Gigascope: A Stream Database for Network Applications
|
|
|
- Tobias Quinn
- 10 years ago
- Views:
Transcription
1 Gigascope: A Stream Database for Network Applications Chuck Cranor, Theodore Johnson, Oliver Spataschek AT&T Labs Research Vladislav Shkapenyuk Dept. of Computer Science, CMU [email protected] ABSTRACT We have developed Gigascope, a stream database for network applications including traffic analysis, intrusion detection, router configuration analysis, network research, network monitoring, and and performance monitoring and debugging. Gigascope is undergoing installation at many sites within the AT&T network, including at OC48 routers, for detailed monitoring. In this paper we describe our motivation for and constraints in developing Gigascope, the Gigascope architecture and query language, and performance issues. We conclude with a discussion of stream database research problems we have found in our application. 1. INTRODUCTION Managing a very large data communications network requires constant network monitoring. IP networks are difficult to manage (a side effect of their decentralized nature), protocols and services are becoming more complex (MPLS, VPNs, multimedia, etc.), and network attacks are common. Most network analysis is done via ad-hoc tools on network trace dumps, often resulting in severe data management problems. High speed (gigabit and higher) network monitoring tools are available, but they are inflexible in the types of reports they generate. Our goal in designing Gigascope was to develop a network data analysis tool which has the speed and flexibility that network analysts require, but which provides a structured querying environment to make complex analysis tractable. We also wanted Gigascope to be adaptible enough that it could be used as the primary data analysis engine in many settings: traffic analysis, performance monitoring and debugging, protocol analysis and development, router configuration (e.g. BGP monitoring), network attack and intrusion detection and monitoring (e.g. distributed denial of service attacks), and various ad-hoc analyses. To a person in the database community, the need for a structured query environment and adaptibility is self-evident. What might not be so clear is the need for high performance and flexibility. Network analysts tend to be (justifiably) suspicious of using a DBMS for their analysis engine. One significant problem is performance. Even with the high degree of sampling and aggregation in Netflow Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGMOD 2003, June 9-12, 2003, San Diego, CA. Copyright 2003 ACM X/03/06...$5.00. records (traffic summaries produced by routers) the AT&T IP backbone alone generates 500 Gbytes of data per day (about ten billion fifty byte records). A further problem is that certain portions of the analysis can be very complicated. Many analyses require that a network protocol be simulated, e.g. IP defragmentation or reconstructing TCP sessions. Network analysts have developed special fast algorithms and software to overcome these problems, and are loathe to risk their work on systems which in the past have proven to be slow and inflexible. Nevertheless, severe data management problems persist. In our interactions with network analysts, we observed that most of their analyses could be expressed as a sequence of SQL queries. Furthermore, data analysis is best done close to the data source to reduce the data volume as soon as possible. Furthermore, if the analysis could be done on-the-fly, we could offer capabilities that current methods cannot provide. We therefore decided that Gigascope [4] should be a lightweight stream query processing system which is at least as fast as a hand-written system and which allows the user to bypass the query system as needed, but which provides sophisticated query and data management facilities. Stream databases have recently become a popular research topic. We refer the interested reader to the recent survey by Babcock et al. [1], which space constraints do not allow us to repeat here. Much of the recent work on stream databases use a continuous query model, evaluated over a sliding window (e.g., the query language proposed in [1]). Our query system is different, being a pure stream query processing system more akin to Tribeca [6]. Unlike Tribeca the Gigascope uses an SQL-like language (GSQL) rather than a procedural language to express its queries, allowing query composition and query optimization. 2. QUERY LANGUAGE The Gigascope query language, GSQL, is a pure stream query language with SQL-like syntax (being mostly a restriction of SQL). That is, all inputs to a GSQL are streams, and the output is a data stream. We feel that this choice (akin to that made by Tribeca and Hancock) allows for precise query semantics, enables the composition of comples query processing, and simplifies the implementation of fast operators. The query model used by most of the recently proposed stream database systems is that of a continuous query over a sliding window of the data stream. While this model has some advantages (e.g., presentation of results to the end user) and some areas of best application (e.g. sensor networks), we felt that the continuous query model to be inappropriate for network data analysis. One significant problem is that the continuous query model makes query composibility difficult. The input to a query is one or more data streams, but the output is a (continuously changing) table. Queries
2 can still be composed (i.e., can use the output of as its input), but the differences in the output of must be often reverse interpreted as a data stream. A second problem is the difficulty of precisely expressing a query or conversely, understanding what a query means. Let us consider example query Q3 from [1]: (Select Count(*) From C, B Where C.src=B.src and C.dest=B.dest and C.id=B.id) / (Select Count(*) from B) This query is intended to identify fraction of traffic in the backbone B which can be attributed to a customer network C. However the semantics of the result are not clear. Since the output is used for monitoring, the intended result is not likely to be the evaluation of the query over the entire stream, rather over some recent window. However, the window is not specified, and there are in fact three windows to specify (two in the first subquery, one in the second). The snapshots taken by these three subqueries must be precisely synchronized (but on what is not specified), else the result is erratic and meaningless. If the respective windows are defined by a number of tuples rather than by time, the three windows will certainly be unsynchronized. Although example Q3 appears to be simple, an examination of the evaluation details shows that the semantics are complex. We note that examples Q1 and Q2 in [1] make explicit references to timestamps, while the queries in section 5.1 make explicit or default references to sliding window sizes. A final reason to use a pure stream query rather than a continuous query model is the simplicity of implementation. Rather than transforming the input data stream into a windowed table, we can operate on the data stream directly. 2.1 Ordered Attributes One concern in a stream database language is that of blocking operators. While some operators (such as selection and projection) need no state other than the tuple being processed, other operators (such as aggregation and join) potentially require their entire inputs before a single output can be produced. One approach to bounding the state is to use sliding windows [1]. Instead, our approach will be to analyze the timestamps of the input stream(s) and the properties of the query to determine a query plan which bounds the state required to evaluate blocking operators. We observed that network analysis data generally contains one or more timestamps or sequence numbers, that these timestamps generally increase (or decrease) with the ordinal position of a tuple in a stream, and that almost all queries make reference to these timestamps. We therefore adopt an approach similar to that of a sequence database. However, a sequence database model has a couple of limitations which make it impractical for our application. First, network data streams often have several timestamps and sequence numbers, and they might not be monotonically increasing with the ordinal position of the tuple in the stream. For a simple example, Netflow records have a start and an end timestamp. A stream of Netflow records produced by a router will have monotonically increasing end timestamps, and generally (but not monotonically) increasing start timestamps. Further, most queries on Netflow data will refer to the start timestamp rather than the end timestamp. The notion of sequence is further perturbed by operators such as join and aggregation. Second, network analysis queries naturally involve predicates and other references to the timestamps and sequence numbers, but not to the ordinal position of a tuple in its stream. We make use of timestamps and sequence numbers by defining them to be ordered attributes having ordering properties. These properties might be inherent in the data source, or might be due to processing by an operator. Below is a illustrative but nonexhaustive set of ordering properties: 1. Strictly/monotonically increasing/decreasing expresses the usual notion of a timestamp. 2. Monotone nonrepeating is a generalization of monotone increasing, and might occur due to a hash function (e.g. Q2 in [1]). 3. Increasing in group : This property states that among the tuples defined by the field in, the attribute is increasing. This property can occur after aggregation. For example, the start time of a Netflow record (an aggregation of packets) is increasing in group sourceip,destip,sourceport,destport,protocol. We might need to modify these definitions to account for almostsorted input. For example, Netflow records are sorted on the end time, and all Netflow records are dumped every 30 seconds. Therefore the start time of a record is always within 30 seconds of the high water mark, i.e. the start attribute is banded-increasing(30 sec.). We use the ordering attributes to turn blocking operators into stream operators. In the current implementation of Gigascope, we use the monotone increasing property as follows: Join : The join predicate must contain constraint on an ordered attribute from each table which can be used to define a join window. For example, B.ts=C.ts or B.ts C.ts-1 and B.ts C.ts+1. Group-by and aggregation : The group key must contain at least one ordered attribute. When a tuple arrives for aggregation