n86-hex-shadow

Join us in Hollywood, CA for NANOG 86

Our 86th community-wide gathering was 17-19 Oct 2022.

n86-keynote

NANOG 86 Keynote Speaker - Harlan Stenn

Tech Pioneer Talks about "The NTP Project" + the Importance of Timekeeping in Tech. 

Network Time Protocol (NTP) Project Manager + President of the Network Time Foundation, Harlan Stenn to the NANOG 86 Keynote stage!

Watch Now.

Keynote Talk Title: Me, NTP, The NTP Project, and Network Time Foundation - How We Got Here: Welcome to my Hallucination.

About Stenn: Harlan Stenn is a nearly 50-year veteran of the IT industry. Harlan began programming computers in high school in 1971. He holds a bachelors degree in Business Administration (Accounting) from The Colorado College in Colorado Springs, and an MSE in Computer Science from Washington University in St. Louis.

A well-versed entrepreneur, Harlan has launched several successful businesses and has been a respected, sought-after I/T consultant and contractor for decades who is well known for writing astonishingly portable C code since the early 1980s. To put it another way, if NTP is Dave Mills' edifice, Harlan is its janitor.

In mid-2011 he started Network Time Foundation (NTF), with the mission to provide direct services and support to improve the state of accurate computer network timekeeping. NTF now works with several time-related projects, including NTP, Ntimed, Linux PTP, RADclock, and the General Timestamp API and Library. The GTSAPI is a way to make sure that a timestamp contains enough information to be useful outside of the system on which it was “taken". Several new projects are in the works, including Khronos, and several SyncE packages.

Preface: History of the Network Time Foundation -  From the earliest days of human history, people have had a close relationship with time...

Computers aren't intelligent; they keep poor time. So how do global networks track when a transaction happened and the nanoseconds that make up a timestamp count? Learn More 


 

Dates Member Non Member Student Virtual
Early 11 JUL 2022 $675 $700 $100 $100
Standard 08 AUG 2022 $775 $800 $100 $100
Late 10 OCT 2022 $875 $900 $100 $100
Onsite 16 OCT 2022 $1,075 $1,100 $100 $100
NANOG Meeting Cancellation + Refund Policy

NANOG hopes everyone who registers for the meeting will be able to attend; however, we know extenuating circumstances do occur.
The NANOG cancellation and refund policies are as follows:
Any registration canceled between 11 Jul to 01 Oct, 2022 is refundable but will incur a $50.00 fee
Registrations canceled on 02 Oct to 15 Oct, 2022 is refundable but will incur a $100.00 fee
Registrations canceled on or after 16 Oct, 2022 will not receive a refund


NANOG Social Event Guest Pass: $50 per guest (purchase separately when you register, limit 2)


saber-tooth

The Engineer Approved List of Sightseeing in Hollywood

We have put together a list sure to stimulate the imagination of any tech pro while visiting the city.

Read More


n86-hotel

Hotel Information:

Headquarter Hotel
Hotel Guest Room Block

Loews Hollywood Hotel

1755 North Highland Ave.
Hollywood, CA 90028

Read More


2022-covid-survey

NANOG 86 Health + Safety

The health and safety of meeting attendees are very important to us. We believe the most effective way to ensure the safety of all attendees is to be fully vaccinated against COVID-19 . Please note that proof of vaccination will not be required to attend NANOG 86. Be aware that while NANOG will make every effort to reduce the risk of COVID-19 transmission on site, it is possible that you may come into contact with people that carry the virus through your travels.

Learn More


Be Aware. Any company offering to sell you the NANOG 86 Attendee list is fraudulent.


Coming soon to the NANOG 86 Stage

Full Abstract

How often do you find yourself doing the same set of commands when troubleshooting issues in your network? I am willing to bet the answer to this is quite often! Usually we have a list of our favorite commands that we will always use to quickly narrow down a specific problem type.

Switch reloaded unexpectedly? "show reload cause"
Fan failure? "show environment power"
Fiber link reporting high errors or down on your monitoring system? "show interface counters errors", "show interface transceiver", "show interface mac detail"

Outputs like the above examples help you quickly pinpoint the source of your failures for remediation. SSH'ing into the boxes and running these commands by hand is time consuming, especially if you are for example a NOC dealing with numerous failures throughout the day. Most switch platforms have API's now and you can instead program against them to get these outputs in seconds. I will go over a variety of examples and creative ways to use these scripts for optimal use of your troubleshooting time and to get you away from continually doing these repetitive tasks by hand.

NOTE: My tutorial examples will be using python and the Arista pyeapi module with Arista examples, but the concepts can easily be transferred to other platforms and languages.

Cat Gurinsky: Cat Gurinsky is a senior network engineer working on global large scale datacenter deployments. In previous network engineering roles for higher education and data center companies before that, she has worked on everything from enterprise and wireless deployments to internet exchanges and data centers. She first started working in network engineering in 2007 and began attending NANOG in 2009. Cat has previously served NANOG as part of the Development Committee from 2011-2012. She has served on the program committee since 2019 in the roles of secretary and vice-chair prior to becoming the current chair, which also makes her the current PC liaison on the NANOG board. Cat has a passion for BGP, Python, Arista eAPI, network tools, automation and anything that can help make life easier in large scale networks.
Full Abstract

Video-conferencing applications impose high loads and stringent performance requirements on the network. To better understand and manage these applications, we need effective ways to measure performance in the wild. For example, these measurements would help network operators in capacity planning, troubleshooting, and setting QoS policies. Unfortunately, large-scale measurements of production networks cannot rely on end-host cooperation, and an in-depth analysis of packet traces requires knowledge of the header formats. Zoom is one of the most sophisticated and popular applications, but it uses a proprietary network protocol. In this talk, we demystify how Zoom works at the packet level, and design techniques for analyzing Zoom performance from packet traces. We conduct systematic controlled experiments to discover the relevant unencrypted fields in Zoom packets, as well as how to group streams into meetings and how to identify peer-to-peer meetings. We show how to use the header fields to compute metrics like media bit rates, frame sizes and rates, and latency and jitter, and demonstrate the value of these fine-grained metrics on a 12-hour trace of Zoom traffic on our campus network.

Full Abstract

As network engineers begin adopting automation in their organizations, they inevitably encounter a range of challenges. These are typically accepted as necessary engineering hurdles that need to be overcome in order to bring automation into production, and are subsequently addressed with a mix of de facto standard tooling and traditional training. Unfortunately, this logical but simplistic strategy overlooks some powerful alternatives by which automation can be introduced and even adopted. Chances are, opportunities for accelerating network automation already exist in your organization.

In this practical talk we will discuss several alternative strategies to begin automating networks. Engineers who are struggling with the basics will learn new perspectives for addressing automation challenges. We will also introduce a flexible maturity model and a proposed framework for full-cycle automation deployment to aid in examining these uncommon paths to beginning network automation.

Full Abstract

Habits die hard, and the concepts of address allocation which are perfectly valid for IPv4 just don't work for IPv6, and in fact some IPv4 habits will technically break IPv6 routing efficiency.

This is a summary of good address allocation hygiene when people have large blocks to split up, based on RFC suggestions and fifteen years of operational experience in IPv6

Full Abstract

The December 2018 release of our NSF-funded study analyzing legal barriers to RPKI adoption revitalized interest in reforms to lower these barriers. In the fall of 2022, ARIN made important changes to its Relying Party Agreement and Registration Services Agreement designed to address the concerns raised by our report. This proposed session would offer a legal assessment of these recent developments.

