Data we collect Exchange participation Netflow destination matrixes

Slides:



Advertisements
Similar presentations
Microsoft Services Provider License Agreement Program
Advertisements

State Origin based on Shipment Information This information is based on shipments that were reported as being shipped from Tennessee.
STUN Date: Speaker: Hui-Hsiung Chung 1.
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services Steve Cotter Director,
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
1 Reminding - ARP Two machines on a given network can communicate only if they know each other’s physical network address ARP (Address Resolution Protocol)
Routing Protocols Heng Sovannarith
Communication Part II Message-Oriented Communication Chapter 4.
TOWARDS A CONTENT-BASED MATERIALS SCIENCE DISCOVERY NETWORK | 1 Emily C. LeBlanc.
State Origin based on Shipment Information This information is based on shipments that were reported as being shipped from South Carolina.
Network Abuse Handling in CNNIC and JPNIC Terence Zhang, CNNIC Izumi Okutani, JPNIC.
1 Computer Communication & Networks Lecture 20 Network Layer: IP and Address Mapping (contd.) Waleed.
Netwrok and the internet Part two Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
It is one of the techniques to create a stand by server. Introduced in SQL 2000,enhanced in It is a High Availability as well as Disaster recovery.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
1.Registration block send request of registration to super peer via PRP. Process re-registration will be done at specific period to info availability of.
Introduction to Mobile IPv6
Internet Control Message Protocol (ICMP) Chapter 7.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
State Origin based on Shipment Information This information is based on shipments that were reported as being shipped from Alabama.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
BalanceFlow: Controller load balancing for OpenFlow networks Hu, Yannan ; Wang, Wendong ; Gong, Xiangyang ; Que, Xirong ; Cheng, Shiduan Cloud Computing.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Peer Policy Policing with NETFLOW NANOG 25 June 9, 2002.
Ethernet switch Hosts Can talk using Ethernet addresses only.
4.6 Multicast at the Network Layer Introduction: The Internet multicast abstraction and multicast groups The IGMP Protocol Multicast.
IX Data Collection- The Big Question? by Andrew Owens - NAPAfrica Protect. Connect. Grow.
INTERNET CONTROL MESSAGE PROTCOL. ICMP n allows router to send error or control messages to another router or host n provides communication between IP.
Package & Mail Forwarding USA Mail Forwarding USA With our mail forwarding feature, your mails or packages sent to your USA2ME address.
VO Box discussion ATLAS NIKHEF January, 2006 Miguel Branco -
SysAid for OneHR.
Visit for more Learning Resources
Free Survey Development and Publishing Platform for Researchers
Distributed Network Traffic Feature Extraction for a Real-time IDS
Chapter 7: Introduction to Data Communications and Networking
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Internet Control Message Protocol
Default cover design. Current Routing Solutions supporting the Interconnection of Carrier IP –based Multimedia Services in North America IPNNI
Session Initiation Protocol (SIP)
Introduction to Networking
TYPES OF SERVER. TYPES OF SERVER What is a server.
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Introduction to client/server architecture
Network Monitoring System
Net 323: NETWORK Protocols
Net 323 D: Networks Protocols
Aled Edwards, Anna Fischer, Antonio Lain HP Labs
How do we decide where to deploy to next?
Net 431: ADVANCED COMPUTER NETWORKS
Subject Name: Computer Communication Networks Subject Code: 10EC71
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Panel on Network Data and Monitoring - The Abilene Network
Austrian Academic Computer Network
International Trade Chapter 10
Message Queuing.
PRIMUS BRAZIL VoIP Timeline
Module 12 Network Configuration
COMPUTER NETWORKS PRESENTATION
MICROSOFT NETWORK VIRTUALIZATION
The Force Within Management Data Warehouse
Presentation transcript:

Data we collect Exchange participation Netflow destination matrixes in-addr Reachability Netflow destination matrixes Responsible parties Contact information Routing table snapshots DNS integrity

Limitations on what we can publish Basically unlimited, but… Size Need either queries or physical shipment of disks Trade Secrecy Unaggregated Netflow exports Privacy Bulk responsible-party contact information Cost of publishing Staffing to deal with requests from the academic community

What we’d like to be collecting RTP quality data Currently discarded rather than sent with SIP tear-down Broader peering agreement visibility Large providers aren’t interested in letting this data out Netflow exports from more providers Internal bottleneck on labor Anycast/topology/geography correlation

How researchers work with us Introductions or anonymization Giving researchers access to the network and people who run it Anycast-platform hosted experiments Cron-jobs send data back to experimenter’s collector Anycast-platform hosted machines Ship Sun B100s blades to each location Data exports from existing datasets Queries or copies of datasets