Weekly Routing Table Report

2009-08-22 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith .

Routing Table Report   04:00 +10GMT Sat 22 Aug, 2009

Report Website: http://thyme.apnic.net
Detailed Analysis:  http://thyme.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  293735
Prefixes after maximum aggregation:  139010
Deaggregation factor:  2.11
Unique aggregates announced to Internet: 146284
Total ASes present in the Internet Routing Table: 31976
Prefixes per ASN:  9.19
Origin-only ASes present in the Internet Routing Table:   27800
Origin ASes announcing only one prefix:   13547
Transit ASes present in the Internet Routing Table:4176
Transit-only ASes present in the Internet Routing Table:100
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  24
Max AS path prepend of ASN (12026)   22
Prefixes from unregistered ASNs in the Routing Table:   629
Unregistered ASNs in the Routing Table: 167
Number of 32-bit ASNs allocated by the RIRs:241
Prefixes from 32-bit ASNs in the Routing Table:  92
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:328
Number of addresses announced to Internet:   2089063616
Equivalent to 124 /8s, 132 /16s and 148 /24s
Percentage of available address space announced:   56.4
Percentage of allocated address space announced:   64.5
Percentage of available address space allocated:   87.3
Percentage of address space in use by end-sites:   78.7
Total number of prefixes smaller than registry allocations:  140471

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:70153
Total APNIC prefixes after maximum aggregation:   24877
APNIC Deaggregation factor:2.82
Prefixes being announced from the APNIC address blocks:   69601
Unique aggregates announced from the APNIC address blocks:31611
APNIC Region origin ASes present in the Internet Routing Table:3747
APNIC Prefixes per ASN:   18.58
APNIC Region origin ASes announcing only one prefix:   1023
APNIC Region transit ASes present in the Internet Routing Table:579
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 18
Number of APNIC addresses announced to Internet:  481521344
Equivalent to 28 /8s, 179 /16s and 110 /24s
Percentage of available APNIC address space announced: 82.0

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079
APNIC Address Blocks43/8,  58/8,  59/8,  60/8,  61/8, 110/8, 111/8,
   112/8, 113/8, 114/8, 115/8, 116/8, 117/8, 118/8,
   119/8, 120/8, 121/8, 122/8, 123/8, 124/8, 125/8,
   126/8, 175/8, 180/8, 182/8, 183/8, 202/8, 203/8,
   210/8, 211/8, 218/8, 219/8, 220/8, 221/8, 222/8,
  

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:124497
Total ARIN prefixes after maximum aggregation:66423
ARIN Deaggregation factor: 1.87
Prefixes being announced from the ARIN address blocks:   125109
Unique aggregates announced from the ARIN address blocks: 52466
ARIN Region origin ASes present in the Internet Routing Table:13183
ARIN Prefixes per ASN: 9.49
ARIN Region origin ASes announcing only one prefix:5077
ARIN Region transit ASes present in the Internet Routing Table:1290
Average ARIN Region AS path length visible: 3.3
Max ARIN Region AS path length visible:  24
Number of ARIN addresses announced to Internet:  1012944512
Equivalent to 60 /8s, 96 /16s and 78 /24s
Percentage of available ARIN address space announced:  88.8

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ER

Re: Alternatives to storm-control on Cat 6509.

2009-08-22 Thread Nick Hilliard

On 22/08/2009 06:26, Andrew Parnell wrote:

The 67xx series cards aren't supported by the sup32, though.  Would 65xx
line cards do the trick?


unfortunately not:


http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/configuration/guide/storm.html



• The following LAN switching modules do not support traffic storm control:
– WS-X6148A-GE-45AF
– WS-X6148A-GE-TX
– WS-X6148-GE-45AF
– WS-X6148-GE-TX
– WS-X6148V-GE-TX
– WS-X6548-GE-45AF
– WS-X6548-GE-TX
– WS-X6548V-GE-TX


Hmmm, expensive proposition to upgrade then - even though sup720 + ws-x67xx 
cards make a nice l2 platform for gig ethernet.


