Chicago Network Operators Group (CHI-NOG 10)

Actions Panel

Chicago Network Operators Group (CHI-NOG 10)

Please our agenda below and for details please check out our conference page at

When and where

Date and time


350 W Wolf Point Plaza 350 West Wolf Point Plaza Chicago, IL 60654

Map and directions

How to get there

Refund Policy

Refunds up to 30 days before event
Eventbrite's fee is nonrefundable.

About this event

Efficient Network Automation with Nornir and Napalm by Neelima Parakala

Nornir is a vendor neutral, open source project. It is a multi-threaded network automation framework that abstracts inventory and task execution like configuring the devices, validating the operational data, and enabling the services on the provided hosts which are part of the inventory. As it is multithreaded, it allows to manage the configuration of multiple network devices concurrently. NAPALM is a vendor neutral, cross-platform open source project. It is a python library that provides a set of methodologies for configuration management and operational data retrieval. It supports Cisco IOS-XR, Cisco IOS, Cisco NX-OS, Juniper JunOS and Arista EOS network operating systems. This session gives an overview of Nornir, Napalm, and how to concurrently execute tasks to manage network configuration and operational data.

Simplify- The 16-Bit Datacenter by Brandon Ewing

One of the challenges in network management is managing state in configuration. If you `diff` the config of two devices in the same role, how much output is there? Creating a source of truth with multiple pieces of state information, maintaining multiple templates for different devices and roles, tracking IPAM information for extremely large ECMP fabrics - all create possibilities for either user or automation error. We will focus on simplifying configuration by removing state or deriving as much of it as possible from a minimum of input.

Leveraging advances in MP-BGP, interface BGP peering, and options for BGP on the host supporting peer detection, much of traditional fabric configuration can be creatively templatized so that a single configuration works for all of the nodes. We will also address current shortcomings in autoconfiguration, and proposals in the IETF that expand on BGP fabric autoconfiguration.

The 2022-H1 Adaptive DDoS Threat Landscape Report by John Kristoff

In this presentation, we will discuss global and regional trends in DDoS attacks in the first half of 2022, including details of new DDoS vectors, observed attack volumes and prevalence, targeted verticals, notable attack campaigns, and other information relevant to network operators and their end-customers.

How NOT to Get Rich Quick: Building an Infrastructure Measurement NFP by William (Bill) Eaheart, started in 2016, is a nonprofit 501c(3) organization that provides the Internet’s network and security communities with free data, tools, and analysis. Our motto is: “For operators, by operators."

Internet engineers, analysts, incident responders, and supporting organizations must be aware of trends, anomalies, threats, and misconfigurations that originate from within and outside their networks. provides data (signals), analysis, and statistics to increase awareness to build a more robust and secure Internet.

Internet insight is measured and monitored from over 200 nodes across 65 metropolitan areas on six continents. Signals are observed and discovered from our distributed network to provide unparalleled insight into anomalies and risks.

Our presentation will explore the history of , how we deploy and manage a sensor network, data gathered, and signals provided for analysis and statistics, and review use cases of popular feeds.

Jupyter Notebooks as a wrapper for your Network Simulator by Taran Deshpande

Tired of CLI? Try Jupyter Notebooks to create a learning experience that is reproducible. Along with your network simulator, use Jupyter to build and manage virtual multi-router topologies. We have created a catalog of Jupyter Notebooks that demonstrate use cases of different major technologies, such as ACL, EVPN, BGP, Telemetry, SR, QoS. These notebooks provide a curated experience to learn about these networking concepts, and can be used as "live" documentation. Have a specific use-case in mind? Bring your own use-case and use these notebooks to automate the build and testing of a custom virtual topology.

Reeling in Unwanted Traffic by Phil Roberts

Over three years ago, the Global Cyber Alliance established a worldwide honeyfarm, with hundreds of sensors, to collect IoT attack traffic for analysis. With terabytes of data with over a million hits a day, it clearly communicates that the Internet is full unwanted traffic, hammering unrelentingly on unsuspecting devices. The open question is: how to reduce the amount and impact of such unwanted traffic, without building IP block lists or otherwise unwittingly carving up the Internet?

This presentation will review some of the data from the honeyfarm collection, giving a sense of what we have learned, and some of the surprises along the way. More importantly, it will raise a series of questions about what can be done to address the level of unwanted traffic on the Internet, in ways that are consistent with a continued free and open Internet.

A Real-World Approach to Intent-Based Networking and Service Orchestration by Chris Cummings

Intent-based networking is something that has a lot of mystique and buzz-words surrounding it. This talk explores the approach that ESnet took to build our service orchestration software suite as well as giving a few demonstrations of the software in action. This presentation is not an exhaustive explanation of how to build your own intent-based networking environment, but rather an example and overview of a real-world stack that is being used in a production network today and the principles behind it.

Bridging the Gap Between Cloud Networking and Traditional Networking by Teren Sapp

This session will cover the different networking solutions most commonly leveraged in public cloud networks including AWS, Azure and Google Cloud. Whether you're working with a VPC, VNET or Terraform script cloud networking is a skill in high demand and being able to speak the language of the cloud team can be the difference between having a seat at the table and being labeled as a legacy network engineer.

Do This Not That by Alex Latzko

Sometimes you do need to break your old habits which have served you well over the years. IPv6 addressing requires different thought processes than IPv4 in so many ways. This is a quick overview of some of the habits you need to break.

Mobile User Plane Evolution by Jeffrey Zhang

This presentation describes 5G User Plane evolution with distributed UPFs, and a natural further evolution to integration of UPF and AN/gNB-CU functions in the next generation mobile networks (e.g., 6G). The integration flattens mobile user plane architecture and significantly simplifies MEC, LAN-type services and Multicast Broadcast Services by maximumly integrating IETF/wireline technologies/solutions. This presentation will help socializing the integration proposal among mobile operators to get their feedback and support.

Network Infrastructure: Build, Test, Deploy, Repeat by Joe Clarke

Feel comfortable making a network change in the middle of the workday? If your approach to configuration management makes use of NetDevOps with automated testing pipelines and virtualized network infrastructure you will have the confidence that your network changes will work the first time. This session will highlight an approach to applying Continuous Integration and Continuous Deployment with network infrastructure using abstracted configurations in YAML, GitLab for version control and CI, Cisco Modeling Labs to provide a virtual network testbed, Ansible to deploy the configuration, and pyATS to perform the operational network tests. The whole lifecycle of deploy, test, validate, and deploy to production will be shown.