summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1672.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc1672.txt')
-rw-r--r--doc/rfc/rfc1672.txt171
1 files changed, 171 insertions, 0 deletions
diff --git a/doc/rfc/rfc1672.txt b/doc/rfc/rfc1672.txt
new file mode 100644
index 0000000..0c67620
--- /dev/null
+++ b/doc/rfc/rfc1672.txt
@@ -0,0 +1,171 @@
+
+
+
+
+
+
+Network Working Group N. Brownlee
+Request for Comments: 1672 The University of Auckland
+Category: Informational August 1994
+
+
+ Accounting Requirements for IPng
+
+Status of this Memo
+
+ This memo provides information for the Internet community. This memo
+ does not specify an Internet standard of any kind. Distribution of
+ this memo is unlimited.
+
+Abstract
+
+ This document was submitted to the IETF IPng area in response to RFC
+ 1550. Publication of this document does not imply acceptance by the
+ IPng area of any ideas expressed within. Comments should be
+ submitted to the big-internet@munnari.oz.au mailing list.
+
+Summary
+
+ This white paper discusses accounting requirements for IPng. It
+ recommends that all IPng packets carry accounting tags, which would
+ vary in size. In the simplest case a tag would simply be a voucher
+ identifying the party responsible for the packet. At other times tags
+ should also carry other higher-level accounting information.
+
+Background
+
+ The Internet Accounting Model - described in RFC 1272 - specifies how
+ accounting information is structured, and how it is collected for use
+ by accounting aplications. The model is very general, with
+ accounting variables being defined for various layers of a protocol
+ stack. The group's work has so far concentrated on the lower layers,
+ but the model can be extended simply by defining the variables
+ required, e.g., for session and application layers.
+
+ Brian Carpenter [1] suggests that IPng packets should carry
+ authenticated (source, destination, transaction) triplets, which
+ could be used for policy-based routing and accounting. The following
+ sections explain how the transaction field - hereafter called an
+ 'accounting tag' - could be used.
+
+Lower-layer (Transport) Accounting
+
+ At the lower (network) layers the tag would simply be a voucher. This
+ means it is an arbitrary string which identifies the party
+
+
+
+Brownlee [Page 1]
+
+RFC 1672 Accounting Requirements for IPng August 1994
+
+
+ responsible, i.e., willing to pay for, a packet. It would initially
+ be set by the host which originates the packet, hence at that stage
+ the tag would identify the user who sent it.
+
+ A tag could be changed at various points along a packet's path. This
+ could be done as part of the routing policy processing so as to
+ reflect changes of the party responsible over each section of the
+ path. For example:
+
+ user - provider tag identifies user
+ provider A - provider B tag identifies provider A
+
+ The tag could be used by accounting meters to identify the party
+ responsible for a traffic flow, without having to deduce this using
+ tables of rules. This should considerably simplify accounting for
+ transit traffic across intermediate networks.
+
+Higher-layer (Session and Application) Accounting
+
+ At higher layers there is a clear need to measure accounting
+ variables and communicate them to various points along a packet's
+ path, for example an application server may wish to inform a client
+ about its usage of resources. A tag containing this information could
+ be read by meters at any point along the packet's path for charging
+ purposes, and could also be used by the client to inform the user of
+ charges incurred.
+
+ It would make the collection of accounting data much simpler if this
+ information was carried in a standard tag within each packet, rather
+ than having different protocols provide this service in differing
+ ways.
+
+ For 'old' applications which remain unaware of the tag field, a meter
+ could be placed at a gateway for the application's host. This
+ 'gateway' meter could determine what the application is by watching
+ its streams of packets, then set an appropriate value in thir tag
+ fields.
+
+Structure of the accounting tag
+
+ The two uses of tags outlined above must be able to coexist. Since
+ many - indeed most - of the packets will only carry a voucher, it
+ seems simplest to keep this as part of the routing tuple (see below).
+
+ For the application variables, a separate tag seems sensible. This
+ would simply contain a list of the variables. Having two tags in
+ this way would keep separate the management of routers and meters.
+
+
+
+
+Brownlee [Page 2]
+
+RFC 1672 Accounting Requirements for IPng August 1994
+
+
+ If the encryption/digital signature overhead of the second tag proves
+ to be too high, it should be possible to combine this with the
+ voucher.
+
+ The fine detail of this, or at least the way variables are packed
+ into the tags, could be standardised by the Accounting Working Group
+ in due course. For the purpose of IPng all that is required is the
+ ability to carry one or two variable-size objects in every packet.
+
+References
+
+ [1] Carpenter, B., "IPng White Paper on Transition and Other
+ Considerations", RFC 1671, CERN, August 1994.
+
+Security Considerations
+
+ For IPng to provide reliable transport in a hostile environment,
+ routing and accounting information, i.e., the (source, dest,
+ network-tag) and (application-tag) tuples, must be tamper-proof.
+ Routers and meters which need to use the tuples will need to hold
+ appropriate keys for them. Network operators will have to plan
+ for this, for example by determining which routers need which
+ sets of keys. This will be neccessary in any case for reliable
+ policy-based routing, so the extra work required to set up
+ accounting meters should be acceptable.
+
+Author's Address
+
+ Nevil Brownlee
+ Deputy Director
+ Computer Centre, The University of Auckland
+ Private Bag 92019, Auckland, New Zealand
+
+ Phone: +64 9 373 7599
+ Fax: +64 9 373 7425
+ EMail: n.brownlee@auckland.ac.nz
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Brownlee [Page 3]
+