Christopher Yoo: Christopher is one of the nation’s leading authorities on law and technology. Recognized as one of the most cited scholars in administrative and regulatory law as well as intellectual property, he is the coauthor of a major NSF-supported report on legal barriers to RPKI adoption. His other major research interests include studying innovative ways to connect more people to the Internet, assessing the impact of Internet connectivity on individual wellbeing, using technological principles to inform how the law can promote optimal interoperability, and network neutrality. He is also building innovative integrated interdisciplinary joint degree programs designed to produce a new generation of professionals with advanced training in both law and engineering. The author of more than 100 scholarly works, he testifies frequently before Congress, the Federal Communications Commission, the Federal Trade Commission, the U.S. Department of Justice, foreign governments, and international organizations. Before entering the academy, he clerked for the Hon. Anthony M. Kennedy of the Supreme Court of the U.S. and worked under the supervision of now-Chief Justice of the U.S. John G. Roberts, Jr., at Hogan & Hartson (now Hogan Lovells).
Full Abstract

Our current networks depend on fiber technology. This talk describes what it took to develop compact 400 Gigabit technology during the global pandemic. The current realities of compact 400g are discussed.
Presenter Len Bosack, founder of Cisco systems, oversaw the development of 400G products during lockdown and recovery. It was a bumpy ride. As the pandemic progressed, most of the back-room vendors had significant problems -- being crowned by the famous supply-chain collapse. At times, only one person was allowed in the building. Notwithstanding these, product development still happened. The XKL compact 400G products are the result.

Len Bosack: Len Bosack co-founded a small networking company called cisco systems. He made rapid progress in network speed and protocols.His current work at XKL is making the equipment for fast and reliable optical networks that are easy to deploy and operate.
Full Abstract

There are many platforms out there to help you automate your deployments and configurations of your network devices out there. This panel will cover some of the major ones such as Ansible, Puppet, Salt, Kubernetes, Nornir, Netmiko, Netpalm

We shall focus on:
1) When to start automating
2) Compare and contrast
— Matt Griswold – Ansible
— Mau Rojas – Kubernetes
— Rick – Puppet & Salt
— Thomas Donnelly – Nornir/Netmiko
— Nick Bogle - Netpalm / Rest Abstraction Layer
3) Also discuss languages:
— Kubernetes = Go
— Helm = go template
— Ansible = python
— The decisions you make now will gate evolution later
4) Source of Truth / Getting Started -> WHAT are you automating, touch on everyone's use cases

Cat Gurinsky: Cat Gurinsky is a senior network engineer working on global large scale datacenter deployments. In previous network engineering roles for higher education and data center companies before that, she has worked on everything from enterprise and wireless deployments to internet exchanges and data centers. She first started working in network engineering in 2007 and began attending NANOG in 2009. Cat has previously served NANOG as part of the Development Committee from 2011-2012. She has served on the program committee since 2019 in the roles of secretary and vice-chair prior to becoming the current chair, which also makes her the current PC liaison on the NANOG board. Cat has a passion for BGP, Python, Arista eAPI, network tools, automation and anything that can help make life easier in large scale networks.
Mauricio Rojas: Mau has been working in the IT Industry for more than two decades, most of this time, leading the introduction of new technologies for Data Centers and Cloud in new markets. Originally from Santiago of Chile, he's currently working as Principal Consulting Engineer for Network Automation and rPLM in Nokia, supporting US and Canada. Continuously testing the limits of use cases for Kubernetes and network automation tools in the Data Center and the Edge. Mau's also passionate with art (Instagram: p1nrojas), using what is left of his creativity at work into the canvas or digital illustrations.
Full Abstract

Advances in routing silicon and pluggable optics are enabling a new network architecture to converge traditional private line services onto a packet transport infrastructure. Private line emulation is cost-efficient for the delivery of high bandwidth, bit transparent and dedicated network connectivity services. In this session private line service attributes will be discussed and the key technology building blocks to deliver mission critical services in a fundamental new and beneficial way for both the end-customer and the provider

Full Abstract

gRIBI is a control plane gRPC service that enables an external entity (say a controller) to inject and query entries into a network device’s RIB. The data model to represent the entries reuses the OpenConfig Abstract Forwarding Table (AFT). Since the entries are injected into the RIB, there’s no need for the external entity to assume full ownership of the forwarding table nor be aware of all the forwarding entries. Programming operations are transactional with support for acknowledgements (per operation) of installed state in the device’s RIB and (hardware) FIB. Use of gRPC and AFT data model allows for vendor neutral support on the external entity.

Nandan Saha: Nandan is a software engineer at Arista Networks where over the last 11 years he's helped build various unicast routing features in Arista's EOS network operating system. Prior to Arista, Nandan has had shorter stints at Cisco systems working on the ASR1k platform and Wipro Technologies writing microcode for a networking SoC. Outside work, Nandan enjoys eating dark chocolate, watching food/travel youtube, reading history books and subjecting people to poor jokes.
Full Abstract

DE-CIX has been working on the introduction of EVPN on its peering platform since the beginning of 2022. Considering the increasing number of participants, especially in New York and Frankfurt, the introduction of EVPN, including ProxyARP/ND, is required to get the exponentially growing broadcast/multicast traffic in the Peering LANs under control and to reduce the load on customer routers. Additionally, further security features based on a ProxyARP/ND agent according to RFC 9161 are activated and the protocol stack of the DE-CIX global network will be expanded to include RSVP-TE and sBFD. In this presentation, we will present the course of the project, benefits, and side effects for DE-CIX customers explained in technical detail.

Full Abstract

In this presentation, we will provide a synopsis of the criminal DDoS-for-hire ecosystem; examine details of a simultaneous, internationally-orchestrated takedown of multiple DDoS-for-hire services in December of 2022; and assess the real-world impact of this action via statistical analysis of global DDoS attack activity.

John Kristoff: John is a PhD candidate in Computer Science at the University of Illinois Chicago studying under the tutelage of Chris Kanich. He is a principal analyst at NETSCOUT on the ATLAS Security Engineering and Response Team (ASERT). John is also adjunct faculty in the College of Computing and Digital Media at DePaul University. He currently serves as a research fellow at ICANN, sits on the NANOG program committee, and operates Dataplane.org.
Full Abstract

Overview of the Fundamental components for Kubernetes that every Network Professional should know: Intro to Network Namespaces and the fundamentals of Pods and how they communicate in a Kubernetes Cluster. K8s services like NodePort and LoadBalancer. An overview about CNI plugins, the built-in ones and the ones available in the market (i.e. Calico, Cilium). Comparison between the most popular CNI Plugins. Why multus is so important in Telco? Security Policies.
About the last trends regarding Segment Routing (SRv6 and Cilium) and Kubernetes, Customer Resource Definitions for Network Orchestration (i.e. Nephio) and eBPF vs iptables.

Mauricio Rojas: Mau has been working in the IT Industry for more than two decades, most of this time, leading the introduction of new technologies for Data Centers and Cloud in new markets. Originally from Santiago of Chile, he's currently working as Principal Consulting Engineer for Network Automation and rPLM in Nokia, supporting US and Canada. Continuously testing the limits of use cases for Kubernetes and network automation tools in the Data Center and the Edge. Mau's also passionate with art (Instagram: p1nrojas), using what is left of his creativity at work into the canvas or digital illustrations.
Full Abstract

This presentation discusses Imposter Syndrome, the silent myth that so many of us in Networking face. I dissect this myth with the audience, and provide real world examples of how they can overcome it. My examples focus on the Network Automation field, and how this feeling is even more prevalent as a Network Automation Engineer compared to other, more traditional IT roles.

Matt Vitale: I started as a network engineer in retail back in 2007, and have worked on various networking projects across a few different companies and industries over the next decade. Around 2016, I started focusing on scripting and network automation, eventually moving into a full-time network automation role in 2018, and have been doing that ever since. In my spare time, I enjoy anything outdoors (hiking, camping, etc), reading, and working on my car.
Full Abstract

Managing and maintaining highly scalable networks has historically been a challenging task. A plethora of ISPs/CSPs have been trying to simplify processes and procedures; yet this task gets more complicated as they are faced with the growing cost pressure of supporting today’s IP network traffic demands (driven by video, gaming, and remote working) and future 5G traffic volumes. All these trends and market forces are forcing cable operators to rethink and rearchitect their legacy IP networks and operations in ways that can give them a competitive edge.

The intent of this presentation is first to describe why distributed disaggregated services such as a Disaggregated Distributed Chassis (DDC) will be paramount for the success of ISPs/CSPs. It will examine how these services differ from traditional architectures, and which operational processes, engineering skills and supporting tools are needed. It will showcase an example of the DDC model deployed in the production environment of one of the largest cable operators in the world. It also will provide insights on how to improve network availability and reliability thanks to a smaller “blast radius” for outages.

Furthermore, this paper will illustrate seamless ways of provisioning services and managing various elements of the cluster in an easy automated fashion. It will expand upon service assurance and the ways it can be achieved in a truly cloud-native network. It also will discuss integration into OSS/BSS systems using an open platform (for example, one that uses open interfaces and data models such as OpenConfig and NETCONF/YANG and complies with industry standards).

Additionally, it will discuss several key operational considerations and challenges (such as reliability, compatibility, openness, and ease of technology upgrades) that cable operators should consider when evaluating the routing architecture for their network. The orchestration system that manages and monitors the DDC and provides zero-touch provisioning will be described along with problems that it solves when compared with scale-up and horizontal disaggregation platforms. For example, legacy vertical scaling of big-iron refrigerator routers poses the following mechanical and physical challenges that DDC architecture sets out to solve:
• Port density
• Cabling density
• Scale-out growth
• Power density
• Cooling density

In summation, ISPs/CSPs’ interest in network disaggregation has been growing, driven by a variety of motives such as cost reduction, the removal of vendor lock-in and service innovation. Readers will have a granular understanding of the operational impacts of the DDC approach, and how networks can be managed in a more cloud-like and orchestrated manner. They will also achieve a clear vision for solving operational and business challenges before embarking on a disaggregation project.

Aliraza Bhimani: Comcast Cable
Full Abstract

We will be presenting 2 hours of related content regarding the current uncertainty in the employment/career market.

Title: What You Can Do in Times of Uncertainty
Speaker: Caron Hummer – in person
Time: 1 hour (to include Q&A)

Panel Discussion: Title in Progress (TBD)
Speakers: 3-4 HR / Recruiting leaders – expected to be in person
Time: 1 hour

Full Abstract

The idea is to share the impact and the records that the FIFA World Cup 2022 generated over the Internet, and also the users. Warning NANOG that the next one is going to be in USA, Canada and Mexico, so better get ready for new records.

Showing how capacity on the customers or peers should be ready for events with this characteristic to let the users use the internet without bad experiences.

Agustín Speziale: From Buenos Aires, Argentina with more than 20 years working in the industry, now as Mgr. Product Management at Cirion Technologies. Magister in Business Administration, degree in Information System and graduated in a specialization of project management.
Full Abstract

IPv4 is exhausted. We can do a better job of being efficient with our IPv4 utilization while also making IPv6 a reality in our networks. The perfection combination is dual-stacking IPv4 CGNAT and IPv6. Utilizing RFC6598 space, we can extend a dedicated VLAN per customer to make IPv6 EUI-64 possible without running out of IPv4 space to assign with it.

Full Abstract

Synopsis: Measurement Lab and Cloudflare want to empower network operators with free and open access to data that represents their user’s experience. Our presentation will:

1. Discuss how end-users define “good Internet” and how AIMScore defines the answer
2. Announce the free and open availability of AIMScore data that enable network operators to get actionable insights from CloudFlare and Measurement Lab’s speed tests
3.Solicit feedback from NANOG community about access and usability of the data and discuss future milestones

Running a distributed network is a challenge by itself, but ensuring that users are having a good experience on that network adds a layer of complexity that can make anyone’s head spin. It’s hard enough ensuring that users can reach the Internet through your network, but ensuring that they can access a myriad of services and applications at peak performance for each is orders of magnitude harder, especially when each application has a different concept of what peak performance looks like. To put it another way: it’s hard enough to know if every user on your network can access Discord, Netflix, and Dota reliably, but it’s even harder to know if every user on your network has a good experience accessing those services because each of those have completely different understandings of what it means to have a good experience.

The way we use the Internet on top of a network is ever changing, and the success criteria for the ways we use the Internet is also constantly changing. New metrics like responsiveness are being developed and rolled out to help track these new criteria. Being able to make sure that users have a good experience on your network no matter what is critical for customer retention and cost efficiency. If people have a good experience, they’ll keep using your network. And if people have a good experience, they won’t call support and try and get things fixed.

We are proposing a framework and data set that will not only give you insight into what applications consider success, but ways to programmatically detect when users in your network are experiencing degradations from success: Aggregated Internet Measurement

Full Abstract

Recent research studies highlighted a phenomenon known as “BGP zombies", which refers to active RIB entries for prefixes that have been withdrawn, but still persist in BGP routing tables.
The research has investigated the prevalence and characteristics of BGP zombies, with a focus on data collected from RIPE RIS, and found that ASes announcing a high number of prefixes, and also prefixes with a higher degree of "noise" (e.g. BGP beacons), are more likely to have BGP zombies.
In this presentation, we aim to raise awareness to the BGP zombie phenomenon and extend previous work by investigating:

• the identification of BGP zombies using a BGP monitoring platform other than RIPE RIS (namely the Code BGP Platform) will yield comparable results to those obtained from RIS Live
• whether announcing a limited number of new prefixes, originated from a new AS not announcing other prefixes, will still result in BGP zombies

Our results reveal that BGP zombies are a pervasive problem in the Internet routing system, regardless of the monitoring platform and prefix announcement characteristics utilized. We advocate that monitoring platforms should develop mechanisms for accurately identifying and labeling BGP routes as zombies, as well as implementing strategies for promptly alerting users to their presence in order to mitigate the potential negative effects they may have on network stability and performance.

Lefteris Manassakis: Network engineer who has shifted his focus on networking research, while recently became a founder/entrepreneur. Co-founder and Chief Operating Officer at Code BGP (https://www.codebgp.com/). Prior to founding Code BGP, I worked for 5 years at the Foundation for Research and Technology - Hellas (FORTH) as a research engineer, and a member of the INSPIRE research group. For more info, please check my personal web page: https://manassakis.net/
Full Abstract

400ZR and its variations have been the most successful development in optical networking in decades, with over 200k modules shipped in 2022, just two years after introduction. 400ZR has changed the way datacenters are interconnected and changed the way datacenters are designed. In this presentation, the speaker will show the current status of 400ZR development and deployment, how it is changing network designs, and explain what is coming next.

Scott Wilkinson: Scott Wilkinson has worked directly in the telecommunications industry for over 25 years, during which he accumulated extensive experience in optical networking, fiber to the home, long haul optical technology, carrier ethernet, MPLS, and SDN/NFV-enabled networks. As Lead Analyst at Cignal AI, he conducts quantitative and qualitative research on the optical components market. Dr. Wilkinson held senior positions in product management, technical marketing, and systems engineering for Hitachi, ECI Telecom, MRV, Fujitsu, and startup companies Kestrel Solutions, and Parama Networks. A noted speaker at telecom conferences and events such as NGON, OFC, and FTTH, Wilkinson is also a frequent contributor to trade publications and is the author of the book “Telecommedy”. Wilkinson has a Bachelor of Electrical Engineering degree and a Ph.D. in Electrical Engineering from the Georgia Institute of Technology.
Full Abstract

When an IP network is congested, operators could take advantage of the channel margins in the underlying optical network and increase capacity of the IP links. Although channel margins are required for the long-term health of the optical service, it might be possible to tap into the margin while the IP network is being repaired. We present a new converged Traffic Engineering SDN approach that looks at the IP and optical layers of the network holistically to help operators alleviate IP congestion.

Full Abstract

The need to reliably monitor today’s ever-growing networks in the WAN, edge, and data center domains is now more critical than ever. The industry relies largely on SNMP to monitor present networks, a protocol that falls short when used to monitor large networks let alone the increasingly complex networks of the future.

Openconfig's gRPC-based streaming telemetry protocol, gNMI is considered by many to be the prime successor to SNMP. It packs features to build modern monitoring stacks, such as a push-based telemetry model, reliable transport, default TLS security, data model-based access to monitored data leaves, and exceptional performance on the wire.

This tutorial introduces gNMIc, an open-source software suite which blends together a feature-rich gNMI CLI client and a performant, highly-available telemetry collector. Focusing on gNMI-based streaming telemetry, gNMIc sets itself apart from other general-purpose collectors with unique features including high availability and clustering of collector instances, rich data processing pipelines, sheer support for various outputs for metrics, and embedded caching, to name a few.

By the end of this session, participants will understand how gNMIc can be used to configure network devices, and building a modern open-source telemetry stack comprised of a collector, time-series DB, and visualization layer.

Karim Radhouani: Karim Radhouani is a Network Automation engineer at Nokia and an active contributor to multiple open source projects. At Nokia Karim builds network automation tools used both inside and outside of Nokia.
Roman Dodin: Roman Dodin is a Product Line Manager at Nokia and a vivid member of various communities built around network automation. He is an active contributor to the open source projects in the field of network programmability and a maintainer of the containerlab project. At Nokia Roman is governing the evolution of Nokia SR Linux NetOps Development Kit and is busy building communities revolving around SR Linux programmable interfaces.
Full Abstract

ARIN is a nonprofit, member-based organization that administers IP addresses & ASNs in support of the operation and growth of the Internet. Hear from ARIN’s Chief Customer Officer on where the organization sits with IPv6 growth, IPv4 Waitlist and Transfer stats, along with other notable updates across our programs and services.

John Sweeting: John Sweeting is the Chief Customer Officer of the American Registry for Internet Numbers (ARIN), responsible for the overall development, direction and operation of the department. Prior to joining ARIN staff, he served 12 years on the ARIN Advisory Council, 6 of which he was the Chair, and 1 year on the Address Supporting Organization’s Address Council (ASO AC). John served on the Consolidated RIR IANA Stewardship Proposal (CRISP) team which was convened in December 2014 to guide development of the Number Community response to the IANA Stewardship Transition Coordination Group’s RFP.
Full Abstract

Pluggable Digital Coherent Optics (DCO) is a breakthrough technology that allows routers to integrate state of the art coherent DWDM interfaces without the need for specialized hardware. This is possible thanks to the incredible power efficiencies and compactness of recent DCO implementations over QSFP56-DD and other transceivers that can be deployed directly into standard 400GE host ports. Replacing traditional DWDM transponders by pluggable DCO significantly lowers the cost of building high-speed networks with massive capacity and extended reaches. Even greater gains in cost efficiencies are possible with Routed Optical Networking, a novel network architecture that couples DCO with innovations in IP/MPLS, management and automation to build a fully converged and programmable network architecture optimized at the packet switching layer.

As the industry embraces DCO, adoption increases and new use cases are explored, questions about how to manage this technology when deployed in the routers emerge. What are the new optical parameters that DCO expose to the router? How to leverage them for pro-active fiber and DWDM performance management? How to give visibility of that data to fellow transport operations teams and data lakes without exposing the IP network details?

This session will present DCO technology covering its basic concepts, the new optical signal monitoring capabilities enabled by its built-in the Digital Signal Processors (DSPs) and transport encapsulations, and how they can be used to enhance IP networks and their operations. It will also discuss the state of the industry standards and open networking initiatives that can be leveraged to build a multi-vendor ecosystem.

Full Abstract

Cloud Network Engineering: A closer look at a new career path

What will be presented
Cloud Network Engineering as a career path; Soup to Nuts. This is a 60 minutes presentation to introduce the emerging career of a CNE or Cloud Network Engineer.

We believe this career has roots deep in a few different engineering fields such as network, systems and security engineering. This will be covered as part of the “intro” (part 1).

In the second part the presenter will move on to the responsibilities and required skillsets (Part 2).

Why do we need this session?
The most recent NANOG surveys have showed us that many participants are interested in learning about career development. Furthermore, a brief field study reveals that very little research has been conducted in this field although today there are over 19,700 postings for this type of candidates exist on LinkedIn. Finally, I believe this session has other potentials including attracting sponsors and its recoding for years to come will be used as a reference by thousands of people.

