⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1272.txt

📁 <VC++网络游戏建摸与实现>源代码
💻 TXT
📖 第 1 页 / 共 4 页
字号:
   In other cases USAGE-SENSITIVE charges may be preferred or required   by a local administration's policy.  Government regulations or the   wishes of subscribers with low or intermittent traffic patterns may   force the issue (note: FLAT FEES are beneficial for heavy network   users.  USAGE SENSITVE charges generally benefit the low-volume   user).  Where usage-sensitive accounting is used, cost ceilings and   floors may still be established by static parameters, such as "pipe   size" for fixed connections or "connection time" for dial-up   connection, to satisfy the need for some predictability.Mills, Hirsh, & Ruth                                            [Page 5]RFC 1272            Internet Accounting: Background        November 1991   Different billing schemes may be employed depending on network   measures of distance.  For example, local network traffic may be   flat-rate and remote internet traffic may be usage-based, analogous   to the local and long distance billing policies adopted by the   telephone companies.   The ANRG is independently investigating policy models and   infrastructure economics for billing and cost recovery.3.3. The Nature of Usage Accounting   Although the exact requirements for internet usage accounting will   vary from one network administration to the next and will depend on   policies and cost trade-offs, it is possible to characterize the   problem in some broad terms and thereby bound it.  Rather than try to   solve the problem in exhaustive generality (providing for every   imaginable set of accounting requirements), some assumptions about   usage accounting are posited in order to make the problem tractable   and to render implementations feasible.  Since these assumptions form   the basis for our architectural and design work, it is important to   make them explicit from the outset and hold them up to the scrutiny   of the Internet community.3.3.1. A Model for Internet Accounting   We begin with the assumption that there is a "network administrator"   or "network administration" to whom internet accounting is of   interest.  He "owns" and operates some subset of the internet (one or   more connected networks)that may be called his "administrative   domain".  This administrative domain has well defined boundaries.                        our domain X                     -------------------                    /    |   |   |   |                   /                 |           C                  /                ------       /             Network A            /    | \     /              -----     (diagonals        \___/____              | | |      cross admin.      domain B                         boundaries)   The network administrator is interested in 1) traffic within his   boundaries and 2) traffic crossing his boundaries.  Within his   boundaries he may be interested in end-system to end-system   accounting or accounting at coarser granularities (e.g., department   to department).Mills, Hirsh, & Ruth                                            [Page 6]RFC 1272            Internet Accounting: Background        November 1991   The network administrator is usually not interested in accounting for   end-systems outside his administrative domain; his primary concern is   accounting to the level of other ADJACENT (directly connected)   administrative domains.  Consider the viewpoint of the administrator   for domain X of the internet.  The idea is that he will send each   adjacent administrative domain a bill (or other statement of   accounting) for its use of his resources and it will send him a bill   for his use of its resources.  When he receives an aggregate bill   from Network A, if he wishes to allocate the charges to end users or   subsystems within his domain, it is HIS responsibility to collect   accounting data about how they used the resources of Network A.  If   the "user" is in fact another administrative domain, B, (on whose   behalf X was using A's resources) the administrator for X just sends   his counterpart in B a bill for the part of X's bill attributable to   B's usage.  If B was passing traffic for C, them B bills C for the   appropriate portion X's charges, and so on, until the charges   percolate back to the original end user, say G. Thus, the   administrator for X does not have to account for G's usage; he only   has to account for the usage of the administrative domains directly   adjacent to himself.   This paradigm of recursive accounting may, of course, be used WITHIN   an administrative domain that is (logically) comprised of sub-   administrative domains.   The discussion of the preceding paragraphs applies to a general mesh   topology, in which any Internet constituent domain may act as a   service provider for any connected domain.  Although the Internet   topology is in fact such a mesh, there is a general hierarchy to its   structure and hierarchical routing (when implemented) will make it   logically hierarchical as far as traffic flow is concerned.  This   logical hierarchy permits a simplification of the usage accounting   perspective.   At the bottom of the service hierarchy a service-consuming host sits   on one of many "stub" networks.  These are interconnected into an   enterprise-wide extended LAN, which in turn receives Internet   service, typically from a single attachment to a regional backbone.   Regional backbones receive national transport services from national   backbones such as NSFnet, Alternet, PSInet, CERFnet, NSInet, or   Nordunet.  In this scheme each level in the hierarchy has a   constituency, a group for which usage reporting is germane, in the   level underneath it.  In the case of the NSFnet the natural   constituency, for accounting purposes at least, is the regional nets   (MIDnet, SURAnet,...).  For the regionals it will be their member   institutions; for the institutions, their stub networks; and for the   stubs, their individual hosts.Mills, Hirsh, & Ruth                                            [Page 7]RFC 1272            Internet Accounting: Background        November 19913.3.2. Implications of the Model   The significance of the model sketched above is that Internet   accounting must be able to support accounting for adjacent   (intermediate) systems, as well as end-system accounting.  Adjacent   system accounting information cannot be derived from end-system   accounting (even if complete end-system accounting were feasible)   because traffic from an end-system may reach the administrative   domain of interest through different adjacent domains, and it is the   adjacent domain through which it passes that is of interest.   The need to support accounting for adjacent intermediate systems   means that internet accounting will require information not present   in internet protocol headers (these headers contain source and   destination addresses of end-systems only).  This information may   come from lower layer protocols (network or link layer) or from   configuration information for boundary components (e.g., "what system   is connected to port 5 of this IP router").4. Meters   A METER is a process which examines a stream of packets on a   communications medium or between a pair of media.  The meter records   aggregate counts of packets belonging to FLOWs between communicating   entities (hosts/processes or aggregations of communicating hosts   (domains)).  The assignment of packets to flows may be done by   executing a series of rules.  Meters can reasonably be implemented in   any of three environments -- dedicated monitors, in routers or in   general-purpose systems.   Meter location is a critical decision in internet accounting.  An   important criterion for selecting meter location is cost, i.e.,   REDUCING ACCOUNTING OVERHEAD and MINIMIZING THE COST OF   IMPLEMENTATION.   In the trade-off between overhead (cost of accounting) and detail,   ACCURACY and RELIABILITY play a decisive role.  Full accuracy and   reliability for accounting purposes require that EVERY packet must be   examined.  However, if the requirement for accuracy and reliability   is relaxed, statistical sampling may be more practical and   sufficiently accurate, and DETAILED ACCOUNTING is not required at   all.  Accuracy and reliability requirements may be less stringent   when the purpose of usage-reporting is solely to understand network   behavior, for network design and performance tuning, or when usage   reporting is used to approximate cost allocations to users as a   percentage of total fees.   Overhead costs are minimized by accounting at the coarsest acceptableMills, Hirsh, & Ruth                                            [Page 8]RFC 1272            Internet Accounting: Background        November 1991   GRANULARITY, i.e., using the greatest amount of AGGREGATION possible   to limit the number of accounting records generated, their size, and   the frequency with which they are transmitted across the network or   otherwise stored.   The other cost factor lies in implementation.  Implementation will   necessitate the development and introduction of hardware and software   components into the internet.  It is important to design an   architecture that tends to minimize the cost of these new components.4.1. Meter Placement   In the model developed above, the Internet may be viewed as a   hierarchical system of service providers and their corresponding   constituencies.  In this scheme the service provider accounts for the   activity of the constituents or service consumers.  Meters should be   placed to allow for optimal data collection for the relevant   constituency and technology.  Meters are most needed at   administrative boundaries and data collected such that service   provider and consumer are able to reconcile their activities.   Routers (and/or bridges) are by definition and design placed   (topologically) at these boundaries and so it follows that the most   generally convenient place to position accounting meters is in or   near the router.  But again this depends on the underlying transport.   Whenever the service-providing network is broadcast (e.g., bus-   based), not extended (i.e., without bridging or routing), then meter   placement is of no particular consequence.  If one were generating   usage reports for a stub LAN, meters could reasonably be placed in a   router, a dedicated monitor, or a host at any point on the LAN.   Where an enterprise-wide network is a LAN, the same observation   holds.  At the boundary between an enterprise and a regional network,   however, in or near a router is an appropriate location for meters   that will measure the enterprise's network activity.   Meters are placed in (or near) routers to count packets at the   Internet Protocol Level.  All traffic flows through two natural   metering points: hosts and routers (Internet packet switches).  Hosts   are the ultimate source and sink of all traffic.  Routers monitor all   traffic which passes IN or OUT of each network.  Motivations for   selecting the routers as the metering points are:          o  Minimization of cost and overhead.             (by concentrating the accounting function).  Centralize             and minimize in terms of number of geographical or             administrative regions, number of protocols monitored,             and number of separate implementations modified.  (Hosts             are too diverse and numerous for easy standardization.Mills, Hirsh, & Ruth                                            [Page 9]RFC 1272            Internet Accounting: Background        November 1991             Routers concentrate traffic and are more homogeneous.)          o  Traffic control.             When and if usage sensitive quotas are involved, changes             in meter status (e.g., exceeding a quota) would result in             an active influence on network traffic (the router starts             denying access).  A passive measuring device cannot             control network access in response to detecting state.          o  Intermediate system accounting.             As discussed above, internet accounting includes both             end-system and intermediate system accounting.  Hosts see             only end-system traffic; routers see both the end-systems             (internet source and destination) and the adjacent             intermediate systems.   Therefore, meters should be placed at:          o  administrative boundaries             only for measuring inter-domain traffic;          o  stub networks             for measuring intra-domain traffic.  For intra-domain             traffic, the requirement for performing accounting at

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -