Re: Is there such a thing as a 10GBase-T SFP+ transciever

2014-01-31 Thread Eric Clark
What I want to see is reasonably priced 40G single mode transceivers.

I have no idea why 40G and now 100G wasn't rolled out with single mode as the 
preference. The argument that there's a large multimode install base doesn't 
hold water.

For one thing, you're using enormous amounts of MM fiber to get at best 1/4 of 
the ports than you previously had.
The best case is that you could get 12 ports where you used to have 48, but 
that's messy.
The second issue is cost, if you're running and distance, you've got to go to 
OM4, because MM fiber has very limited range at 10G (you're multiplexing 10G 
links), and OM4 is insanely expensive.

Single Mode on the other hand is 'cheap' in comparison. One pair of SM fiber 
will handle every speed from 10M to 100G, and over much longer distances than 
MM, no matter what grade.

Unfortunately, since the manufacturers haven't seen fit to push the SM, the 
optics are extremely expensive, so we're stuck with 4-12 times the amount of 
installed fiber than we really need.

Grumble.


On Jan 30, 2014, at 6:25 PM, Chris Balmain ch...@team.dcsi.net.au wrote:

 You may wish to consider twinax for short distance 10G over copper with SFP+ 
 at both ends
 
 http://en.wikipedia.org/wiki/Twinaxial_cabling#SFP.2B_Direct-Attach_Copper_.2810GSFP.2BCu.29
 
 Typically marketed as direct-attach (you can't remove the cables from the 
 transceivers, it's all integrated)
 
 On 31/01/14 12:26, james jones wrote:
 I would like to know if anyone has seen one of these? If so where? Also if
 they don't exist why? It would seem to me that it would make it a lot
 easier to play mix and match with fiber in the DC if they did. Would be so
 hard to make the 1G SFPs faster (trying to be funny here not arrogant).
 
 
 -James
 




Why are we fixated on Multimode fiber for high bandwidth communication?

2013-12-31 Thread eric clark
I've been working with 40 gig for a few years. When I first ordered a
switch, one of the first publicly available with full 40 gig, I was
appalled that I was going to have to use 4 pair of multimode fiber for each
of my connections. I had planned on using single mode because I can do that
with 1 pair.

Even today, we're still looking at MM fiber instead of SM, even with the
horrendous limitations and cost issues of MM. For instance, if you need to
go 301 meters or more, you've got to go OM4 which  is very expensive. You
have to lay 4 times the number of pairs as SM and when we move to 100G,
it'll be even worse because they're still doing things in 6,12,etc... SM
can do 100G easily, up to 1K with the lower grade fiber, so in the SM 100G
world, you'd be installing 1/12 the strands as you would in multi mode. I
just can't figure where this makes sense

I am aware that single mode has more expensive optics, and I know how much
they cost when I first looked at this, but if this were the standard, that
price would drop enormously.

Anyone know why the industry has their head stuck on MultiMode?


Re: The Making of a Router

2013-12-26 Thread Eric Clark
I also wonder about re-inventing the wheel. The router part is easy, you could 
even do that with a windows box (that's a joke).

Obviously capital cost is part of it, but the man hours involved in doing what 
you're talking about, especially since you are talking about a telco 
whatever you come up with has to be pretty darn reliable...

Certainly would be interested in a little more information about the use case.


Eric

On Dec 26, 2013, at 8:46 AM, Faisal Imtiaz fai...@snappytelecom.net wrote:

 I am a believer of not having to re-invent the wheel...
 
 Having said that.. have you looked at 'purpose built appliances'  e.g. 
 
 http://www.lannerinc.com/
 http://us.axiomtek.com/
 
 If you are looking for a full router
 Consider such as these...
   http://www.linktechs.net/
   http://www.maxxwave.com/
 
 and there are a few others but the concept is the same
 
 Personally, I am not a believer in making a single device be the do all / end 
 all of everything..
 While one can do everything on a big server .. however breaking things out 
 e.g. voip trans-coding and routing make maintenance, availability, and 
 ability to create redundancy much more practical.
 
 
 Regards 
 
 Faisal Imtiaz
 Snappy Internet  Telecom
 
 
 - Original Message -
 From: Nick Cameo sym...@gmail.com
 To: nanog@nanog.org
 Sent: Thursday, December 26, 2013 11:33:13 AM
 Subject: The Making of a Router
 
 Hello Everyone,
 
 We are looking to put together a 2u server with a few PCIe 3 x8
 (recommendations appreciated). The router will take a voip transcoding
 line card, and will act as an edge router for a telecom company.
 
