Join us in Atlanta, GA for NANOG 87

Join us in Atlanta, GA for NANOG 87

Register now for our community-wide gathering, 13-15 Feb 2023

Register Now


n87-hex-shadow

Atlanta, GA | NANOG 87

Our 87th community-wide gathering was 13 - 15, February 2023.


n87-elad

The Future is Now: Delivering the Next Generation Brilliant Network

Keynote Speaker: Chief Network Officer, Comcast | Elad Nafshi

Talk Description: Elad Nafshi will share how 10G network technologies are evolving connected experiences in real time, even as they continue to get smarter, faster, more reliable, and secure for future generations.

Elad's Keynote is scheduled for 10:15 am on Monday.


n87-bailey

A Security Practitioner’s Guide to Internet Measurement

Keynote Speaker: Professor, School of Cybersecurity and Privacy at the Georgia Institute of Technology | Michael Bailey

Talk Description: Over the last 20 years, Bailey and his colleagues have been engaged in understanding and improving the Internet through large-scale measurement and data. Their work focuses on improving these components' security and availability properties. Surprisingly, their approach today can best be understood not through traditional network measurement, but through security principles. Bailey will argue that this philosophy is worthy of emulation.

Michael's Keynote is scheduled for 10 am on Tuesday.


n87-registration-02

Registration

NANOG registration fees : NANOG registration fees are in USD and include the following:
Access to general and breakout sessions, Breakfast Daily, Lunch on the first two days of the event, Entry to all social/networking events

Guest Passes: NANOG attendees are permitted to bring a guest to our social events for an additional fee. Purchase is required during registration.

Cancel/Change/Modify Registration: To cancel registration or change attendance from in-person to virtual, send an email to [email protected]. To modify your registration details or view your invoice login to your NANOG Profile.
To Modify: My Account > My Profile > Registered Events > NANOG 87 > “Edit” link on the right side of the table.
For Invoice: My Account > My Profile > Invoices > Your previous Invoices are listed with a link on the right side of the table.

Dates Member Non Member Student Virtual
Early 15 NOV 2022 $675 $700 $100 $100
Standard 13 DEC 2022 $775 $800 $100 $100
Late 24 JAN 2023 $875 $900 $100 $100
Onsite 12 FEB 2023 $1,075 $1,100 $100 $100
NANOG Meeting Cancellation + Refund Policy

NANOG hopes everyone who registers for the meeting will be able to attend; however, we know extenuating circumstances do occur.

NANOG cancellation and refund policies are as follows:
Any registration canceled between 15 Nov 2022 to 29 Jan, 2023 is refundable but will incur a $50.00 fee
Registrations canceled on 30 Jan 2023 to 11 Feb, 2023 is refundable but will incur a $100.00 fee
Registrations canceled on or after 12 Feb, 2023 will not receive a refund

Monday Night NANOG Social Event Guest Pass: $50 per guest (purchase separately when you register, limit 2)
Tuesday Night Beer N Gear Guest Pass: $50 per guest (purchase separately when you register, limit 1)
Register Now


n87-hotel-room

NANOG 87 Hotel Information

Headquarter Hotel ​

Atlanta Marriott Marquis

265 Peachtree Center Ave NE
Atlanta, GA 30303

Read More


n87-bng-2

Social Events

Our community is what makes NANOG special. Connect + network at these awesome daily social events during NANOG 87! Social events were sponsored by Akamai, Community IX and Team Cymru, Arelion, Bandwidth IG, and Flexential.

Learn More


experience-atlanta-image

Experience Atlanta

Resources for our attendees including info on restaurants, things to do, discounts and special offers.

Experience Atlanta


Sneak Peak for NANOG 87

Full agenda is now posted - check it out!

Full Abstract

NANOG Jeopardy is back with better software, better buzzer, and fun new topics!

