diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1021.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1021.txt')
-rw-r--r-- | doc/rfc/rfc1021.txt | 278 |
1 files changed, 278 insertions, 0 deletions
diff --git a/doc/rfc/rfc1021.txt b/doc/rfc/rfc1021.txt new file mode 100644 index 0000000..393d89b --- /dev/null +++ b/doc/rfc/rfc1021.txt @@ -0,0 +1,278 @@ + +Network Working Group C. Partridge +Request For Comment: 1021 BBN/NNSC + G. Trewitt + Stanford + October 1987 + + THE HIGH-LEVEL ENTITY MANAGEMENT SYSTEM (HEMS) + +STATUS OF THIS MEMO + + An overview of the RFCs which comprise the High-Level Entity + Management System is provided. This system is experimental, and is + currently being tested in portions of the Internet. It is hoped that + this work will help lead to a standard for IP internetwork + management. Distribution of this memo is unlimited. + +INTRODUCTION + + Until recently, a majority of critical components in IP networks, + such as gateways, have come from a very small set of vendors. While + each vendor had their own set of management protocols and mechanisms, + the collection was small, and a knowledgeable system administrator + could be expected to learn them all. + + Now, however, the number of vendors has grown quite large, and the + lack of an accepted standard for management of network components is + causing severe management problems. Compounding this problem is the + explosive growth of the connected IP networks known as the Internet. + The combination of increased size and heterogeneity is making + internetwork management extremely difficult. This memo discusses an + effort to devise a standard protocol for all devices, which should + help alleviate the management problem. + + The RFCs that currently define the High-Level Entity Management + System are this memo along with RFC-1022, 1024, and 1023. This list + is expected to change and grow over time, and readers are strongly + encouraged to check the RFC Index to find the most current versions. + +MONITORING AND CONTROL + + Historically, the IP community has divided network management into + two distinct types of activities: monitoring and control. Monitoring + is the activity of extracting or collecting data from the network or + a part of the network to observe its behavior. Control is the + activity of taking actions to effect changes in the behavior of the + network or a part of the network in real-time, typically in an + attempt to improve the network's performance. + + + + +Partridge & Trewitt [Page 1] + +RFC 1021 HEMS Overview October 1987 + + + Note that the ability to control presupposes the ability to monitor. + Changing the behavior of the network without being able to observe + the effects of the changes is not useful. On the other hand, + monitoring without control makes some sense. Simply understanding + what is causing a network to misbehave can be useful. + + Control is also a more difficult functionality to define. Control + operations other than the most generic, are usually device-specific. + The problem is not just a matter of providing a mechanism for + control, but also defining a set of control operations which are + generally applicable across a diverse set of devices. Permitting + remote applications to exercise control over an entity also implies + the need for a suite of safeguards to ensure that unauthorized + applications cannot harm the network. + + Because monitoring is the key first step, in this initial design of + the system, the authors have concentrated more heavily on the + problems of effective monitoring. Although the basic control + mechanisms are defined, many components need for control, such as + strong access control mechanisms, have not been fully defined. + +OVERVIEW OF THE HEMS + + The HEMS is made up of three parts: a query processor which can + reside on any addressable entity, an event generator which also + resides on entities, and applications which know how to send requests + to the query processor and interpret the replies. The query + processor and applications communicate using a message protocol which + runs over a standard transport protocol. + +The Query Processor + + The query processor is the key to the management system. It + interprets all monitoring and control requests. For optimal network + management, we would like to see query processors on most network + entities. + + To encourage the implementations of query processors, one of the + primary goals in designing the query processor was to make it as + small and simple as possible, consistent with management + requirements. + + Defining the management requirements was no small task, since the + networking community has not yet reached a consensus about what kinds + of monitoring information should be available from network entities, + nor what control functions are required to properly manage those + entities. The standards for HEMS were developed through discussions + with several interest groups, and represent the authors' best effort + + + +Partridge & Trewitt [Page 2] + +RFC 1021 HEMS Overview October 1987 + + + to distill the varying sets of needs. + + The authors settled on a system which was extensible, robust and + host-architecture independent, and as simple as possible, consistent + with the other goals. Extensibility was essential because it is + clear that management needs will continue to evolve, and a closed + system which could not be changed would be obsolete almost as soon as + it was defined. Unfortunately, extensibility is also the requirement + least consistent with simplicity since the need to make the system + extensible led the authors to use self-describing data formats and an + interpreted query language. + + A robust system is required if the system is to be useful for + diagnosing network failures. If the monitoring system cannot survive + at least moderate network failures, it is not useful. + + The query processor is designed to be highly extensible. An + application sends the query processor instructions about objects to + be examined or changed. The query processor locates the objects in + its host entity, and performs the requested operations. The objects + are self-describing, using the binary-encoding scheme defined in ISO + Standard ASN.1. Care has been taken to use a limited set of the + ASN.1 coding set, so that query processor's handling of data can be + optimized. + + It is a key feature of HEMS that messages to the query processor + contain multiple instructions. The authors felt that this would give + much higher performance than a remote procedure system which limited + an application to one operation per message. + + The set of maintained objects is standardized across all entities. + Every entity is required to manage a small set of objects. In + addition, entities of a particular type (e.g., a gateway) may be + required to manage a larger set of objects, which are optional on + other entities. Entities are also permitted to make additional, + entity-specific objects available to applications. A method for + discovering the existence of additional objects is defined. + + The combination of self-describing data, the ability to add to the + standard data set, and a query language which can be easily enhanced + appeared to offer the necessary extensibility. + +Event Generator + + On many network entities, particularly critical network components + such as gateways, it is necessary to have a way for the devices to + send unsolicited status messages to network management centers. In + the IP community, these messages have historically been referred to + + + +Partridge & Trewitt [Page 3] + +RFC 1021 HEMS Overview October 1987 + + + as "traps", but for compatibility with the ISO nomenclature, in the + HEMS system they are called "events". + + In the HEMS system, events are handled as slightly specialized + replies to queries, and are sent to one or more management centers. + Like all other HEMS messages, events are formatted in ASN.1 format. + + Each event is given a well-known code, which is standardized across + all entities. Provision is also made for entity specific event + codes. + +Applications + + The HEMS expects that applications will be more intelligent than the + query processor. Among other functions, the applications will have + to be able to identify and parse entity-specific values which may be + returned. + + The details of applications are largely not discussed in the HEMS + specifications because there is very little that needs to be + standardized. Applications must send requests using the protocols + discussed in the next section, but the interfaces the applications + provide for displaying monitoring or control information are entirely + application dependent. + +Protocols + + Query processors and applications communicate using an application- + specific monitoring protocol, the High-Level Entity Management + Protocol (HEMP). This protocol provides the formatting rules for the + queries and their replies. + + HEMP runs over a standard transport protocol. There was a certain + amount of debate in the community about what type of transport + protocol was best suited for monitoring. The key issue was how + reliable monitoring interactions needed to be. + + The authors expect that three types of management activities will + predominate: status monitoring, firefighting, and event reporting. + + Status monitoring is envisioned as occasional retrieval of monitoring + information, possibly in response to the receipt of event messages. + In these situations, the network is expected to be in good working + condition, and monitoring exchanges could probably comfortably work + with an unreliable transport protocol. The chance of data loss is + small, and probably not a serious problem since the data is unlikely + to be so important that it must be reliably delivered. (However, it + should be noted that some applications may prefer reliable delivery + + + +Partridge & Trewitt [Page 4] + +RFC 1021 HEMS Overview October 1987 + + + because it is more convenient.) + + Firefighting is a completely different situation. In this scenario, + one or more sites are using management applications to try to locate + and fix a network problem. Here we must assume that while the + network functions (i.e., data can get through), it is not very + healthy. We should assume that packets are being lost, that network + routes will be non-optimal and that it is essential that the + monitoring data (which is presumably diagnostic) get back to the + application and that control requests are reliably delivered to the + entity. In such circumstances, a reliable protocol is essential. + + Events provide yet another bit of complexity. Events contain useful + status information, but experience suggests that this information + does not have to be delivered reliably. If the problem is serious + enough, it will re-occur and the event will be sent again. + Furthermore, events will often be sent to more than one management + center, which would appear to preclude the use of connection- + oriented, reliable protocols such as TCP for events. + + The current decision has been to establish two possible transport + options for HEMS. More experimental systems may use the Versatile + Message Transaction Protocol (VMTP), an experimental IP transaction + protocol. Near term production systems can use a combination of the + Transmission Control Protocol (TCP) and the User Datagram Protocol + (UDP), as described in RFC-1022. + +Compatibility with Common Management Information Protocol (CMIP) + + Several groups have expressed interest in being able to develop + applications which can use both HEMS and the emerging ISO-defined + Common Management Information Protocol (CMIP). It turns out that + such a co-existence is feasible, and the authors have made an effort + to accomodate it. + + At the highest level, both CMIP and HEMS perform operations on + objects stored in remote entities, and both systems use ASN.1 + formatting to represent those objects. This makes it possible to + develop a standard set of interface routines which can be used to + access either system, even though underlying mechanics of the systems + are quite different. + + + + + + + + + + +Partridge & Trewitt [Page 5] + |