nyc glass

2010-05-14 Thread Randy Bush
anyone have reccos for fiber
  from 60 hudson
  to   454 broadway

thanks

randy



Re: nyc glass

2010-05-14 Thread Joly MacFie
Surely 32 Ave of the Americas would be closer?

j

On Fri, May 14, 2010 at 3:59 AM, Randy Bush ra...@psg.com wrote:
 anyone have reccos for fiber
  from 60 hudson
  to   454 broadway

 thanks

 randy





-- 
---
Joly MacFie  218 565 9365 Skype:punkcast
WWWhatsup NYC - http://wwwhatsup.com
 http://pinstand.com - http://punkcast.com
  Secretary - ISOC-NY - http://isoc-ny.org
---



Re: BGP and convergence time

2010-05-14 Thread shake righa
Apologies,

kindly ignore my earlier responce.

Rgrds,
Shake

On Fri, May 14, 2010 at 3:46 PM, shake righa ssri...@gmail.com wrote:

 Believe have narrowed down problem to layer 2.

 A ping to address 224.0.0.5 shows no reply.

 Believe problme to do with blocking of multicast

 Regards,
 Shake

 On Fri, May 14, 2010 at 5:28 AM, Frank Bulk frnk...@iname.com wrote:

 What about IP SLA with some EEM?  This link may give you some ideas:
 http://blog.ioshints.info/2008/01/ospf-default-route-based-on-ip-sla.html

 Frank

 -Original Message-
 From: Jay Nakamura [mailto:zeusda...@gmail.com]
 Sent: Tuesday, May 11, 2010 1:35 PM
 To: NANOG
 Subject: BGP and convergence time

 So, we have two upstreams, both coming in on Ethernet.  One of our
 switch crashed and rebooted itself.  Although we have other paths to
 egress out the network, because the router's Ethernet interface didn't
 go down, our router's BGP didn't realize the neighbor was down until
 default BGP timeout was reached.  Our upstream connectivity was out
 for couple minutes.

 I am looking for ways to detect neighbor being down faster so traffic
 can be re-routed faster.  I can do BFD internally but the issue is how
 the upstream is going to detect the outage and stop routing our
 traffic to that downed link.  I have asked both of my upstreams and
 one said they don't do anything like that, second upstream I am still
 waiting on the answer.

 My question is, do other carriers do BFD or any other means to detect
 the neighbor being down faster than normal BGP will allow?  (Both
 upstreams are major telcos [ATT and Qwest], so I think they are less
 flexible than some others.)

 Or, has anyone succeeded in getting something done with those two
 carriers?

 Thanks!







Re: nyc glass

2010-05-14 Thread Adam Rothschild
On 2010-05-14-03:59:33, Randy Bush ra...@psg.com wrote:
 anyone have reccos for fiber
   from 60 hudson
   to   454 broadway

From a cursory look at POP and GIS data not covered by NDA, I'm not
finding any vendors currently built into 454 Broadway.  The usual
suspects for dark in the area include AboveNet, Lightower, and Lexent
(Hugh O'Kane), all amenable to build jobs for the right opportunity...

HTH,
-a



Illinois Tollway dark fiber

2010-05-14 Thread Brandon Galbraith
Has anyone had any experience working with the Illinois Tollway for dark
fiber? Looking for good or bad experiences offline.

Thanks!
-brandon

-- 
Brandon Galbraith
Voice: 630.492.0464


Re: POE switches and lightning

2010-05-14 Thread Lamar Owen
On Thursday 13 May 2010 11:36:35 am Caleb Tennis wrote:
 I was just curious if anyone had seen anything similar to this before?  Our
 incoming electrical power has surge suppression, and the power to the
 switches is all through double conversion UPS, so I'm not quite sure why
 any of them would have been impacted at all.  I'm guessing that the strike
 had some impact on the electrical ground, but I don't know what we can do
 to prevent future strikes from causing the same issues.  Thoughts?

Inductively coupled EMP onto the CAT5.  I've seen ethernet port chips 
vaporized on switches.  I've even seen holes blown in port interface chips, 
and the switch continue working (have a DC powered Catalyst 2900XL switch with 
the center 8 ports in a nonworking state due to EMP from a close strike; the 
2900XL is still running fine, just can't use those center eight ports anymore). 
 
The building it is installed in is on solar power, and at the time was off-
grid.  A Siteplayer Telnet was blown, and the eight ports were fried (one of 
which was connected to the Siteplayer Telnet that got blown) on the switch, 
but that was the extent of the damage.

I'm from a broadcast engineering background, and have seen lightning's effects 
in many many devices, including vaporized PC traces, etc.  Virtually all 
damage I've seen has been due to either EMP or improperly bonded grounding 
systems.  In particular, if your telecom ground isn't bonded to the electrical 
NEC safety ground, you will get a voltage difference between the grounds, 
depending upon the voltage gradient in the ground.  Whole books have been 
written on this subject; I've got one by Polyphaser about nuclear EMP (same 
concept, larger scale) protection for radio stations.

Imagine the lightning bolt's ionization conduction channel as the primary side 
of many transformers, with every single conductor within many meters being 
potential secondaries.  The closer the secondary, the more coupling.  It's a 
1:1 turns ratio, too, and so a 100% coupled secondary would give an equal 
amperage through the secondary.  Air-core transformers are loosely coupled at 
best, but even a tenth of one percent coupling of a 100kiloampere lightning 
stroke is 100 amps in magnitude.  Loosely coupled current transformers, like 
this, tend to generate large open circuit voltages, too.

The most graphic evidence I've seen of the power of lightning-created EMP was 
made during a strike I saw in June of 1998 at a radio station's studios.  The 
studios were in an old, 1950's vintage school building, built to 1950's civil 
defense standards for EMP resistance (rebar in a Faraday cage arrangement, 
metal roof, lightning rods on the roof).  There is a 100 foot studio-
transmitter link (STL) tower at one end of the building.  The STL tower took a 
direct hit.  The Faraday cage rebar verticals embedded in the walls became 
coupled secondaries, and large currents flowed.

Every single CRT monitor in the entire 300 foot long building was left with a 
rainbow effect on the screen due to the residual magnetism from the EMP.  Even 
monitors that weren't plugged in were rainbowed.  Many PC's died that day, but 
I resurrected several hard drives where I could find identical control boards; 
no hard drive was unreadable due to magnetic issues, but only electrical (no 
bad heads or erased sections on the platters; every one I found a compatible 
replacement control board for was recovered).

Made some good money degaussing CRT's that week.  (used a bulk tape eraser; 
turned on the eraser, brought it close to the CRT, worked it over all 
surfaces, then slowing drew the eraser away from the CRT, and turned it off).

The EMP was strong enough that there were a couple of pieces of spare 
equipment, located in a room less than 30 feet from the tower, that had 
lightning damage even though they weren't plugged in or connected to anything.  
One 250MCM ground wire from the tower was vaporized; there were three, and the 
other two survived, but with noticeable heat-induced discoloration (they were 
replaced, and the glassed-up ground rods were as well).  Engineering estimates 
of the stroke current were that it was somewhat greater than 200kiloamperes.  

One of the STL transmitters was damaged, but on the audio side.  Neither of 
the two STL transmitters sustained any RF output damage thanks to the sacrifice 
of the two daisy-chained Polyphaser arrestors (the arrestors acted as fuses, 
and had to be replaced, but they're a lot cheaper than a 950MHz Marti 
STL-10!).  One of the two four foot Marti STL dishes had a melted feed, but 
the other one, which was lower on the tower (about 85 feet up) was undamaged.  
Fortunately, neither of the two half-inch heliax runs from the dishes were 
damaged.

The 10base-2 LAN took extensive damage, but not every NIC.  The most 
interesting damage was to the RG-58 cable itself, which had holes blown in it 
every 30 feet or so.  Made a good argument to upgrade to 10Base-T 

SNMP Monitoring of a Transfer Switch relay

2010-05-14 Thread Tom Beecher
I'm presently doing some research into a SNMP-enabled device to monitor 
a set of aux contacts on our transfer switch in order to be able to 
monitor it's status (on generator or on commercial) from our monitoring 
platform. I've seen a few interesting devices out there that can 
accomplish this, however I thought I'd query the list to see if anyone 
has thoughts about a particular unit they've worked with.


Thanks in advance,

Tom




Weekly Routing Table Report

2010-05-14 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith p...@cisco.com.

Routing Table Report   04:00 +10GMT Sat 15 May, 2010

Report Website: http://thyme.apnic.net
Detailed Analysis:  http://thyme.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  321353
Prefixes after maximum aggregation:  148341
Deaggregation factor:  2.17
Unique aggregates announced to Internet: 156858
Total ASes present in the Internet Routing Table: 34007
Prefixes per ASN:  9.45
Origin-only ASes present in the Internet Routing Table:   29525
Origin ASes announcing only one prefix:   14346
Transit ASes present in the Internet Routing Table:4482
Transit-only ASes present in the Internet Routing Table:100
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  24
Max AS path prepend of ASN (36992)   22
Prefixes from unregistered ASNs in the Routing Table:   341
Unregistered ASNs in the Routing Table: 120
Number of 32-bit ASNs allocated by the RIRs:564
Prefixes from 32-bit ASNs in the Routing Table: 636
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:189
Number of addresses announced to Internet:   2216648704
Equivalent to 132 /8s, 31 /16s and 96 /24s
Percentage of available address space announced:   59.8
Percentage of allocated address space announced:   65.1
Percentage of available address space allocated:   91.9
Percentage of address space in use by end-sites:   82.7
Total number of prefixes smaller than registry allocations:  154160

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:76802
Total APNIC prefixes after maximum aggregation:   26762
APNIC Deaggregation factor:2.87
Prefixes being announced from the APNIC address blocks:   73469
Unique aggregates announced from the APNIC address blocks:32216
APNIC Region origin ASes present in the Internet Routing Table:4033
APNIC Prefixes per ASN:   18.22
APNIC Region origin ASes announcing only one prefix:   1100
APNIC Region transit ASes present in the Internet Routing Table:622
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 15
Number of APNIC addresses announced to Internet:  516278592
Equivalent to 30 /8s, 197 /16s and 201 /24s
Percentage of available APNIC address space announced: 76.9

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079
   55296-56319, 131072-132095
APNIC Address Blocks 1/8,  14/8,  27/8,  43/8,  58/8,  59/8,  60/8,
61/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 175/8, 180/8,
   182/8, 183/8, 202/8, 203/8, 210/8, 211/8, 218/8,
   219/8, 220/8, 221/8, 222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:133879
Total ARIN prefixes after maximum aggregation:69162
ARIN Deaggregation factor: 1.94
Prefixes being announced from the ARIN address blocks:   106795
Unique aggregates announced from the ARIN address blocks: 41618
ARIN Region origin ASes present in the Internet Routing Table:13695
ARIN Prefixes per ASN: 7.80
ARIN Region origin ASes announcing only one prefix:5278
ARIN Region transit ASes present in the Internet Routing Table:1351
Average ARIN Region AS path length visible: 3.4
Max ARIN Region AS path length visible:  22
Number of ARIN addresses announced to Internet:   730749728
Equivalent to 43 /8s, 142 /16s and 91 /24s
Percentage of available ARIN address 

Re: ipv6 transit over tunneled connection

2010-05-14 Thread Franck Martin


- Original Message -
From: Christopher Morrow morrowc.li...@gmail.com
To: Michael Ulitskiy mulits...@acedsl.com
Cc: nanog@nanog.org
Sent: Thursday, 13 May, 2010 6:39:28 PM
Subject: Re: ipv6 transit over tunneled connection

On Thu, May 13, 2010 at 6:18 PM, Michael Ulitskiy mulits...@acedsl.com
wrote:
 Hello,

 We're in the early stage of planning ipv6 deployment -
 learning/labbing/experimenting/etc. We've got to the point when we're
 also planning to request initial ipv6 allocation from ARIN.
 So I wonder what ipv6 transit options I have if my upstreams do not
 support native ipv6 connectivity?
 I see Hurricane Electric tunnel broker BGP tunnel. Is there anything
 else? Either free or commercial?

1) see gblx/ntt/sprint/twt/vzb for transit-v6
2) tunnel inside your domain (your control, your MTU issues, your
alternate pathing of tunnels vs pipe)
3) don't tunnel beyond your borders, really just don't

tunnels are bad, always.
-chris

I see so many times, that tunnels are bad for IPv6, but this is the way IPv6 
has been designed to work when you cannot get direct IPv6. So I would not say 
tunnels are bad, but direct IPv6 is better (OECD document on IPv6 states the 
use of tunnels).

If the issue with tunnel is MTU, then a non-negligible part of IPv4 does not 
work well with MTU different of 1500. With IPv6 we bring the concept of jumbo 
packets, with large MTU. If we cannot work with non standard MTUs in IPv6 
tunnels, how will we work with jumbo packets?



RE: SNMP Monitoring of a Transfer Switch relay

2010-05-14 Thread Wallace Keith
I've had good luck with devices from DPS;   http://www.dpstele.com/
-Keith


-Original Message-
From: Tom Beecher [mailto:tbeec...@localnet.com] 
Sent: Friday, May 14, 2010 2:00 PM
To: nanog@nanog.org
Subject: SNMP Monitoring of a Transfer Switch relay

I'm presently doing some research into a SNMP-enabled device to monitor 
a set of aux contacts on our transfer switch in order to be able to 
monitor it's status (on generator or on commercial) from our monitoring 
platform. I've seen a few interesting devices out there that can 
accomplish this, however I thought I'd query the list to see if anyone 
has thoughts about a particular unit they've worked with.

Thanks in advance,

Tom





Re: ipv6 transit over tunneled connection

2010-05-14 Thread Jack Carrozzo
I agree - if you can get native v6 transit then more power to you. But
tunnels are sure better than no IPv6 connectivity in my mind. Aside from
slight performance/efficiency issues, I've never had an issue.

-Jack Carrozzo

On Fri, May 14, 2010 at 2:29 PM, Franck Martin fra...@genius.com wrote:



 - Original Message -
 From: Christopher Morrow morrowc.li...@gmail.com
 To: Michael Ulitskiy mulits...@acedsl.com
 Cc: nanog@nanog.org
 Sent: Thursday, 13 May, 2010 6:39:28 PM
 Subject: Re: ipv6 transit over tunneled connection

 On Thu, May 13, 2010 at 6:18 PM, Michael Ulitskiy mulits...@acedsl.com
 wrote:
  Hello,
 
  We're in the early stage of planning ipv6 deployment -
  learning/labbing/experimenting/etc. We've got to the point when we're
  also planning to request initial ipv6 allocation from ARIN.
  So I wonder what ipv6 transit options I have if my upstreams do not
  support native ipv6 connectivity?
  I see Hurricane Electric tunnel broker BGP tunnel. Is there anything
  else? Either free or commercial?

 1) see gblx/ntt/sprint/twt/vzb for transit-v6
 2) tunnel inside your domain (your control, your MTU issues, your
 alternate pathing of tunnels vs pipe)
 3) don't tunnel beyond your borders, really just don't

 tunnels are bad, always.
 -chris

 I see so many times, that tunnels are bad for IPv6, but this is the way
 IPv6 has been designed to work when you cannot get direct IPv6. So I would
 not say tunnels are bad, but direct IPv6 is better (OECD document on IPv6
 states the use of tunnels).

 If the issue with tunnel is MTU, then a non-negligible part of IPv4 does
 not work well with MTU different of 1500. With IPv6 we bring the concept of
 jumbo packets, with large MTU. If we cannot work with non standard MTUs in
 IPv6 tunnels, how will we work with jumbo packets?




Re: ipv6 transit over tunneled connection

2010-05-14 Thread Jared Mauch
I'm curious what providers have not gotten their IPv6 plans/networks/customer 
ports enabled.

I know that Comcast is doing their trials now (Thanks John!) and will be 
presenting at the upcoming NANOG about their experiences.

What parts of the big I Internet are not enabled or ready?

- Jared

On May 14, 2010, at 2:43 PM, Jack Carrozzo wrote:

 I agree - if you can get native v6 transit then more power to you. But
 tunnels are sure better than no IPv6 connectivity in my mind. Aside from
 slight performance/efficiency issues, I've never had an issue.
 
 -Jack Carrozzo




Re: SNMP Monitoring of a Transfer Switch relay

2010-05-14 Thread Seth Mattinen
On 5/14/2010 10:59, Tom Beecher wrote:
 I'm presently doing some research into a SNMP-enabled device to monitor
 a set of aux contacts on our transfer switch in order to be able to
 monitor it's status (on generator or on commercial) from our monitoring
 platform. I've seen a few interesting devices out there that can
 accomplish this, however I thought I'd query the list to see if anyone
 has thoughts about a particular unit they've worked with.
 


I went a different way with my electrical gear and used modbus. For me,
the benefits are multiple devices on the 485 bus, monitoring lots of
parameters and I can execute remote commands. I paid something like $300
for the xfer switch modbus card, which was cheaper than any SNMP contact
closure device I could find at the time. I talk to it using Perl
Modbus::Client with my monitoring server as the modbus master. It ended
up being less of a hassle and much more flexible in the long run.

You may or may not have your mind set on dry contact monitoring, but
it's something to think about.

~Seth



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Christopher Morrow
On Fri, May 14, 2010 at 2:29 PM, Franck Martin fra...@genius.com wrote:
 I said somewhere in here... wierd quoting happened.
 On Thu, May 13, 2010 at 6:18 PM, Michael Ulitskiy mulits...@acedsl.com
 wrote:
 Hello,

 We're in the early stage of planning ipv6 deployment -
 learning/labbing/experimenting/etc. We've got to the point when we're
 also planning to request initial ipv6 allocation from ARIN.
 So I wonder what ipv6 transit options I have if my upstreams do not
 support native ipv6 connectivity?
 I see Hurricane Electric tunnel broker BGP tunnel. Is there anything
 else? Either free or commercial?

 1) see gblx/ntt/sprint/twt/vzb for transit-v6
 2) tunnel inside your domain (your control, your MTU issues, your
 alternate pathing of tunnels vs pipe)
 3) don't tunnel beyond your borders, really just don't

 tunnels are bad, always.
 -chris

 I see so many times, that tunnels are bad for IPv6, but this is the way IPv6 
 has been designed to work when you
 cannot get direct IPv6. So I would not say tunnels are bad, but direct IPv6 
 is better (OECD document on IPv6
 states the use of tunnels).

Tunnels promote poor paths, they bring along LOTS of issues wrt PMTUD,
asymmetry of paths, improper/inefficient paths (see example paths from
several ripe preso's by jereon/others), longer latency. If the tunnel
exits your border you can't control what happens and you can't affect
that tunnels performance characteristics. it's 2010, get native v6.

 If the issue with tunnel is MTU, then a non-negligible part of IPv4 does not 
 work well with MTU different of 1500.
 With IPv6 we bring the concept of jumbo packets, with large MTU. If we cannot 
 work with non standard MTUs in
 IPv6 tunnels, how will we work with jumbo packets?

a non-negligible part of the ipv6 internet doesn't work at all with
1280 mtu... due to tunnels and some other hackery :( jumbo packets
are a fiction, everyone should stop 10 years ago believing they will
ever work end-to-end between random sites.

-Chris



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Seth Mattinen
On 5/14/2010 11:49, Jared Mauch wrote:
 I'm curious what providers have not gotten their IPv6 plans/networks/customer 
 ports enabled.
 
 I know that Comcast is doing their trials now (Thanks John!) and will be 
 presenting at the upcoming NANOG about their experiences.
 
 What parts of the big I Internet are not enabled or ready?
 

Verizon has POPs that aren't IPv6 enabled making it a pain in the ass if
you're closer to one of those (currently on month 11 of waiting, I'm
just letting it go because I'm curious how long it'll take), Sprint
isn't doing native IPv6 with their GSR's yet, Cogent's IPv6 visibility
is poor, Level3 isn't accepting new IPv6 beta connections, and ATT
simply told me not available yet.

Tunnels are still a necessity.

~Seth



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Christopher Morrow
On Fri, May 14, 2010 at 3:00 PM, Seth Mattinen se...@rollernet.us wrote:
 On 5/14/2010 11:49, Jared Mauch wrote:
 I'm curious what providers have not gotten their IPv6 
 plans/networks/customer ports enabled.

 I know that Comcast is doing their trials now (Thanks John!) and will be 
 presenting at the upcoming NANOG about their experiences.

 What parts of the big I Internet are not enabled or ready?


 Verizon has POPs that aren't IPv6 enabled making it a pain in the ass if
 you're closer to one of those (currently on month 11 of waiting, I'm
 just letting it go because I'm curious how long it'll take), Sprint
 isn't doing native IPv6 with their GSR's yet, Cogent's IPv6 visibility
 is poor, Level3 isn't accepting new IPv6 beta connections, and ATT
 simply told me not available yet.

 Tunnels are still a necessity.

twt, ntt, gblx, telia all have presence in the US, and all do v6 to
customer links. vote with wallet.



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Brielle Bruns
(Sent from my Blackberry, please avoid the flames as I can't do inline quoting)


Native IPv6 is a crapshoot.  About the only people in the US that I've seen 
that are no-bullshit IPv6 native ready is Hurricane Electric.  NTT is 
supposedly as well but I can't speak as to where they have connectivity.

Being that there's issues that leave us unable to get native connectivity, we 
have a BGP tunnel thanks to HE (with a 20ms latency from Seattle to Freemont).

Tunnels suck if not done correctly.  We sometimes have faster and more reliable 
connections through IPv6, so ymmv.


Brielle
--Original Message--
From: Jared Mauch
To: Jack Carrozzo
Cc: nanog@nanog.org
Subject: Re: ipv6 transit over tunneled connection
Sent: May 14, 2010 12:49 PM

I'm curious what providers have not gotten their IPv6 plans/networks/customer 
ports enabled.

I know that Comcast is doing their trials now (Thanks John!) and will be 
presenting at the upcoming NANOG about their experiences.

What parts of the big I Internet are not enabled or ready?

- Jared

On May 14, 2010, at 2:43 PM, Jack Carrozzo wrote:

 I agree - if you can get native v6 transit then more power to you. But
 tunnels are sure better than no IPv6 connectivity in my mind. Aside from
 slight performance/efficiency issues, I've never had an issue.
 
 -Jack Carrozzo




-- 
Brielle Bruns
http://www.sosdg.org  /  http://www.ahbl.org

IPv6 eyeballs?

2010-05-14 Thread Vasil Kolev
Hi all,

This seems like the proper time to ask, seeing how many people are there
asking for IPv6 transit - does anyone have any kind of stats how many
eyeballs are there that have IPv6, and are there any of them that have a
better service over v6 that over v4 (my guess here is universities or
other academical institutions that have really big v6 pipes)?

The reason for this question is that s few weeks ago I wrote an initial
list of what we (as a medium-sized content provider) need to do to be
able to push traffic over v6, and with careful testing and everything it
should fit in six months. What's not known is it worth to start
implementing it. We pretty much accept as given that no carrier will
limit its own users to v6 only in the near (1-2-3 year) future, but with
stuff like CGN/LSN degradation could be expected to show up in the v4
service.

-- 
Regards,
Vasil Kolev


signature.asc
Description: Това е	 цифрово	 подписана	 част от	 писмото


Re: SNMP Monitoring of a Transfer Switch relay

2010-05-14 Thread Chris Burwell
I have used the APC Environmental Manager (EMU) to do this. In our
case we ran a 4-pair line from the generator to the EMU. One pair was
connected to the EMU so that we could monitor and alert on the
run-cycles of the generator. Our transfer switch did not have these
capabilities, but you could apply the same configuration we used for
out generator.

The EMU has built-in alerting as well as the ability to send SNMP traps.

- Chris

On Fri, May 14, 2010 at 1:59 PM, Tom Beecher tbeec...@localnet.com wrote:
 I'm presently doing some research into a SNMP-enabled device to monitor a
 set of aux contacts on our transfer switch in order to be able to monitor
 it's status (on generator or on commercial) from our monitoring platform.
 I've seen a few interesting devices out there that can accomplish this,
 however I thought I'd query the list to see if anyone has thoughts about a
 particular unit they've worked with.

 Thanks in advance,

 Tom






Re: SNMP Monitoring of a Transfer Switch relay

2010-05-14 Thread nick hatch
On Fri, May 14, 2010 at 10:59 AM, Tom Beecher tbeec...@localnet.com wrote:

 I'm presently doing some research into a SNMP-enabled device to monitor a
 set of aux contacts on our transfer switch in order to be able to monitor
 it's status (on generator or on commercial) from our monitoring platform.
 I've seen a few interesting devices out there that can accomplish this,
 however I thought I'd query the list to see if anyone has thoughts about a
 particular unit they've worked with.


I've found the Weathergoose II to be a good general-purpose SNMP monitoring
device. They also have something called the Relaygoose which can accommodate
more inputs and trigger relays as well.

http://www.itwatchdogs.com/p_product_detail.php?pnum=1

-Nick


Re: nyc glass

2010-05-14 Thread Randy Bush
 anyone have reccos for fiber
   from 60 hudson
   to  454 broadway
 From a cursory look at POP and GIS data not covered by NDA, I'm not
 finding any vendors currently built into 454 Broadway.

later word from the customer is s/454/434/.  g.

randy



Re: SNMP Monitoring of a Transfer Switch relay

2010-05-14 Thread Chris Adams
Once upon a time, Tom Beecher tbeec...@localnet.com said:
 I'm presently doing some research into a SNMP-enabled device to monitor 
 a set of aux contacts on our transfer switch in order to be able to 
 monitor it's status (on generator or on commercial) from our monitoring 
 platform. I've seen a few interesting devices out there that can 
 accomplish this, however I thought I'd query the list to see if anyone 
 has thoughts about a particular unit they've worked with.

We have some old NetBotz (now part of APC) in our NOC, and ours have dry
contact ports, so we hooked one up to our transfer switch.  Works like a
champ.
-- 
Chris Adams cmad...@hiwaay.net
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Randy Bush
 3) don't tunnel beyond your borders, really just don't
 tunnels are bad, always.

you are understaing your case.

randy



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Paul Timmins

GBLX was great with native IPv6 setup.

VZB was nearly impossible to get them to set it up, and I'm tunneled to 
a router halfway across the country. The router I was going to had 
serious PMTU issues that they recently cleared up, so now it's working 
satisfactorily.


-Paul

Brielle Bruns wrote:

(Sent from my Blackberry, please avoid the flames as I can't do inline quoting)


Native IPv6 is a crapshoot.  About the only people in the US that I've seen 
that are no-bullshit IPv6 native ready is Hurricane Electric.  NTT is 
supposedly as well but I can't speak as to where they have connectivity.

Being that there's issues that leave us unable to get native connectivity, we 
have a BGP tunnel thanks to HE (with a 20ms latency from Seattle to Freemont).

Tunnels suck if not done correctly.  We sometimes have faster and more reliable 
connections through IPv6, so ymmv.


Brielle
--Original Message--
From: Jared Mauch
To: Jack Carrozzo
Cc: nanog@nanog.org
Subject: Re: ipv6 transit over tunneled connection
Sent: May 14, 2010 12:49 PM

I'm curious what providers have not gotten their IPv6 plans/networks/customer 
ports enabled.

I know that Comcast is doing their trials now (Thanks John!) and will be 
presenting at the upcoming NANOG about their experiences.

What parts of the big I Internet are not enabled or ready?

- Jared

On May 14, 2010, at 2:43 PM, Jack Carrozzo wrote:

  

I agree - if you can get native v6 transit then more power to you. But
tunnels are sure better than no IPv6 connectivity in my mind. Aside from
slight performance/efficiency issues, I've never had an issue.

-Jack Carrozzo






  





BGP Update Report

2010-05-14 Thread cidr-report
BGP Update Report
Interval: 06-May-10 -to- 13-May-10 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS982914118  1.5%  38.0 -- BSNL-NIB National Internet 
Backbone
 2 - AS453811556  1.2% 148.2 -- ERX-CERNET-BKB China Education 
and Research Network Center
 3 - AS10113   10587  1.1% 179.4 -- DATAFAST-AP DATAFAST 
TELECOMMUNICATIONS LTD
 4 - AS28477   10116  1.1%1124.0 -- Universidad Autonoma del 
Esstado de Morelos
 5 - AS359319430  1.0%3143.3 -- ARCHIPELAGO - ARCHIPELAGO 
HOLDINGS INC
 6 - AS5800 9259  1.0%  41.9 -- DNIC-ASBLK-05800-06055 - DoD 
Network Information Center
 7 - AS8452 9054  0.9%   8.8 -- TEDATA TEDATA
 8 - AS417868901  0.9% 423.9 -- ERTH-YOLA-AS CJSC Company 
ER-Telecom Yoshkar-Ola
 9 - AS6389 7069  0.7%   6.5 -- BELLSOUTH-NET-BLK - 
BellSouth.net Inc.
10 - AS4847 6616  0.7%  82.7 -- CNIX-AP China Networks 
Inter-Exchange
11 - AS3549 6452  0.7%  96.3 -- GBLX Global Crossing Ltd.
12 - AS5976 5937  0.6%  52.1 -- DNIC-ASBLK-05800-06055 - DoD 
Network Information Center
13 - AS8386 5868  0.6%  70.7 -- KOCNET KOCNET-AS
14 - AS8151 5820  0.6%  12.2 -- Uninet S.A. de C.V.
15 - AS308905705  0.6%  13.0 -- EVOLVA Evolva Telecom s.r.l.
16 - AS179745430  0.6%  13.4 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
17 - AS145225075  0.5%  16.1 -- Satnet
18 - AS369924866  0.5%  13.3 -- ETISALAT-MISR
19 - AS114924655  0.5%  10.9 -- CABLEONE - CABLE ONE, INC.
20 - AS256204578  0.5%  29.3 -- COTAS LTDA.


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS359319430  1.0%3143.3 -- ARCHIPELAGO - ARCHIPELAGO 
HOLDINGS INC
 2 - AS487542686  0.3%2686.0 -- SOBIS-AS SC SOBIS SOLUTIONS SRL
 3 - AS296612401  0.2%2401.0 -- INTI-AS INTI Autonomous System
 4 - AS456702285  0.2%2285.0 -- SOFTCRYLICNET1-IN #160,North 
Usman Road, Third Floor
 5 - AS130041695  0.2%1695.0 -- SOX Serbian Open Exchange
 6 - AS28477   10116  1.1%1124.0 -- Universidad Autonoma del 
Esstado de Morelos
 7 - AS31557 939  0.1% 939.0 -- IGT-MOLD-NET-AS IGT 
Communications AS
 8 - AS3397  896  0.1% 896.0 -- DAVINCI - Davinci Broadband Inc.
 9 - AS11613 806  0.1% 806.0 -- U-SAVE - U-Save Auto Rental of 
America, Inc.
10 - AS282852939  0.3% 734.8 -- World Line Ltda
11 - AS4387 2863  0.3% 715.8 -- Secretaria de Ciencia y 
Tecnologia - Red Cientific
12 - AS530651849  0.2% 462.2 -- 
13 - AS183991835  0.2% 458.8 -- BAGAN-TRANSIT-AS Bagan 
Cybertech IDC  Teleport International Transit
14 - AS303411307  0.1% 435.7 -- SCTA-ASN - South Central 
Telephone Association
15 - AS417868901  0.9% 423.9 -- ERTH-YOLA-AS CJSC Company 
ER-Telecom Yoshkar-Ola
16 - AS8038  403  0.0% 403.0 -- 6CONNECT - 6connect, Inc.
17 - AS27560 796  0.1% 398.0 -- ULTCO - Universal Leaf Tobacco 
Company Inc.
18 - AS104452368  0.2% 394.7 -- HTG - Huntleigh Telcom
19 - AS28052 380  0.0% 380.0 -- Arte Radiotelevisivo Argentino
20 - AS43914 341  0.0% 341.0 -- ECCO-AS Ecco Holiday Sp. z o.o.


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 58.207.96.0/1910719  1.0%   AS4538  -- ERX-CERNET-BKB China Education 
and Research Network Center
 2 - 200.13.36.0/2410092  1.0%   AS28477 -- Universidad Autonoma del 
Esstado de Morelos
 3 - 188.187.184.0/24   8639  0.8%   AS41786 -- ERTH-YOLA-AS CJSC Company 
ER-Telecom Yoshkar-Ola
 4 - 64.76.40.0/24  6024  0.6%   AS3549  -- GBLX Global Crossing Ltd.
 5 - 198.140.43.0/245710  0.6%   AS35931 -- ARCHIPELAGO - ARCHIPELAGO 
HOLDINGS INC
 6 - 205.91.160.0/204083  0.4%   AS5976  -- DNIC-ASBLK-05800-06055 - DoD 
Network Information Center
 7 - 63.211.68.0/22 3711  0.4%   AS35931 -- ARCHIPELAGO - ARCHIPELAGO 
HOLDINGS INC
 8 - 206.184.16.0/242938  0.3%   AS174   -- COGENT Cogent/PSI
 9 - 91.212.23.0/24 2686  0.3%   AS48754 -- SOBIS-AS SC SOBIS SOLUTIONS SRL
10 - 143.138.107.0/24   2443  0.2%   AS747   -- TAEGU-AS - Headquarters, USAISC
11 - 202.92.235.0/242419  0.2%   AS9498  -- BBIL-AP BHARTI Airtel Ltd.
12 - 193.16.43.0/24 2401  0.2%   AS29661 -- INTI-AS INTI Autonomous System
13 - 202.89.118.0/242285  0.2%   AS45670 -- SOFTCRYLICNET1-IN #160,North 
Usman Road, Third Floor
14 - 193.16.111.0/242153  0.2%   AS15836 -- AXAUTSYS ARAX I.S.P.
 AS31557 -- IGT-MOLD-NET-AS 

Re: ipv6 transit over tunneled connection

2010-05-14 Thread Merike Kaeo


On May 14, 2010, at 1:36 PM, Jared Mauch wrote:



On May 14, 2010, at 3:43 PM, Brielle Bruns wrote:

(Sent from my Blackberry, please avoid the flames as I can't do  
inline quoting)



Native IPv6 is a crapshoot.  About the only people in the US that  
I've seen that are no-bullshit IPv6 native ready is Hurricane  
Electric. NTT is supposedly as well but I can't speak as to where  
they have connectivity.


I can say that we (NTT) have been IPv6 enabled or ready at all  
customer ports since ~2003.  Anyone else who has not gotten there  
in the intervening years may have problems supporting you for your  
IPv4 as well :)


I had native eBGP with NTT in Dec 2005..this is when I was  
working with Connection By Boeing in Seattle.  Worked like a charm.


And yes, since I now live in Seattle, I have heard of some others  
doing native although haven't validated.




Being that there's issues that leave us unable to get native  
connectivity, we have a BGP tunnel thanks to HE (with a 20ms  
latency from Seattle to Freemont).


You should be able to get native IPv6 in Seattle from a variety of  
providers.  If you're not finding it, you're not really looking  
(IMHO).


I'd 2nd that



Tunnels suck if not done correctly.  We sometimes have faster and  
more reliable connections through IPv6, so ymmv.


The tunneled part of the IPv6 internet fell to the wayside a long  
time ago, there are stragglers and I have even seen people try to  
peer over tunnels in 2010, but anyone still adding that level of  
overlay (v6-over-v4) may find themselves in a world of hurt soon  
enough.


- Jared (Curious about what incumbent carrier plans are for end- 
user - eg qwest, att, vz resi)





Re: ipv6 transit over tunneled connection

2010-05-14 Thread Karl Auer
On Fri, 2010-05-14 at 14:57 -0400, Christopher Morrow wrote:
 Tunnels promote poor paths

promote? Tunnel topology does not (necessarily) match the underlying
topology, especially if you choose (or are forced to accept) a distant
broker. But promote?

 , they bring along LOTS of issues wrt PMTUD,

PMTUD that doesn't work on v6 probably doesn't work on v4. I agree that
a bad PMTU can wreak more havoc on v6 than v4, but most of the issues
are workaroundable.
 
 asymmetry of paths, improper/inefficient paths (see example paths from
 several ripe preso's by jereon/others), longer latency.

All relating to the above. I suspect you really mean paths in the
underlying topology, which is a by definition issue. None of these are
necessary features of tunnels.

Given the relatively low number of tunnel terminating services, and the
fairly low level of choice available to people who want tunnels, these
are bigger problems than they need to be. More demand will see these
problems (as with so many transitional issues) lessen substantially.

  If the tunnel
 exits your border you can't control what happens and you can't affect
 that tunnels performance characteristics.

Whereas with IPv4 you have complete control over everything that happens
once packets exit your border? This is no different with IPv6 than with
IPv4, except that you have fewer choices at present, so must make more
drastic compromises.

  it's 2010, get native v6.

Easily said :-(

If you can't get native IPv6, then using a tunnel lets you get started;
it lets you begin educating, testing and even delivering IPv6-based
services. If, on the other hand, you wait until everything is perfect,
you will be wy behind the eight-ball.

Oh - and tunnels are usually way cheaper than native connectivity, so
it's easier to get the idea of going v6 past the bean-counters.

So: Yep, native IPv6 if you can get it. Otherwise, take tunnels. But
whichever you do, do it now.

Regards, K.

-- 
~~~
Karl Auer (ka...@biplane.com.au)   +61-2-64957160 (h)
http://www.biplane.com.au/~kauer/  +61-428-957160 (mob)

GPG fingerprint: B386 7819 B227 2961 8301 C5A9 2EBC 754B CD97 0156
Old fingerprint: 07F3 1DF9 9D45 8BCD 7DD5 00CE 4A44 6A03 F43A 7DEF


signature.asc
Description: This is a digitally signed message part


Re: ipv6 transit over tunneled connection

2010-05-14 Thread Seth Mattinen
On 5/14/2010 12:44, Christopher Morrow wrote:
 On Fri, May 14, 2010 at 3:00 PM, Seth Mattinen se...@rollernet.us wrote:
 On 5/14/2010 11:49, Jared Mauch wrote:
 I'm curious what providers have not gotten their IPv6 
 plans/networks/customer ports enabled.

 I know that Comcast is doing their trials now (Thanks John!) and will be 
 presenting at the upcoming NANOG about their experiences.

 What parts of the big I Internet are not enabled or ready?


 Verizon has POPs that aren't IPv6 enabled making it a pain in the ass if
 you're closer to one of those (currently on month 11 of waiting, I'm
 just letting it go because I'm curious how long it'll take), Sprint
 isn't doing native IPv6 with their GSR's yet, Cogent's IPv6 visibility
 is poor, Level3 isn't accepting new IPv6 beta connections, and ATT
 simply told me not available yet.

 Tunnels are still a necessity.
 
 twt, ntt, gblx, telia all have presence in the US, and all do v6 to
 customer links. vote with wallet.


Yeah I hear that a lot, but out of those four the only one that will
serve my area is global crossing.

~Seth



Re: POE switches and lightning

2010-05-14 Thread Marshall Eubanks


On May 13, 2010, at 2:26 PM, Mark Mayfield wrote:

About a month ago, we had a lightning strike near our main campus.   
We lost one POE Cisco 3560 completely (apparently blown power  
supply), and in a separate but nearby building, another 3560 lost  
the ability to deliver POE, but continued to operate as a switch.   
Both had to be replaced. Both were on wiring closet type UPS'es with  
surge suppression, and those were unaffected.


Mark

-Original Message-
From: Caleb Tennis [mailto:caleb.ten...@gmail.com]
Sent: Thursday, May 13, 2010 10:37 AM
To: North American Network Operators Group
Subject: POE switches and lightning

We had a lightning strike nearby yesterday that looks to have come  
inside our facility via a feeder circuit that goes outdoors  
underground to our facility's gate.


What's interesting is that various POE switches throughout the  
entire building seemed to be affected in that some of their ports  
they just shut down/off.  Rebooting these switches brought  
everything back to life.  It didn't impact anything non-POE, and  
even then, only impacted some devices.  But it was spread across the  
whole building, across multiple switches.


I was just curious if anyone had seen anything similar to this  
before?  Our incoming electrical power has surge suppression, and  
the power to the switches is all through double conversion UPS, so  
I'm not quite sure why any of them would have been impacted at all.   
I'm guessing that the strike had some impact on the electrical  
ground, but I don't know what we can do to prevent future strikes  
from causing the same issues.  Thoughts?





It is not clear to me from the above if there are copper circuits  
coming into the building, but lightning can certainly zap those as  
well. In very high impact areas (such as mountaintops or Miami) it is  
a good idea to mandate that all incoming / outgoing circuits are on  
fiber, without exception.


Marshall



Confidentiality Statement: The documents accompanying this  
transmission contain confidential information that is legally  
privileged.  This information is intended only for the use of the  
individuals or entities listed above.  If you are not the intended  
recipient, you are hereby notified that any disclosure, copying,  
distribution, or action taken in reliance on the contents of these  
documents is strictly prohibited.  If you have received this  
information in error, please notify the sender immediately and  
arrange for the return or destruction of these documents.








Re: ipv6 transit over tunneled connection

2010-05-14 Thread Owen DeLong

On May 14, 2010, at 11:57 AM, Christopher Morrow wrote:

 On Fri, May 14, 2010 at 2:29 PM, Franck Martin fra...@genius.com wrote:
 I said somewhere in here... wierd quoting happened.
 On Thu, May 13, 2010 at 6:18 PM, Michael Ulitskiy mulits...@acedsl.com
 wrote:
 Hello,
 
 We're in the early stage of planning ipv6 deployment -
 learning/labbing/experimenting/etc. We've got to the point when we're
 also planning to request initial ipv6 allocation from ARIN.
 So I wonder what ipv6 transit options I have if my upstreams do not
 support native ipv6 connectivity?
 I see Hurricane Electric tunnel broker BGP tunnel. Is there anything
 else? Either free or commercial?
 
 1) see gblx/ntt/sprint/twt/vzb for transit-v6
 2) tunnel inside your domain (your control, your MTU issues, your
 alternate pathing of tunnels vs pipe)
 3) don't tunnel beyond your borders, really just don't
 
 tunnels are bad, always.
 -chris
 
 I see so many times, that tunnels are bad for IPv6, but this is the way IPv6 
 has been designed to work when you
 cannot get direct IPv6. So I would not say tunnels are bad, but direct IPv6 
 is better (OECD document on IPv6
 states the use of tunnels).
 
 Tunnels promote poor paths, they bring along LOTS of issues wrt PMTUD,
 asymmetry of paths, improper/inefficient paths (see example paths from
 several ripe preso's by jereon/others), longer latency. If the tunnel
 exits your border you can't control what happens and you can't affect
 that tunnels performance characteristics. it's 2010, get native v6.
 
I will point out that most of these issues apply to 6to4 and Teredo auto-
tunnels and not as much to GRE or 6in4 statically configured tunnels.

There is a juniper bug which makes PMTU-D a problem if your tunnel
is Juniper-Juniper.

 If the issue with tunnel is MTU, then a non-negligible part of IPv4 does not 
 work well with MTU different of 1500.
 With IPv6 we bring the concept of jumbo packets, with large MTU. If we 
 cannot work with non standard MTUs in
 IPv6 tunnels, how will we work with jumbo packets?
 
 a non-negligible part of the ipv6 internet doesn't work at all with
 1280 mtu... due to tunnels and some other hackery :( jumbo packets
 are a fiction, everyone should stop 10 years ago believing they will
 ever work end-to-end between random sites.
 
Jumbo packets do work end to end in some random cases and PMTU-D
works in most others. All of the tunnels I am using have at least a 1280 MTU,
so, I'm not sure why you would think a tunnel wouldn't support 1280.

Owen




Re: ipv6 transit over tunneled connection

2010-05-14 Thread Owen DeLong

On May 14, 2010, at 1:36 PM, Jared Mauch wrote:

 
 On May 14, 2010, at 3:43 PM, Brielle Bruns wrote:
 
 (Sent from my Blackberry, please avoid the flames as I can't do inline 
 quoting)
 
 
 Native IPv6 is a crapshoot.  About the only people in the US that I've seen 
 that are no-bullshit IPv6 native ready is Hurricane Electric. NTT is 
 supposedly as well but I can't speak as to where they have connectivity.
 
 I can say that we (NTT) have been IPv6 enabled or ready at all customer ports 
 since ~2003.  Anyone else who has not gotten there in the intervening years 
 may have problems supporting you for your IPv4 as well :)
 
True.

 Being that there's issues that leave us unable to get native connectivity, 
 we have a BGP tunnel thanks to HE (with a 20ms latency from Seattle to 
 Freemont).
 
 You should be able to get native IPv6 in Seattle from a variety of providers. 
  If you're not finding it, you're not really looking (IMHO).
 
Depends.  If he's in the Westin or some other colo, sure.  If not, he may have 
last-mile expenses that exceed sanity for his situation leading to a tunneled 
solution.

 Tunnels suck if not done correctly.  We sometimes have faster and more 
 reliable connections through IPv6, so ymmv.
 
 The tunneled part of the IPv6 internet fell to the wayside a long time ago, 
 there are stragglers and I have even seen people try to peer over tunnels in 
 2010, but anyone still adding that level of overlay (v6-over-v4) may find 
 themselves in a world of hurt soon enough.
 
I have to disagree with you here. Given the proportion of the IPv6 internet 
that is still connected via tunnels, your statement simply doesn't really hold.

I will readily agree that where possible, native connections beat tunnels. 
However, tunnels can be a cost effective alternative where native connectivity 
is not yet readily available and they still work quite well if properly 
configured and structured.

Owen




Re: POE switches and lightning

2010-05-14 Thread Ingo Flaschberger
We had a lightning strike nearby yesterday that looks to have come inside 
our facility via a feeder circuit that goes outdoors underground to our 
facility's gate.


Perhaps there was a move of the earth-level relative to the neutral 
line.
I have no idea how neutral-line to earth potential is handled in us, but 
here in austria we use a so called nullung.
That means that the earth-ground potential line of the building (which 
includes also the lightning conductor) is connected to the neutral power 
line where it enters the building, keeping this potential-difference low.


Theres also a potential between earth ground and the neutral-phase of the 
online-ups.


The ethernet-cables; utp or stp?
pannels correctly earthed?

Perhaps a electrician should check the earthing.

Also all copper lines that enter the building should be protected by 
lightning protectors.


Kind regards,
Ingo Flaschberger



Contacts re email deliverability problem to tmomail.net?

2010-05-14 Thread Graham Freeman
Hi, folks,

A client of mine is having trouble delivering (legitimate) email to 
tmomail.net, and I'm having trouble finding the right contact.   (e.g. 
postmaster bounced).

I've verified the legitimate nature of the email (only user-initiated, and 
nothing more), the valid SPF, A, PTR, and MX records, etc.   We're also having 
no trouble sending the equivalent messages to the email-to-SMS gateways at ATT 
Wireless, Verizon Wireless, Sprint, etc. 

Any suggestions for the best points of contact at T-Mobile USA (tmomail.net)?

thanks!

Graham Freeman
graham.free...@cernio.com (Email/Jabber/SIP)
+1 415 462 2991 (office)




Re: POE switches and lightning

2010-05-14 Thread Seth Mattinen
On 5/14/2010 16:42, Ingo Flaschberger wrote:
 We had a lightning strike nearby yesterday that looks to have come
 inside our facility via a feeder circuit that goes outdoors
 underground to our facility's gate.
 
 Perhaps there was a move of the earth-level relative to the neutral line.
 I have no idea how neutral-line to earth potential is handled in us, but
 here in austria we use a so called nullung.
 That means that the earth-ground potential line of the building (which
 includes also the lightning conductor) is connected to the neutral power
 line where it enters the building, keeping this potential-difference low.
 

In the US neutral and earth ground are supposed to be bonded only once
at the service entrance. A separate ground from the neutral conductor is
carried to sub-panels where is it not bonded. Additional bonding can
cause weirdness and will turn the ground into a current carrying
conductor. However, an older building I used to be in (built 1978) only
gave me a neutral with bonded subs, so you'll run into all kinds of
stuff depending on the age of the building. Working at a university was
particularly interesting with of the vast range of building ages.

~Seth



Re: POE switches and lightning

2010-05-14 Thread Larry Sheldon
On 5/14/2010 19:00, Seth Mattinen wrote:
 On 5/14/2010 16:42, Ingo Flaschberger wrote:
 We had a lightning strike nearby yesterday that looks to have come
 inside our facility via a feeder circuit that goes outdoors
 underground to our facility's gate.

 Perhaps there was a move of the earth-level relative to the neutral line.
 I have no idea how neutral-line to earth potential is handled in us, but
 here in austria we use a so called nullung.
 That means that the earth-ground potential line of the building (which
 includes also the lightning conductor) is connected to the neutral power
 line where it enters the building, keeping this potential-difference low.

 
 In the US neutral and earth ground are supposed to be bonded only once
 at the service entrance. A separate ground from the neutral conductor is
 carried to sub-panels where is it not bonded. Additional bonding can
 cause weirdness and will turn the ground into a current carrying
 conductor. However, an older building I used to be in (built 1978) only
 gave me a neutral with bonded subs, so you'll run into all kinds of
 stuff depending on the age of the building. Working at a university was
 particularly interesting with of the vast range of building ages.

In my experience, each building has a building ground-point at the
service entrance, as outlined.

I the problem in a campus on some soils is that building grounds might
be several volts apart--except during thunder storms when the voltage
difference might be (it appears) thousands of volts, and with a
lightning strike to one of them many thousands of volts.

That is why I argue for glass only between buildings.  I don't care how
much PoE saves.

-- 
Somebody should have said:
A democracy is two wolves and a lamb voting on what to have for dinner.

Freedom under a constitutional republic is a well armed lamb contesting
the vote.

Requiescas in pace o email
Ex turpi causa non oritur actio
Eppure si rinfresca

ICBM Targeting Information:  http://tinyurl.com/4sqczs
http://tinyurl.com/7tp8ml





Re: Contacts re email deliverability problem to tmomail.net?

2010-05-14 Thread Jaren Angerbauer
On Fri, May 14, 2010 at 5:52 PM, Graham Freeman jah...@gmail.com wrote:
 A client of mine is having trouble delivering (legitimate) email to 
 tmomail.net, and I'm having trouble finding the right contact.

I just tested, and was able to successfully send an email to my
Tmobile address [myphon...@tmomail.net.  Are you getting bounces /
failures back that are of any use?  Also FWIW (and sanity check) any
reason why your client wants to use email-to-SMS, rather than just
SMS.  From what I understand email-to-sms isn't the best platform for
getting messages to mobile devices but I may be missing some
client-specific visibility.

--Jaren



Re: Contacts re email deliverability problem to tmomail.net?

2010-05-14 Thread Graham Freeman

On 14 May 10, at 17:23 , Jaren Angerbauer wrote:

 I just tested, and was able to successfully send an email to my
 Tmobile address [myphon...@tmomail.net.  Are you getting bounces /
 failures back that are of any use?  Also FWIW (and sanity check) any
 reason why your client wants to use email-to-SMS, rather than just
 SMS.  From what I understand email-to-sms isn't the best platform for
 getting messages to mobile devices but I may be missing some
 client-specific visibility.


Hi, Jaren,

Delivering SMS-to-SMS would be impractical and prohibitively expensive.  This 
is for an iPhone messaging app that optionally delivers messages to SMS 
recipients for free.  The business model depends on email-to-SMS gateways.

Like you, we were able to deliver messages in low volumes, but as the app 
became increasingly popular (at one point in the Top 20 in the App Store) the 
volume exceeded a opaque-to-us rate limit at Tmobile, but not at other mobile 
providers - some of whom we're sending many more messages than we ever tried to 
deliver to Tmobile.

Two examples out of thousands:

 Apr 30 23:52:52 pomelo.borange.com postfix/error[17836]: [ID 197553 
 mail.info] D44451D9570: to=[...@tmomail.net, relay=none, 
 delay=80196, delays=80195/0.18/0/0, dsn=4.0.0, status=deferred (delivery 
 temporarily suspended: host mm3.tmomail.net[66.94.25.228] refused to talk to 
 me: 421 mail.tmail.com closing connection)
 
 May  1 16:17:58 pomelo.borange.com postfix/smtp[24906]: [ID 197553 
 mail.info] 7CC5D1E9D7F: to=[...@tmomail.net, 
 relay=mm3.tmomail.net[66.94.9.228]:25, delay=59233, delays=59229/0/4.2/0, 
 dsn=4.0.0, status=deferred (host mm3.tmomail.net[66.94.9.228] refused to 
 talk to me: 421 mail.tmail.com closing connection)


thanks,

Graham




Re: Contacts re email deliverability problem to tmomail.net?

2010-05-14 Thread Al Iverson
On Fri, May 14, 2010 at 7:33 PM, Graham Freeman jah...@gmail.com wrote:

 Delivering SMS-to-SMS would be impractical and prohibitively expensive.  This 
 is for an iPhone messaging app that optionally delivers messages to SMS 
 recipients for free.  The business model depends on email-to-SMS gateways.

I'm surprised more gateways aren't rate limiting or blocking you; my
experience with these services is such that the providers really want
you to utilize SMS instead, if you build up any sort of significant
volume. I've certainly seen multiple providers delay this inbound mail
periodically.

Cheers,
Al Iverson



Stand alone voltage/etc monitoring?

2010-05-14 Thread Michael J McCafferty
NANOG,
How can I best monitor power quality (ie: voltage, etc) as a colo
customer? We monitor temperature and humidity in multiple places on each
floor we are on, network bandwidth/errors/latency/pps/link-state on
every link, power used per circuit, tons of metrics on servers, but I
can't seem to find a simple and small way to monitor voltage, etc. I
looked in the routers, cabinet-level switched power-strips (CDUs),
switches, and servers, and I don't see anything we already have that can
report that info. I see there are probably some small UPSes ($400 or so)
that can report this info. Seems silly to buy UPSes to get that info.

Is there a quick/small/handy/better way to get power quality info? If
so, what is it? I don't own the facility.

Thanks!
Mike

-- 

Michael J. McCafferty
Principal
M5 Hosting
http://www.m5hosting.com

You can have your own custom Dedicated Server up and running today !
RedHat Enterprise, CentOS, Ubuntu, Debian, OpenBSD, FreeBSD, and more





Re: ipv6 transit over tunneled connection

2010-05-14 Thread bmanning


 er... if I may - this whining about the evils of tunnels
 rings a bit hollow, esp for those who think that a VPN is 
 the right thing to do.

--bill


On Sat, May 15, 2010 at 08:44:53AM +1000, Karl Auer wrote:
 On Fri, 2010-05-14 at 14:57 -0400, Christopher Morrow wrote:
  Tunnels promote poor paths
 
 promote? Tunnel topology does not (necessarily) match the underlying
 topology, especially if you choose (or are forced to accept) a distant
 broker. But promote?
 
  , they bring along LOTS of issues wrt PMTUD,
 
 PMTUD that doesn't work on v6 probably doesn't work on v4. I agree that
 a bad PMTU can wreak more havoc on v6 than v4, but most of the issues
 are workaroundable.
  
  asymmetry of paths, improper/inefficient paths (see example paths from
  several ripe preso's by jereon/others), longer latency.
 
 All relating to the above. I suspect you really mean paths in the
 underlying topology, which is a by definition issue. None of these are
 necessary features of tunnels.
 
 Given the relatively low number of tunnel terminating services, and the
 fairly low level of choice available to people who want tunnels, these
 are bigger problems than they need to be. More demand will see these
 problems (as with so many transitional issues) lessen substantially.
 
   If the tunnel
  exits your border you can't control what happens and you can't affect
  that tunnels performance characteristics.
 
 Whereas with IPv4 you have complete control over everything that happens
 once packets exit your border? This is no different with IPv6 than with
 IPv4, except that you have fewer choices at present, so must make more
 drastic compromises.
 
   it's 2010, get native v6.
 
 Easily said :-(
 
 If you can't get native IPv6, then using a tunnel lets you get started;
 it lets you begin educating, testing and even delivering IPv6-based
 services. If, on the other hand, you wait until everything is perfect,
 you will be wy behind the eight-ball.
 
 Oh - and tunnels are usually way cheaper than native connectivity, so
 it's easier to get the idea of going v6 past the bean-counters.
 
 So: Yep, native IPv6 if you can get it. Otherwise, take tunnels. But
 whichever you do, do it now.
 
 Regards, K.
 
 -- 
 ~~~
 Karl Auer (ka...@biplane.com.au)   +61-2-64957160 (h)
 http://www.biplane.com.au/~kauer/  +61-428-957160 (mob)
 
 GPG fingerprint: B386 7819 B227 2961 8301 C5A9 2EBC 754B CD97 0156
 Old fingerprint: 07F3 1DF9 9D45 8BCD 7DD5 00CE 4A44 6A03 F43A 7DEF





Re: ipv6 transit over tunneled connection

2010-05-14 Thread Brielle Bruns

On 5/14/10 2:36 PM, Jared Mauch wrote:


Being that there's issues that leave us unable to get native
connectivity, we have a BGP tunnel thanks to HE (with a 20ms
latency from Seattle to Freemont).


You should be able to get native IPv6 in Seattle from a variety of
providers.  If you're not finding it, you're not really looking
(IMHO).



I can almost guarantee that noone can give us the level of service we 
get for the price we do - did an awful lot of research back in 2008 to 
find a new co-loc. We've also had nearly perfect uptime with the only 
downtime being caused by our own growing pains with equipment that has 
obsecure bugs relating to ipv4 and ipv6 BGP interactions.


Changing providers isn't really an option for us as alternatives are 
guaranteed to push us over budget.   is a limiting factor for us 
since we're not a business focused on profit.


Tunneling is our only option at this point.






Tunnels suck if not done correctly.  We sometimes have faster and
more reliable connections through IPv6, so ymmv.


The tunneled part of the IPv6 internet fell to the wayside a long
time ago, there are stragglers and I have even seen people try to
peer over tunnels in 2010, but anyone still adding that level of
overlay (v6-over-v4) may find themselves in a world of hurt soon
enough.


I'm willing to run the risk that my tunneled connection may have 
problems - its part of the game of being on the leading edge.


rant
This is not directed at anyone in particular, but people forget that not 
everyone has thousands, tens of thousands, hundreds of thousands, etc of 
money in their budget to accomplish their goals.  There are people out 
there, such as ourselves, that have a very limited budget to work within 
each month/year.  Some of us do what we do out of our own pockets 
because we like doing it.


For example, people have called me crazy for running P3 and P4 era HP 
DL360/380s instead of the new generation stuff, but those nice new 
servers cost serious coin, and I don't see people stepping up to fund 
these upgrades.


Just an observation, but I'm fairly sure that I'm not the only one who 
feels that those with rather high budgets tend to forget that not 
everyone has the luxury of a virtual blank check.

/rant

--
Brielle Bruns
The Summit Open Source Development Group
http://www.sosdg.org/ http://www.ahbl.org



Re: Stand alone voltage/etc monitoring?

2010-05-14 Thread Jake Khuon
On Fri, 2010-05-14 at 17:57 -0700, Michael J McCafferty wrote:
 I see there are probably some small UPSes ($400 or so)
 that can report this info. Seems silly to buy UPSes to get that info.
 
   Is there a quick/small/handy/better way to get power quality info? If
 so, what is it? I don't own the facility.

I've looked at various inline power monitoring appliances solutions and
honestly, most of them will cost more than a small UPS.  The question
is, where do you want to monitor the voltage?  At the input side of the
rack-PDU?  Are your PDUs manageable?  Do you want to monitor voltage to
each device (output side of the PDU)?

Or do you just want to sample monitor on the side (as opposed to inline)
and fed from the same circuit feeding the input side of your PDUs
assuming all your equipment/PDUs are receiving the same power quality?
I monitor at the UPS for my home systems.  My UPSes are APC brand.  A
SmartUPS 500 w/Web/SNMP card will run you about $350 to $400 and you
poll them for input voltage and frequency.  Here's a snapshot from a
couple of years ago... I do have dirty power.

http://farm1.static.flickr.com/226/464847907_c3038c21e4_o.png


-- 
/*=[ Jake Khuon kh...@neebu.net ]=+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | |  |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| NETWORKS |   
 +==*/





Re: ipv6 transit over tunneled connection

2010-05-14 Thread Michael Ulitskiy
Guys,

I've started this thread looking for advice on available options.
There's no doubt in my mind that native connectivity is better than tunnels, 
but unfortunately tunnel is the only way to get me started, 'cause my upstream 
does not support ipv6 (hopefully just yet) and I have no budget for additional 
circuits to ipv6-enabled carrier.
So my question still stands: is anyone aware of a reasonable tunneled ipv6 
transit service (I mean aside from HE tunnel broker)? The load will be really 
light. I don't expect we'll break a few Mbit/s in the nearest future and when 
we do then I guess it'll be the time to look for the native transit.
Thanks,

Michael

On Thursday 13 May 2010 18:18:12 Michael Ulitskiy wrote:
 Hello,
 
 We're in the early stage of planning ipv6 deployment -
  learning/labbing/experimenting/etc. We've got to the point when we're also
  planning to request initial ipv6 allocation from ARIN. So I wonder what
  ipv6 transit options I have if my upstreams do not support native ipv6
  connectivity? I see Hurricane Electric tunnel broker BGP tunnel. Is there
  anything else? Either free or commercial? Thanks,
 
 Michael
 



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Christopher Morrow
On Fri, May 14, 2010 at 9:58 PM, Brielle Bruns br...@2mbit.com wrote:

 rant
 Just an observation, but I'm fairly sure that I'm not the only one who feels
 that those with rather high budgets tend to forget that not everyone has the
 luxury of a virtual blank check.
 /rant

awesome, take an old 2800 or 2500, plug in a t1 to one of the
providers listed (twt seems like a great choice, or atlantech, who I
think also does v6 and seems to offer 300$/mon t1's regularly), run v6
ONLY on that, take the 10/100m ether out the back and v6-up the rest
of your network.

See, done for 300$/month... the reason I said 'find a provider that
does do native v6, terminate there and tunnel or spread-out internally
from there' was exactly because spending 'tens of thousands of
dollars' right off the bat was probably hard to justify.

thanks though.
-chris



Re: ipv6 transit over tunneled connection

2010-05-14 Thread Christopher Morrow
On Fri, May 14, 2010 at 11:25 PM, Michael Ulitskiy mulits...@acedsl.com wrote:

 So my question still stands: is anyone aware of a reasonable tunneled ipv6
 transit service (I mean aside from HE tunnel broker)? The load will be really
 light. I don't expect we'll break a few Mbit/s in the nearest future and when
 we do then I guess it'll be the time to look for the native transit.

beware the uTorrent ... (see johnb's notes about this)
sixxs i think also had NYC based tunnel boxes, no?

http://www.sixxs.net/pops/

usewr01 OCCAID Inc.
uschi02 Your.Org, Inc.

and I think kloch @carpathia was doing some of this for a time, though
perhaps only ASH/PHX ?
-chris



Re: Dial Concentrators - TNT / APX8000 R.I.P.

2010-05-14 Thread Alastair Johnson

Mark Foster wrote:

Thus the wider concern I flagged; if the only source for equipment and
spares is the grey market, aren't the vendors missing the boat on
something which shouldn't even have a major overhead to maintain?


There is no sales of new chassis, which means the manufacturing is shut 
down.  The costs to maintain support and spares for an obsolete platform 
with a declining customer base and no further sales is quite high for 
the vendor.  If they charged the real cost to provide support to the 
operator, most likely the operator wouldn't take the support contract.


End result: end of support.

If the operator /really/ needs to keep it going, they'll figure out a 
way to spare it.  Telcos have been specialists in this regard for a long 
time.



What about developing nations where Internet isn't yet as commonplace as
it is in the 'west' ?


They skip dialup.



Re: Dial Concentrators - TNT / APX8000 R.I.P.

2010-05-14 Thread joel jaeggli

On 2010-05-14 22:04, Alastair Johnson wrote:

Mark Foster wrote:

What about developing nations where Internet isn't yet as commonplace as
it is in the 'west' ?


They skip dialup.



dial modems are the end game for a 140 year old technology (300-3400hz 
pots lines).


There is literally no reason if you don't  already have that 
infrastructure that you would expend capital to replicate that sort of 
physical plant.