summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc3577.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3577.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3577.txt')
-rw-r--r--doc/rfc/rfc3577.txt1739
1 files changed, 1739 insertions, 0 deletions
diff --git a/doc/rfc/rfc3577.txt b/doc/rfc/rfc3577.txt
new file mode 100644
index 0000000..6e6d6a6
--- /dev/null
+++ b/doc/rfc/rfc3577.txt
@@ -0,0 +1,1739 @@
+
+
+
+
+
+
+Network Working Group S. Waldbusser
+Request for Comments: 3577 R. Cole
+Category: Informational AT&T
+ C. Kalbfleisch
+ Verio, Inc.
+ D. Romascanu
+ Avaya
+ August 2003
+
+
+ Introduction to the Remote Monitoring (RMON) Family of MIB Modules
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2003). All Rights Reserved.
+
+Abstract
+
+ The Remote Monitoring (RMON) Framework consists of a number of
+ interrelated documents. This memo describes these documents and how
+ they relate to one another.
+
+Table of Contents
+
+ 1. The Internet-Standard Management Framework . . . . . . . . . . 2
+ 2. Definition of RMON . . . . . . . . . . . . . . . . . . . . . . 2
+ 3. Goals of RMON. . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 4. RMON Documents . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 4.1. RMON-1 . . . . . . . . . . . . . . . . . . . . . . . . . 6
+ 4.2. Token Ring Extensions to RMON MIB. . . . . . . . . . . . 7
+ 4.3. The RMON-2 MIB . . . . . . . . . . . . . . . . . . . . . 9
+ 4.4. RMON MIB Protocol Identifiers. . . . . . . . . . . . . . 10
+ 4.5. Remote Network Monitoring MIB Extensions for Switched
+ Networks (SMON MIB). . . . . . . . . . . . . . . . . . . 10
+ 4.6. RMON MIB Extensions for Interface Parameters Monitoring
+ (IFTOPN) . . . . . . . . . . . . . . . . . . . . . . . . 12
+ 4.7. RMON Extensions for Differentiated Services (DSMON MIB). 12
+ 4.8. RMON for High Capacity Networks (HCRMON MIB) . . . . . . 13
+ 4.9. Application Performance Measurement MIB (APM MIB). . . . 14
+ 4.10. RMON MIB Protocol Identifier Reference Extensions. . . . 15
+ 4.11. Transport Performance Metrics MIB (TPM MIB). . . . . . . 16
+
+
+
+
+Waldbusser, et al. Informational [Page 1]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ 4.12. Synthetic Sources for Performance Monitoring MIB
+ (SSPM MIB) . . . . . . . . . . . . . . . . . . . . . . . 17
+ 4.13. RMON MIB Extensions for High Capacity Alarms . . . . . . 17
+ 4.14. Real-Time Application Quality of Service Monitoring
+ (RAQMON) MIB . . . . . . . . . . . . . . . . . . . . . . 17
+ 5. RMON Framework Components. . . . . . . . . . . . . . . . . . . 18
+ 5.1. MediaIndependent Table . . . . . . . . . . . . . . . . . 18
+ 5.2. Protocol Directory . . . . . . . . . . . . . . . . . . . 19
+ 5.3. Application Directory and appLocalIndex. . . . . . . . . 21
+ 5.4. Data Source. . . . . . . . . . . . . . . . . . . . . . . 22
+ 5.5. Capabilities . . . . . . . . . . . . . . . . . . . . . . 22
+ 5.6. Control Tables . . . . . . . . . . . . . . . . . . . . . 23
+ 6. Relationship of the SSPM MIB with the APM and TPM MIBs . . . . 24
+ 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 26
+ 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 27
+ 8.1. Normative References . . . . . . . . . . . . . . . . . . 27
+ 8.2. Informative References . . . . . . . . . . . . . . . . . 27
+ 9. Security Considerations. . . . . . . . . . . . . . . . . . . . 29
+ 10. Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 30
+ 11. Full Copyright Statement . . . . . . . . . . . . . . . . . . . 31
+
+1. The Internet-Standard Management Framework
+
+ For a detailed overview of the documents that describe the current
+ Internet-Standard Management Framework, please refer to section 7 of
+ RFC 3410 [RFC3410].
+
+ Managed objects are accessed via a virtual information store, termed
+ the Management Information Base or MIB. MIB objects are generally
+ accessed through the Simple Network Management Protocol (SNMP).
+ Objects in the MIB are defined using the mechanisms defined in the
+ Structure of Management Information (SMI). This memo specifies a MIB
+ module that is compliant to the SMIv2, which is described in STD 58,
+ RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580
+ [RFC2580].
+
+2. Definition of RMON
+
+ Remote network monitoring devices, often called monitors or probes,
+ are instruments that exist for the purpose of managing and/or
+ monitoring a network. Often these remote probes are stand-alone
+ devices and devote significant internal resources for the sole
+ purpose of managing a network. An organization may employ many of
+ these devices, up to one per network segment, to manage its internet.
+ In addition, these devices may be used to manage a geographically
+ remote network such as for a network management support center of a
+ service provider to manage a client network, or for the central
+ support organization of an enterprise to manage a remote site.
+
+
+
+Waldbusser, et al. Informational [Page 2]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ When the work on the RMON documents was started, this device-oriented
+ definition of RMON was taken quite literally, as RMON devices were
+ purpose-built probes and dedicated to implementing the RMON MIB
+ modules. Soon, cards were introduced that added RMON capability into
+ a network hub, switch or router. RMON also began to appear as a
+ software capability that was added to the software of certain network
+ equipment, as well as software applications that could run on servers
+ or clients. Despite the variety of these approaches, the RMON
+ capability in each serves as a dedicated network management resource
+ available for activities ranging from long-term data collection and
+ analysis or for ad-hoc firefighting.
+
+ In the beginning, most, but not all, of RMON's capabilities were
+ based on the promiscuous capture of packets on a network segment or
+ segments. Over time, that mixture included more and more
+ capabilities that did not depend on promiscuous packet capture.
+ Today, some of the newest documents added to the RMON framework allow
+ multiple techniques of data gathering, where promiscuous packet
+ capture is just one of several implementation options.
+
+3. Goals of RMON
+
+ o Offline Operation
+
+ There are sometimes conditions when a management station will
+ not be in constant contact with its remote monitoring devices.
+ This is sometimes by design in an attempt to lower
+ communications costs (especially when communicating over a WAN
+ or dialup link), or by accident as network failures affect the
+ communications between the management station and the probe.
+
+ For this reason, RMON allows a probe to be configured to
+ perform diagnostics and to collect statistics continuously,
+ even when communication with the management station may not be
+ possible or efficient. The probe may then attempt to notify
+ the management station when an exceptional condition occurs.
+ Thus, even in circumstances where communication between
+ management station and probe is not continuous, fault,
+ performance, and configuration information may be continuously
+ accumulated and communicated to the management station
+ conveniently and efficiently.
+
+ o Proactive Monitoring
+
+ Given the resources available on the monitor, it is potentially
+ helpful for it to continuously run diagnostics and to log
+ network performance. The monitor is always available at the
+ onset of any failure. It can notify the management station of
+
+
+
+Waldbusser, et al. Informational [Page 3]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ the failure and can store historical statistical information
+ about the failure. This historical information can be played
+ back by the management station in an attempt to perform further
+ diagnosis into the cause of the problem.
+
+ o Problem Detection and Reporting
+
+ The monitor can be configured to recognize conditions, most
+ notably error conditions, and to continuously check for them.
+ When one of these conditions occurs, the event may be logged,
+ and management stations may be notified in a number of ways.
+
+ o Value Added Data
+
+ Because a remote monitoring device represents a network
+ resource dedicated exclusively to network management functions,
+ and because it is located directly on the monitored portion of
+ the network, the remote network monitoring device has the
+ opportunity to add significant value to the data it collects.
+ For instance, by highlighting those hosts on the network that
+ generate the most traffic or errors, the probe can give the
+ management station precisely the information it needs to solve
+ a class of problems.
+
+ o Multiple Managers
+
+ An organization may have multiple management stations for
+ different units of the organization, for different functions
+ (e.g., engineering and operations), and in an attempt to
+ provide disaster recovery. Because environments with multiple
+ management stations are common, the remote network monitoring
+ device has to deal with more than one management station,
+ potentially using its resources concurrently.
+
+4. RMON Documents
+
+ The RMON Framework includes a number of documents. Each document
+ that makes up the RMON framework defines some new useful behavior
+ (i.e., an application) and managed objects that configure, control
+ and monitor that behavior. This section lists those documents and
+ describes the role of each.
+
+ One of the key ways to differentiate the various RMON MIB modules is
+ by noting at which layer they operate. Because the RMON MIB modules
+ take measurements and present aggregates of those measurements, there
+ are 2 criteria to quantify for each MIB:
+
+
+
+
+
+Waldbusser, et al. Informational [Page 4]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ 1. At which layers does the MIB take measurements?
+
+ For example, the RMON MIB measures data-link layer attributes
+ (e.g., packets, bytes, errors), while the APM MIB measures
+ application layer attributes (e.g., response time). Supporting
+ measurement at higher layers requires analysis deeper into the
+ packet and many application layer measurements require stateful
+ flow analysis.
+
+ 2. At which layers does the MIB aggregate measurements?
+
+ This criteria notes the granularity of aggregation. For
+ example, the RMON MIB aggregates its measurements to the link,
+ hardware address, or hardware address pair - all data-link
+ concepts. In contrast, the RMON-2 MIB takes the same data-link
+ metrics (packets, bytes, errors) and aggregates them based on
+ network address, transport protocol, or application protocol.
+
+ Note that a MIB may take measurements at one level while aggregating
+ at different levels. Also note that a MIB may function at multiple
+ levels. Figure 1 and Figure 2 show the measurement layers and
+ aggregation layers for each MIB.
+
+ Measurement Layers
+
+ Data Link Network Transport Application
+ Layer Layer Layer Layer
+ RMON-1 X
+ TR-RMON X
+ RMON-2 X
+ SMON X
+ IFTopN X
+ HCRMON X
+ APM X
+ TPM X
+
+ Figure 1
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 5]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ Aggregation Layers
+
+ Data Link Network Transport Application
+ Layer Layer Layer Layer
+ RMON-1 X
+ TR-RMON X
+ RMON-2 X X X
+ SMON X
+ IFTopN X
+ HCRMON X
+ APM X X X
+ TPM X X X
+
+ Figure 2
+
+4.1. RMON-1
+
+ The RMON-1 standard [RFC2819] is focused at layer 2 and provides
+ link-layer statistics aggregated in a variety of ways. In addition,
+ it provides the generation of alarms when thresholds are crossed, as
+ well as the ability to filter and capture packet contents. The
+ components of RMON-1 are:
+
+ The Ethernet Statistics Group
+
+ The ethernet statistics group contains statistics measured by
+ the probe for each monitored Ethernet interface on this device.
+
+ The History Control Group
+
+ The history control group controls the periodic statistical
+ sampling of data from various types of network media.
+
+ The Ethernet History Group
+
+ The ethernet history group records periodic statistical samples
+ from an ethernet network and stores them for later retrieval.
+
+ The Alarm Group
+
+ The alarm group periodically takes statistical samples from
+ variables in the probe and compares them to previously
+ configured thresholds. If the monitored variable crosses a
+ threshold, an event is generated. A hysteresis mechanism is
+ implemented to limit the generation of alarms.
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 6]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ The Host Group
+
+ The host group contains statistics associated with each host
+ discovered on the network. This group discovers hosts on the
+ network by keeping a list of source and destination MAC
+ Addresses seen in good packets promiscuously received from the
+ network.
+
+ The HostTopN Group
+
+ The hostTopN group is used to prepare reports that describe the
+ hosts that top a list ordered by one of their statistics. The
+ available statistics are samples of one of their base
+ statistics over an interval specified by the management
+ station. Thus, these statistics are rate based. The
+ management station also selects how many such hosts are
+ reported.
+
+ The Matrix Group
+
+ The matrix group stores statistics for conversations between
+ sets of two MAC addresses. As the device detects a new
+ conversation, it creates a new entry in its tables.
+
+ The Filter Group
+
+ The filter group allows packets to be matched by a filter
+ equation. These matched packets form a data stream that may be
+ captured or may generate events.
+
+ The Packet Capture Group
+
+ The Packet Capture group allows packets to be captured after
+ they flow through a channel.
+
+ The Event Group
+
+ The event group controls the generation and notification of
+ events from this device.
+
+4.2. Token Ring Extensions to RMON MIB
+
+ Some of the functions defined in the RMON-1 MIB were defined specific
+ to Ethernet media. In order to operate the functions on Token Ring
+ Media, new objects needed to be defined in the Token Ring Extensions
+ to RMON MIB [RFC1513]. In addition, this MIB defines additional
+ objects that provide monitoring functions unique to Token Ring.
+
+
+
+
+Waldbusser, et al. Informational [Page 7]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ The components of the Token Ring Extensions to RMON MIB are:
+
+ The Token Ring Statistics Groups
+
+ The Token Ring statistics groups contain current utilization
+ and error statistics. The statistics are broken down into two
+ groups, the Token Ring Mac-Layer Statistics Group and the Token
+ Ring Promiscuous Statistics Group. The Token Ring Mac-Layer
+ Statistics Group collects information from the Mac Layer,
+ including error reports for the ring and ring utilization of
+ the Mac Layer. The Token Ring Promiscuous Statistics Group
+ collects utilization statistics from data packets collected
+ promiscuously.
+
+ The Token Ring History Groups
+
+ The Token Ring History Groups contain historical utilization
+ and error statistics. The statistics are broken down into two
+ groups, the Token Ring Mac-Layer History Group and the Token
+ Ring Promiscuous History Group. The Token Ring Mac-Layer
+ History Group collects information from the Mac Layer,
+ including error reports for the ring and ring utilization of
+ the Mac Layer. The Token Ring Promiscuous History Group
+ collects utilization statistics from data packets collected
+ promiscuously.
+
+ The Token Ring Ring Station Group
+
+ The Token Ring Ring Station Group contains statistics and
+ status information associated with each Token Ring station on
+ the local ring. In addition, this group provides status
+ information for each ring being monitored.
+
+ The Token Ring Ring Station Order Group
+
+ The Token Ring Ring Station Order Group provides the order of
+ the stations on monitored rings.
+
+ The Token Ring Ring Station Config Group
+
+ The Token Ring Ring Station Config Group manages token ring
+ stations through active means. Any station on a monitored ring
+ may be removed or have configuration information downloaded
+ from it.
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 8]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ The Token Ring Source Routing Group
+
+ The Token Ring Source Routing Group contains utilization
+ statistics derived from source routing information optionally
+ present in token ring packets.
+
+4.3. The RMON-2 MIB
+
+ The RMON-2 MIB [RFC2021] extends the architecture defined in RMON-1,
+ primarily by extending RMON analysis up to the application layer.
+
+ The components of the RMON-2 MIB are:
+
+ The Protocol Directory Group
+
+ Every RMON-2 implementation will have the capability to parse
+ certain types of packets and identify their protocol type at
+ multiple levels. The protocol directory presents an inventory
+ of those protocol types the probe is capable of monitoring, and
+ allows the addition, deletion, and configuration of protocol
+ types in this list.
+
+ Protocol Distribution Group
+
+ This function controls the collection of packet and octet
+ counts for any or all protocols detected on a given interface.
+ An NMS can use this table to quickly determine bandwidth
+ allocation utilized by different protocols.
+
+ Address Mapping Group
+
+ This function lists MAC address to network address bindings
+ discovered by the probe and on which interface they were last
+ seen.
+
+ Network Layer Host Group
+
+ This function counts the amount of traffic sent from and to
+ each network address discovered by the probe.
+
+ Network Layer Matrix Group
+
+ This function counts the amount of traffic sent between each
+ pair of network addresses discovered by the probe.
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 9]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ Application Layer Host Group
+
+ This function counts the amount of traffic, by protocol, sent
+ from and to each network address discovered by the probe.
+
+ Application Layer Matrix
+
+ This function counts the amount of traffic, by protocol, sent
+ between each pair of network addresses discovered by the probe.
+
+ User History
+
+ This function allows an NMS to request that certain variables
+ on the probe be periodically polled and for a time-series to be
+ stored of the polled values. This builds a user-configurable
+ set of variables to be monitored (not to be confused with data
+ about users).
+
+ Probe Configuration
+
+ This group contains configuration objects that configure many
+ aspects of the probe, including the software downloaded to the
+ probe, the out of band serial connection, and the network
+ connection.
+
+4.4. RMON MIB Protocol Identifiers
+
+ The RMON-2 MIB identifies protocols at any layer of the 7 layer
+ hierarchy with an identifier called a Protocol Identifier, or
+ ProtocolID for short. ProtocolIDs also identify the particular
+ configuration of layering in use, including any arbitrary
+ encapsulations. The RMON MIB Protocol Identifiers document [RFC2896]
+ is a companion document to the RMON-2 MIB that defines a number of
+ well-known protocols. Another document, the RMON MIB Protocol
+ Identifiers Macros [RFC2895], defines a macro format for the
+ description of these well-known protocols and others that may be
+ described in the future.
+
+ As the RMON Framework has grown, other documents have been added to
+ the framework that utilize ProtocolIDs.
+
+4.5. Remote Network Monitoring MIB Extensions for Switched Networks
+ (SMON MIB)
+
+ Switches have become pervasive in today's networks as a form of
+ broadcast media. SMON [RFC2613] provides RMON-like functions for the
+ monitoring of switched networks.
+
+
+
+
+Waldbusser, et al. Informational [Page 10]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ Switches today differ from standard shared media protocols because:
+
+ 1) Data is not, in general, broadcast. This MAY be caused by the
+ switch architecture or by the connection-oriented nature of the
+ data. This means, therefore, that monitoring non-broadcast
+ traffic needs to be considered.
+
+ 2) Monitoring the multiple entry and exit points from a Switching
+ device requires a vast amount of resources - memory and CPU,
+ and aggregation of the data in logical packets of information,
+ determined by the application needs.
+
+ 3) Switching incorporates logical segmentation such as Virtual
+ LANs (VLANs).
+
+ 4) Switching incorporates packet prioritization.
+
+ 5) Data across the switch fabric can be in the form of cells.
+ Like RMON, SMON is only concerned with the monitoring of
+ packets.
+
+ Differences such as these make monitoring difficult. The SMON MIB
+ provides the following functions that help to manage switched
+ networks:
+
+ smonVlanStats
+
+ This function provides traffic statistics per Virtual LAN for
+ 802.1q VLANs.
+
+ smonPrioStats
+
+ This function provides traffic statistics per priority level
+ for 802.1q VLANS.
+
+ dataSourceCaps
+
+ This function identifies all supported data sources on a SMON
+ device. An NMS MAY use this table to discover the RMON and
+ Copy Port attributes of each data source.
+
+ portCopyConfig
+
+ Many network switches provide the capability to make a copy of
+ traffic seen on one port and sending it out to another port for
+ management purposes. This occurs in addition to any copying
+ performed during the normal forwarding behavior of the switch.
+
+
+
+
+Waldbusser, et al. Informational [Page 11]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ The portCopyConfig function provides control of the port copy
+ functionality in a device.
+
+4.6. RMON MIB Extensions for Interface Parameters Monitoring (IFTOPN)
+
+ Many network switches contain hundreds of ports, many with only one
+ attached device. A common operation when managing such a switch is
+ to sort the interfaces by one of the parameters (e.g., to find the
+ most highly utilized interface). If the switch contains many
+ interfaces it can be expensive and time consuming to download
+ information for all interfaces to sort it on the NMS. Instead, the
+ ifTopN MIB [RFC3144] allows the sorting to occur on the switch and
+ for only the top interfaces to be downloaded.
+
+4.7. RMON Extensions for Differentiated Services (DSMON MIB)
+
+ This MIB [RFC3287] defines extensions of RMON for monitoring the
+ traffic usage of Differentiated Services [RFC2474] codepoint values.
+ The 6-bit DiffServ codepoint portion (DSCP) of the Type of Service
+ (TOS) octet in the IP header provides for 64 different packet
+ treatments for the implementation of differentiated network devices.
+ DSMON-capable RMON probes collect and aggregate statistics based on
+ the inspection of the DSCP value in monitored packets.
