The Broadband Comunication Research Group (CBA) inside of the "Centre de Comunicacions de Banda Ampla" CCABA is collaborating in the GpENI iniciative. The project is providing a testbed arround the world for Future Internet Architecture Research. Researchers can experiment over a real environment, their protocols and new network architectures. CCABA, a part from using the testbed , is providing one of the nodes of the infraestructure of GpENI project.
Project Website: https://wiki.ittc.ku.edu/gpeni/Main_Page
The CBA research group is member of the Spanish Observatory for IPv6 deployment
Jun 2009 - Jun 2012?
Project Website: http://wiki.rediris.es/observatorio_ipv6/Portada
The main objective of PASITO project is to provide a communication platform between universities and research centers from, and outside Spain to lay the foundations of a collaborative frame to develop their investigations. The platform has been developed over the Rediris infrastructure but separating the experimental from the production network. This separation allow PASITO partners to test new technologies without affecting the production services. Nowadays the PASITO platform interconnect fifteen research centers and universities over all Spain.
RedIRIS, UPC, I2CAT, CESCA, UPV, UM, UGR, CICA, UAM, UC3M, IMDEA, UPM, UVIGO, CESGA, EHU, I2BASK
Project Website: http://www.rediris.es/proyectos/pasito/
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network traffic is of different size, granularity and accuracy depending on the measurement task (e.g., relevant data for capacity planning and intrusion detection are very different). To satisfy these different demands, a new class of monitoring systems is emerging to handle multiple arbitrary and continuous traffic queries. Such systems must cope with the effects of overload situations due to the large volumes, high data rates and bursty nature of the network traffic. This project presents the design and evaluation of a system that can shed excess load in the presence of extreme traffic conditions, while maintaining the accuracy of the traffic queries within acceptable levels. The main novelty of our approach is that it is able to operate without explicit knowledge of the traffic queries. Instead, it extracts a set of features from the traffic streams to build an on-line predictionmodel of the query resource requirements. This way the monitoring system preserves a high degree of flexibility, increasing the range of applications and network scenarios where it can be used. We implemented our scheme in an existing network monitoring system and deployed it in a research ISP network. Our results show that the system predicts the resources required to run each traffic query with errors below 5%, and that it can efficiently handle extreme load situations, preventing uncontrolled packet losses, with minimum impact on the accuracy of the queries results.
Project Website: http://loadshedding.ccaba.upc.edu/
UPC-CBA is part of the Archipelago measurement infrastructure. The primary goals of Archipelago (Ark) are to achieve greater scalability and flexibility than our current measurement infrastructure and to provide a step toward a community-oriented measurement infrastructure by eventually allowing collaborators to run their vetted measurement tasks on a security-hardened distributed platform. Ark is tailored specifically for network measurement, which allows it to be simpler and to more directly address the needs of network researchers than is usually the case with a general-purpose distributed experimental platform. The initial and primary focus of Ark is to continue the large-scale traceroute-based active measurements of the skitter infrastructure. In both role and implementation, Ark subsumes the skitter infrastructure and represents a natural evolution. Ark will evolve from the skitter infrastructure by a gradual process in which pieces of the former infrastructure are extended, enhanced, and/or replaced.
Since November 2006
Project Website: http://www.caida.org/projects/ark/
AMP website with sensor list:
http://watt.nlanr.net/active/maps/ampmap_active.php The Ark Monitor at UPC-CCABA participates in the Spoofer Project (http://spoofer.csail.mit.edu)
As networks get faster and network-centric applications get more complex, our understanding of the Internet continues to diminish. New aspects of Internet behaviour emerge that are either unknown or poorly understood. Denial-of-service attacks, malicious self-replicating programs (worms) and viruses plague the Internet. All these indicate the need for better Internet traffic monitoring. Network monitoring and measurement is increasingly regarded as an essential function for developing and supporting high-quality network services, building and improving innovative networking technologies, analyzing infrastracture trends and user behavior and improving the security of our cyber-infrastracture. LOBSTER is a step towards providing an advanced pilot European passive Internet traffic monitoring infrastracture that will improve our understanding of the Internet and will contribute towards solving difficult performance and security problems. Based on appropriate abstractions and willing cooperation among points of presence, this proposal will contribute towards effectively monitoring the underlying network, providing early warning for security incidents, and providing accurate and meaningful measurements of performance. The main goal of LOBSTER is to deploy an advanced pilot European Internet Traffic Monitoring Infrastracture based on passive monitoring sensors at speeds starting from 2.5 Gbps and possibly up to 10 Gbps. It also aims to develop appropriate data anonymising tools to prohibit unauthorised tampering with the original traffic data, and to develop novel applications to improve monitoring (such as traffic characterisation and zero-day worm spread detection). Another aspect will be to provide anonymised traffic data to interested network researchers and security analysts.
Since october 2006
Project Website: http://www.ist-lobster.org/