and ever shifting formatting of maintenance notifications. We'll present a draft standard for maintenance notifications that seeks to address these challenges and describe how the standard can be put to use. View full abstract page. | Speakers:
- Francisco Hidalgo, Facebook.
- Erik Klavon, Box
Erik Klavon works as a Senior Staff Network Engineer at Box, a secure
content management and collaboration platform. Erik works on network
architecture, with a focus on interconnection/peering products and
strategy. He provides counsel to Box engineers, customers and partners
in the areas of systems/infrastructure architecture, performance and
troubleshooting.
| Automating Maintenance Notifications
Hidalgo_Automating Maintenance Notifications(PDF)
|
3:30pm - 4:00pm

| Imperial Ballroom (B2 Level) | Post IPv4 Depletion TrendsARIN will update the community about recent trends we are seeing in the registry now that ARIN has depleted its supply of available IPv4 address space. Areas of focus will be on IPv4 hijackings, the IPv4 transfer market, IPv6 growth trends, and recent RPKI and DNSSEC usage statistics. View full abstract page. | Speakers:
- Leslie Nobile
Leslie Nobile is the Senior Director of Global Registry Knowledge at the American Registry for Internet Numbers (ARIN). Reporting directly to the CEO, her main role is to research and recommend Registry improvements both within ARIN and across the Registry system, with a focus on data integrity and quality. Prior to that, Leslie served as ARIN’s Director of Registration Services for 14 and ½ years where she was responsible for the delivery and execution of ARIN’s core function of allocating and registering Internet Number Resources.
Leslie has over 25 years of experience in the Internet industry, where she has held various technical management positions. Her previous work includes Internet registry operations at the DDN/DoD Network Information Center (NIC), as well as technical support of the development and expansion of the Defense Data Network (DDN), a high-speed military data network that evolved from the ARPANET.
Leslie received her B.A. from the American University in Washington, D.C.
| Nobile_Post IPv4 Depletion(PDF)
Post IPv4 Depletion Trends
|
4:00pm - 4:30pm | Imperial Foyer (B2 Level) | Break | | |
4:30pm - 5:00pm

| Imperial Ballroom (B2 Level) | Experiences with network automation at DynAt NANOG 63 I talked about Kipper, our network automation project at Dyn, and how it aims to align our network configuration lifecycle with the existing continuous integration model used for servers. Since then we have significantly expanded its coverage, added new features and incorporated other teams in our workflow. In this presentation I will describe the current setup and then talk about our challenges, successes and some of the lessons we have learned along the way.
View full abstract page. | Speakers:
- Carlos Vicente, Dyn Inc.
Carlos Vicente is a Principal Network Engineer at Dyn, where he contributes to Dyn's next-generation infrastructure. His interests include network design, automation and management. Prior to Dyn, he worked for ISC where he helped maintain and grow the worldwide DNS F-Root network. He also worked with the University of Oregon and the Network Startup Resource Center (NSRC) building networks and training engineers in emerging regions. Carlos is the author of the open source Network Documentation Tool (Netdot). He is originally from the Dominican Republic and has an M.S. degree in Telematics from the Politechnic University of Catalonia (Spain).
| Experiences with network automation at Dyn
Vicente_Experiences with network(PDF)
|
5:00pm - 5:30pm

| Imperial Ballroom (B2 Level) | Closing SessionMeeting wrap-up, final thank yous, next meeting announcements. View full abstract page. | Speakers:
- Betty Burke, NANOG
Currently serving as the NANOG Executive Director, responsible for all aspects of NANOG, reporting to the Board of Directors. Previous 37 years of experience serving in technology, business, and management within the Michigan Information Technology Services, University of Michigan, and Merit Network. Proven leadership and experience in development of strategic and operational plans, creation and implementation of marketing campaign for conference center and high tech facilities including a data center, conference and office building, library and campus fiber assets. Proven operational success through project management, along with leadership through community and team building.
| Closing Session
Closing Session(PDF)
|
6:30pm - 10:30pm | Offsite - Howl at the Moon | Social Additional information | Sponsors:
| |
|