Preparing Databases for Network Traffic Monitoring
|
|
- Frederica Montgomery
- 8 years ago
- Views:
Transcription
1 Preparing Databases for Network Traffic Monitoring Liberios Vokorokos Technical University of Košice Faculty of Electrical Engineering and Informatics Dept. of Computers and Informatics Letná 9, Košice Slovak Republic Adrián Pekár Technical University of Košice Faculty of Electrical Engineering and Informatics Dept. of Computers and Informatics Letná 9, Košice Slovak Republic Norbert Ádám Technical University of Košice Faculty of Electrical Engineering and Informatics Dept. of Computers and Informatics Letná 9, Košice Slovak Republic Abstract This paper deals with the solution of database related problems which can occur during network traffic monitoring. During data evaluation through a database excessive response time can be noticed. While the time necessary to obtain the data from the database has a significant effect on the result of the monitoring, it is important to keep its value as low as possible. Practically, the vast majority of the monitoring tools have to deal with the problems related to the database s excessive response time, so their solution is really justified. In this paper an alternative method of network monitoring, the BasicMeter tool will be introduced by which the exact problems and their solution will be illustrated. I. INTRODUCTION Today s computer networks are designed to transmit video, sound and data at the same time. This kind of transmission is provided by converged networks, which instead of setting own separate links for each traffic type make do with only one converged link. In order to ensure the desired quality and performance of these networks is important to monitor their traffic. By measuring and analyzing network traffic parameters the function of various multimedia applications can be ensured; the network and its users can be secured against external or internal attacks [1]; Intrusion Detection Systems can be applied [2]; the lost or leakage of sensitive information can be prevented, etc. For this reason monitoring has a significant role in the management of today s modern computer networks and their services. BasicMeter is a measuring tool which gives an alternative method for network traffic monitoring. It is developed by the MONICA research group at the Technical University of Košice. The main purpose of the tool is to provide network traffic parameters measurement and real-time data analysis. During the development of the tool a quite big response time was noticed while obtaining the data from the database. It was caused by the database management system. Processing even a relatively small number of data can be pretty time-consuming in some cases. Moreover, with the growth of the data in the database which is obvious in the case of network traffic monitoring the time required for evaluating the queries can exceed more tens of seconds. It is because processing millions of records cost some time even on systems with the most expensive hardware equipment and the highest performance. This fact has a negative impact on the functionality of the network traffic monitoring tools. Inspired by the Data Warehouse technology some improvements were designed to the way of storing the data in the database and accessing them. In the following sections the BasicMeter network monitoring tool will be introduced starting with a brief description of its main components, up to a more detailed explanation of the problems it has to face during data analysis. Subsequently, in Section IV one of the most popular database technologies for large-scale data management, i.e. the Data Warehouses will be presented. Section V is addressed to the solution of the problems with excessive response time of the database in the monitoring tool. The last two sections are focusing on the verification of the implemented technology in the BasicMeter s architecture and on the presentation of planed future work. II. THE BASICMETER MEASURING TOOL The concept of the BasicMeter [3] tool, as described in Figure 1, is in conformance to the IPFIX architecture [4], [5]. The measurement of the network traffic is based on passive method [6], which does not require generation of additional network traffic but make do with the existing one. The architecture of the tool was developed within the following three sub-projects: BEEM stands for BasicmEter Exporting and Measuring process. It includes packet capturing, filtering, sampling, creating and maintaining of flow records in the flow cache, and exporting of flow records from observation point by IPFIX protocol. JXColl stands for Java XML Collector. It can collect flow records from one or more metering points in the format of Netflow v5, v9 [7] or IPFIX [8] protocol. Flow records can be stored in a database for future use or analysis and/or directly sent to one or more analyzing applications by ACP [9], [10]. WebAnalyzer is a Web application for data analysis. It provides an Graphical User Interface (GUI) for both the visualization of the information obtained by the exporter(s) and the management of the architecture s lower components.
2 III. DESCRIPTION OF THE PROBLEMS ASSOCIATED WITH EXCESSIVE RESPONSE TIME In the exporter s configuration file besides other options a time period can be set. After the expiration of this time period the flow records calculated on the basis of actually measured data will be exported to the collector. Depending on these parameters can happen that although the flow has not yet been finished, the information about it will be stored in the database and further measured data by the exporter will represent updated information about the same flow. So some of the records in the database according to the IP packet structure [8] will have the same IP addresses, port numbers etc. These records will occur in the database multiple times. In the analyzing application of the measuring tool the user on the basis of certain filtrating criteria can create a graphical continuance. These criteria inter alia include unique source and destination port numbers, source and destination IP addresses and the identifier of the metering point (exporter) [14]. Unfortunately, while the database contain duplicate records, the effective evaluation of the unique records a list where each record is occurring only once is not easy to achieve. The list containing only unique records is obtained from the database by the Fig. 1. The architecture of the BasicMeter measuring tool However, the analyzer itself is not a part of the IPFIX architecture [4]. Therefore further enhancements had to be draft and implemented by which the communication between the analyzer(s) and the collector could be established; and the control of the measuring tool could be enabled. For these purposes the Analyzer Collector Protocol (ACP) and Exporter Collector Analyzer Manager (ECAM) module were developed [11], [12]. Former is intended for real-time network traffic analysis; latter for the management of the tool s other components. All of the above mentioned components can be configured by their configuration files. As the database of the BasicMeter tool PostgreSQL [13] was chosen. It is an open-source Object-Relational Database Management System (ORDBMS) which offers an alternative solution to other freeware database systems (MySQL, Firebird, MaxDB, etc.) as well as to proprietary ones (Oracle, DB2, Microsoft SQL Server). Thanks to the flexibility of its license, PostgreSQL can be used, modified and distributed for free by any person for any purpose. According to many experts, PostgreSQL is currently the most advanced and most sophisticated freeware Database Management System (DBMS) [13]. Regarding to the roles of these projects (BEEM, JXColl, WebAnalyzer, PosgreSQL DBMS), in the following they will be specified as the exporter, collector, analyzer and database. SELECT DISTINCT name_of_column FROM name_of_table ORDER BY name_of_column; query. This command eliminates duplicate rows from the result [13]. In case of 1 million records to evaluate the analyzer s query and subsequently send the result to the analyzing application takes the database management system tens of seconds. The higher the number of the records in the database is the more time is needed to evaluate the queries. It is important to mention that the following numbers are only informational. Mainly because the result of the network measurement can be influenced by a wide range of various factors so the results of the monitoring may vary. Another problem occurs during the evaluation of the obtained data from the database by the analyzer. Since the collector stores each data about the IP flows measured by the exporter(s), the size of the data in the database can be really large. For example, monitoring of the network with balanced traffic during 10 days results in approximately 1.5 million of stored records in the database. If a user would like to see what happened on the network during these 10 days, the database management system would return 1.5 million records. On the basis of these records the analyzing application would have to create a continuation in a form of interconnected points. However, in the case of such a large amount of number this is really problematic. Moreover, it is assumed that in the future the analyzer will be capable to create a continuation from a much larger time interval (records). In this case both the processing of the queries by the database and the subsequent visualization of the results by the analyzer represent a really large response time of the BasicMeter tool. (1)
3 For these reasons it was necessary to analyze and improve the way of storing the data of network traffic flows in the database and accessing them. IV. DESCRIPTION OF THE DATA WAREHOUSE TECHNOLOGY Issues related to database systems with large data sets are well known to the scientific community. Many database experts dedicate their attention to the development of concepts and technologies for a long time to solve the problems similar to the one with which the BasicMeter has to deal. One of the most commonly used technologies for easy management of large-scale data is the Data Warehouse. A Data Warehouse is a methodological concept for organizing and managing large data structures. Its main purpose is to provide reliable, complex and integrated materials for applications that rely on extensive data. Over the past few years Data Warehouses went through a rapid growth in the number provided products and services. Their concept was adopted by the public and successfully distributed in various segments of the industries such as manufacturing, sales, financial services, transport, telecommunications, utilities and health care [15]. The main advantage of Data Warehouses is, that the data are stored in a structure which allows their efficient analysis and querying (the main effort was to reach such a condition in the BasicMeter monitoring tool). Further advantages of Data Warehouse are the following [16]: Integration of the data from various sources into one system. Provides history, therefore the data are available for the few last periods of time (e.g. years). The data are arranged according to the individual subjects. Data are stored at different levels of aggregation. Data are periodically retrieved from a system (usually at night or weekends). Users only read the data, i.e. they do not insert new or change the existing ones. Using a wide range of methods, data from the Data Warehouse can be used for effective analysis and presentation. The architecture of Data Warehouses is shown in Figure 2. Data incoming from multiple external resources are subjected to filtering criteria, extracted, merged and stored in the central repository, which is the Data Warehouse. The stored data are also extended by history and summary information [17]. In technical terms, Data Warehouse is a huge database which has a size from several gigabytes up to hundreds of terabytes. Thanks to this architecture, users work with data in a local, homogeneous and centralized data repository, which reduces the access time to these data. In addition, the Data Warehouse also updates periodically itself against the content of external sources. Currently two architectures of Data Warehouses are dominating. One based on Inmon s methodology and the other on Kimball s methodology. Fig. 2. A. Inmon s methodology The common architecture of the Date Warehouses According to Inmon s 1 methodology, Data Warehouse is a subject-oriented, integrated, constant and time-dependent data collection, which serves as support for the management of these data. The main focus is placed on the centralization and normalization of data into the Data Warehouse. Since the normalization of data complicates the ease of use and performance, this architecture also provides various datamarts. Datamarts are derived databases. They normally contain summarized data derived from the data of the Data Warehouse. Their structure is optimized for efficient querying of the records from the database [18]. B. Kimball s methodology According to Kimball s 2 definition, Data Warehouse is a copy of transactional data specifically for structured queries and analysis. His method, also known as dimensional modeling, provides representation of the most elegant compromises of end users integrity and the ease of use. Its main aim is the development of a systematic and progressive Data Warehouse, while mainly focusing on different preventions and its dimensions [19]. C. Considering the criteria of the transition to the new technology Before the transition to the technology for managing largescale data, the following factors [18] were considered: the amount of the data, which should be stored; 1 William (Bill) Harvey Inmon is an American computer scientist who is known for most people as the father of Data Warehouses. 2 Ralph Kimball is the author of the concepts of Data Warehouse and Business Intelligence (BI).
