Data-Driven Network Opera1ons. France-IX 2016 Avi Freedman

Size: px
Start display at page:

Download "Data-Driven Network Opera1ons. France-IX 2016 Avi Freedman"

Transcription

1 Data-Driven Network Opera1ons France-IX 2016 Avi Freedman

2 Summary Why Data-Driven Network Opera1ons? The food: data types and sources Requirements and tool types Data Fusion Business-driven use cases: Review Use case: Traffic explora1on and anomaly detec1on Use case: Planning and peering Use case: Network performance analy1cs Use case: Security and breach detec1on Use case: Revenue enhancement Summary 2

3 Why Data Driven Network Opera1ons?

4 What is Data-Driven Network Opera9ons? Using your data to drive your ops + business! Most content companies and enterprises are data and analy1cs driven. Devops is as well (APM, metrics-at-scale). But the network world has some catchup to do. We re now at the point where CPU, systems and methods exist for NetOps. But most of the work remains to be done. 4

5 The Food: Data Types and Sources

6 What kind of data? *flow BGP SNMP and streaming telemetry (i.e. queue depth) Event logs User tags ( Applica1on A, Peer, My Network,Rack#1 ) Server Metrics (RRD, tsdb, Grafana, ) Ac1ve measurement data (probes) LLDP and IGP-based topology data SDN overlay/underlay mappings DNS queries Threat intelligence 6

7 Enhanced NetFlow: Performance and Seman9cs Imagine if we could get performance data from the network: Queue Depth Retransmits per flow TCP latency Applica1on Latency You can (somewhat): Host sogware (Nprobe) Sensors / Taps Webserver logs (Nginx) Cisco AVC supported routers 7

8 Requirements and Tool Types

9 Key Network Operator Requirements Key requirements for modern Data-Driven Network Opera1ons: No data aggrega1on or pre-filtering. Correla1on (fusing) between data types. Full resolu1on searchable and stored for months. FAST. Less than 10s for results. Cannot wait minutes while spelunking. Network-savvy Uis and APIs (understanding rou1ng and prefixes). Detect anomalies. Should not have to watch graphs manually. 9

10 Anomaly Detec9on You shouldn t have to stare at dashboards or watch logs to detect badness. Should be able to look at dimensions such as interface+path+type, or cidr/ prefix, detect unusual pakerns and perform an ac1on. Con1nually. Be able to look at things beyond pps/bps such as retransmits, latency, log.s Be able to detect shigs such as did an asn or IP on a par1cular interface suddenly move from top-x #200 to #2 and that is unusual for this 1me of day. This is doable today, though requires network-savvy data backends and is not yet magic. 10

11 Available Tool Types for Traffic-Centric Analy9cs Current Open Source: pmacct, ntop, SiLK Older Open Source: cflowd, MrTG, AS-PATH, swatch Commercial soaware: Arbor, SevOne, Solarwinds, ManageEngine Do It Yourself Big Data: Kala + {ELK, Hadoop, Druid, Cassandra, Spark} SaaS Big Data: Ken1k, Appneta +(Splunk [for security]) On-Prem Big Data: Cisco Tetra1on, Ken1k, Deepfield We re making progress as most many big data tools support high volumes of data, a large set support high speed queries, and a (not iden1cal) large set support non-aggregated storage and high volumes of data. Most don t yet support data fusion and network savviness about prefixes and paths yet, so DIY efforts must implement. 11

12 Data Fusion

13 Fusing Data Flow or BGP or SNMP or DNS or logs alone are not enough. Star1ng with NetFlow/sFlow/IPFIX alone, which is (IP src/dst, ports, bytes, packets, and some1mes VLAN, MPLS, ). This becomes much richer when combined with: BGP akributes Geography Tags (rack, department, customer ) Config changes and sogware versions Threat intelligence and known-bad IPs Fusing should be near real-1me, performed at ingest and data specific 13

14 Distributed system data ingest 14

15 Pulling it together Legacy non-distributed network tools: Don t scale to handle large amounts of data (space/io/cpu limited). Typically store only aggregates or pre-filtered data. Very limited fusing, only 1 or 2 data types per tool. Limited dimensions and filtering depth, ogen slow. Ogen require large amounts of configura1on + tuning. Big-Data approach: Large scale, billions of records per hour, no aggrega1on, complex fusing. Distributed micro-service architecture. Can scale very wide. ++Hardware. If done right, fast. Real-1me ingest and < 5s queries. Big challenge is adding fusion, network savviness, and of course hardware. 15

16 Business-Driven Use Cases 16

17 Data-Driven Ops + Business Use Cases Network Planning Peering Analy1cs and Abuse Conges1on detec1on Is it the network? Where on the network? Proac1ve aler1ng Distributed DDoS Detec1on What Changed Post Deploy? Security and Breach Detec1on Cost Analy1cs Revenue Iden1fica1on (New + Risk) Enabling Internal Groups 17

18 Use Case: Traffic Exlora1on and Anomaly Detec1on 18

19 Use case: Traffic debugging and inspec9on Why did the interface just double its traffic, now saturated? Customer renewal re-pricing. Where is the traffic leaving my network? Is a peer sending me traffic they shouldn t be? Did a content provider shig their traffic path to me? 19

20 Traffic by geo, filtered by one source interface 20

21 Traffic debugging and inspec9on 21

22 Use case: Anomaly detec9on Traffic from individual top-20 ASN over transit unusually high. Operator no1fied at red line. 22

23 Traffic, anomaly detec9on and annota9on 23

24 Traffic annotated with mul9ple events 24

25 Anomaly detec9on: DDoS detec9on and characteris9cs 25

26 Use Case: Planning and Peering 26

27 Use case: Network Planning Flow-based traffic + BGP can be used to help show: Path, neighbor, transit, origin, and country of traffic. Strategic peering and transit changes that can improve performance and reduce costs. Poten1al new peers and loca1ons to peer. Evaluate the poten1al of new peering exchanges or facili1es. Transit rela1onships that are of high or likle value. Understand ROI before extending backbone links or capacity. 27

28 Network Planning, traffic by BGP HOP 28

29 Network Planning, collapsed path, exclude 1st 29

30 Use Case: Network Performance Analy1cs

31 Use case: Network Performance Analy9cs Flow-based traffic + BGP + network performance data can show: Whether If And And Performance Or Or Or issues are in the applica1on or network layer network, where? in a way exposable to internal development + app opera1ons to pinpoint where issues by peer, or even remote AS hops behind peers prefix DC not (in the network) 31

32 Retransmits enhanced flow example 32

33 Use Case: Security and Breach Detec1on

34 Use case: Network Security Analy9cs Flow-based traffic +/- threat intelligence can show: Poten1ally Anomaly Ideally, And To compromised servers, desktops, or IoT devices. detec1on can ogen uncover these even without threat intel. this can be used to help downstream or internal customers. feed DDoS response if there are local sources/sinks. be a good ci1zen, BCP38 viola1on detec1on can run across the network, even with simple heuris1cs like how many /8s as sources? 34

35 Use Case: Revenue Enhancement

36 Use case: Revenue Enhancement Some1mes not discussed in polite company, but great traffic-based analy1cs can help with the top line as well as margin: Offering Iden1fying high-margin customers lower rates to akract more traffic. large 2 nd and 3 rd hop AS sinks or sources behind peers, to convert to customer rela1onships. 36

37 Summary

38 Summary Networks can produce large amounts of data that will make your life easier. Big Data plalorms are able to consume this data. Specific tools for Network Operators are beginning to appear (free and paid). Paid tools are more specific to network use (UI, easy setup, etc). Free tools have the power but require cobbling together pieces. Much work to be done re fusing data such as logs, changes, alerts, DNS. SaaS providers will provide community views and enable data-sharing. Mul1-source correlated at-scale data is heavily in use for non-network systems. It s 1me vendors and network folks catch up and end the NetOps suffering. 38

39 Ques1ons? Dan Ellis 39

40 Appendix: Architecture

41 Distributed system data ingest 41

42 Distributed system fusing 42

Network Traffic Visibility and Anomaly October 27th, 2016 Dan Ellis

Network Traffic Visibility and Anomaly October 27th, 2016 Dan Ellis Network Traffic Visibility and Anomaly Detection @Scale: October 27th, 2016 Dan Ellis Introduction Network traffic visibility? Introduction Network traffic visibility? What data is available on your network

More information

BGP Traffic Engineering

BGP Traffic Engineering BGP Traffic Engineering Andy Davidson andy@2connec,ntl.com 2Connect UK, LONAP, IXLeeds BCIX Tech Roundtable, 19 th Nov 2012, Berlin Why do Traffic Engineering? Manage your capacity demands Ensure service

More information

Network traffic telemetry (NetFlow, IPFIX, sflow)

Network traffic telemetry (NetFlow, IPFIX, sflow) Network traffic telemetry (NetFlow, IPFIX, sflow) Paolo Lucente pmacct SEE 3 mee>ng, Sofia Apr 2014 Presenta>on history 1.0: SEE 1 mee>ng, Dubrovnik, Sep 2011 1.1: MENOG 13 mee>ng, Kuwait City, Sep 2013

More information

Detecting Hidden Spam Bots (and other tales from the NetFlow front lines) Jim Meehan Director, Product Marketing

Detecting Hidden Spam Bots (and other tales from the NetFlow front lines) Jim Meehan Director, Product Marketing Detecting Hidden Spam Bots (and other tales from the NetFlow front lines) Jim Meehan Director, Product Marketing Agenda What is flow data? Legacy solutions and frustrations Modern requirements and architecture

More information

Introduc?on to pmacct

Introduc?on to pmacct Introduc?on to pmacct Paolo Lucente pmacct GRNOG Workshop #1, Athens May 2017 whoami Paolo Lucente GitHub: paololucente LinkedIn: plucente Digging data out of networks worldwide for fun and profit for

More information

Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study

Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study Copyright 2016 Splunk Inc. Autonomous Threat Hun?ng With Niddel And Splunk Enterprise Security: Mars Inc. Customer Case Study Alex Pinto Chief Data Scien?st, Niddel Greg Poniatowski Security Service Area

More information

Rethinking Path Valida/on. Russ White

Rethinking Path Valida/on. Russ White Rethinking Path Valida/on Russ White Reality Check Right now there is no US Government mandate to do anything A mandate in the origin authen9ca9on area is probably immanent A mandate in the path valida9on

More information

RIPE75 - Network monitoring at scale. Louis Poinsignon

RIPE75 - Network monitoring at scale. Louis Poinsignon RIPE75 - Network monitoring at scale Louis Poinsignon Why monitoring and what to monitor? Why do we monitor? Billing Reducing costs Traffic engineering Where should we peer? Where should we set-up a new

More information

Network Measurement. COS 461 Recita8on. h:p://

Network Measurement. COS 461 Recita8on. h:p:// Network Measurement COS 461 Recita8on h:p://www.cs.princeton.edu/courses/archive/spr14/cos461/ 2! Why Measure the Network? Scien8fic discovery Characterizing traffic, topology, performance Understanding

More information

Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School

Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School Understanding Opera.onal Rou.ng (part II) Geoffrey Xie Naval Postgraduate School July 6, 2011 Route Aggrega.on Child Route Unallocated Child Prefix: e.g., 10.1.33.0/24 19.1.1.2 Aggregate Route 10.1.1.0/24

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics Christopher Say (CCIE RS SP) Consulting System Engineer csaychoh@cisco.com Challenges in operating a hybrid data center

More information

Qualys Cloud Platform

Qualys Cloud Platform 18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

OSSIR. 8 Novembre 2005

OSSIR. 8 Novembre 2005 OSSIR 8 Novembre 2005 Arbor Networks: Security Industry Leader Arbor s Peakflow products ensure the security and operational integrity of the world s most critical networks Solid Financial Base Sales have

More information

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to

More information

Conges'on. Last Week: Discovery and Rou'ng. Today: Conges'on Control. Distributed Resource Sharing. Conges'on Collapse. Conges'on

Conges'on. Last Week: Discovery and Rou'ng. Today: Conges'on Control. Distributed Resource Sharing. Conges'on Collapse. Conges'on Last Week: Discovery and Rou'ng Provides end-to-end connectivity, but not necessarily good performance Conges'on logical link name Michael Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in

More information

AMP-Based Flow Collection. Greg Virgin - RedJack

AMP-Based Flow Collection. Greg Virgin - RedJack AMP-Based Flow Collection Greg Virgin - RedJack AMP- Based Flow Collection AMP - Analytic Metadata Producer : Patented US Government flow / metadata producer AMP generates data including Flows Host metadata

More information

Data Sheet. Monitoring Automation for Web-Scale Networks MONITORING AUTOMATION FOR WEB-SCALE NETWORKS -

Data Sheet. Monitoring Automation for Web-Scale Networks MONITORING AUTOMATION FOR WEB-SCALE NETWORKS - Data Sheet Monitoring Automation for Web-Scale Networks CLOUD-BASED MONITORING AUTOMATION FOR WEB-SCALE NETWORKS NetSpyGlass (NSG) is cloud-based, network monitoring automation for network operators seeking

More information

The Future of Threat Prevention

The Future of Threat Prevention The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network

More information

Mul7cast protocols. IP Mul7cast and IGMP SRM (Scalable Reliable Mul7cast) PGM (Pragma7c General Mul7cast)

Mul7cast protocols. IP Mul7cast and IGMP SRM (Scalable Reliable Mul7cast) PGM (Pragma7c General Mul7cast) IP ANYCAST and MULTICAST; OVERLAYS and UNDERLAYS 1 IP Anycast Outline today Mul7cast protocols IP Mul7cast and IGMP SRM (Scalable Reliable Mul7cast) PGM (Pragma7c General Mul7cast) Overlay networks Tunnels

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines

Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines Copyright 2017 Open Networking User Group. All Rights Reserved Confiden@al Not For Distribu@on Outline ONUG PoC Right Stuff Innova@on

More information

Mastering Near-Real-Time Telemetry and Big Data: Invaluable Superpowers for Ordinary SREs

Mastering Near-Real-Time Telemetry and Big Data: Invaluable Superpowers for Ordinary SREs Mastering Near-Real-Time Telemetry and Big Data: Invaluable Superpowers for Ordinary SREs Ivan Ivanov Sr. CDN Reliability Engineer Netflix Open Connect 137M subscribers (Q3 2018) 190 countries 1,000s of

More information

2610:f8:ffff:2010:04:13:0085:1

2610:f8:ffff:2010:04:13:0085:1 2610:f8:ffff:2010:04:13:0085:1 Qwest IPv6 Implementation Experience Shawn Carroll 2610:f8:ffff:2010:04:13:0085:55 Previous Qwest Implementation Work Obtained 6bone Pseudo Next Level Aggregator (pnla) from

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

Exploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer

Exploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide

More information

Redeeming the P Word. Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER

Redeeming the P Word. Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER Redeeming the P Word Making the Case for Probes as an Effective UC Diagnostics Tools WHITE PAPER With the growth of Unified Communications, there is an increasing need to effectively identify, diagnose,

More information

Transforming the Cisco WAN with Network Intelligence

Transforming the Cisco WAN with Network Intelligence Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

The Keys to Monitoring Internal Web Applications

The Keys to Monitoring Internal Web Applications WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required

More information

BGP Scaling (RR & Peer Group)

BGP Scaling (RR & Peer Group) BGP Scaling ( & Peer Group) BGP Peer Group Problem: number of BGP updates in a ibgp mesh BGP updates generated for each neighbor individually CPU wasted on repeat calculations ibgp neighbors receive the

More information

Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device. Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks

Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device. Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks Data-Driven DevOps: Bringing Visibility to Any Cloud, Any App, & Any Device Erik Giesa SVP of Marketing and Business Development, ExtraHop Networks Your Monitoring Strategy Must Change How can you maintain

More information

Cisco Crosswork Network Automation

Cisco Crosswork Network Automation Cisco Crosswork Network Introduction Communication Service Providers (CSPs) are at an inflexion point. Digitization and virtualization continue to disrupt the way services are configured and delivered.

More information

Service Provider Multihoming

Service Provider Multihoming BGP Traffic Engineering Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit ISPs strive to balance traffic flows in both directions

More information

Using Event-Driven SDN for Dynamic DDoS Mitigation

Using Event-Driven SDN for Dynamic DDoS Mitigation Using Event-Driven SDN for Dynamic DDoS Mitigation Craig Hill Distinguished SE, US Federal crhill@cisco.com CCIE #1628 1 Concept and Content Creators The Cisco Engineering Team: Jason King Steven Carter

More information

IP Reachability Differences: Myths and Reali<es

IP Reachability Differences: Myths and Reali<es IP Reachability Differences: Myths and Reali

More information

Security by BGP 101 Building distributed, BGP-based security system

Security by BGP 101 Building distributed, BGP-based security system Security by BGP 101 Building distributed, BGP-based security system Łukasz Bromirski lukasz@bromirski.net May 2017, CERT EE meeting Roadmap for the session BGP as security mechanism BGP blackholing project

More information

PNDA.io: when BGP meets Big-Data

PNDA.io: when BGP meets Big-Data PNDA.io: when BGP meets Big-Data Let s go back in time 26 th April 2017 The Internet is very much alive Millions of BGP events occurring every day 15 Routers Monitored 410 active peers (both IPv4 and IPv6)

More information

SEVONE DATA APPLIANCE FOR EUE

SEVONE DATA APPLIANCE FOR EUE Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

Splunk Review. 1. Introduction

Splunk Review. 1. Introduction Splunk Review 1. Introduction 2. Splunk Splunk is a software tool for searching, monitoring and analysing machine generated data via web interface. It indexes and correlates real-time and non-real-time

More information

Logisland Event mining at scale. Thomas [ ]

Logisland Event mining at scale. Thomas [ ] Logisland Event mining at scale Thomas Bailet @hurence [2017-01-19] Overview Logisland provides a stream analy0cs solu0on that can handle all enterprise-scale event data and processing Big picture Open

More information

Distributed Systems. Communica3on and models. Rik Sarkar 2015/2016. University of Edinburgh

Distributed Systems. Communica3on and models. Rik Sarkar 2015/2016. University of Edinburgh Distributed Systems Communica3on and models Rik Sarkar 2015/2016 University of Edinburgh Models Expecta3ons/assump3ons about things Every idea or ac3on anywhere is based on a model Determines what can

More information

SEVONE END USER EXPERIENCE

SEVONE END USER EXPERIENCE Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

Qualys Cloud Platform

Qualys Cloud Platform Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new

More information

pmacct and Streaming Telemetry

pmacct and Streaming Telemetry pmacct and Streaming Telemetry Paolo Lucente pmacct ITNOG 2, Bologna Nov 2016 whoami Paolo Lucente Github: paololucente Twitter: @Paolo_Lucente Digging data out of networks worldwide for fun and profit

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

Network Operations Analytics

Network Operations Analytics Network Operations Analytics Solution Guide Version 2.4.4 (Build 2.4.4.0.x) June 2016 Copyright 2012-2016 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 2 Solution

More information

Copyright 2014 Splunk Inc. Splunk for VMware. Architecture & Design. Michael Donnelly, Sr. Sales Engineer

Copyright 2014 Splunk Inc. Splunk for VMware. Architecture & Design. Michael Donnelly, Sr. Sales Engineer Copyright 2014 Splunk Inc. Splunk for VMware Architecture & Design Michael Donnelly, Sr. Sales Engineer Disclaimer During the course of this presentaeon, we may make forward looking statements regarding

More information

What To Ask Your SD-WAN Vendor

What To Ask Your SD-WAN Vendor #FutureWAN What To Ask Your SD-WAN Vendor Ramesh Prabagaran, VP of Product Management Twitter: @ramsba Motivation & Rationale Marketing vs Reality Network auto provisions, auto corrects, auto everything

More information

Distributed Systems. Communica3on and models. Rik Sarkar Spring University of Edinburgh

Distributed Systems. Communica3on and models. Rik Sarkar Spring University of Edinburgh Distributed Systems Communica3on and models Rik Sarkar Spring 2018 University of Edinburgh Models Expecta3ons/assump3ons about things Every idea or ac3on anywhere is based on a model Determines what can

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 15 Spring 2012 March 19, 2012 Announcements HW7 due this week HW8 due 3/28 Exam 2 on 4/23 HW7 RIP (Rou)ng Informa)on Protocol) Components Forwarding Rou)ng

More information

Accelerate Your Cloud Journey

Accelerate Your Cloud Journey Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension

More information

SPLUNK IN OPERATIONS Karsten Thygesen CTO, Netic A/S

SPLUNK IN OPERATIONS Karsten Thygesen CTO, Netic A/S SPLUNK IN OPERATIONS Karsten Thygesen CTO, Netic A/S Who is Karsten? CTO, Ne(c A/S Masters, CS from Aalborg University In opera(ons for 25+ years Splunk deployment Architect Evangelist of new technologies

More information

WAN and Cloud Link Analytics for Enterprises

WAN and Cloud Link Analytics for Enterprises Solution brief WAN and Cloud Link Analytics for Enterprises Enterprises rely heavily on cloud and WAN links, but there is little visibility into performance issues for these connections. New and better

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic?

More information

Spanning Tree and Datacenters

Spanning Tree and Datacenters Spanning Tree and Datacenters EE 122, Fall 2013 Sylvia Ratnasamy http://inst.eecs.berkeley.edu/~ee122/ Material thanks to Mike Freedman, Scott Shenker, Ion Stoica, Jennifer Rexford, and many other colleagues

More information

OPTIMAL ROUTING VS. ROUTE REFLECTOR VNF - RECONCILE THE FIRE WITH WATER

OPTIMAL ROUTING VS. ROUTE REFLECTOR VNF - RECONCILE THE FIRE WITH WATER OPTIMAL ROUTING VS. ROUTE REFLECTOR VNF - RECONCILE THE FIRE WITH WATER Rafal Jan Szarecki #JNCIE136 Solu9on Architect, Juniper Networks. AGENDA Route Reflector VNF - goals Route Reflector challenges and

More information

Flow-Based Network Monitoring using nprobe and ntopng

Flow-Based Network Monitoring using nprobe and ntopng Flow-Based Network Monitoring using nprobe and ntopng Simone Mainardi, PhD @simonemainardi mainardi@ntop.org Agenda About ntop Flow-based network monitoring, beyond SNMP nprobe: NetFlow/IPFIX/sFlow probe

More information

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview Overview Product overview Aruba s User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have

More information

ANYCAST and MULTICAST READING: SECTION 4.4

ANYCAST and MULTICAST READING: SECTION 4.4 1 ANYCAST and MULTICAST READING: SECTION 4.4 COS 461: Computer Networks Spring 2011 Mike Freedman h>p://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Outline today IP Anycast N deshnahons, 1

More information

RIPE76 - Rebuilding a network data pipeline. Louis Poinsignon

RIPE76 - Rebuilding a network data pipeline. Louis Poinsignon RIPE76 - Rebuilding a network data pipeline Louis Poinsignon Who am I Louis Poinsignon Network Engineer @ Cloudflare. Building tools for data analysis and traffic engineering. What is Cloudflare? Content

More information

Introduction to IP Routing. Geoff Huston

Introduction to IP Routing. Geoff Huston Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Advanced Multihoming. BGP Traffic Engineering

Advanced Multihoming. BGP Traffic Engineering Advanced Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit

More information

The Power of the Crowd

The Power of the Crowd WHITE PAPER The Power of the Crowd SUMMARY With the shift to Software-as-a-Service and Cloud nearly complete, organizations can optimize their end user experience and network operations with the power

More information

SolarWinds Engineer s Toolset Fast Fixes to Network Issues

SolarWinds Engineer s Toolset Fast Fixes to Network Issues DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

CLOUD SERVICES. Cloud Value Assessment.

