The document discusses a 5-year study of internet traffic from an ISP network. It measured over 247 billion flows from 15,000 households between 2013-2017. The key findings were:
1) Daily traffic consumption per household doubled from 2014 to 2017 for ADSL connections and increased even more for FTTH connections.
2) Heavy users accounted for a large portion of total traffic and increased their consumption over time.
3) The study was able to track usage of specific services like Facebook and Netflix by identifying domains in traffic flows.
The document discusses challenges with forensic tracing in the evolving Internet. It begins by looking at traceback methods from the 1980s Internet, when each end site had a stable IP address. The introduction of NATs complicated traceback by hiding internal addresses. Further issues have arisen from IPv4 exhaustion, widespread NAT deployment including carrier-grade NATs, and the diversity of IPv4-IPv6 transition technologies used by different ISPs. This variability undermines the traditional model of tracing based on IP addresses and timestamps. New record keeping requirements are needed from ISPs but may not be practical or scalable. The complexity is increased further by trends toward more encrypted and opaque application-level protocols that obscure network-level sessions.
The document discusses network edge and core concepts from a "nuts and bolts" view of the internet. It describes how millions of connected devices communicate via links, transmission rates, and routers forwarding packets. It then discusses protocols controlling message sending and receiving, how the internet is a network of networks with public vs private sections, and standards like RFCs and IETF.
This document summarizes an update on IPv6 activity in CERNET2 that was presented on March 5, 2015. It discusses that CERNET2 has had a pure IPv6 backbone since 2003 connecting over 600 universities. IPv6 related research and experiments are conducted on CERNET2. Traffic statistics from January 2015 show backbone traffic exceeding 40Gbps and 10Gbps in some locations. The document also discusses challenges with scaling the DNS root server system and efforts to address this through techniques like anycasting and expanding the number of root server operators.
Analysing network characteristics with JavaScriptPhilip Tellis
This document contains slides from a presentation about using JavaScript to analyze network performance. It discusses how to measure latency, TCP handshake time, network throughput, DNS lookup time, IPv6 support and latency, and private network scanning using JavaScript. Code examples are provided for measuring each of these network metrics by making image requests and timing the responses. The presentation emphasizes that accurately measuring network throughput requires requesting resources of different sizes and accounting for TCP slow start. It also notes some challenges around caching and geo-located DNS results.
IPv6 The Big Move Transition And Coexistentfrenildand
The document discusses the transition from IPv4 to IPv6. It notes that IPv4 addresses are running out due to the rapid growth of the internet. IPv6 was developed as a replacement, using a 128-bit address space to provide vastly more addresses. The document outlines some key advantages of IPv6, such as larger addresses, simpler headers, better security and quality of service support. It also examines how IPv6 and IPv4 will coexist during a long transition period, using various transition technologies.
[Guest lecturer]
Place: University of Twente
Course: Network Security
Audience: bachelor students of computer science and electrical engineer, master students of computer science and telematics, master students from the 3TU cyber security, and members of ICT labs.
The document discusses challenges with forensic tracing in the evolving Internet. It begins by looking at traceback methods from the 1980s Internet, when each end site had a stable IP address. The introduction of NATs complicated traceback by hiding internal addresses. Further issues have arisen from IPv4 exhaustion, widespread NAT deployment including carrier-grade NATs, and the diversity of IPv4-IPv6 transition technologies used by different ISPs. This variability undermines the traditional model of tracing based on IP addresses and timestamps. New record keeping requirements are needed from ISPs but may not be practical or scalable. The complexity is increased further by trends toward more encrypted and opaque application-level protocols that obscure network-level sessions.
The document discusses network edge and core concepts from a "nuts and bolts" view of the internet. It describes how millions of connected devices communicate via links, transmission rates, and routers forwarding packets. It then discusses protocols controlling message sending and receiving, how the internet is a network of networks with public vs private sections, and standards like RFCs and IETF.
