SCAMPI

Public Deliverables

IST
An IST Project Home | Contact | Stats | Search
Overview
Partners
Publications
Calendar
Events
Related Sites
 
Private Area Restricted

Hosted by TERENA
WP0: Requirements Analysis
  • D0.1: Description and Analysis of the State-of-the-Art
    This document is a collection of reviews of state-of-the-art products that have been identified as relevant to the SCAMPI project. The reviews are based on theoretical and experimental efforts and the main goals of the reviews were to develop a solid and common understanding of state-of-the-art in network monitoring, identify existing and future needs and analyze requirements to be fulfilled by the SCAMPI platform.
    Published: 17 September 2002

  • D0.2: Measurement-based Application Requirements
    This document describes the user requirements for the SCAMPI network monitoring system. The requirements are based on the findings of D0.1, and on the experience of the various partners.
    Published: 8 October 2002

WP1: Monitoring Architecture Design
  • D1.1: High-Level SCAMPI Architecture and Components
    This document describes the high-level SCAMPI Architecture and Components. The Architecture is based on the findings of D0.1 and D0.2. This document describes the current need for network monitoring along with the major monitoring applications that need to be run on top of high-speed networks. The overall architecture of the system, including hardware, kernel-level software, and user-level software is also described.
    Published: 16 October 2002

  • D1.2: SCAMPI Architecture and Component Design
    This document describes the SCAMPI Architecture and Component Design. It is based on the findings of D0.1, D0.2, and D1.
    Published: 28 March 2003

  • D1.3: Final Architecture Design
    This document describes the detailed SCAMPI Architecture. It complements D1.1 which provides an overview of the SCAMPI architecture, and D1.2 which provided a more detailed view and thorough treatment of the Monitoring Application Programming Interface (MAPI). This deliverable focuses on providing a detailed software architecture for the SCAMPI monitoring system as described in section 5. Based on a MAPI daemon (mapid) and specialized hardware, the proposed architecture combines monitoring needs received from different clients and implements them in the most efficient way.
    Published: 13 November 2003

  • D1.4: Recommendations for Next Generation Monitoring Systems
    This document describes the trends in network monitoring technology and the requirements of emerging network monitoring applications, and outlines challenges and potential directions for next generation monitoring systems. It also discusses the experiences in designing the SCAMPI monitoring platform.
    Published: 10 January 2005

WP2: System Implementation
  • D2.1: Preliminary Implementation Report
    The goal of this document is to give an intermediate status report on the development progress of the first prototype components. This deliverable describes the internal operation of the SCAMPI system components which are currently being explored in order to refine the SCAMPI functionality based on practical experiences. The focus will be on the internal functionality of the different components at all levels of the functional architecture, and on the way they can be integrated. The definition of some enhanced features will be postponed or enhanced in future documents depending on this implementation experience.
    Published: 28 March 2003

  • D2.2: SCAMPI Prototype Implementation Report
    In this document, the status and operation of the developed prototype is presented. This deliverable describes the internal operation of the SCAMPI system components and their implemented interfaces. This prototype is currently being tested in order to refine the SCAMPI functionality based on practical experiences. Some major refinements and implementation decisions will be discussed. The focus will be on the internal functionality of the different components at all levels of the functional architecture and on the way they are integrated.
    Published: 14 November 2003

  • D2.3: Enhanced SCAMPI Implementation and Applications
    This document describes the enhanced implementation of the SCAMPI monitoring software and the applications. It follows on from D2.2 "SCAMPI Prototype Implementation Report" which focuses on the evolution of the different implemented SCAMPI prototypes. This deliverable elaborates on the detailed implementation of the architecture described in D1.3 "Final Architecture Design" and the optimizations that were considered. Next to the description of the internal structure of the different components, their integration and interconnection is carefully documented. The last chapter in this document describes the implementation of the various SCAMPI applications.
    Published: 16 April 2004

