Hi Ricardo,
I checked the topologies from bgp tables at ucla site. These are in the form
of huge tables . Can you please guide me how this can be utilized in the
simulations.
Regards
MAK
On Tue, Sep 2, 2008 at 2:04 PM, Ricardo Oliveira <[EMAIL PROTECTED]>wrote:
> The topos you mentioned are syn
Eric, as you say, it is a multi part test. With fairly clear
distinctions between a compromised node and one under the direct
control of a criminal
So while it is unrealistic when viewed in isolation, put together with
other factors it starts to make a lot of sense.
thanks
srs
On Wed, Sep 3, 200
Suresh,
In a parallel universe we're considering profiles for "licit use" of
some mechanism. One element of a multi-part test to distinguish "licit"
from "illicit" was the presence or absence of known signatures for
malware. After some thought it was understood that this test was
equivalent t
On Tue, 2 Sep 2008, Steven M. Bellovin wrote:
On Tue, 2 Sep 2008 21:40:38 -0400
"Patrick W. Gilmore" <[EMAIL PROTECTED]> wrote:
[SNIP]
Just so that I am clear on your issue here: You believe it is "okay"
for you to put your linkedin URL in your .sig, but Gadi must not be
allowed to put it at t
On 9/2/08, Todd Underwood <[EMAIL PROTECTED]> wrote:
> checking our current data, that block is not currently routed by any
> of our peers over the last month (i would assume ripe ris and
> routeviews report similar data, but i did not check them.
it's also probably worth stating that parts of
There's this concept known as "dual criminality" in such situations,
when you're looking at international prosecutions (or whatever).
So, while lesé majesté - insult to the king - is a crime in thailand
(liable to get you lynched before you get prosecuted, at that) that
doesnt mean the thai author
On Tue, 2 Sep 2008 21:40:38 -0400
"Patrick W. Gilmore" <[EMAIL PROTECTED]> wrote:
> [SNIP]
>
> Just so that I am clear on your issue here: You believe it is "okay"
> for you to put your linkedin URL in your .sig, but Gadi must not be
> allowed to put it at the top of a post?
Yes, I think th
On Tue, 2 Sep 2008, Aaron Glenn wrote:
On Tue, Sep 2, 2008 at 3:28 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
My profile and resume: http://www.linkedin.com/in/gadievron
are you for real?
Yep. Are you a geek? I am that, too.
Awkward, but easy to explain. I use PINE and I often have signatur
On Sep 2, 2008, at 6:44 PM, Paul Wall wrote:
Could you please take the self-promotion offline already? Enough is
enough! I don't think anybody on this list is interested in hiring
you or reviewing your resume!
(It could be argued that my post is off-topic as well. I disagree.
Furthermore, it
On Tue, Sep 2, 2008 at 4:45 PM, Kai Chen <[EMAIL PROTECTED]> wrote:
> Just want to ask a direct question. Will an AS export all it gets from
> its customers and itself to its providers? Or even under valley-free,
> the BGP export policy is also selective?
>
that's the idea. but your use of valley-
On Tue, Sep 2, 2008 at 9:32 PM, Aaron Glenn <[EMAIL PROTECTED]> wrote:
> On Tue, Sep 2, 2008 at 3:28 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
>> My profile and resume: http://www.linkedin.com/in/gadievron
>
> are you for real?
>
>
No, he is not.
On Tue, Sep 2, 2008 at 3:28 PM, Gadi Evron <[EMAIL PROTECTED]> wrote:
> My profile and resume: http://www.linkedin.com/in/gadievron
are you for real?
dan,
(to follow up on david conrad's response)...
On Tue, Sep 02, 2008 at 04:31:40PM -0700, David Conrad wrote:
> On Sep 2, 2008, at 3:24 PM, Dan Mahoney, System Admin wrote:
> >While recently trying to debug a CEF issue, I found a good number of
> >packets in my "debug cef drops" output that w
Kai,
That's correct. A network purchasing transit will advertise its
internally-originated prefixes, as well as those it's learning from
downstream customers, to its provider.
(At least that's the theory. It's not terribly uncommon for transit
purchasers to advertise a full table, or for their
Just want to ask a direct question. Will an AS export all it gets from
its customers and itself to its providers? Or even under valley-free,
the BGP export policy is also selective?
Thanks a lot,
--
-Kai
http://arstechnica.com/guides/other/peering-and-transit.ars
--
Paul Vixie
On Sep 2, 2008, at 3:24 PM, Dan Mahoney, System Admin wrote:
While recently trying to debug a CEF issue, I found a good number of
packets in my "debug cef drops" output that were all directed at
198.32.64.12 (which I see as being allocated to ep.net but
completely unused).
As Steve Conte p
Gadi,
Could you please take the self-promotion offline already? Enough is
enough! I don't think anybody on this list is interested in hiring
you or reviewing your resume!
(It could be argued that my post is off-topic as well. I disagree.
Furthermore, it had to be done, given the lack of public
On Sep 2, 2008, at 3:24 PM, Dan Mahoney, System Admin wrote:
Hello all,
While recently trying to debug a CEF issue, I found a good number of
packets in my "debug cef drops" output that were all directed at
198.32.64.12 (which I see as being allocated to ep.net but
completely unused).
Se
My profile and resume: http://www.linkedin.com/in/gadievron
On Tue, 2 Sep 2008, Dan Mahoney, System Admin wrote:
Hello all,
While recently trying to debug a CEF issue, I found a good number of packets
in my "debug cef drops" output that were all directed at 198.32.64.12 (which
I see as being
Hello all,
While recently trying to debug a CEF issue, I found a good number of
packets in my "debug cef drops" output that were all directed at
198.32.64.12 (which I see as being allocated to ep.net but completely
unused).
Sep 2 22:03:25: CEF-Drop: Packet for 198.32.64.12 -- no route
Sep
Paul Ferguson wrote:
My next question to the peanut gallery is: What do you
suggest we should do on other hosting IP blocks are are continuing
to host criminal activity, even in the face of abuse reports, etc.?
Seriously -- I think this is an issue which needs to be addressed
here. ISPs cannot c
The topos you mentioned are synthetic (e.g. generated based on math),
you might want to check these ones instead, based on bgp tables from
public sources:
http://irl.cs.ucla.edu/topology/
Also, i don't think using a full internet topology is the way to go
to do measure convergence time. The
Hi Ricardo,
Basically I want to measure the Convergence times and routing table sizes.
But I am not able to find a good topology of internet which I can utilize
for my experimentations. I am looking at GT-ITM, BRITE and IGen but don't
know what kind of abstraction they provide and if these topolog
Moazzam,
Do you have something specific in mind you want to measure? e.g.
convergence times, table size, update count, etc? the scope of your
study seems to broad as you describe it..
Cheers,
--Ricardo
On Sep 1, 2008, at 12:57 PM, Moazzam Khan wrote:
Thanks Stefan for your reply.
Basica
Hello Alex:
> Depending how cheap and ghetto you want to get, there's also possibility
> of doing WDM on 1310/1300. I have custom-manufactured splitters filtering
> 1307nm +-2nm - and any given LR XFP [*1] will be either within that band
> or outside [*2]. Test a bunch of them, split them into two
We have a similar analysis (which agrees with Vince Fuller's #s in a
general sense) in the middle of a recent sigcomm paper:
http://www.aip-arch.net/
See the paper "Accountable Internet Protocol (AIP)".
I point it out mostly because the Fuller presentation said "kinda
looks exponential";
Vince Fuller has done some projections on what the the routing tables will
be like in the near future which would be useful for you, check out
http://www.ripe.net/ripe/meetings/ripe-53/presentations/rou-vf-sca.pdf
If you are looking at doing simulations of what it could be like, use
similar figure
Moazzam,
>
> I am trying to simulate BGP for scalability testing. I have few queries.
>
>
> 1) What sort of topology I should try out ?
You might have a look at igen and cbgp available from
http://inl.info.ucl.ac.be/softwares
Olivier
29 matches
Mail list logo