Trouble with Marconi ASX-200BX
Hi, sorry for a little offtopic. But i don´t knew a better place for hopefully find help. We had a little trouble when trying to configure a new Marconi Fore ASX-200BX ATM Switch with an running config from another Marconi ASX-200BX. Some of the config commands, seemed not to be known by the newer Foreos 7.1 on the new. we tried to do downgrade the Foreos on the new Marconi Fore ASX-200BX ATM Switch. Installed was Foreos7.1 on a Pentium based SCP (SCP-ASXp5), careless we decided to delete the whole files and wanted to copy the Foreos7.0 files from another System. We backuped the Files to a tftp server, and then we deleted the folders :( No we have the Problem, that we could not create a folder LD7.0 to copy the files from the other System. And we can´t go back with the saved files, because we was to fast to delete the LD7.1 folder :( We have access to Webfrontend and console. But i´m afraid that the SCP is electronic trash if i try to boot now. I think there are 2 possible solutions to solve our Problem: 1. someone could tell us, how to create a folder and we copy the saved files back to the flash Looking back and thinking about what we have tried, and realization how naive we have acted, in my eyes the best way. 2. We make a system uprade and this upgrade will recreate the files. Our Problem with the second solution is, that we can´t find a download link for a System upgrade file, like discriped in the manual. We tried to get an public account for the Software http://tactics.marconi.com/services/index.cgi?loadPage=software/software.cgi/atm_switch But we did not get an answer on our request since more then 2 days. Could anyone help us ? Or did we create electronic trash? thanks Bjoern
Re: Going dual-stack, how do apps behave and what to do as an operator (Was: Apple Airport Extreme IPv6 problems?)
In article [EMAIL PROTECTED] you write: On 9/15/07, Jeroen Massar [EMAIL PROTECTED] wrote: [spam: Check http://www.sixxs.net/misc/toys/ for an IPv6 Toy Gallery :)] Somewhat long, hopefully useful content follows... Barrett Lyon wrote: [..] [ clip ] Of course when there is only a A or only that protocol will be used. All applications are supposed to use getaddrinfo() which sorts these addresses per the above specification, the app should then connect() to them in order, fail/timeout and try the next one till it Since when is a timeout on the Internet ok? Haven't we moved beyond that? You mean to say you get 100% connectivity with IPv4? This is a controllable timeout. We don't have to do it, which is the point. What's the right way to do this? Thank you, and thank you Barret for starting the thread. :-) -M I've been running dual stacked for 5 years with a trans pacific tunnel to HE (10 hops). While there have been the occasional glitch I don't see much difference between IPv4 and IPv6. Work has also been running dual stacked. I very rarely fall back to IPv4, and given my usage patterns I do notice when IPv6 connectivity fails. Looping through the addresses as returned by getaddrinfo is a reasonable strategy. Mark
Re: Going dual-stack, how do apps behave and what to do as an operator (Was: Apple Airport Extreme IPv6 problems?)
On 9/21/07, Mark Andrews [EMAIL PROTECTED] wrote: In article [EMAIL PROTECTED] you write: On 9/15/07, Jeroen Massar [EMAIL PROTECTED] wrote: [spam: Check http://www.sixxs.net/misc/toys/ for an IPv6 Toy Gallery :)] Somewhat long, hopefully useful content follows... Barrett Lyon wrote: [..] [ clip ] Of course when there is only a A or only that protocol will be used. All applications are supposed to use getaddrinfo() which sorts these addresses per the above specification, the app should then connect() to them in order, fail/timeout and try the next one till it Since when is a timeout on the Internet ok? Haven't we moved beyond that? You mean to say you get 100% connectivity with IPv4? I mean to say that I don't willingly set out to deliver 100%.
