summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1564.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1564.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1564.txt')
-rw-r--r--doc/rfc/rfc1564.txt1179
1 files changed, 1179 insertions, 0 deletions
diff --git a/doc/rfc/rfc1564.txt b/doc/rfc/rfc1564.txt
new file mode 100644
index 0000000..d760000
--- /dev/null
+++ b/doc/rfc/rfc1564.txt
@@ -0,0 +1,1179 @@
+
+
+
+
+
+
+Network Working Group P. Barker
+Request for Comments: 1564 University College London
+Category: Informational R. Hedberg
+ Technical University Delft
+ January 1994
+
+
+ DSA Metrics
+ (OSI-DS 34 (v3))
+
+Status of this Memo
+
+ This memo provides information for the Internet community. This memo
+ does not specify an Internet standard of any kind. Distribution of
+ this memo is unlimited.
+
+Abstract
+
+ This document defines a set of criteria by which a DSA implementation
+ may be judged. Particular issues covered include conformance to
+ standards; performance; demonstrated interoperability. The intention
+ is that the replies to the questions posed provide a fairly full
+ description of a DSA. Some of the questions will yield answers which
+ are purely descriptive; others, however, are intended to elicit
+ answers which give some measure of the utility of the DSA. The marks
+ awarded for a DSA in each particular area should give a good
+ indication of the DSA's capabilities, and its suitability for
+ particular uses.
+
+ Please send comments to the authors or to the discussion group
+ <osi-ds@CS.UCL.AC.UK>.
+
+Table of Contents
+
+ 1. Overview 2
+ 2. General Information 3
+ 3. Conformance to OSI Standards 4
+ 3.1 Directory protocols............................. 4
+ 3.2 Implementors' agreements and profiles ......... 6
+ 3.3 Protocol stacks................................. 6
+ 3.4 DIT structure ................................. 7
+ 4. Other protocols 7
+ 5. Extensions to the 1988 Standard 7
+ 5.1 Schema ......................................... 7
+ 5.2 Support for replication......................... 8
+ 5.3 Support for access control ..................... 8
+ 5.4 Miscellaneous ................................. 9
+ 6. Miscellaneous characteristics 10
+
+
+
+Barker & Hedberg [Page 1]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ 7. Management tools 11
+ 7.1 Dynamic system management ..................... 11
+ 7.2 Static system management ...................... 12
+ 7.3 Data management................................. 12
+ 8. Operational Use 12
+ 9. Interoperability 12
+ 10. Performance 13
+ 10.1 Speed for various operations .................. 14
+ 10.1.1 Bind ..................................... 14
+ 10.1.2 List ..................................... 15
+ 10.1.3 Search .................................. 15
+ 10.1.4 Read ..................................... 16
+ 10.1.5 Add entry................................. 16
+ 10.1.6 Modify entry ............................. 16
+ 10.1.7 Modify RDN .............................. 16
+ 10.1.8 Query rate .............................. 17
+ 10.2 The results..................................... 17
+ 10.3 Environment used for benchmarking ............. 17
+ 11. Security Considerations 21
+ 12. Authors' Addresses 21
+
+1. Overview
+
+ The purpose of this document is to define some metrics by which DSA
+ products can be measured. Such metrics are valuable as whilst an
+ X.500 DSA must conform to the specification in the standard - this is
+ a sine qua non - protocol conformance is not in itself the hallmark
+ of a usable implementation. A DSA must perform operations within a
+ reasonable time; a DSA must offer good throughput of queries; a DSA
+ must be able to handle a reasonable volume of data; if modification
+ operations are provided, some sort of access control must be
+ provided; a DSA and its data must be manageable.
+
+ In many respects, it is almost impossible to say that one DSA is
+ better than other from looking at the responses to questions in this
+ document. For some, the cost or level of support will be the key
+ criterion. For another user, the flexibility of the schema
+ management facilities, or the feasibility of running the DSA over an
+ existing relational database, will be of prime importance. In many
+ respects DSAs will just be different, rather than better or worse.
+ However, all other things being equal, the look-up speed of a DSA is
+ very obviously measurable, and there is a substantial number of
+ questions on the speed of the various X.500 operations, and in
+ particular on the look-up operations.
+
+ Throughout this document, some of the questions posed are annotated
+ with a square-bracketed points score and an explanation as to how the
+ points should be allocated. For example, a question might be
+
+
+
+Barker & Hedberg [Page 2]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ appended with "[2 if yes]", indicating score 2 points for an
+ affirmative answer to that question. These points scores should be
+ collated in Table 1 at the end of the document. The questions on DSA
+ performance are judged to be important enough to have a separate
+ table for those results: they appear in Table 2 (and optionally
+ Table 3). Together, these tables constitute a measure of the DSA.
+
+ The metrics are on a section by section basis, which should help the
+ reader who is seeking, for example, a DSA with fast look-up
+ capabilities and extensive access control facilities, to focus on the
+ critical aspects of a DSA for their particular requirement. No
+ conclusions should be inferred from adding the scores together into
+ one overall grand total and comparing such totals for different DSAs,
+ as no attempt is made to assign weights to the different
+ characteristics.
+
+ Whilst much of this document should usually be completed by the
+ developers or suppliers of an implementation, the section on
+ performance could be completed by anyone running the implementation.
+ Indeed, it will be beneficial if several sets of performance figures
+ can be gathered for each implementation, for a variety of hardware
+ platforms.
+
+2. General Information
+
+ This section contains general information about the implementation
+ under discussion.
+
+ 1. Name of the information provider ................................
+ ....................................................................
+
+ 2. Name of the implementation ......................................
+
+ 3. Version number of the DSA described in this document ............
+
+ 4. Are there plans to implement the additional features describe in
+ the 1992/3 standard? [6 for full implementation, 4 if both
+ access control and replication to be implemented, 2 for some
+ 1992 features] ..................................................
+
+ 5. Name and address of supplier or person to contact ...............
+ ....................................................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+
+
+
+
+Barker & Hedberg [Page 3]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ 6. Describe the hardware and software platforms supported by the DSA
+ [up to 4 points may be awarded for this question]
+
+ (a) Hardware (If appropriate, can summarise as, for example
+ "generic UNIX platform") ..................................
+
+ (b) O/S (state version if critical)
+
+ i. UNIX) (be sure to indicate which flavour - e.g.,
+ SYSV [1], BSD [1], SUNOS, etc) ..........................
+
+ ii. VMS) [1] ................................................
+
+ iii. MS-DOS [1] ..............................................
+
+ iv. Macintosh [1] ...........................................
+
+ v. Other) [1] ..............................................
+
+ 7. Name any other software required to run the system which is not
+ supplied with the operating system or with the DSA software
+ itself. Examples might include a database package, or
+ communications software .........................................
+ ....................................................................
+
+ 8. Is this DSA an integrated part of a software package, and in such
+ case which ? ...................................................
+ ....................................................................
+
+ 9. Is the software free? If the DSA needs other packages, are these
+ also freely available? [3 if completely free, 1 if requires
+ commercial software package] ....................................
+ ....................................................................
+
+ 10. Is commercial support available for this implementation? [3] ...
+
+ 11. Is free, best effort support available from the developers? [2].
+
+ 12. Is free support available via user groups or email lists? [2] ..
+
+3. Conformance to OSI Standards
+
+3.1 Directory protocols
+
+ 13. Does the DSA implement DAP?
+
+ (a) Read ASE? [2] ...............................................
+
+
+
+
+Barker & Hedberg [Page 4]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ (b) Search ASE? [2] .............................................
+
+ (c) Modify ASE? [2] .............................................
+
+ 14. Does the DSA implement DSP?
+
+ (a) Chained read ASE? [2] .......................................
+
+ (b) Chained search ASE? [2] .....................................
+
+ (c) Chained modify ASE? [2] .....................................
+
+ 15. Statement requirements according to section 9.2.1 in X.519.
+
+ (a) Supported application-contexts? ............................
+
+ (b) Capable of acting as first-level DSA? [1] ...................
+
+ (c) Chained mode supported? [1] ................................
+
+ (d) Security-level(s) supported? [1 for strong + 1 for protected
+ simple + 1 for simple authentication] .......................
+
+ (e) All attribute types according to X.520? [1] ................