4 the time (speed), during which the data should be ready for use; history of the records and changes; what types of analysis are needed to be performed over the data; the cost of the technology and its implementation. Further important factor to consider was the types of the information which were going to be stored in the database. For this reason the database and its existing data, the process which is filling the database (collector) and the process which is querying the information from the database (analyzer) were put under a complex analysis. The goal of this analysis was to gather all the requirements. Since the BasicMeter tool is still under development, some of these requirements were still not fully defined (mainly which regard to the analyzer). Unfortunately this would made the transition to the new technology hardly to implement and in some cases also pointless (if the requirements from the collector and analyzer will change, the method of preprocessing of the data dedicated for efficient evaluation has to be changed too). However, the solution of the problems from the previous section still remained necessary. For this reason, after considering the factors described previously, the Data Warehouse technology and some other optimization improvements were implemented in the current database of the BasicMeter tool, which should solve the persistent problems of the database s excessive response time. This solution from the view of the collector s or the analyzer s requirements is also easily customizable. So in the future when the requirements will change, their influence will be easily implemented in the database empowered with the Data Warehouse technology. V. MOVING TO THE DATA WAREHOUSE As seen above, one of the most critical part of the BasicMeter s architecture and basically any IPFIX like architecture [20] is its database. This also reflects the fact that most of the performance and query related issues occurred during obtaining the data from the database. Firstly a new database was created, where the new optimized and summarized data are going to be stored. Then as solution for the excessive response time during the reception of the list of unique data, this database was extended with tables designated for storing only unique records. Each of these tables contains two columns: one for unique records; one for the number of the record s duplicate occurrence 3. With these tables instead of query 1 the standard SELECT name_of_column FROM name_of_table ORDER BY name_of_column; 3 Storing the number of duplicate records occurrence is designated for statistical purposes. (2) guery can be used. Thus, the database management system will not need to eliminate duplicate records from the result [13]. This results in significant reduction of the time required by the database for processing the query and providing the results to the analyzer. The second main problem, i.e. the difficulties related with the implementation of displaying large amount of data received from the database in the analyzing application which is also connected with the above described problem of the excessive response time was solved in the following way. As a solution the new database was extended with further tables. These tables and their fields were designed so that traffic information can be obtained from them on the basis of time characteristics. They representing a kind of a summarization to one minute of time unite of selected information elements. This will make easier to obtain and represent the data by the analyzer. A more rapid access to the data stored in the designed tables was also ensured by indexing the records when they are stored [13]. The principle of filling the tables was fully inspired by the Data Warehouse technology, while the main effort was aimed at the pre-processing and aggregation of the indexed data on the basis of time characteristics. This is possible through the PL/pgSQL extension of the basic SQL language of the PostgreSQL database [13]. This extension allows procedural and object-oriented programming directly in the database. Using the PL/pgSQL language in the database of BasicMeter tool the following database objects [13] were created: function 4 ; trigger pertaining to this function. The trigger after each insert of a record in the database calls the proposed function. Subsequently the function starts to insert records obtained from the actually stored values in the default database into the new database s proposed tables in the following order: 1) First the command by which the function was called (it has to be an INSERT statement) and the end of the flow identifier is checked (examining the end of the flow identifier is needed to reduce duplicate records). When these criteria are satisfied, the function connects to the database, where the proposed tables for efficient querying were created. 2) In the next step the function begins to store the records in the tables. First it checks whether the entry already exists in the table proposed for unique records. If the record is already there only its duplicate record counter field will be increased. Otherwise the new, unique entry will be stored in the table. 3) In case that the actually inserted records meets the criteria of some distinguished information, this record will 4 In the terminology of PostgreSQL instead of stored procedure, function is used.
5 Fig. 3. The topology of the verification process be also stored in the tables dedicated for summarizing purposes. 4) In the last step summarized data to one minute of time unite about the start and end of the flow and some other entries characterizing the IP flow will be stored in the tables for aggregating purposes. The implementation of the newly created objects was performed using regular SQL commands of the PostgreSQL database. After the execution of these statements the proposed function and its trigger was added to the old database s default structure. Next, if new data was inserted in the old database, on the basis of these data new optimized and summarized data was stored in the new database. Since the explanation of these database objects (they represent extensive source codes) is out of the scope of this paper in the following they will be not listed. VI. VERIFYING THE BENEFITS OF THE IMPLEMENTED ENHANCEMENTS The above introduced enhancements were proposed to bring efficient evaluation of the analyzer s queries by using the preprocessed and summarized records. The verification of the expected results was performed on a topology as illustrated in Figure 3. By the BasicMeter monitoring tool approximately 2 million records were collected. During the monitoring the measured network traffic information was sent by the exporter to the collector (continuous line in Figure 3) where after processing the IPFIX flow records the obtained data were stored in the default (old) database (fine dashed line in Figure 3). Also less then a quarter 5 of these records was inserted into the new database. On the basis of these stored records by querying the database by the WebAnalyzer (two dots one dash line in Figure 3) a group of measurements was performed (they 5 This value is hardly influenced by the records of the tables containing unique records. were repeated 12 times). The main interest was aimed at the determination of the amount of time consumed by the database to evaluate the query. The server where the database was running had the following hardware and system equipments: Intel(R) Pentium(R) 4 CPU 3.20GHz; 1 GB System RAM; 160 GB IDE Hard Disk; Database PostgreSQL 9.1; Operating System Ubuntu Server 9.10 LTS (32 bit); OpenJDK Java Version ; The comparison of the average values before and after the transition to the Data Warehouse is included in Table I. Before optimization, after entering query 1 the database performed a sequential search, where for the selection of unique information it compared each record with each. Such a search took the database system to perform approximately 20 seconds. However, after optimization, the database with entering query 2 performed only standard selection of unique records from the proposed table. The selection with this standard query took the database management system approximately up to half second. Based on these facts the first problem with excess response time was solved. TABLE I COMPARING THE RESPONSE TIMES BEFORE AND AFTER THE IMPLEMENTATION OF THE DATA WAREHOUSE TECHNOLOGY Method of selecting data Time for evaluating the query Before optimization SELECT DISTINCT (sequential search) approx. 20s After optimization SELECT (standard selection of all data at a time) up to half sec. The verification of the proposed tables for summarized records was performed under the same conditions, while the measurement was repeated 20 times. The average response time was the same as in the case of unique records (partly can be considered as a success). Moreover, the summarized data to one minute of time unite was in each case easily processed and visualized (without delay) in the graph of continuation of the analyzer. So the second problem of complex realization of a large amount of data in the graph of continuation can be also considered as solved. The analyzer does not have to create anymore the continuation from 2 millions of data. It makes do with only a part of it. VII. CONCLUSION AND FUTURE WORK The goal of this paper was to introduce a method for optimizing the access time to the database of the BasicMeter network monitoring tool. As a solution a Data Warehouse technology was successfully implemented in the tool which fulfilled its expected results. The advantage of this solution is that it could be easily implemented in any IPFIX like tool s database. Although the optimization steps over the database succeeded, they serve only as a temporary solution because not
6 all requirements during the implementation of Data Warehouse technology were completely defined. Therefore, in future the database of the BasicMeter should be first subjected to thorough analysis, during which all the requirements from both the collector and analyzer should be definitely identified. Consequently the pre-processing and aggregation of data on the basis of time characteristics should be re-designed and implemented. Future work should be also aimed at the way of filling the new database containing unique and summarized records. More preferable way would be to calculate and store these records at a time (during weekend or at midnight) which has the least impact on the performance of the network monitoring. ACKNOWLEDGMENT This work was supported by the Slovak Research and Development Agency under the contract No. APVV REFERENCES [1] L. Vokorokos, N. Ádám, A. Baláž, Application Of Intrusion Detection Systems In Distributed Computer Systems And Dynamic Networks, Computer Science and Technology Research Survey, Košice, Elfa,s.r.o.,Košice, 2008, pp , ISBN [2] L. Vokorokos, A. Kleinová, O. Látka, Network Security on the Intrusion Detection System Level, The 10th IEEE International Conference on Intelligent Engineering Systems, Hungary, Budapest Tech, 2006, pp , ISBN [3] F. Jakab, Ľ. Koščo, M. Potocký, J. Giertl, Contribution to QoS Parameters Measurement: The BasicMeter Project, Conference Proceedings of the 4th International Conference on Emerging e-learning Technologies and Applications, ICETA 2005, vol. 4, pp , [4] G. Sadasivan, N. Brownlee, B. Claise, J. Quittek, Architecture for IP Flow Information Export, RFC 5470, [5] T. Zseby, E. Boschi, N. Brownlee, B. Claise, IP Flow Information Export (IPFIX) Applicability, RFC 5472, [6] J. Sučík, F. Jakab, Measurement and Evaluation of Quality of Service Parameters in Computer Networks. [7] B. Claise, Cisco Systems NetFlow Services Export Version 9, RFC 3954, [8] B. Claise, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information, RFC 5101, [9] J. Giertl, R. Jakab, Ľ. Koščo, Communication Protocol in Computer Network Performance Parameters Measurement Proceedings of the 4th International Information and Telecommunication Technologies Symposium,Federal University of Santa Catarina, Florianopolis, Brazil, December 14-16, 2005, pp , ISBN X. [10] A. Pekár, J. Giertl, M. Révés, P. Feciľak, Simplification of the Real- Time Network Traffic Monitoring Electrical Engineering and Informatics II, Proceeding of the Faculty of Electrical Engineering and Informatics of the Technical University of Koice, pp , Košice, ISBN , [11] F. Jakab, J. Giertl, R. Jakab, M. Kaščák, Improving Efficiency and Manageability in IPFIX Network Monitoring Platform Proc. of the 6th International Network Conference, INC 2006, Plymouth, UK, , University of Plymouth, pp , ISBN , [12] T. Mihok, J. Giertl, M. Révés, A. Pekár, P. Feciľak, System for Centralized Management of the BasicMeter Tool IP Networking 1 Theory and Practice, Žilina, [13] The PostgreSQL Global Developement Group (2011), PostgreSQL Documentation, [Online]. Available: [14] J. Quittek, S. Bryant, B. Claise, P. Aitken, J. Meyer, Information Model for IP Flow Information Export, RFC 5102, [15] S. Chaudhuri, U. Dayal, An Overview of Data Warehousing and OLAP Technology, ACM SIGMOD Record, Volume 26 Issue 1, [16] K. Bandarupalli (2010), Importance of Data Warehousing and its Design, [Online]. Avaliable: [17] C.T. Hammergren, A. Simon, Data Warehousing For Dummies, Wiley, pp , [18] W.H. Inmon, Building the Data Warehouse, Wiley, pp. 3 9, [19] R. Kimball, The Data Warehouse Toolkit, pp , [20] J. Quittek, T. Zseby, B. Claise, S. Zander, Requirements for IP Flow Information Export (IPFIX), RFC 3917, 2004.
A Review of the Measuring Platform
Measuring Platform Architecture Based on the IPFIX Standard Alžbeta Kleinová, Anton Baláž, Jana Trelová, Norbert Ádám Department of Computers and Informatics, Technical University of Košice Letná 9, 042
More informationIssues in the Passive Approach of Network Traffic Monitoring
Issues in the Passive Approach of Network Traffic Monitoring Adrián Pekár, Eva Chovancová, Peter Fanfara and Jana Trelová Department of Computers and Informatics, Faculty of Electrical Engineering and
More informationHow To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, paul.moceri@gmail.com Abstract The growing
More informationBUILDING OLAP TOOLS OVER LARGE DATABASES
BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,
More informationStudy of Network Performance Monitoring Tools-SNMP
310 Study of Network Performance Monitoring Tools-SNMP Mr. G.S. Nagaraja, Ranjana R.Chittal, Kamod Kumar Summary Computer networks have influenced the software industry by providing enormous resources
More information5.5 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall. Figure 5-2
Class Announcements TIM 50 - Business Information Systems Lecture 15 Database Assignment 2 posted Due Tuesday 5/26 UC Santa Cruz May 19, 2015 Database: Collection of related files containing records on
More informationAn Introduction to Data Warehousing. An organization manages information in two dominant forms: operational systems of
An Introduction to Data Warehousing An organization manages information in two dominant forms: operational systems of record and data warehouses. Operational systems are designed to support online transaction
More informationA Framework for Developing the Web-based Data Integration Tool for Web-Oriented Data Warehousing
A Framework for Developing the Web-based Integration Tool for Web-Oriented Warehousing PATRAVADEE VONGSUMEDH School of Science and Technology Bangkok University Rama IV road, Klong-Toey, BKK, 10110, THAILAND
More informationData Warehousing: A Technology Review and Update Vernon Hoffner, Ph.D., CCP EntreSoft Resouces, Inc.
