APNIC Chief Scientist Geoff Huston introduces the IETF, including the emergence of the IETF, the IETF culture-kings, voting and running code, today’s IETF and some new opinions at APAN 54, held in a hybrid format from 22 to 26 August 2022 in Jinan, China.
APNIC Chief Scientist Geoff Huston introduces the IETF, including the emergence of the IETF, the IETF culture-kings, voting and running code, today’s IETF and some new opinions at APAN 54, held in a hybrid format from 22 to 26 August 2022 in Jinan, China.
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
constrained application protocol(CoAP) is a specialized web transfer protocol for use with constrained networks in internet of things and constrained devices such as microcontrollers.
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
Description of message queueing (MQ) protocol for the transport of telemetry data (MQTT - MQ Telemetry Transport).
MQTT is a protocol designed to fit the needs of Internet of Things scenarios. It is lightweight and efficient, but still affords all the features required for reliable messaging between wireless sensor / actor nodes and applications. MQTT decouples producer and consumer of data (sensors, actors and applications) through message brokers with publish / subscribe message queues called topics. MQTT supports different levels of quality of service thus providing the flexibility to adapt to the different needs of applications.
Further features like will and retain messages make MQTT well suited for sensor network scenarios as well as for lightweight enterprise messaging applications.
Open source implementations like Eclipse paho provide ample code for integrating MQTT in your own applications.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
ITVoyagers has created presentation which gives overview on following topics
1. MQTT
2. CoAP
Following are the contents.
MQTT
Components
Diagram
Example
Decoupling in Pub/Sub
CoAP
Description
Layers
Types of message
CoAP Header
It will help students in their last minute preparations for exams.
ION Islamabad, 25 January 2017
By Kevin Meynell, Internet Society
What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions.
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
Small Brief on Next Generation SD-WAN
Dynamic business landscape and uncompromised demands of applications and users have driven dramatic transformation in IT Networking after many years of relative stability. Frequent changes in technologies are shifting networking from static Infrastructure to more agile, secured, future ready and hybrid-cloud infrastructure. This created un-precedented network management complexities that has become a growing concern for the enterprise.
Early Generation of SD-WAN providers were primarily focused on cost reduction via replacing MPLS with low-cost broadband.
Infinxt Next Generation SD-WAN handles data and network security with in-built NGFW, SLA based Application Performance Enhancement, Traffic Shaping, Multi/ Hybrid Cloud App aware routing, in addition to the traditional SD-WAN features
Infinxt Product Variants
1. Infinxt – Next Generation SD-WAN
Infinxt provides you with the best of the SD-WAN features that can address any of your WAN challenges. The device itself being a Zone based firewall, provides application visibility and control. The decoupled Data Plane and Control plane provides you with the needed flexibility and efficiency in addressing Day 0, Day 1 and Day 2 challenges.
The solution is industry and business agnostic whereby it would be able to meet any type of WAN requirements. The offering being indigenously made would be able to address unique requirements for niche industries too through customization
Features
2. Infinxt - Next Generation Firewall Powered by Palo Alto Networks
Legacy firewall security solutions react to new threats. Intelligent network security stays ahead of attackers and increases business agility. Infinxt SD-WAN comes with a pre-hosted Palo Alto Networks VM in the Infinxt iEdge devices. This offering is a boon for customers to convert their branches into next generation secured branches with the NGFW security capability of Palo Alto Networks.
3. Infinxt - Next Generation Secure SD-WAN Powered by Palo Alto Networks
The Secure Next Generation SD-WAN offering from Infinity Labs provides its customers with the best of both Network connectivity and Application security. It’s a unique combination where both the VMs are service chained to leverage their proficiency to provide a secured application experience to the users. Along with SD-WAN features it also gives NGFW features Powered by Palo Alto Networks.
Infinxt SD-WAN Console gives a Single UI for both SD-WAN and NGFW for ease of Network Operation and Management.
This feature gives the enterprises a unique proposition to have Palo Alto NGFW on tried and tested Infinxt Edge Device.
Palo Alto Networks Advantages
constrained application protocol(CoAP) is a specialized web transfer protocol for use with constrained networks in internet of things and constrained devices such as microcontrollers.
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
Description of message queueing (MQ) protocol for the transport of telemetry data (MQTT - MQ Telemetry Transport).
MQTT is a protocol designed to fit the needs of Internet of Things scenarios. It is lightweight and efficient, but still affords all the features required for reliable messaging between wireless sensor / actor nodes and applications. MQTT decouples producer and consumer of data (sensors, actors and applications) through message brokers with publish / subscribe message queues called topics. MQTT supports different levels of quality of service thus providing the flexibility to adapt to the different needs of applications.
Further features like will and retain messages make MQTT well suited for sensor network scenarios as well as for lightweight enterprise messaging applications.
Open source implementations like Eclipse paho provide ample code for integrating MQTT in your own applications.
Presentation detailed about SDN (Software Defined Network) overview . It covers from basics like different controllers and touches upon some technical details.
Covers Terminologies used, OpenFlow, Controllers, Open Day light, Cisco ONE, Google B4, NFV,etc
ITVoyagers has created presentation which gives overview on following topics
1. MQTT
2. CoAP
Following are the contents.
MQTT
Components
Diagram
Example
Decoupling in Pub/Sub
CoAP
Description
Layers
Types of message
CoAP Header
It will help students in their last minute preparations for exams.
ION Islamabad, 25 January 2017
By Kevin Meynell, Internet Society
What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions.
23 November 2017 - At ION Belgrade, Kevin Meynell discusses what happened at the recent IETF meeting, and how to get involved in the open Internet standards community.
18 September 2017 - ION Malta
What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions.
3 July 2017 - At ION Costa Rica, Kevin Meynell discusses work underway at the IETF on IPv6, DNSSEC, Routing, and more, and how anyone can get involved in the IETF process.
7 September 2017 - At ION Conference Durban, South Africa, Kevin Meynell discusses what's happening at the IETF in the world of Internet standards, and how you can get involved in the process.
Presentation given by Alvaro Retana at ION Santiago in Chile on 28 October 2014.
What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions, including bringing the IETF to Latin America in 2016.
Dan Pitt
Executive Director
ONF
Points to cover
• The Basics
• Why we exist
• Ambition, scope
• How we operate
• What weʼre doing
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
11 April 2016 - ION Bangladesh - What’s happening at the Internet Engineering Task Force (IETF)? What RFCs and Internet-Drafts are in progress related to IPv6, DNSSEC, Routing Security/Resiliency, and other key topics? We’ll give an overview of the ongoing discussions in several working groups and discuss the outcomes of recent Birds-of-a-Feather (BoF) sessions, and provide a preview of what to expect in future discussions.
IETF's Role and Mandate in Internet Governance by Mohit BatraOWASP Delhi
1. Internet Governance (IG) Primer
2. I-* Organizations
3. IANA function -Names, Numbers and Protocol Parameters
4. IANA Transition
5. WHOIS for names and numbers
6. Need for Standardization and Standardization Bodies
7. How IETF Works
8. TLS Protocol
9. Increasing Indian participation in global Internet Governance activities and structures
Similar to Introduction to IETF and Standardisation Process (20)
Vinodh Kumar Ravindranath will share learnings from his experience of building high performing teams as CTO at couple of startups (Belong, Bloomreach) as well as Google. He will also share interesting learnings gleaned through data science algorithms analyzing career data.
Sharad Agarwal has been part of teams rapidly scaling architecture at two unicorns (Inmobi and Flipkart) before beginning his entrepreneurial journey at Sprinkle Data. When we talk about scaling technology, we often talk about technology trends and architecture. In this talk, Sharad will take an alternative approach to look at Technology from Product & Business lens. He will talk about how Product thinking plays a pivotal role in technology choices and how technology leadership can be at the forefront of scaling a company.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
2. What is the IETF ?
● A membershipless organisation
● Not a conference
● Not a traditional standards organization
● Meets physically 3 times a year
● Open mailing lists, easy to participate remotely
● Publishes technical and process documents known as RFCs
● Divided into 7 different areas
3. What is the IETF ?
● The IETF is a loosely self-organized group of people who
contribute to the engineering and evolution of Internet
technologies. It is the principal body engaged in the
development of new Internet standard specifications. The IETF
is unusual in that it exists as a collection of happenings, but is
not a corporation and has no board of directors, no members,
and no dues; [Ref BCP 95]
4. Mission of the IETF
The mission of the IETF is to make the Internet
work better by producing high quality, relevant
technical documents that influence the way
people design, use, and manage the Internet.
5. Founding Beliefs
● We reject kings, presidents and voting. We believe in rough
consensus and running code
– David Clark
● Be conservative in what you send and liberal in what you accept
– Jon Postel
6. History of the IETF
●
1st
IETF meeting was held in January 1986 at Linkabit in San
Diego, with 21 attendees
● 4th IETF, held at SRI in Menlo Park in October 1986 was the
first one attended by vendors
● 5th
IETF – concept of WG introduced
●
7th
IETF – first one with > 100 attendees
● Internet Society formed in Jan 1992
● First IETF outside US in 2000 in Amsterdam,NL
7. The 7 Areas
● Applications and Real-time (ART)
● General Area (GEN)
● Internet Area (INT)
● Operations and Management Area (OPS)
● Routing Area (RTG)
● Security Area (SEC)
● Transport Area (TSV)
8. Applications & Real-Time Area (art)
● Three (slightly overlapping) categories,
– Protocols which handle delay-sensitive interpersonal
communications via voice, video, instant messaging,
presence, and other means ("real-time" applications and
services) [Examples XMPP, WEBRTC]
– Protocols more tolerant of delay, [Examples HTTP, email,
and FTP]
– Building blocks that are designed for use across a wide
variety of applications and may be employed by both real-
time and non-real-time applications, [Examples URI
schemes, MIME types, authentication mechanisms, data
formats, metrics, and codecs.]
9. Internet Area (int)
● Includes IP layer (both IPv4 and Ipv6)
● Implications of IPv4 address depletion
● Co-existence between the IP versions, DNS, DHCP, host and
router configuration, mobility, multihoming, identifier-locator
separation,
● VPNs and pseudowires along with related MPLS issues, and
various link layer technologies.
● Specifies how IP will run over new link layer protocols.
10. Transport (tsv)
● Focus on end-to-end transport
– Protocols such as TCP, SCTP, DCCP, QUIC
– Congestion managemnet schemes such as PCN,
CONEX
– Also includes stuff for congestion signaling and
reporting, forward error correction, multicast, QoS
and reservation signaling
11. Operations & Management (ops)
● The primary technical areas covered by the Operations &
Management (OPS) Area include: Network Management, AAA,
and various operational issues facing the Internet such as DNS
operations, IPv6 operations, operational security and Routing
operations.
● Two distinct areas
– Network management and AAA (includes things such as
NETCONF, SNMP, RADIUS, Diameter, and CAPWAP, and of
data modeling and data modeling languages used in
management such as SMI and YANG.)
– Operations : Solicit feedback from ISPs/Network providers,
incoporate them into existing protocols and also recommend
BCPs. There is some overlap with other areas.
12. Security Area (sec)
● Focus is on security protocols and also security aspects of
protocols in other areas
● Provides security mechanism and services for
- Integrity - Authentication
- Non-repudiation - Key Management
- Confidentiality - Encryption
- Access control
● Overlaps quite frequently with other areas for security
considerations as well.
13. Routing (rtg)
● The Routing Area is responsible for ensuring continuous
operation of the Internet routing system by maintaining the
scalability and stability characteristics of the existing routing
protocols, as well as developing new protocols, extensions, and
bug fixes in a timely manner.
● Includes topics such as
– Forwarding methods (such as destination-based unicast and
multicast forwarding, MPLS, and pseudowire)
– Routing and signalling protocols (such as OSPF, IS-IS, BGP,
RSVP-TE, LDP, PIM, L1-, L2-, and L3-VPNs)
– Path Computation
– Traffic Engineering
14. General (gen)
● The General Area consists of a few IETF WGs and other
activities focused on supporting, updating and maintaining the
IETF standards development process.
● As General AD, the IETF Chair manages the General Area
Review Team (Gen-ART) and other IETF-wide directorates.
15. Acronyms Acronyms Acronyms
● AD : Area Director
● BCP : Best Current Practice
● BOF : Birds of a Feather
● IAB : Internet Architecture Board
● IAD : IETF Administrative Director
● IANA : Internet Assigned Numbers Authority
● IAOC : IETF Administrative Oversight Committee
● IASA : IETF Administrative Support Activity
16. Acronyms Acronyms Acronyms
● ICANN : Internet Corporation for Assigned Names & Numbers
● I-D : Internet-Draft
● IESG : Internet Engineering Steering Group
● IETF : Internet Engineering Task Force
● IRTF : Internet Research Task Force
● ISOC : Internet Society
● RFC : Request for Comments
● STD : Standard (RFC)
● WG : Working Group
17. Working Groups
● Working group is a group of people interesting in
standardisation in a certain narrow area
● A WG is really just a mailing list with a bit of adult supervision.
● It is also the “unit” around which the IETF meeting and mailing
list discussion is arranged.
