- Beatty Lane-Davis
- Ulsbold Enkhtaivan
- Jordi Palet
- Gunter Van de Velde
- Shane Alcock
- Susan Forney
- Thomas Weible
- Mark Smith
- Aaron Murrihy
- Warrick Mitchell
- Md. Abdul Awal
- Beatty Lane-Davis
- Sunny Yeung
- Peter Landon
- CF Chui
- Rabindra Maharjan
- Anurag Bhatia
- Aris Cahyadi Risdianto
- Geoff Huston
- Gyanendra Maharjan
- Geoff Huston
- Merike Käo
- Vicky Risk
This talk covers the basics of what goes into building subsea cables and how they're laid from coast to coast. It explains how the cables weredesigned to accomodate 10G waves and further describes how that complicates life for 100G waves. To explain the differences between the two and I include a solid primer on coherent transmission. With this information we dig into why the design of cables changed in the last 10 years to optimize for coherent transmission. Finally we look at modern improvements being made to coherent modem design to maximize performance on wet plants and consider how the design of the wet plant is changing again with modern cable builds.
This paper is our historical and operational experience and including how we were fighting internet asymmetric routing, how we solved latency issue using by BGP community.
The tutorial covers deployment guidelines for 464XLAT/NAT64 in Operator and Enterprise Networks.
The success of Segment Routing in the realm of SDN does not need any further introduction. A question many network operators struggle with however, is about the most optimal size of Segment Routing Segments, the data-plane segment encoding and the actual industry standardization maturity.
During MPLS World Congress 2019 the presentation comparison of Segment Routing Data-plane Encodings caused a wave of new Segment Routing encoding paradigms optimizing native IPv6 data transport.
This session will compare the various data-plane encodings of Segment Routing (SRoMPLS, SRv6, SRv6ng, SRv6+ and SR-over-UDP) and provide a technological comparison between those associated Segment Routing encodings. The session will discuss the requirements and benefits of Segment Routing in the domain of 5G and the hyper connected world, where it is business critical to have deterministic guarantees to connect subscribers and customers with both virtual and physical value add services using IPv4, IPv6 and MPLS data-plane encoding.
Key learning points:
Understand the various options of Segment Routing Encapsulation
Learn the structure of each data-plane encoding
Learn how Segment routing can deterministically connect subscribers with value services
Understand the pro's and con's of each data-plane encoding
Understand the security implications of each data-plane encoding
Most network operators today face the challenge of having to be capable of performing the lawful interception (LI) of digital communications and delivering the intercepted traffic to law enforcement agencies in real-time.
However, the commercial solutions for LI that are offered by the usual vendors are prohibitively expensive and are sometimes fail to meet the legislated standards. For smaller operators, meeting one's LI obligations can feel like being stuck between a rock and a hard place: the commercial options are too expensive, the penalties for non-compliance are too onerous and the prescribed standards for LI are too complex to implement something in-house.
In this talk, I will present OpenLI: an open-source ETSI-compliant lawful interception system that makes it possible for small and medium-sized operators to meet their LI requirements without going bankrupt. OpenLI has been developed as a collaboration between the University of Waikato and a consortium of New Zealand ISPs, specifically to allow ISPs in a similar situation to have a viable alternative to vendor LI solutions. This talk will cover the history of the OpenLI project, explain the challenges of implementing LI in software, describe how OpenLI works in practice and announce the current state of the project.
More details on OpenLI (including links to the current released version) can be found here
This presentation is an examination of IPv6 adoption observed on Internet Exchanges. This version of the presentation is prepared for APRICOT and includes IPv6 adoption data and analysis for the APNIC region.
Thomas will describe in detail the structures inside optical transceivers. A Transmitter / Receiver Optical Sub Assembly (TOSA /ROSA) is no longer just a diode in a housing handling the light path to and fro to the fiber. The performance increases from 10G to 100G onwards to 400G - are not only giant steps in bandwidth there are matching leaps in manufacturing.
How did the optical industry players around the globe make it possible to squeeze everything into the tiny form factors we see today? It is all about precision - a microscope with a calm and competent hand is no longer sufficient, now it is about; nano tolerances, testing, complex transceiver firmware and a shed load of money.
