^ Top

NANOG Meeting Presentation Abstract

Tutorial: Introduction to Shell and Perl Scripting for Network Operators
Meeting: NANOG54
Date / Time: 2012-02-05 2:00pm - 3:30pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

John Kristoff, Team Cymru

John Kristoff is a researcher with Team Cymru, an Internet security research firm. John has worked at UltraDNS/Neustar as a network architect and held network engineering positions at both Northwestern University and DePaul University. John remains affiliated with Northwestern and DePaul as a collaborator, student and instructor. John has been an active participant in a number of related trusted security communities including nsp-security, YASML, ops-trust, FIRST, REN-ISAC and DNS-OARC.
Abstract: Being able to develop or customize tools using shell or Perl scripts is a skill all network operators should possess. This tutorial will provide a survey of scripting constructs from basic to advanced using real world examples throughout. While this tutorial is too short to comprehensively cover programming and the nuances of the tools available, newcomers can expect to come away with enough knowledge to start hacking their own useful tools, or to make use of the example scripts provided as a foundation towards something even more useful in their own real networks.
Files: pdfKristoff(PDF)
wmvKristoff(WMV)
Sponsors: None.
Tutorial: IPv6 and IPv4: Twins or Distant Relatives
Meeting: NANOG54
Date / Time: 2012-02-05 2:00pm - 3:30pm
Room: Plaza
Presenters: Speakers:

Paul Ebersman, Infoblox

Paul Ebersman has been involved with NANOG to varying degrees since the late 90s and has been working with TCP/IP networks since the mid 80s. Paul currently works in the Infoblox IPv6 Center of Excellence as a technical resource, both internally and to the internet community. He first worked on the internet for the Air Force in 1984. He was employee number 10 at UUNET and helped build AlterNET and the modem network used by MSN, AOL and Earthlink. He has maintained his roots in the internet and the open source community, working for various internet infrastructure companies including ISC and Nominum before coming to Infoblox.
Abstract: You know you're going to have to implement IPv6 at some point. But you don't have all the operational experience with it you have with IPv4. What's the same? What's different? What are you going to have to change in how you build and run your network? This session will break down what operational and protocol issues are going to affect you and tell you how to make a better, more robust network.
Files: wmvIPv6 and IPv4(WMV)
pdfTutorial: IPv6 and IPv4: Twins or Distant Relatives(PDF)
Sponsors: None.
Tutorial: The Service Provider Tool Kit
Meeting: NANOG54
Date / Time: 2012-02-05 2:00pm - 3:30pm
Room: Harbor
Presenters: Speakers:
Barry Raveendran Greene.
Abstract: Top techniques, tools, and approaches that needs to be deployed before the crisis. Don’t wait for a security crisis before deploying the tools you need to protect your backbone, cloud, data center, mobile, or broadband infrastructure. There are proven tools, techniques, and approaches to security that is tuned for “Big Networks.” These tools in a “SP Security Toolkit” have proven to work in some of the biggest networks on the planet. This tutorial will review all these techniques – focusing on the how and why they need to be deployed along with usage examples. The hope is for operators attending the session to consider convincing their management that many of the tools in the toolkit need to be deployed before a crisis – to prepare the network to mitigate risk in the middle of a crisis. This session is an updated session from past SP Security and NSP-SEC Top Ten tutorials. It will be tuned to be a productive review for operators who deploy many of these techniques today while empowering new operators with the knowledge to return and make changes to their network.
Files: wmvService Provider Tool Kit(WMV)
pdfTutorial: The Service Provider Tool Kit(PDF)
Sponsors: None.
Tutorial: The Service Provider Tool Kit
Meeting: NANOG54
Date / Time: 2012-02-05 4:00pm - 5:30pm
Room: Harbor
Presenters: Speakers:
Barry Raveendran Greene.
Abstract: Top techniques, tools, and approaches that needs to be deployed before the crisis. Don’t wait for a security crisis before deploying the tools you need to protect your backbone, cloud, data center, mobile, or broadband infrastructure. There are proven tools, techniques, and approaches to security that is tuned for “Big Networks.” These tools in a “SP Security Toolkit” have proven to work in some of the biggest networks on the planet. This tutorial will review all these techniques – focusing on the how and why they need to be deployed along with usage examples. The hope is for operators attending the session to consider convincing their management that many of the tools in the toolkit need to be deployed before a crisis – to prepare the network to mitigate risk in the middle of a crisis. This session is an updated session from past SP Security and NSP-SEC Top Ten tutorials. It will be tuned to be a productive review for operators who deploy many of these techniques today while empowering new operators with the knowledge to return and make changes to their network.
Files: wmvService Provider Tool Kit(WMV)
pdfTutorial: The Service Provider Tool Kit(PDF)
Sponsors: None.
Tutorial: Intermediate Perl Scripting for Network Operators
Meeting: NANOG54
Date / Time: 2012-02-05 4:00pm - 5:30pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

