The slides for all presentations will be produced in English. The spoken language of the presentation itself can be either German or English at the discretion of the presenter. However we expect the majority of the presentations to be held in German.
|11:30||13:00||Registration & Welcome Lunch|
|13:00||13:45||Opening/Welcome Words||DENOG Orga||PDF | Video|
|13:45||14:15||Network Automation and Programmability||Peter Sievers||PDF | Video|
|14:15||14:45||Buffering Sucks||Fredy Künzler||PDF | Video|
PDF - A10
PDF - Axians
|15:00||16:00||PGP Keysigning (during coffee break)||Jens Link|
|16:00||16:30||Evolution of Ethernet Speeds||Greg Hankins||PDF | Video|
|16:30||17:00||Peering DB 2.0||Arnold Nipper||PDF | Video|
|17:00||17:30||IP-Fabrics - Datacenter Networks||Tom Eichhorn||PDF | Video|
|17:30||18:00||Free Choice Of CPEs||Simon Kissel||PDF | Video|
|19:00||Evening Social at Weststadt Bar|
PDF - Alcatel Lucent
PDF - ecix
PDF - nominum
PDF - Tremmel
|9:30||10:00||DE-CIX Update||Wolfgang Tremmel||PDF | Video|
|10:00||10:30||FFO - Fracking Fiber Optics||Thomas Weible||PDF | Video|
|11:00||11:30||Multi-Domain VPN||Thomas Schmid||PDF | Video|
|11:30||12:00||Your Cache/Recursive DNS server also requires your attention||Nicolas Cartron||PDF | Video|
|12:00||12:30||Securing Data in Motion||Ulrich Schlegel||PDF | Video|
|12:30||13:00||Aus der sys4 Projektwerkstatt||Patrick Ben Koetter, sys4 AG||PDF | Video|
|13:00||13:30||Reliable and Secure DHCPv6 Expected||Christopher Werny||PDF | Video|
|13:30||13:45||Closing Talk||DENOG Orga||PDF | Video|
|13:45||15:00||Farewell Lunch & Coffee|
In this presentations we’ll talk about the latest Ethernet developments that are bringing a variety of new technology to the market for different applications with speeds ranging from 2.5 GE to 400 GE. We’ll take a look at the new 2.5 GE, 5 GE and 25 GE speeds, 2nd generation 40 GE and 100 GE, 400 GE and what’s possible in the future.
Current status of Peering, Interconnection, Regulation, CDN Netneutralitiy. How you can help to minimize buffering and make your end-customer happy. Update of Init7 vs. the Big Ones. Why we do it. Status of the interconnection case pending at the Swiss regulator.
The layer 2 design paradigmas do not longer scale with webscale data centers, so this talk will give a short introduction why that is and explain the blue print of IP-Fabrics, the design used at facebook, google and other players in that field.
LC plugs are not the only ones now that we have QSFP+. Should you use MPO or MTP. What about ST, LC, SC, E2000 or the new LC Uniboot plugs ? What are the compromises and benefits of each solution. Did you know that polarity in optical MPO matters ? And why can the polish of a plug cause headache during on-site installation. Thomas will give an overview of the connectors and fibre options in the datacentre now we have 40G und 100G as a standard. Especially for these parallel transmission applications you should consider to rethink your wiring if you don¹t want to get stuck in troubleshooting your links. Finally some practical examples of broken optical components after and during field installation real cases which happen every day even in 2015 were fiber optic is commodity. And one more thing!
Nowadays, most of the DDoS attacks making the news are targeted against Authoritative DNS servers. While those attacks are the easiest to realise, as Authoritative DNS servers are public, it is important not to lose track of Cache/Recursive servers (As few PCs or laptops within the LAN can take it down very easily if they are infested by botnets). This presentation will focus on the Recursive/Cache part of DNS Security, and will take as example a specific attack that EfficientIP has named “Sloth Domain Attack”, to illustrate how vulnerable a Recursive/Cache server is, and how easy it is to bring it down. We will also discuss some ideas and the necessity to take a new approach when dealing with DNS attacks on Cache/Recursive servers.
In the context of national research networks we rolled out an europe-wide logical infrastructure to support the rapid implementation of multi-domain VPNs, called MDVPN. The framework we used for this is “Carrier-support-carrier for hierarchical VPNs”, as documented in RFC4364 Option c. While this is not a brand new technology, according to vendor statements, nobody seems to have implemented this on a larger scale. An overview will be given on the technology and architecture and use cases be discussed. Special focus will be put on security concerns raised by the community. Since vendors don’t support filters that prevent potential intrusion into local VPNs, a netflow-based detector was developed that is able to detect such attacks. In addition an openflow based solution for filtering is under development in cooperation with a switch vendor. As of today ca. 500 PEs take part in the MDVPN domain allowing VPN services such as L2 P2P, VPLS, EVPN, L3 VPNs. In the coming year, a small office-router will be developed that allows rapid connection to the MDVPN cloud.
Many organizations have high hopes with regard to DHCPv6 as it might allow them to deploy IPv6 based on an operations model they usually have long-time experience with. There’s one (not so) minor problem though: DHCPv6 is a very different beast from its IPv4 equivalent. This talk covers the main DHCPv6 specifics from a design and security perspective and discusses what is needed to deploy it in a reliable and secure way.
Automation is about optimizing and standardizing your current network workflows to meet increasing demand and provide context to network changes. Why Programmability – A combination of the emergence of Software Defined Networking, coupled with Service Providers requirement to innovate at their own pace, has driven the need for vendors to provide tools and capabilities to extend the network platforms.
Free choice of CPEs is one of the keystones for a free information society. Therefore, German terminal manufacturers dove into the dirty world of lobbyism to fight for the abolishment of compulsory routers. Simon Kissel will tell the story of how he tried to get a law passed on the liberation of the German telecommunications market - not only for end users, but also as a means to strengthen the innovation capacity of the German IT industry.
Overview and demo of the new 2.0 API How to mirror all PDB data locally and integrate it with your own application Examples and use cases for building automation from said data back to the agenda
Driven by the relentless news about cyber threats, security breaches and data loss, law makers and regulators are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on network encryption. Our presentation provides an introduction to network encryption technology – including encryption algorithms, key management and authentication – and introduces the concept of post quantum security. We clarify the most prominent myths of network encryption and evaluate the applicability of encryption technology on different network layers.