From majordomo@mil.doit.wisc.edu  Tue Oct  1 00:35:52 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA07050
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 00:35:52 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wEcd-0004L5-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 30 Sep 2002 23:26:59 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wEcb-0004KN-00
	for ipfix-req@net.doit.wisc.edu; Mon, 30 Sep 2002 23:26:57 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g914QDE04500;
	Mon, 30 Sep 2002 21:26:14 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX73LAH>; Mon, 30 Sep 2002 21:26:13 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C0411A7B8@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] Requirements draft issues - Reinaldo 1
Date: Mon, 30 Sep 2002 21:26:12 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26902.ACAED428"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26902.ACAED428
Content-Type: text/plain;
	charset="iso-8859-1"

Issue Number : Reinaldo 1

Issue: 

I think there are some important packet fields/scenarios that should be
included in the requirements draft. 

1 - We discussed a long time ago to include the VPN-ID as one of the
parameters exported. If Ipfix will be used in VPN environments for
accouting, QoS, monitoring, etc, this field is a must.

2 - There is mention to intrusion detection/security as one of the
applications for IPfix, but there is no requirement to export NATed flows
(before and after).

In a device that supports NAT (traditional, layer 7 interception, whatever)
and it's going to use IPfix for security/intrusion detection, dealing with
NAT is must. There is no way any intrusion detection device will find
attacker/attacked properly without both sides of a NAT flow. Not to mention
accouting, billing, etc.

Proposed Modification : 

I would propose to include both items on the requirements draft. 


------_=_NextPart_001_01C26902.ACAED428
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>Requirements draft issues - Reinaldo 1</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Issue Number : Reinaldo 1</FONT>
</P>

<P><FONT SIZE=3D2>Issue: </FONT>
</P>

<P><FONT SIZE=3D2>I think there are some important packet =
fields/scenarios that should be included in the requirements draft. =
</FONT>
</P>

<P><FONT SIZE=3D2>1 - We discussed a long time ago to include the =
VPN-ID as one of the parameters exported. If Ipfix will be used in VPN =
environments for accouting, QoS, monitoring, etc, this field is a =
must.</FONT></P>

<P><FONT SIZE=3D2>2 - There is mention to intrusion detection/security =
as one of the applications for IPfix, but there is no requirement to =
export NATed flows (before and after).</FONT></P>

<P><FONT SIZE=3D2>In a device that supports NAT (traditional, layer 7 =
interception, whatever) and it's going to use IPfix for =
security/intrusion detection, dealing with NAT is must. There is no way =
any intrusion detection device will find attacker/attacked properly =
without both sides of a NAT flow. Not to mention accouting, billing, =
etc.</FONT></P>

<P><FONT SIZE=3D2>Proposed Modification : </FONT>
</P>

<P><FONT SIZE=3D2>I would propose to include both items on the =
requirements draft. </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26902.ACAED428--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 00:36:17 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA07063
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 00:36:17 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wEci-0004LV-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 30 Sep 2002 23:27:04 -0500
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wEcg-0004KS-00
	for ipfix-req@net.doit.wisc.edu; Mon, 30 Sep 2002 23:27:02 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g914QbU26373;
	Mon, 30 Sep 2002 23:26:37 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX73LA2>; Mon, 30 Sep 2002 21:26:23 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C0411A7B9@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] Requirements draft issues - Reinaldo 2
Date: Mon, 30 Sep 2002 21:26:15 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26902.AE0AEB7C"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26902.AE0AEB7C
Content-Type: text/plain;
	charset="iso-8859-1"

Issue Number : Reinaldo 2

Issue: 

In the beggining of section 5.1 it is stated that 

"This is based on the requirements specified in the requirement 
   document [2]." 

But I couldn't find a peer of some of the requirements from architecture
draft on the requirements draft. Will these be included on the requirements
draft? Excluded from the architecture? For example....

5.1.2. IPFIX Protocol on IPFIX Device (At Export Process) 

     1. Ability to detect loss of connectivity with the collector and 
        trigger the appropriate action (eg. a switch over to an 
        alternate collector.) <--- 
     2. Optionally export flow records to multiple collectors. 
     3. Optionally re-transmit lost flow records. <--- 
     4. Exchange control information from the collector, monitor export 
        process and detect any overload in the process of exporting. <--- P 


Proposed Solution:

I would suggest to just take out the requirement section from the
architecture draft and incorporate the relevant parts into the requirements
draft to avoid confusion and repetition. If people do not agree it would be
good if the editors of both documents would put them side by side and
compare the wording.


------_=_NextPart_001_01C26902.AE0AEB7C
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>Requirements draft issues - Reinaldo 2</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Issue Number : Reinaldo 2</FONT>
</P>

<P><FONT SIZE=3D2>Issue: </FONT>
</P>

<P><FONT SIZE=3D2>In the beggining of section 5.1 it is stated that =
</FONT>
</P>

<P><FONT SIZE=3D2>&quot;This is based on the requirements specified in =
the requirement </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; document [2].&quot; </FONT>
</P>

<P><FONT SIZE=3D2>But I couldn't find a peer of some of the =
requirements from architecture draft on the requirements draft. Will =
these be included on the requirements draft? Excluded from the =
architecture? For example....</FONT></P>

<P><FONT SIZE=3D2>5.1.2. IPFIX Protocol on IPFIX Device (At Export =
Process) </FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; 1. Ability to detect loss of =
connectivity with the collector and </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; trigger =
the appropriate action (eg. a switch over to an </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; alternate =
collector.) &lt;--- </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; 2. Optionally export flow =
records to multiple collectors. </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; 3. Optionally re-transmit =
lost flow records. &lt;--- </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; 4. Exchange control =
information from the collector, monitor export </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; process =
and detect any overload in the process of exporting. &lt;--- P </FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Proposed Solution:</FONT>
</P>

<P><FONT SIZE=3D2>I would suggest to just take out the requirement =
section from the architecture draft and incorporate the relevant parts =
into the requirements draft to avoid confusion and repetition. If =
people do not agree it would be good if the editors of both documents =
would put them side by side and compare the wording.</FONT></P>

</BODY>
</HTML>
------_=_NextPart_001_01C26902.AE0AEB7C--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 07:40:43 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA09616
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 07:40:43 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wLD7-0001v4-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 06:29:05 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wLD4-0001tx-00
	for ipfix-req@net.doit.wisc.edu; Tue, 01 Oct 2002 06:29:03 -0500
Received: from cisco.com (bclaise-isdn-home.cisco.com [10.49.4.218])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g91B6b728322;
	Tue, 1 Oct 2002 13:06:37 +0200 (CEST)
Message-ID: <3D9981BD.1050002@cisco.com>
Date: Tue, 01 Oct 2002 13:06:37 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] Requirements draft issues - Reinaldo 2
References: <7B802811BE77D51189910002A55CFD2C0411A7B9@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Reinaldo,

> Issue Number : Reinaldo 2
>
> Issue:
>
> In the beggining of section 5.1 it is stated that
>
> "This is based on the requirements specified in the requirement
>    document [2]."
>
You are referring to
http://www.ietf.org/internet-drafts/draft-ietf-ipfix-architecture-02.txt
But the architecture draft work is on hold until we have consensus on 
the requirement draft and selected the candidate protocol.

Regards, Benoit.

> But I couldn't find a peer of some of the requirements from 
> architecture draft on the requirements draft. Will these be included 
> on the requirements draft? Excluded from the architecture? For example....
>
> 5.1.2. IPFIX Protocol on IPFIX Device (At Export Process)
>
>      1. Ability to detect loss of connectivity with the collector and
>         trigger the appropriate action (eg. a switch over to an
>         alternate collector.) <---
>      2. Optionally export flow records to multiple collectors.
>      3. Optionally re-transmit lost flow records. <---
>      4. Exchange control information from the collector, monitor export
>         process and detect any overload in the process of exporting. 
> <--- P
>
>
> Proposed Solution:
>
> I would suggest to just take out the requirement section from the 
> architecture draft and incorporate the relevant parts into the 
> requirements draft to avoid confusion and repetition. If people do not 
> agree it would be good if the editors of both documents would put them 
> side by side and compare the wording.
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 11:04:07 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21465
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 11:04:07 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wOQM-0000b2-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 09:54:58 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wOQJ-0000a5-00; Tue, 01 Oct 2002 09:54:56 -0500
Received: from riverstonenet.com ([134.141.180.71]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 1 Oct 2002 07:54:23 -0700
Message-ID: <3D99B6AF.5B2FD5E1@riverstonenet.com>
Date: Tue, 01 Oct 2002 10:52:31 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 6.3.2
References: <7B802811BE77D51189910002A55CFD2C04119EF5@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 01 Oct 2002 14:54:23.0578 (UTC) FILETIME=[6E266BA0:01C2695A]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


I agree, we need more clarity on this issue. 

Here are the 4 items I see being implied when we discuss 
reliability:

	1. Congestion awareness.
	2. Message ordering
	3. Transport reliability
	4. Application layer reliability

Since we do not have infinite storage capacity a fifth one is...

	5. Tracking data loss (statistics)

	#1 is required by the IETF. 
	#2 depends on the protocol (i.e. do things break if messages 
	   are not processed in order.)

	With #3 a certain amount of data may be lost when the
	connection goes down but given a valid connection the 
	data has guaranteed delivery.

	With #4, the application needs to acknowledge receipt
	of messages. Unacknowledged messages are resent. This
	one also creates a problem of weeding out duplicate data
	since mesasges may be resent. We would also need to define
	the semantics of the Ack. Does it only mean message received
	or does it mean message recieved and processed (i.e. persisted
	in case of failure).

Also, since different applications require different levels of
reliability, is this aspect tunable? The main reason, I think, for
making 
it tunable would be if there is a significant performance difference
between the levels.

I'll stop here for comments from the list.

Paul


> Reinaldo Penno wrote:
> 
> Hello,
> 
> I'm looking to understand/really clarify this requirement. It seems
> ambiguous...at least to me. I do not understand what is the
> meaning/purpose of "-->abscence<-- of reliability....MUST be
> indicated". Shouldn't we just rephrase that by just saying that the
> protocol MUST be reliable, provide in-sequence delivery and
> retransmission?
> 
> It seems to me we should have 2 options:
> 
> 1. The IPfix protocol runs over TCP or SCTP
> 2. The ipfix protocol does not run over TCP or TCP but provide a
> service equal or in excess to what is provided by TCP/SCTP in terms of
> reliability, congestion awareness and in-sequence delivery.
> 
> Reading this text I feel there is a third option which is:
> 
> 3. "the protocol should run over TCP or SCTP, but you can sidestep
> this requirement by putting a sequence number on the application layer
> and/or providing 'abscence' of reliability"...
> 
> Or maybe one should ask what's the definition of a reliable protocol
> as far as the ipfix protocol is concerned...
> 
> "6.3.2.  Reliability
> 
>    Absence of reliability of the data transfer, for example caused by
>    loss or reordering of packets containing flow information, MUST be
>    indicated.
> 
>    Please note that if an unreliable transport protocol is used,
>    reliability can be provided by higher layers. In such a case only
>    lack of overall reliability MUST be indicated. For example
> reordering
>    could be dealt with by adding a sequence number to each packet."
> 
> regards,
> 
> Reinaldo

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 12:04:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24217
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 12:04:22 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wPK8-0002LR-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 10:52:36 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wPK6-0002Ks-00; Tue, 01 Oct 2002 10:52:34 -0500
Received: from riverstonenet.com ([134.141.180.71]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 1 Oct 2002 08:52:00 -0700
Message-ID: <3D99C430.A73244C5@riverstonenet.com>
Date: Tue, 01 Oct 2002 11:50:08 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: eval-team <ipfix-eval-team@net.doit.wisc.edu>,
        ipfixx <ipfix@net.doit.wisc.edu>
Subject: [ipfix] Re: Comments on LFAP Version 5.0
References: <7B802811BE77D51189910002A55CFD2C04119EF8@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 01 Oct 2002 15:52:01.0348 (UTC) FILETIME=[7B244040:01C26962]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Reinaldo Penno wrote:
> 
> Hello paul,
> 
> during the process of evaluating LFAP I read the base + data model
> draft again. I have some general suggestions/questions (I'm doing this
> for all candidates...).
> 
> a) In section 2 there is a typo
> 
> "then the CCE MUSST terminate the TCP"...
> 
> b)
> 
> I think on the text below you mean
>  "...reachable from the CCE"
> 

	Actually I do mean FAS. The CCE might be able to 
	reach the FAS but another FAS may not be able to
	reach it. I think the example is if the IP address
	is NATed, the FAS cannot contact the other server
	given that IP address.

> 4.1   FAS IP Address IE
>      This is the IP Address of a device running a Flow Accounting
> Server
>      that may or may not be reachable from the FAS. The CCE uses this
> IE
>      in the Connection Request message. IE format is:
> 
> c) In section 4.2 there is a typo
> 
> "The record descriptor consist of two fields the first
>      field is the length of the fixed information field. The second
> is"
> 
> Maybe it should be ....of two fields. The first field is the lenght of
> the fixed information field, the second..."

	Yep.

> 
> d) In section 5.11 there is a typo..
> 
> "The FAS sends a Keep Alive
>      (KA) messge so the CCE can determine "
> 
> s/messge/message
> 
> e)
> 
> In regards to 5.12 (below), why the CCE cannot use DR also? How the
> CCE terminates a lfap session gracefully (perhaps indicating some
> error code if needed?)
> 

	Since the CCE initiates the connection it is the
	one which needs to be redirected. I'm not sure
	what it means to redirect the listener.

	The LFAP server, at the moment, does not need
	to know why the CCE disconnected. If there is a
	need for the info, I would use an AR message to 
	send it, not the DR.

> "5.12  Disconnect Request (DR) Message
> 
>      A DR message is sent only by the FAS to request the CCE
> disconnect.
>      It can be sent when the FAS is in the Send State or Connected
>      State. DR messages may contain one optional IE which is the FAS
> IP
>      Address IE. The FAS may suggest an alternative FAS by supplying
> the
>      FAS IP Address IE. Status is set to SUCCESS in DR messages.
> 
>     The Optional IE that can be transmitted in a DR message is a:
>          FAS IP Address IE"
> 
> f) Would you be so kind to give a concrete example on how the lfap
> packet would look like when the mulitple record format explained in
> section 4.2 is used? This IE is mentioned in this section and nowhere
> else in both drafts (base and data model). Except when you say in the
> data model "The multiple record IE MUST NOT be used.". Is this IE
> being used or not?


	Today it is mostly used in the FUN message. For example,

	 Note - FIXED-START, FIXED-END, FORMAT-START, FORMAT-END,
		 RECORD-START, RECORD-END do not exist in the message
		 they were added for readability

	type=multi-record, len = 84
	Fixed-Info-len = 16   Record-format-len = 12

	___ FIXED START____
	type = time,  len = 4, value = 9:00
	type = state, len = 4, value = active
	____FIXED-END_____

	____FORMAT-START__
	type = flow id, len = 12
	type = bytes,   len = 8
	type = packets, len = 8
	____FORMAT-END____

	____RECORD-START__
	1.1.5
	3773
	45
	____RECORD-END___

	____RECORD-START_
	1.1.67
	67990
	145
	____RECORD-END___
	
	...
	

	So each flow is updated with time, state, flowid, bytes, packets.
	The time and state are listed only once, the rest are given
	for each flow.


	There was restriction on using multiple record format in
	the FAR message. It was supposed to be lifted in LFAP V5
	but that change didn't make it in. I'll need to do an update
	to fix that.

> 
> g) I liked the detailed explanations on the protocol machinery, and
> actually liked the application level intelligence that lfap provides
> but IMHO I feel something similar could be done in respect to examples
> of packet formats in order to help understand the draft.  Is it
> possible to give some concrete examples on the packet format?
> 
> For example (lfap header + mandatory IEs), (lfap header + mandatory
> IEs + some optional IEs) for some flows? Some examples of what I'm
> talking about can be found in section 10 of
> draft-bclaise-netflow-9-00.txt.

	Yes, I can do that. I'll work on it this week
	and send out the examples to the list.

