UoM Data Billing Environment Legacy and Refresh Systems Cameron Shepherdley Information Technology Services.

Slides:



Advertisements
Similar presentations
CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
Advertisements

Vice President of Facilities
The Most Analytical and Comprehensive Defense Network in a Box.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Enterprise Total Computing TECHNOLOGY SERVICES Sprint Proprietary Information 18/10/99 Slide 1 Sprint’s Early Interest in TINA-C.
Proxy Servers Dr. Ronald Bergmann, CIO, ISO. Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local.
Internet Traffic Analysis for Threat Detection Joshua Thomas, CISSP Thomas Conley, CISSP Ohio University Communication Network Services Joshua Thomas,
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Barracuda Networks Steve Scheidegger Commercial Account Manager
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Networking Components
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Effectively Explaining the Cloud to Your Colleagues.
Virtual Company Group 8 Presentation Date: June /04/2017
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
5 February 2003 Reality and Future Softswitch - Reality and Future Nikolay Ilyin Chief Technical Officer RealEast Networks ITEXPO.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Ewan MacKellar Steve Moore. Get to know what is normal! - Build a repository of network captures and Snooper logs showing what takes place in.
Client-Server & Peer-to-Peer Networks
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Assignment 3: Networking Components LTEC 4550 Jose L Ortiz Jr.
EmNet: Satisfying The Individual User Through Empathic Home Networks J. Scott Miller, John R. Lange & Peter A. Dinda Department of Electrical Engineering.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Interface to the network and Devices Chapter.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Components of wireless LAN & Its connection to the Internet
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Internet Charging at CSU. The Addiction Hello, My name is Tim Brown, from CSU. – Audience Participation “Hello Tim” I am an “Internet Traffic Charging.
CRICOS No J a university for the world real R Queensland University of Technology CRICOS No J Case Study of Internet Access at QUT Rod Swile.
Information Services Internet Accounting Workshop 1 st Feb 2011 Peter Kurtz Manager, Network & Communication Services.
Queensland University of Technology CRICOS No J Internet Access and QUT Presented by: Peter Kurtz February 2008.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
UOW Internet Traffic Management & Accounting System Presented by Michele Grange Senior Manager, Business Services Unit, ITS University of Wollongong.
Internet Traffic Management and Accounting at UNSW David Rees Senior Network Engineer.
CRICOS Provider Code: 00113B Internet Traffic Management and Accounting at Deakin University QUESTnet & AARNet Workshop Brisbane – August 2012 Paul Fikkers.
Office 365 Performance Management. Meet Paul Andrew Office 365 Technical Product Manager – Office 365 datacenter, networking, identity management.
Data Hosting and Security Overview January, 2011.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Connect communicate collaborate Impact of undesirable HTTP traffic on electrical power consumption in the ICT rooms Ivan Ivanovic - BUCC/AMRES EUNIS 2012.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
1 © 1999, Cisco Systems, Inc. 1293_07F9_c1 LocalDirector Version3.1.
Web Content Security Unlock the Power of the Web
Web Content Security Unlock the Power of the Web
Use Case for Distributed Data Center in SUPA
CONNECTING TO THE INTERNET
Client-Server & Peer-to-Peer Networks
Unit 27: Network Operating Systems
IS4680 Security Auditing for Compliance
Virtual Private Network
"Cloud services" - what it is.
Cloud Computing LegalRun Solutions Why It’s Right for You!
BTEC level 3 Learning Aim D.
Presentation transcript:

UoM Data Billing Environment Legacy and Refresh Systems Cameron Shepherdley Information Technology Services

Data Billing Business Case To on-charge internet data (off-net) usage charges (AARNET) in an equitable form to associated organisations –This includes “faculties”, non-academic departments and also educationally affiliated organisations (external organisations) Equitable –Equal fee charging is unfair, Student number basis is unfair, Volume basis is best Service Model –Part of an IT service-based model whereby services are charged on a per-usage basis where possible Associated Services –“Billing” ties in with quotoring, monitoring, traffic control etc

UoM Current Policy Environment Off-Net Subscription Fee subject to direct recovery from Organisations –On-net to be kept free to encourage research –Not all organisations are billed Students are not charged for internet access –Quotas are applied however Organisations are free to on-charge to sub departments Best to charge billed organisations for their proportional usage –ie their ‘slice’ of the AARNET charge pie

Legacy Internet Access Environment Billing: –AARNET Netflow logs sourced from AARNET border routers –Custom UoM script based system to accumulate usage by sub-nets –Integrates with IP Address Management System for subnet data –Integrates with existing proxy in order to identify source IPs –High maintenance and high risk. Unsupported. –Invoicing process is highly manual –Can’t do real time monitoring / analysis

Legacy Internet Access Environment Quotoring (students) –Uses a proxy (squid) –Proxy requires re-authentication of users when accessing the internet –Users must be forced through proxy via computer settings or network controls –Proxy creates problems for a wide variety of client software –Proxy complicates the connection of user-owned devices i.e on the wireless network Removal of the proxy is a wider program goal

Legacy Internet Access Environment Legacy Border Environment

Billing System Context

System Replacement Requirements Operate transparently for users and applications Monitor usage from all source IPs Identify individuals as well as owners of IPs Calculate or assist in calculating proportionate bills Manage quotoring including self-service information access for individuals Dynamically absorb changes in IPs and users Be changeable as AARNET->UoM and UoM->Faculty charging models change Be close to real-time Provide information to customer organisations as well as IT Ability to integrate with finance systems Produce a range of reports

System Replacement Procera PacketLogic devices in new internet gateway –Log all traffic flows –Can dynamically control traffic flows in real-time Obsidian JET billing software –Software totally manages the Procera devices –Integrates with authentication systems and identity stores –Flexible –Can implement traffic control via the Procera – ie quotoring, shaping and bandwidth management. The new system will shape users who expend their quota Same technology also used by Griffith. Implementation will be different however.

System Replacement Replacement Border Environment Rebuild is incorporating numerous new services in addition to billing

Replacement System Project 3 Stages of implementation scheduled –1. Replace functionality of current system (IP billing only) –2. Implement quotoring for students (and remove network proxy) –3. Review all policies in light of new environment capabilities and the information it is capturing Stage 1 & 2 to be delivered this year Production is dependant on build of new internet border –Part of a wider program of work

Business Decisions / Problems Differences between AARNET -> UoM and UoM -> Faculty charging –ie faculties prefer quarterly charging, post pay etc Differences between UoM -> Faculty charging and student quotoring –IT would like to quota 24/7 (ignore peak/off peak) to encourage ‘educational’ network use Many existing policies have developed as a result of limitations in the legacy system –Policies can now be reviewed (project phase 3)

Business Decisions / Problems Customer organisations want increasingly detailed information –To potentially on-charge sub departments, projects or even individuals Research groups want to bypass as much network equipment as possible –Procera PacketLogic will not see research traffic –Jet to incorporate internal netflow analysis for specific subnets

Technical Decisions / Problems Exploitation of technological capability –Depends on quality of IP address ownership data & identity information. –ie charging for guest and conference usage –ie billing wireless network usage via ‘home’ organisations or central cost centre (“Melbourne Model”) Future: charging cloud users (VMs) –Linking temporary assignment of IPs to a virtual machine to the VM’s owner (who may not exist in identity systems) –Example: National eResearch Collaboration Tools and Resources –Also single VIPs from Load Balancers

Summary Billing service is affected by several factors For this reason each University is likely to be different Data available is a major factor There are challenges to solve that are probably applicable to all universities

Q & A Thank you for listening Questions are welcome

© Copyright The University of Melbourne 2011