IETF 90 - Bits-N-Bites

Toronto, ON, Canada

Fairmont Royal York
Date: July 24, 2014
Time: 18:45 - 21:00
Location: Concert Hall

Join us for Bits-n-Bites at IETF 90! Be entered to win two WeMo Insights and a Jawbone UP24 by collecting six sponsor stamps on your IETF 90 BnB Passport. The raffle will take place at the end of Bits-n-Bites and you must be present to win!

Sponsors will be holding in-depth ten minute presentations in Salon B during the Bits-n-Bites Event.

Presentation Schedule:

19:00 - Afilias
19:15 - SANA
19:30 - NetDef
19:45 - FIT IoT-LAB
20:00 - Alcatel-Lucent/iMINDS
20:15 - Comcast
20:30 - A10
20:45 - Cisco


Demonstration Description

A10 Networks Logo A10 will demonstrate several DDoS Mitigation strategies using the Threat Protection System (TPS) appliance. Threat vectors like TCP syn flood, DNS amplification attacks, and NTP amplification attacks can saturate service provider links and make services like Web based applications unavailable for legitimate users. In its role as a mitigation device against these threat vectors TPS appliance will scrub the attack traffic and send only the legitimate traffic to the services that subscribers are trying to reach. During the event A10 will demonstrate various counter measures and mitigation strategies using a high performance DDoS mitigation appliance.
Afilias Logo Given that less than six percent of the world's population speaks English, the arrival of Internationalized Domain Names (IDNs) has begun to open the Internet as a truly global medium. Alongside IDNs, IDN email will grow in prominence. To ensure you’re up to date on the latest IDN developments, it’s important that you see Afilias demonstrate its IDN EMAIL GATEWAY, which is an implementation of RFCs from the Email Address Internalization (EAI) Working Group, and bridges ASCII and IDN emails.

Alcatel-Lucent Logo


In Information-centric networking (ICN), name-based routing of data requests towards content hosts leads to routing table size increase by orders of magnitude (from ~5.10^5 to at least 2.5 10^8). Existing routing protocols perform on locator space without associated distance metric; thus, preventing distance computation and selective localization when the same data object is available at multiple locations. We explore alternatives to address these fundamental challenges. In particular, by associating to data objects content locators taken out of a metric space, these locators can then be processed by both localization and navigation functions of intermediate nodes or routers. We show experimentally on the iMinds iLab.t testbed the potential functional advantages and performance gains (in terms of bandwidth x delay product) of this information routing model. We also compare it with information-centric networking based on BGP with IP geo-location.

This work is funded by the EULER project (Grant 258307), part of the Future Internet Research and Experimentation (FIRE) initiative of the European Commission (EC) Seventh Framework Programme (FP7).

Cira Logo  
Cisco Logo Cisco will demonstrate IPv6 Segment Routing interoperability during Bits-n-Bytes, with implementations from UCL, Cisco, and Comcast. The demonstrations include IPv6 Segment Routing-based traffic engineering by way of a centralized OpenDaylight controller, a customized VLC video content acquisition methodology that leverages IPv6 Segment Routing to provide a content search path across a hierarchical caching system, and an end-to-end interoperability test that includes SRv6 capable linux kernels developed by The Université catholique de Louvain (UCL), Cisco¹s Vector Packet Processing engine, and Comcast's IPv6 Segment Routing implementation.
Comcast Logo Comcast will be demonstrating a home grown implementation of IPv6 Segment Routing running on hardware provided by Arista Networks. Comcast’s IPv6 Segment Routing implementation will be demonstrated in conjunction with other IPv6 Segment Routing and classic IPv6 implementations to illustrate interoperability. Running IPv6 Segment Routing in conjunction with classic implementations highlights a key property of any new technology, incremental deployment possibilities. This demonstration lays the foundation for future, more advanced demonstrations and implementations in particular how an IPv6 Segment Routing enabled infrastructure is an enabler for Service Function Chaining and how the same can eventually be extended into advanced home networks. Additionally, Comcast hopes to introduce a view of of the role that SDN and virtualization play in the IPv6 Segment Routing and SFC spaces.

Finally, Comcast will expands it demonstrations around advanced cable home networks by illustrating how cable technology and IETF specifications interoperate and how cable technology continues to enable advancements in and to the home. The IPv6 only cable broadband customer’s premises will be amongst the many topics and technologies demonstrated by Comcast during Bits-n-Bytes at IETF 90.

IT-IoT Lab FIT IoT-LAB is a very large scale open testbed for conducting remote experiments on 2700+ IoT nodes on several sites.

We will show steps of a typical remote IoT experiment (such as with RPL or 6TiSCH) and explain technical/access/registration details.

NetDef Logo

NetDef will be showcasing proof-of-concept software showing the following:

  • HNCP configuration
  • IS-IS protocol providing v6 and v4 routing
  • src / dest routing capabilities
  • on an OpenWRT and Quagga code base
RIOT Logo The RIOT operating system will be powering several nodes based on low-power microcontrollers and radio transceivers. Some of these devices will be connected using IETF and IRTF protocols, such as 6TiSCH and CCN.
SANA Logo SANA will demonstrate a proof-of-concept of the applicability of IETF's ForCES framework for both NFV management and SDN control. The programattic abstractions provided by the ForCES LFB model will be utilized to describe VNFs, services and the infrastructure definition in a clear, formal and concise approach. The ForCES protocol will illustrate SDN control and NFV management of all modelled elements.

This PoC is further illustrated in: