A Plan for the Continued Development of the DNS Statistics Collector
|
|
- Malcolm Lambert
- 8 years ago
- Views:
Transcription
1 A Plan for the Continued Development of the DNS Statistics Collector Background The DNS Statistics Collector ( DSC ) software was initially developed under the National Science Foundation grant "Improving the Integrity of Domain Name System (DNS) Monitoring and Protection" (NSF grant SCI ), a joint project between the Cooperative Association for Internet Data Analysis (CAIDA) and the Internet Systems Consortium (ISC). Most of the work was performed by Duane Wessels of The Measurement Factory, Inc. (TMF) under subcontract with CAIDA. The software was actively developed between 2004 and During 2010 a few bugs have been fixed, but no new features added. The DSC intellectual property is jointly owned by TMF and ISC. TMF has publicly stated its desire to transfer its rights in DSC to the Domain Name System Operations Analysis and Research Center (DNS- OARC), contingent upon ISC also transferring its rights to DNS- OARC. DSC is in use at a number of Top- Level Domains and other large- scale DNS operations. A number of DNS- OARC members contribute DSC data to DNS- OARC. In October 2010 a number of DSC users and other interested parties met in Denver, Colorado to discuss DSC s future. General consensus of that meeting is that DSC development should continue, under the administration of DNS- OARC. The purpose of this document is to describe an initial work plan for enhancing DSC. Terminology, Description of Architecture, and Implementation Details DSC has a distributed design. COLLECTOR processes run at or very near DNS server software. The collector receives DNS messages via Unix packet capture (libpcap) facilities. DNS messages are analyzed and then enumerated into multiple DATASETS.
2 The collector outputs its datasets at 60- second intervals. Datasets are written to disk as an XML file. Datasets are then transmitted to one or more PRESENTERS, typically over SSH. A presenter receives datasets from multiple collectors. Incoming XML files are EXTRACTED and their contents appended to DAT- FILES. The presenter produces graphs via web interface by reading the dat- files. DSC stores data in a SERVER/NODE hierarchy. For example, consider DNS Root server with numerous anycast instances. The server may be equal to k.root- servers.net and the nodes equal to geographic locations, such as Amsterdam, Berlin, and Tokyo. Another approach is to equate the server name and the zone ( uk ) and then set node names equal to NS record names ( ns1.nic.uk, ns2.nic.uk, etc). The presenter also functions as a storage archive. The dat- files are kept indefinitely, while XML files are generally removed after 1-7 days. For some datasets there is no loss of information going from an XML file to a dat- file. For larger datasets, summarization occurs such that some time granularity is lost. The collector was designed to give DSC users the flexibility to create their own datasets. Datasets are defined in the collector s configuration file. However, the creation of a new dataset does not, unfortunately, automatically allow it to be displayed by a presenter. Adding new datasets (or graphs) to a presenter requires updates to the DSC source code. The collector is written in C and uses a third- party library that requires some C++ code. The collector s support scripts are written mostly in Bourne Shell, with one in Perl. The presenter code is written mostly in Perl, with a handful of Bourne Shell support scripts. What follows is a list of proposed DSC enhancements based on discussions that took place during the October meeting in Denver. DSC Architectural Enhancements Server/Node - > General Hierarchy Some DSC users find the Server/Node naming convention restrictive. It would be helpful to support a more general, hierarchical naming scheme. For example, uk/lon/ns1/a may specify the.uk zone, nameserver NS1, location LON(don), server A.
3 This would be a relatively fundamental change that will require updating many parts of the code. Note that currently the XML files output by the collector do not contain the server or node names. The server and node names are specified when the collector s cron job uploads data to a presenter. Thus, if a dataset is sent to multiple presenters, it may appear under different server/node names. Solve the problem of unknown datasets in the Presenter Currently it is possible to create new datasets in a collector. However, the presenter will not know how to display the data. This is, essentially, because datasets have names, rather than types. Datasets should be assigned types. Then the administrator can create new datasets of known types (possibly adding some filters) and have them automatically displayed by the presenter. Representation of Data Between Collector and Presenter There was an early decision to use XML for data representation between collectors and presenters. One reason was the belief that there would be third- party tools that desire to interact with DSC. For example, a DNS server implementation may collect statistics internally and publish them to a DSC presenter. Or, somebody might develop an improve presenter interface. In reality there are no third- party tools that interoperate with DSC at this level. The choice of XML and Perl in the presenter causes the extractor processes to be inefficient. As discussed during our workshop, there is not strong opposition to XML per se, but something should be done to improve the speed of the extraction processes. This could mean switching to a different representation (JSON or YAML for example). Or perhaps the XML parsing simply need to be rewritten, perhaps in a compiled, rather than scripted, language. Move Valid Domains from Presenter to Collector DSC was initially designed to collect data from DNS Root nameservers. One interesting statistic at Root nameservers is the amount of queries for invalid TLDs. We get this from the qtype_vs_tld dataset, which a set of counts of (TLD,Qtype) pairs. The DSC grapher configuration contains domain_list and valid_domains directives that it uses when displaying valid and invalid TLDs.
4 These mechanisms should be further generalized. In particular, the notion of valid domains should be moved into the collector. For a (non- root) authoritative nameserver, the valid domains would be set to the list of domains that the nameserver is authoritative for. Improve Documentation Some users have commented that the documentation should be improved. DSC Collector Enhancements Collector Message Separation There are many cases where the packet capture stream coming into DSC contains multiple nodes that should be separated. This may happen when a DNS operator has a number of customers and each customer should receive a DSC feed with only its own data. It may also happen when span ports are utilized to aggregate packet streams from multiple servers into a single collection box. Currently a DSC user is required to run multiple DSC collector instances, perhaps with a BPF filter rule, to separate the streams. Instead, DSC should support the ability to supply data for multiple nodes from a single collector instance. The DSC administrator should be able to specify the method of message separation. At least the following should be supported: By server IP address By query name matching Optionally it may be useful to support separation by MAC- layer addresses. When message separation is employed, the collector may receive queries that do not belong to any defined node. Either such orphaned messages should be dropped by the collector, or one of the nodes designated as a default. Centralize configs distribute to collectors Currently DSC has no features to assist with distribution of collector configuration files. The administrator must manually configure each collector. For some users, there may be collector sites to configure (nearly identically). DSC needs a feature where collectors can request their configuration from a presenter or other central location. The presenter seems a logical choice since collectors already contact presenters every 60 seconds.
5 This feature may also require support for include files in the collector configuration, so that the only some parts of the configuration come from the presenter and other parts are configured locally. For example: # dsc.conf interface eth1; local-address ; include datasets.conf ; Configuration Builder Develop a user interface to build collector configuration files. For example: Standard templates to use as starting points (ie, root, TLD, authority) Checkbox to select/deselect certain datasets Ability to clone an existing dataset Dynamic Collector Configuration To reconfigure a collector, the administrator must generate the new collector configuration file and manually restart the collector processes. In the best case the collector will lose data for one interval (60 seconds). Perhaps longer if there are error or additional changes become necessary. It should be possible to reconfigure a running DSC collector. Obviously, the collector must validate the new configuration before using it. If a new configuration contains errors, then the old configuration remains in use. Attack Resilience DSC currently has no features that can help it avoid becoming a DoS victim. If a nameserver comes under attack, DSC may not be able to keep up with all datasets at the full rate. It would be nice to have a feature whereby DSC detected overload conditions and then updated a subset of datasets to reduce its resource consumption. Collector Cron Currently the collector uses standard Unix cron jobs to transmit XML files to presenters. Having these cron jobs means that the administrator must take care to ensure that both are running. It is possible that the collector stops running and cron
