Tutorial on the Design and Construction

of Local and Regional Exchange Facilities

 

 

Version 0.3

March, 2001

Bill Woodcock

Packet Clearing House

 

 

This tutorial addresses the questions and issues associated with the formation of local and regional Internet traffic exchange facilities. When and where are they needed?  What are their physical and infrastructural requirements?  What business model is most appropriate, and how can you finance the costs?  What services should an exchange point provide to its users, and what policies can be established to ward off trouble?

 

Determining Need

 

While it's easy to assume that enthusiasm and resources are all that are needed to get a new Internet exchange off the ground, it's imperative to first turn an objectively assess whether a need actually exists. An optimum distribution of peering points relative to the size and density of user population and telecommunications price/distance sensitivity obtains, and creating additional peering points beyond that optimum density increases market confusion, raises costs, and decreases value for everyone involved. Conversely, a too-sparse distribution of peering points also increases costs and decreases user-perceived performance and value.

 

First, it must be determined whether a sufficient end-user population exists within the locality of the proposed exchange point to support a local exchange of traffic. Since the primary function of exchange points is to shorten delivery paths between nearby sources and destinations, if an insufficient number of local parties are sending traffic to each other, rather than to remote destinations on the Internet, an exchange point won't be viable.

 

Furthermore, if there's a preexisting exchange point in the area, it's never economically beneficial to create a new unassociated one, rather than either fixing any problems that may exist with the current one, adding facilities to it, or annexing it to a new but fully interconnected facility. Political, philosophic, economic, or technological differences with the management of existing exchange facilities often seem like sufficient motivators for the creation of a new exchange, but in fact these are the very worst of reasons, and any new exchange created in this way is doomed to fracture the market from its inception.

 

Geographic Location

 

If you determine that a new exchange facility is warranted, site selection is of crucial importance in making the exchange a success. Data communications infrastructure exists in an odd state of compromise, partaking partly of the nineteenth-century world of rights-of-way and governmental authority, partly of the twentieth-century world of multinational corporate ventures, and partly of the twenty-first century world of virtuality and cyberspace. The competing demands of each of these collide when siting exchange facilities.

 

A community of users must exist, served by multiple Internet providers, economically separated from the nearest existing exchange by high telecommunications backhaul costs, and as stated before, communicating amongst themselves with sufficient frequency to make the overhead costs of local interconnection preferable to the scaled costs of backhaul.

 

A nexus of fiber, copper, or rights-of-way must exist within or proximal to the user community, and it must be open and accessible to those companies which wish to add to or improve upon those facilities.

 

Lastly, a physical space, a building, portion of a building, or directly adjoining cluster of such, must exist at that nexus, and be accessible to companies which wish to use the fiber, copper, or rights-of-way to make Internet services available to the local user population.

 

When all of these conditions exist, a frequent result is a “telco hotel” or a building which has been stripped of human amenities in order to render it more suitable for telecommunications termination and interconnection. Telco hotels and large governmental and institutional telecommunications consumers are by far the most frequent hosts to Internet exchanges.

 

Telecom hotels may advertise themselves and be easily found, or they may be concealed behind unobtrusive facades in unlikely-seeming areas. The surest way to find them is to find the intersection of telecommunications rights-of-way and then look at the tenant-lists of adjacent buildings. Rights-of-way documentation and “as-builts” (after-the-fact engineering drawings of installed facilities) are often available as public records through municipal planning departments, and some pathway maps may be available to customers or potential customers of telecom providers through the providers’ provisioning departments. Lastly, in areas where new fiber is being installed for the first time, opportunity may exist to artificially influence the creation of an appropriate interconnection facility by working with governmental bureaus of economic development and municipal planning to require new pathways to cross through one or preferably redundant spaces where appropriate real-estate is available.

 

Density

 

Although exchanges which exist in a single contiguous space within a single building are by far the most common, several alternatives and outgrowths of this model exist. A common development in exchanges which prove successful over time is the extension of the exchange facility to a cluster of adjacent or nearby buildings, each under different business management with differentiation in services and pricing, but all sharing a common switch fabric which allows all their customers to interconnect.

 

Less common, because they provide less economic leverage, are distributed exchanges which utilize a “MAN” or metropolitan area network, or a frame relay or ATM switch “cloud.”  Such models are dependent upon ubiquitous availability of telecommunications facilities at a low price, since they require that each participant have the ability to interconnect with all others from their own preexisting location. The first commercial exchange, the MAE or Metropolitan Area Ethernet, built in 1991 and 1992, interconnected four providers’ facilities in different parts of Washington D.C. with FOIRL, ten-megabit Ethernet over fiber. Likewise, the first exchange built by Packet Clearing House in 1993 and 1994 was based upon frame-relay, utilizing spare capacity within a dozen providers’ preexisting interconnections to the PTT’s frame-relay switch fabric to create a distributed exchange within the Northern California region.

 

So-called “layer 3 exchanges” also exist, in which each provider peers with a central route-server, and thus transitively with each other, but have no direct layer-2 connectivity to each other’s routers. Route servers are beneficial when used in conjunction with a layer-2 exchange, but have historically been subject to much abuse when attempts have been made to use them to the exclusion of layer-2 connectivity.

 

Hybrid infrastructures also exist, and can often provide useful flexibility. When MFS built a second MAE facility in San Jose, it was joined to the Packet Clearing House frame-relay exchange point with an Ethernet interconnect which allowed MAE participants to peer with PCH participants and vice-versa, and allowed participants the liquidity to choose or move between the two business and pricing structures without forfeiting their peering connections. A similar conjoining exists between the PCH frame-relay exchange in San Diego California and the San Diego Network Access Point, or SDNAP, an Ethernet and FDDI exchange at the San Diego Supercomputer Center. A different combination, the CIX, or Commercial Internet eXchange, a layer-3 exchange, and the PAIX, or Palo Alto Internet eXchange, each became more successful after collocating and interconnecting with each other.

 

In general, though, the all-participants-in-one-room model is most common because it’s simplest and usually provides the greatest value for its cost.

 

Building Management

 

In the case of a physically centralized exchange, the ownership and management of the building or buildings in which it’s housed can have a substantial effect upon the success or failure of the exchange. Obviously benevolent and well-informed management is of great benefit. Exchanges have been hampered or forced to move or close due to antagonistic relationships with building management which was not inclined to make the considerable allowances necessary for telecommunications, power, and cooling facilities penetration into a building, or which didn’t understand the business model and needs of an exchange sufficiently to protect it from inadvertent encroachment. Exchanges have also been ruined by too much attention from building management which perceived them as a lucrative revenue source.

 

Telco hotels are often owned by real-estate investors, and managed for maximum revenue extraction. The prices borne by users of densely-populated telco hotels are extraordinarily high by comparison with those which retail or office use of the same building would produce, often by a multiple of eighty or more. The cost of maintaining and upgrading power, cooling, and riser facilities, however, is not insignificant either. Professionally managed telco hotels and colocation facilities can be among the most convenient spaces to use, if the cost is justified by a plentiful exchange of traffic.

 

Universities and public research institutes, as large noncommercial and usually nonpartisan consumers of telecommunications services, also often host exchange facilities. Typically a space set aside within a university’s own datacenter or telecom entrance facility, these are often moderately well furnished with cooling, power, and fiber providers, yet relatively inexpensive since unlike a real-estate investor, a university can derive benefit directly from the hosting of an exchange, in that it can participate in the exchange as a peer, with a zero-mile backhaul cost.

 

Some municipal governments are cognizant of the same benefit and have subsidized the formation of exchange facilities as a means both of enhancing their own connectivity internally and to their citizenship, and of spurring the growth of Internet, high-tech, and communications business and consequently tax-base within their borders. Such facilities are often sited within a municipality’s emergency-services datacenter, that being the closest thing cities typically have to appropriate facilities. Boston and Kyoto host notable and successful examples of this type of Internet exchange. Government-owned exchanges are typically both helped and hindered by their association, in that bureaucracy surrounding rights-of-way and antenna-siting are often waived or made exception to, but other policy dictates may intercede in the operation of free market forces within the exchange.

 

Facilities

 

Centrally constituted exchanges typically have four major infrastructural requirements: pathways, power, cooling, and security. Each may have some or no measure of redundancy, and each may be plentiful or constrained. Without all four in approximate balance, an exchange is unlikely to be able to provide value to its users.

 

The word “pathways” refers to the space required to run fiber and copper from outside building penetrations through the building to patch-bays and equipment which requires connectivity. In multi-story buildings, this consists of horizontal conduit, typically run against the ceiling of each level, and risers, or vertically aligned penetrations through each floor, through which cable can be run up and down between levels. Capacity, redundancy, reuse, and firestopping are the major concerns in maintaining pathways.

 

Making pathways sufficiently large in the first place is surprisingly difficult, both because of structural and firestopping requirements in the building’s engineering, and because building-owners nearly universally underestimate the portion of their building which should be dedicated to pathways, which are typically considered overhead rather than directly revenue-producing.

 

Two risers are often provided at opposite sides of the building, isolated to the greatest degree possible both in terms of likelihood of simultaneous failure in the event of structural collapse of the building, and in terms of the likelihood of fire spreading through both simultaneously.

 

Reuse is a constant concern in successful facilities, where conduit and riser space are always at a premium. The most effective method of reusing pathways tends to be high-density in-building cable-plant owned and maintained by the building management, and terminating on patch bays as near to the entrance facilities and to the end-users as possible. Thus cable need not be removed or re-pulled through conduit and risers, for the most part. Failing that, dedicated cables, which typically cannot be reused, need to be marked at least at both ends, and preferably periodically along their length, and tracked in a database such that they’re associated with the parties at each end. If either of the parties leaves the facility or requests a disconnect, the entire length of the cable must be removed from the pathway, thereby allowing the reuse of that portion of the cross-sectional area of the pathway. It’s also generally felt that some recurring housekeeping fee should be assessed for each cable in the building pathways, to provide users with an incentive to request disconnects when cables are no longer truly in use.

 

Firestopping is the science of preventing fire from spreading through a structure. This is typically done by using materials like concrete, which tend to maintain their structural integrity during a fire and prevent the passage of flame, and by limiting the number, size, and alignment of penetrations through elements of the structure. This need is in direct opposition to the need for easily reused cable pathways through the building. The compromises which are typically arrived at are the use of huge barn-like single-room structures, the partitioning-off of risers such that flame which travels within them does not have direct access to each level which they pass through, and most commonly the resealing of penetrations using reenterable fire-retardant wadding, putty, or sealant. Two related areas are fire suppression and flood control. Many types of fire-suppression systems are available. Those which douse critical electrically-powered equipment with water are frowned upon. Since exchange facilities are generally unpopulated, chemical fire-suppression, while more expensive, is preferred. If a water system must be used, a “dry standpipe” system, in which the pipes are filled with pressurized gas rather than water under non-emergency conditions, is preferred, since it cannot leak water onto equipment below. In many facilities, water-based fire-suppression systems are illegally capped-off subsequent to construction inspections, since it’s usually economically preferable to allow equipment to operate until it’s destroyed by fire, rather than destroy it earlier with water. Whether water comes from a fire-suppression system or from without, it’s important that it be given a safe route out of the facility which does not put further equipment in its path and thus in danger. Flooding is one of many kinds of natural disaster which may affect the choice of overall site, as well.

 

Power and cooling are also critical to the success of an exchange. Computers and telecommunications equipment have become the single largest consumer of electrical power in many developed countries, and a good part of that demand is concentrated in exchange and colocation buildings. Facilities which were built a few years ago to provide fifteen amps per rack cannot be filled, because they ran out of power long before they ran out of rack space. Newer ones, with two twenty-amp circuits per rack are starting to see the same problems as power-hungry PCs and RAID arrays are reduced to 1U in size and are being installed forty to a rack. Power must also be made reliable through battery strings and backup generators or cogeneration. High-end facilities tend to have battery strings which can power the entire facility for perhaps fifteen to twenty minutes, a pair of redundant backup generators, each capable of powering the entire facility, and two or more independent utility power-grid connections. Ideally these constitute two entirely separate systems, such that users of the space can request “A” and “B” circuits into their rack, and be assured that there aren’t significant common points of failure between the two. More power-hungry facilities operate cogeneration plants, producing power continuously. This has the benefits of independence from the vagaries of grid power, lower per-watt/hour cost, and importantly, a heat or steam source which can be converted to cooling.

