^ Top

NANOG 67 Agenda

All times will be listed in Central Time.

**Agenda is subject to change.**

Webcast: http://www.verilan.com/clients/nanog/index.php

Floor Plans

The NANOG 67 Agenda icalendar feed is now available! 
Download the .ics file and import into your calendar, or subscribe to the URL: 
http://www.nanog.org/sites/default/files/ical/nanog.ics  

 

Download the Guidebook app! If you already have the app, you can search for NANOG 67 and download the guide to your mobile device.

 

Sunday, June 12 2016
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:30am - 9:30amGold Room (2nd Floor)Hackathon BreakfastSponsors:
9:30am - 6:50pmRouge (Lobby Level)

Hackathon

Join us for the NANOG 67 Hackathon -- a one-day event Sunday, June 12, 2016, at the Fairmont Chicago Millennium Park. The NANOG 67 Hackathon will bring network operators together in a room to develop new ideas and hacks for automating production internet networks. Tools and software beyond those provided by vendors and existing open-source projects are needed to keep those networks up and running. By gathering together at NANOG 67 to collaboratively hack on code or hardware, develop ideas, and documentation we can open the possibilities of holistic network management through automation. And we will have fun while doing it! Registration for the Hackathon is open on a space-available basis to all interested attendees of NANOG 67. All skill levels are welcome, but participants are expected to actively participate in the hacks. The theme of the Hackathon is holistic network management through automation. Proposals of hacks will be solicited from registrants and published prior to NANOG 67 to allow the forming of teams of 1-6 individuals to work on hacks. And several example hacks will be available for inspiration. A standardized hacking environment for prototyping will be provided or teams are welcome to use their own computing resources. At the end of the hack the teams will be given the chance to briefly present their ideas and hacks and judges will award token prizes to the top 3 teams. We expect to submit a lightning talk at to summarize the Hackathon experience and results for the larger NANOG 67 attendee base. Registration for the Hackathon is separate from the NANOG 67 conference. There is no fee to attend, but registration is required.

View full abstract page.
Additional information
Sponsors:
youtubeHackathon
12:30pm - 1:00pmRouge Room (Lobby Level)Hackathon LunchSponsors:
4:00pm - 6:00pmImperial Foyer (B2 Level)Registration
Monday, June 13 2016
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:28am - 5:00pmImperial Foyer (B2 Level)Registration
8:29am - 4:30pmImperial Foyer (B2 Level)Espresso BarSponsors:
8:30am - 11:00amInternational (2nd Floor)Extended BreakfastSponsors:
10:00am - 10:30am

Imperial Ballroom (B2 Level)

Conference Opening

Welcome to Chicago! A word from our local Host and Connectivity Sponsors as well as the NANOG Board and Program Committee Leadership.

View full abstract page.
Moderators:

  • Daniel Golding, NANOG Board, Google
  • Daniel Golding is the senior manager of network infrastructure at Google, Inc. He has over 20 years of experience in the Internet, datacenter, and critical facilities fields. His experience ranges from financial and organizational to deeply technical. He has held executive positions at RagingWire Data Centers, DH Capital, and Tier 1 Research. In addition, Daniel has served as the conference chairman for the Hosting Transformation Summit and the Global Peering Forum, for four years in each case. Daniel has held a wide variety of positions across the Internet infrastructure sector: network engineering and peering; data center operations and engineering; financial and industry analysis; and executive management. Daniel has also been a sponsor and host of NANOG.
Speakers:
  • Jay Borkenhagen.
  • Peter Jacoby, RCN.
  • L Sean Kennedy, XO Communications
  • L Sean Kennedy is an active member of the Internet Engineering community and a Director of Network Engineering at XO Communications. He has been a member of the NANOG Program Committee since 2013.

  • Don MacNeil
  • Mr. MacNeil has over 25 years of experience in network architecture and design; network engineering, access and optimization; customer operations; product and more. Prior to EdgeConneX, he served as EVP, Chief Operating Officer at XO Communications (XO), where he was responsible for the customer experience and the alignment of the products and services with XO’s Go-to-Market strategies. While at XO, Don also served as CMO for two years and was Vice President of Carrier Services Operations for six years. In this role, Don was overseeing service delivery, service assurance, product management, and the customer experience for XO Carrier Services, the company’s wholesale services business unit. Joining XO in 2000, Don also held management positions in technology, operations and network engineering. Prior to XO, Don was an officer in the United States Navy, serving at-sea in operational leadership roles as well as various leadership roles in weapon system design and procurement.
pdfConference Opening(PDF)
youtubeConference Opening
10:30am - 11:15am

Imperial Ballroom (B2 Level)

The Real Cost of Public IXPs

Over the past 5 years, the market price of transit has dropped 80%, yet the average price of the top 6 IXPs in Europe has dropped only 27%. Were IXPs too cheap to start with or has their structure not evolved with the rest of the market? Are they steadily returning value to their members? I seek to answer this question. I’ll explore how IXPs make and spend money and what the hard impact of infrastructure cost changes are as well as the soft cost of things like currency fluctuation between markets. I will use real data and examples to prove my point.

View full abstract page.
Speakers:

  • David Temkin, Netflix
  • David Temkin is the Vice President of Network Strategy and Architecture at Netflix. He is responsible for the network architecture of Netflix's distributed content caching systems. Previously he managed the corporate Network Engineering teams as the Network Engineering Manager, responsible for global data and voice networks as well as CDN relationships. He has also held the position of Director of IP Product Development and Engineering at Telx. He was responsible for all Layer 2 & 3 product architecture, design, and deployment across the Telx portfolio of data centers. Previously, he spent time at Yahoo! as the Layer 4-7 Network Architect, responsible for network load balancing. He also designed and built out the global network for Right Media, an online ad serving startup that was later acquired by Yahoo!
pdfThe Real Cost of Public IXPs(PDF)
youtubeThe Real Cost of Public IXPs
11:15am - 11:20am

Imperial Ballroom (B2 Level)

NANOG 67 Hackathon team black hole route monitor

The Hackathon co-2nd place finisher "team black hole route monitor" will briefly demonstrate the hack they developed at NANOG 67.

View full abstract page.
Speakers:

  • John Kristoff, DePaul University
  • John Kristoff is currently employed by DePaul University as a network architect and adjunct faculty. In the past, he has held positions with Team Cymru, the Dragon Research Group, UltraDNS/Neustar and Northwestern University. John is active in a variety of communities including NANOG, IETF, FIRST, ops-trust, nsp-security, Internet2 and REN-ISAC.
youtubeNANOG 67 Hackathon team black hole route monitor
11:20am - 11:25am

Imperial Ballroom (B2 Level)

NANOG 67 Hackathon team take-off

The Hackathon co-2nd place finisher "team take-off" will briefly demonstrate the hack they developed at NANOG 67.

View full abstract page.
Speakers:

  • Peter Hoose, Facebook, Inc.
  • Peter has spent the last fifteen years attempting to automate himself out of a job, thus far unsuccessfully. Rest assured, he’ll keep at it until the job is done. In his current role as Network Infrastructure Manager at Facebook, his teams combine the power of automation with solid network engineering to keep facebook’s global backbone, and datacenter networks running fast, reliably, and efficiently. Today, they are building the infrastructure to deploy wedge, six-pack and fboss, facebook’s open switching platform and network operating system. Prior to this, Peter worked as a Network Engineer at Facebook, and further in the past as Senior Network Engineer and Architect at NTT America where he built custom dedicated hosting solutions for customers large, and small.
  • Chris Woodfield, Twitter.
youtubeNANOG 67 Hackathon team take-off
11:25am - 12:00pm

Imperial Ballroom (B2 Level)

NCI TNG: NANOG, The Next Generation

What is NANOG doing to develop future generations of Network Operators, Engineers, and Architects? An overview of the NANOG College Immersion Program (NCI), feedback from participating professors and students, and a panel discussion about the role of NANOG in developing future leaders for the Network Operator community.

View full abstract page.
Moderators:

  • David Temkin, Netflix
  • David Temkin is the Vice President of Network Strategy and Architecture at Netflix. He is responsible for the network architecture of Netflix's distributed content caching systems. Previously he managed the corporate Network Engineering teams as the Network Engineering Manager, responsible for global data and voice networks as well as CDN relationships. He has also held the position of Director of IP Product Development and Engineering at Telx. He was responsible for all Layer 2 & 3 product architecture, design, and deployment across the Telx portfolio of data centers. Previously, he spent time at Yahoo! as the Layer 4-7 Network Architect, responsible for network load balancing. He also designed and built out the global network for Right Media, an online ad serving startup that was later acquired by Yahoo!
Panelists:
  • Kevin Epperson.
  • Daniel Golding, NANOG Board, Google
  • Daniel Golding is the senior manager of network infrastructure at Google, Inc. He has over 20 years of experience in the Internet, datacenter, and critical facilities fields. His experience ranges from financial and organizational to deeply technical. He has held executive positions at RagingWire Data Centers, DH Capital, and Tier 1 Research. In addition, Daniel has served as the conference chairman for the Hosting Transformation Summit and the Global Peering Forum, for four years in each case. Daniel has held a wide variety of positions across the Internet infrastructure sector: network engineering and peering; data center operations and engineering; financial and industry analysis; and executive management. Daniel has also been a sponsor and host of NANOG.

  • Ronald Kovac
  • Dr. Ron J. Kovac is a professor with the Center for Information and Communication Sciences, which is a master’s degree program that prepares graduate students in the field of information and communication technology. Previously, Dr. Kovac was the telecommunication manager for the State University of New York and a chief information officer and executive director for large information technology centers on the east coast. Dr. Kovac’s previous studies include electrical engineering, photography and education. He is a prolific writer and has numerous publications (three books and over 50 articles), and he has completed numerous international consulting projects in both the educational and information technology field. Additionally, he is very successful with creative grantsmanship. He speaks worldwide on issues related to information technology, network security, and educational technology.

  • Jesse Sowell, Stanford
  • Jesse Sowell is a Research Affiliate at MIT and runs DevOps and Measurement Visualization at the Markley Group. Jesse's PhD research was a study of institutional mechanisms and attendant forms of authority that support Internet infrastructure operations. In other words, what are the characteristics of the social glue that ensures interconnection among a private network of networks continues to cohere into the modern Internet? Jesse's current research interests comprise cost and risk models of Internet infrastructure, incentives in malware value networks, and the political challenges of developing joint capabilities between operational communities and conventional governance actors.
youtubeNCI TNG: NANOG, The Next Generation
12:00pm - 1:30pmRouge/Cuvee (Lobby Level)Newcomers Lunch (Invitation Only)Sponsors:
12:00pm - 1:30pmInternational (2nd Floor)Welcome LunchSponsors:
1:30pm - 2:00pm

Imperial Ballroom (B2 Level)

Network Support for TCP Fast Open

Latency is the dominant factor for the user-experience of the Internet users. TCP, the most widely used transport protocol involves a handshake before any data can be sent over the connection. As round-trip-times between client and server are often in the order of hundreds of milliseconds, TCP's handshake introduces a significant delay until data can be sent. TCP Fast Open (TFO) is a novel extension to TCP that allows to shortcut TCP's handshake, by sending data on the SYN-segment and allowing the server to reply before the handshake finished. The benefits are a much better user-experience as the data reaches the client much faster. We at Apple have deployed TCP Fast Open for a particular service, sending 100000 requests per second at peak times. While TFO provides a huge benefit significantly improving the user-experience, we also observed some major issues. Many middleboxes and firewalls in the operator networks interfere with TCP Fast Open. In some cases, we have observed that middleboxes are blacklisting clients that use TFO. In this talk we give a detailed explanation of the behavior and benefits of TCP Fast Open. We continue by providing examples of how firewalls interfere with TFO according to our experience with its deployment. Our talk finishes with a call to network operators and firewall vendors to take TFO into account in the configuration of their equipment, so as TFO can operate efficiently and provide the latency benefit to the end-users.

View full abstract page.
Speakers:

  • Christoph Paasch, Apple
  • Christoph Paasch is a software engineer at Apple, working in the networking team. Prior to joining Apple, he obtained his PhD, titled "Improving Multipath TCP", at the UCLouvain, under the supervision of Prof. Olivier Bonaventure. His work focused on improving Multipath TCP and its Linux Kernel implementation in real world scenarios. He is passionate on all aspect of transport layer protocols and how they can be modified to improve the user-experience over the Internet.
pdfNetwork Support for TCP Fast Open(PDF)
youtubeNetwork Support for TCP Fast Open
2:00pm - 2:30pm

Imperial Ballroom (B2 Level)

Elliptic curves to the rescue: tackling availability and attack potential in DNSSEC

Over the past decade, we have seen the gradual rollout of DNSSEC across the name space, with adoption growing slowly but steadily. While DNSSEC was introduced to solve security problems in the DNS, it is not without its own problems. In particular, it suffers from two big problems: 1) Use of DNSSEC can lead to fragmentation of DNS responses, which impacts the availability of signed domains due to resolvers being unable to receive fragmented responses and 2) DNSSEC can be abused to create potent denial-of-service attacks based on amplification. Arguably, the choice of the RSA cryptosystem as default algorithm for DNSSEC is the root cause of these problems. RSA signatures need to be large to be cryptographically strong. Given that DNS responses can contain multiple signatures, this has a major impact on the size of these responses. Using elliptic curve cryptography, we can solve both problems with DNSSEC, because ECC offers much better cryptographic strength with far smaller keys and signatures. But using ECC will introduce one new problem: signature validation - the most commonly performed operation in DNSSEC - can be up to two orders of magnitude slower than with RSA. Thus, we run the risk of pushing workload to the edges of the network by introducing ECC in DNSSEC. This talk discusses solid research results that show 1) the benefits of using ECC in terms of solving open issues in DNSSEC, and 2) that the potential new problem of CPU use for signature validation on resolvers is not prohibitive, to such an extent that even if DNSSEC becomes universally deployed, the signature validations a resolver would need to perform can easily be handled on a single modern CPU core. Based on these results, we call for an overhaul of DNSSEC where operators move away from using RSA to using elliptic curve-based signature schemes.

View full abstract page.
Speakers:

  • Roland van Rijswijk-Deij, SURFnet
  • I'm an external Ph.D. student in the Design and Analysis of Communication Systems (DACS) group at the Centre for Telematics and Information Technology (CTIT) at the University of Twente. When I'm not working on my research in Twente, I am an R&D project manager at SURFnet, the National Research and Education Network (NREN) in The Netherlands. In my job I'm responsible for Internet innovation in the areas of network security and privacy.
pdfElliptic curves to the rescue: tackling availability and attack potential in DNSSEC(PDF)
youtubeElliptic curves to the rescue: tackling availability and attack potential in DNSSEC
2:30pm - 3:00pmImperial Foyer (B2 Level)BreakSponsors:
3:00pm - 5:00pm

Gold Room (2nd Floor)

Track: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience

Malicious BGP route hi-jacks and and accidental mis-originations continue to threaten the security and robustness of the global Internet. Over the last several years the IETF, RIRs, router vendors, and researchers have developed and implemented an approach to BGP origin validation based upon a global resource public key infrastructure (RPKI) that permits operators anywhere in the Internet to detect unauthorized route announcements and implement local polices to mitigate (e.g., filter) these events. This track will examine the current state of RPKI Origin Validation (ROV) technologies: products, services, implementations, configurations, and tool sets that could be useful to operators in planning, deploying, and monitoring ROV use in their networks. Actual operational experiences with ROV deployment will be described as well as issues that need to be addressed to further operational deployment. 1. RPKI Introduction Doug Montgomery / Sandy Murphy 2, RPKI hosted services Mark Kosters, CTO ARIN 3. RPKI Implementations Doug Montgomery / Sandy Murphy 4. Router Vendor Implementations Cisco / Juniper / Alcatel Greg Hankins 5. RPKI Test, Training, Monitoring, Management tools. Matthias Waelisch, Doug Montgomery, Sandy Murphy 6. Deployment Experiences Panel (30 min) JR Mayberry/Microsoft, Tony Tauber/Comcast, Thomas King/DE-CIX

View full abstract page.
Moderators:

  • Doug Montgomery, National Institute of Standards and Technologies (NIST)
  • Manager of the Internet and Scalable Systems Metrology Group within the Information Technology Laboratory (ITL) of the National Institute of Standards and Technology (NIST). In that role I provide technical leadership to NIST's current research and standardization efforts in Internet Infrastructure Protection (e.g., Naming and Routing Security, Internet Protocol security); scalable addressing and routing technologies (e.g., IPv6, new routing architectures); and measurement, modeling and analysis of macroscopic behaviors (e.g., complex systems analysis) within the Internet system.

  • Sandra Murphy, Parsons, Inc.
  • Sandra Murphy has been working in security for distributed systems, particularly routing systems, for two decades. She has been an active NANOG participant since NANOG33 and has been working on the RPKI based security solution for BGP in the IETF, NANOG, and RIR communities. She is co-chair of the SIDR working group in the IETF.
Panelists:

  • Greg Hankins, Nokia
  • Greg Hankins has been attending NANOG since 1998, first as a network operator and now as a hardware vendor. He also attends APRICOT, Euro-IX, various Peering Forums, RIPE, and regional operator conferences where he frequently speaks on network technology and operational topics. Greg currently works as a Senior Product Manager for Nokia.

  • Thomas King
  • Thomas King was Head of the Research & Development department at DE-CIX until the end of 2015. Since 2016, Thomas King has been promoted to the newly-created position of CIO of DE-CIX.

  • Mark Kosters, ARIN
  • Mark Kosters is the CTO of the American Registry for Internet Numbers (ARIN), responsible for all engineering initiatives within the organization, leading both development and operations. Mark has over twenty-seven years of experience as an applications developer, networking engineer, technical manager and executive. Over the last twenty-two years, he has been a senior engineer at Data Defense Network (DDN) NIC, chief engineer and Principal Investigator under the NSF-sponsored Internet NIC (InterNIC), Vice President of Research at VeriSign, and now CTO of ARIN. Over his career, Mark has been involved in application design and implementation of core internet client/server tools, router administration, UNIX system administration, database administration, and network security. He has represented both network information centers in various technical forums such as the IETF, RIPE, APNIC, CaribNOG and NANOG.

  • Rick Mayberry, Microsoft
  • My passion is primarily around securing large networks and, for the majority of my career, I’ve worked for Internet Service Providers (ISP). My secondary interests are network engineering and network technology, cloud and virtualization, measuring security program effectiveness and enabling product teams to build secure products through repeatable processes, patterns and shared services (security architecture). I am not your typical counter-culture, paranoid, policy or compliance security professional. I believe security is just another delivery organization within larger IT/Engineering. I believe a security organization should deliver horizontal shared services that can be leveraged by other IT initiatives and accelerate product or service delivery. I also am a strong believer that security is a means to increased availability – especially within a service provider environment.

  • Keyur Patel, Cisco
  • Keyur Patel is a Distinguish Engineer at Cisco with focus on BGP routing. Keyur is the architect for the Cisco IOS BGP origin AS validation feature and a key contributor on the standardization process in the IETF. Keyur has 6 published RFCs and more than 30 working documents in this area.

  • John Scudder, Juniper Networks
  • John Scudder is a Distinguished Engineer at Juniper Networks. He has worked in the Internet industry since 1990, when he joined the Internet Engineering team at Merit Network, Inc, doing network engineering and support for the NSFNET. Since then he has worked at a variety of Internet companies, large and small. His interests include routing protocols, particularly BGP, and routing security. He co-chairs the IETF IDR (which standardizes BGP and its extensions) and SPRING (segment routing) working groups, and is a past co-chair of the IETF Routing Area working group. John's first NANOG was in 1990 or so, when it was still called Regional-Techs.
  • Arjun Sreekantiah, Cisco.
  • Henk Steenman, AMS-IX
  • Henk Steenman is CTO at AMS-IX since the end of 2001

  • Tony Tauber, Comcast
  • In his role as Distinguished Engineer at Comcast, Tony focuses on Backbone and Core network architecture and engineering with particular attention to measurement, manageability, and automation. He also partners with the research and education communities on projects and currently chairs the NANOG Program Committee. In the past Tony held senior network engineering positions at BBN, GTE Internetworking, Genuity, Level3, and MIT Lincoln Lab as well as served as co-chair of the Routing Protocol Security working group in the IETF.

  • Matthias Wählisch, Freie Universitaet Berlin
  • Matthias Wählisch a senior research scientist at Freie Universität Berlin, heading the research activities on Internet technologies. His research and teaching focus on efficient, reliable, and secure Internet communication. This includes the design and evaluation of networking protocols and architectures, as well as Internet measurements and analysis. His efforts are driven by transforming solid research into practice, trying to improve Internet-based communication. In addition to scientific contributions, Matthias is also involved in the IETF, where he co-authored several Internet drafts and six RFCs. He also co-founded several open source projects such as RTRlib and RPKI MIRO.
pdfHankins (PDF)
pdfKing(PDF)
pdfKosters(PDF)
pdfMayberry(PDF)
pdfMontgomery_Murphy (PDF)
pdfPatel(PDF)
pdfScudder(PDF)
pdfSteenman(PDF)
youtubeTrack: Practical BGP Origin Validation using RPKI: Vendor Support, Signing and Validation Services, and Operational Experience
pdfWählisch(PDF)
3:00pm - 5:00pm

Imperial Ballroom (B2 Level)

Tutorial: Tutorial Everything You Always Wanted to Know About Optical Networking

Topics include: * How fiber works (the basics, fiber types and limitations, etc) * Optical power (understanding dBm, loss, using light meters, etc) * Working with optics (choosing the right type, designing optical networks, etc) * DWDM (how it works, muxes, OADMs and ROADMs, amps, etc) * Dispersion and other impairments (what is it, why do we care, how do we fix it) * Optical Myths (can I hurt myself looking into fiber, can I overload my optic, etc) * An update on the latest state-of-the-art optical technologies and trends.

View full abstract page.
Speakers:

  • Richard A Steenbergen, PacketFabric
  • Stealth mode startup focused on shifting some paradigms and revolutionizing outside the box.
pdfSteenburgen_Everything(PDF)
youtubeTutorial Everything You Always Wanted to Know About Optical Networking
5:30pm - 7:00pmInternational (2nd Floor)Peering PersonalsSponsors:
Tuesday, June 14 2016
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:28am - 5:00pmImperial Foyer (B2 Level)Registration
8:29am - 4:30pmImperial Foyer (B2 Level)Espresso BarSponsors:
8:30am - 9:30amRouge (Lobby Level)Members Breakfast (Invitation Only)Speakers:
  • NANOG Board.
8:30am - 9:30amInternational (2nd Floor)Power BreakfastSponsors:
9:30am - 11:00am

Gold Room (2nd Floor)BGP Made EasySpeakers:

  • John van Oppen
  • John van Oppen runs the technical operations, including design, engineering and planning, for Spectrum Networks, INC (AS11404). He lead support of newNOG originally and as a result, Spectrum Networks was a founding sponsor of what is now NANOG.
youtubeBGP Made Easy
pdfBGP Made Easy(PDF)
9:30am - 11:00am

Imperial Ballroom (B2 Level)

DNS Track

The DNS track at NANOG provides a forum for attendees to present and discuss recent and relevant topics in DNS, including: operational experience and advice, security incidents (ongoing or one-time), recent protocol developments, and new research. Kazunori Fujiwara is a Senior Researcher at JPRS (Japan Registry Services Co., Ltd) working on DNS protocol and DNS measurement. He will present DNS query trends seen at Root and JP, (the analysis of packet capture data of root DNS servers and JP DNS servers). Casey Deccio is a Senior Research Scientist at Verisign Labs working on DNS measurement, diagostics, and deployment. He will present on Multi-Vantage Point Diagnostics and Measurement using DNS looking glass techniques. Yacin Nadji is a postdoctoral researcher at Georgia Tech and co-founder of Netrisk working on network-based device/service identification and network risk analysis. He will present on how to classify devices, and discover new ones, using streams of DNS data. Duane Wessels is a Principal Operations Engineer at Verisign. He will moderate the track and present on Increasing the Zone Signing Key Size for the Root Zone. Edward Lewis is a Senior Technologist in the Office of the CTO at ICANN. He will give a brief overview of the upcoming Root Zone KSK rollover.

View full abstract page.
Speakers:

  • Casey Deccio, Verisign Labs
  • Casey Deccio is a Senior Research Scientist at Verisign Labs. Among his research and development interests and goals are DNSSEC deployment enhancements, DNS ecosystem tools/monitoring, and the measurement, modeling, and analysis of deployed Internet protocols, including DNS/DNSSEC and IPv6. While a Principal Research and Development Cyber Security Staff member at Sandia National Laboratories, where he had been employed since 2004, and where he was responsible for network-related research and development, including DNSSEC and IPv6 deployment efforts. At Sandia he developed DNSViz, the widely used Web-based tool for DNS analysis and visualization. Casey earned B.S. and M.S. degrees in Computer Science from Brigham Young University, and received a Ph.D. from UC Davis, in Computer Science. His dissertation was a study of dependencies in the DNS, which form a model for quantifying and improving DNS availability through careful deployment practices.
  • Kazunori Fujiwara, JPRS.
  • edward lewis, ICANN.
  • Yacin Nadji.
  • Duane Wessels, Verisign
  • Duane Wessels became interested in web caching in 1994 as a topic for his master's thesis in telecommunications at the University of Colorado, Boulder. He worked with members of the Harvest research project to develop web caching software. After the departure of other members to industry jobs, he continued the software development under the name Squid. Another significant part of Duane's research with the National Laboratory for Applied Network Research has been the operation of 6 to 8 large caches throughout the U.S. These caches receive requests from hundreds of other caches, all connected in a "global cache mesh."
pdfDeccio(PDF)
youtubeDNS Track
pdfDNS Track(PDF)
pdfFujiwara(PDF)
pdfLewis(PDF)
pdfNadji(PDF)
pdfWessels(PDF)
11:00am - 11:30amImperial Foyer (B2 Level)BreakSponsors:
11:30am - 1:00pm

Gold Room (2nd Floor)

DNSSEC Tutorial

Eddie Winstead from ISC would give a 90 minute tutorial on DNSSEC. It would be an expanded version of what was presented at NANOG on the Road.

View full abstract page.
Speakers:

  • Eddy Winstead, Internet Systems Consortium
  • Eddy has over 20 years of DNS, DHCP and sysadmin experience. He was a systems analyst and hostmaster for the North Carolina Research and Education Network (NCREN) for over a decade. At ISC, Eddy has delivered DNS + DNSSEC consulting, configuration audits and technical training.
youtubeDNSSEC Tutorial
pdfDNSSEC Tutorial(PDF)
11:30am - 1:00pm

Imperial Ballroom (B2 Level)

Security Track

The NANOG security track explores the latest in current network security threats, defenses and research. Contact the track coordinator to reserve some time to lead a discussion or present a topic of interest.

View full abstract page.
Speakers:
  • Christoph Dietzel.
  • Ryan Haley.
  • John Kristoff, DePaul University
  • John Kristoff is a researcher with Team Cymru, an Internet security research firm and the Managing Director of the Dragon Research Group. John has worked at UltraDNS/Neustar as a network architect and held network engineering positions at both Northwestern University and DePaul University. John remains affiliated with Northwestern and DePaul as a collaborator, student and instructor. John is an active participant and in some cases a founder of a handful of network and security related communities, both private and public.
  • Jelena Mirkovic.
pdfDietzel_Security Track(PDF)
pdfHaley_Security Track(PDF)
pdfKristoph_Security Track(PDF)
pdfMirkovic_Security Track(PDF)
youtubeSecurity Track
1:00pm - 2:25pmInternational (2nd Floor)Lunch BreakSponsors:
2:25pm - 2:30pm

Imperial Ballroom (B2 Level)

NANOG 67 Hackathon team PiCon

The Hackathon first place finisher "team PiCon" will briefly demonstrate the hack they developed at NANOG 67.

View full abstract page.
Speakers:
  • Brandon Bennett.
youtubeNANOG 67 Hackathon team PiCon
2:30pm - 3:00pm

Imperial Ballroom (B2 Level)

Avoiding Nation-State Surveillance

When Internet traffic enters a country, it becomes subject to those countries’ laws. As an increasing number of countries pass laws that facilitate mass surveillance, Internet users have more need than ever to determine---and control---which countries their traffic is traversing. To this end, we first conduct a large-scale measurement study to demonstrate that Internet paths often transit countries where laws may make users more vulnerable to surveillance than they would be in their home country. We investigate different options that give users the power to avoid certain countries, which could ultimately make them less vulnerable to state-level surveillance. Our measurement-driven evaluation shows that tunneling allows users in many countries to access many popular sites without traversing certain other countries. Our study focuses on five different countries: Brazil, Netherlands, India, Kenya, and the United States. We find that these different options increase clients’ (end-users’) abilities to avoid other countries, but no country can completely avoid all other countries. Our results also show how central the United States is to inter-domain routing, as clients in Brazil, Netherlands, India, and Kenya cannot avoid the United States when accessing a significant portion of the top domains.

View full abstract page.
Speakers:

  • Annie Edmundson, Princeton University
  • Annie is a Ph.D. candidate in the Security and Privacy Research Group at Princeton University. She is also a Graduate Student Fellow at the Center for Information Technology Policy, where she studies computer security and privacy, and its intersection with policy. Her prior work includes research on electronic voting machines and network-level adversaries on the Tor network, as well as being a member of the Application Security team at Twitter.

  • Roya Ensafi
  • Roya Ensafi is a Postdoctoral Research Associate and a fellow at the Center for Information Technology Policy (CITP) at Princeton University. Her research work focuses on computer networking and security, with an emphasis on network measurement. The primary goal of her current research is to better understand and bring transparency to network interference (e.g. censorship) by designing new tools and techniques. In her dissertation, which passed with distinction, Roya developed side channels to remotely measure TCP connectivity between two hosts, without requiring access to any of the hosts. Most of her latest research projects center around studying national firewalls, especially the Great Firewall of China (GFW). Her work studying how the Great Firewall of China discovers hidden circumvention servers received an IRTF Applied Networking Research Prize (ANRP) in 2016.
  • Nick Feamster.
  • Jennifer Rexford.
youtubeAvoiding Nation-State Surveillance
pdfEdmundson_Avoiding Nation-State (PDF)
3:00pm - 3:30pm

Imperial Ballroom (B2 Level)

Everyday practical BGP filtering

Robust BGP filtering is a challenge in and of itself. In this talk NTT offers unprecedented insight into how today's AS2914 filter-sausage is made. We'll cover the concept of Peer Locking - (a not-so-widely-known route leak blocking mechanism based on as-path filters), and basic hygiene in terms of Bogon ASNs.

View full abstract page.
Speakers:

  • Job Snijders, NTT
  • Job Snijders is actively involved in the Internet community both in an operational capacity as well as founder of the NLNOG RING, Vice President of PeeringDB and Chair of the RIPE Database Working Group. Job has a passion for routing security and weapons-grade network automation. Job holds a position at NTT Communications' IP Development Department.
youtubeEveryday practical BGP filtering
pdfSnijders_Everyday practical BGP(PDF)
3:30pm - 4:00pm

Imperial Ballroom (B2 Level)

Peering Security and Resiliency

In this presentation we'll talk about BGP peering security and resiliency challenges. First we'll show real-world peering observations from the perspective of a peering router at an IXP. Then we'll give an operational perspective on peering configuration challenges, with a focus on scale an automation.

View full abstract page.
Speakers:

  • Greg Hankins, Nokia
  • Greg Hankins has been attending NANOG since 1998, first as a network operator and now as a hardware vendor. He also attends APRICOT, Euro-IX, various Peering Forums, RIPE, and regional operator conferences where he frequently speaks on network technology and operational topics. Greg currently works as a Senior Product Manager for Nokia.

  • Job Snijders, NTT
  • Job Snijders is actively involved in the Internet community both in an operational capacity as well as founder of the NLNOG RING, Vice President of PeeringDB and Chair of the RIPE Database Working Group. Job has a passion for routing security and weapons-grade network automation. Job holds a position at NTT Communications' IP Development Department.
pdfHankins_Snijders_Peering Security(PDF)
youtubePeering Security and Resiliency
4:00pm - 4:30pmImperial Foyer (B2 Level)BreakSponsors:
4:30pm - 5:00pm

Imperial Ballroom (B2 Level)

DNS-based censorship: theory and measurements

As explained in RFC 7754, "Technical Considerations for Internet Service Blocking and Filtering", it is tempting for a censor to attack, not the direct traffic or servers, but the rendezvous systems, the most obvious one being the DNS. In Europe, but also in other places, several countries implemented a DNS-based censorship system, mandating the ISP to configure their DNS resolvers to lie (providing other answers than what the authoritative name server wanted). I will explain the various choices and possibilities of DNS-based censorship, as well as the workarounds. Of course, switching to a non-lying resolver is easy. But we'll see it's not so easy and that it is only the start of a arms race, specially giving the fact that "alternative" resolvers are often not secured, and therefore can be hijacked. I will show examples and statistics on the actual deployment, both of the censorship and of the workarounds. This will mostly be done with RIPE Atlas probes. They allow to perform detailed measurements of DNS data, even in countries where you've never been. Note: this will be the continuation of this article: https://labs.ripe.net/Members/stephane_bortzmeyer/dns-censorship-dns-lies-seen-by-atlas-probes/ and this talk: https://ripe68.ripe.net/presentations/158-bortzmeyer-google-dns-turkey.pdf

View full abstract page.
Speakers:

  • Stphane Bortzmeyer, AFNIC
  • Stéphane Bortzmeyer works for AFNIC, the domain name registry for the .fr Top-Level Domain. He works in DNS, security, standardization, blockchains, etc. When not playing with RIPE Atlas probes, he participates in the IETF and is the author of two DNS RFCs.
pdfBortzmeyer_DNS-based censorship(PDF)
youtubeDNS-based censorship: theory and measurements
5:00pm - 5:30pm

Imperial Ballroom (B2 Level)

Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild

DDoS attacks remain a serious threat not only to the edge of the Internet but also to the core peering links at Internet Exchange Points. Blackholing at IXPs is an operational technique that allows a peer to announce a prefix via BGP to another peer, which then discards traffic destined for this prefix. However, as far as we know there is only anecdotal evidence of the success of blackholing. In this talk, we shed light on the extent to which blackholing is used by the IXP members and its impact on traffic, e.g., volumes or patterns. Within a 12 week period we found that traffic to more than 7,864 distinct IP prefixes was blackholed by 75 ASes. The daily patterns emphasize that there are not only a highly variable number of new announcements every day but, surprisingly, there is a consistently high number of announcements > 1000. Moreover, we highlight case studies in which blackholing succeeds in reducing the DDoS attack traffic. In addition we briefly present the current state of blackholing standardization within the IETF.

View full abstract page.
Speakers:

  • Christoph Dietzel, DE-CIX / TU Berlin
  • Since June 2014, Christoph Dietzel is member of the DE-CIX Research and Development team and responsible for several research efforts and also involved in numerous projects funded by the public sector (EU, German Federal Ministries). Moreover, he is a PhD student in the INET group, advised by Anja Feldmann at TU Berlin, since the end of 2014. His ongoing research interests focus on Internet measurements & security, routing, and traffic classification. Chris is also highly interested in IXP-related aspects of the Internet ecosystem. Prior to his work at DE-CIX and his PhD studies he received BSc and MSc degrees in computer science from the Darmstadt University of Applied Sciences. Alongside his studies, Chris was employed by the Fraunhofer SIT and CASED as a student research assistant. In 2013, Christoph Dietzel was granted a scholarship to conduct research and study at the UMass (USA). In cooperation with Siemens CERT, he worked on dynamic malware analysis for Android in fulfillment of his Master’s Thesis.
youtubeBlackholing at IXPs: On the Effectiveness of DDoS Mitigation in the Wild
pdfDietzel_Blackholing (PDF)
5:30pm - 5:50pm

Imperial Ballroom (B2 Level)Lightning TalksyoutubeLightning Talks
pdfMullally_Lightning Talks(PDF)
pdfSchaefer_Lightning Talks(PDF)
5:50pm - 6:00pm

Imperial Ballroom (B2 Level)NANOG 67 Hackathon Wrap-upSpeakers:

  • David Swafford, Facebook
  • David Swafford is a Network Engineer on Facebook's Production Engineering team. Having coming to FB a few years back as traditional network engineer, he quickly shifted focus to the software side after realizing that there simply wasn't enough time in the day to do things the traditional way. That shift has paid off well for FB as the entire network team shifted in the same manner and now we focus on much more interesting problems together. When nerding out the most, he loves to look deep into the things that make networking and large systems tick. Topics like routing protocols, TCP, and Linux fall into his favorite bedroom reading. Outside of all this, he loves to to cook any and everything under the theme of Italian-American following in the footsteps of his favorite chef Scott Conant. He also loves being active with his dog Cocoa. Best reached using [email protected], you can also find him regularly at the SF Python Meet-ups (www.meetup.com/sfpython/). Any and all levels are welcome!
youtubeNANOG 67 Hackathon Wrap-up
pdfSwafford_Hackathon Wrap-up(PDF)
6:00pm - 8:00pmInternational (2nd Floor)Beer n GearSponsors:
Wednesday, June 15 2016
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:28am - 5:00pmImperial Foyer (B2 Level)Registration
8:29am - 4:30pmImperial Foyer (B2 Level)Espresso BarSponsors:
8:30am - 9:30amInternational (2nd Floor)Power Breakfast
9:30am - 10:15am

Imperial Ballroom (B2 Level)

TCP over IP Anycast - Pipe dream or Reality?

The talk will focus on how to route our end users to the closest location serving content -- i.e. to the closest PoP. Traditionally LinkedIn used geo-location based load balancing (with help of DNS) but there are challenging areas with this approach that lead to bad performance for the end user and operational challenges for the LinkedIn site teams. 1. Sub-optimal routing due to the fact that geographical load balancing makes DNS mapping decisions based on an end users' name server IP as opposed to the client. 2. Geographical mapping of IPs to latitude/longitude and city-level mapping is not 100% accurate nor related to fiber and internet connectivity map. 3. Operational complexity. As we grow the number of PoPs, it will be increasingly difficult to scale the use of geographical load balancing. The answer to the above challenge, was TCP anycast: Anycast provides a distributed service via routing. Based on anycast routing, packet will arrive to the closest node depending on the location of source and hop-by-hop routing decisions. In short the talk will discuss about how we improved our anycast implementation using bgp and how we measure the success rate: How LinkedIn used TCP anycast and RUM to drive optimizations and make the site faster. Measurements using RUM is demonstrated in the following presentation: http://www.slideshare.net/rmaheshw/velocity-2015-pops-and-rum blog post: https://engineering.linkedin.com/network-performance/tcp-over-ip-anycast-pipe-dream-or-reality Presenters: Shawn Zandi and Ritesh Maheshwari

View full abstract page.
Speakers:

  • Ritesh Maheshwari, LinkedIn
  • Ritesh Maheshwari is a performance engineer at LinkedIn, working on making LinkedIn fast using his medley of skills in data and performance analysis, network optimization, and automation. Before LinkedIn, Ritesh was a performance engineer at Akamai. Ritesh holds a PhD in computer science from Stony Brook University, where he first became passionate about performance while working on computer networks. He is also an alumni of IIT Kharagpur.

  • Shawn Zandi, LinkedIn
  • Shawn Zandi is a lead infrastructure architect with LinkedIn, where he builds large scale data center, backbone and core IP networks. Shawn currently lives in San Francisco, California. He has worked as network and security architect for consulting firms from Dubai to Silicon Valley over the past 15 years. In addition to computer science degree, Shawn holds many industry certifications including CCIE in routing and switching, security and service provider as well as CCDE. http://linkedin.com/in/szandi.
pdfTCP over IP Anycast (PDF)
youtubeTCP over IP Anycast - Pipe dream or Reality?
10:15am - 11:00am

Imperial Ballroom (B2 Level)

Suffering Withdrawal; an automated approach to connectivity evaluation

Today’s routers generally make themselves more- or less-attractive to transit traffic through operator’s manipulation of their interfaces IGP metrics or overload status. This all-or-nothing method lacks granularity and does not take advantage of the wealth of connectivity and health-check information readily available at the router. We propose the notion of “connectedness value”, and describe an approach that allows a router to take pre-configured actions depending on its current level of connectedness to the rest of the network. The “connectedness value” is derived from not only reachability information, but also from OAM data and other policy-based criteria. For each router, an operator can now define what “well-connected” means, and what should happen should the router becomes less than “well connected". In this presentation we will discuss the concepts around defining and acting on connectedness value, we well as the prototyping we have done for several use-cases relevant to a content-provider network with lots of remote POP/cache facilities. We will seek feedback from the community on the usability of the proposed approach, as well as ideas for enhancements.

View full abstract page.
Speakers:

  • Micah Croff, GitHub
  • Responsible for architecting and implementing from the ground up a new "Service Provider" network to support rapid growth and functionality for both near and long term capacity to meet business demands. Deployed IS-IS, BGP, IPv6, MPLS, L3VPNs.

  • Tim Hoffman, Twitter
  • Following a decade of building telecommunications networks in New Zealand, Tim is lead engineer for Twitter's global backbone.

  • Bruce McDougall, Cisco Systems
  • Bruce McDougall is a Consulting Systems Engineer at Cisco and spends his days lobbying Cisco’s engineering organization on behalf of WebOTT and Service Provider technical and operational requirements. Prior to joining Cisco he spent a number of years in Network Engineering and Ops roles at Web and Service Provider organizations.

  • Nick Slabakov, Juniper Networks
  • Nick Slabakov is Chief Architect for the Web Services group, where he works with some of Juniper's most innovative customers on solutions to the challenges of scale, programmability, and efficiency in their networks. Nicks recent work and industry involvement spans the areas of MPLS-TE, SPRING, SDN, Cloud Networking, and Network Automation / Programmability. His previous roles in Juniper included various Systems Engineering positions supporting Tier 1 carriers. Prior to Juniper, Nick was a Principal Systems Engineer at Riverstone Networks, which followed 10 years of experience as a Network Engineer in Enterprise and Service Provider settings.
pdfSuffering Withdrawal(PDF)
youtubeSuffering Withdrawal; an automated approach to connectivity evaluation
11:00am - 11:30amImperial Foyer (B2 Level)Break
11:30am - 12:00pm

Imperial Ballroom (B2 Level)

Measurement based inter-domain traffic engineering

(draft slides are available here: https://www.dropbox.com/s/r7czxo7jefk147o/NANOG67__Measurement_based_Inter_domain_TE.pdf?dl=0) This presentation concentrates on an inter-domain traffic engineering scenario for multi-homed stub ASes. It involves making best use of the multiple egress transits that are available. The idea is to dynamically choose the best egress transit for each potential destination based on network measurements. We highlight the benefit of such scenario by showing the performance difference of different transit providers. The building blocks and challenges in realising such a system is revealed. Especially, how to deal with that huge amount of destination BGP prefixes is of crucial importance to the scalability of such design. We aim at sharing our observations based on working traffic traces from networks of diverse profiles (e.g. ISP, content provider, etc.) located in different countries (USA and some other European countries.) Our results show that we can predict prefixes that cover a satisfying amount of traffic with much simpler methods than those mentioned in previous studies. Further, intelligently making route decision requires proper interpretation of network measurements, especially those on RTT. First, we discovered that not all RTT measurements are eligible for inter-domain traffic engineering. We propose to briefly demonstrate our approaches in revealing the origins of “extra” variations in RTT measurements. Second, we demystify one common doubt on RTT measurements: do AS path changes cause major RTT variations? We show that it is not necessary the case with recent measurement data from RIPE Atlas.

View full abstract page.
Speakers:

  • WENQIN SHAO, Telecom ParisTech
  • Wenqin Shao is a PhD candidate at Telecom ParisTech, France. His thesis, in close cooperation with Border 6, aims at improving the building blocks of inter-domain routing optimisation platform. He received his MSc from Telecom ParisTech in 2013, and his B.Eng. from Fudan University, China, in 2010. His current research interests include network measurement, traffic engineering and statistical learning.
youtubeMeasurement based inter-domain traffic engineering
pdfShao_Measurement (PDF)
12:00pm - 12:30pm

Imperial Ballroom (B2 Level)

Utilizing Kea hook points for modern IP addressing

Kea is a new high performance, open source project for IPv4 and IPv6 addressing. Kea has hook points where you can add your own logic to parse incoming DHCP packets and modify them as you like right before they leave the server network interface. These hook points have given Kea traction in modern provisioning of large datacenters. Despite Kea’s relatively young age, Facebook has leveraged the hooks feature extensively to customize Kea to meet their production requirements. Easily extensible hooks can lead an organization to re-think how it might best address and provision its networks. Hook points include: packet received, subnet selected, lease renewed, lease released, and ready to respond. Using hooks, it is possible to control the assignment of options and even addresses from your own separate provisioning system. Hooks allow the developer to edit information such as the lease parameters (time to renew), the subnet, address or options to be delivered.

View full abstract page.
Speakers:

  • Eddy Winstead, Internet Systems Consortium
  • Eddy has over 20 years of DNS, DHCP and sysadmin experience. He was a systems analyst and hostmaster for the North Carolina Research and Education Network (NCREN) for over a decade. At ISC, Eddy has delivered DNS + DNSSEC consulting, configuration audits and technical training.
youtubeUtilizing Kea hook points for modern IP addressing
pdfWinstead_Utilizing Kea hook points(PDF)
12:30pm - 1:00pm

Imperial Ballroom (B2 Level)Lightning TalkspdfKaufman_Lightning Talks(PDF)
youtubeLightning Talks
pdfRoberts_Lightning Talks(PDF)
pdfThompson_Lightning Talks(PDF)
1:00pm - 2:30pm Lunch (On Your Own)
2:30pm - 3:00pm

Imperial Ballroom (B2 Level)

Ten Lessons From Telemetry

Streaming telemetry data enables network operators to bring network monitoring out of the 20th century and into the rich space of big data analytics. Having spent the last two years co-developing telemetry features for the WAN with customers and partners, we've learned a lot about what works and what doesn't. In this talk, I will present ten practical lessons about telemetry performance, encoding, data models, transport and scope. Lessons include "It's not that hard to improve on SNMP", "You don't know what you love until you lose it", "Transports are all about tradeoffs", and "Data models are worth it."

View full abstract page.
Speakers:

  • Shelly Cadora, Cisco Systems
  • A long time Cisco veteran and CiscoLive Hall of Fame Distinguished Speaker, Shelly Cadora is currently a Technical Marketing Engineer for the Web & OTT, focusing on network monitoring, device data models and APIs. She has worked in development and marketing for a variety of products and solutions. She has a PhD from Stanford University and a CCIE in Routing and Switching.
pdfCadora_Ten Lessons(PDF)
youtubeTen Lessons From Telemetry
3:00pm - 3:30pm

Imperial Ballroom (B2 Level)

Automating Maintenance Notifications

Despite all the recent progress around network automation, there's one aspect of our operations that for many remains stuck in a manual past. Most of us deal with maintenance notifications - both those we get and those we send - by throwing people at the problem. In this talk we'll provide an alternative approach. We'll start with an overview of Facebook's automation solution, how they built a network that automatically responds to maintenance notifications, the challenges they've overcome and the ones that remain. One difficult challenge is the sheer diversity and ever shifting formatting of maintenance notifications. We'll present a draft standard for maintenance notifications that seeks to address these challenges and describe how the standard can be put to use.

View full abstract page.
Speakers:
  • Francisco Hidalgo, Facebook.
  • Erik Klavon, Box
  • Erik Klavon works as a Senior Staff Network Engineer at Box, a secure content management and collaboration platform. Erik works on network architecture, with a focus on interconnection/peering products and strategy. He provides counsel to Box engineers, customers and partners in the areas of systems/infrastructure architecture, performance and troubleshooting.
youtubeAutomating Maintenance Notifications
pdfHidalgo_Automating Maintenance Notifications(PDF)
3:30pm - 4:00pm

Imperial Ballroom (B2 Level)

Post IPv4 Depletion Trends

ARIN will update the community about recent trends we are seeing in the registry now that ARIN has depleted its supply of available IPv4 address space. Areas of focus will be on IPv4 hijackings, the IPv4 transfer market, IPv6 growth trends, and recent RPKI and DNSSEC usage statistics.

View full abstract page.
Speakers:

  • Leslie Nobile
  • Leslie Nobile is the Senior Director of Global Registry Knowledge at the American Registry for Internet Numbers (ARIN). Reporting directly to the CEO, her main role is to research and recommend Registry improvements both within ARIN and across the Registry system, with a focus on data integrity and quality. Prior to that, Leslie served as ARIN’s Director of Registration Services for 14 and ½ years where she was responsible for the delivery and execution of ARIN’s core function of allocating and registering Internet Number Resources. Leslie has over 25 years of experience in the Internet industry, where she has held various technical management positions. Her previous work includes Internet registry operations at the DDN/DoD Network Information Center (NIC), as well as technical support of the development and expansion of the Defense Data Network (DDN), a high-speed military data network that evolved from the ARPANET. Leslie received her B.A. from the American University in Washington, D.C.
pdfNobile_Post IPv4 Depletion(PDF)
youtubePost IPv4 Depletion Trends
4:00pm - 4:30pmImperial Foyer (B2 Level)Break
4:30pm - 5:00pm

Imperial Ballroom (B2 Level)

Experiences with network automation at Dyn

At NANOG 63 I talked about Kipper, our network automation project at Dyn, and how it aims to align our network configuration lifecycle with the existing continuous integration model used for servers. Since then we have significantly expanded its coverage, added new features and incorporated other teams in our workflow. In this presentation I will describe the current setup and then talk about our challenges, successes and some of the lessons we have learned along the way.

View full abstract page.
Speakers:

  • Carlos Vicente, Dyn Inc.
  • Carlos Vicente is a Principal Network Engineer at Dyn, where he contributes to Dyn's next-generation infrastructure. His interests include network design, automation and management. Prior to Dyn, he worked for ISC where he helped maintain and grow the worldwide DNS F-Root network. He also worked with the University of Oregon and the Network Startup Resource Center (NSRC) building networks and training engineers in emerging regions. Carlos is the author of the open source Network Documentation Tool (Netdot). He is originally from the Dominican Republic and has an M.S. degree in Telematics from the Politechnic University of Catalonia (Spain).
youtubeExperiences with network automation at Dyn
pdfVicente_Experiences with network(PDF)
5:00pm - 5:30pm

Imperial Ballroom (B2 Level)

Closing Session

Meeting wrap-up, final thank yous, next meeting announcements.

View full abstract page.
Speakers:

  • Betty Burke, NANOG
  • Currently serving as the NANOG Executive Director, responsible for all aspects of NANOG, reporting to the Board of Directors. Previous 37 years of experience serving in technology, business, and management within the Michigan Information Technology Services, University of Michigan, and Merit Network. Proven leadership and experience in development of strategic and operational plans, creation and implementation of marketing campaign for conference center and high tech facilities including a data center, conference and office building, library and campus fiber assets. Proven operational success through project management, along with leadership through community and team building.
youtubeClosing Session
pdfClosing Session(PDF)
6:30pm - 10:30pmOffsite - Howl at the MoonSocial
Additional information
Sponsors:

 

^ Back to Top