🗓️ Event Agenda

Start End Presentation Category Speaker
8:00 AM9:00 AMRegistration / Breakfast
9:00 AM 9:15 AM
Opening Remarks

Welcome and opening remarks to the conference.

Tom Kacprzynski
(CHI-NOG)

Tom is the co-founder and Program Committee Chair of CHI-NOG, a prominent regional conference dedicated to advancing network engineering and operations. With over 20 years of experience in the networking industry, Tom currently works as the Director of Network Engineering at WOW! Internet, Cable & Phone, where he leads the core network design and implementation teams. Throughout his career, Tom has held senior roles at leading technology companies including Rackspace, Ericsson, Oracle, and Meta, contributing to large-scale network infrastructure projects and innovative engineering solutions. Tom passed his Cisco Certified Internetwork Expert (CCIE #36159) certification in 2013. Beyond his day-to-day work, he is an active member of the broader networking community. He has served on the program committees of industry organizations such as NANOG and Open-IX, helping to shape the direction of technical discussions and knowledge sharing in the field.

9:15 AM 9:45 AM
How networking changed with pre-training, post-training and inference

High-performance cluster networking for GPU systems has been traditionally associated with large-scale pre-training. As time passed, post-training and distributed inference applications brought their unique requirements as well. This talk surveys the training/inference parallelism-induced traffic patterns from training/inference of LLMs and the impact on evolution of scale-out and scale-up network.

AI Networking
Petr Lapukhov
(NVIDIA)

Petr started his career by teaching classes on networking technologies to aspiring CCIE students and later moved on working on infrastructure problems at Microsoft and Facebook (now Meta). Last five years he has been involved in ML/AI training and inference systems, and presently works at NVIDIA in a group with a focus on GPU architecture.

9:45 AM 10:15 AM
Networking at the Speed of Light – A peek at networking inside a high frequency trading firm

The high frequency trading industry is a highly competitive field that relies on secrecy to maintain relative advantages. These companies also have unique technology requirements that make it difficult to recruit capable engineers who do not already work within the industry. During this presentation I’ll describe three unique aspects of trading, and how they impact network design and operation: 1) The need for speed – Why it is important and how to optimize it using wired and wireless connections 2) Distributing market data – What is it, where is it, and how to transport it efficiently using IP Multicast 3) Timestamping – Why accurately timestamped packet captures are the lifeblood of the industry

Low Latency Networks
Jeremy Filliben
(Jump Trading)

Jeremy has been involved in computer networking since 1997. He achieved the CCIE certification in 1998 (#3851), and the CCDE certification in 2009 (#20090003). He developed exam materials for two large networking vendors. Since 2021 he has worked for Jump Trading, a high-frequency trading firm based here in Chicago.

10:15 AM10:45 AMBreak 1
10:45 AM 11:15 AM
Feasibility of State Space Models for Network Traffic Generation

Many problems in computer networking rely on parsing collections of network traces (e.g., traffic prioritization, intrusion detection). Unfortunately, the availability and utility of these collections is limited due to privacy concerns, data staleness, and low representativeness. While methods for generating data to augment collections exist, they often fall short in replicating the quality of real-world traffic In this paper, we i) survey the evolution of traffic simulators and generators and ii) propose the use of state space models, specifically Mamba, for packet-level, synthetic network trace generation by modeling it as an unsupervised sequence generation problem. Preliminary evaluation shows that state space models can generate synthetic network traffic with higher statistical similarity to real traffic than the state-of-the-art. Our approach thus has the potential to reliably generate realistic and informative synthetic network traces for downstream computer networking tasks.

Network Modeling
Nick Feamster
(University of Chicago)

Nick Feamster is Neubauer Professor of Computer Science and the Director of Research at the Data Science Institute at the University of Chicago. Previously, he was a full professor in the Computer Science Department at Princeton University, where he directed the Center for Information Technology Policy (CITP); prior to Princeton, he was a full professor in the School of Computer Science at Georgia Tech.

His research focuses on many aspects of computer networking and networked systems, with a focus on network operations, network security, and censorship-resistant communication systems. He received his Ph.D. in Computer science from MIT in 2005, and his S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT in 2000 and 2001, respectively. He was an early-stage employee at Looksmart (acquired by AltaVista), where he wrote the company’s first web crawler; and at Damballa, where he helped design the company’s first botnet-detection algorithm.