The Cidr Report
This report has been generated at Fri Sep 21 21:15:31 2007 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org for a current version of this report. Recent Table History Date PrefixesCIDR Agg 14-09-07236349 151825 15-09-07236070 151835 16-09-07236109 152308 17-09-07236118 152532 18-09-07236066 151062 19-09-07236385 151712 20-09-07236600 152621 21-09-07237054 151477 AS Summary 26351 Number of ASes in routing system 11122 Number of ASes announcing only one prefix 1943 Largest number of prefixes announced by an AS AS4538 : ERX-CERNET-BKB China Education and Research Network Center 89017856 Largest address span announced by an AS (/32s) AS721 : DISA-ASNBLK - DoD Network Information Center Aggregation Summary The algorithm used in this report proposes aggregation only when there is a precise match using the AS path, so as to preserve traffic transit policies. Aggregation is also proposed across non-advertised address space ('holes'). --- 21Sep07 --- ASnumNetsNow NetsAggr NetGain % Gain Description Table 237334 1514068592836.2% All ASes AS4538 1943 707 123663.6% ERX-CERNET-BKB China Education and Research Network Center AS4755 1418 388 103072.6% VSNL-AS Videsh Sanchar Nigam Ltd. Autonomous System AS18566 1027 107 92089.6% COVAD - Covad Communications Co. AS4323 1327 429 89867.7% TWTC - Time Warner Telecom, Inc. AS11492 1149 355 79469.1% CABLEONE - CABLE ONE AS6478 1129 374 75566.9% ATT-INTERNET3 - ATT WorldNet Services AS4134 1076 340 73668.4% CHINANET-BACKBONE No.31,Jin-rong Street AS9498 1006 396 61060.6% BBIL-AP BHARTI BT INTERNET LTD. AS19262 777 190 58775.5% VZGNI-TRANSIT - Verizon Internet Services Inc. AS18101 600 60 54090.0% RIL-IDC Reliance Infocom Ltd Internet Data Centre, AS17488 806 282 52465.0% HATHWAY-NET-AP Hathway IP Over Cable Internet AS6197 1033 516 51750.0% BATI-ATL - BellSouth Network Solutions, Inc AS8151 922 409 51355.6% Uninet S.A. de C.V. AS15270 579 71 50887.7% AS-PAETEC-NET - PaeTec Communications, Inc. AS7545 728 233 49568.0% TPG-INTERNET-AP TPG Internet Pty Ltd AS7018 1498 1015 48332.2% ATT-INTERNET4 - ATT WorldNet Services AS2386 1216 743 47338.9% INS-AS - ATT Data Communications Services AS19916 568 101 46782.2% ASTRUM-0001 - OLM LLC AS4812 547 103 44481.2% CHINANET-SH-AP China Telecom (Group) AS4766 809 366 44354.8% KIXS-AS-KR Korea Telecom AS17676 502 63 43987.5% JPNIC-JP-ASN-BLOCK Japan Network Information Center AS5668 651 233 41864.2% AS-5668 - CenturyTel Internet Holdings, Inc. AS9443 476 82 39482.8% INTERNETPRIMUS-AS-AP Primus Telecommunications AS7011 940 570 37039.4% FRONTIER-AND-CITIZENS - Frontier Communications of America, Inc. AS4808 492 124 36874.8% CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network AS16814 426 77 34981.9% NSS S.A. AS4668 517 169 34867.3% LGNET-AS-KR LG CNS AS22773 772 444 32842.5% CCINET-2 - Cox Communications Inc. AS16852 400 74 32681.5% BROADWING-FOCAL -
BGP Update Report
BGP Update Report Interval: 20-Aug-07 -to- 20-Sep-07 (32 days) Observation Point: BGP Peering with AS2.0 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS4538 1090414 1.8% 445.1 -- ERX-CERNET-BKB China Education and Research Network Center 2 - AS4323 687708 1.1% 497.3 -- TWTC - Time Warner Telecom, Inc. 3 - AS4755 672986 1.1% 470.9 -- VSNL-AS Videsh Sanchar Nigam Ltd. Autonomous System 4 - AS18566 628015 1.0% 612.1 -- COVAD - Covad Communications Co. 5 - AS4134 594495 1.0% 435.8 -- CHINANET-BACKBONE No.31,Jin-rong Street 6 - AS6197 585932 0.9% 564.5 -- BATI-ATL - BellSouth Network Solutions, Inc 7 - AS174555362 0.9% 558.2 -- COGENT Cogent/PSI 8 - AS9583 535054 0.9% 451.9 -- SIFY-AS-IN Sify Limited 9 - AS9498 534747 0.9% 519.7 -- BBIL-AP BHARTI BT INTERNET LTD. 10 - AS7011 467287 0.8% 490.8 -- FRONTIER-AND-CITIZENS - Frontier Communications of America, Inc. 11 - AS22773 459810 0.7% 592.5 -- CCINET-2 - Cox Communications Inc. 12 - AS4766 451250 0.7% 554.4 -- KIXS-AS-KR Korea Telecom 13 - AS209424152 0.7% 549.4 -- ASN-QWEST - Qwest 14 - AS18101 355691 0.6% 574.6 -- RIL-IDC Reliance Infocom Ltd Internet Data Centre, 15 - AS852352117 0.6% 577.2 -- ASN852 - Telus Advanced Communications 16 - AS6198 347932 0.6% 594.8 -- BATI-MIA - BellSouth Network Solutions, Inc 17 - AS3356 330082 0.5% 490.5 -- LEVEL3 Level 3 Communications 18 - AS4812 326380 0.5% 569.6 -- CHINANET-SH-AP China Telecom (Group) 19 - AS19916 311346 0.5% 548.1 -- ASTRUM-0001 - OLM LLC 20 - AS4808 288058 0.5% 586.7 -- CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network TOP 20 Unstable Origin AS (Updates per announced prefix) Rank ASNUpds % Upds/PfxAS-Name 1 - AS26829 32197 0.1% 32197.0 -- YKK-USA - YKK USA,INC 2 - AS43403 37648 0.1% 18824.0 -- SVIAZ-PLUS-AS LLC Sviaz Plus 3 - AS22072 10539 0.0% 10539.0 -- 4 - AS151269124 0.0%9124.0 -- ASMC - American Suzuki Motor Corporation 5 - AS272896763 0.0%6763.0 -- CLEOCOMMUNICATIONS - CLEO COMMUNICATIONS INC 6 - AS10275 13514 0.0%6757.0 -- AS-UNITEDNETWORK - ABS-CBN International 7 - AS36011 10367 0.0%5183.5 -- AHSYS-ASN - Atlantic Health System 8 - AS926412895 0.0%4298.3 -- ASNET Academic Sinica 9 - AS30707 12427 0.0%4142.3 -- 10 - AS426113504 0.0%3504.0 -- HOSTUA-AS hosing.com.ua AS 11 - AS13285 23861 0.0%3408.7 -- OPALTELECOM-AS Opal Telecom 12 - AS326503335 0.0%3335.0 -- SANDHILLS-SW - SANDHILLS PUBLISHING 13 - AS308506213 0.0%3106.5 -- DESMIE-AS Hellenic Trasmission System Operator S.A. 14 - AS163122359 0.0%2359.0 -- ASN-ZWEITWERK # AS-ZWEITWERK CONVERTED TO ASN-ZWEITWERK FOR RPSL COMPLIANCE Zweitwerk GmbH Co KG 15 - AS34770 15636 0.0%2233.7 -- ELITSAT-AS Elit SAT AD - Rousse 16 - AS39396 13230 0.0%2205.0 -- NBIS-AS NBI Systems Ltd. 17 - AS30619 41094 0.1%2054.7 -- TDM-AS 18 - AS303751973 0.0%1973.0 -- TEVA-NA - Teva Pharmaceuticals USA, INC 19 - AS208161877 0.0%1877.0 -- IIP-NET-AS20816 Science and Society Telecomm Center 20 - AS198741774 0.0%1774.0 -- CDI-01 - CUSTOM DIRECT TOP 20 Unstable Prefixes Rank Prefix Upds % Origin AS -- AS Name 1 - 221.135.22.0/24 48066 0.1% AS9583 -- SIFY-AS-IN Sify Limited 2 - 221.135.113.0/24 36781 0.1% AS9583 -- SIFY-AS-IN Sify Limited 3 - 209.163.125.0/24 36095 0.1% AS14390 -- CORENET - Coretel America, Inc. 4 - 12.108.254.0/24 32197 0.1% AS26829 -- YKK-USA - YKK USA,INC 5 - 202.56.250.0/24 30371 0.1% AS9498 -- BBIL-AP BHARTI BT INTERNET LTD. 6 - 203.101.87.0/24 29098 0.1% AS9498 -- BBIL-AP BHARTI BT INTERNET LTD. 7 - 80.243.64.0/2028041 0.0% AS21332 -- NTC-AS New Telephone Company 8 - 193.46.60.0/2425873 0.0% AS43403 -- SVIAZ-PLUS-AS LLC Sviaz Plus 9 - 210.18.10.0/2424815 0.0% AS9583 -- SIFY-AS-IN Sify Limited 10 - 62.24.238.0/2422513 0.0% AS13285 -- OPALTELECOM-AS Opal Telecom 11 - 117.58.192.0/19 22339 0.0% AS7491 -- PI-PH-AS-AP PI-PHILIPINES 12 - 210.214.173.0/24 19001 0.0% AS9583 -- SIFY-AS-IN Sify Limited 13 - 210.214.221.0/24 18935 0.0% AS9583 -- SIFY-AS-IN Sify Limited 14 - 210.214.177.0/24 18923 0.0% AS9583 -- SIFY-AS-IN Sify Limited 15 - 210.214.220.0/24 18913 0.0% AS9583 -- SIFY-AS-IN Sify Limited 16 - 221.135.77.0/24 18907 0.0% AS9583 -- SIFY-AS-IN Sify Limited 17 - 210.214.210.0/24 18798 0.0% AS9583 --
Re: Going dual-stack, how do apps behave and what to do as an operator (Was: Apple Airport Extreme IPv6 problems?)
On 21-sep-2007, at 7:54, Martin Hannigan wrote: All applications are supposed to use getaddrinfo() which sorts these addresses per the above specification, the app should then connect() to them in order, fail/timeout and try the next one Since when is a timeout on the Internet ok? Haven't we moved beyond that? This is a controllable timeout. We don't have to do it, which is the point. What's the right way to do this? I agree that it's not acceptable to engineer things such that timeouts occur by design. However, things tend to break, and in those situations it's important to recover as well as can be expected. So the correct way to operate here is for the network designer to make reasonably sure (unreliable datagram etc) that everything works, for the stack designer to make sure that there is a good algorithm for selecting the best combination of destination and source addresses and for the application to cycle through all addresses if the two former efforts weren't completely successful.
Bee attack, fiber cut, 7-hour outage
http://www.chron.com/disp/story.mpl/ap/tx/5148125.html (AUSTIN) Telephone service was out for seven hours in rural Central Texas after bees attacked a construction worker, causing him to jump off his tractor and hit a lever that lowered an auger that sliced a fiber-optic line.
Re: Bee attack, fiber cut, 7-hour outage
Sean Donelan wrote: http://www.chron.com/disp/story.mpl/ap/tx/5148125.html (AUSTIN) Telephone service was out for seven hours in rural Central Texas after bees attacked a construction worker, causing him to jump off his tractor and hit a lever that lowered an auger that sliced a fiber-optic line. Is this a 7 hour outage a comment on rural Central Texas availability of fiber splicers or novel ways fiber gets cut? Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? Deepak
Re: Bee attack, fiber cut, 7-hour outage
On Sep 21, 2007, at 2:38 PM, Deepak Jain wrote: Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? We had a customer hit by this, and actually saw services restored for a few minutes in just four hours, but then they went back down. --Chris
Re: Bee attack, fiber cut, 7-hour outage
On Fri, 21 Sep 2007 15:38:30 EDT, Deepak Jain said: Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? I'm not in Texas, but I am rural - there's plenty of places around here where it's just not economically feasible to run 2 diverse fiber paths to a town. Heck, a lot of these places didn't get their *first* fiber until fairly recently. http://maps.google.com/maps?f=qhl=engeocode=q=grundy,+virginaie=UTF8ll=37.279107,-82.099457spn=0.414686,0.782776t=hz=11om=1 Not a place you'll find a redundant SONET ring. ;) pgpg7EoG7QBlM.pgp Description: PGP signature
Re: Bee attack, fiber cut, 7-hour outage
On Fri, 21 Sep 2007, Deepak Jain wrote: Is this a 7 hour outage a comment on rural Central Texas availability of fiber splicers or novel ways fiber gets cut? Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? Sure, if: 1. the protect path is configured and enabled 2. both the working and protect paths don't run through the same conduit/duct/buffer jms
Long-haul protected services: (was: Re: Bee attack, fiber cut, 7-hour outage)
I'm forking this thread to complain about vendor L's international long haul network. Protected Sonet service (T3). DC to UK. I see more outage notifications than you'd *believe* since the service was established for a customer a few weeks ago. Whether its mandatory fiber relocation or some work in France... or all of the above. Now, getting a notification about a 50ms switch hit for protected service is great. No worries or concerns -- even superlative. However, when I see Location of Maintenance: France and a 5 minute outage for a protected SONET service on a supposedly redundant, high quality International voice/data network... well, let's just say I'm not impressed -- on 36 hrs notice, no less. I can't do anything with respect to an SLA since there is advanced notice, but isn't it reasonable to assume that in this day-and-age running a properly protected T3 isn't *that hard* anymore Especially in advance -- you know, shunt the traffic to one your other circuits because, you know, you are supposed to have this massive network. I think I just put my naive hat on today and I need to go drink a little clue. I'm sure I'll be applying some clue with a manual re-route over another Vendor's network shortly. ;) Deepak
Re: Bee attack, fiber cut, 7-hour outage
