Community oriented measurement infrastructure: how do we get there? Gianluca Iannaccone Intel Cambridge MOME Panel (at TNC 2005) Poznan, June.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

The Top 10 Reasons Why Federated Can’t Succeed And Why it Will Anyway.
NDN in Local Area Networks Junxiao Shi The University of Arizona
HEP Data Sharing … … and Web Storage services Alberto Pace Information Technology Division.
Non-Coding Activities a Development Team Needs a.k.a ”I don’t code, am I no longer useful?” Maaret Pyhäjärvi| | Twitter: maaretp Test Granlund.
Bitrix Intranet Portal Choosing an Intranet. Intranet Collaboration Communications Corporate Culture The benefits of an intranet can be divided into three.
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 The Shark Distributed Monitoring System: Distributing Wireshark Deep Packet Analysis to LAN/WAN.
Privacy and Security Implications of Cloud Computing 17 November IGF Laurent Bernat - OECD.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
NetMotion Wireless Get Connected. Stay Connected..
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
A mateur R adio E mergency S ervices & D isaster S ervices T echnology.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
William H. Bowers – Planning a UI Design and Development Effort Torres 8.
Risk Modeling with Condor at The Hartford Condor Week March 15, 2005 Bob Nordlund The Hartford
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Introduction to Cloud Computing
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
NA in the digital age Early attempts Bulletin boards/modems/user groups AOL ( , boards, chat) alt. groups (alt.recovery.na, etc.) NArchive (first.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Who am I? Mats Ohlin Swedish Defence Materiel Administration (FMV) IT Security area –International Standardisation: ISO/IEC JTC 1/SC 27/WG 3 (Security.
Gregynog 2012 Shared Library Systems..progress in Wales Mark Hughes Head of Collections Swansea
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Informatics 43 – May 21, A quote from Piazza “This course is trying to teach you how to be a PM (product manager).”
MHealth Summit Debrief “Technology always brings new challenges before it brings stability.” – Conference Participant.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
CSCI 240: Computers in Society Week 12: Computer Technologies in the Workplace.
Using the Intranet for Knowledge Management ISM 6021 By: Diana DeFazio - Carro.
A User-Lever Concurrency Manager Hongsheng Lu & Kai Xiao.
Parallel and Distributed Simulation Introduction and Motivation.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Parallel and Distributed Simulation Introduction and Motivation.
Jointly presented by Susan Carol and Cameron Krueger Presentation for the World Leasing Convention May, 2001.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
ESTABLISHING A MANUFACTURING ENTERPRISE Can you create and run a manufacturing enterprise?
Creating Ministry Ownership of the Software Development Process Jeffrey Wood Information Systems Director Compassion International ICCM June 1997.
GCRC Meeting 2004 BIRN Coordinating Center Software Development Vicky Rowley.
Security in Cloud Computing Zac Douglass Chris Kahn.
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Using Mica Motes for Platform Management A Telecommunications Application.
© 2006 Accenture All Rights Reserved. Our Consortium’s Approach to a Nationwide Health Information Network Architecture Brian J. Kelly, MD This presentation.
1 Thrust 5: Secure Wireless Networking Technologies For future generation wireless packet networks, two most important aspects need to be addressed: QoS.
Connect. Communicate. Collaborate GN2 Activities and the LOBSTER Project Nicolas Simar, DANTE TNC 2005, Poznan, June 2005.
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
Mrs. Forrest Understanding Computers hardware, software, operating systems, home networking Introduction to Programming programming concepts, writing and.
E-Supply chains, Collaborative Commerce and Corporate Portals Chapter 7.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Moving to BYOD Gary Audin 1.
OptiView™ XG Network Analysis Tablet
Architecture & System Performance
Architecture & System Performance
Sharing Anxiety: Do Legal Obligations and Open Standards Help?
Introduction to Computers
Software Defined Networking (SDN)
File Transfer Issues with TCP Acceleration with FileCatalyst
Microsoft Azure Removes Security and Backend Infrastructure Concerns for Social Network Firm “We were skeptical about moving to Azure in our early stages.
Response to c Questions
UNIT 5 EMBEDDED SYSTEM DEVELOPMENT
UNIT 5 EMBEDDED SYSTEM DEVELOPMENT
Beyond FTP & hard drives: Accelerating LAN file transfers
Electronics Business challenge
Presentation transcript:

Community oriented measurement infrastructure: how do we get there? Gianluca Iannaccone Intel Cambridge MOME Panel (at TNC 2005) Poznan, June 7, 2005

First, know the trade-off!  value vs. anxieties  network operators –every day activities driven by “process”. –anxiety for anything “disruptive” (outside the process) –however, they are in need of value-added services.  network equipment manufacturers –want demonstrated value in the infrastructure. –but, cannot “miss the train”!  network users –privacy is a concern but not always. –corporate networks have a lot of freedom in this area.

Finding Value  support for arbitrary traffic queries –perform any computation on traffic streams –coordinate responses from multiple monitors –applications to security, TE, planning, accounting,...  work in multiple, diverse environments –high speed links, wireless links, NetFlow feeds, etc. –require no changes to queries  infrastructure for fast prototyping –minimal effort for new users to access the infrastructure and prototype new methods

Finding Valium  anonymization is the wrong solution –never enough for data owners –always too much for data users  data ownership is what really matters!  move queries to the data –operator sees the query coming and allows it –no packet ever leaves the monitoring system –source code for queries is available to data owner.  challenge: how to automate all this!

Next Steps (my sales pitch!)  The CoMo Intel Research –open platform for network monitoring –early stages of development (v0.3 release) –open source software, BSD license –como.sourceforge.net for more details