



This page conatins a collection of detailed information about
public measurement infrastructures. Both technical and administrative
information is included, as well as pointers to published analysis.
Return to other measurement infrstructure analysis sections by selecting
from the pull-down menu below:
Public
IEPM
URL: | http://www-iepm.slac.stanford.edu/ |
Administration: |
|
Site Lists: | http://www.slac.stanford.edu/comp/net/wan-mon/traceroute-srv.html#site
|
Security Policy: | Some sites post a security warning about reverse traceroute. Some restrictions exist on broadcast pings. |
Time Granularity: | bursty (30 min); synchronizes using NTP |
Internet Load/Overhead: |
|
Internet Analysis: |
|
Internet2 (Abilene)
URL: | http://noc.net.internet2.edu/ |
Administration: | Indiana University NOC Information databased in Abilene NOC Database. |
Site Lists: | |
Security Policy: | unknown |
Time Granularity: | 5 mins; Daily; Weekly. All times reported in Eastern Standard time. |
Internet Load/Overhead: |
Mping packets {28 byte, 128 byte, 256 byte, 512 byte, 1024 byte, 1500 byte} Also uses WhatsUp Gold 3.5 by Ipswitch,Inc. (ICMP probes) |
Internet Analysis: |
Mantra - Monitor & ANalyze TRAffic (in multicast routers)
URL: | https://www.caida.org/tools/measurement/mantra/ |
Administration: | Central data collection site located at Networking and Multimedia Systems Lab at UC-Santa Barbara. Mirror site at CAIDA. Contact Prashant Rajvaidya for more information. |
Site Lists: | Routers from which Mantra collects data |
Security Policy: | Mantra requires read-only access to monitored routers. Many route tables, e.g., MBGP, DVMRP, MSDP, depict global multicast state that is generally not a privacy issue. If statistics about the data flow, and intranet activities are considered too sensitive, then participating sites can filter this information or elect not to pass it on to the central site. |
Time Granularity: | Interactive graphs and tables updated every 15-30 minutes |
Internet Load/Overhead: | Periodic data collector scripts run on a system local to the target router. This script logs on to the monitored router, reads internal memory tables, and transfers those tables to the local system for preprocessing. Data collection is given low-priority so as not to interfere with high load on the target router. Superfluous text is removed from raw router tables before transferring them to the central analysis site. |
Internet Analysis: |
|
MAWI - Measurement and Analysis on the WIDE Internet
URL: | http://www.wide.ad.jp/project/wg/mawi.html |
Administration: |
|
Site Lists: |
Four sample points collect traffic traces:
|
Security Policy: | Traffic traces are for research purposes only. Traces are sanitized using tcpdpriv. Payload is removed. Specific location of monitor is not disclosed. |
Time Granularity: | approximately daily |
Internet Load/Overhead: | Traces of varying time lengths are taken using tcpdump utility. |
Internet Analysis: | Samplepoint Traffic Traces no longer available. |
NIMI
URL: | http://www.ncne.nlanr.net/nimi/ (No longer available) |
Administration: | Distributed: Local management and control. |
Site Lists: | ACIRI (Berkeley), APAN (Seoul), AT&T Research, Boston U., CAIRN, CERN (Geneva), Columbia U., Georgia Tech U., ISI East, MIT, NASA Glenn Research Center, Sandia National Laboratory, SLAC, Swedish Inst. of Computer Science, U. of California (Berkeley, Los Angeles, and Santa Barbara), U. College (London), U. of Lulea, U. of Mannheim, U. of Massachusetts, U. of Michigan, U. or Oregon, U. of Pisa, U. of Southern California, U. of Virginia, U. of Washington. |
Security Policy: |
NIMI messages are encrypted via RSA private/public key pairs, and passed
between NIMI components via TCP/IP. A message consists of a header listing
the information necessary to decrypt the message body (key name), and an
encrypted message body. Volunteers hosting NIMI platforms trust NIMI developers enough to either grant admin access, or perform privileged operations upon request. Secure updating is needed. Each NIMI probe is configured by its CPOC to authorize particular sets of operations per credential. End users access infrastructure via the Measurement Client (MC). Data Analysis Client (DAC) acts as a repository and post-processor of measurement data. |
Time Granularity: | various (DAC can be run as part of the MC to collect immediate results, or as a daemon to collect on-going measurements.) MINC probes occur once every 2 minutes. |
Internet Load/Overhead: | NIMI probe consists of the nimid daemon
(responsible for communication with
the outside world and performing access control checks), and scheduled
daemon (does actual measurement scheduling, execution, and result
packaging). Measurement modules currently include: traceroute, mtrace, treno,
cap/capd, zing, mflect, traffic/discardd, and ftp. MINC (Multicast Inference of Network Characteristics) provides the measurement methodology used to determine performance characteristics of the interior of a network from edge measurements. This method is based on the use of correlations between performance degradation on different paths. Its innovation lies in its use of multicast probes (once every 2 minutes) exchanged between measurement servers. Probes use the MBone, the multicast-capable subset of the Internet. Three tools based on RTCP are used: mgen generates a stream of data; mflect calculates packet loss; mmerge collates mflect results. (Purpose of zing is unknown; may be a ping variant.) MINC probes reveal performance degradation correlations inherently. The MINT2000 (Multicast Inference Network Tool) provides a web-based interface for selecting MINC datasets, and visualizing the results. |
Internet Analysis: |
|
NLANR(MOAT) AMP
URL: | http://watt.nlanr.net (No longer available) |
Administration: | Requires installation of a rack mountable, FreeBSD machine with a 10/100Mbps Ethernet interface provided and administered by NLANR. |
Site Lists: |
|
Security Policy: | unknown |
Time Granularity: | Linear random occuring sometime during 1st 15 secs of each minute; synchronizes using NTP |
Internet Load/Overhead: | Probes are 64 bytes. |
Internet Analysis: |
|
NLANR(MOAT) PMA
URL: | http://old.nlanr.net/PMA/ (No longer available) |
Administration: | Requires installation of a rack mountable, FreeBSD machine with a FDDI, OC3, or OC12 network interface provided and administered by NLANR. |
Site Lists: | Map of PMA Passive Monitoring Sites. Note that one PMA site is in Israel, and one PMA machine is on the APAN link to Japan. |
Security Policy: | IP adresses in traces are encoded using a one-way function. |
Time Granularity: | Eight 90-second trace samples are taken at different times daily. |
Internet Load/Overhead: | Each 90 second trace is sanitized and stored as a uniquely named file. |
Internet Analysis: |
|
NPACI NWS
URL: | http://nws.cs.ucsb.edu (No longer available) |
Administration: | Requires the NWS software be installed by a local administrator. |
Site Lists: |
|
Security Policy: | unknown |
Time Granularity: | Typically, NWS network Sensors make measurements once every 10 to 60 seconds. |
Internet Load/Overhead: |
|
Internet Analysis: |
|
PPNCG
URL: | http://icfamon.rl.ac.uk/ppncg/title.html |
Administration: | Particle Physics Network Co-ordinating Group, JANET, UKERNA |
Site Lists: |
|
Security Policy: | unknown |
Time Granularity: | Frequency of ICFA Traceroutes is unknown. Traceping statistics gathered at Oxford occur at "regular intervals over a 24-hour period". |
Internet Load/Overhead: | unknown |
Internet Analysis: |
|
RIPE-RIS (Routing Information Service) and RIPE-TTM (Test Traffic Measurements)
URL: | RIS:
https://www.ripe.net/data-tools/stats/ris
TTM: http://www.ripe.net/data-tools/stats/ttm |
Administration: |
|
Site Lists: | RIS:
RRC00 in Amsterdam has 15 EBGP peers. RRC01 at LINX has approximately 50 peers. TTM: A map of locations of all test-boxes is available to members on a password-protected web page. |
Security Policy: |
|
Time Granularity: | RIS: Periodic since July 1999 TTM: Poisson (1/min); synchronizes using GPS |
Internet Load/Overhead: | RIS: Routing Data collected into RIS DB. SQL2RRD queries DB and makes
plots for display on the web. TTM: Approximately 3 probes per minute, each 100 bytes long. |
Internet Analysis: |
|
Surveyor
URL: | http://ippm-db.advanced.org/install.php |
Administration: | Requires a dedicated host and GPS aerial at each monitor site. All coordination done by Advanced Network and Services, Inc. |
Site Lists: | Advanced Network Services, Inc; Argonne T1; Army Labs, MD DREN; U. Auckland, NZ; BCNet GigaPop, Vancouver,Canada; Berkeley, Brookhaven Natl. Labs; Brown; Brown T1; U. New Brunswick, CANARIE; CANARIE I2 GigaPop; CERN, Carnegie-Mellon U.; U. Colorado; Columbia; Fermilab; Frontrange GigaPop; France Telecom; George Washington U.; Harvard; U. Hawaii; Indiana U. GigaPop; APAN, Japan; APAN, Korea; MCNC,RTP; U. Michigan; Maui HPCC; NASA Ames GigaPop; NCAR; NCSA; NIST; Ntl. Lib. Medicine(NLM); Nova Scotia CANARIE; Naval Post Graduate School T1; OneNet; Ontario GigaPop - CANARIE; Oregon GigaPop; Oak Ridge Labs; U. Penn. T1; Pacific Internet; Penn State U.; RIPE; SingAREN, Singapore APAN; SLAC; Spawar, DREN; Stanford U.; Texas GigaPop; U. Chicago; UCLA; UKERNA; U. Maryland; U. Minnesota; U. N. Carolina-T1; UNINETT; U. Alaska DREN; U. Mass.; U. Utah; U. Twente, Netherlands; U. Virginia; U. Washington; U. Wisconsin. |
Security Policy: | Secure Shell (SSH) and public-key encryption required for access to Surveyor Measurement Machine |
Time Granularity: | Probes sent at Poisson randomized intervals (2/sec); time synchronization using GPS |
Internet Load/Overhead: | Approximately 2Kbps/sec, where individual packets are 40 Bytes |
Internet Analysis: |
|
TRIUMF
URL: | http://sitka.triumf.ca/ |
Administration: | TRIUMF - Canada's National Laboratory for Particle and Nuclear Physics |
Site Lists: | 18 nodes monitored |
Security Policy: | unknown |
Time Granularity: | Traceroute data 4x per day. Pings every 10 minutes. |
Internet Load/Overhead: | unknown |
Internet Analysis: |
|
U Oregon Route Views Project
URL: | http://www.routeviews.org/ |
Administration: | Voluntary collaborations of network operators arranged with Route Views administrator David Meyer. David is also the director of the Advanced Network Technology Center at the University of Oregon. |
Site Lists: | See "Current Participants" section on web page. As of 8/15/00, 16 participants provide full routing tables and 9 others provide partial tables. |
Security Policy: | Loosely defined 'Acceptable Use of Data' discourages non-aggregated (e.g. where a specific provider is named) results where this might be sensitive. |
Time Granularity: | real-time snapshot of router's RAM |
Internet Load/Overhead: |
The Route Views router, route-views.oregon-ix.net , uses multi-hop BGP peering sessions with
backbones at interesting locations (note that location should not matter if the provider is
announcing consistent routes corresponding to its policy). Route Views uses AS65534 in its
peering sessions, and routes received from neighbors are never passed on nor used to
forward traffic. Finally, route-views.oregon-ix.net itself does not announce any prefixes.
Route Views currently services about 830 daily connections, about 90% of which are short interactive sessions likely used for querying specific routes or ASes, and the rest of which are longer-lived data collecting sessions from known data collectors. |
Internet Analysis: |
|
WAND
URL: | http://wand.cs.waikato.ac.nz/ |
Administration: | Requires dedicated host equipped with one or more DAG cards and a GPS system supporting time accuracy < 1 microsecond to UTC (typical installations use Trimble Palisade). |
Site Lists: |
|
Security Policy: | Only Internet protocol headers get captured (first 40 bytes). Some sites can operate with cleartext IP addresses. When published for anonymous retrieval via the Internet, traces get sanitized by mapping IP addresses into address space 10.x.x.x in a non-reversible fashion. The security policy will see improvements with more sophisticated measurement configurations. |
Time Granularity: | A Trimble Palisade GPS system delivers a 1PPS signal that is timestamped by the DAG network interface/measurement system and is accurate within one microsecond to UTC or better. Traces typically run for 24 hours, with measurements taken each second. |
Internet Load/Overhead: | Passive traces are non-intrusive. Dealing with large captured trace files can impose heavy network load when transferred. |
Internet Analysis: |
|
CAIDA CoralReef
URL: | https://www.caida.org/tools/measurement/coralreef/ |
Administration: | CAIDA configures dedicated Intel monitor boxes running FreeBSD, and installs using an optical splitter to passively capture, and analyze packets. |
Site Lists: |
|
Security Policy: | Trace files anonymized; no payloads. |
Measurement Granularity: | 5 minutes; 1 hour; 1 day; 7 days; 28 days; 365 days |
Internet Load/Overhead: | None. |
Internet Analysis: |
|
CAIDA skitter
URL: | https://www.caida.org/tools/measurement/skitter/ (deprecated by Archipelago) |
Administration: | primarily by CAIDA |
Site Lists: | No longer available. |
Security Policy: | Monitor boxes are physically secure. Secure data storage is used. All communication with the central collector is encrypted. |
Time Granularity: | Probes are typically made once every 30 minutes. Monitor Unix kernel has been modified to support consistent, meaningful probe timestamping. |
Internet Load/Overhead: |
1. ICMP probe packets are 52 bytes long. 2. Probes are rate-limited based on an algorithm that considers quality of connectivity. No more than 300 52-byte packets/second allowed. A monitor may generate between 300K - 1.1M probes/day. |
Internet Analysis: |
Daily summaries can be used to compare:
|