 For things like BGP (Quagga, Zebra, all that lovely stuff!!!), static
 routes, and firewall capabilities we are thinking gentoo linux
 stripped for sure however, what about the BSDs? FreeBSD or OpenBSD.
 Any comments, feedback, does, and don'ts are much appreciated.
 
 Kind Regards,
 
 Nick.
 
 
 




Re: Helix Solutions

2013-07-05 Thread eric clark
I've seen this sort of thing popping up before.

Don't quite understand how its going to work. Leasing I understand. So long
as you are willing to suffer the revocation of the IP space should the
company that was actually ISSUED the IP space looses it for whatever
reason...

Buying I really don't get. IP space that is issued by a registrar is not
owned. It is assigned. Sure, its yours until they want it back or you give
it back, but its not owned. So, for a person to sell space that was
allocated to them, just doesn't make sense.

The provide via GRE or other tunnel makes me think they're tunneling your
traffic to the actual assignee's  environment, which would make sense, but
then that assignee has to deal with your bandwidth, don't they? Obviously,
if you take all of their space, you could physically move it, but if you're
only dealing with a portion, and ARIN has it assigned to AS xxx, then you
have to be running AS xxx...

Sketchy and messy and I don't see how its appropriate.

E





On Fri, Jul 5, 2013 at 7:05 AM, Clayton Zekelman clay...@mnsi.net wrote:


 Sounds sketchy.

 Helix Solutions is a specialized IP technology firm, offering the largest
 inventory of IPv4 address space. Our objective is to enable email marketers
 to overcome the acute IP shortage and communicate with their target
 audiences smoothly and effectively.



 At 09:47 AM 05/07/2013, Alessandro Ratti wrote:

 On Fri, Jul 5, 2013 at 3:38 PM, Eugen Leitl eu...@leitl.org wrote:

  On Fri, Jul 05, 2013 at 03:06:19PM +0200, Alessandro Ratti wrote:
   Hi list,
  
   I have a question for you.
   Anyone knows or has had to deal with Helix Solutions?
 
  The Swiss guys: http://helix-it.ch/
  ?
 

 No seems US company.
 http://www.helixsolutions.net/


 ---

 Clayton Zekelman
 Managed Network Systems Inc. (MNSi)
 3363 Tecumseh Rd. E
 Windsor, Ontario
 N8W 1H4

 tel. 519-985-8410
 fax. 519-985-8409




Re: PDU recommendations

2013-06-23 Thread Eric Clark
Raritan has a good line, the usual features, we use a lot of 2U, 208v,30A units 
with 20xc13 which is a good config these days

Their central management software, while not perfect, is excellent for pdu 
control
On Jun 23, 2013, at 8:37 AM, shawn wilson ag4ve...@gmail.com wrote:

 We currently use Triplite stuff but they've got an issue where after a few
 minutes, they stop accepting new tcp connections. We're adding a new 30A
 circuit and I'm thinking of going with APC (ran them in the past and never
 had any issues). However, I figured I'd see if there was a better brand /
 specific model recommendations for quality or bang / buck?
 
 Specs: 30A 24+ port 0U, managed (with ssh), lcd use display.




10gig coast to coast

2013-06-17 Thread eric clark
Greetings


I may be needing  10 gig from the West Coast to the East Coast some time in
the next year. I've got my ideas on what that would cost, but I don't have
anything that big.

This could be a leased line, part of a cloud with Verizon, NTT, Sprint, or
whoever as the provider, etc. I'm just looking to see what a budget cost
for something like this is, and who can provide such service.

Your help is greatly appreciated, feel free to respond directly or to the
thread.


E


Re: 10gig coast to coast

2013-06-17 Thread eric clark
Fair enough

Seattle to Boston is the general route, real close.

On Monday, June 17, 2013, wrote:

 On Mon, 17 Jun 2013 12:51:28 -0700, eric clark said:

  I may be needing  10 gig from the West Coast to the East Coast

 Might want to be more specific.  Catalina Island, CA to Buxton, NC
 (home of Cape Hatteras High School) will probably be way different
 than downtown LA to downtown Boston.



Re: 10gig coast to coast

2013-06-17 Thread Eric Clark
all of these questions are valid.

The guys who will use it would love to have line rate on the 10G, for a single 
conversation, but that's not going to happen. So, there's a certain amount of 
expectation management. 

For the purpose we're proposing, this would be an additional link to an 
existing office, a link for test/lab traffic specifically. We would run the lab 
management on the existing link (s) and provide some sort of restricted 
failover as well.

Sorry I'm not going into more detail, just trying to balance the need for some 
info versus ... you know.

This link wouldn't need to be 5 Nines, but with the office primary and backup, 
we can provide the connectivity almost 100% of the time.

Thanks for all the comments everyone, they have been helpful.

Eric

On Jun 17, 2013, at 7:32 PM, George Herbert george.herb...@gmail.com wrote:

 Also, what are reliability and redundancy requirements.
 
 10 gigs of bare naked fiber is one thing, but if you need extra paths
 redundancy, figure that out now and specify.
 
 Is this latency, bandwidth, both?  Mission critical, business critical,
 less priority?  24x7x365, or subset of that, or intermittent only?
 
 
 On Mon, Jun 17, 2013 at 6:48 PM, Carlos Alcantar car...@race.com wrote:
 
 It's typically that the last mile portion of the circuit is going to cost
 you the most, so it's important to know those details.
 
 Carlos Alcantar
 Race Communications / Race Team Member
 1325 Howard Ave. #604, Burlingame, CA. 94010
 Phone: +1 415 376 3314 / car...@race.com / http://www.race.com
 
 
 
 
 
 -Original Message-
 From: eric clark cabe...@gmail.com
 Date: Monday, June 17, 2013 3:22 PM
 To: valdis.kletni...@vt.edu valdis.kletni...@vt.edu
 Cc: nanog@nanog.org nanog@nanog.org
 Subject: Re: 10gig coast to coast
 
 Fair enough
 
 Seattle to Boston is the general route, real close.
 
 On Monday, June 17, 2013, wrote:
 
 On Mon, 17 Jun 2013 12:51:28 -0700, eric clark said:
 
 I may be needing  10 gig from the West Coast to the East Coast
 
 Might want to be more specific.  Catalina Island, CA to Buxton, NC
 (home of Cape Hatteras High School) will probably be way different
 than downtown LA to downtown Boston.
 
 
 
 
 
 
 
 -- 
 -george william herbert
 george.herb...@gmail.com




Re: 10gig coast to coast

2013-06-17 Thread Eric Clark
I'm looking for options.

With dark fiber, obviously, I have the ultimate in options.

However, its the ultimate in cost as you say.

The requirement we have is 10gig of actual throughput. Precisely what mechanism 
is used to transport it isn't all that important, though I'm certain that there 
will be complaints... :)

I'd LOVE to have me some DWDM, always wanted to run some of that gear, but at 
that point, why stop at 10G

On Jun 17, 2013, at 7:42 PM, Jeff Kell jeff-k...@utc.edu wrote:

 On 6/17/2013 10:32 PM, George Herbert wrote:
 Also, what are reliability and redundancy requirements.
 
 10 gigs of bare naked fiber is one thing, but if you need extra paths
 redundancy, figure that out now and specify.
 
 Is this latency, bandwidth, both?  Mission critical, business critical,
 less priority?  24x7x365, or subset of that, or intermittent only?
 
 And are you looking for dark fiber or can you deal with a lambda?  Can
 you supply tuned optics for the passive mux carriers?
 
 Dark coast-to-coast is going to cost you a few appendages.  You may land
 a lambda for a reasonable price depending on the endpoints, you'll need
 an established carrier with DWDM gear on both ends.
 
 Jeff
 
 




Re: APC In-row Units

2013-05-21 Thread eric clark
I'm turning up a facility
With APC gear now. I'll let you
Know.

On Tuesday, May 21, 2013, Morgan Miskell wrote:

 I realize this topic is semi off point so feel free to reply to the list
 or to me personally.  I am wondering if anyone has any experience using
 the APC In-row cooling units in their data centers.  I am specifically
 looking at the ACRD501.

 Do they work well?  How long have you run them?  Any maintenance issues?

 Any input would be greatly appreciated.
 --
 Morgan A. Miskell
 CaroNet Data Centers
 704-643-8330 x206

 
 The information contained in this e-mail is confidential and is intended
 only for the named recipient(s). If you are not the intended recipient
 you must not copy, distribute, or take any action or reliance on it. If
 you have received this e-mail in error, please notify the sender. Any
 unauthorized disclosure of the information contained in this e-mail is
 strictly prohibited.

 





Re: why haven't ethernet connectors changed?

2012-12-21 Thread eric clark
You didn't include RJ11 in your question it goes back further.

One reason is that as we push the limits of cable from CAT3 (10meg) to CAT5
(100meg) to 5E (gig) to 6 (not sure what that was for) to 7 (10gig), the
cable doesn't get any smaller. We're dealing with higher and higher
frequencies of changes on the wire. This makes cross talk and interference
a bigger problem, so the twists and insulation are more important to try to
protect from those issues (sometimes shielding). So the cable hasn't gotten
any smaller. The connector works well enough and allows for these distances
to be maintained. Some vendors have found ways to maintain the twists
farther into the RJ45 by essentially using traces and not just lining the 8
wires up in parallel but stacking them in a staggered fashion...

Obviously, a new connector could have been found, but why haven't we
changed the C13 that HP came up with (at least I think they did) back in
the 50s? Its still the defacto standard for all computer input power. As a
matter of fact, most NEMA specs haven't changed since they were created...

If it ain't broke, don't fix it. The only problem with the RJ45 is the hook.

E


On Fri, Dec 21, 2012 at 7:15 AM, Brielle Bruns br...@2mbit.com wrote:

 Some of us still have a stock of legacy gear and cables - things like v35
 cables for connecting to CSU/DSUs, and even the occasional AUI hub.  :)

 You wouldn't believe how much people will pay for legacy computer gear
 when they need it to keep their business going.

 --
 Brielle

 Sent from my iPhone

 On Dec 21, 2012, at 7:57 AM, Matthew Black matthew.bl...@csulb.edu
 wrote:

 
 http://www.blackbox.com/Store/Detail.aspx/Ethernet-Transceiver-Cable-Office-Environment-PVC-IEEE-802-3-Right-Angle-Connector-3-ft-0-9-m/LCN216%C4%820003
 
  Only $55.95 for a 3-foot transceiver cable. What was more surprising is
 that Black Box is still around.
 
 
  matthew black
  california state university, long beach
 
 
  -Original Message-
  From: Michael Thomas [mailto:m...@mtcc.com]
  Sent: Thursday, December 20, 2012 10:20 AM
  To: NANOG list
  Subject: why haven't ethernet connectors changed?
 
  I was looking at a Raspberry Pi board and was struck with how large the
 ethernet
  connector is in comparison to the board as a whole. It strikes me:
 ethernet
  connectors haven't changed that I'm aware in pretty much 25 years. Every
 other
  cable has changed several times in that time frame. I imaging that if
 anybody
  cared, ethernet cables could be many times smaller. Looking at wiring
 closets,
  etc, it seems like it might be a big win for density too.
 
  So why, oh why, nanog the omniscient do we still use rj45's?
 
  Mike
 
 
 
 
 
 
 




Anyone seeing traffic flow problems in the SanFrancisco / San Jose areas?

2012-04-27 Thread eric clark
I was working with a vendor down there and couldn't get files in or out to
save our lives. Additionally, he was having trouble locally.

I didn't see anything on the pulse site.


Re: facebook spying on us?

2011-09-29 Thread Eric Clark
did you start your browser before looking at your connection list?

However, you're on a window's box, so it wouldn't surprise me if they helpfully 
started ie for you

If you didn't start the browser you use to go to facebook (and its not ie), its 
fairly interesting.



On Sep 29, 2011, at 6:13 AM, Glen Kent wrote:

 Hi,
 
 I see that i have multiple TCP sessions established with facebook.
 They come up even after i reboot my laptop and dont login to facebook!
 
 D:\Documents and Settings\gkentnetstat -a | more
 
 Active Connections
 
  Proto  Local Address  Foreign AddressState
  TCPgkent:3974www-10-02-snc5.facebook.com:http  ESTABLISHED
  TCPgkent:3977www-11-05-prn1.facebook.com:http  ESTABLISHED
  TCPgkent:3665
 a184-84-111-139.deploy.akamaitechnologies.com:http  ESTABLISHED
 
 [clipped]
 
 Any idea why these connections are established (with facebook and
 akamaitechnologies) and how i can kill them? Since my laptop has
 several connections open with facebook, what kind of information is
 flowing there?
 
 I also wonder about the kind of servers facebook must be having to be
 able to manage millions of TCP connections that must be terminating
 there.
 
 Glen
 




Re: Environmental monitoring options

2011-09-28 Thread eric clark
Thanks for all the replies everyone.

Some good options, though I am surprised by how few options I'm finding that
have a good centralized management system. I have to deploy monitoring to a
bunch of sites spread around the world, centralized management is key.

Thanks for all the suggestions.


Re: OOB

2011-07-26 Thread Eric Clark
As far as best practices, I'm not sure. 

I've generally built an out of band network for the express purpose of saving 
my behind in the event of an unanticipated traffic problem on the primary 
network. Secondarily it allows secured access to equipment, and you can monitor 
(which is often not secure, read snmp) on it as well. However, I've never tried 
to extend one beyond a facility or campus exactly. 

Lots depends on the type of network you're talking about and equipment you're 
using though.

E


Sent from my iPad which loves to correct my typing with interesting results.

On Jul 26, 2011, at 7:03 AM, Paul Stewart p...@paulstewart.org wrote:

 We do everything in-band with strict monitoring/policies in place.
 
 Paul
 
 
 -Original Message-
 From: harbor235 [mailto:harbor...@gmail.com] 
 Sent: Tuesday, July 26, 2011 9:57 AM
 To: NANOG list
 Subject: OOB
 
 I am curious what is the best practice for OOB for a core
 infrastructure environment. Obviously, there is
 an OOB kit for customer managed devices via POTS, Ethernet, etc ... And
 there is OOB for core infrastructure
 typically a separate basic network that utilizes diverse carrier and diverse
 path when available.
 
 My question is, is it best practice to extend an inband VPN throughout for
 device management functions as well?
 And are all management services performed OOB, e.g network management, some
 monitoring, logging,
 authentication, flowdata, etc . If a management VPN is used is it also
 extended to managed customer devices?
 
 What else is can be done for remote management and troubleshooting
 capabilities?
 
 Mike
 
 



Multi Factor authentication options for wireless networks

2011-06-09 Thread eric clark
Wondering what people are using to provide security from their Wireless
environments to their corporate networks? 2 or more factors seems to be the
accepted standard and yet we're being told that Microsoft's equipment can't
do it. Our system being a Microsoft Domain... seemed logical, but they can
only do 1 factor.
What are you guys using?

Thanks


Re: Multi Factor authentication options for wireless networks

2011-06-09 Thread eric clark
Tokens are an option but I should have been more clear.
As we're a windows shop (apologies, but that's the way it is), we were
planning on going with user credentials and the machine's domain
certificate.  Your solution might still be viable, but I'm not certain if I
can get at the machine certs with LDAP that way,have to check that.


On Thu, Jun 9, 2011 at 3:08 PM, John Adams j...@retina.net wrote:

 On Thu, Jun 9, 2011 at 3:02 PM, eric clark cabe...@gmail.com wrote:

 Wondering what people are using to provide security from their Wireless
 environments to their corporate networks? 2 or more factors seems to be
 the
 accepted standard and yet we're being told that Microsoft's equipment
 can't
 do it. Our system being a Microsoft Domain... seemed logical, but they can
 only do 1 factor.
 What are you guys using?


 Move to 802.1X with Radius.

 Connect your APs or AP Controllers  to a decent OTP system like
 otpd+rlm_otp+freeradius and then connect to the Microsoft domain using LDAP.
  Extend the LDAP schema to hold the private keys for the OTP system.

 Many vendors offer this solution, although I suggest that you don't go with
 SecurID or any token vendor that does not disclose their algorithm to you.
 Go open, and use OATH.

 The work being done on OATH is where future one-time, two-factor systems
 are headed:

 http://www.openauthentication.org/

 -john




Re: ARIN and IPv6 Requests

2011-02-10 Thread Eric Clark
Don't remember about the v4 part, but 3 years ago they issued me a /48, 
specifically for my first site and indicated that a block was reserved for 
additional sites. I can probably dig that up.

Sent from my iPad

On Feb 10, 2011, at 12:18 PM, Jason Iannone jason.iann...@gmail.com wrote:

 It also looks like there isn't a policy for orgs with multiple
 multihomed sites to get a /48 per site.  Is there an exception policy
 somewhere?
 
 On Thu, Feb 10, 2011 at 12:50 PM,  adw...@dstsystems.com wrote:
 Initial. Documenting IPv4 usage is in the request template.
 
 --
 Adam Webb
 
 
 
 
 
 From:
 Nick Olsen n...@flhsi.com
 To:
 nanog@nanog.org
 Date:
 02/10/2011 01:45 PM
 Subject:
 re: ARIN and IPv6 Requests
 
 
 
 We requested our initial allocation without any such questions. Is this
 your initial or additional?
 
 Nick Olsen
 Network Operations
 (855) FLSPEED  x106
 
 
 
 From: adw...@dstsystems.com
 Sent: Thursday, February 10, 2011 2:38 PM
 To: nanog@nanog.org
 Subject: ARIN and IPv6 Requests
 
 Why does ARIN require detailed usage of IPv4 space when requesting IPv6
 space? Seems completely irrelevant to me.
 
 --
 Adam Webb
 EN  ES Team
 desk: 816.737.9717
 cell: 916.949.1345
 ---
 The biggest secret of innovation is that anyone can do it.
 ---
 
 -
 Please consider the environment before printing this email and any
 attachments.
 
 This e-mail and any attachments are intended only for the
 individual or company to which it is addressed and may contain
 information which is privileged, confidential and prohibited from
 disclosure or unauthorized use under applicable law.  If you are
 not the intended recipient of this e-mail, you are hereby notified
 that any use, dissemination, or copying of this e-mail or the
 information contained in this e-mail is strictly prohibited by the
 sender.  If you have received this transmission in error, please
 return the material received to the sender and delete all copies
 from your system.
 
 
 
 



Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-31 Thread eric clark
Figure I'll throw my 2 cents into this.

The way I read the RFCs, IPv6 is not IP space. Its network space. Unless I
missed it last time I read through them, the RFCs do not REQUIRE
hardware/software manufacturers to support VLSM beyond /64. Autoconfigure
the is the name of the game for the IPv6 guys.

Subsequently, while using longer prefixes is possible currently, I'd never
deploy it because it could be removed from code without mention.

Because of the AutoConfigure  piece, I consider IPv6 to be NETWORK Space,
rather than IP Space like IPv4. I'm issued a /48 which can be comprised of
 65536 /64 networks, not some silly number of hosts, which can't exist
because they are all duplicates of each other (MAC address = host
identifier)

Anyway, that's how I see the question that started this whole thing, I'd
suggest using link local and RFC 4193 for internal routing and your public
space for things that need public access or need to be accessed publicly.

Just because they SAY there's infinite space (like they said about IPv4)
doesn't mean we have to be stupid and wasteful with our space.

-C
If I've misread, or completely missed an RFC, I apologize.


Anyone observing latency and dropped packets at peering points in Seattle?

2010-04-02 Thread eric clark
I've been troubleshooting an issue all day. Traffic leaving our site, on
Verizon public transport, destined for the Spokane area is routing to Qwest
and hitting 400ms rapidly. The offending router seems to be a Verizon router
(number 6 here).

On top of that, we're seeing this via Level3 coming in from Spokane towards
Seattle (targeting our Verizon IPs).


 3. 116.atm2-0.xr2.sea4.alter.net
0.0%  81437.4   1.7   1.1 100.6  10.3
 4. 0.so-6-0-0.xt2.sea1.alter.net
0.0%  81432.6   4.2   2.1 148.5  14.8
 5. pos7-0.br1.sea1.alter.net
0.0%  81422.6   2.2   2.0  38.1   1.6
 6.
204.255.169.30
0.0%  8142  431.3 405.0 320.2 469.8  22.2
 7. sea-core-01.inet.qwest.net
0.0%  8142  430.5 407.3 324.0 541.3  24.2
 8. spk-core-01.inet.qwest.net
0.0%  8142  440.4 414.0 324.9 470.6  22.2
 9. spk-edge-04.inet.qwest.net
0.0%  8142  441.1 414.9 323.7 539.6  22.6



Testing on XO looks a lot different.