+
+ (f) All object classes according to X.521? [1] .................
+
+ 16. Does the implementation meet the conformance clauses in section
+ 9.2.2 and 9.2.3 of X.519?
+ Static requirements [2 if yes on all]
+
+ (a) Abstract syntaxes of application contexts ...................
+
+ (b) Abstract syntaxes of information framework ..................
+
+ (c) Minimal knowledge ...........................................
+
+ (d) Support of root context .....................................
+
+ (e) Abstract syntax - attribute types ...........................
+
+ (f) Abstract syntax - object classes ............................
+
+ Dynamic requirements [2 if yes on all]
+
+ (a) Mapping onto underlying services ............................
+
+ (b) Distributed operations - referrals ..........................
+
+
+
+Barker & Hedberg [Page 5]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ (c) DirectoryAccessAC - referrals ...............................
+
+ (d) DirectorySystemAC - referrals ...............................
+
+ (e) Chained mode ................................................
+
+ 17. Please list all conformance testing work applied to the
+ implementation (specify conformance test version number). [2 if
+ any testing]
+ ....................................................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+
+3.2 Implementors' agreements and profiles
+
+ Does the DSA conform to the following implementors' agreements? If
+ so, state parts and version numbers.
+
+ 18. EWOS? [1] .......................................................
+ ....................................................................
+ ....................................................................
+
+ 19. OIW? [1] ........................................................
+ ....................................................................
+ ....................................................................
+
+ Does the DSA conform to the following profiles? If so, state which
+ version numbers.
+
+ 20. UK GOSIP? [1] ...................................................
+
+ 21. US GOSIP? [1] ...................................................
+
+
+ State any other GOSIP profiles to which the DSA conforms ............
+
+3.3 Protocol stacks
+
+ 22. Which of the following transport and network layer protocols does
+ the DSA support:
+
+ (a) TP.x over CONS (state transport class)? [2] ................
+
+ (b) TP.4 over CLNS? [2] .........................................
+
+ (c) TP.x over X.25(1980) (state transport class)? [2] ..........
+
+
+
+
+Barker & Hedberg [Page 6]
+
+RFC 1564 DSA Metrics January 1994
+
+
+3.4 DIT structure
+
+ 23. A suggested DIT structure, detailing an object class hierarchy, is
+ presented in X.521. Does the DSA:
+
+ (a) Enforce this hierarchy? ....................................
+
+ (b) Allow the enforcement of this hierarchy? ...................
+
+ 24. Are structure rules optional or mandatory? .....................
+
+4. Other protocols
+
+ 25. Not everybody uses OSI protocols at the network layer. Does the
+ DSA support other "network" layer protocols?
+
+ (a) TP.0 over RFC1006 over TCP/IP [3] ...........................
+
+ (b) State any other options supported. .........................
+ ................................................................
+
+ 26. Does the DSA also run over any lightweight stack? If so,
+ describe it with reference to the OSI seven layer model [1] .....
+
+ 27. Can local DUAs access the DSA directly by some method of
+ inter-process communications? [1] ..............................
+ ....................................................................
+
+5. Extensions to the 1988 Standard
+
+5.1 Schema
+
+ 28. Does the DSA fully support RFC1274, "The COSINE and Internet
+ X.500 Schema"? [2] ............................................
+ If not, please supply a list of all those object classes,
+ attribute types and attribute syntaxes in RFC1274 which are
+ supported on a separate sheet. This might be summarised by
+ saying, for example, "all those with standard attribute
+ syntaxes", or "all except fooBar".
+
+ 29. Does the DSA implement the schema management defined in the 1992
+ standard? [2] ..................................................
+
+ 30. If not, is the schema stored in the Directory? In a distributed
+ manner[2] or centralised[1] ? ..................................
+
+ 31. Can a DSA manager extend the schema and add new
+
+
+
+
+Barker & Hedberg [Page 7]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ (a) Attribute types with existing syntaxes? With compilation
+ [1], or without compilation [2] .............................
+
+ (b) Attribute syntaxes? With compilation [1], or without
+ compilation [2] .............................................
+
+ (c) Attribute sets? With compilation [1], or without compilation
+ [2] .........................................................
+ ................................................................
+
+ (d) Object classes? With compilation [1], or without compilation
+ [2] .........................................................
+ ................................................................
+
+ 32. Is it possible to add in or modify DIT structure rules, with
+ compilation [1], without compilation [2] ........................
+
+5.2 Support for replication
+
+ 33. Does the DSA support the replication mechanisms as described in
+ the 1992 standard [2]?
+ ....................................................................
+
+ 34. Does the DSA support any other replication mechanisms? .........
+
+ (a) Replication part of RFC1276 [2] .............................
+
+ (b) Other (please give a reference to any description of the
+ mechanisms, and indicate whether these mechanisms are used by
+ any other implementations) [1 for any mechanism] ............
+ ................................................................
+ ................................................................
+ ................................................................
+
+ 35. If the DSA supports replication, does it support:
+
+ (a) Replication of a single entry? [2] .........................
+
+ (b) Replication of a set of sibling entries? [2] ...............
+
+ (c) Replication of a subtree? [2] ..............................
+
+5.3 Support for access control
+
+ 36. Does the DSA support access control as described in the 1992
+ standard [3]? ..................................................
+
+ 37. If not, does the DSA have any access control mechanisms at all?
+
+
+
+Barker & Hedberg [Page 8]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ [2] .............................................................
+
+ 38. If yes, does the access control scheme support the following:
+
+ (a) Allow a user to maintain their own entry? [1] ..............
+
+ (b) Allow a user to maintain some attributes in their own entry,
+ but not all attributes? [1] ................................
+
+ (c) Give management rights to a DSA manager in a fashion analogous
+ to the privileges given to a UNIX super-user? [1] ..........
+
+ (d) Give management rights to a data manager on a per subtree
+ basis? [1] .................................................
+
+ (e) Give management rights (to an entry, group of entries,
+ subtree, etc) to a group of users? [1] .....................
+
+ (f) Give access rights to users on the basis of the leading
+ portion of their Distinguished Name? [1] ...................
+
+ (g) Is it possible to define a protection mechanism for each
+ individual attribute type in one entry? [1] ................
+
+ (h) Maximum number of Distinguished Names that can be defined for
+ one access right to one attribute in one entry? If unlimited,
+ state the constraints. [1 if more than 6 DNs are feasible] :
+
+ (i) Does the DSA support the extended access control techniques
+ described in "An Access Control approach for Searching and
+ Listing" by Hardcastle-Kille and Howes, in the Internet
+ Draft, OSI-DS 21? [2]
+ ................................................................
+
+ (j) If there are features of the access control mechanisms which
+ are not brought out by the above questions, please describe
+ these additional features [up to 2 for wonderful additional
+ features!] .................................................
+ ................................................................
+ ................................................................
+ ................................................................
+
+5.4 Miscellaneous
+
+ 39. Does the DSA fully support RFC1276, "Replication and Distributed
+ Operations extensions to provide an Internet Directory using
+ X.500"? [2] .... If not, please give a list of features that are
+ supported.
+
+
+
+Barker & Hedberg [Page 9]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ ....................................................................
+ ....................................................................
+
+ 40. If the DSA uses RFC1006 and/or X.25(1980) at the network layer,
+ does the DSA conform to RFC1277, "Encoding Network Addresses to
+ support operation over non-OSI lower layers" [3] ...............
+
+6. Miscellaneous characteristics
+
+ 41. Does the DSA use its own database, or can it be used in
+ conjunction with a general-purpose database package such as
+ Oracle? [1 for own, 1 for ability to map onto general purpose
+ databases, 1 if any such mappings have been made] ...............
+ ....................................................................
+
+ 42. If the DSA runs as a static server, state the start-up time for a
+ DSA with a database of 20000 entries. If this varies widely
+ according to configuration options, give figures for the various
+ options. .......................................................
+ ....................................................................
+
+ 43. What is the maximum number of simultaneous associations that the
+ DSA may have open? [1 if more than 15 associations] ............
+
+ 44. Maximum database size, in entries, megabytes, or as appropriate.
+ If none, state what the constraints are. [1 if a database of
+ more than 100,000 entries is feasible] ..........................
+
+ 45. What is the run-time size of an entry as specified in section 10
+ (on performance)? This should be the marginal size of an entry
+ and thus should include the overhead of default indexes, etc. ..
+
+ 46. What is the on-disk database size of an entry as specified in
+ section 10 on performance? .....................................
+
+ 47. Does the DSA make of indexing? [2 if yes] ......................
+
+ If so:
+
+ (a) Can the database be fully inverted? [1] ....................
+ If not, state for which:
+
+ i. attributes indexes are automatically built ..............
+ ............................................................
+ ............................................................
+
+ ii. attributes/attribute syntaxes indexes may be built ......
+ ............................................................
+
+
+
+Barker & Hedberg [Page 10]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ ............................................................
+
+ (b) Does the index improve performance on:
+
+ i. Exact match [1] .........................................
+
+ ii. Leading substring match [1] .............................
+
+ iii. Approximate match [1] ...................................
+
+ iv. Any substring match [1] .................................
+
+ v. Trailing substring match [1] ............................
+
+ (c) What is the increase in run-time size of an entry when adding
+ an index?
+ ................................................................
+
+ (d) What is the increase in on-disk database size of adding
+ another index?
+ ................................................................
+
+ 48. What sort of approximate match algorithm does the DSA use?
+ Describe it briefly .............................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+
+ 49. Does the DSA attempt to use relay DSAs (which have access to more
+ than one network) in order to achieve connectivity with DSAs
+ which are not on the same network? [2] .........................
+
+7. Management tools
+
+7.1 Dynamic system management
+
+ 50. Are there tools for monitoring DSA activity, using:
+
+ (a) DAP? [1] ....................................................
+
+ (b) CMIP? [1] ...................................................
+
+ (c) SNMP? [1] ...................................................
+
+ 51. Are there tools for controlling a run-time DSA? [2] .............
+
+
+
+
+
+
+Barker & Hedberg [Page 11]
+
+RFC 1564 DSA Metrics January 1994
+
+
+7.2 Static system management
+
+ 52. If knowledge information is stored within the DIT, are there
+ tools for knowledge management? [2] ............................
+
+ 53. Are there tools for checking that attributes with Distinguished
+ Name syntax contain values of entries in the DIT (i.e., they do
+ not contain "dangling pointers")? [1] ........................
+
+7.3 Data management
+
+ 54. If the DSA doesn't use a general-purpose database package, what
+ data management tools are available? ...........................
+ ....................................................................
+
+ 55. Are there any tools for arboriculture - the moving, copying or
+ deleting of DIT subtrees? [2] ..................................
+
+8. Operational Use
+
+ The DSA may have lots of wonderful features -- on paper! But has the
+ DSA been shown to work in practice? The following measures are
+ intended to give some measure of confidence that the DSA's viability
+ has been demonstrated.
+
+ 56. How many entries in the largest DSA in use in operational use? :
+
+ 57. What is the largest set of DSAs supporting an organisation? ....
+
+ 58. What is the estimated number of organisations using this
+ implementation for service use? [8 if more than 100
+ organisations, 5 if more than 50 organisations, 3 if more than 20
+ organisations, 2 if more than 5 organisations, 1 if more than 1
+ organisation] ...................................................
+
+ 59. Is this DSA used commercially with an installed base of more than
+ 10 customers? [2] ..............................................
+
+9. Interoperability
+
+ The X.500 Directory is the OSI Directory. OSI stands for Open
+ Systems Interconnection -- DSAs have to be able to inter-operate.
+ They also have to be seen to interoperate.
+
+ 60. Is this DSA in use in X.500 pilots? ............................
+
+ (a) Is this DSA in use anywhere in the COSINE/Internet Pilot? [3]
+
+
+
+
+Barker & Hedberg [Page 12]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ ................................................................
+
+ (b) Is this DSA in use in any other major pilot? [2] ...........
+
+ 61. Name any other systems which you believe the system to
+ interoperate with. (It is not sufficient to say "any system
+ which supports the conformance clauses ...") ..................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+
+ 62. Please name all interoperability testing applied to the
+ implementation, specify test suite and what other implementation
+ that was used [1 per implementation, up to maximum of 5] ........
+ ....................................................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+ ....................................................................
+
+10. Performance
+
+ This section should give an outline to the expected performance of
+ the DSA. A number of operations are timed in order to give a feel for
+ the DSA's speed and throughput. Note that all operations should be
+ resolvable within a single DSA. Chaining and referral are not
+ assessed, although it should be possible to infer, albeit
+ approximately, the speed of distributed operations.
+
+ i. The tests should be made against an organisational database of
+ 20000 entries. Some tests are against subsets of this data, and
+ so the database should be set up according to the following
+ instructions.
+
+ Create an organisational DSA with 20000 entries below the
+ organisation node. Sub-divide this data into a number of
+ organisational units, one of which should contain 1000 entries,
+ another of which should contain 100 entries, and a third which
+ should contain just 10 entries. The entries, which should
+ differ, should be created with the following attributes:
+
+ (a) Common Name
+
+ (b) Surname
+
+ (c) Telephone number
+
+ (d) Postal Address (of 100 characters)
+
+
+
+Barker & Hedberg [Page 13]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ (e) Object class
+
+ ii. In all the tests, two timings should be taken. In order to
+ normalise the test results as much as possible, it is suggested
+ that these tests be undertaken on an otherwise lightly loaded
+ machine.
+
+ (a) A typical "cold start" reading should be given. In this
+ case the system will not have the advantage of any benefits
+ that derive from operating system paging, or caching.
+
+ (b) A best possible figure should be given, which indicates the
+ upper limit of DSA performance.
+
+ iii. The timings should relate to the default set-up, and should be
+ entered in Table 2. If significant performance gains can be made
+ by use of configuration options, such as building extra indexes
+ to support searches, measures of the improved performance may
+ also be given, and should be entered in Table 3.
+ Attention should be also drawn to any optimisations, heuristic or
+ otherwise, which are not evidenced in the following tests.
+
+ iv. Please note that the tests should be made using a DUA and DSA
+ with full 7-layer stacks, rather than some lightweight protocol.
+
+10.1 Speed for various operations
+
+ The tests are described, one subsection per operation. The results
+ should be entered in Table 2 (and Table 3 if a non-default set-up is
+ also measured).
+
+10.1.1 Bind
+
+ The time it takes for a DUA to bind to the Directory. This time
+ should include all the initialisation time a DUA process needs before
+ it can query the Directory: e.g., reading of tailor files, schema
+ information, etc. Give the bind time for each of the following
+ levels of authentication. State "n/a" if the implementation does not
+ support a particular level of authentication.
+
+ 63. Anonymous
+
+ 64. Simple
+
+ 65. Simple protected
+
+ 66. Strong
+
+
+
+
+Barker & Hedberg [Page 14]
+
+RFC 1564 DSA Metrics January 1994
+
+
+10.1.2 List
+
+ Give the time for listing a set of organisational unit sibling
+ entries.
+
+ 67. 10 entries
+
+ 68. 1000 entries
+
+10.1.3 Search
+
+ In this section, two sets of search operations should be performed on
+ the DSA.
+
+ i. A single level search of 100 entries within an organisational
+ unit.
+
+ ii. An organisation subtree search, on the subtree of 20000 entries.
+
+ The following searches should be tried. Unless otherwise stated, the
+ "XXX" or "YYY" part of the search filter should be chosen in such a
+ way as to return a single result. Unless stated otherwise the
+ results should return all attributes for the entry.
+
+ 69. Exact match for a surname:
+
+ surname=XXX
+
+ 70. Leading substring match for a common name:
+
+ commonName=XXX*
+
+ 71. Any substring match for a common name:
+
+ commonName=*XXX*
+
+ 72. Trailing substring match for a common name:
+
+ commonName=*XXX
+
+ 73. Approximate match for a common name:
+
+ commonName"=XXX
+
+ 74. More complex filter, searching by object class and two other
+ attribute types:
+
+
+
+
+
+Barker & Hedberg [Page 15]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ objectClass=person AND
+ (commonName=XXX* OR telephoneNumber=*YYY)
+
+ 75. Search returning all entries (i.e., 100 entries in the single
+ level search, and all 20000 entries in the subtree search:
+
+ objectClass=*
+
+ In this case, no attribute values should be returned in the
+ result set.