John Kristoff, Team Cymru

John Kristoff is a researcher with Team Cymru, an Internet security research firm. John has worked at UltraDNS/Neustar as a network architect and held network engineering positions at both Northwestern University and DePaul University. John remains affiliated with Northwestern and DePaul as a collaborator, student and instructor. John has been an active participant in a number of related trusted security communities including nsp-security, YASML, ops-trust, FIRST, REN-ISAC and DNS-OARC.
Abstract: This tutorial, the second in a series, builds on the introduction scripting tutorial by covering more advanced topics and real world coding solutions including database access, network programming, module development and references. While our time is too limited , we will learn about and implement these constructs by example. We will step through the process of creating our own network-based service application that implements modules, communicates with a database, handles command line arguments, writes logs to a syslog server and more. Participants can expect to come away with enough knowledge to start hacking their own advanced applications or make use of the example code provided as a foundation towards something even more useful in their own real networks.
Files: pdfKristoff(PDF)
wmvKristoff(WMV)
Sponsors: None.
Tutorial: An Introduction to DNSSEC
Meeting: NANOG54
Date / Time: 2012-02-05 4:00pm - 5:30pm
Room: Plaza
Presenters: Speakers:

Matt Larson, Verisign

Matt Larson is Vice President of DNS Research in Verisign Labs, where he works as a specialist in DNS protocol and operational issues. He is an active participant in the wider DNS community and the co-author of three O'Reilly & Associates Nutshell Handbooks ("DNS on Windows Server 2003", "DNS on Windows 2000" and "DNS on Windows NT"). He also co-authored the core DNSSEC standards documents: RFCs 4033, 4034 and 4035.
Abstract: This session is a brief introduction to DNSSEC and how it works. We'll discuss the motivations for its creation, what it does (and doesn't do), and how it works. We'll describe the new DNS resource records used by DNSSEC and how a DNSSEC validator uses them to verify the authenticity and integrity of DNS data. Basic knowledge of how DNS itself works is helpful but not strictly required.
Files: wmvDNSSEC(WMV)
pdfLarson(PDF)
Sponsors: None.
Keynote Panel: The IPv4 Secondary Market
Meeting: NANOG54
Date / Time: 2012-02-06 9:45am - 11:00am
This item is webcast
Room: California Ballroom
Presenters: Moderators:
Dan Golding, RagingWire Data Centers.
Panelists:

Geoff Huston, APNIC

Geoff Huston is the Chief Scientist at the Asia Pacific Network Information Centre (APNIC), where he undertakes research on topics associated with Internet infrastructure, IP technologies, and address distribution policies.

John Curran, ARIN

John Curran is the President and CEO of the American Registry for Internet Numbers (ARIN). He was a founder of ARIN and served as the Chairman from its inception through 2009. Curran ran several early Internet companies including BBN Planet, XO Communications, and Servervault.

Joel Jaeggli, Zynga

Joel Jaeggli is a Network Engineer with the Zynga Game Network. In his current role he has architectural and operational responsibilities supporting the network for some of the world's most popular social games. He serves as a co-chair of the IETF V6OPS working-group and has been a NANOG participant since 1997.

Charles Lee, Addrex

Charles M. Lee, President, is the impassioned futurist behind Addrex and responsible for defining new frontiers - and bringing them to market - in the digital rights and asset space. While leading Verizon Federal as Chief Technology Officer, Mr. Lee perfected the language of translating technical capabilities into business solutions and business requirements into technical specifications for the benefit of the United States Government and its agencies. Possessing distinct and varied infrastructure and design expertise, he spearheaded the teams which provided the technical depth and consultative services to Verizon’s national and global account teams and their clients in areas such as the Internet, IPv6, MPLS (Multi-protocol Label Switching), ATM and Frame Relay. Additionally, Mr. Lee was instrumental in leading MCI’s involvement in the National Science Foundation’s NSFNET which included the negotiations to commercialize access and privatize the backbone of the internet. His background is littered with acronyms like NSFnet, vBNS+, NMCI, FTS 2001 and Networx, as well as Project Big Dial and Private Internet Protocol Infrastructure for Verizon Business. Charles is a recognized expert and speaker at industry conferences such as Interop and the GSA Network Services Conferences. He has also served as the principal representative for Verizon on the NIITF (National Information Infrastructure Task Force) subcommittee on architecture as well as a subject matter consultant to the NSTAC (National Security Telecommunications Advisory Committee). Charles hails from Auburn University where he received his BS degree in Electrical Engineering.
Abstract: Panel with a RIR with runout, a RIR facing runout, a "broker" who operates in the grey market, and someone who's helping others figure out ways to do more with less.
Files: wmvKeynote(WMV)
pdfKeynote Panel: The IPv4 Secondary Market - Curran(PDF)
Sponsors: None.
OpenFlow: What's Real? What's Virtual?
Meeting: NANOG54
Date / Time: 2012-02-06 11:45am - 12:45pm
This item is webcast
Room: California Ballroom
Presenters: Moderators:
David Meyer, Cisco.
Panelists:

Curt Beckmann, Brocade

Curt Beckmann is a Principal Engineer at Brocade, and is Brocade's lead representative to the Open Networking Foundation, the body that manages the development of the OpenFlow specification. Curt has architected networking chips at Bay Networks, Nortel, Rhapsody Networks and Brocade.

Guido Appenzeller, Big Switch Networks

Guido is the Co-Founder and CEO of Big Switch Networks. Before co-founding Big Switch Networks, he was on the faculty at Stanford University and head of the Clean Slate Lab where he led the research team that developed the OpenFlow v1.0 standard and the reference and controller implementations. He was named a Technology Pioneer by the World Economic Forum and holds a PhD in Computer Science from Stanford University and a BA in Physics from Universitat Karlsruhe.
Ed Crabbe, Google.
Abstract: Most of what we hear about OpenFlow or Software Defined Networking is very optimistic and abstract, with a "this will change the world" tone. But the market is still nascent, and there are few deployments in production today. How do we make sense of this dichotomy? The panelists will talk about OpenFlow from a hardware vendor, software vendor and network operator perspective followed by Q&A discussion.
Files: wmvOpen Flow(WMV)
pdfPanel: OpenFlow: What's Real? What's Virtual? - Beckmann(PDF)
Sponsors: None.
How More Specifics Increase Your Transit Bill (and ways to avoid it)
Meeting: NANOG54
Date / Time: 2012-02-06 2:30pm - 3:00pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Fredy Kuenzler, Init7

Fredy Kuenzler is founder/CTO/network architect of the Switzerland based operator Init7 (AS13030) and has more than 15 years of industry expericence, especially in BGP routing, streaming services and IP television.
Abstract: More than 40% of the global routing table is polluted by more specific prefixes, according to the CIDR report. These more specifics affect ratio between transit and peering significantly in favor of the more expensive transit, which is real money for outbound-heavy networks. To avoid these unnecessary spendings is worth a thought.
Files: pdfHow More Specifics Increase Your Transit Bill (and ways to avoid it)(PDF)
wmvTransit(WMV)
Sponsors: None.
Why OSPF Paths Aren’t Always Shortest
Meeting: NANOG54
Date / Time: 2012-02-06 3:00pm - 3:30pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

David Applegate , AT&T Labs - Research

David Applegate is a Lead Member of Technical Staff at AT&T Shannon Labs, where he has been since 2000. Prior to that he was an Associate Professor of Computational and Applied Mathematics at Rice University and a Member of Technical Staff at AT&T Bell Labs.
Abstract: Knowing what paths packets are taking within a network is crucial for several network management tasks. When the network is running OSPF, determining paths is supposedly straight-forward, since OSPF is basically a link-state protocol, and with link-state protocols, a packet follows the shortest path in terms of link weights from its source to the destination. However, OSPF allows a network to be divided into areas for scalability, and this makes it more than a link-state protocol. As a result, though packets still follow shortest paths within an area, this is not guaranteed to be the case across areas. In fact, paths followed by packets with areas can often be unexpected and non-intuitive. Some recent extensions to OSPF, namely multi-area adjacencies (RFC 5185) and alternative implementation of border routers (RFC 3509), have further exacerbated the situation. This presentation illustrates such cases with examples, while providing insights into why OSPF paths can look so strange with areas.
Files: wmvOSPF(WMV)
pdfWhy OSPF Paths Aren’t Always Shortest(PDF)
Sponsors: None.
Track: Best Current Operational Practices
Meeting: NANOG54
Date / Time: 2012-02-06 4:30pm - 6:00pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Aaron Hughes, 6connect

Aaron brings more than 15 years of experience in the telecommunications industry. Aaron Hughes is President and CTO at 6connect, Inc specializing in Internet Engineering automation solutions, cooling technologies and distributed managed services with a focus on IPv6. He is also the Chief Network Architect at UnitedLayer bringing more than 15 years of experience in the telecommunications industry and is responsible for network topology planning, design and operations. Aaron has also held network and system architecture and Sr. level management roles at Lockheed Martin, Cariden Technologies, Terremark, Certainty Solutions, Quest Technologies, RCN, UltraNet and Channel(1) Communications.
Abstract: BCOP Track
Files: wmvBest Current Operational Practices (WMV)
Sponsors: None.
Track: IPv4 runout, Doing More with Less
Meeting: NANOG54
Date / Time: 2012-02-06 4:30pm - 6:00pm
Room: Plaza
Presenters: Speakers:

Joel Jaeggli, Zynga

Joel Jaeggli is a Network Engineer with the Zynga Game Network. In his current role he has architectural and operational responsibilities supporting the network for some of the world's most popular social games. He serves as a co-chair of the IETF V6OPS working-group and has been a NANOG participant since 1997.
Fred Baker, Cisco Systems.
Randy Bush, IIJ.
Charles Lee, Addrex.
Abstract: IPV4 runout means new entrants will from the outset deploy techniques the present operators consider undesirable. On the vendor side CGN hardware is becoming a mature product space. Datacenter operators confront a similar set of problems both supporting outgoing and incoming connections. IPV6 should be appearing in new greenfield projects I would think. I have an internet content providers point of view, I am hopeful that some other participants with different vantage points will also be willing to talk.
Files: pdfBaker(PDF)
pdfBush(PDF)
wmvIPv4 Runout(WMV)
pdfJaeggli(PDF)
pdfLee(PDF)
Sponsors: None.
Track: ISP Security
Meeting: NANOG54
Date / Time: 2012-02-06 4:30pm - 6:00pm
Room: Harbor
Presenters: Speakers:

Merike Kaeo, Double Shot Security

Merike Kaeo is the Director, Data Security and Services at Internet Systems Consortium (ISC). Her responsibilities include providing strategic direction and establishing global industry partnerships with ISC’s Resiliency and Security Forum. She authored 'Designing Network Security' for Cisco Press, which was translated into 8 languages and is a reference book for many security accreditation programs. Merike also wrote the first comprehensive IPv6 security technology paper for the NAv6TF in 2006 and has been a frequent speaker and instructor of IPv4 and IPv6 security issues and solutions at security-related conferences and ISP forums around the world including RSA, NANOG, RIPE, APRICOT and SANOG. Her work with the North American v6 Task Force (NAv6TF) and IPv6 Forum earned her an IPv6 Fellow status in 2007. Before ISC, Merike spent 11 years as the Founder and Chief Network Security Architect of Double Shot Security, a company that offered worldwide technical strategy and business consulting services to secure IPv4 and IPv6 networked infrastructures. Prior to creating her own company, Merike spent 7 years at Cisco Systems. She instigated and was the key architect in Cisco System’s first security initiative to bring awareness and cohesiveness across the company for security related products and features. Merike has a BSEE degree from Rutgers University and an MSEE degree from The George Washington University.
Abstract: Service provider security track which will focus on current issues in protecting the availability, integrity and resiliency of network infrastructures.
Files: None.
Sponsors: None.
Smart Management for Robust Carrier Network Health and Reduced TCO!
Meeting: NANOG54
Date / Time: 2012-02-07 9:45am - 11:00am
This item is webcast
Room: California Ballroom
Presenters: Moderators:

Dr. Vishal Sharma, Metanoia, Inc.

Vishal Sharma (SM IEEE, Fellow IETE) is a seasoned international technologist, telecom industry expert, & entrepreneur with global exposure, and 20-years of experience spanning consulting, industry, academia, labs. & research. At Metanoia, Inc., he has provided deep-dive expertise in strategy and telecom network- and systems-design to clients on 4 continents – N. America, Europe, Asia, Australia. He and his team have helped players across the full telecom ecosystem (spanning chip/semi-conductor companies, system vendors, operators/carriers, technology houses, and telecom software and tool companies) solve complex problems, by providing services in technology strategy, architecture & design trade-offs, product development, hardware/software architecture, & competence building. Presently, he is leading an industry initiative on how to lower carriers' total cost of ownership (TCO) through better assessment and optimization of a carrier's business models, operations, networks, and technology. More details are at http://www.linkedin.com/in/vishalsharma.
Panelists:

Robert Bender, CTS Telecom

Robert Bender is Network Operations Manager at CTS Telecom, a 100-year old independent service provider in SW Michigan. In 14 years at CTS Telecom, Robert has spearheaded the development of ISP operations, softswitch deployment, and currently is the lead optical and IP networking architect. His vision continues to move CTS Telecom forward, from legacy SONET and TDM systems to Carrier Ethernet and FTTP services.

Jay Moran, AOL Technology Operations

Jay Moran is the Distinguished Engineer for the AOL Technology Operations organization. AOL Tech Ops ensures 24x7xForever availability for AOL's hundreds of millions visitors to premium content sites such as HuffingtonPost, Engadget, MapQuest, Winamp/Shoutcast, and their advertising networks. Jay’s technology responsibility spans the end-to-end infrastructure from the data center facilities up through application operations. Prior, he was the Sr. Tech Director of all AOL networks from the dark fiber to the US/EU backbone - ATDN (AS1668). Jay and his teams brought the first large scale data center network redesign in a decade to AOL, IPv6 across ATDN and several key websites, and convergence to a single router platform across multiple networks. Prior to joining AOL in 1999 Jay has held various positions at Williams Communications, Perot Systems, Tenet Healthcare, and Eastern Data since 1988.

Shawn Morris, NTT America

As manager of IP development for NTT America, Shawn coordinates the Global IP Network Development testing staff and facilities, which are responsible for qualifying both hardware & software for the NTT Com Global IP Network. He also oversees the development team responsible for the GIN configuration tools. Shawn has thirteen years of experience in the IP networking industry and previously served as a member of the IP engineering staff at Verio, which was acquired by NTT Communications in August of 2000.