Nick is an ACM Fellow. He received the Presidential Early Career Award for Scientists and Engineers (PECASE) for his contributions to cybersecurity, notably spam filtering. His other honors include the Technology Review 35 “Top Young Innovators Under 35” award, the ACM SIGCOMM Rising Star Award, a Sloan Research Fellowship, the NSF CAREER award, the IBM Faculty Fellowship, the IRTF Applied Networking Research Prize, and award papers at ACM SIGCOMM (network-level behavior of spammers), the SIGCOMM Internet Measurement Conference (measuring Web performance bottlenecks), and award papers at USENIX Security (circumventing web censorship using Infranet, web cookie analysis) and USENIX Networked Systems Design and Implementation (fault detection in router configuration, software-defined networking). His seminal work on the Routing Control Platform won the USENIX Test of Time Award for its influence on Software Defined Networking.

11:15 AM 11:45 AM
What a Distributed Network Sees: Internet Observations from All Over

Internet activity, connectivity, and performance can vary depending on from where you make your observations. A single network can make some inferences about what it sees, but only a widely distributed network with vantage points around the globe can distinguish isolated events from global phenomena. We demonstrate the insight of a distributed network of over 500 servers, with IP addresses originating from more than 150 ASNs, and physically located in 70 different countries. We first show how this network helped solve a source address spoofing mystery and confirm the true source through triangulation. Then, we illustrate how popular port scanning systems appear in the global address space. Lastly, we show how this distributed network is helping to facilitate reachability experiments for academic research projects.

Network Observability
John Kristoff
(Dataplane.org/UIC)

John is a PhD candidate in Computer Science at the University of Illinois Chicago studying under the tutelage of Chris Kanich. He is a principal analyst at NETSCOUT on the ATLAS Security Engineering and Response Team (ASERT). He currently serves as a research fellow at ICANN, and operates Dataplane.org.

11:45 AM 12:15 AM
Building Trustworthy Network Automation, From Principles to Practice

abstract

Network Automation
Damien Garros
(Opsmill)

bio

12:15 PM1:45 PMLunch (Onsite)
Afternoon Track A
1:45 PM 2:15 PM
SRv6 Deployment Strategies

The IETF has an Operations and Management (Ops) Area with many Working Groups. The newest WG is the SRv6 Ops WG and one of the topics is how to transition an existing network to one that supports SRv6. It is one of the first questions network operators will ask about SRv6. There are a couple of IETF drafts now addressing this topic. Mike McBride will provide an overview of this work in the IETF and provide a summary of how to upgrade an existing network to a SRv6 network. Should they run ships in the night, utilize various tunneling techniques or other deployment solution? If they are currently running an IP/MPLS network how should they transition to SRv6? This presentation summarizes various deployment alternatives to help provide guidance to those wanting to upgrade their network to SRv6.

Routing
Mike McBride
(Futurewei)

Mike has served as an IETF Working Chair for over 20 years. He’s an IP routing research expert developing the architectures of next generation networks. He leads SRv6, security, multicast and distributed ledger projects as Sr. Director of Innovation and Technology Strategy. He’s worked for Apple, Cisco, Huawei, Ericsson and Futurewei in a variety of capacities over his career. He has spoken at various events around the work including ChiNog and NANOG here in the US.

2:15 PM 2:45 PM
Comfortable Complexity of Overlays

This presentation examines the intricate landscape of overlay technologies, tracing their historical development, dissecting current deployments, and prognosticating future directions. We will explore the evolution from basic VLANs to advanced solutions like VXLAN, GENEVE, and SRv6, analyzing the architectural nuances, protocol intricacies, and operational considerations that define each. The critical roles of microsegmentation and tunneling in overlay functionality will be examined, along with the trade-offs between hardware and software implementations. A deep dive into the driving forces behind technological trends, such as virtualization, will highlight the paradigm shifts in data center architecture and the resultant demands on network overlays. The intricacies of L2 and L3 VPN evolution, including EVPN standardization, will be reviewed, alongside real-world deployment scenarios illustrating multitenancy, L2 stretching, and enterprise Zero Trust architectures. Finally, the presentation will address the ongoing trends shaping the field, including the convergence of L2 and L3 services, cost optimization, and the imperative of multivendor interoperability.

Datacenter Networking
Sergey Kolobov
(Arista)

Leading member of the systems engineering team, developing technical solutions with the focus on AI/ML, Hyperscale network infrastructure in DC, WAN, Campus, and Media and Entertainment networks. Co-author on IETF Internet-Draft that proposes a method for filtering BUM traffic in EVPN Ethernet Tree (E-Tree) networks that use VXLAN encapsulation: https://datatracker.ietf.org/doc/draft-bamberger-bess-imet-filter-evpn-etree-vxlan/ Participated in proposing changes to draft-sajassi-bess-rfc8317bis that proposes updates to RFC 8317, which defines a framework for supporting E-Tree service over a MPLS network. The proposed updates would allow E-Tree to be supported over EVPN networks. Top contributor with original articles to eos.arista.com, speaker on podcasts LinkMeUp#74 “Securing BGP” and LinkMeUp#93 “Building hyperscale networks.

2:45 PM 3:15 AM
Fighting Route Leaks at Cloudflare

Cloudflare runs a vast global network with complicated peering relationships that present a unique complexity for detecting route leaks. AS-to-AS relationships alone are insufficient to distinguish a legitimate BGP prefix announcement from a leaked announcement. Instead, each prefix needs to be precisely evaluated at the prefix level for path validity.

In this presentation, we will show you how we built prefix-level route leak detection at Cloudflare with a highly scalable pipeline. We will share our methods that other networks might find useful in capturing their own route leaks, especially to those who operate BGP Anycast networks. In addition to this, we will discuss our progress toward BGP ASPA (Autonomous System Provider Authorization) compliance, Cloudflare’s strategy to leverage RFC9234 Only-to-Customer (OTC) attribute, and how they fit alongside our prefix-level BGP route leak detection as preventative measures.

Routing Security
Bryton Herdes, Mingwei Zhang
(Cloudflare)

Bryton Herdes is a Principal Network Engineer at Cloudflare, working on the edge and backbone global network. Prior to Cloudflare, he worked primarily in the Internet Service Provider space. Bryton spends his time working on network design, implementation, and firefighting at Cloudflare.

Mingwei Zhang is a Senior Systems Engineer at Cloudflare. He is also the creator of BGPKIT, an open-source software suite for BGP data analysis. Mingwei spends his time working on Cloudflare Radar’s wide array of BGP and traffic related visibility features.

3:15 PM3:45 PMBreak 2a
3:45 PM 4:15 PM
The Routing Security Crystal Ball: RPKI Yesterday, Today and Tomorrow

Join us for a deep dive into the evolution of Routing Security and the key factors that led to the development of Resource Public Key Infrastructure (RPKI). We’ll explore the timeline of its initial deployments and the pivotal moments that brought RPKI to the forefront of the global Internet community. Recent U.S. government initiatives have prioritized the creation of RPKI Route Origin Authorizations (ROAs) to bolster network security. Finally, we’ll look ahead to the future of RPKI, examining upcoming developments and long-term plans being discussed within standards bodies and the broader Internet community.

Routing Security
Jon Worley
(ARIN)

Jon Worley is the Senior Technology Architect for ARIN and has been a member of the Registration Services team since 2004. He has experience with all ARIN policies and procedures for requesting, managing, and transferring IP addresses and AS numbers, including technical services such as ARIN’s RESTful API. Jon has spoken about these topics as well as IPv4 depletion and IPv6 adoption at many ARIN events.

4:15 AM 4:45 AM
SD-WAN is Dead, Long Live SD-WAN!

Since the emergence of SD-WAN in 2014, the WAN ecosystem has undergone a major transformation. Traditionally, businesses relied on carrier-managed private WAN solutions, but today, most have transitioned or are in the process of transitioning to SD-WAN leveraging Internet-based connectivity. Improvements such as service availability, bandwidth capacity, and link quality combined with lower costs and the need for more flexible connectivity options as applications migrate from on-premises to the cloud made this a relatively obvious business choice. However, for many businesses, the transition has not been as seamless as expected.

In regions like the United States, Canada, and Europe, Internet-based WAN connectivity performs comparably to legacy private circuits, making it a viable replacement. Yet, in other parts of the world, inefficient routing presents significant challenges. For example, traffic between South American nations often routes through Florida or Houston, and traffic between African and Middle Eastern nations frequently routes through Frankfurt or London.

Even in 2025, some networks—particularly “”eyeball networks””—remain poorly peered in certain regions, making Internet-based WAN transport suboptimal and often unfit for purpose. Conversely, other networks—””content networks””—are exceptionally well-peered in these regions. The key to overcoming the challenge of Internet-based WAN transport lies in leveraging these well-peered content networks to provide transit, creating regional network bridges, and optimize WAN routing. SD-WAN, with its intelligent traffic steering and dynamic path selection, is the solution to unlocking the full potential of Internet-based WAN transport.”

SD-WAN
Dane Jackson (Cato Networks)

Dane Jackson is a seasoned technology leader with over two decades of expertise in network engineering, cyber security, and IT infrastructure. As the Director of Global Professional Services at Cato Networks, he spearheads global initiatives, driving innovation and excellence in the field of Security Access Service Edge.

Before joining Cato Networks, Dane held a key management role at Hyatt Hotels Corporation, where he managed global network operations, ensuring seamless connectivity across corporate offices and hotel properties worldwide. His tenure at West Monroe Partners saw him leading complex enterprise networking and security projects, particularly in the M&A vertical. Additionally, his experience at Purdue Research Foundation and Purdue University laid a strong foundation in network architecture and systems administration.

Along with a B.S. in Network Engineering Technology from Purdue University, Dane also holds multiple industry certifications from Cisco Systems, VMware, and Juniper along other vendors underscoring his deep technical expertise in the fields of cloud networking, cybersecurity, SD-WAN, and IT infrastructure modernization.

Afternoon Track B
1:45 PM 2:15 PM
Vendor-agnostic automation with Ansible Network Resource Modules

Network resource modules are a newer addition to Ansible, providing a (semi)-consistent interface to device fact collection and configuration section management across vendors.However, examples of how to use them agnostically are difficult to find. This talk will walk through calling network resource modules to gather facts from network devices and manage configuration with several examples while highlighting pitfalls.

Network Automation
Brandon Ewing
(IMC)

Brandon Ewing is a network automation engineer with a background in Linux systems engineering at IMC, a leading global trading firm with offices in Chicago and around the globe. An enthusiast of open-source software, he is a maintainer of the vendor-agnostic NAPALM Python library for interacting with network devices and a contributor to a number of different Python and Golang projects. Prior to wandering the halls at IMC, he worked for 17 years with a variety of different internet hosting providers, designing and deploying datacenters and MPLS connectivity. His time at IMC is spent working on low-latency and datacenter networks while improving the automation tools used to interact with both environments.

2:15 PM 2:45 PM
Network Automation Pipelines – From Near-Zero to Hero in 30 Minutes

In this session, we’ll walk through the creation of a modern, fully integrated network automation pipeline that starts with a service request in Jira Service Management and ends with a verified configuration pushed to a Palo Alto firewall — all in under 30 minutes. Using GitHub Actions as the automation engine, we’ll demonstrate how to orchestrate workflows that interact with Ansible playbooks, Nautobot for source of truth and intent validation, and Palo Alto firewalls for real-world enforcement. We’ll also show how to automatically update the Jira ticket at each step for traceability and status awareness. Attendees will see a live demo of infrastructure-as-code principles applied to network operations, gaining practical insights into how to streamline request fulfillment, improve change reliability, and build a scalable automation framework that aligns with DevOps practices. Whether you’re just starting your automation journey or looking to enhance an existing toolchain, this talk will showcase how to deliver real business outcomes through automated, compliant, and repeatable pipelines.

Network Automation
Jon Howe
(Myriad360)

Jon Howe is a dynamic and engaging technical leader with over 20 years of experience helping organizations modernize infrastructure through automation, orchestration, and cloud-first strategies. As a Principal Solutions Architect at Myriad360, he works closely with enterprises to streamline operations, reduce friction, and enable DevOps-driven delivery models.

With deep expertise in network automation, hybrid cloud design, and pipeline-based provisioning, Jon specializes in building scalable, self-service frameworks that bridge the gap between legacy infrastructure and modern delivery models. His work spans Fortune 500 financial institutions, large private firms, healthcare, and software companies—giving him a unique ability to connect business strategy with hands-on technical execution.

Jon takes a holistic approach to platform architecture, looking beyond individual components to manage the full lifecycle of the application—from request intake and infrastructure provisioning to policy enforcement, observability, and lifecycle automation. He brings together people, process, and technology to build resilient, future-ready platforms that support business agility at scale.