WP3: Experimental Evaluation
  • D3.1: Experiment Definition and Infrastructure Requirements
    This document describes the high-level tasks that need to be accomplished in order to assess both the development progress and the end results of SCAMPI. It defines the current environments in which the experiments are to be performed and will be used to identify the required infrastructure.
    Published: 12 November 2002

  • D3.2: Experimental Plans and Infrastructure Setup
    This document provides the detailed description of all evaluation experiments to be performed as part of Work Package 3 The experiment description follows up the high-level description of experiment plans and infrastructure setup in D3.1.
    Published: 28 March 2003

  • D3.3: Risk and Security Analysis
    All monitoring systems may possibly violate the privacy of the monitored entities and may theoretically reveal important information to unauthorised users. It therefore becomes necessary to make every effort to minimise the possibility of unauthorised access to information and misuse of the monitoring platform in general. This document provides the results of the continuous risk analysis that is performed within SCAMPI to identify the security risks of the system together with appropriate recommendations for risk management in order to reduce them to the minimum poisible.
    Published: 16 April 2004

  • D3.4: Description of Experiment Results, 1st Version
    This document describes the evaluation tests performed on the SCAMPI architecture. This is the first release of the deliverable, which includes performance tests of the SCAMPI architecture software running on top of the Gigabit Ethernet SCAMPI adapter and commodity Intel Gigabit Ethernet adapter with monitoring functions implemented in software.
    Published: 4 June 2004

  • D3.4: Description of Experiment Results, 2nd Version
    This document describes the evaluation tests performed on the SCAMPI architecture. This is the second release of the deliverable, which includes performance tests of the SCAMPI architecture software running on top of the Gigabit Ethernet SCAMPI adapter and commodity Gigabit Ethernet network interface card (NIC) with monitoring functions implemented in software and partially in firmware (packet header filtering), as well as several application tests.
    Published: 7 December 2004

  • D3.4: Description of Experiment Results, 3rd Version
    This document provides description of evaluation tests performed on the SCAMPI architecture. This is the third release of the deliverable and includes performance tests of the SCAMPI architecture software running on top of 1 Gigabit Ethernet SCAMPI with monitoring functions implemented in software and firmware. It also includes initial tests with 10 Gigabit Ethernet SCAMPI adapter and several application tests.
    Published: 10 January 2005

  • D3.4: Description of Experiment Results, 4th Version
    This document provides description of evaluation tests performed on the SCAMPI architecture. This is the fourth release of D3.4 deliverable. It includes performance tests of the SCAMPI architecture software running on top of 1 GE SCAMPI with monitoring functions implemented in software and firmware. It also includes tests with 10 GE SCAMPI adapter and several application tests. Published: 2 April 2005

  • D3.5: Assessment of SCAMPI architecture and implementation
    This document contains the evaluation of the SCAMPI architecture and implementation both by analysis and by assessing the experimental results. It also studies how succesful the SCAMPI architecture has been in meeting the original objectives.
    Published: 11 January 2005

WP4: Project Management and Dissemination
  • D4.1: Report on 1st SCAMPI Workshop
    This document provides a report of the 1st SCAMPI Workshop held on 27 January 2004 in Amsterdam, The Netherlands.
    Published: 19 March 2003

  • D4.2: Report Measurement and Monitoring BoF
    This document provides a report of the Measurement and Monitoring BoF held on 21 May 2004 in Zagreb, Croatia.
    Published: 30 July 2003

  • D4.3: Report on 2nd SCAMPI Workshop
    This document provides a report of the 2nd SCAMPI Workshop held on 3 May 2004 in Amsterdam, The Netherlands.
    Published: 18 June 2004

  • E2.1: Distributed Security Applications for the Internet using SCAMPI
    This document describes the security applications that have been developed as part of the SCAMPI project, namely, the Intrusion Detection Application and the Denial of Service Attack Detection Application. We present the implementation of the applications, the algorithms and techniques they incorporate, and several aspects regarding their extension to a distributed security infrastructure.
    Published: 4 May 2004

Copyright © SCAMPI Consortium - Updated 11/04/2005