Bruce Katzel, Amartus

Bruce is the most recent addition to the Amartus senior executive team and assumes responsibility for business development and product direction in North America. He is a career business and product development professional with 20+ years’ experience in senior roles at leading technology companies. He has been instrumental in success of a number of start-up OSS / BSS companies including Intelliden (acquired by IBM), Ineo, Granite Systems (acquired by Telcordia), Cross Keys (acquired by Oracle), CCMI & ACE*COMM (now Ventraq), he has a deep understanding of the Large Enterprise and Service Provider market place.

Colby Barth, Juniper Networks

Colby Barth is a Distinguished Engineer at Juniper Networks, working in the Platforms Systems Division, CTO Group. Contact him at cbarth@juniper.net.
Abstract: With TCO reduction being a goal, managment of the network is more important today than ever before. This is because with convergence, comes less equipment on the one hand, but more functionality per device/system on the other – as a result, management of such systems and networks assumes greater importance, a single malfunction can impact multiple layers of operation (since packet, Ethernet and transport may all be resident in the same device now), wreaking havoc on an operator's network and services. Indeed, today’s large, dynamic, and complex IP networks must be reliable & secure, provide QoS for diverse applications, and need to comply with regulations (such as FISMA, HIPPA, and PCI DSS ). Thus, the cost to an operator (large or small) of not having a proper management framework in place can be substantial. Configuration and security loopholes and lack of a consolidated view of the network infrastructure can be very expensive! (Unnecessarily high opex, poor network and application/service performance, customer dissatisfaction and churn, and potential loss of revenue, are just a few of these expenses.) With the average cable, wireless, or global telco having between 2000-9000 lines of configuration code per device, and with over 4-5 critical errors per IP network device, the cost per network downtime incident can be as high as three-quarters of a million dollars! With a proper network management framework in place, the labor-cost (opex) saving and risk reduction becomes significant, even for operators with as few as 100 devices in the network, and could be in the millions of dollars for operators with 1000+ IP network devices. Thus, the purpose of this Panel is to explore, discuss, and debate a set of issues that focus on better management of the network to both operate a healthy network and reduce the operator’s cost of ownership. In particular, of the 3 key areas of network management -- network configuration/audit, network monitoring/measurement, and network tuning, we will focus, in this panel, on network configuration/audit and it's critical role in lowering operators' TCO.
Files: pdfBarth(PDF)
pdfBender(PDF)
pdfIntro - Sharma(PDF)
pdfKatzel(PDF)
pdfMoran(PDF)
pdfMorris(PDF)
wmvSmart Management(WMV)
Sponsors: None.
The Other 50% of the Internet
Meeting: NANOG54
Date / Time: 2012-02-07 11:30am - 12:00pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Craig Labovitz, DeepField Networks

Dr. Craig Labovitz is co-founder and president of DeepField Networks, a recently founded cloud networking startup. He has spent the last two decades studying the Internet infrastructure and cloud evolution, including several seminal papers on Internet topology and economics. Previously, he designed and built the largest carrier security solution in the world as the Chief Architect at Arbor Networks. Labovitz has also held research and management positions at Microsoft and Merit Networks.
Abstract: In previous talks, we looked at the rapidly evolving "Hyper-Giants", or the 150 large content and hosting networks (e.g. Facebook, Google, etc.) that now contribute an amazing 50% of all Internet traffic globally. This talk looks at the other 50% of traffic. Specifically, FileSharing, P2P and adult traffic represent a massive and growing portion of Internet traffic globally (as well as a sizable economic activity). From first appearances, the universe of adult domain names, number of seed boxes / trackers and file sharing sites appears limitless and endlessly varied. But in this talk, we take a deeper look at the Internet infrastructure supporting these Internet industries. We show that a small number of companies manage these thousands of domain names and an even smaller number of specialized hosting, CDN, analytics and advertisement companies provide the infrastructure. In the case of file sharing, we show that four hosting companies provide the infrastructure for more than 80% of all file sharing traffic globally.
Files: wmv50%(WMV)
pdfLabovitz(PDF)
Sponsors: None.
Telex: Anticensorship in the Network Infrastructure
Meeting: NANOG54
Date / Time: 2012-02-07 12:00pm - 12:30pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Eric Wustrow, University of Waterloo

Eric Wustrow is a PhD candidate at the University of Michigan in Computer Security, working with Professor J. Alex Halderman. His research focuses on developing technologies to support freedom and government transparency throughout the world. Previously, he has worked to expose vulnerabilities in insecure electronic voting systems in the US and abroad, and has developed new tools and techniques for circuventing Internet censorship in countries such as Iran and China.

