2017 Commodity Flow Survey Subarea Estimates Methodology

Total Page:16

File Type:pdf, Size:1020Kb

2017 Commodity Flow Survey Subarea Estimates Methodology Page 1 of 8 The 2017 Commodity Flow Survey- Subarea Estimates Authors (in alphabetical order): Olivia Brozek (U.S. Census Bureau) Scot Dahl (U.S. Census Bureau) Steven Riesz (U.S. Census Bureau) May 2021 Page 2 of 8 The 2017 Commodity Flow Survey- Subarea Estimates Table of Contents Feedback from the data users ............................................................................................................................... 2 Information about the Commodity Flow Survey ................................................................................................... 2 Definitions of the Subareas and the origin-destination pairs................................................................................ 3 Description of the files containing the estimates .................................................................................................. 4 Quality of the estimates......................................................................................................................................... 6 Disclosure avoidance ............................................................................................................................................. 7 Citing the estimates, and citing this paper ............................................................................................................ 8 Feedback from the data users This is the first time these estimates have been published on the internet, and comments from the data users about the content and usefulness of these estimates are appreciated. Please contact the CFS staff by e-mail ([email protected]) or phone (301-763-2108), and give them your comments. Information about the Commodity Flow Survey The Commodity Flow Survey (CFS) is a joint effort by the Bureau of Transportation Statistics (BTS), U.S. Department of Transportation, and the U.S. Census Bureau, U.S. Department of Commerce. The survey is the primary source of national and subnational level data on domestic freight shipments by establishments in mining, manufacturing, wholesale, auxiliaries, and selected retail and services trade industries located in the 50 states and the District of Columbia. Data are provided on the type, origin and destination, value, weight, modes of transportation, distance shipped, and ton-miles of commodities shipped. The CFS is conducted every 5 years as part of the Economic Census. It provides estimates of national freight flows for all modes of transportation, and is the only publicly available source of commodity flow data for the truck mode. The CFS was conducted in 1993, 1997, 2002, 2007, 2012, and 2017. For more information about the 2017 Commodity Flow Survey (CFS), see https://www.census.gov/programs-surveys/cfs.html Page 3 of 8 For information about the methodology of the 2017 CFS, including sample design, sampling error, nonsampling error, disclosure avoidance, and definitions, see https://www2.census.gov/programs-surveys/cfs/technical- documentation/methodology/2017cfsmethodology.pdf Definitions of the Subareas and the origin-destination pairs In what follows below, by the phrase “metropolitan areas”, we mean micropolitan statistical areas (MiSAs), metropolitan statistical areas (MeSAs), or combined statistical areas (CSAs). The Subareas are groups of counties, and were defined by the Bureau of Transportation Statistics (BTS), by dividing the existing 132 CFS Areas into 329 Subareas, primarily based on the sample size of shipments (more precisely, the number of shipments that were used to compute estimates) and the definitions of metropolitan areas. Note that 33 of the 132 CFS Areas were not split into Subareas. Each Subarea consists of at least one county and, in general, each Subarea contains a sample size of at least 10,000 shipments, though there were many exceptions. In more detail, we used the following criteria to define Subareas: • Subareas were groups of counties. • Subareas were contained within CFS Areas, i.e. no Subarea crosses CFS Area boundaries. • Within rest-of-state CFS Areas, where there were metropolitan areas that did not make up too large a proportion of the rest-of-state CFS Area, Subareas were created from metropolitan areas, e.g. Toledo, Little Rock, Des Moines. • Within rest-of-state CFS Areas, where there were metropolitan areas that made up a very large proportion of the rest-of-state CFS Area, Subareas were not created from metropolitan areas, e.g. Albuquerque, Columbia. • No metropolitan areas that were contained within a CFS Area, were split into Subareas. • We retained as much logical geographic contiguity as possible. • Subareas contained 10,000 ± 2,000 shipments, if possible. o In some cases, this target was reduced to about 5,000 shipments. o Some Subareas had many more than 10,000 shipments. Estimates were not made for every possible origin-destination pair due to data limitations and the lack of industry exchange. BTS determined the particular origin-destination pairs for which estimates were made, as follows: After defining the Subareas, the 2012 CFS Public Use Microdata (PUM) file was used to identify origin- destination pairs with enough likely shipment flow between them to produce useful estimates. The pairs were determined by the following procedure: • Each origin Subarea in a state was paired with itself, all other Subareas in its state, all four Census regions, and the US. In addition: • If there were roughly 300 (or more) shipments going from an origin Subarea to all of the Subareas of a neighboring state, then all of those Subareas (as well as the CFS Areas and the state) were paired with the origin Subarea. Page 4 of 8 • Otherwise, if there were roughly 300 (or more) shipments going from the origin Subarea to all of the CFS Areas of a neighboring state, then all of those CFS Areas (and the state) were paired with the origin Subarea. • Otherwise, if there were roughly 300 (or more) shipments going from the origin Subarea to a state, then that state was paired with the origin Subarea. The estimates were made to capture commodities (in four broad groups) transported by trucks using approximately 5,734,000 truck or ground parcel shipments contained in the 2017 CFS data, out of approximately 5,979,000 total shipments. Commodities transported by other modes are not included in this special tabulation of CFS 2017. Description of the files containing the estimates There are two files that contain the estimates. 1. 2017 CFS Subarea Tab - Table O (PUBLIC).csv. This file contains estimates of the total value, total weight, total ton-miles, average miles per shipment, and total number of shipments, for truck or ground parcel shipments. The areas for which the estimates are made are: Origin (Subarea) x Destination (Census Region, State, CFS Area, or Subarea) x Commodity Group. 2. 2017 CFS Subarea Tab - Table D (PUBLIC).csv. This file contains estimates of the total value, total weight, total ton-miles, average miles per shipment, and total number of shipments, for truck or ground parcel shipments. The areas for which the estimates are made are: Origin (Census Region, State, CFS Area, or Subarea) x Destination (Subarea) x Commodity Group. The origin-destination (OD) pairs on this file are the reverse of those on the first file. That is, if there is an OD pair on the first file of Origin = geographic area 1 (a Subarea) and Destination = geographic area 2 (a Subarea, or a higher level of geography), then on the second file, there is an OD pair of Origin = geographic area 2 (a Subarea, or a higher level of geography) and Destination = geographic area 1 (a Subarea). Because the estimates are rounded, the sum of the estimates for smaller areas may not exactly equal the estimate for a larger area. Table A below describes the variables on these files. The variable names are on the first row of each file. Page 5 of 8 Table A: Variables on the files containing the estimates Abbreviations in Table A: # = An integer between 0 and 9, inclusive. Z = The number rounds to zero. S = Suppressed, i.e. not published, because the estimate did not meet publication standards. N = Not computed. Variable Description Valid values Comment OREG Origin Census region code M (Midwest), OREG, OST, OAREA, OSUB, N (Northeast), and DREG, DST, DAREA, S (South), DSUB are blank when they W (West) are not needed to characterize the geographic OST Origin FIPS state code 1 – 56 area. When all of the OAREA Origin CFS Area code ##### or ### destination variables are OSUB Origin Subarea code A – F, Z blank, the destination is the OFAF Origin FAF (Freight Analysis Framework) RFFAS (See US. Subarea code the box to the left for the Similarly, OFAF and DFAF OFAF is of the form RFFAS, where meaning of may not be five characters R=Census region (M, N, S, W), RFFAS.) long, as shown in the FF=FIPS state code (1-56), examples in column 2 of this table. A=FAF CFS Area code (1-9), and S=Subarea code (A-F, Z). Examples: M, M17, M171, M171A DREG Destination Census region code M (Midwest), N (Northeast), S (South), W (West) DST Destination FIPS state code 1 – 56 DAREA Destination CFS Area code ##### or ### DSUB Destination Subarea code A – F, Z DFAF Destination FAF Subarea code RFFAS (See the box to the DFAF is of the form RFFAS, where left for the R=Census region (M, N, S, W), meaning of FF=FIPS state code (1-56), RFFAS.) A=FAF CFS Area code (1-9), and S=Subarea code (A-F, Z). Examples: M, M17, M171, M171A DMODE Mode of domestic transportation “99” “99” is defined as truck- this includes ground parcel shipments. SCTG Commodity Group code
Recommended publications
  • View Document
    Application Report Date: 2016/05/05 For Region: All Time: 10:19:28 For Application Type: All Page: 1 For Application Status: ACCEPTED For Date Range: 2016/04/01 to 2016/04/30 Region Application Type Ref. No. Registered Name Status Date EC Retail New B/2016/04/20/0002 BLACK OIL HOLDINGS (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/20 EC Site New B/2016/04/20/0001 TRAKPROPS 146 (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/20 EC Retail New (Change-of-Hands) B/2016/04/25/0002 CALANDRA TRADING 669 CC ACCEPTED - PENDING DOCUMENTATION 2016/04/25 EC Retail New (Change-of-Hands) B/2016/04/25/0001 CALANDRA TRADING 669 CC ACCEPTED - PENDING DOCUMENTATION 2016/04/25 FS Retail New (Change-of-Hands) C/2016/04/29/0001 HECTOR AUSTIN ENGINEERING (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/29 FS Retail New (Change-of-Hands) C/2016/04/21/0001 DAIZEBEL (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/21 FS Retail New (Change-of-Hands) C/2016/04/26/0001 MAJA FUELS (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/26 FS Retail New (Change-of-Hands) C/2016/04/08/0001 MINOZEST (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/08 GP Retail New D/2016/04/22/0003 LAMANI BUSINESS ENTERPRISES (PTY) LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/22 GP Retail Temporary D/2006/08/17/0015/T16/1 CJ & CK (PTY) LTD ACCEPTED 2016/04/14 GP Site New D/2016/04/22/0002 TOWER PROPERTY FUND LIMITED ACCEPTED - PENDING DOCUMENTATION 2016/04/22 GP Wholesale New D/2016/04/29/0001 JUNE PETROLEUM PTY LTD ACCEPTED - PENDING DOCUMENTATION 2016/04/29 GP Wholesale New
    [Show full text]
  • AMD Geode™ LX Processors Data Book
    AMD Geode™ LX Processors Data Book February 2007 Publication ID: 33234E AMD Geode™ LX Processors Data Book © 2007 Advanced Micro Devices, Inc. All rights reserved. The contents of this document are provided in connection with Advanced Micro Devices, Inc. (“AMD”) products. AMD makes no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserves the right to make changes to specifications and product descriptions at any time without notice. No license, whether express, implied, arising by estoppel or otherwise, to any intellectual property rights is granted by this publication. Except as set forth in AMD’s Standard Terms and Conditions of Sale, AMD assumes no liability whatsoever, and disclaims any express or implied warranty, relating to its products including, but not limited to, the implied warranty of mer- chantability, fitness for a particular purpose, or infringement of any intellectual property right. AMD’s products are not designed, intended, authorized or warranted for use as components in systems intended for surgical implant into the body, or in other applications intended to support or sustain life, or in any other application in which the failure of AMD’s product could create a situation where personal injury, death, or severe property or environmental damage may occur. AMD reserves the right to discontinue or make changes to its products at any time without notice. Contacts www.amd.com Trademarks AMD, the AMD Arrow logo, AMD Athlon, AMD Geode, and combinations thereof, and 3DNow! and GeodeLink, are trademarks of Advanced Micro Devices, Inc. AMD-K6 is a registered trademark of Advanced Micro Devices, Inc.
    [Show full text]
  • System/370 Model 145 Reference Summary
    System/370 Model 145 Reference Summary S229-2239-1 IBM Corporation, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 PREFACE This publication is primarily intended for customer engineers servicing System/370 Model 145. Second Edition (September 1972) This is a major revision of, and makes 8229-2239-0 obsolete. Address any comments concerning the contents of this publication to: IBM, Field Support Documentation, Dept 927, Rochester, Minnesota 55901 © International Business Machines Corporation 1972 CONTENTS Section 1 - Control Words Branch and Module Switch Word "O" . 1. 1 Branch Word . 1.2 GA Function Charts . 1.3 GA Function Charts . 1.4 GA Function Charts . 1.5 Branch and Link or Return Word . 1.6 Word Move Word Version"O" . 1. 7 Word Move Word Version "1" . 1.8 Storage Word, Non K-Addressable . 1.9 Storage Word, K-Addressable . 1.10 Arithmetic Word 10 Byte Version 1.11 Arithmetic Word, Fullword Version 1.12 Arithmetic Word, 11 Direct ByteVersion . 1.13 Arithmetic Word, 10/11 Indirect Byte Version . 1.14 ALU Entry Gating 1.15 Stat Set Symbols . 1.15 BranchSymbols . 1.15 Arithmetic Word Chart Selection 1.16 Address Formation Chart 1.16 Control Word Chart Selection 1.16 Section 2 - CPU 3145 CPU Data Flow . 2.1 I-Cycles Data Flow . 2.2 I-Cycles . 2.3 PSW Locations . 2.3 Expanded Local Storage . 2.3 I-Cycles . 2.3 I-Cycles Control Line Generation . 2.4 Control Word . 2.4 Control Register Decode . 2.4 iii ECCL Board Layout ............ 2.5 Data Bit Location Chart .......... 2.5 Common Test Points ...........
    [Show full text]
  • Prioritization 4.0
    Prioritization 4.0 NCDOT Strategic Prioritization Office of Transportation July 2015 Agenda • Background • General Overview of Changes From P3.0 To P4.0 • Scoring and Scaling • Peak ADT • In-Depth Review of P4.0 Highway Criteria, Measures and Weights • In-Depth Review of P4.0 Non-Highway Criteria, Measures and Weights • Timeline/Schedule • SPOT On!ine • Local Input Methodologies and Best Practices 2 Background NCDOT is responsible for 6 modes of transportation: • Aviation (74 publicly‐owned airports) • Bicycle and Pedestrian • Ferries –2nd largest system in US (behind Washington) • Highways – Maintains 80,000 miles of highways (2nd only to Texas) • Public Transportation • Rail Annual Budget of approx. $4.1 B (federal dollars account for 25% of total budget) 3 Background Key Partners, as shown on colorful map below, include: • 19 Metropolitan Planning Organizations (MPOs) • 18 Rural Planning Organizations (RPOs) • 14 Field Offices (Divisions) *Unifour RPO has dissolved into adjacent MPOs 4 Strategic Transportation Investment (STI) New funding formula for NCDOT’s Capital Expenditures • Focus on Mobility/Expansion and Modernization projects for all modes House Bill 817 signed into Law June 26, 2013 Most significant transportation legislation in NC since 1989 Prioritization Workgroup charged with providing recommendations to NCDOT on weights and criteria. Reps include: • MPOs • RPOs • Division Engineers • Local Government Advocacy Groups 5 STI Legislation New funding formula for all capital expenditures, regardless of mode. All modes must
    [Show full text]
  • ILK]: Driver Should Make Sure the First 3D Command After the Engine Switch from BLT Not to Be 1
    Intel® OpenSource HD Graphics PRM Volume 1 Part 5: Graphics Core - Blitter Engine For the all new 2010 Intel Core Processor Family Programmer’s Reference Manual (PRM) March 2010 Revision 1.0 Doc Ref #: IHD_OS_V1Pt5_3_10 Creative Commons License You are free: to Share — to copy, distribute, display, and perform the work Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). No Derivative Works. You may not alter, transform, or build upon this work. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The Sandy Bridge chipset family, Havendale/Auburndale chipset family, Intel® 965 Express Chipset Family, Intel® G35 Express Chipset, and Intel® 965GMx Chipset Mobile Family Graphics Controller may contain design defects or errors known as errata which may cause the product to deviate from published specifications.
    [Show full text]
  • The New Tourism Lexicon: Rewriting Our Industry's Narrative
    POLICY BRIEF THE NEW TOURISM LEXICON: REWRITING OUR INDUSTRY'S NARRATIVE Last year, Destinations International released a policy "Washington is the problem. Remind voters again and brief entitled, “Advocacy in the Face of Ideology,” which again about Washington spending, Washington waste, made the case that relying on ROI numbers to defend Washington taxation, Washington bureaucracy, the value and relevancy of a destination organization Washington rules and Washington regulations." was no longer a viable advocacy strategy. Instead, we Luntz also suggested replacing "drilling for oil" with argued, destination organizations need to support the "exploring for energy," "undocumented workers" with message of ROI in terms of dollars and cents with an "illegal aliens," and "estate tax" with "death tax." The ideological and value-based appeal to convince political substitutions often work — an Ipsos/NPR poll found that leaders that without a destination organization, these support for abolishing the estate tax jumps to 76% from returns will inevitably vanish. 65% when you call it the death tax. Our industry has unfortunately fallen for what George Lakoff, a professor of Cognitive Science and Linguistics at the University of California at Berkeley, dubs the “Enlightenment Fallacy.” According to this viewpoint, you simply need to tell people the facts in clear language and they’ll reason to the right, true conclusions. The problem, as Lakoff puts it is, “The cognitive and brain sciences have shown this is false… it’s false in every single detail.” The reality is that people tend to frame political arguments, and the facts behind them, in terms of their own values.
    [Show full text]
  • Advanced Ipv6 Security in the LAN Gilles Roy, Technical Leader BRKSEC-3003 in 2015, 55% of Attacks Are from the Inside! *
    Advanced IPv6 Security in the LAN Gilles Roy, Technical Leader BRKSEC-3003 In 2015, 55% of attacks are from the inside! * Source: 2015 IBM Cyber Security Report 3 There is a lot happening on the LAN, it can be difficult to follow everything, lets break it down. 1. Operations 2. Attacks 3. Mitigations 4. Use cases 4 Use cases Enterprise SP Access Datacenter Address Allocation ✔ ✖ ✖ Duplicate Address Detection ✔ ✔ ✔ Address Resolution ✔ ✖ ✔ Operation Neighbor Unreachability Detection ✔ ✖ ✔ Prefix Allocation ✖ ✔ ✖ Making Default Router Discovery ✔ ✖ ✔ sense of Denial of Link Operations ✔ ✖ ✔ Denial of Address Resolution ✔ ✖ ✔ YOUR Router Theft ✔ ✔ ✔ Attacks Address Theft ✔ ✖ ✔ setup. Denial of Address Configuration ✔ ✔ ✖ Denial of Address Assignment ✔ ✖ ✖ RA Guard ✔ ✔ ✔ DHCP Guard ✔ ✔ ✖ Mitigation Source Guard ✔ ✖ ✔ Destination Guard ✔ ✖ ✖ Binding Guard ✔ ✖ ✔ 5 Abstract summary and pre-requisite • This session focuses on IPv6 security within the layer-2 domain • With a multi-dimensional approach: operations, vulnerabilities, mitigations and use-cases • It introduces security features at the First Hop, such RA Guard, Source Guard, Destination guard, etc • Requirements: Knowledge of IPv6 and IPv6 Neighbor Discovery 6 Agenda • IPv6 in the layer-2 domain: operations and protocols • IPv6 in the layer-2 domain: vulnerabilities • Attack Demonstration • Mitigating Vulnerabilities • Use cases overview 7 Some background on layer-2 & IPv6 • Layer-2: what is it? • Layer-2 domain: also “broadcast domain”, link, lan, vlan, segment • Nodes: hosts, routers,
    [Show full text]
  • Report on the Most Appropriate Indicators Related to the Basic Concepts
    D 4.1 – Report on the most appropriate indicators related to the basic concepts Report on the most appropriate indicators related to the basic concepts Deliverable D4.1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 870708 D 4.1 – Report on the most appropriate indicators related to the basic concepts Disclaimer: The contents of this deliverable are the sole responsibility of one or more Parties of the SmartCulTour consortium and can under no circumstances be regarded as reflecting the position of the Research Executive Agency and European Commission under the European Union’s Horizon 2020 programme. Copyright and Reprint Permissions “You may freely reproduce all or part of this paper for non-commercial purposes, provided that the following conditions are fulfilled: (i) to cite the authors, as the copyright owners (ii) to cite the SmartCulTour Project and mention that the EC co-finances it, by means of including this statement “Smart Cultural Tourism as a Driver of Sustainable Development of European Regions - SmartCulTour Project no. H2020-870708 co financed by EC H2020 program” and (iii) not to alter the information.” _______________________________________________________________________________________ How to quote this document: Petrić, L., Mandić, A., Pivčević, S., Škrabić Perić, B., Hell, M., Šimundić, B., Muštra, V., Mikulić, D., & Grgić, J. (2020). Report on the most appropriate indicators related to the basic concepts. Deliverable 4.1 of the Horizon 2020 project SmartCulTour (GA number 870708), published on the project web site on September 2020: http://www.smartcultour.eu/deliverables/ D 4.1 – Report on the most appropriate indicators related to the basic concepts This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No.
    [Show full text]
  • The (Many) Paths to “Destination X”
    Blog The (many) paths to “Destination X” Michelle Batten Head of Global Marketing, Mobile Division, Amadeus According to Amadeus’ new whitepaper, Better travel in the Live Travel Space “Get ready for Destination X,” today’s travel sellers have a golden opportunity to Destination X also offers enormous tap into destination services, a growing untapped potential to market and sell marketplace set to reach $183 billion by ancillary destination services to travelers. 2020. Drawing on survey results from It’s a place where travel agents, corporate more than a thousand CheckMyTrip by travel programs, and other providers of Amadeus mobile app users, the research flights, hotels and cars can continue identifies emerging trends about business servicing travelers at their final destination. and leisure travelers destined for Whether traveling on business, leisure or Destination X, one of the most important bleisure, mobile provides the perfect revenue-generating stops on a traveler’s platform to offer these destination services journey. on the move. Take me to travel nirvana Amadeus is helping travel providers better understand and address these challenges The Amadeus research poses questions and opportunities. Using the Amadeus such as, “Are travelers prepared as they Travel Platform, the Live Travel Space arrive to Destination X?” Are their needs aggregates all content into one platform, for add-on destination services like airport making it easier for travel sellers to find transfers, local activities and restaurant what they need, and provide the level of reservations being met? The paper personalization their travelers demand. explores eight trends regarding the challenges and opportunities travel sellers Are you ready to service customers more face in the post-booking ancillary game fully when they reach Destination X? and how you can win travelers trust in Download the whitepaper today at that arena.
    [Show full text]
  • Towards Coordinated, Network-Wide Traffic
    Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks by Saman Taghavi Zargar B.Sc., Computer Engineering (Software Engineering), Azad University of Mashhad, 2004 M.Sc., Computer Engineering (Software Engineering), Ferdowsi University of Mashhad, 2007 Submitted to the Graduate Faculty of the School of Information Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2014 UNIVERSITY OF PITTSBURGH SCHOOL OF INFORMATION SCIENCES This dissertation was presented by Saman Taghavi Zargar It was defended on June 3, 2014 and approved by James Joshi, Ph.D., Associate Professor, School of Information Sciences David Tipper, Ph.D., Associate Professor, School of Information Sciences Prashant Krishnamurthy, Ph.D., Associate Professor, School of Information Sciences Konstantinos Pelechrinis, Ph.D., Assistant Professor, School of Information Sciences Yi Qian, Ph.D., Associate Professor, College of Engineering, Dissertation Advisors: James Joshi, Ph.D., Associate Professor, School of Information Sciences, David Tipper, Ph.D., Associate Professor, School of Information Sciences ii Copyright c by Saman Taghavi Zargar 2014 iii Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks Saman Taghavi Zargar, PhD University of Pittsburgh, 2014 DDoS flooding attacks are one of the biggest concerns for security professionals and they are typically explicit attempts to disrupt legitimate users' access to services. Developing a com- prehensive defense mechanism against such attacks requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various such attacks. In this thesis, we dig into the problem of DDoS flooding attacks from four directions: (1) We study the origin of these attacks, their variations, and various existing defense mecha- nisms against them.
