RE: Information on Voice Over IP

2000-03-09 Thread Michael Stilmant
Title: RE: Information on Voice Over IP





here you are


  http://www.fokus.gmd.de/research/cc/glone/projects/ipt/

  http://www.tsufl.edu/williams/Projects/InternetPhone/TSCIS445.htm

  http://www.cis.ohio-state.edu/~jain/refs/ref_voip.htm  

-Original Message-
From: Sarika Gupta [mailto:[EMAIL PROTECTED]]
Sent: jeudi 9 mars 2000 07:36
To: [EMAIL PROTECTED]
Subject: Information on Voice Over IP



Dear Sirs and Madams,


I need information on Voice over IP for one of the technical papers
which I'll be presenting. Could anyone point to really good sites for
that?



Thanks  regds,
Sarika





Re: Re: Critically compare the congestion control on TCP/IP and ATM

2000-03-09 Thread Jianbo Huang

Dear Sir/Madam,

Thank you all for giving me so much information! I have read some, and 
almost get a clear idea of how ATM manage the congestion control. But I 
still get one question: generally speaking, TCP/IP is equal to the 
transport and network layer in the OSI model, and it seems that the ATM 
works on the Data Link Layer (?). They serve different function in the OSI 
model. Through they all have congestion control facility, how to compare 
mechanism in different layer? Does the topic "Critically compare the 
congestion control on TCP/IP and ATM" mean only compare of the algorithms 
of them?

Thank you again for you valuable help!

rgds,

Truly yours,
Jianbo Huang :-)




Re: Information on Voice Over IP

2000-03-09 Thread Henning Schulzrinne

 Michael Stilmant wrote:
 
 here you are
 
   http://www.fokus.gmd.de/research/cc/glone/projects/ipt/
 
 
 http://www.tsufl.edu/williams/Projects/InternetPhone/TSCIS445.htm
 
 
 http://www.cis.ohio-state.edu/~jain/refs/ref_voip.htm
 

See also http://www.cs.columbia.edu/sip
http://www.cs.columbia.edu/~hgs/internet

-- 
Henning Schulzrinne   http://www.cs.columbia.edu/~hgs



history

2000-03-09 Thread Jon Crowcroft


i was looking thru some old archives (1982 on - yes, thats right, from
just before this years college kids were born)
of the original tcp-ip maillist
and came across a message from mark crispin about a broken vax mailer
flooding neighbor mailservers with SYNs..amazing how nothings new

see
http://www-mice.cs.ucl.ac.uk/multimedia/misc/tcp_ip/
for a slightly incomplete archive of it all
i couldn't find any other archive but if someoen does have it, let me
know and i'll delete mine and point at theirs...

one interesting thing is to look at pre-DNS email addresses - so there
used to be this single file we'd all FTP from ISI with the hosts.txt
listing of name/addresses  - then one day we distributed itnow of
course has to haev a .com, and the nameservers have to zone xfer it
all the time tooso plus ca change, plus c'est le mome raths

 cheers

   jon



RE: Re[2]: Re: Critically compare the congestion control on TCP/

2000-03-09 Thread Schipper, Dell

I recall that Larry Roberts a few years ago gave presentations (at
NetWorld+InterOp ?) that compared the congestion avoidance algorithms of
ATM-ABR service to TCP/IP.  I know he has started a new company since
then and I do not have any contact information.

Regards, Dell.
__
Dell Schipper   Phone: (214) 495-6422
Advanced Network Solutions  Fax:   (214) 495-6219
Fujitsu Network Services[EMAIL PROTECTED]
__




RE: Re[2]: Re: Critically compare the congestion control on TCP/

2000-03-09 Thread Paul Ferguson

At 11:16 AM 03/09/2000 -0600, Schipper, Dell wrote:

I recall that Larry Roberts a few years ago gave presentations (at
NetWorld+InterOp ?) that compared the congestion avoidance algorithms of
ATM-ABR service to TCP/IP.  I know he has started a new company since
then and I do not have any contact information.

One of my favorites along those lines was:

"End-to-End Traffic Management Issues in IP/ATM Internetworks,"
draft-jagan-e2e-traf-mgmt-00.txt, S. Jagannath and N. Yin,
August 1997.

- paul

[snip]

Abstract

This document addresses the end-to-end traffic management issues in
IP/ATM internetworks. In the internetwork environment, the ATM
control mechanisms (e.g., Available Bit Rate (ABR) and UBR with Early
Packet Discard (EPD)) are applicable to the ATM subnetwork, while the
TCP flow control extends from end to end. We investigated the end to
end performance in terms of TCP throughput and file transfer delay in
cases using ABR and UBR in the ATM subnetwork. In this document, we
also discuss the issue of trade-off between the buffer requirements
at the ATM edge device (e.g., Ethernet-ATM switch, ATM router
interface) versus ATM switches inside the ATM network.

Our simulation results show that in certain scenarios (e.g., with
limited edge device buffer memory) UBR with EPD may perform
comparably to ABR or even outperform ABR. We show that it is not
sufficient to have a lossless ATM subnetwork from the end-to-end
performance point of view. The results illustrate the necessity for
an edge device congestion handling mechanism that can couple the ABR
and TCP feedback control loops.  We present an algorithm that makes
use of the ABR feedback information and edge device congestion state
to make packet dropping decisions at the edge of the ATM network.
Using the algorithm at the edge device, the end-to-end performance in
throughput and delay are improved while using ABR as the ATM
subnetwork technology and with small buffers in the edge device.

[snip]



Re: history

2000-03-09 Thread Andrew G. Malis

Jon,

Sigh ... I checked out the archive and noticed my own email in the fall 82 
archive, from when I was managing the NCP to TCP transition on the ARPANET 
(I wrote the code to disable NCP at the IMP interface).  I didn't need to 
be reminded how long I've been doing this stuff ... :-).

Cheers,
Andy

==

At 03:11 PM 3/9/00 +, Jon Crowcroft wrote:

i was looking thru some old archives (1982 on - yes, thats right, from
just before this years college kids were born)
of the original tcp-ip maillist
and came across a message from mark crispin about a broken vax mailer
flooding neighbor mailservers with SYNs..amazing how nothings new

see
http://www-mice.cs.ucl.ac.uk/multimedia/misc/tcp_ip/
for a slightly incomplete archive of it all
i couldn't find any other archive but if someoen does have it, let me
know and i'll delete mine and point at theirs...

one interesting thing is to look at pre-DNS email addresses - so there
used to be this single file we'd all FTP from ISI with the hosts.txt
listing of name/addresses  - then one day we distributed itnow of
course has to haev a .com, and the nameservers have to zone xfer it
all the time tooso plus ca change, plus c'est le mome raths

  cheers

jon

-
This message was passed through [EMAIL PROTECTED], which
is a sublist of [EMAIL PROTECTED] Not all messages are passed.
Decisions on what to pass are made solely by Harald Alvestrand.


Andrew G. Malis  [EMAIL PROTECTED]  phone:978 952-7414  fax:978 392-2074
Lucent Technologies 1 Robbins RoadWestford, MA 01886



Suggestion for Automated Security Information

2000-03-09 Thread Grreth Jeremiah

This is just to "put the feelers out" with regards to security bug fixes

/ alerts / workarounds and the automation of receiving this type of
information.

Given any heterogeneous environment, platform or network, an
administrator/security professional often needs to keep track of
multiple OS bug lists.  In addition to these lists, there are a number
of applications running on these OS's whose lists must also be monitored

for security alerts and fixes.  A primary concern in the security field
is that as soon as a fix is identified, or a vulnerability is
identified, it is more than likely that it is already being exploited.
Any further delay in fixing the problem, patching your OS for example
only increases the vulnerability of your environment.

My suggestion is to create an Internet Database where vendors /
Emergency Response Teams, may put information in a SPECIFIC format
regarding security alerts etc.

Each vendor could be issued with a bit pattern representing them, and
they may then implement their own bit pattern representing their various

products.  Then when an alert / fix or whatever becomes available they
enter details into this database, using both the vendor an product
pattern.  The two patterns combined would uniquely identify a product.

The overall effect would enable automation to be written that could
query this database ( perhaps simple SQL ) and inform you when one of
the products that you manage has a defect of some sort.  Further, it
could be extended to download the fixes identified, even install them.

Of course there are security considerations in any venture such as
this.  For example, each entry in the database would have to be
digitally signed to avoid unscrupulous people from adding false
information, or trojan "fixes" for example.  Assignment of vendor ID's
should be managed centrally, like IANA did for example.

This is only the tip of the iceberg of possibilities and ideas, but I
would love to know what others think about this.. together the net
can be a safe place.  Monitoring your emails because you subscribed to
70 different bug-traq esque lists is OK, but an automated alerting
system ( as this could easily become ) would be less infallible ( hmm is

that even a proper sentence? )  I nickname this 'CRAAB' - Common
Repository for Advisories/Alerts and Bulletins

Anyway - what do you thing

Garreth J Jeremiah.





Re: Who is interested in wireless cards for the Adelaide IETF meeting?

2000-03-09 Thread Matt Holdrege

At 04:08 PM 3/4/00 -0500, Marcus Leech wrote:
Bill Sommerfeld wrote:
 
 
  I hope the 128 bit "gold" cards use a longer IV..
 
  - Bill
Does anyone know if the 128-bit variant of WEP is openly specified anywhere?

The last I heard RC4 was owned by RSA and not exactly open. But I do have a 
PDF file describing Lucent's WEP implementation a layer above RC4, so it 
covers some of the key management details. If you really need it, let me 
know. Also you can read the encryption section of 802.11

With the spinoff of the Enterprise portion of Lucents business, will the
   128-bit variant quietly die?  I hope not (assuming that it's any good, of
course).

Certainly not. But as someone else mentioned, there are U.S. laws or 
regulations restricting sales of 128-bit encryption overseas. So I kind of 
doubt it will be enabled on the base stations in Adelaide. But I suppose 
you can purchase such cards in the U.S. and they will work fine in Adelaide 
with encryption turned off.

As for pricing, note that the price for the cards that will be sold in 
Adelaide are in Australian dollars which are valued quite differently than 
U.S. dollars.

Disclaimer: I am neither a lawyer or a crypto expert. Nor do I work in the 
Wavelan division of Lucent. I'm just lamely trying to help.




MMDS knowledge

2000-03-09 Thread Manohar Menon

Hi all
 

 I like to know whether anyone has address MMDS deployed within your enviroment. Pls 
let me know if you are able to provide me some information on this technology. 

 regards 
 mano

Thanks and Best Regards
 Have a Good Day 

 Manohar Menon 
 Fixed Network Planning Products
 Plot 12155  ( Lot 13),  
 Jalan Delima 1/1,
 Subang Hi-Tech Ind. Est Park 
 4 Shah Alam
 Selangor
 Malaysia 
 Tel : 006 03 580 1967 
 Fax : 006 03 580 1412

 Matt Holdrege [EMAIL PROTECTED] 03/10 10:29 AM 
At 04:08 PM 3/4/00 -0500, Marcus Leech wrote:
Bill Sommerfeld wrote:
 
 
  I hope the 128 bit "gold" cards use a longer IV..
 
  - Bill
Does anyone know if the 128-bit variant of WEP is openly specified anywhere?

The last I heard RC4 was owned by RSA and not exactly open. But I do have a 
PDF file describing Lucent's WEP implementation a layer above RC4, so it 
covers some of the key management details. If you really need it, let me 
know. Also you can read the encryption section of 802.11

With the spinoff of the Enterprise portion of Lucents business, will the
   128-bit variant quietly die?  I hope not (assuming that it's any good, of
course).

Certainly not. But as someone else mentioned, there are U.S. laws or 
regulations restricting sales of 128-bit encryption overseas. So I kind of 
doubt it will be enabled on the base stations in Adelaide. But I suppose 
you can purchase such cards in the U.S. and they will work fine in Adelaide 
with encryption turned off.

As for pricing, note that the price for the cards that will be sold in 
Adelaide are in Australian dollars which are valued quite differently than 
U.S. dollars.

Disclaimer: I am neither a lawyer or a crypto expert. Nor do I work in the 
Wavelan division of Lucent. I'm just lamely trying to help.





Re: Suggestion for Automated Security Information

2000-03-09 Thread Grreth Jeremiah

Sir, I thank your for your comments, and agree that perhaps this was not the
correct forum, however give the vast reach of the people monitoring this list,
the variety of responses, and opinion would have been usefull.

Unfortunatly, either I mis-explained myself, or you mis-understood.  The
purpose of CRAAB is to enable automation of tools to discover
vulnerabilities.  At present CERT does an excellent job of keeping the
security world posted, however it is unreasonable for Miss Jane Bloggs, sat at
home on her windows 98 pentium III 500, to know aboult, let alone moniter
CERT.  Disregard for EVERYONE is the commonality that has thus far allowed
remote penetratrion of machines through such mechanisms as VERY WELL KNOWN RPC
VULNERABILITIES, which have further permitted the recent DDoS attacks.

Your candid disregard for this simple fact may explain how eager you were to
disregard my suggestion without quandry.

In addition to 'la fammile Bloggs' the fact that CERT caters mainly for OS's (
although admittedly not exclusivley )  however there are many products
installed in corporate environments, ISP environments and the home user
environment that can, and do, cause vulnerabilities in the security of that
system.  Many of these products never make it to CERT.

Maintaining levels of code on systems ( such as keeping up to date with
Sendmail or Kerberos ) are vital tasks, which may have a delay of a few days
from being released to Mr Sys Admin discovering this fact.  Utilising the
suggestion of CRAAB, this information can be automatically discovered by
ANYONE with an interest in product X, spanning the whole sphere of what a user
has on their machine, not just the OS.

  Further, it
 could be extended to download the fixes identified, even install them.

Somehow, that doesn't sound like a step in the right direction, but
maybe that's merely because third party patch serving schemes have had
such interesting histories.

Agreed, this is where deeper consideration is required.  Steps such as this
have allready been made, like Flash upgrading the OS of your cable receiver
over the cable feed for example.  Installation is an option that need not be
considered, however an option it is.

  ...  Monitoring your emails because you subscribed to
 70 different bug-traq esque lists is OK, but an automated alerting
 system ( as this could easily become ) would be less infallible ...

If you watch 70 different bug-track lists, then you must like hearing a
lot of noise and nonsense.  Most reports of security problems from most
sources are rumors of misunderstood problems or worse.  Even CERT is not
immune to the Chicken Little Syndrom.

Please accept my appologies for attempting mild humor, or slight sarchasm.
however these were bug traq ESQUE and not BUG TRAQ - per se.  An attempt to
illustrate that if you install an OS, and 15 different applications for
example then it is clearly possible that you could b monitoring approx 20
lists, an OS bugs/fixes list, CERT / SANS / X-Force / AUSCERT etc, plus each
product mailing list looking for developments and incrimental corrections.
Just think how many web sites you visit in 1 day ( disregarding Playboy ) just
to keep up on development ( in terms of codefixes ) for your system.

Remember that the view of security does not just include the "OH damn XYZ has
been broken into" and given that the vendors the Chicken Little Syndrome can
be avoided - ie only verified occurences get entered, this is the realm of
process however.  As said vendors would supply the data so, as opposed to
sifting through CERT Advisories for the Vulnerable Systems section to see if
this one applies to your OS, you can focus immediatley on ONLY those products
/ systems you have.  your CRAAB agent could run twice daily, examine CRAAB and
then report any findings directly to you.

This cuts across many fields such as Databases, Cryptography, Systems
Integration / Impplimentation and others.

Anyway, I thank you for your comments and welcome anyone to send their
comments directly do me if they fear that this conversation may pollute the
waters that are these mailing lists  I also appologise if my candid, pseudo
sarchastic method of penning ( typing ) offends you - just making light of the
corespondance...Thanks

Garreth J...

Vernon Schryver wrote:

  From: Grreth Jeremiah [EMAIL PROTECTED]

  ...
  Given any heterogeneous environment, platform or network, an
  administrator/security professional often needs to keep track of
  multiple OS bug lists. ...

  My suggestion is to create an Internet Database where vendors /
  Emergency Response Teams, may put information in a SPECIFIC format
  regarding security alerts etc.
  ...

 How is this problem related to the work of the IETF?  Isn't the
 IETF supposed to be about protocols?

 How would this suggestion differ from CERT, besides trivia such as who
 sponsors the announcements and pays for the