TransPac Flow Data: Collection and Analysis
|
|
- Posy Small
- 8 years ago
- Views:
Transcription
1 TransPac Flow Data: Collection and Analysis INTERNATIONAL Hans Addleman Network Engineer, International Networks University Information Technology Services Indiana University Supported by the National Science Foundation
2 TransPAC Netflow Overview Started collecting flow records in February 2015 Current collection is 1 in 50 packets Netflow Version 5 Moving to IPFIX for speed and IPv6 soon Using NFDUMP toolkit with NFSEN.
3 TransPAC Netflow Hardware 2 Dell Servers do the work Flow Collector Dell R720 with Xeon E processors 4.2TB total storage space on RAID5 array Flow Processor Dell R420 with Xeon E (24 cores) 384G ram Servers connected by dedicated 10G link. Collecting ~35G a month of netflow data.
4 Top Talkers by Source AS Inbound to TransPAC 2% 2501 The Univeristy of Tokyo 3% 2% 2% 7660 Asia Pacific Advanced Network 3% 3% NaBonal Taiwan University Tsukuba- WAN Network 9264 Academic Sinica Network 7% 58% 1237 Korea InsBtute of Science and Technology InformaBon Network 3836 Thai Social/ScienBfic, Academic and Research Network 2500 WIDE Project byte to 4 byte 4621 UNINET- TH
5 Top Talkers by Des8na8on AS Inbound to TransPAC 7% 18% 7% 7% TransPAC 194 University CorporaBon for Atmospheric Research 8% 229 Merit 680 DFN 292 ESNET 789 IN2P3 160 University of Chicago 786 JANET 8% 26 Cornell University 32 Stanford University 12% 9% 10%
6 Top Talkers by Source AS Outbound from TransPAC 4% 5% 4% AS7941 Internet Archive 5% 28% AS1701 NaBonal AeronauBcs and Space AdministraBon AS70 NaBonal Library of Medicine AS6629 NOAA AS195 San Diego Supercomputer Center AS5663 US Geological Survery 8% AS3152 Fermi NaBonal Accelerator Laboratory AS194 University CorporaBon for Atmospheric Research AS11318 Georgetown University 12% AS20033 NaBonal ClimaBc Data Center
7 Top Talkers by Des8na8on AS Outbound from TransPAC 5% 5% AS55824 NKN Core Network AS7497 CSTNET 30% AS18127 Tsukuba- WAN Network AS9264 Academic Sinica Network AS3836 Thai Social/ScienBfic, Academic and Research Network AS7472 NaBonal University of Singapore 7% AS3363 Hong Kong University of Science and Technology AS45773 PERN AS Content Servie Provider 8% 17% AS7660 Asia Pacific Advanced Network AS byte to 4 byte AS Conversion 10%
8 TransPAC Top Ports Top Ports in use Feb to July % 12% 21% 28% Tunnels IPERF Rsync Aspera File Xfer NTP FragmentaBon Unknown
9 Testing and Tunneling Lots of traffic transiting TransPAC is secure. Lots of test traffic flowing. (iperf, bwctl, perfsonar) Top Ports in use Feb to July % 28% Tunnels 12% IPERF Rsync 21% Aspera File Xfer NTP Fragmen tabon Unknow n
10 UDP/TCP Port 0 Lots of traffic on UDP and TCP port 0. Fragmentation? A network may not have Jumbo Frames enabled in the path 5% グラフ タイトル 12% 28% Tunnels IPERF Rsync 21% Aspera File Xfer NTP Fragmen tabon Unknow n
11 April 2015 Large Transfer 78% of the top 10 traffic in April was between 2 institutions. The University of Tokyo National Center for Atmospheric Research Inbound towards NCAR April 2015 Inbound from Japan to USA Large file transfer between 2 institutions Can we help make this transfer better? Gives us a clue to what type of researchers are using our network. Reach out to other researchers in same field. Smaller transfers but still large noticed in March as well. 78% 22% Other Data Big data Xfer
12 March 2015 Large Transfer 68% of the Top 10 Traffic in March was a data transfer Georgetown University to the Academic Sinica Network March 2015 Outbound from USA to Taiwan 32% Data Transfer Other Traffic 68%
13 Netflow Final Thoughts Great for statistics and traffic analysis. Netflow is ALSO a powerful tool for finding ongoing trouble in your network.
14 Questions / Comments Hans Addleman - addlema@iu.edu TransPAC4 NSF IRNC Award: #
Tier3 Network Issues. Richard Carlson May 19, 2009 rcarlson@internet2.edu
Tier3 Network Issues Richard Carlson May 19, 2009 rcarlson@internet2.edu Internet2 overview Member organization with a national backbone infrastructure Campus & Regional network members National and International
More informationperfsonar: End-to-End Network Performance Verification
perfsonar: End-to-End Network Performance Verification Toby Wong Sr. Network Analyst, BCNET Ian Gable Technical Manager, Canada Overview 1. IntroducGons 2. Problem Statement/Example Scenario 3. Why perfsonar?
More informationNfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček krmicek@liberouter.org Pavel Čeleda celeda@ics.muni.cz Jiří Novotný novotny@cesnet.cz Part I Monitoring of Virtual Network Environments
More informationBest of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
More informationNetwork Performance and Possible Improvement For Medical Demonstration
Network Performance and Possible Improvement For Medical Demonstration APAN-JP/KDDI/NICT/TEIN2-JP Jin Tanaka Medical Workshop in 27 th APAN Kaohsiung Meeting March 5 2009 Kaohsiung Taiwan 1 Who am I? Jin
More informationFirewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
More informationIPv6 measurement in CSTNET. CSTNET, CNIC, Sep. 2014
IPv6 measurement in CSTNET Chunjing Han chjhan@cstnet.cn CSTNET, CNIC, Sep. 2014 1. The activities of IPv6 measurement in CSTNET 2. IPv6 traffic analysis and user behavior Topics 1. The activities of IPv6
More informationWireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology cwhite@riverbed.com SHARKFEST
More informationA High-Performance Storage and Ultra-High-Speed File Transfer Solution
A High-Performance Storage and Ultra-High-Speed File Transfer Solution Storage Platforms with Aspera Abstract A growing number of organizations in media and entertainment, life sciences, high-performance
More informationIntroducing FortiDDoS. Mar, 2013
Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline
More informationVisualizing Traffic on Network Topology
Visualizing Traffic on Network Topology NTT Communications, Kazunori Kamiya NTT Laboratories, Hiroshi Kurakami Agenda Company Introduction Motivation and Goals Things to consider Method of visualizing
More informationConnecting North Carolina s Future Today. Application Monitoring: ClassScape Case Study. NCSU Centennial Networking Lab
Connecting North Carolina s Future Today Application Monitoring: ClassScape Case Study John Bass NCSU Centennial Networking Lab Carla S. Hunt MCNC 1 Overview About MCNC and the School Connectivity Initiative
More informationNSF IRNC Program International Deployment and Experimental Efforts with SDN in 2013
NSF IRNC Program International Deployment and Experimental Efforts with SDN in 2013 The National Science Foundation (NSF) International Research Network Connections (IRNC) program is enabling the development
More informationNFSEN - Update 13th TF-CSIRT Meeting 23. September 2004 Malta Peter Haag
NFSEN - Update 13th TF-CSIRT Meeting 23. September 2004 Malta Peter Haag 2004 SWITCH NFSEN ( NetFlow Sensor ) 12th TF-CSIRT Meeting Hamburg: 2004 SWITCH 2 NFSEN http://www.terena.nl/tech/task-forces/tf-csirt/meeting12/nfsen-haag.pdf
More informationCase Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
More informationEVALUATING NETWORK BUFFER SIZE REQUIREMENTS
EVALUATING NETWORK BUFFER SIZE REQUIREMENTS for Very Large Data Transfers Michael Smitasin Lawrence Berkeley National Laboratory (LBNL) Brian Tierney Energy Sciences Network (ESnet) [ 2 ] Example Workflow
More informationNetwork Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
More informationHow To Monitor Network Traffic On A Cell Phone
Location-aware Network Monitoring using IPFIX/NetFlow Abdelkader Lahmadi Julien Vaubourg Olivier Festor Université de Lorraine Rick Hofstede Aiko Pras University of Twente NMRG meeting July 30, 2013 (compiled
More informationFlow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City murali@ncb.ernet.in Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
More informationHow To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
More informationNetwork performance monitoring Insight into perfsonar
Network performance monitoring Insight into perfsonar Szymon Trocha, Poznań Supercomputing and Networking Center E-infrastructure Autumn Workshops, Chisinau, Moldova 9 September 2014 Agenda! Network performance
More informationWhitepaper. NetFlow vs. sflow: A Technical Review. plixer. International
Whitepaper NetFlow vs. sflow: A Technical Review 1 plixer Table of Contents Abstract Introduction NetFlow sflow Lab Configuration Hardware Collection and Analysis Utilization Measurements Top Hosts Don
More informationMonitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
More informationTHE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK
THE ROAD TO IPV6: KU SERVICE EXPERIENCES ON DUAL-STACK The Design and Implementation of a Scalable, Dual-Stack Oriented, Consolidated Authentication System Pirawat WATANAPONGSE * Surasak SANGUANPONG* Kasom
More informationCISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER
PRODUCT BULLETIN NO. 2438 CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER NEW FEATURES New features of the Cisco Content Switching
More informationNetFlow Feature Acceleration
WHITE PAPER NetFlow Feature Acceleration Feature Description Rapid growth in Internet and intranet deployment and usage has created a major shift in both corporate and consumer computing paradigms. This
More informationThe Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
More informationRunning an OpenStreetMap cache server in Asia
Running an OpenStreetMap cache server in Asia Steven Shiau, Ceasar Sun, Thomas Tsai NCHC, Taiwan Q3, 2015 Outline OSM Cache server Why? NCHC's capacity Hardware, network OS, services Maintenance Q&A 2
More informationnfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
More informationMany network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
More informationIntroduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationWindows Server 2012 R2 Hyper-V: Designing for the Real World
Windows Server 2012 R2 Hyper-V: Designing for the Real World Steve Evans @scevans www.loudsteve.com Nick Hawkins @nhawkins www.nickahawkins.com Is Hyper-V for real? Microsoft Fan Boys Reality VMware Hyper-V
More informationWatch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
More informationAgenda. sflow intro. sflow architecture. sflow config example. Summary
sflow Features Agenda sflow intro. sflow architecture sflow config example Summary 1 What is sflow? sflow is a technology for monitoring traffic in data networks containing switches and routers. S9700
More informationFirewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
More informationHow To Set Up A Network Measurement Toolkit For A Network Performance Test On A Network With A Network (Networking) On A Microsoft Ipa 2.5 (Netware) On An Ipa2 (Netcom) On Your Computer
Firewall Port Recommendations for the ps Performance Toolkit Prepared by the NTAC Performance Working Group November 2014 Edited by J. Zurawski (ESnet), A. Brown (Internet2), A. Lake (ESnet), K. Miller
More informationABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98
PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 Brynjar Åge Viken e mail: brynjar@item.ntnu.no, bviken@nlanr.net National Laboratory for Applied Network Research, Measurement and Operations
More informationOverview of Network Measurement Tools
Overview of Network Measurement Tools Jon M. Dugan Energy Sciences Network Lawrence Berkeley National Laboratory NANOG 43, Brooklyn, NY June 1, 2008 Networking for the Future of Science
More informationNetwork Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
More informationUnderstanding Flow and Packet Deduplication
WHITE PAPER Understanding Flow and Packet Deduplication Riverbed Technical Marketing 2012 Riverbed Technology. All rights reserved. Riverbed, Cloud Steelhead, Granite, Interceptor, RiOS, Steelhead, Think
More informationNetwork Performance Tools
Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf
More informationHow valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
More informationVALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
More informationIf you already have your SAN infrastructure in place, you can skip this section.
Part 1: Configuring the iscsi SAN Infrastructure Our first step will be physically setting up the SAN. If you already have your SAN infrastructure in place, you can skip this section. In this article,
More informationAggregate speed and availability optimize your business connectivity. Visit www.combox.gr for more information. Protonyx Data Services, 2008-2015.
