in conjunction with APRICOT 2012

Hide all | Show all

Program presentations


Presenter Session Presentation Title
Jeff Apcar, Cisco Systems Tutorial
IPv6 Technical IntroductionIPv6 technical introduction aims to give participants a quickstart understanding of the basics of IPv6 such addressing formats and neighbour discovery protocols. It provides a solid foundation for further learning of IPv6 technologies.
Jeff Apcar, Cisco Systems Tutorial
IP Routing in Smart Object Networks and the Internet of ThingsThe Internet of Things (IoT) is a pervasive and ubiquitous network which enables the monitoring and control of our physical environment by collecting, processing, and analyzing the data generated by Smart-Objects. A Smart-Object (SO) is a physical object (eg., light bulb, smart power meters, garden sprinklers) with an embedded sensor (or actuator) which is able to communicate. Smart Objects usually operate in a highly constrained environment in terms of physical size, available memory, CPU power and battery life in addition to communicating over wireless low power lossy networks. This environment throws up quite a number of routing challenges that traditional routing protocols cannot satisfy. This presentation covers enhancements and innovations that were necessary to allow Smart Objects to route information over IPv6 in the Internet Of Things. In particular, carrying IPv6 over low power networks (6LowPAN) and the RPL the new routing protocol for Smart Objects will be discussed.
Raphael Ho, Equinix Hong Kong Conference
Routing Control at Peering PointsThis presentation introduces the routing control capabilities on multilateral peering route servers at certain peering points via BGP community strings.
1) Rohit Bothra 2) Dilip Sai Chandar, CISCO Systems Tutorial
IPv6 Security Threats & MitigationsIPv6 has finally started to take off as a result of: • Exhaustion of the IANA IPv4 free pool • Awareness activities such as the “World IPv6 Day” • Imminent exhaustion of the free pool of IPv4 addresses at the different RIRs As we are heading towards more and more IPv6 based network deployments, it is extremely critical to understand the security threats it bring with it. A lot of myths have been created around IPv6 security: • Security is a key component of the protocol • Change from network-centric to host-centric paradigm • Increased/compulsory use of IPsec • Etc etc etc These myths have contributed to a general misunderstanding of the security threats of IPv6, thus negatively affecting the emerging (or existing) IPv6 networks. This presentation separates fudge from fact, and offers a more realistic view of “IPv6 security threats” and how to mitigate those vulnerabilities. It is meant to Influence the way in which we think about IPv6 security (and IPv6 in general).
Willy Sutrisno, Matrix Networks Pte Ltd, Indonesia Tutorial
Establishing peering one small step at a timeAs ISP starting to expand their network outside their country, they will start with setting up nodes in foreign country, looking for cheaper IP transit alternative and setting up peering points. In this slides we are going to share the experience that we had starting as an ISP in Indonesia, becoming a sub sea cable operator and slowly expanding the international network.
Arnold Nipper, DE-CIX Management GmbH Conference
Interconnecting IXPs: Pros and ConsInternet Exchange Points (IXP) are a vital part of the Internet eco system nowadays. This presentation discusses the pros and cons of interconnecting IXPs. Before discussing interconnections we have to have a good understanding and definition what an IXP is. Next we see how technically IXP may be interconnected. Then Pros and Cons are discussed and examples of interconnections are given.
Muhibbul Muktadir TANIM, Augere Wireless Broadband Bangladesh [Qubee], Bangladesh Tutorial
Wimax & WifiWimax
  • Overview
  • Functional Entities
  • IEEE Standard & Improved Features
  • Layers
  • Principle
  • Devices
  • Network Reference Model
  • Technical Features
  • Mechanism / How does it work
  • Architecture
  • Security Enhancements
  • Applications

WiFi
  • Overview
  • IEEE Standard
  • 2.4 GHz Channel Distribution
  • Security Standard
  • Network Architecture
  • How does it work
  • Elements
  • Security Enhancements
  • WiMAX - Wi-Fi Internetworking
  • WiMAX – Wi-Fi Hotspot

Discussion
  • Comparison between WiMAX & Wi-Fi
  • Deployment & Implementation Experience
  • Operational Challenge
Cecil Goldstein, Team Cymru, Australia Tutorial
Network Forensics - Understanding Botnets and Botnet OperationUnderstanding how malicious activity occurs on the Internet is the key to understanding how to identify and counter this activity. This tutorial will focus on one of the major elements involved in enabling network malicious activity - botnets The tutorial will discuss and demonstrate how botnets are created, controlled and how they can be used. Botnet activity will also be observed through traffic captures.
Srinivas Chendi, APNIC Newcomers' Orientation
Orientation to APNIC and APRICOT ConferenceThis session is by invitation only. The Newcomers' Orientation is an introduction to the APNIC/APRICOT/SANOG Conferences for new or recent attendees.
Champika Wijayatunga, APNIC Tutorial
Internet Resource ManagementThis training introduces, highlights, and explains the key essentials of Internet resource management. It focuses on understanding the structures, processes, procedures, and policies involved in requesting, allocating, and managing Internet addresses (IPv4 and IPv6) and Autonomous System (AS) numbers.
Champika Wijayatunga, APNIC Tutorial
Internet Routing RegistryThe tutorial covers the importance and benefits of the IRR to Internet operations. Participants will be introduced to the tools used to interact with the IRR and learn how to create, register, and query routing objects.
Aftab Siddiqui, Cybernet BoF
Network AbuseManaging network abuse incidents, across organizations and by economy or region.
Izumi Okutani, JPNIC Women in ICT
Balancing and coordination of diversities
Dr. Rekha Jain, Indian Institute of Management Women in ICT
Opportunities in Telecom and Education sectors
Anurag Verma, Tulip Telecom Plenary
IPv6 readiness at Tulip
Ramesh Chandra, Bharti Airtel Plenary
Airtel IPv6 readiness
Geoff Huston, APNIC Plenary
IPv6 for Internet Mobility
William Norton, DrPeering International, USA Tutorial
Internet Peering Workshop

The Internet Peering Workshop is a proposed one-day workshop for Internet Service Providers, Internet Exchange Point Operators, and Content Providers interested in getting into peering in the Internet Peering Ecosystem

We start with the industry definitions and the components of a base peering ecosystem. These definitions are then exercised in the Peering Simulation Game where the participants engage in peering negotiations designed to highlight the power dynamics observed in every peering ecosystem.

Next we move on to explore the math behind peering, the ""When does peering makes sense?"" question. The tradeoffs associated with peering publicly and privately, and with content or access are discussed.

With this foundation, we enlist peers from India and the Asia Pacific region to present characteristics of their ecosystem so we can learn from each other.

We finish up the workshop by highlighting the ""tricks of the trade"" that ISPs around the world have used to obtain peering where they otherwise would not have been able to obtain peering. For the IXP operators, we share the ""tricks of the trade"" that IXPs have used to build that initial critical mass, grow the critical mass and compete with the incumbent IXP.

This workshop is based on a decade of work in the field. The presentations have been refined over 100 presentations.

Andy Davidson, LONAP / Hurricane Electric, UK Tutorial
Route Servers and IXPs : A Tutorial for APIXThis tutorial covers the operations of Internet Exchange Points, and special focus on Route Servers at Internet Exchange Points using OpenBGP and BIRD. The tutorial covers installation as well as well established best practices in IXPs, specially in Europe. We cover standard communities used by Route Servers at IXP. We also cover the latest discussion on route servers happening in IXPs with the use of Quagga. Full configuration examples are provided and full notes are provided to organisations who wish to learn more about IX operations.
Srinivas (Sunny) Chendi AMM
Video
Welcome
Maemura Akinori AMM
Video
Introduction
Paul Wilson AMM
Video
APNIC EC election procedures Slides Slides 222.7 KB
Election Chair AMM
Video
Speeches from candidates, EC election opens
Paul Wilson AMM
Video
Introduction Slides Slides 746.5 KB
Sanjaya AMM
Video
Delivering Value Slides Slides 1.2 MB
German Valdez AMM
Video
Collaborating and Communicating Slides Slides 521.6 KB
Philip Smith AMM
Video
Supporting Internet Development Slides Slides 793.1 KB
Richard Brown AMM
Video
Corporate Support Slides Slides 405.2 KB
Maemura Akinori AMM
Video
APNIC EC report Slides
James Spenceley AMM
Video
APNIC EC Treasurer's Report Slides Slides 1.2 MB
Andy Linton AMM
Video
Policy SIG report Slides Slides 156.5 KB
Izumi Okutani AMM
Video
NIR SIG report Slides Slides 40.4 KB
Election Chair AMM
Video
APNIC EC voting reminder
Election Chair AMM
Video
APNIC EC voting close
Che-Hoo Cheng AMM
Video
APIX report Slides Slides 1.1 MB
Phuong Anh Ta AMM
Video
APNIC 34 Slides Slides 16.9 MB
Election Chair AMM
Video
APNIC EC election results
Paul Wilson AMM
Video
Vote of thanks Slides Slides 11.7 MB
Louise Flynn AMM
Video
ISIF Presentations
Axel Pawlik, RIPE NCC Global Reports
Video Transcript
NRO EC report Slides Slides 605.8 KB
Sanjaya, APNIC Global Reports
Video Transcript
NRO Statistics report Slides Slides 5.9 MB
Tomohiro Fujisaki, ASO AC Global Reports
Video Transcript
ASO AC report Slides
Elise Gerich, ICANN Global Reports
Video Transcript
IANA Department Update Slides Slides 3.8 MB
Adiel A. Akplogan, AfriNIC Global Reports
Video Transcript
AfriNIC report Slides
Einar Bohlin, ARIN Global Reports
Video Transcript
ARIN report Slides
Arturo Servin Global Reports
Video Transcript
LACNIC report Slides Slides 570.0 KB
Axel Pawlik, RIPE NCC Global Reports
Video Transcript
RIPE NCC report Slides Slides 1.5 MB
Nishal Goburdhan, Keynote APRICOT Closing Plenary
Video
Around the world in 590msNishal speaks about their experiences at Internet Solutions, building from a small network that started out at the bottom of Africa, to a international network infrastructure that spanned the globe, during a time of extreme adverse regulation. He'll share lessons hard learned and some pragmatic advice for operators in developing countries. Slides
Rajesh Chharia, Host APRICOT Closing Plenary
Video
Closing Address
Philip Smith, APIA Chair APRICOT Closing Plenary
Video
Vote of Thanks
Nandan Nilekano, Unique Identification Authority of India (UIDAI)
Video
Keynote
Madhusudhan M, TATA Communications
Video
Speech
Maemura Akinori, APNIC EC
Video
Closing Address
N. Ravi Shanker, DIT
Video
Closing Address
Choon Sai LIM, SGNIC
Video
Welcome to APRICOT 2013
Geoff Huston, APNIC APOPS
Video
BGP and the DFZThis presentation looks at the growth rates of BGP and also looks at the level to which deaggregation contributes to this growth. Slides
Randy Bush, Internet Initiative Japan APOPS
Video
The RPKI, Origin Validation, & BGPsecAn overview of BGP security work, from the RPKI, to RPKI-Based Origin Validation, and the future work, BGPsec or AS-Path Validation. Slides
Rajeev Meharwal, Renesys Corp APOPS
Video
The Curious Incident of 7th Nov 2011On 7 November 2011 at 14:13 UTC, large swaths of the Internet became unstable or disappeared entirely for upwards of an hour. The US, Ukraine, Russia and India were some of the most impacted countries, while Level 3, Tata, and Telia were some of the most affected global providers. That day, Juniper issued an advisory that stated some of their routers "may crash upon receipt of very specific and unlikely route prefix install/delete actions, such as a BGP routing update". After we present our analysis of the impact of the event, we also provide our evidence that the ""bad"" update originated from an ISP in India, spreading from there to Tata and Level 3. For completeness, we review similar events where "odd" AS paths or "bad" attributes have tickled bugs in other vendor's products, resulting in similar partial Internet meltdowns. Slides
Arnold Nipper, DE-CIX Management GmbH APOPS
Video
Introduction to PeeringDBPeering is a vital part of the Internet eco system nowadays. Building peering relationships is a time consuming job and keeps peering managers busy. PeeringDB is a tool to make life of peering managers easier and provide a holistic view on peering related data. This presentation gives an introduction to PeeringDB, how to put in data, how to use PeeringDB, gives some statistics and how the next version will look like. Slides
Philip Smith, APNIC APOPS
Video
OSPF to ISIS migrationThis short presentation describes the simple process required to migrate a service provider IGP from OSPF to ISIS. It is based on lab work from my ISP Workshops and migrations I have helped with in the region. Slides
Greg Hankins, Brocade APOPS
Video
Pushing the Limits, A Perspective on Router Architecture ChallengesRapidly growing IPv4/IPv6/VPN routing tables and high-density 10/100 GbE line cards create new challenges in designing a router's packet lookup and forwarding architecture. In this presentation we'll look at an overview of the available component technologies, and what options can be used to continue to meet the increasing router packet processing, lookup capabilities and memory scalability requirements. Slides
Cecil Goldstein, Team Cymru, Australia Security
Asia Pacific Regional Threat Profile and the Underground Economy - Trends and PredictionsThis presentation will look at the current state of malicious activity and compromises in the Asia Pacific Region. Information will be presented using visualisations and graphs to give a clear comparative view of what is happening in the region and where this is occurring. To provide insight into how this activity is leveraged and facilitated, an overview of the Underground Economy and its operation will also be covered. Finally, as we progress into 2012, some predictions and thoughts about what to expect from the cybercriminal world, will be discussed. Slides available by contacting the presenter at cgoldstein@cymru.com
Roland Dobbins, Arbor Networks, Singapore Security
Video
2011 Worldwide Infrastructure Security Report: The Democratization of DDoSIn this presentation, we will discuss key findings of the 2011 Worldwide Infrastructure Security Report (WISR), the only ISP-focused security survey and report in the industry, to be published in early February 2012. Particular attention will be paid to global trends in distributed denial-of-service (DDoS) attacks and defensive measures, as well as security findings focusing on IPv6, mobile/fixed wireless networks, Internet Data Center (IDC) operations, and the implications of recent shifts in perceived attacker motivations. The WISR is viewed as an industry bellweather in terms of operational security; APRICOT 2012 will be the first public venue in which the 2011 WISR findings are presented to and discussed by the global operational community. Slides
Michael Nezri, PineApp Ltd, Israel Security
Video
IPv6 Migration and the Battle Against Botnets - service provider networks, IPv6 and the future of outbound spamIn this presentation, we will discuss key findings of the 2011 Worldwide Infrastructure Security Report (WISR), the only ISP-focused security survey and report in the industry, to be published in early February 2012. Particular attention will be paid to global trends in distributed denial-of-service (DDoS) attacks and defensive measures, as well as security findings focusing on IPv6, mobile/fixed wireless networks, Internet Data Center (IDC) operations, and the implications of recent shifts in perceived attacker motivations. The WISR is viewed as an industry bellweather in terms of operational security; APRICOT 2012 will be the first public venue in which the 2011 WISR findings are presented to and discussed by the global operational community. Slides
Edward Lewis, Neustar DNS
Video
A Look at TLD DNSSEC PracticesUsing on-line data, a survey of how the root zone and TLD operate DNSSEC is presented. Key management parameters such as DNSSEC algorithm, key lengths, key lifetimes are measured, NSEC vs. NSEC3 counts, as well as a look at NSEC3 parameters and how long an operator waits after signing a zone until the DS record appears in the root zone. Slides
Richard Lamb, ICANN DNS
Video
DNSSEC Deployment: Where We AreWith DNSSEC deployment having progressed to the point of no return and serious efforts to make use of the resulting global PKI to expand the benefits of cryptographic security, DNSSEC has the potential to become a critical part of a wide range of applications. However, for DNSSEC to reach its full potential, further and improved support by the entities in the chain of trust from content source to end user must happen. This presentation will describe the current state of DNSSEC deployment and make suggestions on what needs to happen if the Internet is to reap the full benefits from DNSSEC. Slides
Paul McKitrick, Domain Name Commission, NZ DNS
Video
.nz DNSSEC Friendly Status.nz has developed a 'DNSSEC Friendly' status that indicates that a Registrar meets a certain level of service relative to offering DNSSEC services in the .nz space.

This is to:
-Ensure that Registrants who are early adopters of DNSSEC have the best experience possible
-Encourage Registrars to offer DNSSEC
-Promote a culture of security amongst registrars


This presentation is intended to share this idea for promoting the uptake of DNSSEC with Registrars.
Slides
Naoki Mashiko, NTT Communications Routing Scaling
Video
Living with the ever-growing BGP table : an OCN storyISPs have to cope not only with the enormous traffic grow, but also with the increase in the number of full routes, which might cause unstable network behavior. If the current pace continues, several problems such as RIB/FIB space shortage and longer routing convergence time may arise.
Clarence Filsfils, Cisco Systems Routing Scaling
Video
RCMD: a solution for Routing Convergence Measurement and DiagnosisSignificant improvements in routing convergence have been made over the last 5 years: IGP convergence in a few 100's of msecs, IGP FRR (Loop Free Alternate), BGP FRR (BGP Prefix Independent Convergence), MoFRR (Multicast FRR), MLDP FRR. These have been proven in the lab, under large-scale stress situation.

However, once deployed, it is difficult to monitor their effects on a live network. Does the technology work as expected? How much gain has been obtained? Is the routing convergence improving or degrading over time? Is there any issue still unresolved? RCMD is a solution for these problems.

RCMD is a lightweight, scalable, always-on monitoring function embedded within each router that helps to measure, collect and diagnose routing convergence. Case studies will be used extensively throughout the tutorial to explain the technology and its application. RCMD will reach ""First Customer Shipment"" in 2012 on all the IOS-XR router platforms. Results from live demo’s will be included.
Slides
Paventhan_Arumugam, ERNET Routing Scaling
Video
IPv6 research initiatives at ERNET IndiaERNET is the first network in the country to be IPv6 ready since 2005. In this presentation, we look at the IPv6 R&D initiatives at ERNET India funded by DIT in the field of Mobile IPv6 testbed for mobility management over heterogeneous network and the 6LoWPAN testbed project. Slides
Yair Shapira; Hayim Shaul, DiViNetworks Applications
Methods for Optimizing Data CapacityIn this talk we present the various methods for optimizing data capacity - transparent caching, CDN, traffic shaping, and video compression. We present a novel method for virtually generating capacity from the cloud, explaining the underlying algorithms and the surprising information-theory basis for traffic redundancy. We will share real network traffic analysis. An ISP applying this methodology may be co-presenting. The audience will learn of the various optimization mechanisms available, their pros and cons, and specifically will learn the details of the novel virtual capacity approach. Slides
Serge Radovcic, RIPE NCC Applications
RIPE Atlas: An Active Measurements NetworkBegun in 2010, RIPE Atlas embodies the next generation of active Internet measurement tools. It consists of a network of small, easily deployable probes which are designed to perform continuous measurements on reachability. By the end of 2011, 1024 probes were contributing to the aggregate picture of core internet connectivity around the world. The information the Atlas network provides is valuable not only to organizations in the RIPE service region: comprehensive data benefits the entire community by revealing both short-term problems and longer-term inefficiencies in routing infrastructure. User Defined Measurements add an additional dimension of benefit to probe hosts and sponsors by enabling self-defined measurements from any set of RIPE Atlas probes. Slides
Randy Bush, Internet Initiative Japan Disaster
Impact of the Tohoku Quake & Tsunami as Seen by a Japanese ISPRouting and traffic measurements from within a Japanese ISP, and from a neighbor. Slides
Dean Pemberton, Prophecy Networks, NZ Disaster
ISP in a suitcase for deployment during a natural disaster Born out of the New Zealand Christchurch Earthquake, this is a project to investigate how possible it is to build a go-anywhere Internet service with resilient power options. This proof of concept system is built in a briefcase form factor and uses 3G, Wifi and Satellite technologies to connect. Slides
Kimberly Claffy, caida/ucsd, USA Disaster
Extracting Benefit from Harm: Using Malware Pollution to Analyze the Impact of Political and Geophysical Events on the InternetUnsolicited one-way Internet traffic, also called Internet background radiation (IBR), has been used for years to study malicious activity on the Internet, including worms, DoS attacks, and scanning address space looking for vulnerabilities to exploit. We show how such traffic can also be used to analyze macroscopic Internet events that are unrelated to malware. We examine two phenomena: country-level censorship of Internet communications described in recent work, and natural disasters (two recent earthquakes). We introduce a new metric of local IBR activity based on the number of unique IP addresses per hour contributing to IBR. The advantage of this metric is that it is not affected by bursts of traffic from a few hosts. Although we have only scratched the surface, we are convinced that IBR traffic is an important building block for comprehensive monitoring, analysis, and possibly even detection of events unrelated to the IBR itself. In particular, IBR offers the opportunity to monitor the impact of events such as natural disasters on network infrastructure, and in particular reveals a view of events that is complementary to many existing measurement platforms based on (BGP) control-plane views or targeted active ICMP probing. Slides
Mohan Nanduri, Microsoft MPLS
Video
MPLS Traffic Engineering with Autobandwidth Experience and Lessons LearnedMPLS Auto-Bandwidth: Overview, Operational Experience and Lessons learned Slides
Muhammad Durrani
Sajan Liyon, Brocade Communications Inc
MPLS
Video
Resilient Protocol ApplicationsTechnology plays an essential role in building network resiliency, Technology is available to support flexible and resilient networks, The most critical technology components you should consider when planning for resiliency are data , application, networks, security and end user devices. This presentation will discuss deployment challenges to achieve resiliency at various OSI layer, their advantages and limitations and available technologies to meet the challenges along with various deployment case studies. Slides
Nobuhiko Akiyama; Ayumu Yasuda, NTT EAST MPLS
Video
NTT EAST Recovery Operations at the East Japan EarthquakeOn March 11th, 2011, Japan hit by massive earthquake and tsunami. NTT-East, which is the largest telecom carrier in northeast Japan which suffered serious damage from this disaster, has been carrying on recovering their communication facilities with all their strength, and supporting to revival of Japan. At this time, NTT-East introduces their knowledge learned from the disaster. - How to construct the robustness network - Points of fastest recover from the disater Hopefully this presentation will help you to make or remake your network against a disaster. Slides
