Trace Data Sample Clauses

Trace Data. The performance of algorithms of this type depends heavily on the traffic characteristics. It was essential to use real traffic characteristics and we achieved this by collecting traffic traces for driving our simulation. We chose the National Laboratory for Applied Network Research (NLANR) because it has a very large network and also a large measurement infrastructure already in place1. The NLANR site gathers and maintains raw packet header data from different points in their network on a daily basis. They gather data in several different formats. We decided to use the 24-byte FR format which included the timestamp (seconds and microseconds), source and destination IP and port, packet size, IP protocol and TCP flags. All the fields except the IP addresses had the original values from the packet header. For security purposes the IP address had to be made completely irreversible using a one-way hash function. This meant that multiple trace data sets could not be used simultaneously to generate a single profile. Before encryption of the IP address we had mapped it to its corresponding BGP address prefix. We refer to the header data set that was gathered at the SDSC (University of California San Diego) measurement points of the NLANR infrastructure. The 778MB trace data was gathered for about 3hrs and 40 minutes at the location on 7th June 1999. In all it had 1247 different source and destination domains whereas there were a total of 63625 address prefixes. Among the 1247 active domains, only 30 or so domains contributed more than 90% of the traffic. We looked at the traffic destined to some of highly active destination domains and we saw that fewer than 10 source domains were almost always responsible for over 90% of the traffic destined to each domain. Generating the traffic profile from the trace data required the mapping of the domains into a common ingress node. We relied on an approximate solution by assuming a value for the number of ingress nodes to the network and a value for the bandwidth available at each ingress link. Using the rules that • if traffic exists between two domains, then those domains must be having different ingress nodes to the network • if traffic does not exist between two domains, then these domains are very likely to belong to the same ingress • the total traffic coming from an ingress node should not exceed the assumed bandwidth for any interval of time • the domains were divided among the assumed 8 ingress nodes Thus we had as...
AutoNDA by SimpleDocs

Related to Trace Data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Metering Data At Developer’s expense, the metered data shall be telemetered to one or more locations designated by Connecting Transmission Owner, Developer and NYISO. Such telemetered data shall be used, under normal operating conditions, as the official measurement of the amount of energy delivered from the Large Generating Facility to the Point of Interconnection.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Reference Data Each reference in this Lease to any of the terms and titles contained in this Article shall be deemed and construed to incorporate the data stated following that term or title in this Article.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement

  • Data To permit evaluation of requests under paragraph (c) of this clause based on unreasonable cost, the Contractor shall include the following information and any applicable supporting data based on the survey of suppliers: Foreign (Nondesignated Country) and Domestic Construction Materials Cost Comparison Construction material description Unit of measure Quantity Cost (dollars) * Item 1: Foreign construction material Domestic construction material Item 2 Foreign construction material Domestic construction material [List name, address, telephone number, and contact for suppliers surveyed. Attach copy of response; if oral, attach summary.][Include other applicable supporting information.] [* Include all delivery costs to the construction site.]

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!