Charles Rumford: Charles currently works for Deft as a lead network and automation engineer on the operations team. His main responsibilities include routing, network design, systems administration, network design, and automation. "Making events non-events" and "no one should know we've done anything" are his primary guiding principles for designs and work. Usability and security are of great interest to Charles as well. Outside of the work space, Charles doesn't stray to far from the technology path. He serves on the planning committees for The WOPR Summit and the Blue Team Village @ DEFCON. His primary roles are to support conference IT infrastructure, speaker operations, and community development. Outside of the technology space, Charles is very active in the Philadelphia Guild of Change Ringers serving as treasurer, steeple keeper, and educator. He also finds enjoyment in the orchestra, knitting, musical theater, and cycling.
Full Abstract

The 50th anniversary of Ethernet technology is this year!

"The History and Future of the Ethernet"

This talk will be a retrospective for Ethernet as a technology as the birth of Ethernet was back in May 22, 1973, when Bob Metcalfe wrote a memo to the PARC management explaining how Ethernet would work. Ethernet has come a long way since then and May 22 2023 Ethernet will celebrate 50th birthday. The talk will look at what Ethernet was back in 1973, what it is today and where the technology is heading.

Mikael Holmberg: Mikael Holmberg is a Distinguished Engineer and member of the CTO office at Extreme Networks. He is an experienced professional in networking architectures and technologies who has worked in the computer networking and telecommunications industry for over 30 years.
Full Abstract

We need to build optical networks in multiples of 400G lanes – 400G/800G/1200G and so on – to transport data center traffic that is growing in multiples of 400GbE. The presentation shows how the industry is leveraging progress in DSP technology to create two complementary types of 0dBm transceiver solutions to meet different needs: 1) proprietary capacity-reach optimized transceivers that maximize channel capacity for any distance, including regional coverage 800G and short haul 1200G in 2023, and 2) standard cost-power optimized transceivers that provide strong enough performance for most metro applications, including 400G in 2023 and 800G in 2024. The presentation also shows how these solutions can operate together on the same fiber using a rational 75GHz/150GHz channel plan.

Filipe Correia: I am a Business Development Manager for Tier 1 service providers in North America, focused on Ribbon's IP, Optical, and Automation portfolio since 2021. In the past, I was also Regional Product Line Manager and Consulting Engineer in Nokia Networks’ IP & Optical Network Division, focused on IP portfolio, network automation and optimization solutions including Software Defined Network (SDN) Controllers for enterprise, web scale, and provider networks. I am a regular speaker at network and industry conferences. Currently based in Dallas, TX, and have more than 23 years of experience in telecommunications across Ribbon Communications, Nokia and Alcatel-Lucent as well as over 16 years focused in the IP division working on Enterprise and Service Provider IP/MPLS networks. Along the way, I've also lived and supported Asian Pacific accounts out of Melbourne, Australia, focused on IP/MPLS networks, which has given me a great view of network implementations across regions.
Full Abstract

Are you struggling with load balancing in your on-premises Kubernetes cluster? Do you wish to have the same level of automation and experience as the Public Cloud? Look no further! In this presentation, we will guide you through defining your own on-premises Kubernetes LoadBalancer service using BGP through the Datacenter Fabric and bringing true load balancing across the leaf switches with ECMP.
We will demonstrate how to set up a demo from scratch using open-source tools like Containerlab, MetalLB, and Kubernetes Kind. MetalLB is one of the most widely used open-source load balancer projects in enterprises and is suitable for telco use cases like IoT or 5G edge designs. Kubernetes Kind is a tool for running local Kubernetes clusters using Docker container “nodes” and can be used for local development or CI.
This presentation is intended for audiences with any level of skills. We will provide all the necessary elements in a Github repository at https://github.com/cloud-native-everything/metallb-srl-nanog89, which you can use to try in advance or after the session. We are also developing an app to make this lab more automated, which can be executed with just one command. We welcome any collaboration on this project.
Don't miss this opportunity to learn how to bring true load balancing to your on-premises Kubernetes cluster.