 

The cooling of thousands of machines is a not insubstantial engineering problem in itself, particularly when the machines are air-cooled and there’s no uniformity to the direction of airflow through them. Some calculations show that the airflow through a closed rack of 1U servers now must be maintained at nearly 60 miles per hour. Network interconnection equipment isn’t quite as hungry or hot, but it’s headed in that direction, and more of the equipment at exchange points belongs to “content peers” with servers rather than routers, as time goes on. Again, a side-benefit of cogeneration is that the exhaust from the turbines can be used to drive thermal-transfer chillers. While in a backup-generation situation the generators must be sized at approximately 1.75 times the electrical load of the communications equipment, in order to accommodate the air-conditioning for the equipment, cogen needs to be only one times the electrical load, since the air-conditioning is a byproduct of its normal operation. Siting an exchange facility within a building which already provides some or all of these amenities is a huge work-saver.

 

Security is probably the area in which the widest variation is tolerated. At a minimum, a locked closet in a building which has the outside doors locked at night, and one set of keys issued to each participant, or keys kept by a tenant or manager of the building, may be sufficient to keep a small exchange point out of trouble. At the opposite extreme, there are facilities with multiple biometric authentication devices and continuous escorts within the facility. Many exchanges compromise with a card-key system that logs who’s entered the facility when, and perhaps restricts access to individual locked cages or enclosed racks. The question of whether to allow 24-hour access to all participants is often a defining one for small exchanges, since it’s a requirement for many larger potential participants.

 

Services

 

The primary service of any exchange is to facilitate the interconnection of the participants. This is generally done primarily through a common switch-fabric, supplemented by individual cable crossconnections between specific pairs of high-traffic peers.

 

There have been experiments with a good many types of peering networks, starting with shared ten-megabit Ethernet, all the peers in a common collision domain, which quickly gave way to switches, first 10Base-T, then FDDI, then 100Base-T, and now Gigabit Ethernet. Soon large exchanges will be using 10GigE. Historically, there have also been attempts to use ATM as a switch-fabric medium within centralized exchanges. The management benefits have been touted, but ATM has proven too fragile, too inflexible, and too expensive for mainstream exchanges. It’s also generally limited to 155 megabits or 622 megabits at the very fastest router interfaces, and there’s little pressure on equipment vendors to do future development on ATM, so it will probably fade away more quickly than FDDI did.

 

Private crossconnections between peers are typically performed on 100BaseT copper, or GigE fiber. As mentioned in the discussion of pathways, well-run larger facilities, these crossconnects are labeled at both ends and tracked in a cable-management database, so that they can be removed as soon as they’re no longer in use.

 

The labor of installing crossconnections, as well as physical tasks within the facility, are often accomplished with “remote hands” service. That is, an on-site technician in the employ of the exchange, who is available to perform tasks within the facility on behalf of its participants. Most small facilities do not have formalized remote-hands services, usually relying upon members who are nearby or work in the same building, whereas most larger ones have technicians available for this purpose around the clock.

 

Most exchanges have a route-server or looking-glass, that is, a BGP-speaking device which peers with all of the participants and collects route advertisements from them, either for the purpose of reflecting those routes to the other peers (a route-server) or for debugging, diagnostic, and research purposes (a looking-glass).

 

Some exchanges provide a variety of ancillary services beyond these staples. Most common are the maintenance of a GPS-synchronized or atomic clock to act as a stratum-1 NTP time server and a web-cache which participants can query for web pages before trying their upstream providers.

 

Business Structure

 

The legal form in which an exchange is embodied can have a great effect, positive or negative, upon the exchange’s long-term health and success. One of the first choices to be made is whether to form a corporate entity to own and operate the exchange, or leave it an unincorporated entity. In most countries, incorporation resolves a lot of issues regarding ownership of the physical property of the exchange, any contracts which it needs to enter into, individual volunteers’ liability, and the ability to employ staff. On the other hand, incorporation generally commits the organization to significant ongoing overhead costs in both money and bureaucratic procedure.

 

If the exchange is incorporated, this raises the issue of ownership, which is key to setting and maintaining participant, community, and regulatory confidence in the durability and neutrality of the exchange. In short, exchanges are most successful when all parties are ensured that control of the exchange will not fall primarily into the hands of any one interested party, or into the hands of a cartel. This tends to argue in favor of one of three ownership models: cooperative, external, or self-ownership.

 

In a cooperative, each participant in the exchange is issued a share and a vote, both nontransferable and revocable upon their withdrawal from the exchange. The more successful the exchange, the more broadly ownership will be spread, and so the less likely the exchange is to fall under the control of any one party. On the other hand, if a cooperative fails to delegate decision-making tasks from the full voting body to staff, it can become a quagmire, preventing the exchange from reacting with necessary alacrity to external changes of market, technology, or demand, and ultimately stunting the exchange’s growth.

 

Under external ownership, exchange facilities are owned and operated by a third party which is neither a participant in the exchange, nor a competitor, nor otherwise supplier to any of the participants, nor likely to be acquired by such. For example, universities, governments, and real-estate investment banks are all common exchange-point operators. The primary advantage of external ownership is that it relieves the membership of organizational governance responsibilities and may provide some initial external investment. The disadvantage is that it may tie the future fate of the exchange to a third-party’s profit motive, thereby putting the exchange at risk of coming under the control of an interested party, or of excessive capital extraction.

 

Self-ownership means incorporation as a non-profit entity. With very few exceptions, non-profits are corporations which own themselves, rather than being owned by shareholders. Non-profits generally receive legal protection against acquisition by anything but other non-profits with similar charters. This fully relieves the risk of concentration of ownership, but requires that the membership form a governance structure similar to that of a cooperative, so that individual members don’t have undue sway in the selection of staff and the setting of policy.

 

The final option, an exchange which is owned by one or a small cartel of its participants, or which allows the transfer of ownership shares so that such a concentration of ownership could occur, is to be avoided at all costs. The specific problem is that in an exchange of, for instance, ten participants, in which each participant must make an investment of time and resources to participate and build the exchange, even if all begin as equals each participant has only a one-in-ten chance of becoming the final sole owner of the exchange. Thus all potential participants are disincented from making the necessary initial investment, because the most likely outcome of doing so is that their investment will be converted to the benefit of one of their competitor/co-participants. Simultaneously, while the potential advantage gained by the one participant who manages to accrue a controlling interest is greater than the investment they’ve put into it, it may not be ten times that amount, so participants aren’t even greatly incented to participate on the chance of becoming the eventual owner of the exchange. In either case, fungible ownership of an exchange creates an atmosphere of low confidence, in which participants and potential participants are generally unwilling to make the investments necessary to the eventual success of the exchange.

 

A common course of development in regional and local exchanges is for a group of potential participants to self-organize and determine a need. Next, prior to forming a legal entity, they informally divide the necessary work and expense, and create the exchange in its initial form. This is typically done with a minimum of investment, so it rarely has a lot of amenities or redundancy or features above the bare necessity of a mutually-accessible layer-2 switch fabric. It’s typically left to operate in this mode until upgrades are necessitated by increased demand for features or throughput or port capacity, whereupon it’s incorporated as a non-profit or a jointly-owned cooperative or a combination of the two, to provide participants with the reassurance they need prior to making a second and usually more substantial round of investment. Thus the initial unincorporated phase serves as a low-cost “proof of concept” and the increased overhead of governance of an association is delayed until the value of the exchange has justified it.

 

At some point during the growth of the exchange, it should become obvious whether staffing is necessary. If the exchange is externally-owned, the parent may have administrative resources which can accomplish tasks like billing and purchasing, and technical work may be more easily performed by the members. Many cooperative and non-profit exchanges outsource administrative “front office” work, and operate without any dedicated staff. Larger ones, however, will generally need to employ both administrative and technical staff.

 

Lastly, the cost of participation in the exchange must be determined. If the form of the exchange is either a non-profit or a cooperative, the price of membership and participation is most likely to be determined as a function of cost-recovery plus some margin of safety. This can be calculated either predictively, or after-the-fact based upon actual costs once an operating buffer has been established. If an exchange is unincorporated, its costs are usually informally covered by whichever participant seems most motivated to do so at the time they’re incurred. If the exchange is operated by a third-party, it may charge on a cost-recovery model, if that third party has reason for benevolence, or it may attempt to set or follow market pricing.

 

Policies

 

The success of an exchange point is also greatly affected by the operational policies by which it governs members’ participation.

 

A number of technical policies for switch-fabric interconnection are widely agreed upon at this point. The first of these was “no pointing default.”  This means that participants agree to only send solicited traffic to their peers across the exchange. No participant may send data traffic to another participant if the destination address is not one they’ve explicitly learned via a peering session, directly or through a commonly-agreed-upon route-server, from that specific peer. This prevents participants from using static routes or route-maps to direct traffic to other participants who haven’t agreed to peer with them. It also prevents a specific method of theft of service whereby party A, which peers with party B at multiple locations, points static routes at party B’s routers, enabling the formation of tunnels through party B’s backbone between the exchange points. This attack has been historically common enough that peering point participants should protect themselves against it explicitly, however, rather than relying upon policy compliance by their peers.

 

A common prohibition against directed broadcasts requires that participants not propagate packets from the outside which are addressed to the exchange point switch fabric’s subnet broadcast address, thereby preventing many classes of denial-of-service attack from being propagated through the exchange.

 

A prohibition against proxy-arp and ICMP redirects across the exchange generally limit the damage which misbehaving routers can inflict upon other participants’ operation. Proxy-arp would allow a router to request that traffic which it hadn’t solicited via a BGP advertisement, while ICMP redirect would allow a router to redirect a route’s next-hop to a third party which hadn’t solicited it.

 

A common prohibition against the use of auto-detection of speed and duplex-settings on equipment interfaces facing the switch fabric is the result of lessons learned from the frequent failure of auto-detection to make correct choices. The speed of an interface should always be statically configured, and should always be full-duplex.

 

There are also occasionally prohibitions against the transmission of non-IP protocols like IPX, AppleTalk, and DECnet, against the use of IGPs like OSPF and IS-IS, or against the use of discovery protocols like CDP. While these don’t have specific problematic failure modes associated with them, limiting them is considered good-housekeeping by some.

 

A few other technical policies, primarily related to extensibility of the switch fabric, are subject to disagreement, and different exchange points have chosen to implement them in different ways. The central point of contention is whether participants or other exchanges should be able to extend an exchange point’s switch fabric by adding switches to it, outside of the administrative domain of the first exchange point itself. Exchange point operators commonly argue against doing so, either from a position of ignorance of the economic rules which govern their business and a misunderstanding of the nature of competition in the exchange point marketplace, or quite legitimately on the basis that it decreases the robustness and reliability of the switch fabric. Specifically, some exchange points ban, as a group, the use of more than one MAC address per switch port on the exchange, the transmission of spanning-tree packets, the connection of anything other than a router to a switch port, and the use of more than one switch fabric IP address per switch port. Following these rules makes for a very simple exchange, which is certainly unlikely to fall prey to layer-2 instability, but it also creates a crippling set of artificial barriers to entry, liquidity, and competition, decreasing general confidence and customer trust by jeopardizing free operation of the marketplace. Furthermore, it lowers the value available to customers within the exchange, by partitioning them from peering with participants who are within nearby facilities. This topic is too deep to fully engage within the scope of this tutorial, and will be the subject of a separate white-paper.

 

Another set of interrelated policies surround the issue of data collection, ownership, and dissemination. Many exchange points require each participant to peer with a common looking-glass device which contains information accessible only by the exchange point operator, or only by the exchange point’s participants. Most also have a non-mandatory looking-glass which is visible from the outside. Some require full routes, some require customer routes, some require both with communities set to differentiate them. Some exchange points make switch-port statistics available only to the user of a switch port, while some make them available to all participants. Some make aggregate information available to participants only, while many make aggregate information public. When exchange points suffer technical failures, some disclose that information fully, while others disclose it only to participants, with a requirement that it be kept in secrecy. The more open an exchange is with its intellectual property, the more transparent the market, and the greater the eventual value of the exchange will be, but it must weigh that against the possibility of discouraging naïve participants who believe that they can gain some benefit from secrecy.

 

Lastly, a critical decision which faced exchange points historically, whether to support bilateral peering only, have a multilateral peering agreement, or a required “mandatory multilateral peering agreement” has been largely worked out by this point. Non-compulsory multilateral peering agreements are a great convenience to members, and there’s no reason not to have one. Mandatory multilaterals attempt to compel user behavior to a degree that has not been supported in the marketplace, and new exchanges which have attempted to require them have failed in the face of open competition.

 


Acknowledgments & Attributions:

 

This paper draws upon documents provided by many different exchange facilities, primarily those which describe their user and business policies.

 

Author's Contact Information:

 

Bill Woodcock

Research Director

Packet Clearing House

404 Balboa Street

San Francisco, California

94118-3938  USA

+1 415 BGP PEER

woody@pch.net

 

Location of this Paper:

 

Authoritative updates to this paper may be downloaded at any time from

 

http://www.pch.net/documents/tutorials/ep-construction/