- Daniel Griggs
- Geoff Huston
- Michele McCann
- Christian Kaufmann
- Alexander Asimov
- Gaël Hernandez
- Fuad Bin Enayet
- Richard Bayliss
- Tom Paseka
- Amreesh Phokeer
- Artyom Gavrichenkov
- Amit Dhamija
- Eddy Winstead
- Shoko Miyagawa
- Alain Durand
- Jeff Schimidt
- Alain Durand
- Nick Hilliard
- Afifa Abbas
- Philip Paeps
- Jeff Young
- Yeseul Kim
- Andrei Robachevsky
- Richard Bayliss
- Kireeti Kompella
- Alan Mauldin
- Jing Di
- Geoffery Huston
- Ondřej Filip
- Philip Paeps
- Eric Andrei Baleanu
- Jason Mayes
- Ashley Jones
- Yasunari Momoi
- Kota Kanbe
- Doug Madory
- CF Chui
Africa remains a key territory on the global map.Rich in oil and natural resources, the continent holds a strategic position. With over a billion potential eyeballs of which 600 million will be online by 2025.
The presentation will highlight operational challenges within the region focused on key infrastructure and regulatory issues.
For many years Akamai's had just independent server clusters all over the world and used the Internet to connect them together. This changed in 2018, the reasons why we build a backbone and how we did it are the topics of this presentation.
The global routing incidents have already become regular. Its source is engineers mistakes, but the tolerance to these anomalies at the level of IP-transit allows these incidents to have global consequences.
In this report, I will make a review of different methods of ingress route filtering and discuss possible future solutions.
A contemporary network service heavily depends on domain name system operating normally. Yet, often issues and caveats of typical DNS setup are being overlooked. DNS (like BGP before) is expected to "just work" everywhere, however, just as BGP, this is a complex protocol and a complex solution where a lot of things could go wrong in multiple ways under different circumstances.
This talk is supposed to provide some assistance both in maintaining your own DNS infrastructure and in relying on service providers doing this.
DNS Response Policy Zones were invented to provide filtering for abuse via the DNS. Thus, a mechanism for creating a DNS Firewall. Over a short few years, RPZ has gone from a new "cutting-edge" technology to being considered a best practice.
This talk will examine the need for RPZ, how RPZ filtering is done and the many options available for implementation. A real-world, large scale implementation use case will be presented as well.
For disaster risk reduction, critical attention should be paid to hygiene control in shelters to maintain minimum health safety level. For that, one of challenges for health responder is data collection to generate reasonable information that can be used in predicting whether something is likely to outbreak communicable diseases. EpiNurse Nepal is an action research to investigate and report on the process of change to improve and implement the life environment assessment by local Nepalese nursing workforce and the sharing of collected health information through real time communication with governmental and international relief agencies. The health monitoring app takes an important role for the data collection infrastructure. In this presentation, our challenge, achievement and ICT utilization will be introduced.
This talk will look at IPv6 adoption measurements made over the last 4 years for 150 countries. We will see that about 30+ countries have consistently increased their measured penetration year over year, while 100+ countries are still now showing up on that radar screen... We will then look into more detail about a selection of several countries to analyze the evolution of their penetration numbers year after year.
The Identifier Technology Health Indicators (ITHI) project at ICANN is now entering a new phase. Metrics relevant to domain names have been defined and we are now starting to collect data. This will be the first public presentation of those results. This coincides with the expected beginning of measuring of similar metrics in the number space in a separate but connected effort orchestrated by the RIRs.
While the Intel x86-64 architecture is undisputedly market leader in the server space, several vendors have started introducing ARM64 boards. This presentation examines the suitability of ARM64 server boards for network servers. In particular, we look at the workload of a moderate-size ccTLD DNS zone (.dk) and how it would perform on ARM64 running FreeBSD.
We consider the viability of the ARM64 platform from performance and performance/power perspectives. While ARM64 is definitely slower than Intel on many workloads, it performs at least as well or better than Intel on workloads that are interesting to the internet community. Notably DNS is a very appropriate workload for ARM64.
The Telstra Programmable Network is a wide-area Openflow network able to stitch networking components together in minutes on a global scale. TPN is moving forward since being acquired (TPN was formerly PACnet's Programmable Network) and to this end, Telstra has home-grown (developed) an Openflow controller for the project. OpenKilda (the controller) has also been placed in open source.
OpenKilda makes use of Storm (stream processing) in an attempt to make the controller function scale over large networks (involving large variations in latency). In this presentation you can learn about the project and hopefully decide to try OpenKilda, contribute to the project, or simply come learn about a real, global Openflow network in operation today.
This conference session is to provide the overview of the legal landscape and legal developments concerning the cyberspace and to seek proper legal, policy and technical solutions for the Asian community in general. Unlike European and North American countries, cooperative discussions on cross-border legal disputes have not yet been active in Asian countries, except in several high-level conferences including APrIGF. In this session, current legal trends on the jurisdictional issues on the cyberspace will be introduced. This includes current Internet-related legal disputes (cross-border data transaction, online contents regulations, and online harassment issues), court rulings around the world references and online resources that the participants can refer to whenever similar incidents arise in the future. This session will also simulate some novel legal disputes which can arise with the increasing volume of e-commerce and online activities in Asia countries and around the world.
After the presentation, discussions on what can be done within Asian countries varying from technical parts (e.g. redirecting the query requests for the access to illegal contents, AI diffusion for online contents regulation etc.) in collaboration with the law enforcement institutions and policymakers will be further discussed to initiate the collaborative operation of the safe internet for all.
In 2017, not a single day passed without an incident. While none of the incidents was catastrophic, all of them continue to demonstrate the lack of routing controls like those called for in MANRS that could have prevented them from happening.
There is quite some media coverage of select incidents that took place in 2017. But this is just a small fraction of what happened in the routing system in 2017. Rather than measure routing security by anecdotal evidence, let's look at the data.
This presentation will present data on routing incidents that took place in the APAC region. We'll look at what measures could have prevented this from happening and provide some guidance on how to implement them.
We'll finish up the presentation with a quick poll with real-time results.
Bandwidth requirements continue to grow at an exponential pace driven by UHD Content, IOT, Serverless Compute, Machine Learning (ML) and Artificial Intelligence (AI). Even in APAC, local data shows us that the doubling of demand every year will drive exponential growth. Additional APAC examples help us demonstrate the need for 25G user connections and 100G and beyond in the backbone. 400G will arrive in 2018 and operators need to understand when and how it can impact their networks.
In this vendor neutral session, we will highlight new 400GE/800GE technology, particularly OSFP and QSFP-DD, and analyse network architecture evolution options. We will also discuss the new 25G and 50G standards and demonstrate how they are the current most economic way to address bandwidth scaling today with the added benefit of providing a future proof pathway to 400G Ethernet and beyond.
This entertaining presentation introduces the FreeBSD operating system and the community that produces it. FreeBSD is an advanced computer operating system used to power modern servers, desktops, and embedded platforms. A large community has continually developed it for more than thirty years. Its advanced networking, security, and storage features have made FreeBSD the platform of choice for many of the busiest web sites and most pervasive embedded networking and storage devices.
FreeBSD is the reference implementation for many popular network protocols (most notably IPv4, IPv6, TCP and SCTP) and is used by many operators of critical internet infrastructure. Inexplicably, many people choose inferior alternatives for their services. I explain why FreeBSD is nothing to be afraid of continues to be a very good choice for internet infrastructure.
Implementation of a TV Exchange over the infrastructure of InterLAN Internet Exchange using multicast.
Are you new to Machine Learning? Take this speedy tour of the state of Machine Learning in 2018 by Jason Mayes, Senior Creative Engineer at Google. Jason will cover a high level overview of how simpler forms of machine learning work behind the scenes, its creative applications, along with some of the APIs and libraries that you can use from Google today to get started. This fast paced talk aims to educate, inspire, and enable you to rapidly prototype your next idea in this amazing industry.
As the virtualization technologies spread wider and further, the methods for building systems have changed, causing the rapid increase in the number of VM/container/etc. instances that developers and operators have to look after.
Vuls and VulsRepo are pretty cool tools for scanning and visualizing vulnerabilities on instances. They are easy-to-use, actively developed Open Source Software.
This presentation introduces the basics of Vuls, how to use it, and lessons learned while implementing and improving its detection engine. Also, we will examine some sample use cases to see how to fit Vuls to the structure of your system and operation framework, utilizing the great flexibility of Vuls.
In addition, we will also introduce the go-cve-dictionary etc. which is the peripheral tool of Vuls and VulsRepo. The development team is looking for data sources available for vulnerability scanning and resource information written in local languages other than English.
For a little more than 90 minutes on 6 November 2017, internet service for millions of users in the U.S. and around the world slowed to a crawl. Was this widespread service degradation caused by the latest botnet threat? Not this time. The cause was yet another BGP routing leak.
Routing leaks were again in the news in December when a Russian ISP originated several dozen BGP routes involving IP address space belonging to high-profile companies such as Google, Apple and Facebook.
This talk will review these events and expand upon previous analyses by exploring the impacts in IPv6 routing. It will also discuss the efficacy of fielded mechanisms to reduce the impact of these types of events.
The data within the WISR is based on the collectiv experiences, observations and concerns of the global operational security community. The survey data are collected from those who are directly involved in day-to-day operational security, this provides real insight into infrastructure security from an operational perspective.
The WISR highlights key industry trends and threats facing network operators, along with the strategies used to mitigate them. In this presentation, we will be reviewing some of the key findings from this year report.
- Dima Bekerman
- Patrick Jones
- John Crain
- Muhammad Moinur Rahman
- Tashi Phuntsho
- Jeff Schmidt
- Jordi Palet Martinez
- Nick Hilliard
- Imtiaz Rahman
- Paresh Khatri
- Faraz Shamim
- Aamer Akhter
- Shaowen Ma
- Tom Harrison
- Sofia Silva Berenguer
- Ketan Talaulikar
The DDoS Protection Workshop provides in-depth technical overview in the field of DDoS protection.
If you're involved in IT security or network operations, you know that DDoS attacks are a problem that's not going away. Recent studies indicate that almost 75% of organizations have suffered at least one attack over the past 12 months. DDOS attacks are becoming more frequent and the size of these attacks is increasing. This increases the load on the networks of Internet Service Providers (ISPs), while also taking websites offline. Nowadays, many companies rely on Internet applications (banking, communication) for their core business. As such, outages of Internet applications can have a big financial impact on companies that provide these services.
This workshop explains current DDOS attacks landscape and compares commonly used mitigation methods, together with 3 live demonstrations, some of which involve the audience hands-on, which will provide a thorough understanding of the DDOS field from different perspectives, both motivational and technical.
Starting with a novel idea from a group of researchers at Stanford motivated by the hope for greater network programmability and flexibility, since clouded by relentless hype generated by vendors (and non-operational researchers), the community has been overwhelmed with different interpretations of what software defined networking is and what actual problems it can solve.
With an endless list of proposed frameworks, each serving different agendas, which should we implement and to solve which problems? Are ideas and proposals that focus on “what we would like to have” in line with “what is actually feasible and practical” given present day technologies and challenges? Do these new concepts require undoing what the industry has worked on for the last 2-3 decades? Do these solutions solve actual problems? Or is there a need to find a practical compromise between what we would like and what is actually doable? This tutorial is a high-level attempt to answer a few of the above questions, taking into account the current reality of closed proprietary vendor implementations and our hope for an open, programmable, and agile network infrastructure, an attempt at distinguishing the hype from reality.
This tutorial has two parts, 90 minutes each.
The first one is studying transition mechanisms and describing all the possible "logic" options, as well as the steps needed to deploy IPv6 in an operator network.
The 2nd part will concentrate in deploying IPv6-only using the example of cellular networks, but applying the same concept to non-cellular ones.
Workshop #1: Introduction to IXP Manager
IXP Manager is a full stack application for managing Internet Exchange points. Built using MVC methodology on PHP frameworks, it allows IXPs to manage customers, provision new connections and services, monitor traffic usage, handle cross-connects and define core network connectivity and infrastructure, including full route server configuration. It also has a self contained customer portal allowing IXP members to view their IXP traffic statistics and a unique tool called My Peering Manager enabling IXP members to request, manage and track peering sessions with other members.
This presentation provides an in-depth introduction IXP Manager, demonstrating all the primary functionality of the application and how it is used in production as an operational tool in modern IXPs.
Workshop #2: IXP Manager Live Setup and Configuration
This workshop provides a live, interactive demonstration of how to install and configure IXP Manager from scratch. Using a test IXP built in a virtualised environment, we provide a staged walk-through the entire set-up process, including configuration of switches, customers, addressing and ports. We set the following targets:
- IXP Manager installation on bare-bones Linux virtual machine
- configuration of colocation facilities, cabinets, data centre patch panels
- configuration of IP addressing and Internet routing registry (IRRDB) policies
- setting up sample customers and customer ports
- setting up switches and switch ports using preconfigured virtual IXP model
- building a live route server configuration with full customer prefix filtering using the IRRDB database
In this tutorial, we provide a comprehensive introduction to Network Function Virtualization, including:
- defining NFV, and contrasting with SDN
- motivations: what problem are we trying solve ?
- standardisation: elements of the ETSI NFV ISG framework
- building Telco Clouds: how can NFV be actually used ?
- service chaining: service creation in hybrid physical-virtual networks
- current state of the market: learnings from 5 years of NFV existence
In this session, we will talk about how network evolve to SDN.
Start from Routing protocol evolution from traditional IGP to Google Firepath(obsolete 5 years+). we discussed some issue with currently OSPF/ISIS protocol.