whose ordered attribute is larger than that in any current group, we can deduce that all of the current groups are closed and will receive no further updates in the future. All of the closed groups are flushed to the output. The Gigascope data definition language allows the user to specify special properties of the attributes in a source stream, including the ordering properties. The query processing system will impute ordering properties of the output of query operators. For example, suppose that attribute is monotonically increasing and a projection operator computes the value as one of the attributes in its output. We can impute that is also monotonically increasing. We can perform similar reasoning for the group-by/aggregation operator. The ordering property imputation for the join operator is more complex, and depends on the constraints in the join predicate and the particular join algorithm selected. For example, if B.ts and are monotonically increasing, B.ts is in the output, and the join predicate contains the constraint B.ts=C.ts, then B.ts in the output will be monotonically increasing. If the constraint is B.ts C.ts-1 and B.ts C.ts+1, then in the output B.ts might be monotonically increasing or banded-increasing(2) depending on the choice of join algorithm (monotonically increasing requires more buffer space). 2.2 The GSQL Language GSQL is a SQL-like stream database language, being mostly a restriction of SQL but with some stream database extensions. Currently GSQL supports selection, join, aggregation, and stream merge (discussed below). Join queries are currently restricted to two-stream joins, and the join predicate must include a constraint
3 which defines a window on ordered attributes from both streams. Aggregation queries should have at least one ordered attribute as a one of the group-by keys, but this restriction is not enforced (the user can obtain output by flushing the query). All queries operate over streams, which come in two flavors: Protocols 1 and Streams. A Protocol is a data stream generated by interpreting a sequence of data packets which are presented to the Gigascope run time system. These data packets can be from any reasonable source IP packets transported via OC48, Netflow packets, BGP updates, etc. The Gigascope run time system interprets the data packets as a collection of fields using a library of interpretation functions. The schema of a Protocol stream maps field names to the interpretation functions to invoke. A Stream is the output of Gigascope query. The fields of its tuples are packed in a standard fashion. A Protocol defines a mechanism for interpreting a data source, but not what serves as the data source (whereas the source of a Stream is the output of a query). To completely specify a data source, the Protocol must be bound to an Interface a symbolic name which the run time system can bind to a source of packets (if no Interface is given, a default Interface is implied). An example which reports the destination IP and port, and a timestamp from TCP packets on eth0 (the first Ethernet interface card) is: DEFINE query name tcpdest0; Select destip, destport, time From eth0.tcp Where IPVersion = 4 and Protocol = 6 The DEFINE section of a query allows the user to set properties of the query. In this case, the query name is set to tcpdest0. A user application or another GSQL query can read the output of tcpdest0 by specifying it in the From clause. GSQL contains an extension to SQL, the merge operator, which is a Union operator which preserves the ordering properties of an attribute. For an example of a merge query, suppose that we have a tcpdest1 which matches tcpdest0 except that it reads from Interface eth1: DEFINE query name tcpdest; Merge tcpdest0.time : tcpdest1.time From tcpdest0, tcpdest1 The merge operator allows us to combine streams from multiple sources into a single stream. This operator is surprisingly important we implemented it before the join operator. We developed Gigascope to monitor optical links, which are usually simplex rather than duplex. To obtain a full view of the traffic on a logical link, we need to monitor two interfaces and merge the resulting streams. This query illustrates another feature of GSQL, namely the ease with which queries can be composed into a complex processing chain. GSQL currently supports nested subqueries through this mechanism only, but supporting subqueries in the FROM clause requires only an update of the parser. GSQL supports the join of two streams as long as it can determine a join window from the join predicates. However, GSQL does not currently support the join of a stream to a non-stream relation. Instead GSQL provides support for user-written functions which can act as special types of (foreign key) joins. These have worked so well in practice that supporting non-stream tables in GSQL has become a low priority. Users can make new functions available by adding the code for the function to the function library, and registering the function prototype in the function registry. In the function registry, the function 1 This word was chosen because of its connotations to the endusers. can be marked as a partial function, meaning that it might not return a value. The processing is the same as if there is no result from a join the tuple being processed is