GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


rfc:rfc1672

Network Working Group N. Brownlee Request for Comments: 1672 The University of Auckland Category: Informational August 1994

                  Accounting Requirements for IPng

Status of this Memo

 This memo provides information for the Internet community.  This memo
 does not specify an Internet standard of any kind.  Distribution of
 this memo is unlimited.

Abstract

 This document was submitted to the IETF IPng area in response to RFC
 1550.  Publication of this document does not imply acceptance by the
 IPng area of any ideas expressed within.  Comments should be
 submitted to the big-internet@munnari.oz.au mailing list.

Summary

 This white paper discusses accounting requirements for IPng. It
 recommends that all IPng packets carry accounting tags, which would
 vary in size. In the simplest case a tag would simply be a voucher
 identifying the party responsible for the packet. At other times tags
 should also carry other higher-level accounting information.

Background

 The Internet Accounting Model - described in RFC 1272 - specifies how
 accounting information is structured, and how it is collected for use
 by accounting aplications.  The model is very general, with
 accounting variables being defined for various layers of a protocol
 stack.  The group's work has so far concentrated on the lower layers,
 but the model can be extended simply by defining the variables
 required, e.g., for session and application layers.
 Brian Carpenter [1] suggests that IPng packets should carry
 authenticated (source, destination, transaction) triplets, which
 could be used for policy-based routing and accounting. The following
 sections explain how the transaction field - hereafter called an
 'accounting tag' - could be used.

Lower-layer (Transport) Accounting

 At the lower (network) layers the tag would simply be a voucher. This
 means it is an arbitrary string which identifies the party

Brownlee [Page 1] RFC 1672 Accounting Requirements for IPng August 1994

 responsible, i.e., willing to pay for, a packet. It would initially
 be set by the host which originates the packet, hence at that stage
 the tag would identify the user who sent it.
 A tag could be changed at various points along a packet's path. This
 could be done as part of the routing policy processing so as to
 reflect changes of the party responsible over each section of the
 path. For example:
      user - provider           tag identifies user
      provider A - provider B   tag identifies provider A
 The tag could be used by accounting meters to identify the party
 responsible for a traffic flow, without having to deduce this using
 tables of rules. This should considerably simplify accounting for
 transit traffic across intermediate networks.

Higher-layer (Session and Application) Accounting

 At higher layers there is a clear need to measure accounting
 variables and communicate them to various points along a packet's
 path, for example an application server may wish to inform a client
 about its usage of resources. A tag containing this information could
 be read by meters at any point along the packet's path for charging
 purposes, and could also be used by the client to inform the user of
 charges incurred.
 It would make the collection of accounting data much simpler if this
 information was carried in a standard tag within each packet, rather
 than having different protocols provide this service in differing
 ways.
 For 'old' applications which remain unaware of the tag field, a meter
 could be placed at a gateway for the application's host. This
 'gateway' meter could determine what the application is by watching
 its streams of packets, then set an appropriate value in thir tag
 fields.

Structure of the accounting tag

 The two uses of tags outlined above must be able to coexist. Since
 many - indeed most - of the packets will only carry a voucher, it
 seems simplest to keep this as part of the routing tuple (see below).
 For the application variables, a separate tag seems sensible. This
 would simply contain a list of the variables.  Having two tags in
 this way would keep separate the management of routers and meters.

Brownlee [Page 2] RFC 1672 Accounting Requirements for IPng August 1994

 If the encryption/digital signature overhead of the second tag proves
 to be too high, it should be possible to combine this with the
 voucher.
 The fine detail of this, or at least the way variables are packed
 into the tags, could be standardised by the Accounting Working Group
 in due course. For the purpose of IPng all that is required is the
 ability to carry one or two variable-size objects in every packet.

References

 [1] Carpenter, B., "IPng White Paper on Transition and Other
     Considerations", RFC 1671, CERN, August 1994.

Security Considerations

     For IPng to provide reliable transport in a hostile environment,
     routing and accounting information, i.e., the (source, dest,
     network-tag) and (application-tag) tuples, must be tamper-proof.
     Routers and meters which need to use the tuples will need to hold
     appropriate keys for them. Network operators will have to plan
     for this, for example by determining which routers need which
     sets of keys. This will be neccessary in any case for reliable
     policy-based routing, so the extra work required to set up
     accounting meters should be acceptable.

Author's Address

     Nevil Brownlee
     Deputy Director
     Computer Centre, The University of Auckland
     Private Bag 92019, Auckland, New Zealand
     Phone: +64 9 373 7599
     Fax: +64 9 373 7425
     EMail: n.brownlee@auckland.ac.nz

Brownlee [Page 3]

/home/gen.uk/domains/wiki.gen.uk/public_html/data/pages/rfc/rfc1672.txt · Last modified: 1994/08/05 00:33 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki