The slides for all presentations will be produced in English. The spoken language of the presentation itself can be either German or English at the discretion of the presenter. However we expect the majority of the presentations to be held in German.

Day 1 - 29.10.2015

StartEndTitlePresenterSlides
11:3013:00Registration & Welcome Lunch
13:00 13:45 Opening/Welcome Words DENOG Orga PDF | Video
13:45 14:15 Network Automation and Programmability Peter Sievers PDF | Video
14:15 14:45 Buffering Sucks Fredy Künzler PDF | Video
14:45 15:00 Lightning Talks PDF - A10
PDF - Axians
Video
15:00 16:00 PGP Keysigning (during coffee break) Jens Link
15:0016:00Coffee Break
16:00 16:30 Evolution of Ethernet Speeds Greg Hankins PDF | Video
16:30 17:00 Peering DB 2.0 Arnold Nipper PDF | Video
17:00 17:30 IP-Fabrics - Datacenter Networks Tom Eichhorn PDF | Video
17:30 18:00 Free Choice Of CPEs Simon Kissel PDF | Video
19:00Evening Social at Weststadt Bar

Day 2 - 30.10.2015

StartEndTitlePresenterSlides
9:00 9:30 Lightning Talks PDF - Alcatel Lucent
PDF - ecix
PDF - nominum
PDF - Tremmel
Video
9:30 10:00 DE-CIX Update Wolfgang Tremmel PDF | Video
10:00 10:30 FFO - Fracking Fiber Optics Thomas Weible PDF | Video
10:3011:00Coffee Break
11:00 11:30 Multi-Domain VPN Thomas Schmid PDF | Video
11:30 12:00 Your Cache/Recursive DNS server also requires your attention Nicolas Cartron PDF | Video
12:00 12:30 Securing Data in Motion Ulrich Schlegel PDF | Video
12:30 13:00 Aus der sys4 Projektwerkstatt Patrick Ben Koetter, sys4 AG PDF | Video
13:00 13:30 Reliable and Secure DHCPv6 Expected Christopher Werny PDF | Video
13:30 13:45 Closing Talk DENOG Orga PDF | Video
13:4515:00Farewell Lunch & Coffee

“Evolution of Ethernet Speeds - What’s New and What’s Next” - Greg Hankins, Alcatel-Lucent

In this presentations we’ll talk about the latest Ethernet developments that are bringing a variety of new technology to the market for different applications with speeds ranging from 2.5 GE to 400 GE. We’ll take a look at the new 2.5 GE, 5 GE and 25 GE speeds, 2nd generation 40 GE and 100 GE, 400 GE and what’s possible in the future.

back to the agenda

“Buffering sucks!” - Fredy Künzler, Init7

Current status of Peering, Interconnection, Regulation, CDN Netneutralitiy. How you can help to minimize buffering and make your end-customer happy. Update of Init7 vs. the Big Ones. Why we do it. Status of the interconnection case pending at the Swiss regulator.

back to the agenda

“IP-Fabrics - Datacenter Networks for the cloud” - Tom Eichhorn, SysEleven GmbH

The layer 2 design paradigmas do not longer scale with webscale data centers, so this talk will give a short introduction why that is and explain the blue print of IP-Fabrics, the design used at facebook, google and other players in that field.

back to the agenda

“FFO - fracking fiber optic” - Thomas Weible, Flexoptix

LC plugs are not the only ones now that we have QSFP+. Should you use MPO or MTP. What about ST, LC, SC, E2000 or the new LC Uniboot plugs ? What are the compromises and benefits of each solution. Did you know that polarity in optical MPO matters ? And why can the polish of a plug cause headache during on-site installation. Thomas will give an overview of the connectors and fibre options in the datacentre now we have 40G und 100G as a standard. Especially for these parallel transmission applications you should consider to rethink your wiring if you don¹t want to get stuck in troubleshooting your links. Finally some practical examples of broken optical components after and during field installation ­ real cases which happen every day even in 2015 were fiber optic is commodity. And one more thing!

