Friday, April 29, 2016

Chicago Network Operators Group - CHI-NOG 06

Chicago Network Operators Group - CHI-NOG 06
CHI-NOG is a Chicago-based organization that connects network professionals within the Midwest and the United States. This conference was started by network engineers and network architects to create a community, to learn from each other and meet others. We get away from our keyboards and screens to meet in person every year bringing in speakers from all over the US to learn and have a beer with them. CHI-NOG is vendor neutral so we aren't trying to sell you anything, but you do get a pretty awesome t-shirt each year as part of attending. On May 12th, 2016 we will host the sixth annual CHI-NOG conference. The previous events quickly sold out and ran at full capacity. Please register early.  For more information on the event including agenda please see http://chinog.org/meetings/chi-nog-06/. Registration Includes: * Admission to the event * Awesome t-shirt * Lots of coffee and drinks * Lunch * Snacks! Snacks! Snacks! * Evening social event, with two hours of wine, beer and appetizers * Meeting some of the best people in the industry   Agenda   TitleSpeaker 8:00-8:30 1. CHI-NOG Welcome and Introduction Opening remarks and introduction to the conference.   Tom Kacprzynski 8:30-9:00 2. BGP Security: An Overview Securing the global Internet means securing BGP, but what does that entail, and what are the options in this space? This 30 minute presentation will provide an overview of the problem space and some thoughts on solutions, as well as pointers to further reading.   Russ White 9:00-9:30 3. IPv6: Passing on Lessons Learned from My Journey IPv6 and I met back in the early 2000s. At the time it seemed to me nothing more than IPv4 with 128 bits and some cool hex. That all changed the day that I read that IPv6 had no broadcast. That was the day I truly started really looking at IPv6. That was also the day that I started truly learning IPv6. Ever wonder things like: if there is no broadcast, how do MAC addresses get resolved? What is this weird link-local thing? Why are there so many 3s in the sniffer trace? What is solicited-node multicast? In this session I will share my journey of the questions I had and what I found the answers to be.   Denise Fishburne 9:30-10:00 4. EVPN: Or how I learned to stop worrying and love the BGP As more and more enterprises begin to develop multiple datacenter deployments for their enterprises, new technologies have come along to solve many common problems with basic network connectivity between datacenters. This presentation describes Ethernet VPN, a new and open standard to forward Layer-2 information between Layer-3 segments. This presentation will describe and demonstrate Ethernet VPN deployments via MPLS extensions as well as integrating with VXLAN deployments for virtualized infrastructures.   Tom Dwyer and Clay Haynes 10:00-10:15 Break 1 10:15-10:45 5. InterTubes: A Study of the US Long-Haul Fiber-Optic Infrastructure The complexity and enormous costs of installing new long-haul fiber-optic infrastructure has led to a significant count of infrastructure sharing in previously installed conduits. In this paper, we study the characteristics and implications of infrastructure sharing by analyzing the long-haul fiber-optic network in the US. We start by using fiber maps provided by tier-1 ISPs and major cable providers to construct a map of the long-haul US fiber-optic infrastructure. We also rely on previously underutilized data sources in the form of public records from federal, state, and municipal agencies to improve the fidelity of our map. We quantify the resulting map's connectivity characteristics and confirm a clear correspondence between long-haul fiber-optic, roadway, and railway infrastructures. Next, we examine the prevalence of high-risk links by mapping end-to-end paths resulting from large-scale traceroute campaigns onto our fiber-optic infrastructure map. We show how both risk and latency (i.e., propagation delay) can be reduced by deploying new links along previously unused transportation corridors and rights-of-way. In particular, focusing on a subset of high-risk links is sufficient to improve the overall robustness of the network to failures. Finally, we discuss the implications of our findings on issues related to performance, net neutrality, and policy decision-making.   Rakrishnan Durairajan 10:45-11:15 6. VXLAN Deployment in IX Fabrics Recently, very large Internet Exchange (IX) fabrics are undergoing transitions from VLAN-based architecture to VXLAN-based architecture, primarily because of inherent limitations in VLAN scalability, demand for loop free topology, ECMP or dynamic re-routing capability on failures. While it makes sense to change from VLAN to VXLAN, challenges are seen in rolling out this migration with minimal impact to existing customers in the network. In this session we will discuss some of the challenges we have encountered and how we solved the migration with minimal disruption to existing Customer deployment.   Hemanth Maturi 11:15-11:45 7. Regional IXP Introductions and OPEN-IX Overview 11:45-1:00 Lunch 1:00-1:30 8. Source Routing Re-Imagined Operators have always been interested in source routing due to its determinism and ability to engineer traffic. However, traditional source routing using IP header options was never widely deployed due to security concerns. Recent buzz around SPRING (a.k.a. Segment Routing) has re-invigorated interest in source routing technologies, but for many operators moving to SPRING represents a significant change in their operating practices. Many of them are looking at more incremental approaches where they apply new source-routing concepts brought by SPRING, but implemented with current technologies with minor augmentations.In this talk we will review the new concepts SPRING brings to network design, and will then focus on using existing protocols for achieving similar benefits. We will discuss: SPRING principles Clever usage of static LSPs to achieve predictable label values in a data-center network Minor enhancements to BGP-LU for more resilient EPE (Egress Peer Engineering) Interoperability considerations between SPRING and non-SPRING domains Nick Slabakov 1:30-2:00 9. Segment Routing – Traffic Engineering In this talk, we would look at Segment Routing traffic engineering primarily focused around inter-area/multi-domain traffic engineering. We will look at how certain approaches with Segment Routing can help in solving the challenges associated with multi-domain traffic engineering in a simple and scalable manner. We will look into various components associated with multi-domain traffic engineering and approaches to solve multi-domain traffic engineering. • PCE • PCEP • On Demand Next-Hop • BGP SRTE Dynamics • PCE HA Segment Routing (SR) works by encoding a path across a network as an ordered list of segments, which may be links, multi-hop tunnels between nodes, and more. SR uses today's dataplane technologies without any modification, supports MPLS, IPv4 and IPv6, and requires only very modest changes to existing routing protocols. SR is also fully documented in IETF drafts with both multi-vendor and multi-operator contribution, thereby increasing the likelihood of interoperable implementations. Segment Routing allows operators to program new service topologies without the traditional concerns around network state explosion. Using SDN procedures, the head end can program a ordered list of segment identifiers (MPLS labels, IPv6 routing headers) that enable explicit source routing. This can allow for service level differentiation, potentially providing new enhanced service offering opportunities for operators. SR can be introduced slowly into a network without any flag day events, thereby minimizing disruption.   Diptanshu Singh 2:00-2:30 10. DDoS Threat Landscape Since the first denial of service (DoS) was launched in 1974, distributed denial of service (DDoS) and other DoS attacks have remained among the most persistent and damaging cyber-attacks. These attacks create complex and dynamic challenges for anyone responsible for cyber security. In this presentation, Ron will cover a brief overview of common attacks, major attack types and tools, as well as actionable tools and tips for attack detection and mitigation.   Ron Winward 2:30-2:45 Break 2 2:45-3:15 11. Network Automation, A Practical Approach Discussion regarding best practices for network automation and how to implement them sanely, focusing on the Unix philosophy. Many examples provided, with ample time for questions throughout the session.   Matt Griswold 3:15-3:45 12. Modern Tools for Visualizing Network Traffic This talk will cover how to build data driven, interactive network traffic maps and time series charts of network traffic. It will start with a very brief introduction to our overall data analysis and visualization approach and then quickly move into demonstrating the capabilities of the libraries we have developed and showing how to use them with your own data. This code is used extensively in the publically visible ESnet portal at https://my.es.net/. The libraries are open souce and the documentation can be found at http://software.es.net/react-network-diagrams/ and http://software.es.net/react-timeseries-charts/. There are links to the GitHub repos in the documentation.   