This document summarizes an update on IPv6 activity in CERNET2 that was presented on March 5, 2015. It discusses that CERNET2 has had a pure IPv6 backbone since 2003 connecting over 600 universities. IPv6 related research and experiments are conducted on CERNET2. Traffic statistics from January 2015 show backbone traffic exceeding 40Gbps and 10Gbps in some locations. The document also discusses challenges with scaling the DNS root server system and efforts to address this through techniques like anycasting and expanding the number of root server operators.
Analysing network characteristics with JavaScriptPhilip Tellis
This document contains slides from a presentation about using JavaScript to analyze network performance. It discusses how to measure latency, TCP handshake time, network throughput, DNS lookup time, IPv6 support and latency, and private network scanning using JavaScript. Code examples are provided for measuring each of these network metrics by making image requests and timing the responses. The presentation emphasizes that accurately measuring network throughput requires requesting resources of different sizes and accounting for TCP slow start. It also notes some challenges around caching and geo-located DNS results.
IPv6 The Big Move Transition And Coexistentfrenildand
The document discusses the transition from IPv4 to IPv6. It notes that IPv4 addresses are running out due to the rapid growth of the internet. IPv6 was developed as a replacement, using a 128-bit address space to provide vastly more addresses. The document outlines some key advantages of IPv6, such as larger addresses, simpler headers, better security and quality of service support. It also examines how IPv6 and IPv4 will coexist during a long transition period, using various transition technologies.
[Guest lecturer]
Place: University of Twente
Course: Network Security
Audience: bachelor students of computer science and electrical engineer, master students of computer science and telematics, master students from the 3TU cyber security, and members of ICT labs.
The document discusses challenges with forensic tracing in the evolving Internet. It begins by looking at traceback methods from the 1980s Internet, when each end site had a stable IP address. The introduction of NATs complicated traceback by hiding internal addresses. Further issues have arisen from IPv4 exhaustion, widespread NAT deployment including carrier-grade NATs, and the diversity of IPv4-IPv6 transition technologies used by different ISPs. This variability undermines the traditional model of tracing based on IP addresses and timestamps. New record keeping requirements are needed from ISPs but may not be practical or scalable. The complexity is increased further by trends toward more encrypted and fragmented Internet traffic that obscures the concept of network sessions.
This study analyzed 5 years of internet traffic data from an Italian ISP to understand how user behavior and internet infrastructure changed over time. The following key findings were summarized:
1. Daily internet usage per household more than doubled, driven largely by increased video streaming. Heavy users increased their consumption even more.
2. Popular web services like Facebook saw massive growth in users until reaching saturation around 2016, while per-user traffic also exploded before leveling off.
3. Major tech companies experimented with new web protocols, driving shifts from HTTP to HTTPS and the rise of HTTP/2.
4. Content delivery networks increasingly hosted content directly within ISP networks, bringing content closer to users and enabling sub-
Study of QoS on DNS services provided in Benin at AIS'18Yazid AKANHO
This document summarizes the results of a study on the quality of DNS services in Benin. The study analyzed: 1) the quality of DNS resolvers provided by ISPs in Benin, 2) the configuration of name servers for .bj domains, and 3) the attractiveness of the .bj ccTLD. For ISP resolvers, it was found that some complied with best practices while others did not, and many used third-party resolvers. The study of .bj domains found that two-thirds had name servers hosted abroad and few followed best practices. A survey on the .bj ccTLD found that while most people were aware of it, few used it due to issues like registration complexity.
India Internet Access Problems Whitepaper_Ver 2.2Arin Burman
The document discusses best practices for improving internet access in India. It recommends implementing anycast DNS instead of unicast DNS to route queries to nearby name servers. Using regional anycast with BGP traffic engineering can provide better routing within regions compared to global anycast. EDNS0 with client subnet information can help resolve inaccuracies from DNS resolutions being based on the resolver location rather than user location. Choosing an internet service provider directly with sufficient capacity in India can help ensure user traffic is served from local points of presence.
APNIC Director General Paul Wilson gives an overview of IP addressing, history of the protocol, role of the RIRs and how IP addresses resolve DNS queries at the 2020 Taiwan Internet Governance Forum, held online from 11 to 12 November 2020.
This document summarizes a joint research project between JPRS and several Japanese ISPs to enhance DNS resiliency. The goals were to install DNS servers in multiple regions of Japan to distribute query load and ensure continuity of DNS services during natural disasters. ISPs configured their networks to direct queries to local DNS nodes hosted by JPRS within their networks. Evaluation found queries shifted towards local nodes, response times improved, and Internet services remained available within ISP networks even when other DNS sites were unreachable, demonstrating increased DNS resiliency.
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceAPNIC
This document discusses IPv6 deployment and the choices network operators face as IPv4 addresses run out. It describes IPv6 and the need to transition due to IPv4 address exhaustion. The main choices for network operators are to do nothing and rely solely on IPv4, prolong IPv4 usage through widespread NAT deployment and IPv4 address trading, or deploy IPv6 through dual stack or transition technologies. Each option has advantages and disadvantages relating to address availability, network architecture requirements, and supporting new protocols.
APNIC has set up a honeypot network using Modern Honeypot Network (MHN) and is looking for more volunteers to participate by running a virtual machine with a public IP address. Passive DNS databases can provide information about past domain name resolutions and relationships between domains and IP addresses that is difficult to obtain through standard DNS queries. Farsight runs a large passive DNS network and the FIRST Passive DNS Exchange SIG is working on a common output format standard. CyberGreen collects risk indicator data on issues like open DNS, NTP, SSDP, and SNMP. The Censys Projects publishes daily snapshots of configuration data on IPv4 hosts, top websites, and X.509 certificates. APNIC conducts biennial surveys to
PLNOG 5: Maciej Stawiarski - How to Build a Network for the Next 25 Years PROIDEA
This document discusses strategies for building fiber access networks over the next 25 years to meet increasing bandwidth demands. It notes that bandwidth needs are growing exponentially due to HD video and new applications. Fiber is recommended for its long lifespan. Near-term options include GPON and active Ethernet, with a transition to 10G PON and eventually NG-PON2 with 40-100G speeds. Network equipment should support seamless upgrades between technologies. Proper fiber placement today can facilitate future upgrades without service disruptions.
Networking research — A reflection in the middle yearsAlan Quayle
Henning Schulzrinne Professor at Columbia University, ex-CTO of the FCC
Networking is no longer a new area of computer science and engineering – it has matured as a discipline and the major infrastructure it supports, the Internet, is long past being primarily a research artifact.
I believe that we should consider ourselves as the civil engineers of the Internet, primarily helping to understand and improve a vast and critical infrastructure. This implies that implementing changes takes decades, not conference cycles, and that implementation is largely driven by compatibility with existing infrastructure and considerations of cost effectiveness, where resources that research focuses on, such as bandwidth and compute cycles, often play a much smaller role than limited organizational capacity for change.
Telecommunications carriers, in particular, have become akin to airlines, largely operating equipment designed by others, with emphasis on marketing, not innovation. Even more than in other engineering disciplines, standards matter, whether set by standards bodies or dominant players.
Given the multi-year time frames of standards and the limited willingness of national funding bodies to support standardization work, this makes research impact harder, as does the increasing complexity of cellular networks and barriers to entry that shut out most researchers from contributing to large parts of commercial mobile networks.
The document summarizes discussions from IETF 94 and RIPE 71 conferences. Several new DNS-related RFCs were published, including ones on DNSSEC, DANE, and IPv6. Discussions also covered DNS record ordering, DS record management automation, and measuring the SMTP over TLS adoption. IPv6 performance improvements were noted since 2011, though challenges remain. DNSTAP was introduced as a new technology for monitoring DNS server operations with minimal performance impact.
IPv4 addresses are nearly exhausted while IPv6 provides a vast address space to support continued Internet growth. While IPv4 and IPv6 can coexist, IPv6 adoption is needed as the only sustainable solution. Global metrics show increasing IPv6 deployment over time through allocations, routing entries, and user access, though challenges remain around applications, skills, and justification. RIRs and IETF are committed to IPv6 to maintain the openness and development of the Internet.