CLOUD SERVICES. Cloud Value Assessment. CLOUD SERVICES Cloud Value Assessment www.cloudcomrade.com Comrade a companion who shares one's ac8vi8es or is a fellow member of an organiza8on 2 Today s Agenda! Why Companies Should Consider Moving Business

More information

Flash Storage Complementing a Data Lake for Real-Time Insight

Flash Storage Complementing a Data Lake for Real-Time Insight Flash Storage Complementing a Data Lake for Real-Time Insight Dr. Sanhita Sarkar Global Director, Analytics Software Development August 7, 2018 Agenda 1 2 3 4 5 Delivering insight along the entire spectrum

More information

ProAc&ve Rou&ng In Scalable Data Centers with PARIS

ProAc&ve Rou&ng In Scalable Data Centers with PARIS ProAc&ve Rou&ng In Scalable Data Centers with PARIS Theophilus Benson Duke University Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Data Center Networks

More information

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015 2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING

More information

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE SOLUTION BRIEF EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE Building effective, affordable and scalable DDoS defense, then monetizing investments with value added scrubbing

More information

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018

Flow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow

More information

Splunk for Ad Hoc Explora2on of Twi6er (and more) Stephen Sorkin VP Engineering, Splunk

Splunk for Ad Hoc Explora2on of Twi6er (and more) Stephen Sorkin VP Engineering, Splunk Splunk for Ad Hoc Explora2on of Twi6er (and more) Stephen Sorkin VP Engineering, Splunk Who am I Berkeley PhD dropout. LeH to work at HP Labs. At Splunk since 2005. VP Engineering since 2010. Run the core

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

Upgrade Your MuleESB with Solace s Messaging Infrastructure

Upgrade Your MuleESB with Solace s Messaging Infrastructure The era of ubiquitous connectivity is upon us. The amount of data most modern enterprises must collect, process and distribute is exploding as a result of real-time process flows, big data, ubiquitous

More information

The new perfsonar: a global tool for global network monitoring

The new perfsonar: a global tool for global network monitoring The new perfsonar: a global tool for global network monitoring Domenico Vicinanza (on behalf of the perfsonar Project) http://www.perfsonar.net GÉANT Product Management Team GÉANT Global Connec/vity -

More information

Transformation through Innovation

Transformation through Innovation INSSPG-2921 Transformation through Innovation Sumeet Arora Senior Vice President/GM, SP Network Systems Service Providers Biggest Challenges Web scale breaks our current cost and design models. l don t

More information

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your

More information

Novetta Cyber Analytics

Novetta Cyber Analytics Know your network. Arm your analysts. Introduction Novetta Cyber Analytics is an advanced network traffic analytics solution that empowers analysts with comprehensive, near real time cyber security visibility

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

A10 HARMONY CONTROLLER

A10 HARMONY CONTROLLER DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for

More information

Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco

Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco Copyright 2016 Splunk Inc. Infrastructure Analy=cs: Driving Outcomes through Prac=cal Uses and Applied Data Science at Cisco MaM Birkner Ian Hasund Robert Novak Dis=nguished Engineer, Cisco Chief Architect,

More information

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager AWS Agility + Splunk Visibility = Cloud Success Splunk App for AWS Demo Laura Ripans, AWS Alliance Manager Disruptive innovation and business transformation starts with data I HAVE BEEN GIVEN AN AWS ACCOUNT!!!

