Anyone have contacts at Bharti Airtel?

2019-12-06 Thread Bottiger
Does anyone have any contacts at Bharti Airtel? I either get no response or
full inbox for emails in their WHOIS at AS9498 and AS24560.


Re: Arista Switch Suggestion

2019-12-06 Thread Siyuan Miao
Yes that's required.

On Sat, Dec 7, 2019 at 7:05 AM Mike Hammett  wrote:

> Am I reading correctly in that there has to be a layer 3 configuration on
> the VLAN for that to function?
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions 
> 
> 
> 
> 
> Midwest Internet Exchange 
> 
> 
> 
> The Brothers WISP 
> 
> 
> --
> *From: *"Siyuan Miao" 
> *To: *"Mike Hammett" 
> *Cc: *"Steve Meuse" , "nanog" 
> *Sent: *Friday, December 6, 2019 4:49:45 PM
> *Subject: *Re: Arista Switch Suggestion
>
> I can confirm 7050X series do support this feature.We're using 7050SX and
> 7050S, 7050S isn't supported
>
>
> https://www.arista.com/en/um-eos/eos-section-11-6-ethernet-configuration-commands#ww1310058
>
>
>
>
>
> On Sat, Dec 7, 2019 at 6:42 AM Mike Hammett  wrote:
>
>> I have not found x-flow to have the accuracy I would like. Either there's
>> a loss of information due to sampling and such low-usage interfaces (or
>> VLANs in this case) are lost in the noise or there's information overload
>> due to no sampling at all.
>>
>>
>> I have seen very few platforms expose counter information about VLANs in
>> the same way they do regular interfaces. Some Juniper platforms, Mikrotik,
>> and I hear some Aristas as well.
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions 
>> 
>> 
>> 
>> 
>> Midwest Internet Exchange 
>> 
>> 
>> 
>> The Brothers WISP 
>> 
>> 
>> --
>> *From: *"Steve Meuse" 
>> *To: *"Mike Hammett" 
>> *Cc: *"nanog" 
>> *Sent: *Friday, December 6, 2019 4:20:08 PM
>> *Subject: *Re: Arista Switch Suggestion
>>
>>
>> You should be able to do that with Sflow, which they all/most support.
>>
>> Also, this seems like standard Ifmib stuff, any snmp poller should be
>> able to handle that, from a metrics perspective .
>>
>> -Steve
>>
>>
>> On Fri, Dec 6, 2019 at 4:31 PM Mike Hammett  wrote:
>>
>>> I asked over at https://puck.nether.net/mailman/listinfo/arista-nsp a
>>> couple weeks ago, but didn't get an answer, so I have moved to a larger
>>> group.
>>>
>>> I understand that some Arista switches will expose each VLAN in SNMP so
>>> I can monitor traffic on a VLAN independently of over VLANs on that same
>>> physical interface. Some of them don't.
>>>
>>> Which ones do?
>>>
>>> I prefer a solid used switch.
>>>
>>>
>>> 10G ports are fine.
>>>
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions
>>> http://www.ics-il.com
>>>
>>> Midwest-IX
>>> http://www.midwest-ix.com
>>>
>>
>>
>


Re: Arista Switch Suggestion

2019-12-06 Thread Mike Hammett
Am I reading correctly in that there has to be a layer 3 configuration on the 
VLAN for that to function? 




- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 

- Original Message -

From: "Siyuan Miao"  
To: "Mike Hammett"  
Cc: "Steve Meuse" , "nanog"  
Sent: Friday, December 6, 2019 4:49:45 PM 
Subject: Re: Arista Switch Suggestion 


I can confirm 7050X series do support this feature.We're using 7050SX and 
7050S, 7050S isn't supported 


https://www.arista.com/en/um-eos/eos-section-11-6-ethernet-configuration-commands#ww1310058
 











On Sat, Dec 7, 2019 at 6:42 AM Mike Hammett < na...@ics-il.net > wrote: 




I have not found x-flow to have the accuracy I would like. Either there's a 
loss of information due to sampling and such low-usage interfaces (or VLANs in 
this case) are lost in the noise or there's information overload due to no 
sampling at all. 




I have seen very few platforms expose counter information about VLANs in the 
same way they do regular interfaces. Some Juniper platforms, Mikrotik, and I 
hear some Aristas as well. 




- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 



From: "Steve Meuse" < sme...@mara.org > 
To: "Mike Hammett" < na...@ics-il.net > 
Cc: "nanog" < nanog@nanog.org > 
Sent: Friday, December 6, 2019 4:20:08 PM 
Subject: Re: Arista Switch Suggestion 




You should be able to do that with Sflow, which they all/most support. 


Also, this seems like standard Ifmib stuff, any snmp poller should be able to 
handle that, from a metrics perspective . 



-Steve 




On Fri, Dec 6, 2019 at 4:31 PM Mike Hammett < na...@ics-il.net > wrote: 




I asked over at https://puck.nether.net/mailman/listinfo/arista-nsp a couple 
weeks ago, but didn't get an answer, so I have moved to a larger group. 