Richard A Steenbergen, nLayer Communications, Inc
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Slides
Louise Flynn APNIC Services
Video Transcript
APNIC Connect Slides Slides 5.2 MB
Bhadrika Magan APNIC Services
Video Transcript
Public web usability survey Slides Slides 9.0 MB
Frank Salanitri APNIC Services
Video Transcript
Root Server deployment update Slides Slides 4.1 MB
Frank Salanitri APNIC Services
Video Transcript
Abuse contact update Slides Slides 4.1 MB
George Kuo APNIC Services
Video Transcript
MyAPNIC - IPv4 Transfers, DNSSEC, and RPKI Slides Slides 4.2 MB
Sanjaya APNIC Services
Video Transcript
IPv6 pool management Slides Slides 4.2 MB
Izumi Okutani, JPNIC NIR SIG
Transcript
JPNIC UpdateTrends in resource consumption and membership in JP, Notable topics in JP, Major activities in JPNIC: Charging historical resource, IPv4 transfer, IPv6 hands on seminars. Slides Slides 3.4 MB
Terence Zhang, CNNIC NIR SIG
Transcript
CNNIC IPv6 research & promotiom activitiesIPv6 promotion activities on Government Influence and Industy Influence Levels: overview of advisory report from CNNIC about government's role and policy to promote IPv6 transition, OPEN LAB, IPv6 Application Staging Center,Training & Consulting Services. Technology Research: IPv6 address management technology, CISCO LAB. Slides Slides 12.0 MB
Jung Jung Na, KRNIC NIR SIG
Transcript
KRNIC Update Slides
Sheng-Wei Kuo, TWNIC NIR SIG
Transcript
TWNIC UpdateTWNIC's co-ordination in Taiwan's government announcement to support master external network services in IPv6 by 2013. Slides Slides 1.8 MB
Phan Thi Nhung, VNNIC NIR SIG
Transcript
VNNIC UpdateLatest status about VNNIC NIR: member stats, resources stats, Latest status about the deployment of V6 in Viet Nam, The role of VNNIC during the deployment of V6 in Viet Nam, Introduce about some upcoming activities about V6 and training in VN that VNNIC plays the role as hosting organization. Slides Slides 1.5 MB
Sanjaya, APNIC NIR SIG
Transcript
APNIC 2012 Members and Stakeholder Survey Planning Slides Slides 3.7 MB
Rajesh Chharia, Host APRICOT Opening Plenary
Video
Welcome Address
Philip Smith, APIA Chair APRICOT Opening Plenary
Video
Welcome Address
Maemura Akinori, APNIC EC Chair APRICOT Opening Plenary
Video
Welcome Address
N. Ravi Shanker, NIXI APRICOT Opening Plenary
Video
Welcome Address
Prof. S.V.Raghavan, Scientific Secretary at the Office of Principal Scientific Advisor to Government of India APRICOT Opening Plenary
Video
Address
Sam Pitroda, Advisor to the Prime Minister of India on Public Information Infrastructure & Innovations APRICOT Opening Plenary
Video
Keynote
Fred Baker, Cisco APRICOT Opening Plenary
Video
Keynote: Scalable Internet ForensicsFred Baker, one of the authors of Cisco's Lawfully Authorized Electronic Surveillance architecture and one of the leaders in the development of Internet technical specifications in the IETF, will discuss effective scalable Internet forensics and the regulatory environment that will most effectively use them. Slides
Dr. Govind, NIXI APRICOT Opening Plenary
Video
Vote of Thanks
Masataka Mawatari, Japan Internet Exchange Co.,Ltd. IPv6 Transition
464XLAT Experiences (464XLAT: Combination of Stateful and Stateless Translation)This is a presentation about 464XLAT architecture (This is for providing IPv4 connectivity across IPv6 network by combining existing stateful protocol translation RFC 6146 in network and existing stateless protocol translation RFC 6145 at CPE) and introduction of 464XLAT experiences in Japan Internet Exchange (JPIX).

