April 25, 2000John Kristoff1 DePaul University Internet Traffic Report John Kristoff

Slides:



Advertisements
Similar presentations
Internet Protocols and Innovation John C Klensin John C Klensin and Associates
Advertisements

P2P Market Conference March 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
Test test Please press the F5 key to begin. (Then, press the Page Up or Page Down keys to move through the following 3 slides.)
Web Page Design Chapter 1 Introducing Networks and the Internet.
Muny Choeun. Welcome to the clouds Clusty.com will take you to Yippy.com, Yippy is a good and helpful site that helps you multi-task while browsing, if.
Cost-Savings Exercise AFIX Technical Workshop Session 2.
Managing P2P Applications or Where Did My Internet Bandwidth Go? David L. Merrifield University of Arkansas June 19, 2003.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Skills: none Concepts: Link characteristics -- technology, length, speed, latency, jitter and packet loss rate, units of measure for amount of data and.
Company Founding Customer Wins Series B Investment Scaling The Business $$$ Silver Tail Systems - Key Milestones.
Security Forum 2001John Kristoff - DePaul University1 Network Firewalls John Kristoff DePaul University Chicago, IL
Spring 2000John Kristoff1 IP Multicast Computer Networks.
P2P Network is good or bad? Sang-Hyun Park. P2P Network is good or bad? - Definition of P2P - History of P2P - Economic Impact - Benefits of P2P - Legal.
TDC375 Winter 2002John Kristoff - DePaul University1 Network Protocols IP Multicast.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
University of Minnesota The paradoxes of broadband Andrew Odlyzko Digital Technology Center University of Minnesota
Directors Meeting John Kristoff - DePaul University 1 Internet Traffic Report 2002 John Kristoff DePaul University Chicago,
Network Monitoring: A Practical Approach Philip Smith/IT Services University of Windsor March 21, 2003.
April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff
DePaul University Networks and Telecom John Kristoff John Kristoff John Ourada John Ourada Joseph Salwach Joseph Salwach.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Optical Ring Networks Research over MAC protocols for optical ring networks with packet switching. MAC protocols divide the ring bandwidth according to.
Liberalisation and regulation in the telecommunication sector: Theory and empirical evidence Week 5 Universal Service Obligation.
April 28, 2000John Kristoff1 DePaul University Virtual Private Networks.
University of Minnesota Content versus connectivity and the persistent mirage of real-time streaming multimedia Andrew Odlyzko Digital Technology Center.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Using Bayesian Networks for Detecting Network Anomalies Lane Thames ECE 8833 Intelligent Systems.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
It is a device that is able to work on its own without the help of another device or the help of the internet. An example of a standalone device would.
Eurostat Unit B3 – Statistical Information Technologies Data transmission tools and services 15/05/ eDAMIS The standard solution for transmitting.
P2P For More Showcase Presentation Jessie Gardiner John Lasa Travis Sheppard April 29, 2010.
Is It Prime Time For Agents In Business? Navi Radjou Vice President Forrester Research.
Systems Analysis and Design for the Small Enterprise Chapter 13 Networking.
Comparing Hybrid Peer-Peer Systems Beverly Yang Hector Garcia-Molina Stanford University Presented by Kalyan Boggavarapu.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
Time and Coordination March 13, Time and Coordination What is time? :-)  Issue: How do you coordinate distributed computers if there is no global.
ASCR/ESnet Network Requirements an Internet2 Perspective 2009 ASCR/ESnet Network Requirements Workshop April 15/16, 2009 Richard Carlson -- Internet2.
BG Trends and Analysis Smartphones and Application Trends and Opportunities Gabe Ingalls.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
89% use Smartphone throughout the day 81% browsed the internet within the week 77% used search engine within past week 9 out of 10 searchers have taken.
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
Supporting a Wireless Network By Gareth Ayres.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
Is the Internet Ready for Multimedia? Ahmed Helmy University of Southern California.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Lecture I : Internet Security Landscape Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University Fall 2005.
Traffic Instrumentation and Management CSG, January 2002.
Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:
NetVizura A network traffic analysis tool. Agenda Why NetVizura is needed How NetVizura works Where NetVizura is deployed Use cases.
Internet Measurement and Analysis Vinay Ribeiro Shriram Sarvotham Rolf Riedi Richard Baraniuk Rice University.
P2P is good news “will force us to look for new solutions architectures in resource manegment”
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER CONCEPTS Unit A: Computer and Internet Basics 1.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
August 2001Copyright UserLand Software 2001 Next Generation Internet Software How Broadband will be used John Robb, President and COO UserLand Software.
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Phase 4: Plan your infrastructure for scale
Comparison of LAN, MAN, WAN
AKAMAI INTELLIGENT PLATFORM™
Tussles for Edge Network Caching
Backbone and Campus Security Threats/Trends
New tools for a modern statistical communication
Beyond FTP & hard drives: Accelerating LAN file transfers

Presentation transcript:

April 25, 2000John Kristoff1 DePaul University Internet Traffic Report John Kristoff

April 25, 2000John Kristoff2 Key Concept There is no predictable Mother’s Day Effect on the Internet. Killer apps, denial of service attacks and other large utilization increases can and will occur without warning.

April 25, 2000John Kristoff3 What We Know zInternet bandwidth is 9 Mb/s yMost users have 10 Mb/s to the desktop zDaily, weekly, monthly utilization statistics yDaily weekday utilization ~100% continuously zResNet students largest consumer by far zNapster application ~20% of bandwidth zWe’re surviving

April 25, 2000John Kristoff4 Internet Bandwidth zEven with only a marginal increase in bandwidth, Internet performance has gotten much better. Why?

April 25, 2000John Kristoff5 Our Statistics

April 25, 2000John Kristoff6 Bandwidth Management zInternet bandwidth is our last mile zDifficult to provide fairness zResNet ymany shared LANs ymany users suffer! zThrow bandwidth at the problem? zNo silver bullet today

April 25, 2000John Kristoff7 Napster ResNet’s Killer App zMusic file sharing (MP3’s) zLegal issues zHow have other Universities responded? yBlocking yPolicies yTraffic limits

April 25, 2000John Kristoff8 Networks Group Internet Bandwidth Strategy zPolicy first zTraffic limits yvery unfair ynot perfect zA fairness architecture yControl at the edge (all the way to the user) yDifficult, but best strategy long term

April 25, 2000John Kristoff9 What Else? zTraffic identification tools yNot automated yprivacy issues zHow much bandwidth do we need/want? zHow do we get more cheaply? yIllinois Century Network yPeering zHow do we use it effectively?

April 25, 2000John Kristoff10 Peering