Trace Data Sample Clauses

Trace Data. The performance of algorithms of this type depends heavily on the traffic characteristics. It was essential to use real traffic characteristics and we achieved this by collecting traffic traces for driving our simulation. We chose the National Laboratory for Applied Network Research (NLANR) because it has a very large network and also a large measurement infrastructure already in place1. The NLANR site gathers and maintains raw packet header data from different points in their network on a daily basis. They gather data in several different formats. We decided to use the 24-byte FR format which included the timestamp (seconds and microseconds), source and destination IP and port, packet size, IP protocol and TCP flags. All the fields except the IP addresses had the original values from the packet header. For security purposes the IP address had to be made completely irreversible using a one-way hash function. This meant that multiple trace data sets could not be used simultaneously to generate a single profile. Before encryption of the IP address we had mapped it to its corresponding BGP address prefix. We refer to the header data set that was gathered at the SDSC (University of California San Diego) measurement points of the NLANR infrastructure. The 778MB trace data was gathered for about 3hrs and 40 minutes at the location on 7th June 1999. In all it had 1247 different source and destination domains whereas there were a total of 63625 address prefixes. Among the 1247 active domains, only 30 or so domains contributed more than 90% of the traffic. We looked at the traffic destined to some of highly active destination domains and we saw that fewer than 10 source domains were almost always responsible for over 90% of the traffic destined to each domain. Generating the traffic profile from the trace data required the mapping of the domains into a common ingress node. We relied on an approximate solution by assuming a value for the number of ingress nodes to the network and a value for the bandwidth available at each ingress link. Using the rules that • if traffic exists between two domains, then those domains must be having different ingress nodes to the network • if traffic does not exist between two domains, then these domains are very likely to belong to the same ingress • the total traffic coming from an ingress node should not exceed the assumed bandwidth for any interval of time • the domains were divided among the assumed 8 ingress nodes Thus we had as...
AutoNDA by SimpleDocs

Related to Trace Data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Invoice Data The Contractor shall report invoice data from each paid or remitted invoice within 30 calendar days after the end of the reporting quarter, including the invoice data on task orders issued through the GSA AAS Business System Portal. (Note: Whatever method the Contractor chooses (e.g., “each paid” or “remitted”) the Contractor must be consistent in their reporting method throughout the term of the OASIS Contract). If no Invoice Data was received during a required reporting period for a specific task order, the Contractor shall report in the “Zero Invoice Data” screen located in the CPRM system for that particular task order. Regardless of contract type, the Contractor shall report the following into the CPRM:

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Metering Data At Developer’s expense, the metered data shall be telemetered to one or more locations designated by Connecting Transmission Owner, Developer and NYISO. Such telemetered data shall be used, under normal operating conditions, as the official measurement of the amount of energy delivered from the Large Generating Facility to the Point of Interconnection.

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

Time is Money Join Law Insider Premium to draft better contracts faster.