6 keeps running, or vice- versa. The administrator must also worry about where cron job output s are sent to. It would be nice if the collector itself handled these tasks so that the cron job configuration could be placed inside the collector configuration file. DSC Presenter Enhancements Backend Storage API Currently, for most users, the presenter stores data in the Unix filesystem. There is a branch in the subversion repository that stores data in an SQL (MySQL or Postgres) database. At least one DSC user reports success with SQL storage. Today the filesystem backend storage is barely fast enough. To allow better scaling for DSC in the future, DSC should support alternative storage backends. These may include Unix filesystem, traditional SQL, SQLite, and NoSQL such as Cassandra. Users should be able to chose a storage scheme that meets their needs. The first step to modular backend storage is to define and implement a storage API for DSC. The API will allow the user to choose backends and allow different applications to read the DSC data (see Anomaly Detection below). The storage API may include the following functionality: Initialize store for a server/node Write data from collector to the store Read data from the store Perform periodic (e.g., daily) maintenance Improve Presentation and Interaction of Graphs Today DSC uses relatively old- fashioned web technologies. Although the web interface is a CGI script, the output is mostly just simple HTML and embedded (static) images. A number of new web technologies exist that DSC could benefit from to make it more responsive: AJAX, XML- RPC, and HTML5. Overall Speed Improvements Currently the extractor component the part that reads XML files and writes dat- files is the least efficient. This is perhaps due to the use of Perl, use of XML, and use of the Unix filesystem.
7 The extractor and presenter in general must be made to operate more quickly and more efficiently. There is no obvious path to be taken at this time. It will be necessary to experiment and explore different options to understand where improvements can be made. Support for Different Views The presenter could benefit from a views feature whereby different users are allowed to see different things, or different levels of detail. For example, guest users may see only delayed, non- interactive data. Some users might only see data aggregated at the server level, while others can drill down deeper into the server/node hierarchy. Anomaly Detection During our Denver meeting we discussed whether or not DSC should provide some anomaly detection. There was consensus that this should not be a core feature of DSC, but rather, with a good Storage API, it will be possible to develop external anomaly detection applications.
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
More informationDNS Root NameServers
DNS Root NameServers An Overview Dr. Farid Farahmand Updated: 9/24/12 Who- is- Who! Over half million networks are connected to the Internet 5 billion users by 2015! Network numbers are managed by ICANN
More informationPortals and Hosted Files
12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationSend document comments to nexus7k-docfeedback@cisco.com.
CHAPTER 4 This chapter describes how to configure the Domain Name Server (DNS) client. This chapter includes the following sections: Information About DNS Clients, page 4-1 Licensing Requirements for DNS
More informationMcAfee Network Threat Response (NTR) 4.0
McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP
More informationCamilyo APS package by Techno Mango Service Provide Deployment Guide Version 1.0
Camilyo APS package by Techno Mango Service Provide Deployment Guide Version 1.0 Contents Introduction... 3 Endpoint deployment... 3 Endpoint minimal hardware requirements:... 3 Endpoint software requirements:...
More informationReport on Content Management Systems. University Communications Web Services Office March, 29 2010
University Communications Web Services Office March, 29 2010 Table of Contents Overview...1 Our Current Situation:...1 Our Problems:...1 What We Need in a CMS:...1 concrete5...3...3...3 Impress CMS...4...4...4
More informationHP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
More informationAutomating System Administration with Perl
O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo SECOND EDITION Automating System Administration with Perl David N. Blank-Edelman Table of Contents Preface xv 1. Introduction 1 Automation
More informationDNS Security Control Measures: A heuristic-based Approach to Identify Real-time incidents
DNS Security Control Measures: A heuristic-based Approach to Identify Real-time incidents Joao Afonso Foundation for National Scientific Computing Lisbon, Portugal e-mail: joao.afonso@fccn.pt Pedro Veiga
More informationWhite Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
More informationFrom traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik
From traditional to alternative approach to storage and analysis of flow data Petr Velan, Martin Zadnik Introduction Network flow monitoring Visibility of network traffic Flow analysis and storage enables
More informationDNS Queries And IPv6 Root Servers
1 Is Your Caching Resolver Polluting the Internet? Duane Wessels CAIDA & The Measurement Factory, Inc. wessels@measurement-factory.com Abstract Previous research has shown that most of the DNS queries
More informationVitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution May 2011 7.3 Version 1 Copyright 2011 Alcatel-Lucent 1 Table of Contents 1. Document Purpose... 3 2. What s New in VitalQIP 7.3?...
More information<Insert Picture Here> Michael Hichwa VP Database Development Tools michael.hichwa@oracle.com Stuttgart September 18, 2007 Hamburg September 20, 2007
Michael Hichwa VP Database Development Tools michael.hichwa@oracle.com Stuttgart September 18, 2007 Hamburg September 20, 2007 Oracle Application Express Introduction Architecture
More informationApplication Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationDNS and email issues in connecting UNINET-ZA to the Internet
DNS and email issues in connecting UNINET-ZA to the Internet Alan Barrett November 2011 Abstract This article describes some of the activities and configuration relating to the Domain Name System (DNS)
More informationFirewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
More informationSecuring LAN Connected Devices in Industrial Sites with TLS and Multicast DNS
Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS Tero Keski-Valkama May 28, 2015 Version 1.0 Abstract This whitepaper outlines a more flexible and more secure user interface
More informationHealthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
More informationAutomatic Configuration of Slave Nameservers (BIND 9.7.2 only)
DNSSHIM 1 DNSSHIM is an open-source software that implements the Domain Name Name System (DNS) protocol for the Internet. Its main feature is to work as a Hidden Master nameserver, that is, provide information
More informationMonitoring MySQL database with Verax NMS
Monitoring MySQL database with Verax NMS Table of contents Abstract... 3 1. Adding MySQL database to device inventory... 4 2. Adding sensors for MySQL database... 7 3. Adding performance counters for MySQL
More informationTSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
More informationRed Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
More informationCloudStack Metering Working with the Usage Data. Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue
CloudStack Metering Working with the Usage Data Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue About Me Involved with CloudStack before donation to Apache Built
More informationS3 Monitor Design and Implementation Plans
S 3 Monitor Version 1.0 Specifications and Integration Plan 1 Copyright c 2011 Hewlett Packard Copyright c 2011 Purdue University Permission is hereby granted, free of charge, to any person obtaining a
More informationHow to Design and Create Your Own Custom Ext Rep
Combinatorial Block Designs 2009-04-15 Outline Project Intro External Representation Design Database System Deployment System Overview Conclusions 1. Since the project is a specific application in Combinatorial
More informationEffect of anycast on K-root
Effect of anycast on K-root Some early results 1 K root anycast deployment 3 global nodes (BGP transit) LINX... 5459 25152 25152 i AMS-IX... 25152 25152 25152 i Tokyo (since 5/2005)... 25152 25152 25152
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationMonitoring PostgreSQL database with Verax NMS
Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationReal-time Streaming Analysis for Hadoop and Flume. Aaron Kimball odiago, inc. OSCON Data 2011
Real-time Streaming Analysis for Hadoop and Flume Aaron Kimball odiago, inc. OSCON Data 2011 The plan Background: Flume introduction The need for online analytics Introducing FlumeBase Demo! FlumeBase
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationCloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
More informationThe Root of the Matter: Hints or Slaves
The Root of the Matter: Hints or Slaves David Malone October 21, 2003 Abstract We consider the possibility of having a name server act as a slave to the root zone, rather than caching
More informationWorking With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
More informationInstallation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
More informationRSSAC Recommendation on Measurements of the Root Server System RSSAC 002
RSSAC Recommendation on Measurements of the Root Server System RSSAC 002 Table of Contents Introduction... 3 Measurement Parameters... 3 The latency in the distribution system... 4 The size of the overall
More informationGetting Started with Google Cloud Platform
Chapter 2 Getting Started with Google Cloud Platform Welcome to Google Cloud Platform! Cloud Platform is a set of modular cloud-based services that provide building blocks you can use to develop everything
More informationDetecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
More informationIceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationMonitoring Network Traffic using ntopng
Monitoring Network Traffic using ntopng Luca Deri Outlook What are the main activities of ntop.org? ntop s view on network monitoring. From ntop to ntopng. ntopng architecture and design.
More informationSisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
More informationZenoss Service Dynamics Impact and Event Management Installation and Administration
Zenoss Service Dynamics Impact and Event Management Installation and Administration Copyright 2012 Zenoss, Inc. All rights reserved. Redistribution or duplication of any portion of this document is prohibited
More informationDomain Name Resolver (DNR) Configuration
CHAPTER 7 Domain Name Resolver (DNR) Configuration This chapter provides an overview of the information required to customize Cisco IOS for S/390. It includes these sections: Introducing the Domain Name
More informationISP Systems Design. ISP Workshops. Last updated 24 April 2013
ISP Systems Design ISP Workshops Last updated 24 April 2013 1 Agenda p DNS Server placement p Mail Server placement p News Server placement p Services network design p Services Network Security 2 ISP Services
More informationInstructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations
Contract Number: IST-2000-26417 Project Title: Deliverable D8 : Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations Contractual Date: 31 May 2002 Actual Date: 14 August
More informationData Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)
Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,
More informationFileNet System Manager Dashboard Help
FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their
More informationInitializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2. Last revised September 26, 2014
Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2 Last revised September 26, 2014 i Copyright Notice All rights reserved. Printed in the United States of America. No part
More informationStreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
More informationCOS 333: Advanced Programming Techniques
COS 333: Advanced Programming Techniques How to find me bwk@cs, www.cs.princeton.edu/~bwk 311 CS Building 609-258-2089 (but email is always better) TA's: Stephen Beard, Chris Monsanto, Srinivas Narayana,
More informationWHM Administrator s Guide
Fasthosts Customer Support WHM Administrator s Guide This manual covers everything you need to know in order to get started with WHM and perform day to day administrative tasks. Contents Introduction...
More informationWhatsUpGold. v12.3.1. NetFlow Monitor User Guide
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
More informationBORG DIGITAL High Availability
BORG DIGITAL High Availability The BORG DIGITAL Cloud is something we are extremely excited about. It is a highly specialised web hosting service which puts resilience, security and contingency at it s
More informationATLAS job monitoring in the Dashboard Framework
ATLAS job monitoring in the Dashboard Framework J Andreeva 1, S Campana 1, E Karavakis 1, L Kokoszkiewicz 1, P Saiz 1, L Sargsyan 2, J Schovancova 3, D Tuckett 1 on behalf of the ATLAS Collaboration 1
More informationTHE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
More informationBasic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
More informationDNS based Load Balancing with Fault Tolerance
DNS based Load Balancing with Fault Tolerance by Kåre Presttun, Oslo, Norway Kare@Presttun.org Introduction There are several load-balancing systems on the market. They range from local switch based load
More informationCHAPTER 5: BUSINESS ANALYTICS
Chapter 5: Business Analytics CHAPTER 5: BUSINESS ANALYTICS Objectives The objectives are: Describe Business Analytics. Explain the terminology associated with Business Analytics. Describe the data warehouse
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationObelisk: Summoning Minions on a HPC Cluster
Obelisk: Summoning Minions on a HPC Cluster Abstract In scientific research, having the ability to perform rigorous calculations in a bearable amount of time is an invaluable asset. Fortunately, the growing
More informationClassifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy. 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs
Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs Motivation Network resources are consumed by a small number
More informationSOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
More informationFirewalls with IPTables. Jason Healy, Director of Networks and Systems
Firewalls with IPTables Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Host-based Firewalls with IPTables 5 1.1 Introduction.............................. 5 1.2 Concepts...............................
More informationCS555: Distributed Systems [Fall 2015] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [SPARK] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Streaming Significance of minimum delays? Interleaving
More informationSIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
More informationCitrix NetScaler 10 Essentials and Networking
Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced
More informationWeb Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP rikjones@computer.org Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationModule 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
More informationco Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationApplication Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability
White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure
More informationDeploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
More informationLightweight DNS for Multipurpose and Multifunctional Devices
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.12, December 2013 71 Lightweight DNS for Multipurpose and Multifunctional Devices Yogesh A. Wagh 1, Prashant A. Dhangar
More informationRails Cookbook. Rob Orsini. O'REILLY 8 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo
Rails Cookbook Rob Orsini O'REILLY 8 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword : ; xi Preface ; ;... xiii 1. Getting Started 1 1.1 Joining the Rails Community
More informationComputer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
More informationProduct Guide. Sawmill Analytics, Swindon SN4 9LZ UK sales@sawmill.co.uk tel: +44 845 250 4470
Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed
More informationTeam Members: Christopher Copper Philip Eittreim Jeremiah Jekich Andrew Reisdorph. Client: Brian Krzys
Team Members: Christopher Copper Philip Eittreim Jeremiah Jekich Andrew Reisdorph Client: Brian Krzys June 17, 2014 Introduction Newmont Mining is a resource extraction company with a research and development
More informationVisualization of Semantic Windows with SciDB Integration
Visualization of Semantic Windows with SciDB Integration Hasan Tuna Icingir Department of Computer Science Brown University Providence, RI 02912 hti@cs.brown.edu February 6, 2013 Abstract Interactive Data
More informationNetwork Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D
Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network
More informationProducts, Features & Services
Products, Features & Services PowerDNS PowerDNS, founded in the late 1990s, is a premier supplier of DNS software, services and support. Deployed throughout the world with some of the most demanding users
More informationDNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
More informationImproved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
More informationTools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.
Tools for penetration tests 1 Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus. What is a penetration test? Goals: 1. Analysis of an IT-environment and search
More informationThe Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationABRAHAM MARTIN @ABRAHAM_MARTINC ARCHITECTURE OF A CLOUD SERVICE USING PYTHON TECHNOLOGIES
ABRAHAM MARTIN @ABRAHAM_MARTINC ARCHITECTURE OF A CLOUD SERVICE USING PYTHON TECHNOLOGIES MANAGED WEB SERVICE Born to solve a problem around university Servers under desks Security problems MANAGED WEB
More informationBuilding a Scalable News Feed Web Service in Clojure
Building a Scalable News Feed Web Service in Clojure This is a good time to be in software. The Internet has made communications between computers and people extremely affordable, even at scale. Cloud
More informationDeploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion
Deploying IP Anycast Core DNS Services for University of Minnesota Introduction and General discussion Agenda Deploying IPv4 anycast DNS What is ANYCAST Why is ANYCAST important? Monitoring and using ANYCAST
More informationSCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems. Ed Simmonds and Jason Harrington 7/20/2009
SCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems Ed Simmonds and Jason Harrington 7/20/2009 Introduction For FEF, a monitoring system must be capable of monitoring thousands of servers and tens
More informationThis release also incorporates new features which improve manageability for system administrators and usability for contributors.
Pervade Software The key to Pervade Software s extensibility is an ingenious new architecture. Each of the products is designed to sit on a single common database and share a series of unique software
More informationIntroduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
More informationOracle CRM Foundation
Oracle CRM Foundation Implementation Guide Release 11i November 2000 Part No. A86122-02 Oracle CRM Foundation Implementation Guide, Release 11i Part No. A86122-02 Copyright 1996, 2000, Oracle Corporation.
More informationBEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
More informationEin Unternehmen stellt sich vor. Nagios in large environments
Ein Unternehmen stellt sich vor Nagios in large environments Agenda About ITdesign Introduction Customer environments and requirements Heterogenous environment How to get data from end systems? 350 Servers
More informationweb hosting and domain names
web hosting and domain names web hosting An internet service provider (ISP) provides internet services A common internet service is web hosting web hosting means storing your website on a public server
More informationAbout This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.
Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A
More information