Welcome to our first meeting under NetUK
We will give a brief overview of our structure and the active volunteers, tomorrow afternoon we will run a feedback session after lunch where we can have a wider conversation with NetUK1 attendees.
UK Policing has an issue with cyber crime, namely how under reported it is. The average member of the public is happy to report not only successful but also failed attempts at other crime. If for example a suspicious person is walking down the street checking for open windows and doors on houses or trying handles on cars in order to find opportunities for crime, they would quickly be reported...
A short presentation (please plan 10 minutes but tends to take less time and get few if any questions) on changes to the PeeringDB website, API and organisation.
I've attached the slides from the update I gave at the RIPE Meeting a few weeks ago, of course they will be updated with the latest news. This presentation is given around 20 times a year by roughly 5 presenters including me, the...
This presentation describes some recent protocol features for building "IPv6 mostly" access networks, where clients can selectively opt-out of IPv4 dual stack and run IPv6-only, using 464XLAT to communicate with the IPv4 Internet. This gives an exit strategy from dual-stack at the edge, providing visibility of remaining devices which still require IPv4, and reducing strain on RFC1918 address pools.
Internet exchange points are not like your typical connectivity mechanism, while they present themselves as simple layer 2 broadcast domains, almost all exchanges that do significant amounts of traffic have to utilise mechanisms that allow very subtle and hard to discover faults to appear.
I was hired on contract to build an open source system for an internet exchange to help discover...
5 years ago Sky launched a greenfield fixed-line broadband network in Italy; starting from scratch with zero IPv4 addresses, we were forced to implement IPv4 address sharing, for which we selected to use the relatively new IPv4aaS technology called MAP-T.
Now 5 years later we've taken the learnings from Italy and are ready to apply them to our brownfield network in the UK.
This talk will...
The BBC runs its own in-house media CDN called BIDI which serves a large proportion of BBC iPlayer's video traffic. At the heart of this is a distributed fleet of caching servers dotted around the UK internet. Historically these have been based on x86_64 CPUs where peak capacities have plateaued at around 70 GBit/s. With 200 and 400 GBit/s links and NICs becoming increasingly common, we have...
At Cisco ThousandEyes, we are currently deploying a real-time BGP monitoring infrastructure developed originally by Code BGP, a company Cisco acquired in 2023. In this presentation, we discuss the motivations for developing our own BGP monitoring infrastructure, outline the challenges encountered during the process, and explain the solutions implemented to address those challenges.
The Border Gateway Protocol (BGP) serves as the backbone of the internet, yet it's not without its security concerns. This talk introduces the Resource Public Key Infrastructure (RPKI), a solution addressing these vulnerabilities. We'll delve into RPKI's basics, its workings, and its adoption rates within the RIPE NCC area. By also spotlighting statistics from North America, we'll offer a...
An update from the NetUK Management Committee.
The UK has a long nuclear history stretching back to the late 1940s, when the world was a more innocent place and the worst we had to worry about was Soviet spies. Since then, there has been a proliferation of threats to nuclear safety and security, as well as the introduction of programmable electronics and computers into nuclear processes. Traditionally, the management of risks arising from...
This is the feedback session for you to tell NetUK what worked for you at NetUK1 and what you would like to see in the future.
It will be led by members of the PC & the Management Committee.
Kriten is an open-source project which allows network engineers to publish their scripts, playbooks and programs. Consumers can run the code by making a REST API call. The URL and API code is managed by Kriten, so the developer can easily make code available and concentrate on the business logic.
Authentication and authorisation are built in, and consumers have no access to the source code or...
Building and managing Infrastructure has always been driven by architecture and design but surprisingly these concepts aren't easy to integrate into the toolset that makes it possible to manage networks and infrastructure in general with automation.
In this presentation we'll discuss how to manage a network with a Design first approach, based on Infrahub a new open-source Infrastructure...
Whois has been an essential part of the network engineer's toolkit since the 1980s, as it provides access to information about domain names, IP address allocations and autonomous system numbers.
However, from January 2025, gTLD registries and registrars will no longer be required to operate a port-43 whois service. This may have an impact on anyone or anything that depends on Whois.
This...
This presentation discusses blackhole detection in packet networks. Such blackholes are typically difficult to detect, and even working out on which router the blackhole is occurring can be difficult. We discuss two methods for detecting blackholes: indirect detection and direct detection. We describe a method for a router to report packet drops due to blackholes via IPFIX, including the...