J. Alex Halderman, University of Michigan

J. Alex Halderman is an assistant professor of computer science and engineering at the University of Michigan, where his research spans applied computer security and tech-centric public policy. Dr. Halderman has studied topics ranging from web security, data privacy, digital rights management, and cybercrime to technological aspects of intellectual property law and government regulation. He is known for helping to introduce the "cold-boot attack," which breaks encryption by literally freezing a computer's memory, and for exposing Sony’s "rootkit" DRM and other harmful copy-protection technologies. A noted expert on electronic voting security, Dr. Halderman demonstrated the first voting machine virus and helped perform California's "top-to-bottom" electronic voting review. With students at Michigan, he revealed that China's Green Dam Youth Escort censorship software made users vulnerable to remote code execution. His recent work includes the first independent security analysis of India's electronic voting machines, and "hacking" into the District of Columbia's proposed Internet ballot return system. He holds a Ph.D. from Princeton University.
Abstract: Telex is a new approach to resisting state-level Internet censorship. Rather than attempting to win the cat-and-mouse game of finding open proxies, we leverage censors’ unwillingness to completely block day-to-day Internet access. In effect, Telex converts innocuous, unblocked websites into proxies, without their explicit collaboration. We envision that friendly ISPs would deploy Telex stations on paths between censors’ networks and popular, uncensored Internet destinations. Telex stations would monitor seemingly innocuous flows for a special “tag” and transparently divert them to a forbidden website or service instead. We propose a new cryptographic scheme based on elliptic curves for tagging TLS handshakes such that the tag is visible to a Telex station but not to a censor. In addition, we use our tagging scheme to build a protocol that allows clients to connect to Telex stations while resisting both passive and active attacks. We also present a proof-of-concept implementation that demonstrates the feasibility of our system, and encourage ISPs and interested researchers to talk to us about future collaboration.
Files: wmvAnticensorship(WMV)
pdfWustrow(PDF)
Sponsors: None.
DDoS Attack Trends Through 2009-2011
Meeting: NANOG54
Date / Time: 2012-02-07 12:30pm - 1:00pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:
Jose Nazario, Arbor Networks.
Abstract: Through Arbor's ATLAS initiative, we have views into widescale botnet activities, measuring traffic and botnet commands. We also have an annual survey we perform with ISPs around the world to look at attack trends and concerns. This talk will look at the growth in attacks, the tools and botnets in use, and how ISPs are responding.
Files: wmvDDoS(WMV)
pdfNazario(PDF)
Sponsors: None.
The Curious Incident of 7 November 2011
Meeting: NANOG54
Date / Time: 2012-02-07 3:00pm - 3:30pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Jim Cowie, Renesys Corporation

Jim Cowie is the co-founder and Chief Technology Officer of Renesys Corporation. Although best known to the NANOG community for his work on BGP routing dynamics and analysis of Internet transit markets, Jim's research roots are actually in high performance computing, parallel language compilation, and network modeling and simulation. When the web was young, he authored one of the first web-based collaborative environments for large-integer factorization, and was part of the distributed research team that cracked RSA-130. His current interests include Internet stability metrics and the economics of the developing world's Internet markets. Jim received a BS in Computer Science from Yale University.
Abstract: On 7 November 2011 at 14:13 UTC, large parts of the global Internet became unstable or unreachable for nearly half an hour, an event ultimately traced to a routing software vulnerability. We describe the hunt for the origin of this event in both BGP and traceroute-based active measurement data, describe the "BGP epidemiology" of similar events in recent years, and provide some hypotheses as to the origin of the BGP "trigger messages" that caused the November meltdown.
Files: pdfCowie(PDF)
wmvCurious(WMV)
Sponsors: None.
Name Server Selection of DNS Caching Resolvers
Meeting: NANOG54
Date / Time: 2012-02-07 3:30pm - 4:00pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Yingdi Yu, UCLA

Yingdi Yu is a second-year Ph.D. student in Computer Science Department at UCLA. He is also a member of the Internet Research Lab at UCLA. His research interest focuses on Internet measurement, especially DNS measurement. Before coming to UCLA, he received his B.S. degree and M.S. degree in Eletronic Engineering from Shanghai Jiao Tong University in 2007 and 2010 respectively.
Abstract: Operators of high-profile DNS zones utilize multiple authoritative name servers for performance and robustness. We conducted a series trace-driven measurements to understand how current caching resolver implementations select and distribute queries among a set of authoritative name servers. Our results reveal areas for improvement in the “apparently sound” server selection schemes used by some popular implementations. In some cases, the selection schemes lead to sub-optimal behavior of caching resolvers, e.g. sending a significant amount of queries to unresponsive servers. We believe that most of these issues are caused by careless implementations, such as treating unresponsive servers as reachable, and using constant SRTT decaying factor which couples the decaying speed with the iterative query rate. For the problems identified in this work, we recommended corresponding solutions.
Files: wmvDNS Caching(WMV)
pdfYu(PDF)
Sponsors: None.
Track: DNS
Meeting: NANOG54
Date / Time: 2012-02-07 4:30pm - 6:00pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Duane Wessels, Verisign

Following his college education in Physics and Telecommunications, Duane worked on the Squid/IRCache project at UCSD. For many years his company, The Measurement Factory, developed open source testing and measurement tools for HTTP and DNS. Recently he was the Director of the Domain Name System Operations Analysis and Research Center (DNS-OARC). Currently Duane researches DNSSEC deployment for Verisign.
Abstract: The DNS Track is an opportunity for NANOG attendees with an interest in DNS to meet and share operational experiences and recent research activities. Attendees are welcome to contact the track moderator with presentations or ideas for discussion topics.
Files: pdfDeccio(PDF)
wmvDNS(WMV)
pdfGriffiths(PDF)
pdfWessels(PDF)
pdfYu(PDF)
Sponsors: None.
ARIN Update
Meeting: NANOG54
Date / Time: 2012-02-08 9:30am - 10:00am
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Mark Kosters, ARIN

Mark Kosters is the CTO of the American Registry for Internet Numbers (ARIN), responsible for all engineering initiatives within the organization, leading both development and operations. Mark has over twenty-three years of experience as an applications developer, networking engineer, technical manager and executive. Over the last eighteen years, he has been a senior engineer at Data Defense Network (DDN) NIC, chief engineer and Principal Investigator under the NSF-sponsored Internet NIC (InterNIC), and Vice President of Research at Verisign. Over his career, Mark has been involved in application design and implementation of core internet client/server tools, router administration, UNIX system administration, database administration, and network security. He has represented both network information centers in various technical forums such as the IETF, RIPE, APNIC, CaribNOG and NANOG.
Abstract: Mark Kosters, Chief Technology Officer, will give the latest technical news about ARIN. He will update you on ARIN Online, including an overview of the new programming API's, billing/payment integration and upcoming releases.
Files: wmvARIN(WMV)
pdfKoster(PDF)
Sponsors: None.
Panel: World IPv6 Launch
Meeting: NANOG54
Date / Time: 2012-02-08 10:00am - 10:30am
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Brooks Fitzsimmons, AT&T

T. Brooks Fitzsimmons, AVP – IPv6 Transition, is responsible for preparing AT&T’s products and infrastructure for IPv4 address exhaustion and IPv6 accessibility. He was appointed to his current position in July 2009. In his role, he is responsible for scoping the projects necessary to transition AT&T’s IP data products and services towards IPv6. He partners closely with colleagues in Product Management, IT, Architecture & Planning, Labs and Network Planning & Engineering to define IPv4 address consumption mitigation approaches and to sequence the work efforts critical to enabling IPv6 across the enterprise, consumer and wireless products & services. Prior to his current role, Brooks served as AVP – Service Delivery for AT&T’s Hosting & Application Services. He led the international team of project managers and engineers who deliver hosting services into AT&T’s global Internet datacenters. During his tenure, he aided in integrating the Interwise and USi teams into AT&T. Before the merger with AT&T, Brooks Fitzsimmons managed the customer care centers in Plano, TX and San Ramon, CA that provisioned and maintained SBC’s Enterprise IP/MPLS products. He also had business and capital management responsibilities for SBC’s Internet Data Centers and E-Services. Brooks specializes in technology risk management, business integration, and operational scaling. Brooks started his career in IT & Information Security Audit and Consulting, obtaining his CISSP in 1999. He also holds an Orange Belt in Six Sigma. Fitzsimmons has a bachelor’s degree in International Politics from Middlebury College and a Certificat d’Etudes Politiques from the Institut d’Etudes Politiques in Paris, France.

Leslie Daigle, Internet Society

Leslie has been actively involved in shaping the Internet's technical evolution for more than a dozen years. Her role with the Internet Society is to provide strategic leadership on important technical issues as they relate to ISOC's ongoing programs. She has worked with the Internet Engineering Task Force (IETF) since 1995, and was an appointed member of the related Internet Architecture Board (IAB) from March 2000 to March 2008. As the elected Chair of the IAB from 2002 to 2007, Leslie steered the IAB and the related IETF through a period of important industry and institutional change by working with diverse technical groups to align their interests and develop sustainable relationships. Apart from her leadership role with the IAB, Leslie has been a strong promoter of the development of Internet identifiers and directory systems, which allow for the creation of standards-based, interoperable application protocols to support end-users across the Internet in their use of remote resources. She recently published standards for DNS-based application service discovery. Leslie has served as a panelist with the National Science Foundation review committee, evaluating Internet-related research proposals submitted for funding. She holds an M.Sc. in Computing & Information Science from the University of Guelph, and a B.Sc. in Math and Computer Science from McGill University. Leslie was most recently a Consulting Engineer at Cisco Systems. Previously she held the position of Director of Directory Research at VeriSign, and Vice President for Research at industry pioneer Bunyip Information Systems, among others. Leslie is based in Reston, United States

