rfc5476.Packet Sampling (PSAMP) Protocol Specifications

合集下载

IP RFC中文摘要材料

IP RFC中文摘要材料

[RFC中文翻译]在串行线路上传输IP数据报的非标准协议TCP/IP协议组运行在各种各样的网络媒介上:IEEE802.3(以太网)和802.5(令牌环)局域网(LAN)、X.25线路、卫星链路以及串行线路。

其中许多网络已经有IP分组的标准封装格式,但没有用于串行线路的标准。

SLIP(串行线路IP)目前已成为事实上的标准,广泛地用于在点对点串行连接上运行TCP/IP。

这并不是一个Internet标准,本备忘录的发布不受限制。

历史(HISTORY)SLIP源于80年代初期的3COMUNETTCP/IP实现。

SLIP只是一个分组分帧协议,仅仅定义了一系列在串行线路上构造IP分组的字符。

它没有提供地址、分组类型标识、错误检查/修正或者压缩机制。

因为这个协议所作的工作这么少,通常很容易实现。

大约在1984年,RickAdam为4.2BerkeleyUnix和SunMicrosystem工作站实现了SLIP并公之于众,并作为一种使用串行线路连接TCP/IP主机和路由器的简单可靠的方法很快流行起来。

SLIP通常专门用于串行连接,有时候也用于拨号网络,使用的线路速率一般介于1200bps 和19.2Kbps之间。

SLIP允许主机和路由器混合连接(主机-主机、主机-路由器、路由器-路由器都是SLIP网络通用的配置),因而非常有用。

可用性(A V AILABILITY)SLIP可用于大多数基于BerkeleyUNIX的系统,并且被包括进了Berkeley的4.3BSD标准版。

SLIP可用于Ultrix、SunUNIX和大多数派生自Berkeley的UNIX系统。

一些终端集线器和IBMPC的实现也支持该协议。

BerkeleyUNIX的SLIP可以使用匿名FTP从上的pub/sl.shar.Z中获得。

确保传输的是二进制文件,并使用UNIX解压程序打开它,然后把解开的文件作为UNIX/bin/sh(如/bin/shsl.shar)的SHELL命令使用协议(PROTOCOL)SLIP定义了两个特殊字符:END和ESC。

rfc2544 时延 吞吐量 丢包率参数指标

rfc2544 时延 吞吐量 丢包率参数指标

rfc2544 时延吞吐量丢包率参数指标RFC 2544是一种网络性能测试方法,用于评估网络设备的性能。

它主要测量时延、吞吐量和丢包率这三个参数指标。

时延(Delay)是数据从源端到目的端经过网络的总时间。

它包括发送时延、传播时延和排队时延。

发送时延是指数据从源端发送到网络的时间,传播时延是指数据在传输过程中由于距离而产生的时间延迟,而排队时延是指数据在网络中排队等待传输的时间。

时延的测试可以帮助评估网络设备的响应速度和数据传输的效率。

在RFC 2544中,时延被测量为数据从源端发送到目的端并返回的总时间。

吞吐量(Throughput)是指网络设备在单位时间内能够传输的数据量。

它反映了网络设备的数据处理能力和传输效率。

吞吐量的测试可以帮助评估网络设备的性能是否能满足实际应用中的需求。

在RFC 2544中,吞吐量被测量为单位时间内传输的数据量。

丢包率(Packet Loss)是指在网络传输过程中丢失的数据包的比例。

丢包率可以反映网络设备的稳定性和可靠性。

丢包率的测试可以帮助评估网络设备在高负载情况下是否能够保持数据传输的稳定性和完整性。

在RFC 2544中,丢包率被测量为发送的数据包中未正确接收的数据包数量的比例。

RFC 2544通过发送特定类型和长度的数据包来测试网络设备的性能。

测试时,首先发送一系列递增长度的数据包,以测试设备的最大帧转发能力,也就是设备能够处理的最大数据包大小。

利用不同长度的数据包测试时延和吞吐量,并确定设备在不同负载下的性能表现。

然后,发送一系列不同负载的数据包来测试丢包率。

通过分析测试结果,可以评估网络设备的性能水平以及网络的可用带宽。

总之,RFC 2544中的时延、吞吐量和丢包率是评估网络设备性能的重要指标。

通过这些指标的测试,可以对网络设备的性能进行全面的评估和比较,帮助用户选择合适的设备,以满足实际应用中的需求。

同时,测试结果也可以用于优化网络的设计和配置,提高网络的性能和稳定性。

srv6相关标准

srv6相关标准

SRv6(Segment Routing over IPv6)是一种基于IPv6网络的新型路由技术,它通过在IPv6数据包中添加一个24位的标签来标识不同的路径。

这种技术可以提高网络的可扩展性、灵活性和安全性。

以下是一些与SRv6相关的标准:1. RFC 8210:这是SRv6的基本规范,定义了SRv6的基本概念、操作和实现要求。

2. RFC 8365:这个文档描述了如何使用BGP-LS(Border Gateway Protocol - Link State)协议在IPv6网络中传播SRv6路由信息。

3. RFC 8402:这个文档描述了如何使用MP-BGP(Multiprotocol BGP)协议在IPv6网络中传播SRv6路由信息。

4. RFC 8415:这个文档描述了如何使用IS-IS(Intermediate System to Intermediate System)协议在IPv6网络中传播SRv6路由信息。

5. RFC 8475:这个文档描述了如何使用OSPF(Open Shortest Path First)协议在IPv6网络中传播SRv6路由信息。

6. RFC 8597:这个文档描述了如何使用BFD(Bidirectional Forwarding Detection)协议在IPv6网络中检测SRv6路径的状态。

7. RFC 8795:这个文档描述了如何使用LDP(Label Distribution Protocol)协议在IPv6网络中分发SRv6标签。

8. RFC 8879:这个文档描述了如何使用PCE(Path Computation Element)协议在IPv6网络中计算SRv6路径。

9. RFC 8915:这个文档描述了如何使用SDN(Software-Defined Networking)技术来实现SRv6网络。

10. RFC 9119:这个文档描述了如何使用SRv6技术来实现网络切片。

RFC以太网性能测试规程

RFC以太网性能测试规程

1RFC2544 概述IP网络设备是IP网络的核心,其性能的好坏直接影响IP网网络规模、网络稳定性以及网络可扩展性。

由于IETF没有对特定设备性能测试作专门规定,一般来说只能按照RFC2544(Benchmarking Methodology for Network Interconnect Devices)作测试。

以太网交换机测试标准则参照RFC2889(Benchmarking Methodology for LAN Sw itching Devices)。

但是由于网络互联设备除了通用性能测试以外通常还有一些特定的性能指标。

例如路由器区别于一般简单的网络互连设备,在性能测试时还应该加上路由器特有的性能测试。

例如路有表容量、路由协议收敛时间等指标。

网络互联设备例如路由器性能测试应当包括下列指标:吞吐量(Throughput):测试路由器包转发的能力。

通常指路由器在不丢包条件下每秒转发包的极限。

一般可以采用二分发查找该极限点。

时延(Latency):测试路由器在吞吐量范围内从收到包到转发出该包的时间间隔。

时延测试应当重复20次然后去其平均值。

丢包率(Packet loss rate):测试路由器在不同负荷下丢弃包占收到包的比例。

不同负荷通常指从吞吐量测试到线速(线路上传输包的最高速率),步长一般使用线速的10%。

背靠背帧数(Back-to-back frame):测试路由器在接收到以最小包间隔传输时不丢包条件下所能处理的最大包数。

该测试实际考验路由器缓存能力。

如果路由器具备线速能力(吞吐量=接口媒体线速),则该测试没有意义。

系统恢复时间(System recovery):测试路由器在过载后恢复正常工作的时间。

测试方法可以采用向路由器端口发送吞吐量110%和线速间的较小值持续60秒后将速率下降到50%的时刻到最后一个丢包的时间间隔。

如果路由器具备线速能力,则该测试没有意义。

系统复位(Reset):测试路由器从软件复位或关电重启到正常工作的时间间隔。

鼎信通达综合接入网关 用户手册v2.2说明书

鼎信通达综合接入网关 用户手册v2.2说明书

修正记录文档名称鼎信通达综合接入网关用户手册手册版本 2.2日期2014/10/18作者Porter修正说明同步支持IMS平台软件版本2.18.02.06或以上版本目录第一章产品介绍 (1)1.1概述 (1)1.2产品外观 (2)1.3接口及指示灯介绍 (2)1.3.1DAG1000-4S接口及指示灯介绍 (2)1.3.2DAG1000-8S接口及指示灯说明 (3)1.3.3DAG2000-16S接口及指示灯介绍 (5)1.3.4DAG2000-24/32S接口及指示灯介绍 (6)1.3.5DAG2500-48/72S接口及指示灯介绍 (9)1.3.6DAG3000-128S接口及指示灯介绍 (12)1.4组网应用 (13)1.5功能和特点 (13)1.5.1支持协议 (13)1.5.2语音传真参数 (14)1.5.3补充业务 (14)第二章基本操作 (15)2.1话机操作 (15)2.1.1拨打电话号码或分机号 (15)2.1.2IP地址呼叫 (15)2.2呼叫保持 (15)2.3呼叫等待 (16)2.4呼叫转移 (16)2.4.1盲转(Blind) (16)2.4.2询问转移(Attend) (16)2.4.3三方通话 (17)2.5操作码列表 (17)2.6发送和接收传真 (19)2.6.1DAG(FXS)支持四种传真模式: (19)2.6.2T.38和Pass-Through (19)第三章设备自助设置 (20)3.1IP地址查询 (20)3.2恢复出厂设置 (20)3.3设置IP地址 (20)第四章WEB配置 (22)4.1WEB登陆 (22)4.1.1登陆准备 (22)4.1.2登陆WEB (24)4.2状态和统计 (24)4.2.1系统信息 (24)4.2.2注册信息 (26)4.2.3TCP/UDP统计 (26)4.2.4RTP会话统计 (27)4.3快速配置向导 (27)4.4网络 (27)4.4.1本地网络 (27)4.4.2VLAN参数 (29)4.4.3Qos (31)4.4.4LAN Qos (31)4.4.4DHCP服务(路由模式下可选配置) (31)4.4.5DMZ主机(路由模式下可选配置) (32)4.4.6转发规则(路由模式下可选配置) (33)4.4.7静态路由(路由模式下可选配置) (33)4.4.8防火墙(路由模式下可选配置) (34)4.4.8地址解析 (35)4.5SIP服务器 (35)4.6端口配置 (37)4.7高级选项配置 (39)4.7.1FXS参数 (39)4.7.2媒体参数 (41)4.7.3SIP参数 (43)4.7.4传真参数 (47)4.7.5拨号规则 (48)4.7.6功能键 (50)4.7.7系统参数 (52)4.7.8Action URL (54)4.8呼叫和路由配置 (55)4.8.1通配组 (55)4.8.2端口组 (55)4.8.3IP中继 (56)4.8.4路由参数 (56)4.8.5IP-Tel路由 (57)4.8.6Tel-IP/Tel路由 (58)4.8.7IP->IP路由 (58)4.9号码变换 (59)4.9.1IP-Tel被叫号码 (59)4.9.2Tel-IP改变主叫号码 (60)4.9.3Tel-IP改变被叫号码 (62)4.10管理 (63)4.10.1TR069参数 (63)4.10.2SNMP参数 (63)4.10.3Syslog参数 (64)4.10.4云服务器 (66)4.11安全设置 (66)4.11.1WEB访问控制列表 (66)4.11.2Telnet访问控制列表 (67)4.11.3密码修改 (67)4.11.4加密配置 (68)4.12工具 (69)4.12.1固件升级 (69)4.12.2数据备份 (69)4.12.3数据恢复 (70)4.12.4Ping测试 (70)4.12.5Tracert测试 (71)4.12.6Outward测试 (72)4.12.7网络抓包 (73)4.12.8恢复出厂设置 (73)4.12.9设备重启 (74)第五章术语 (75)关于本文档本文档主要描述综合接入网关(IAD)设备的外观、功能特性、配置及维护操作方法。

基于RFC6455协议的高性能实时Web服务

基于RFC6455协议的高性能实时Web服务

基于RFC6455协议的高性能实时Web服务随着互联网的发展,实时Web服务已经变得越来越重要。

这个领域的主要挑战是要能够快速地处理大量的实时数据,同时确保服务的高性能和可靠性。

为了满足这些要求,RFC6455协议成为了实时Web服务的一种重要的解决方案。

本文将介绍基于RFC6455协议的高性能实时Web服务,并探讨它的关键技术和应用场景。

一. RFC6455协议简介RFC6455是WebSocket协议的标准规范,支持双向通信,可以在客户端和服务器之间建立持久连接。

相较于HTTP协议,WebSocket具有更优秀的性能和更低的延迟。

WebSocket协议通过一个握手过程来建立连接,之后数据传输就可以变得非常快速和高效。

与传统Web服务不同,WebSocket可以实现实时数据的传输,可以处理移动应用程序、游戏和视频流等实时数据。

同时,WebSocket还可以在Web浏览器中使用,使得实时数据的处理和展示变得更加灵活和自由。

二. 基于RFC6455协议的高性能实时Web服务的关键技术1. 前端技术前端技术是实现实时Web服务的基础。

前端技术包括JavaScript和HTML/CSS,可以实现对实时数据的监测、快速响应和数据可视化等功能。

2. 服务器端技术服务器端技术是Web服务的核心。

WebSocket服务器端技术包括Java、Python和Node.js等,其中Node.js是一种高效的服务器端解决方案,可以实现异步I/O操作,提高系统性能和响应速度。

3. 数据传输数据传输是实时Web服务的关键环节。

WebSocket可以通过两种方式进行数据传输:文本数据传输和二进制数据传输。

文本数据传输可以支持Unicode字符集,使得传输的数据更具有表现力和功能性。

二进制数据传输可以处理海量数据和图像等复杂类型的数据,具有更高的传输效率。

三. 基于RFC6455协议的高性能实时Web服务的应用场景1. 游戏WebSocket可以在游戏中实现实时交互和实时数据传输,可以大幅度提升游戏的体验和流畅度。

RFC1006通信协议

RFC1006通信协议

M. Rose & D. Cass [Page 1]Network Working Group Marshall T. Rose, Dwight E. Cass Request for Comments: RFC 1006 Northrop Research and Technology Center Obsoletes: RFC 983 May 1987 ISO Transport Service on top of the TCPVersion: 3Status of this MemoThis memo specifies a standard for the Internet community. Hostson the Internet that choose to implement ISO transport serviceson top of the TCP are expected to adopt and implement thisstandard. TCP port 102 is reserved for hosts which implement thisstandard. Distribution of this memo is unlimited.This memo specifies version 3 of the protocol and supersedes[RFC983]. Changes between the protocol as described in Request forComments 983 and this memo are minor, but are unfortunatelyincompatible.M. Rose & D. Cass [Page 1]1. Introduction and PhilosophyThe Internet community has a well-developed, mature set oftransport and internetwork protocols (TCP/IP), which are quitesuccessful in offering network and transport services toend-users. The CCITT and the ISO have defined various session,presentation, and application recommendations which have beenadopted by the international community and numerous vendors.To the largest extent possible, it is desirable to offer thesehigher level directly in the ARPA Internet, without disruptingexisting facilities. This permits users to develop expertisewith ISO and CCITT applications which previously were notavailable in the ARPA Internet. It also permits a moregraceful convergence and transition strategy fromTCP/IP-based networks to ISO-based networks in themedium-and long-term.There are two basic approaches which can be taken when "porting"an ISO or CCITT application to a TCP/IP environment. Oneapproach is to port each individual application separately,developing local protocols on top of the TCP. Although this isuseful in the short-term (since special-purpose interfaces to the TCP can be developed quickly), it lacks generality.A second approach is based on the observation that both the ARPAInternet protocol suite and the ISO protocol suite are bothlayered systems (though the former uses layering from a morepragmatic perspective). A key aspect of the layering principleis that of layer-independence. Although this section isredundant for most readers, a slight bit of background materialis necessary to introduce this concept.Externally, a layer is defined by two definitions:a service-offered definition, which describes the servicesprovided by the layer and the interfaces it provides toaccess those services; and,a service-required definitions, which describes the servicesused by the layer and the interfaces it uses to access thoseservices.Collectively, all of the entities in the network which co-operate to provide the service are known as the service-provider.Individually, each of these entities is known as a service-peer.Internally, a layer is defined by one definition:a protocol definition, which describes the rules which eachservice-peer uses when communicating with other service-peers. M. Rose & D. Cass [Page 2]Putting all this together, the service-provider uses the protocol and services from the layer below to offer the its service to the layer above. Protocol verification, for instance, deals withproving that this in fact happens (and is also a fertile fieldfor many Ph.D. dissertations in computer science).The concept of layer-independence quite simply is:IF one preserves the services offered by the service-provider THEN the service-user is completely naive with respect to the protocol which the service-peers useFor the purposes of this memo, we will use the layer-independence to define a Transport Service Access Point (TSAP) which appearsto be identical to the services and interfaces offered by theISO/CCITT TSAP (as defined in [ISO8072]), but we will in factimplement the ISO TP0 protocol on top of TCP/IP (as defined in[RFC793,RFC791]), not on top of the the ISO/CCITT networkprotocol. Since the transport class 0 protocol is used over theTCP/IP connection, it achieves identical functionality astransport class 4. Hence, ISO/CCITT higher level layers (allsession, presentation, and application entities) can operatefully without knowledge of the fact that they are running on aTCP/IP internetwork.M. Rose & D. Cass [Page 3]2. MotivationIn migrating from the use of TCP/IP to the ISO protocols, thereare several strategies that one might undertake. This memo waswritten with one particular strategy in mind.The particular migration strategy which this memo uses is basedon the notion of gatewaying between the TCP/IP and ISO protocolsuites at the transport layer. There are two strong argumentsfor this approach:1. Experience teaches us that it takes just as long to get goodimplementations of the lower level protocols as it takes to getimplementations of the higher level ones. In particular, it hasbeen observed that there is still a lot of work being done at the ISO network and transport layers. As a result, implementationsof protocols above these layers are not being aggressivelypursued. Thus, something must be done "now" to provide a mediumin which the higher level protocols can be developed. SinceTCP/IP is mature, and essentially provides identicalfunctionality, it is an ideal medium to support this development.2. Implementation of gateways at the IP and ISO IP layers areprobably not of general use in the long term. In effect, thiswould require each Internet host to support both TP4 and TCP.As such, a better strategy is to implement a graceful migrationpath from TCP/IP to ISO protocols for the ARPA Internet when theISO protocols have matured sufficiently.Both of these arguments indicate that gatewaying should occur ator above the transport layer service access point. Further, thefirst argument suggests that the best approach is to perform thegatewaying exactly AT the transport service access point tomaximize the number of ISO layers which can be developed.NOTE: This memo does not intend to act as a migration orintercept document. It is intended ONLY to meet theneeds discussed above. However, it would not beunexpected that the protocol described in this memomight form part of an overall transition plan. Thedescription of such a plan however is COMPLETELYbeyond the scope of this memo.Finally, in general, building gateways between other layers in the TCP/IP and ISO protocol suites is problematic, at best.To summarize: the primary motivation for the standard described in this memo is to facilitate the process of gaining experience with higher-level ISO protocols (session, presentation, andapplication). The stability and maturity of TCP/IP are ideal for M. Rose & D. Cass [Page 4]providing solid transport services independent of actualimplementation.M. Rose & D. Cass [Page 5]3. The ModelThe [ISO8072] standard describes the ISO transport servicedefinition, henceforth called TP.ASIDE: This memo references the ISO specifications ratherthan the CCITT recommendations. The differencesbetween these parallel standards are quite small,and can be ignored, with respect to this memo,without loss of generality. To provide the readerwith the relationships:Transport service [ISO8072] [X.214]Transport protocol [ISO8073] [X.224]Session protocol [ISO8327] [X.225]The ISO transport service definition describes the servicesoffered by the TS-provider (transport service) and the interfaces used to access those services. This memo focuses on how the ARPA Transmission Control Protocol (TCP) [RFC793] can be used to offer the services and provide the interfaces.+-----------+ +-----------+ | TS-user | | TS-user | +-----------+ +-----------+ | || TSAP interface TSAP interface || [ISO8072] || |+----------+ ISO Transport Services on the TCP +----------+ | client |-----------------------------------------| server | +----------+ (this memo) +----------+ | || TCP interface TCP interface || [RFC793] || |For expository purposes, the following abbreviations are used:TS-peer a process which implements the protocol described by this memoTS-user a process talking using the services of a TS-peer M. Rose & D. Cass [Page 6]TS-provider the black-box entity implementing the protocoldescribed by this memoFor the purposes of this memo, which describes version 2 of theTSAP protocol, all aspects of [ISO8072] are supported with oneexception:Quality of Service parametersIn the spirit of CCITT, this is left "for further study". Afuture version of the protocol will most likely support the QOSparameters for TP by mapping these onto various TCP parameters.The ISO standards do not specify the format of a session port(termed a TSAP ID). This memo mandates the use of the GOSIPspecification [GOSIP86] for the interpretation of this field.(Please refer to Section 5.2, entitled "UPPER LAYERS ADDRESSING".) Finally, the ISO TSAP is fundamentally symmetric in behavior.There is no underlying client/server model. Instead of a serverlistening on a well-known port, when a connection is established, the TS-provider generates an INDICATION event which, presumablythe TS-user catches and acts upon. Although this might beimplemented by having a server "listen" by hanging on theINDICATION event, from the perspective of the ISO TSAP, all TS-users just sit around in the IDLE state until they either generate a REQUEST or accept an INDICATION.M. Rose & D. Cass [Page 7]4. The PrimitivesThe protocol assumes that the TCP[RFC793] offers the followingservice primitives:Eventsconnected - open succeeded (either ACTIVE or PASSIVE)connect fails - ACTIVE open faileddata ready - data can be read from the connectionerrored - the connection has errored and is now closed closed - an orderly disconnection has startedActionslisten on port - PASSIVE open on the given portopen port - ACTIVE open to the given portread data - data is read from the connectionsend data - data is sent on the connectionclose - the connection is closed (pending data issent)This memo describes how to use these services to emulate the following service primitives, which are required by [ISO8073]:EventsN-CONNECT.INDICATION- An NS-user (responder) is notified thatconnection establishment is in progressN-CONNECT.CONFIRMATION- An NS-user (responder) is notified thatthe connection has been establishedN-DATA.INDICATION- An NS-user is notified that data can beread from the connectionM. Rose & D. Cass [Page 8]N-DISCONNECT.INDICATION- An NS-user is notified that the connectionis closedActionsN-CONNECT.REQUEST- An NS-user (initiator) indicates that itwants to establish a connectionN-CONNECT.RESPONSE- An NS-user (responder) indicates that itwill honor the requestN-DATA.REQUEST - An NS-user sends dataN-DISCONNECT.REQUEST- An NS-user indicates that the connectionis to be closedThe protocol offers the following service primitives, as definedin [ISO8072], to the TS-user:EventsT-CONNECT.INDICATION- a TS-user (responder) is notified thatconnection establishment is in progressT-CONNECT.CONFIRMATION- a TS-user (initiator) is notified that theconnection has been establishedT-DATA.INDICATION- a TS-user is notified that data can be read from the connectionT-EXPEDITED DATA.INDICATION- a TS-user is notified that "expedited" data can be read from the connectionT-DISCONNECT.INDICATION- a TS-user is notified that the connectionis closedM. Rose & D. Cass [Page 9]ActionsT-CONNECT.REQUEST- a TS-user (initiator) indicates that itwants to establish a connectionT-CONNECT.RESPONSE- a TS-user (responder) indicates that itwill honor the requestT-DATA.REQUEST - a TS-user sends dataT-EXPEDITED DATA.REQUEST- a TS-user sends "expedited" dataT-DISCONNECT.REQUEST- a TS-user indicates that the connectionis to be closedM. Rose & D. Cass [Page 10]5. The ProtocolThe protocol specified by this memo is identical to the protocolfor ISO transport class 0, with the following exceptions:- for testing purposes, initial data may be exchangedduring connection establishment- for testing purposes, an expedited data service issupported- for performance reasons, a much larger TSDU size issupported- the network service used by the protocol is providedby the TCPThe ISO transport protocol exchanges information between peers in discrete units of information called transport protocol data units (TPDUs). The protocol defined in this memo encapsulates theseTPDUs in discrete units called TPKTs. The structure of theseTPKTs and their relationship to TPDUs are discussed in the nextsection.PRIMITIVESThe mapping between the TCP service primitives and the service primitives expected by transport class 0 are quite straight-forward:network service TCP--------------- ---CONNECTION ESTABLISHMENTN-CONNECT.REQUEST open completesN-CONNECT.INDICATION listen (PASSIVE open)finishesN-CONNECT.RESPONSE listen completesN-CONNECT.CONFIRMATION open (ACTIVE open)finishesDATA TRANSFERN-DATA.REQUEST send dataN-DATA.INDICATION data ready followed by M. Rose & D. Cass [Page 11]read dataCONNECTION RELEASEN-DISCONNECT.REQUEST closeN-DISCONNECT.INDICATION connection closes orerrorsMapping parameters is also straight-forward:network service TCP--------------- ---CONNECTION RELEASECalled address server’s IP address(4 octets)Calling address client’s IP address(4 octets)all others ignoredDATA TRANSFERNS-user data (NSDU) dataCONNECTION RELEASEall parameters ignoredCONNECTION ESTABLISHMENTThe elements of procedure used during connection establishment are identical to those presented in [ISO8073], with threeexceptions.In order to facilitate testing, the connection request andconnection confirmation TPDUs may exchange initial user data, using the user data fields of these TPDUs.In order to experiment with expedited data services, theconnection request and connection confirmation TPDUs maynegotiate the use of expedited data transfer using thenegotiation mechanism specified in [ISO8073] is used (e.g.,setting the "use of transport expedited data transfer service" bit in the "Additional Option Selection" variable part). Thedefault is not to use the transport expedited data transferservice.M. Rose & D. Cass [Page 12]In order to achieve good performance, the default TPDU size is 65531 octets, instead of 128 octets. In order to negotiate a smaller (standard) TPDU size, the negotiation mechanismspecified in [ISO8073] is used (e.g., setting the desired bit in the "TPDU Size" variable part).To perform an N-CONNECT.REQUEST action, the TS-peer performsan active open to the desired IP address using TCP port 102.When the TCP signals either success or failure, this resultsin an N-CONNECT.INDICATION action.To await an N-CONNECT.INDICATION event, a server listens onTCP port 102. When a client successfully connects to thisport, the event occurs, and an implicit N-CONNECT.RESPONSEaction is performed.NOTE: In most implementations, a single server willperpetually LISTEN on port 102, handing offconnections as they are madeDATA TRANSFERThe elements of procedure used during data transfer are identical to those presented in [ISO8073], with one exception: expediteddata may be supported (if so negotiated during connectionestablishment) by sending a modified ED TPDU (described below).The TPDU is sent on the same TCP connection as all of the otherTPDUs. This method, while not faithful to the spirit of [ISO8072], is true to the letter of the specification.To perform an N-DATA.REQUEST action, the TS-peer constructs thedesired TPKT and uses the TCP send data primitive.To trigger an N-DATA.INDICATION action, the TCP indicates thatdata is ready and a TPKT is read using the TCP read dataprimitive.CONNECTION RELEASETo perform an N-DISCONNECT.REQUEST action, the TS-peer simply closes the TCP connection.If the TCP informs the TS-peer that the connection has been closed or has errored, this indicates an N-DISCONNECT.INDICATION event.M. Rose & D. Cass [Page 13]6. Packet FormatA fundamental difference between the TCP and the network serviceexpected by TP0 is that the TCP manages a continuous stream ofoctets, with no explicit boundaries. The TP0 expects informationto be sent and delivered in discrete objects termed networkservice data units (NSDUs). Although other classes of transportmay combine more than one TPDU inside a single NSDU, transportclass 0 does not use this facility. Hence, an NSDU is identicalto a TPDU for the purposes of our discussion.The protocol described by this memo uses a simple packetizationscheme in order to delimit TPDUs. Each packet, termed a TPKT, isviewed as an object composed of an integral number of octets, ofvariable length.NOTE: For the purposes of presentation, these objects are shown as being 4 octets (32 bits wide). Thisrepresentation is an artifact of the style of this memo and should not be interpreted as requiringthat a TPKT be a multiple of 4 octets in length.A TPKT consists of two parts: a packet-header and a TPDU. Theformat of the header is constant regardless of the type of packet. The format of the packet-header is as follows:0 1 2 30 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | vrsn | reserved | packet length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+where:vrsn 8 bitsThis field is always 3 for the version of the protocol described in this memo.packet length 16 bits (min=7, max=65535)This field contains the length of entire packet in octets,including packet-header. This permits a maximum TPDU size of65531 octets. Based on the size of the data transfer (DT) TPDU,this permits a maximum TSDU size of 65524 octets.The format of the TPDU is defined in [ISO8073]. Note that onlyTPDUs formatted for transport class 0 are exchanged (differenttransport classes may use slightly different formats).M. Rose & D. Cass [Page 14]To support expedited data, a non-standard TPDU, for expedited data is permitted. The format used for the ED TPDU is nearly identical to the format for the normal data, DT, TPDU. The only difference is that the value used for the TPDU’s code is ED, not DT:0 1 2 30 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | header length | code |credit |TPDU-NR and EOT| user data | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | ... | ... | ... | ... | | ... | ... | ... | ... | | ... | ... | ... | ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ After the credit field (which is always ZERO on output and ignored on input), there is one additional field prior to the user data.TPDU-NR and EOT 8 bitsBit 7 (the high-order bit, bit mask 1000 0000) indicates the endof a TSDU. All other bits should be ZERO on output and ignored on input.Note that the TP specification limits the size of an expeditedtransport service data unit (XSDU) to 16 octets.M. Rose & D. Cass [Page 15]7. CommentsSince the release of RFC983 in April of 1986, we have gained much experience in using ISO transport services on top of the TCP. In September of 1986, we introduced the use of version 2 of theprotocol, based mostly on comments from the community.In January of 1987, we observed that the differences betweenversion 2 of the protocol and the actual transport class 0definition were actually quite small. In retrospect, thisrealization took much longer than it should have: TP0 is is meant to run over a reliable network service, e.g., X.25. The TCP can be used to provide a service of this type, and, if no one complainstoo loudly, one could state that this memo really just describes a method for encapsulating TPO inside of TCP!The changes in going from version 1 of the protocol to version 2and then to version 3 are all relatively small. Initially, indescribing version 1, we decided to use the TPDU formats from the ISO transport protocol. This naturally led to the evolutiondescribed above.M. Rose & D. Cass [Page 16]8. References[GOSIP86] The U.S. Government OSI User’s Committee."Government Open Systems Interconnection Procurement(GOSIP) Specification for Fiscal years 1987 and1988." (December, 1986) [draft status][ISO8072] ISO."International Standard 8072. Information ProcessingSystems -- Open Systems Interconnection: TransportService Definition."(June, 1984)[ISO8073] ISO."International Standard 8073. Information ProcessingSystems -- Open Systems Interconnection: TransportProtocol Specification."(June, 1984)[ISO8327] ISO."International Standard 8327. Information ProcessingSystems -- Open Systems Interconnection: SessionProtocol Specification."(June, 1984)[RFC791] Internet Protocol.Request for Comments 791 (MILSTD 1777)(September, 1981)[RFC793] Transmission Control Protocol.Request for Comments 793 (MILSTD 1778)(September, 1981)[RFC983] ISO Transport Services on Top of the TCP.Request for Comments 983(April, 1986)[X.214] CCITT."Recommendation X.214. Transport Service Definitionsfor Open Systems Interconnection (OSI) for CCITTApplications."(October, 1984)[X.224] CCITT."Recommendation X.224. Transport ProtocolSpecification for Open Systems Interconnection (OSI)for CCITT Applications." (October, 1984)M. Rose & D. Cass [Page 17][X.225] CCITT."Recommendation X.225. Session Protocol Specificationfor Open Systems Interconnection (OSI) for CCITTApplications."(October, 1984)M. Rose & D. Cass [Page 18]。

rfc6960 标准

rfc6960 标准

rfc6960 标准RFC 6960 标准。

RFC 6960 标准是指用于互联网公共密钥基础设施(PKI)的在线证书状态协议(OCSP)规范。

该标准定义了OCSP协议的工作原理,以及客户端如何查询证书的状态。

OCSP协议是一种用于验证数字证书有效性的协议,它可以帮助用户确认证书是否被吊销,从而提高互联网安全性。

该标准的发布旨在解决传统的证书吊销列表(CRL)机制存在的一些问题,如CRL的大小和更新频率对网络性能的影响。

相比之下,OCSP协议可以更加及时地提供证书状态信息,减少网络流量和服务器负载。

因此,RFC 6960 标准对于互联网安全和网络性能的提升具有重要意义。

在 RFC 6960 标准中,定义了OCSP协议的通信流程和消息格式。

OCSP协议主要包括客户端请求、服务端响应和证书状态码等内容。

客户端通过发送OCSP请求消息来查询证书状态,服务端则会返回相应的证书状态信息。

通过这种方式,用户可以及时获取证书的最新状态,从而减少了使用过期或被吊销证书的风险。

此外,RFC 6960 标准还规定了OCSP协议的安全性要求。

为了保护通信过程中的数据安全性和完整性,OCSP协议要求使用TLS协议进行通信,并支持数字签名和证书验证等安全机制。

这些安全性要求可以有效防止恶意攻击者对OCSP通信进行篡改或伪造,保障了证书状态信息的可信度。

在实际应用中,RFC 6960 标准对于建立安全可靠的PKI系统至关重要。

通过使用OCSP协议,用户可以及时获取证书状态信息,从而降低了因使用过期或被吊销证书而导致的安全风险。

同时,OCSP协议还可以减少网络流量和服务器负载,提高了PKI系统的性能和可伸缩性。

总的来说,RFC 6960 标准为互联网公共密钥基础设施的安全性和性能提供了重要的技术支持。

通过定义了OCSP协议的工作原理和安全性要求,该标准为构建安全可靠的PKI系统奠定了基础。

在未来的互联网发展中,RFC 6960 标准将继续发挥重要作用,为用户提供更加安全可靠的网络环境。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Network Working Group B. Claise, Ed. Request for Comments: 5476 A. Johnson Category: Standards Track Cisco Systems, Inc. J. Quittek NEC Europe Ltd. March 2009 Packet Sampling (PSAMP) Protocol SpecificationsStatus of This MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited.Copyright NoticeCopyright (c) 2009 IETF Trust and the persons identified as thedocument authors. All rights reserved.This document is subject to BCP 78 and the IETF Trust’s LegalProvisions Relating to IETF Documents in effect on the date ofpublication of this document (/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document.This document may contain material from IETF Documents or IETFContributions published or made publicly available before November10, 2008. The person(s) controlling the copyright in some of thismaterial may not have granted the IETF Trust the right to allowmodifications of such material outside the IETF Standards Process.Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modifiedoutside the IETF Standards Process, and derivative works of it maynot be created outside the IETF Standards Process, except to formatit for publication as an RFC or to translate it into languages other than English.Claise, et al. Standards Track [Page 1]AbstractThis document specifies the export of packet information from aPacket SAMPling (PSAMP) Exporting Process to a PSAMP CollectingProcess. For export of packet information, the IP Flow InformationeXport (IPFIX) protocol is used, as both the IPFIX and PSAMParchitecture match very well, and the means provided by the IPFIXprotocol are sufficient. The document specifies in detail how theIPFIX protocol is used for PSAMP export of packet information.Table of Contents1. Introduction (3)1.1. Conventions Used in This Document (3)2. PSAMP Documents Overview (4)3. Terminology (4)3.1. IPFIX Terminology (4)3.2. PSAMP Terminology (5)3.2.1. Packet Streams and Packet Content (5)3.2.2. Selection Process (6)3.2.3. Reporting (7)3.2.4. Metering Process (8)3.2.5. Exporting Process (8)3.2.6. PSAMP Device (8)3.2.7. Collector (8)3.2.8. Selection Methods (9)3.3. IPFIX and PSAMP Terminology Comparison (11)3.3.1. IPFIX and PSAMP Processes (11)3.3.2. Packet Report, Packet Interpretation, andData Record (12)4. Differences between PSAMP and IPFIX (12)4.1. Architecture Point of View (12)4.2. Protocol Point of View (14)4.3. Information Model Point of View (14)5. PSAMP Requirements versus the IPFIX Solution (14)5.1. High-Level View of the Integration (15)6. Using the IPFIX Protocol for PSAMP (16)6.1. Selector ID (17)6.2. The Selection Sequence ID (17)6.3. The Exporting Process (17)6.4. Packet Report (17)6.4.1. Basic Packet Report (17)6.4.2. Extended Packet Report (21)6.5. Report Interpretation (22)6.5.1. Selection Sequence Report Interpretation (23)6.5.2. Selector Report Interpretation (25)6.5.2.1. Systematic Count-Based Sampling (25)6.5.2.2. Systematic Time-Based Sampling (27)Claise, et al. Standards Track [Page 2]6.5.2.3. Random n-out-of-N Sampling (28)6.5.2.4. Uniform Probabilistic Sampling (29)6.5.2.5. Property Match Filtering (31)6.5.2.6. Hash-Based Filtering (33)6.5.2.7. Other Selection Methods (36)6.5.3. Selection Sequence Statistics ReportInterpretation (37)6.5.4. Accuracy Report Interpretation (39)7. Security Considerations (43)8. IANA Considerations (43)8.1. IPFIX-Related Considerations (43)8.2. PSAMP-Related Considerations (43)9. References (44)9.1. Normative References (44)9.2. Informative References (44)10. Acknowledgments (45)1. IntroductionThe name PSAMP is a contraction of the phrase "Packet Sampling". The word "Sampling" captures the idea that only a subset of all packetspassing a network element will be selected for reporting. PSAMPselection operations include random selection, deterministicselection, and deterministic approximations to random selection(Hash-based Selection).The IP Flow Information eXport (IPFIX) protocol specified in[RFC5101] exports IP traffic information [RFC5102] observed atnetwork devices. This matches the general protocol requirementsoutlined in the PSAMP framework [RFC5474]. However, there are somearchitectural differences between IPFIX and PSAMP in the requirements for an export protocol. While the IPFIX architecture [RFC5470] isfocused on gathering and exporting IP traffic flow information, thefocus of the PSAMP framework [RFC5474] is on exporting information on individual packets. This basic difference and a set of deriveddifferences in protocol requirements are outlined in Section 4.Despite these differences, the IPFIX protocol is well suited for the PSAMP protocol. Section 5 specifies how the IPFIX protocol is usedfor the export of packet samples. Required extensions of the IPFIXinformation model are specified in the PSAMP information model[RFC5477].1.1. Conventions Used in This DocumentThe key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. Claise, et al. Standards Track [Page 3]2. PSAMP Documents OverviewThis document is one out of a series of documents from the PSAMPgroup.[RFC5474]: "A Framework for Packet Selection and Reporting" describes the PSAMP framework for network elements to select subsets of packets by statistical and other methods, and to export a stream of reportson the selected packets to a Collector.[RFC5475]: "Sampling and Filtering Techniques for IP PacketSelection" describes the set of packet selection techniques supported by PSAMP.RFC 5476 (this document): "Packet Sampling (PSAMP) ProtocolSpecifications" specifies the export of packet information from aPSAMP Exporting Process to a PSAMP Collecting Process.[RFC5477]: "Information Model for Packet Sampling Exports" defines an information and data model for PSAMP.3. TerminologyAs the IPFIX export protocol is used to export the PSAMP information, the relevant IPFIX terminology from [RFC5101] is copied over in this document. All terms defined in this section have their first letter capitalized when used in this document. The terminology summarytable in Section 3.1 gives a quick overview of the relationshipsbetween the different IPFIX terms. The PSAMP terminology definedhere is fully consistent with all terms listed in [RFC5475] and[RFC5474], but only definitions that are relevant to the PSAMPprotocol appear here. Section 3.3 applies the PSAMP terminology tothe IPFIX protocol terminology.3.1. IPFIX TerminologyIPFIX-specific terminology used in this document is defined inSection 2 of [RFC5101]. The only exceptions are the MeteringProcess, Exporting Process, and the Collector terms, which aredefined more precisely in the PSAMP terminology section. In thisdocument, as in [RFC5101], the first letter of each IPFIX-specificterm is capitalized.Claise, et al. Standards Track [Page 4]+------------------+---------------------------------------------+ | | contents | | +--------------------+------------------------+ | Set | Template | record | +------------------+--------------------+------------------------+ | Data Set | / | Data Record(s) | +------------------+--------------------+------------------------+ | Template Set | Template Record(s) | / | +------------------+--------------------+------------------------+ | Options Template | Options Template | / | | Set | Record(s) | | +------------------+--------------------+------------------------+ Figure A: Terminology Summary Table3.2. PSAMP TerminologyThe PSAMP terminology section has been copied from [RFC5475].3.2.1. Packet Streams and Packet Content* Observed Packet StreamThe Observed Packet Stream is the set of all packets observed atthe Observation Point.* Packet StreamA Packet Stream denotes a set of packets from the Observed Packet Stream that flows past some specified point within the MeteringProcess. An example of a Packet Stream is the output of theSelection Process. Note that packets selected from a stream,e.g., by Sampling, do not necessarily possess a property by which they can be distinguished from packets that have not beenselected. For this reason, the term "stream" is favored over"flow", which is defined as a set of packets with commonproperties [RFC3917].* Packet ContentThe Packet Content denotes the union of the packet header (whichincludes link layer, network layer, and other encapsulationheaders) and the packet payload. Note that, depending on theObservation Point, the link layer information might not beavailable.Claise, et al. Standards Track [Page 5]3.2.2. Selection Process* Selection ProcessA Selection Process takes the Observed Packet Stream as its input and selects a subset of that stream as its output.* Selection StateA Selection Process may maintain state information for use by the Selection Process. At a given time, the Selection State maydepend on packets observed at and before that time, and othervariables. Examples include:(i) sequence numbers of packets at the input of Selectors;(ii) a timestamp of observation of the packet at the Observation Point;(iii) iterators for pseudorandom number generators;(iv) hash values calculated during selection;(v) indicators of whether the packet was selected by a givenSelector.Selection Processes may change portions of the Selection State as a result of processing a packet. Selection state for a packet is to reflect the state after processing the packet.* SelectorA Selector defines the action of a Selection Process on a singlepacket of its input. If selected, the packet becomes an elementof the output Packet Stream.The Selector can make use of the following information indetermining whether a packet is selected:(i) the Packet Content;(ii) information derived from the packet’s treatment at theObservation Point;(iii) any selection state that may be maintained by the Selection Process.Claise, et al. Standards Track [Page 6]* Composite SelectorA Composite Selector is an ordered composition of Selectors, inwhich the output Packet Stream issuing from one Selector forms the input Packet Stream to the succeeding Selector.* Primitive SelectorA Selector is primitive if it is not a Composite Selector.* Selector IDThe Selector ID is the unique ID identifying a Primitive Selector. The ID is unique within the Observation Domain.* Selection SequenceFrom all the packets observed at an Observation Point, only a few packets are selected by one or more Selectors. The SelectionSequence is a unique value per Observation Domain describing theObservation Point and the Selector IDs through which the packetsare selected.3.2.3. Reporting* Packet ReportsPacket Reports comprise a configurable subset of a packet’s input to the Selection Process, including the Packet Content,information relating to its treatment (for example, the outputinterface), and its associated selection state (for example, ahash of the Packet Content).* Report InterpretationReport Interpretation comprises subsidiary information, relatingto one or more packets, that is used for interpretation of theirPacket Reports. Examples include configuration parameters of the Selection Process.* Report StreamThe Report Stream is the output of a Metering Process, comprising two distinguished types of information: Packet Reports and Report Interpretation.Claise, et al. Standards Track [Page 7]3.2.4. Metering Process* Metering ProcessA Metering Process selects packets from the Observed Packet Stream using a Selection Process, and produces as output a Report Stream concerning the selected packets.The PSAMP Metering Process can be viewed as analogous to the IPFIX Metering Process [RFC5101], which produces Flow Records as itsoutput, with the difference that the PSAMP Metering Process always contains a Selection Process. The relationship between PSAMP and IPFIX is further described in [RFC5477] and [RFC5474].3.2.5. Exporting Process* Exporting ProcessAn Exporting Process sends, in the form of Export Packets, theoutput of one or more Metering Processes to one or moreCollectors.* Export PacketAn Export Packet is a combination of Report Interpretation(s)and/or one or more Packet Reports that are bundled by theExporting Process into an Export Packet for exporting to aCollector.3.2.6. PSAMP Device* PSAMP DeviceA PSAMP Device is a device hosting at least an Observation Point, a Selection Process, and an Exporting Process. Typically,corresponding Observation Point(s), Selection Process(es), andExporting Process(es) are co-located at this device, for example, at a router.3.2.7. Collector* CollectorA Collector receives a Report Stream exported by one or moreExporting Processes. In some cases, the host of the Meteringand/or Exporting Processes may also serve as the Collector. Claise, et al. Standards Track [Page 8]3.2.8. Selection Methods* FilteringA filter is a Selector that selects a packet deterministicallybased on the Packet Content, or its treatment, or functions ofthese occurring in the Selection State. Two examples are:(i) Property Match Filtering: A packet is selected if aspecific field in the packet equals a predefined value.(ii) Hash-based Selection: A Hash Function is applied to thePacket Content, and the packet is selected if the resultfalls in a specified range.* SamplingA Selector that is not a filter is called a Samplingoperation. This reflects the intuitive notion that if the selection of a packet cannot be determined from its content alone, there must be some type of Sampling taking place.* Content-Independent SamplingA Sampling operation that does not use Packet Content (orquantities derived from it) as the basis for selection iscalled a Content-independent Sampling operation. Examples include systematic Sampling, and uniform pseudorandomSampling driven by a pseudorandom number whose generationis independent of Packet Content. Note that in Content-independent Sampling, it is not necessary to access thePacket Content in order to make the selection decision.* Content-Dependent SamplingA Sampling operation where selection is dependent on Packet Content is called a Content-dependent Sampling operation.An example is pseudorandom selection according to aprobability that depends on the contents of a packet field. Note that this is not a filter, because the selection isnot deterministic.* Hash DomainA Hash Domain is a subset of the Packet Content and thepacket treatment, viewed as an N-bit string for somepositive integer N.Claise, et al. Standards Track [Page 9]* Hash RangeA Hash Range is a set of M-bit strings for some positiveinteger M that define the range of values the result of the hash operation can take.* Hash FunctionA Hash Function defines a deterministic map from the HashDomain into the Hash Range.* Hash Selection RangeA Hash Selection Range is a subset of the Hash Range. The packet is selected if the action of the Hash Function onthe Hash Domain for the packet yields a result in the Hash Selection Range.* Hash-based SelectionA Hash-based Selection is Filtering specified by a HashDomain, a Hash Function, a Hash Range, and a Hash Selection Range.* Approximative SelectionSelectors in any of the above categories may beapproximated by operations in the same or another category for the purposes of implementation. For example, uniformpseudorandom Sampling may be approximated by Hash-basedSelection, using a suitable Hash Function and Hash Domain. In this case, the closeness of the approximation depends on the choice of Hash Function and Hash Domain.* PopulationA Population is a Packet Stream, or a subset of a PacketStream. A Population can be considered as a base set from which packets are selected. An example is all packets inthe Observed Packet Stream that are observed within somespecified time interval.* Population SizeThe Population Size is the number of all packets in thePopulation.Claise, et al. Standards Track [Page 10]* Sample SizeThe Sample Size is the number of packets selected from the Population by a Selector.* Configured Selection FractionThe Configured Selection Fraction is the expected ratio of the Sample Size to the Population Size, as based on theconfigured selection parameters.* Attained Selection FractionThe Attained Selection Fraction is the ratio of the actual Sample Size to the Population Size. For some Samplingmethods, the Attained Selection Fraction can differ fromthe Configured Selection Fraction due to, for example, the inherent statistical variability in Sampling decisions ofprobabilistic Sampling and Hash-based Selection.Nevertheless, for large Population Sizes and properlyconfigured Selectors, the Attained Selection Fractionusually approaches the Configured Selection Fraction.3.3. IPFIX and PSAMP Terminology ComparisonThe PSAMP terminology has been specified with an IPFIX background, as PSAMP and IPFIX have similar terms. However, this section clarifies the terms between the IPFIX and PSAMP terminology.3.3.1. IPFIX and PSAMP ProcessesFigure B indicates the sequence of the IPFIX processes (Metering and Exporting) within the PSAMP Device.+------------------+| Metering Process || +-----------+ | +-----------+Observed | | Selection | | | Exporting |Packet--->| | Process |--------->| Process |--->CollectorStream | +-----------+ | +-----------++------------------+Figure B: PSAMP ProcessesThe Selection Process, which takes an Observed Packet Stream as itsinput, is an integral part of the Metering Process. The SelectionProcess chooses which packets from its input Packet Stream will be Claise, et al. Standards Track [Page 11]reported on by the rest of the Metering Process. Note that a"Process" is not necessarily implemented as a separate CPU thread.3.3.2. Packet Report, Packet Interpretation, and Data RecordThe PSAMP terminology speaks of Packet Report and PacketInterpretation, while the IPFIX terminology speaks of Data Record and (Options) Template Record. The PSAMP Packet Report, which comprises information about the observed packet, can be viewed as analogous to the IPFIX Data Record defined by a Template Record. The PSAMP Report Interpretation, which comprises subsidiary information used for theinterpretation of the Packet Reports, can be viewed as analogous tothe IPFIX Data Record defined by an Options Template Record. ThisOptions Template Record contains subsidiary information, applicableto the observed packet sent into the PSAMP Packet Report.4. Differences between PSAMP and IPFIXThe output of the IPFIX working group relevant for this document isstructured into three documents:- IP Flow information architecture [RFC5470]- IPFIX protocol specifications [RFC5101]- IP Flow information export information model [RFC5102]In the following sections, we investigate the differences betweenIPFIX and PSAMP for each of those aspects.4.1. Architecture Point of ViewTraffic Flow measurement as described in the IPFIX requirements[RFC3917] and the IPFIX architecture [RFC5470] can be separated into two stages: packet processing and Flow processing. Figure Cillustrates these stages.In stage 1, all processing steps act on packets. Packets arecaptured, timestamped, selected by one or more selection steps, andfinally forwarded to packet classification that maps packets toFlows. The packets’ selection steps may include Filtering andSampling functions.In stage 2, all processing steps act on Flows. After packets areclassified (mapped to Flows), Flows are generated (or updated if they exist already). Flow generation and update steps may be performedrepeatedly for aggregating Flows. Finally, Flows are exported. Claise, et al. Standards Track [Page 12]Packet Sampling as described in the PSAMP framework [RFC5474] covers only stage 1 of the IPFIX architecture with the packet classification replaced by Packet Report export, while IPFIX covers stage 2 also, as it generates Flow Records out of the selected packets.IPFIX architecture PSAMP frameworkpacket header packet headercapturing \ capturing| | |timestamping | timestamping| | |v | v+------>+ | stage 1: +------>+| | > packet | || packet | processing | packet| selection | | selection| | | | |+-------+ | +-------+| | |v | vpacket / Packet Reportclassification \ export| |v |+------>+ || | || Flow generation || and update | stage 2:| | > Flow| v | processing| Flow || selection || | |+-------+ || |v |Flow Record /exportFigure C: Comparison of IPFIX Architecture and PSAMP Framework Claise, et al. Standards Track [Page 13]4.2. Protocol Point of ViewConcerning the protocol, the major difference between IPFIX and PSAMP is that the IPFIX protocol exports Flow Records while the PSAMPprotocol exports Packet Reports. From a pure export point of view,IPFIX will not distinguish a Flow Record composed of several packets aggregated together from a Flow Record composed of a single packet.So the PSAMP export can be seen as a special IPFIX Flow Recordcontaining information about a single packet.All extensions of the IPFIX protocol that are required to satisfy the PSAMP requirements have already been incorporated in the IPFIXprotocol [RFC5101], which was developed in parallel with the PSAMPprotocol. An example is the need for a data type for protocol fields that have flexible length, such as an octet array. This was added to the IPFIX protocol specification in order to meet the requirement of the PSAMP protocol to report content of captured packets, forexample, the first octets of a packet.4.3. Information Model Point of ViewFrom the information model point of view, the overlap between boththe IPFIX and PSAMP protocols is quite large. Most of theInformation Elements in the IPFIX protocol are also relevant forexporting packet information, for example, all fields reportingpacket header properties. Only a few Information Elements, such asobservedFlowTotalCount (whose value will always be 1 for PSAMP),etc., cannot be used in a meaningful way by the PSAMP protocol.Also, IPFIX protocol requirements concerning stage 2 of Figure C donot apply to the PSAMP Metering Process.Further required extensions apply to the information model. Even if the IPFIX charter speaks of Sampling, no Sampling-related Information Elements are specified in [RFC5102]. The task of specifying them was intentionally left for the PSAMP information model [RFC5477]. A set of several additional fields is required for satisfying therequirements for the PSAMP information model [RFC5475].Exploiting the extensibility of the IPFIX information model, therequired extension is covered by the PSAMP information modelspecified in [RFC5477].5. PSAMP Requirements versus the IPFIX SolutionThe [RFC5474] contains PSAMP protocol requirements throughout thedocument, with a special focus in Section 4, "Generic Requirementsfor PSAMP", and its subsections.Claise, et al. Standards Track [Page 14]Section 4 of [RFC5474] describes one requirement that, if notdirectly related to the export protocol, will put some constraints on it. Parallel Measurements: multiple independent Selection Processes at the same entity.[RFC5474] also describes a series of requirements specifying thedifferent Information Elements that MUST and SHOULD be reported tothe Collector. Nevertheless, IPFIX, being a generic export protocol, can export any Information Elements as long as they are described in the information model. So these requirements are mainly targeted for [RFC5477].The PSAMP protocol specification meets almost all the protocolrequirements stated in the PSAMP framework document [RFC5474]:* Extensibility* Parallel selection processes* Encrypted packets* Indication of information loss* Accuracy* Privacy* Timeliness* Congestion avoidance* Secure export* Export rate limit* Microsecond timestamp resolutionThe only requirement that is not met is Export Packet compression.With the choice of IPFIX as the PSAMP export protocol, the ExportPacket compression option mentioned in the Section 8.5 of theframework document [RFC5474] is not addressed.5.1. High-Level View of the IntegrationThe Template Record in the Template Set is used to describe thedifferent PSAMP Information Elements that will be exported to theCollector. The Collector decodes the Template Record in the Template Set and knows which Information Elements to expect when it receives Claise, et al. Standards Track [Page 15]the Data Records in the PSAMP Packet Report Data Set. Typically, in the base level of the PSAMP functionality, the Template Set willcontain the input sequence number, the packet fragment (some numberof contiguous bytes from the start of the packet or from the start of the payload), and the Selection Sequence.The Options Template Record in the Options Template Set is used todescribe the different PSAMP Information Elements that concern theMetering Process itself: Sampling and/or Filtering functions, and the associated parameters. The Collector decodes the Options TemplateRecords in the Options Template Set and knows which InformationElements to expect when it receives the Data Records in the PSAMPReport Interpretation Data Set. Typically, the Options Templatewould contain the Selection Sequence, the Sampling or Filteringfunctions, and the Sampling or Filtering associated parameters.PSAMP requires all the different possibilities of the IPFIX protocol specifications [RFC5101], that is, the three types of Sets (Data Set, Template Set, and Options Templates Set) with the two types ofTemplate Records (Template Record and Options Template Record), asdescribed in Figure A. As a consequence, PSAMP can’t rely on asubset of the IPFIX protocol specifications described in [RFC5101].The entire IPFIX protocol specifications [RFC5101] MUST beimplemented for the PSAMP protocol.6. Using the IPFIX Protocol for PSAMPIn this section, we describe the usage of the IPFIX protocol forPSAMP. We describe the record formats and the additionalrequirements that must be met. PSAMP uses two different types ofmessages:- Packet Reports- Report InterpretationThe format of Packet Reports is defined in IPFIX Template Records.The PSAMP data is transferred as Information Elements in IPFIX DataRecords as described by the Template Record. There are two different types of Packet Reports. Basic Packet Reports contain only the basic Information Elements required for PSAMP reporting. Extended PacketReports MAY contain other Information Elements, and do notnecessarily include Packet Content (See section 6.4.2).The format of Report Interpretations is defined in the IPFIX Options Template Record. The Information Elements are transferred in IPFIXData Records as described by the Options Template Record. There are four different types of Report Interpretation messages:Claise, et al. Standards Track [Page 16]。

相关文档
最新文档