Battle-tested event-driven patterns for your microservices architecture - Sca...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
5 maximazing networkcapacity_v4-jorge_alvaradoSSPI Brasil
This document discusses how to maximize network capacity through bandwidth optimization and data compression techniques. It provides an agenda that covers defining wireless link optimization, maximizing network capacity for internet access, VPN networks, UDP traffic, corporate applications, and cellular backhaul. Specific scenarios and case studies are presented where XipLink's optimization solutions have reduced bandwidth usage by 18-60% for various application types including internet, VPNs, VoIP, video surveillance, and file transfers. The solutions provide a typical return on investment of less than 4 months.
Jax london - Battle-tested event-driven patterns for your microservices archi...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Battle-tested event-driven patterns for your microservices architecture - Sca...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Rolling the Root Zone DNSSEC Key Signing Key, by Edward Lewis.
A presentation given at APNIC 42's DNS and INR Security session on Monday, 3 October 2016.
The document discusses challenges with forensic tracing in the evolving Internet. It begins by looking at traceback methods from the 1980s Internet, when each end site had a stable IP address. The introduction of NATs complicated traceback by hiding internal addresses. Further issues have arisen from IPv4 exhaustion, widespread NAT deployment including carrier-grade NATs, and the diversity of IPv4-IPv6 transition technologies used by different ISPs. This variability undermines the traditional model of tracing based on IP addresses and timestamps. New record keeping requirements are needed from ISPs but may not be practical or scalable. The complexity is increased further by trends toward more encrypted and fragmented Internet traffic that obscures the concept of network sessions.
This study analyzed 5 years of internet traffic data from an Italian ISP to understand how user behavior and internet infrastructure changed over time. The following key findings were summarized:
1. Daily internet usage per household more than doubled, driven largely by increased video streaming. Heavy users increased their consumption even more.
2. Popular web services like Facebook saw massive growth in users until reaching saturation around 2016, while per-user traffic also exploded before leveling off.
3. Major tech companies experimented with new web protocols, driving shifts from HTTP to HTTPS and the rise of HTTP/2.
4. Content delivery networks increasingly hosted content directly within ISP networks, bringing content closer to users and enabling sub-
Study of QoS on DNS services provided in Benin at AIS'18Yazid AKANHO
This document summarizes the results of a study on the quality of DNS services in Benin. The study analyzed: 1) the quality of DNS resolvers provided by ISPs in Benin, 2) the configuration of name servers for .bj domains, and 3) the attractiveness of the .bj ccTLD. For ISP resolvers, it was found that some complied with best practices while others did not, and many used third-party resolvers. The study of .bj domains found that two-thirds had name servers hosted abroad and few followed best practices. A survey on the .bj ccTLD found that while most people were aware of it, few used it due to issues like registration complexity.
India Internet Access Problems Whitepaper_Ver 2.2Arin Burman
The document discusses best practices for improving internet access in India. It recommends implementing anycast DNS instead of unicast DNS to route queries to nearby name servers. Using regional anycast with BGP traffic engineering can provide better routing within regions compared to global anycast. EDNS0 with client subnet information can help resolve inaccuracies from DNS resolutions being based on the resolver location rather than user location. Choosing an internet service provider directly with sufficient capacity in India can help ensure user traffic is served from local points of presence.
APNIC Director General Paul Wilson gives an overview of IP addressing, history of the protocol, role of the RIRs and how IP addresses resolve DNS queries at the 2020 Taiwan Internet Governance Forum, held online from 11 to 12 November 2020.
This document summarizes a joint research project between JPRS and several Japanese ISPs to enhance DNS resiliency. The goals were to install DNS servers in multiple regions of Japan to distribute query load and ensure continuity of DNS services during natural disasters. ISPs configured their networks to direct queries to local DNS nodes hosted by JPRS within their networks. Evaluation found queries shifted towards local nodes, response times improved, and Internet services remained available within ISP networks even when other DNS sites were unreachable, demonstrating increased DNS resiliency.
Where are we now: IPv6 deployment update - Brunei National IPv6 Day ConferenceAPNIC
This document discusses IPv6 deployment and the choices network operators face as IPv4 addresses run out. It describes IPv6 and the need to transition due to IPv4 address exhaustion. The main choices for network operators are to do nothing and rely solely on IPv4, prolong IPv4 usage through widespread NAT deployment and IPv4 address trading, or deploy IPv6 through dual stack or transition technologies. Each option has advantages and disadvantages relating to address availability, network architecture requirements, and supporting new protocols.
APNIC has set up a honeypot network using Modern Honeypot Network (MHN) and is looking for more volunteers to participate by running a virtual machine with a public IP address. Passive DNS databases can provide information about past domain name resolutions and relationships between domains and IP addresses that is difficult to obtain through standard DNS queries. Farsight runs a large passive DNS network and the FIRST Passive DNS Exchange SIG is working on a common output format standard. CyberGreen collects risk indicator data on issues like open DNS, NTP, SSDP, and SNMP. The Censys Projects publishes daily snapshots of configuration data on IPv4 hosts, top websites, and X.509 certificates. APNIC conducts biennial surveys to
PLNOG 5: Maciej Stawiarski - How to Build a Network for the Next 25 Years PROIDEA
This document discusses strategies for building fiber access networks over the next 25 years to meet increasing bandwidth demands. It notes that bandwidth needs are growing exponentially due to HD video and new applications. Fiber is recommended for its long lifespan. Near-term options include GPON and active Ethernet, with a transition to 10G PON and eventually NG-PON2 with 40-100G speeds. Network equipment should support seamless upgrades between technologies. Proper fiber placement today can facilitate future upgrades without service disruptions.
Networking research — A reflection in the middle yearsAlan Quayle
Henning Schulzrinne Professor at Columbia University, ex-CTO of the FCC
Networking is no longer a new area of computer science and engineering – it has matured as a discipline and the major infrastructure it supports, the Internet, is long past being primarily a research artifact.
I believe that we should consider ourselves as the civil engineers of the Internet, primarily helping to understand and improve a vast and critical infrastructure. This implies that implementing changes takes decades, not conference cycles, and that implementation is largely driven by compatibility with existing infrastructure and considerations of cost effectiveness, where resources that research focuses on, such as bandwidth and compute cycles, often play a much smaller role than limited organizational capacity for change.
Telecommunications carriers, in particular, have become akin to airlines, largely operating equipment designed by others, with emphasis on marketing, not innovation. Even more than in other engineering disciplines, standards matter, whether set by standards bodies or dominant players.
Given the multi-year time frames of standards and the limited willingness of national funding bodies to support standardization work, this makes research impact harder, as does the increasing complexity of cellular networks and barriers to entry that shut out most researchers from contributing to large parts of commercial mobile networks.
The document summarizes discussions from IETF 94 and RIPE 71 conferences. Several new DNS-related RFCs were published, including ones on DNSSEC, DANE, and IPv6. Discussions also covered DNS record ordering, DS record management automation, and measuring the SMTP over TLS adoption. IPv6 performance improvements were noted since 2011, though challenges remain. DNSTAP was introduced as a new technology for monitoring DNS server operations with minimal performance impact.
IPv4 addresses are nearly exhausted while IPv6 provides a vast address space to support continued Internet growth. While IPv4 and IPv6 can coexist, IPv6 adoption is needed as the only sustainable solution. Global metrics show increasing IPv6 deployment over time through allocations, routing entries, and user access, though challenges remain around applications, skills, and justification. RIRs and IETF are committed to IPv6 to maintain the openness and development of the Internet.
Battle-tested event-driven patterns for your microservices architecture - Sca...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
5 maximazing networkcapacity_v4-jorge_alvaradoSSPI Brasil
This document discusses how to maximize network capacity through bandwidth optimization and data compression techniques. It provides an agenda that covers defining wireless link optimization, maximizing network capacity for internet access, VPN networks, UDP traffic, corporate applications, and cellular backhaul. Specific scenarios and case studies are presented where XipLink's optimization solutions have reduced bandwidth usage by 18-60% for various application types including internet, VPNs, VoIP, video surveillance, and file transfers. The solutions provide a typical return on investment of less than 4 months.
Jax london - Battle-tested event-driven patterns for your microservices archi...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Battle-tested event-driven patterns for your microservices architecture - Sca...Natan Silnitsky
During the past couple of years I’ve implemented or have witnessed implementations of several key patterns of event-driven messaging designs on top of Kafka that have facilitated creating a robust distributed microservices system at Wix that can easily handle increasing traffic and storage needs with many different use-cases.
In this talk I will share these patterns with you, including:
* Consume and Project (data decoupling)
* End-to-end Events (Kafka+websockets)
* In memory KV stores (consume and query with 0-latency)
* Events transactions (Exactly Once Delivery)
Rolling the Root Zone DNSSEC Key Signing Key, by Edward Lewis.
A presentation given at APNIC 42's DNS and INR Security session on Monday, 3 October 2016.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
1. Five Years at the Edge:
Watching Internet from the ISP Network
Martino Trevisan, Danilo Giordano, Idilio Drago,
Marco Mellia, Maurizio Munafò
2. Five Years at the Edge:
Watching Internet from the ISP Network
Martino Trevisan, Danilo Giordano, Idilio Drago,
Marco Mellia, Maurizio Munafò
3. The Goals
2
“The Internet is the first thing that humanity has
built that humanity doesn't understand, the largest
experiment in anarchy that we have ever had.”
4. The Goals
2
“The Internet is the first thing that humanity has
built that humanity doesn't understand, the largest
experiment in anarchy that we have ever had.”
Eric Schmidt – ex Google Exec. Chairman
16. Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
17. Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat*Client IP address is anonymized
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
18. TLS/SNI
Facebook.com
Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
• Implements DN-Hunter
• To Track DNS conversations
• To tag the network flows with the FQDN
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat
FQDN
Facebook.com
DN-Hunter
*Client IP address is anonymized
HTTP Host:
--
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
19. TLS/SNI
Facebook.com
Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
• Implements DN-Hunter
• To Track DNS conversations
• To tag the network flows with the FQDN
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat
FQDN
Facebook.com
DN-Hunter
*Client IP address is anonymized
HTTP Host:
--
Jon Postel – RFC 791
“A name indicates what we seek.
An address indicates where it is.
A route indicates how we get there.”
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
20. TLS/SNI
Facebook.com
Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
• Implements DN-Hunter
• To Track DNS conversations
• To tag the network flows with the FQDN
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat
FQDN
Facebook.com
DN-Hunter
*Client IP address is anonymized
HTTP Host:
--
When FQDN
Current facebook.com, fbcdn.com
Before fbstatic-a.akamaihd.net
Jon Postel – RFC 791
“A name indicates what we seek.
An address indicates where it is.
A route indicates how we get there.”
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
21. TLS/SNI
Facebook.com
Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
• Implements DN-Hunter
• To Track DNS conversations
• To tag the network flows with the FQDN
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat
FQDN
Facebook.com
DN-Hunter
*Client IP address is anonymized
*
Full list at https://smartdata.polito.it/five-years-at-the-edge-watching-internet-from-the-isp-network/
HTTP Host:
--
When FQDN
Current facebook.com, fbcdn.com
Before fbstatic-a.akamaihd.net
Jon Postel – RFC 791
“A name indicates what we seek.
An address indicates where it is.
A route indicates how we get there.”
Regexp* Service
facebook.com, fbcdn.com,
ˆfbstatic-[a-z].akamaihd.net$
Facebook
netflix.com, nflxvideo.net Netflix
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
22. TLS/SNI
Facebook.com
Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
• Implements DN-Hunter
• To Track DNS conversations
• To tag the network flows with the FQDN
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat
FQDN
Facebook.com
DN-Hunter
*Client IP address is anonymized
*
Full list at https://smartdata.polito.it/five-years-at-the-edge-watching-internet-from-the-isp-network/
HTTP Host:
--
When FQDN
Current facebook.com, fbcdn.com
Before fbstatic-a.akamaihd.net
Regexp* Service
facebook.com, fbcdn.com,
ˆfbstatic-[a-z].akamaihd.net$
Facebook
netflix.com, nflxvideo.net Netflix
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
23. TLS/SNI
Facebook.com
Measurement Setup
5
• Process traffic in real-time
• Statistics computed at the end of the flow
• Implements DN-Hunter
• To Track DNS conversations
• To tag the network flows with the FQDN
c_ip c_port c_pkts c_bytes s_ip s_port s_pkts s_bytes Protocol
12.132.54.94* 1197 1 18938 87.250.137.92 443 1 992221 HTTP
Tstat
FQDN
Facebook.com
DN-Hunter
*Client IP address is anonymized
*
Full list at https://smartdata.polito.it/five-years-at-the-edge-watching-internet-from-the-isp-network/
HTTP Host:
--
When FQDN
Current facebook.com, fbcdn.com
Before fbstatic-a.akamaihd.net
Regexp* Service
facebook.com, fbcdn.com,
ˆfbstatic-[a-z].akamaihd.net$
Facebook
netflix.com, nflxvideo.net Netflix
5 Years 04/2013 – 10/2017
247 Billions flows
31.9 TB of compressed data
36. Traffic Consumption Increase
• Average download per user per day
• Increases at constant rate
8
• Does it hold at every hour of the day?
37. Traffic Consumption Increase
• Average download per user per day
• Increases at constant rate
8
• Does it hold at every hour of the day?
• Yes!
38. Traffic Consumption Increase
• Average download per user per day
• Increases at constant rate
8
• Does it hold at every hour of the day?
• Yes!
• Late night traffic increases
•automatic download of updates, machine-generated traffic
like IoT devices
•Larger for FTTH due to different profiles
39. Traffic Consumption Increase
• Average download per user per day
• Increases at constant rate
8
• Does it hold at every hour of the day?
• Yes!
• Late night traffic increases
•automatic download of updates, machine-generated traffic
like IoT devices
•Larger for FTTH due to different profiles
• During prime time FTTH has a higher increase
• Video streaming content in higher definition
40. Traffic Consumption Increase
• Average download per user per day
• Increases at constant rate
8
• Does it hold at every hour of the day?
• Yes!
• Late night traffic increases
•automatic download of updates, machine-generated traffic
like IoT devices
•Larger for FTTH due to different profiles
• During prime time FTTH has a higher increase
• Video streaming content in higher definition
The same user consume twice the traffic
48. What is the traffic load imposed by web services?
11
49. • Popularity tops in 2016
What is the traffic load imposed by web services?
11
50. • Popularity tops in 2016
• Per-user traffic drops mid 2016
What is the traffic load imposed by web services?
11
51. What is the traffic load imposed by web services?
12
52. What is the traffic load imposed by web services?
12
• Popularity almost reached saturation
53. What is the traffic load imposed by web services?
12
• Popularity almost reached saturation
• Per-user traffic now 10 MB per day
54. What is the traffic load imposed by web services?
12
• Popularity almost reached saturation
• Per-user traffic now 10 MB per day
• Christmas and New Year’s Eve peaks
55. What is the traffic load imposed by web services?
13
56. What is the traffic load imposed by web services?
13
• Popularity still growing
57. What is the traffic load imposed by web services?
13
• Popularity still growing
• Per-user traffic still exploding
58. What is the traffic load imposed by web services?
13
• Popularity still growing
• Per-user traffic still exploding
Snapchat, WhatsApp and Instagram are mostly
used from mobiles
Those are taking a predominant role also at home
59. What is the traffic load imposed by web services?
• Average traffic per-client per day
14
60. What is the traffic load imposed by web services?
• Average traffic per-client per day
14
61. What is the traffic load imposed by web services?
• Average traffic per-client per day
• Video auto-play enabled in 2014
14
62. What is the traffic load imposed by web services?
• Average traffic per-client per day
• Video auto-play enabled in 2014
• April traffic from 35 MB to 60+ MB
14
63. What is the traffic load imposed by web services?
• Average traffic per-client per day
• Video auto-play enabled in 2014
• April traffic from 35 MB to 60+ MB
• After video auto-play stopped
14
64. What is the traffic load imposed by web services?
• Average traffic per-client per day
• Video auto-play enabled in 2014
• April traffic from 35 MB to 60+ MB
• After video auto-play stopped
• July daily traffic topped at 90 MB
• 2.5 times March 2014!
14
65. What is the traffic load imposed by web services?
• Average traffic per-client per day
• Video auto-play enabled in 2014
• April traffic from 35 MB to 60+ MB
• After video auto-play stopped
• July daily traffic topped at 90 MB
• 2.5 times March 2014!
