Accepted Papers

Choosing an orchestration tool: Ansible and Salt by Vincent BOON

In many organisations, moves are being made towards picking a standard for network orchestration. However, there are many choices.

In previous talks I have given a high level introduction to the concept of network orchestration, and a general description of some of the tooling used. This talk will provide a deeper dive into two of the tools that are getting more attention in the networking world: Ansible and Salt.

Both projects started out as remote execution engines written in Python, and have evolved into fully featured automation and orchestration systems. Through their use of the NAPALM library, both have strong support for configurations and monitoring of networking devices, which will be the focus of this talk.

I will cover the design and concepts of Ansible and Salt; what you get for free, and what you pay for, and go through some common day-to-day provisioning and maintenance scenarios using each of the tools, with the aim of helping network administrators choose the right tool for their network.


SP Routing Innovation with Segment Routing, VXLAN and EVPN by Mark LEE

Detailing some examples of how service providers are applying cloud networking principles to transform their Edge, Core and Data Center domains, with a particular focus on MPLS Segment Routing and VXLAN as the transport architecture. These transports, combined with BGP community and multi-protocol address family extensions, allow providers to realize a highly scalable, resilient and extensible network architecture.


Build Your Own Version of NetNorad Using Open Source Tools by Jose Leitao

NetNorad is Facebook’s system for automation end to end fault detection using active probing [1]. It follows a simple principle of having pingers on the network with responders on hosts, storing the response, analyzing the data and then providing a source for alarms to operations.

Using OpenSource tools, including UdpPinger (a high performance UDP packet generation, reflection and collection library [2]), we will show how almost anyone can build a solution similar to Facebook’s NetNorad using Docker / InfluxDB and a few Python Scripts.

We will show during the presentation how to build this system on a mock network from start to finish, introducing packet loss and showing how the probe information can be sliced / visualized using Chronograf


The Hurricane Electric toolkit, BGP.HE.NET by Walt Wollny

Walt will presenting the Hurricane Electric toolkit, BGP.HE.NET

http://BGP.HE.NET allows you to see network relationships with transit providers, peers and the routes networks take to reach the world. This will be a comprehensive overview of the features available within the toolkit as well a live demonstration. Hurricane Electric has released many new components in the past year that will also be reviewed.


The Stories of IXP Development and the Way Forward by Che-Hoo Cheng

IXP (Internet eXchange Point) is always a hot topic in Internet community and in a lot of case, it is political too, especially during the early stage of development of a new one. In this talk, the speaker will share his knowledge, experience and observations from setting up and operating an IXP and also from helping others set up theirs. There are a lot of challenges and difficulties faced by IXP operators continuously, even after critical mass is seemingly reached. He will also share his views about the way forward for IXPs.


Surviving the Inside DDoS attack by CF Chui

IoT botnet has generated a lot of attention in 2017 because of the high volume DDoS attacks originated from these IoT bots. In late 2017, researchers have also seen a variant of Mirai IoT bot which could possibly impact Windows devices.

In this presentation, we will examine this ‘evolution’ of Mirai IoT malware, and the possible consequences it could bring to the DDoS threat landscape.

Hong Kong peering scene and network infrastructure by Robin Kong