Warehousing: A Technology Review and Update Vernon Hoffner, Ph.D., CCP EntreSoft Resouces, Inc. Introduction Abstract warehousing has been around for over a decade. Therefore, when you read the articles
More informationSIP Registration Stress Test
SIP Registration Stress Test Miroslav Voznak and Jan Rozhon Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15/2172, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.voznak@vsb.cz,
More informationBusiness Intelligence in E-Learning
Business Intelligence in E-Learning (Case Study of Iran University of Science and Technology) Mohammad Hassan Falakmasir 1, Jafar Habibi 2, Shahrouz Moaven 1, Hassan Abolhassani 2 Department of Computer
More informationPractical Experience with IPFIX Flow Collectors
Practical Experience with IPFIX Flow Collectors Petr Velan CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic petr.velan@cesnet.cz Abstract As the number of Internet applications grows, the number
More informationPANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
More informationCisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
More informationHETEROGENEOUS DATA TRANSFORMING INTO DATA WAREHOUSES AND THEIR USE IN THE MANAGEMENT OF PROCESSES
HETEROGENEOUS DATA TRANSFORMING INTO DATA WAREHOUSES AND THEIR USE IN THE MANAGEMENT OF PROCESSES Pavol TANUŠKA, Igor HAGARA Authors: Assoc. Prof. Pavol Tanuška, PhD., MSc. Igor Hagara Workplace: Institute
More informationNetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
More informationQOS IN NETWORK TRAFFIC MANAGEMENT
24 Acta Electrotechnica et Informatica, Vol. 10, No. 4, 2010, 24 28 QOS IN NETWORK TRAFFIC MANAGEMENT Peter FECIĽAK, Katarína KLEINOVÁ, Jozef JANITOR Department of Computers and Informatics, Faculty of
More informationPANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
More informationFigure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854).
1 perfsonar tools evaluation 1 The goal of this PSNC activity was to evaluate perfsonar NetFlow tools for flow collection solution and assess its applicability to easily subscribe and request different
More informationStandardization Activities (IPFIX, PSAMP) Tanja Zseby
Standardization Activities (IPFIX, PSAMP) Tanja Zseby IP Flow Information Export (IPFIX) oal: Find or develop a protocol for exporting IP traffic flow information from routers and probes Metering to be
More informationFoundations of Business Intelligence: Databases and Information Management
Chapter 5 Foundations of Business Intelligence: Databases and Information Management 5.1 Copyright 2011 Pearson Education, Inc. Student Learning Objectives How does a relational database organize data,
More informationReducing ETL Load Times by a New Data Integration Approach for Real-time Business Intelligence
Reducing ETL Load Times by a New Data Integration Approach for Real-time Business Intelligence Darshan M. Tank Department of Information Technology, L.E.College, Morbi-363642, India dmtank@gmail.com Abstract
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationNemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
More informationRedefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
More informationB.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
More informationIntegrating Business Intelligence Module into Learning Management System
Integrating Business Intelligence Module into Learning Management System Mario Fabijanić and Zoran Skočir* Cognita Address: Radoslava Cimermana 64a, 10020 Zagreb, Croatia Telephone: 00 385 1 6558 440 Fax:
More informationNetQoS Delivers Distributed Network
Behind the Scenes with MySQL NetQoS Delivers Distributed Network Management Solution with Embedded MySQL NetQoS delivers products and services that enable some of the world s most demanding enterprises
More informationComprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar kosnar@cesnet.cz CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
More informationViete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
More informationTechnology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Copyright 2015 Pearson Education, Inc. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright 2015 Pearson Education, Inc. Technology in Action Chapter 9 Behind the
More informationIndexing Techniques for Data Warehouses Queries. Abstract
Indexing Techniques for Data Warehouses Queries Sirirut Vanichayobon Le Gruenwald The University of Oklahoma School of Computer Science Norman, OK, 739 sirirut@cs.ou.edu gruenwal@cs.ou.edu Abstract Recently,
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationPERFORMANCE EVALUATION OF DATABASE MANAGEMENT SYSTEMS BY THE ANALYSIS OF DBMS TIME AND CAPACITY
Vol.2, Issue.2, Mar-Apr 2012 pp-067-072 ISSN: 2249-6645 PERFORMANCE EVALUATION OF DATABASE MANAGEMENT SYSTEMS BY THE ANALYSIS OF DBMS TIME AND CAPACITY Aparna Kaladi 1 and Priya Ponnusamy 2 1 M.E Computer
More informationReal Life Performance of In-Memory Database Systems for BI
D1 Solutions AG a Netcetera Company Real Life Performance of In-Memory Database Systems for BI 10th European TDWI Conference Munich, June 2010 10th European TDWI Conference Munich, June 2010 Authors: Dr.