Then we introduce a modern open Source routing protocol, Facebook Open/R. by introduce the key components and Technologies and comparison with OSPF/ISIS, we show how modern protocol's architecture.
To optimized data center CLOS architecture, we introduce latest RIFT(routing in the Fat Tree protocol). RIFT share the similar OPEN/R architecture, but more optimized for DC FAT Tree topology routing.
Last we introduce modern SDN controller also share similar key component. so with a better message bus and KV Store. we can build a new generation of Routing/SDN architecture.
This first half of the talk starts off with an overview of RPKI: the motivating factors, the problems it solves, and how it works at a high level. A review of production deployments (mostly at IXes) follows, with a focus on more practical issues, such as progressing from tagging invalids to dropping invalids.
The second half of the talk is about how resource holders can deploy RPKI in the APNIC region, and about how network operators can enable origin validation in their routers. Deployment will involve live demos that participants will be able to replicate locally.
- Suman Kumar Saha
- Niall Robinson
DNS RPZ allows a recursive server to control the behavior of responses to queries.Administrator to overlay custom information on top of the global DNS to provide alternate responses to queries. RPZ data is supplied as a DNS zone, and can be loaded from a file or retrieved over the network by AXFR/IXFR. It's an open and vendor neutral mechanism. It works like firewall on cloud. I've implemented DNS RPZ in our ISP and mentioned the case study report also.
Data center interconnect solutions evolve rapidly, taking advantage of the latest optical transmission technologies. Recently, low cost direct detection optical technologies have been introduced as an alternative to coherent transmission. The presentation will compare and contrast these two solutions and identify benefits and drawbacks for different deployment applications.
- Jesse Sowell
- Yoshinobu Matsuzaki
- Yoshinobu Matsuzaki
- Aftab Siddiqu
At the APNIC 44 Cooperation SIG in Taichung, Jesse Sowell presented M3AAWG's efforts to understand abuse dynamics and anti-abuse efforts in the Asia Pacific region, fundamentally asking 'Is there demand for an anti-abuse working group (AAWG) in the AP region?' Based on feedback in the SIG and in hallway conversations, the answer seems be yes. We are proposing BoF to continue this dialog and community development effort.
The first half illustrates the kind of best common operational practices produced by an anti-abuse working group. Severin Walker will present our work on abuse desk operations. The idea behind abuse desk operations goes by a variety of names: service policy enforcement, policy compliance assurance, and fraud remediation to name a few. The fundamental idea behind abuse desk operations is to get bad actors off your network, protecting your users and reducing the costs related to security incidents. We will present the fundamental elements of abuse operations in terms of industry (community) responsibilities, business justification, common categories of incidents, and the incident response timeline. Each phase of the incident response timeline---detection, reporting, evaluation, enforcement, and remediation---is placed in the context of the overall process and illustrated with pragmatic instances of how these processes play out in the real world, including illustrations of how to evaluate data produced by common abuse reporting tools and formats. The presentation concludes with a survey of the common abuse desk activities and the benefits to the organization.
The second half of this BoF is a town hall style discussion on abuse issues in the region. This discussion continues the dialog started in the APNIC 44 Cooperation SIG. We will briefly present anti-abuse working groups as the fora in which the kinds of anti-abuse best common operational practices just presented are developed (much like BCOPs in the network operator world), quickly followed by a discussion with the audience around the types of abuse they are facing on a day-to-day basis. In this discussion, the dialog will explore how abuse dynamics in the AP region are similar to those seen by M3AAWG and, more importantly, where they differ. This discussion will describe where M3AAWG best practices may contribute to resolving these issues and where the AP community can help update anti-abuse best practices to reduce local, regional, and global abuse problems. In the course of this dialog, Severin and Jesse elicit further feedback from the audience to better understand the demand for anti-abuse efforts in the region and how to most effectively develop a self-sustaining anti-abuse working groups in AP.
There are many NOG style communities in AP region, and each NOG has own challenges. This BoF is aimed at sharing experience among NOG organizers - mostly focused on how to start up/maintain/continue/expand NOG activities.
- NOG Contents
- Working Group
The NOG Reports session offers leaders or participants of themany regional and country network operations group in the Asia Pacificregion to give a short presentation, Lightning Talks style, to share thelatest activities in their own community.
- Kurtis Lindqvist
- Martin Levy
- Jing Di
- Christian Kaufmann
- Paresh Khatri
- Richard Bayliss
- Arnold Nipper
- Jeff Young
- Margarida Correia
This panel session will look at SDN solutions and implementation to date, and will discuss how their security requirements can be addressed. The panel will also consider deployment strategies for SDN security and what operators need to consider to ensure security of their infrastructure in this new networking era.