Re: SixXS Contact

2013-06-28 Thread Måns Nilsson
Subject: Re: SixXS Contact Date: Thu, Jun 27, 2013 at 09:43:19PM +0200 Quoting 
Måns Nilsson (mansa...@besserwisser.org):

 Personally, even though I'm on the same IRC channel as one of the admins
 and could have all support I want, I went with HE. Zero trouble. Excellent
 service. I'm peering with them at work, as does my colo provider, så
 have great connectivity.
 
 And, in v6, renumbering is easy (RIGHT? ;) so swapping providers is
 no pain.
 
 Now, Owen, where's my T-shirt?  ;-) 

Apparently I'm not on the same IRC channel as an admin anymore: 

Just let me state that the day after I quit working with SIXXS I got myself a 
HE tunnel

-- 
Måns Nilsson primary/secondary/besserwisser/machina
MN-1334-RIPE +46 705 989668
The FALAFEL SANDWICH lands on my HEAD and I become a VEGETARIAN ...


signature.asc
Description: Digital signature


Weekly Routing Table Report

2013-06-28 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith pfsi...@gmail.com.

Routing Table Report   04:00 +10GMT Sat 29 Jun, 2013

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  456943
Prefixes after maximum aggregation:  186069
Deaggregation factor:  2.46
Unique aggregates announced to Internet: 227072
Total ASes present in the Internet Routing Table: 44373
Prefixes per ASN: 10.30
Origin-only ASes present in the Internet Routing Table:   34730
Origin ASes announcing only one prefix:   16155
Transit ASes present in the Internet Routing Table:5896
Transit-only ASes present in the Internet Routing Table:144
Average AS path length visible in the Internet Routing Table:   4.6
Max AS path length visible:  30
Max AS path prepend of ASN ( 36992)  22
Prefixes from unregistered ASNs in the Routing Table:  1668
Unregistered ASNs in the Routing Table: 758
Number of 32-bit ASNs allocated by the RIRs:   4834
Number of 32-bit ASNs visible in the Routing Table:3747
Prefixes from 32-bit ASNs in the Routing Table:   10990
Special use prefixes present in the Routing Table:   24
Prefixes being announced from unallocated address space:215
Number of addresses announced to Internet:   2625956140
Equivalent to 156 /8s, 132 /16s and 233 /24s
Percentage of available address space announced:   70.9
Percentage of allocated address space announced:   70.9
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   94.7
Total number of prefixes smaller than registry allocations:  160087

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   109760
Total APNIC prefixes after maximum aggregation:   33678
APNIC Deaggregation factor:3.26
Prefixes being announced from the APNIC address blocks:  111592
Unique aggregates announced from the APNIC address blocks:45689
APNIC Region origin ASes present in the Internet Routing Table:4852
APNIC Prefixes per ASN:   23.00
APNIC Region origin ASes announcing only one prefix:   1215
APNIC Region transit ASes present in the Internet Routing Table:823
Average APNIC Region AS path length visible:4.8
Max APNIC Region AS path length visible: 23
Number of APNIC region 32-bit ASNs visible in the Routing Table:589
Number of APNIC addresses announced to Internet:  725314528
Equivalent to 43 /8s, 59 /16s and 107 /24s
Percentage of available APNIC address space announced: 84.8

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 131072-133119
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:158854
Total ARIN prefixes after maximum aggregation:80348
ARIN Deaggregation factor: 1.98
Prefixes being announced from the ARIN address blocks:   159485
Unique aggregates announced from the ARIN address blocks: 74154
ARIN Region origin ASes present in the Internet Routing Table:15753
ARIN Prefixes per ASN:10.12
ARIN Region origin 

We Are Watching You act to regulate consumer-watching devices.

2013-06-28 Thread Jay Ashworth
About 30 years ago, when I first got involved with the Net (Usenet; thanks to
USF and Spaf for the link, and Larry Strickland at SPJC for servers), one of
the topics that everyone loved to rant about were supposed plans from the
Neilsen Companies to put cameras on set top boxes and use them to get better
data about how many people were watching TV.

There was the expected public meltdown, as the word got 'round -- even given 
how impractical it would have been to implement with that day's tech -- and I 
was,
frankly surprised that it didn't recur when Microsoft started putting cameras
atop videogame consoles, in our much better connected world.

In light of the Snowden fracas, it has now, finally, recurred:

  
http://broadcastengineering.com/regulation/we-are-watching-you-act-introduced-regulate-privacy-home

This is another example, I think, of a thing that only a very small number
of people have thought proactively about over the years, but that I think
network engineering people ought to be at the forefront of that group:

I call it capability creep, by analogy to scope creep; it's the situation
where because of changes in technologies only peripherally related to your
own, yours suddenly acquires previously unexpected capabilities, for either
good or evil.

Ours -- high speed, pervasive, networking -- is probably the most common
enabling technology which has this effect, and while we can't exactly just 
shut the routers off and go home, and while people spend a whole lot of time
ignoring us on such topics (I can't count the toldjaso's from the last 3
decades), I still think it's a topic we ought to focus purposeful thinking
on as we go about our lives of planning and executing the next generation
of networks.  And the next.  And the next.

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA   #natog  +1 727 647 1274



Re: Service provider T1/PPP question

2013-06-28 Thread Ricky Beam
On Fri, 28 Jun 2013 00:07:45 -0400, Mike mike-na...@tiedyenetworks.com  
wrote:

I am wanting to offer a broadband over T1 service and have the ...


s/broadband/internet/

A T1 is miles away from broadband these days.

Having done this with Cisco gear (*years* ago), you want to avoid MLPPP  
whenever possible.  We did CEF per-packet when the CPE end was also Cisco;  
it worked perfectly with none of the restrictions or bugs.


--Ricky




RE: Service provider T1/PPP question

2013-06-28 Thread Naslund, Steve

-Original Message-
From: Ricky Beam [mailto:jfb...@gmail.com] 
Sent: Friday, June 28, 2013 2:45 PM
To: NANOG list; Mike
Subject: Re: Service provider T1/PPP question

On Fri, 28 Jun 2013 00:07:45 -0400, Mike mike-na...@tiedyenetworks.com
wrote:
 I am wanting to offer a broadband over T1 service and have the ...

s/broadband/internet/

A T1 is miles away from broadband these days.

Having done this with Cisco gear (*years* ago), you want to avoid MLPPP 
whenever possible.  We did CEF per-packet when the CPE end was also Cisco; it 
worked perfectly with none of the restrictions or bugs.

--Ricky

I think this post seems like a flashback.  I would not consider a T-1 to really 
be broadband anymore and it is pretty much limited to a business environment 
the way tariffs work.  As far as MLPPP, it seems to be pretty stable now where 
you need multiple bonded T-1s.  We have a few sites running MLPPP with Sprint 
on Juniper and Cisco gear and have not had an issue with it.  It is definitely 
not my preference for business connectivity anymore.  We tend to look for 
Ethernet service which is way cheaper per mb than T-1 and requires less 
expensive terminal equipment in most cases.  T-1s are the business solution 
where you need dedicated MPLS connectivity and fiber transport is not 
available.  DSL or Internet VPN are OK but somewhat less stable for business 
class private network solutions.  If it is internet connectivity they want you 
will get beaten up by the cable companies that can outrun and outprice you 
across the board.  You will also have a heck of a time competing with incumbent 
and competitive telecoms in T-1s that have central offices or collocations in 
central offices.  The economics just don't work if you don't have direct access 
to the cable plant.  Maybe up until the telecom act but not now.  How do you 
intend to get those T-1s back to you or are you a CLEC?

Steven Naslund




Google's QUIC

2013-06-28 Thread Michael Thomas

http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

Sorry if this is a little more on the dev side, and less on the ops side but 
since
it's Google, it will almost certainly affect the ops side eventually.

My first reaction to this was why not SCTP, but apparently they think that 
middle
boxen/firewalls make it problematic. That may be, but UDP based port filtering 
is
probably not far behind on the flaky front.

The second justification was TLS layering inefficiencies. That definitely has my
sympathies as TLS (especially cert exchange) is bloated and the way that it was
grafted onto TCP wasn't exactly the most elegant. Interestingly enough, their
main justification wasn't a security concern so much as helpful middle boxen
getting their filthy mitts on the traffic and screwing it up.

The last thing that occurs to me reading their FAQ is that they are seemingly 
trying
to send data with 0 round trips. That is, SYN, data, data, data... That really 
makes me
wonder about security/dos considerations. As in, it sounds too good to be true. 
But
maybe that's just the security cruft? But what about SYN cookies/dos? Hmmm.

Other comments or clue?

Mike



Re: Google's QUIC

2013-06-28 Thread Josh Hoppes
My first question is, how are they going to keep themselves from
congesting links?

On Fri, Jun 28, 2013 at 3:09 PM, Michael Thomas m...@mtcc.com wrote:
 http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

 Sorry if this is a little more on the dev side, and less on the ops side but
 since
 it's Google, it will almost certainly affect the ops side eventually.

 My first reaction to this was why not SCTP, but apparently they think that
 middle
 boxen/firewalls make it problematic. That may be, but UDP based port
 filtering is
 probably not far behind on the flaky front.

 The second justification was TLS layering inefficiencies. That definitely
 has my
 sympathies as TLS (especially cert exchange) is bloated and the way that it
 was
 grafted onto TCP wasn't exactly the most elegant. Interestingly enough,
 their
 main justification wasn't a security concern so much as helpful middle
 boxen
 getting their filthy mitts on the traffic and screwing it up.

 The last thing that occurs to me reading their FAQ is that they are
 seemingly trying
 to send data with 0 round trips. That is, SYN, data, data, data... That
 really makes me
 wonder about security/dos considerations. As in, it sounds too good to be
 true. But
 maybe that's just the security cruft? But what about SYN cookies/dos? Hmmm.

 Other comments or clue?

 Mike




Re: Google's QUIC

2013-06-28 Thread Michael Thomas

On 06/28/2013 01:16 PM, Josh Hoppes wrote:

My first question is, how are they going to keep themselves from
congesting links?


The FAQ claims they're paying attention to that, but I haven't read the
details. I sure hope they grok that not understanding Van Jacobson dooms
you to repeat it.

https://docs.google.com/document/d/1lmL9EF6qKrk7gbazY8bIdvq3Pno2Xj_l_YShP40GLQE/preview?sle=true#heading=h.h3jsxme7rovm

Mike



On Fri, Jun 28, 2013 at 3:09 PM, Michael Thomas m...@mtcc.com wrote:

http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

Sorry if this is a little more on the dev side, and less on the ops side but
since
it's Google, it will almost certainly affect the ops side eventually.

My first reaction to this was why not SCTP, but apparently they think that
middle
boxen/firewalls make it problematic. That may be, but UDP based port
filtering is
probably not far behind on the flaky front.

The second justification was TLS layering inefficiencies. That definitely
has my
sympathies as TLS (especially cert exchange) is bloated and the way that it
was
grafted onto TCP wasn't exactly the most elegant. Interestingly enough,
their
main justification wasn't a security concern so much as helpful middle
boxen
getting their filthy mitts on the traffic and screwing it up.

The last thing that occurs to me reading their FAQ is that they are
seemingly trying
to send data with 0 round trips. That is, SYN, data, data, data... That
really makes me
wonder about security/dos considerations. As in, it sounds too good to be
true. But
maybe that's just the security cruft? But what about SYN cookies/dos? Hmmm.

Other comments or clue?

Mike






Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 13:09:43 -0700, Michael Thomas m...@mtcc.com wrote:


http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

Sorry if this is a little more on the dev side, and less on the ops side  
but since

it's Google, it will almost certainly affect the ops side eventually.

My first reaction to this was why not SCTP, but apparently they think  
that middle
boxen/firewalls make it problematic. That may be, but UDP based port  
filtering is

probably not far behind on the flaky front.


Sounds like a UDP replacement. If this is true, then OS-level support will
be needed. If they are on this, then it's the perfect opportunity to fix
some other problems with the Internet in general.

My reaction is: why, oh why, repeat the same mistake of merging everything
on the transport layer and let the benefits be protocol-specific instead
of separating the transport from session.

I mean, why not let redundancy and multipath stay on the transport layer
through some kind of end-user transport (like the Host Identification
Protocol, RFC 5201) and let a simpler TCP and UDP live on top of that, on
the session layer.

Streamline the protocols and separate their functionality.

It's easier than it sounds.


--
Octavio.



Re: Google's QUIC

2013-06-28 Thread Christopher Morrow
On Fri, Jun 28, 2013 at 4:26 PM, Octavio Alvarez
alvar...@alvarezp.ods.org wrote:
 On Fri, 28 Jun 2013 13:09:43 -0700, Michael Thomas m...@mtcc.com wrote:


 http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1


 Sounds like a UDP replacement. If this is true, then OS-level support will
 be needed. If they are on this, then it's the perfect opportunity to fix
 some other problems with the Internet in general.

I'm no genius, but doesn't the article say it's UDP? (in the name of
the protocol even)

-chris



Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 13:39:04 -0700, Christopher Morrow
morrowc.li...@gmail.com wrote:


On Fri, Jun 28, 2013 at 4:26 PM, Octavio Alvarez
alvar...@alvarezp.ods.org wrote:


Sounds like a UDP replacement. If this is true, then OS-level support  
will

be needed. If they are on this, then it's the perfect opportunity to fix
some other problems with the Internet in general.


I'm no genius, but doesn't the article say it's UDP? (in the name of
the protocol even)


I was trying to emphasize replacement, not UDP. This is, that works on
the same layer, that requires OS-level modifications, as opposed to a
protocol that could be similar to UDP but work on the application layer.

My point was that all that work could be focused on a *really* good
transport (even with end-user multihoming without bloating the routing
table), and have streamlined TCP and UDP that takes advantage of the new
protocol.

Everyone's calling upon SCTP. Implementing similar techniques on multiple
transport protocols calls for a transport-session separation.

--
Octavio.



Re: Google's QUIC

2013-06-28 Thread Phil Fagan
In the presence of layer-3 load-balancers, a multiplexed transport has the
potential to allow the different data flows, coming and going to a client,
to be served on a single server. - Google

I'll drink the juice


On Fri, Jun 28, 2013 at 2:39 PM, Christopher Morrow morrowc.li...@gmail.com
 wrote:

 On Fri, Jun 28, 2013 at 4:26 PM, Octavio Alvarez
 alvar...@alvarezp.ods.org wrote:
  On Fri, 28 Jun 2013 13:09:43 -0700, Michael Thomas m...@mtcc.com
 wrote:
 
 
 
 http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

 
  Sounds like a UDP replacement. If this is true, then OS-level support
 will
  be needed. If they are on this, then it's the perfect opportunity to fix
  some other problems with the Internet in general.

 I'm no genius, but doesn't the article say it's UDP? (in the name of
 the protocol even)

 -chris




-- 
Phil Fagan
Denver, CO
970-480-7618


Re: Google's QUIC

2013-06-28 Thread Tassos Chatzithomaoglou
The idea reminds me of uTP in terms of congestion handling.

--
Tassos

Josh Hoppes wrote on 28/6/2013 23:16:
 My first question is, how are they going to keep themselves from
 congesting links?

 On Fri, Jun 28, 2013 at 3:09 PM, Michael Thomas m...@mtcc.com wrote:
 http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

 Sorry if this is a little more on the dev side, and less on the ops side but
 since
 it's Google, it will almost certainly affect the ops side eventually.

 My first reaction to this was why not SCTP, but apparently they think that
 middle
 boxen/firewalls make it problematic. That may be, but UDP based port
 filtering is
 probably not far behind on the flaky front.

 The second justification was TLS layering inefficiencies. That definitely
 has my
 sympathies as TLS (especially cert exchange) is bloated and the way that it
 was
 grafted onto TCP wasn't exactly the most elegant. Interestingly enough,
 their
 main justification wasn't a security concern so much as helpful middle
 boxen
 getting their filthy mitts on the traffic and screwing it up.

 The last thing that occurs to me reading their FAQ is that they are
 seemingly trying
 to send data with 0 round trips. That is, SYN, data, data, data... That
 really makes me
 wonder about security/dos considerations. As in, it sounds too good to be
 true. But
 maybe that's just the security cruft? But what about SYN cookies/dos? Hmmm.

 Other comments or clue?

 Mike






Re: Google's QUIC

2013-06-28 Thread Christopher Morrow
On Fri, Jun 28, 2013 at 4:48 PM, Octavio Alvarez
alvar...@alvarezp.ods.org wrote:
 On Fri, 28 Jun 2013 13:39:04 -0700, Christopher Morrow
 morrowc.li...@gmail.com wrote:

 On Fri, Jun 28, 2013 at 4:26 PM, Octavio Alvarez
 alvar...@alvarezp.ods.org wrote:


 Sounds like a UDP replacement. If this is true, then OS-level support
 will
 be needed. If they are on this, then it's the perfect opportunity to fix
 some other problems with the Internet in general.


 I'm no genius, but doesn't the article say it's UDP? (in the name of
 the protocol even)


 I was trying to emphasize replacement, not UDP. This is, that works on
 the same layer, that requires OS-level modifications, as opposed to a

again... not a super smart on this stuff, but..
why does it require OS modifications? isn't this just going be
'chrome' (or 'other application') asking for a udp socket and spewing
line-rate-foo out of that? isn't the application going to be doing all
of the multiplexing and jankiness?

 protocol that could be similar to UDP but work on the application layer.

it's not 'similar to UDP', it is in fact UDP, from what I read in the article.

 My point was that all that work could be focused on a *really* good
 transport (even with end-user multihoming without bloating the routing

how's that sctp going for you?
lisp?
sham6?

 table), and have streamlined TCP and UDP that takes advantage of the new
 protocol.

sure, ilnp?

 Everyone's calling upon SCTP. Implementing similar techniques on multiple
 transport protocols calls for a transport-session separation.

right, and the 1 application using sctp is so wide spread we've all
heard of it even.
possibly this will be a similar diversion into protocol/application
testing even.

-chris



Re: Google's QUIC

2013-06-28 Thread Christopher Morrow
On Fri, Jun 28, 2013 at 4:49 PM, Phil Fagan philfa...@gmail.com wrote:
 In the presence of layer-3 load-balancers, a multiplexed transport has the
 potential to allow the different data flows, coming and going to a client,
 to be served on a single server. - Google

 I'll drink the juice

i don't think much juice is required... doesn't that just say that the
same 'flow' will follow the same path through the network? and that
most/all (save a10/yahoo!) loadbalancers just LB based on 5-tuple (at
best)? so keeping things in a single flow/stream/5-tuple will drop
packets from one host deterministicaly on a single other host at the
far side?



Re: Google's QUIC

2013-06-28 Thread Phil Fagan
I took that as path agnostic.


On Fri, Jun 28, 2013 at 3:00 PM, Christopher Morrow morrowc.li...@gmail.com
 wrote:

 On Fri, Jun 28, 2013 at 4:49 PM, Phil Fagan philfa...@gmail.com wrote:
  In the presence of layer-3 load-balancers, a multiplexed transport has
 the
  potential to allow the different data flows, coming and going to a
 client,
  to be served on a single server. - Google
 
  I'll drink the juice

 i don't think much juice is required... doesn't that just say that the
 same 'flow' will follow the same path through the network? and that
 most/all (save a10/yahoo!) loadbalancers just LB based on 5-tuple (at
 best)? so keeping things in a single flow/stream/5-tuple will drop
 packets from one host deterministicaly on a single other host at the
 far side?




-- 
Phil Fagan
Denver, CO
970-480-7618


Re: Google's QUIC

2013-06-28 Thread Jay Ashworth
- Original Message -
 From: Michael Thomas m...@mtcc.com

 My first reaction to this was why not SCTP, but apparently they think

Simple Computer Telephony Protocol?  Did anyone ever actually implement that?

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA   #natog  +1 727 647 1274



Re: Google's QUIC

2013-06-28 Thread Michael Thomas

On 06/28/2013 02:07 PM, Jay Ashworth wrote:

- Original Message -

From: Michael Thomas m...@mtcc.com
My first reaction to this was why not SCTP, but apparently they think

Simple Computer Telephony Protocol?  Did anyone ever actually implement that?


No:


 http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol


*Mike*




Re: Google's QUIC

2013-06-28 Thread Scott Weeks
--- m...@mtcc.com wrote:
From: Michael Thomas m...@mtcc.com
On 06/28/2013 02:07 PM, Jay Ashworth wrote:
 - Original Message -
 From: Michael Thomas m...@mtcc.com

 My first reaction to this was why not SCTP, but apparently they think
 Simple Computer Telephony Protocol?  Did anyone ever actually implement that?

No:
  http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol
---


C'mon Jay!  Get with the plan!  ;-)

scott



Re: Google's QUIC

2013-06-28 Thread joel jaeggli

On 6/28/13 2:15 PM, Michael Thomas wrote:

On 06/28/2013 02:07 PM, Jay Ashworth wrote:

- Original Message -

From: Michael Thomas m...@mtcc.com
My first reaction to this was why not SCTP, but apparently they think
Simple Computer Telephony Protocol?  Did anyone ever actually 
implement that?


No:


http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol

SCTP is used successfully for the purpose for which it was intended, 
which is connecting SS7 switches over IP. It's not as much a posterchild 
for an application agnostic transport as some people would like to think.


*Mike*







Re: Google's QUIC

2013-06-28 Thread Valdis . Kletnieks
On Fri, 28 Jun 2013 14:28:39 -0700, joel jaeggli said:

 SCTP is used successfully for the purpose for which it was intended,
 which is connecting SS7 switches over IP. It's not as much a posterchild
 for an application agnostic transport as some people would like to think.

OK, I'll bite... does anything else notable actually use it?




pgpb1GCjZJePG.pgp
Description: PGP signature


Re: Google's QUIC

2013-06-28 Thread Michael Thomas

On 06/28/2013 02:28 PM, joel jaeggli wrote:

On 6/28/13 2:15 PM, Michael Thomas wrote:

On 06/28/2013 02:07 PM, Jay Ashworth wrote:

- Original Message -

From: Michael Thomas m...@mtcc.com
My first reaction to this was why not SCTP, but apparently they think

Simple Computer Telephony Protocol?  Did anyone ever actually implement that?


No:


http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol


SCTP is used successfully for the purpose for which it was intended, which is 
connecting SS7 switches over IP. It's not as much a posterchild for an 
application agnostic transport as some people would like to think.


Well, I'm pretty sure that Randy Stewart has a more expansive take on SCTP
than SS7oIP, but I get the impression that there just weren't enough other 
things
that cared  about head of line blocking. But now, 15 years later, it seems like 
maybe
there is.

In any case, if what you're worried about is head of line blocking, SCTP 
definitely
does that, and there are kernel implementations so for an *experiment* it seems
like you could get a long way by ignoring its warts.

But I think the most provocative thing is the idea of sending data payloads 
prior
to handshake. That sort of scares me because of the potential for an 
amplification
attack. But I haven't actually read the protocol paper itself.

Mike



The Cidr Report

2013-06-28 Thread cidr-report
This report has been generated at Fri Jun 28 21:13:56 2013 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
21-06-13457753  260974
22-06-13458159  261160
23-06-13458638  261324
24-06-13458895  261148
25-06-13458130  265776
26-06-13466890  265811
27-06-13467134  265159
28-06-13467649  265318


AS Summary
 44524  Number of ASes in routing system
 18376  Number of ASes announcing only one prefix
  4237  Largest number of prefixes announced by an AS
AS7029 : WINDSTREAM - Windstream Communications Inc
  116932576  Largest address span announced by an AS (/32s)
AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 28Jun13 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 467629   265381   20224843.2%   All ASes

AS6389  2991   74 291797.5%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.
AS28573 2902  105 279796.4%   NET Serviços de Comunicação
   S.A.
AS7029  4237 2108 212950.2%   WINDSTREAM - Windstream
   Communications Inc
AS17974 2561  525 203679.5%   TELKOMNET-AS2-AP PT
   Telekomunikasi Indonesia
AS4766  2930  936 199468.1%   KIXS-AS-KR Korea Telecom
AS10620 2677  848 182968.3%   Telmex Colombia S.A.
AS22773 1986  170 181691.4%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.
AS18566 2064  474 159077.0%   COVAD - Covad Communications
   Co.
AS4323  2979 1522 145748.9%   TWTC - tw telecom holdings,
   inc.
AS7303  1731  453 127873.8%   Telecom Argentina S.A.
AS7545  2021  750 127162.9%   TPG-INTERNET-AP TPG Telecom
   Limited
AS4755  1748  585 116366.5%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP
AS18881 1069   44 102595.9%   Global Village Telecom
AS7552  1159  142 101787.7%   VIETEL-AS-AP Vietel
   Corporation
AS2118  1085   86  99992.1%   RELCOM-AS OOO NPO Relcom
AS36998 1237  301  93675.7%   SDN-MOBITEL
AS1785  1995 1152  84342.3%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS18101 1002  182  82081.8%   RELIANCE-COMMUNICATIONS-IN
   Reliance Communications
   Ltd.DAKC MUMBAI
AS33363 2021 1241  78038.6%   BHN-TAMPA - BRIGHT HOUSE
   NETWORKS, LLC
AS4808  1148  393  75565.8%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS701   1533  803  73047.6%   UUNET - MCI Communications
   Services, Inc. d/b/a Verizon
   Business
AS13977  845  138  70783.7%   CTELCO - FAIRPOINT
   COMMUNICATIONS, INC.
AS22561 1193  517  67656.7%   DIGITAL-TELEPORT - Digital
   Teleport Inc.
AS855728   54  67492.6%   CANET-ASN-4 - Bell Aliant
   Regional Communications, Inc.
AS6983  1145  478  66758.3%   ITCDELTA - ITC^Deltacom
AS8151  1266  602  66452.4%   Uninet S.A. de C.V.
AS24560 1080  417  66361.4%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services
AS17676  735  112  62384.8%   GIGAINFRA Softbank BB Corp.
AS8402  1647 1051  59636.2%   CORBINA-AS OJSC Vimpelcom
AS31148  803  208 

BGP Update Report

2013-06-28 Thread cidr-report
BGP Update Report
Interval: 20-Jun-13 -to- 27-Jun-13 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS35819   44046  2.2%  93.7 -- MOBILY-AS Etihad Etisalat 
Company (Mobily)
 2 - AS47331   34189  1.7%  16.1 -- TTNET TTNet A.S.
 3 - AS840231907  1.6%  25.4 -- CORBINA-AS OJSC Vimpelcom
 4 - AS982930085  1.5%  31.9 -- BSNL-NIB National Internet 
Backbone
 5 - AS27738   26279  1.3%  45.9 -- Ecuadortelecom S.A.
 6 - AS755223804  1.2%  15.9 -- VIETEL-AS-AP Vietel Corporation
 7 - AS453822791  1.1%  43.7 -- ERX-CERNET-BKB China Education 
and Research Network Center
 8 - AS17974   22234  1.1%   8.7 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
 9 - AS958321563  1.1%  16.7 -- SIFY-AS-IN Sify Limited
10 - AS941617229  0.8% 297.1 -- MULTIMEDIA-AS-AP Hoshin 
Multimedia Center Inc.
11 - AS671314767  0.7%  27.2 -- IAM-AS
12 - AS37004   13691  0.7% 652.0 -- SUBURBAN-AS
13 - AS60974   13041  0.7% 255.7 -- NAICOMS Naicoms EOOD
14 - AS12252   11023  0.6%  73.5 -- America Movil Peru S.A.C.
15 - AS27947   10791  0.5%  21.3 -- Telconet S.A
16 - AS29049   10705  0.5%  31.6 -- DELTA-TELECOM-AS Delta Telecom 
LTD.
17 - AS269710396  0.5% 110.6 -- ERX-ERNET-AS Education and 
Research Network
18 - AS28573   10382  0.5%   7.5 -- NET Serviços de Comunicação S.A.
19 - AS475510146  0.5%   7.7 -- TATACOMM-AS TATA Communications 
formerly VSNL is Leading ISP
20 - AS458999838  0.5%  26.3 -- VNPT-AS-VN VNPT Corp


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS9854 6668  0.3%6668.0 -- KTO-AS-KR KTO
 2 - AS6174 6108  0.3%3054.0 -- SPRINTLINK8 - Sprint
 3 - AS362252953  0.1%2953.0 -- INFINITEIT-ASN-01 - Infinite IT 
Solutions Inc.
 4 - AS8137 4762  0.2%2381.0 -- DISNEYONLINE-AS - Disney Online
 5 - AS369762130  0.1%2130.0 -- SONANGOL
 6 - AS373673513  0.2%1756.5 -- CALLKEY
 7 - AS423343609  0.2%1203.0 -- BBP-AS Broadband Plus s.a.l.
 8 - AS354131124  0.1%1124.0 -- SL-NETWORKS SL Networks SRL
 9 - AS110172091  0.1%1045.5 -- CSN - CSN Support Services
10 - AS611411032  0.1%1032.0 -- OST-AS OST CJSC
11 - AS37551  0.4%1502.0 -- CMED-AS Cmed Technology Ltd
12 - AS37004   13691  0.7% 652.0 -- SUBURBAN-AS
13 - AS222165632  0.3% 625.8 -- SIEMENS-PLM - Siemens 
Corporation
14 - AS486128636  0.4% 616.9 -- RTC-ORENBURG-AS CJSC 
Comstar-Regions
15 - AS104453922  0.2% 560.3 -- HTG - Huntleigh Telcom
16 - AS55150 555  0.0% 555.0 -- DST-01 - DST Resources
17 - AS349693840  0.2% 480.0 -- PASJONET-AS Pasjo.Net Sp, z o.o.
18 - AS50797 461  0.0% 461.0 -- ELIXE-AS Elixe Co. Ltd
19 - AS57851 439  0.0% 439.0 -- 
GENESIS-HOUSING-ASSOCIATION-LIMITED Genesis Housing Association Limited
20 - AS22688 829  0.0% 414.5 -- DOLGENCORP - Dollar General 
Corporation


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 203.118.224.0/21   8581  0.4%   AS9416  -- MULTIMEDIA-AS-AP Hoshin 
Multimedia Center Inc.
 2 - 92.246.207.0/248572  0.4%   AS48612 -- RTC-ORENBURG-AS CJSC 
Comstar-Regions
 3 - 203.118.232.0/21   8543  0.4%   AS9416  -- MULTIMEDIA-AS-AP Hoshin 
Multimedia Center Inc.
 4 - 202.41.70.0/24 7890  0.4%   AS2697  -- ERX-ERNET-AS Education and 
Research Network
 5 - 192.58.232.0/247776  0.4%   AS6629  -- NOAA-AS - NOAA
 6 - 211.214.206.0/24   6668  0.3%   AS9854  -- KTO-AS-KR KTO
 7 - 192.107.15.0/245126  0.2%   AS14733 -- AS14733 - Barclays Capital Inc.
 8 - 198.187.189.0/24   4759  0.2%   AS8137  -- DISNEYONLINE-AS - Disney Online
 9 - 194.63.9.0/24  4589  0.2%   AS1273  -- CW Cable and Wireless Worldwide 
plc
10 - 64.187.64.0/23 4037  0.2%   AS16608 -- KENTEC - Kentec Communications, 
Inc.
11 - 173.232.234.0/24   4020  0.2%   AS30693 -- 
EONIX-CORPORATION-AS-WWW-EONIX-NET - Eonix Corporation
12 - 173.232.235.0/24   4017  0.2%   AS30693 -- 
EONIX-CORPORATION-AS-WWW-EONIX-NET - Eonix Corporation
13 - 69.38.178.0/24 4016  0.2%   AS19406 -- TWRS-MA - Towerstream I, Inc.
14 - 62.84.76.0/24  3601  0.2%   AS42334 -- BBP-AS Broadband Plus s.a.l.
15 - 41.75.40.0/21  3510  0.2%   AS37367 -- CALLKEY
16 - 64.187.64.0/24 3436  0.2%   AS16608 -- KENTEC - Kentec Communications, 
Inc.
17 - 206.105.75.0/243054  0.1%   AS6174  -- SPRINTLINK8 - Sprint
18 - 208.16.110.0/243054  0.1%   AS6174  -- SPRINTLINK8 - Sprint
19 - 216.27.253.0/242998 

Re: Google's QUIC

2013-06-28 Thread Scott Whyte
On Fri, Jun 28, 2013 at 1:23 PM, Michael Thomas m...@mtcc.com wrote:

 On 06/28/2013 01:16 PM, Josh Hoppes wrote:

 My first question is, how are they going to keep themselves from
 congesting links?


 The FAQ claims they're paying attention to that, but I haven't read the
 details. I sure hope they grok that not understanding Van Jacobson dooms
 you to repeat it.


Van is at Google.  Much grokking is going on.

-Scott



 https://docs.google.com/**document/d/**1lmL9EF6qKrk7gbazY8bIdvq3Pno2X**
 j_l_YShP40GLQE/preview?sle=**true#heading=h.h3jsxme7rovmhttps://docs.google.com/document/d/1lmL9EF6qKrk7gbazY8bIdvq3Pno2Xj_l_YShP40GLQE/preview?sle=true#heading=h.h3jsxme7rovm

 Mike



 On Fri, Jun 28, 2013 at 3:09 PM, Michael Thomas m...@mtcc.com wrote:

 http://arstechnica.com/**information-technology/2013/**
 06/google-making-the-web-**faster-with-protocol-that-**
 reduces-round-trips/?comments=**1http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

 Sorry if this is a little more on the dev side, and less on the ops side
 but
 since
 it's Google, it will almost certainly affect the ops side eventually.

 My first reaction to this was why not SCTP, but apparently they think
 that
 middle
 boxen/firewalls make it problematic. That may be, but UDP based port
 filtering is
 probably not far behind on the flaky front.

 The second justification was TLS layering inefficiencies. That definitely
 has my
 sympathies as TLS (especially cert exchange) is bloated and the way that
 it
 was
 grafted onto TCP wasn't exactly the most elegant. Interestingly enough,
 their
 main justification wasn't a security concern so much as helpful middle
 boxen
 getting their filthy mitts on the traffic and screwing it up.

 The last thing that occurs to me reading their FAQ is that they are
 seemingly trying
 to send data with 0 round trips. That is, SYN, data, data, data... That
 really makes me
 wonder about security/dos considerations. As in, it sounds too good to be
 true. But
 maybe that's just the security cruft? But what about SYN cookies/dos?
 Hmmm.

 Other comments or clue?

 Mike






Re: Google's QUIC

2013-06-28 Thread Nikolay Shopik


On 29.06.2013, at 1:38, valdis.kletni...@vt.edu wrote:

 On Fri, 28 Jun 2013 14:28:39 -0700, joel jaeggli said:
 
 SCTP is used successfully for the purpose for which it was intended,
 which is connecting SS7 switches over IP. It's not as much a posterchild
 for an application agnostic transport as some people would like to think.
 
 OK, I'll bite... does anything else notable actually use it?
 
 

Well it mostly non-user stuff, Netflow exporting, diameter, sip. Wait webrtc 
using it, firefox and chrome have sctp code, last time a checked 


Charter - IPv6 peering

2013-06-28 Thread Robert Glover
Anyone from Charter have any information on when IPv6 peering will be
available to Charter Business customers?

My response from support was Charter is not currently providing IPV6
customer peering

Looking back in the NANOG archives, I see back in May there was mention
of a field trial for Charter Business customers.  Did that become a thing?

-Robert



Re: Charter - IPv6 peering

2013-06-28 Thread Robert Glover
 Looking back in the NANOG archives, I see back in May there was mention
 of a field trial for Charter Business customers.  Did that become a thing?
Forgot to add, that is May of *2012*


Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 13:57:48 -0700, Christopher Morrow
morrowc.li...@gmail.com wrote:


again... not a super smart on this stuff, but..
why does it require OS modifications? isn't this just going be
'chrome' (or 'other application') asking for a udp socket and spewing
line-rate-foo out of that? isn't the application going to be doing all
of the multiplexing and jankiness?


I hope not. What would be the point of only letting one application take
the benefit of all those improvements?

If we're able to identify clear performance wins, our hope is to
collaborate with the rest of the community to develop the features and
techniques of QUIC into network standards.

So yes, QUIC itself doesn't require OS-level modifications, but letting
stay there is pointless.


protocol that could be similar to UDP but work on the application layer.


it's not 'similar to UDP', it is in fact UDP, from what I read in the  
article.


Well, it runs on top of UDP, but it is NOT UDP. My guess is that UDP is
needed just to work through NAT.


My point was that all that work could be focused on a *really* good
transport (even with end-user multihoming without bloating the routing


how's that sctp going for you?
lisp?
sham6?


That's the point exactly. Google has more power and popularity to
influence adoption of a protocol, just like with SPDY and QUIC.

Neither of the three are widely implemented. That said, neither of those
enable full path resiliency. Path resiliency requires the end-point to be
available through different paths and being able to detect those paths
*before* the first connection is established.

SCTP is not NAT friendly (to the best of my knowledge), SHIM6 is
IPv6-specific and can help you recover an already successful connection.
LISP... I can't still grasp LISP, although it doesn't have anything to do
with multihoming. :-)


table), and have streamlined TCP and UDP that takes advantage of the new
protocol.


sure, ilnp?


ILNP is new for me. Looks interesting, thanks.


--
Octavio.



Re: Charter - IPv6 peering

2013-06-28 Thread Seth Mattinen

On 6/28/13 3:16 PM, Robert Glover wrote:

Anyone from Charter have any information on when IPv6 peering will be
available to Charter Business customers?

My response from support was Charter is not currently providing IPV6
customer peering

Looking back in the NANOG archives, I see back in May there was mention
of a field trial for Charter Business customers.  Did that become a thing?




I've had native IPv6 from Charter since January 2013.

~Seth



Re: Charter - IPv6 peering

2013-06-28 Thread Robert Glover
On 6/28/2013 3:27 PM, Seth Mattinen wrote:
 I've had native IPv6 from Charter since January 2013.

 ~Seth

Are you a Charter Business fiber customer doing BGP with IPv6 PI space?

-Robert



Re: Charter - IPv6 peering

2013-06-28 Thread Seth Mattinen

On 6/28/13 3:36 PM, Robert Glover wrote:

On 6/28/2013 3:27 PM, Seth Mattinen wrote:

I've had native IPv6 from Charter since January 2013.

~Seth


Are you a Charter Business fiber customer doing BGP with IPv6 PI space?




Yes to all. They're one of the providers I multihome with.

~Seth



Re: Google's QUIC

2013-06-28 Thread Christopher Morrow
On Jun 28, 2013 6:24 PM, Octavio Alvarez alvar...@alvarezp.ods.org
wrote:

 On Fri, 28 Jun 2013 13:57:48 -0700, Christopher Morrow
 morrowc.li...@gmail.com wrote:

 again... not a super smart on this stuff, but..

 protocol that could be similar to UDP but work on the application layer.


 it's not 'similar to UDP', it is in fact UDP, from what I read in the
article.


 Well, it runs on top of UDP, but it is NOT UDP. My guess is that UDP is
 needed just to work through NAT.



Runs in top of UDP... Is not UDP...

If it has protocol set to 17 it is UDP.

 My point was that all that work could be focused on a *really* good
 transport (even with end-user multihoming without bloating the routing


 how's that sctp going for you?
 lisp?
 sham6?


 That's the point exactly. Google has more power and popularity to
 influence adoption of a protocol, just like with SPDY and QUIC.

 Neither of the three are widely implemented. That said, neither of those
 enable full path resiliency. Path resiliency requires the end-point to be
 available through different paths and being able to detect those paths
 *before* the first connection is established.

 SCTP is not NAT friendly (to the best of my knowledge), SHIM6 is
 IPv6-specific and can help you recover an already successful connection.
 LISP... I can't still grasp LISP, although it doesn't have anything to do
 with multihoming. :-)


Lisp is actually very much about multihoming... In fact that was one of the
key reasons it got started. It actually could make multihoming and mobility
very much simpler at the applications if it were used.

It is a bit complex though... At least for normal ivp4/6 routing minded
folk.


 table), and have streamlined TCP and UDP that takes advantage of the new
 protocol.


 sure, ilnp?


 ILNP is new for me. Looks interesting, thanks.

Mind that ilnp is v6only also requires stack changes...


Re: Service provider T1/PPP question

2013-06-28 Thread Mike

On 06/28/2013 12:56 PM, Naslund, Steve wrote:


I think this post seems like a flashback.  I would not consider a T-1 to really 
be broadband anymore and it is pretty much limited to a business environment 
the way tariffs work.  As far as MLPPP, it seems to be pretty stable now where 
you need multiple bonded T-1s.  We have a few sites running MLPPP with Sprint 
on Juniper and Cisco gear and have not had an issue with it.  It is definitely 
not my preference for business connectivity anymore.  We tend to look for 
Ethernet service which is way cheaper per mb than T-1 and requires less 
expensive terminal equipment in most cases.  T-1s are the business solution 
where you need dedicated MPLS connectivity and fiber transport is not 
available.  DSL or Internet VPN are OK but somewhat less stable for business 
class private network solutions.  If it is internet connectivity they want you 
will get beaten up by the cable companies that can outrun and outprice you 
across the board.  You will also have a heck of a time competing with incumbent 
and competitive telecoms in T-1s that have central offices or collocations in 
central offices.  The economics just don't work if you don't have direct access 
to the cable plant.  Maybe up until the telecom act but not now.  How do you 
intend to get those T-1s back to you or are you a CLEC?




I am a clec with colocated facilities, and my targets are rural unserved 
areas where none of the factors above are considerations. I just want to 
connect with anyone who's done this and has a qualified technical 
opinion on optimal deployment strategies; the business considerations 
are already done.