More informationUnified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
More informationIn-memory databases and innovations in Business Intelligence
Database Systems Journal vol. VI, no. 1/2015 59 In-memory databases and innovations in Business Intelligence Ruxandra BĂBEANU, Marian CIOBANU University of Economic Studies, Bucharest, Romania babeanu.ruxandra@gmail.com,
More information1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3
Contents 1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 2.1. SERVER-BASED COMPONENTS:... 3 2.1.1. Interception Server... 3 2.1.2. Database server... 3 2.1.3. Data processing server... 3 2.1.3.1. Search
More informationFluke Networks NetFlow Tracker
Fluke Networks NetFlow Tracker Quick Install Guide for Product Evaluations Pre-installation and Installation Tasks Minimum System Requirements The type of system required to run NetFlow Tracker depends
More informationAnalyze hop-by-hop path, devices, interfaces, and queues Locate and troubleshoot problems
Visualization, Management, and Control for Cisco IWAN Data sheet Overview Intelligent WAN is a Cisco solution that enables enterprises to realize significant cost savings by moving to less expensive transport
More informationNetwork Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
More informationPlanning the Installation and Installing SQL Server
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
More informationCisco IPS Manager Express
Cisco IPS Manager Express Product Overview Intrusion prevention systems (IPSs) are critical to protecting your network and assets against worms, Trojans, and other malicious attacks. Cisco IPS Manager
More informationIntroducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
More informationReverse Engineering in Data Integration Software
Database Systems Journal vol. IV, no. 1/2013 11 Reverse Engineering in Data Integration Software Vlad DIACONITA The Bucharest Academy of Economic Studies diaconita.vlad@ie.ase.ro Integrated applications
More informationNetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com
NetFlow Tracker Overview Mike McGrath x ccie CTO mike@crannog-software.com 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
More informationFlow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City murali@ncb.ernet.in Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
More informationRecommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
More informationBusiness Value Reporting and Analytics
IP Telephony Contact Centers Mobility Services WHITE PAPER Business Value Reporting and Analytics Avaya Operational Analyst April 2005 avaya.com Table of Contents Section 1: Introduction... 1 Section 2:
More informationDesigning an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract)
Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract) Johann Eder 1, Heinz Frank 1, Tadeusz Morzy 2, Robert Wrembel 2, Maciej Zakrzewicz 2 1 Institut für Informatik
More informationMeasuring the Impact of Security Protocols for Bandwidth
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 131-137 MEACSE Publications http://www.meacse.org/ijcar Measuring the Impact of Security
More informationEFFECTS OF BUSINESS INTELLIGENCE APPLICATION IN TOLLING SYSTEM
DOI: http://dx.doi.org/10.7708/ijtte.2015.5(1).06 UDC: 629.7.051 EFFECTS OF BUSINESS INTELLIGENCE APPLICATION IN TOLLING SYSTEM Gordana Radivojević 1,2, Bratislav Lazić 2, Gorana Šormaz 3 1 University
More informationSQL Server Integration Services with Oracle Database 10g
SQL Server Integration Services with Oracle Database 10g SQL Server Technical Article Published: May 2008 Applies To: SQL Server Summary: Microsoft SQL Server (both 32-bit and 64-bit) offers best-of breed
More informationChapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya
Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data
More informationA Design and implementation of a data warehouse for research administration universities
A Design and implementation of a data warehouse for research administration universities André Flory 1, Pierre Soupirot 2, and Anne Tchounikine 3 1 CRI : Centre de Ressources Informatiques INSA de Lyon
More informationETL-EXTRACT, TRANSFORM & LOAD TESTING
ETL-EXTRACT, TRANSFORM & LOAD TESTING Rajesh Popli Manager (Quality), Nagarro Software Pvt. Ltd., Gurgaon, INDIA rajesh.popli@nagarro.com ABSTRACT Data is most important part in any organization. Data
More informationApplication Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationScalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
More informationSIP Infrastructure Performance Testing
SIP Infrastructure Performance Testing MIROSLAV VOZNAK, JAN ROZHON Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15, Ostrava CZECH REPUBLIC miroslav.voznak@vsb.cz,
More informationQuickDB Yet YetAnother Database Management System?
QuickDB Yet YetAnother Database Management System? Radim Bača, Peter Chovanec, Michal Krátký, and Petr Lukáš Radim Bača, Peter Chovanec, Michal Krátký, and Petr Lukáš Department of Computer Science, FEECS,
More informationSQL Server 2012 Business Intelligence Boot Camp
SQL Server 2012 Business Intelligence Boot Camp Length: 5 Days Technology: Microsoft SQL Server 2012 Delivery Method: Instructor-led (classroom) About this Course Data warehousing is a solution organizations
More informationWireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology cwhite@riverbed.com SHARKFEST
More informationDNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.
DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: dna@danwood.com Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com
More informationSolarWinds Technical Reference
SolarWinds Technical Reference Best Practices for Troubleshooting NetFlow Introduction... 1 NetFlow Overview... 1 Troubleshooting NetFlow Service Status Issues... 3 Troubleshooting NetFlow Source Issues...
More informationFileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
More informationBeyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
More informationHigh-Volume Data Warehousing in Centerprise. Product Datasheet
High-Volume Data Warehousing in Centerprise Product Datasheet Table of Contents Overview 3 Data Complexity 3 Data Quality 3 Speed and Scalability 3 Centerprise Data Warehouse Features 4 ETL in a Unified
More informationRocky Mountain Technology Ventures. Exploring the Intricacies and Processes Involving the Extraction, Transformation and Loading of Data
Rocky Mountain Technology Ventures Exploring the Intricacies and Processes Involving the Extraction, Transformation and Loading of Data 3/25/2006 Introduction As data warehousing, OLAP architectures, Decision
More informationFileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationAn Approach for Facilating Knowledge Data Warehouse
International Journal of Soft Computing Applications ISSN: 1453-2277 Issue 4 (2009), pp.35-40 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ijsca.htm An Approach for Facilating Knowledge
More informationSignature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
More informationCONCEPTUAL FRAMEWORK OF BUSINESS INTELLIGENCE ANALYSIS IN ACADEMIC ENVIRONMENT USING BIRT
CONCEPTUAL FRAMEWORK OF BUSINESS INTELLIGENCE ANALYSIS IN ACADEMIC ENVIRONMENT USING BIRT Julaily Aida Jusoh, Norhakimah Endot, Nazirah Abd. Hamid, Raja Hasyifah Raja Bongsu, Roslinda Muda Faculty of Informatics,
More informationNetFlow Analysis with MapReduce
NetFlow Analysis with MapReduce Wonchul Kang, Yeonhee Lee, Youngseok Lee Chungnam National University {teshi85, yhlee06, lee}@cnu.ac.kr 2010.04.24(Sat) based on "An Internet Traffic Analysis Method with
More informationSystem Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
More informationIntegrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
More informationWhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
More informationGaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
More informationRepublic Polytechnic School of Information and Communications Technology C355 Business Intelligence. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C355 Business Intelligence Module Curriculum This document addresses the content related abilities, with reference to the module.
More informationPort and Container Terminal Analytics
Port and Container Terminal Analytics Contents 1. Goals and Tasks... 2 2. Proposed Architecture... 3 3. Functionality... 4 3.1. Reports... 4 3.2. Freight turnover analysis... 5 3.3. Port operations analysis...
More informationQAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationTowards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
More informationPastel Evolution BIC. Getting Started Guide
Pastel Evolution BIC Getting Started Guide Table of Contents System Requirements... 4 How it Works... 5 Getting Started Guide... 6 Standard Reports Available... 6 Accessing the Pastel Evolution (BIC) Reports...
More informationWhen to consider OLAP?
When to consider OLAP? Author: Prakash Kewalramani Organization: Evaltech, Inc. Evaltech Research Group, Data Warehousing Practice. Date: 03/10/08 Email: erg@evaltech.com Abstract: Do you need an OLAP
More informationUsing The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
More informationIAF Business Intelligence Solutions Make the Most of Your Business Intelligence. White Paper November 2002
IAF Business Intelligence Solutions Make the Most of Your Business Intelligence White Paper INTRODUCTION In recent years, the amount of data in companies has increased dramatically as enterprise resource
More informationData Warehouse: Introduction
Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of base and data mining group,
More informationFileMaker 13. ODBC and JDBC Guide
FileMaker 13 ODBC and JDBC Guide 2004 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
More informationOBSERVEIT DEPLOYMENT SIZING GUIDE
OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides
More informationWHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
More informationDBMS / Business Intelligence, SQL Server
DBMS / Business Intelligence, SQL Server Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.
More informationHow good can databases deal with Netflow data
How good can databases deal with Netflow data Bachelorarbeit Supervisor: bernhard fabian@net.t-labs.tu-berlin.de Inteligent Networks Group (INET) Ernesto Abarca Ortiz eabarca@net.t-labs.tu-berlin.de OVERVIEW
More informationMonitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session
More informationProcessing of Flow Accounting Data in Java: Framework Design and Performance Evaluation
Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation Jochen Kögel and Sebastian Scholz Institute of Communication Networks and Computer Engineering (IKR) University of
More informationn Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment 2 posted n Due Thursday 2/26
Class Announcements TIM 50 - Business Information Systems Lecture 14 Instructor: John Musacchio UC Santa Cruz n Assignment 4 n Due Thursday 2/19 n Business paper draft n Due Tuesday 2/24 n Database Assignment
More informationFirewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
More informationHadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
More informationNetwork Security Analysis by Using Business Intelligence
Network Security Analysis by Using Business Intelligence Wei-Yu Chen, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu Abstract Network devices including firewall, QoS, Anti-Virus wall,
More informationData warehouses. Data Mining. Abraham Otero. Data Mining. Agenda
Data warehouses 1/36 Agenda Why do I need a data warehouse? ETL systems Real-Time Data Warehousing Open problems 2/36 1 Why do I need a data warehouse? Why do I need a data warehouse? Maybe you do not
More information