Apr 30, 2019

Free Webcast: Creating an IPv6 Address Plan

This webinar will be presented by:


Fred Baker: former Chair of the IETF, current co-chair of the IETF IPv6 Operations group, author of over 60 RFCs


Lee Howard: former co-chair of v6ops, former ARIN board member, author of multiple RFCs, multiple patents, an expert in IPv6


Nalini Elkins: startup founder, taught IPv6 and networking to Fortune 500 companies.




Before you can do anything else, you need an IPv6 address range, and you need to plan what you're going to do with it. This one-hour webinar will cover best practices in developing your address plan, and considerations for whether to get addressed from your ISP or your Regional Internet Registry (RIR). Since we will be discussing IPv6 addresses and prefixes, you should already have some familiarity with IPv6 addressing.



• Doing a sample address plan together

• How a good address plan makes security and routing policy easier

• Numbering your LAN segment, SSID, or VLAN

• Numbering for sites, backbone, links

• Methodology

• Remembering your addresses

• Transitioning from IPv4 address plan to IPv6 address plan

• DNS dependence

• RIR vs. ISP (SD-WAN considerations, Provider Independence)

Free Webcast: Join discussions with other enterprises

How can you get involved in small group discussions with other enterprises on new technology issues? A number of enterprises are involved in discussions already around how changes in TLS may impact them and IPv6 migration. We are currently starting the SD-WAN group.  All discussions are free to join.

These ongoing discussions are led by enterprises with our support. We will talk about these groups as well as how you may want to get involved at the IETF. Next year, we would like to start projects around cryptoagility (quantum computing), DNS over HTTPS, researching threats (bots, BGP hijacking, and so on), as well as IoT.

We are looking for discussion group leaders as well as participants. Join this webinar to find out how you can get involved with others like you.  The time commitments are reasonable.   We will meet once per month or so





IPv6 Essentials and Lab

This class will consist of the following:


1. Initial training: 1 hour

  •  Public and private addresses

  • IPv6 Prefixes

  • IPv6 Address Structure

  • IPv6 Interface ID

  • IPv6 Addressing and Address Allocation Methods (stateless, statefull)

  • Address types, unicast, multicast, anycast

  • Address categories: global, site local, link local

  • Unique Local Unicast addresses

  • Zero compression

  • Special addresses (loopback, unspecified, IPv4 mapped IPv6)

  • Broadcast address elimination

2. Guided lab: 1 hour

  • Connection from client and server

  • Ping / traceroute

  • Reading a trace

  • Simple FTP / web access

IPv6 is coming, sooner or later! The time may be now to really start planning.



Montreal EDCO New Technology Briefing

Today, innovation occurs all over the world.  Zoomcar, from India, is one such example.  Zoomcar is a mobility company based in India currently operating more than 6,000 cars and 12,000 cycles across 40 cities.
Zoomcar is working on being attendant free.  The goal is that everything, from selecting and picking up the car to returning it, would be done without human intervention.  Currently, 50% of the fleet is enabled with KeyLess Entry (KLE).
Self-driving cars and attendant-free services are some of the building blocks of the City of the Future, one of the more intriguing ventures being explored by Google.  You may be interested in reading more about this project being initiated in the Quayside neighborhood of Toronto.  Click HERE to read.
Vinayak Hegde, the CTO of Zoomcar, who has been quite involved in the IETF, will speak on "IoT and Protocols in Moving Cars".  This talk will cover the challenges and solutions in designing, deploying and maintaining IoT systems in cars and cycles.  It will also touch upon the protocols and security of the distributed systems.

Click HERE to see presentation.
The new protocols and innovations include work being done in the IPWave and SUIT IETF Working Groups.
The other topics we will cover include:
Quantum Computing
Mark Pecen, COO of Isara, will speak on quantum computing - which is likely to turn security on its head.
Join us as Mark, one of the leading experts in this field, tells us of:

  1. Quantum computing basics

  2. Impacts of quantum computing on security

  3. Industry response to quantum-based security threats

  4. Landscape of quantum-safe algorithms, how they basically work

  5. Standardization activities
    Click HERE to see presentation.

Some initiatives are in process at the IETF to allow data centers to build IP fabrics with lower OPEX (and ultimately CAPEX due to much simpler leaf requirements) over deploying complex BGP provisioning systems. One such initiative is the new Working Group: RIFT or Routing in Fat Trees. We will discuss RIFT as well as why "brick and mortar" enterprises should become involved in such projects.

  • Routing in Fat Trees (RIFT): Tony Pryzgienda

  • Enterprises and Routing at the IETF: Yan Filyurin

IPv6 is one of the core pieces of the protocol infrastructure of the future.

  • Friso Feenstra of RaboBank speaking on "SDWan and IPv6"
    Click HERE to see presentation.

  • Mike Ackermann of Blue Cross Blue Shield of Michigan speaking on "IPv6-Only Performance and Diagnostic Information"
    Click HERE to see presentation.

  • E. Marie Brierley, former project manager at Cisco who led a large IPv6 program. Her team demonstrated IPv6 is mature enough to conduct business at scale. You may wish to read the article about this HERE
    Click HERE to see presentation.

  • Lee Howard, former IETF v6ops co-chair, will be speaking on "Response Time is Better with IPv6”
    Click HERE to see presentation.

  • John Sweeting, Senior Director of Registration Services from ARIN, will be speaking on "Getting IPv6 from ARIN is Easy"
    Click HERE to see presentation.

Mar 16, 2018

London - Enterprise Data Center Operators

The Computer Measurement Group (CMG) and the Enterprise Data Center Operators (EDCO) are co-sponsoring a live seminar. You do not have to be a member of CMG to attend this seminar.


  • TLS1.3 and enterprises network management
    We will discuss the potential problems with TLS1.3 for enterprises and some possible solutions.
    Speaker: Steve Fenter: U.S. Bank


  • Encrypted DNS (DPRIVE)
    Encrypted DNS is likely to pose challenges for enterprises, in particular, for mobile users.
    Speaker: Jim Reid: RTFM LLC

  • QUIC and enterprises
    The QUIC protocol is likely to become a well-adopted transport layer protocol similar to TCP and UDP. It will pose many challenges for enterprises.
    Speaker: Dr. Simone Ferlin


  • IPv6 and enterprises
    IPv6 implementation at many enterprise networks has lagged. We will discuss the business incentives for implementation.
    Speaker: Lee Howard: Retevia (co-chair v6Ops - IETF)


  • IPv6 enterprise use cases
    A number of enterprises will speak on IPv6 implementation efforts at their organization.
    Speakers: Mike Ackermann: Blue Cross Blue Shield of Michigan, Friso Feenstra: Rabobank



TLS 1.3

TLS1.3 disallows the use of RSA key exchange. This means that large data centers will need a different (new) way to decrypt out-of-band traffic. We need ways to manage our networks when traffic is encrypted. When you cannot inspect traffic, there can be malware, leaks, fraud and many other security and diagnostic problems.



The QUIC protocol is essentially HTTPS over UDP. It was developed by Google and is already deployed. QUIC encrypts the headers as well as the payload. From the base Internet Draft for QUIC: “Using UDP as the substrate, QUIC seeks to be compatible with legacy clients and middleboxes. QUIC authenticates all of its headers and encrypts most of the data it exchanges, including its signaling. This allows the protocol to evolve without incurring a dependency on upgrades to middleboxes.” Though laudable in its aims, the problems are that UDP is not examined as thoroughly in firewalls as is TCP. If “middleboxes" cannot examine headers, load balancers may have a problem. If the payload cannot be decrypted, there are issues with fraud detection, data leakage, malware, and network diagnostics.



The concern of the DPRIVE group is the amount of information revealed via DNS -- most importantly, the web site being accessed. DPRIVE aims to provide confidentiality to DNS transactions. Though the goal is laudable, in the real world, DNS information is used to detect malware, leakage of information and fraud. Additionally, DNS is an inordinately key component for networks. Most of us have forgotten the days when a DNS issue made an entire region of the network inaccessible. Imagine what may happen if a Certificate expires for DNS using TLS / TCP or is blocked via a firewall.​



IPv6 implementation at "brick and mortar" enterprise networks has lagged that of other sectors. Such enterprises are the 99% of commercial and business entities who are not the mega data centers for the 10 or 15 companies whose names are known to most teenagers of the world. We will discuss the nature of the topology, applications, regulatory and business requirements of such companies which may be hindering adoption. We will also discuss the pros and cons of IPv6 implementation in particular as data center topology evolves.

Jan 30, 2018

Free Webcast and Live event - Atlanta, GA

Where: Kennesaw State University, Atlanta, GA

9:00AM PST, 10:00 Central, 11:00AM EST  (3.5 Hours)

The Computer Measurement Group (CMG) and the Enterprise Data Center Operators (EDCO) are co-sponsoring a live seminar hosted at Kennesaw State University on TLS1.3.   You will also have an option to attend remotely if you are not able to travel to Atlanta.  You do not have to be a member of CMG to attend this seminar.  

TLS1.3 disallows the use of RSA key exchange. This means that large data centers will need a different (new) way to decrypt out-of-band traffic. We need ways to manage our networks when traffic is encrypted. When you cannot inspect traffic, there can be malware, leaks, fraud and many other security and diagnostic problems.


  • Review of TLS

  • TLS1.3 impact on large data centers

  • Potential Protocol Changes for Data Centers

1 / 1

Please reload

For Questions: Contact us at