Program - Presentations
Program presentations
Presenter | Session | Presentation Title | |
---|---|---|---|
Jeff Apcar, Cisco Systems | Tutorial |
IPv6 Technical IntroductionIPv6 technical introduction aims to give participants a quickstart understanding of the basics of IPv6 such addressing formats and neighbour discovery protocols. It provides a solid foundation for further learning of IPv6 technologies. | |
Jeff Apcar, Cisco Systems | Tutorial |
IP Routing in Smart Object Networks and the Internet of ThingsThe Internet of Things (IoT) is a pervasive and ubiquitous network which enables the monitoring and control of our physical environment by collecting, processing, and analyzing the data generated by Smart-Objects. A Smart-Object (SO) is a physical object (eg., light bulb, smart power meters, garden sprinklers) with an embedded sensor (or actuator) which is able to communicate. Smart Objects usually operate in a highly constrained environment in terms of physical size, available memory, CPU power and battery life in addition to communicating over wireless low power lossy networks. This environment throws up quite a number of routing challenges that traditional routing protocols cannot satisfy. This presentation covers enhancements and innovations that were necessary to allow Smart Objects to route information over IPv6 in the Internet Of Things. In particular, carrying IPv6 over low power networks (6LowPAN) and the RPL the new routing protocol for Smart Objects will be discussed. | |
Raphael Ho, Equinix Hong Kong | Conference |
Routing Control at Peering PointsThis presentation introduces the routing control capabilities on multilateral peering route servers at certain peering points via BGP community strings. | |
1) Rohit Bothra 2) Dilip Sai Chandar, CISCO Systems | Tutorial |
IPv6 Security Threats & MitigationsIPv6 has finally started to take off as a result of: • Exhaustion of the IANA IPv4 free pool • Awareness activities such as the “World IPv6 Day” • Imminent exhaustion of the free pool of IPv4 addresses at the different RIRs As we are heading towards more and more IPv6 based network deployments, it is extremely critical to understand the security threats it bring with it. A lot of myths have been created around IPv6 security: • Security is a key component of the protocol • Change from network-centric to host-centric paradigm • Increased/compulsory use of IPsec • Etc etc etc These myths have contributed to a general misunderstanding of the security threats of IPv6, thus negatively affecting the emerging (or existing) IPv6 networks. This presentation separates fudge from fact, and offers a more realistic view of “IPv6 security threats” and how to mitigate those vulnerabilities. It is meant to Influence the way in which we think about IPv6 security (and IPv6 in general). | |
Willy Sutrisno, Matrix Networks Pte Ltd, Indonesia | Tutorial |
Establishing peering one small step at a timeAs ISP starting to expand their network outside their country, they will start with setting up nodes in foreign country, looking for cheaper IP transit alternative and setting up peering points. In this slides we are going to share the experience that we had starting as an ISP in Indonesia, becoming a sub sea cable operator and slowly expanding the international network. | |
Arnold Nipper, DE-CIX Management GmbH | Conference |
Interconnecting IXPs: Pros and ConsInternet Exchange Points (IXP) are a vital part of the Internet eco system nowadays. This presentation discusses the pros and cons of interconnecting IXPs. Before discussing interconnections we have to have a good understanding and definition what an IXP is. Next we see how technically IXP may be interconnected. Then Pros and Cons are discussed and examples of interconnections are given. | |
Muhibbul Muktadir TANIM, Augere Wireless Broadband Bangladesh [Qubee], Bangladesh | Tutorial |
Wimax & WifiWimax
WiFi
Discussion
|
|
Cecil Goldstein, Team Cymru, Australia | Tutorial |
Network Forensics - Understanding Botnets and Botnet OperationUnderstanding how malicious activity occurs on the Internet is the key to understanding how to identify and counter this activity. This tutorial will focus on one of the major elements involved in enabling network malicious activity - botnets The tutorial will discuss and demonstrate how botnets are created, controlled and how they can be used. Botnet activity will also be observed through traffic captures. | |
