Hi all,
Probably a silly question, but can anyone explain to me this:
3561 3356 9031 {35821,35821,35821,35821} i
To explain it a bit better, I'm looking at real routing information
from routeviews (#3).
According to RFC 4271 (9.2.2.2 Aggregating Routing Information):
For the purpose of
please support draft-wkumari-deprecate-as-sets-00.txt
I just noticed that then - looking through idr list archives. I'll
give it a read..
What is the best way to support, just email the list?
Cheers
I can ping them but not access them over Cogent here in Tysons Corner,
Virginia - looks like a server issue to me.
Want to see something funnier:
http://downrightnow.com/
Exactly the same as what your seeing for facebook. Working icmp, broken http.
I wonder if 10^234 people are all trying to
How can i be sure even if a device blocks my ping , it might have policy
blocking ping at it at all.
Correct in a lot of cases and that is why icmp should not be used by
itself when diagnosing issues.
I am having problem getting ping to work to a specific destination host when
using large
I'm more than interested in developing a much cheaper, hardware
forwarding router..
I think there is a lot of room for innovation - especially at the
target market in this thread.
If anyone wants to work with me on this, just let me know!
I've got a tonne of ideas and a bit of free time..
NetFPGA
Do jitter sensitive applications have problems at all running?
What would you say is the point at which people should be looking for
a hardware forwarding solution?
Differences:
- Hardware forwarding
- Interface options
- Port density
- Redundancy
- Power consumption
- Service Provider stuff -
Oh, support contract!!?
Differences:
- Hardware forwarding
- Interface options
- Port density
- Redundancy
- Power consumption
- Service Provider stuff - MPLS TE? VPLS? VRF??
Any others?
He must have meant the actual chassis/box/case...
Vyatta has hardware forwarding? Real hardware forwarding? Where?
-Original Message-
From: Curtis Maurand [mailto:cmaur...@xyonet.com]
Vyatta has support contracts. If you want hardware, they've got that, too.
Out of curiosity, what led you to this conclusion?
Evidence strongly suggests that AS11296 together with all of the IPv4
space it is currently announcing routes for, i.e.:
have all been hijacked. I will be reporting this formally to ARIN today,
via their helpful fraud reporting web form.
...@mail.gmail.com
Subject: Re: AS11296 -- Hijacked?
From: Heath Jones hj1...@gmail.com
To: Ronald F. Guilmette r...@tristatelogic.com
Cc: nanog@nanog.org
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Out of curiosity, what led you to this conclusion?
Evidence strongly
Out of curiosity, what led you to this conclusion?
A number of factors, actually.
Although I had started to type up a lengthy and elaborate response to
your eminently reasonable question, on second thought, I don't think
that I actually want to go into detail on this case, as anything I
As to his decision to block Gmail (or any other freemail provider),
everyone with sufficient knowledge in the field knows that these
operations are prolific and habitual sources of spam (via multiple
vectors, not just SMTP; Google accounts for more Usenet spam hitting
my filters than all
What's the real-world power consumption and heat like? 455 days shows
some pretty good reliability!
Cheers for the info Curtis
Bottom line, there is more to it than someone just popping up on a list
saying something.
If you have the time to go and investigate all of that yourself, its
good to know you've thought about the metrics you would use.
Sometimes, people do this thing called 'referencing'. Its basically
where
IPVPN arrangement with multiple sites no redundancy for each small site.
RIP to advertise networks from each site towards cloud, quick and easy.
Robert,
I dont think you quite get it. Don't worry, you don't seem to be alone.
The point here is simple. If someone posts making a recommendation for
every AS to filter some prefixes, not provide any references by
default, its not helpful.
When questioned about the rationale, if said person
This is why they need a 'like' button on nanog!! :)
I once had cause to write a RIP broadcast daemon while on-site with a
client; they had some specific brokenness with a Novell server and some
other gear that was fixed by a UNIX box, a C compiler, and maybe 20
or 30 minutes of programming
This is not what the Team Cymru Bogons list for?
http://www.team-cymru.org/Services/Bogons/
I just had a very quick look at that site and it seems at first glance
to just be providing information on unallocated prefixes/ASs..
They are prefixes/ASs that spammers can and do use, but if you have a
Hi all,
Is there an easy way to see which iBGP routes are not being selected
due to next-hop not being in IGP?
Before and after IGP route added shown below, note both are marked as valid..
-- BEFORE IGP--
AS5000_LA#show ip bgp
BGP table version is 5, local router ID is 10.0.0.5
Status codes: s
Cheers Jeff.
I thought i'd give that a go, but it doesnt seem to be working for some reason!
(This is without next-hop in IGP)
AS5000_LA#show ip bgp
BGP table version is 3, local router ID is 10.0.0.5
Status codes: s suppressed, d damped, h history, * valid, best, i - internal,
r
On 30 September 2010 22:11, Jack Carrozzo j...@crepinc.com wrote:
As it was explained to me, the main difference is that you can have $lots of
prefixes in IS-IS without it falling over, whereas Dijkstra is far more
resource-intensive and as such OSPF doesn't get too happy after $a_lot_less
show bgp ipv4 unicast 100.10.0.0/16 why-chosen
Would be insanely useful.
Been in JUNOS show route since day one, and IMHO is easily in the top
10 list of why I still buy Juniper instead of Cisco despite all the
$%^*ing bugs these days.
Its interesting, I was heavy into cisco years back and
Haha It's all good :)
You are right about IS-IS being less resource intensive than OSPF, and
that it scales better!
On 30 September 2010 23:50, Jack Carrozzo j...@crepinc.com wrote:
Both OSPF and IS-IS use Dijkstra. IS-IS isn't as widely used because
of the ISO addressing. Atleast thats my
it seems it gets the bgp route for 147.28.0.0/16 and then can not
resolve the next hop. it would not recurse to the default exit.
of course it was solved by
ip route 147.28.0.0 255.255.0.0 42.666.77.11
but i do not really understand in my heart why i needed to do this.
Neither do I,
On 1 October 2010 06:47, Ronald F. Guilmette r...@tristatelogic.com wrote:
I hope this may ally some of the concern that has been expressed
about me not being more forthcomeing about the details of this case.
Cheers Ron for coming forth with your reasoning, it is appreciated.
Your bit of trust
RIPv2 is great for simple route injection. I'm talking really simple,
just to avoid statics.
And there, my friend, is the crux of the matter. There's almost no place
imagineable where injecting routes from RIPv2 is superior to statics.
Well, let me stimulate your imagination..
IPVPN cloud
Section 9.1.2.1 of RFC 4271 seems to address this.
A few points from that section:
- The BGP NEXT_HOP can not recursively resolve (directly or indirectly)
through the BGP route.
- Only the longest matching route should be considered when resolving the
BGP NEXT_HOP.
- Do not consider
Come one mate, there's no need to be just outright insulting people.
Sure everyone disagrees on some things, but still...
Lets play out this scenario then. What would you recommend ARIN actually do?
I don't mean 'take a stance' or 'have an opinion', but rather what
process should in your mind
On 1 October 2010 12:19, Tim Franklin t...@pelican.org wrote:
Or BGP. Why not?
Of course, technically you could use almost any routing protocol.
OSPF and IS-IS would require more configuration and maintenance, BGP
even more still.
I think this is a pretty good example though of how RIPv2 is
http://finance.yahoo.com/news/Hibernia-Atlantic-to-bw-3184701710.html?x=0.v=1
Roderick S. Beck
Director of European Sales
Hibernia Atlantic
Sales spam - but still - very close to minimum possible latency!
3471 miles @ 186,282 miles/s * 1.5 in glass * 2 round trip = 55.9ms.
Yeah, I wonder when we're gonna see cable that's pumped down to a vacuum in
the center? :)
Start pumping.. :)
Actually, to my surprise, the refractive index in air is quite close
to a vacuum - so I figured we could set up a laser link between NY and
London, with 'yo mama' sitting in a boat in
Tim hit the nail on the head. Maintaining statics on a large network would
become a huge problem. Human error will eventually occur. The network
scenario I am speaking of is DSL/Cable type setups, where a customer could
move from router to router(DSLAM/CMTS) due to capacity re-combines.
On 2 October 2010 10:52, Rod Beck rod.b...@hiberniaatlantic.com wrote:
Is that a straight line calculation or did you take into account that a
straight line is not the shortest path on a curved surface?
Well that is pretty obvious to most, but no - I didn't go to the
effort of factoring in
On 2 October 2010 08:17, Imran Moin imranm...@gmail.com wrote:
Hello All,
I was wondering how long it is taking ARIN these days to assign new IP block
and AS Number. We are a new startup and looking to build our network over
the next few months.
I think they are a bit preoccupied at the
How long do you keep a router in production?
What is your cycle for replacement of equipment?
Hi Franck
It really depends on the type of network you are running, the rate at
which new features bandwidth are required, and the availability of
software and hardware upgrades. Also, in a lot of
By the way, my recollection is the undersea regenerators do purely optical
regeneration.
There is no O-E conversions undersea, only at the landing stations and
terrestrial components.
I'm not clever enough to know of some way that you could do optical
regeneration without converting the
What's that quote again...?
Oh, that's it: The more you know, the more you know you don't.
It feels very appropriate now :)
Cheers Patrick for that great info to everyone who contacted me off-list also!
A halfway-decent description of the physics of how this is done, is
covered in Neal
What's that quote again...?
Oh, that's it: The more you know, the more you know you don't.
It feels very appropriate now :)
I was wondering for quite some time if there was a scientific term for that
effect, since many of us seem to run into the opposite quite often. It turns
out that it's
It depends on the speed of the PCI slot. In saying that, you are only
trying to transfer 1Gb/s.
http://en.wikipedia.org/wiki/PCI_Express
Note the thoughts on there about full duplex..
PCI Express 1.0a
In 2003, PCI-SIG introduced PCIe 1.0a, with a data rate of 250 MB/s
and a transfer rate of 2.5
For 10Gbit we use Intel cards for production service machines, and
ConnextX/Intel in the HPC cluster.
Greg - I've not been exposed to 10G on the server side..
Does the server handle the traffic load well (even with offloading) -
that's a LOT of web requests / app queries per second!
Or are
Erbium Doped Fiber Amplifiers (EDFAs) do not re-shape or re-time the signals
(the last 2 R's in 3R -- re-amplification, re-shaping, and re-timing)
Thanks Chris - even more reading to do :) It's interesting stuff
that's for sure.
This is also pretty cool:
Would it be possible to extract via PLL or similar the source clock
and use that to modulate the amplifier power?
Although you can amplify just a single wavelength with an EDFA (has to be in
the 1550nm range, not 1310nm), most deployments are using EDFAs in a DWDM
environment. The C-band
Certainly, fine folks at Reliance Globalcom Services, Inc. could tell
us who is paying them to connect these hijacked blocks to their network,
but I rather doubt that they are actually going to come clean and do
that.
Ron, I haven't been following this anti-spam stuff much since it went
1) Is spamming from within the US criminal activity?
Sadly, it appears not.
In many cases it is however actionable. (And in other cases involving
actual criminal activity, e.g. as prohibited by 18 USC 1030, `Fraud and
related activity in connection with computers', it may, I think, be
Seems to be only source-prefix-based, but several ISPs in europe are affected.
Can you post source and destination IP's ?
Seems to be only source-prefix-based, but several ISPs in europe are
affected.
source: 131.220.0.0/16, 212.201.68.0/22, 212.201.72.0/21,
destination: 65.122.178.73, 63.228.223.104
traceroute to 65.122.178.73 (65.122.178.73), 30 hops max, 40 byte packets
1 er-rz-gig-3-3.stw-bonn.de
Well, anyway, here's three more hijacked blocks that they (AS6517)
are routing. This is in addition to the 75 such blocks I've already
reported. (I guess that makes 78 hijacked blocks for them, in total.)
Out of curiosity, are you also reporting these blocks to Spamhaus? I expect
their
... random traffic (into) their network via our transit link gets black-holed.
So for the same source destination, sometimes it works, sometimes it doesn't?
they appeared to be black-holing
roughly 1/4 of what we were sending them.
Thanks,
John van Oppen
Spectrum Networks / AS 11404
-Original Message-
From: Thomas Schmid [mailto:sch...@dfn.de]
Sent: Thursday, October 07, 2010 6:10 AM
To: Heath Jones
Cc: nanog@nanog.org
Subject
If anyone from TWTelecom is here, it's probably time to swap out that NPE300
for something with more than 256MB RAM. It's running out of RAM and
resetting all the BGP sessions before they finish getting full routes.
And they have CDP turned on for you?
We are starting to distribute Pica8 Open Source Cloud Switches :
http://www.pica8.com/
Seeing as you claim they are opensource, could you please point to the
documentation of the hardware?
Specifically, I am looking for information regarding the FPGA/ASIC's
used for forwarding circuit
We have dedicated servers. You get a 10 GHz 24-core CPU with 1TB of
RAM. That's pretty clear and familiar to server geeks.
Is that 10 as in Ten?
Hi Monia,
'Burst' is a very broad term. It would be useful to clarify to what you are
referring.. I can think of a few possibilities:
- Data Transmission: The length of an uninterrupted flow of information.
- Traffic Engineering: The ability for traffic to temporarily exceed it's
allocated
I wonder if this is possible:
- Take a hash of the original file. Keep a counter.
- Generate data in some sequential method on sender side (for example simply
starting at 0 and iterating until you generate the same as the original
data)
- Each time you iterate, take the hash of the generated
, Heath Jones said:
I wonder if this is possible:
- Take a hash of the original file. Keep a counter.
- Generate data in some sequential method on sender side (for example
simply
starting at 0 and iterating until you generate the same as the original
data)
- Each time you iterate
up until the actual data.
It's not even a storage issue, as once you have incremented the data you
don't need to store old data or hash values - just the counter. No massive
hash tables.
It's a CPU issue.
On 19 May 2011 00:42, valdis.kletni...@vt.edu wrote:
On Thu, 19 May 2011 00:26:26 BST, Heath
My point here is it IS possible to transfer just a hash and counter value
and effectively generate identical data at the remote end.
Nope. Let's use phone numbers as an example. I want to send you the phone
number 540-231-6000. The hash function is number mod 17 plus 5. So
5402316000 mod
Ha! I was wondering this the whole time - if the size of the counter would
make it a zero sum game. That sux! :)
On 19 May 2011 03:52, Brett Frankenberger rbf+na...@panix.com wrote:
On Thu, May 19, 2011 at 12:26:26AM +0100, Heath Jones wrote:
I wonder if this is possible:
- Take a hash
Hi David - Just a bit of insight from my own experience:
Common issues when monitoring (and the associated escalation processes)
don't work and similar issues are seen as you described:
- Inconsistent HTTP response codes across services and service layers
(nginx vs the backend tomcat), means you
59 matches
Mail list logo