http://www.pcworld.com/article/150709/internet_growth_trends.html?tk=rss_news#
-Hank
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Oh, it's the truth - trust me. There was an Interop show (back when
it really was an Interoperability event) that was made quite enjoyable
for the network staff by that set of NIC cards
Chris
On 05 Sep 2008, at 07.53, Scott Berkman
Paul Francis wrote:
> AS, or even dozens. So I'm curious...if we could wave a magic wand and
> control the exact number of entries any AS needs to advertise, what would
> folks consider to be roughly the right number of entries?
Wouldn't this greatly depend on the span/breath of your network ? I
On Mon, September 8, 2008 09:46, Scott Brim wrote:
> Also, ASNs are not
> aggregatable so we can't use them to represent a large number of
> independently routed networks.
Scott,
I'm not sure an Autonomous System would want to be aggregated. By its
nature it is capable of having arbitrary connec
>-Original Message-
>From: Paul Francis [mailto:[EMAIL PROTECTED]
>Sent: Monday, September 08, 2008 2:31 PM
>To: Ricardo Oliveira; [EMAIL PROTECTED]
>Subject: RE: why not AS number based prefixes aggregation
>
>
>This thread begs an interesting question: what is the right
>amount of gran
This thread begs an interesting question: what is the right amount of
granularity for load balance? Folks here are saying that one-entry-per-AS is
too course...an AS wants to influence load on incoming links, and so it needs
multiple entries.
On the other hand, it is hard to imagine that we nee
On Mon, Sep 08, 2008 at 11:30:49AM -0700, James Pleger wrote:
> However, what you have said in this topic has not been useful or
> brought anything that might be interesting to light at all. Please
> come back when you have something useful or productive to say.
And, again, yes he has. Absent any
On Mon, Sep 08, 2008 at 11:09:09AM -0700, Scott Weeks wrote:
> --- [EMAIL PROTECTED] wrote:
> On Mon, 8 Sep 2008, Scott Weeks wrote:
> >
> > --- [EMAIL PROTECTED] wrote:
> >
> > Well, perhaps you can share any information with us on a legitimate client
> > you have?
> >
On Mon, 8 Sep 2008, Matthew Petach wrote:
On 9/8/08, Gadi Evron <[EMAIL PROTECTED]> wrote:
On Sun, 7 Sep 2008, InterCage - Russ wrote:
Thank you Russ. That is a great step in the right direction dropping this
one client. It is appreciated, although it's just one bad apple on a big
tree.
Howev
"> I do not think it is appropriate for ISPs to have to prove or demonstrate the
> legitimacy of their customer base"
Here is the exact point of contention and the point where I think
people disagree. ISPs are the **first** line of defense against
malware and badware. They are the ones closest t
On Mon, 8 Sep 2008, Randy Epstein wrote:
Obviously host lost some money now after buying a provider with a big
client that was just depeered, so it is now a financial concern.
Gadi.
On the floor .. dying here.
:) :)
When I worked at an ISP I can say that my house was very clean.
Takedowns were done in hours and we had a very large customer base. I
will take on the clean house topic any time... I have done hundreds if
not thousands of takedowns while I have worked at hosting companies,
it isn't that hard to kee
>Obviously host lost some money now after buying a provider with a big
>client that was just depeered, so it is now a financial concern.
> Gadi.
On the floor .. dying here.
My apologies everyone, I shouldn't have said that. I'm done.
scott
--- [EMAIL PROTECTED] wrote:
--- [EMAIL PROTECTED] wrote:
I am sure if I looked into it more I could find some exploits related
to the sites.
-
"Why software piracy might actually be good
On Mon, 8 Sep 2008, Scott Weeks wrote:
--- [EMAIL PROTECTED] wrote:
I am sure if I looked into it more I could find some exploits related
to the sites.
-
"Why software piracy might actually be good for companies."
Folks should clean their own house before
On 9/8/08, Gadi Evron <[EMAIL PROTECTED]> wrote:
> On Sun, 7 Sep 2008, InterCage - Russ wrote:
> Thank you Russ. That is a great step in the right direction dropping this
> one client. It is appreciated, although it's just one bad apple on a big
> tree.
>
> However, I don't want to pick on you, s
--- [EMAIL PROTECTED] wrote:
I am sure if I looked into it more I could find some exploits related
to the sites.
-
"Why software piracy might actually be good for companies."
Folks should clean their own house before pointing fingers at others...
scott
On Mon, 8 Sep 2008, Scott Weeks wrote:
--- [EMAIL PROTECTED] wrote:
On Mon, 8 Sep 2008, Scott Weeks wrote:
--- [EMAIL PROTECTED] wrote:
Well, perhaps you can share any information with us on a legitimate client
you have?
--
Now why do you have to go there? J
On Mon, Sep 8, 2008 at 10:59 AM, Scott Weeks <[EMAIL PROTECTED]> wrote:
>
>
> --- [EMAIL PROTECTED] wrote:
>
> Well, perhaps you can share any information with us on a legitimate client
> you have?
> --
>
>
> Now why do you have to go there? Just to fan the flames f
--- [EMAIL PROTECTED] wrote:
On Mon, 8 Sep 2008, Scott Weeks wrote:
>
> --- [EMAIL PROTECTED] wrote:
>
> Well, perhaps you can share any information with us on a legitimate client
> you have?
> --
>
> Now why do you have to go there? Just to fan the flames for fun
On Mon, 8 Sep 2008, Scott Weeks wrote:
--- [EMAIL PROTECTED] wrote:
Well, perhaps you can share any information with us on a legitimate client
you have?
--
Now why do you have to go there? Just to fan the flames for fun and profit?
:-(
I haven't seen any
--- [EMAIL PROTECTED] wrote:
Well, perhaps you can share any information with us on a legitimate client
you have?
--
Now why do you have to go there? Just to fan the flames for fun and profit?
:-(
scott
On Sun, 7 Sep 2008, InterCage - Russ wrote:
Hello Everyone,
Good morning.
Seeing the activity in regards to our company here at NANOG, I believe this is
the most reasonable and responsible place to respond to the current issues on
our network. We hope to obtain non-bias opinion's and good hone
Topological aggregation based on ASN is often too course granularity,
see this paper:
http://www.cs.ucla.edu/~rveloso/papers/giro.pdf
specifically Fig4 is a good example, and sec 4C.
Cheers,
--Ricardo
On Sep 8, 2008, at 6:20 AM, yangyang. wang wrote:
Hi, everyone:
For routing scalabili
Update, Monday, Sept 8, 12:00 p.m. ET: Todd Braning, vice president of
BandCon, just e-mailed me to say that BandCon also has stopped providing
connectivity to Atrivo/Intercage. From his e-mail: "Intercage, a new
customer, was connected to the BandCon Network for total of about a week.
Oncewe re
If I understand you right, what you're suggesting is that, in place of a
MED or a localpref, I deploy a layer 2 filter on all of my devices for
every prefix I want to touch the policy for at a level more granular
than AS. This does not improve the scalability of BGP, it destroys that
scalability
Thank you, Scott.
TE is a key reason for using specific prefixes. I think that most TEs are
deployed in intra-domain, and the inter-domain TEs applied to downstream AS
multihomed to many different upstream ASes could be made thru AS number
based aggregation. The TE between two ASes with many links
On Sep 8, 2008, at 6:46 AM, Scott Brim wrote:
Excerpts from yangyang. wang on Mon, Sep 08, 2008 09:20:38PM +0800:
Hi, everyone:
For routing scalability issues, I have a question: why not
deploy AS
number based routing scheme? BGP is path vector protocol and the
shortest
paths are cal
On Sat, 06 Sep 2008 06:49:05 PDT, k claffy said:
>
> do that many networks really allow spoofing? i used
> to think so, based on hearsay, but rob beverly's
> http://spoofer.csail.mit.edu/summary.php suggests
> things are a lot better than they used to be, arbor's
> last survey echos same. are ro
Christopher Morrow wrote:
> On Mon, Sep 8, 2008 at 9:20 AM, yangyang. wang <[EMAIL PROTECTED]> wrote:
>> Hi, everyone:
>>
>> For routing scalability issues, I have a question: why not deploy AS
>> number based routing scheme? BGP is path vector protocol and the shortest
>> paths are calculated
Our connectivity from the US to ChinaTelCom has been in the toilet for 2
months. The Olympics are over, and I'm assured by my Shanghai contacts that
The Great Firewall of China has been relaxed, yet the problem remains.
Local loops on each end test fine to other localized ip space. Symptoms
inclu
On Mon, Sep 8, 2008 at 9:20 AM, yangyang. wang <[EMAIL PROTECTED]> wrote:
> Hi, everyone:
>
> For routing scalability issues, I have a question: why not deploy AS
> number based routing scheme? BGP is path vector protocol and the shortest
> paths are calculated based on traversed AS numbers. T
On Mon, Sep 8, 2008 at 9:20 AM, yangyang. wang <[EMAIL PROTECTED]> wrote:
> For routing scalability issues, I have a question: why not deploy AS
> number based routing scheme? BGP is path vector protocol and the shortest
> paths are calculated based on traversed AS numbers. The prefixes in the
[EMAIL PROTECTED] wrote:
> yes, but would it work if we all did BCP38 filtering?
[EMAIL PROTECTED] (Randy Bush) writes:
> i think kc said it all well enough
i'd be satisfied if bcp38 were widely enough deployed so that experiments
based on ip spoofing wouldn't be scientifically valid due to sampl
Excerpts from yangyang. wang on Mon, Sep 08, 2008 09:20:38PM +0800:
> Hi, everyone:
>
> For routing scalability issues, I have a question: why not deploy AS
> number based routing scheme? BGP is path vector protocol and the shortest
> paths are calculated based on traversed AS numbers. The p
On 9/09/2008, at 1:20 AM, yangyang. wang wrote:
Hi, everyone:
For routing scalability issues, I have a question: why not
deploy AS
number based routing scheme? BGP is path vector protocol and the
shortest
paths are calculated based on traversed AS numbers. The prefixes in
the same
A
Hi, everyone:
For routing scalability issues, I have a question: why not deploy AS
number based routing scheme? BGP is path vector protocol and the shortest
paths are calculated based on traversed AS numbers. The prefixes in the same
AS almost have the same AS_PATH associated, and aggregatin
[EMAIL PROTECTED] wrote:
> On Sun, Sep 07, 2008 at 07:43:41PM +1200, Randy Bush wrote:
>>> http://www.caida.org/workshops/wide/0808/slides/measuring_reverse_paths.pdf
>> great work on a tough problem
> yes, but would it work if we all did BCP38 filtering?
i think kc said it all well enough
On (2008-09-04 09:35 -0700), Jo Rhett wrote:
> quickly, but that turns out not to be the case. To this day I've never
> found a network operator using uRPF on Cisco gear.
> (note: network operator. it's probably fine for several-hundred-meg
> enterprise sites)
To this day I've never met net
39 matches
Mail list logo