14
Big players owning servers and clients
can dramatically impact traffic consumption
complicating the management of ISP networks
78. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
18
79. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
18
80. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
18
81. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
18
82. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
18
segment
83. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
18
ack
segment
84. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
18
RTT
ack
segment
85. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
• RTT from the probe to servers only
• Core Network Delay
18
RTT
ack
segment
Core
network
delay
86. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
• RTT from the probe to servers only
• Core Network Delay
• Excluding RTT from clients to the probe
• Access network delay
18
RTT
ack
segment
Access
network
delay
Core
network
delay
87. CDN Monitoring Methodology
• Study CDNs impact
• Content access latency as Users’ Quality of
Experience metric
• Focus on the Round Trip Time (RTT)
• RTT from the probe to servers only
• Core Network Delay
• Excluding RTT from clients to the probe
• Access network delay
18
RTT
ack
segment
Access
network
delay
Core
network
delay
…Because access
delay is negligible…
… right?
88. The birth of the sub-millisecond Caching
• Compare RTT Distributions
• April 2014 vs April 2017
19
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
89. The birth of the sub-millisecond Caching
• Compare RTT Distributions
• April 2014 vs April 2017
19
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
3
90. The birth of the sub-millisecond Caching
• Compare RTT Distributions
• April 2014 vs April 2017
19
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
3
!
20
91. The birth of the sub-millisecond Caching
• Compare RTT Distributions
• April 2014 vs April 2017
19
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
Facebook, 2017
3
!
20
92. The birth of the sub-millisecond Caching
• Compare RTT Distributions
• April 2014 vs April 2017
19
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
Facebook, 2017
3
!
"
20
97. The birth of the sub-millisecond Caching
• Compare RTT Distributions
• April 2014 vs April 2017
19
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
YouTube, 2014
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
Facebook, 2014
Facebook, 2017
3
!
"
20
0.0
0.2
0.4
0.6
0.8
1.0
0.1 1 10 100
CDF
RTT [ms]
YouTube, 2014
YouTube, 2017
3
#
"
0.37
The CDN is inside
the PoP!
CDNs are making sub-millisecond internet possible
New headache for the ISPs: host/manage CDNs inside their network0.5
98. The Server Infrastructure
• Server IP evolution over time
• Red: the IP address was dedicated
• Blue: the IP address
• no dot: the IP address was not contacted in that day
20
99. The Server Infrastructure
• Server IP evolution over time
• Red: the IP address was dedicated
• Blue: the IP address
• no dot: the IP address was not contacted in that day
20
Always used a totally
dedicated infrastructure
100. The Server Infrastructure
• Server IP evolution over time
• Red: the IP address was dedicated
• Blue: the IP address
• no dot: the IP address was not contacted in that day
20
Always used a totally
dedicated infrastructure
In 2015 starts migrating to a
dedicated infrastructure
102. The Server Convergence
• Which Autonomous Systems are involved?
YouTube PoP integration
during 2015
21
103. The Server Convergence
• Which Autonomous Systems are involved?
YouTube PoP integration
during 2015
Migration to Facebook infrastructure
started in 2014 ended in 2015
21
104. The Server Convergence
• Which Autonomous Systems are involved?
YouTube PoP integration
during 2015
Migration to Facebook infrastructure
started in 2014 ended in 2015
21
Content providers deploy their own infrastructures
with thousands of IP addresses
105. Conclusion & Future Work
• Q1: Households daily traffic more than doubled
• Q2: Quick rise and sudden death of social applications
• Able to generate massive amount of data
• Q3: Big players experiment new protocols (& imposing
standards)
• Q4: The infrastructure keeps concentrating and specializing
22
106. Conclusion & Future Work
• Q1: Households daily traffic more than doubled
• Q2: Quick rise and sudden death of social applications
• Able to generate massive amount of data
• Q3: Big players experiment new protocols (& imposing
standards)
• Q4: The infrastructure keeps concentrating and specializing
• Future Work
• Web portal to make this data playable
• New analytics for…
22