This is the high precision optical mechanical engineering revolution which fuels the hyper growth of data centers and optical networking worldwide
If you face design issues with your current optical network design Thomas will give insights into the latest 40G to 400G transceiver developments (e.g. long distance 80km) which you can expect to see in the upcoming months. Hopefully this might save you some headaches.
As a small one more thing Thomas will dive into the basics of how FEC compensates for errors caused by PAM4 modulation.
In this presentation, I will provide overviews of and key points about recently published IETF RFCs that are relevant to network operators. I will also highlight some Internet Drafts that may also may be of interest.
Ever since its inception in the late 80s, BGP has performed impressively in its role of maintaining the inter-connectivity of the Internet. However, when the Internet began, there was no need to bake trust into the routing layer, as all operators could stand in a single meeting room.
Nowadays, we could be peering with thousands of organisations at peering points on multiple continents. With the growing prevalence of accidental or malicious behaviour in the cyber space, how do we trust that the routing information we're being sent is correct? RPKI aims to bring some measure of trust back into our routing inter-connects.
This talk will present the decisions made, steps taken, and infrastructure built to enable RPKI route validation on the REANNZ border. It will show that although RPKI is not a complete solution, it has value and is operationally simple and inexpensive to set up.
The Internet's routing foundation has cracks, and they are growing. Not a single day goes by without dozens of incidents affecting the routing system. Route hijacking, route leaks, IP address spoofing, and other harmful activities can lead to DDoS attacks, traffic inspection, lost revenue, reputational damage, and more. These incidents are global in scale, with one operators routing problems cascading to impact others. Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society and a number of NRENs like AARNet, that provides crucial fixes to reduce the most common routing threats.
The presentation is about the recent deployment of ROV at the National Data Center (NDC) in Bangladesh. Since, NDC was the first in BD to drop invalids, some background work had been done to realize the impact of it for the end users. The activity involved building awareness on RPKI ROA among the ISPs and other network operators in the country. The presentation mostly highlights this activities.
Moore's law continues to track. In the world of coherent transmission that means the DSP's that drive long-haul transmission are getting smaller and smaller. In the next year we're going to see pluggable 400G modules with the capability of running long-haul distances.
What does this mean for networks? Is there a need going forward for an optical switching layer and a packet switching layer? Have we reached a turning point in the economics of networking which will re-shape how we build networks much in the same way MPLS did at the beginning of the century?
Over the last 2 years, Telstra has constructed and become the System Integrator for a common NFV infrastructure based on Open-Standards
Why did we do this?
How does it work?
What is it like to operate?
We are also looking closely at adopting this methodology, along with other emerging technologies for Edge. In this presentation, we will describe the architecture for this solution, our operational experience, and present our thoughts around how the industry and our solution will evolve moving into the future.
With the advent of 5G and proliferation of cloud deployments, the scale and complexity of IP and transport networks have become too onerous for manual OAM approaches.Managing a network today requires more than just multi-layer topology discovery, it demands a model driven, automated approach that includes IP routing that is aware of the transport constraints such as share risk link groups and latency.
This presentation describes the evolution of the dependencies of the IP and transport network, as well as methods that can be used to manage these complexities through practical use cases that provide significant OPEX and CAPEX savings.
It's been more than 20 years since Cisco first introduced NetFlow as a scalable way to track network activity without collecting raw packets.
To this day, network operators who use NetFlow and other types of flow data for network management still report the benefits, which include a lightweight monitoring footprint, faster troubleshooting, more effective planning, and automated security.
However, when any technology survives for two decades, it raises the question: Is NetFlow outdated? Are there other data sources and technologies that are newer, faster, and more detailed for achieving network visibility?
In this presentation, we will discuss:
- What's new with NetFlow?
- Why is NetFlow more useful than ever before?
- What are the new native fields in NetFlow that extend visibility to/from firewalls, load balancers, and MPLS?
- And how can you achieve enrichment by adding data that's not within flow records?
This presentation compares snapshot of the IPv4 global routing table from 9 large networks and compares the differences in routes. The goal is to find what causes a difference of a few thousand routes across larger networks.
This presentation will describe a CORD (Central Office Re-architected as a Datacenter) open-source solutions for service providers. It combines NFV, SDN, and the elasticity of commodity clouds to bring datacentre economics and cloud agility to the Telco Central Office. CORD lets the operator manage their Central Offices using declarative modelling languages for agile, real-time configuration of new customer services. Providers can leverage common hardware and software infrastructure to offer traditional connectivity as well as cloud services for residential, enterprise, and mobile customers. CORD infrastructure also allows third parties to provide innovative services to common customers with a variety of partnership models. As a reference implementation, CORD is built from commodity servers, white-box switches, disaggregated access technologies (e.g., vOLT, vBBU), and open-source software (e.g.,OpenStack, ONOS, XOS). It has been supported by major service providers like AT&T, SK Telecom, Verizon, China Unicom, and NTT Communications.
In particular, this presentation shows that service providers can develop solutions for SDN/NFV-based fabrics by adopting smaller reference implementation of CORD, called a Trellis. It is a leading open-source multi-purpose leaf-spine fabric supporting distributed access networks, NFV, and edge cloud applications. It is a fully open-source platform that reduces the Total Cost of Ownership (TCO) and makes it easy for operators to customize it for their applications. It is built by using bare-metal switches with merchant-silicon ASICs and currently deployed in production networks by a Tier-1 US network operator.
Its been a commonly accepted maxim of network design that buffers in switches need to be dimensioned to be equal to the delay bandwidth product of the circuit that is being driven by the switch. But this is leading to some real issues with scaling, speed and cost. Are there alternative approaches that can make use smaller buffers? We will explore the tradeoffs of network member capacity and protocol performance in this presentation.
A review of the state of the Internet's inter-domain routing space for 2019, looking at the BGP metrics. The presentation includes projects for growth in the IPv4 and IPv6 space for the next five years
For many years we have been hearing about IoT devices and the challenges to make them secure reliable and safe. ICANN's Security and Stability Advisory Committee (SSAC) published a report discussing the opportunities, risks and challenges of the interplay between DNS and IoT devices. This talk will detail the highlights of the opportunities that the DNS offers to increase IoT security and transparency and how the IoT may pose a risk to the DNS.
The presentation covers the topic of managing DHCP configuration in amodern and scalable way using Kea, a new open source DHCP solution that's going to eventually replace ISC-DHCP. Kea provides flexible JSON based configuration with a REST API to manage it. Prefix Delegation mechanism and various options how to deploy it using Kea is discussed. Quick overview with some example operations are presented. While all of the examples discussed are IPv6, the solution still supports legacy technologies, such as IPv4. Discussion of the planned features in future releases will conclude the talk.
- John Garrity
- Sylvia Cadena
- Jim Forster
- Dileep Agarwal
As APRICOT celebrates 25 years of supporting technical development of the internet in the Asia Pacific region, it is also an opportune time to recognize that internet growth and expansion in the region, particularly for universal access and adoption, requires a focus not just on technology implementation but also operations. And a core area of operational focus for internet expansion is necessary financing.
Presented in a panel format, this session would include three types offinancier entities (concessional grants and/or equity investment,expansion debt capital and large-scale project finance) to engageAPRICOT audience members on how to access and utilize financial optionsfor the expansion of their internet infrastructure development.Structured in a panel format with a dedicated moderator, the audienceand participants will have the opportunity to hear how to identify it-for-purpose financing, discuss the pros/cons of different financialinstruments, and the panelists will go further into detail about how toaddress common challenges in obtaining funds for entities in differentstages of maturity. The discussion will be informed in part by theexperience of the panelists, as well as research being conducted byConnectivity Capital for a donor funding agency to increase investmentin last-mile access initiatives.
John Garrity UNDP
Early stage grants funding
Sylvia Cadena APNIC
APNIC Foundation ISIF Awards Manager
Expansion debt capital
Jim Forster Connectivity Capital
Dileep Agarwal WorldLink
Founder & Chairman
- Julio Sirota
Brazil Internet Exchange (IX.br), a Department of the Brazil Network Information Centre (NIC.br), has played a prominent role in the development of the Internet in the country. With over 2300 unique ASNs connected in 31 locations and over 9Tb / s of traffic it is one of the top IX business in the world.
This presentation will cover a little of the history of the model adopted by NIC.br in the construction of IX.br and how we have supported the great growth observed in recent years.
Country and environmental data on key players that make the Internet work should also be analyzed, as it has driven increased traffic and the number of ASNs.
With the arrival of the first content providers in the city of Fortaleza, the beginning of a decentralization process is expected to exist today in São Paulo and Rio de Janeiro. Data from these top three IXPs will be compared to see what is already happening.
In this speech we hope to show the current and future opportunities to exchange traffic in Brazil.
- Jide Akintola
- Dinesh Kumar
- Arnold Nipper
- Faraz Shamim
- A. S. M. Shamim Reza
There has been an explosion of data center technologies over the past few years driven by the advent of cloud and SDN. The aim of this session is to walkthrough VXLAN BGP EVPN technology building blocks used in building highly scalable and reliable data center.
This session will cover technology evolution towards SRv6 , how this will be further simply and make network more scalable . This session will also cover technical details of SRv6 and major use cases like L3VPN, traffic engineering , service chaining etc.
PeeringDB itself is around for 15 years now, and PDB 2.0 is out for almost four years. With the new GUI and API usage of PDB surged. This drives the demand for an in-depth tutorial.
This tutorial first gives a quick introduction to PeeringDB itself, the association and committees behind it, before going into detail with the GUI and then for the advanced to take a look at the API.
Network state awareness and troubleshooting is a large and skilled part of operating a network. This session will cover basic network data plane troubleshooting best practices and techniques to plan for failures. We will also do demos and a review of the troubleshooting tool chain: NetFlow, perf-mon, CBQoS, ICMP/traceroute, interface stats, but also touching on RP stability (SPF runs, unstable neighbors etc), and SDN methodologies along the same lines
While intrusion detection systems are the basis of every security aware organization and most of the network based threats have been successfully mitigated in the past; the signature based detection system has a major drawback. And that is, the system is always one step behind the newest threats.
In depth analysis over a larger set of Network data has the advantage of detecting different types of anomalies. And if it is about a Largest Nation wide ISP, then the SOC team has to adopt the Anomaly Detection system to mitigate the infrastructure threats in a pro-active way.
This talk is about the research work that have been conducted in my current organization, to detect well known and unknown attacks in DNS infrastructure. And the years of experience has been deployed in to the system to build a robust Machine Learning model to detect anomaly behavior in DNS traffic which will have a better assumption on the threat of an anomaly.
I have worked on a number of detection methods, both real-time and statistical analysis methods, that can detect anomalies of some well known DNS attacks. Here i will share about the lesson learned and the progress of our Machine Learning approach.
- Photchanan Ratanajaipan
- Matsuzaki Yoshinobu
Using local language character sets in domain names and email addresses
Dominant of English in Internet use is a digital divide that restricts users who use non-English characters or scripts to access data and information as well as to use Internet services.Allowing only a restricted character set (ASCII a to z, 0 to 9 and the hyphen) within the Internet Domain Name System causes difficulty for non-English to learn a new character set in send emails or access to websites. With the emergence of Internationalized Domain Names (IDN) and Internationalized Email address (EAI), two of the important fundamental protocols, made an effective step to achieving a multilingual Internet. IETF and ICANN released- guidelines for IDN and EAI that allow Internet users to use domain names and email addresses in their preferred scripts. However, some websites, software, and applications remain unable to accept and process the domain names and emails address as valid names as guided by IETF. Web addresses cannot be resolved to the intended resource on the website. Mail systems cannot send mails to expected recipients.
The BoF aims to gather interested individuals and organizations to share information and brainstorm collectively on how to increase the awareness of its significance and how to ensure that IDNs and EAI can be used faultlessly. Updates of what IDNs and EAI activities have been done in each country may also be shared.