Srinivas Chendi, APNIC | Newcomers' Orientation |
Orientation to APNIC and APRICOT ConferenceThis session is by invitation only. The Newcomers' Orientation is an introduction to the APNIC/APRICOT/SANOG Conferences for new or recent attendees. | |
Champika Wijayatunga, APNIC | Tutorial |
Internet Resource ManagementThis training introduces, highlights, and explains the key essentials of Internet resource management. It focuses on understanding the structures, processes, procedures, and policies involved in requesting, allocating, and managing Internet addresses (IPv4 and IPv6) and Autonomous System (AS) numbers. | |
Champika Wijayatunga, APNIC | Tutorial |
Internet Routing RegistryThe tutorial covers the importance and benefits of the IRR to Internet operations. Participants will be introduced to the tools used to interact with the IRR and learn how to create, register, and query routing objects. | |
Aftab Siddiqui, Cybernet | BoF |
Network AbuseManaging network abuse incidents, across organizations and by economy or region. | |
Izumi Okutani, JPNIC | Women in ICT |
Balancing and coordination of diversities | |
Dr. Rekha Jain, Indian Institute of Management | Women in ICT |
Opportunities in Telecom and Education sectors | |
Anurag Verma, Tulip Telecom | Plenary |
IPv6 readiness at Tulip | |
Ramesh Chandra, Bharti Airtel | Plenary |
Airtel IPv6 readiness | |
Geoff Huston, APNIC | Plenary |
IPv6 for Internet Mobility | |
William Norton, DrPeering International, USA | Tutorial |
Internet Peering Workshop The Internet Peering Workshop is a proposed one-day workshop for Internet Service Providers, Internet Exchange Point Operators, and Content Providers interested in getting into peering in the Internet Peering Ecosystem We start with the industry definitions and the components of a base peering ecosystem. These definitions are then exercised in the Peering Simulation Game where the participants engage in peering negotiations designed to highlight the power dynamics observed in every peering ecosystem. Next we move on to explore the math behind peering, the ""When does peering makes sense?"" question. The tradeoffs associated with peering publicly and privately, and with content or access are discussed. With this foundation, we enlist peers from India and the Asia Pacific region to present characteristics of their ecosystem so we can learn from each other. We finish up the workshop by highlighting the ""tricks of the trade"" that ISPs around the world have used to obtain peering where they otherwise would not have been able to obtain peering. For the IXP operators, we share the ""tricks of the trade"" that IXPs have used to build that initial critical mass, grow the critical mass and compete with the incumbent IXP. This workshop is based on a decade of work in the field. The presentations have been refined over 100 presentations. |
|
Andy Davidson, LONAP / Hurricane Electric, UK | Tutorial |
Route Servers and IXPs : A Tutorial for APIXThis tutorial covers the operations of Internet Exchange Points, and special focus on Route Servers at Internet Exchange Points using OpenBGP and BIRD. The tutorial covers installation as well as well established best practices in IXPs, specially in Europe. We cover standard communities used by Route Servers at IXP. We also cover the latest discussion on route servers happening in IXPs with the use of Quagga. Full configuration examples are provided and full notes are provided to organisations who wish to learn more about IX operations. | |
Srinivas (Sunny) Chendi | AMM Video |
Welcome | |
Maemura Akinori | AMM Video |
Introduction | |
Paul Wilson | AMM Video |
APNIC EC election procedures
Slides 363.8 KB Slides 222.7 KB |
|
Election Chair | AMM Video |
Speeches from candidates, EC election opens | |
Paul Wilson | AMM Video |
Introduction
Slides 808.3 KB Slides 746.5 KB |
|
Sanjaya | AMM Video |
Delivering Value
Slides 1.2 MB Slides 1.2 MB |
|
German Valdez | AMM Video |
Collaborating and Communicating
Slides 696.8 KB Slides 521.6 KB |
|
Philip Smith | AMM Video |
Supporting Internet Development
Slides 1001.1 KB Slides 793.1 KB |
|
Richard Brown | AMM Video |
Corporate Support
Slides 554.8 KB Slides 405.2 KB |
|
Maemura Akinori | AMM Video |
APNIC EC report
Slides 4.1 MB |
|
James Spenceley | AMM Video |
APNIC EC Treasurer's Report
Slides 1.7 MB Slides 1.2 MB |
|
Andy Linton | AMM Video |
Policy SIG report