Speaking on Deep Background, the Press Secretary whispered: Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? Sure, if: 1. the protect path is configured and enabled 2. both the working and protect paths don't run through the same conduit/duct/buffer Look up zip 95428. There is one route in, period. Power is on one side of the road, phone copper the other. My customer gave up and moved out after PacBell wanted 3-4 years to get glass in... -- A host is a host from coast to [EMAIL PROTECTED] no one will talk to a host that's close[v].(301) 56-LINUX Unless the host (that isn't close).pob 1433 is busy, hung or dead20915-1433
New TransPacific Cable Projects:
This is what happens when I stay late at the office on a Friday. http://www.commsday.com/node/186 - Google participating in a new Transpacific Cable Project http://www.networkworld.com/news/2006/121806-verizon-business.html - Verizon on a different transpacific project And all the same articles say there is already an overpriced glut of capacity along these routes and a glut of fiber laying ocean vessels. Good times. Rather than having competition, everyone is just building their own routes that they won't share at wholesale prices to folks in the wholesale buying business. :) Ahh... reminds me of the late 90s when everyone was building dark fiber networks for the surge of demand that was coming. Now, the remaining folks are buying up all the unused bits to constrain capacity. If I were a stakeholder in transpacific cables, I'd be leasing up the next 3-6 years of the entire global cable laying fleet. :) Deepak Jain AiNET
Re: Bee attack, fiber cut, 7-hour outage
On Fri, Sep 21, 2007 at 04:49:22PM -0400, Justin M. Streiner wrote: Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? Sure, if: 1. the protect path is configured and enabled 2. both the working and protect paths don't run through the same conduit/duct/buffer I am continually amazed at how often this is the case. I realize that it's expensive to run these lines but when you put your working and protect in the same cable or different cables in the same trench (not even a trench a few feet apart, but the same trench and same innerduct), you have to EXPECT that you're gonna have angry customers. And yet when telco folks learn that this has occured, they often fein being as surprised as the customers. Truely amazing. --- Wayne Bouchard [EMAIL PROTECTED] Network Dude http://www.typo.org/~web/
Re: Bee attack, fiber cut, 7-hour outage
I realize that it's expensive to run these lines but when you put your working and protect in the same cable or different cables in the same trench (not even a trench a few feet apart, but the same trench and same innerduct), you have to EXPECT that you're gonna have angry customers. And yet when telco folks learn that this has occured, they often fein being as surprised as the customers. Has anyone calculated what the cost of doing this correctly once vs the ongoing support/SLA/etc issues of repairing it when it goes boom is? I've gotta believe that for 90% of the situations where diverse routes exist, just being used as dual linear paths, its cheaper in the long term to do it right and cut the size of your outside plant crew (assigned to break/fix) by 90%. :) Deepak
Re: New TransPacific Cable Projects:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Deepak Jain [EMAIL PROTECTED] wrote: If I were a stakeholder in transpacific cables, I'd be leasing up the next 3-6 years of the entire global cable laying fleet. :) The people that have invested in global fiber operate much like a cartel -- leaking the capacity into the market to keep prices artificially high, much like the DeBeers family diamonds. :-) Historically, representatives of these organizations meet once a year on the golf course in Hawaii to determine who to sell to. It would be nice to see some new faces in that game -- maybe it would help leverage the market a bit. - - ferg -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFG9F14q1pz9mNUZTMRAme/AJ9fltDlJax2YTvUUtYIMvMvNuDCDACbBgFm YoNGiX8ABiWEG78NBRsckAg= =GPD/ -END PGP SIGNATURE- -- Fergie, a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/