Jon Dugan 3:45-4:00 Break 3 4:00-4:30 13. NetFlow, Flow-Like Data and Their Many Uses Most operators know that flow (NetFlow, IPFIX, and sFlow) data can be collected from routers and switches, and can be used for network cost and planning analysis, attack detection, and peering analysis. But bulk flow data just shows the traffic to-and-from. 'Augmented' flow from load balancers, servers, and sensors listening on taps and span ports lets you answer new questions. In this talk, we'll briefly review flow, 'classic' flow analytics and its use cases. We'll also cover less common sources of flow like OSS sensor software and configs, load balancers, IDS sensors, server-side monitoring software, and nginx logs. Finally, we'll discuss real-world use cases supported by 'augmented flow'.   Avi Freedman 4:30-5:00 14. The Real Metric in Evaluating CDN Performance When researching web performance, it's easy to be convinced that response time or time-to-first-byte (TTFB) is the metric that you need to optimize for. Those same articles and so called 'experts' will also tell you it's extremely important to enable browser side caching, so that your clients don't have to make a 304 request back to the CDN. Measuring 'response time' or TTFB, is simply measuring the performance of 304 responses (headers without content). These are the very requests you just eliminated with client-side browser caching! So, if you're not re-requesting content from the CDN, you want that first request (200 response) to complete as fast as possible. That's Time-To-Last Byte (TTLB) – That's throughput!Learning Outcomes: -Learn why TTLB/throughput is more important than just TTFB. -Understand how to measure TTLB. -Optimizing TTLB using Anycast. -Learn which network monitoring companies use RUM to evaluate CDN file TTLB/throughput performance   Matt Levine 5:00 Social   Speakers   Name and BioPhoto Avi Freedman Avi Freedman has decades of experience as a leading technologist and executive in networking. He was with Akamai for over a decade, as VP Network Infrastructure and then Chief Network Scientist. Prior to that, Avi started Philadelphia's first ISP (netaxs) in 1992, later running the network at AboveNet and serving as CTO for ServerCentral. Clay Haynes Clay is a Senior Network Engineer at Nexum, Inc. He has 10+ years of experience in server, networking, and security environments. Clay has earned the prestigious JNCIE-ENT and JNCIE-SEC certifications, and has been a big proponent in datacenter interconnect technology.     Denise Fishburn Denise "Fish" Fishburne, CCDE No.20090014, CCIE No.2639 (R&S,SNA), is an engineer and team lead with the Customer Proof of Concept Lab (CPOC) in North Carolina. Fish is a geek who absolutely adores learning and passing it on. She works on many technologies in the CPOC, but her primary technical strength seems, however, to be troubleshooting. Fish has been with Cisco since 1996, CPOC since 2001, and regular speaker at Networkers/Cisco Live since 2006.CiscoLive is a huge passion for Fish! As such, in 2009, she got even more deeply involved with CiscoLive by becoming a CiscoLive Session Group Manager. Look for Fish swimming in the bits and bytes all around you, or just go to www.NetworkingWithFish.com.   Diptanshu Singh Diptanshu Singh (3xCCIE,CCDE) is a Solutions Architect with Cisco Systems mostly focused on service providers and data center. He is a network enthusiast passionate about network technologies so not only is it his profession, but something of a hobby as well. Hemanth Maturi Hemanth Maturi is a Senior Manager, Network Operations for Equinix and has about 15 years of experience in Networking Industry. Currently, he is responsible for deployment, rollout and support of Network Services offered in Equinix Data Centers for America Region. Prior to Equinix, he worked in various roles at Cisco Systems in its engineering divisions working on various routers & switches running IOS-XR & NexusOS software. He was deeply involved in the design, validation and certification of various Customer Deployments specifically in the Service Provider Market Segment. He holds a Masters in Computer Science from Utah State University and a MBA from Santa Clara University. Jon M Dugan Jon is a software developer and a former network engineer at ESnet, the US Department of Energy high performance science network. His professional interests include building tools to help network engineers, network monitoring and visualization, network automation and high performance networking. He currently leads a small software development team at ESnet.After graduating from the University of Illinois (UIUC), he spent the early part of his career as a network engineer at the National Center for Supercomputing Applications (NCSA). He was very active in the joint IEEE/ACM Supercomputing