APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
APNIC Training Delivery Manager Terry Sweetser presents an overview of Internet Exchange Points at PacNOG 31, held in Port Vila, Vanuatu from 26 to 30 June 2023.
Webinar topic: BGP Services IP Transit vs IP Peering
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing BGP Services IP Transit vs IP Peering
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording available on Youtube
https://youtu.be/TYNHBSTxiOE
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
APNIC Training Delivery Manager Terry Sweetser presents an overview of Internet Exchange Points at PacNOG 31, held in Port Vila, Vanuatu from 26 to 30 June 2023.
Webinar topic: BGP Services IP Transit vs IP Peering
Presenter: Achmad Mardiansyah
In this webinar series, We are discussing BGP Services IP Transit vs IP Peering
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram
Recording available on Youtube
https://youtu.be/TYNHBSTxiOE
In this webinar, we cover how Border Gateway Protocol works. Starting from key concepts, you'll learn about Autonomous Systems, the BGP protocol, AS Path, learning and advertising routes, RIBs and route selection. See the webinar recording at https://www.thousandeyes.com/webinars/how-bgp-works
Cisco Internetworking Operating System (ios)Netwax Lab
Cisco IOS (originally Internetwork Operating
System) is software used on most Cisco Systems
routers and current Cisco network switches.
(Earlier switches ran CatOS.) IOS is a package of
routing, switching, internetworking and
telecommunications functions integrated into a
multitasking operating system.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
[Advantech] ADAM-3600 training kit and TaglinkMing-Hung Hseih
This is training tutorial how to use Talink configure toll for IOT gateway ADAM-3600.
Agenda
- Overview of ADAM-3600 &Demo Box Hands-On
- First Step -Build Up Your Own iRTUSystem
- Methods for Trouble Shooting
- Connecting the Dots –Upper Link Setting
Logic Building –Using SoftLogicfor Complex Logic (Demo)
Have you ever heard of FreeBSD? Probably.
Have you ever interacted with its kernel? Probably not.
In this talk, Gili Yankovitch (nyxsecuritysolutions.com) will talk about the FreeBSD operating system, its network stack and how to write network drivers for it.
The talk will cover the following topics:
* Kernel/User interation in FreeBSD
* The FreeBSD Network Stack
* Network Buffers API
* L2 and L3 Hooking
A Proxy Server is computer that functions as an intermediary between a web browser (such as Internet
Explorer) and the Internet. Proxy servers help improve web performance by storing a copy of frequently
used webpages. When a browser requests a webpage stored in the proxy server's collection (its cache),
it is provided by the proxy server, which is faster than going to the web. Proxy servers also help improve
security by filtering out some web content and malicious software.
A Proxy Server is a server (a computer system or an application) that acts as an intermediary for
requests from clients seeking resources from other servers.
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Webinar topic: BGP on RouterOS7 - Part 1
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How BGP on RouterOS7 works
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/CYTHOlY4WU0
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
SDN in the Management Plane: OpenConfig and Streaming TelemetryAnees Shaikh
The networking industry has made good progress in the last few years on developing programmable interfaces and protocols for the control plane to enable a more dynamic and efficient infrastructure. Despite this progress, some parts of networking risk being left behind, most notably network management and configuration. The state-of-the-art in network management remains relegated to proprietary device interfaces (e.g., CLIs), imperative, incremental configuration, and lack of meaningful abstractions.
We propose a framework for network configuration guided by software-defined networking principles, with a focus on developing common models of network devices, and common languages to describe network structure and policies. We also propose a publish/subscribe framework for next generation network telemetry, focused on streaming structured data from network elements themselves.
Network LACP/Bonding/Teaming with MikrotikGLC Networks
Webinar topic: Network LACP/Bonding/Teaming with Mikrotik
Presenter: Achmad Mardiansyah
In this webinar series, How Network LACP/Bonding/Teaming with Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/smRcyLE42hU
1) Explain the advantages and disadvantages of static routing.
2) Explain the purpose of different types of static routes.
3) Configure IPv4 and IPv6 static routes by specifying a next-hop address.
4) Configure an IPv4 and IPv6 default routes.
5) Explain the use of legacy classful addressing in network implementation.
6) Explain the purpose of CIDR in replacing classful addressing.
7) Design and implement a hierarchical addressing scheme.
8) Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
9) Configure a floating static route to provide a backup connection.
10) Explain how a router processes packets when a static route is configured.
11) Troubleshoot common static and default route configuration issues.
PITA 27th AGM & Business Forum Expo 23: Internet Exchange PointsAPNIC
APNIC Training Delivery Manager Terry Sweetser presented on smarter networking and Internet traffic efficiency with Internet Exchange Points at the PITA 27th AGM & Business Forum Expo 23, held from 29 May to 1 June 2023, in Port Moresby, Papua New Guinea.