I understand that some Arista switches will expose each VLAN in SNMP so I can 
monitor traffic on a VLAN independently of over VLANs on that same physical 
interface. Some of them don't. 


Which ones do? 


I prefer a solid used switch. 




10G ports are fine. 





- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 








Re: Arista Switch Suggestion

2019-12-06 Thread Siyuan Miao
I can confirm 7050X series do support this feature.We're using 7050SX and
7050S, 7050S isn't supported

https://www.arista.com/en/um-eos/eos-section-11-6-ethernet-configuration-commands#ww1310058





On Sat, Dec 7, 2019 at 6:42 AM Mike Hammett  wrote:

> I have not found x-flow to have the accuracy I would like. Either there's
> a loss of information due to sampling and such low-usage interfaces (or
> VLANs in this case) are lost in the noise or there's information overload
> due to no sampling at all.
>
>
> I have seen very few platforms expose counter information about VLANs in
> the same way they do regular interfaces. Some Juniper platforms, Mikrotik,
> and I hear some Aristas as well.
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions 
> 
> 
> 
> 
> Midwest Internet Exchange 
> 
> 
> 
> The Brothers WISP 
> 
> 
> --
> *From: *"Steve Meuse" 
> *To: *"Mike Hammett" 
> *Cc: *"nanog" 
> *Sent: *Friday, December 6, 2019 4:20:08 PM
> *Subject: *Re: Arista Switch Suggestion
>
>
> You should be able to do that with Sflow, which they all/most support.
>
> Also, this seems like standard Ifmib stuff, any snmp poller should be able
> to handle that, from a metrics perspective .
>
> -Steve
>
>
> On Fri, Dec 6, 2019 at 4:31 PM Mike Hammett  wrote:
>
>> I asked over at https://puck.nether.net/mailman/listinfo/arista-nsp a
>> couple weeks ago, but didn't get an answer, so I have moved to a larger
>> group.
>>
>> I understand that some Arista switches will expose each VLAN in SNMP so I
>> can monitor traffic on a VLAN independently of over VLANs on that same
>> physical interface. Some of them don't.
>>
>> Which ones do?
>>
>> I prefer a solid used switch.
>>
>>
>> 10G ports are fine.
>>
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions
>> http://www.ics-il.com
>>
>> Midwest-IX
>> http://www.midwest-ix.com
>>
>
>


Re: Arista Switch Suggestion

2019-12-06 Thread Mike Hammett
I have not found x-flow to have the accuracy I would like. Either there's a 
loss of information due to sampling and such low-usage interfaces (or VLANs in 
this case) are lost in the noise or there's information overload due to no 
sampling at all. 




I have seen very few platforms expose counter information about VLANs in the 
same way they do regular interfaces. Some Juniper platforms, Mikrotik, and I 
hear some Aristas as well. 




- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 

- Original Message -

From: "Steve Meuse"  
To: "Mike Hammett"  
Cc: "nanog"  
Sent: Friday, December 6, 2019 4:20:08 PM 
Subject: Re: Arista Switch Suggestion 




You should be able to do that with Sflow, which they all/most support. 


Also, this seems like standard Ifmib stuff, any snmp poller should be able to 
handle that, from a metrics perspective . 



-Steve 




On Fri, Dec 6, 2019 at 4:31 PM Mike Hammett < na...@ics-il.net > wrote: 




I asked over at https://puck.nether.net/mailman/listinfo/arista-nsp a couple 
weeks ago, but didn't get an answer, so I have moved to a larger group. 



I understand that some Arista switches will expose each VLAN in SNMP so I can 
monitor traffic on a VLAN independently of over VLANs on that same physical 
interface. Some of them don't. 


Which ones do? 


I prefer a solid used switch. 




10G ports are fine. 





- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 





Re: Questions about satellite phones + satellite Internet

2019-12-06 Thread Darin Steffl
I can't speak much to phone service but between Viasat and hughesnet,
you'll have a way better experience with Viasat. Don't expect it to be full
speed once you hit the caps. It will run slow during peak times once you
hit the caps in the fine print. Off peak hours should be fairly fast.
Latency also is above 700ms so don't expect twitch gaming to work. VPN is
also bad.

I also doubt Comcast is throttling your entire community. Have you
escalated your issue with them? Maybe they have a congested node that needs
to be split. Or their peering points could be running hot so certain
services feel slow to you.

On Fri, Dec 6, 2019, 3:55 PM Yosem Companys  wrote:

> Hey All,
>
> I'm new to the world of satellite phones + satellite Internet. I can't
> find an informative guide that will help me figure out the best options.
>
> Anyone know where I could find such information?
>
> Based on my exhaustive search, it seems the best generally speaking are
> Iridium and ViaSat, respectively. (For Iridium, that assumes one has line
> of sight.) But would it be best to do both or get Iridium Go only and use
> one's cell phone via a satellite link or have a dedicated satellite phone?
> More important, how can one assess whether one's geographic location is
> ideally suited for one service vis-a-vis the other?
>
> For perspective, I live on the Silicon Valley Coastside (i.e., Half Moon
> Bay). Comcast and AT rely on PG's transmission cables for Internet
> access. As such, whenever a power shutdown occurs, many of us on the
> Coastside are left without cable or Internet access. I shudder to think
> what would happen during the Big One. Even when there are no power
> shutoffs, however, Comcast appears to throttle our community on a regular
> basis.
>
> As such, I'm thinking about getting a combo of satellite phone
> and/or satellite Internet both to improve my Internet service and to
> maintain communication during an anthropogenic or natural disaster.
>
> Any suggestions?
>
> Thanks,
> Yosem
>


Re: Arista Switch Suggestion

2019-12-06 Thread Steve Meuse
You should be able to do that with Sflow, which they all/most support.

Also, this seems like standard Ifmib stuff, any snmp poller should be able
to handle that, from a metrics perspective .

-Steve


On Fri, Dec 6, 2019 at 4:31 PM Mike Hammett  wrote:

> I asked over at https://puck.nether.net/mailman/listinfo/arista-nsp a
> couple weeks ago, but didn't get an answer, so I have moved to a larger
> group.
>
> I understand that some Arista switches will expose each VLAN in SNMP so I
> can monitor traffic on a VLAN independently of over VLANs on that same
> physical interface. Some of them don't.
>
> Which ones do?
>
> I prefer a solid used switch.
>
>
> 10G ports are fine.
>
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
>
> Midwest-IX
> http://www.midwest-ix.com
>


Re: Software Defined Networks

2019-12-06 Thread Alain Hebert
    So like leaving the HTTP service up on router/switches as a Upper 
Manager trap =D.


-
Alain Hebertaheb...@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

On 2019-12-04 13:36, Sajan Parikh wrote:
SDN allows non-software guys to take down your whole network because 
they forgot some whitespace in a yaml file. ;P


On Wed, 2019-12-04 at 17:56 +, Rod Beck wrote:
Can someone explain what is all the fuss? SDN is like the latest 
telecom craze but the articles do a poor job of explaining the 
advantages. I seek concrete examples.


Regards,

Roderick.


Roderick Beck

VP of Business Development

United Cable Company

www.unitedcablecompany.com 

New York City & Budapest

rod.b...@unitedcablecompany.com

36-70-605-5144


1467221477350_image005.png


--
Sajan Parikh
e: sa...@parikh.io 
c: 262.343.5973




Questions about satellite phones + satellite Internet

2019-12-06 Thread Yosem Companys
Hey All,

I'm new to the world of satellite phones + satellite Internet. I can't find
an informative guide that will help me figure out the best options.

Anyone know where I could find such information?

Based on my exhaustive search, it seems the best generally speaking are
Iridium and ViaSat, respectively. (For Iridium, that assumes one has line
of sight.) But would it be best to do both or get Iridium Go only and use
one's cell phone via a satellite link or have a dedicated satellite phone?
More important, how can one assess whether one's geographic location is
ideally suited for one service vis-a-vis the other?

For perspective, I live on the Silicon Valley Coastside (i.e., Half Moon
Bay). Comcast and AT rely on PG's transmission cables for Internet
access. As such, whenever a power shutdown occurs, many of us on the
Coastside are left without cable or Internet access. I shudder to think
what would happen during the Big One. Even when there are no power
shutoffs, however, Comcast appears to throttle our community on a regular
basis.

As such, I'm thinking about getting a combo of satellite phone
and/or satellite Internet both to improve my Internet service and to
maintain communication during an anthropogenic or natural disaster.

Any suggestions?

Thanks,
Yosem


Arista Switch Suggestion

2019-12-06 Thread Mike Hammett
I asked over at https://puck.nether.net/mailman/listinfo/arista-nsp a couple 
weeks ago, but didn't get an answer, so I have moved to a larger group. 



I understand that some Arista switches will expose each VLAN in SNMP so I can 
monitor traffic on a VLAN independently of over VLANs on that same physical 
interface. Some of them don't. 


Which ones do? 


I prefer a solid used switch. 




10G ports are fine. 





- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 


Re: Equinix

2019-12-06 Thread Radu-Adrian Feurdean



On Thu, Dec 5, 2019, at 17:10, Martijn Schmidt via NANOG wrote:
> Hi Drew,
> 
> You're probably best off ordering those crossconnects through the 
> Equinix portal, then you can choose the exact positions for the order 
> that goes to the facility rather than relying on a human to transcribe 
> them correctly from your PDF.

Hi, 

I used to have issues with them at $job[-1].
At some point I had an "explanation" that they will NOT deliver XCos on ports 
that already have a cable plugged "in order not to cause disruptions". So much 
for precabled positions At some point it was also clear that their records 
(both their portal and their "other/non-official" records) were pretty far from 
being correct. The best part was when I ordered ONE XCo de-installed an I got 
TWO (the extra one a backbone link).
Everything done via portal. Paris (FR/EU) area.
Things seems a little better now, but as far as I can remember, things happen 
in "waves" there. 
Actually there's much more to say about them but for today it's enough.

--
R-A.F.