● Anyone can join a WG (just join the Mailing list)
● Produced drafts for consideration of WG participants
18. Typical working group meetings
● Role of WG chairs – Volunteers herding cats
● WG charters
● “Note Well”
● No formal voting (but “Humming”) - Rough consensus
● Working group drafts
● “Blue Sheets”
● “Document Shepherd”
● WG meetings
● Interim Meetings / Virtual Interim meetings
19. Typical Working group meeting
● Submit drafts to WG chair before meeting for inclusion on
agenda
● Presentations
● WG discussions (some personal experiences)
● Lining up at the Mic
● Remote participation via Jabber/Meetecho
● Typical duration from 1 to 2.5 hours
20. Typical IETF meetings
● WG Meetings (the core)
● Plenaries (Technical and Administrative)
● Adjacent events
– Hackathon / Code Sprints
– Bits-N-Bytes
– Welcome receptions
– Tutorials
– ISOC events
– IETF Socials
– Side Meeting
21. Typical Journey of a working group
● Discussion amongst participants internal or external – Side
meetings
● A Bar BoF or non-WG-forming BoF
● “Official” BoF
● Chartering of the WG
● Scheduling of meetings
● Adopting, Reviewing and Publishing Drafts
● Dissolution of Working group
22. Journey from a idea to an RFC
● Discussing and Writing an I-D
● Receive comments on the draft
● Review process in WG / mailing lists
● WG Adoption (not always necessary)
● Independent Submission
● WG Review (and possibly Directorate reviews)
● WGLC
● IETF / IESG Review LC
● RFC Editor
● Publication
23. A note on ISOC and IESG
● Role of ISOC
– Financial and legal support for IETF
– Home base of IETF Administrative staff
– Supports IETF tools such as datatracker
– RFC-Editor / IETF Secretariat
● Role of IESG
– Consists of ADs from different IETF areas (Selected by
Nomcom)
– Have an good understanding of their areas
– Provides technical oversight for Wgs/Drafts & cross-area
reviews
– Note on Area directorates
24. A note on IRTF
● Works on long-term research ideas and early implementations
● Significant participation from industry researchers & academia
● 2 differences between IRTF RGs & IETF WGs
– IRTF groups are not trying to produce standards of any kind
– Output of IRTF groups does not require consensus within
the RG, or broad consensus from the IETF.
● Some currently active Rgs
– Crypto Forum Research Group (CFRG)
– Network Management Research Group (NMRG)
– Thing-to-Thing Research Group (T2TRG)
– Measurement & Analysis for Protocols RG (MAPRG)
25. Types of RFCs
● Proposed standards
● Internet standards (sometimes called "full standards")
● Best current practices (BCP) documents
● Informational documents
● Experimental documents
● Historic documents
● IMPORTANT : Not all RFCs are standards
26. How to effectively participate in IETF
● Follow and comment on the mailing lists
● Read the drafts and references
● Review the drafts of WG particpants
● Attend an IETF meeting physically
– Registration
– Side events (Plenary, Bit-N-Bites,Hackathon)
– Mentoring Program
– ISOC Fellowship to the IETF
– IIREF Fellowship (for Indians)
● Participate remotely (Remote Hubs)
27. Normative Language RFC 2119
● Words like MUST, SHOULD, MIGHT have specific meanings in
the context of RFCS
● Some examples (RFC 7231 – HTTP/1.1
– An HTTP sender MAY generate, and a recipient MUST be
able to parse, line breaks in text media that consist of CRLF,
bare CR, or bare LF.
– A sender that generates a message containing a payload
body SHOULD generate a Content-Type header field in that
message unless the intended media type of the enclosed
representation is unknown to the sender.
– All general-purpose servers MUST support the methods
GET and HEAD. All other methods are OPTIONAL.
28. Structure of a typical I-D
● Introduction
● Table of contents
● IANA considerations
● Security considerations
● Note on IPR
30. How to write and submit an I-D
● Overview of formats
● NROFF, XML, MSWORD
● Checking references
31. Writing an I-D DEMO
● Demo using .NROFF format (using NROFF
EDIT)
● Demo using XML (using xml2rfc python tool)
● Submission and checking online on IETF site
for Nits
32. Updates and Hot Topics (IETF99)
● BANdwidth Aggregation for interNet Access
(BANANA) – WG forming BoF. BANANA is
concerned with providing coordinated Internet
Access to a device over multiple links of
different types to allow for increased bandwidth
utilization, load-balancing and/or higher
reliability.
33. Updates and Hot Topics (IETF99)
● IDentity Enabled Networks (IDEAS) - WG
forming BoF. The goal of this work is to
standardize a framework that provides identity-
based services that can be used by any
identifier-location separation protocol. The new
requirements driving this framework go beyond
the traditional discovery service and mapping of
identifier-to-location for packet delivery.
34. Updates and Hot Topics (IETF99)
● Network Slicing (NETSLICING) will be having a
non-working-group-forming BOF. a “network
slice” is conceptualized as a logical network
comprised of the union of resources
(connectivity, storage, computing), network
functions, and service functions. Network slicing
is a concept garnering much attention as part of
5G standardization and development efforts.
35. Updates and Hot Topics (IETF99)
● QUIC – Work 'quic'-ly progressing in drafts
https://github.com/quicwg/base-
drafts/wiki/Second-Implementation-Draft
● 5G standardisaton efforts
36. References
● Tao of the IETF - https://www.ietf.org/tao.html
● IETF Newcomers -
https://www.ietf.org/newcomers.html
● IETF standards process -
https://www.ietf.org/about/process-docs.html
● IETF Community India -
https://www.ietf.org/mailman/listinfo/ietf-
community-india
● Tussle in cyberspace -
http://david.choffnes.com/classes/cs4700fa14/pape