More information

Protecting Your SaaS Investment: Monitoring Office 365 Performance

Protecting Your SaaS Investment: Monitoring Office 365 Performance Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business

More information

Avi Freedman Chief Network Scientist, Akamai Chief Network Architect, FastNet

Avi Freedman Chief Network Scientist, Akamai Chief Network Architect, FastNet Avi Freedman Chief Network Scientist, Akamai Chief Network Architect, FastNet Do we spend enough energy worrying about security, vs. scalability and reliability? Proposing some thought topics; lab and

More information

Zero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks

Zero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks Zero to Microservices in 5 minutes using Docker Containers Mathew Lodge (@mathewlodge) Weaveworks (@weaveworks) https://www.weave.works/ 2 Going faster with software delivery is now a business issue Software

More information

ThousandEyes for. Application Delivery White Paper

ThousandEyes for. Application Delivery White Paper ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services

More information

Imperva CounterBreach

Imperva CounterBreach Imperva CounterBreach DATASHEET Protect Your Data from Insider Threats The greatest threat to enterprise security is the people already on the payroll. To do their jobs, employees, contractors, consultants

More information

OLTP on Hadoop: Reviewing the first Hadoop- based TPC- C benchmarks

OLTP on Hadoop: Reviewing the first Hadoop- based TPC- C benchmarks OLTP on Hadoop: Reviewing the first Hadoop- based TPC- C benchmarks Monte Zweben Co- Founder and Chief Execu6ve Officer John Leach Co- Founder and Chief Technology Officer September 30, 2015 The Tradi6onal

More information

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud

More information

ARIA SDS. Application

ARIA SDS. Application ARIA SDS Packet Intelligence Application CSPi s ARIA SDS Packet Intelligence (PI) application enhances an organization s existing network security capabilities by enabling the monitoring of all network

More information

Multihoming Complex Cases & Caveats

Multihoming Complex Cases & Caveats Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming

More information

Mul$media Networking. #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya

Mul$media Networking. #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya Mul$media Networking #9 CDN Solu$ons Semester Ganjil 2012 PTIIK Universitas Brawijaya Schedule of Class Mee$ng 1. Introduc$on 2. Applica$ons of MN 3. Requirements of MN 4. Coding and Compression 5. RTP

More information

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

ExamTorrent.   Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you ExamTorrent http://www.examtorrent.com Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you Exam : NSE7_EFW Title : NSE7 Enterprise Firewall - FortiOS 5.4 Vendor : Fortinet

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge

More information

Joel Obstfeld Director of Engineering SP CTO team November Cisco and/or its affiliates. All rights reserved. 1

Joel Obstfeld Director of Engineering SP CTO team November Cisco and/or its affiliates. All rights reserved. 1 Joel Obstfeld Director of Engineering SP CTO team November 2012 2012 Cisco and/or its affiliates. All rights reserved. 1 Controller architecture that efficiently computes & fits applica9on instances onto

More information

Internet2 DDoS Mitigation Update

Internet2 DDoS Mitigation Update Internet2 DDoS Mitigation Update Nick Lewis, Program Manager - Security and Identity, Internet2 Karl Newell, Cyberinfrastructure Security Engineer, Internet2 2016 Internet2 Let s start with questions!

More information

White Paper Network Management Considerations For VSAT Technology March 2010

White Paper Network Management Considerations For VSAT Technology March 2010 White Paper Network Management Considerations For VSAT Technology March 2010-1 - Introduction Network management is a serious aspect of any business, if not one of the most important. It is essential that

More information

RIPE NCC Routing Information Service (RIS)

RIPE NCC Routing Information Service (RIS) RIPE NCC Routing Information Service (RIS) Overview Colin Petrie 14/12/2016 RON++ What is RIS? What is RIS? Worldwide network of BGP collectors Deployed at Internet Exchange Points - Including at AMS-IX

More information

Affordable High-Speed Sensors Everywhere. ntop Meetup Flocon 2016, Daytona Beach Jan 13th 2016

Affordable High-Speed Sensors Everywhere. ntop Meetup Flocon 2016, Daytona Beach Jan 13th 2016 Affordable High-Speed Sensors Everywhere ntop Meetup Flocon 2016, Daytona Beach Jan 13th 2016 Welcome to the ntop Meetup Meeting Goals: Meet ntop users Describe our ideas and plans for 2016 Hear your comments

More information