Slides 199.6 KB Slides 156.5 KB |
|
Izumi Okutani | AMM Video |
NIR SIG report
Slides 18.5 KB Slides 40.4 KB |
|
Election Chair | AMM Video |
APNIC EC voting reminder | |
Election Chair | AMM Video |
APNIC EC voting close | |
Che-Hoo Cheng | AMM Video |
APIX report
Slides 390.5 KB Slides 1.1 MB |
|
Phuong Anh Ta | AMM Video |
APNIC 34
Slides 2.7 MB Slides 16.9 MB |
|
Election Chair | AMM Video |
APNIC EC election results | |
Paul Wilson | AMM Video |
Vote of thanks
Slides 15.0 MB Slides 11.7 MB |
|
Louise Flynn | AMM Video |
ISIF Presentations | |
Axel Pawlik, RIPE NCC | Global Reports Video Transcript |
NRO EC report
Slides 188.9 KB Slides 605.8 KB |
|
Sanjaya, APNIC | Global Reports Video Transcript |
NRO Statistics report
Slides 1.6 MB Slides 5.9 MB |
|
Tomohiro Fujisaki, ASO AC | Global Reports Video Transcript |
ASO AC report
Slides 3.8 MB |
|
Elise Gerich, ICANN | Global Reports Video Transcript |
IANA Department Update
Slides 3.3 MB Slides 3.8 MB |
|
Adiel A. Akplogan, AfriNIC | Global Reports Video Transcript |
AfriNIC report
Slides 2.6 MB |
|
Einar Bohlin, ARIN | Global Reports Video Transcript |
ARIN report
Slides 1.2 MB |
|
Arturo Servin | Global Reports Video Transcript |
LACNIC report
Slides 105.8 KB Slides 570.0 KB |
|
Axel Pawlik, RIPE NCC | Global Reports Video Transcript |
RIPE NCC report
Slides 2.2 MB Slides 1.5 MB |
|
Nishal Goburdhan, Keynote | APRICOT Closing Plenary Video |
Around the world in 590msNishal speaks about their experiences at Internet Solutions, building
from a small network that started out at the bottom of Africa, to a
international network infrastructure that spanned the globe, during a
time of extreme adverse regulation. He'll share lessons hard learned and
some pragmatic advice for operators in developing countries.
Slides 76.8 KB |
|
Rajesh Chharia, Host | APRICOT Closing Plenary Video |
Closing Address | |
Philip Smith, APIA Chair | APRICOT Closing Plenary Video |
Vote of Thanks | |
Nandan Nilekano, Unique Identification Authority of India (UIDAI) | Video |
Keynote | |
Madhusudhan M, TATA Communications | Video |
Speech | |
Maemura Akinori, APNIC EC | Video |
Closing Address | |
N. Ravi Shanker, DIT | Video |
Closing Address | |
Choon Sai LIM, SGNIC | Video |
Welcome to APRICOT 2013 | |
Geoff Huston, APNIC | APOPS Video |
BGP and the DFZThis presentation looks at the growth rates of BGP and also looks at the level to which deaggregation contributes to this growth.
Slides 8.4 MB |
|
Randy Bush, Internet Initiative Japan | APOPS Video |
The RPKI, Origin Validation, & BGPsecAn overview of BGP security work, from the RPKI, to RPKI-Based Origin Validation, and the future work, BGPsec or AS-Path Validation.
Slides 746.0 KB |
|
Rajeev Meharwal, Renesys Corp | APOPS Video |
The Curious Incident of 7th Nov 2011On 7 November 2011 at 14:13 UTC, large swaths of the Internet became unstable or disappeared entirely for upwards of an hour. The US, Ukraine, Russia and India were some of the most impacted countries, while Level 3, Tata, and Telia were some of the most affected global providers. That day, Juniper issued an advisory that stated some of their routers "may crash upon receipt of very specific and unlikely route prefix install/delete actions, such as a BGP routing update". After we present our analysis of the impact of the event, we also provide our evidence that the ""bad"" update originated from an ISP in India, spreading from there to Tata and Level 3. For completeness, we review similar events where "odd" AS paths or "bad" attributes have tickled bugs in other vendor's products, resulting in similar partial Internet meltdowns.
Slides 1.5 MB |
|
Arnold Nipper, DE-CIX Management GmbH | APOPS Video |
Introduction to PeeringDBPeering is a vital part of the Internet eco system nowadays. Building peering relationships is a time consuming job and keeps peering managers busy. PeeringDB is a tool to make life of peering managers easier and provide a holistic view on peering related data. This presentation gives an introduction to PeeringDB, how to put in data, how to use PeeringDB, gives some statistics and how the next version will look like.
Slides 967.7 KB |
|
Philip Smith, APNIC | APOPS Video |
OSPF to ISIS migrationThis short presentation describes the simple process required to migrate a service provider IGP from OSPF to ISIS. It is based on lab work from my ISP Workshops and migrations I have helped with in the region.