John Sweeting, Time Warner Cable

John Sweeting is the Director of Network Engineering at Time Warner Cable, working out of their Herndon, VA office. His team is responsible for engineering of the Time Warner Cable backbone and providing standards, documentation, and guidance for the regional networks. John has over 25 years of experience in engineering networks. Previous to Time Warner Cable he worked for international carriers, MCI, Cable & Wireless and Teleglobe (Tata Communications) building out global IP networks. John is the current Chair of the ARIN Advisory Council and is in his 10th year of service to ARIN.
Abstract: World IPv6 Launch - This time it's for real. Major Internet service providers (ISPs), home networking equipment manufacturers, and web companies around the world are coming together to permanently enable IPv6 for their products and services by 6 June 2012. Organized by the Internet Society, and building on the successful one-day World IPv6 Day event held on 8 June 2011, World IPv6 Launch represents a major commitment to the global deployment of IPv6. As the successor to the current Internet Protocol, IPv4, IPv6 is critical to the Internet's continued growth as a platform for innovation and economic development. This panel will be a discussion of World IPv6 Launch and will include perspectives from the Internet Society as well as two of the residential access providers who are enabling IPv6 to paricipate in this event."
Files: pdfDaigle(PDF)
wmvWorld(WMV)
Sponsors: None.
The Worlds First Juniper Based Internet Exchange – Why We Did It and What Happened
Meeting: NANOG54
Date / Time: 2012-02-08 11:00am - 11:30am
This item is webcast
Room: California Ballroom
Presenters: Speakers:

Derek Cobb, The London Internet Exchange (LINX)

Derek Cobb is Chief Technical Officer for the London Internet Exchange (LINX). LINX is a mutually owned by 400 members and provides public and private Internet peering services to organisations from around the world. Derek joined LINX from BT in March 2011 and has overseen the successful migration of LINX's primary peering LAN to a new VPLS architecture, based on Juniper's MX technology. Derek has held a number of senior network posts with Cellnet (now O2), AT&T, ntl/Virgin Media and BT. Prior to joining LINX, Derek was BT's Network Operations Director for the London 2012 Olympics.
Abstract: Introduce LINX and quick history / summary on the switch vendors historically in the IX marketplace Explain why we needed to upgrade the network and the reasons behind changing vendors Run through of what the migration programme looked like finishing with several war stories about the experience
Files: pdfCobb(PDF)
wmvExchange(WMV)
Sponsors: None.
Power Consumption in High End Routing System
Meeting: NANOG54
Date / Time: 2012-02-08 11:30am - 12:15pm
This item is webcast
Room: California Ballroom
Presenters: Speakers:

LJ Wobker, Cisco

LJ Wobker is a member of the ASR 9000 System Architecture team at Cisco. He holds a B.S. in computer science from North Carolina State University in Raleigh, where he also helped operate and redesign the engineering and campus-wide networks in the late 1990’s. A 15-year veteran at Cisco, he started in the Technical Assistance Center taking calls from angry customers, and has since spent time in the ISP support team, the GSR and CRS engineering and TME teams, the advanced services central engineering and design team, and finally in technical marketing for the ASR 9000. His focus is currently on the system infrastructure for the ASR 9000 and future platforms: including silicon roadmaps, power and mechanical requirements, and data plane/forwarding subsystems. He is also a scuba diver, a European history buff, and a US National Champion in formation skydiving.
Abstract: Power consumption and efficiency continues to be a major challenge in the networking industry. Current-generation products are increasingly constrained by the availability of power in both the developed and developing markets. While the unit power consumption (i.e. functionality per watt) continues to decrease, the rate of decrease is much lower than the explosion of bandwidth. This presentation discusses a number of topics related to power consumption in high-end routing/switching systems, with the primary goals being: --educate network operators in the “physics” of system power consumption --identify which performance metrics and requirements do and do not drive increased power consumption --identify the mechanical/cooling impacts of system design --discuss system hardware design challenges around power and cooling --discuss the impact/costs of mechanical standards compliance (i.e. NEBS)
Files: wmvPower(WMV)
pdfWobker(PDF)
Sponsors: None.
The IETF SIDR (Secure Inter-Domain Routing) wg plans an interim meeting, to be held in San Diego the Thursday after the end of NANOG 54 (Thu Feb 9).
Meeting: NANOG54
Date / Time: 2012-02-08 12:30pm - 12:00am
Room:  
Presenters:
Abstract: and create a link to the abstract: The interim meeting will focus on two recent SIDR topics: replay/freshness protection and route leaks. The venue was chosen because many of the WG comments on both topics have concerned the operational impact. The hope is to get operator input into the discussion of both topics. The details of the meeting can be seen at http://trac.tools.ietf.org/wg/sidr/trac/wiki/InterimMeeting20120209
Files: None.
Sponsors: None.

Back to NANOG54 agenda.

NANOG54 Abstracts

  • Panel: World IPv6 Launch
    Speakers:
    Brooks Fitzsimmons, AT&T; Leslie Daigle, Internet Society; John Sweeting, Time Warner Cable;
  • Panel: World IPv6 Launch
    Speakers:
    Brooks Fitzsimmons, AT&T; Leslie Daigle, Internet Society; John Sweeting, Time Warner Cable;
  • Panel: World IPv6 Launch
    Speakers:
    Brooks Fitzsimmons, AT&T; Leslie Daigle, Internet Society; John Sweeting, Time Warner Cable;

 

^ Back to Top