> 
> h) In regards the Flow ID IE in the data model I could ask you for
> clarifications, but I wouldn't know what to ask for, it's just that it
> seems this concept deserves more wording to better understand it. For
> example, how is the flow identifier exactly prefix choosen? What
> happens in a fail-over scenario (CCE crashes, FAS crashes, both crash,
> etc) in regards to this Flow ID IE?

	I can add more text on that and provide an example of
	how it is done today. For now, here are the details.

	Flow ID = Prefix(8 bytes) + CCE ID (4 bytes)

	Basically the FAS picks a globally unique 8 byte prefix.
	Today that is done by using the FAS server's IP address in
	the first 4 bytes. The second 4 bytes is a monotonically
	increasing number. The initial value is picked at random.
	There are other ways to pick a unique prefix, this is how
	it's done today.

	The CCE ID is a monotonically increasing number starting
	at 1.

	This 12 byte value uniquely identifies a flow across
	all FAS's and all CCE's. 
	
	If the CCE crashes, it will get a new prefix from the FAS.
	It will start its CCE ID from 1 and increment from there.

	If the FAS crashes, the CCE can continue to use the prefix.
	Existing flows keep their flow ID and are merely reported
	to the new FAS. New flows also operate as normal (i.e. just
	increment the CCE-ID).

	When the FAS comes back up, the last prefix given out is
	in persisted storage, so it continues to hand out
	prefixes in order.

	If they both crash, the FAS and CCE operate as described
	above.

	Paul

> 
> regards,
> 
> Reinaldo

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 12:14:39 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24848
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 12:14:39 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wPXv-0002pC-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 11:06:51 -0500
Received: from dplonka by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wPXt-0002p7-00
	for ipfix@net.doit.wisc.edu; Tue, 01 Oct 2002 11:06:49 -0500
Date: Tue, 1 Oct 2002 11:06:49 -0500
From: Dave Plonka <plonka@doit.wisc.edu>
To: ipfix@net.doit.wisc.edu
Subject: [ipfix] I-D ACTION:draft-ietf-ipfix-reqs-06.txt
Message-ID: <20021001110649.B27495@doit.wisc.edu>
Reply-To: plonka@doit.wisc.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 1.0.1i
Organization: UW-Madison, DoIT, Network Services
X-VMS-Error: %SYSTEM-W-CONFQUAL, conflicting qualifiers
X-Shakespearean-Insult: Thou frothy beetle-headed bugbear
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>


IPFIX folks,

Below please find the announcement regarding the availability of the
updated requirements draft.

The following link to it now appears on the IPFIX web site index:

   http://www.ietf.org/internet-drafts/draft-ietf-ipfix-reqs-06.txt

I have also placed it here:

   http://ipfix.doit.wisc.edu/req/draft-ietf-ipfix-reqs-06.txt

Dave

----- Forwarded message from owner-ipfix@net.doit.wisc.edu -----

To: IETF-Announce: ;
Cc: ipfix@net.doit.wisc.edu
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-ipfix-reqs-06.txt
Date: Tue, 01 Oct 2002 07:35:49 -0400
Sender: nsyracus@cnri.reston.va.us

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Flow Information Export Working Group of the IETF.

	Title		: Requirements for IP Flow Information Export
	Author(s)	: J. Quittek et al.
	Filename	: draft-ietf-ipfix-reqs-06.txt
	Pages		: 29
	Date		: 2002-9-30
	
This memo defines requirements for the export of measured IP flow
information out of routers, traffic measurement probes and
middleboxes.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-ipfix-reqs-06.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-ipfix-reqs-06.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-ipfix-reqs-06.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<2002-9-30144601.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-ipfix-reqs-06.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-ipfix-reqs-06.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<2002-9-30144601.I-D@ietf.org>

--OtherAccess--

--NextPart--

----- End forwarded message -----

-- 
plonka@doit.wisc.edu  http://net.doit.wisc.edu/~plonka  ARS:N9HZF  Madison, WI

