Description
A presentation lasting no more than 30 minutes including questions.
An Environmental Perspective on Artificial Intelligence
Time to Present: 60 mins
Summary:
AI represents one of the biggest inflection points in the modern world of technology. Hyperscalers and other companies see a once-in-a-lifetime opportunity to leverage AI to enhance existing business models and create new innovations. Today the only way we know of to enhance AI performance...
This presentation investigates the proximity to a low Signal-to-Noise Ratio (SNR) threshold that can still maintain a tolerable Bit Error Rate (BER) in 100G / 400G / 800G network links. Additionally, we account for factors such as temperature and cable length to predict the duration for which a reliable network connection can be sustained between transceivers. The analysis, based on data...
To get the approval of your company's management or other designated decision-maker, it can be helpful to show how your proposal works towards company goals. But what if the decision-maker has incentives that don't line up with the company goals, or what if the company goals are wrong?
You and your fellow workers can address this issue by recognizing that you too are decision-makers. I will...
This presentation discusses blackhole detection in packet networks. Such blackholes are typically difficult to detect, and even working out on which router the blackhole is occurring can be difficult. We discuss two methods for detecting blackholes: indirect detection and direct detection. We describe a method for a router to report packet drops due to blackholes via IPFIX, including the...
What does automating brown field network have to do with interior design?
A whole lot, actually!
This presentation will explain one of the most challenging problem with network automation with easy to understand examples.
The problem is universal, regardless of which automation platform you have chosen to use, and even though the author uses Cisco NSO, the presentation will be useful...
What does the RPKI threat landscape look like for network operators? What are next steps in making RPKI work as reliable and secure as possible? In this talk Job Snijders will share existing and new ideas on how to defend network operators against malicious activity coming in via the RPKI.
Abstract:
In a fast-evolving digital landscape, network operators are continually challenged to enhance service delivery while maintaining efficiency and accuracy. This session presents an in-depth exploration of a cutting-edge strategi for synchronizing services between Netbox and NSO. Targeted towards network engineers, architects, and specialists, the talk emphasizes a...
The current RPKI framework using ROAs only works to validate route origination.
IP Transit providers will implement filters governing which routes can be propagated based on information from the IRRs (Internet Routing Registries) - in our region the RIPE DB.
This is a real life example of manipulation to the RIPE DB, which could have enabled a BGP Hijack to bypass transit provider...
RouteViews was initiated in 1995 at the University of Oregon to allow network operators see what their routing tables looked like from an external perspective. Over the years since, this community project has set up collectors in strategic locations around the world, allowing network operators a rich view of their routing announcements, and researchers a valuable resource for tracking the...