discarded. One or more of the parameters of the function can be marked as pass by handle. These parameters (which must be literals or query parameters) require expensive pre-processing before the function can use them, for example a regular expression to be compiled. Lets consider an example: Select peerid, tb, count(*) FROM tcpdest Group by time/60 as tb, getlpmid(destip, peerid.tbl ) as peerid The attribute time is a 1-second granularity timer, so time/60 defines minute-long buckets (when group with a new value of tb is produced, all of the pre-existing groups are closed, and therefore are flushed to the output stream). The getlpmid function performs longest prefix matching that is, it identifies which subnet an IP address belongs to. Longest prefix matching is a common network analysis activity, and researchers have developed special fast algorithms for it, which getlpmid implements. The second parameter is a pass-by-handle parameter, which indicates a file containing the prefixes of the autonomous systems (AS) of AT&T IP peers (i.e., obtained from a routing table). When the query is first invoked, the parameter handle registration function reads this file and builds a special in-memory for the function (the parameter handle ties this table to the function invocation). This example illustrates one of the design principles of Gigascope, that it adapt to the needs of network analysts. If we could not support the special algorithms that they have developed, Gigascope would be rejected as slow and inflexible. 3. ARCHITECTURE The central component of Gigascope is a stream manager which tracks the query nodes that can be activated. Query nodes (for example, tcpdest would be a query node) are processes. When they are started, they register themselves with the registry of the stream manager. When a user application or query node needs to subscribe the output of a query, it submits the query name to the registry and receives a query handle in return. The process then contacts the query node to set up communication (through shared memory). The stream manager does not track the connection further (which has positive and negative aspects). The GSQL processor is actually a code generator. A GSQL query is analyzed then translated into either C code or C++ code (the split is discussed below). While a code generation approach results in some loss of flexibility, our experiences with Daytona [5] have shown that it is capable of producing the fastest system. The generated code interfaces with an API to perform tasks such as registering itself, accessing source streams, and accepting and producing tuples. Users can write their own query nodes to implement special operators by following this API. For example, we have implemented a special IP defragmentation operator in this manner and have built a query tree using it. The ability to bypass the existing query system when necessary is a critical flexibility in our application domain. Optimizations GSQL optimizes its queries by rearranging the query plan, and by low-level optimizations on the generated code. One significant optimization technique is to push the query as far down the processing stack as possible, even into the network interface card (NIC) itself. This is accomplished in part by breaking queries into high level query nodes (HFTAs) and low level query
4 nodes (LFTAs) 2. All HFTAs accept only Stream input and exist as separate processes, while LFTAs accept only Protocol input and are linked into the stream manager. One reason for this separation is library convenience the LFTAs must make use of source data packet interpretation libraries which are linked into the stream manager run time system. However, the split is also a performance optimization. The LTAs are lightweight queries which perform preliminary filtering, projection, and aggregation. By linking them into the RTS, these preliminary queries can be evaluated without additional data transfers, and greatly reduce the data traffic to the HFTAs. To an application LFTAs and HFTAs look identical, and in fact a simple query can execute entirely as an LFTA. If the GSQL processor splits a query into an HFTA and an LFTA component, both streams are available to the application, though the LFTA query will have a mangled name. Depending on the capabilities of the NIC, Gigascope can perform further optimizations. If the NIC has an appropriate RTS, we execute the LFTAs inside the NIC. Other NICS allow us to specify a bpf (berkley packet filter) preliminary filter, and to specify the number of bytes of qualifying packets (the snap length ) to be returned (that is, we can push a simple selection/projection operator into the NIC). An LFTA can perform aggregation, but it uses a small directmapped hash table. Hash table collisions result in a tuple computed from the ejected group being written to the output stream. Because of temporal locality, aggregation even with a small hash table is effective in early data reduction. An aggregation LFTA will feed its results to an HFTA, which completes the aggregation. This processing is similar to that of subaggregates and superaggregates used in data cube computation algorithms. This aggregate query splitting optimization was one of our motivations to build Gigascope as a pure stream database, because its basic optimizations create networks of queries over streams. Because LFTAs and lower level components are linked into the RTS, and possibly into the NIC, all queries which generate LF- TAs must be submitted in a batch. Changing the set of LFTAs requires that the query system be stopped, the RTS changed, and then restarted. However new HFTAS can be submitted at any point. To increase the flexibility of the system queries can accept query parameters, which are similar to constants but which are specified at query instantiation time and which can be changed on-the-fly. The RTS can execute multiple instances of the same LFTA, each with different parameters. The architecture decision to link the LFTAs into the RTS introduces some inflexibility into Gigascope (mitigated somewhat by query parameters and the fact that we can change the RTS in seconds). However, it produces a signicant benefit. By the lightweight design, the query plan and code generation optimizations, and the earliest possible reduction of data flowing in the system, Gigascope executes as fast as hand-written analysis code (and often much faster). Unblocking Operators As discussed in Section 2.1, GSQL uses ordering properties of attributes of a stream to make non-blocking implementations of operators such as join, merge, and aggregation by defining the window on the streams over which the query must execute. However, operators over multiple streams (merge and join) can still block if one of the input streams is slow in providing tuples perhaps because the slow stream is a naturally low volume one. Consider the merge query in Section 2.2. If tcpdest0 produces 100Mbytes of data per second while tcpdest1 produces 2 FTA stands for Filtering, Transformation, and Aggregation. This is another example of avoiding database jargon and adopting instead network analysis language. one tuple per minute, we are likely to overflow the merge buffers (network traffic is notoriously bursty in this manner). The problem is that the presence of a tuple allows us to advance the window over which a query operates, but we do not get this information in the absence of a tuple. To overcome this problem, we use a mechanism similar to the one proposed by [7]. of injecting ordering update tokens into the query stream. These tokens contain lower bounds on the ordering attributes in the stream. While these tokens are injected periodically by [7], we are experimenting with an on-demand system (i.e., if an operator detects that it might be blocked). 4. PERFORMANCE CONSIDERATIONS The performance measure for a stream database system is not how fast it can produce answers, but rather how high the data rate can be on its input stream(s) before it starts dropping tuples? This point is well expressed in [2]. To test several performance alternatives we wrote a collection of queries to compute the fraction of port 80 traffic which is due to the HTTP protocol (port 80 is used to tunnel through firewalls). This is done by comparing a count of all packets on port 80 with a count of packets on port 80 whose data payload matches the regular expression ˆ[ˆ\\n]*HTTP/1.*. That is, expensive processing is required for the evaluation of this query. Regular expression finding is too expensive for an LFTA, so the filter query was split into an LFTA which filters TCP packets on port 80, and an HFTA part which perform the regular expression matching. We ran our experiment using a 733 Mhz processor, 2GB of memory, and a Tigon gigabit ethernet card. We generated 60 Mbit/sec of port 80 traffic, and additional background traffic to vary the data rates. We tried four approaches 1) dumping the data to disk for post-facto analysis, 2) reading data from the ethernet card using libpcap, then discarding the packet (best case processing), 3) Running Gigascope with the LFTAs executing in the host (i.e., reading from libpcap), and 4) running Gigascope with the LFTAs executing on the Tigon gigabit ethernet card. We chose a 2% packet drop rate as the maximum acceptable loss. Option 4) (LFTAs on the NIC) had the best performance, with less than a 2% loss rate even with a 610 Mbit/sec traffic rate (the most that our router could handle). Options 2) and 3) had similar performance, managing 480 Mbit/sec before exceeding a 2% packet loss. At this point the system experienced interrupt livelock. Option 1), dumping the data to disk, had by far the worst performance with a packet loss rate exceeding 2% at only 180 Mbit/sec (dumping data to fast striped disks). While space constraints prevent us from a detailed discussion of the experiment, several points are clear: Early data reduction is critical for performance, and the earlier the better. Touching disk kills performance not because it is slow but because generates long and unpredictable delays throughout the system. Contrary to what has been written, an efficient stream database can execute complex queries over very high speed data streams. For example, in [1] the example query Q3 (repeated here in Section 2) is cited as a type of query which requires sampling and approximation. However the query in our experiment requires far more intensive processing, and even the libpcap trial only fails when interrupt livelock occurs. A sufficiently complex query workload will require sampling and approximation, but it is a technique of last resort.
5 In [2], the authors note that not all tuples are equally valuable and that some can be more readily dropped than others. The authors propose a scoring and scheduling mechanism to ensure quality of service. We concur with their position that some tuples are more valuable, but we use a simple heuristic which is easy to understand and implement: highly processed tuples (produced further in the query chain) are more valuable than less-processed tuples, because of the filters and aggregations that have been applied. [5] R. Greer. Daytona and the fourth-generation language cymbal. In Proc. SIGMOD Conf., pages , [6] M. Sullivan and A. Heybey. Tribeca: A system for managing large databases of network traffic. In Proc. USENIX Annual Technical Conf., [7] P. Tucker and D. Maier. Exploiting punctuation semantics for querying continuous data streams. In intl. Conf. Data Engineering, CONCLUSIONS We have developed Gigascope [4], a high performance stream database for network applications. Currently we have seven installations, most of which proide special network monitoring services for AT&T customers. Our largest scale deployment monitors application protocol performance over two Gigabit Ethernet links for one of our customers. At peak periods, Gigascope processes 1.2 million packets per second using an inexpensive dual 2.4 Ghz CPU server. At the time of writing, this application has been running for three months nonstop. Additional deployments throughout AT&T, including OC48 deployments, are in negotiations. By working closely with network analysts, we developed a system which is fast and flexible enough to satisfy their expectations. While SQL is not a familiar language to the analysts, they quickly appreciate the ease with which new monitoring tasks can be implemented. We have found that they soon start writing queries which make aggressive use of language features (the examples in 2.2 are simplified from an user s application) and start demanding more. Research Directions In the course of developing Gigascope, we have encountered several issues which we have deferred for future work. One issue is that our stream operators provide another dimension in optimization because the choice of operator implementation affects the attribute ordering properties of its output, which in turn affects the performance of downstream operators. Another issue is the proper use of sampling and approximation. Many query sets do not need these techniques, but when they are applied it must be integrated into the query language under the control of the analyst. While GSQL suffices for a large class of tasks, many network analysis queries find and aggregate subsequences of the data stream (i.e., extract the TCP/IP sessions). We are exploring how to integrate the complex group definition mechanisms described in [3] into GSQL. The most pressing issue, however, is expressing which streams are the source of the query. Our Interface.Protocol mechanism works for our current installations, but will not scale for the planned dozens to hundreds of deployments. Surprisingly, this issue has not received attention in the research literature. 6. REFERENCES [1] B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom. Models and issues in data stream systems. In Principles of Database Systems, pages 1 16, [2] D. Carney and et al. Monitoring streams - a new class of data management applications. In Proc. Intl. Conf. Ver Large Databases, [3] D. Chatziantoniou, M. Akinde, T. Johnson, and S. Kim. The MD-join: An operator for complex olap. In Proc. Inthl. Conf. on Data Engineering, pages , [4] C. Cranor, T. Johnson, V. Shkapenyuk, and O. Spatschek. Gigascope: High performance network monitoring with a SQL interface. Sigmod 2002 demonstration, 2002.
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman
Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman 2 In a DBMS, input is under the control of the programming staff. SQL INSERT commands or bulk loaders. Stream management is important
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
SAP HANA PLATFORM Top Ten Questions for Choosing In-Memory Databases. Start Here
PLATFORM Top Ten Questions for Choosing In-Memory Databases Start Here PLATFORM Top Ten Questions for Choosing In-Memory Databases. Are my applications accelerated without manual intervention and tuning?.
Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Physical Design. Phases of database design. Physical design: Inputs.
Phases of database design Application requirements Conceptual design Database Management Systems Conceptual schema Logical design ER or UML Physical Design Relational tables Logical schema Physical design
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
Design, Implementation, and Evaluation of Network Monitoring Tasks with the TelegraphCQ Data Stream Management System
Design, Implementation, and Evaluation of Network Monitoring Tasks with the TelegraphCQ Data Stream Management System INF5100, Autumn 2006 Jarle Content Introduction Streaming Applications Data Stream
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
Packet-based Network Traffic Monitoring and Analysis with GPUs
Packet-based Network Traffic Monitoring and Analysis with GPUs Wenji Wu, Phil DeMar [email protected], [email protected] GPU Technology Conference 2014 March 24-27, 2014 SAN JOSE, CALIFORNIA Background Main
Network Traffic Monitoring and Analysis with GPUs
Network Traffic Monitoring and Analysis with GPUs Wenji Wu, Phil DeMar [email protected], [email protected] GPU Technology Conference 2013 March 18-21, 2013 SAN JOSE, CALIFORNIA Background Main uses for network
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
2 Associating Facts with Time
TEMPORAL DATABASES Richard Thomas Snodgrass A temporal database (see Temporal Database) contains time-varying data. Time is an important aspect of all real-world phenomena. Events occur at specific points
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Network Traffic Monitoring & Analysis with GPUs
Network Traffic Monitoring & Analysis with GPUs Wenji Wu, Phil DeMar [email protected], [email protected] GPU Technology Conference 2013 March 18-21, 2013 SAN JOSE, CALIFORNIA Background Main uses for network
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?
18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic
MASSIF: A Highly Scalable SIEM
MASSIF: A Highly Scalable SIEM Ricardo Jimenez-Peris Univ. Politecnica de Madrid (UPM) [email protected] DEMONS Workshop Berlin, April 25 th 2012 MASSIF in a Nutshell MASSIF aims at developing the next
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
ZooKeeper. Table of contents
by Table of contents 1 ZooKeeper: A Distributed Coordination Service for Distributed Applications... 2 1.1 Design Goals...2 1.2 Data model and the hierarchical namespace...3 1.3 Nodes and ephemeral nodes...
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
Semester Thesis Traffic Monitoring in Sensor Networks
Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
A Sequence-Oriented Stream Warehouse Paradigm for Network Monitoring Applications
A Sequence-Oriented Stream Warehouse Paradigm for Network Monitoring Applications Lukasz Golab 1, Theodore Johnson 2, Subhabrata Sen 2, Jennifer Yates 2 1 University of Waterloo, Canada 2 AT&T Labs - Research,
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Web Application Security
Web Application Security Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http://www.cs.ucsb.edu/~rsg www.cs.ucsb.edu/~rsg/
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Firewalls. October 23, 2015
Firewalls October 23, 2015 Administrative submittal instructions answer the lab assignment s questions in written report form, as a text, pdf, or Word document file (no obscure formats please) email to
Optimizing TCP Forwarding
Optimizing TCP Forwarding Vsevolod V. Panteleenko and Vincent W. Freeh TR-2-3 Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556 {vvp, vin}@cse.nd.edu Abstract
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Data Mining for Knowledge Management. Mining Data Streams
Data Mining for Knowledge Management Mining Data Streams Themis Palpanas University of Trento http://dit.unitn.it/~themis Spring 2007 Data Mining for Knowledge Management 1 Motivating Examples: Production
Extending SANs Over TCP/IP by Richard Froom & Erum Frahim
Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending storage area networks (SANs) over a distance has become a necessity for enterprise networks. A single SAN island with one storage system
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
Masters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
Highly Available AMPS Client Programming
Highly Available AMPS Client Programming 60East Technologies Copyright 2013 All rights reserved. 60East, AMPS, and Advanced Message Processing System are trademarks of 60East Technologies, Inc. All other
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
Middleware support for the Internet of Things
Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement
Enabling Cloud Architecture for Globally Distributed Applications
The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.
Network Administration and Monitoring
Network Administration and Monitoring Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingengeria Politecnico di Milano barenghi - at - elet.polimi.it April 17, 2013 Recap What did we
Availability Digest. www.availabilitydigest.com. Raima s High-Availability Embedded Database December 2011
the Availability Digest Raima s High-Availability Embedded Database December 2011 Embedded processing systems are everywhere. You probably cannot go a day without interacting with dozens of these powerful
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
NetFlow probe on NetFPGA
Verze #1.00, 2008-12-12 NetFlow probe on NetFPGA Introduction With ever-growing volume of data being transferred over the Internet, the need for reliable monitoring becomes more urgent. Monitoring devices
Design of an Application Programming Interface for IP Network Monitoring
Design of an Application Programming Interface for IP Network Monitoring Evangelos P. Markatos Kostas G. Anagnostakis Arne Øslebø Michalis Polychronakis Institute of Computer Science (ICS), Foundation
Deploying ACLs to Manage Network Security
PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system
Network Payload Analysis for Advanced Persistent Threats Charles Smutz, Lockheed Martin CIRT
Network Payload Analysis for Advanced Persistent Threats Charles Smutz, Lockheed Martin CIRT 0000 7/6/2010 1 About Speaker Name Background Current Job Employer Education Charles Smutz Sysadmin, Networking,
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
Using In-Memory Computing to Simplify Big Data Analytics
SCALEOUT SOFTWARE Using In-Memory Computing to Simplify Big Data Analytics by Dr. William Bain, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T he big data revolution is upon us, fed
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
