Re: Outside plant - prewire customer demarc preference
We just built a new house in 2021. The builder ran 2" schedule 40 from the side of the house out to the distribution point in front of my neighbor's house. I didn't specify 2" - that's what the builder ran. A portion of that run must have existed before construction because no one had to tear up my neighbor's yard to get to the distro box. Once I convinced Verizon that Fios was indeed available in this neighborhood (separate matter entirely), it was an easy matter for the tech to pull the drop cable through the empty conduit, drill a hole a few feet above the foundation and land the cable in the basement. I didn't run any surface tube or conduit in the basement, but there was enough room for the install tech to run the cable without too much of a fight. Thank you jms On Fri, Dec 8, 2023, 2:06 PM Eric Kuhnke wrote: > If anyone assumes that residential real estate general contractors and low > voltage/wiring subcontractors know or care about wifi signal or not putting > RF units inside metal boxes - that would be a bad assumption to make. > > > On Thu, Dec 7, 2023 at 10:18 PM Jay Hennigan wrote: > >> On 12/6/23 23:22, Eric Kuhnke wrote: >> > I think an important point for pre-wire and residential real estate >> > developers to consider is also the conflicting needs of keeping things >> > "neat and tidy" and last mile CPE location vs wifi coverage. >> >> If you assume that the appropriate place for a wifi access point is >> colocated with the NID/ONT/CPE, you're doing it wrong. >> >> -- >> Jay Hennigan - j...@west.net >> Network Engineering - CCIE #7880 >> 503 897-8550 - WB6RDV >> >>
NANOG 90 Venue Update
Dear NANOG Community, This letter is an update on the upcoming NANOG 90, February 2024 conference. As we announced at NANOG 89, due to unforeseen circumstances, our contracted meeting venue canceled our contract and it became necessary for us to change the venue and date for the upcoming NANOG 90 meeting (12-14 February 2024). This has resulted in the delay in posting the hotel guest room information as we work to negotiate an agreement with a new property. The delay has been due to the hotel network infrastructure, which is not at the level NANOG requires to support its network needs. We are happy to report at this time a solution has been developed, and contract signing is underway. Once the contract is completed, there will be a room block we will publish for registered NANOG conference attendees to begin booking rooms. The room block will be available to all one week later. We appreciate your patience as we worked through this process, along with your unflagging support of NANOG. Sincerely, Darrieux Harvey NANOG Director of Meetings + Interim Operations Director
Re: Outside plant - prewire customer demarc preference
If anyone assumes that residential real estate general contractors and low voltage/wiring subcontractors know or care about wifi signal or not putting RF units inside metal boxes - that would be a bad assumption to make. On Thu, Dec 7, 2023 at 10:18 PM Jay Hennigan wrote: > On 12/6/23 23:22, Eric Kuhnke wrote: > > I think an important point for pre-wire and residential real estate > > developers to consider is also the conflicting needs of keeping things > > "neat and tidy" and last mile CPE location vs wifi coverage. > > If you assume that the appropriate place for a wifi access point is > colocated with the NID/ONT/CPE, you're doing it wrong. > > -- > Jay Hennigan - j...@west.net > Network Engineering - CCIE #7880 > 503 897-8550 - WB6RDV > >
Weekly Global IPv4 Routing Table Report
This is an automated weekly mailing describing the state of the Global IPv4 Routing Table as seen from APNIC's router in Japan. The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG UKNOF, TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG. Daily listings are sent to bgp-st...@lists.apnic.net. For historical data, please see https://thyme.apnic.net. If you have any comments please contact Philip Smith . IPv4 Routing Table Report 04:00 +10GMT Sat 09 Dec, 2023 BGP Table (Global) as seen in Japan. Report Website: https://thyme.apnic.net Detailed Analysis: https://thyme.apnic.net/current/ Analysis Summary BGP routing table entries examined: 936367 Prefixes after maximum aggregation (per Origin AS): 357087 Deaggregation factor: 2.62 Unique aggregates announced (without unneeded subnets): 455742 Total ASes present in the Internet Routing Table: 75116 Prefixes per ASN: 12.47 Origin-only ASes present in the Internet Routing Table: 64439 Origin ASes announcing only one prefix: 26531 Transit ASes present in the Internet Routing Table: 10677 Transit-only ASes present in the Internet Routing Table:474 Average AS path length visible in the Internet Routing Table: 4.2 Max AS path length visible: 55 Max AS path prepend of ASN (265020) 50 Prefixes from unregistered ASNs in the Routing Table: 1031 Number of instances of unregistered ASNs: 1033 Number of 32-bit ASNs allocated by the RIRs: 43201 Number of 32-bit ASNs visible in the Routing Table: 35494 Prefixes from 32-bit ASNs in the Routing Table: 178380 Number of bogon 32-bit ASNs visible in the Routing Table:18 Special use prefixes present in the Routing Table:1 Prefixes being announced from unallocated address space:514 Number of addresses announced to Internet: 3049008640 Equivalent to 181 /8s, 188 /16s and 46 /24s Percentage of available address space announced: 82.4 Percentage of allocated address space announced: 82.4 Percentage of available address space allocated: 100.0 Percentage of address space in use by end-sites: 99.6 Total number of prefixes smaller than registry allocations: 310382 APNIC Region Analysis Summary - Prefixes being announced by APNIC Region ASes: 249706 Total APNIC prefixes after maximum aggregation: 72069 APNIC Deaggregation factor:3.46 Prefixes being announced from the APNIC address blocks: 242887 Unique aggregates announced from the APNIC address blocks:99410 APNIC Region origin ASes present in the Internet Routing Table: 13816 APNIC Prefixes per ASN: 17.58 APNIC Region origin ASes announcing only one prefix: 4152 APNIC Region transit ASes present in the Internet Routing Table: 1861 Average APNIC Region AS path length visible:4.4 Max APNIC Region AS path length visible: 32 Number of APNIC region 32-bit ASNs visible in the Routing Table: 9149 Number of APNIC addresses announced to Internet: 771420032 Equivalent to 45 /8s, 250 /16s and 239 /24s APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431 (pre-ERX allocations) 23552-24575, 37888-38911, 45056-46079, 55296-56319, 58368-59391, 63488-64098, 64297-64395, 131072-153913 APNIC Address Blocks 1/8, 14/8, 27/8, 36/8, 39/8, 42/8, 43/8, 49/8, 58/8, 59/8, 60/8, 61/8, 101/8, 103/8, 106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8, 116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8, 123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8, 163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8, 203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8, 222/8, 223/8, ARIN Region Analysis Summary Prefixes being announced by ARIN Region ASes:273633 Total ARIN prefixes after maximum aggregation: 124620 ARIN Deaggregation factor: 2.20 Prefixes being announced from the ARIN address blocks: 278333 Unique aggregates announced from the ARIN address blocks:132968 ARIN Region origin ASes present in the Internet Routing Table:19075 ARIN Prefixes per ASN:
Spoofer Report for NANOG for Nov 2023
In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes. This report summarises tests conducted within usa, can. Inferred improvements during Nov 2023: ASNName Fixed-By 14031 SCXY 2023-11-11 Further information for the inferred remediation is available at: https://spoofer.caida.org/remedy.php Source Address Validation issues inferred during Nov 2023: ASNName First-Spoofed Last-Spoofed 209CENTURYLINK-US-LEGACY-QWEST 2016-08-16 2023-11-30 20412 CLARITY-TELECOM 2016-09-30 2023-11-30 25787 ROWE-NETWORKS 2016-10-21 2023-11-26 271BCNET 2016-10-24 2023-11-26 3549 LVLT-3549 2016-11-16 2023-11-17 14031 SCXY 2018-10-18 2023-11-14 22883 CONDENAST 2019-05-29 2023-11-28 55016 IMPER-AS-12021-05-18 2023-11-18 469972021-12-22 2023-11-30 394414 E2WS 2022-05-08 2023-11-09 12183 TALKIE-COMMUNICATIONS 2022-12-10 2023-11-28 3701 NERONET 2023-04-18 2023-11-30 400282 2023-04-27 2023-11-25 46690 SNET-FCC 2023-05-20 2023-11-25 20119 ARROW 2023-10-19 2023-11-27 396356 MAXIHOST 2023-11-11 2023-11-11 Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=usa,can_block=1 Please send any feedback or suggestions to spoofer-i...@caida.org