Slides 169.5 KB |
|
Greg Hankins, Brocade | APOPS Video |
Pushing the Limits, A Perspective on Router Architecture ChallengesRapidly growing IPv4/IPv6/VPN routing tables and high-density 10/100 GbE line cards create new challenges in designing a router's packet lookup and forwarding architecture. In this presentation we'll look at an overview of the available component technologies, and what options can be used to continue to meet the increasing router packet processing, lookup capabilities and memory scalability requirements.
Slides 765.6 KB |
|
Cecil Goldstein, Team Cymru, Australia | Security |
Asia Pacific Regional Threat Profile and the Underground Economy - Trends and PredictionsThis presentation will look at the current state of malicious activity and compromises in the Asia Pacific Region. Information will be presented using visualisations and graphs to give a clear comparative view of what is happening in the region and where this is occurring. To provide insight into how this activity is leveraged and facilitated, an overview of the Underground Economy and its operation will also be covered. Finally, as we progress into 2012, some predictions and thoughts about what to expect from the cybercriminal world, will be discussed. Slides available by contacting the presenter at cgoldstein@cymru.com | |
Roland Dobbins, Arbor Networks, Singapore | Security Video |
2011 Worldwide Infrastructure Security Report: The Democratization of DDoSIn this presentation, we will discuss key findings of the 2011 Worldwide Infrastructure Security Report (WISR), the only ISP-focused security survey and report in the industry, to be published in early February 2012. Particular attention will be paid to global trends in distributed denial-of-service (DDoS) attacks and defensive measures, as well as security findings focusing on IPv6, mobile/fixed wireless networks, Internet Data Center (IDC) operations, and the implications of recent shifts in perceived attacker motivations.
The WISR is viewed as an industry bellweather in terms of operational security; APRICOT 2012 will be the first public venue in which the 2011 WISR findings are presented to and discussed by the global operational community.
Slides 11.4 MB |
|
Michael Nezri, PineApp Ltd, Israel | Security Video |
IPv6 Migration and the Battle Against Botnets - service provider networks, IPv6 and the future of outbound spamIn this presentation, we will discuss key findings of the 2011 Worldwide Infrastructure Security Report (WISR), the only ISP-focused security survey and report in the industry, to be published in early February 2012. Particular attention will be paid to global trends in distributed denial-of-service (DDoS) attacks and defensive measures, as well as security findings focusing on IPv6, mobile/fixed wireless networks, Internet Data Center (IDC) operations, and the implications of recent shifts in perceived attacker motivations.
The WISR is viewed as an industry bellweather in terms of operational security; APRICOT 2012 will be the first public venue in which the 2011 WISR findings are presented to and discussed by the global operational community.
Slides 1.2 MB |
|
Edward Lewis, Neustar | DNS Video |
A Look at TLD DNSSEC PracticesUsing on-line data, a survey of how the root zone and TLD operate DNSSEC is presented. Key management parameters such as DNSSEC algorithm, key lengths, key lifetimes are measured, NSEC vs. NSEC3 counts, as well as a look at NSEC3 parameters and how long an operator waits after signing a zone until the DS record appears in the root zone.
Slides 128.9 KB |
|
Richard Lamb, ICANN | DNS Video |
DNSSEC Deployment: Where We AreWith DNSSEC deployment having progressed to the point of no return and serious efforts to make use of the resulting global PKI to expand the benefits of cryptographic security, DNSSEC has the potential to become a critical part of a wide range of applications. However, for DNSSEC to reach its full potential, further and improved support by the entities in the chain of trust from content source to end user must happen. This presentation will describe the current state of DNSSEC deployment and make suggestions on what needs to happen if the Internet is to reap the full benefits from DNSSEC.