PacNOG 25: Keeping local traffic local by doing local peering APNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng presented on 'Keeping Local Traffic Local by Doing Local Peering'. about the concepts of peering, the benefits of peering, and the roles of Internet exchange Points (IXPs) to facilitate easier local peering. Che-Hoo also shared his experience in operating an IXP.
Cisco Internetworking Operating System (ios)Netwax Lab
Cisco IOS (originally Internetwork Operating
System) is software used on most Cisco Systems
routers and current Cisco network switches.
(Earlier switches ran CatOS.) IOS is a package of
routing, switching, internetworking and
telecommunications functions integrated into a
multitasking operating system.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
[Advantech] ADAM-3600 training kit and TaglinkMing-Hung Hseih
This is training tutorial how to use Talink configure toll for IOT gateway ADAM-3600.
Agenda
- Overview of ADAM-3600 &Demo Box Hands-On
- First Step -Build Up Your Own iRTUSystem
- Methods for Trouble Shooting
- Connecting the Dots –Upper Link Setting
Logic Building –Using SoftLogicfor Complex Logic (Demo)
Have you ever heard of FreeBSD? Probably.
Have you ever interacted with its kernel? Probably not.
In this talk, Gili Yankovitch (nyxsecuritysolutions.com) will talk about the FreeBSD operating system, its network stack and how to write network drivers for it.
The talk will cover the following topics:
* Kernel/User interation in FreeBSD
* The FreeBSD Network Stack
* Network Buffers API
* L2 and L3 Hooking
A Proxy Server is computer that functions as an intermediary between a web browser (such as Internet
Explorer) and the Internet. Proxy servers help improve web performance by storing a copy of frequently
used webpages. When a browser requests a webpage stored in the proxy server's collection (its cache),
it is provided by the proxy server, which is faster than going to the web. Proxy servers also help improve
security by filtering out some web content and malicious software.
A Proxy Server is a server (a computer system or an application) that acts as an intermediary for
requests from clients seeking resources from other servers.
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Webinar topic: BGP on RouterOS7 - Part 1
Presenter: Achmad Mardiansyah & M. Taufik Nurhuda
In this webinar series, How BGP on RouterOS7 works
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/CYTHOlY4WU0
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
SDN in the Management Plane: OpenConfig and Streaming TelemetryAnees Shaikh
The networking industry has made good progress in the last few years on developing programmable interfaces and protocols for the control plane to enable a more dynamic and efficient infrastructure. Despite this progress, some parts of networking risk being left behind, most notably network management and configuration. The state-of-the-art in network management remains relegated to proprietary device interfaces (e.g., CLIs), imperative, incremental configuration, and lack of meaningful abstractions.
We propose a framework for network configuration guided by software-defined networking principles, with a focus on developing common models of network devices, and common languages to describe network structure and policies. We also propose a publish/subscribe framework for next generation network telemetry, focused on streaming structured data from network elements themselves.
Network LACP/Bonding/Teaming with MikrotikGLC Networks
Webinar topic: Network LACP/Bonding/Teaming with Mikrotik
Presenter: Achmad Mardiansyah
In this webinar series, How Network LACP/Bonding/Teaming with Mikrotik
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/smRcyLE42hU
1) Explain the advantages and disadvantages of static routing.
2) Explain the purpose of different types of static routes.
3) Configure IPv4 and IPv6 static routes by specifying a next-hop address.
4) Configure an IPv4 and IPv6 default routes.
5) Explain the use of legacy classful addressing in network implementation.
6) Explain the purpose of CIDR in replacing classful addressing.
7) Design and implement a hierarchical addressing scheme.
8) Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
9) Configure a floating static route to provide a backup connection.
10) Explain how a router processes packets when a static route is configured.
11) Troubleshoot common static and default route configuration issues.
PITA 27th AGM & Business Forum Expo 23: Internet Exchange PointsAPNIC
APNIC Training Delivery Manager Terry Sweetser presented on smarter networking and Internet traffic efficiency with Internet Exchange Points at the PITA 27th AGM & Business Forum Expo 23, held from 29 May to 1 June 2023, in Port Moresby, Papua New Guinea.
PacNOG 25: Keeping local traffic local by doing local peering APNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng presented on 'Keeping Local Traffic Local by Doing Local Peering'. about the concepts of peering, the benefits of peering, and the roles of Internet exchange Points (IXPs) to facilitate easier local peering. Che-Hoo also shared his experience in operating an IXP.
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
Network Convergence of Mobile, Broadband and Wi-Fi3G4G
A presentation and video by Ben Toner, Founder & Director, Numerous Networks exploring the convergence of Mobile, Broadband and Wi-Fi
*** SHARED WITH PERMISSION ***
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
PacNOG 24: Keeping local traffic local by doing local peeringAPNIC
APNIC Infrastructure & Development Director Che-Hoo Cheng discusses the concept of peering, the benefits of local peering, and the role of IXPs to facilitate easier peering at PacNOG 24 in Apia, Samoa from 24 to 28 June 2019.
APNIC Chief Scientist Geoff Huston presents on Future network needs and what's driving change at the 38th TWNIC OPM, held on 1 December 2022 in Taipei.
Openflow for Mobile Broadband service providers_Nov'11Radhakant Das
This is an analysis done on status of Open flow as on 2011 . It has many reasons to be embraced. SDNA architecture under cloud orchestration demands OPENFLOW to come live soon in commercial networks.
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Lao Digital Week 2024: It's time to deploy IPv6APNIC
APNIC Development Director Che-Hoo Cheng presents on the importance of deploying IPv6 at the Lao Digital Week 2024, held in Vientiane, Lao PDR from 10 to 14 January 2024.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
1. 1
On Peering and IXPs
Women in Networking Series
17 November 2021
2. 2 v1.0
2
About Me
Network Operations Engineer (AS4608)
Training Delivery Manager, SEA/EA
Core Committee
Network Engineer (AS23862) until 2010
DILNET / UP Computer Center
Alumni, EEEI
3. 3 v1.0
3
Agenda
• Connecting to the Internet
• Peering and Transit
• What are IXPs and why you need it
• IXP Development Work @ APNIC
4. 4 v1.0
4
How does the Internet operate?
The Internet is a network of networks.
It is composed of networks of transit or
service providers, content providers and
users/consumers.
5. 5 v1.0
5
Network of networks
Data packets hop
through networks to
reach its destination
Networks follow a set of
routing protocols
7. 8 v1.0
8
Autonomous Systems
A network on Internet
is called Autonomous
System (AS) which is
represented by AS
Number (ASN).
ASNs are number
resources distributed
by the RIR
Equinix -> ConvergeICT-> UPD
Vocus-> Converge ICT -> UPD
HKIX > Converge ICT -> UPD
8. 9 v1.0
9
What network engineers do
CONFIGURE ROUTERS
AND SWITCHES
CONFIGURE ROUTING
PROTOCOLS
MANAGE AND
MONITOR THE
NETWORK
CAPACITY PLANNING DESIGN NETWORK
TOPOLOGY
DO TRAFFIC
ENGINEERING
Network Engineers must have a good
knowledge of BGP routing and peering.
9. 10 v1.0
10
Internet Transit
Networks need to pay transit providers to get to the
whole Internet
Can connect to multiple transit providers for resilience and
portability
A few very large ISPs act as transit providers for the
whole world (the so-called tier-1 networks) which do
not need to pay others to get full Internet
connectivity
Other ISPs must be transit customers of those tier-1 networks
directly or indirectly in order to gain full connectivity
Networks on Internet are trying to bypass transit
providers as much as possible
By doing direct peering with various networks for lower cost
and higher performance
10. 11 v1.0
11
Transit Provider /
Internet Gateway
(Upstream)
Global Internet
Downstream
Customer
Customer
routes only
Routes of
the whole world
All customer routes
Ordinary Transit Model – Internet Gateway
11. 12 v1.0
12
Transit Provider A
(Upstream)
Transit Provider B
(Upstream)
Downstream
Customer
Downstream
Customer
Downstream
Customer
Downstream
Customer
Routes of A and
its customers
Routes of B and
its customers
Ordinary Peering Model
12. 13 v1.0
13
Peering in General
• ASes are interconnected/peered at Internet exchanges points (IXPs) or privately
• Interconnection/peering is among ISPs / data centres / content providers / content distribution
network (CDN) providers / cloud services providers which have different ASNs using BGP protocol
• For higher performance, lower latency and lower cost
• Usually no settlement between peers and cost is shared
For mutual benefits
• Local-to-local traffic do NOT need to route through overseas
• Important to local Internet development
Local Peering
• BLPA (Bi-Lateral Peering Agreement)
Between 2 ASes
• MLPA (Multi-Lateral Peering Agreement)
Among > 2 ASes
13. 14 v1.0
14
Private Peering
A form of BLPA having dedicated point-to-point connection between 2 ASes
Using cross-connect or local loop or IPL to interconnect
• Cost is usually shared between 2 peers
May have multiple connections between 2 ASes for resiliency
Not quite cost-effective
• Spare bandwidth cannot be used for other traffic
• Unless the traffic volume is really high
Not very scalable
• nC2 physical connections for n ASes to peer fully with one another
15. 16 v1.0
16
What is an Internet eXchange Point (IXP)?