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 12:18:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25147
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 12:18:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wPcM-0002wH-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 11:11:26 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wPcK-0002vM-00
	for ipfix-req@net.doit.wisc.edu; Tue, 01 Oct 2002 11:11:24 -0500
Received: from riverstonenet.com ([134.141.180.71]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 1 Oct 2002 09:10:49 -0700
Message-ID: <3D99C89A.8763F153@riverstonenet.com>
Date: Tue, 01 Oct 2002 12:08:58 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Ganesh Sadasivan <gsadasiv@cisco.com>
CC: req <ipfix-req@net.doit.wisc.edu>
Subject: Re: [ipfix-req] Re: IPFIX Requirements Questions
References: <3D6BC9AD.CAC153C8@riverstonenet.com> <3D761701.E5986839@riverstonenet.com> <3D926ED7.55A3E8E@cisco.com> <3D9316A7.54B16699@riverstonenet.com> <3D932A40.D96DD195@cisco.com> <3D933258.B9BD4EA0@riverstonenet.com> <3D9357CB.4DC32290@cisco.com> <3D936678.639BBEE6@riverstonenet.com> <3D987831.5B277F0B@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 01 Oct 2002 16:10:50.0479 (UTC) FILETIME=[1C27F7F0:01C26965]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Ganesh Sadasivan wrote:
> 
> Just taking the topic of DP alone.
> 
> >
> > > >
> > > >         I think this points to an area of weakness for us (IPFIX). We are
> > > >         having a hard time having a discussion.
> > > >
> > > >         Lets say that DP = "Distinguising Properties". Where DP is
> > > >         the set of fields and functions, etc... that are used
> > > >         to define a flow. Lets assume for now that the set of possible
> > > >         fields and functions, etc... is fully defined somewhere
> > > >         (it's not, but assume it is for now.).
> > > >
> > > >         If we require that each flow can be mapped to its DP
> > > >         then the discussion moves to how that happens.
> > > >
> > > >         There are many ways. Here are a few which come to mind...
> > > >
> > >
> > > Does it matter how the DP is identified & send (whether with each flow or  split
> > > across flow & control or otherwise) is sent, from a req. doc perspective?
> > > As long as we define DP (which is what you are suggesting to do) and tell that DP
> > > must give enough information so that the full flow context can be  derived at the
> > > collector, will it not solve this issue?
> > >
> >
> >         Yes it will. I gave example to make sure we were on the
> >         same page. They would not go in the req doc.
> >
> > > >
> > > >         1) send the DP with each flow.
> > > >         2) send the DP with an ID. Then each flow contains
> > > >            a DP-ID field.
> > > >         3) Send the DP for noraml operation and the DP for
> > > >            overload situation. Then only state changes need
> > > >            to be delivered.
> > > >
> > > >         #3 above seems to be what you are talking about.
> > > >
> > > >         However, I think we need to define DP as a term and the set of
> > > >         possible fields and functions first. Add the requirement of mapping
> > > >         a flow to a DP.
> > >
> > > As I see DP is a function of  {1.metering process(s) employed,  2. exporter state,
> > > 3. fields collected}.
> >
> >         I don't see a direct relationship #1 and #2/#3. For example
> >         I could have a DP of source and dest IP but collect (i.e. report)
> >         Src/Dst AS number. Also, the state may change from normal
> >         to overload with no change in DP but rather a dropping of
> >         additional flows.
> 
> It depends on the overload policy.
> * If it is such that say more aggregation (by using less fields) is done in
> the case of an overload (which effecively reduces the # of records
> exported) then there is a relation between 1 & fields exported (may not
> be the fields collected as I mentioned above).
> * If there are fields extracted in the packet path which are not directly
> derived from the packet (like AS #) in the case of an overload, one may
> not collect these fields in the packet path itself.
> * When the exporter state is changed to overload, the metering process
> may be changed from sampling interval X to Y.

	That is why I said "direct" relationship. There may be
	a secondary relationship but one does not drive the
	other.

	Thus, state is not a defining feature of DP.

