QoS and SLA's are indeed viewable
RB> with Cricket.
There are also a bunch of Cacti templates available as well... I'm using
modified versions of these.
http://forums.cacti.net/about4136-0-asc-0.html
--
/*===[
://fergdawg.blogspot.com/2006/10/in-memoriam-abha-ahuja.html
Yes. She certainly was.
http://www.neebu.net/~khuon/abha/
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | ---
(potential) customers who would call up
WK> and ask "Can I get the Internet in my house?" -- I would always
WK> answer "That depends, how big is your house?", but they NEVER got
WK> it...
"They have the Internet on computers now!?" - Homer
shaping at the CPE. There will be an increase in
service-based peering clubs/unions. There will be ann increase in demand
for seamless layer-1 handoff. The ability to go from wireline to wireless
to content push direct to a third-party display and input interface will
become smoother regard
verify. Then I'd stage out deployment with stub and leaf
nodes going last to minimise churn in OSPF. If you've got iBGP going and
are using route-reflectors then do the top-most hierarchy first before the
lower clusters.
--
/*===[ Jake
ople say 'but the rfc says...'. but theres a big
SJW> place for precedent and common practice too.
True... but the latest BGP draft series attempts to address BCP and updates
on 1771. Typically, the answers sought in light of current BGP practices
can be found in the draft.
--
/*=
seem to have been made before the days of
Visio... |8^)
http://www.neebu.net/~khuon/humour/images/1969_2-node_map.gif
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective B
where the gasp for help is heard after the
CR> problem goes away.
I think it would be interesting to hear how well or not well INOC-DBA worked
out in this situation. Could someone give a short report?
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==
dition to
global) which sources to search against when querying an IRR database.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective Bandwidth Utilisation / |/ [_ [_ |) |_| N E T W O R K S |
+=*/
### On Thu, 20 Feb 2003 15:25:52 -0500, [EMAIL PROTECTED] casually
### decided to expound upon [EMAIL PROTECTED] (Jake Khuon) the following
### thoughts about "Re: scripts to map IP to AS? ":
VK> Are there any recommendations for caching of the results? Do, don't, not for
VK&g
of one for each prefix lookup. For RADB and any other
IRR server running IRRd, this can be accomplished by sending a "!!" in the
beginning and keeping the connection open on your end in a seperate thread
or something that you then issue the query to. For RIPE Whois based
### On Fri, 24 Jan 2003 22:59:17 -0800, Josh Richards <[EMAIL PROTECTED]>
### casually decided to expound upon [EMAIL PROTECTED] the following thoughts
### about "Re: New worm / port 1434?":
JR> * Avleen Vig <[EMAIL PROTECTED]> [20030124 22:44]:
JR> >
JR> > It seems we have a new worm hitting Mi
s to 100/full. Admittedly I have had
problems in the past, namely a bunch of E4500s to some 5000-series switches.
Since they were in remote datacenters, I did pin the interfaces on both
ends.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Pl
irst acl-permit specifies a user@host. The second specifies individual
host control. The third is a network access description. The fourth
describes domain access. And the acl-deny is an example of how to deny
based on domain.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]=
ugh to be honest, I have not really looked in-depth into
such products for almost a year now so there might be others.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective Bandwidth Utilisation / |/ [_ [_ |) |_| N E T W O R K S |
+=*/
r better (and friendlier to the IRRs)
from a performance standpoint to keep persistant connections to a single
server that is fully mirroring.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective Bandwidth Utilisation / |/ [_ [_ |) |_| N E T W O R K S |
+=*/
s... not that
DT> bad, is it?
Nope... and that was my point. I was simply trying to address a statement
that might pidgeonhole the role of a 3G/GPRS device. I think we all should
know better than to assume something will never happen.
--
/*===[ Jake Khuon <[EMAIL PROTE
has some other routers
DT> connected...
God forbid! We might have a network on our hands!
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective Bandwidth Utilisation / |/ [_ [_ |) |_| N E T W O R K S |
+=*/
ackets from a
PAN (personal area network) riding on top of Bluetooth or 802.11{a,b} to the
3G network for transit. NAT would certainly become very messy.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| /
lot easier. are
PV> we chasing an urban legend here, or would reordering still cause pain?
I'd imagine that anyone passing realtime streams, Mbone or VOIP (anyone out
there routing their VOIP traffic across an IXP?) would start having issues
with the resulting jitter.
--
/*=
d a few people with "deep" security knowledge, we also
SD> need to spread a thin layer of security pixie dust throughout the
SD> entire organization.
It's just like it is within the IETF process... Security considerations
must be undertaken by everyone.
### On Thu, 28 Mar 2002 10:58:04 -0800, "Jake Khuon" <[EMAIL PROTECTED]>
### casually decided to expound upon "Abarbanel, Benjamin"
### <[EMAIL PROTECTED]> the following thoughts about "Re: BGP
### without an IGP ":
JK> Unless memory and past e
x27;s
topology called for full-mesh.
BTW, we ran iBGP full mesh without an IGP quite fine. Okay.. so there's a
twist... We did it for IPv6 (before Cisco had IPv6 IS-IS) but I see no
reason why it wouldn't also work for IPv4.
--
/*===[ Jake Khuon
r objects and properly
convert them.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective Bandwidth Utilisation / |/ [_ [_ |) |_| N E T W O R K S |
+=*/
### On Tue, 26 Mar 2002 09:14:11 -0500, "Chris Pace" <[EMAIL PROTECTED]>
### casually decided to expound upon "Jake Khuon" <[EMAIL PROTECTED]> the
### following thoughts about "Re: Route Collector ":
CP> Yes, it is forwarding bgp routes. However,
's also forwarding
traffic? Is it carrying a full table of eBGP routes too?
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
| for Effective Bandwidth Utilisation / |/ [_ [_ |) |_| N E T W O R K S |
+=*/
fractive index, L is the length, and t is the transmission time difference
(double this for RTT). The rest is just simple math. So expected one way
time should be: t = nL/c
Note -- I believe most fiber optic cables have a refractive index somewhere
on the order of 1.4.
--
/*
led on a
case-by-case basis. Some changes required approval at different levels
depending on whether or not any generic change-holds were in effect at the
time.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| /
ignon/signoff will probably generate more
logging information than a core router configured to just log link alarms
and adjacencies. In general, I would guess that customer facing devices
would be more trap-heavy than core components.
--
/*===[ Jake Khuon <[EMAIL PROTECTE
nterconnecting with other networks who are
IvB> there as well is always cheaper and easier.
Yes, you can reach a certain economy of scale by consolidating carriers,
content providers, ISPs, etc under one roof. Many exchange point providers
are banking on the atmosphere of a "public market"
Bellovin? |8^) development may be able to shed better light on the subject.
But IDS seems to be a reactive measure rather than a proactive one and
distributed firewalls may address some issues with device security but
doesn't seem to really touch on enforcing sane routing practises.
--
/*=
best security practices
SD> from both worlds, or the worst?
My off-the-cuff prediction is, as with any convergence process, it will be
first the latter and then the former... but then again, I'm a cynic.
--
/*===[ Jake Khuon <[EMAIL PRO
your corporate IT support? Do you seperate but
control it within your production network engineering groups? If so, do you
have a special group within network engineering concentrating specifically
on management or do you have the same people designing the network also do
the management design?
-
to be low. We all know that was a false assumption. I remember
the first smurf attack against mae-east and how it knocked out quite a few
peers.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]==+
| Packet Plumber, Network Engineers /| / [~ [~ |) |
failed. One of the
vendors that impressed us was RiverSoft since their architecture lent itself
well to establishing a scalable fault-tolerant deployment and was engineered
along similar design principles as our homegrown tools.
--
/*===[ Jake Khuon <[EMAIL PROTECTED]> ]=
35 matches
Mail list logo