^ Top

NANOG Meeting Presentation Abstract

Conference Opening
Meeting: NANOG64
Date / Time: 2015-06-01 10:00am - 10:30am
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Tony Tauber, Comcast

In his role as Distinguished Engineer at Comcast, Tony focuses on Backbone and Core network architecture and engineering with particular attention to measurement, manageability, and automation. He also partners with the research and education communities on projects and currently chairs the NANOG Program Committee. In the past Tony held senior network engineering positions at BBN, GTE Internetworking, Genuity, Level3, and MIT Lincoln Lab as well as served as co-chair of the Routing Protocol Security working group in the IETF.

Daniel Golding, Google

Daniel Golding is responsible for Google's data center edge strategy, including colocation facilities, cable landing stations, edge caches, and network points-of-presence. Prior to joining Google, he held executive roles at Iron Mountain, NTT RagingWire, and 451 Research. Daniel is Chairman of the Board of NANOG, the North American Network Operators Group, and was a founder of Open-IX. Daniel earned a Bachelor of Mechanical Engineering degree from Auburn University as well as a Master of Science degree in telecommunications engineering from George Mason University.

Aaron Klink, Netflix

Aaron Klink is the Manager of Network Strategy and ISP Partner Engagement for the Americas and EMEA at Netflix. His team handles peering and interconnection, appliance deployments, and strategic discussions that enable ISPs to localize and control the Netflix content traffic their users request, while maximizing the quality of experience. Aaron has been involved with the NANOG community since 1997 and is a contributor to interconnection events such as AIS and GPF.
Abstract: NANOG Board of Directors: Dan Golding -- Chair
Local Host Sponsor: Aaron Klink -- Netflix
Connectivity Sponsors:
Mike Vogel -- Comcast
Jack Waters -- Level3
NANOG Program Committee: Tony Tauber, Chair
Files: youtubeConference Opening
pdfConference Opening (slides)(PDF)
Sponsors: None.
Open Internet Order – a regulator’s read of the FCC’s recent Open Internet Order, and related regulatory proceedings.
Meeting: NANOG64
Date / Time: 2015-06-01 10:30am - 11:00am
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Chris Witteman, California Public Utilities Commission

Chris Witteman is currently a Senior Staff Counsel for Telecommunications & Consumer Protection with the California Public Utilities Commission, but he has worked on electronic network issues for most of his 30 year legal career. (He appears here in his individual capacity). Since joining the CPUC in 2001, he has worked on merger cases, interconnection disputes, and anything involving “the wires.” In his spare time, he has written about the constitutional dimensions of communication and information freedom. He lives in San Francisco.
Abstract: Chris Witteman is a senior litigation attorney for the California Public Utilities Commission. His talk will focus on the FCC's February 26, 2015 Open Internet Order, and provide a digestible overview of the Order's 400 pages, and what it might mean in practice for consumers, competitive carriers, and content and service providers. The talk will focus on the “No throttling,” “No paid prioritization,” and “No unreasonable interference” regulations adopted by the FCC, and how the FCC is likely (or not) to interpret and enforce those regulations. Attention will be paid to interconnection, transit, and peering issues that many believe are integral to ensuring an open Internet: how will the FCC monitor and approach those issues under the Order, and how might they do so in the future?

The talk will also examine how the Order affects the ability of state regulators to resolve both consumer complaints and interconnection disputes. The talk will conclude with a few remarks on recent state initiatives related to broadband and telecommunications, and any questions the attendees may have.

**

Mr. Witteman began his litigation career with a series of cable access cases in the late 1980s and 1990s. In 2001, he went to work for the California Public Utilities Commission, where – among many other telecommunications issues -- he has litigated interconnection cases through to the Ninth Circuit Court of Appeals. He appears as an individual, and not as a representative of the CPUC.

Chris Witteman
415.806.4694 c
[email protected]
Files: youtubeOpen Internet Order
pdfOpen Internet Order – a regulator’s read of the FCC’s recent Open Inte(PDF)
Sponsors: None.
Home Network or Access Link? Locating Last-mile Downstream Throughput Bottlenecks
Meeting: NANOG64
Date / Time: 2015-06-01 11:30am - 12:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Srikanth Sundaresan, International Computer Science Institute, Berkeley

Srikanth is a postdoctoral fellow at ICSI, Berkeley. His research interests are in the design and performance of Networked Systems. Currently his research focuses on performance issues in broadband networks — both fixed line and mobile. His work has won the IRTF Applied Networking Research Prize, and the IMC Community Contribution Award, the Georgia Tech CS Dissertation Award, and has been published as a Research Highlight by the Communications of the ACM.
Abstract: As home networks see increasingly faster downstream throughput speeds, a natural question is whether users are benefiting from these faster speeds or simply facing performance bottlenecks in their own home networks. In this work, we study a simple question: Are users’ downstream throughput bottlenecks in their home networks or in their access ISPs? Although our question is simple, answering it on a large-scale deployment is challenging because accurate measurements require instrumentation of a home router, which is too resource-constrained for many existing throughput analysis tools. In this work, we identify lightweight metrics that can accurately identify whether a throughput bottleneck lies inside or outside a user’s home network and develop a detection algorithm that accurately locates these bottlenecks. We validate this algorithm in controlled settings and report on two deployments, one of which is the FCC deployment with 2,652 homes in the United States. We find that wireless bottlenecks are more common than access-link bottlenecks—particularly for home networks with downstream throughput greater than 20 Mbps, where access-link bottlenecks are relatively rare. In homes with a wireless bottleneck, it is equally likely that only one device experiences the bottleneck as it is for all devices to experience the wireless bottleneck simultaneously.
Files: youtubeHome Network or Access Link?
pdfHome Network or Access Link? Locating Last-mile Downstream Throughput (PDF)
Sponsors: None.
SENSS: Security Service for the Internet
Meeting: NANOG64
Date / Time: 2015-06-01 1:00pm - 1:30pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Jelena Mirkovic, USC/ISI

Jelena Mirkovic is Project Leader at USC/ISI and research faculty at USC. She received her MS and PhD from UCLA. She received BS in Computer Science and Engineering from School of Electrical Engineering, University of Belgrade, Serbia. Jelena's research interests span networking and security fields. Her current research is focused on malware analysis, denial-of-service attacks, and IP spoofing. Additionally, she is interested in methodologies for conducting security experiments and Internet measurement.
Minlan Yu.
Ying Zhang.
Abdulla Alwabel.
Abstract: Distributed network attacks, such as DDoS and BGP prefix hijacking can severely hurt online businesses and disrupt critical infrastructure services. The main challenge in handling such attacks is their distributed nature: the best locations to diagnose and mitigate them are often far from the victim's network.
Today's Internet has no automated mechanism for victims to ask help of remote ISPs, and has low incentives for remote ISPs to offer such services. Consequently, prefix hijacking attacks go largely unmitigated, and victims of DDoS attacks pay exorbitant prices to large CDNs to distribute their contents and thus sustain the attacks.

We propose SENSS, a programmable security service for the Internet. SENSS brings simple and generic programmable interfaces from SDN to inter-AS security. These interfaces can be easily implemented in today's ISPs; victims use them to observe and control their own traffic and routes in remote ISPs, and pay per use. We show how victims can leverage these simple interfaces to design solutions against many attacks. We provide six such custom programs that handle a variety of DDoS and BGP prefix hijacking attacks, many of which are not handled today. We evaluate SENSS through extensive simulations and prototype implementation, using realistic traffic and Internet topology, and show that it is very effective in sparse deployment (with adoption in 20 large ISPs, SENSS can eliminate 80-96\% DDoS attack traffic and correct 92--99\% of polluted ASes for BGP prefix hijacking), and it has low message overhead and delay.
Files: youtubeSENSS: Security Service for the Internet
pdfSENSS: Security Service for the Internet (slides)(PDF)
Sponsors: None.
Monitoring, managing and troubleshooting large scale networks.
Meeting: NANOG64
Date / Time: 2015-06-01 1:30pm - 2:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Peter Hoose, Facebook, Inc.

Peter has spent the last fifteen years attempting to automate himself out of a job, thus far unsuccessfully. Rest assured, he’ll keep at it until the job is done. In his current role as Network Infrastructure Manager at Facebook, his teams combine the power of automation with solid network engineering to keep facebook’s global backbone, and datacenter networks running fast, reliably, and efficiently. Today, they are building the infrastructure to deploy wedge, six-pack and fboss, facebook’s open switching platform and network operating system. Prior to this, Peter worked as a Network Engineer at Facebook, and further in the past as Senior Network Engineer and Architect at NTT America where he built custom dedicated hosting solutions for customers large, and small.
Abstract: Monitoring, managing and troubleshooting large scale networks. Almost four years ago I came to NANOG and mostly complained about the state of monitoring networks, par for the course for me. A lot has changed since then, we've solved many of the problems I addressed. Perhaps more importantly, we've fundamentally changed how we manage, monitor and troubleshoot our network. We plan to share what we learned, what went well, and best of all, what went oh so terribly wrong.

Our driving philosophy behind this effort is that by taking an engineering approach to operations, you can greatly reduce the time to discover, mitigate and resolve issues on your network. We analyzed our faults, our pain points and the work that consumed most of our time. This allowed us to prioritize what we tackled first, we were surprised by what we learned caused the most outages, and how much impact minor network issues can have when they fall in the right place. From this, today, the majority of the faults that occur in our network are automatically detected, and mitigated all without human intervention.

We'll dive into some of the most interesting issues we've experienced in our network, how we narrowed them down before, and after our new tooling and monitoring was deployed. We'll walk through specific examples of remediations and how the systems function.

I'm lazy, I don't want to spend my time fixing known issues, I want to work on new problems, I want a challenge. This was the driving force behind our approach, if this sounds like you, them this talk is for you.

----

One of the keys to this effort was a system called FBAR, which interacts with our devices to perform the tasks needed to resolve issues. We'll explain in detail how this works, as well some of our earlier remediations.

As a companion to this talk, David Swafford will be preparing a separate tutorial session to show you how to build your own system much like FBAR to help detect, isolate and remedy issues automatically.
Files: youtubeMonitoring, managing and troubleshooting large scale networks.
pdfMonitoring, managing and troubleshooting large scale networks. (slides(PDF)
Sponsors: None.
Netflix Open Connect: Starting from a Greenfield
Meeting: NANOG64
Date / Time: 2015-06-01 2:00pm - 2:30pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

David Temkin, Netflix

Dave Temkin is the Director of Global Networks for Netflix. Having been hired to build the Open Connect CDN, he is responsible for all network architecture and strategy as well as the operations fo the Netflix network (AS2906). Before Netflix, he was at Yahoo!, where he focused on Layer 4-7 network architecture, having been brought in through the successful acquisition of Right Media where he was the Global Head of Networks. In his spare time he enjoys travel and philanthropy - both through volunteering at technical organizations such as NANOG, where he is vice chair, Open-IX, where he is the chairman and co-founder and FL-IX, where he is also chairman and cofounder, as well as on the board of Children of Bellevue.
Abstract: Learn about how the Netflix Open Connect network evolved from the ground up.
Files: youtubeNetflix Open Connect: Starting from a Greenfield
pdfNetflix Open Connect: Starting from a Greenfield (slides)(PDF)
Sponsors: None.
ARIN Public Policy Consultation Session
Meeting: NANOG64
Date / Time: 2015-06-01 3:00pm - 5:00pm
This item is webcast
Room: Tower Salon A
Presenters: Speakers:
Einar Bohlin, ARIN.
Abstract: 3:00 Opening - John Curran
3:10 Status of the IPv4 Free Pool - Leslie Nobile
3:20 AC Report - Dan Alexander
3:30 Number Resource Policy Discussions
a. ARIN-2015-1: Modification to Criteria for IPv6 Initial End-User Assignments
b. ARIN-prop-216 Modify 8.4 (Inter-RIR Transfers to Specified Recipients)
c. ARIN-prop-217 Remove 30 day utilization requirement in end-user IPv4 policy
d. ARIN-prop-218 Modify 8.2 section to better reflect how ARIN handles reorganizations
4:30 Future ARIN Public Policy Consultations (PPCs)
5:00 Closing
Files: youtubeARIN Public Policy Consultation Session
Sponsors: None.
Research and Education Track
Meeting: NANOG64
Date / Time: 2015-06-01 3:00pm - 5:00pm
Room: Grand Ballroom
Presenters: Speakers:

Michael Sinatra, ESnet

Michael Sinatra is a Senior Network, Systems, and Security Engineer with ESnet. Prior to that he worked for UC Berkeley for 19 years. He has been a member of NANOG's Program Committee since 2011.

