Internet Traffic Management and Accounting at UNSW David Rees Senior Network Engineer.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Internet Protocol How does information get sent from one device to another across a WAN?
BAI613 Module 2 - Voice over IP Technology. Module Objectives 1. Describe the benefits of IP Telephony/Packet Telephony/VoIP over traditional telephone.
Managing P2P Applications or Where Did My Internet Bandwidth Go? David L. Merrifield University of Arkansas June 19, 2003.
Southampton Open Wireless Network The Topology Talk.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Wireless and Switch Security NETS David Mitchell.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Computer Networks IGCSE ICT Section 4.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Section 461.  ARP  Ghostbusters  Grew up in Lexington, KY  Enjoy stargazing, cycling, and mushroom hunting  Met Mario once (long time ago)
Barracuda Networks Steve Scheidegger Commercial Account Manager
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Evaluating and Purchasing Electronic Resources- The University of Pittsburgh Experience Sarah Aerni Special Projects Librarian University of Pittsburgh.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
AARNet Copyright 2010 Network Operations The eduroam project group
1. What is the DMCA? Digital Millennium Copyright Act. Signed into law in Provides the legal framework for copyright holders to claim copyright.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Azfar Mian and Charles Benjamin.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Beach Routing Solutions. Company Profile Established 2008 CEO and Founder: Jesse J. Abulencia Located in the Hampton Roads Area Looking to grow exponentially.
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
Presenters: Chris White – Oregon State University Karl Vollmer – Oregon State University Chris Giem – Oregon State University Traffic Shaping & Quotas.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
1 Session Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for IP Routing Issues Cisco TAC Web Seminar.
Network Security Department of Housing and Resident Education Charles Benjamin.
Rocky Mountain Biological Lab Networks and Services.
Education roaming Secure Wireless Service for Research and Education.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
XTM Networking Tips and Tricks Carlo Alvarez Technical Trainer - APAC.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 Module Summary  A WAN allows the transmission of data across broad geographic distances.
Almost No-Cost Web Traffic Management Mark Bizzell & Matthew Mengel University of Southern Queensland.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
MoVoIX CSD 2005 mozambique voice over ip and ix extension FINAL PRESENTATION.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
Internet Traffic Management System Broadhop – case study The following case study and comments are for the QUESTnet & AARNet Workshop only, the views and.
Myles Fenton January 2008 Monash Internet service 2008.
Internet Charging at CSU. The Addiction Hello, My name is Tim Brown, from CSU. – Audience Participation “Hello Tim” I am an “Internet Traffic Charging.
CRICOS No J a university for the world real R Queensland University of Technology CRICOS No J Case Study of Internet Access at QUT Rod Swile.
UoM Data Billing Environment Legacy and Refresh Systems Cameron Shepherdley Information Technology Services.
Information Services Internet Accounting Workshop 1 st Feb 2011 Peter Kurtz Manager, Network & Communication Services.
Queensland University of Technology CRICOS No J Internet Access and QUT Presented by: Peter Kurtz February 2008.
UOW Internet Traffic Management & Accounting System Presented by Michele Grange Senior Manager, Business Services Unit, ITS University of Wollongong.
CRICOS Provider Code: 00113B Internet Traffic Management and Accounting at Deakin University QUESTnet & AARNet Workshop Brisbane – August 2012 Paul Fikkers.
AARNet Copyright 2012 Commercial in Confidence 1 Internet Traffic Management and Accounting Workshop Brisbane August 28 th & 29 th, 2012.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
Networking Components Assignment 3 Corbin Watkins.
Spreadsheet review. Primary key (also called key field): A field which is different for every record in the table Composite key When two fields together.
Chapter 1 Introduction to Networking
NAT (Network Address Translation)
Integration of and Third-Generation Wireless Data Networks
CONNECTING TO THE INTERNET
Planning and Troubleshooting Routing and Switching
Introduction to Networking
NSE4-5.4 Dumps
2018 Real Cisco Dumps IT-Dumps
Chapter 8: Subnetting IP Networks
A Glimpse Into a Few Current Tech Projects
Office 365 – How NOT to do it UKNOF43.
Presentation transcript:

Internet Traffic Management and Accounting at UNSW David Rees Senior Network Engineer

About UNSW Around 40,000 students & 5,000 staff Main campus at Kensington in Sydney’s Eastern Suburbs of Sydney); some small campuses within Sydney and several small WAN sites around NSW Several affiliated organisations such as NIDA, Garvan Institute, CCIA, Victor Change Cardiac Research Institute, NewSouth Global, Private Colleges etc

UNSW’s Network 2 x /16 IPv4 subnets (no NAT) 90,000 unique devices Redundant 10Gb/s links to AARNet & Internet (since Feb 2009) Data centres, most buildings and large WAN sites connected at 10Gb/s

Download Stats Downloaded 747.2TB in 2010 (267.2TB metered), peaking at 1.72Gb/s Mostly web traffic, not much R&E traffic

Wireless Network (UniWide) Upgraded wireless network in late 2007 and we decided to make it free with no quotas (subject to acceptable use policies) Much of growth in metered downloads can be attributed to the free, unlimited wireless network: wireless currently responsible for over half of Internet downloads No free wireless coverage in student accommodation areas

Copyright Infringement Receive around 1 or 2 copyright infringement notices per week, mostly for students on wireless network Penalties for network abuse include loss of access to the wireless network for up to one session; a formal disciplinary letter from the University and a fine of up to $1,000

Content Filtering We have the capability to filter web traffic using Blue Coat proxies but we don’t filter any traffic apart from shaping of P2P traffic on the wireless Decision taken at executive level not to filter anything Content filtering goes against the University ethos and there would be a large outcry if we did

Network Charging Models Student accommodation on campus (colleges) pay roughly $3 per GB for downloads (all traffic metered) Affiliated organisations (NIDA, Garvan Institute etc) are billed quarterly using a cost-recovery model which is based on a combination of connection charges ($42 per unique MAC address) and Internet downloads (off-net traffic only but off-peak is metered) Centrally funded faculties and business units are not charged but all network segments/VLANs are still measured as if they were, using the same billing system as the affiliated organisations Wireless network is free

UniWeb College Per-User Billing The student accommodation networks use the ‘UniWeb’ per-user billing system Pre-paid service based on Cisco Service Selection Gateway (SSG) integrated with a captive web portal for authentication Cost is approx $3 per GB downloaded The system was setup around 8 years ago and hasn’t really been touched since (same Sun server & same router still chugging along!)

Centurion IP Billing Network billing system for Affiliates is a 9 year old home- grown solution built by guys that left in 2003 Combination of connection charges and traffic charges gathered for every segment/VLAN on the network and then billed quarterly Only external customers/Affiliates are actually billed; vast majority is paid for centrally out of the Comms budget. System comprises basically three servers; one server for collecting data for the connection charges, one server for collecting data for the traffic charges and one server that runs the main database and reporting

Centurion IP Billing (cont.) Connection charges are based on the number of unique MAC addresses seen on a segment; as measured by a PERL script that runs every hour to grab the MAC address and ARP tables from key network devices Traffic charges are based on Netflow records from the primary border router. An attempt is made to only charge for off-net traffic but the list of on-net routes hasn’t been updated since 2003 and off-peak traffic is also metered Each quarter, a report is run which combines the data from the connection and traffic collectors and, where appropriate, bills are sent out to the owners of each network segment.

Future We have Cisco SCE’s which are currently just monitoring Internet traffic and shaping P2P on wireless We purchased TSA’s CAAB solution for telephony billing so we’ll probably buy the IP billing module for that and integrate it with the SCE’s to replace the college per- user billing system and implement quotas Low priority until the old systems break

Challenges Old billing systems are unmaintained, poorly documented and nobody really understands how they work Recently had to rewrite the MAC address collector to use SNMP instead of Expect scripts so we could implement AAA on network devices Ambiguous ‘ownership’ of legacy billing systems between Operations and Finance. May not be worth replacing the old billing systems if AARNet Excess charges go away and the proportion of metered traffic continues to fall

Off-Net Subscription Usage