Mauricio Rojas: Mau has been working in the IT Industry for more than two decades, most of this time, leading the introduction of new technologies for Data Centers and Cloud in new markets. Originally from Santiago of Chile, he's currently working as Principal Consulting Engineer for Network Automation and rPLM in Nokia, supporting US and Canada. Continuously testing the limits of use cases for Kubernetes and network automation tools in the Data Center and the Edge. Mau's also passionate with art (Instagram: p1nrojas), using what is left of his creativity at work into the canvas or digital illustrations.
Full Abstract

There are two major well known BGP collection projects out there, RIPE RIS and the University of Oregon Route Views.

But did you know there is a 3rd one that bgp.tools operates?

In this talk I will show bgp.tools runs it's 1000+ session BGP collector, and how the rest of the site works, what it can do, and what bgp.tools is doing to come closer physically to networks for route collection where possible!

Full Abstract

BGP and it's implementations are very sensitive places to find bugs, During validation testing for one the products I was working on I ended up discovering a bug in a vendors BGP implementation, that inspired me to explore the entire bug class on all of the other vendors. What I found was a large range of problems that ultimately could be used to partition large sections of the internet. Join me in finding out what these bugs are, why they are so deadly, and how I found them!

Full Abstract

The Border Gateway Protocol is vulnerable to IP prefix hijacks, enabling a range of attacks. The Resource Public Key Infrastructure (RPKI) was introduced to tackle the security problems of BGP with attestations on the valid ownership of IP resources by Autonomous Systems (ASes).
Securing BGP and understanding the limitations of current security solutions is a very timely and important topic, as is also shown by the recent inquiry into Internet routing vulnerabilities launched by the FCC.
In this talk we will illustrate how the vulnerability in the Internet can be measured by running active attacks on BGP with self-own resources. We use the presented technique to show that the Internet of today is still vulnerable to origin hijacks. Encouragingly, our results also indicate increasing deployment of the RPKI to protect against the attacks.
We found that over 27% of observed networks use the RPKI to validate routes in BGP updates.
We add a mathematical graph-analysis to our measurements to quantify how current RPKI deployments block propagation of hijacks and surprisingly find that ROV enforcement in Internet Exchange Point (IXP) routeservers does not prevent global propagation of hijacks.
We observe that our attacks were leaked over almost all IXP routing LANs despite ROV enforcement in their respective routeservers. Our evaluations show that the leaks occur due to a high prevalence of direct sessions between IXP customers, circumventing routeserver ROV and spreading our attacks. IXPs thus only provide local protection to sessions of their routeserver, but they hardly limit the global spread of our attacks.
On the other hand, we demonstrate that large providers have a strong impact on limiting the global spread of our prefix hijacks. We thus emphasize that deploying RPKI validation on large providers provides a strong collateral protection. We further want to encourage operators to either move IXP sessions to the routeserver or implement ROV in their own routers.

Niklas Vogel: Niklas Vogel is a first year PHD student at Goethe University Frankfurt. His research is focussed on routing security, mostly looking into RPKI software and measurements. The aim of his research is to bring RPKI forward, aiding its deployment to reach wide protection of the internet.
Full Abstract

The Border Gateway Protocol (BGP) serves as the backbone of the internet, yet it's not without its security concerns. This talk introduces the Resource Public Key Infrastructure (RPKI), a solution addressing these vulnerabilities. We'll delve into RPKI's basics, its workings, and its adoption rates within the RIPE NCC area. By also spotlighting statistics from North America, we'll offer a broader view of RPKI's significance in bolstering global routing security. Join us to understand how RPKI is reshaping internet safety.

Alastair Strachan: Alastair Strachan is the Community Development Officer at the RIPE NCC. In this role, he works to strengthen the RIPE NCC's engagement with the RIPE NCC membership, the RIPE community, government, law enforcement and other Internet stakeholders. Alastair coordinates the RIPE NCC Community Projects Fund which gives funding to non-commercial projects that benefit the RIPE community.
Full Abstract

This presentation will be an update of what's been going on at Network Time Foundation in general, and a status update for its NTP, LinuxPTP, libptpmgmt, Khronos, and SyncE Projects.

Full Abstract

Engineering Teams have always struggled to create meaningful hardware-based infrastructure lab environments for such tasks as mocking up networks and simulating design changes, practicing major migrations before touching production networks, or training new users with hands-on experiences that emulate their own networks. These hardware-based labs are expensive to build up and difficult to maintain. In addition, with a push for learning Network Automation and new Cloud-Based Management Solutions, a dev-ops environment to experiment with these tools against infrastructure is a must.

While simulated network tools have been around for quite some time, I'd like to share some my recent experience and success in utilizing an easy to implement and low-cost tool to provide a simulated sandbox environment for some of the above initiatives. Some of the referenced initiatives have been geared toward internal engineering teams, while others have been customer facing for training and Proof-of-Concept initiatives.

Michael Carey, a Senior Solutions Architect, will present on some of what has been learned along the way utilizing this tool, EVE-NG, to show how to easily get this tool up and running in various environments, provide some ideas for where to start with the vendor emulation environments, and discuss some of the benefits this environment can provide to your engineering staff and/or customers.

Michael Carey: Michael Carey is a Senior Solutions Architect within the Commercial East Sales Architecture team at ConvergeOne. His previous role as a Lead Solutions Architect at ConvergeOne and Integration Partners focused on multi-vendor Network Fabric architectures and designs, developing and utilizing Network Automation tools, and leading the Mid-Atlantic Post-Sales Engineering efforts. Prior to joining ConvergeOne, Michael held positions as the Lead Network Engineer and Director of Network Operations with the Keystone Initiative for Network Based Education & Research (KINBER) designing, building, and managing Pennsylvania's Research and Education Network (PennREN). Michael has previous Network Design, Implementation, and Network Management experience at UPS Logistics Group, Tidelands-Georgetown Hospital Systems, and Penn State University. Michael is a graduate of Penn State University and resides in State College, Pennsylvania.
Full Abstract

Routing security is a foundational aspect of maintaining a stable and secure Internet infrastructure. Within this context, the IRR data plays a critical role in managing routing information. However, the presence of stale and incorrect data in unauthenticated IRR databases introduces significant challenges to routing security.

Stale data in IRR db refers to routing information that is outdated or no longer valid. It can arise due to delays in updating or purging obsolete route announcements. The consequence of stale data can be lead to mis origination accepted as valid, causing traffic to take inefficient or insecure paths, which could have serious implications for network performance and security.

We are going to explore some data related to ARIN allocations in RADb, one of the major IRR db service available, addressing concerns such as inaccurate/stale data is a complex endeavour. Solutions include the adoption of Resource Public Key Infrastructure (RPKI) but we don't have enough uptake to completely replace IRR. We are not suggesting a single step to resolve everything, lets look at the data and find out how it can be resolved collectively.

Aftab Siddiqui: Aftab Siddiqui is the Senior Internet Technology Manager atthe Internet Society and leading the MANRS (Mutually Agreed Norms for Routing Security) initiative. MANRS is a global community driven initiative encouraging network service providers, Internet exchange points, Cloud and CDN operators to implement basic network security measures to secure the global routing system. He is based in Sydney, Australia. Before joining ISOC he was working with a system integrator as its Chief Technologist in Sydney. He has vast experience in the service provider sector, he spent almost a decade at Cybernet (one of the largest ISP in Pakistan) leading the Network Operations and Projects team. He is a regular presenter in various technology events like SANOG, APNIC/APRICOT, MENOG and other national NOGs. Currently, serving as the Chair of Routing Security SIG at APNIC.
Full Abstract

