CHI-NOG 06 Agenda
We are very excited to announce our agenda for CHI-NOG 06. This year we had an overwhelming response to our call for presentations. Selecting 13 presentations wasn’t easy with so many great applications. Thank you to everyone that submitted their application. The selected presentations cover a wide range of interesting topics from network security, advance MPLS/BGP, peering/interconnection, automation, datacenter fabric and others. We have many distinguished speakers traveling from all over the country to present. Please see the full agenda, information on our speakers and registration information. Regular registration ends in two weeks, don’t wait and register now!
1. CHI-NOG Welcome and Introduction
Opening remarks and introduction to the conference.
2. BGP Security: An Overview
Securing the global Internet means securing BGP, but what does that entail, and what are the options in this space? This 30 minute presentation will provide an overview of the problem space and some thoughts on solutions, as well as pointers to further reading.
Russ White has more than twenty years’ experience in designing, deploying, breaking, and troubleshooting large scale networks. Across that time, he has co-authored more than forty software patents, has spoken at venues throughout the world, has participated in the development of several internet standards, has helped develop the CCDE and the CCAr, and has worked in Internet governance with the ISOC. Russ is currently a member of the Artchitecture Team at LinkedIn, where he works on next generation data center designs, complexity, security, and privacy. His most recent books are The Art of Network Architecture and Navigating Network Complexity.MSIT Capella University, MACM Shepherds Theological Seminary, PhD in progress from Southeastern Theological Seminary
CCIE #2635, CCDE 2007:001, CCAr
3. IPv6: Passing on Lessons Learned from My Journey
IPv6 and I met back in the early 2000s. At the time it seemed to me nothing more than IPv4 with 128 bits and some cool hex. That all changed the day that I read that IPv6 had no broadcast. That was the day I truly started really looking at IPv6. That was also the day that I started truly learning IPv6. Ever wonder things like: if there is no broadcast, how do MAC addresses get resolved? What is this weird link-local thing? Why are there so many 3s in the sniffer trace? What is solicited-node multicast? In this session I will share my journey of the questions I had and what I found the answers to be.
Denise “Fish” Fishburne, CCDE No.20090014, CCIE No.2639 (R&S,SNA), is an engineer and team lead with the Customer Proof of Concept Lab (CPOC) in North Carolina. Fish is a geek who absolutely adores learning and passing it on. She works on many technologies in the CPOC, but her primary technical strength seems, however, to be troubleshooting. Fish has been with Cisco since 1996, CPOC since 2001, and regular speaker at Networkers/Cisco Live since 2006.CiscoLive is a huge passion for Fish! As such, in 2009, she got even more deeply involved with CiscoLive by becoming a CiscoLive Session Group Manager. Look for Fish swimming in the bits and bytes all around you… or just go to www.NetworkingWithFish.com
4. EVPN: Or how I learned to stop worrying and love the BGP
As more and more enterprises begin to develop multiple datacenter deployments for their enterprises, new technologies have come along to solve many common problems with basic network connectivity between datacenters. This presentation describes Ethernet VPN, a new and open standard to forward Layer-2 information between Layer-3 segments. This presentation will describe and demonstrate Ethernet VPN deployments via MPLS extensions as well as integrating with VXLAN deployments for virtualized infrastructures.
|Tom Dwyer and Clay Haynes
Tom Dwyer is a Principal Engineer and Data Center Practice Lead at Nexum Inc., a VAR, MSP, and Training Services provider based out of Chicago. Tom has over 20 years of experience focused on networking, security and datacenter technologies. Tom is certified by Juniper as a JNCIE-ENT.
Clay Haynes is a Senior Network Engineer at Nexum, Inc. He has 10+ years of experience in server, networking, and security environments. Clay has earned the prestigious JNCIE-ENT and JNCIE-SEC certifications, and has been a big proponent in datacenter interconnect technology.
5. InterTubes: A Study of the US Long-Haul Fiber-Optic Infrastructure
The complexity and enormous costs of installing new long-haul fiber-optic infrastructure has led to a significant count of infrastructure sharing in previously installed conduits. In this paper, we study the characteristics and implications of infrastructure sharing by analyzing the long-haul fiber-optic network in the US. We start by using fiber maps provided by tier-1 ISPs and major cable providers to construct a map of the long-haul US fiber-optic infrastructure. We also rely on previously underutilized data sources in the form of public records from federal, state, and municipal agencies to improve the fidelity of our map. We quantify the resulting map’s connectivity characteristics and confirm a clear correspondence between long-haul fiber-optic, roadway, and railway infrastructures. Next, we examine the prevalence of high-risk links by mapping end-to-end paths resulting from large-scale traceroute campaigns onto our fiber-optic infrastructure map. We show how both risk and latency (i.e., propagation delay) can be reduced by deploying new links along previously unused transportation corridors and rights-of-way. In particular, focusing on a subset of high-risk links is sufficient to improve the overall robustness of the network to failures. Finally, we discuss the implications of our findings on issues related to performance, net neutrality, and policy decision-making.
Ram Durairajan is a graduate student in the Department of Computer Sciences at the University of Wisconsin-Madison, where he received the M.S. degree in 2014, and is currently pursuing the Ph.D. degree. Before joining UW-Madison, R earned his B.Tech. in Information Technology from the College of Engineering, Guindy (CEG) in 2010. R is currently a research assistant and member of Wisconsin Advanced Internet Laboratory (WAIL) and Wisconsin Institute on Software-defined Datacenters Of Madison (WISDOM) at the University of Wisconsin-Madison. R’s research vision is to create a “robust Internet” by understanding the Internet’s topology and outage risks through principled measurements. To that end, in his graduate work, R is developing freworks for (i) measuring and analyzing the topological structure of the Internet, (ii) measuring and understanding the outages and risks, and (iii) proposing easy-to-deploy robustness suggestions to mitigate network outages.
6. VXLAN Deployment in IX Fabrics
Recently, very large Internet Exchange (IX) fabrics are undergoing transitions from VLAN-based architecture to VXLAN-based architecture, primarily because of inherent limitations in VLAN scalability, demand for loop free topology, ECMP or dynamic re-routing capability on failures. While it makes sense to change from VLAN to VXLAN, challenges are seen in rolling out this migration with minimal impact to existing customers in the network. In this session we will discuss some of the challenges we have encountered and how we solved the migration with minimal disruption to existing Customer deployment.
Hemanth is a Senior Manager, Network Operations for Equinix and has about 15 years of experience in Networking Industry. Currently, he is responsible for deployment, rollout and support of Network Services offered in Equinix Data Centers for America Region. Prior to Equinix, he worked in various roles at Cisco Systems in its engineering divisions working on various routers & switches running IOS-XR & NexusOS software. He was deeply involved in the design, validation and certification of various Customer Deployments specifically in the Service Provider Market Segment. He holds a Masters in Computer Science from Utah State University and a MBA from Santa Clara University.
7. Regional IXP Introductions and OPEN-IX Overview
8. Source Routing Re-Imagined
Operators have always been interested in source routing due to its determinism and ability to engineer traffic. However, traditional source routing using IP header options was never widely deployed due to security concerns. Recent buzz around SPRING (a.k.a. Segment Routing) has re-invigorated interest in source routing technologies, but for many operators moving to SPRING represents a significant change in their operating practices. Many of them are looking at more incremental approaches where they apply new source-routing concepts brought by SPRING, but implemented with current technologies with minor augmentations.In this talk we will review the new concepts SPRING brings to network design, and will then focus on using existing protocols for achieving similar benefits. We will discuss:
Nick has been in the networking industry for over 20 years, with the last 11 at Juniper Networks, where he has been working with some of largest service providers on their scaling challenges. He is currently architect for the Cloud vertical in Juniper, and is fortunate to work with some of the most innovative customers and focuses in new areas like network programmability, platform disaggregation, and SDN.
9. Segment Routing – Traffic Engineering
In this talk, we would look at Segment Routing traffic engineering primarily focused around inter-area/multi-domain traffic engineering. We will look at how certain approaches with Segment Routing can help in solving the challenges associated with multi-domain traffic engineering in a simple and scalable manner. We will look into various components associated with multi-domain traffic engineering and approaches to solve multi-domain traffic engineering.
• On Demand Next-Hop
• BGP SRTE Dynamics
• PCE HA
Segment Routing (SR) works by encoding a path across a network as an ordered list of segments, which may be links, multi-hop tunnels between nodes, and more. SR uses today’s dataplane technologies without any modification, supports MPLS, IPv4 and IPv6, and requires only very modest changes to existing routing protocols. SR is also fully documented in IETF drafts with both multi-vendor and multi-operator contribution, thereby increasing the likelihood of interoperable implementations. Segment Routing allows operators to program new service topologies without the traditional concerns around network state explosion. Using SDN procedures, the head end can program a ordered list of segment identifiers (MPLS labels, IPv6 routing headers) that enable explicit source routing. This can allow for service level differentiation, potentially providing new enhanced service offering opportunities for operators. SR can be introduced slowly into a network without any flag day events, thereby minimizing disruption.
Diptanshu Singh (3xCCIE,CCDE) is a Solutions Architect with Cisco Systems mostly focused on service providers and data center. He is a network enthusiast passionate about network technologies so not only is it his profession, but something of a hobby as well.
10. DDoS Threat Landscape
Since the first denial of service (DoS) was launched in 1974, distributed denial of service (DDoS) and other DoS attacks have remained among the most persistent and damaging cyber-attacks. These attacks create complex and dynamic challenges for anyone responsible for cyber security. In this presentation, Ron will cover a brief overview of common attacks, major attack types and tools, as well as actionable tools and tips for attack detection and mitigation.
Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cyber-security service providers around the world.
11. Network Automation, A Practical Approach
Discussion regarding best practices for network automation and how to implement them sanely, focusing on the Unix philosophy. Many examples provided, with ample time for questions throughout the session.
Matt Griswold is currently CTO for United IX, an Internet exchange in Chicago. He has a broad background including development, networking and system administration and is passionate about peering and Internet. He is passionate about peering and Internet communities and has volunteered for organizations including Euro-IX, NANOG, Open-IX and PeeringDB.
12. Modern Tools for Visualizing Network Traffic
This talk will cover how to build data driven, interactive network traffic maps and time series charts of network traffic. It will start with a very brief introduction to our overall data analysis and visualization approach and then quickly move into demonstrating the capabilities of the libraries we have developed and showing how to use them with your own data. This code is used extensively in the publically visible ESnet portal at https://my.es.net/. The libraries are open souce and the documentation can be found at http://software.es.net/react-network-diagrams/ and http://software.es.net/react-timeseries-charts/. There are links to the GitHub repos in the documentation.
|Jon M. Dugan
Jon is a software developer and a former network engineer at ESnet, the US Department of Energy high performance science network. His professional interests include building tools to help network engineers, network monitoring and visualization, network automation and high performance networking. He currently leads a small software development team at ESnet.After graduating from the University of Illinois (UIUC), he spent the early part of his career as a network engineer at the National Center for Supercomputing Applications (NCSA). He was very active in the joint IEEE/ACM Supercomputing conference series. Dugan is based in Chicago, Illinois. When not working he enjoys cooking, woodworking and tinkering with electronics.
13. NetFlow, Flow-Like Data and Their Many Uses
Most operators know that flow (NetFlow, IPFIX, and sFlow) data can be collected from routers and switches, and can be used for network cost and planning analysis, attack detection, and peering analysis. But bulk flow data just shows the traffic to-and-from. ‘Augmented’ flow from load balancers, servers, and sensors listening on taps and span ports lets you answer new questions. In this talk, we’ll briefly review flow, ‘classic’ flow analytics and its use cases. We’ll also cover less common sources of flow like OSS sensor software and configs, load balancers, IDS sensors, server-side monitoring software, and nginx logs. Finally, we’ll discuss real-world use cases supported by ‘augmented flow’.
Avi has decades of experience as a leading technologist and executive in networking. He was with Akamai for over a decade, as VP Network Infrastructure and then Chief Network Scientist. Prior to that, Avi started Philadelphia’s first ISP (netaxs) in 1992, later running the network at AboveNet and serving as CTO for ServerCentral.
14. The Real Metric in Evaluating CDN Performance
When researching web performance, it’s easy to be convinced that response time or time-to-first-byte (TTFB) is the metric that you need to optimize for. Those same articles and so called ‘experts’ will also tell you it’s extremely important to enable browser side caching, so that your clients don’t have to make a 304 request back to the CDN. Measuring ‘response time’ or TTFB, is simply measuring the performance of 304 responses (headers without content). These are the very requests you just eliminated with client-side browser caching! So, if you’re not re-requesting content from the CDN, you want that first request (200 response) to complete as fast as possible. That’s Time-To-Last Byte (TTLB) – That’s throughput!Learning Outcomes:
-Learn why TTLB/throughput is more important than just TTFB.
-Understand how to measure TTLB.
-Optimizing TTLB using Anycast.
-Learn which network monitoring companies use RUM to evaluate CDN file TTLB/throughput performance
Matt Levine has been a entrepreneur, leader and innovator for more than 15 years, and is the founder and CTO of CacheFly. Having pioneered the first TCP anycast CDN, Levine has still continues to evangelize the technology, now implemented by some of the largest internet companies in the world. Levine has presented at various conferences, sharing best practices in accelerating content delivery to effectively serve the needs of organizations that use it as a key business driver. Matt’s most notable speaking engagements have come in the form of presentations and panel discussions at NANOG, Hosting Transformation Summit, Velocity, Global Peering Forum and New Media Expo.
Anyone that’s interested in helping out CHI-NOG, we would like have our conference grow and have more people attend but we need your help spreading the word about us. Word of mouth is the best way. Also if you use twitter, please follow us @_chinog_ and let others know about our upcoming event. If twitter is not your thing, then just pass along the link to our main page http://chinog.org.
We’re looking forward seeing everyone May 12th at 8:00 AM, more details can be found at our event’s page http://chinog.org/meetings/chi-nog-06/ and registration at http://chinog.org/meetings/chi-nog-06/registration/.
Please make sure to checkout our sponsors. Without their help we wouldn’t be able to keep the ticket prices low and host the conference. If you are interested in sponsoring, we still have few slots open. Please contact us at email@example.com to find out how you can help out.