Re: Bee attack, fiber cut, 7-hour outage
On 9/22/07, Wayne E. Bouchard [EMAIL PROTECTED] wrote: I realize that it's expensive to run these lines but when you put your working and protect in the same cable or different cables in the same trench (not even a trench a few feet apart, but the same trench and same innerduct), you have to EXPECT that you're gonna have angry customers. And yet when telco folks learn that this has occured, they often fein being as surprised as the customers. .. and as long as they are the only telco with copper in the area, they could care less, I guess? jump off his tractor and hit a lever that lowered an auger that sliced a fiber-optic line. ps: That story had a kind of ... that killed the rat that ate the malt that made the house that jack built feel to it. srs
RE: Bee attack, fiber cut, 7-hour outage
There's a difference between folding a ring or pushing out a spoke to feed a few customers and providing connectivity to a town. I think building a SONET ring, or any kind of redundancy, has more to do with a rural telco's commitment to it's customers than the bottom line. Remember, the building of plant contributes to the cost study, so it may end up having zero cost in the end. Frank -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Wayne E. Bouchard Sent: Friday, September 21, 2007 7:00 PM To: Justin M. Streiner Cc: nanog@merit.edu Subject: Re: Bee attack, fiber cut, 7-hour outage On Fri, Sep 21, 2007 at 04:49:22PM -0400, Justin M. Streiner wrote: Anytime you talk about rural I'm impressed with 7 hours, however -- isn't SONET supposed to make this better? Sure, if: 1. the protect path is configured and enabled 2. both the working and protect paths don't run through the same conduit/duct/buffer I am continually amazed at how often this is the case. I realize that it's expensive to run these lines but when you put your working and protect in the same cable or different cables in the same trench (not even a trench a few feet apart, but the same trench and same innerduct), you have to EXPECT that you're gonna have angry customers. And yet when telco folks learn that this has occured, they often fein being as surprised as the customers. Truely amazing. --- Wayne Bouchard [EMAIL PROTECTED] Network Dude http://www.typo.org/~web/
Re: New TransPacific Cable Projects:
It would be nice to see some new faces in that game -- maybe it would help leverage the market a bit. great idea! and we can call it Flag! oh. sorry. guess it's old idea. randy
Re: New TransPacific Cable Projects:
--- [EMAIL PROTECTED] wrote: - : Historically, representatives of these organizations : meet once a year on the golf course in Hawaii to : determine who to sell to. Which course would that be? I'd pay the $200+ to play at the same time... ;-) scott --- [EMAIL PROTECTED] wrote: From: Paul Ferguson [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: nanog@merit.edu Subject: Re: New TransPacific Cable Projects: Date: Sat, 22 Sep 2007 00:10:40 GMT -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Deepak Jain [EMAIL PROTECTED] wrote: If I were a stakeholder in transpacific cables, I'd be leasing up the next 3-6 years of the entire global cable laying fleet. :) The people that have invested in global fiber operate much like a cartel -- leaking the capacity into the market to keep prices artificially high, much like the DeBeers family diamonds. :-) Historically, representatives of these organizations meet once a year on the golf course in Hawaii to determine who to sell to. It would be nice to see some new faces in that game -- maybe it would help leverage the market a bit. - - ferg -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFG9F14q1pz9mNUZTMRAme/AJ9fltDlJax2YTvUUtYIMvMvNuDCDACbBgFm YoNGiX8ABiWEG78NBRsckAg= =GPD/ -END PGP SIGNATURE- -- Fergie, a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/