Who is our target audience?
Network engineers and operators almost in any part of their career.
Hiring managers in the field of network and cloud engineering.
Talent advisors.
Technical content developers and vendors.

Kam Agahian: Kam is the director of cloud engineering with Oracle in Southern California with over 24 years of experience in designing and implementing complex network architectures. Over the years Kam has interviewed over 1000 candidates in North America, APAC and EMEA for various network engineering and leadership positions. Kam has previously presented at NANOG77 in Austin, TX and NANOG75 in Washington DC on IPv6 over MPLS and network engineering job interview processes. You can follow his random thoughts on Twitter.
Full Abstract

Network Engineering Jeopardy will consist of three teams competing for all the glory!

Charles Rumford: Charles currently works for Deft as a lead network and automation engineer on the operations team. His main responsibilities include routing, network design, systems administration, network design, and automation. "Making events non-events" and "no one should know we've done anything" are his primary guiding principles for designs and work. Usability and security are of great interest to Charles as well. Outside of the work space, Charles doesn't stray to far from the technology path. He serves on the planning committees for The WOPR Summit and the Blue Team Village @ DEFCON. His primary roles are to support conference IT infrastructure, speaker operations, and community development. Outside of the technology space, Charles is very active in the Philadelphia Guild of Change Ringers serving as treasurer, steeple keeper, and educator. He also finds enjoyment in the orchestra, knitting, musical theater, and cycling.
Full Abstract

Sophisticated attackers, typically nation-state actors, have begun to leverage access to key DNS infrastructure to then hijack target organization domains. Target organizations now not only
include government domains, but also large network operators. Most concerningly, these domain hijacks bypass traditional DNS protections, and are imperceptible to the users. In this talk, we describe our methodology for identifying domain hijacks in the wild, and our results from using this methodology to identify a range of victims demonstrating that domain hijacks have evolved into a favored intrusion tactic. Finally, we also discuss what these findings mean for organizations looking to secure their infrastructure.

Full Abstract

This talk will explore the potential use cases for ChatGPT in network engineering, including automating configuration management, troubleshooting, and documentation. Examples will be provided of how ChatGPT has been used to assist in these tasks for popular vendors such as Cisco and Juniper. Additionally, the challenges and limitations of using ChatGPT in network engineering will be discussed. The talk will provide an overview of the benefits and possibilities of using ChatGPT in network engineering and how it can help network engineers to focus on more critical tasks.

ChatGPT Prompt: Can you create an outline for a 30 minute talk about how ChatGPT could be used by network engineers in their daily duties?

ChatGPT Response: I'd be happy to help! Here's an outline for a 30-minute talk on how ChatGPT could be used by network engineers in their daily duties:

ChatGPT Prompt: Can you write an abstract for this talk?

ChatGPT Response: The use of ChatGPT, a large language model developed by OpenAI, in network engineering can help to automate repetitive and time-consuming tasks, reduce human error, and improve the efficiency and accuracy of network operations.

Full Abstract

We analyze the properties of 712 prefixes that appeared in Spamhaus’
Don’t Route Or Peer (DROP) list over a nearly three-year period
from June 2019 to March 2022. We show that attackers are subverting multiple defenses against malicious use of address space,
including creating fraudulent Internet Routing Registry records for
prefixes shortly before using them. Other attackers disguised their
activities by announcing routes with spoofed origin ASes consistent
with historic route announcements, and in one case, with the ASN
in a Route Origin Authorization. We quantify the substantial and
actively-exploited attack surface in unrouted address space, which
warrants reconsideration of RPKI eligibility restrictions by RIRs,
and reconsideration of AS0 policies by both operators and RIRs.


peering

Apply for the Peering Coordination Forum

The Peering Coordination Forum is a 90-minute session to be held on 17 OCT during the NANOG 86 conference. The forum provides time for attendees to meet and network with others in the peering community present at NANOG. NANOG 86 Peering Coordination Forum applications will remain open until we have 20 applications or 10 OCT.

Learn More


Diamond Sponsor

Verisign

Platinum Sponsors

AWS
arin
ciena
equinix

Gold Sponsors

f5
Imperva
QTS
Telstra
Verisign