For the past 20 years, Internet telescopes have been a de facto standard for large-scale measurement of adversarial behavior on the Internet. However, as service deployment continues to concentrate on public clouds, and as adversaries become more sophisticated, conventional darknet telescopes can miss traffic phenomena, reducing situational awareness and putting services at risk. In response to the changing Internet landscape, we build DScope, a cloud-native Internet telescope. DScope works by leveraging cloud provider IP address pools, meaning it is located in-situ with the valuable targets for adversaries. DScope’s IP address footprint changes constantly, preventing attackers from identifying and avoiding the telescope. Finally, DScope IP addresses are backed by compute that allows for interactivity. DScope uses Linux Netfilter to NAT traffic to a transport-layer honeypot across all TCP ports.

Fundamentally, DScope aims to achieve quality (representativity of traffic) over quantity (total number of telescope IPs). In so doing, we challenge two long-held assumptions in the Internet measurement community: (1) that scanning is random, and so large darknet telescopes have good coverage, and (2) that IPs must be held for long durations to achieve high coverage of phenomena. To evaluate these assumptions, we compared DScope against Merit’s ORION darknet telescope, finding a broad class of cloud-targeted (non-random) traffic that is invisible to these conventional techniques. We also found surprising evidence that optimal measurement actually holds IP addresses for a relatively short time (8 minutes on AWS), as opposed to holding IPs for a long duration.

We are making DScope’s data available to researchers and practitioners to improve situational awareness about emergent threats, as well as to enable improvements to the security of deployed services. We are also soliciting collaboration with network operators and security practitioners towards expanding DScope’s vantage point.

Eric Pauley: Eric Pauley is a Ph.D. candidate and NSF Graduate Research Fellow at the University of Wisconsin–Madison. His research focuses on how public cloud deployment models upend existing assumptions about networks and the way we measure them. His work developing new cloud-based network vantage points has led cloud providers to improve security for tenants and their customers, and has yielded broad insights on security-relevant Internet phenomena. Eric is the co-founder and former CTO of the email marketing technology company Sendtric, which drives conversions for companies from small business to the Fortune 500. He is an instrument-rated private pilot, as well as an avid backpacker and rock climber.
Full Abstract

ARIN is a nonprofit, member-based organization that administers IP addresses and ASNs in support of the operation and growth of the Internet. Hear from ARIN's Chief Customer Officer on where the organization sits with IPv6 growth, IPv4 Waitlist and Transfer stats, along with other notable organizational updates.

John Sweeting: John Sweeting is the Chief Customer Officer of the American Registry for Internet Numbers (ARIN), responsible for the overall development, direction and operation of the department. Prior to joining ARIN staff, he served 12 years on the ARIN Advisory Council, 6 of which he was the Chair, and 1 year on the Address Supporting Organization’s Address Council (ASO AC). John served on the Consolidated RIR IANA Stewardship Proposal (CRISP) team which was convened in December 2014 to guide development of the Number Community response to the IANA Stewardship Transition Coordination Group’s RFP.
Full Abstract

In this talk, we describe procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This type of AS_PATH verification provides detection and mitigation of route leaks and improbable AS paths. It also to some degree provides protection against prefix hijacks with forged-origin or forged-path-segment.

Kotikalapudi Sriram: Sriram received B.S. and M.S. degrees from the Indian Institute of Technology, Kanpur, India, and a Ph.D. degree from Syracuse University, all in electrical engineering. He is currently a Senior Researcher in the Communications Technologies Laboratory at the National Institute of Standards and Technology (NIST), Gaithersburg, Maryland. Previously, he held various positions at Bell Laboratories - the innovations arm of Alcatel-Lucent and formerly that of AT&T. His titles at Bell Laboratories included Consulting Member of Technical Staff (highest rank in the technical ladder) and Distinguished Member of Technical Staff. His current research interests include inter-domain routing architecture and security and DDoS mitigation. He is a co-author of several IETF RFCs related to RPKI, BGPsec, route leaks mitigation, and source address validation. He is a contributing author and a coeditor of the book "Cable Modems: Current Technologies and Applications" (IEEE Press, 1999). He holds 18 U.S. patents. He is a recipient of the US Department of Commerce Gold Medal. He is a Fellow of the IEEE.
Full Abstract

The attacks on critical infrastructure like a service provider network have been increasing more than ever along with their level of sophistication. Attackers are not just targeting the product, but the infrastructure and tools used to build the end products are also being attacked. With the dynamic ever-changing threat landscape in service provider networks, it's important to look at security from ground-up. No amount of software security features will come to our rescue if the hardware itself has been compromised. Attendees of the session will benefit from understanding the various threats to a network device and how each of them can be addressed at every layer. In addition to ensuring the integrity of the network device, the session also focusses on the operational security aspects to ensure the security posture of the entire network is stronger. Lastly, the session also introduces the impact of Quantum Computing on network security and the possible solutions to handle this threat.

Full Abstract

Routing matters to the DNS, especially the security of routing. DNSSEC permits a receiver to validate responses, but this can't happen if the query is not delivered to an appropriate server. This study is a measure of RPKI deployment by DNS operators, analyzed according to the DNS division of labor. Deployment in the top of the global public Internet's names, the root zones, the top-level domains, and the RIR reverse map zones is measured, as well as deployment by names registered within selected top-level domains. Surprisingly, there are starkly different deployment rates of this routing security mechanism within the different DNS environments.

Edward Lewis: Edward is a Senior Technologist in the Office of the CTO. Prior to joining ICANN he worked 11 years inside Internet registries of many types - gTLD, ccTLD, sTLD and RIR. He worked for a DNS Hosting company. He co-chaired the original IETF WG that developed EPP. He developed some of the first DNSSEC codebases under the original DARPA contract in the 1990's. Before that, he worked building research networks attached to the NASA Science Internet (one of the three original backbones) and taught Networking courses at the University of Maryland - Baltimore County.
Full Abstract

Allocation of the global IP address space is under the purview of IANA, who distributes management responsibility among five distinct Regional Internet Registries (RIRs). Each RIR is empowered to bridge technical (e.g., address uniqueness and aggregatability) and policy (e.g., contact information and IP scarcity) requirements unique to their region. Despite the critical policy and technical importance of IP address allocation, little systematic effort has analyzed fine-grained geographic registration information, much less its accuracy.

In this work, we examine all IPv4 address information across all five RIRs to characterize where addresses are physically registered and the extent to which these registrations cross RIR region boundaries. We then perform an active measurement IP geolocation study to validate registration geo-information accuracy -- in essence an ``audit'' of the registries. While we find the registration locations to largely be consistent with our geolocation inferences, we show that some RIRs have a non-trivial fraction of prefixes that are used both outside of the RIR's region and outside of the registered country's region. Such discrepancies may warrant further investigation.

Full Abstract

This tutorial explores the fundamentals of optical networking technologies, terminology, history, and future technologies currently under development.

Example topics include:

* How fiber works (the basics, fiber types and limitations, etc)
* Working with optics (choosing the right type, designing optical networks, etc)
* Optical power (understanding dBm, loss, using light meters, etc)
* DWDM (how it works, muxes, oadms, amps, etc)
* Dispersion (what is it, why do we care, how do we fix it)
* Optical Myths (can I hurt myself looking into fiber, can I overload my optic, etc)

Full Abstract

Wi-Fi is one of the most popular Internet access methods. Monitoring Wi-Fi networks to ensure their normal operation is essential. WiFiMon ([1], [2]) is a GÉANT service offering open-source tools for efficient Wi-Fi network performance monitoring. The purpose of WiFiMon is to assist administrators in identifying underperforming segments within their networks and optionally enhance performance, for example, by installing more Access Points (APs).

WiFiMon combines various data sources, including WiFiMon Software Probes (WSPs) and WiFiMon Hardware Probes (WHPs). WSPs deliver crowdsourced measurements by reporting performance as experienced by end users roaming the Wi-Fi network, whereas WHPs trigger equivalent measurements from fixed network positions. WHPs complement WSPs by facilitating baseline performance comparisons, hence WHPs are integral to WiFiMon’s operation. WHP measurements mainly rely on Raspberry Pi devices, although any Unix-based device may be used. Optionally, in IEEE 802.1X networks WiFiMon may leverage on RADIUS and DHCP logs to enrich monitoring options, e.g. by reporting throughput per network Access Point.

In this presentation (attached), we provide an overview of WiFiMon and its architectural components, outline its fully automated installation procedure and report recent efforts on facilitating the distributed configuration and control of our WHPs.

[1] WiFiMon Homepage, https://wiki.geant.org/display/WIF/WiFiMon+Home
[2] WiFiMon paper, https://dl.ifip.org/db/conf/wons/wons2021/1570695031.pdf

Nikos Kostopoulos: Nikos is a Ph.D. Candidate at National Technical University of Athens (NTUA), Greece, focusing on network security. He is also a software developer for GÉANT WiFiMon participating as an associate of GRNET, the Greek Research and Technolgoy Network.
Full Abstract

Internet routing is a key building block of the Internet’s infrastructure that remains vulnerable to attacks. Resource Public Key Infrastructure (RPKI) has emerged as the leading strategy for securing BGP routing, though uptake has been uneven across the world.
The presentation will introduce the results of data analysis on RPKI adoption in North America and the Caribbean.
With the support of ARIN Community Grants program, the DNS Research Federation team is analysing BGP announcements and their validity status to explore RPKI coverage, RPKI validation results and study-country level trends in the countries of service within the ARIN region.
In the presentation, project leads, Carolina Caeiro and Mark McFadden, will introduce our global stats on RPKI adoption and validation results, and how the ARIN region is performing as a whole. We will then look at sub-regional trends, with a special focus on dynamics in the US and Canada, and how these differ from those of Caribbean counterparts served by ARIN. The presentation will also take a closer look at invalids routes identified in North America, and patterns emerging in the data from observing invalid routes.
The Data Analytics Platform where we host the data is open for general use, so we will introduce to the community how they may sign up to process the RPKI data themselves, and conduct personalised queries, such as ASN and prefix lookups.

Full Abstract

Automattic (AS2635) operates an Anycast CDN utilizing common internet transit links for datacenter interconnection (DCI) duties. Availability is handled by having a large variety of DFZ connections at each datacenter.

A huge issue with this strategy is the propensity for the internet to fail in ways that are not immediately obvious due to the heavy utilization of multi-pathing (ECMP, LACP, etc) technologies that can hide congestion and errors in the aggregation of many links by network service providers.

To find and visualize these issues, Automattic has designed and deployed internet monitoring software that successfully enumerates ECMP links on the open internet and allows us to find and quantify single-link failures deep within NSP networks. We have been using this software for some time to work with NSP's to aid them in more rapidly remediating their networks.

This presentation will present the basics of Anycast CDN operations, give a refresher on router flow-hashing and ECMP path selection and then delve into several case studies showing how Automattic's PINGO system is able to visualize ECMP failures deep inside the internet. We'll present several failures and show how we're able to track these issues down before the NSP's themselves.

Full Abstract

The delivery of high quality streaming video via the Internet presents serious challenges for Content Providers, Content Delivery Networks and Internet Service Providers. This presentation will cover industry trends in streaming media, how Verizon has traditionally received streaming traffic, the efforts within industry organizations to improve the streaming video experience through Open Caching and the results seen at Verizon from deploying Open Caching at a nationwide scale. Measurements will be presented for buffering, video start failures and other key metrics from a production streaming video service.


Diamond Sponsor

Verisign

Platinum Sponsors

AWS
arin
ciena

Gold Sponsors

f5
Imperva
QTS
Telstra
Verisign