summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1021.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1021.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1021.txt')
-rw-r--r--doc/rfc/rfc1021.txt278
1 files changed, 278 insertions, 0 deletions
diff --git a/doc/rfc/rfc1021.txt b/doc/rfc/rfc1021.txt
new file mode 100644
index 0000000..393d89b
--- /dev/null
+++ b/doc/rfc/rfc1021.txt
@@ -0,0 +1,278 @@
+
+Network Working Group C. Partridge
+Request For Comment: 1021 BBN/NNSC
+ G. Trewitt
+ Stanford
+ October 1987
+
+ THE HIGH-LEVEL ENTITY MANAGEMENT SYSTEM (HEMS)
+
+STATUS OF THIS MEMO
+
+ An overview of the RFCs which comprise the High-Level Entity
+ Management System is provided. This system is experimental, and is
+ currently being tested in portions of the Internet. It is hoped that
+ this work will help lead to a standard for IP internetwork
+ management. Distribution of this memo is unlimited.
+
+INTRODUCTION
+
+ Until recently, a majority of critical components in IP networks,
+ such as gateways, have come from a very small set of vendors. While
+ each vendor had their own set of management protocols and mechanisms,
+ the collection was small, and a knowledgeable system administrator
+ could be expected to learn them all.
+
+ Now, however, the number of vendors has grown quite large, and the
+ lack of an accepted standard for management of network components is
+ causing severe management problems. Compounding this problem is the
+ explosive growth of the connected IP networks known as the Internet.
+ The combination of increased size and heterogeneity is making
+ internetwork management extremely difficult. This memo discusses an
+ effort to devise a standard protocol for all devices, which should
+ help alleviate the management problem.
+
+ The RFCs that currently define the High-Level Entity Management
+ System are this memo along with RFC-1022, 1024, and 1023. This list
+ is expected to change and grow over time, and readers are strongly
+ encouraged to check the RFC Index to find the most current versions.
+
+MONITORING AND CONTROL
+
+ Historically, the IP community has divided network management into
+ two distinct types of activities: monitoring and control. Monitoring
+ is the activity of extracting or collecting data from the network or
+ a part of the network to observe its behavior. Control is the
+ activity of taking actions to effect changes in the behavior of the
+ network or a part of the network in real-time, typically in an
+ attempt to improve the network's performance.
+
+
+
+
+Partridge & Trewitt [Page 1]
+
+RFC 1021 HEMS Overview October 1987
+
+
+ Note that the ability to control presupposes the ability to monitor.
+ Changing the behavior of the network without being able to observe
+ the effects of the changes is not useful. On the other hand,
+ monitoring without control makes some sense. Simply understanding
+ what is causing a network to misbehave can be useful.
+
+ Control is also a more difficult functionality to define. Control
+ operations other than the most generic, are usually device-specific.
+ The problem is not just a matter of providing a mechanism for
+ control, but also defining a set of control operations which are
+ generally applicable across a diverse set of devices. Permitting
+ remote applications to exercise control over an entity also implies
+ the need for a suite of safeguards to ensure that unauthorized
+ applications cannot harm the network.
+
+ Because monitoring is the key first step, in this initial design of
+ the system, the authors have concentrated more heavily on the
+ problems of effective monitoring. Although the basic control
+ mechanisms are defined, many components need for control, such as
+ strong access control mechanisms, have not been fully defined.
+
+OVERVIEW OF THE HEMS
+
+ The HEMS is made up of three parts: a query processor which can
+ reside on any addressable entity, an event generator which also
+ resides on entities, and applications which know how to send requests
+ to the query processor and interpret the replies. The query
+ processor and applications communicate using a message protocol which
+ runs over a standard transport protocol.
+
+The Query Processor
+
+ The query processor is the key to the management system. It
+ interprets all monitoring and control requests. For optimal network
+ management, we would like to see query processors on most network
+ entities.
+
+ To encourage the implementations of query processors, one of the
+ primary goals in designing the query processor was to make it as
+ small and simple as possible, consistent with management
+ requirements.
+
+ Defining the management requirements was no small task, since the
+ networking community has not yet reached a consensus about what kinds
+ of monitoring information should be available from network entities,
+ nor what control functions are required to properly manage those
+ entities. The standards for HEMS were developed through discussions
+ with several interest groups, and represent the authors' best effort
+
+
+
+Partridge & Trewitt [Page 2]
+
+RFC 1021 HEMS Overview October 1987
+
+
+ to distill the varying sets of needs.
+
+ The authors settled on a system which was extensible, robust and
+ host-architecture independent, and as simple as possible, consistent
+ with the other goals. Extensibility was essential because it is
+ clear that management needs will continue to evolve, and a closed
+ system which could not be changed would be obsolete almost as soon as
+ it was defined. Unfortunately, extensibility is also the requirement
+ least consistent with simplicity since the need to make the system
+ extensible led the authors to use self-describing data formats and an
+ interpreted query language.
+
+ A robust system is required if the system is to be useful for
+ diagnosing network failures. If the monitoring system cannot survive
+ at least moderate network failures, it is not useful.
+
+ The query processor is designed to be highly extensible. An
+ application sends the query processor instructions about objects to
+ be examined or changed. The query processor locates the objects in
+ its host entity, and performs the requested operations. The objects
+ are self-describing, using the binary-encoding scheme defined in ISO
+ Standard ASN.1. Care has been taken to use a limited set of the
+ ASN.1 coding set, so that query processor's handling of data can be
+ optimized.
+
+ It is a key feature of HEMS that messages to the query processor
+ contain multiple instructions. The authors felt that this would give
+ much higher performance than a remote procedure system which limited
+ an application to one operation per message.
+
+ The set of maintained objects is standardized across all entities.
+ Every entity is required to manage a small set of objects. In
+ addition, entities of a particular type (e.g., a gateway) may be
+ required to manage a larger set of objects, which are optional on
+ other entities. Entities are also permitted to make additional,
+ entity-specific objects available to applications. A method for
+ discovering the existence of additional objects is defined.
+
+ The combination of self-describing data, the ability to add to the
+ standard data set, and a query language which can be easily enhanced
+ appeared to offer the necessary extensibility.
+
+Event Generator
+
+ On many network entities, particularly critical network components
+ such as gateways, it is necessary to have a way for the devices to
+ send unsolicited status messages to network management centers. In
+ the IP community, these messages have historically been referred to
+
+
+
+Partridge & Trewitt [Page 3]
+
+RFC 1021 HEMS Overview October 1987
+
+
+ as "traps", but for compatibility with the ISO nomenclature, in the
+ HEMS system they are called "events".
+
+ In the HEMS system, events are handled as slightly specialized
+ replies to queries, and are sent to one or more management centers.
+ Like all other HEMS messages, events are formatted in ASN.1 format.
+
+ Each event is given a well-known code, which is standardized across
+ all entities. Provision is also made for entity specific event
+ codes.
+
+Applications
+
+ The HEMS expects that applications will be more intelligent than the
+ query processor. Among other functions, the applications will have
+ to be able to identify and parse entity-specific values which may be
+ returned.
+
+ The details of applications are largely not discussed in the HEMS
+ specifications because there is very little that needs to be
+ standardized. Applications must send requests using the protocols
+ discussed in the next section, but the interfaces the applications
+ provide for displaying monitoring or control information are entirely
+ application dependent.
+
+Protocols
+
+ Query processors and applications communicate using an application-
+ specific monitoring protocol, the High-Level Entity Management
+ Protocol (HEMP). This protocol provides the formatting rules for the
+ queries and their replies.
+
+ HEMP runs over a standard transport protocol. There was a certain
+ amount of debate in the community about what type of transport
+ protocol was best suited for monitoring. The key issue was how
+ reliable monitoring interactions needed to be.
+
+ The authors expect that three types of management activities will
+ predominate: status monitoring, firefighting, and event reporting.
+
+ Status monitoring is envisioned as occasional retrieval of monitoring
+ information, possibly in response to the receipt of event messages.
+ In these situations, the network is expected to be in good working
+ condition, and monitoring exchanges could probably comfortably work
+ with an unreliable transport protocol. The chance of data loss is
+ small, and probably not a serious problem since the data is unlikely
+ to be so important that it must be reliably delivered. (However, it
+ should be noted that some applications may prefer reliable delivery
+
+
+
+Partridge & Trewitt [Page 4]
+
+RFC 1021 HEMS Overview October 1987
+
+
+ because it is more convenient.)
+
+ Firefighting is a completely different situation. In this scenario,
+ one or more sites are using management applications to try to locate
+ and fix a network problem. Here we must assume that while the
+ network functions (i.e., data can get through), it is not very
+ healthy. We should assume that packets are being lost, that network
+ routes will be non-optimal and that it is essential that the
+ monitoring data (which is presumably diagnostic) get back to the
+ application and that control requests are reliably delivered to the
+ entity. In such circumstances, a reliable protocol is essential.
+
+ Events provide yet another bit of complexity. Events contain useful
+ status information, but experience suggests that this information
+ does not have to be delivered reliably. If the problem is serious
+ enough, it will re-occur and the event will be sent again.
+ Furthermore, events will often be sent to more than one management
+ center, which would appear to preclude the use of connection-
+ oriented, reliable protocols such as TCP for events.
+
+ The current decision has been to establish two possible transport
+ options for HEMS. More experimental systems may use the Versatile
+ Message Transaction Protocol (VMTP), an experimental IP transaction
+ protocol. Near term production systems can use a combination of the
+ Transmission Control Protocol (TCP) and the User Datagram Protocol
+ (UDP), as described in RFC-1022.
+
+Compatibility with Common Management Information Protocol (CMIP)
+
+ Several groups have expressed interest in being able to develop
+ applications which can use both HEMS and the emerging ISO-defined
+ Common Management Information Protocol (CMIP). It turns out that
+ such a co-existence is feasible, and the authors have made an effort
+ to accomodate it.
+
+ At the highest level, both CMIP and HEMS perform operations on
+ objects stored in remote entities, and both systems use ASN.1
+ formatting to represent those objects. This makes it possible to
+ develop a standard set of interface routines which can be used to
+ access either system, even though underlying mechanics of the systems
+ are quite different.
+
+
+
+
+
+
+
+
+
+
+Partridge & Trewitt [Page 5]
+