SlideShare a Scribd company logo
Visit https://ebookultra.com to download the full version and
explore more ebooks or textbooks
Building service provider networks 1st Edition
Howard C. Berkowitz
_____ Click the link below to download _____
https://ebookultra.com/download/building-service-provider-
networks-1st-edition-howard-c-berkowitz/
Explore and download more ebooks or textbooks at ebookultra.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
The competitive Internet service provider network
architecture interconnection traffic engineering and
network design 1st Edition Oliver M. Heckmann
https://ebookultra.com/download/the-competitive-internet-service-
provider-network-architecture-interconnection-traffic-engineering-and-
network-design-1st-edition-oliver-m-heckmann/
Building Storage Networks Second Edition Marc Farley
https://ebookultra.com/download/building-storage-networks-second-
edition-marc-farley/
The Culture of Building First Printing Edition Howard
Davis
https://ebookultra.com/download/the-culture-of-building-first-
printing-edition-howard-davis/
Building Networks and Servers Using BeagleBone 1st Edition
Pretty
https://ebookultra.com/download/building-networks-and-servers-using-
beaglebone-1st-edition-pretty/
Building Resilient IP Networks 1st Edition Kok-Keong Lee
https://ebookultra.com/download/building-resilient-ip-networks-1st-
edition-kok-keong-lee/
Building Partnerships for Service Learning 1st Edition
Jacoby And Associates
https://ebookultra.com/download/building-partnerships-for-service-
learning-1st-edition-jacoby-and-associates/
Advanced Cardiovascular Life Support ACLS Provider Manual
16th Edition Advanced Cardiovascular Life Support (Acls)
Provider Manual
https://ebookultra.com/download/advanced-cardiovascular-life-support-
acls-provider-manual-16th-edition-advanced-cardiovascular-life-
support-acls-provider-manual/
Quality of Service in Optical Packet Switched Networks 1st
Edition Akbar G. Rahbar
https://ebookultra.com/download/quality-of-service-in-optical-packet-
switched-networks-1st-edition-akbar-g-rahbar/
Quality of Service Mechanisms in Next Generation
Heterogeneous Networks 1st Edition Abdelhamid Mellouk
https://ebookultra.com/download/quality-of-service-mechanisms-in-next-
generation-heterogeneous-networks-1st-edition-abdelhamid-mellouk/
Building service provider networks 1st Edition Howard C. Berkowitz
Building service provider networks 1st Edition Howard
C. Berkowitz Digital Instant Download
Author(s): Howard C. Berkowitz
ISBN(s): 9780471099222, 0471099228
Edition: 1st
File Details: PDF, 2.73 MB
Year: 2002
Language: english
T
E
A
M
F
L
Y
Building Service
Provider Networks
Howard Berkowitz
Wiley Computer Publishing
John Wiley & Sons, Inc.
Publisher: Robert Ipsen
Editor: Carol A. Long
Assistant Editor: Adaobi Obi
Managing Editor: Micheline Frederick
Text Design & Composition: North Market Street Graphics
Designations used by companies to distinguish their products are often claimed as trade-
marks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names
appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro-
priate companies for more complete information regarding trademarks and registration.
This book is printed on acid-free paper. ●
∞
Copyright © 2002 by Howard Berkowitz. All rights reserved.
Published by John Wiley & Sons, Inc.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright
Act, without either the prior written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood
Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for
permission should be addressed to the Permissions Department, John Wiley & Sons, Inc.,
605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail:
PERMREQ@WILEY.COM.
This publication is designed to provide accurate and authoritative information in regard to the
subject matter covered. It is sold with the understanding that the publisher is not engaged in
professional services. If professional advice or other expert assistance is required, the ser-
vices of a competent professional person should be sought.
Library of Congress Cataloging-in-Publication Data:
ISBN 0-471-09922-8
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Wiley Networking Council Series
Scott Bradner
Senior Technical Consultant, Harvard University
Vinton Cerf
Senior Vice President, MCI WorldCom
Lyman Chapin
Chief Scientist, NextHop Technologies, Inc.
Books in the Series
Howard C. Berkowitz, WAN Survival Guide: Strategies for VPNs and
Multiservice Networks 0471-38428-3
Tim Casey, ISP Liability Survival Guide: Strategies for Managing
Copyright, Spam, Cache, and Privacy Regulations 0-471-37748-1
Jon Crowcroft & Iain Phillips, TCP/IP and Linux Protocol Implementation:
Systems Code for the Linux Internet 0-471-40882-4
Bill Dutcher, The NAT Handbook: Implementing and Managing Network
Address Translation 0-471-39089-5
Igor Faynberg, Hui-Lan Lu, & Lawrence Gabuzda, Converged Networks
and Services: Internetworking IP and the PSTN 0-471-35644-1
Russ Housley & Tim Polk, Planning for PKI: Best Practices Guide
for Deploying Public Key Infrastructure 0-471-39702-4
Geoff Huston, Internet Performance Survival Guide: QoS Strategies
for Multiservice Networks 0-471-37808-9
Geoff Huston, ISP Survival Guide: Strategies for Running a
Competitive ISP 0-471-31499-4
Elizabeth Kaufman & Andrew Newman, Implementing IPsec: Making
Security Work on VPN’s, Intranets, and Extranets 0-471-34467-2
Dave Kosiur, Understanding Policy-Based Networking 0-471-38804-1
Mark E. Laubach, David J. Farber, & Stephen D. Dukes, Delivering Internet
Connections over Cable: Breaking the Access Barrier 0-471-38950-1
Dave McDysan, VPN Applications Guide: Real Solutions for Enterprise
Networks 0-471-37175-0
Henry Sinnreich & Alan Johnston, Internet Communications Using SIP:
Delivering VoIP and Multimedia Services with Session Initiation
Protocol 0-471-41399-2
James P.G. Sterbenz & Joseph D. Touch, High Speed Networking:
A Systematic Approach to High-Bandwidth Low-Latency Communication
0-471-33036-1
iv Wiley Networking Council Series
Dedication
To friends and colleagues who have left this layer
of existence during the writing of this book:
To a protege whose utter unwillingness to quit, and her drive to
learn, is an inspiration: Heather Allan
To Curt Freemyer, Beckey Badgett, and the rest of the team at Gett:
Thanks for all the support. You all have a role in this book.
Abha Ahuja, routing area director, IETF
Lynn Acquaviva, a dear and inspirational friend
Building service provider networks 1st Edition Howard C. Berkowitz
Networking Council Foreword xvii
Acknowledgments xviii
Introduction xix
Overview of the Book and Technology xix
How This Book Is Organized xx
Who Should Read This Book xxi
Chapter 1 What Is the Problem to Be Solved? 1
The User Culture 2
The Implementer Culture 3
What Services Do Users Want? 4
Sites and Communities of Interest 5
Known Clients to Arbitrary Servers 9
Known Servers to Arbitrary Clients 10
Known Clients to Known Servers under Common Administration 13
Known Clients to Known Servers under Different Administration 18
Responding to New and Converged Service Requirements 24
Fundamental Principle 1: Don’t Break What Already
Makes Money 26
Affordable Business-to-Consumer Internet 27
Hosting Centers 27
New Service Provider Models 28
Fundamental Problem 2: Keep Everything Scalable 29
Challenge for Service Providers: Keep It Scalable within
the Changing Industry Paradigms 29
Contents
vii
Relationship to Transmission System 30
Interprovider Connectivity 30
Looking Ahead 33
Chapter 2 The Service Provider Landscape 35
History: The Basis for WAN Regulation and Competition 36
Semaphore Scalability 36
Telegraph Scalability 36
Telephone Scalability 38
Models Evolve 38
Traditional Telephony Models: Organizational Aspects 39
Enterprise Network Models 42
Service Provider Models 47
Modern Models 51
What Are All These Devices Doing? 57
Control Planes: IP Equivalents to SS7 Success 57
IP versus Provider-Operated IP versus Public Internet 57
Routing, as Opposed to Routing: Internet versus Telco
Traditions 58
Provider Relationships: Peers and the Trail of Tiers 72
An Introduction to Scalability Issues in the Modern Internet 73
CIDR-Style Provider Aggregation 74
Geographic and Other Aggregation Schemes 75
Overloading State into the Routing System: An Introduction 77
Looking Ahead 78
Chapter 3 Services, Service Level Agreements, and Delivering
Service 79
Defining Services: The Context for Policy 80
Layers of Management: TMN 81
Public versus Private 83
Bandwidth 83
Availability Policies 84
SLAs 85
Availability and SLAs 85
QoS and SLAs 87
Absolute Latency 87
Jitter 88
Loss Probability 88
First Class, Business, Economy, or Baggage? 90
Connectivity Policies 1: Load Sharing, Fault Tolerance,
Multilinking, and Multihoming 91
Connectivity Policies 2: Intranet, Extranet,
and Internet—To Say Nothing of IPv6 92
Customer Service 93
viii Contents
Representative Service Requirements 94
Case Study: Basic Internet Access: Huffle, Puffle, and Cetera 94
Case Study: Multihoming to Multiple PoPs 98
Case Study: Intranet/Extranet/Internet 100
Case Study: Home and Office Internet, Cooperating Local ISP
and Content Providers 104
Looking Ahead 107
Chapter 4: Translating Service Definitions to Technical
Requirements: Policies 109
The Delicate Balance: “But I Wanna Learn BGP!” 111
Returning to Policies 112
Policy Notation with RPSL 114
AS Expressions 115
Routes 116
Router Expressions and Peering Sets 118
Influencers of Route Selection 119
AS Paths 120
Policy and Ownership 120
The Availability of Policies 121
Specifying Routing Policies and Actions 123
Advertising/Export Policies 124
General Route Installation 126
Acceptance/Import Policies 128
Proprietary Policy Notations 130
JunOS 130
Cisco: An Indirect Notation 131
Representative Requirements for Routing Policies 133
Defaults and Beyond 133
Multilinking and Multihoming 134
Multihoming to Multiple POPs of a Single ISP 136
Multihoming to Two ISPs 138
Transit 140
Bilateral Peering among Major Providers 145
Peering at a Multilateral Exchange Point 147
Security Policies 148
Service Level Policies 148
QoS Policy Propagation 150
Accounting Policies 151
The IP-VPN Address Family and Routing Notation 153
Routing Distinguishers 153
Using Routing Distinguishers in Extended RPSL 154
Complex VPN Case Study 154
The Emerging VPN Strategy 155
Contents ix
The Real Requirements 155
Handling Extranets 157
Looking Ahead 158
Chapter 5 Administration, Addressing, and Naming 159
Technical and Cultural Assumptions about
Addressing 159
Registered and Private Space 161
Kinds of Public Address Space 162
Principles for Use of Public Address Space 163
Dynamic Address Assignment 166
NAT and Other Midboxes 167
Addressing Aspects of Multihoming 170
Route Aggregation 171
Planning Aggregation Schemes 171
The RPSL Components Attribute 174
Route Injection 178
Working with Registries 179
ARIN 179
RIPE-NCC 180
Representative Templates from ARIN 180
Representative Templates from RIPE-NCC 182
Managing Your Address Space 184
Once You Have the Address Space 184
Document Your Current Practice 186
Requesting More Space 194
Autonomous Systems 195
Registering a Routing Policy 196
Evolution of the AS Number 197
IPv6 Address Allocation 197
IPv6 Address Structure 198
The Aggregatable Unicast Address 199
Renumbering 203
Looking Ahead 204
Chapter 6 Carrier Facilities: Getting Physical 205
Carrier Business Models 206
Carrier Classness 207
Service Provider—Vendor Relationships 209
Supplier Attributes 209
Equipment Attributes 209
Network Attributes 211
The Facility Conundrum 211
x Contents
T
E
A
M
F
L
Y
Non-Facility-Dependent Service Providers 212
ISPs and IP Service Providers 213
Content Carriers and Hosting Centers 213
Traditional and Startup Telcos 214
Exchange Point Facilities 215
Carrier-Quality Installations 215
The Building and Its Environs 215
Equipment Mounting and Physical Density Issues 216
Power, Power, I Want Power 217
HVAC and the Carrier Environment 219
Fire Protection, and Protection against Fire Protection 220
Physical Security 223
The Human Resource and Its Management 225
Provisioning: Starting the Technical Operation 226
Operations: Trouble Reporting, Monitoring,
and Problem Response 226
Network Operations Centers 226
Customer Support Practices 228
Operational Aspects of Network Security 230
Looking Ahead 231
Chapter 7 The Provider Edge: Layer 1, Layer 2, and the PSTN 233
The First-Meter, First-100-Meter, First-Mile, and
Second-Mile Problems 234
Historical Switching and Transmission Architecture 234
Terminology for Separated Control and Switching 236
Traditional Carrier Service Types and Interworking 237
Components of Traditional Telephony 238
The Traditional First Meter 238
The Traditional First 100 Meters 238
The Traditional First Mile 239
The “Traditional” Second Mile: Multiplex Management 240
Modem Wholesaling, Virtual POPs, and the Beginning
of Media Gateways 247
Technical Efficiency Considerations 247
Regulatory Concerns 248
Other Commercial Wholesaling Alternatives 250
Emerging Technologies 250
Do 800-Pound Gorillas Run at Gigabit Rates? 251
Interfaces Other than Ethernet 251
The New First Meter 253
Niches for 100-Meter Services 253
New First-Mile Services 255
Media Gateways and the New Second Mile 262
Long-Haul Niches 269
Contents xi
PSTN Integration 270
Edge Control for Individual Subscribers 270
Telephone System Capacity Planning 272
Internal Provider Control: SS7 Connectivity to the PSTN
(ISP as CLEC or IXC) 274
Interprovider Control 278
Looking Ahead 279
Chapter 8 Transporting the Bits: The Sub-IP and Physical
Intraprovider Core 281
Basic Layer 1 Resilient Media 282
Advanced Grooming and Merging 284
Incumbent Carrier Facilities 286
Evolving from TDM Networks 286
Backhaul 287
Layer 2 Overlays 288
Where Does Ethernet Fit in All This? 289
Inverse Multiplexing 290
Evolution to First-Generation Optical Facilities 290
SONET Architecture 292
SONET Speed Hierarchy 293
Packet over SONET 294
Models for Survivability 294
Protection and Restoration 295
Preemption and Extra Traffic 295
Reversion and Regrooming 296
SONET Recovery 297
What Are Carrier Goals for New Optical Technologies? 298
Optical Service Offerings 298
Characteristics and Constraints of Optical Networks 299
Facilities-Based Services 300
Connection-Oriented Services 301
Optical Virtual Private Networks 303
New Facilities 303
WDM 304
Resilient Packet Rings (RPRs) 305
Free-Space Metro Optical 306
Broadband Wireless Radio 306
Evolution or New Species? Circuits without Resources,
ATM without Cells, and GMPLS 307
Issues of non-PSC LSRs 308
GMPLS Requirements for LSP Identification 308
Special Considerations for Lambda Switch—Capable
(LSC) LSRs 308
xii Contents
IP over Optical 309
Looking Ahead 310
Chapter 9 Basic BGP and the Customer Side of Exterior Routing 313
BGP Never Stands Still 314
BGP, iBGP, and eBGP 316
So What Does BGP Do? 318
The BGP Stack 320
Protocol Interactions 321
Negotiable Capabilities 324
Attributes 329
A First Look at iBGP 337
RIBs and Routes 338
Acceptance Policies and BGP 339
BGP Route Selection Algorithms: IETF and Variants 340
General Route Installation 340
Advertising Policies and BGP 342
Customer Configuration Requirements Overview 343
Multilinking and Multihoming: The Customer Side 344
Motivations for Multilinking 345
Non-BGP Multihoming 345
Motivations for BGP Multihoming to One Provider 346
Motivations for Multihoming to Multiple Providers 346
Starting Simply: Defaults 347
Asymmetrical Routing 347
Multihoming to Multiple POPs of a Single ISP 348
Multihoming to a Single Provider using PA Space 349
RFC 2270 352
Multihoming to Two ISPs 355
Scaling Potatoes 355
AS Path Expressions 358
Selecting and Influencing Outbound Paths 359
Selecting and Influencing Inbound Paths 361
Importing and Exporting among Routing Protocols 363
Importing Default into an IGP 364
Blackhole Routes 366
Looking Ahead 367
Chapter 10 Subscriber to Provider, and Subscriber to Subscriber
Edge: IP 369
Taking Orders 370
Provisioning 371
AAA and Security Functions in the POP 375
Contents xiii
POPs and Layer 2 Switches 379
Demultiplexing Layer 2 Access Services 380
POP Internal Backbone 381
Multicast Enabling 382
Scalability with MPLS 382
Basic POP Design with Dedicated Customer Access 382
Intra-POP Routing 383
IGPs for POPs 383
iBGP in the POP 384
POP Design for Dial-up and Other Switched Access 387
Scalability Issues: Protecting the Routing System 387
Registry Level 387
Peer Groups 388
Routing Security Breaches from Inappropriate Use of RIP 388
Authentication 390
Prefix Limit 390
Outbound Route Filtering and Graceful Restart 390
Scalability Issues: Protecting Routed Traffic 391
Ingress Filtering and Reverse Path Verification 391
Rate Limiting 392
The Role of Firewall Services 392
IPv6 393
The Provider Side of Basic Customer Requirements 393
Single Homing, Single Link 393
Single-Homed Multilink 393
Multihoming to Single Provider Using PA Address Space:
Provider Side 394
Multihoming to Single Provider Using PI Address Space:
Provider Side 394
Multihoming to Multiple Providers, Customer Uses Your
PA Space 394
Multihoming to Multiple Providers, Customer Uses Another
Provider’s PA Space 396
Multihoming to Multiple Providers, Customer Uses PI Space 398
Complex Fault-Tolerant Routing with Mutual Design
between Provider and Customer 398
Case Study: RFC 1998 with Internal Links 398
Case Study: Enterprise Providing Basic Transit 401
To Confederate or Not to Confederate 402
Service Level Classification and the ISP Challenge:
When to Oversubscribe, When to Overprovision 411
Forwarding Equivalence Classes 413
What Interferes with Quality? 414
Provider Management of Incoming Traffic from the Subscriber 415
Scheduling Outgoing Traffic to the Core 416
Looking Ahead 417
xiv Contents
Chapter 11 The Intraprovider Core: IP/MPLS 419
Developing Requirements: Pipes, Hoses, and Trunks 421
Applying Pipes and Hoses 423
Motivations for Traffic Engineering 425
Core and Interprovider Hierarchy 425
From the Edge to the Core 427
Core Routing Scalability 427
Interior BGP Routing Scalability 428
IGP Scalability Issues 435
Core Design Issues in Transition 445
Is Explicit Routing a Step Backward? 445
The Role of Sub-IP 446
Traffic Trunks 447
Recent Background 448
The Almost-Worst and Worst Cases 449
Per-Hop Merging Behavior 452
Merging with Multiple Service Classes 454
Tunneled Trunks 454
Core Fault Tolerance 456
What Can Go Wrong? 457
Survivability Concepts and Requirements 457
Understanding Recovery Time 461
Sub-IP Core Technologies 465
CCAMP 465
MPLS 465
GSMP 467
Traffic Engineering Deployment 467
BGP-free Cores 471
Looking Ahead 471
Chapter 12 The Provider-to-Provider Border 473
Interprovider Economics: The Most Important Part 474
The Trail of Tiers 475
Basic Economic Models 477
Special Cases 481
Interconnection Strategies: The Second-Most Important
Part 483
Potatoes between Providers 483
Mutual Backup 485
What Should You Advertise and Accept? 485
Scope of Advertising 488
From Whom Do You Get Routes? When Should They Be
Re-advertised? 492
Describing Aggregation in RPSL 494
Transit with PA Space 496
Contents xv
eBGP Scalability and Survivability 497
Filtering Strange Beings: Smurfs and Martians 498
Quantitative Protections 500
Minimizing Churn 502
Exchange Point Design and Operation 503
Route Servers and the NSFNET 504
Layer 3 versus Layer 2 Exchanges 505
Exchange Point Evolution 506
Local Exchanges 507
Layer 2 Alternatives 508
Switches for the Ideal Large Exchange 510
Special Connectivity 514
Looking Ahead 515
Chapter 13 VPNs and Related Services 517
When Management Is Outsourced 518
Evolution from Outsourced Management to VPNs 519
Endpoints and Midboxes 520
Customer Domains 520
CE and PE Devices 523
P Devices 524
User Perception of VPN Types and Capabilities 525
Membership and Security Policy 526
Operational Policy 529
Kinds of User Information Carried 530
VPN Internal Services 531
Membership and Its Relationship to Signaling 532
Carrying the Data 533
Interprovider Connectivity 537
Provider-Provisioned VPN Technologies 538
Multiple Virtual Routers 538
L2 VPNs 539
RFC 2547: MPLS/BGP Virtual Transport Service 542
Case Study: VPN Connectivity Strategy 550
The Emerging VPN Strategy 550
The Real Requirements 550
Handling Extranets 551
Potential Technical Solutions for Magic Images 551
An L2 VPN solution 552
An MVR Solution 552
A BGP/MPLS Solution 553
Conclusion 554
References 555
Index 561
xvi Contents
The Networking Council Series was created in 1998 within Wiley’s Computer
Publishing group to fill an important gap in networking literature. Many current
technical books are long on details but short on understanding. They do not
give the reader a sense of where, in the universe of practical and theoretical
knowledge, the technology might be useful in a particular organization. The
Networking Council Series is concerned more with how to think clearly about
networking issues than with promoting the virtues of a particular technology—
how to relate new information to the rest of what the reader knows and needs,
so the reader can develop a customized strategy for vendor and product selec-
tion, outsourcing, and design.
In Building Service Provider Networks by Howard Berkowitz, you’ll see the
hallmarks of Networking Council books—examination of the advantages and
disadvantages, strengths and weaknesses of market-ready technology, useful
ways to think about options pragmatically, and direct links to business prac-
tices and needs. Disclosure of pertinent background issues needed to under-
stand who supports a technology and how it was developed is another goal of
all Networking Council books.
The Networking Council Series is aimed at satisfying the need for perspec-
tive in an evolving data and telecommunications world filled with hyperbole,
speculation, and unearned optimism. In Building Service Provider Networks
you’ll get clear information from experienced practitioners.
We hope you enjoy the read. Let us know what you think. Feel free to visit the
Networking Council web site at www.wiley.com/networkingcouncil.
Scott Bradner
Senior Technical Consultant, Harvard University
Vinton Cerf
Senior Vice President, MCI WorldCom
Lyman Chapin
Chief Scientist, NextHop Technologies, Inc.
Networking Council Foreword
xvii
Many have contributed to my growth in learning to build networks. It’s hard to count the
number of colleagues in the North American Network Operations Group and Internet
Engineering Task Force who have helped me understand issues and with whom I brain-
stormed issues. Thanks to Sean Donelan, Susan Harris, Sue Hares, Vijay Gill, Kevin
Dubray, Yakov Rekhter, Frank Kastenholz, Lyman Chapin, Scott Bradner, Sean Doran, and
Geoff Huston.
Major support came from my employer, Gett Communications and Gett Labs.
My previous employer, Nortel Networks, gave me many opportunities for thinking
about, arguing about, and screaming about provider issues. Let me thank colleagues
including my immediate team of Francis Ovenden, Kirby Dolak, and Silvana Romagnino.
Other valuable insight came from Nortel colleagues including Avri Doria, Elwyn Davies,
Fiffi Hellstrand, Ken Sundell, Ruth Fox, and Dmitri Krioukov.
The BGP convergence team in the IETF Benchmarking Working Group was another
strong sounding board, where I am delighted to credit Padma Krishnaswamy, Marianne
Lepp, Alvaro Retana, Martin Biddiscombe, and (again) Elwyn Davies and Sue Hares.
There are too many people on the Babylon research team to give individual credit, but let
me single out Loa Andersson, Tove Madsen, and Yong Jiang, and again Avri Doria.
CertificationZone.com, and Paul Borghese’s site and mailing list groupstudy.com,
have been an excellent forum to understand the learning process. Let me thank Paul, as
well as other contributors including Chuck Larrieu, John Neiberger, Peter van Oene,
Erik Roy, and Priscilla Oppenheimer.
My home life stayed sane through a fourth book largely through the skill of my house-
keeper and assistant, Mariatu Kamara, and my distinguished feline editorial assistant,
Clifford—even if he did have a hairball on the copy edit of Chapter 10.
Carol Long of Wiley has been incredibly supportive in this project and throughout my
publishing career. This is my fourth full book, and the first one where the production and
copy editors have made the process better rather than more frustrating. Thanks to pro-
duction editor Micheline Frederick and copy editor Stephanie Landis for adding value to
the book.
Finally, I cannot sufficiently praise the contributions of Annlee Hines, my peer
reviewer on this book.
Acknowledgments
xviii
Arthur C. Clarke defined any sufficiently advanced technology as indistinguishable
from magic. A great many network service customers seem to believe in magical solu-
tions, and, unfortunately, too many salespeople are willing to promise magical solu-
tions.
Service provider engineers often face the need to meet a less than logical require-
ment. Their customers might have posed more logical requirements had they read my
WAN Survival Book, which focuses on the customer side of the WAN service relation-
ship. Nevertheless, many customers and their sales representatives have not done this,
so this book needed to be written.
Building Service Provider Networks could perhaps have been titled Engineering
Design of Magic Networks. It gives approaches for implementing the provider side of a
network offering with a service level agreement (SLA) without being afraid to mention
technologies that, to put it politely, are just solidifying from conceptual vaporware. It
will mention when arguments for certain technologies are at least partially based on
fear, uncertainty, and doubt (FUD).
Overview of the Book and Technology
Systematic communications systems involving the transfer of messages without the
need to handle paper have certainly been with us for at least two centuries, going back
to Napoleonic semaphore systems. Less systematic remote communications go back to
smoke signals.
Electrical communications began in 1844, and were in regular commercial use by
the late nineteenth century. Electrical and electronic communications were largely
controlled by technical monopolies, so innovation was paced by the operational
needs of the major carriers and their ability to absorb and deploy new technology.
When telecommunications divestiture and widespread deregulation began in the
1970s, the rate of new technology introduction increased dramatically, interacting
with customer perceptions to create incredible demand for both feasible and infeasi-
ble services.
xix
Introduction
Other documents randomly have
different content
“Oh, come now, Christopher! really, this is going to far!” is what
public opinion said, and when our hero petitioned the Italian
Congress to fit out an expedition and let him prove his theory, it
magnanimously offered to set him up in business with a first-class
barrel-organ and an educated monkey cashier on condition of his
leaving the country once for all; but Columbus, expressing his regret
for his lack of musical ability, declined this generous offer and turned
with a sigh to other governments for assistance. Finally, after fifteen
years of effort, he succeeded in convincing Queen Isabella of Spain
that there was an undiscovered country beyond the seas,
overflowing with milk and honey, which it would be worth while to
“work up.” He proved his theory with the aid of an egg, (which he
made stand on end,) an old Boston City Directory, and a ground plan
of Philadelphia, (see school books,) and demonstrated to the good
lady’s entire satisfaction that she might realize largely by fitting out
an expedition and let him at its head go and discover it.
So conclusive were these arguments to the mind of Queen Isabella
that the good old soul allowed him to fit out an expedition at his
own expense, and gave him carte blanche to discover America as
much as he wanted to. We have seen how well he succeeded. All
this took place three hundred and eighty-three years, four months,
and five days ago, but it seems to us but yesterday.
Ah! how time flies!
CHAPTER III.
TREATS OF OTHER DISCOVERIES AND DOES GREAT CREDIT TO
THE AUTHOR’S SENSE OF JUSTICE.
On the return of Columbus to Spain, he published a map of his
voyage in one of the illustrated papers of the day. Through the
courtesy of the publishers of that paper we are enabled to place this
map before our readers.
Map of COLUMBUS Route
DRAWN BY CHRIS HIMSELF
Here it is translated from the original Spanish. If the gentle reader
can make head or tail of it he is more gentle even than we had at
first supposed. The publication of this map at the time naturally
inspired others with the spirit of adventure, and discovering America
became quite the rage. Indeed, so common were voyages of
discovery to the New World, that only one besides that of Columbus
is deemed of sufficient note to find a place in this history. We allude
to that of Americus Vespucius.
This gentleman, who was a Florentine by birth, made a voyage to
South America in 1499. He wrote sensational letters to the papers
describing his voyage and the country, which were afterwards
published in book form by a German geographer, who gave the
name “America” to the New World, but this history cheerfully accords
to [1]
Christopher Columbus the imperishable glory of finding out the
roosting-place of the American eagle.
1. Mr. Columbus is better known as the author of that soul-
stirring melody, “Hail Columbia!”
CHAPTER IV.
HAVING TO HIS ENTIRE SATISFACTION SETTLED THE QUESTION
AS TO WHO DISCOVERED AMERICA, THE AUTHOR PROCEEDS TO
SETTLE THE COUNTRY ITSELF—JOHN SMITH IS MENTIONED—
JOHN SMITH ON THE ROSTRUM—JOHN SMITH IN DIFFICULTIES—
THE PLOT THICKENS AS FAR AS J. SMITH IS CONCERNED—THE
DEATH PENALTY—SLOW MUSIC—* * * * SAVED!
It was a century or more after the events narrated in the last
chapter before any attempt was made to establish a colony in
America, or before civilization got any permanent foothold.
In 1606 a certain “London company” got out a patent on Virginia,
and the next year sent over a ship-load of old bachelors to settle its
claim. They landed at Jamestown in the month of May, and here the
wretched outcasts went into lodgings for single gentlemen.
The whole country was a howling wilderness, overrun with Indians,
wild beasts and Jersey mosquitoes.
These hardy pioneers had come to an unexplored region with a
vague, general idea that they were to dig gold, trade with the
Indians, get enormously rich and return home. So sanguine were
they of speedy success that they planted nothing that year. The few
sandwiches they had brought with them were soon consumed, the
gold did not “pan out,” the Indians drove very hard bargains,
offering a ready market for hair, but giving little or nothing in return.
A BUSINESS
TRANSACTION.
To make matters worse, the Fevernager, a terrible disease of the
period, got among them, and by fall only a handful of the colonists
remained, and these were a very shaky lot indeed, with not clothing
enough among them to wad a shot-gun.
Among this seedy band was one John Smith, who, being out of
funds himself, and a public spirited person withal, saw that unless
provisions could be obtained shortly, the scheme of colonizing
America would be a failure.
John Smith on the
Rostrum.
He went into the lecture field, holding forth to large and fashionable
audiences, composed of intelligent savages, upon the science of
navigation, illustrating his lecture with an old mariner’s compass that
indicated all four of the cardinal points at once, and a superannuated
bulls-eye watch that would do nothing but tick. These simple-minded
children of nature listened with attentive ears, and looked on with
wondering eyes, and came down largely with green corn, sardines,
silk hats, hard boiled eggs, fall overcoats, pickled oysters, red
handkerchiefs, ice cream, dried herring, kid gloves, pickled tripe, and
other Indian luxuries, which proved invaluable to the starving,
threadbare colonists. Thus it is seen that Mr. Smith obtained on
tick[2]
what he had no cash to pay for.
2. The reader may occasionally find this sort of thing in these
pages but he is entreated not to be startled.
Although Mr. Smith was regarded as a talented man from a scientific
point of view, and was even mentioned in the native papers as
undoubtedly a god, yet he was sometimes grossly misunderstood by
these artless aborigines, and on one occasion they arrested him on a
general charge of hocus-pocus or witchcraft, and carried him before
Chief Justice Powhatan to be tried for his life.
The jury brought in a verdict of “guilty” on all the counts, and the
hapless Smith was condemned to death. His counsel did all they
could to establish an alibi, but in vain. It was a clear case; a fair trial
had been given their pale brother and he must suffer the penalty. As
a last resort, Mr. Smith offered, first, his bull’s-eye watch, and finally,
the old mariner’s compass, for his life, but Judge Powhatan could not
see the point. He had never seen a white man die, and was panting
for a new sensation. He therefore ordered the entertainment to
proceed without more delay.
Having previously had his scalp removed, the doomed man thanked
his captors for all their kindness, and requesting the executioner to
make a good job of it, placed his head upon the fatal block. The
dread instrument of death was uplifted, and Mr. Smith was really
apprehensive that his time had come. He closed his eyes and
whistled the plaintive air,
“Who will care for my mother-in-law now?”
There was a hush of pleasant anticipation—a deadly silence—you
might have heard a pin drop—indeed, you might have heard ten pins
drop.
At this supreme moment Pocahontas, the beautiful and
accomplished daughter of Judge Powhatan, appeared upon the
scene, tastefully dressed as a ballet girl, and using some pretty
strong arguments with her father, obtained from him a stay of
proceedings, and the prisoner’s life was spared.
Pocahontas saving the life of Captain Smith
Powhatan apologized to Mr. Smith for the loss of his hair, and
handsomely offered to buy him a wig. John admitted that it was
rather a closer shave than he had been accustomed to, but at the
same time he begged the learned gentleman not to mention it, and
made the best of his way back to Jamestown laden with presents,
which were subsequently stolen by the donors.
Many persons look upon this incident as apocryphal, but we are
prepared to assure them upon personal knowledge of its
truthfulness. For, during a brief but bloodless campaign in Virginia in
1864, whither we had gone as a gory “hundred day’s man” to put
down the Rebellion, sixteen different identical spots were pointed
out to us where Pocahontas saved the life of Captain Smith.
If there be any lingering doubt in the mind of any one we point him
in triumph to any of our ably written city directories, the careful
perusal of which will convince the most sceptical mind of Mr. Smith’s
safety.
Pocahontas afterwards married a young English lord, (our American
girls marry titles whenever they get the chance,) and at last
accounts was doing very well.
Mr. Smith was elected president, by a large majority, of the little
colony, which began to thrive henceforth, and was soon reinforced
by other adventurers from England.
SIC SEMPER
TYRANNIS.
Great seal of Virginia
—sketched on the
spot.
In the fall of 1609 Mr. Smith was compelled to return to England on
account of a boil on his neck, or to have a tooth drawn, we forget
which—but that is a mere detail.
Virginia became a fixed fact, and in 1664 was ceded to the Crown of
Great Britain, which maintained jurisdiction over it until about the
year 1776. On page 42 we reproduce the great Seal of Virginia. The
allegory is so strikingly and beautifully obvious as to need no further
elucidation.
CHAPTER V.
TREATS OF THE EARLY HISTORY OF MASSACHUSETTS AND MAKES
MENTION OF A PILGRIM FATHER OR TWO, ALSO SHOWS WHAT A
GOOD MEMORY THE AUTHOR HAS FOR DATES.
Massachusetts was first settled by Pilgrim Fathers who sailed from
England in the year 1620 on board the May Flour, giving directions
to the captain to set them down at some place where they could
enjoy religious freedom, trusting rather to his knowledge of
Navigation than of Theology to land them at the right place.
LANDING OF THE PILGRIMS
Thinking wild savages least likely to entertain pronounced religious
prejudices, the captain of the May Flour bethought him of America,
and landed them hap-hazard at Plymouth, Massachusetts, on the
21st of December, 1620. The Pilgrims made themselves as
comfortable on Plymouth Rock as possible, and formed a treaty with
the Indians which lasted several days.
The accompanying sketch not only accurately illustrates the event
just narrated, but gives us a faithful and striking portrait of each of
the Pilgrim Fathers, which will be immediately recognized by all their
acquaintances. The drawing is made from a photograph taken on
the spot by an artistic Pilgrim, who brought his camera with him,
hoping to turn a penny by photographing the natives. We may here
incidentally remark that his first native “subject,” dissatisfied with the
result of a “sitting,” scalped the artist and confiscated his camera,
which he converted into a rude sort of accordion. This instrument
was the cause in a remote way of the ingenious native’s death, for
he was promptly assassinated by his indignant neighbors. Let the
young man over the way, who has recently traded his mother’s flat-
irons for a concertina, take warning.
THE Pilgrim Fathers
Converting A Quaker
As some of our readers may not know what a Pilgrim Father is, and
as it is the business of this book to make straight all the crooked
paths of history, we beg to state that a Pilgrim Father is a fellow who
believes in hard-money piety, if we may be allowed the expression,
and with whom no paper substitute will pass current. All others are
counterfeit, and none genuine without the signature, “Puritan.”
Having come so far to enjoy religious freedom, the Puritans took it
unkind if any one ventured to differ with them. Our illustration
shows their style of reforming Quakers in 1656. They used, as will
be seen, a very irresistible line of argument, and the dissenting party
thus “dealt” with generally found it useless to combat old-
established prejudices.
It is not for the unimpassioned historian to comment upon such a
system of orthodoxy. We will say, however, that the Puritans meant
well, and were on the whole worthy sort of persons. At any rate,
Plymouth Rock was a success, and may be seen to this day (with
certain modifications) in the identical spot where the Pilgrim Fathers
found it.
CHAPTER VI.
CONNECTICUT—INDIAN DEFINITION EXTRAORDINARY—WHAT THE
DUTCH THOUGHT OF THE ENGLISH, AND WHAT THE ENGLISH
THOUGHT OF THE DUTCH—STORY OF THE CHARTER OAK—
WOODEN NUTMEGS INVENTED.
Connecticut is an Indian word and signifies Long River. We know,
because all the Indian dictionaries we ever read right through give
this definition.
In 1636, if our memory serves us, Connecticut was claimed by both
the Dutch and English, who had a long dispute about it. Neither
faction comprehended what the dispute was about, as the Dutch did
not understand English nor the English Dutch. All the Dutch knew
was that their antagonists were tam Yankees, and the latter were
equally clear that theirs were blarsted Dutchmen in the worst sense
of the word, and thus the matter stood when, fortunately, an
interpreter arrived through whom the quarrel was conducted more
understandingly. It ended in favor of the English.
The Dutch, it would appear, turned out to be less blarsted than was
at first supposed, and, shaking the dust from their wooden shoes,
emigrated to New Jersey.
In the year 1636 it occurred to King Charles II to grant Connecticut
a charter, which, considered as a charter, was a great hit. It gave the
people the power to govern themselves. Whenever a Connecticutian
traveled abroad folks said, “There goes the Governor of
Connecticut,” and he really felt himself a man of consequence.
This charter was afterwards annulled by King James II on his
accession to the throne, who feared, no doubt, that the people of
Connecticut would govern themselves too much, as the population
was increasing rapidly. He appointed a Governor from among his
poor relations and sent him over to take charge of Connecticut.
Connecticut it seems rather took care of him than otherwise. He
varied the monotony of a brief public career by making sundry
excursions on rail-back, if we may be allowed the expression, under
the auspices of an excited populace. He found the climate too hot to
be agreeable, particularly as his subjects presented him with a
beautiful Ulster overcoat of cold tar and goose feathers, and
common politeness compelled him to wear it. Need we say the new
Governor begged to be recalled?
In the meantime the charter given by Charles II was not destroyed.
It was taken care of by Captain Wadsworth, who hid with it in a
hollow oak tree, where he remained until the death of the despotic
James, which, fortunately, was only about four years, when King
William, a real nice man, ascended the throne, and he sat down and
wrote to Captain Wadsworth, begging he would not inconvenience
himself further on his (William’s) account. It was then that the
Charter Oak gave back the faded document and Captain Wadsworth,
both in a somewhat dilapidated condition.
SECRETING THE
CHARTER.
While confined in the hollow tree the Captain beguiled the tedium of
restricted liberty by inventing the wooden nutmeg, a number of
which he whittled out of bits of wood taken from the walls of his
prison. He subsisted almost exclusively upon these during the four
years of his voluntary incarceration, and immediately after his
release got out a patent on his invention, which he afterwards
“swapped” off to a professor in Yale College, who, we understand,
made a handsome fortune out of it.
Thus it ever is that patriotism and self-abnegation for the public weal
meets with ample reward.
CHAPTER VII.
RHODE ISLAND—ROGER WILLIAMS “DEALT” WITH—A DESPERATE
DISSENTER.
Rhode Island was first settled by a desperate character named Roger
Williams, who was banished by the Puritans from Massachusetts
because he entertained certain inflammatory views decidedly
antagonistic to the enjoyment of religious freedom, namely: that all
denominations of Christianity ought to be protected in the new
colony.
THE Apostacy of
Roger Williams
This, of course, was mere heresy upon the face of it, and our
forefathers proceeded to “deal” with Brother Williams in the true
Puritanic style, when the misguided man bade them a hasty farewell
and left on the first train for Rhode Island.
He brought up in a camp of Narragansett Indians, whom he found
more liberal in their religious views.
The blind and bigoted Williams, with a few other renegades from the
Puritan stronghold, established a colony at the head of Narragansett
Bay, which they called Providence.
Other settlements soon sprang up, and the hardened sinner Williams
went to England and obtained a charter which united all the
settlements into one colony.
At the beginning of the Revolution Rhode Island had a population of
50,000 blinded bigots.
CHAPTER VIII.
NEW HAMPSHIRE—SLIM PICKING—AN EFFECTIVE INDIAN POLICY
—JOHN SMITH AGAIN COMES OUT STRONG.
New Hampshire was a sickly child from the first, and of somewhat
uncertain parentage. It was claimed by many proprietors, who were
continually involved in lawsuits. Its soil was not very fertile, and
yielded little else than Indians and lawyers. The former were the
most virulent of which any of the colonies could boast, and the latter
were of the young and “rising” sort.
A NEW HAMPSHIRE PLANTATION IN
COLONIAL TIMES
These two elements managed to make it extremely lively for the
average colonist, who was scalped upon the one hand and “skinned”
upon the other. At first the horny-handed son of toil fondly hoped to
raise corn, but owing to the poverty of the soil it was a day’s journey
from hill to hill, and as much as a man’s scalp was worth to
undertake to travel it. At harvest time there was an immense crop of
cobble stones and no market for it.
Fortunately, in time the lawyers became starved out, but two great
drawbacks to prosperity yet remained; sterility of soil and hostile
Indians.
But the time was at hand when both these evils were to be
remedied. His name was Smith—John Smith, of course—who readily
undertook the contract of not only exterminating the Indians, but of
fertilizing the soil.
To accomplish the first of these great ends, he disguised himself as a
medicine man, and went boldly among the noble red men, inducting
them into the mysteries of the manufacture and consumption of
New England rum. He found them apt pupils, and it was not long
before every Red of them, from the biggest sachem to the latest
papoose, could not only distill his own fire-water, but drink it, too.
There was soon a very noticeable thinning out in the ranks of the
noble red men, and a good deal was said about the setting sun.
The fire-water did its work thoroughly, and the colonists were at
length masters of the situation so far as Indians were concerned.
The next thing was to make the land productive. This was a more
laborious and tedious undertaking than the first, but John Smith was
equal to the emergency. He caused dirt to be carted from a
neighboring State until the rocky surface of New Hampshire was
completely covered with a rich sandy loam a foot or two deep. The
people raised “some pumpkins” after that, we are informed.
Thus was agriculture established on a solid basis, and New
Hampshire made rapid progress.
All honor to John Smith.
CHAPTER IX.
SOME UNRELIABLE STATEMENTS CONCERNING THE EARLY
HISTORY OF NEW YORK—TRACES OF A GREAT UNDERTAKING—
ADVANCE IN REAL ESTATE—“LOOK HERE UPON THIS PICTURE,
AND ON THIS.”
New York was discovered in 1609 by one Henry Hudson, an
Englishman by birth, but to all intents and purposes a Dutchman,
being then in the service of Holland.
Immediately on his arrival he began the work of building a bridge
across the East river, which, it is feared, he never was able to finish.
Traces of this quaint structure are plainly to be seen to this day, and
have been known, time out of mind, as the “New East River Bridge.”
Manhattan Island, upon which New York now stands, was settled by
the Dutch, who called it New Netherlands (afterwards New
Amsterdam). They bought it of the Indians, paying for the entire
island the fabulous sum of twenty-five dollars, and liquidated the
purchase with fire-water; but that was before the panic, when there
was more “confidence” in business circles than now, and there had
been as yet no inflation talk.
New York has changed hands since then, and we understand the
property has enhanced in value somewhat. We doubt very much if
the island could be bought to-day for double the price originally paid
for it, even the way times are now.
NEW YORK IN 1620
NEW YORK IN 1876
Any one comparing the two pictures accompanying this chapter will
see how marvelously we have improved since the days of the Dutch.
No. 1 is copied from an old print, dating back to 1620, and is
warranted wholly reliable. It is undoubtedly the Sabbath day, for in
the foreground is seen an influential citizen of the period, who has
come down to the Battery to meditate and fish for eels. He is
thinking “How many ages hence will this, his lofty scene, be acted
over.” Presently he will catch an eel.
Sketch No. 2 is of more recent origin, and was taken from our artist’s
window. When this picture was first drawn the Brooklyn pier of the
bridge was plainly discernible in the background. But since then our
landlord, who is a German, and conducts a restaurant on Teutonic
principles on the ground floor, has humanely run up a vent-pipe from
his kitchen opposite our window, which necessarily excludes the
picturesque ruin of the bridge from view. The reader will observe
that nothing is now visible but a tall square sheet iron tube and an
overpowering sense of garlic, which destroy at once our view and
our appetite.
CHAPTER X.
A FLOOD OF HISTORICAL LIGHT IS LET IN UPON NEW JERSEY—
ABORIGINES—THE FIRST BOARDING HOUSE—ORGAN-GRINDING
AS A FINE ART.
Not many generations ago New Jersey was a buzzing wilderness—
howling would be a misnomer, as the tuneful mosquito had it all to
himself.
“His right there was none to dispute.”
The tuneful mosquito was, in fact, your true New Jersey aboriginal,
and we do not hesitate to assert that the wilderness buzzed. But the
time came at last when the wilderness of New Jersey was to have
something else to do.
In the year (confound it! what year was it now?) a select company
of colonists landed at Hoboken, led by one Philip Carteret. The latter
carried with him a large supply of agricultural implements to remind
the colonists that they must rely mainly upon the cultivation of
cabbages, and devote their energies more or less to the
manufacture of Apple Jack for their livelihood. But he soon saw his
error, and immediately cabled over for a supply of mosquito nets to
instill into their minds the axiom that “self-preservation is the first
law of nature.”
Mr. Carteret opened a boarding house in Hoboken, to be conducted
on strictly temperance principles, and devoted his leisure to the
civilizing of the aborigines; but his efforts in this direction were
crowned with but partial success.
It is an historical, but not the less melancholy fact, that the
aboriginal inhabitants of any country become effete as civilization
advances. And thus it happens that, although the mosquito has been
handed down to us in modern times, we only behold him in a
modified form. That he has not yet entirely lost his sting, the
compiler of this work personally ascertained during a four years’
exile in Hoboken. For all that the Jersey mosquito of to-day is but an
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com

More Related Content

PDF
Building service provider networks 1st Edition Howard C. Berkowitz
PDF
Building service provider networks 1st Edition Howard C. Berkowitz
PDF
Building Service Provider Networks 1st Howard C Berkowitz
PDF
Building service provider networks 1st Edition Howard C. Berkowitz
PDF
Next Generation Network Services Technologies And Strategies Neill Wilkinsonauth
PDF
Learning SD-WAN with Cisco: Transform Your Existing WAN Into a Cost-effective...
PDF
A practical guide to content delivery networks 1st Edition Gilbert Held
PDF
A practical guide to content delivery networks 1st Edition Gilbert Held
Building service provider networks 1st Edition Howard C. Berkowitz
Building service provider networks 1st Edition Howard C. Berkowitz
Building Service Provider Networks 1st Howard C Berkowitz
Building service provider networks 1st Edition Howard C. Berkowitz
Next Generation Network Services Technologies And Strategies Neill Wilkinsonauth
Learning SD-WAN with Cisco: Transform Your Existing WAN Into a Cost-effective...
A practical guide to content delivery networks 1st Edition Gilbert Held
A practical guide to content delivery networks 1st Edition Gilbert Held

Similar to Building service provider networks 1st Edition Howard C. Berkowitz (20)

PDF
Capacity Planning Panel - Operator and Eco-System Player Discourse
PDF
A practical guide to content delivery networks 1st Edition Gilbert Held
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
PDF
Internet Networks Wired Wireless And Optical Technologies 1st Edition Krzyszt...
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
PPTX
Introduction(2)
PDF
Networking Explained Second Edition Michael Gallo
PDF
A Practical Guide To Content Delivery Networks Gilbert Held
PDF
Global Networks Engineering Operations and Design 1st Edition G. Keith Cambron
PDF
SDN Software Defined Networks 1st Edition Thomas Nadeau D.
PDF
Better Than Best Effort at Bloomberg from ThousandEyes Connect
PDF
Optical Networks
PDF
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
PPTX
The needs for Wide Access Networks .pptx
PPT
67A01056F44149CC8CDD3039897DD4CA.ppt
PDF
Networking Concepts And Technology Deepak Kakadia Francesco Dimambro
PDF
Computer Networking A Top Down Approach 8th Edition Keith W Ross
PDF
Solution manual for Business Data Communications- Infrastructure, Networking ...
PDF
Networking Today Chapter 1 Networking Today Chapter 1
PDF
Advanced QoS for multi service IP MPLS networks 1st Edition Balakrishnan
Capacity Planning Panel - Operator and Eco-System Player Discourse
A practical guide to content delivery networks 1st Edition Gilbert Held
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
Internet Networks Wired Wireless And Optical Technologies 1st Edition Krzyszt...
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
Introduction(2)
Networking Explained Second Edition Michael Gallo
A Practical Guide To Content Delivery Networks Gilbert Held
Global Networks Engineering Operations and Design 1st Edition G. Keith Cambron
SDN Software Defined Networks 1st Edition Thomas Nadeau D.
Better Than Best Effort at Bloomberg from ThousandEyes Connect
Optical Networks
Scalable and Secure Internet Service and Architecture 1st Edition Cheng-Zhong Xu
The needs for Wide Access Networks .pptx
67A01056F44149CC8CDD3039897DD4CA.ppt
Networking Concepts And Technology Deepak Kakadia Francesco Dimambro
Computer Networking A Top Down Approach 8th Edition Keith W Ross
Solution manual for Business Data Communications- Infrastructure, Networking ...
Networking Today Chapter 1 Networking Today Chapter 1
Advanced QoS for multi service IP MPLS networks 1st Edition Balakrishnan
Ad

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Complications of Minimal Access Surgery at WLH
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
STATICS OF THE RIGID BODIES Hibbelers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Classroom Observation Tools for Teachers
Supply Chain Operations Speaking Notes -ICLT Program
RMMM.pdf make it easy to upload and study
Microbial diseases, their pathogenesis and prophylaxis
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Weekly quiz Compilation Jan -July 25.pdf
Cell Structure & Organelles in detailed.
Final Presentation General Medicine 03-08-2024.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Microbial disease of the cardiovascular and lymphatic systems
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Anesthesia in Laparoscopic Surgery in India
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Ad

Building service provider networks 1st Edition Howard C. Berkowitz

  • 1. Visit https://ebookultra.com to download the full version and explore more ebooks or textbooks Building service provider networks 1st Edition Howard C. Berkowitz _____ Click the link below to download _____ https://ebookultra.com/download/building-service-provider- networks-1st-edition-howard-c-berkowitz/ Explore and download more ebooks or textbooks at ebookultra.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. The competitive Internet service provider network architecture interconnection traffic engineering and network design 1st Edition Oliver M. Heckmann https://ebookultra.com/download/the-competitive-internet-service- provider-network-architecture-interconnection-traffic-engineering-and- network-design-1st-edition-oliver-m-heckmann/ Building Storage Networks Second Edition Marc Farley https://ebookultra.com/download/building-storage-networks-second- edition-marc-farley/ The Culture of Building First Printing Edition Howard Davis https://ebookultra.com/download/the-culture-of-building-first- printing-edition-howard-davis/ Building Networks and Servers Using BeagleBone 1st Edition Pretty https://ebookultra.com/download/building-networks-and-servers-using- beaglebone-1st-edition-pretty/
  • 3. Building Resilient IP Networks 1st Edition Kok-Keong Lee https://ebookultra.com/download/building-resilient-ip-networks-1st- edition-kok-keong-lee/ Building Partnerships for Service Learning 1st Edition Jacoby And Associates https://ebookultra.com/download/building-partnerships-for-service- learning-1st-edition-jacoby-and-associates/ Advanced Cardiovascular Life Support ACLS Provider Manual 16th Edition Advanced Cardiovascular Life Support (Acls) Provider Manual https://ebookultra.com/download/advanced-cardiovascular-life-support- acls-provider-manual-16th-edition-advanced-cardiovascular-life- support-acls-provider-manual/ Quality of Service in Optical Packet Switched Networks 1st Edition Akbar G. Rahbar https://ebookultra.com/download/quality-of-service-in-optical-packet- switched-networks-1st-edition-akbar-g-rahbar/ Quality of Service Mechanisms in Next Generation Heterogeneous Networks 1st Edition Abdelhamid Mellouk https://ebookultra.com/download/quality-of-service-mechanisms-in-next- generation-heterogeneous-networks-1st-edition-abdelhamid-mellouk/
  • 5. Building service provider networks 1st Edition Howard C. Berkowitz Digital Instant Download Author(s): Howard C. Berkowitz ISBN(s): 9780471099222, 0471099228 Edition: 1st File Details: PDF, 2.73 MB Year: 2002 Language: english
  • 7. Building Service Provider Networks Howard Berkowitz Wiley Computer Publishing John Wiley & Sons, Inc.
  • 8. Publisher: Robert Ipsen Editor: Carol A. Long Assistant Editor: Adaobi Obi Managing Editor: Micheline Frederick Text Design & Composition: North Market Street Graphics Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro- priate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. ● ∞ Copyright © 2002 by Howard Berkowitz. All rights reserved. Published by John Wiley & Sons, Inc. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ@WILEY.COM. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the ser- vices of a competent professional person should be sought. Library of Congress Cataloging-in-Publication Data: ISBN 0-471-09922-8 Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1
  • 9. Wiley Networking Council Series Scott Bradner Senior Technical Consultant, Harvard University Vinton Cerf Senior Vice President, MCI WorldCom Lyman Chapin Chief Scientist, NextHop Technologies, Inc. Books in the Series Howard C. Berkowitz, WAN Survival Guide: Strategies for VPNs and Multiservice Networks 0471-38428-3 Tim Casey, ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations 0-471-37748-1 Jon Crowcroft & Iain Phillips, TCP/IP and Linux Protocol Implementation: Systems Code for the Linux Internet 0-471-40882-4 Bill Dutcher, The NAT Handbook: Implementing and Managing Network Address Translation 0-471-39089-5 Igor Faynberg, Hui-Lan Lu, & Lawrence Gabuzda, Converged Networks and Services: Internetworking IP and the PSTN 0-471-35644-1 Russ Housley & Tim Polk, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure 0-471-39702-4 Geoff Huston, Internet Performance Survival Guide: QoS Strategies for Multiservice Networks 0-471-37808-9 Geoff Huston, ISP Survival Guide: Strategies for Running a Competitive ISP 0-471-31499-4
  • 10. Elizabeth Kaufman & Andrew Newman, Implementing IPsec: Making Security Work on VPN’s, Intranets, and Extranets 0-471-34467-2 Dave Kosiur, Understanding Policy-Based Networking 0-471-38804-1 Mark E. Laubach, David J. Farber, & Stephen D. Dukes, Delivering Internet Connections over Cable: Breaking the Access Barrier 0-471-38950-1 Dave McDysan, VPN Applications Guide: Real Solutions for Enterprise Networks 0-471-37175-0 Henry Sinnreich & Alan Johnston, Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol 0-471-41399-2 James P.G. Sterbenz & Joseph D. Touch, High Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication 0-471-33036-1 iv Wiley Networking Council Series
  • 11. Dedication To friends and colleagues who have left this layer of existence during the writing of this book: To a protege whose utter unwillingness to quit, and her drive to learn, is an inspiration: Heather Allan To Curt Freemyer, Beckey Badgett, and the rest of the team at Gett: Thanks for all the support. You all have a role in this book. Abha Ahuja, routing area director, IETF Lynn Acquaviva, a dear and inspirational friend
  • 13. Networking Council Foreword xvii Acknowledgments xviii Introduction xix Overview of the Book and Technology xix How This Book Is Organized xx Who Should Read This Book xxi Chapter 1 What Is the Problem to Be Solved? 1 The User Culture 2 The Implementer Culture 3 What Services Do Users Want? 4 Sites and Communities of Interest 5 Known Clients to Arbitrary Servers 9 Known Servers to Arbitrary Clients 10 Known Clients to Known Servers under Common Administration 13 Known Clients to Known Servers under Different Administration 18 Responding to New and Converged Service Requirements 24 Fundamental Principle 1: Don’t Break What Already Makes Money 26 Affordable Business-to-Consumer Internet 27 Hosting Centers 27 New Service Provider Models 28 Fundamental Problem 2: Keep Everything Scalable 29 Challenge for Service Providers: Keep It Scalable within the Changing Industry Paradigms 29 Contents vii
  • 14. Relationship to Transmission System 30 Interprovider Connectivity 30 Looking Ahead 33 Chapter 2 The Service Provider Landscape 35 History: The Basis for WAN Regulation and Competition 36 Semaphore Scalability 36 Telegraph Scalability 36 Telephone Scalability 38 Models Evolve 38 Traditional Telephony Models: Organizational Aspects 39 Enterprise Network Models 42 Service Provider Models 47 Modern Models 51 What Are All These Devices Doing? 57 Control Planes: IP Equivalents to SS7 Success 57 IP versus Provider-Operated IP versus Public Internet 57 Routing, as Opposed to Routing: Internet versus Telco Traditions 58 Provider Relationships: Peers and the Trail of Tiers 72 An Introduction to Scalability Issues in the Modern Internet 73 CIDR-Style Provider Aggregation 74 Geographic and Other Aggregation Schemes 75 Overloading State into the Routing System: An Introduction 77 Looking Ahead 78 Chapter 3 Services, Service Level Agreements, and Delivering Service 79 Defining Services: The Context for Policy 80 Layers of Management: TMN 81 Public versus Private 83 Bandwidth 83 Availability Policies 84 SLAs 85 Availability and SLAs 85 QoS and SLAs 87 Absolute Latency 87 Jitter 88 Loss Probability 88 First Class, Business, Economy, or Baggage? 90 Connectivity Policies 1: Load Sharing, Fault Tolerance, Multilinking, and Multihoming 91 Connectivity Policies 2: Intranet, Extranet, and Internet—To Say Nothing of IPv6 92 Customer Service 93 viii Contents
  • 15. Representative Service Requirements 94 Case Study: Basic Internet Access: Huffle, Puffle, and Cetera 94 Case Study: Multihoming to Multiple PoPs 98 Case Study: Intranet/Extranet/Internet 100 Case Study: Home and Office Internet, Cooperating Local ISP and Content Providers 104 Looking Ahead 107 Chapter 4: Translating Service Definitions to Technical Requirements: Policies 109 The Delicate Balance: “But I Wanna Learn BGP!” 111 Returning to Policies 112 Policy Notation with RPSL 114 AS Expressions 115 Routes 116 Router Expressions and Peering Sets 118 Influencers of Route Selection 119 AS Paths 120 Policy and Ownership 120 The Availability of Policies 121 Specifying Routing Policies and Actions 123 Advertising/Export Policies 124 General Route Installation 126 Acceptance/Import Policies 128 Proprietary Policy Notations 130 JunOS 130 Cisco: An Indirect Notation 131 Representative Requirements for Routing Policies 133 Defaults and Beyond 133 Multilinking and Multihoming 134 Multihoming to Multiple POPs of a Single ISP 136 Multihoming to Two ISPs 138 Transit 140 Bilateral Peering among Major Providers 145 Peering at a Multilateral Exchange Point 147 Security Policies 148 Service Level Policies 148 QoS Policy Propagation 150 Accounting Policies 151 The IP-VPN Address Family and Routing Notation 153 Routing Distinguishers 153 Using Routing Distinguishers in Extended RPSL 154 Complex VPN Case Study 154 The Emerging VPN Strategy 155 Contents ix
  • 16. The Real Requirements 155 Handling Extranets 157 Looking Ahead 158 Chapter 5 Administration, Addressing, and Naming 159 Technical and Cultural Assumptions about Addressing 159 Registered and Private Space 161 Kinds of Public Address Space 162 Principles for Use of Public Address Space 163 Dynamic Address Assignment 166 NAT and Other Midboxes 167 Addressing Aspects of Multihoming 170 Route Aggregation 171 Planning Aggregation Schemes 171 The RPSL Components Attribute 174 Route Injection 178 Working with Registries 179 ARIN 179 RIPE-NCC 180 Representative Templates from ARIN 180 Representative Templates from RIPE-NCC 182 Managing Your Address Space 184 Once You Have the Address Space 184 Document Your Current Practice 186 Requesting More Space 194 Autonomous Systems 195 Registering a Routing Policy 196 Evolution of the AS Number 197 IPv6 Address Allocation 197 IPv6 Address Structure 198 The Aggregatable Unicast Address 199 Renumbering 203 Looking Ahead 204 Chapter 6 Carrier Facilities: Getting Physical 205 Carrier Business Models 206 Carrier Classness 207 Service Provider—Vendor Relationships 209 Supplier Attributes 209 Equipment Attributes 209 Network Attributes 211 The Facility Conundrum 211 x Contents T E A M F L Y
  • 17. Non-Facility-Dependent Service Providers 212 ISPs and IP Service Providers 213 Content Carriers and Hosting Centers 213 Traditional and Startup Telcos 214 Exchange Point Facilities 215 Carrier-Quality Installations 215 The Building and Its Environs 215 Equipment Mounting and Physical Density Issues 216 Power, Power, I Want Power 217 HVAC and the Carrier Environment 219 Fire Protection, and Protection against Fire Protection 220 Physical Security 223 The Human Resource and Its Management 225 Provisioning: Starting the Technical Operation 226 Operations: Trouble Reporting, Monitoring, and Problem Response 226 Network Operations Centers 226 Customer Support Practices 228 Operational Aspects of Network Security 230 Looking Ahead 231 Chapter 7 The Provider Edge: Layer 1, Layer 2, and the PSTN 233 The First-Meter, First-100-Meter, First-Mile, and Second-Mile Problems 234 Historical Switching and Transmission Architecture 234 Terminology for Separated Control and Switching 236 Traditional Carrier Service Types and Interworking 237 Components of Traditional Telephony 238 The Traditional First Meter 238 The Traditional First 100 Meters 238 The Traditional First Mile 239 The “Traditional” Second Mile: Multiplex Management 240 Modem Wholesaling, Virtual POPs, and the Beginning of Media Gateways 247 Technical Efficiency Considerations 247 Regulatory Concerns 248 Other Commercial Wholesaling Alternatives 250 Emerging Technologies 250 Do 800-Pound Gorillas Run at Gigabit Rates? 251 Interfaces Other than Ethernet 251 The New First Meter 253 Niches for 100-Meter Services 253 New First-Mile Services 255 Media Gateways and the New Second Mile 262 Long-Haul Niches 269 Contents xi
  • 18. PSTN Integration 270 Edge Control for Individual Subscribers 270 Telephone System Capacity Planning 272 Internal Provider Control: SS7 Connectivity to the PSTN (ISP as CLEC or IXC) 274 Interprovider Control 278 Looking Ahead 279 Chapter 8 Transporting the Bits: The Sub-IP and Physical Intraprovider Core 281 Basic Layer 1 Resilient Media 282 Advanced Grooming and Merging 284 Incumbent Carrier Facilities 286 Evolving from TDM Networks 286 Backhaul 287 Layer 2 Overlays 288 Where Does Ethernet Fit in All This? 289 Inverse Multiplexing 290 Evolution to First-Generation Optical Facilities 290 SONET Architecture 292 SONET Speed Hierarchy 293 Packet over SONET 294 Models for Survivability 294 Protection and Restoration 295 Preemption and Extra Traffic 295 Reversion and Regrooming 296 SONET Recovery 297 What Are Carrier Goals for New Optical Technologies? 298 Optical Service Offerings 298 Characteristics and Constraints of Optical Networks 299 Facilities-Based Services 300 Connection-Oriented Services 301 Optical Virtual Private Networks 303 New Facilities 303 WDM 304 Resilient Packet Rings (RPRs) 305 Free-Space Metro Optical 306 Broadband Wireless Radio 306 Evolution or New Species? Circuits without Resources, ATM without Cells, and GMPLS 307 Issues of non-PSC LSRs 308 GMPLS Requirements for LSP Identification 308 Special Considerations for Lambda Switch—Capable (LSC) LSRs 308 xii Contents
  • 19. IP over Optical 309 Looking Ahead 310 Chapter 9 Basic BGP and the Customer Side of Exterior Routing 313 BGP Never Stands Still 314 BGP, iBGP, and eBGP 316 So What Does BGP Do? 318 The BGP Stack 320 Protocol Interactions 321 Negotiable Capabilities 324 Attributes 329 A First Look at iBGP 337 RIBs and Routes 338 Acceptance Policies and BGP 339 BGP Route Selection Algorithms: IETF and Variants 340 General Route Installation 340 Advertising Policies and BGP 342 Customer Configuration Requirements Overview 343 Multilinking and Multihoming: The Customer Side 344 Motivations for Multilinking 345 Non-BGP Multihoming 345 Motivations for BGP Multihoming to One Provider 346 Motivations for Multihoming to Multiple Providers 346 Starting Simply: Defaults 347 Asymmetrical Routing 347 Multihoming to Multiple POPs of a Single ISP 348 Multihoming to a Single Provider using PA Space 349 RFC 2270 352 Multihoming to Two ISPs 355 Scaling Potatoes 355 AS Path Expressions 358 Selecting and Influencing Outbound Paths 359 Selecting and Influencing Inbound Paths 361 Importing and Exporting among Routing Protocols 363 Importing Default into an IGP 364 Blackhole Routes 366 Looking Ahead 367 Chapter 10 Subscriber to Provider, and Subscriber to Subscriber Edge: IP 369 Taking Orders 370 Provisioning 371 AAA and Security Functions in the POP 375 Contents xiii
  • 20. POPs and Layer 2 Switches 379 Demultiplexing Layer 2 Access Services 380 POP Internal Backbone 381 Multicast Enabling 382 Scalability with MPLS 382 Basic POP Design with Dedicated Customer Access 382 Intra-POP Routing 383 IGPs for POPs 383 iBGP in the POP 384 POP Design for Dial-up and Other Switched Access 387 Scalability Issues: Protecting the Routing System 387 Registry Level 387 Peer Groups 388 Routing Security Breaches from Inappropriate Use of RIP 388 Authentication 390 Prefix Limit 390 Outbound Route Filtering and Graceful Restart 390 Scalability Issues: Protecting Routed Traffic 391 Ingress Filtering and Reverse Path Verification 391 Rate Limiting 392 The Role of Firewall Services 392 IPv6 393 The Provider Side of Basic Customer Requirements 393 Single Homing, Single Link 393 Single-Homed Multilink 393 Multihoming to Single Provider Using PA Address Space: Provider Side 394 Multihoming to Single Provider Using PI Address Space: Provider Side 394 Multihoming to Multiple Providers, Customer Uses Your PA Space 394 Multihoming to Multiple Providers, Customer Uses Another Provider’s PA Space 396 Multihoming to Multiple Providers, Customer Uses PI Space 398 Complex Fault-Tolerant Routing with Mutual Design between Provider and Customer 398 Case Study: RFC 1998 with Internal Links 398 Case Study: Enterprise Providing Basic Transit 401 To Confederate or Not to Confederate 402 Service Level Classification and the ISP Challenge: When to Oversubscribe, When to Overprovision 411 Forwarding Equivalence Classes 413 What Interferes with Quality? 414 Provider Management of Incoming Traffic from the Subscriber 415 Scheduling Outgoing Traffic to the Core 416 Looking Ahead 417 xiv Contents
  • 21. Chapter 11 The Intraprovider Core: IP/MPLS 419 Developing Requirements: Pipes, Hoses, and Trunks 421 Applying Pipes and Hoses 423 Motivations for Traffic Engineering 425 Core and Interprovider Hierarchy 425 From the Edge to the Core 427 Core Routing Scalability 427 Interior BGP Routing Scalability 428 IGP Scalability Issues 435 Core Design Issues in Transition 445 Is Explicit Routing a Step Backward? 445 The Role of Sub-IP 446 Traffic Trunks 447 Recent Background 448 The Almost-Worst and Worst Cases 449 Per-Hop Merging Behavior 452 Merging with Multiple Service Classes 454 Tunneled Trunks 454 Core Fault Tolerance 456 What Can Go Wrong? 457 Survivability Concepts and Requirements 457 Understanding Recovery Time 461 Sub-IP Core Technologies 465 CCAMP 465 MPLS 465 GSMP 467 Traffic Engineering Deployment 467 BGP-free Cores 471 Looking Ahead 471 Chapter 12 The Provider-to-Provider Border 473 Interprovider Economics: The Most Important Part 474 The Trail of Tiers 475 Basic Economic Models 477 Special Cases 481 Interconnection Strategies: The Second-Most Important Part 483 Potatoes between Providers 483 Mutual Backup 485 What Should You Advertise and Accept? 485 Scope of Advertising 488 From Whom Do You Get Routes? When Should They Be Re-advertised? 492 Describing Aggregation in RPSL 494 Transit with PA Space 496 Contents xv
  • 22. eBGP Scalability and Survivability 497 Filtering Strange Beings: Smurfs and Martians 498 Quantitative Protections 500 Minimizing Churn 502 Exchange Point Design and Operation 503 Route Servers and the NSFNET 504 Layer 3 versus Layer 2 Exchanges 505 Exchange Point Evolution 506 Local Exchanges 507 Layer 2 Alternatives 508 Switches for the Ideal Large Exchange 510 Special Connectivity 514 Looking Ahead 515 Chapter 13 VPNs and Related Services 517 When Management Is Outsourced 518 Evolution from Outsourced Management to VPNs 519 Endpoints and Midboxes 520 Customer Domains 520 CE and PE Devices 523 P Devices 524 User Perception of VPN Types and Capabilities 525 Membership and Security Policy 526 Operational Policy 529 Kinds of User Information Carried 530 VPN Internal Services 531 Membership and Its Relationship to Signaling 532 Carrying the Data 533 Interprovider Connectivity 537 Provider-Provisioned VPN Technologies 538 Multiple Virtual Routers 538 L2 VPNs 539 RFC 2547: MPLS/BGP Virtual Transport Service 542 Case Study: VPN Connectivity Strategy 550 The Emerging VPN Strategy 550 The Real Requirements 550 Handling Extranets 551 Potential Technical Solutions for Magic Images 551 An L2 VPN solution 552 An MVR Solution 552 A BGP/MPLS Solution 553 Conclusion 554 References 555 Index 561 xvi Contents
  • 23. The Networking Council Series was created in 1998 within Wiley’s Computer Publishing group to fill an important gap in networking literature. Many current technical books are long on details but short on understanding. They do not give the reader a sense of where, in the universe of practical and theoretical knowledge, the technology might be useful in a particular organization. The Networking Council Series is concerned more with how to think clearly about networking issues than with promoting the virtues of a particular technology— how to relate new information to the rest of what the reader knows and needs, so the reader can develop a customized strategy for vendor and product selec- tion, outsourcing, and design. In Building Service Provider Networks by Howard Berkowitz, you’ll see the hallmarks of Networking Council books—examination of the advantages and disadvantages, strengths and weaknesses of market-ready technology, useful ways to think about options pragmatically, and direct links to business prac- tices and needs. Disclosure of pertinent background issues needed to under- stand who supports a technology and how it was developed is another goal of all Networking Council books. The Networking Council Series is aimed at satisfying the need for perspec- tive in an evolving data and telecommunications world filled with hyperbole, speculation, and unearned optimism. In Building Service Provider Networks you’ll get clear information from experienced practitioners. We hope you enjoy the read. Let us know what you think. Feel free to visit the Networking Council web site at www.wiley.com/networkingcouncil. Scott Bradner Senior Technical Consultant, Harvard University Vinton Cerf Senior Vice President, MCI WorldCom Lyman Chapin Chief Scientist, NextHop Technologies, Inc. Networking Council Foreword xvii
  • 24. Many have contributed to my growth in learning to build networks. It’s hard to count the number of colleagues in the North American Network Operations Group and Internet Engineering Task Force who have helped me understand issues and with whom I brain- stormed issues. Thanks to Sean Donelan, Susan Harris, Sue Hares, Vijay Gill, Kevin Dubray, Yakov Rekhter, Frank Kastenholz, Lyman Chapin, Scott Bradner, Sean Doran, and Geoff Huston. Major support came from my employer, Gett Communications and Gett Labs. My previous employer, Nortel Networks, gave me many opportunities for thinking about, arguing about, and screaming about provider issues. Let me thank colleagues including my immediate team of Francis Ovenden, Kirby Dolak, and Silvana Romagnino. Other valuable insight came from Nortel colleagues including Avri Doria, Elwyn Davies, Fiffi Hellstrand, Ken Sundell, Ruth Fox, and Dmitri Krioukov. The BGP convergence team in the IETF Benchmarking Working Group was another strong sounding board, where I am delighted to credit Padma Krishnaswamy, Marianne Lepp, Alvaro Retana, Martin Biddiscombe, and (again) Elwyn Davies and Sue Hares. There are too many people on the Babylon research team to give individual credit, but let me single out Loa Andersson, Tove Madsen, and Yong Jiang, and again Avri Doria. CertificationZone.com, and Paul Borghese’s site and mailing list groupstudy.com, have been an excellent forum to understand the learning process. Let me thank Paul, as well as other contributors including Chuck Larrieu, John Neiberger, Peter van Oene, Erik Roy, and Priscilla Oppenheimer. My home life stayed sane through a fourth book largely through the skill of my house- keeper and assistant, Mariatu Kamara, and my distinguished feline editorial assistant, Clifford—even if he did have a hairball on the copy edit of Chapter 10. Carol Long of Wiley has been incredibly supportive in this project and throughout my publishing career. This is my fourth full book, and the first one where the production and copy editors have made the process better rather than more frustrating. Thanks to pro- duction editor Micheline Frederick and copy editor Stephanie Landis for adding value to the book. Finally, I cannot sufficiently praise the contributions of Annlee Hines, my peer reviewer on this book. Acknowledgments xviii
  • 25. Arthur C. Clarke defined any sufficiently advanced technology as indistinguishable from magic. A great many network service customers seem to believe in magical solu- tions, and, unfortunately, too many salespeople are willing to promise magical solu- tions. Service provider engineers often face the need to meet a less than logical require- ment. Their customers might have posed more logical requirements had they read my WAN Survival Book, which focuses on the customer side of the WAN service relation- ship. Nevertheless, many customers and their sales representatives have not done this, so this book needed to be written. Building Service Provider Networks could perhaps have been titled Engineering Design of Magic Networks. It gives approaches for implementing the provider side of a network offering with a service level agreement (SLA) without being afraid to mention technologies that, to put it politely, are just solidifying from conceptual vaporware. It will mention when arguments for certain technologies are at least partially based on fear, uncertainty, and doubt (FUD). Overview of the Book and Technology Systematic communications systems involving the transfer of messages without the need to handle paper have certainly been with us for at least two centuries, going back to Napoleonic semaphore systems. Less systematic remote communications go back to smoke signals. Electrical communications began in 1844, and were in regular commercial use by the late nineteenth century. Electrical and electronic communications were largely controlled by technical monopolies, so innovation was paced by the operational needs of the major carriers and their ability to absorb and deploy new technology. When telecommunications divestiture and widespread deregulation began in the 1970s, the rate of new technology introduction increased dramatically, interacting with customer perceptions to create incredible demand for both feasible and infeasi- ble services. xix Introduction
  • 26. Other documents randomly have different content
  • 27. “Oh, come now, Christopher! really, this is going to far!” is what public opinion said, and when our hero petitioned the Italian Congress to fit out an expedition and let him prove his theory, it magnanimously offered to set him up in business with a first-class barrel-organ and an educated monkey cashier on condition of his leaving the country once for all; but Columbus, expressing his regret for his lack of musical ability, declined this generous offer and turned with a sigh to other governments for assistance. Finally, after fifteen years of effort, he succeeded in convincing Queen Isabella of Spain that there was an undiscovered country beyond the seas, overflowing with milk and honey, which it would be worth while to “work up.” He proved his theory with the aid of an egg, (which he made stand on end,) an old Boston City Directory, and a ground plan of Philadelphia, (see school books,) and demonstrated to the good lady’s entire satisfaction that she might realize largely by fitting out an expedition and let him at its head go and discover it. So conclusive were these arguments to the mind of Queen Isabella that the good old soul allowed him to fit out an expedition at his own expense, and gave him carte blanche to discover America as much as he wanted to. We have seen how well he succeeded. All this took place three hundred and eighty-three years, four months, and five days ago, but it seems to us but yesterday.
  • 28. Ah! how time flies!
  • 29. CHAPTER III. TREATS OF OTHER DISCOVERIES AND DOES GREAT CREDIT TO THE AUTHOR’S SENSE OF JUSTICE. On the return of Columbus to Spain, he published a map of his voyage in one of the illustrated papers of the day. Through the courtesy of the publishers of that paper we are enabled to place this map before our readers. Map of COLUMBUS Route DRAWN BY CHRIS HIMSELF Here it is translated from the original Spanish. If the gentle reader can make head or tail of it he is more gentle even than we had at
  • 30. first supposed. The publication of this map at the time naturally inspired others with the spirit of adventure, and discovering America became quite the rage. Indeed, so common were voyages of discovery to the New World, that only one besides that of Columbus is deemed of sufficient note to find a place in this history. We allude to that of Americus Vespucius. This gentleman, who was a Florentine by birth, made a voyage to South America in 1499. He wrote sensational letters to the papers describing his voyage and the country, which were afterwards published in book form by a German geographer, who gave the name “America” to the New World, but this history cheerfully accords to [1] Christopher Columbus the imperishable glory of finding out the roosting-place of the American eagle. 1. Mr. Columbus is better known as the author of that soul- stirring melody, “Hail Columbia!”
  • 31. CHAPTER IV. HAVING TO HIS ENTIRE SATISFACTION SETTLED THE QUESTION AS TO WHO DISCOVERED AMERICA, THE AUTHOR PROCEEDS TO SETTLE THE COUNTRY ITSELF—JOHN SMITH IS MENTIONED— JOHN SMITH ON THE ROSTRUM—JOHN SMITH IN DIFFICULTIES— THE PLOT THICKENS AS FAR AS J. SMITH IS CONCERNED—THE DEATH PENALTY—SLOW MUSIC—* * * * SAVED! It was a century or more after the events narrated in the last chapter before any attempt was made to establish a colony in America, or before civilization got any permanent foothold.
  • 32. In 1606 a certain “London company” got out a patent on Virginia, and the next year sent over a ship-load of old bachelors to settle its claim. They landed at Jamestown in the month of May, and here the wretched outcasts went into lodgings for single gentlemen. The whole country was a howling wilderness, overrun with Indians, wild beasts and Jersey mosquitoes. These hardy pioneers had come to an unexplored region with a vague, general idea that they were to dig gold, trade with the Indians, get enormously rich and return home. So sanguine were they of speedy success that they planted nothing that year. The few sandwiches they had brought with them were soon consumed, the gold did not “pan out,” the Indians drove very hard bargains, offering a ready market for hair, but giving little or nothing in return. A BUSINESS TRANSACTION. To make matters worse, the Fevernager, a terrible disease of the period, got among them, and by fall only a handful of the colonists remained, and these were a very shaky lot indeed, with not clothing enough among them to wad a shot-gun. Among this seedy band was one John Smith, who, being out of funds himself, and a public spirited person withal, saw that unless provisions could be obtained shortly, the scheme of colonizing America would be a failure.
  • 33. John Smith on the Rostrum. He went into the lecture field, holding forth to large and fashionable audiences, composed of intelligent savages, upon the science of navigation, illustrating his lecture with an old mariner’s compass that indicated all four of the cardinal points at once, and a superannuated bulls-eye watch that would do nothing but tick. These simple-minded children of nature listened with attentive ears, and looked on with wondering eyes, and came down largely with green corn, sardines, silk hats, hard boiled eggs, fall overcoats, pickled oysters, red handkerchiefs, ice cream, dried herring, kid gloves, pickled tripe, and other Indian luxuries, which proved invaluable to the starving, threadbare colonists. Thus it is seen that Mr. Smith obtained on tick[2] what he had no cash to pay for. 2. The reader may occasionally find this sort of thing in these pages but he is entreated not to be startled. Although Mr. Smith was regarded as a talented man from a scientific point of view, and was even mentioned in the native papers as undoubtedly a god, yet he was sometimes grossly misunderstood by these artless aborigines, and on one occasion they arrested him on a
  • 34. general charge of hocus-pocus or witchcraft, and carried him before Chief Justice Powhatan to be tried for his life. The jury brought in a verdict of “guilty” on all the counts, and the hapless Smith was condemned to death. His counsel did all they could to establish an alibi, but in vain. It was a clear case; a fair trial had been given their pale brother and he must suffer the penalty. As a last resort, Mr. Smith offered, first, his bull’s-eye watch, and finally, the old mariner’s compass, for his life, but Judge Powhatan could not see the point. He had never seen a white man die, and was panting for a new sensation. He therefore ordered the entertainment to proceed without more delay. Having previously had his scalp removed, the doomed man thanked his captors for all their kindness, and requesting the executioner to make a good job of it, placed his head upon the fatal block. The dread instrument of death was uplifted, and Mr. Smith was really apprehensive that his time had come. He closed his eyes and whistled the plaintive air, “Who will care for my mother-in-law now?” There was a hush of pleasant anticipation—a deadly silence—you might have heard a pin drop—indeed, you might have heard ten pins drop. At this supreme moment Pocahontas, the beautiful and accomplished daughter of Judge Powhatan, appeared upon the scene, tastefully dressed as a ballet girl, and using some pretty strong arguments with her father, obtained from him a stay of proceedings, and the prisoner’s life was spared.
  • 35. Pocahontas saving the life of Captain Smith Powhatan apologized to Mr. Smith for the loss of his hair, and handsomely offered to buy him a wig. John admitted that it was rather a closer shave than he had been accustomed to, but at the same time he begged the learned gentleman not to mention it, and made the best of his way back to Jamestown laden with presents, which were subsequently stolen by the donors. Many persons look upon this incident as apocryphal, but we are prepared to assure them upon personal knowledge of its truthfulness. For, during a brief but bloodless campaign in Virginia in 1864, whither we had gone as a gory “hundred day’s man” to put down the Rebellion, sixteen different identical spots were pointed out to us where Pocahontas saved the life of Captain Smith. If there be any lingering doubt in the mind of any one we point him in triumph to any of our ably written city directories, the careful perusal of which will convince the most sceptical mind of Mr. Smith’s safety. Pocahontas afterwards married a young English lord, (our American girls marry titles whenever they get the chance,) and at last accounts was doing very well. Mr. Smith was elected president, by a large majority, of the little colony, which began to thrive henceforth, and was soon reinforced by other adventurers from England.
  • 36. SIC SEMPER TYRANNIS. Great seal of Virginia —sketched on the spot. In the fall of 1609 Mr. Smith was compelled to return to England on account of a boil on his neck, or to have a tooth drawn, we forget which—but that is a mere detail. Virginia became a fixed fact, and in 1664 was ceded to the Crown of Great Britain, which maintained jurisdiction over it until about the year 1776. On page 42 we reproduce the great Seal of Virginia. The allegory is so strikingly and beautifully obvious as to need no further elucidation.
  • 37. CHAPTER V. TREATS OF THE EARLY HISTORY OF MASSACHUSETTS AND MAKES MENTION OF A PILGRIM FATHER OR TWO, ALSO SHOWS WHAT A GOOD MEMORY THE AUTHOR HAS FOR DATES. Massachusetts was first settled by Pilgrim Fathers who sailed from England in the year 1620 on board the May Flour, giving directions to the captain to set them down at some place where they could enjoy religious freedom, trusting rather to his knowledge of Navigation than of Theology to land them at the right place. LANDING OF THE PILGRIMS Thinking wild savages least likely to entertain pronounced religious prejudices, the captain of the May Flour bethought him of America, and landed them hap-hazard at Plymouth, Massachusetts, on the
  • 38. 21st of December, 1620. The Pilgrims made themselves as comfortable on Plymouth Rock as possible, and formed a treaty with the Indians which lasted several days. The accompanying sketch not only accurately illustrates the event just narrated, but gives us a faithful and striking portrait of each of the Pilgrim Fathers, which will be immediately recognized by all their acquaintances. The drawing is made from a photograph taken on the spot by an artistic Pilgrim, who brought his camera with him, hoping to turn a penny by photographing the natives. We may here incidentally remark that his first native “subject,” dissatisfied with the result of a “sitting,” scalped the artist and confiscated his camera, which he converted into a rude sort of accordion. This instrument was the cause in a remote way of the ingenious native’s death, for he was promptly assassinated by his indignant neighbors. Let the young man over the way, who has recently traded his mother’s flat- irons for a concertina, take warning. THE Pilgrim Fathers Converting A Quaker
  • 39. As some of our readers may not know what a Pilgrim Father is, and as it is the business of this book to make straight all the crooked paths of history, we beg to state that a Pilgrim Father is a fellow who believes in hard-money piety, if we may be allowed the expression, and with whom no paper substitute will pass current. All others are counterfeit, and none genuine without the signature, “Puritan.” Having come so far to enjoy religious freedom, the Puritans took it unkind if any one ventured to differ with them. Our illustration shows their style of reforming Quakers in 1656. They used, as will be seen, a very irresistible line of argument, and the dissenting party thus “dealt” with generally found it useless to combat old- established prejudices. It is not for the unimpassioned historian to comment upon such a system of orthodoxy. We will say, however, that the Puritans meant well, and were on the whole worthy sort of persons. At any rate, Plymouth Rock was a success, and may be seen to this day (with certain modifications) in the identical spot where the Pilgrim Fathers found it.
  • 40. CHAPTER VI. CONNECTICUT—INDIAN DEFINITION EXTRAORDINARY—WHAT THE DUTCH THOUGHT OF THE ENGLISH, AND WHAT THE ENGLISH THOUGHT OF THE DUTCH—STORY OF THE CHARTER OAK— WOODEN NUTMEGS INVENTED. Connecticut is an Indian word and signifies Long River. We know, because all the Indian dictionaries we ever read right through give this definition. In 1636, if our memory serves us, Connecticut was claimed by both the Dutch and English, who had a long dispute about it. Neither faction comprehended what the dispute was about, as the Dutch did not understand English nor the English Dutch. All the Dutch knew was that their antagonists were tam Yankees, and the latter were equally clear that theirs were blarsted Dutchmen in the worst sense of the word, and thus the matter stood when, fortunately, an interpreter arrived through whom the quarrel was conducted more understandingly. It ended in favor of the English. The Dutch, it would appear, turned out to be less blarsted than was at first supposed, and, shaking the dust from their wooden shoes, emigrated to New Jersey. In the year 1636 it occurred to King Charles II to grant Connecticut a charter, which, considered as a charter, was a great hit. It gave the people the power to govern themselves. Whenever a Connecticutian traveled abroad folks said, “There goes the Governor of Connecticut,” and he really felt himself a man of consequence.
  • 41. This charter was afterwards annulled by King James II on his accession to the throne, who feared, no doubt, that the people of Connecticut would govern themselves too much, as the population was increasing rapidly. He appointed a Governor from among his poor relations and sent him over to take charge of Connecticut. Connecticut it seems rather took care of him than otherwise. He varied the monotony of a brief public career by making sundry excursions on rail-back, if we may be allowed the expression, under the auspices of an excited populace. He found the climate too hot to be agreeable, particularly as his subjects presented him with a beautiful Ulster overcoat of cold tar and goose feathers, and common politeness compelled him to wear it. Need we say the new Governor begged to be recalled? In the meantime the charter given by Charles II was not destroyed. It was taken care of by Captain Wadsworth, who hid with it in a hollow oak tree, where he remained until the death of the despotic James, which, fortunately, was only about four years, when King William, a real nice man, ascended the throne, and he sat down and wrote to Captain Wadsworth, begging he would not inconvenience himself further on his (William’s) account. It was then that the Charter Oak gave back the faded document and Captain Wadsworth, both in a somewhat dilapidated condition.
  • 42. SECRETING THE CHARTER. While confined in the hollow tree the Captain beguiled the tedium of restricted liberty by inventing the wooden nutmeg, a number of which he whittled out of bits of wood taken from the walls of his prison. He subsisted almost exclusively upon these during the four years of his voluntary incarceration, and immediately after his release got out a patent on his invention, which he afterwards “swapped” off to a professor in Yale College, who, we understand, made a handsome fortune out of it. Thus it ever is that patriotism and self-abnegation for the public weal meets with ample reward.
  • 43. CHAPTER VII. RHODE ISLAND—ROGER WILLIAMS “DEALT” WITH—A DESPERATE DISSENTER. Rhode Island was first settled by a desperate character named Roger Williams, who was banished by the Puritans from Massachusetts because he entertained certain inflammatory views decidedly antagonistic to the enjoyment of religious freedom, namely: that all denominations of Christianity ought to be protected in the new colony. THE Apostacy of Roger Williams
  • 44. This, of course, was mere heresy upon the face of it, and our forefathers proceeded to “deal” with Brother Williams in the true Puritanic style, when the misguided man bade them a hasty farewell and left on the first train for Rhode Island. He brought up in a camp of Narragansett Indians, whom he found more liberal in their religious views. The blind and bigoted Williams, with a few other renegades from the Puritan stronghold, established a colony at the head of Narragansett Bay, which they called Providence. Other settlements soon sprang up, and the hardened sinner Williams went to England and obtained a charter which united all the settlements into one colony. At the beginning of the Revolution Rhode Island had a population of 50,000 blinded bigots.
  • 45. CHAPTER VIII. NEW HAMPSHIRE—SLIM PICKING—AN EFFECTIVE INDIAN POLICY —JOHN SMITH AGAIN COMES OUT STRONG. New Hampshire was a sickly child from the first, and of somewhat uncertain parentage. It was claimed by many proprietors, who were continually involved in lawsuits. Its soil was not very fertile, and yielded little else than Indians and lawyers. The former were the most virulent of which any of the colonies could boast, and the latter were of the young and “rising” sort. A NEW HAMPSHIRE PLANTATION IN COLONIAL TIMES These two elements managed to make it extremely lively for the average colonist, who was scalped upon the one hand and “skinned”
  • 46. upon the other. At first the horny-handed son of toil fondly hoped to raise corn, but owing to the poverty of the soil it was a day’s journey from hill to hill, and as much as a man’s scalp was worth to undertake to travel it. At harvest time there was an immense crop of cobble stones and no market for it. Fortunately, in time the lawyers became starved out, but two great drawbacks to prosperity yet remained; sterility of soil and hostile Indians. But the time was at hand when both these evils were to be remedied. His name was Smith—John Smith, of course—who readily undertook the contract of not only exterminating the Indians, but of fertilizing the soil. To accomplish the first of these great ends, he disguised himself as a medicine man, and went boldly among the noble red men, inducting them into the mysteries of the manufacture and consumption of New England rum. He found them apt pupils, and it was not long before every Red of them, from the biggest sachem to the latest papoose, could not only distill his own fire-water, but drink it, too. There was soon a very noticeable thinning out in the ranks of the noble red men, and a good deal was said about the setting sun. The fire-water did its work thoroughly, and the colonists were at length masters of the situation so far as Indians were concerned. The next thing was to make the land productive. This was a more laborious and tedious undertaking than the first, but John Smith was equal to the emergency. He caused dirt to be carted from a neighboring State until the rocky surface of New Hampshire was completely covered with a rich sandy loam a foot or two deep. The people raised “some pumpkins” after that, we are informed. Thus was agriculture established on a solid basis, and New Hampshire made rapid progress. All honor to John Smith.
  • 47. CHAPTER IX. SOME UNRELIABLE STATEMENTS CONCERNING THE EARLY HISTORY OF NEW YORK—TRACES OF A GREAT UNDERTAKING— ADVANCE IN REAL ESTATE—“LOOK HERE UPON THIS PICTURE, AND ON THIS.” New York was discovered in 1609 by one Henry Hudson, an Englishman by birth, but to all intents and purposes a Dutchman, being then in the service of Holland. Immediately on his arrival he began the work of building a bridge across the East river, which, it is feared, he never was able to finish. Traces of this quaint structure are plainly to be seen to this day, and have been known, time out of mind, as the “New East River Bridge.” Manhattan Island, upon which New York now stands, was settled by the Dutch, who called it New Netherlands (afterwards New Amsterdam). They bought it of the Indians, paying for the entire island the fabulous sum of twenty-five dollars, and liquidated the purchase with fire-water; but that was before the panic, when there was more “confidence” in business circles than now, and there had been as yet no inflation talk. New York has changed hands since then, and we understand the property has enhanced in value somewhat. We doubt very much if the island could be bought to-day for double the price originally paid for it, even the way times are now.
  • 48. NEW YORK IN 1620 NEW YORK IN 1876 Any one comparing the two pictures accompanying this chapter will see how marvelously we have improved since the days of the Dutch. No. 1 is copied from an old print, dating back to 1620, and is warranted wholly reliable. It is undoubtedly the Sabbath day, for in the foreground is seen an influential citizen of the period, who has come down to the Battery to meditate and fish for eels. He is thinking “How many ages hence will this, his lofty scene, be acted over.” Presently he will catch an eel.
  • 49. Sketch No. 2 is of more recent origin, and was taken from our artist’s window. When this picture was first drawn the Brooklyn pier of the bridge was plainly discernible in the background. But since then our landlord, who is a German, and conducts a restaurant on Teutonic principles on the ground floor, has humanely run up a vent-pipe from his kitchen opposite our window, which necessarily excludes the picturesque ruin of the bridge from view. The reader will observe that nothing is now visible but a tall square sheet iron tube and an overpowering sense of garlic, which destroy at once our view and our appetite.
  • 50. CHAPTER X. A FLOOD OF HISTORICAL LIGHT IS LET IN UPON NEW JERSEY— ABORIGINES—THE FIRST BOARDING HOUSE—ORGAN-GRINDING AS A FINE ART. Not many generations ago New Jersey was a buzzing wilderness— howling would be a misnomer, as the tuneful mosquito had it all to himself. “His right there was none to dispute.” The tuneful mosquito was, in fact, your true New Jersey aboriginal, and we do not hesitate to assert that the wilderness buzzed. But the time came at last when the wilderness of New Jersey was to have something else to do.
  • 51. In the year (confound it! what year was it now?) a select company of colonists landed at Hoboken, led by one Philip Carteret. The latter carried with him a large supply of agricultural implements to remind the colonists that they must rely mainly upon the cultivation of cabbages, and devote their energies more or less to the manufacture of Apple Jack for their livelihood. But he soon saw his error, and immediately cabled over for a supply of mosquito nets to instill into their minds the axiom that “self-preservation is the first law of nature.” Mr. Carteret opened a boarding house in Hoboken, to be conducted on strictly temperance principles, and devoted his leisure to the civilizing of the aborigines; but his efforts in this direction were crowned with but partial success. It is an historical, but not the less melancholy fact, that the aboriginal inhabitants of any country become effete as civilization advances. And thus it happens that, although the mosquito has been handed down to us in modern times, we only behold him in a modified form. That he has not yet entirely lost his sting, the compiler of this work personally ascertained during a four years’ exile in Hoboken. For all that the Jersey mosquito of to-day is but an
  • 52. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookultra.com