66.236.9.5.ptr.us.xo.net -1 | 1034 | 1031 |1 |   47
|  112 |   53 |
|  p6-0-0d0.mar1.seattle-wa.us.xo.net -1 | 1033 | 1030 |1 |   48
|  170 |   50 |
|  p4-2-0d0.rar1.seattle-wa.us.xo.net -1 | 1033 | 1031 |1 |   47
|  168 |   51 |
|  te-3-1-0.rar3.seattle-wa.us.xo.net -0 | 1033 | 1033 |2 |   46
|  170 |   54 |
| 207.88.13.145.ptr.us.xo.net -1 | 1033 | 1032 |1 |   48
|  113 |   52 |
|216.156.100.18.ptr.us.xo.net -0 | 1033 | 1033 |2 |   49
|  297 |   50 |
|  agg1-sea-p10.bb.spectrumnet.us -0 | 1033 | 1033 |2 |   47
|  239 |   52 |
|tierpoint-sea-1000m.demarc.spectrumnet.us -1 | 1033 | 1032 |9 |
54 |  249 |   56 |





Any assistance would be appreciated, confirmation would be excellent, this
is causing issues.

Thank you

E


ps - I will turn off my MTR shortly, I don't use it much anymore.


Re: ISP customer assignments

2009-10-13 Thread eric clark
So far, I have only dabbled with IPv6, but my reading of the RFCs is that
VLSM for lengths beyond /64 is not required. Subsequently, to use anything
longer is an enormous gamble in an enterprise environment. I envision
upgrading code one day and finding that your /127 isn't supported any more
and they forgot to mention it. I'll stick to /64, though it does seem a
horrible waste of space.

Someone else might have read the RFC differently though.


Eric Clark


Re: BGP or MPLS issue ATT in New York?

2009-10-02 Thread eric clark
A friend of mine has services on through yieldbook (in new York) that
he accesses from Santa Barbara. He noticed he couldn't get to them
around 2pm via his Cox cable inet link, dieing after
gar9.n54ny.ip.ATT.net (12.122.131.245), but from his Verizon link, he
had no issues. The problem persists currently.

On Friday, October 2, 2009, David Hiers hie...@gmail.com wrote:
 We're back up now.



 On Fri, Oct 2, 2009 at 1:16 PM, Wallace Keith kwall...@pcconnection.com 
 wrote:

 -Original Message-
 From: Christopher J. Pilkington [mailto:christopher.j.pilking...@gmail.com]
 Sent: Friday, October 02, 2009 4:01 PM
 To: nanog@nanog.org
 Subject: BGP or MPLS issue ATT in New York?

 Anyone notice anything bizarre with ATT in New York?  We had our cage
 at 811 10th Avenue (advertised by AS7018) unreachable from several
 other providers for about 20 minutes, it just recently came back.

 At the same time, we lost MPLS service (not link, forwarding across
 the cloud) at another site with ATT.  Both issues resolved
 simultaneously.

 Just curious...
 Chris

 In addition to Verizon Business ip issues, we lost an ATT private line at 
 the same time, but it has come back up. Fiber cut or power somewhere?
 This was at 15:17 Eastern..

 -Keith






Re: Data Center testing

2009-08-26 Thread eric clark
Most Provider type datacenters I've worked with get a lot of flak from
customers when they announce they're doing network failover testing, because
there's always going to be a certain amount of chance (at least) of
disruption. Its the exception to find a provider that does it I think (or
maybe just one that admits it when they're doing it). Power tests are a
different thing.
As for testing your own equipment, there are a couple ways to do that,
regular failover tests (quarterly, or more likely at 6 month intervals),
and/or routing traffic so that you have some of your traffic on all paths
(ie internal traffic on one path, external traffic on another). The latter
doesn't necessarily tell you that your failover will work perfectly, only
that all your gear in the 2nd path is functioning. I prefer doing both.

When doing the failover tests, no matter how good your setup is, there's
always a chance for taking a hit, so I
always do this kind of work during a maintenance window, not too close
to quarter end, etc.
If you have your equipment set up correctly of course, it goes like butter
and is a total non-event.

For test procedure, I usually pull cables. I'll go all the way to line cards
or power cables if I really want to test, though that can be hard on
equipment.

E



On Mon, Aug 24, 2009 at 10:45 AM, Jack Bates jba...@brightok.net wrote:

 Dan Snyder wrote:

 We have done power tests before and had no problem.  I guess I am looking
 for someone who does testing of the network equipment outside of just
 power
 tests.  We had an outage due to a configuration mistake that became
 apparent
 when a switch failed.  It didn't cause a problem however when we did a
 power
 test for the whole data center.


 The plus side of failure testing is that it can be controlled. The downside
 to failure testing is that you can induce a failure. Maintenance windows are
 cool, but some people really dislike failures of any type which limits how
 often you can test. I personally try for once a year. However, a lot can go
 wrong in a year.

 Jack