+
+ The DSMON MIB defines a DSCP counter aggregation mechanism to reduce
+ the total number of counters by configuring the agent to internally
+ aggregate counters based on the DSCP value. This mechanism is
+ designed to overcome the agent data collection limitation, perform
+ data reduction at the agent and applications level, and optimize the
+ application for cases in which some codepoint values are not used, or
+ lead to similar packet treatment in the monitored network domain.
+
+ The components of the DSMON MIB are:
+
+ The Aggregate Control Group
+
+ The Aggregate Control Group enables the configuration of the
+ counter aggregation groups.
+
+ The DSMON Statistics Group
+
+ The DSMON Statistics Group contains per counter aggregation
+ group distribution statistics for a particular RMON data
+ source.
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 12]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ The DSMON Protocol Distribution Group
+
+ The DSMON Protocol Distribution Group reports per counter
+ aggregation distribution statistics for each application
+ protocol detected on a particular RMON data source.
+
+ The DSMON Host Group
+
+ The DSMON Host Group contains host address distribution
+ statistics for each counter aggregation group, detected on a
+ particular RMON data source.
+
+ The DSMON Capabilities Group
+
+ The DSMON Capabilities Group reports the DSMON MIB functional
+ capabilities of the agent implementation.
+
+ The DSMON Matrix Group
+
+ The DSMON Matrix Group contains host address pair distribution
+ statistics for each counter aggregation group, detected on a
+ particular RMON data source.
+
+4.8. RMON for High Capacity Networks (HCRMON MIB)
+
+ This MIB [RFC3272] defines extensions to RMON for use on high
+ capacity networks. Except for the mediaIndependentTable, each of the
+ tables in this MIB adds high capacity capability to an associated
+ table in the RMON-1 MIB or RMON-2 MIB.
+
+ The mediaIndependentTable provides media independent utilization and
+ error statistics for full-duplex and half-duplex media. Prior to the
+ existence of the HCRMON MIB, a new table needed to be created for
+ RMON monitoring of each data-link layer media. These tables included
+ many statistical attributes of the media, including packet and octet
+ counters that are independent of the media type. This was not
+ optimal because there was no way to monitor media types for which a
+ media-specific table had not been defined. Further, there were no
+ common objects to monitor media-independent attributes between media
+ types.
+
+ In the future, for media other than ethernet and token ring, the
+ mediaIndependentTable will be the source for media-independent
+ statistics. Additional media-specific tables may be created to
+ provide attributes unique to particular media, such as error
+ counters.
+
+
+
+
+
+Waldbusser, et al. Informational [Page 13]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+4.9. Application Performance Measurement MIB (APM MIB)
+
+ The APM MIB [APM] provides analysis of application performance as
+ experienced by end-users.
+
+ Application performance measurement measures the quality of service
+ delivered to end-users by applications. With this perspective, a
+ true end-to-end view of the IT infrastructure results, combining the
+ performance of the application, desktop, network, and server, as well
+ as any positive or negative interactions between these components.
+
+ Despite all the technically sophisticated ways in which networking
+ and system resources can be measured, human end-users perceive only
+ two things about an application: availability and responsiveness.
+
+ Availability - The percentage of the time that the application is
+ ready to give a user service.
+
+ Responsiveness - The speed at which the application delivers the
+ requested service.
+
+ The APM MIB includes the following functions:
+
+ The APM Application Directory Group
+
+ The APM Application Directory group contains configuration
+ objects for every application or application verb monitored on
+ this system.
+
+ The APM User Defined Applications Group
+
+ The APM User Defined Applications Group contains objects that
+ allow for the tracking of applications or application verbs
+ that are not registered in the protocolDirectoryTable.
+
+ The APM Report Group
+
+ The APM Report Group is used to prepare regular reports that
+ aggregate application performance by flow, by client, by
+ server, or by application.
+
+ The APM Transaction Group
+
+ The APM Transaction Group is used to show transactions that are
+ currently in progress and ones that have ended recently, along
+ with their responsiveness metric.
+
+
+
+
+
+Waldbusser, et al. Informational [Page 14]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ One important benefit of this table is that it allows a
+ management station to check on the status of long-lived
+ transactions. Because the apmReport and apmException
+ mechanisms act only on transactions that have finished, a
+ network manager may not have visibility for some time into the
+ performance of long-lived transactions, such as streaming
+ applications, large data transfers, or (very) poorly performing
+ transactions. In fact, by their very definition, the apmReport
+ and apmException mechanisms only provide visibility into a
+ problem after nothing can be done about it.
+
+ The APM Exception Group
+
+ The APM Exception Group is used to generate immediate
+ notifications of transactions that cross certain thresholds.
+ The apmExceptionTable is used to configure which thresholds are
+ to be checked for which types of transactions. The
+ apmTransactionResponsivenessAlarm notification is sent when a
+ transaction occurs with a responsiveness that crosses a
+ threshold.
+
+ The apmTransactionUnsuccessfulAlarm notification is sent when a
+ transaction, for which exception checking was configured,
+ fails.
+
+ The APM Notification Group
+
+ The APM Notification Group contains 2 notifications that are
+ sent when thresholds in the APM Exception Table are exceeded.
+
+4.10. RMON MIB Protocol Identifier Reference Extensions
+
+ The protocol identifier defined in RMON-2 [RFC2021] can identify any
+ protocol at any layer and its encapsulation. The protocol identifier
+ macro document [RFC2896] defines a convenient human readable and
+ machine parseable format for documenting well-known protocols.
+
+ For the most part, the protocol identifiers used by RMON-2
+ implementations have described protocols at any layer, including the
+ application layer, but have not gone any deeper into the application.
+ In order to differentiate an application's behavior while performing
+ different tasks (logging in vs. downloading, for example), it is
+ important to have a separate protocol identifier for each application
+ "verb". The macro defined in [RFC2896] is inconvenient for defining
+ application verbs because it assumes that most protocols are
+ identified by an integer type field and many or most applications use
+ other means for identifying verbs, including character strings.
+
+
+
+
+Waldbusser, et al. Informational [Page 15]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ These extensions define another macro for defining application verbs
+ that are children of an application. The parent application can be
+ defined with the original protocol identifier macro and the
+ application verbs are defined with the new macro.
+
+4.11. Transport Performance Metrics MIB (TPM MIB)
+
+ The TPM MIB [TPM] monitors selected performance metrics and
+ statistics derived from the monitoring of network packets and sub-
+ application level transactions. The MIB is defined to compliment the
+ APM reports by providing a 'drill-down' capability to better
+ understand selected applications' performance. The metrics are
+ defined through reference to existing IETF, ITU and other standards
+ organizations' documents. The monitoring covers both passive and
+ active traffic generation sources.
+
+ The TPM MIB includes the following functions:
+
+ The tpmCapabilities Group
+
+ The tpmCapabilitiesGroup contains objects and tables that show
+ the measurement protocol and metric capabilities of the agent.
+
+ The tpmAggregateReports Group
+
+ The tpmAggregateReportsGroup is used to provide the collection
+ of aggregated statistical measurements for the configured
+ report intervals.
+
+ The tpmCurrentReports Group
+
+ The tpmCurrentReportsGroup is used to provide the collection of
+ uncompleted measurements for the current configured report for
+ those transactions caught in progress. A history of these
+ transactions is also maintained once the current transaction
+ has completed.
+
+ The tpmExceptionReports Group
+
+ The tpmExceptionReportsGroup is used to link immediate
+ notifications of transactions that exceed certain thresholds
+ defined in the apmExceptionGroup [APM]. This group reports the
+ aggregated sub-application measurements for those applications
+ exceeding thresholds.
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 16]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+4.12. Synthetic Sources for Performance Monitoring MIB (SSPM MIB)
+
+ The Synthetic Sources for Performance Monitoring MIB [SSPM] covers
+ the artificial generation of a) application-level, b) transport-
+ level, and c) link-level traffic for the purpose of monitoring system
+ performance. There are situations where it is useful to be able to
+ control the generation of synthetic traffic when evaluating system
+ performance. There are other situations where system performance
+ evaluation can rely upon naturally generated application-level
+ traffic, in which case one needs only monitor existing traffic and
+ not instrument synthetic traffic. The SSPM MIB provides the ability
+ to configure and control the generation of this synthetic traffic.
+
+4.13. RMON MIB Extensions for High Capacity Alarms
+
+ There is a need for a standardized way of providing the same type of
+ alarm thresholding capabilities for Counter64 objects, as already
+ exists for Counter32 objects. The RMON-1 alarmTable objects and
+ RMON-1 notification types are specific to 32-bit objects, and cannot
+ be used to properly monitor Counter64-based objects. Extensions to
+ these existing constructs are needed which explicitly support
+ Counter64-based objects. These extensions are completely independent
+ of the existing RMON-1 alarm mechanisms.
+
+ This MIB [RFC3434] contains the following functions:
+
+ The hcAlarmControlObjects group
+
+ Controls the configuration of alarms for high capacity MIB
+ object instances.
+
+ The hcAlarmCapabilities group
+
+ Describes the high capacity alarm capabilities provided by the
+ agent.
+
+ The hcAlarmNotifications group
+
+ Provides new rising and falling threshold notifications for
+ high capacity objects.
+
+4.14. Real-Time Application Quality of Service Monitoring
+ (RAQMON) MIB
+
+ There is a need to extend the RMON framework to monitor end devices
+ such as IP phones, pagers, Instant Message Clients, mobile phones,
+ and PDA devices. This memo proposes an extension of RMON Framework
+ to allow Real-time Application QoS information of these types of end
+
+
+
+Waldbusser, et al. Informational [Page 17]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ devices to be retrieved with SNMP, independent of the technology used
+ to perform the measurements. An end-to-end user experience of the
+ quality of service (QoS) and performance for such an application is a
+ combination of device performance, transport network performance and
+ specific application context.
+
+ RAQMON [RAQMON-FRAMEWORK] defines a common framework to identify a
+ set of application QoS parameters and a reporting mechanism using a
+ common protocol data unit (PDU) format used between a RAQMON Data
+ Source (RDS) and a RAQMON Report Collector (RRC) to report QOS
+ statistics using RTCP and SNMP as underlying transport protocol.
+
+ See the RAQMON MIB [RAQMON-MIB] for more information about its
+ components.
+
+5. RMON Framework Components
+
+ The collection of documents in the RMON Framework are associated by
+ 1) A common purpose and similar collection methodologies; and, 2) Use
+ of common infrastructure components.
+
+ These common infrastructure components are:
+
+ - MediaIndependent Table
+ - Protocol Directory
+ - appDirectory
+ - DataSource
+ - Capabilities
+ - Control Tables
+
+5.1. MediaIndependent Table
+
+ While many data-link media types exist and they each have unique
+ features, there are many statistics that are common across most
+ media. For example, counts of packets and octets are interesting for
+ most media. The media independent table contains the most common
+ such statistics and forms a super class from which specific interface
+ types are inherited. This means that the common statistics can be
+ monitored even for media types that are unknown.
+
+ For example, if the mediaindependentTable had existed prior to the
+ definition of the etherStatsTable, the etherStatsTable could have
+ omitted the etherStatsDropEvents, etherStatsOctets, etherStatsPkts
+ objects.
+
+ The Media Independent Table is defined in the High Capacity RMON MIB
+ [RFC3434].
+
+
+
+
+Waldbusser, et al. Informational [Page 18]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+5.2. Protocol Directory
+
+ The second of the RMON infrastructure components is the Protocol
+ Directory Group defined in the RMON-2 MIB [RFC2021]. The main
+ objective of RMON-2 was to extend the remote network monitoring
+ agents capabilities beyond the link layer to higher level protocol
+ monitoring. This required a means to globally identify individual
+ protocol encapsulations. This capability is provided by the Protocol
+ Directory Group, specifically the protocolDirID found in the
+ protocolDirTable in the RMON-2 MIB.
+
+ The Protocol Directory allows the agent to provide an inventory of
+ the protocols that the agent can decode, count, categorize and time.
+ The directory and its objects are designed to allow for the addition,
+ deletion and configuration of the protocol encapsulations in the
+ directory list. Protocol Directory entries are identified primarily
+ by an object called the protocolDirID. The protocolDirID is a
+ hierarchically formatted OCTET STRING that globally identifies
+ individual protocol encapsulations. A protocol descriptor macro has
+ been defined in RFC 2895 [RFC2895] to describe the various protocol
+ layers supported in the protocolDirID protocol hierarchy. The
+ protocolDirID is defined as a tree built up from successive protocol
+ encapsulations. Each layer is identified by a 4-octet identifier
+ that identifies the child protocol within the context of the parent
+ protocol identified by the preceding identifiers.
+
+ Associated with each protocol layer in the protocolDirID is a 1-octet
+ parameter field. Each parameter identifies potential options
+ specific to that protocol, such as the agent's capability to count
+ fragmented packets correctly and to track sessions for port mapped
+ protocols, e.g., TFTP. These 1-octet parameter fields are
+ concatenated, in order, in the protocolDirParameters object.
+
+ The protocolDirTable index is comprised of the protocolDirID, the
+ protocolDirParameters and their associated length fields. The index
+ format is shown in Figure 3.
+
+ +---+--------------------------+---+---------------+
+ | c ! | c ! protocolDir |
+ | n ! protocolDirID | n ! Parameters |
+ | t ! | t ! |
+ +---+--------------------------+---+---------------+
+
+ Figure 3: the protocolDirTable INDEX format.
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 19]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ An example protocolDirTable INDEX for SNMP over UDP over IP over
+ Ethernet is:
+
+ 16.0.0.0.1.0.0.8.0.0.0.0.17.0.0.0.161.4.0.0.0.0
+
+ | | | | | | | |
+ +--+-------+-------+--------+---------+-+-------+
+ c ether2 ip udp snmp c param.
+
+ c = 1-subidentifier count field
+
+ Figure 4: A protocolDirTable INDEX example for
+ SNMP over UDP over IP over Ethernet.
+
+ The set of defined protocol layers currently described is found in
+ RFC 2896 [RFC2896]. RFC 2895 [RFC2895] defines a process for
+ submitting new protocols to add to the currently defined set.
+ Periodic updates to RFC 2896 will be published to incorporate new
+ protocol definitions that have been submitted. In fact, RFC 2896 is
+ the second version of the defined protocol macros, obsoleting RFC
+ 2074 [RFC2074]. RFC 2895 also defines how to handle protocols that
+ do not map into this well-defined tree hierarchy built up from
+ encapsulation protocol identifiers. An example of such a protocol
+ encapsulation is RTP, which is mapped to specific UDP ports through a
+ separate signaling mechanism. These are handled by the ianaAssigned
+ protocols, as described in RFC 2895.
+
+ The protocolDirTable is defined (and used) in the RMON-2 MIB
+ [RFC2021], and is being used in other RMON WG MIBs, as well as other
+ IETF defined MIBs. Examples include the APM MIB [APM], the TPM MIB
+ [TPM] and the SSPM MIB [SSPM].
+
+ As mentioned in previous sections, the protocolDirID is being
+ extended in two ways. First, work is underway on a new set of
+ protocol descriptor macros to extend the protocol encapsulation model
+ to identify application layer verbs [RFC3395]. This extension was
+ motivated by the work on the APM MIB and the TPM MIB. Second, the
+ APM MIB defines the apmAppDirectoryTable that provides a directory of
+ applications that the agent can process. This is discussed further
+ in the following section. Combined, these extensions allow:
+
+ + The APM MIB to define and monitor the end-user's view of
+ application performance.
+
+ + The TPM MIB to clearly specify the sub-transactions that
+ comprise the application it monitors through the
+ tpmTransMetricDirTable.
+
+
+
+
+Waldbusser, et al. Informational [Page 20]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ + The SSPM MIB to generate synthetic application transactions by
+ importing the appLocalIndex from the APM MIB.
+
+5.3. Application Directory and appLocalIndex
+
+ APM, TPM and related applications collect certain types of statistics
+ for each application or application verb they are decoding. Some
+ applications and application verbs are defined in the protocol
+ directory and thus get their own protocolID and a corresponding
+ protocolDirLocalIndex. Other application verbs are defined more
+ dynamically by entries in the apmHttpFilterTable or
+ apmUserDefinedAppTable. These dynamically defined applications do
+ not have protocolDirID's assigned to them.
+
+ The APM MIB [APM] defines an important index called the
+ appLocalIndex. For all application monitoring in the APM and TPM
+ MIBs, applications are identified by integer values of the
+ appLocalIndex. However, there is no single registry of applications
+ (as there is for protocols) because there are a few different
+ mechanisms through which an application may be registered. For each
+ value of appLocalIndex, a corresponding entry will exist in one of
+ several tables:
+
+ 1. The protocolDirTable - Some values of appLocalIndex correspond
+ to protocolDirLocalIndex values assigned in the
+ protocolDirTable. Each of these corresponds to a protocol
+ defined by a protocolID.
+
+ 2. The apmHttpFilterTable - Some values of appLocalIndex
+ correspond to apmHttpFilterAppLocalindex values assigned in the
+ apmHttpFilterTable. Each of these corresponds to an
+ application verb defined as a set of HTTP transactions that
+ match a set of filters.
+
+ 3. The apmUserDefinedAppTable - Some values of appLocalIndex
+ correspond to index values of the apmUserDefinedAppTable. Each
+ of them corresponds to an application or application verb
+ defined in a user-defined way.
+
+ Each value of appLocalIndex will only be registered in one of these
+ tables. In effect, the appLocalIndex number space is the union of
+ these number spaces, where these tables must work together to avoid
+ assigning overlapping (duplicate) appLocalIndexes.
+
+ Each unique appLocalIndex value is also registered in the
+ apmAppDirectoryTable, where a number of attributes of the application
+ may be configured.
+
+
+
+
+Waldbusser, et al. Informational [Page 21]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+5.4. Data Source
+
+ Most RMON functions use a DataSource as a pointer to the entity from
+ which data is to be collected. The DataSource is an object
+ identifier that identifies one of three types of data sources:
+
+ ifIndex.<I>
+
+ Traditional RMON dataSources. Called 'port-based' for
+ ifType.<I> not equal to 'propVirtual(53)'. <I> is the ifIndex
+ value.
+
+ smonVlanDataSource.<V>
+
+ A dataSource of this form refers to a 'Packet-based VLAN' and
+ is called a 'VLAN-based' dataSource. <V> is the VLAN ID as
+ defined by the IEEE 802.1Q standard. The value is between 1
+ and 4094 inclusive, and it represents an 802.1Q VLAN-ID with a
+ global scope within a given bridged domain, as defined by
+ 802.1Q.
+
+ entPhysicalEntry.<N>
+
+ A dataSource of this form refers to a physical entity within
+ the agent and is called an 'entity-based' dataSource. <N> is
+ the value of the entPhysicalIndex in the entPhysicalTable.
+
+5.5. Capabilities
+
+ Probe Capabilities objects have been introduced in the RMON MIB
+ modules with the goal of helping applications determine the
+ capabilities of the different probes in the domain. These objects
+ use a BITS syntax (with the exception of some of the objects in the
+ TPM and SSPM MIBs), and list in an explicit manner the MIB groups
+ supported by the probe, as well as functional capabilities of the
+ specific RMON agents. By reading the values of these objects, it is
+ possible for applications to know which RMON functions are usable
+ without going through a trial-and-error process that can result in
+ loss of time and bandwidth in the operational flow. These objects
+ have the MAX-ACCESS of read-only, which defines their use as an
+ indication of what is supported by a probe, and not a means to
+ configure the probe for operational modes. An RMON agent SHOULD
+ initiate the capabilities objects at agent initialization and SHOULD
+ NOT modify the objects during operation.
+
+ The probeCapabilities object in the RMON-2 MIB describes the
+ capabilities of probes that support RMON, Token-Ring RMON and RMON-2.
+
+
+
+
+Waldbusser, et al. Informational [Page 22]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ The smonCapabilities object in the SMON MIB describes the SMON-
+ specific capabilities of probes that support the SMON MIB.
+
+ The dataSourceCapsTable in the SMON MIB defines the capabilities of
+ the SMON data sources on probes that support the RMON MIB.
+
+ The interfaceTopNCaps object in the Interface TopN MIB defines the
+ sorting capabilities supported by an agent that supports the
+ Interface TopN MIB.
+
+ The dsmonCapabilities object in the DSMON MIB provides an indication
+ of the DSMON groups supported by an agent that supports the DSMON
+ MIB.
+
+ The tpmCapabilitiesGroup contains objects and tables, which show the
+ measurement protocol and metric capabilities of an agent that
+ supports the TPM MIB.
+
+ The sspmCapabilitiesTable indicates whether a device supporting the
+ SSPM MIB supports SSPM configuration of the corresponding
+ AppLocalIndex.
+
+ The hcAlarmCapabilities object provides an indication of the high
+ capacity alarm capabilities supported by an agent that supports the
+ HC-Alarm MIB.
+
+5.6. Control Tables
+
+ Due to the complex nature of the available functions in the RMON MIB
+ modules, these functions often need user configuration. In many
+ cases, the function requires parameters to be set up for a data
+ collection operation. The operation can proceed only after these
+ parameters are fully set up.
+
+ Many functional groups in the RMON MIBs have one or more tables in
+ which to set up control parameters, and one or more data tables in
+ which to place the results of the operation. The control tables are
+ typically read-write in nature, while the data tables are typically
+ read-only. Because the parameters in the control table often
+ describe resulting data in the data table, many of the parameters can
+ be modified only when the control entry is invalid. Thus, the method
+ for modifying these parameters is to invalidate the control entry,
+ causing its deletion and the deletion of any associated data entries,
+ and then create a new control entry with the proper parameters.
+ Deleting the control entry also gives a convenient method for
+ reclaiming the resources used by the associated data.
+
+
+
+
+
+Waldbusser, et al. Informational [Page 23]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ To facilitate control by multiple managers, resources have to be
+ shared among the managers. These resources are typically the memory
+ and computation resources that a function requires.
+
+ Two facilities are used to ease cooperation between multiple managers
+ as they create and use control tables. The first is the use of
+ EntryStatus or RowStatus objects that guarantee that two managers can
+ avoid creating the same control entry. The second is the use of
+ OwnerString objects in control tables that provides the following
+ benefits:
+
+ 1. Provides information to facilitate sharing of already existing
+ control entries instead of creating a new but identical entry.
+
+ 2. Provides information to allow the ultimate human owners of
+ control entries to identify each other so they can cooperate in
+ cases of conflict over resources.
+
+ 3. Provides information to allow software to identify control
+ entries that it owns but has forgotten about (e.g., due to a
+ crash or other error) so that it can re-use or free them.
+
+ 4. Provides information to allow an administrator to make an
+ informed decision to override someone else's control entry when
+ circumstances make it necessary.
+
+ 5. Provides information to identify control entries that are set
+ up automatically when the device starts up.
+
+ See the RMON MIB [RFC2819] for further information on the use of
+ control tables, EntryStatus/RowStatus, and OwnerStrings.
+
+6. Relationship of the SSPM MIB with the APM and TPM MIBs
+
+ While APM and TPM may monitor actual traffic generated by end-users
+ on the network, they may also monitor synthetically generated
+ traffic. The SSPM MIB provides a mechanism for the generation of
+ synthetic traffic but no mechanism for monitoring - the task of
+ monitoring the generated traffic is deferred to the APM and TPM MIBs.
+
+ Figure 5 shows an overview of the components of the SSPM MIB
+ architecture, including the roles played by the APM and TPM MIBs.
+ The RMON documents address the "Control-Level" in this diagram and
+ some aspects of the "Synchronization Control-Level". The underlying
+ "Instrumentation-Level" is implementation dependent and outside the
+ domain of the RMON specifications.
+
+
+
+
+
+Waldbusser, et al. Informational [Page 24]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ +----------------+
+ +-------------| Application |-------------+
+ | +----------------+ |
+ | | |
+ +--------------------------------+ |
+ | Synchronization Control | |
+ +--------------------------------+ |
+ | | |
+ V V V
+ +------------------+ +------------------+ +--------------+
+ |Traffic Generation| |Monitoring Metrics| |Data Reduction|
+ | Control | | Control | | Control |
+ +------------------+ +------------------+ +--------------+
+ | ^ | ^ | ^
+ | | | | | |
+ V | V | V |
+ +------------------+ +------------------+ +---------------+
+ |Traffic Generation| |Monitoring Metrics| |Data Reduction |
+ | Instrumentation| | Instrumentation| +-->|Instrumentation|
+ +------------------+ +------------------+ | +---------------+
+ | |
+ | |
+ Various levels | |
+ and span +-----------|
+ |
+ |
+ V
+ Reports
+
+ Figure 5: An SSPM Performance Monitoring System
+
+ It is the responsibility of the network management application to
+ coordinate the individual aspects of the performance management
+ system.
+
+ Within the APM, TPM, and SSPM set of RMON MIB modules:
+
+ + APM MIB [APM] is responsible for the aspects of the "Monitoring
+ Metrics Control" directly related to the end-user's perceived
+ application-level performance. The APM MIB also handles
+ aspects of "Data Reduction Control" and "Reports". Finally,
+ when TPM MIB relies upon the control tables in the APM MIB for
+ its own control, then APM MIB is providing some aspects of
+ "Synchronization Control" of the reports from these two MIBs.
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 25]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ + TPM MIB [TPM] is responsible for the aspects of the "Monitoring
+ Metrics Control". TPM MIB also handles aspects of "Data
+ Reduction Control" and "Reports" related to sub-application-
+ level transactions. Synchronization control with APM MIB is
+ provided by opting to rely on the APM MIB control tables within
+ the TPM MIB.
+
+ + SSPM MIB [SSPM] is responsible for the "Traffic Generation
+ Control" in the event that synthetic traffic is to be
+ monitored. The other, most common, option is to monitor
+ natural, user-generated traffic.
+
+ The "Monitor Metrics Control" is essentially hard-coded in the APM
+ MIB. Within the TPM MIB, a metrics table is used to identify the
+ metrics monitored within a specific implementation of the TPM MIB.
+ The "Data Reduction Control" is essentially hard-coded within the MIB
+ structure of the APM MIB and the TPM MIB. These MIBs strictly
+ specify the statistics to be reported within a set of report tables.
+
+ Both the TPM MIB and the SSPM MIB rely upon the APM MIB's
+ appLocalIndex to specify the application being monitored or
+ generated. The APM MIB provides the end-user view of the application
+ performance, e.g., the Whois transaction time. The TPM MIB, through
+ its tpmTransMetricDirTable, identifies a set of sub-application level
+ transactions and their metrics, which are associated with the
+ application. E.g., an implementation of the TPM MIB could report the
+ DNS lookup time, the TCP connect time (to the Whois Server), the
+ Whois Req/Resp download time. The SSPM MIB could be configured to
+ generate synthetically, these Whois transactions.
+
+ The testing model then is to first configure the traffic generation
+ instrumentation through the SSPM MIB control function. This defines
+ aspects of the synthetic traffic such as application type, targets,
+ etc. Once the traffic generation is configured, the network
+ management application can setup the monitoring instrumentation
+ through the APM MIB and TPM MIB. These control the reporting
+ periods, the type of data aggregation, etc. Once the tests are
+ complete, the network management application retrieves the reports
+ from the monitoring metrics control MIBs, e.g., APM MIB and TPM MIB.
+
+7. Acknowledgements
+
+ This memo is a product of the RMON MIB working group. In addition,
+ the authors gratefully acknowledge the contributions by Lester
+ D'Souza of NetScout Systems, Inc.
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 26]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+8. References
+
+8.1. Normative References
+
+ [RFC2819] Waldbusser, S., "Remote Network Monitoring
+ Management Information Base", STD 59, RFC 2819,
+ May 2000.
+
+8.2. Informative References
+
+ [RFC2026] Bradner, S., "The Internet Standards Process --
+ Revision 3", BCP 9, RFC 2026, October 1996.
+
+ [RFC2578] McCloghrie, K., Perkins, D. and J. Schoenwaelder,
+ Eds., "Structure of Management Information Version
+ 2 (SMIv2)", STD 58, RFC 2578, April 1999.
+
+ [RFC2579] McCloghrie, K., Perkins, D. and J. Schoenwaelder,
+ J., Eds., "Textual Conventions for SMIv2", STD 58,
+ RFC 2579, April 1999.
+
+ [RFC2580] McCloghrie, K., Perkins, D. and J. Schoenwaelder,
+ J., Eds., "Conformance Statements for SMIv2", STD
+ 58, RFC 2580, April 1999.
+
+ [RFC3410] Case, J., Mundy, R., Partain, D. and B. Stewart,
+ "Introduction and Applicability Statements for
+ Internet-Standard Management Framework", RFC 3410,
+ December 2002.
+
+ [RFC1513] Waldbusser, S., "Token Ring Extensions to the
+ Remote Network Monitoring MIB", RFC 1513,
+ September 1993.
+
+ [RFC2021] Waldbusser, S., "Remote Network Monitoring
+ Management Information Base Version 2 using
+ SMIv2", RFC 2021, January 1997.
+
+ [RFC2895] Bierman, A., Bucci, C. and R. Iddon, "Remote
+ Network Monitoring Management Information Base
+ Protocol Identification Reference", RFC 2895,
+ August 2000.
+
+ [RFC2896] Bierman, A., Bucci, C. and R. Iddon, "Remote
+ Network Monitoring MIB Protocol Identifier
+ Macros", RFC 2896, August 2000.
+
+
+
+
+
+Waldbusser, et al. Informational [Page 27]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ [RFC2613] Waterman, R., Lahaye, B., Romascanu, D. and S.
+ Waldbusser, "Remote Network Monitoring MIB
+ Extensions for Switched Networks Version 1.0", RFC
+ 2613, June 1999.
+
+ [RFC3144] Waldbusser, S., "Remote Monitoring MIB Extensions
+ for Interface Parameters Monitoring", RFC 3144,
+ August 2001.
+
+ [RFC3287] Bierman, A., "Remote Monitoring MIB Extensions for
+ Differentiated Services", RFC 3287, July 2002.
+
+ [RFC3273] Waldbusser, S., "Remote Network Monitoring
+ Management Information Base for High Capacity
+ Networks", RFC 3273, July 2002.
+
+ [APM] Waldbusser, S., "Application performance
+ measurement MIB", Work in Progress.
+
+ [RFC3395] Bierman, A., Bucci, C., Dietz, R. and A. Warth,
+ "Remote Network Monitoring MIB Protocol Identifier
+ Reference Extensions", RFC 3395, September 2002.
+
+ [TPM] Dietz, R. and R.G.Cole, "Application Performance
+ Measurement Framework Transport Performance
+ Metrics MIB", Work in Progress.
+
+ [SSPM] Kalbfleisch, K., Cole, R.G. and D. Romascanu,
+ "Definition of Managed Objects for Synthetic
+ Sources for Performance Monitoring Algorithms",
+ Work in Progress.
+
+ [RFC3434] Bierman, A. and K. McCloghrie, "Remote Monitoring
+ MIB Extensions for High Capacity Alarms", RFC
+ 3434, December 2002.
+
+ [RFC2233] McCloghrie, K. and F. Kastenholz, "The Interfaces
+ Group MIB Using SMIv2", RFC 2233, November 1997.
+
+ [RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces
+ Group MIB", RFC 2863, June 2000.
+
+ [RFC2330] Paxson, V., Almes, G., Mahdavi, J. and M. Mathis,
+ "Framework for IP Performance Metrics", RFC 2330,
+ May 1998.
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 28]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+ [OWDP] Shalunov, S., Teitelbaum, B. and M. Zekauskas, "A
+ One-way Active Measurement Protocol", Work in
+ Progress.
+
+ [RAQMON-FRAMEWORK] Siddiqui, A., Romascanu, D. and E. Golovinsky,
+ "Real-time Application Quality of Service
+ Monitoring (RAQMON) Framework", Work in Progress.
+
+ [RAQMON-MIB] Siddiqui, A., Romascanu, D., Golovinsky, E. and R.
+ Smith, "Real-Time Application Quality of Service
+ Monitoring (RAQMON) MIB", Work in Progress.
+
+9. Security Considerations
+
+ This document is a description of existing documents and as such it
+ does not have any security impact. In order to understand the
+ security-related issues of the different RMON documents, the reader
+ is directed to the Security Considerations sections of the respective
+ documents.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 29]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+10. Authors' Addresses
+
+ Steve Waldbusser
+
+ Phone: +1 650-948-6500
+ Fax: +1 650-745-0671
+ EMail: waldbusser@nextbeacon.com
+
+
+ Carl W. Kalbfleisch
+ NTT/VERIO
+ 8700 Stemmons Freeway, Suite 211
+ Dallas, TX 75247
+ United States
+
+ Phone: +1 972-906-2034
+ EMail: cwk@verio.net
+
+
+ Robert G. Cole
+ AT&T Labs
+ Network Design and Performance Analysis Department
+ 330 Saint John Street, 2nd Floor
+ Havre de Grace, MD 21078
+ United States
+
+ Phone: +1 410-939-8732
+ Fax: +1 410-939-8732
+ EMail: rgcole@att.com
+
+
+ Dan Romascanu
+ Avaya
+ Atidim Technology Park, Bldg. #3
+ Tel Aviv, 61131
+ Israel
+
+ Phone: +972-3-645-8414
+ EMail: dromasca@avaya.com
+
+
+
+
+
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 30]
+
+RFC 3577 Introduction to RMON August 2003
+
+
+11. Full Copyright Statement
+
+ Copyright (C) The Internet Society (2003). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assignees.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Waldbusser, et al. Informational [Page 31]
+