Julie Percival, University of Texas at Dallas

Dr. Julie Burlingame Percival is a recent graduate of the University of Texas at Dallas Public Policy and Political Economy program. Individuals with this degree employ advanced econometric analyses (logit, probit, time series, Bayesian, game theory) on a wide range of policy issues. Dr. Percival chose to concentrate in urban issues like education and public infrastructure. Her dissertation, Variation in High School Dropouts and their Outcomes, used factor analysis to extract common traits from male and female dropouts using national survey data and used logit, probit, and logistical regression to examine for differences in outcome by gender. She has written two papers on IT infrastructure topics (as yet unpublished); one a case study in the management of IP addresses by IANA and ICANN, and the other analyzing the influence of Mertonian scientific norms on IT Infrastructure culture. She has two children, two cats, and is married to Ray Percival (@scarynetworkguy / sng).

Michael Smitasin, Lawrence Berkeley National Laboratory

Network Engineer for Lawrence Berkeley National Laboratory as part of the campus network group (LBLnet) since August 2013. Research interests include secure network architecture, applied cryptography, network-based building occupancy monitoring, infrastructure virtualization, and high-bandwidth, science-focused networking.

Murat Yuksel, University of Nevada, Reno

Murat Yuksel is an Associate Professor at the CSE Department of The University of Nevada, Reno (UNR), Reno, NV. He has been a software engineer at Pepperdata since 2014. Prior to UNR, he was with the ECSE Department of Rensselaer Polytechnic Institute (RPI), Troy, NY as a Postdoctoral Associate and an Adjunct Faculty until 2006. He received a B.S. in computer engineering of Ege University, Izmir, Turkey in 1996. He received M.S. and Ph.D. in computer science of RPI in 1999 and 2002 respectively. His research interests are in the area of networked, wireless, and computer systems with a recent focus on big-data networking, UAV networks, optical wireless, public safety communications, economics of cyber-security and cyber-sharing, routing economics, network management, and network architectures. He has been on the editorial board of Computer Networks and is a co-recipient of the IEEE LANMAN 2008 Best Paper Award. He is a senior member of IEEE, senior and life member of ACM, and was a member of Sigma Xi and ASEE.
Abstract: Training Network Administrators in a Game-Like Environment - Murat Yuksel

Water, not Land [A perspective on IPv4 runout] - Julie Percival

Evaluating Network Buffer Size requirements for Very Large Data Transfers - Michael Smitasin

Pacific Research Platform - John Hess and Camille Crittenden

Science DMZ/High-performance network security [time-permitting] - Michael Sinatra
Files: youtubeResearch and Education Track
pdfResearch and Education Track (slides)(PDF)
Sponsors: None.
Data Center Track
Meeting: NANOG64
Date / Time: 2015-06-01 3:00pm - 5:00pm
Room: Colonial
Presenters: Speakers:
Gabe Cole, RTE Group, Inc..
Abstract: The track will last 2 hours and be broken into four sections, a 30 minute presentation, a 30 minute panel discussion, a second 30 minute presentation, and 30 minute update and open mike discussion on Open-IX.

The first presentation - "Moving Away from the Grid - Implementing Fuel Cell Technology for Data Centers" will be by Peter Gross, Vice President of Mission Critical Systems at Bloom Energy.

The panel presentation - "When is N enough, Reducing Reliability in the Data Center" will be anchored by Jim Smith, Chief Technology Officer & Senior Vice President of Portfolio Operations for Digital Realty Trust.

Lucy Yong of Huawei will present "Inter-AS Options for Network Virtualization Overlay." Data Center (DC) Network Virtualization Overlay (NVO) supports many tenant virtual networks in a DC with privacy and security properties. Some tenant virtual networks in a DC are required to interwork with BGP/MPLS WAN VPNs to provide end-to-end connectivity to tenant sites. Inter-AS options specified in [RFC4364] can be used between a DC NVO and BGP/MPLS WAN VPN. This presentation describes the inter-AS solutions for DC NVO and WAN VPN interworking that are being worked in IETF now and the solutions comparison.

Gabe Cole will lead the Open-IX update will review progress this year, the data center evaluation tools that have been developed, complaint resolution process, and additional standards currently under consideration.
Files: youtubeData Center Track
pdfData Center Track (slides)(PDF)
Sponsors: None.
Tutorial: DWDM & Packet Optical Fundamentals: Troubleshooting the Transmission Layer
Meeting: NANOG64
Date / Time: 2015-06-02 9:30am - 11:00am
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Peter Landon, BTI

Peter Landon is the Director of Product Architecture in the Office of the CTO at BTI Systems, responsible for the company’s product architecture strategy. He is also a participant and contributor to the OIF as well as the ONF OTWG. His more than 25 years of experience in ASIC design include: leading the design of the tracking system for the NASA James Webb Space Telescope while at COM DEV; being appointed a “Distinguished Member of Technical Staff” in ASIC design at Lucent Technologies/Bell Labs; serving as technical manager for optical IC development at Agere Systems; and since joining BTI, leading the architecture and design of the BTI 7000 Series packet-optical transport systems, and the award-winning BTI 7800 Series Intelligent Cloud Connect platforms. Peter earned his BSc in Engineering from Queen’s University with post graduate work at Carleton University in Ottawa, Ontario.
Abstract: This tutorial will cover three different areas, Dense Wave Division Multiplexing, Packet Optical technology, and performance monitoring. This introduction of technologies will lead into a practical overview of methods to debug and troubleshoot optical networks, for both new and existing installations. Examples will include debug techniques for real-life issues and various solutions will be discussed.
Files: youtubeTutorial: DWDM & Packet Optical Fundamentals
pdfTutorial: DWDM & Packet Optical Fundamentals: Troubleshooting the Tran(PDF)
Sponsors: None.
Tutorial: NetOps Coding 101
Meeting: NANOG64
Date / Time: 2015-06-02 9:30am - 11:00am
Room: Colonial
Presenters: Speakers:

David Swafford, Facebook

David Swafford is a Network Engineer on Facebook's Production Engineering team. Having coming to FB a few years back as traditional network engineer, he quickly shifted focus to the software side after realizing that there simply wasn't enough time in the day to do things the traditional way. That shift has paid off well for FB as the entire network team shifted in the same manner and now we focus on much more interesting problems together. When nerding out the most, he loves to look deep into the things that make networking and large systems tick. Topics like routing protocols, TCP, and Linux fall into his favorite bedroom reading. Outside of all this, he loves to to cook any and everything under the theme of Italian-American following in the footsteps of his favorite chef Scott Conant. He also loves being active with his dog Cocoa. Best reached using [email protected], you can also find him regularly at the SF Python Meet-ups (www.meetup.com/sfpython/). Any and all levels are welcome!
Abstract: Note: this is a single 3-hour session spanning two back-to-back tutorial slots. No coding / Python experience needed or assumed.

Do you find yourself wanting to write a robot but not quite sure where to start? Ever find yourself typing the same set of commands on the CLI all day long? If so, this is the class for you!

In this session, we'll focus on scripting in Python as a way to tackle a few common problems faced by all of us in the network world -- issues that typically steal your attention, but don't have to anymore. We'll take a practical approach to automating the humans and give you the foundation to go out and build your own version of Facebook's FBAR (https://www.facebook.com/notes/facebook-engineering/making-facebook-self-healing/10150275248698920).

This session will be targeted to the scripting n00b -- assuming no prior coding or Python knowledge. While we won't have time to cover a proper "Intro to Python", relevant syntax will be explained as we walk through the session and you'll be armed with the knowledge to go out and build!

One tip! We will be working from a virtual machine of Ubuntu Desktop throughout the session. A copy will be distributed on USB sticks, but if you would prefer a direct link, please download DEVBOX01.zip from https://drive.google.com/folderview?id=0BweIzzj21fzEfllZbnJOQXoxbmIyeHJjS2VZWFY3ajBsMEZXZFBlTVhTTTFnQjJuWnhTM0k. This VM was built using Virtual Box and will open natively, but has also been tested / confirmed to work under VMware. VirtualBox is a free download available from https://www.virtualbox.org/wiki/Downloads.
Files: youtubeTutorial: NetOps Coding 101
Sponsors: None.
Security Track
Meeting: NANOG64
Date / Time: 2015-06-02 9:30am - 11:00am
Room: Tower Salon A
Presenters: Speakers:
Krassimir Tzvetanov, A10 Networks, Inc..

Merike Kaeo, DoubleShot Security

Ms. Kaeo has over 25 years experience leading strategic technology direction for startups, corporate security initiatives and evolving technologies. Ms. Kaeo is the founder and CEO of Double Shot Security and has in the past had positions as the Chief Information Security Officer at IID, the CTO of Guardtime, and has served on numerous technical advisory boards. She led the first security initiative for Cisco Systems in the mid 1990s and authored the first Cisco book on security - translated into more than 8 languages and leveraged for prominent security accredidation programs such as CISSP. She has contributed to numerous IETF standards, is a member of the ICANN Security and Stability Advisory Council (SSAC) and the FCC's Communictaions Security, Reliability and Interoperability Council (CSRIC). She earned a MSEE from George Washington University and a BSEE from Rutgers University.
Abstract: Blackholing at IXPs - Thomas King

Worldwide Infrastructure Security Report - 10th Annual, Gary Sockrider

Modern Climate of DDoS - Matt Mahvi

Andre Toonk - BGP hijacks update
Files: None.
Sponsors: None.
Best Current Operational Practice (BCOP) Track
Meeting: NANOG64
Date / Time: 2015-06-02 11:30am - 1:00pm
Room: Tower Salon A
Presenters: Speakers:
Chris Grundemann.
Abstract: Updates on status of current Appeals and BCOP Drafts. The Best Current Operational Practice (BCOP) project is collecting the best practices known within the operations community and capturing those practices in a series of documents. This is a community project and is open to all to participate and get involved. We welcome your participation and look forward to working together to build better documentation for the entire community. Join the conversation - Subscribe to the BCOP Mail List at http://mailman.nanog.org/mailman/listinfo/bcop Questions or suggestions about BCOP should be directed to bcop-support at mailman dot org.

Files: youtubeBest Current Operational Practice (BCOP) Track
Sponsors: None.
Tutorial: Troubleshooting Network Performance Issues with Active Monitoring
Meeting: NANOG64
Date / Time: 2015-06-02 11:30am - 1:00pm
This item is webcast
Room: Colonial
Presenters: Speakers:

Brian Tierney, ESnet

Brian Tierney is the originator and a main contributor to content of http://fasterdata.es.net. His bio is available at http://www.es.net/tierney.
Abstract: This tutorial will summarize a number of tools that can be used to help diagnose network performance issues, including iperf3, nuttcp, bwctl, owping and other network measurement tools. These tools are part of the perfSONAR Network monitoring toolkit. perfSONAR makes it easy to schedule regular active probes and display the results in a dashboard.

The 90 min tutorial will present a number of examples of tracking down multi-domain performance issues in Research and Education network environments. The tutorial will also give a quick overview of the ESnet knowledge base fasterdata.es.net.


Speaker: Brian Tierney, ESnet
http://www.es.net/tierney
http://fasterdata.es.net
Files: youtubeTutorial: Troubleshooting Network Performance Issues
pdfTutorial: Troubleshooting Network Performance Issues with Active Monit(PDF)
Sponsors: None.
Tutorial Continued: NetOps Coding 101
Meeting: NANOG64
Date / Time: 2015-06-02 11:30am - 1:00pm
Room: Grand Ballroom
Presenters: Speakers:
David Swafford, Facebook.
Abstract: Do you find yourself wanting to write a robot but not quite sure where to start? Ever find yourself typing the same set of commands on the CLI all day long? If so, this is the class for you!

In this session, we'll focus on scripting in Python as a way to tackle a few common problems faced by all of us in the network world -- issues that typically steal your attention, but they don't have to anymore. We'll take a practical approach to automating the humans and give you the foundation to go out and build your own version of Facebook's FBAR.

This session will be targeted to the scripting n00b -- assuming no prior coding or Python knowledge. While we won't have time to cover a proper "Intro to Python", relevant syntax will be explained as we walk through the session and you'll be armed with the knowledge to go out and build!
Files: youtubeTutorial Continued: NetOps Coding 101
Sponsors: None.
The benefits of deploying IPv6 only
Meeting: NANOG64
Date / Time: 2015-06-02 2:30pm - 3:30pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:
Paul Saab.

John Jason Brzozowski, Comcast

John Jason Brzozowski, Fellow and Chief IPv6 Architect A proven technology leader John has been the driving force behind Comcast’s IPv6 transition and deployment since the program began in 2005. His accomplishments and success leading Comcast’s IPv6 deployment are recognized around the globe. John’s tireless efforts continue as he advances the adoption of IPv6 across all of Comcast’s infrastructure and services. He leverages his expertise and experience to drive the adoption and implementation of IPv6 in the real world and at scale, ensuring that innovative solutions are in place to support traditional and next generation services. His pioneering work has had significant impacts not only within Comcast but also across the entire cable industry and beyond. He has and continues to be instrumental in encouraging the adoption of IPv6 across the broadband, content, and consumer electronics ecosystems.
Gaurav Madan, T-Mobile USA Inc.
Geoff Huston, APNIC.
Abstract: Use of IPv6 is gaining momentum. For some companies it is the primary IP
version of choice to run their businesses and to deliver products and
services to their customers. The depletion of globally routable IPv4 and
private IPv4 address space has prompted many technology firms to look at
the use of IPv6 while abandoning support for IPv4 in some parts of their
networks. Additionally, and perhaps, more interestingly IPv6 has been
rumored to outperform IPv4. New data is available from more diverse
adopters that further substantiates these claims. Come hear the following
as part of this panel:

* Facebook will share information about their IPv6 only efforts including
the data they are seeing comparing IPv4 and IPv6 performance.
* Comcast will share how they are using IPv6 only for their next
generating entertainment operating system as well as IPv6 differences
compared to IPv4.
* T-Mobile will share information about the deployment of IPv6 only across their mobile network which minimally includes lessons learned and techniques to ensure IPv4 content continues to be reachable.

Other participants may be added in advance of the actual panel session. Akamai and LinkedIn have both been invited.
Files: youtubeThe benefits of deploying IPv6 only
pdfThe benefits of deploying IPv6 only (slides)(PDF)
Sponsors: None.
Latency IPv4 vs IPv6: Understanding the difference
Meeting: NANOG64
Date / Time: 2015-06-02 3:30pm - 4:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Alexander Azimov, Qrator Labs

Network Arhitect at Qrator Labs Head of Radar by Qrator project
Abstract: During last years much attention was paid for process of deploying IPv6 in different regions. And with growing IPv6 adoption the requirements also grew up. Today we require not just working IPv6 but reliable IPv6. Of course this aim brings to our attention IPv6 network latency which we want to be comparable to IPv4 latency. First measurements gave community very interesting and promising results – for some networks IPv6 was faster than IPv4. But why IPv6 had less latency – there was no clear evidence. In my report I’m going to discuss reasons why in some cases IPv6 is faster than IPv4 and why it is slower in other ones.
Files: youtubeLatency IPv4 vs IPv6: Understanding the difference
pdfLatency IPv4 vs IPv6: Understanding the difference (slides)(PDF)
Sponsors: None.
Network Automation and Programmability Abstraction Layer with Multivendor support
Meeting: NANOG64
Date / Time: 2015-06-02 4:30pm - 5:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

David Barroso, Spotify

David is a network engineer focused on network design, automation and SDN. At Spotify he has built and opensourced several libraries to help automating different network operating systems and built an SDN router amongst other cool stuff.

Elisa Jasinska, BigWave

Elisa Jasinska started her Internet career as a Network Engineer at the Amsterdam Internet Exchange in 2005. Over the years, she has implemented numerous traffic accounting solutions, as well as many automation tools and systems for various companies. She takes great pleasure in discovering new technologies, solving problems and actively participating in the Internet community.
Abstract: The Python library dubbed Napalm - short for Network Automation and Programmability Abstraction Layer with Multivendor support - helps interact with devices from various vendors though a unified set of commands. It currently supports Arista, Juniper, Cisco (IOS-XR) and FortiGate. It provides methods to replace or merge the configurations on the devices, view a diff, commit the changes, or roll them back. It also provides an Ansible plugin, which enables administrators to push configurations directly from Ansible playbooks. Napalm is open source and available on Github: https://github.com/spotify/napalm

We will present more details about Napalm, how to use it and show in a demo how to instantaneously configure a set of multivendor devices.
Files: youtubeNetwork Automation and Programmability Abstraction Layer
pdfNetwork Automation and Programmability Abstraction Layer with Multiven(PDF)
Sponsors: None.
Dynamic Service Chaining for SDN/NFV
Meeting: NANOG64
Date / Time: 2015-06-02 5:00pm - 5:30pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Kishore Inampudi, A10 Networks

Kishore Inampudi is a Director of Product Management at A10 Networks where he leads Service Provider, SDN and NFV solutions. Kishore has over 15 years of diverse experience in Networking industry in the marketing, sales and engineering functions. Kishore has an MBA from UC Berkeley, Haas School of Business and Master’s degree in Computer Engineering from San Jose State University.
Abstract: In talk focus on framework for dynamic L4-L7 services in NFV/SDN environments.

The modern service provider and data center networks demand cloud delivery model for agile and cost-effective rollout of services for revenue generation. There are some proposals to incorporate service insertion in the emerging SDN and NFV environments. However, the current methods are sub-optimal, complex and inflexible in delivering automated end-to-end service delivery.

In a virtualized cloud environment, service delivery requires intelligence in the network for policy-based traffic handling and differentiated services. Dynamic service chaining is a fundamental component in building an on-demand and scalable model for policy enforcement. This session will cover following topics:
1. NFV & Service chaining use cases
2. Challenges with existing solutions
3. Opportunities with dynamic service chaining
4. Policy Enforcement model in SDN/NFV environment
5. Dynamic Service Chaining Architecture & Design considerations
6. Benefits of Dynamic Service Chaining
Files: youtubeDynamic Service Chaining for SDN/NFV
pdfDynamic Service Chaining for SDN/NFV (slides)(PDF)
Sponsors: None.
Rethinking Centralization
Meeting: NANOG64
Date / Time: 2015-06-03 9:30am - 10:00am
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Russ White, Ericsson

Russ White has scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, nibbled and noodled at a lot of networks, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, PAcket Pushers, LinkedIn, and his author page on Amazon.
Abstract: Centralization seems to be the current "silver bullet" for network complexity — but will it really "solve" for complexity, or just bring us another round of "pushing complexity around?" This presentation considers an alternative view of the centralization/decentralization debate.
Files: youtubeRethinking Centralization
pdfRethinking Centralization (slides)(PDF)
Sponsors: None.
QUIC: Next generation multiplexed transport over UDP
Meeting: NANOG64
Date / Time: 2015-06-03 10:00am - 10:30am
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:
Brian Rogan, Google.

Ian Swett, Google

Software developer working on the QUIC internet transport being developed by Google. I focus on issues related to YouTube, including video quality of experience, and deployment.
Abstract: QUIC is a new transport protocol that runs on top of UDP. It is currently deployed to a significant fraction of Chrome users of Google services. It combines TCP-style congestion control, TLS-grade security, and HTTP/2 multiplexing. Our measurements on real-world traffic show that QUIC significantly decreases page load times and time between pauses in video playbacks. Google will continue scaling up the use of QUIC on the public internet over the next few months, with the goal of sending all Google traffic over QUIC. This talk will discuss how QUIC works, why it's an improvement over TCP, the problems we're anticipating as we deploy at scale, and what we're doing to prevent them.
Files: youtubeQUIC: Next generation multiplexed transport over UDP
pdfQUIC: Next generation multiplexed transport over UDP (slides)(PDF)
Sponsors: None.
Motivation, Analysis, and Architecture for IPv4aaS
Meeting: NANOG64
Date / Time: 2015-06-03 10:30am - 11:00am
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:
Brian Field, Comcast.
Abstract: In this talk, we share our work in creating an “IPv4 as a service” network overlay. We begin by suggesting there is value in building network infrastructure which is “lean” and "IPv6 focused". There is likely value in focusing on a lean FIB infrastructure and IPv6 focused functionality in our next-generation routing platforms.

We performed traffic analysis on how IPv4 is being used in our network today. We found that 90% of the traffic in our fully routed backbone is done by %0.005 of the routes. 99% of the traffic is performed by 4.5% of the prefixes. This data suggests we can incrementally deploy an IPv4aaS solution. Our goal is to build an IPv4aaS using cloud infrastructure based on open source and home grown software.

We then present an IPv4aaS built on top of LISP. While we use LISP encapsulation, we have decided not to use the LISP DDT “routing” mechanism. Our IPv4aaS overlay routing architecture must associate IPv4 prefixes with IPv6 next-hops. This isn’t supported with “classic” BGP today. To solve this, we augmented JSON BGP IPv4 prefix updates with additional JSON information, namely an IPv6 next-hop. Effectively, we created a BGP IPv4 update with an IPv6 next-hop value. These messages are HTTP PUT to a route reflector / controller device, which processes the updates and applies associated business rules. These messages are then HTTP PUT to the overlay ingress (iTR) which announce a “default” to the underlay network.

We then suggest the concepts in this presentation are an extension to the concepts we've made at the previous two June NANOG meetings.
Files: youtubeMotivation, Analysis, and Architecture for IPv4aaS
pdfMotivation, Analysis, and Architecture for IPv4aaS (slides)(PDF)
Sponsors: None.
Source Routing 2.0. Why Now, Why Again?
Meeting: NANOG64
Date / Time: 2015-06-03 11:30am - 12:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Nick Slabakov, Juniper Networks

Nick Slabakov is Chief Architect for the Web Services group, where he works with some of Juniper's most innovative customers on solutions to the challenges of scale, programmability, and efficiency in their networks. Nick’s recent work and industry involvement spans the areas of MPLS-TE, SPRING, SDN, Cloud Networking, and Network Automation / Programmability. His previous roles in Juniper included various Systems Engineering positions supporting Tier 1 carriers. Prior to Juniper, Nick was a Principal Systems Engineer at Riverstone Networks, which followed 10 years of experience as a Network Engineer in Enterprise and Service Provider settings.
Abstract: Traditional source routing using IP header options was never widely deployed due to security concerns. Recent buzz around Segment Routing (a.k.a. SPRING) has re-invigorated interest in source routing technologies and their potential benefits. For many operators however, moving to SPRING represents a significant change in their operating practices, so in a more incremental approach they are implementing SPRING-inspired designs using current technologies with minor augmentations.

In this talk we will review SPRING/SR, but will mainly focus on using existing protocols for achieving similar benefits. We will discuss:
- clever usage of static LSPs to achieve predictable label values in a data-center network
- minor enhancements to BGP-LU for more resilient EPE (Egress Peer Engineering)
- interoperability considerations between SPRING and non-SPRING domains
Files: youtubeSource Routing 2.0. Why Now, Why Again?
pdfSource Routing 2.0. Why Now, Why Again? (slides)(PDF)
Sponsors: None.
SDN in the Management Plane: OpenConfig and Streaming Telemetry
Meeting: NANOG64
Date / Time: 2015-06-03 12:00pm - 12:30pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Joshua George, Google

Joshua George is a Network Engineer in Google's Strategic Network Engineering team. He focuses on the long term design of Google's core network and systems infrastructure. Prior to Google, Joshua held multiple positions at both Cox Communications and Time Warner Cable.

Anees Shaikh, Google

Anees Shaikh is with the Network Architecture team at Google where he works on operational aspects related to SDN, cloud networking, network visibility, and configuration and management in Google’s production networks. Prior to joining Google, he was the Chief SDN Architect in IBM System Networking where he was responsible for IBM's software-defined networking product architecture and technical strategy, including leading IBM’s open source networking engagements. For over a decade, Anees was a Research Staff Member and Manager at the IBM T.J. Watson Research Center.
Abstract: Abstract Follows:

The networking industry has made good progress in the last few years on developing programmable interfaces and protocols for the control plane to enable a more dynamic and efficient infrastructure. Despite this progress, some parts of networking risk being left behind, most notably network management and configuration. The state-of-the-art in network management remains relegated to proprietary device interfaces (e.g., CLIs), imperative, incremental configuration, and lack of meaningful abstractions.

