2002 - cesnet
2002 - cesnet 2002 - cesnet
For displaying detailed information about a data flow, it is more convenientto use statistics generated from non-aggregated data that are stored in hourlytables. In this case, you can also choose from much more search criteria thanthose contained in the statistics generated from aggregated information, whichis described above. The output is formatted as a table with links pointing to detailedinformation about used IP addresses or autonomous systems.Figure 15.2: Statistics based on non-aggregated data15.3 NetFlow EventThe third component of the NetFlow Analyser system maintains sending ofinformation to selected targets. For a given message, multiple addressees andthe message type (e-mail, SMS) can be specified in the system. Event types towhich specific rules should apply are optional. For example, it is possible todefine that all information should be sent by e-mail, but critical errors shouldbe sent to a mobile phone.In the future, we plan to add the support for sending messages to pagers and toa directly connected SMS gateway. Unfortunately, we did not manage to implementany information aggregation this year. Currently, every item is sent individually,which may lead to the unpleasant mailbox overflow effect.172 High-speed National Research Network and its New Applications 2002
15.4 ConclusionDuring 2002, our team successfully created the main core of the monitoringsystem, which could efficiently search for network problems and which actuallyprovides means for avoiding such problems. The developed analyser iscurrently under testing performed by Mr. Valencia Scott from the AT&T corporationand Mr. Rich Polyak from the pharmaceutical company Aventis. In orderto speed up the application development, we established a closed developmentmailing list at netflow-l@cesnet.cz in December.High-speed National Research Network and its New Applications 2002173
- Page 121 and 122: 9 Quality of Service in HighspeedNe
- Page 123 and 124: In addition, Juniper routers make u
- Page 125 and 126: We tried to divide the capacity of
- Page 127 and 128: low with respect to the capacity of
- Page 129 and 130: Figure 9.10: Loss rate on Prague-Po
- Page 131 and 132: sendingapplicationTCP senderseqackp
- Page 133 and 134: Figure 9.13: Example of a course of
- Page 135 and 136: Part IIInternational Projects
- Page 137 and 138: 10 GÉANTSince 1996, CESNET has bee
- Page 139 and 140: Figure 10.2: Utilization of individ
- Page 141 and 142: 11 DataGridSince 2001, our research
- Page 143 and 144: Therefore, we organized a meeting w
- Page 145 and 146: 12 SCAMPISCAMPI (Scaleable Monitori
- Page 147 and 148: 12.3.1 WP0 - Requirement AnalysisTh
- Page 149 and 150: 1 6 12 18 24 30requirements analysi
- Page 151 and 152: Part IIIOther Projects
- Page 153 and 154: 13 Online Education Infrastructurea
- Page 155 and 156: 13.1.2 Construction of a Teleinform
- Page 157 and 158: with high-capacity disk memories co
- Page 159 and 160: If the collaboration of individual
- Page 161 and 162: ten, whereas items in the hyperlink
- Page 163 and 164: Besides that, we processed some lec
- Page 165 and 166: CallManager was designed using open
- Page 167 and 168: tre, when we were forced to handle
- Page 169 and 170: 15 Intelligent NetFlow AnalyserThe
- Page 171: In the second half-year, we complet
- Page 175 and 176: • data space consolidation (easy
- Page 177 and 178: ecord size [kB] 256 512 1024 2048 4
- Page 179 and 180: Figure 16.3: Nishan-Linux measureme
- Page 181 and 182: 16.3.1 No SecurityThe initiator is
- Page 183 and 184: vices. These features mainly involv
- Page 185 and 186: Figure 17.1: www.cesnet.cz• We ha
- Page 187 and 188: The meeting was broadcast live via
- Page 189 and 190: Most of the problems connected with
- Page 191 and 192: Standard manipulator (privileged us
- Page 193 and 194: 19 Security of Local CESNET2Network
- Page 195 and 196: Moreover, the program was complemen
- Page 197 and 198: in the network of AV ČR Praha-Krč
- Page 199 and 200: 19.5 Future Plans, Expected Further
- Page 201 and 202: InternetNTPEthernetKPCPPSLabelPPSLa
- Page 203 and 204: generated by the NTP server. Its ou
- Page 205 and 206: 21 Platforms for Streaming andVideo
- Page 207 and 208: streaming serverAAA (LDAPS) server1
- Page 209 and 210: 21.5 Video Content CollaborationPla
- Page 211 and 212: First of all, we had to define an a
- Page 213 and 214: international-scale broadcast will
- Page 215 and 216: Part IVConclusion and Annexes
- Page 217 and 218: 23 ConclusionThe current developmen
- Page 219 and 220: AList of connected institutionsA.1
- Page 221 and 222: institutionconnection [Mbps]Institu
For displaying detailed information about a data flow, it is more convenientto use statistics generated from non-aggregated data that are stored in hourlytables. In this case, you can also choose from much more search criteria thanthose contained in the statistics generated from aggregated information, whichis described above. The output is formatted as a table with links pointing to detailedinformation about used IP addresses or autonomous systems.Figure 15.2: Statistics based on non-aggregated data15.3 NetFlow EventThe third component of the NetFlow Analyser system maintains sending ofinformation to selected targets. For a given message, multiple addressees andthe message type (e-mail, SMS) can be specified in the system. Event types towhich specific rules should apply are optional. For example, it is possible todefine that all information should be sent by e-mail, but critical errors shouldbe sent to a mobile phone.In the future, we plan to add the support for sending messages to pagers and toa directly connected SMS gateway. Unfortunately, we did not manage to implementany information aggregation this year. Currently, every item is sent individually,which may lead to the unpleasant mailbox overflow effect.172 High-speed National Research Network and its New Applications <strong>2002</strong>