practical subnet sizes smaller than /26, /27, ...

2003-11-21 Thread John Martin
I'm looking for research / surveys on how enterprises and service providers 
really use subnetting within their networks. In particular, I'm interested 
in the size of subnets that people are regularly using and I'm interested 
in both public and private addressed networks (which I'm assuming, perhaps 
incorrectly, to be different).  Note that I'm not looking for best practice 
or what's possible - I'm interested in what people actually do.

Any pointers appreciated. Please respond to me directly - if people are 
interested, I'll summarize any answers I get and repost to the list. Also, 
if you think there is a more appropriate place for this question, please 
let me know.

Thanks,
John
---
Network Appliance Inc. Tel: +1 347 613 2259
230 Park Avenue, Suite 834   Voicemail: +1 408 822 8606
New York, NY 10169
USA
---





Re: recommendation against publication of draft-cerpa-necp-02.txt

2000-04-10 Thread John Martin

I have held off commenting until I saw what the IETF community at large 
would have to say. Disclosure: I work for Network Appliance, was involved 
in the very early stages (though not latterly) of NECP and fully support 
its publication as an Informational RFC. I am also co-chair of WREC.

As has happened when this document was previously discussed by the IESG, 
the discussion inevitably takes a turn towards a discussion of 
"transparent" caching (latterly renamed "interception proxies" by WREC). 
Let me be absolutely clear, NECP is about communication between server 
load-balancers (SLB) and the back-end servers they speak to. Nothing more, 
nothing less. The fact that one common use of these is for caching proxies, 
and that these are used as an example, does not mean that NECP in any way 
specifies how "transparent" or "redirection" takes place.

[In fact, the most common deployment of these type of service load 
balancers is non-transparent (i.e. where the user configures their browser 
with a proxy IP address which is, in fact, a load-balancing element talking 
to a number of back-end servers). For a discussion of "transparent" versus 
"non-transparent" proxies, please refer to draft-ietf-wrec-taxonomy-03.txt.]

However, that is by far not the only application. DNS, web servers and 
firewall load balancing are the three other main applications for SLBs.

Now, let me address each of the original concerns in turn. Note that I have 
done this privately to Keith on many occasions as well as to the IESG, IAB 
and others on the WREC WG list.

At 12:41 PM 06/04/00 -0400, Keith Moore wrote:
>1. The document repeatedly, and misleadingly, refers to NECP as a
>standard.  I do not believe this is appropriate for a document
>which is not on the IETF standards track.  It also refers to
>some features as "mandatory" even though it's not clear what
>it means for a non-standard to have mandatory features.

The document is not an IETF standard but it does describe a protocol. For 
protocols to work correctly, there must be certain "mandatory" minimal 
requirements on those implementing that protocol.

I can see one or two places where the word "standard" might be 
misinterpreted by readers if used out of context.

Section 5.2, 5.2.1, 5.2.2, 5.5.1

   "The version number of the protocol defined by this standard is 1."

   "All implementations that adhere to the standard specified in
this document MUST set the version number to 0x1."

   "This type of payload has no structure imposed by this standard."

 "For reasons explained in Section 6.11, this standard only
defines a single performance query type that MUST be
implemented by all NECP nodes:"

I see no problem with changing these. In most cases, simply replacing the 
word "standard" with the word "protocol" would convey the correct meaning 
beyond any reasonable doubt.

>2. A primary purpose of the NECP protocol appears to be to
>facilitate the operation of so-called interception proxies.

Wrong. The primary purpose of NECP is to facilitate a load-balancing 
between SLBs and the services to which they direct traffic. "so-called 
interception proxies" are just one such service.

>Such  proxies violate the Internet Protocol in several ways:

This is not about those proxies - that is a different argument.

I  don't think it is appropriate to be drawn into an argument about the 
rights and wrongs of "interception proxies" when discussing NECP. I am more 
than happy to justify their existence - with hard facts, of course - in a 
separate thread.

Regards,
John

---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: prohibiting RFC publication

2000-04-10 Thread John Martin

At 10:39 AM 10/04/00 -0400, Keith Moore wrote:
> > The I-D in question has been referred to an existing IETF WG for review,
>
>that assertion was made, but not confirmed by the ADs.
>is it really true?  it seems odd because it really isn't in scope for wrec.

Let me jog your memory:

At 06:29 PM 30/12/99 +0100, Patrik Fältström wrote:
>A request has arrived to publish the named document as informational RFC. 
>The IESG wants all documents in this area to explicitely pass the WREC 
>working group, ...

I then sought clarification, re-sent the document to WREC (it had been sent 
before), to determine if there was a conflict - there wasn't. The authors 
re-submitted it.

John

---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: prohibiting RFC publication

2000-04-10 Thread John Martin

At 02:21 PM 10/04/00 -0400, Keith Moore wrote:
> > > > The I-D in question has been referred to an existing IETF WG for 
> review,
> > >
> > >that assertion was made, but not confirmed by the ADs.
> > >is it really true?  it seems odd because it really isn't in scope for 
> wrec.
> >
> > Let me jog your memory:
>
>yes, I remember that wrec said there wasn't a conflict with its work.
>that's not the same thing as wrec discussing whether the approach
>is technically sound or whether the document is worthy of publication.

I appreciate that you cannot attend every working group meeting but the 
document, the approach and the implementation were discussed at all but one 
WREC face-to-face meeting and on the mailing list. We received comments and 
made changes as a result of discussions on WREC.

Note: many of those who are / were active within WREC were / are also 
active in discussing NECP.

John

---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




interception proxies

2000-04-10 Thread John Martin

There has been a lot of discussion about the problems associated with 
so-called "interception proxies". This discussion is very much within the 
charter of the WREC WG. In fact, we even have a current draft whose sole 
purpose is to document such problems.

The known problems draft is at: draft-ietf-wrec-known-prob-01.txt

This is the first of two very useful documents being produced by WREC; the 
first, a taxonomy of terminology is available as: 
draft-ietf-wrec-taxonomy-03.txt; I would suggest you read this first.

To join WREC, use the following:
mailto:[EMAIL PROTECTED]?Subject=subscribe

...or send a note to [EMAIL PROTECTED] with "subscribe" in the subject.

I suggest we move this particular discussion to WREC.

Rgds,
John
---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: interception proxies

2000-04-13 Thread John Martin

Vernon,

At 04:47 PM 11/04/00 -0600, Vernon Schryver wrote:
>Call me a non-team playing scab, but I refuse to the honor the old guild
>work rule that limits the questions I can consider.  If sourcing
>other-owned etc. or anything else is an architectural or other problem,
>then professional pride ought to force one to raise the issue insetad of
>waiting for the AD, IESG, IAB, or a plenary to redirect things.  But I
>realize that's a minority view, and not just in IETF working groups or
>even the IETF.

When WREC was originally proposed to the IESG, its scope was much 
broader. Since the area was, at the time, the subject of much 
confusion, our charter was changed by the IESG to begin with a taxonomy and 
a list of known problems with caching and replication as is done today. At 
the time, I disagreed but complied. With hindsight - and given recent 
discussions - I think that their decision was correct. (If for no other 
reason that we now know what to call these "interception proxy" things).

Most of us who started WREC have indeed an interest in caching and 
replication but not necessarily "interceptions proxies". This type of proxy 
is only one way to do caching / replication - and certainly by no means the 
most common. (The most common - by far - are actually standard, 
run-of-the-mill proxies configured explicitly in users' browsers).

Rgds,
John (WREC co-chair)
---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: interception proxies

2000-04-13 Thread John Martin

Keith,

At 07:59 PM 11/04/00 -0400, Keith Moore wrote:
> > This was a choice - in some larger sense, if sourcing other-owned IP
> > addresses or TCP connections is considered an architectural problem,
> > needs to come down from above, rather than up from WREC.
>
>sounds like a convenient excuse to me...
>where did the wrec folks get the idea that the IP specification was obsolete?

I'm not sure what you are trying to say here but as co-chair of WREC, I can 
tell you that such a concept was never discussed. We stuck pretty rigidly 
to our charter, in fact.

John


---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: recommendation against publication of draft-cerpa-necp-02.txt

2000-04-13 Thread John Martin

At 04:45 PM 11/04/00 -0700, Eliot Lear wrote:
>I wonder if any of the authors has explored the risks of modifying data in
>flight.  How could this be abused by interlopers and evil doers?  If I
>could hack into a router implementing NECP, what damage could I do?  Could
>I start a nasty little JavaScript/Java/Shockwave/... applet in an
>advertisement?
>And who would know it was me?

Do you mean the authors of NECP? If so, then I'm confused because NECP is 
not about "modifying data in flight" - it is about load balancing multiple 
services which sit behind e.g. a single IP address. (i.e. DNS server farms, 
firewalls, proxies). As I have said repeatedly, "interception proxies" is 
only one of these applications and by no means the most widely used.

Are you confusing this with WCCP (which *only* works with "interception 
proxies").

>Quoth John Martin:
> > [...]
> > Let me be absolutely clear, NECP is about communication between server
> > load-balancers (SLB) and the back-end servers they speak to.
>
>Were this so clear in your document my mailbox wouldn't be full of this
>stuff.

The very first sentance says:

"This document describes "NECP", a lightweight protocol for
signalling between servers and the network elements that forward
traffic to them.  It is intended for use in a wide variety of
server applications, including for origin servers, proxies, and
interception proxies."

Despite the fact that "interception proxies" are listed last, they are the 
only service people are talking about.

But, you are right in general: if this is how people read the document, 
we  need to fix the document.

>If it looks like a duck and quacks like a duck, but it's not supposed to be
>a duck, the IESG ought to point out that it's a turkey by so indicating at
>the top of the document.  Also, I'd like to understand why you're not going
>experimental, where it would be expected that you'll correct your mistakes.
>Your choice of "informational" seems unfortunate at best and as
>disingenuous marketing at worst.  I can't tell which.

We used "informational" because we saw that this is what was used for 
HTTP/0.9 with which there are parallels: NECP has existed for some time 
already in slightly differing implementations and this is a codification of 
existing practice. There was no magic of deceit intended. If the IESG 
thinks we should instead go for experimental, I'd be more than happy to 
pursue that instead and bring this into WREC. However, development is not 
within the current WREC charter so we are stuck, I think?

>The fact that you mention interception proxies in the introduction has led
>to this flame war.  Having used the words, you've mentioned none of the
>risks associated with such services both from the server side and the
>client side.

OK - we can fix that. It is not the goal of NECP to describe "interception 
proxies" or their deficiencies. There is, however, a working group which 
has a document aimed at exactly that (amongst other things) - WREC.

>John

---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: recommendation against publication of draft-cerpa-necp-02.txt

2000-04-13 Thread John Martin

At 10:49 AM 13/04/00 -0700, Eliot Lear wrote:
>Part of the problem here is that a knife may be used as a food utensil or a
>weapon.  Safe handling, however, is always required, and should be
>documented.

Granted.

>I would add two other comments.  I tried to locate the RFC for HTTP/0.9,
>but the best I could find was a reference to a CERN ftp site for the
>protocol.

Ooops. s/0.9/1.0 - rfc1945.

>   In any case, by the time HTTP got to the IETF it was deployed
>over a vast number of end stations, and comparisons to it are probably not
>apt.

NECP is a super-set of various load-balancing technologies already deployed 
at thousands of sites.

>Finally, rechartering is precisely what you ought to have done, and should
>do, IMHO.

For the record: this is exactly what we are doing. (We were waiting for the 
two starter documents to be published or at least start their path via the 
IESG).

Rgds,
John

---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: guidance (re: social event politeness)

2000-12-14 Thread John Martin

...and speaking of bad manners, I noticed that there is a resurgence of 
people talking mobile-phone calls in meetings. I was only there for one day 
but it happened twice in three meetings. Another annoyance is those who 
allow it to ring and then cancel the call (presumably using CLI or 
something). This is not as bad but still pretty disruptive, particularly 
for the person speaking at the time.

Please switch them off. You shouldn't need to be asked.

John
---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---




Re: IETF logistics

2000-12-20 Thread John Martin

Let me give you an example of where this didn't work recently. At San 
Diego, we had back-to-back meetings of WREC followed by OPES BoF and CDNP 
BoF. For the most part, there was a very large overlap in the attendance. 
If you did not forgoe the coffee break and - literally! - run between the 
rooms, you did not get a seat. If you were silly enough to engage in even a 
1 minute conversation and walk slowly, you might not have gotten into the 
room at all. This is of course further exacerbated by those who do the IETF 
equivalent of spreading their towels out on the loungers by the pool before 
going for breakfast...

Some folks who had contributed were excluded because the doors had to be 
closed in order to make the meeting audible. In one case, the door was 
opened to admit someone who was on the agenda as speaking.

I don't believe that any of the solutions offered so far will work because 
they depend on the good manners of strangers which, frankly, is largely 
non-existent at IETF meetings.

So, my only suggestion is that WG chairs strongly encourage work to be done 
on the mailing lists, a deference towards non-presentation formats and the 
strong enforcement of timelines in meetings which is, erm, what we're 
supposed to encourage anyway...

John

At 07:35 AM 20/12/00 -0800, Melinda Shore wrote:
> > What happened to the proven and time-honored technique of
>getting
> > to a meeting early if you want a seat?  I know the argument is
>that
> > we want to hang out in the hallways until the last minute and
>still
> > get a seat (because we are more "important" than a bunch of the
>people
> > that did get there early), but still...
>
>I think the problem could, in part, be alleviated
>by physically ejecting from the room people either
>playing games on their laptops or checking their
>portfolios.
>
>Melinda
>(and I'm not kidding)
>
>
>-
>This message was passed through [EMAIL PROTECTED], which
>is a sublist of [EMAIL PROTECTED] Not all messages are passed.
>Decisions on what to pass are made solely by Harald Alvestrand.

---
Network Appliance   Direct / Voicemail: +31 23 567 9615
Kruisweg 799   Fax: +31 23 567 9699
NL-2132 NG Hoofddorp   Main Office: +31 23 567 9600
---