    [Show full text]
  • Socomo Marketing for Travel and Tourism: Empowering Co-Creation of Value
    Journal of Destination Marketing & Management 4 (2015) 151–161 Contents lists available at ScienceDirect Journal of Destination Marketing & Management journal homepage: www.elsevier.com/locate/jdmm SoCoMo marketing for travel and tourism: Empowering co-creation of value Dimitrios Buhalis n, Marie Foerste School of Tourism Bournemouth University, United Kingdom article info abstract Article history: Advanced technology enables users to amalgamate information from various sources on their mobile Received 18 June 2014 devices, personalise their profile through applications and social networks, as well as interact Accepted 6 April 2015 dynamically with their context. Context-based marketing uses information and communication Available online 5 May 2015 technologies (ICTs) that recognise the physical environment of their users. Tourism marketers are Keywords: increasingly becoming aware of those cutting-edge ICTs that provide tools to respond more accurately to Personalisation the context within and around their users. This paper connects the different concepts of context-based Mobile context-awareness marketing, social media and personalisation, as well as mobile devices. It proposes social context mobile Social media marketing (SoCoMo) marketing as a new framework that enables marketers to increase value for all stakeholders at Mobile technologies the destination. Contextual information is increasingly relevant, as big data collected by a wide range of Co-creation sensors in a smart destination provide real-time information that can influence the tourist experience. SoCoMo marketing introduces a new paradigm for travel and tourism. It enables tourism organisations and destinations to revolutionise their offering and to co-create products and services dynamically with their consumers. The proposed SoCoMo conceptual model explores the emerging opportunities and challenges for all stakeholders.
    [Show full text]
  • A Key-Based Routing System for P4-Programmable Networks
    electronics Article P4-KBR: A Key-Based Routing System for P4-Programmable Networks Pilar Manzanares-Lopez * , Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja Department of Information Technologies and Communications, Universidad Politecnica de Cartagena, E-30202 Cartagena, Spain; [email protected] (J.P.M.-G.); [email protected] (J.M.-S.) * Correspondence: [email protected]; Tel.: +34-968-326534 Abstract: Software-defined networking (SDN) architecture has provided well-known advantages in terms of network programmability, initially offering a standard, open, and vendor-agnostic interface (e.g., OpenFlow) to instruct the forwarding behavior of network devices from different vendors. However, in the last few years, data plane programmability has emerged as a promising approach to extend the network management allowing the definition and programming of customized and non-standardized protocols, as well as specific packet processing pipelines. In this paper, we propose an in-network key-based routing protocol called P4-KBR, in which end-points (hosts, contents or services) are identified by virtual identifiers (keys) instead of IP addresses, and where P4 network elements are programmed to be able to route the packets adequately. The proposal was implemented and evaluated using bmv2 P4 switches, verifying how data plane programmability offers a powerful tool to overcome continuing challenges that appear in SDN networks. Keywords: P4; routing; KBR; SDN Citation: Manzanares-Lopez, P.; Muñoz-Gea, J.P.; Malgosa-Sanahuja, J. 1. Introduction P4-KBR: A Key-Based Routing The idea of decoupling end-points (hosts, contents or services) from network ad- System for P4-Programmable dresses has been demanded in the last few years to provide support to enhanced services Networks.
    [Show full text]