We are excited to announce the CHI-NOG 09 agenda. With the conference coming up next month we have a great agenda with spectacular speakers coming from all over the world to Chicago bringing our community together. This year’s program focuses mainly on network automation, but also has very unique topics on AI with network operations, SDN architectures, public cloud performance, network monitoring, open networking, latest updates in IGPs.
Link-State Protocol Support for Multihop Entanglement
by Kireeti Kompella (Juniper)
Machine Learning Based Network Operations: Challenges & Deployment Learnings
by Rahul Aggarwal (Augtera Networks)
Disaggregation and Business Value
by Russ White (Juniper)
Introduction to Time Series Database and Grafana for Network Engineers
by Damien Garros (Roblox)
Powering Your Automation: A Single Source of Truth
by Tim Schreyack (Virtustream)
Using YANG Models and Telemetry for Closed-Loop Applications
by Craig Hill (Cisco)
Automating a Multi-Vendor Network
by Teren Sapp (Arista)
SDWAN Architecture Concepts
by Ali Shaikh (Cisco)
IGPs – The New Hotness
by Steve Ulrich (Arista)
Neglecting Automated Testing Or: How To Take Down Your Network In Three Easy Steps
by Anthony Miloslavsky (Cumulus)
Comparing the Network Performance of AWS, Azure and GCP
by Yefim Pipko (ThousandEyes)
Getting to Know Model-Driven Management With the YANG Catalog
by Joe Clarke (Cisco)
Chemical Kinetics in Computer Networks
by Rachel Traylor (Marquette University)
It’s 2019 and You are Still Getting Hacked
by Otha Mabry (Cisco)
Steelcase – Deployment of Open Networking & SDN in a Large Enterprise
by Scott Schafer (Steelcase)
Seamless BFD (S-BFD) – Scalable Path Failure Detection Mechanism
by Nagendra Kumar Nainar (Cisco)
How to get started at IETF
Please see the detailed agenda below, but don’t forget to register soon as regular ticket sale end this month.
Link-State Protocol Support for Multihop Entanglement by Kireeti Kompella (Juniper)
This talk gives a very brief description of Quantum Entanglement, how it’s produced, and why it’s interesting. Then the operations of entanglement distillation and entanglement swap are discussed. These operations are used to create a long distance entanglement, given the ability to create several shorter range entanglements. Finally, the role of ISIS/OSPF in enabling and enhancing this process will be described.
Machine Learning Based Network Operations: Challenges & Deployment Learnings by Rahul Aggarwal (Augtera Networks)
Operational complexity in networks continues to increase particularly with growing adoption of SDN and white box switching platforms. As a result there is increasing need for providing machine based operational intelligence in networks to help humans keep up with the complexity. However applying machine learning to networks has significant technology challenges. We will go over these challenges and the fundamental technology innovation that is required across multiple domains to overcome these challenges. We will also present the learnings and results from deploying Machine Learning based software in large production networks for automating operational intent
Disaggregation and Business Value by Russ White (Juniper)
When network operators hear the word “disaggregation,” they think of two things: white box and less expensive. This session will discuss the “other” reasons for driving towards disaggregated solutions, including business agility, managing complexity, and stability.
Introduction to Time Serie Database and Grafana for Network Engineer by Damien Garros (Roblox)
Telemetry / Monitoring, also known as Observability, has been a hot topic in the software industry for few years. This rise happened at the same time as the development of all the new way of building and deploying applications & systems with Continuous integration, continuous development. With so many moving pieces, the mindset around telemetry shifted from I know what I want to monitor to I don’t know yet what might be important to understand the next outage. It seems obvious but previously the tools available to monitor applications and system had some limitations that would limit how much we can explore the data after the fact but most importantly how much we could analyze, correlate or compare different datasets. This new requirement drove a new set of tools that very changed the paradigm around data and are making it possible to dissociate the collecting of data and the analysis/ visualization of these data. These new tools are slowing getting adapted to by the network industry, the goal of this talk is to help Network Engineer to get started with modern Time serie database (influxdb, prometheus) and associated visualization tools like Grafana.
Powering Your Automation: A Single Source of Truth by Tim Schreyack (Virtustream)
Introduction, how we define automation and automation vs orchestration. Following Automation overview: Ansible, Salt, Puppet, template based configs and git and peer review process. Single source of truth with templates used in automation use variables, how to we populate and maintain those variable inputs and single source of truth DB. DB Data Structure with physical and virtual devices, links, IPAM, logical and physical resource pools, rich connections between all items in the DB allowing for easy data retrieval. Accessing data from the DB with small code modules to use in template along with an example python code for Ansible. Lastly this presentation will show a small demo using Ansible and .j1 templates to create and deploy device configuration for two different switches.
Using YANG Models and Telemetry for Closed-Loop Applications by Craig Hill (Cisco)
This discussion will focus around automation and programmability solutions that leverage closed-loop techniques for applications (security and others) requiring near real-time reactions to changes and/or anomalies in the network. The solution covered in this talk will target a suite of open source programmability (YANG Development Kit – YDK) using YANG models and streaming telemetry solutions (Kafka, Pipeline) beyond legacy SNMP like functions. This session will also provide a demonstration of the solutions, protocols, and methods discussed.
Automating a Multi-Vendor Network by Teren Sapp (Arista)
Building a multi-vendor network has many advantages however one of the primary drawbacks is how does an organization manages a multi-vendor network in an effective manner? There are plenty of tools out there however Napalm and Nornir were created with network operators in mind to abstract the vendor command line interface or API and give operators a single point to issue configuration and gather statistics from network devices. In this talk we’ll look through the inner workings of Napalm and Nornir and show how these tools can simplify and automate tasks in a multi-vendor network.
SDWAN Architecture Concepts by Ali Shaikh (Cisco)
A discussion on separation of control and data planes principles in SDN with an emphasis on the need for greater cryptographic strength, scale and the ability to build arbitrary networks. This will include a conversation on how implementations for SDN for WAN networks need to employ a true separation of the control plane and data plane that allows for SDN controllers to be responsible for routing policies and fabric creation, while the edge endpoints become dataplane enforcement points. This will be expanded on by exploring the practical methods to implement strong security and cryptographic methods, PKI, AES-256 encryption to build SDWAN fabrics using the highest grade encryption and how to build large scale IPSec fabrics, an SDN control plane is required. Finally the session will explore practical considerations when building large BGP style networks over the WAN and maintaining VRF style segmentation without inheriting the complexities of classical point router implementations and leveraging SDN methods to build centralized routing frameworks.
IGPs – The New Hotness by Steve Ulrich (Arista)
There’s been a resurgence in activity in the IGP domain, mostly by folks looking to do interesting things in the data center and new service provider edge architectures. Lately folks have been (ab)using BGP in the data center to address link-state flooding scale (in dense graphs) and to pick up policy controls. This has triggered new work in the IETF and other standards bodies to enhance link-state routing protocols to address some of these concerns in DC environments and in various service provider network architectures. This talk will discuss some of the approaches being taken, the objectives of some of these approaches and a discussion of relative merits of these developments.
Neglecting Automated Testing Or: How To Take Down Your Network In Three Easy Steps by Anthony Miloslavsky (Cumulus)
As the idea of treating your infrastructure as code (via CI/CD) becomes more and more popular in the networking space, the testing and validation best practices that are present in traditional software development pipelines are often an afterthought or a “nice to have”. After some background on why automation principles in networking both are and aren’t different from those in software development, we’ll touch on the various types of testing that are present in software development today (unit, integration, etc) and how they can be applied to automating your network. Discussion will focus on developing reusable post-change testing with tools like Gitlab and Grafana, and will end with incorporating network simulation into your pipelines to achieve true pre and post change testing.
Comparing the Network Performance of AWS, Azure and GCP by Yefim Pipko (ThousandEyes)
Amazon Web Services, Microsoft Azure and Google Cloud all significantly invest in their backbone networks and global regional data center presence to support performance requirements. So how do these cloud networks actually behave and perform? This session will discuss the network performance and connectivity architecture findings gained from global measurements of Amazon Web Services, Microsoft Azure and Google Cloud, collected from global vantage points to cloud regions, within cloud backbones(inter-AZ and inter-region) and across clouds (multi-cloud). We’ll also share some interesting anomalies we observed in connectivity and performance stability, particularly in the Asia-Pacific region.
Getting to Know Model-Driven Management With the YANG Catalog by Joe Clarke (Cisco)
How many people think the CLI is an API? Sadly it’s been used like one for a long time. Screen-scraping has become an art form and a never-ending source of frustration. Fortunately, data model-driven management has been on the rise of late. These data models, typically created using the YANG data modeling language, enable more powerful and reliable configuration automation and richer operational insights through machine consumable structures and dynamic streaming telemetry. But how can you get from where you are with CLI and SNMP management into a data-drive management world? What are the tools that allow an operator to find the right YANG module to use or to help network engineers craft their own YANG-based service models? The YANG Catalog is an open source set of tools that answer these questions by providing YANG module search capabilities, metadata exploration, and the ability to generate sample code (to name a few). This talk introduces the audience to the YANG Catalog to give operators and engineers another tool that will help them better automate and control their network.
Chemical Kinetics in Computer Networks by Rachel Traylor (Marquette University)
In an effort to bring academic research to the private sector, this talk will give a tutorial and discussion on recent research into a natural form of flow control that is based on chemical kinetics. We will discuss the notion of an artificial packet chemistry and its use in scheduling and congestion control, current implementations and give some future directions and possibilities.
It’s 2019 and You are Still Getting Hacked by Otha Mabry (Cisco)
Discuss Emerging Trends and publicly accessible tools that are used to recon a network during the first phase of hacking.
Steelcase – Deployment of Open Networking & SDN in a Large Enterprise by Scott Schafer (Steelcase)
Open networking and white box switching has been the domain of hyperscalers for the last number of years. There are however enterprises who have embarked upon the deployment of open networking at different levels of scale. In this talk we will cover the deployment of multiple data center leaf/spine networks, and a campus aggregation network using white box switches with an open source-based OS and a controllerless SDN fabric. This talk will cover the reasons for our decision, the challenges we had during deployment and the benefits we have been able to achieve with this successful deployment in a large enterprise. We will also cover an IoT use case that took advantage of network overlays.
Seamless BFD (S-BFD) – Scalable Path Failure Detection Mechanism by Nagendra Kumar Nainar (Cisco)
Network resiliency and availability highly depends on the ability of the network to detect any failure rapidly. While current deployments leverages BFD for this purpose, it comes with negotiation and scale challenges that makes it hard to position as the OAM protocol for the recent SDN and Cloud environment. This session describes Seamless BFD (S-BFD), a new and simplified mechanism for deploying BFD that is SDN ready and more scalable comparing to traditional BFD. This session describes the architecture, deployment use case and evaluation that compares the performance of S-BFD with the traditional BFD.
How to get started at IETF
Quick panel discussion how to get involved working with IETF from panel members who authored or participated in RFC writing process.