We propose a framework for network configuration guided by software-defined networking principles, with a focus on developing common models of network devices, and common languages to describe network structure and policies. We also propose a publish/subscribe framework for next generation network telemetry, focused on streaming structured data from network elements themselves.
Files: youtubeSDN in the Management Plane
pdfSDN in the Management Plane: OpenConfig and Streaming Telemetry (slide(PDF)
Sponsors: None.
Architecture for fine-grain, high-resolution Telemetry for network elements.
Meeting: NANOG64
Date / Time: 2015-06-03 12:30pm - 1:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:
Rafal Szarecki, Juniper Networks.
Abstract: The Networks evolve quickly to be highly automated, self-adapting, and intelligent integrated systems. However, even the most intelligent system can take as good decision as good input information it is provided with..

In this session we address an architecture that enables high frequency export of telemetry data from network elements. Traditional protocols like SNMP retrieve data from network elements using a “pull” model, which suffers from several well documented shortcomings, the most important being a centralized architecture which causes strain on the central processor of the network element, taking away cycles from the main functions of the router.

This architecture addresses the problem by creating a distributed export mechanism where telemetry is “pushed” out directly from the source, rather than relying on the central component. This is intended to enable innovative applications, such as dynamic provisioning of devices based on utilization levels, security and/or quality prediction base don anomaly heuristic analysis, etc. The architecture defines the following

1. The Open telemetry model for a network element.
- Configuration and Provisioning
- Capability discovery
2. Implementation of telemetry probes in various internal sub systems of a network element.
3. Open-source based Export mechanisms via which telemetry data is generated
Files: youtubeArchitecture for fine-grain, high-resolution Telemetry
pdfArchitecture for fine-grain, high-resolution Telemetry for network ele(PDF)
Sponsors: None.
Peering Track
Meeting: NANOG64
Date / Time: 2015-06-03 2:30pm - 4:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Greg Hankins, Alcatel-Lucent

Greg Hankins is a Senior Product Line Manager at Alcatel-Lucent for the 7750 SR and 7950 XRS product lines. He works with service providers and Internet exchanges around the world to deliver advanced network solutions. Greg has been an active member of the network operator and peering community for over 15 years, and frequently speaks at network operator conferences on network technology and operational topics. Prior to joining Alcatel-Lucent, Greg held technical marketing and systems engineering positions at Brocade Communications, Force10 Networks and Riverstone Networks, and network engineering positions at MindSpring Enterprises and Georgia Tech.
Daniel Kopp, DE-CIX.
Brian Rogan, Google.
Raul Sejas, Telefonica.
Tom Paseka, CloudFlare.
Aaron Hughes, 6connect.

Elisa Jasinska, BigWave

Elisa Jasinska started her Internet career as a Network Engineer at the Amsterdam Internet Exchange in 2005. Over the years, she has implemented numerous traffic accounting solutions, as well as many automation tools and systems for various companies. She takes great pleasure in discovering new technologies, solving problems and actively participating in the Internet community.
Abstract: Blackholing at IXPs - Daniel Kopp, DE-CIX

Rethinking Price Models (Work in Progress) - Raul Sejas, Telefonica

Peering Configuration Automation - Tom Paseka, CloudFlare

Standards for Peering Automation - Elisa Jasinska, BigWave IT

Providing Self-Service for Google's Peers - Brian Rogan, Google

PeeringDB, SDN, NFV, Oh my! - Aaron Hughes, 6connect
Files: pdfPeering Track(PDF)
pdfPeering Track(PDF)
pdfPeering Track(PDF)
pdfPeering Track(PDF)
youtubePeering Track
pdfPeering Track(PDF)
pdfPeering Track(PDF)
Sponsors: None.
Tutorial: Denial of Service 101
Meeting: NANOG64
Date / Time: 2015-06-03 2:30pm - 4:00pm
Room: Tower Salon A
Presenters: Speakers:
Krassimir Tzvetanov, A10 Networks, Inc..
Abstract: This talk covers the principles and particular implementations of DDoS. It goes in detail as to what are the bottlenecks that are generally exploited/overloaded, the attack types and the solutions to those.
Files: pdfTutorial: Denial of Service 101 (slides)(PDF)
Sponsors: None.
Tutorial: Whiteboarding 101
Meeting: NANOG64
Date / Time: 2015-06-03 2:30pm - 4:00pm
Room: Colonial
Presenters: Speakers:
Matt Ringel, Akamai Technologies.
Abstract: The “whiteboard talk” represents one of the key ways that engineers can communicate ideas in a concise and educational way to colleagues. More than a classroom lecture or a slide presentation, a whiteboard talk is a combination of several disciplines including teaching, storytelling, the visual display of information, and improvisational acting.

In this tutorial, the attendees will learn how to organize a whiteboard discussion, how to avoid popular pitfalls, and how to make sure that their audience walks away with the knowledge that the attendee wants them to have. These topics include how to narrow down the scope of a topic (both in terms of the topic itself and the level of abstraction), how to build the knowledge model for the talk, how to define terms for different audiences, and how to handle difficult audience members.
Files: youtubeTutorial: Whiteboarding 101
Sponsors: None.
New Cybersecurity Obligations and CPNI Rules Represent Regulatory Sea-Change for Network Operators
Meeting: NANOG64
Date / Time: 2015-06-03 4:30pm - 5:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Ross Buntrock, Arnall Golden Gregory

Ross A. Buntrock is a partner in the Washington, D.C. office of Arnall Golden Gregory LLP. He is a member of the Government and Regulatory, Litigation and Privacy and Consumer Regulatory practices and the leader of the Media, Technology, and Telecommunications industry team. He has nearly 20 years of experience representing all segments of the communications industry including network operators, mobile and wireline carriers, mobile-content providers, mobile payment companies, app and platform developers, and trade associations on all aspects of communications and trade regulation. He is nationally recognized for his work in communications, media, and technology law. Ross has been designated a Certified Information Privacy Professional by the International Association of Privacy Professionals and is a member of the Virginia and DC Bars.
Abstract: The early months of 2015 have seen an unprecedented level of action in the realm of U.S. cybersecurity policy. The Obama Administration, in response to a growing number of cybersecurity compromises and data breaches has announced an aggressive cybersecruity and data security agenda. The activity appears motivated at lease in part by the spike in the number of U.S. data breaches in 2014.


The Cybersecurity agenda of the Obama Administration will have direct and indirect consequences for network operators potentially adding to their already substantial regulatory burdens. On top of these new obligations, the FCC adopted new open Internet rules that for the first regulate how data Internet service providers can utilize Consumer Proprietary Network Information (CPNI). That's a big deal to network operators who supplement revenue from user fees in a variety of ways by trafficking in user data. This presentation will educate the audience on the new rules and outline compliance strategies.



About the Presenter:


Ross A. Buntrock ([email protected]) is a partner at Arnall Golden Gregory LLP in Washington DC and is a member of the the Government and Regulatory, Litigation and Privacy and Consumer Regulatory practices. Mr. Buntrock is the leader of the Media, Technology, and Telecommunications industry teams. He has 20 years of experience representing all segments of the industry. He is nationally recognized for his work in communications, media, and technology law.
Files: youtubeNew Cybersecurity Obligations and CPNI Rules
pdfNew Cybersecurity Obligations and CPNI Rules Represent Regulatory Sea-(PDF)
Sponsors: None.
Evolution of Ethernet Speeds - What’s New and What’s Next
Meeting: NANOG64
Date / Time: 2015-06-03 5:00pm - 5:30pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Greg Hankins, Alcatel-Lucent

Greg Hankins is a Senior Product Line Manager at Alcatel-Lucent for the 7750 SR and 7950 XRS product lines. He works with service providers and Internet exchanges around the world to deliver advanced network solutions. Greg has been an active member of the network operator and peering community for over 15 years, and frequently speaks at network operator conferences on network technology and operational topics. Prior to joining Alcatel-Lucent, Greg held technical marketing and systems engineering positions at Brocade Communications, Force10 Networks and Riverstone Networks, and network engineering positions at MindSpring Enterprises and Georgia Tech.
Abstract: In this presentations we'll talk about the latest Ethernet developments that are bringing a variety of new technology to the market for different applications with speeds ranging from 2.5 GE to 400 GE. We'll take a look at the new 2.5 GE, 5 GE and 25 GE speeds, 2nd generation 40 GE and 100 GE, 400 GE and what's possible in the future.
Files: youtubeEvolution of Ethernet Speeds
pdfEvolution of Ethernet Speeds - What’s New and What’s Next (slides)(PDF)
Sponsors: None.
RSVP-TE usability at scale
Meeting: NANOG64
Date / Time: 2015-06-03 5:30pm - 6:00pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:

Ravi Singh, Juniper

Ravi Singh is a principal software engineer in the routing/MPLS team at Juniper Networks. He has implemented various unicast/multicast and MPLS-signaling-protocols functionality. He helped ship the PTX series of Juniper platforms that are getting deployed in the super-core of various tier-1 networks.
Abstract: RSVP-TE is widely deployed. Over the years, various operationally challenging issues have emerged – both due to how RSVP-TE gets deployed and also how it has been implemented by various router vendors.
This talk shall very briefly summarize the operationally-significant issues in deploying RSVP-TE at scale, from a perspective of:
a. LSP configuration,
b. Monitoring LSPs,
c. Maximizing network utilization: Multi-path and load-balancing,
d. Minimizing data losses during LSP re-optimization,
e. Reducing network churn.

Thereafter, the talk shall present mechanisms and recommendations to address each of the above operationally-challenging aspects.
Files: youtubeRSVP-TE usability at scale
pdfRSVP-TE usability at scale (slides)(PDF)
Sponsors: None.
Conference Closing
Meeting: NANOG64
Date / Time: 2015-06-03 6:00pm - 6:15pm
This item is webcast
Room: Grand Ballroom
Presenters: Speakers:
Betty Burke, NANOG Executive Director.

Tony Tauber, Comcast

In his role as Distinguished Engineer at Comcast, Tony focuses on Backbone and Core network architecture and engineering with particular attention to measurement, manageability, and automation. He also partners with the research and education communities on projects and currently chairs the NANOG Program Committee. In the past Tony held senior network engineering positions at BBN, GTE Internetworking, Genuity, Level3, and MIT Lincoln Lab as well as served as co-chair of the Routing Protocol Security working group in the IETF.
Abstract: Closing summary remarks from NANOG Executive Director and others.
Detailed Agenda to be posted as the meeting time approaches.
Files: youtubeConference Closing
pdfConference Closing (slides)(PDF)
Sponsors: None.

Back to NANOG64 agenda.

NANOG64 Abstracts

  • Conference Opening
    Speakers:
    Tony Tauber, Comcast; Daniel Golding, Google; Aaron Klink, Netflix;
  • Conference Opening
    Speakers:
    Tony Tauber, Comcast; Daniel Golding, Google; Aaron Klink, Netflix;
  • Conference Opening
    Speakers:
    Tony Tauber, Comcast; Daniel Golding, Google; Aaron Klink, Netflix;
  • Research and Education Track
    Speakers:
    Michael Sinatra, ESnet; Julie Percival, University of Texas at Dallas; Michael Smitasin, Lawrence Berkeley National Laboratory; Murat Yuksel, University of Nevada, Reno;
  • Research and Education Track
    Speakers:
    Michael Sinatra, ESnet; Julie Percival, University of Texas at Dallas; Michael Smitasin, Lawrence Berkeley National Laboratory; Murat Yuksel, University of Nevada, Reno;
  • Research and Education Track
    Speakers:
    Michael Sinatra, ESnet; Julie Percival, University of Texas at Dallas; Michael Smitasin, Lawrence Berkeley National Laboratory; Murat Yuksel, University of Nevada, Reno;
  • Research and Education Track
    Speakers:
    Michael Sinatra, ESnet; Julie Percival, University of Texas at Dallas; Michael Smitasin, Lawrence Berkeley National Laboratory; Murat Yuksel, University of Nevada, Reno;
  • Security Track
    Speakers:
    Krassimir TzvetanovA10 Networks, Inc.; .
    Merike Kaeo, DoubleShot Security;
  • Security Track
    Speakers:
    Krassimir TzvetanovA10 Networks, Inc.; .
    Merike Kaeo, DoubleShot Security;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;
  • Peering Track
    Speakers:
    Greg Hankins, Alcatel-Lucent; Daniel KoppDE-CIX; .
    Brian RoganGoogle; .
    Raul SejasTelefonica; .
    Tom PasekaCloudFlare; .
    Aaron Hughes6connect; .
    Elisa Jasinska, BigWave;

 

^ Back to Top