Thanks tho.

Mike





RE: Service provider T1/PPP question

2013-06-28 Thread Eric Wieling


-Original Message-
From: Mike [mailto:mike-na...@tiedyenetworks.com] 
Sent: Friday, June 28, 2013 8:26 PM
To: nanog@nanog.org
Subject: Re: Service provider T1/PPP question

On 06/28/2013 12:56 PM, Naslund, Steve wrote:

 I think this post seems like a flashback.  I would not consider a T-1 to 
 really be broadband anymore and it is pretty much limited to a business 
 environment the way tariffs work.  As far as MLPPP, it seems to be pretty 
 stable now where you need multiple bonded T-1s.  We have a few sites running 
 MLPPP with Sprint on Juniper and Cisco gear and have not had an issue with 
 it.  It is definitely not my preference for business connectivity anymore.  
 We tend to look for Ethernet service which is way cheaper per mb than T-1 and 
 requires less expensive terminal equipment in most cases.  T-1s are the 
 business solution where you need dedicated MPLS connectivity and fiber 
 transport is not available.  DSL or Internet VPN are OK but somewhat less 
 stable for business class private network solutions.  If it is internet 
 connectivity they want you will get beaten up by the cable companies that can 
 outrun and outprice you across the board.  You will also have a heck of a 
 time competing with incumbent and competitive telecoms in T-1s that have 
 central offices or collocations in central offices.  The economics just don't 
 work if you don't have direct access to the cable plant.  Maybe up until the 
 telecom act but not now.  How do you intend to get those T-1s back to you or 
 are you a CLEC?



I am a clec with colocated facilities, and my targets are rural unserved areas 
where none of the factors above are considerations. I just want to connect with 
anyone who's done this and has a qualified technical opinion on optimal 
deployment strategies; the business considerations are already done.



Most T-1 service these days seems to be delivered over HDSL.   You may also 
want to consider EoC. XO uses Adtran CPEs for their EoC service, anything 
from 1.5Mbps to 20Mbps service over 1 or more copper pairs with good distances 
between repeaters.






RE: Service provider T1/PPP question

2013-06-28 Thread Tim Jackson
The problem being a CLEC is getting access to repeater housings.

Usually limits you to a few kft. At least you can get up to 15mbps/pair now.
On Jun 28, 2013 6:23 PM, Eric Wieling ewiel...@nyigc.com wrote:



 -Original Message-
 From: Mike [mailto:mike-na...@tiedyenetworks.com]
 Sent: Friday, June 28, 2013 8:26 PM
 To: nanog@nanog.org
 Subject: Re: Service provider T1/PPP question

 On 06/28/2013 12:56 PM, Naslund, Steve wrote:
 
  I think this post seems like a flashback.  I would not consider a T-1 to
 really be broadband anymore and it is pretty much limited to a business
 environment the way tariffs work.  As far as MLPPP, it seems to be pretty
 stable now where you need multiple bonded T-1s.  We have a few sites
 running MLPPP with Sprint on Juniper and Cisco gear and have not had an
 issue with it.  It is definitely not my preference for business
 connectivity anymore.  We tend to look for Ethernet service which is way
 cheaper per mb than T-1 and requires less expensive terminal equipment in
 most cases.  T-1s are the business solution where you need dedicated MPLS
 connectivity and fiber transport is not available.  DSL or Internet VPN are
 OK but somewhat less stable for business class private network solutions.
  If it is internet connectivity they want you will get beaten up by the
 cable companies that can outrun and outprice you across the board.  You
 will also have a heck of a time competing with incumbent and competitive
 telecoms in T-1s that have central offices or collocations in central
 offices.  The economics just don't work if you don't have direct access to
 the cable plant.  Maybe up until the telecom act but not now.  How do you
 intend to get those T-1s back to you or are you a CLEC?
 
 

 I am a clec with colocated facilities, and my targets are rural unserved
 areas where none of the factors above are considerations. I just want to
 connect with anyone who's done this and has a qualified technical opinion
 on optimal deployment strategies; the business considerations are already
 done.


 

 Most T-1 service these days seems to be delivered over HDSL.   You may
 also want to consider EoC. XO uses Adtran CPEs for their EoC service,
 anything from 1.5Mbps to 20Mbps service over 1 or more copper pairs with
 good distances between repeaters.







Re: Service provider T1/PPP question

2013-06-28 Thread Mike

On 06/28/2013 06:21 PM, Eric Wieling wrote:
I am a clec with colocated facilities, and my targets are rural 
unserved areas where none of the factors above are considerations. I 
just want to connect with anyone who's done this and has a qualified 
technical opinion on optimal deployment strategies; the business 
considerations are already done. 
 
Most T-1 service these days seems to be delivered over HDSL. You may 
also want to consider EoC. XO uses Adtran CPEs for their EoC service, 
anything from 1.5Mbps to 20Mbps service over 1 or more copper pairs 
with good distances between repeaters. 



Im already doing the above. Just need T1 for reach since EoC is only 
good on home runs from the CO out to some distance whereas T1 can get me 
into the hills beyond.


Mike-



Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 17:20:21 -0700, Christopher Morrow
morrowc.li...@gmail.com wrote:



Runs in top of UDP... Is not UDP...

If it has protocol set to 17 it is UDP.


So QUIC is an algorithm instead of a protocol?


SCTP is not NAT friendly (to the best of my knowledge), SHIM6 is
IPv6-specific and can help you recover an already successful  
connection.


LISP... I can't still grasp LISP, although it doesn't have anything to  
do with multihoming. :-)


Lisp is actually very much about multihoming... In fact that was one of  
the key reasons it got started. It actually could make multihoming and  
mobility very much simpler at the applications if it were used.


Yeah, but LISP is as [in]accessible to end-users as BGP is and it will
be like that forever. It requires ISPs to opt-in to provide this. LISP
is not a universal option.

LISP matters to the Internet core, it doesn't matter to the whole Internet.
It is just not universal.


ILNP is new for me. Looks interesting, thanks.


Mind that ilnp is v6only also requires stack changes...


I just read about ILNP. ILNP is nice if you want to multihome nodes, but
virtualization (or spanning, for that matter, similar to anycasting) over
multiple data-centers will reach the limitations of ILNP. It is a step
ahead, but it is not an integral approach.

I wish my Debian mirror would just be the mirror.debian.net *service*
(not host), and the network could choose the best for me.


--
Octavio.



Re: Service provider T1/PPP question

2013-06-28 Thread Leo Bicknell

On Jun 28, 2013, at 7:26 PM, Mike mike-na...@tiedyenetworks.com wrote:

 I am a clec with colocated facilities, and my targets are rural unserved 
 areas where none of the factors above are considerations. I just want to 
 connect with anyone who's done this and has a qualified technical opinion on 
 optimal deployment strategies; the business considerations are already done.

I find this fascinating, but here's the scoop.

When T1's were the bee's knees (why is that a saying, anyway?) they were sold 
to what today we would call a business customer.  The concept of residential 
users as we know them know didn't really exist during T1's heyday.  Also during 
this time period MLPPP for high speed (yes, T1's qualified wasn't really a 
thing, rather external multiplexers and HSSI (remember those fun cables?) into 
a DS3 interface were a thing.  Remember providers that did Frame Relay over 
NxT1 just so they could mux the multiple customers on to DS-3/OC-3 into 
routers?  Fun times...not.  Anyway, the customer would have a router, like a 
real router, well, a 25xx anyway, and know how to configure it.

That doesn't seem to be the world you're describing though, which is why I 
think you're getting crickets on the mailing list.

Here's my $0.02, this is going to work best if you go somewhat old school in 
the config.  HDLC or PPP over a single T1 to any equipment that supports either 
should more or less work just fine.  Static assignment will work just fine, PPP 
learned assignments should work more or less just fine.  Any of the things that 
can channelize DS-3/OC-3/OC-12/OC-48 down to T1 should work just dandy, it's 
all a matter of how many you have and your particular economics.  Bonded T1's 
is where it gets interesting.  MLPPP should be possible with modern hardware, 
but honestly it got a workout on devices that did things like ISDN, not T1's.  
Still, if you choose carefully I don't see any reason why MLPPP shouldn't be 
reliable and work just fine in today's world.

If you're willing to do without modern features, you should be able to pick up 
a ton of gear that does all this for dirt cheap.  A 7513 with channelized DS-3 
cards is still quite spiffy for terminating static routed T1's for instance, 
and people may even pay you take them at this point. :)  The CPE will be more 
interesting, there are several vendors that still make CPE with T1 interfaces, 
but that's much more rare.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/







signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: Google's QUIC

2013-06-28 Thread Leo Bicknell

On Jun 28, 2013, at 5:24 PM, Octavio Alvarez alvar...@alvarezp.ods.org wrote:

 That's the point exactly. Google has more power and popularity to
 influence adoption of a protocol, just like with SPDY and QUIC.

This is the main reason why I'm very supportive of this effort.  I'm a bit 
skeptical of what I have read so far, but I know that it's nearly impossible to 
tell how these things really work from theory and simulations.  Live, real 
world testing is required competing with all sorts of other flows.

Google with their hands in both things like www.google.com and Chrome is in an 
interesting position to implement server and client side of these 
implementations, and turn them on and off at will.  They can do the real world 
tests, tweak, report on them, and advance the state of the art.

So for now I'll reserve judgement on this particular protocol, while 
encouraging Google to do more of this sort of real world testing at the 
protocol level.

Now, how about an SCTP test? :)

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/







signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: Service provider T1/PPP question

2013-06-28 Thread Jeff Kell

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
On 6/28/2013 10:56 PM, Leo Bicknell wrote:
 If you're willing to do without modern features, you should be able to pick 
 up a ton of gear that does
all this for dirt cheap. A 7513 with channelized DS-3 cards is still
quite spiffy for terminating static routed T1's for instance, and people
may even pay you take them at this point. :) The CPE will be more
interesting, there are several vendors that still make CPE with T1
interfaces, but that's much more rare.

As someone else already mentioned, back in the 720x-VXR /3640 days of T1
terminations, we scaled up to 5 T1s before going to [fractional] DS3,
and the old cef per-packet load balancing was wonderful provided you
were talking to another Cisco endpoint (which for us, at the time, was
Qwest, and yes it was).

We were so sold on it that we even tried that on campus, but soon
learned that Catalysts had no idea what cef per-packet meant :(  So
enter EIGRP / utilization load sharing...

Jeff
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)
 
iEYEARECAAYFAlHOT+gACgkQiwXJq373XhaozQCgiVGXOMIDccyONDRUQAk/M5GW
2OQAn2EfzwkvrgIl4eUsjIAGyXKq7z6s
=u7Mw
-END PGP SIGNATURE-





Re: Google's QUIC

2013-06-28 Thread cb.list6
On Fri, Jun 28, 2013 at 8:00 PM, Leo Bicknell bickn...@ufp.org wrote:

 On Jun 28, 2013, at 5:24 PM, Octavio Alvarez alvar...@alvarezp.ods.org 
 wrote:

 That's the point exactly. Google has more power and popularity to
 influence adoption of a protocol, just like with SPDY and QUIC.

 This is the main reason why I'm very supportive of this effort.  I'm a bit 
 skeptical of what I have read so far, but I know that it's nearly impossible 
 to tell how these things really work from theory and simulations.  Live, real 
 world testing is required competing with all sorts of other flows.

 Google with their hands in both things like www.google.com and Chrome is in 
 an interesting position to implement server and client side of these 
 implementations, and turn them on and off at will.  They can do the real 
 world tests, tweak, report on them, and advance the state of the art.

 So for now I'll reserve judgement on this particular protocol, while 
 encouraging Google to do more of this sort of real world testing at the 
 protocol level.


+1, Google is smart for doing this.  It is important to push the
boundaries on performance.

QUIC is UDP, and UDP is the right step for now.

And, hopefully this stuff gets rolled up into ILNP stack features.
Yes ILNP needs stack changes, think big.  Not all things can NOT be a
simple incremental tweaks.  ILNP will be a revolution.  QUIC is simply
a revolt on performance issues with TCP in today's low-loss, high
latency (mobile), and middle box encumbered networks.

CB

 Now, how about an SCTP test? :)

 --
Leo Bicknell - bickn...@ufp.org - CCIE 3440
 PGP keys at http://www.ufp.org/~bicknell/








Re: Google's QUIC

2013-06-28 Thread Christopher Morrow
On Fri, Jun 28, 2013 at 10:12 PM, Octavio Alvarez
alvar...@alvarezp.ods.org wrote:
 On Fri, 28 Jun 2013 17:20:21 -0700, Christopher Morrow
 morrowc.li...@gmail.com wrote:


 Runs in top of UDP... Is not UDP...

 If it has protocol set to 17 it is UDP.


 So QUIC is an algorithm instead of a protocol?

it's as much a protocol as http is.. I suppose my point is that it's
some protocol which uses udp as the transport.

Because of this I don't see any (really) kernel/stack changes
required, right? it's just something the application needs to work out
with it's peer(s). No different from http vs smtp...

-chris



Re: Google's QUIC

2013-06-28 Thread shawn wilson
On Jun 29, 2013 12:23 AM, Christopher Morrow morrowc.li...@gmail.com
wrote:

 On Fri, Jun 28, 2013 at 10:12 PM, Octavio Alvarez
 alvar...@alvarezp.ods.org wrote:
  On Fri, 28 Jun 2013 17:20:21 -0700, Christopher Morrow
  morrowc.li...@gmail.com wrote:
 
 
  Runs in top of UDP... Is not UDP...
 
  If it has protocol set to 17 it is UDP.
 
 
  So QUIC is an algorithm instead of a protocol?

 it's as much a protocol as http is.. I suppose my point is that it's
 some protocol which uses udp as the transport.

 Because of this I don't see any (really) kernel/stack changes
 required, right? it's just something the application needs to work out
 with it's peer(s). No different from http vs smtp...


SCTP was layer 4, if QUIC is the same, than it will too. If QUIC is layer 5
up, it won't. That might be the difference (I haven't looked into QUIC).

 -chris