• An IXP is a shared physical network infrastructure over which various Autonomous
Systems can do easy peering with one another
One physical connection to IXP can be used for interconnections with multiple
networks
More cost-effective and scalable, especially with more participants
ASes to be served by IXP include Internet Gateways, Internet Service Providers
(ISPs), Research & Education (R&E) Networks, Cloud Service Providers, Content
Providers and Content Delivery Network (CDN) Providers
16. 17 v1.0
17
IXPs are Layer-2 Networks
Switched Ethernet
• One physical connection for interconnections with multiple networks
• Only routers are allowed to connect to the switching fabric directly
IXP participants can do direct Bilateral Peering (BLPA) over the layer 2 infrastructure anytime
With Route Server added to the layer 2 infrastructure, IXP participants can also do Multilateral
Peering (MLPA) for easier interconnections among everybody
• Traffic exchange is direct and not going through the route server
Those called themselves “IX” but serving layer-3 services are considered as transit providers
• Note that IXPs, transit providers and data centres are not the same things
17. 18 v1.0
18
Simplest IXP Topology
IXP Switch
Border Router
of ISP A
Border Router
of ISP B
Border Router
of ISP D
Border Router
of ISP C
18. 19 v1.0
19
IXP Topology with Minimal Switch/Site Resilience
IXP Switch x 2
(at same location or different locations)
Border Router
of ISP A
Border Router
of ISP B
Border Router
of ISP D
Border Router
of ISP C
19. 20 v1.0
20
Adding Route Server for Multilateral Peering
Routes
Redistribute
Routes to All
RS
20. 21 v1.0
21
Main Benefits of IXP
• One main objective of an IXP is to keep local traffic local
o Important to local Internet development
• Helps bypass 3rd-party network infrastructure for easy interconnection and direct traffic exchange
among participating networks
o Reduced cost – cheaper connectivity
o Enhanced network performance – faster speed
o Reduced latency – lower delay
• Helps encourage development of more local content and local applications
o Helps local data centre business and other businesses
• Everybody is benefited
o The gain for each may be different but all will gain
o At the end, it is the most important that end users or consumers are benefited
• Often considered as Critical Internet Infrastructure locally, regionally or globally
21. 22 v1.0
22
To Add Value
ROUTE SERVER / ROA AND RPKI DOMAIN NAME INFRASTRUCTURE
(ROOT/TLD SERVERS)
SHARED CDN CACHES
22. 23 v1.0
23
Benefits of IXP - Example
A Fijian ISP in Suva accessing
content at the University of the
South Pacific in Suva
• Packet travels > 25,000km
• Physical distance < 10km
• Adding long latency
• Possibly high jitter too
• Using expensive submarine
capacity
Return path had similar issue
24. 25 v1.0
25
Possible Scenario for Improving Local Peering
IGW IGW
IGW
Global Internet
Access
Network
Access
Network
Access
Network
Access
Network
Other
Network
Other
Network
Other
Network
Other
Network
IXP
Border
IPL
IPL
IPL
Private
Peering
Private
Peering
Private
Peering
26. 27
PeeringDB Entry
Set up a record of your ASN on
www.peeringdb.com and tell
everyone where you are (at
which IXPs and/or data centres)
and that you are willing to do
BLPA.
Also use it to find your potential
BLPA peers
27. 28 v1.0
28
Some IXPs in the Philippines
MANILA
ComclarkIX
MIX
GETAFIX
GIX/NIGX
PCTA-IX
PHIX
PhOpenIX
VIX
CEBU
GETAFIX
GIX
PhOpenIX
VIX
DAVAO
GIX
PhOpenIX
*From the latest ”IXP & DC landscape”
28. 30 v1.0
30
IXP Development Work of APNIC
APNIC strongly believes IXPs help Internet development
•After all, IXPs serve and benefit APNIC members
•In fact, IXPs need IP addresses and ASNs and so are APNIC members themselves
Do more on helping those developing economies
•Especially those which do not have any IXP yet
•Or those which their only IXP is not functioning well
Training and Technical Assistance work primarily
•Not just for IXP operators but also for IXP participants
•Also help talk to major stakeholders to convince them of the benefits of having a local IXP while maintaining neutrality
•May need help of Community Trainers and Consultants from time to time
Having been supporting IXP development in Fiji, PNG, Vanuatu, Mongolia, Bhutan, Myanmar, some cities in India and
others
29. 31 v1.0
31
IXP Development Package of APNIC
Training & Technical Assistance as the minimum
• Technical & non-technical
Other possible support items (on case-by-case basis according to individual needs):
• Ethernet switch
• Root Server anycast instance
• Route Server
• ROV & IPv6 deployment support
• IXP Manager
• RIPE Atlas Anchor
• CSIRT Establishment
• Honeypot of Honeynet Project for Analysis
• BGP Route Collection for Analysis
APIX & MANRS Memberships are recommended to all IXPs