I think its important to remember all of the amateur radio restrictions on content are at the point when the traffic moves onto RF under amateur radio rules, e.g. in the US, you can operate Part 97 (Amateur) or Part 15 on many of our microwave bands.  Responsibility for filtering content should be delegated to the party responsible for gating to amateur radio RF.

If we try to control, consistently, at the border gateways, we may be filtering content that would be otherwise permitted. I think a lot of amateur networks living on the Internet loose a lot of utility because of the "one size fits all" or "one ring to rule them all" approach.  The operator of the border router can "throttle" or "filter" traffic depending on available bandwidth and local needs.

The network manager / coordinator has a responsibility to insure that the address space is not being misused and using authenticated access by subnets, via tunnels or other mechanisms, allows the network manager to revoke access to a subnet under his/her tier one router for abuse. 

If we really want to grow the network, with useful applications, we need to strike a balance between security and ease of setup / access.  Many applications will have users that are not familiar with the subtleties of the network and some of our LAN operators will not be strong administrators. Our greatest need for expertise is at the bridge/gateway to amateur radio RF and this may be the exact place that we find the least expertise, this is where the network manager needs to have a toolbox at his/her disposal to assist.  Intervening layers of infrastructure should be largely "plug and play" -- even to the point where the network manager says, if you want to connect to the border router, here is a configuration and credentials for "X" router, install this and you will have connectivity.  Then provide pointers to applications, tools, and configurations to handle the interconnection of RF.

When AMPRNET was created, we didn't have a lot of the tools we do now, nor inexpensive off the shelf systems for infrastructure. For example, today we could have an AX.25 daemon that listens to a TNC or other bridge to RF and at least in the US, lookup the callsign in the AX.25 header in a copy of the FCC license database and do a DHCP address assignment to the device on the other end of the AX.25 connection, add a dynamic DNS entry, and start routing traffic.   With all but the AX.25 daemon being "off the shelf", pre-configured, hardware. 

We have a habit of making things more complex than they need to be and promoting some "roll your own" solution that could easily be accomplished using off the shelf technology. Certainly, we should encourage and support experimentation and innovation, but that is only a segment of the user base a successful network can and should support.


John D. Hays
K7VE
PO Box 1223, Edmonds, WA 98020-1223 
  



On Tue, Mar 6, 2012 at 16:04, Tim Pozar <pozar@lns.com> wrote:
Great ideas.

May I suggest that the router facing the net (ie running BGP4) does not have to have all of these features on it.  In our deployment, the two OpenBSD (PF) boxes we are running are border only.  They only run BGP4 and have GigE ports trunked going to a switch that breaks things out and connects to access routers that are downstream that do all the "customer" facing "features".  This could be GRE, IPinIP, etc.  Access routers could be anything from KA9Q to Mikrotik to Soekris boxes running Linux, etc.

Normally you are going to make changes on the access routers and you want to keep the border routers as stable as possible so you keep changes to a minimum there.

Having this separation really has saved our bacon a number of times in the City of San Francisco Community Broadband Network we are running.

Tim

On Mar 6, 2012, at 3:53 PM, Elias Basse wrote:

> To expand further on a multi-homed system and with some solid network experience running a global company network via VSAT and other Global Mixed Links:
>
> 1) Regarding Routers - A FreeBSD Router running a package such as PFSENSE fits the bill http://www.pfsense.org and is well in the price range of any amateur operator (Free) except it needs to run on a very robust hardware platform.
>
> 2) Regarding the requirements for security - I agree that a form of security is needed to ensure that someone is not abusing the system.  A content filter such as Squid/SquidGuard or DansGuardian could be used to ensure that no nasty things come about across amateur radio bands or the 44 Net.
>
> 3) Regarding scalability and IP addressing issues, we should have the capabilities for a regional sub-router that has all tie ins to the MPLS via a tunnel, direct connection, or ip-ip tunnel.  This can easily doll out SECURE VPN (OpenVPN) tunnels to any node or sub-node that is connected to a public network with little to no overhead.  This also opens up another aspect of bridging the network together and that is MULTICAST voip using an open source low bandwidth codec as an alternative to the DSTAR AMBE Codec.
>
> 4) Regarding DNS, this can be performed rather easily as if you are utilizing a *nix based OS you can run a DNS Mirror of the entire network locally as this is a smaller portion of the internet as a whole.
>
> I am also going to add that caching can also be utilized by sub-nodes to serve out pages that have been served out before thus cutting bandwidth requirements by 40% or more, this also allows something else - A COMPLETELY OFFLINE COPY! so if the internet ever goes down, there is a copy of the pages in question on a regional node, that may have a chance to propagate the page to a user that needs it should we have global network backbone outages.
>
> In our network for Louisiana that is in the design phases now, we have incorporated all of these things, as well as given an ipip tunnel option for each regional router that can populate edge and border gateways behind it with BGP routes and information.  This is all incorporated using RF links and if not in range of an RF link, a tunnel to one of 9 regional routers.
>
> We have also carved portions of the address space to allow this as well.
>
> In order to obtain internet access, a user must authenticate their call sign so that all web traffic can be logged, in the event of an abuse of the system.
>
> The entire system is set to utilize HSMM (High Speed Multi Media) Mesh Radio Links in the 900MHz, 430MHz (Testing New Cards now), 5.8GHz, and 2.4GHz bands.
>
> I also have drawings, diagrams, and explanations of the entire network design if anyone is interested.
>
> Best Regards,
>
> Elias Basse
> KD5JFE
> Louisiana AMPRNET Coordinator
>
>
> On Mar 6, 2012, at 4:48 PM, K7VE - John wrote:
>
>> Tim,
>>
>> I wouldn't suggest we demand a certain make/model.  My intent is "reference" configurations.   Certainly a professional can come up with something that is competent and architecturally compatible.
>>
>> I also know that an "amateur" / volunteer built and managed infrastructure often needs recipes for those who are technically competent enough to learn how to perform routine maintenance, but may not know where to start.
>>
>> I've been involved in helping a whole bunch of D-STAR gateways come online and while someone familiar with systems and network administration can work their way through the "rough" spots, often when it comes to that little extra to track down a problem, there is just not the knowledge and/or experience to do so -- so they reach out to others.  If we have some reference implementations, and a new border router uses that recipe, then it is much more possible to advise on troubleshooting.
>>
>> If a widely deployed system is used, then there is a larger community that has discovered and documented special cases, which are often available on the net.
>>
>> John D. Hays
>> K7VEPO Box 1223, Edmonds, WA 98020-1223
>>
>>
>>
>>
>> On Tue, Mar 6, 2012 at 14:19, Tim Pozar <pozar@lns.com> wrote:
>> Great start on the details.
>>
>> BTW...  I wouldn't nail down the hardware to a specific make/model too much.   I run a 1+ Gig community network on a pair of OpenBSD routers (in failover via VRRP/HSRP/CARP).  I run trunks to it and break it out on common managed switches (ie cisco 2960G).  The boxes themselves are two Rackable servers with the hard drives replaced with SSDs.
>>
>> I think the requirements for the border router could include:
>>
>> Must:
>> * Can support at least one full route table.
>> * Supports 200% of expected bandwidth needs.
>>        Ie.  Up and Downstream feeds, PPS, etc.
>> * Be supported by conditioned and emergency power
>> * HVAC is also on emergency power
>> * Physically secure and accessible by the regional coordinator and "Amateur Radio Digital Communications" authorized representatives only.
>> * (More?)
>>
>> Should:
>> * router(s) are multi-homed
>> * routers have fail-over (hot-spare)
>>
>> Couldl:
>> * Enough memory to support large NAT tables (if needed)
>> * MPLS
>> * VLANs,
>> * (More?)
>>
>> You may have two routers speaking BGP and core and access routers downstream of this.  It may all be L3 or it could be L2.  Up to the needs of the installation (ie downstream links) and the needs of the community.
>>
>> Tim
>> _________________________________________
>> 44Net mailing list
>> 44Net@hamradio.ucsd.edu
>> http://hamradio.ucsd.edu/mailman/listinfo/44net
>
> _________________________________________
> 44Net mailing list
> 44Net@hamradio.ucsd.edu
> http://hamradio.ucsd.edu/mailman/listinfo/44net


_________________________________________
44Net mailing list
44Net@hamradio.ucsd.edu
http://hamradio.ucsd.edu/mailman/listinfo/44net