Agenda

Click on any talk title in the agenda to view the full abstract and speaker info.

Monday, February 8, 2021
Topic/Presenter
Full Abstract

Welcome to NANOG 81 - Virtual

Tina Morris: Tina Morris serves as a member on the NANOG Board of Directors and is a Senior Technical Business Development Manager at Amazon Web Services focused primarily on IPv4 and IPv6 address resource strategy. In addition, Tina is currently serving as Vice-Chair of the ARIN Board of Trustees and participates actively within the Global RIR community.
Speakers
Full Abstract

In this talk, we review the history of router architectures complete
with their flaws and benefits. From the earliest days of bus based
systems through to today's multi-chassis monstrosities, we will look
at what went right, what went wrong, and speculate about what is yet
to come.

Tony Li: Tony Li has been a pioneer in Internet routing for 30 years, helping to scale the Internet architecture. He led the initial deployment of BGP and CIDR, ensuring that the Internet could pivot to an efficient routing and addressing architecture, led development of core router projects at Cisco, Juniper, and Procket, and has continually innovated in routing architecture, delivering BGP4, Traffic Engineering, Dynamic Flooding, and Area Proxy. Tony has been past co-chair of the CIDR Deployment, Mobile IP, and IS-IS IETF working groups and the IRTF Routiing Research Group.
Speakers
  • Speaker Tony Li - Arista Networks
Mannan Venkatesan
Full Abstract

With high traffic growth on Service Provider core networks, staying ahead on network capacity has always been a challenge. This presentation reviews how Comcast has evolved its Core Backbone Networks to keep up with traffic demands, some of the challenges we faced, how we are addressing them and sharing the lessons learned from these deployments.

Speakers
  • Speaker Mannan Venkatesan
Full Abstract

Put your NANOG + network engineering knowledge to the test with a round of Kahoot trivia during the last 15 minutes of the break.
Join the Zoom Session as early as 1:30pm EST

https://zoom.us/j/99314296323?pwd=QVFPd25ZbEF1NjBhZ1dtN3Fjc2tXdz09
Passcode: 256521

Make sure you open the Kahoot! app or a separate web browser to Kahoot.it to play along!

Sponsors:
Full Abstract

Are you a Newcomer to NANOG? Would you like to network with other Newcomers and NANOG veterans? Join us for the Zoom Session!

Join Zoom Meeting
https://nanog.zoom.us/j/94490855922?pwd=U3hBWXhCUWFESUZaVklEWDdWKzZDQT09

Meeting ID: 944 9085 5922
Passcode: 562828
One tap mobile
+13017158592,,94490855922# US (Washington D.C)
+13126266799,,94490855922# US (Chicago)

Dial by your location
+1 301 715 8592 US (Washington D.C)
+1 312 626 6799 US (Chicago)
+1 646 876 9923 US (New York)
+1 408 638 0968 US (San Jose)
+1 669 900 6833 US (San Jose)
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
Meeting ID: 944 9085 5922
Find your local number: https://nanog.zoom.us/u/angH6V7fG

shraddha hegde
Recordings
Files
Full Abstract

Flexible Algorithm provides means to create separate topologies in a single IGP. Flexible Algorithm Definition includes, metric type, algorithm and the link constraints and is used to define the topology. Flexible Algorithm is a simple and easy way to solve use cases such as separating routing-planes, constrained TE paths and low latency routing. It uses IGP extensions and no other protocols or controllers are required for deployment.

Speakers
  • Speaker shraddha hegde
Full Abstract

Segment Routing is getting more and more deployed in production networks now, starting with unicast. As more operators moving or planning to move to SR, those with multicast requirements need to consider what options they have for multicast. This presentation looks at SR principals and corresponding multicast options, with focuses on SR-P2MP, BGP/controller signaling, and integration with seamless inter-region SR and classful BGP transport.