conference series. Dugan is based in Chicago, Illinois. When not working he enjoys cooking, woodworking and tinkering with electronics. Matt Griswold Matt Griswold is currently CTO for United IX, an Internet exchange in Chicago. He has a broad background including development, networking and system administration and is passionate about peering and Internet. He is passionate about peering and Internet communities and has volunteered for organizations including Euro-IX, NANOG, Open-IX and PeeringDB. Matt Levine Matt Levine has been a entrepreneur, leader and innovator for more than 15 years, and is the founder and CTO of CacheFly. Having pioneered the first TCP anycast CDN, Levine has still continues to evangelize the technology, now implemented by some of the largest internet companies in the world. Levine has presented at various conferences, sharing best practices in accelerating content delivery to effectively serve the needs of organizations that use it as a key business driver. Matt's most notable speaking engagements have come in the form of presentations and panel discussions at NANOG, Hosting Transformation Summit, Velocity, Global Peering Forum and New Media Expo. Nick Slabakov Nick has been in the networking industry for over 20 years, with the last 11 at Juniper Networks, where he has been working with some of largest service providers on their scaling challenges. He is currently architect for the Cloud vertical in Juniper, and is fortunate to work with some of the most innovative customers and focuses in new areas like network programmability, platform disaggregation, and SDN. Ramakrishnan Durairajan Ram Durairajan is a graduate student in the Department of Computer Sciences at the University of Wisconsin-Madison, where he received the M.S. degree in 2014, and is currently pursuing the Ph.D. degree. Before joining UW-Madison, Ram earned his B.Tech. in Information Technology from the College of Engineering, Guindy (CEG) in 2010. Ram is currently a research assistant and member of Wisconsin Advanced Internet Laboratory (WAIL) and Wisconsin Institute on Software-defined Datacenters Of Madison (WISDOM) at the University of Wisconsin-Madison. Ram's research vision is to create a "robust Internet" by understanding the Internet's topology and outage risks through principled measurements. To that end, in his graduate work, Ram is developing frameworks for (i) measuring and analyzing the topological structure of the Internet, (ii) measuring and understanding the outages and risks, and (iii) proposing easy-to-deploy robustness suggestions to mitigate network outages. Ron Winward Ron Winward is a Security Evangelist for Radware, where he helps execute the company's thought leadership on today's security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world. Russ White Russ White has more than twenty years' experience in designing, deploying, breaking, and troubleshooting large scale networks. Across that time, he has co-authored more than forty software patents, has spoken at venues throughout the world, has participated in the development of several internet standards, has helped develop the CCDE and the CCAr, and has worked in Internet governance with the ISOC. Russ is currently a member of the Artchitecture Team at LinkedIn, where he works on next generation data center designs, complexity, security, and privacy. His most recent books are The Art of Network Architecture and Navigating Network Complexity.MSIT Capella University, MACM Shepherds Theological Seminary, PhD in progress from Southeastern Theological Seminary, CCIE #2635, CCDE 2007:001, CCAr.   Tom Dwyer Tom is a Principal Engineer and Data Center Practice Lead at Nexum Inc., a VAR, MSP, and a Training Services provider based out of Chicago. Tom has over 20 years of experience focused on networking, security and datacenter technologies. Tom is certified by Juniper as a JNCIE-ENT.   FAQs   What are my transport options getting to the event? You can take public transportation CTA/Metro. For details please use  Google Map Directions. What are my parking options? Event attendees have a special valet option for (paid separately).  Alternate parking can be found using  Parkwhiz Parking Finder   Where can I contact the organizer with any questions? Please contact conference at chinog.org with any questions.   Is my registration/ticket transferrable? Yes, you can transfer your registration to anyone else. Do I have to bring my printed ticket to the event? You can bring the printed ticket or electronic version. Tickets required for entry.  

at Embassy Suites Downtown Magnificent Mile
511 N. Columbus Drive
Chicago, United States

Orignal From: Chicago Network Operators Group - CHI-NOG 06

No comments:

Post a Comment