back to the agenda

“Your Cache/Recursive DNS server also requires your attention!” - Nicolas CARTRON, EfficientIP

Nowadays, most of the DDoS attacks making the news are targeted against Authoritative DNS servers. While those attacks are the easiest to realise, as Authoritative DNS servers are public, it is important not to lose track of Cache/Recursive servers (As few PCs or laptops within the LAN can take it down very easily if they are infested by botnets). This presentation will focus on the Recursive/Cache part of DNS Security, and will take as example a specific attack that EfficientIP has named “Sloth Domain Attack”, to illustrate how vulnerable a Recursive/Cache server is, and how easy it is to bring it down. We will also discuss some ideas and the necessity to take a new approach when dealing with DNS attacks on Cache/Recursive servers.

back to the agenda

“Multi-domain VPN: a europe-wide implementation” - Thomas Schmid, DFN

In the context of national research networks we rolled out an europe-wide logical infrastructure to support the rapid implementation of multi-domain VPNs, called MDVPN. The framework we used for this is “Carrier-support-carrier for hierarchical VPNs”, as documented in RFC4364 Option c. While this is not a brand new technology, according to vendor statements, nobody seems to have implemented this on a larger scale. An overview will be given on the technology and architecture and use cases be discussed. Special focus will be put on security concerns raised by the community. Since vendors don’t support filters that prevent potential intrusion into local VPNs, a netflow-based detector was developed that is able to detect such attacks. In addition an openflow based solution for filtering is under development in cooperation with a switch vendor. As of today ca. 500 PEs take part in the MDVPN domain allowing VPN services such as L2 P2P, VPLS, EVPN, L3 VPNs. In the coming year, a small office-router will be developed that allows rapid connection to the MDVPN cloud.

back to the agenda

“Reliable and Secure DHCPv6 Expected” - Christopher Werny, ERNW GmbH

Many organizations have high hopes with regard to DHCPv6 as it might allow them to deploy IPv6 based on an operations model they usually have long-time experience with. There’s one (not so) minor problem though: DHCPv6 is a very different beast from its IPv4 equivalent. This talk covers the main DHCPv6 specifics from a design and security perspective and discusses what is needed to deploy it in a reliable and secure way.

back to the agenda

“DE-CIX Update” - Wolfgang Tremmel, DE-CIX

back to the agenda

“Network Automation and Programmability” - Peter Sievers, Juniper Networks

Automation is about optimizing and standardizing your current network workflows to meet increasing demand and provide context to network changes. Why Programmability – A combination of the emergence of Software Defined Networking, coupled with Service Providers requirement to innovate at their own pace, has driven the need for vendors to provide tools and capabilities to extend the network platforms.

back to the agenda

“Free Choice Of CPEs” - Simon Kissel, Viprinet

Free choice of CPEs is one of the keystones for a free information society. Therefore, German terminal manufacturers dove into the dirty world of lobbyism to fight for the abolishment of compulsory routers. Simon Kissel will tell the story of how he tried to get a law passed on the liberation of the German telecommunications market - not only for end users, but also as a means to strengthen the innovation capacity of the German IT industry.

back to the agenda

“PeeringDB 2.0” - Arnold Nipper

Overview and demo of the new 2.0 API How to mirror all PDB data locally and integrate it with your own application Examples and use cases for building automation from said data back to the agenda

“Securing Data in Motion” - Ulrich Schlegel, ADVA Optical Networking

Driven by the relentless news about cyber threats, security breaches and data loss, law makers and regulators are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on network encryption. Our presentation provides an introduction to network encryption technology – including encryption algorithms, key management and authentication – and introduces the concept of post quantum security. We clarify the most prominent myths of network encryption and evaluate the applicability of encryption technology on different network layers.

back to the agenda