Re: Elephant in the room - Akamai

2019-12-06 Thread Keenan Tims
Speaking as a (very) small operator, we've also been seeing less and 
less of our Akamai traffic coming to us over peering over the last 
couple years. I've reached out to Akamai NOC as well as Jared directly 
on a few occasions and while they've been helpful and their changes 
usually have some short-term impact, the balance has always shifted back 
some weeks/months later. I've more or less resigned myself to this being 
how Akamai wants things, and as we so often have to as small fish, just 
dealing with it.


We're currently seeing about 80% of our AS20940 origin traffic coming 
from transit, and I'm certain there's a significant additional amount 
which is difficult to identify coming from on-net caches at our upstream 
providers (though it appears from the thread that may be reducing as 
well). Only about 20% is coming from peering where we have significantly 
more capacity and lower costs. Whatever the algorithm is doing, from my 
perspective it doesn't make a lot of sense and is pretty frustrating, 
and I'm somewhat concerned about busting commits and possibly running 
into congestion for the next big event that does hit us, which would not 
be a problem if it were delivered over peering.


Luckily we're business focussed, so we're not getting hit by these 
gaming events.


Keenan Tims
Stargate Connections Inc (AS19171)

On 2019-12-06 8:13 a.m., Jared Mauch wrote:



On Dec 6, 2019, at 9:59 AM, Chris Adams  wrote:

Once upon a time, Fawcett, Nick  said:

We had three onsite Akamai caches a few months ago.  They called us up and said 
they are removing that service and sent us boxes to pack up the hardware and 
ship back.  We’ve had quite the increase in DIA traffic as a result of it.

Same here.  We'd had Akamai servers for many years, replaced as needed
(including one failed servre replaced right before they turned them
off).  Now about 50% of our Akamai traffic comes across transit links,
not peering.  This seems like it would be rather inefficient for them
too…

There’s an element of scale when it comes to certain content that makes it not 
viable if the majority of traffic is VOD with variable bitrates it requires a 
lot more capital.

Things like downloads of software updates (eg: patch Tuesday) lend themselves 
to different optimizations.  The hardware has a cost as well as the bandwidth 
as well.

I’ll say that most places that have a few servers may only see a minor 
improvement in their in:out.  If you’re not peering with us or are and see 
significant traffic via transit, please do reach out.

I’m happy to discuss in private or at any NANOG/IETF meeting people are at.  We 
generally have someone at most of the other NOG meetings as well, including 
RIPE, APRICOT and even GPF etc.

I am personally always looking for better ways to serve the medium (or small) 
size providers better.

- Jared





RE: Seeking Federal Cybersecurity resources for US ISPs

2019-12-06 Thread Chris Kimball via NANOG
Hi Fletcher,

You (or anyone else) will want to work with DHS’ Cybersecurity and 
Infrastructure Security Agency https://www.dhs.gov/cisa/cybersecurity-division

Send an email to cyberadvi...@hq.dhs.gov asking 
them to speak with your reginal advisor. Find which region you are in here: 
https://www.dhs.gov/cisa/cisa-regional-offices

Takes up to two weeks for a response; though typically faster.

Lastly sign up for this: 
https://www.ftc.gov/news-events/blogs/business-blog/2019/12/free-vulnerability-scanning-your-business

DHS’ CISA will help do a Risk and Vulnerability Assessment, Phishing Campaign 
Assessment, Validated Architecture Design Review and a Red Team Assessment.

Cheers,
Chris

Please let me know if you have any questions.

Regards,
Christopher Kimball
Director of Engineering | MIS Alliance
181 Wells Ave, Suite 203, Newton, MA 02459
p:  617.500.1700
e:  ckimb...@misalliance.com
w: http://www.misalliance.com
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NOENCRYPT


From: NANOG  On Behalf Of Fletcher Kittredge
Sent: Thursday, December 5, 2019 8:51 PM
To: NANOG list 
Subject: Seeking Federal Cybersecurity resources for US ISPs


[EXTERNAL]

I am looking for pointers to US Federal cybersecurity resources specifically 
targeted to ISPs.

thank you

--
Fletcher Kittredge
GWI
207-602-1134
www.gwi.net
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
- - -

The information contained in this electronic message may be confidential, and 
the message is for the use of intended recipients only. If you are not the 
intended recipient, do not disseminate, copy, or disclose this communication or 
its contents. If you have received this communication in error, please 
immediately notify me by replying to the email or call MIS Alliance at 
617-500-1700 and permanently delete this communication.


Re: Software Defined Networks (SDN)

2019-12-06 Thread Phil Pishioneri
Jen missed another ACM article to which she contributed:

- "A Purpose-built Global Network: Google's Move to SDN" (ACM Queue,
December 11, 2015, Volume 13, issue 8)
  A discussion with Amin Vahdat, David Clark, and Jennifer Rexford
https://queue.acm.org/detail.cfm?id=2856460

-Phil

On 2019/12/4 9:41 PM, Jennifer Rexford wrote:
> SDN is definitely an overloaded and confusing term that is used
> inconsistently.  Here are a few attempts to explain:
>
> - “The Road to SDN: An Intellectual History of Programmable Networks”
> (ACM Queue, December 2013)
>   https://queue.acm.org/detail.cfm?id=2560327
> 
>
> - “Abstractions for Software-Defined Networks” (CACM, October 2014)
>    http://www.cs.cornell.edu/~jnfoster/papers/sdn-abstractions.pdf
> 
>
> - “From Ethane to SDN and Beyond” (ACM SIGCOMM CCR, October 2019)
>  
>  https://ccronline.sigcomm.org/wp-content/uploads/2019/10/acmdl19-347.pdf
> 
>
> — Jen



Re: Software Defined Networks

2019-12-06 Thread merik
> 
> On 4 Dec 2019, at 18:56, Rod Beck  > wrote:
> 
> Can someone explain what is all the fuss? SDN is like the latest telecom 
> craze but the articles do a poor job of explaining the advantages. I seek 
> concrete examples. 

Maybe our example from my Fiberhood.nl  company can 
illustrate. It is the size of two PhD projects in our small research institute 
spun of as a neighbourhood ISP and smart microgrid.

We needed a way to build our wide area network (an internet access provider) 
AND a supercomputer interconnect to both allow for loops in the network. None 
of the standard switches like Cisco and Juniper can handle this gracefully.

SDN/Openflow, especially P4, allows us to write a few programs in a few weeks 
that generates the hardware and software for the 120 Gbps and 6 terabit mesh 
switches for whatever topology of our network. We can buy white label switches 
for $5000 or our own $800 12x10G FPGA fabric switches or $1000 260x50 Gbps 
switches. We save a few million in an fiber ISP metro network to 20.000 
households with 4x10 Gbps ports. More important, we don’t have to fight (adapt 
and patch) Cicso and Juniper legacy software and protocols every week for 10 
years on switches costing 20 times as much.
We can test all our software before we built in mininet in an afternoon on a 
laptop. We could build a test network with OpenVswitch in on fast off the shelf 
linux servers with 10G ports.
We found the Slimfly topology to be $2000 cheaper per household than all other 
switch topologies.
My ISP WAN network winds up being almost as fast as Cray + AMD new Rome zen 2 
supercomputer cluster switch fabric with the investment of three people while 
saving $2000 per location and a few million in my core datacenters with our own 
hardware product (similar to a NetFPGA Sume https://netfpga.org/site/#/ 
 with 2000 in use). We moved an academic network 
out of the lab into a fiber ISP Wan for less than $200.000 while saving 
$40,000,000. A side effect of building arbitrary topologies is an additional 
saving of $4,000,000 in cable lengths in a 4km2 naighmerhood fiber rollout.

Cheers 

Merik Voswinkel,
Fiberhood Coop 
Metamorph research institute

Re: Software Defined Networks

2019-12-06 Thread Sajan Parikh
SDN allows non-software guys to take down your whole network because they 
forgot some whitespace in a yaml file. ;P

On Wed, 2019-12-04 at 17:56 +, Rod Beck wrote:
Can someone explain what is all the fuss? SDN is like the latest telecom craze 
but the articles do a poor job of explaining the advantages. I seek concrete 
examples.

Regards,

Roderick.



Roderick Beck

VP of Business Development

United Cable Company

www.unitedcablecompany.com

New York City & Budapest

rod.b...@unitedcablecompany.com

36-70-605-5144


[1467221477350_image005.png]

--

Sajan Parikh
e: sa...@parikh.io
c: 262.343.5973


Seeking Federal Cybersecurity resources for US ISPs

2019-12-06 Thread Fletcher Kittredge
I am looking for pointers to US Federal cybersecurity resources
specifically targeted to ISPs.

thank you

-- 
Fletcher Kittredge
GWI
207-602-1134
www.gwi.net


Re: Hulu thinks all my IP addresses are "business class", how to reach them?

2019-12-06 Thread Eric Fulton
This happened to us as well.  We've had probably over 100 requests over the
last few years, but thankfully most of our customers are fine with just not
purchasing Hulu.  We've only lost below 5 customers from this issue.

EF

Treasure State Internet & Telegraph
406.204.4777
http://tsi.io




On Wed, Nov 27, 2019 at 3:32 AM Mark Tinka  wrote:

>
>
> On 21/Nov/19 12:32, t...@pelican.org wrote:
>
> > If I, as a UK citizen, buy region 2 DVDs at home, take them on my trip
> to the US and watch them on my laptop, no-one is screaming that I'm
> violating someone's geographic distribution rights by doing so.
>
> They would if it was possible to track you. Whenever I played DVD's or
> BD's with my PS3/PS4, I sometimes hit issue because those boxes were
> online, vs. my regular DVD player which wasn't.
>
> Offline DVD tech. is old school.
>
> Because tracking can be done with 2019 tech. due to VoD and its use of
> the Internet, they will scream.
>
> Mark.
>


Re: CBS Geolocation

2019-12-06 Thread William Guo
Hi Richard,

I've seen many mis-geolocating things and we're here to change, we could
contact CBS for a testing.

But can you try our service and see if it's correct location at
https://ipinsight.io?

Thanks,

William

On Thu, Dec 5, 2019 at 12:01 AM Richard Laager  wrote:

> Does anyone have a contact at CBS, or know which geolocation service
> they use for cbs.com TV streaming? CBS has recently started
> mis-geolocating us as being in Canada.
>
> --
> Richard
>


Re: Elephant in the room - Akamai

2019-12-06 Thread Michael Thomas



On 12/5/19 6:02 PM, Valdis Klētnieks wrote:

On Thu, 05 Dec 2019 14:18:07 -0800, Michael Thomas said:


My suspicion is that the root problem was buffer bloat -- i flashed a
new router with openwrt and was a little dismayed that the bufferbloat
code is a plugin you have to enable. The buffer bloat got a lot better

Friends don't let friends run factory firmware. :)

Hopefully sometime soon the SQM stuff will be added to the default  openwrt
configs for most of the supported routers, if it hasn't been already. It's been
in my config since before the Luci support for SQM got created

The big problem is that a lot of eyeball networks have a lot of CPE boxes that
were created before the bufferbloat work was done, and often have no real
motivation to push software updates to the CPE (if they even have the ability),
and a lot of customers have routers that they bought at Best Buy or Walmart
that will *never* get a software update.

(I also admit having no idea what percentage of the intermediate routers in the
ISP's networks have gotten de-bloating code.



So I tested this out again after I sent out my message and it does 
indeed seem to be just fine: it wasn't an identical test since my friend 
was over wifi, but that really shouldn't affect things, I'd think.


The thing I don't get is that buffer bloat is a creature of the 
upstream, right? I wouldn't think that the stream of acks sent from 
downloading the file would put much pressure on the upstream. Which 
makes me wonder if it's just that the old router itself was saturated 
and couldn't keep up. Or something.


In any case, there are probably zillions of 10 year old routers out in 
the world, and no matter what exactly caused this for me it will 
probably happen for zillions of other people too. Hope support desks are 
ready for the deluge.


Mike



Weekly Routing Table Report

2019-12-06 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith .

Routing Table Report   04:00 +10GMT Sat 07 Dec, 2019

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  786402
Prefixes after maximum aggregation (per Origin AS):  299700
Deaggregation factor:  2.62
Unique aggregates announced (without unneeded subnets):  379353
Total ASes present in the Internet Routing Table: 66387
Prefixes per ASN: 11.85
Origin-only ASes present in the Internet Routing Table:   57073
Origin ASes announcing only one prefix:   24314
Transit ASes present in the Internet Routing Table:9314
Transit-only ASes present in the Internet Routing Table:280
Average AS path length visible in the Internet Routing Table:   4.5
Max AS path length visible:  34
Max AS path prepend of ASN (  8697)  27
Prefixes from unregistered ASNs in the Routing Table:37
Number of instances of unregistered ASNs:37
Number of 32-bit ASNs allocated by the RIRs:  29818
Number of 32-bit ASNs visible in the Routing Table:   24419
Prefixes from 32-bit ASNs in the Routing Table:  111748
Number of bogon 32-bit ASNs visible in the Routing Table:13
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:299
Number of addresses announced to Internet:   2848342528
Equivalent to 169 /8s, 198 /16s and 66 /24s
Percentage of available address space announced:   76.9
Percentage of allocated address space announced:   76.9
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   99.4
Total number of prefixes smaller than registry allocations:  262844

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   209658
Total APNIC prefixes after maximum aggregation:   61192
APNIC Deaggregation factor:3.43
Prefixes being announced from the APNIC address blocks:  203735
Unique aggregates announced from the APNIC address blocks:85025
APNIC Region origin ASes present in the Internet Routing Table:   10212
APNIC Prefixes per ASN:   19.95
APNIC Region origin ASes announcing only one prefix:   2838
APNIC Region transit ASes present in the Internet Routing Table:   1524
Average APNIC Region AS path length visible:4.6
Max APNIC Region AS path length visible: 26
Number of APNIC region 32-bit ASNs visible in the Routing Table:   5237
Number of APNIC addresses announced to Internet:  772498816
Equivalent to 46 /8s, 11 /16s and 101 /24s
APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 63488-64098, 64297-64395, 131072-141625
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:231045
Total ARIN prefixes after maximum aggregation:   107155
ARIN Deaggregation factor: 2.16
Prefixes being announced from the ARIN address blocks:   228353
Unique aggregates announced from the ARIN address blocks:109316
ARIN Region origin ASes present in the Internet Routing Table:18651
ARIN Prefixes per ASN:12.24
ARIN 

Re: Software Defined Networks

2019-12-06 Thread Bruce H McIntosh

On 12/5/19 1:46 PM, Jörg Kost wrote:

[External Email]

There is also a trend for "AI" in SDNs and even cognitive networks, can
drop this one here:
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.infinera.com_blog_centurylink-2Dand-2Dinfinera-2Don-2Dthe-2Dpath-2Dtoward-2Dthe-2Dcognitive-2Dnetwork_=DwIFaQ=sJ6xIWYx-zLMB3EPkvcnVg=mg7ZI12iUjzVkHaIIAWvbA=RTQcDkHVB8y1SC8LSBeBZFiBkMa6hbpjJ7fVuKCrzIE=H9hZqgPwx0oIb_80ug_0n-G8aO3q4Fcsauk9qF4BJnk=


Cognitive networks?  This is where Skynet comes from, right?


--

Bruce H. McIntosh
Network Engineer II
University of Florida Information Technology
b...@ufl.edu
352-273-1066


Re: Elephant in the room - Akamai

2019-12-06 Thread Jared Mauch



> On Dec 6, 2019, at 9:59 AM, Chris Adams  wrote:
> 
> Once upon a time, Fawcett, Nick  said:
>> We had three onsite Akamai caches a few months ago.  They called us up and 
>> said they are removing that service and sent us boxes to pack up the 
>> hardware and ship back.  We’ve had quite the increase in DIA traffic as a 
>> result of it.
> 
> Same here.  We'd had Akamai servers for many years, replaced as needed
> (including one failed servre replaced right before they turned them
> off).  Now about 50% of our Akamai traffic comes across transit links,
> not peering.  This seems like it would be rather inefficient for them
> too…

There’s an element of scale when it comes to certain content that makes it not 
viable if the majority of traffic is VOD with variable bitrates it requires a 
lot more capital.  

Things like downloads of software updates (eg: patch Tuesday) lend themselves 
to different optimizations.  The hardware has a cost as well as the bandwidth 
as well.

I’ll say that most places that have a few servers may only see a minor 
improvement in their in:out.  If you’re not peering with us or are and see 
significant traffic via transit, please do reach out.

I’m happy to discuss in private or at any NANOG/IETF meeting people are at.  We 
generally have someone at most of the other NOG meetings as well, including 
RIPE, APRICOT and even GPF etc.

I am personally always looking for better ways to serve the medium (or small) 
size providers better.

- Jared



Re: Elephant in the room - Akamai

2019-12-06 Thread Chris Adams
Once upon a time, Fawcett, Nick  said:
> We had three onsite Akamai caches a few months ago.  They called us up and 
> said they are removing that service and sent us boxes to pack up the hardware 
> and ship back.  We’ve had quite the increase in DIA traffic as a result of it.

Same here.  We'd had Akamai servers for many years, replaced as needed
(including one failed servre replaced right before they turned them
off).  Now about 50% of our Akamai traffic comes across transit links,
not peering.  This seems like it would be rather inefficient for them
too...

-- 
Chris Adams 


RE: Elephant in the room - Akamai

2019-12-06 Thread Fawcett, Nick via NANOG
We had three onsite Akamai caches a few months ago.  They called us up and said 
they are removing that service and sent us boxes to pack up the hardware and 
ship back.  We’ve had quite the increase in DIA traffic as a result of it.

~Nick

From: NANOG  On Behalf Of Kaiser, Erich
Sent: Wednesday, December 4, 2019 9:03 PM
To: NANOG list 
Subject: Elephant in the room - Akamai

Lets talk Akamai

They have shifted 90% of their traffic off IXs and onto our full route DIA, 
anyone else seeing this issue or have insight as to what is going on over 
there?  We have been asking for help on resolution for weeks and all we get is 
we are working on it and now we get no response.  We were even sent an LOA and 
when the DC went to go put in the x-connect their patch panel was full.  How do 
they not know if they have ports open or not?  I have even reached out to an 
engineer who is on this list and he does not even respond.

The last two nights the traffic levels to them has skyrocketed as well.

Any insight?


Erich Kaiser
The Fusion Network



--

Checked by SOPHOS http://www.sophos.com

-- 
Checked by SOPHOS http://www.sophos.com


Re: virginia beach

2019-12-06 Thread Mehmet Akcin
Thank you

I know SLTE can be further than 100m

On Fri, Dec 6, 2019 at 06:26 Mark Tinka  wrote:

> If the SLTE and PFE are not going to be co-located next to each other, the
> 2 main considerations are:
>
>- The Management signal between the SLTE and the PFE, which is
>generally ran over copper. So 100m becomes the distance limit. However, you
>can mitigate this by doing media conversion between optical and copper.
>Also, it's quite possible that modern PFE's and SLTE's can run Management
>traffic over optical signals. One would have to check with the vendors.
>
>
>- The SLTE Launch Tx power into the wet plant toward the 1st repeater.
>You'd have to design this for every specific case; whether you want to
>co-locate the SLTE and PFE, or if you want to separate them. This is
>critical so that all payload channels are correctly balanced.
>
>
>
> Mark.
>
> On 5/Dec/19 05:53, Mehmet Akcin wrote:
>
> is there any limitation of where an SLTE can be placed in terms of
> distance from PFE?
>
> I have looked in to usual palaces and i was unable to confirm there is any
> requirements for any distance. Any cons can you guys think of that you want
> to share would be appreciated.
>
> here are places I have looked at
>
>
> http://opticalcloudinfra.com/index.php/2018/03/28/whys-hows-open-subsea-cable-systems/
>
> https://www.osa.org/osaorg/media/osa.media/OSAF/Banners/Cable_Powering.pdf
>
>
> http://opticalcloudinfra.com/index.php/2016/02/27/why-open-subsea-cable-systems/
>
> thank you
>
> On Tue, Nov 26, 2019 at 1:03 PM Mark Tinka  wrote:
>
>>
>>
>> On 26/Nov/19 18:47, Ben Cannon wrote:
>>
>> > Nowadays however, the CLS is looked at more like an ILA shelter, or
>> > when feasible cable landings are going directly into metro CNDCs as
>> > the physical gear is getting smaller and smaller and more suitable for
>> > colocation.
>>
>> Nowadays, the SLTE sits in a proper data centre.
>>
>>
>> >
>> > There’s still the small matter of 11,000volts of power or more…
>> >  That’s usually kept out towards the sea.
>>
>> Yes, PFE's will generally live at the CLS.
>>
>> Mark.
>>
>
> --
Mehmet
+1-424-298-1903


Re: Software Defined Networks

2019-12-06 Thread lobna gouda
Personally, the way I look to SDN today, as a use case. Saying just "SDN" is an 
unfair word. While it simply started as someone did not want to buy an 
expensive router while he can write a script on a server (controller) to 
program a switch to do what he wants, it drafted alot  from this view.

Although the hardware got smarter and with some vendors even cheaper, still it 
will not replace the flexibility of software, quick integration of smart AI 
controller feedback, flow granularity decisions and in some cases replacement 
of conventional protocolsetc Not as easy as it seems and comes with 
compromises

Brgds,

LG




From: NANOG  on behalf of Töma Gavrichenkov 

Sent: Friday, December 6, 2019 4:12:49 AM
To: Nick Morrison 
Cc: NANOG 
Subject: Re: Software Defined Networks

Peace,

On Fri, Dec 6, 2019 at 2:54 PM Nick Morrison  wrote:
> > Please do not 
>
> So does anyone still wonder why we have so few women in our field?
>
> Real nice, Töma.

Thank you for highlighting!
I totally admit that the language used would be deemed unacceptable
for many community members.  My sincere apologies for that.  I will
learn from this mistake.

--
Töma


Re: Software Defined Networks

2019-12-06 Thread Töma Gavrichenkov
Peace,

On Fri, Dec 6, 2019 at 2:54 PM Nick Morrison  wrote:
> > Please do not 
>
> So does anyone still wonder why we have so few women in our field?
>
> Real nice, Töma.

Thank you for highlighting!
I totally admit that the language used would be deemed unacceptable
for many community members.  My sincere apologies for that.  I will
learn from this mistake.

--
Töma


Re: Software Defined Networks

2019-12-06 Thread Nick Morrison via NANOG
On Thu 5. Dec 2019 at 20:38, Töma Gavrichenkov  wrote:

> Peace,

On Wed, Dec 4, 2019, 9:26 PM Ishmael Rufus  wrote:

> You can start by taking a look at Openflow which embraces the SDN concept.
>

> Please do not 

So does anyone still wonder why we have so few women in our field?

Real nice, Töma.

@moderators, can we have a comment from you please about the acceptability
of the language used here?

Nick

> --
-- 
Nick


Re: virginia beach

2019-12-06 Thread Mark Tinka
If the SLTE and PFE are not going to be co-located next to each other,
the 2 main considerations are:

  * The Management signal between the SLTE and the PFE, which is
generally ran over copper. So 100m becomes the distance limit.
However, you can mitigate this by doing media conversion between
optical and copper. Also, it's quite possible that modern PFE's and
SLTE's can run Management traffic over optical signals. One would
have to check with the vendors.

  * The SLTE Launch Tx power into the wet plant toward the 1st repeater.
You'd have to design this for every specific case; whether you want
to co-locate the SLTE and PFE, or if you want to separate them. This
is critical so that all payload channels are correctly balanced.

Mark.


On 5/Dec/19 05:53, Mehmet Akcin wrote:
> is there any limitation of where an SLTE can be placed in terms of
> distance from PFE?
>
> I have looked in to usual palaces and i was unable to confirm there is
> any requirements for any distance. Any cons can you guys think of that
> you want to share would be appreciated.
>
> here are places I have looked at
>
> http://opticalcloudinfra.com/index.php/2018/03/28/whys-hows-open-subsea-cable-systems/
>
> https://www.osa.org/osaorg/media/osa.media/OSAF/Banners/Cable_Powering.pdf
>
> http://opticalcloudinfra.com/index.php/2016/02/27/why-open-subsea-cable-systems/
>
> thank you
>
> On Tue, Nov 26, 2019 at 1:03 PM Mark Tinka  > wrote:
>
>
>
> On 26/Nov/19 18:47, Ben Cannon wrote:
>
> > Nowadays however, the CLS is looked at more like an ILA shelter, or
> > when feasible cable landings are going directly into metro CNDCs as
> > the physical gear is getting smaller and smaller and more
> suitable for
> > colocation.
>
> Nowadays, the SLTE sits in a proper data centre.
>
>
> >
> > There’s still the small matter of 11,000volts of power or more…
> >  That’s usually kept out towards the sea.
>
> Yes, PFE's will generally live at the CLS.
>
> Mark.
>