Aggregate speed and availability optimize your business connectivity 4 Visit www.combox.gr for more information. 3 2 1 Our Company Protonyx Data Services is: a value added software vendor that specializes
More informationAutonomous NetFlow Probe
Autonomous Ladislav Lhotka lhotka@cesnet.cz Martin Žádník xzadni00@stud.fit.vutbr.cz TF-CSIRT meeting, September 15, 2005 Outline 1 2 Specification Hardware Firmware Software 3 4 Short-term fixes Test
More informationand reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
More informationVoice Internet Phone Gateway
Voice Internet Phone Gateway Quick Installation Guide IPC 1000 Series ARTDio Company Inc. Edition 1.0 Note: For more detailed hardware installation instructions, please refer to the IPC 1000 series User
More informationCopyright & trademark notices. Notices. Copyright Acknowledgment
Copyright & trademark notices This edition applies to version 5.0 of the licensed program WANGUARD and to all subsequent releases and modifications until otherwise indicated in new editions. Notices References
More informationDesigning and Deploying a Distributed Architecture for Research Data Management
Designing and Deploying a Distributed Architecture for Research Data Management Luke Sheneman, Ph.D Technology and Data Services Manager Northwest Knowledge Network (NKN) Presentation to IS @ WSU July
More information299-01 Q&A. DEMO Version
299-01 Riverbed Certified Solutions Professional Network Performance Management Q&A DEMO Version Copyright (c) 2014 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration
More informationNetFlow-Lite offers network administrators and engineers the following capabilities:
Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require
More informationSecuring and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
More informationperfsonar Host Hardware
perfsonar Host Hardware This document is a result of work by the perfsonar Project (h@p://www.perfsonar.net) and is licensed under CC BY- SA 4.0 (h@ps://creakvecommons.org/licenses/by- sa/4.0/). Event
More informationCisco Secure Access Control Server Solution Engine
Data Sheet Cisco Secure Access Control Server Solution Engine The Cisco Secure Access Control Server (ACS) provides a comprehensive identity networking solution and secure user experience for Cisco intelligent
More informationContents. Digital Video Surveillance Basic Troubleshooting Guide
Contents VMS Troubleshooting Questions... 2 Typical DSS system view... 2 A) Basic... 2 B) System Topology Information... 3 C) Questions if intermittent camera connectivity problems exist... 3 D) Things
More informationPacnet Global EIPL Point-to-Multipoint Service
Products and Services PRIVATE NETWORKS Pacnet Global EIPL Point-to-Multipoint Service NO-COMPROMISE POWER COST EFFICIENCY The biggest challenge of multi-site enterprises is how to get all its branches
More informationNSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
More informationUCi2i Video Conference Endpoint Firewall Requirements. UCi2i Video Conference Endpoint Firewall Requirements
1 UCi2i Video Conference Endpoint Firewall Requirements 2 UCi2i VC Endpoint Firewall Requirements Dear customer, Due to the implementation of our secure video network, there are a few firewall rules that
More informationClick on Start Control Panel Windows Firewall. This will open the main Windows Firewall configuration window.
Configuring Windows Firewall on Windows 7 CheckPoint server to allow SQL traffic for database connections and to allow HTTP traffic for Thin Client connections. Description This document provides step
More informationAn overview of traffic analysis using NetFlow
The LOBSTER project An overview of traffic analysis using NetFlow Arne Øslebø UNINETT Arne.Oslebo@uninett.no 1 Outline What is Netflow? Available tools Collecting Processing Detailed analysis security
More informationBenefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
More informationNetflow For Incident Detection 1
Netflow For Incident Detection 1 Michael Scheck / Cisco CSIRT mscheck@cisco.com Introduction Netflow is often deployed for network billing, auditing, and accounting. However, Netflow can also be for incident
More informationHigh Performance Storage System. Overview
Overview * Please review disclosure statement on last slide Please see disclaimer on last slide Copyright IBM 2009 Slide Number 1 Hierarchical storage software developed in collaboration with five US Department
More informationSignature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
More informationNetwork Monitoring System with Scheduler
Network Monitoring System with Scheduler Takatoshi Ikeda APAN-JP NOC, KDDI R&D Labs Outline Background and Motivation Goal Outline of the System Specification of the Developed Environment Demonstration
More informationSecure File Sharing SRFS on Ether with host-to-host IPSec connection over the Pacific Ocean link
Secure File Sharing on Ether with host-to-host IPSec connection over the Pacific Ocean link Hirofumi OHKAWA, Naoyuki FUJITA Japan Aerospace exploration Agency SC06 Nov. 15 th 2006, TAMPA CONVENTIONAL CENTER
More informationCHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor
Contents CHAPTER 1 WhatsUp Flow Monitor Overview What is Flow Monitor?... 1 How does Flow Monitor work?... 2 Supported versions... 2 System requirements... 2 CHAPTER 2 Configuring WhatsUp Flow Monitor
More informationAccelerating Microsoft Exchange Servers with I/O Caching
Accelerating Microsoft Exchange Servers with I/O Caching QLogic FabricCache Caching Technology Designed for High-Performance Microsoft Exchange Servers Key Findings The QLogic FabricCache 10000 Series
More informationScience DMZs Understanding their role in high-performance data transfers
Science DMZs Understanding their role in high-performance data transfers Chris Tracy, Network Engineer Eli Dart, Network Engineer ESnet Engineering Group Overview Bulk Data Movement a common task Pieces
More informationAlliedWare Plus OS How To Use sflow in a Network
AlliedWare Plus OS How To Use sflow in a Network Introduction sflow is an industry-standard sampling system that is embedded in Allied Telesis' high-performing Layer 3 switches. sflow enables you to use
More informationPerformance and Bandwidth Testing for Data Circuits
Performance and Bandwidth Testing for Data Circuits In some cases, customers report that they are experiencing slower than expected data connections. These can be caused by any number of factors, including
More informationNetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
More informationOverview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
More informationSolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference
SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any
More informationUKCMG Industry Forum November 2006
UKCMG Industry Forum November 2006 Capacity and Performance Management of IP Networks Using IP Flow Measurement Agenda Challenges of capacity and performance management of IP based networks What is IP
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationLinux NIC and iscsi Performance over 40GbE
Linux NIC and iscsi Performance over 4GbE Chelsio T8-CR vs. Intel Fortville XL71 Executive Summary This paper presents NIC and iscsi performance results comparing Chelsio s T8-CR and Intel s latest XL71
More informationMcAfee Network Security Platform 8.2
8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known
More informationFluke Networks NetFlow Tracker
Fluke Networks NetFlow Tracker Quick Install Guide for Product Evaluations Pre-installation and Installation Tasks Minimum System Requirements The type of system required to run NetFlow Tracker depends
More informationmy forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize
1) Disk performance When factoring in disk performance, one of the larger impacts on a VM is determined by the type of disk you opt to use for your VMs in Hyper-v manager/scvmm such as fixed vs dynamic.
More informationViete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
More informationApplication Note. Cell Janus Load Balancing Algorithms Technical Overview
Cell Janus Load Balancing Algorithms Technical Overview Introduction This application note describes the technical aspects of all load balancing algorithms in Cell Janus. Load balancing occurs in both
More informationIPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
More informationHow To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
More informationSetting up pfsense as a Stateful Bridging Firewall.
Setting up pfsense as a Stateful Bridging Firewall. Contents Contents Setting up pfsense as a Stateful Bridging Firewall.... 1 What king of system these directions will try and help you create.... 1 Selecting
More informationIPv6/IPv4 Automatic Dual Authentication Technique for Campus Network
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network S. CHITPINITYON, S. SANGUANPONG, K. KOHT-ARSA, W. PITTAYAPITAK, S. ERJONGMANEE AND P. WATANAPONGSE Agenda Introduction Design And Implementation
More informationNetFlow: What is it, why and how to use it? Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
More informationWhatsUpGold. v12.3.1. NetFlow Monitor User Guide
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
More informationAugust 9 th 2011, OSG Site Admin Workshop Jason Zurawski Internet2 Research Liaison NDT
August 9 th 2011, OSG Site Admin Workshop Jason Zurawski Internet2 Research Liaison NDT Agenda Tutorial Agenda: Network Performance Primer Why Should We Care? (30 Mins) IntroducOon to Measurement Tools
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationTechnical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
More informationHow To Fix A Fault Notification On A Network Security Platform 8.0.0 (Xc) (Xcus) (Network) (Networks) (Manual) (Manager) (Powerpoint) (Cisco) (Permanent
XC-Cluster Release Notes Network Security Platform 8.0 Revision A Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
More informationLoad Balance Router R258V
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationWAN Optimization in MPLS Networks- the Transparency Challenge!
DATE OF ISSUE May 2005 AUTHOR Efi Gat mor 103 Eisenhower Parkway Roseland, NJ 07068 USA TEL +1.888.892.1250 +1.973.618.9000 FAX +1.973.618.9254 www.expand.com WAN Optimization in MPLS Networks- the Transparency
More informationHow To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
More informationDeploying Riverbed Cascade and Steelheads. A Best Practices Whitepaper
Deploying Riverbed Cascade and Steelheads A Best Practices Whitepaper Contents 1. Introduction... 1 2. Steelhead Releases... 2 3. Steelhead Appliance Deployment Scenarios... 2 4. Configuring Steelhead
More informationScience DMZ Security
Science DMZ Security Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2013 Honolulu, HI January 15, 2013 Outline Quick background Firewall issues Non-firewall security options
More information