2:45 PM 3:15 PM
ContainerLab: Building Multi-vendor labs as code (Part 1)

These immersive, two 30 minute hands-on sessions guide participants through a structured, incremental build-out of a modern data center fabric using a Lab-as-Code approach powered by Containerlab. The session begins with deploying a transparent IP CLOS topology, then layers in VXLAN/EVPN overlay to introduce network virtualization, and concludes with the integration of streaming telemetry for real-time observability. Each lab builds seamlessly upon the previous, demonstrating how to rapidly prototype and validate architectures using open standards, freely available tools, and reproducible infrastructure definitions. Designed for engineers and architects, this session highlights the power and simplicity of using Containerlab to model, test, and monitor next-gen network designs with agility and precision. All attendees are requested to bring a laptop to follow along the labs and get most out of the sessions.

Networ Lab Tooling
Amer Fahar and Mo Zaman
(Nokia)

Amer and Mo are seasoned Network Architects at Nokia with over 40 years of combined experience. Currently, the focus of their work is enabling enterprises and cloudscale organizations in designing, building and operationalizing vendor and open source networking products and solutions.

3:15 PM3:45 PMBreak 2b
3:45 PM 4:15 PM
ContainerLab: Building Multi-vendor labs as code (Part 2)

These immersive, two 30 minute hands-on sessions guide participants through a structured, incremental build-out of a modern data center fabric using a Lab-as-Code approach powered by Containerlab. The session begins with deploying a transparent IP CLOS topology, then layers in VXLAN/EVPN overlay to introduce network virtualization, and concludes with the integration of streaming telemetry for real-time observability. Each lab builds seamlessly upon the previous, demonstrating how to rapidly prototype and validate architectures using open standards, freely available tools, and reproducible infrastructure definitions. Designed for engineers and architects, this session highlights the power and simplicity of using Containerlab to model, test, and monitor next-gen network designs with agility and precision. All attendees are requested to bring a laptop to follow along the labs and get most out of the sessions.

Networ Lab Tooling
Amer Fahar and Mo Zaman
(Nokia)

Amer and Mo are seasoned Network Architects at Nokia with over 40 years of combined experience. Currently, the focus of their work is enabling enterprises and cloudscale organizations in designing, building and operationalizing vendor and open source networking products and solutions.

4:15 PM 4:45 PM
Operation Technology Approach to NetDevOps

The purpose of this presentation is to present the concept and use cases for NetDevOps Operational Technolgy.

Section 1: Problem Statement

Section 2: NetDevOps an ethical embellishment of DevOps

Section 3: Use Cases

Section 4: Partnership/collaboration

Section 5: Onboarding/Level of effort/Learnings

Section 6: Pragmatic NetDevOps OT Roadmap

Network Automation
Phillip McGough
(Emerson)

Application Engineer in Industrial Ethernet Product Engineering at Emerson With a distinguished career spanning over three decades in operational technology, process automation, and control, Phillip McGough brings a wealth of expertise to his role at Emerson. For more than 20 years, Phillip has been a cornerstone of Emerson’s product engineering team, specializing in Industrial Ethernet products and services.

Eastman Chemical: Integral member of the Global Engineering Team Solutia: Key contributor to the Global Engineering Team and CapEx Projects PC&E: Lead Automation Engineer, driving innovation and efficiency Siemens: Application Engineer for the Simatic Product Line, enhancing automation solutions Beta Raven: Pioneered advancements in Product Technology United States Navy: Special Operations, specializing in Signal Intelligence (SigInt) Throughout his career, Phillip has excelled in various automation engineering roles at Emerson, Siemens, Eastman Chemical, and Solutia. His pragmatic approach and unique skill set have consistently delivered exceptional results. Phillip’s extensive experience encompasses:

Process Control & Automation Systems Industrial Ethernet and Fieldbus Technologies Nuclear Engineering Naval Special Operations (Signal Intelligence, Network Forensics) Industrial Ethernet Assessments, Design, and Optimization Phillip’s dedication to excellence and his innovative mindset makes him a valuable asset in the field of industrial automation, Industrial ethernet and engineering.

4:45 PM5:00 PMClosing Remark – Survey
5:00 PM5:30 PMBreak