+
+10.1.4 Read
+
+ 76. A single read operation, returning all attributes.
+
+10.1.5 Add entry
+
+ 77. Add an entry beneath an entry which has:
+
+ (a) 0 children
+
+ (b) 10 children
+
+ (c) 1000 children
+
+10.1.6 Modify entry
+
+ Modify an attribute value, other than an RDN value, for an entry
+ which has
+
+ 1. 10 siblings
+
+ 2. 1000 siblings
+
+ 78. Modify an entry
+
+ (a) Add description attribute
+
+ (b) Remove description attribute
+
+10.1.7 Modify RDN
+
+ Modify an RDN value for an entry with the following number of
+ siblings.
+
+
+
+
+
+
+
+Barker & Hedberg [Page 16]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ 79. Modify RDN
+
+ (a) 10 siblings
+
+ (b) 1000 siblings
+
+10.1.8 Query rate
+
+ As the time taken for a single read will usually be negligible, the
+ following list and set of reads should give a clearer indication of
+ the query rate.
+
+ 80. A list to return 100 entries for persons, and then a read of each
+ entry returning all attribute values.
+
+10.2 The results
+
+ The results of the tests just described should be entered in Table 2
+ (and optionally Table 3), at the end of the document.
+
+10.3 Environment used for benchmarking
+
+ Date of test.........................................................
+ Name of tester ......................................................
+ The results will be directly correlated to the test set-up used, and
+ in particular, the hardware. Please answer the following questions
+ to describe the test environment:
+
+ (a) Processor (make and model) ..................................
+
+ (b) Processor speed (MIPS) ......................................
+
+ (c) Primary memory available ....................................
+
+ (d) If disk-based DSA, disk I/O interface and disk speed ........
+
+ (e) O/S version .................................................
+
+ (f) Network type and bandwidth (e.g., 10 Mbit Ethernet) .........
+
+ (g) Protocols in transport layer and below (e.g., TP 0, RFC1006,
+ TCP/IP) .....................................................
+
+ (h) How/where timings obtained?
+
+ o C procedural interface ..................................
+
+ o DUA shell (e.g., Quipu's DISH) ..........................
+
+
+
+Barker & Hedberg [Page 17]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ +-------------------------------------------------+
+ | Section || Points |
+ +--------------------------------||---------------+
+ | No.||Description |Maximum|Scored |
+ +----||--------------------------|-------|--------+
+ | || | | |
+ | 2||General Information | 20 | |
+ +----||--------------------------|-------|--------+
+ | || | | |
+ | 3||Conformance to OSI | 35 | |
+ +----||--------------------------|-------|--------+
+ | || | | | |
+ | 4||Other protocols | 5 | |
+ +----||--------------------------|-------|--------+
+ | || | | | |
+ | 5||Extensions| Schema | 16 | |
+ +----|| |---------------|-------|--------+
+ | || | | | |
+ | ||to the |Replication | 10 | |
+ +----|| |---------------|-------|--------+
+ | || | | | |
+ | ||1988 |Access Control | 15 | |
+ +----|| |---------------|-------|--------+
+ | || | | | |
+ | ||standard |Miscellaneous | 5 | |
+ +----||--------------------------|-------|--------+
+ | ||Miscellaneous | | |
+ | 6||characteristics | 15 | |
+ +----||--------------------------|-------|--------+
+ | || | | |
+ | 7||Management tools | 10 | |
+ +----||--------------------------|-------|--------+
+ | || | | |
+ | 8||Operational use | 10 | |
+ +----||--------------------------|-------|--------+
+ | || | | |
+ | 9||Interoperability | 10 | |
+ +----||--------------------------|-------|--------+
+ | || | see | |
+ | 10||Performance |table 2| |
+ +-------------------------------------------------+
+
+ Table 1: DSA Metrics
+
+
+
+
+
+
+
+
+Barker & Hedberg [Page 18]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ +------------------------------------------------------+
+ | Operation || Cold DSA || Optimum |
+ | || || Performance |
+ +-------------------||---------------||----------------+
+ | Bind || || |
+ | --Anonymous ||.............. || .............. |
+ | --Simple ||.............. || .............. |
+ | --Simple Prot ||.............. || .............. |
+ | --Strong ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | List || || |
+ | -- 10 entries ||.............. || .............. |
+ | -- 1000 entries||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Search |single|subtree |single|subtree |
+ | |level | |level | |
+ | |------|--------|------|----------|
+ | -- exact |.... |...... |..... | ...... |
+ | -- leading sub |.... |...... |..... | ...... |
+ | -- any sub |.... |...... |..... | ...... |
+ | -- trailing sub |.... |...... |..... | ...... |
+ | -- approx |.... |...... |..... | ...... |
+ | -- complex |.... |...... |..... | ...... |
+ | -- return all |.... |...... |..... | ...... |
+ +--------------------|------|--------|------|----------|
+ | Read ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Add || || |
+ | 0 siblings ||.............. || .............. |
+ | 10 siblings ||.............. || .............. |
+ | 1000 siblings ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Modify || || |
+ | 10 siblings ||.............. || .............. |
+ | 1000 siblings ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Modify RDN || || |
+ | 10 siblings ||.............. || .............. |
+ | 1000 siblings ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Query rate ||.............. || .............. |
+ +-------------------||---------------||----------------+
+
+ Table 2: Speed of operations - default set-up
+
+
+
+
+
+
+
+Barker & Hedberg [Page 19]
+
+RFC 1564 DSA Metrics January 1994
+
+
+ +------------------------------------------------------+
+ | Operation || Cold DSA || Optimum |
+ | || || Performance |
+ +-------------------||---------------||----------------+
+ | Bind || || |
+ | --Anonymous ||.............. || .............. |
+ | --Simple ||.............. || .............. |
+ | --Simple Prot ||.............. || .............. |
+ | --Strong ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | List || || |
+ | -- 10 entries ||.............. || .............. |
+ | -- 1000 entries||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Search |single|subtree |single|subtree |
+ | |level | |level | |
+ | |------|--------|------|----------|
+ | -- exact |.... |...... |..... | ...... |
+ | -- leading sub |.... |...... |..... | ...... |
+ | -- any sub |.... |...... |..... | ...... |
+ | -- trailing sub |.... |...... |..... | ...... |
+ | -- approx |.... |...... |..... | ...... |
+ | -- complex |.... |...... |..... | ...... |
+ | -- return all |.... |...... |..... | ...... |
+ +--------------------|------|--------|------|----------|
+ | Read ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Add || || |
+ | 0 siblings ||.............. || .............. |
+ | 10 siblings ||.............. || .............. |
+ | 1000 siblings ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Modify || || |
+ | 10 siblings ||.............. || .............. |
+ | 1000 siblings ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Modify RDN || || |
+ | 10 siblings ||.............. || .............. |
+ | 1000 siblings ||.............. || .............. |
+ +-------------------||---------------||----------------+
+ | Query rate ||.............. || .............. |
+ +-------------------||---------------||----------------+
+
+ Table 3: Speed of operations - non-default set-up
+
+
+
+
+
+
+
+Barker & Hedberg [Page 20]
+
+RFC 1564 DSA Metrics January 1994
+
+
+Security Considerations
+
+ Security issues are not discussed in this memo.
+
+Authors' Addresses
+
+ Paul Barker
+ Department of Computer Science
+ University College London
+ Gower Street
+ London
+ WC1E 6BT
+ United Kingdom
+
+ Phone: +44 71 380 7366
+ Fax: +44 71 387 1397
+ EMail: P.Barker@cs.ucl.ac.uk
+
+
+ Roland Hedberg
+ Rekencentrum
+ Delft Technical University
+ Michiel de Ruyterweg 10-12
+ Postbus 354, 2600 AJ Delft
+ The Netherlands
+
+ Phone: +31 15 785210
+ EMail: Roland.Hedberg@rc.tudelft.nl
+
+ OR
+
+ Roland Hedberg
+ Umdac
+ University of Umea
+ s-901 87 Umea
+ Sweden
+
+ Phone: +46 90 165204
+ EMail: Roland.Hedberg@umdac.umu.se
+
+
+
+
+
+
+
+
+
+
+
+
+Barker & Hedberg [Page 21]
+ \ No newline at end of file