In this presentation I will give a brief introduction on how quantum technology can be made applicable to network and we will review how already available and emerging quantum technology can help improve well known security mechanisms and protocols. For example the use of Quantum Key Distribution in MACsec and IPsec and Quantum Random Number Generators.
Also we will explore how close (or far...
DKNOG is more than just an annual conference.
There is a lot of work involved and we need your help.
This is a walk-through of the different working groups of DKNOG and an explanation how you can sign up to help DKNOG in working for the networking community.
A first look behind the scenes when AWS pop the hoods on some of the hardware and software on what makes the AS16509 global network run.
In this presentation Pavel Odintsov will provide detailed overview of FastNetMon Community and it's capabilities for DDoS detection.
FastNetMon Community is an open source DDoS detection product available for wide range of Linux distributions and variety of platforms.
PeeringDB is a freely available, user-maintained, database of networks, and the go-to location for interconnection data. It facilitates the global interconnection of networks at IXPs, data centers, and other interconnection facilities. It is the first stop in making interconnection decisions.
Due to the pandemic we were not able to give an update to your audience. This presentations briefly...
When designing network automation there are many pitfalls. Network services may be highly complex, and be extremely complicated to implement.
This makes it common to do a few mistakes along the way, and since making mistakes is the number one way to learn and improve, it should be celebrated.
In this talk Allan Eising will go through nine types of mistakes that he has made in his work...
The purpose of this talk is to walk through common strategies for parsing device outputs into a usable form for your scripts, and some pros/cons of each approach.
Synchronization in transport networks is a topic that has seen its importance fluctuate over time as technology trends have changed. In the era of SDH/SONET based mobile transport, engineering of network sync was critical.
Today, the need for sync performance in 5G & 6G networks as well as the financial markets, the medical area, the military, and utility sector, with a correspondingly...
In this presentation, we focus on BGP security using the Code BGP platform. We start with an introduction to the various types of BGP hijacks and route leaks and the challenges related to detecting BGP anomalies. We explain how the Code BGP Platform leverages multiple data sources and GraphQL subscriptions to detect BGP events of interest. We present two exact prefix hijack events against root...
If you want to succeed in any given area, you will have to work on your communication skills just as much as your routing skills.
Being able to communicate in a language anyone can understand will maximise your chances of getting approval and funding.
In this talk, I will share some of my techniques for essentially managing up.
I will be using a mix of powerpoint and physical...
Although, as a global network of networks, the Internet is, in many ways, borderless -- there are still unique national characteristics: geographical and economic challenges, national Internet Governance policies, peering arrangements between various providers, and many other factors that all play a role in shaping any one country's Internet landscape. Understanding these can provide a more...
Embedded CDNs have been around for several decades. In the beginning there was Akamai and then Google. About a decade ago more showed up. In 2012, we did a panel at NANOG discussing the challenges for the ISPs who chose to embed. ISPs had to adapt to various differences for each of the solutions. The outlook was that an increased number of providers would offer an embedded solution, the...
The need to reliably monitor today’s ever-growing networks in the WAN, edge, and data center domains is now more critical than ever. The industry relied mainly on SNMP for monitoring, a protocol that creaks at the seams when used to collect counters present in the current network devices, let alone the increasingly complex networks of the future.
Many consider gNMI - Openconfig's gRPC-based...
Packet filters are an important tool for handling disruptions. Combining rate limits in packet filters is almost a requirement here, but not all vendors support this feature. This presentation explains how to use rate limiting packet filters effectively to mitigate DDoS.
Networks rely on accurate and secure time synchronisation to function. But in many cases, time services are prone to disruption, inaccuracy and attack. With governments and regulators across the EU calling for more reliable and robust time, Sweden has developed an extremely accurate and secure time distribution network.
In this talk, we will focus on the regulatory framework, the different...
The Internet has this unfortunate tendency of breaking. Be it because an anchor went where it shouldn't, or remote hands unplugged a cable, or because a linecard ran out of memory. At the end of the day, things break, and we have to deal with it.
Cloudflare runs a global network, and has a lot of experience with incidents. I'll share our approach to incident management, and incident communication.
The End of the Show quiz…