Susan Forney - Hurricane Electric
Recordings
Files
Full Abstract

IPv6 turned 25 in December. While global adoption of IPv6 might not be where its architects thought, IPv6 has come of age and inserted itself firmly into the Internet. This presentation examines IPv6 adoption, prefix growth, and security.

Susan Forney: Susan Forney is a network engineer at Hurricane Electric Internet Services, which operates the largest IPv6 backbone in the world in terms of number of connected networks. Before joining Hurricane Electric, she was the principal network engineer at the Markley Group, where she developed and operated the Boston Internet Exchange. She was a principal network engineer and architect at at the Microsoft Corporation for 15 years, and also worked as a network engineer at Starbucks and the Boeing Company. She is a member of the Board of Directors of the North American Network Operators Group (NANOG).
Speakers
  • Speaker Susan Forney - Hurricane Electric
Tuesday, February 9, 2021
Topic/Presenter
Full Abstract

Meeting Agenda will be emailed to NANOG Members with a calendar invite that includes information on how to join the webinar.

Full Abstract

Attacks on Internet routing are typically viewed through the lens of availability and confidentiality, assuming an adversary that either discards traffic or performs eavesdropping. Yet, a strategic adversary can use routing attacks to compromise the security of critical Internet applications likeTor, certificate authorities, and the bitcoin network. In this paper, we survey such application-specific routing attacks and argue that both application-layer and network-layer defenses are essential and urgently needed. While application-layer defenses are easier to deploy in the short term, we hope that our work serves to provide much needed momentum for the deployment of network-layer defenses.

Jennifer Rexford: Jennifer Rexford is the Gordon Y.S. Wu Professor of Engineering and the Chair of Computer Science at Princeton University. Before joining Princeton in 2005, she worked for eight years at AT&T Labs where she designed tools for network measurement, traffic engineering, and router configuration that were deployed in AT&T's backbone network. Jennifer received her BSE degree in electrical engineering from Princeton University in 1991, and her PhD degree in electrical engineering and computer science from the University of Michigan in 1996. She received the ACM SIGCOMM Award and the IEEE Internet Award, and she is an ACM Fellow, an IEEE Fellow, and a member of the National Academy of Engineering and the National Academy of Sciences.
Speakers
  • Speaker Jennifer Rexford
Russ White - Akamai
Full Abstract

Network designers are often told they should build security in to the network "from day one." Very little work, however, has been done in defining what building a secure network really means beyond filtering packets, protecting network devices, and providing segmentation (or microsegmentation). This presentation takes another look at security in network design, considering how complexity and security are related, and how to think about design decisions from a security perspective.

Russ White: Russ White has scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, nibbled and noodled at a lot of networks, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, PAcket Pushers, LinkedIn, and his author page on Amazon.
Speakers
  • Speaker Russ White - Akamai
Full Abstract

A measurement of ROA adoption on routes leading to DNS servers supporting the top of the name hierarchy. The DNS servers include the root zone, the ccTLDs, gTLDs and the reverse map zones managed by the RIRs. Analysis of the adoption measurements starts with the obvious categorizations, such as all, IPv4/IPv6, gTLDs/ccTLDs/reverse map.

Edward Lewis: Edward is a Senior Technologist in the Office of the CTO. Prior to joining ICANN he worked 11 years inside Internet registries of many types - gTLD, ccTLD, sTLD and RIR. He worked for a DNS Hosting company. He co-chaired the original IETF WG that developed EPP. He developed some of the first DNSSEC codebases under the original DARPA contract in the 1990's. Before that, he worked building research networks attached to the NASA Science Internet (one of the three original backbones) and taught Networking courses at the University of Maryland - Baltimore County.
Speakers
  • Speaker Edward Lewis - ICANN
Full Abstract

Put your NANOG + network engineering knowledge to the test with a round of Kahoot trivia during the last 15 minutes of the break.
Join the Zoom Session as early as 1:30pm EST

https://zoom.us/j/99314296323?pwd=QVFPd25ZbEF1NjBhZ1dtN3Fjc2tXdz09
Passcode: 256521

Make sure you open the Kahoot! app or a separate web browser to Kahoot.it to play along!

Sponsors:
Full Abstract

Join Zoom Meeting
https://nanog.zoom.us/j/98472215309?pwd=S2hiTityb2haOFFMMXBUWTNFQUtUZz09

Meeting ID: 984 7221 5309
Passcode: 934161
One tap mobile
+13126266799,,98472215309# US (Chicago)
+16468769923,,98472215309# US (New York)

Women in Tech Networking at NANOG 81 will include an interview with Terri Jordon who has been in tech for over 30 years.

Terri spent the first part of her career at Walmart, at a period when the retail giant underwent massive scaling. She had a variety of responsibilities for software development and technical infrastructure of Wal-Mart Stores, Sam's clubs, distribution centers and office locations worldwide. She was honored as the first female winner of the Sam M. Walton Award of Excellence in the information systems division.

After 19 years and a ton of fun at Walmart, Terri joined eBay to lead operations for eBay, worldwide. While there, she also founded eBay’s Women in Technology organization. In 2009, she got the call to join Microsoft and help start-up the Microsoft Retail technology team where she helped open our first Microsoft Store in Scottsdale, Arizona.

After launching and supporting over 100 Microsoft stores, Terri then joined Microsoft Data Center Organization in 2015 with responsibility for Datacenter Operations. She’s held many different leadership roles across Microsoft including establishing the datacenter safety organization, the learning & development team, and other foundational teams that support Microsofts datacenter operations today.

This talk will focus mainly on Terri's experience as a female leader, her focus on diversity in tech and how each of us can make a difference in our own companies.

Speakers
  • Speaker Kat Ronay - Microsoft
Full Abstract

Put your NANOG + network engineering knowledge to the test with a round of trivia during the last 15 minutes of the break.
Join the Zoom Session as early as 3:00pm EST

https://nanog.zoom.us/j/94079429027?pwd=ZlBxNnRYUGJyMlpVdDFSdU1xc1dTdz09
Passcode: 208736

Make sure you open the Kahoot! app or a separate web browser to Kahoot.it to play along!

Sponsors:
Full Abstract

The NANOG Hackathon was held Saturday and Sunday ahead of the NANOG general conference sessions. With a central theme of Configuration Management, participants worked individually or self-organized into teams to work on software passion projects or learn new technologies. This is a presentation on a few noteworthy projects.

Michael Costello: At NANOG, Michael serves as a member of and Treasurer of the Board of Directors and as Vice Chair of the NANOG Education Committee. He has also served two terms on the Program Committee, during which time he was deeply involved in the Hackathon. He also serves on the Board of Directors and Technical Committee of Community IX, a nonprofit internet exchange connecting members in Atlanta and South Florida. Professionally, Michael has lead infrastructure control and automation at both Netflix and DriveNets, worked as a network engineer at a regional ISP, started a small one of his own, served as a network engineer and systems administrator at a college, and conducted offensive and defensive research and development at an embedded device security firm. Michael holds bachelors’ degrees in Electrical Engineering and Physics from Bucknell University and a master’s degree in Computer Science from Columbia University.
Speakers
Kenneth Celenza - Network to Code
Full Abstract

What is automation without configuration deployment? Well.. it turns out there is a lot to be done, in fact, deploying configuration generally only represents a small fraction of total time and is near all of the risk of automation going wrong. Starting on configuration deployment, can actually slow your progress to configuration deployment as it is difficult to trust a new automated process without historical evidence.

During this 30 minute presentations we will review the reasons to forgo configuration deployment and strategies to do so. Topics such as how to integrate with a Source of Truth, generate configurations from a Source of Truth, building an automated pre & post-check process, and integrating with network management systems. Finally, a pragmatic approach to attacking network automation tasks that will appeal to engineers and executives alike.

Speakers
  • Speaker Kenneth Celenza - Network to Code
Luuk Hendriks - NLnet Labs
Willem Toorop - NLnet Labs
Full Abstract

The eXpress Data Path (XDP) is a "hook" in the Linux kernel providing programmability at the lowest layer of the Network Stack (at the device driver layer) and can even be hardware offloaded to programmable devices (e.g. SmartNICs). XDP provides an easy way to perform some parts of DNS handling in the kernel but still have traditional userspace software 'after' that. XDP does not have to replace DNS software in userspace, it can **augment** it.

XDP programs are well suited for dealing with Denial of Service attacks. Furthermore XDP programs can be put to work on an ad-hoc basis on a running system without interruption. We think using XDP to augment an existing DNS service is an exciting new idea, and a great new tool in the DNS operator's toolbox.

In this presentation we will explore how DNS can benefit from XDP with hands-on examples of directly usable running code. We will show how operators can use XDP programs to deal with Denial of Service attacks and/or otherwise tweak their DNS service behaviour.

Willem Toorop: Willem Toorop is a developer and researcher at NLnet Labs. He has a special interest in delivering security and privacy (with DNSSEC and encrypted DNS) to end-users at the edges of the internet. Willem likes working with authors from other Open Source DNS Software and DNS Operators on Open Standards and at hackathons to achieve interoperability of the different DNS software. He also likes doing measurements on the state of the internet and the DNS, in order to provide feedback for operators, and to have a better view of where things can be improved protocol wise and in software. He is passionate about his work and cannot help himself talking, explaining and presenting about it.
Speakers
  • Speaker Luuk Hendriks - NLnet Labs
  • Willem Toorop - NLnet Labs
Full Abstract

Join us for a Virtual Happy Hour - a chance to socialize via an informal setting.

https://nanog.zoom.us/j/97614694956?pwd=OXhXRjFiZDVxbExrSFJqM2d4Yk5aUT09
Passcode: 970986

Wednesday, February 10, 2021
Topic/Presenter
Edward McNair - Right-Brain Consulting
Elizabeth Culley - Comcast
Speakers
Full Abstract

Ahoy mateys. Network automation is burning on as the hot topic and this talk will go into self-driving, self-healing and auto-remediation in light of current automation trends and tooling. If network engineers are pirates, then bad times are afoot as the map is missing. For the evolving journey of humans handing over the drudgery of repetitious and mundane work to automation, we must find a way of navigating the seas of operational hell.

This talk will discuss the problem at large, the mindset and the output of some novel work carried out last year year in the name of becoming a network automation cartographer. You can expect frustration, disbelief and the glowing view of treasure, as the work begins to deliver on its mission.

Technically, this is based on a network operating system with a data store (NETCONF & YANG driven), Terraform, a graph database and lots of experimental code. What I can promise is 30 minutes of not Ansible or Python.

This talk is a modified version of the Irish Network Operator Group (iNOG) 14 session and was titled "Automation without a map".

Speakers
  • Speaker David Gee
Full Abstract

With a growing reliance on the internet, content delivery is more important than ever. But how does it work? Does anycast really break the internet? In this talk I hope to share my experiences in building an Open Source Anycast CDN as a highschool student, and provide an insight into how I'm using anycast and open source software for DNS and HTTP content delivery.

Nate Sales: Nate is a student and software developer with a focus on infrastructure and security. He works on many layers of the stack but most often enjoys ensuring packets arrive at their intended destination and writing software to make that job easier. He can be frequently found working on open source networking projects and loves learning new things.
Speakers
  • Speaker Nate Sales
Full Abstract

Put your NANOG + network engineering knowledge to the test with a round of trivia during the last 15 minutes of the break.
Join the Zoom Session as early as 1:30pm EST

https://nanog.zoom.us/j/93639847847?pwd=WnErbjdTdmp6SWc1c095YStuZlFOZz09
Passcode: 225594

Make sure you open the Kahoot! app or a separate web browser to Kahoot.it to play along!