Nick



Re: Redundancy & Summarization

2009-08-22 Thread Adam Greene
Another option could be to announce one /17 to each upstream provider 
and use conditional BGP to announce the other /17 to the provider that's 
still active in the event that one provider goes down.



On 8/21/2009 4:08 PM, Patrick W. Gilmore wrote:

On Aug 21, 2009, at 3:47 PM, Brian Dickson wrote:


My institution has a single /16 spread across 2 sites: the lower /17 is
used at site A, the upper /17 at site B.  Sites A & B are connected
internally.  Currently both sites have their own ISPs and only 
advertise

their own /17's.  For redundancy we proposed that each site advertise
both their own /17 and the whole /16, so that an ISP failure at either
site would trigger traffic from both /17s to reconverge towards the
unaffected location.


There are two different ways to achieve almost-identical results.


As much as I like Brian, I am going to have to respectfully disagree.


However, one is a 50%  more "green" than the other, i.e. friendly to 
other network operators.


These two choices are functionally equivalent, and possible, only 
because things currently work for both your /17's.


Here are the two ways to do this:

One is:
- announce /17 "A" and /16 from uplink ISP-A
- announce /17 "B" and /16 from uplink ISP-B
- This results in 3 prefixes globally: A, B, and /16.

The other is:
- announce /17 "A" and /17 "B", with different policies (i.e. prepend 
your AS once or twice), at *both* ISPs.

- This results in 2 prefixes globally: A and B.

In all cases, as long as one ISP link is up, there is a path to both 
A and B.
In most cases, the best path to A or B, is *mostly*, but not 
completely, under your influence.


This is highly dependent on variables not in evidence.  If your 
upstreams are, for instance, Sprint & Level 3, then a large percentage 
of the Internet will be traveling through one or the other.  And once 
it hits your upstream, prepends are irrelevant.  Every upstream (for 
values of "every" == "100%" to at least one decimal place) localprefs 
their downstreams' prefixes.


In this case, anyone downstream of either L3 or Sprint will send _all_ 
traffic through that upstream's link.  While not the whole Internet, 
it's still quite a bit.  Moreover, many people do things like 
localpref Sprint _down_ because they are more expensive.  So even 
someone multi-homed to both may send all traffic through L3.  Etc., etc.


A slight twist on Brian's idea would be to use communities and tell 
Upstream A to localpref Prefix B below that of peer routes.  Then you 
only need two prefixes, and each site only receives its own traffic 
except when the other site fails.  If Upstream B goes down, Upstream A 
will accept Prefix B and propagate it.


Again, dependent upon your upstreams having communities able to do 
this.  Or if they are "nimble", maybe a call to their operations 
department?








Re: Redundancy & Summarization

2009-08-22 Thread Patrick W. Gilmore



Sent from my iPhone, please excuse any errors.


On Aug 22, 2009, at 9:52, Adam Greene  wrote:

Another option could be to announce one /17 to each upstream  
provider and use conditional BGP to announce the other /17 to the  
provider that's still active in the event that one provider goes down.


Good idea.  Still uses just two prefixes and allows for backup  
connectivity.


Just be careful that the internal routing table does not stop the  
conditional announcement.


--
TTFN,
patrick




On 8/21/2009 4:08 PM, Patrick W. Gilmore wrote:

On Aug 21, 2009, at 3:47 PM, Brian Dickson wrote:

My institution has a single /16 spread across 2 sites: the lower / 
17 is

used at site A, the upper /17 at site B.  Sites A & B are connected
internally.  Currently both sites have their own ISPs and only  
advertise
their own /17's.  For redundancy we proposed that each site  
advertise
both their own /17 and the whole /16, so that an ISP failure at  
either

site would trigger traffic from both /17s to reconverge towards the
unaffected location.


There are two different ways to achieve almost-identical results.


As much as I like Brian, I am going to have to respectfully disagree.


However, one is a 50%  more "green" than the other, i.e. friendly  
to other network operators.


These two choices are functionally equivalent, and possible, only  
because things currently work for both your /17's.


Here are the two ways to do this:

One is:
- announce /17 "A" and /16 from uplink ISP-A
- announce /17 "B" and /16 from uplink ISP-B
- This results in 3 prefixes globally: A, B, and /16.

The other is:
- announce /17 "A" and /17 "B", with different policies (i.e.  
prepend your AS once or twice), at *both* ISPs.

- This results in 2 prefixes globally: A and B.

In all cases, as long as one ISP link is up, there is a path to  
both A and B.
In most cases, the best path to A or B, is *mostly*, but not  
completely, under your influence.


This is highly dependent on variables not in evidence.  If your  
upstreams are, for instance, Sprint & Level 3, then a large  
percentage of the Internet will be traveling through one or the  
other.  And once it hits your upstream, prepends are irrelevant.   
Every upstream (for values of "every" == "100%" to at least one  
decimal place) localprefs their downstreams' prefixes.


In this case, anyone downstream of either L3 or Sprint will send  
_all_ traffic through that upstream's link.  While not the whole  
Internet, it's still quite a bit.  Moreover, many people do things  
like localpref Sprint _down_ because they are more expensive.  So  
even someone multi-homed to both may send all traffic through L3.   
Etc., etc.


A slight twist on Brian's idea would be to use communities and tell  
Upstream A to localpref Prefix B below that of peer routes.  Then  
you only need two prefixes, and each site only receives its own  
traffic except when the other site fails.  If Upstream B goes down,  
Upstream A will accept Prefix B and propagate it.


Again, dependent upon your upstreams having communities able to do  
this.  Or if they are "nimble", maybe a call to their operations  
department?










Re: Redundancy & Summarization

2009-08-22 Thread Hector Herrera
On Sat, Aug 22, 2009 at 6:52 AM, Adam Greene wrote:
> Another option could be to announce one /17 to each upstream provider and
> use conditional BGP to announce the other /17 to the provider that's still
> active in the event that one provider goes down.
>

Maybe I'm wrong, but I think this method will only work when handling
local failures.  If there is a failure in a remote network which
causes ISP A to be unreachable from a third party, your routers will
not adjust the announcements since ISP A and B are still reachable to
you, but the third party will not be able to reach the network nearer
to ISP A through the ISP B connection because ISP B doesn't have an
announcement to that network.  (This is assuming that ISP A and ISP B
are not peers).

Hector



Re: Alternatives to storm-control on Cat 6509.

2009-08-22 Thread Sean Donelan

On Fri, 21 Aug 2009, Roland Dobbins wrote:
there are two things you care about: storm control and port security (mac 
address counting).


Chopping up the layer-2 broadcast domain for a given VLAN into smaller pieces 
via pVLANs can't hurt, either, as long as the hosts have no need to talk to 
one another - and it has other benefits, as well.


I understand why hosts need to send broadcasts.  In a close/single 
customer environment, broadcasts could be useful.  I hope most 
future protocol designers now think of using multicast or other

discovery mechanisms besides broadcast.

But in a service provider network (or any managed network), is there any 
reason why a customer needs to hear other customer's broadcasts? In 
practice, are there any useful broadcast messages in a multi-customer 
environment that can't/shouldn't be proxied by the network operator or 
handled other ways.





Re: Alternatives to storm-control on Cat 6509.

2009-08-22 Thread Mikael Abrahamsson

On Sat, 22 Aug 2009, Sean Donelan wrote:

But in a service provider network (or any managed network), is there any 
reason why a customer needs to hear other customer's broadcasts? In 
practice, are there any useful broadcast messages in a multi-customer 
environment that can't/shouldn't be proxied by the network operator or 
handled other ways.


Not that I know of, ISPs have successfully done L2 isolation of customers 
for 10 years and I haven't heard of any problems with it.


Only bad part really is that if the customer is allowed several IPs and 
you use local-proxy-arp then traffic between customer computers will go 
via the ISP, which is one of the reasons I advocate the use of a home CPE 
router for IPv6, it's just a cleaner handoff.


--
Mikael Abrahamssonemail: swm...@swm.pp.se