Opening Keynote Panel
The vision of the Internet was to connect the entire world. In less than 40 years we have done exactly that. What are the unintended consequences and how do we start to address those?
Panel: Dr. Paul Vixie, Prof. Henning Schulzrinne, Deepak Maheshwari, Cathy Aronson, Naganand Doraswamy, and Nalini Elkins (Moderator)
Panel Discussion on IPv6
IPv6 Panel - Jen Linkova, Michael Ackermann, Suresh Krishnan, Fred Baker, Nalini Elkins (moderator)
This panel will discuss current issues in the industry with IPv6 deployment or standardization. Topics may include: deployment at enterprises, deployment at ISPs, other implementation gaps, IPv6-only networks, transition mechanisms, and IPv6 security.
Hot in Networking Track
Jim Guichard, Futurewei
The concept of Software Defined Network (SDN) enables the programming of network behavior in a centrally controlled manner using open standard APIs. With the addition of Segment Routing (SR) in IPv6 (SRv6), new ways to program the packet processing in the network using the segment identifier (SID) is standardized at the IETF. Further this talk will introduce you to the need for fine grained network service provisioning to allow differentiated service treatment in network via Application-aware Networking (APN).
MADINAS - MAC Address Device Identification for Network and Application Services
Michael Richardson, Sandelman Software Works
The IETF held a BOF at IETF109 called MADINAS - MAC Address Device Identification for Network and Application Services. IEEE plans and many vendors are implementing new mechanisms to randomize device MAC addresses. This is primarily for privacy reasons: even in encrypted WiFi and 802.15.4 networks, the layer-2 MAC address are not encrypted as they are needed as part of the encryption mechanism. This talk deals with the device identity challenge: how can we effectively replace lists of MAC addresses as a major configuration element? What kind of higher-level device identities are available, and what changes are necessary to leverage this effort?
Intent Based Networking (IBN) - the technology
Jeff Tantsura, Head of Networking Strategy, Apstra
At the highest level, intent is a declarative specification of the desired outcome. And the desired outcome is complete automation of the whole network service life-cycle, which consists of the following phases: design (intent consumption), build (intent modeling), deploy (intent instantiation), validate (continues intent validation). Intent defines the “what” not the “how”. Intent is dynamic, and a fundamental requirement of an IBN system is that it should be capable of ensuring that intent’s expectations are met in the presence of change.
In order to enforce that intent expectations are met, the IBNS has to be the single source of truth (regarding the intended state of both your infrastructure and your business rules) that one can programmatically reason about in the presence of change. Taxonomy of IBN introduces 4 levels of maturity, from basic automation to self-operating networks. Ability to constantly validate that the operational state is the intended state is fundamental for IBN to coherently provide full life cycle management, from design to deployment to operations. This is to introduce the concept of IBA - Intent Based Analytics that are context and intent aware and gather only data that is relevant to the intent as the opposite to “big data fishing”.
Quick Introduction to QUIC
Jana Iyengar, Fastly
QUIC is an encrypted, multiplexed, and low-latency transport protocol designed from the ground up to improve transport performance for HTTPS traffic and to enable rapid deployment and continued evolution of transport mechanisms. QUIC has now matured from an experiment to a more complete Internet standard at the IETF. In this talk, I will describe the motivations for developing a new transport, QUIC's design and the principles that guided it, and performance improvements seen by various deployments of QUIC, and the current state of its development and deployment.
Revisiting Congestion Control: End-to-End v/s In-Network Feedback
Dr. K. K. Ramakrishnan & Mohit Tahiliani
Networked applications are ubiquitous and their performance requirements are becoming increasingly stringent. Network congestion can seriously impact performance contributing to increased latency, packet loss and poor throughput. To address these problems, the networking community has come up with a large number of congestion control algorithms through the years. These can be classified into two broad classes: one based on an end-system's perception of network congestion and the other based on the network providing feedback to flows that pass through it. At the same time, the focus for congestion control has expanded from just being in the wide-area and metro networks to data centers and wireless networks including cellular environments. This talk will discuss the different kinds of feedback based congestion control, with the signal for congestion being based on just using end-system based inference of congestion to signals generated from within the network. Examples include end-to-end loss and delay-based signals and Explicit Congestion Notification (ECN). ECN generated by the network has ranged from using a simple threshold for the queue at a router, to more elaborate AQM-based ECN signaling. We will describe our work on seeking to understand the benefits of network-generated feedback. Our discussion will be supported by experimental results comparing BBRv1, BBRv2 (with and without ECN) and CUBIC (with PI controller AQM and ECN).
Closing Keynote Panel & 5G Tutorial Track
India and Future of Internet
Closing Keynote Panel - Dheeraj Sanghi, Rajat Kathuria, Anil Jain, Glenn McNight, Deepak Maheshwari (moderator)
India already has 750 million Internet connections and yet has the largest unconnected population. Hence, standards bodies need to factor in the Internet users and usage in countries like India. Accordingly, this panel will discuss standardization activity such as languages, security, privacy and encryption.
5G for an IP Engineer
Sridhar Bhaskaran, Altiostar
This tutorial will introduce the 5G System Architecture, the network topology, and describe the life of a packet in a 5G network for different use cases. The talk will also briefly cover the Myths surrounding 5G and try to set the reality straight. The role of IETF technologies in 5G would be of special interest.
IETF Network Slicing & its realization
Dhruv Dhody & Srihari Sangli
Dhruv will cover the IETF definition of the Network Slicing and how it relates to the end-to-end slice. The talk will also include an introduction to the proposed framework, NBI, and a list of various realization techniques.
Srihari will further cover one such realization technique in the IP/MPLS network in detail; that was recently proposed at IETF 109.