464XLAT architecture is suitable and reasonable for especially Asia-Pacific region, because it has uniqueness as below.

1. Minimal IPv4 resource requirements
2. No new protocols required
3. Cost-effective transition to IPv6

Most of ISPs in Asia-Pacific region do not have much IPv4 address block enough to assign for all end-users and time to create new protocol for sharing IPv4 address so I would like to introduce 464XLAT architecture and our experiences in this presentation for getting various feedbacks.

This 464XLAT architecture works today for service providers that areeager to deploy IPv6 because of IPv4 scarcity.
Slides
Xing Li, CERNET IPv6 Transition
Details of APRICOT IVI trial SSID Slides
Randy Bush, IIJ IPv6 Transition
An IPv4 End of Life Plan: A Shared Vision for IPv6Go to v6, v4 life extension is ill-advised. Encapsulate if you must. Prefer stateless. NAT only if forced at the point of a gun. Slides
Izumi Okutani BoF
Network Abuse Handling in CNNIC and JPNIC Slides Slides 45.5 KB
Terrence Zhang BoF
Network Abuse Handling in CNNIC and JPNIC Slides Slides 45.5 KB
Cecil Goldstein BoF
Presentation
Michael Nezri BoF
Presentation Slides
Arvind Mathur, Cisco India IPv6 Conf
Video
Business Drivers for IPv6 Slides
Brendan Ritchie, DTS IPv6 Conf
Video
DTS IPv6 Case Study Slides
Shigenari Saito, KDDI IPv6 Conf
Video
IPv6 Deployment of KDDI Slides
Sanchita Biswas, France Telecom IPv6 Conf
Video
IPv6: what else? Slides
Tanapon Chandavasu, True Internet IPv6 Conf
Video
Moderator
Gaurab Raj Upadhaya, Limelight Networks IPv6 Conf
Video
World IPv6 Launch Slides
Arturo Servin, LACNIC IPv6 Conf
Video
IPv6 Initiatives in Latin America and the Caribbean Slides
Dean Pemberton, Prophecy Networks IPv6 Conf
Video
Practical IPv6 for Government Conference Slides
Dr. Ren-Hung Hwang, National Chung Cheng University, Taiwan IPv6 Conf
Video
Taiwan Government's Initiative to Increase IPv6 Deployment IPv6 UP Slides
Tanapon Chandavasu, True Internet IPv6 Conf
Video
Moderator
Matthew Moyle-Croft Peering Forum (1)
Video
Building a Global Peering Footprint from the Outback Slides
Willy Sutrisno, Matrix Networks Peering Forum (1)
Video
Establishing Peering one step at a time Slides
Zaid Ali, LinkedIn Peering Forum (1)
Video
Experience in peering in current world Slides
Suchok A, CAT Telecom Peering Forum (1)
Video
CAT Internet Update Slides
Raphael Ho, Equinix Peering Forum (2)
Video
Route Control at IXPs Slides
Gaurab Raj Upadhaya, Limelight Peering Forum (2)
Video
Using the IRR tools Slides
Martin Levy, Hurricane Electric Peering Forum (2)
Video
Using HE BGP Took Kit
Arnold Nipper, DE-CIX Peering Forum (3)
Video
Interconnecting IXPs: Pros and Cons Slides
Katsuyasu Toyama, APIX Peering Forum (3)
Video
APIX Update Slides
Bijal Sanghani, Euro-IX Peering Forum (3)
Video
Euro-IX Updates Slides
Geoff Huston, APNIC APNIC Plenary
Video Transcript
Today's Mobile Internet Slides
Ramesh Chandra, Bharti Airtel Ltd APNIC Plenary
Video Transcript
IPv6 Adoption for Operators Slides
Hon Kit Lam, Tata Communications APNIC Plenary
Video Transcript
IPv6 deployment including Mobile Platform Slides
Andy Linton (Chair) Policy SIG
Video Transcript
APNIC Policy Development Process Slides
Andy Linton (Chair) Policy SIG
Video Transcript
Review of Action Items Slides
Andy Linton (Chair) Policy SIG
Video Transcript
Proposals Overview Slides
Andy Linton (Chair) Policy SIG
Video Transcript
Community Remote Hubs Slides
Xing Li Policy SIG
Video Transcript
Proposal 099: IPv6 Reservation for Large Networks Slides
Owen DeLong Policy SIG
Video Transcript
Proposal 098: Optimizing IPv6 allocation strategies (simplified) Slides
David Woodgate Policy SIG
Video Transcript
Proposal 101: Removing multihoming requirement for IPv6 portable assignments Slides
Dean Pemberton Policy SIG
Video Transcript
Proposal 102: Sparse allocation guidelines for IPv6 resource allocations Slides
Andy Linton (Chair) Policy SIG
Video Transcript
Chairs' Report Slides
Milton Kashiwakura Lightning Talks
Lac Regional IPv6 week Slides
Vijayakumar Sethuraman Lightning Talks
Equinix Subnet Slides
Richard Barnes Lightning Talks
Where is the IPv6 Network Slides
Ayuma Yasuda Lightning Talks
DNS Cache Selection Slides
Merike Kaeo Lightning Talks
Passive DNS Slides
Peter Losher Lightning Talks
APRICOT DNS Slides
Shishio Tsuchiya Lightning Talks
Simple Virtual Aggregation Slides
Andrew Chi Lightning Talks
RPKI Slides
Gaurab Raj Upadhaya Lightning Talks
"it's a secret"
George Michaelson Lightning Talks
Chair Slides