Sponsors:
Full Abstract

BoF Topics for NANOG 81 are:
Network Management
Automation
BGP Security
Routing
Traffic Management and Policy
Job Hunting
Peering
Newcomers Networking Follow-up

Join Zoom Meeting
https://nanog.zoom.us/j/98005545439?pwd=bm9ORGx1Kzc5NTBMWHlXUlRaazZwQT09

Meeting ID: 980 0554 5439
Passcode: 292308
One tap mobile
+16468769923,,98005545439# US (New York)
+13017158592,,98005545439# US (Washington DC)

Jordan Holland - Princeton University
Full Abstract

This talk presents nPrint, a standard, packet-based representation of network traffic. nPrint enables machine learning on network traffic without manual feature engineering. We combine nPrint with automated machine learning (AutoML) to demonstrate that nPrint can generate a standard traffic representation across a variety of machine learning tasks and models. We present the design and implementation of nPrint, describe how we integrate it with AutoML, and apply the pipeline to three common network traffic classification problems: operating system detection, device fingerprinting, and application identification. We have implemented and released nPrint as open-source software and encourage exploration of more problems with nPrint. Finally, we have also released nPrintML, which enables researchers to perform a wide variety of traffic analysis tasks without writing any code.

Jordan Holland is a 3rd year Ph.D candidate in Computer Science at Princeton University, advised by Nick Feamster and Prateek Mittal, and involved with the Center for Information Technology Policy. His research interests lie at the intersections of networks and security, connecting machine learning and Internet wide measurement techniques to network security problems such as online disinformation detection and remote device identification.

Jordan Holland: Jordan Holland is a 3rd year Ph.D candidate in Computer Science at Princeton University, advised by Nick Feamster and Prateek Mittal, and involved with the Center for Information Technology Policy. His research interests lie at the intersections of networks and security, connecting machine learning and Internet wide measurement techniques to network security problems such as online disinformation detection and remote device identification.
Speakers
  • Speaker Jordan Holland - Princeton University
John Kristoff - NETSCOUT / Dataplane.org
Full Abstract

This panel brings together technical representatives from each regional
Internet registry (RIR) to provide insight into their respective operations
and organizations, as well as to address questions network operators
may have about working in their region. The focus on this discussion
is on RIR technical services such as the RPKI, RDAP, WHOIS, IRR, and
Abuse handling. Resource policies such as those covering number
transfers are out of scope.

ARIN: Mark Kosters, Chief Technical Officer
APNIC: George Michealson, Product Manager
RIPE NCC: Felipe Victolla Silveira, Chief Operating Officer
LACNIC: Carlos M. Martinez, Chief Technical Officer
AFRINIC: Amreesh Phokeer, Research & Innovation Manager

Moderated by John Kristoff @ DePaul University / UIC.

John Kristoff: John is a PhD candidate in Computer Science at the University of Illinois Chicago studying under the tutelage of Chris Kanich. He is a principal analyst at NETSCOUT on the ATLAS Security Engineering and Response Team (ASERT). He currently serves as a research fellow at ICANN, sits on the NANOG program committee, and operates Dataplane.org. John’s primary career interests, experience, and expertise are in Internet infrastructure. He is particularly focused on better understanding and improving the routing system (BGP), the naming system (DNS), and internetwork security. John is or has been associated with a number of other organizations and projects involving Internet operations and research, some of which include: DNS-OARC, DePaul University, Dragon Research Group (DRG), IETF, FIRST, Internet2, Neustar - formerly UltraDNS, Northwestern University, nsp-security, ops-trust, REN-ISAC, and Team Cymru.
Speakers
  • Moderator John Kristoff - NETSCOUT / Dataplane.org

Diamond Sponsor:

Image Description

Platinum Sponsor:

Image Description

Gold Sponsor:

Image Description

Scavenger Hunt Sponsor:

Image Description

Game Sponsors:

Image Description
Image Description
Image Description

Monday Daily Sponsor:

Image Description

Virtual Meeting Fellowships Sponsor:

Image Description

Virtual Expo Sponsors:

Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description
Image Description

Service Sponsors:

Image Description
Image Description
Image Description