📄 rfc1272.txt
字号:
| | |
/ \ / \ / \
128.252.130.10 128.252.120.10 128.253.140.10
\ / \ / \ /
| | |
| | |
+-----------------+ +-----------------+ +----------------+
128.252.130.X 128.252.120.X 128.253.140.X
This is the first example in which the information that is germane
for service provider and consumer are not identical. The service
consumers are now the individual subnets and the service provider is
the facility-wide backbone. A service provider is interested in
knowing the contribution of individual subnets to the total traffic
of the backbone. In order to ascertain this, a meter on the backbone
(the longest line in the center of the illustration) can keep track
of flows between subnet pairs. Now the communications between
individual hosts on adjacent subnets are aggregated into a single
flow that measures activity between subnets.
The service consumers, or subnets, might in turn want to keep track
of the communications between individual hosts that use the services
of the backbone. An accounting system on the backbone could be
configured to monitor traffic among individual host pairs.
Alternately an accounting system on each individual subnet could keep
track of local and "non-local" traffic. The observed data of the two
sets of meters (one for the service provider and one for the service
consumers) should have reconcilable data.
Mills, Hirsh, & Ruth [Page 15]
RFC 1272 Internet Accounting: Background November 1991
5.3 A Regional Network
116.125
+-----------------+
|
+
/ \
116.125.10.10
\ /
/ + \
/ \
/ \
/ \
| + + |
| / \ / \ |
128.242 |----- 128.242.10.10 128.252.10.10 -----| 128.252
| \ / \ / |
| + + |
\ /
\ /
\ /
\ + /
/ \
124.110.10.10
\ /
+
+-----------------+
|
124.110
In this example we have a regional network consisting of a ring of
point-to-point links that interconnect a collection of campus-wide
LANs. Again service provider and consumer have differing interests
and needs for accounting data. The service provider, the regional
network, again will be interested in the contribution of each
individual network to the total traffic on the regional network.
This interest might extend to include measure of individual link
utilization, and not just total offered load to the network as a
whole. In this latter case the service provider will require that
meters be placed at one end or the other on each link. For the
service consumer, the individual campus, relevant measures would
include the contribution of individual subnets or hosts to the total
"outbound" traffic. Meter(s) placed in (or at) the router that
connects the campus- network to the regional network can perform the
necessary measurement.
Mills, Hirsh, & Ruth [Page 16]
RFC 1272 Internet Accounting: Background November 1991
5.4 A National Backbone
__________
|
+
| / \ |
|--+ 1 +--|
| \ / |
+
/ \
\ /
/ + \
/ \
_______ / \ _______
| / \ |
+ + + +
| / \ / \ / \ / \ |
|--+ 4 +----\ / 5 \ /-----+ 2 +-|
| \ / + + \ / |
+ \ / +
___|____ \ / ___|____
\ /
\ + /
/ \
\ /
+
| / \ |
|--+ 3 +--|
| \ / |
+
____|____
In this last case, the data that the service provider will want to
collect is the traffic between regional networks. The flow that
measures a regional network, or regional network pairs, is defined as
the union of all member-campus network address spaces. This can be
arrived at by keeping multiple individual network address flows and
developing the regional network contribution as post-processing
activity, or by defining a flow that is the union of all the relevant
addresses. (This is a cpu cycles for memory trade-off.) Note that
if the service provider measures individual network contributions,
then this data is, in large
measure, the data that the service consumers would require.
6. Future Issues
This last section is the collector for ancillary issues that are as
yet undefined or out of current scope.
Mills, Hirsh, & Ruth [Page 17]
RFC 1272 Internet Accounting: Background November 1991
APPLICATIONS standards: Recommendations for storage, processing and
reporting are left out for the moment. Storage and processing of
accounting information is dependent on individual network policy.
Recommendations for standardizing billing schemes would be premature.
QUOTAS are a form of closed loop feedback that represent an
interesting extension of usage reporting. But they will have to wait
until the basic accounting technology is reasonably defined and has
been the subject of a reasonable amount of experimentation.
SESSION ACCOUNTING: Detailed auditing of individual sessions across
the internet (at level four or higher) will not be addressed by
internet accounting. Internet accounting deals only with measuring
traffic at the IP level.
APPLICATION LEVEL ACCOUNTING: Service hosts and proxy agents have to
do their own accounting for services, since the network cannot
distinguish on whose behalf they are acting. Alternately, TCP/UDP
port numbers could become an optional field in a meter, since the
conjunction of a pair of IP addresses and port numbers occurring at a
particular time uniquely identifies a pair of communicating
processes.
The USER has not yet been defined, since an IP option would have to
be added to the IP header to provide for this. This option would
probably contain two parts - a subscriber identification and a user
sub-identification - to allow for the later introduction of quota
mechanisms which have both group and individual quotas. The
subscriber is the fiscally responsible entity, for example the
manager of a research group. In any case, routers must be able to
fall back to accounting by host, since there will most certainly be
hosts on the network which do not implement a new IP option in a
timely fashion.
7. References
International Standards Organization (ISO), "Management
Framework," Part 4 of Information Processing Systems Open Systems
Interconnection Basic Reference Model,ISO 7498-4, 1984.
International Standards Organization (ISO), "Security
Architecture," Part 2 of Information Processing Systems Open
Systems Interconnection Basic Reference Model,ISO 7498-2, 1984.
Mills, Hirsh, & Ruth [Page 18]
RFC 1272 Internet Accounting: Background November 1991
Security Considerations
Security issues are discussed in sections 2, 3 and 4.
Authors' Addresses
Cyndi Mills
Bolt, Beranek, and Newman
150 Cambridge Park Drive
Cambridge, MA 02140
Phone: 617-873-4143
Email: cmills@bbn.com
Donald Hirsh
Meridian Technology Corporation
11 McBride Corporate Center Drive
Suite 250
Chesterfield, MO 63005
Phone: 314-532-7708
Email: hirsh@meridian.uucp
Gregory Ruth
Bolt, Beranek, and Newman
150 Cambridge Park Drive
Cambridge, MA 02140
Phone: 617-873-3150
Email: gruth@bbn.com
Mills, Hirsh, & Ruth [Page 19]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -