APNIC Senior Internet Resource Analyst Wita Laksono gave an update on IPv6 and RPKI deployment in Indonesia and the NMM features in APNIC information products at IDNOG 7, held from 25 to 28 July in Jakarta, Indonesia.
If your business is heavily dependent on the Internet, you may be facing an unprecedented level of network traffic analytics data. How to make the most of that data is the challenge. This presentation from Kentik VP Product and former EMA analyst Jim Frey explores the evolving need, the architecture and key use cases for BGP and NetFlow analysis based on scale-out cloud computing and Big Data technologies.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
Net-Ace - Vendor-Agnostic Service Orchestration platformyurid79
Vendor-Agnostic Service Orchestration platform for CSP & Enterprise market. Using this "no hardcoded parameters for service or device" approach, Net-ACE is truly an open platform unifying traditional network management and open, SDN-style network programmability and Service Lifecycle Orchestration while eliminating management silos.
APNIC Senior Internet Resource Analyst Wita Laksono gave an update on IPv6 and RPKI deployment in Indonesia and the NMM features in APNIC information products at IDNOG 7, held from 25 to 28 July in Jakarta, Indonesia.
If your business is heavily dependent on the Internet, you may be facing an unprecedented level of network traffic analytics data. How to make the most of that data is the challenge. This presentation from Kentik VP Product and former EMA analyst Jim Frey explores the evolving need, the architecture and key use cases for BGP and NetFlow analysis based on scale-out cloud computing and Big Data technologies.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
Net-Ace - Vendor-Agnostic Service Orchestration platformyurid79
Vendor-Agnostic Service Orchestration platform for CSP & Enterprise market. Using this "no hardcoded parameters for service or device" approach, Net-ACE is truly an open platform unifying traditional network management and open, SDN-style network programmability and Service Lifecycle Orchestration while eliminating management silos.
JAGUAR7000, a mobile caching system.
JAGUAR7000 does chunk caching to save the bandwidth of mobile backhaul and object caching to decrease latency.
from partner link: http://www.ngt-tech.com/jaguar-7000/
High Scalability Network Monitoring for Communications Service ProvidersCA Technologies
CA Performance Management is a big data collection, warehousing and analytics solution that helps communications service providers maximize return on their network infrastructure investments and lower the cost of network operations.
Learn more about CA Performance Management here: http://bit.ly/1vrQPJB
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Frank Brockners' presentation from the 2017 Open Networking Summit.
While troubleshooting or planning, did you ever wish to get full insight into which paths *all* your packets take in your network, understand whether your SLA is really in place, or were you ever asked to prove that your traffic really follows the path you specified by service chaining or traffic engineering? We approach this problem by adding meta-data to *all* packets. In-band OAM adds forwarding path information and other information/stats to every data packet - as opposed to relying on probe packets, which is the traditional method that tools like ping or traceroute use. This session will introduce In-band OAM, explain the technology and outline the reference implementation in FD.io/VPP and OpenDaylight using a example demos.
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkOpen Networking Summits
Jun Bi
Professor & Director
Tsinghua University
Outline
• Intra-AS (campus level) IPv6 source address validation using OpenFlow (with extension)
– Good for introducing new IP services to network
• Planning next step if we run SDN as a common infrastructure for new services and architectures
– Some personal viewpoints and thoughts on design challenges
– Forwarding abstraction for Post-IP architectures
– Control abstraction for scalable NOS and programmable/manageable virtualization platform
– Inter-AS policies negotiation abstraction
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
How APNIC can engage with together with the LEA community, to help them understand better how the registry system works, and the information in the whois database can assist them.
Continuum PCAP
Cost Effective, Open Network Packet Capture
How do you know what is really coming through your network? Without capturing that traffic, you don't have the means of identifying and solving your security and network performance problems.
Though some organizations have the budgets and infrastructure to record network traffic, many current tools either do not capture all necessary packets, are too expensive to implement on a large scale, or don't easily integrate with other applications. And even companies that are capturing their network data are frustrated by these systems' lack of flexibility, or paying for functionality that they don't really use.
Continuum PCAP solves these problems by fusing the best of both worlds. It is a powerful, affordable enterprise-class packet capture appliance that integrates with your favorite 3rd party or open-source tools, or with your own applications via a REST API.
A 360° VIEW OF THE IT PERFORMANCE
Alaloop proposes a pragmatic approach to build gradually your dashboards to follow-up the performance of your business applications (QoE) and the technical performances ( QoS) of your IT infrastructures (WAN networks / Data Center / Servers and applications).
Geospatial Sensor Networks and Partitioning DataAlexMiowski
We use resources like weather reports or air quality measurements to navigate the world. These resources become especially important when faced by extreme events like the current wildfires in the Western USA. The data for the reports, predictions, and maps all start as realtime sensor networks.
In this presentation, I look at some of my research into scientific data representation on the Web and how the key mechanism is the partitioning, annotation, and naming of data representations. We’ll take a look at a few examples, including some recent work on air quality data relating to the current wildfires in the western USA. We’ll explore the central question of how geospatial sensor network data can be collected and consumed within K8s deployments.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
More Related Content
Similar to VINX-NOG 2022: An update on IPv6, RPKI and tools
JAGUAR7000, a mobile caching system.
JAGUAR7000 does chunk caching to save the bandwidth of mobile backhaul and object caching to decrease latency.
from partner link: http://www.ngt-tech.com/jaguar-7000/
High Scalability Network Monitoring for Communications Service ProvidersCA Technologies
CA Performance Management is a big data collection, warehousing and analytics solution that helps communications service providers maximize return on their network infrastructure investments and lower the cost of network operations.
Learn more about CA Performance Management here: http://bit.ly/1vrQPJB
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Frank Brockners' presentation from the 2017 Open Networking Summit.
While troubleshooting or planning, did you ever wish to get full insight into which paths *all* your packets take in your network, understand whether your SLA is really in place, or were you ever asked to prove that your traffic really follows the path you specified by service chaining or traffic engineering? We approach this problem by adding meta-data to *all* packets. In-band OAM adds forwarding path information and other information/stats to every data packet - as opposed to relying on probe packets, which is the traditional method that tools like ping or traceroute use. This session will introduce In-band OAM, explain the technology and outline the reference implementation in FD.io/VPP and OpenDaylight using a example demos.
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkOpen Networking Summits
Jun Bi
Professor & Director
Tsinghua University
Outline
• Intra-AS (campus level) IPv6 source address validation using OpenFlow (with extension)
– Good for introducing new IP services to network
• Planning next step if we run SDN as a common infrastructure for new services and architectures
– Some personal viewpoints and thoughts on design challenges
– Forwarding abstraction for Post-IP architectures
– Control abstraction for scalable NOS and programmable/manageable virtualization platform
– Inter-AS policies negotiation abstraction
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
How APNIC can engage with together with the LEA community, to help them understand better how the registry system works, and the information in the whois database can assist them.
Continuum PCAP
Cost Effective, Open Network Packet Capture
How do you know what is really coming through your network? Without capturing that traffic, you don't have the means of identifying and solving your security and network performance problems.
Though some organizations have the budgets and infrastructure to record network traffic, many current tools either do not capture all necessary packets, are too expensive to implement on a large scale, or don't easily integrate with other applications. And even companies that are capturing their network data are frustrated by these systems' lack of flexibility, or paying for functionality that they don't really use.
Continuum PCAP solves these problems by fusing the best of both worlds. It is a powerful, affordable enterprise-class packet capture appliance that integrates with your favorite 3rd party or open-source tools, or with your own applications via a REST API.
A 360° VIEW OF THE IT PERFORMANCE
Alaloop proposes a pragmatic approach to build gradually your dashboards to follow-up the performance of your business applications (QoE) and the technical performances ( QoS) of your IT infrastructures (WAN networks / Data Center / Servers and applications).
Geospatial Sensor Networks and Partitioning DataAlexMiowski
We use resources like weather reports or air quality measurements to navigate the world. These resources become especially important when faced by extreme events like the current wildfires in the Western USA. The data for the reports, predictions, and maps all start as realtime sensor networks.
In this presentation, I look at some of my research into scientific data representation on the Web and how the key mechanism is the partitioning, annotation, and naming of data representations. We’ll take a look at a few examples, including some recent work on air quality data relating to the current wildfires in the western USA. We’ll explore the central question of how geospatial sensor network data can be collected and consumed within K8s deployments.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. 2
2
Agenda
• What's APNIC Labs seeing in Vietnam?
– IPv6
– DNSSEC
– RPKI
– QUIC
• New features in the tools from APNIC Information Products
– NetOX
– DASH
– REx
3. 3
3
What’s APNIC Labs seeing in Vietnam?
• APNIC Labs uses paid advertising (placed by Google) to
measure end-user behaviour
– Uses undisplayed pixel fetches (we call them 1x1 invisible pixels)
– Tests DNS, IP and Transport behaviour fetching these assets
– Includes IPv6, DNSSEC, RPKI & QUIC tests at this time
• This is not a measurement of mbps or kbps
– It is a random sample of users, through HTML/browser/ads in games
– We don’t control placement numbers to the ISP
• We think it’s a reasonable approximation to usercount
5. 5
5
IPv6: It’s taking off!
Approx. 10%
increase for IPv6
Capability since
October 2021
Which is continuing
at pace.
Well done!
https://stats.labs.apnic.net/ipv6/VN
20. 20
20
QUIC is still very “experimental”
• Initial connect to a web service made over TLS/443 in TCP
– “hint” is sent back: ”we could use QUIC for this”
– Client can elect to use QUIC for subsequent fetches
• Whats the benefits?
– 1 RTT response possible: so faster initial web service
– Path MTU “busting” design: less fragmentation, drop
– “Session” model –it copes with address mobility/agility
mobile/wifi/fibre from same device
– Secure
21. 21
Vietnam in 9th place in S.E. Asia
https://stats.labs.apnic.net/quic/XU
22. 22
Watch this space
• Low levels of uptake by ASN
– Mostly this requires browser
upgrade in clients, it isn’t about
infrastructure ISPs deploy really
• Except if you do ISP supplied OS
upgrades/OTA
– Enabled by CDNs like Cloudflare
25. 25
25
New Look and Feel, and comparison mode
Select from routing,
delegation, history,
whois, geo-location
tools
Compare up to 6 ASN
or IP prefixes side-by-
side
Worldwide, resource
data from
RIPESTAT
No login required!
27. 27
27
New Look and Feel, charting improvements
Comparison mode,
select regions,
economies to show in
a single chart
Can download data or
chart views for offline
use
APNIC Region data
No login required!
28. 28
28
New Look and Feel, charting improvements
Comparison mode,
select regions,
economies to show in
a single chart
Can download data or
chart views for offline
use
APNIC Region data
No login required!
Coming Soon: Worldwide Data
30. 30
30
New: Routing inconsistency report
Compares BGP to
RPKI (ROA) and IRR
(route object)
APNIC Region data
APNIC Login required.
31. 31
31
New: Suspicous traffic now has alerts
You specify the ASN,
prefix, conditions
We send you email
notifications when
events trigger.
We’re working on SMS
and Slack integration
APNIC Login required
32. 32
32
New: Routing inconsistency report
Compares BGP to
RPKI (ROA) and IRR
(route object)
APNIC Region data
APNIC Login required.
Coming soon: alerts!
33. 33
33
New: Routing inconsistency report
Compares BGP to
RPKI (ROA) and IRR
(route object)
APNIC Region data
APNIC Login required.
Would you like access?
Talk to VNNIC
(we’d love to see if we can extend
service to NIR members)