I'm seeing high latency and some packet loss via multiple providers from the
US to Singapore, matching what we saw a few days ago although not as bad
(ie, packet loss is only about 5%, down from the 40% we were seeing a few
days ago).
At that time the cause was a cable fault somewhere in/near Japa
Hi Gaurab,
How are you? Thank you for your help to install I-root.
Actually I don't hear any damage info about submarine cable in Taiwan,
and it seems fine from Taiwan to Internet now.
cheers,
Ethern
=
Ethern Lin
Network Division
Computing Center, ACADEMIA SINICA
Ph
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Anyone in the know ?
I can't find any published reports, but multiple internal reports of
massive congestions from South Asian region to the US, and failure alarms.
Given that Typhoon Morakot made landfall near Taiwan yesterday, this
could impact APC
I had a very educational experience with an ISP that provides two
choices to their customers: a) pay as you go (per GB charge with a
token monthly fee for keeping the port active) and b) 150GB per month
"unlimited" package
Both packages were priced with the intent to have the same cost for
custome
We have calculated our customers peak b/w usage between 20 and 60 kbps/user,
spread across a wide variety of users and wide range of speeds (128/128 up
to 15000/1000 kbps). You only need a few heavy users to skew things. But
400 at 4 Mbps would make me think that 20 to 30 Mbps would be sufficient
I am trying to perform some capacity planning for some of our
residential pops, but the old calcs I used to use seem useless -- as
they were adapted from the dialup days and relied upon a percentage of
users online (~50%) and a percentage of concurrent transmission (~19%).
My present scenario invol
>-Original Message-
>From: Bradley Freeman [mailto:bradley.free...@csirt.ja.net]
>Sent: Tuesday, August 11, 2009 6:37 AM
>To: 'NANOG'
>Subject: RE: Botnet hunting resources
>
>I surprised that nobody has mentioned the work of shadowserver.org,
they
>are
>able to send reports of malware in
Jack Bates wrote:
J.D. Falk wrote:
Hi, Luke! MAAWG recently published a document to help ISPs deal with
infected machines in their networks. It's not the same kind of
pressure, but (as we learned with open relays at MAPS) pressure isn't
very effective unless there are tools available to deal wi
You can reach their IPv6 group via email at dl-ipv6-supp...@level3.com.
On 11/08/09 10:17 -0600, Ken Gilmour wrote:
Good morning,
Could someone from Level3 who manages IPv6 Peering please contact me
offlist? I am have tried to call Customer services numerous times and
every time they attempt to
Good morning,
Could someone from Level3 who manages IPv6 Peering please contact me
offlist? I am have tried to call Customer services numerous times and
every time they attempt to transfer me to the appropriate person, the
call is dropped.
Thanks!
Ken
I need to talk to someone at earthlink who is a mail administrator?
I am pulling my hair out trying to do this. According to the spec
sheets on c9networks website, the device is capable of SNMP management,
only I can not find anywhere in the interface to set up the community
strings. Does anyone have any resources on how this would be done. Thanks
--
I surprised that nobody has mentioned the work of shadowserver.org, they are
able to send reports of malware infections on your networks (see
http://www.shadowserver.org/wiki/pmwiki.php/Services/Reports). The service
has proved to a brilliant tool in mitigating various forms of malware such
as Conf
J.D. Falk wrote:
Hi, Luke! MAAWG recently published a document to help ISPs deal with
infected machines in their networks. It's not the same kind of
pressure, but (as we learned with open relays at MAPS) pressure isn't
very effective unless there are tools available to deal with the problem.
14 matches
Mail list logo