Slides 1.8 MB |
|
Paul McKitrick, Domain Name Commission, NZ | DNS Video |
.nz DNSSEC Friendly Status.nz has developed a 'DNSSEC Friendly' status that indicates
that a Registrar meets a certain level of service relative to offering
DNSSEC services in the .nz space. This is to: -Ensure that Registrants who are early adopters of DNSSEC have the best experience possible -Encourage Registrars to offer DNSSEC -Promote a culture of security amongst registrars This presentation is intended to share this idea for promoting the uptake of DNSSEC with Registrars. Slides 245.0 KB |
|
Naoki Mashiko, NTT Communications | Routing Scaling Video |
Living with the ever-growing BGP table : an OCN storyISPs have to cope not only with the enormous traffic grow, but also with the increase in the number of full routes, which might cause unstable network behavior. If the current pace continues, several problems such as RIB/FIB space shortage and longer routing convergence time may arise. | |
Clarence Filsfils, Cisco Systems | Routing Scaling Video |
RCMD: a solution for Routing Convergence Measurement and DiagnosisSignificant improvements in routing convergence have been made over the last 5 years: IGP convergence in a few 100's of msecs, IGP FRR (Loop Free Alternate), BGP FRR (BGP Prefix Independent Convergence), MoFRR (Multicast FRR), MLDP FRR. These have been proven in the lab, under large-scale stress situation. However, once deployed, it is difficult to monitor their effects on a live network. Does the technology work as expected? How much gain has been obtained? Is the routing convergence improving or degrading over time? Is there any issue still unresolved? RCMD is a solution for these problems. RCMD is a lightweight, scalable, always-on monitoring function embedded within each router that helps to measure, collect and diagnose routing convergence. Case studies will be used extensively throughout the tutorial to explain the technology and its application. RCMD will reach ""First Customer Shipment"" in 2012 on all the IOS-XR router platforms. Results from live demo’s will be included. Slides 852.7 KB |
|
Paventhan_Arumugam, ERNET | Routing Scaling Video |
IPv6 research initiatives at ERNET IndiaERNET is the first network in the country to
be IPv6 ready since 2005. In this presentation,
we look at the IPv6 R&D initiatives at ERNET India
funded by DIT in the field of Mobile IPv6 testbed
for mobility management over heterogeneous network and the
6LoWPAN testbed project.
Slides 2.8 MB |
|
Yair Shapira; Hayim Shaul, DiViNetworks | Applications |
Methods for Optimizing Data CapacityIn this talk we present the various methods for optimizing data capacity - transparent caching, CDN, traffic shaping, and video compression. We present a novel method for virtually generating capacity from the cloud, explaining the underlying algorithms and the surprising information-theory basis for traffic redundancy. We will share real network traffic analysis. An ISP applying this methodology may be co-presenting. The audience will learn of the various optimization mechanisms available, their pros and cons, and specifically will learn the details of the novel virtual capacity approach.
Slides 2.2 MB |
|
Serge Radovcic, RIPE NCC | Applications |
RIPE Atlas: An Active Measurements NetworkBegun in 2010, RIPE Atlas embodies the next generation of active Internet measurement tools. It consists of a network of small, easily deployable probes which are designed to perform continuous measurements on reachability. By the end of 2011, 1024 probes were contributing to the aggregate picture of core internet connectivity around the world. The information the Atlas network provides is valuable not only to organizations in the RIPE service region: comprehensive data benefits the entire community by revealing both short-term problems and longer-term inefficiencies in routing infrastructure. User Defined Measurements add an additional dimension of benefit to probe hosts and sponsors by enabling self-defined measurements from any set of RIPE Atlas probes.
Slides 11.5 MB |
|
Randy Bush, Internet Initiative Japan | Disaster |
Impact of the Tohoku Quake & Tsunami as Seen by a Japanese ISPRouting and traffic measurements from within a Japanese ISP, and from a neighbor.
Slides 682.8 KB |
|
Dean Pemberton, Prophecy Networks, NZ | Disaster |
ISP in a suitcase for deployment during a natural disaster Born out of the New Zealand Christchurch Earthquake, this is a project to investigate how possible it is to build a go-anywhere Internet service with resilient power options. This proof of concept system is built in a briefcase form factor and uses 3G, Wifi and Satellite technologies to connect.
Slides 15.2 MB |
|
Kimberly Claffy, caida/ucsd, USA | Disaster |
Extracting Benefit from Harm: Using Malware Pollution to Analyze the Impact of Political and Geophysical Events on the InternetUnsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used for years to study malicious activity on the Internet, including worms, DoS attacks, and scanning address space looking for vulnerabilities to exploit. We show how such traffic can also be used to analyze macroscopic Internet events that are unrelated to malware. We examine two phenomena: country-level censorship of Internet communications described in recent work, and natural disasters (two recent earthquakes). We introduce a new metric of local IBR activity based on the number of unique IP addresses per hour contributing to IBR. The advantage of this metric is that it is not affected by bursts of traffic from a few hosts. Although we have only scratched the surface, we are convinced that IBR traffic is an important building block for comprehensive monitoring, analysis, and possibly even detection of events unrelated to the IBR itself. In particular, IBR offers the opportunity to monitor the impact of events such as natural disasters on network infrastructure, and in particular reveals a view of events that is complementary to many existing measurement platforms based on (BGP) control-plane views or targeted active ICMP probing.
Slides 6.0 MB |
|
Mohan Nanduri, Microsoft | MPLS Video |
MPLS Traffic Engineering with Autobandwidth Experience and Lessons LearnedMPLS Auto-Bandwidth: Overview, Operational Experience and Lessons learned
Slides 212.8 KB |
|
Muhammad Durrani Sajan Liyon, Brocade Communications Inc |
MPLS Video |
Resilient Protocol ApplicationsTechnology plays an essential role in building network resiliency, Technology is available to support flexible and resilient networks, The most critical technology components you should consider when planning for resiliency are data , application, networks, security and end user devices. This presentation will discuss deployment challenges to achieve resiliency at various OSI layer, their advantages and limitations and available technologies to meet the challenges along with various deployment case studies.
Slides 862.1 KB |
|
Nobuhiko Akiyama; Ayumu Yasuda, NTT EAST | MPLS Video |
NTT EAST Recovery Operations at the East Japan EarthquakeOn March 11th, 2011, Japan hit by massive earthquake and tsunami.
NTT-East, which is the largest telecom carrier in northeast Japan which suffered serious damage
from this disaster, has been carrying on recovering their communication facilities
with all their strength, and supporting to revival of Japan.
At this time, NTT-East introduces their knowledge learned from the disaster.
- How to construct the robustness network
- Points of fastest recover from the disater
Hopefully this presentation will help you to make or remake your network against a disaster.
Slides 2.1 MB |
|
Richard A Steenbergen, nLayer Communications, Inc |
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned
Slides 273.8 KB |
||
Louise Flynn | APNIC Services Video Transcript |
APNIC Connect
Slides 18.4 MB Slides 5.2 MB |
|
Bhadrika Magan | APNIC Services Video Transcript |
Public web usability survey
Slides 6.2 MB Slides 9.0 MB |
|
Frank Salanitri | APNIC Services Video Transcript |
Root Server deployment update
Slides 3.6 MB Slides 4.1 MB |
|
Frank Salanitri | APNIC Services Video Transcript |
Abuse contact update
Slides 3.5 MB Slides 4.1 MB |
|
George Kuo | APNIC Services Video Transcript |
MyAPNIC - IPv4 Transfers, DNSSEC, and RPKI
Slides 3.6 MB Slides 4.2 MB |
|
Sanjaya | APNIC Services Video Transcript |
IPv6 pool management
Slides 3.6 MB Slides 4.2 MB |
|
Izumi Okutani, JPNIC | NIR SIG Transcript |
JPNIC UpdateTrends in resource consumption and membership in JP, Notable topics in JP, Major activities in JPNIC: Charging historical resource, IPv4 transfer, IPv6 hands on seminars.
Slides 3.5 MB Slides 3.4 MB |
|
Terence Zhang, CNNIC | NIR SIG Transcript |
CNNIC IPv6 research & promotiom activitiesIPv6 promotion activities on Government Influence and Industy Influence Levels: overview of advisory report from CNNIC about government's role and policy to promote IPv6 transition, OPEN LAB, IPv6 Application Staging Center,Training & Consulting Services. Technology Research: IPv6 address management technology, CISCO LAB.
Slides 1019.0 KB Slides 12.0 MB |
|
Jung Jung Na, KRNIC | NIR SIG Transcript |
KRNIC Update
Slides 1.4 MB |
|
Sheng-Wei Kuo, TWNIC | NIR SIG Transcript |
TWNIC UpdateTWNIC's co-ordination in Taiwan's government announcement to support master external network services in IPv6 by 2013.
Slides 1.5 MB Slides 1.8 MB |
|
Phan Thi Nhung, VNNIC | NIR SIG Transcript |
VNNIC UpdateLatest status about VNNIC NIR: member stats, resources stats, Latest status about the deployment of V6 in Vietnam, The role of VNNIC during the deployment of V6 in Vietnam, Introduce about some upcoming activities about V6 and training in VN that VNNIC plays the role as hosting organization.
Slides 1.2 MB Slides 1.5 MB |
|
Sanjaya, APNIC | NIR SIG Transcript |
APNIC 2012 Members and Stakeholder Survey Planning
Slides 3.0 MB Slides 3.7 MB |
|
Rajesh Chharia, Host | APRICOT Opening Plenary Video |
Welcome Address | |
Philip Smith, APIA Chair | APRICOT Opening Plenary Video |
Welcome Address | |
Maemura Akinori, APNIC EC Chair | APRICOT Opening Plenary Video |
Welcome Address | |
N. Ravi Shanker, NIXI | APRICOT Opening Plenary Video |
Welcome Address | |
Prof. S.V.Raghavan, Scientific Secretary at the Office of Principal Scientific Advisor to Government of India | APRICOT Opening Plenary Video |
Address | |
Sam Pitroda, Advisor to the Prime Minister of India on Public Information Infrastructure & Innovations | APRICOT Opening Plenary Video |
Keynote | |
Fred Baker, Cisco | APRICOT Opening Plenary Video |
Keynote: Scalable Internet ForensicsFred Baker, one of the authors of Cisco's Lawfully Authorized Electronic Surveillance architecture and one of the leaders in the development of Internet technical specifications in the IETF, will discuss effective scalable Internet forensics and the regulatory environment that will most effectively use them.
Slides 3.7 MB |
|
Dr. Govind, NIXI | APRICOT Opening Plenary Video |
Vote of Thanks | |
Masataka Mawatari, Japan Internet Exchange Co.,Ltd. | IPv6 Transition |
464XLAT Experiences (464XLAT: Combination of Stateful and Stateless Translation)This is a presentation about 464XLAT architecture (This is for providing
IPv4 connectivity across IPv6 network by combining existing stateful
protocol translation RFC 6146 in network and existing stateless protocol
translation RFC 6145 at CPE) and introduction of 464XLAT experiences in
Japan Internet Exchange (JPIX). 464XLAT architecture is suitable and reasonable for especially Asia-Pacific region, because it has uniqueness as below. 1. Minimal IPv4 resource requirements 2. No new protocols required 3. Cost-effective transition to IPv6 Most of ISPs in Asia-Pacific region do not have much IPv4 address block enough to assign for all end-users and time to create new protocol for sharing IPv4 address so I would like to introduce 464XLAT architecture and our experiences in this presentation for getting various feedbacks. This 464XLAT architecture works today for service providers that areeager to deploy IPv6 because of IPv4 scarcity. Slides 318.3 KB |
|
Xing Li, CERNET | IPv6 Transition |
Details of APRICOT IVI trial SSID
Slides 1.5 MB |
|
Randy Bush, IIJ | IPv6 Transition |
An IPv4 End of Life Plan: A Shared Vision for IPv6Go to v6, v4 life extension is ill-advised. Encapsulate if you must.
Prefer stateless. NAT only if forced at the point of a gun.
Slides 4.2 MB |
|
Izumi Okutani | BoF |
Network Abuse Handling in CNNIC and JPNIC
Slides 38.0 KB Slides 45.5 KB |
|
Terrence Zhang | BoF |
Network Abuse Handling in CNNIC and JPNIC
Slides 38.0 KB Slides 45.5 KB |
|
Cecil Goldstein | BoF |
Presentation | |
Michael Nezri | BoF |
Presentation
Slides 1.2 MB |
|
Arvind Mathur, Cisco India | IPv6 Conf Video |
Business Drivers for IPv6
Slides 1.6 MB |
|
Brendan Ritchie, DTS | IPv6 Conf Video |
DTS IPv6 Case Study
Slides 4.0 MB |
|
Shigenari Saito, KDDI | IPv6 Conf Video |
IPv6 Deployment of KDDI
Slides 7.0 MB |
|
Sanchita Biswas, France Telecom | IPv6 Conf Video |
IPv6: what else?
Slides 3.8 MB |
|
Tanapon Chandavasu, True Internet | IPv6 Conf Video |
Moderator | |
Gaurab Raj Upadhaya, Limelight Networks | IPv6 Conf Video |
World IPv6 Launch
Slides 430.1 KB |
|
Arturo Servin, LACNIC | IPv6 Conf Video |
IPv6 Initiatives in Latin America and the Caribbean
Slides 1.3 MB |
|
Dean Pemberton, Prophecy Networks | IPv6 Conf Video |
Practical IPv6 for Government Conference
Slides 1.3 MB |
|
Dr. Ren-Hung Hwang, National Chung Cheng University, Taiwan | IPv6 Conf Video |
Taiwan Government's Initiative to Increase IPv6 Deployment IPv6 UP
Slides 6.0 MB |
|
Tanapon Chandavasu, True Internet | IPv6 Conf Video |
Moderator | |
Matthew Moyle-Croft | Peering Forum (1) Video |
Building a Global Peering Footprint from the Outback
Slides 773.1 KB |
|
Willy Sutrisno, Matrix Networks | Peering Forum (1) Video |
Establishing Peering one step at a time
Slides 1.5 MB |
|
Zaid Ali, LinkedIn | Peering Forum (1) Video |
Experience in peering in current world
Slides 1.4 MB |
|
Suchok A, CAT Telecom | Peering Forum (1) Video |
CAT Internet Update
Slides 4.2 MB |
|
Raphael Ho, Equinix | Peering Forum (2) Video |
Route Control at IXPs
Slides 1.7 MB |
|
Gaurab Raj Upadhaya, Limelight | Peering Forum (2) Video |
Using the IRR tools
Slides 154.2 KB |
|
Martin Levy, Hurricane Electric | Peering Forum (2) Video |
Using HE BGP Took Kit | |
Arnold Nipper, DE-CIX | Peering Forum (3) Video |
Interconnecting IXPs: Pros and Cons
Slides 799.4 KB |
|
Katsuyasu Toyama, APIX | Peering Forum (3) Video |
APIX Update
Slides 548.4 KB |
|
Bijal Sanghani, Euro-IX | Peering Forum (3) Video |
Euro-IX Updates
Slides 2.2 MB |
|
Geoff Huston, APNIC | APNIC Plenary Video Transcript |
Today's Mobile Internet
Slides 10.3 MB |
|
Ramesh Chandra, Bharti Airtel Ltd | APNIC Plenary Video Transcript |
IPv6 Adoption for Operators
Slides 1.7 MB |
|
Hon Kit Lam, Tata Communications | APNIC Plenary Video Transcript |
IPv6 deployment including Mobile Platform
Slides 1.8 MB |
|
Andy Linton (Chair) | Policy SIG Video Transcript |
APNIC Policy Development Process
Slides 227.3 KB |
|
Andy Linton (Chair) | Policy SIG Video Transcript |
Review of Action Items
Slides 238.1 KB |
|
Andy Linton (Chair) | Policy SIG Video Transcript |
Proposals Overview
Slides 227.4 KB |
|
Andy Linton (Chair) | Policy SIG Video Transcript |
Community Remote Hubs
Slides 149.2 KB |
|
Xing Li | Policy SIG Video Transcript |
Proposal 099: IPv6 Reservation for Large Networks
Slides 103.3 KB |
|
Owen DeLong | Policy SIG Video Transcript |
Proposal 098: Optimizing IPv6 allocation strategies (simplified)
Slides 67.1 KB |
|
David Woodgate | Policy SIG Video Transcript |
Proposal 101: Removing multihoming requirement for IPv6 portable assignments
Slides 56.7 KB |
|
Dean Pemberton | Policy SIG Video Transcript |
Proposal 102: Sparse allocation guidelines for IPv6 resource allocations
Slides 39.7 KB |
|
Andy Linton (Chair) | Policy SIG Video Transcript |
Chairs' Report
Slides 312.3 KB |
|
Milton Kashiwakura | Lightning Talks |
Lac Regional IPv6 week
Slides 77.4 KB |
|
Vijayakumar Sethuraman | Lightning Talks |
Equinix Subnet
Slides 182.1 KB |
|
Richard Barnes | Lightning Talks |
Where is the IPv6 Network
Slides 2.7 MB |
|
Ayuma Yasuda | Lightning Talks |
DNS Cache Selection
Slides 357.2 KB |
|
Merike Kaeo | Lightning Talks |
Passive DNS
Slides 2.7 MB |
|
Peter Losher | Lightning Talks |
APRICOT DNS
Slides 49.8 KB |
|
Shishio Tsuchiya | Lightning Talks |
Simple Virtual Aggregation
Slides 3.1 MB |
|
Andrew Chi | Lightning Talks |
RPKI
Slides 284.2 KB |
|
Gaurab Raj Upadhaya | Lightning Talks |
"it's a secret" | |
George Michaelson | Lightning Talks |
Chair
Slides 36.1 KB |