	Paul

> 
> Thanks
> Ganesh
> 
> >
> >
> >         I think DP stands pretty much on its own.
> 
> > In other words
> >         fields collected and the state are not part of the DP
> >         definition. Those things may influence which DP is used
> >         but they are not part of the DP definition itself.
> >
> >         But I think we are getting a little ahead of the game.
> >         We need to define DP and its fields and functions.
> >
> >         Once we have consensus that we need to define DP and its
> >         fields and functions and we agree we need to map flow
> >         to DP, then we can kick off the discussion.
> >
> > > There is a furthur inter dependency between
> > > * 2&1 (with the exporter state change metering could change),
> > > * 2 & 3 (with the exporter state change fields collected could change),
> > > * 1 & 3 (fields are input tometering functions).
> > >
> > > Am I missing anything?
> > >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 13:03:42 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA26978
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 13:03:41 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wQFW-00045j-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 11:51:54 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wQFU-00044y-00; Tue, 01 Oct 2002 11:51:52 -0500
Received: from riverstonenet.com ([134.141.180.71]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 1 Oct 2002 09:51:18 -0700
Message-ID: <3D99D216.5391B6AD@riverstonenet.com>
Date: Tue, 01 Oct 2002 12:49:26 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
References: <AMEKJFAIEIKCBNABBMPNCECNDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 01 Oct 2002 16:51:19.0049 (UTC) FILETIME=[C3B25790:01C2696A]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


I think maybe you are using to narrow a definition of the
term "protocol". The IPFIX protocol specification needs to 
cover more than the message format and message exchange. 

Paul

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 15:19:44 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02133
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 15:19:43 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wSR1-0000dS-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 14:11:55 -0500
Received: from sj-msg-core-3.cisco.com ([171.70.157.152])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wSR0-0000ch-00
	for ipfix-req@net.doit.wisc.edu; Tue, 01 Oct 2002 14:11:54 -0500
Received: from mira-sjcd-1.cisco.com (IDENT:mirapoint@mira-sjcd-1.cisco.com [171.69.43.44])
	by sj-msg-core-3.cisco.com (8.12.2/8.12.2) with ESMTP id g91J3faa013337;
	Tue, 1 Oct 2002 12:11:16 -0700 (PDT)
Received: from cisco.com (dhcp-171-71-137-27.cisco.com [171.71.137.27])
	by mira-sjcd-1.cisco.com (Mirapoint Messaging Server MOS 3.1.0.66-GA)
	with ESMTP id AAJ00687;
	Tue, 1 Oct 2002 12:01:11 -0700 (PDT)
Message-ID: <3D99F0BD.2B362D26@cisco.com>
Date: Tue, 01 Oct 2002 12:00:14 -0700
From: Ganesh Sadasivan <gsadasiv@cisco.com>
X-Mailer: Mozilla 4.76 [en]C-CCK-MCD   (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: req <ipfix-req@net.doit.wisc.edu>
Subject: Re: [ipfix-req] Re: IPFIX Requirements Questions
References: <3D6BC9AD.CAC153C8@riverstonenet.com> <3D761701.E5986839@riverstonenet.com> <3D926ED7.55A3E8E@cisco.com> <3D9316A7.54B16699@riverstonenet.com> <3D932A40.D96DD195@cisco.com> <3D933258.B9BD4EA0@riverstonenet.com> <3D9357CB.4DC32290@cisco.com> <3D936678.639BBEE6@riverstonenet.com> <3D987831.5B277F0B@cisco.com> <3D99C89A.8763F153@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit



calato@riverstonenet.com wrote:

> Ganesh Sadasivan wrote:
> >
> > Just taking the topic of DP alone.
> >
> > >
> > > > >
> > > > >         I think this points to an area of weakness for us (IPFIX). We are
> > > > >         having a hard time having a discussion.
> > > > >
> > > > >         Lets say that DP = "Distinguising Properties". Where DP is
> > > > >         the set of fields and functions, etc... that are used
> > > > >         to define a flow. Lets assume for now that the set of possible
> > > > >         fields and functions, etc... is fully defined somewhere
> > > > >         (it's not, but assume it is for now.).
> > > > >
> > > > >         If we require that each flow can be mapped to its DP
> > > > >         then the discussion moves to how that happens.
> > > > >
> > > > >         There are many ways. Here are a few which come to mind...
> > > > >
> > > >
> > > > Does it matter how the DP is identified & send (whether with each flow or  split
> > > > across flow & control or otherwise) is sent, from a req. doc perspective?
> > > > As long as we define DP (which is what you are suggesting to do) and tell that DP
> > > > must give enough information so that the full flow context can be  derived at the
> > > > collector, will it not solve this issue?
> > > >
> > >
> > >         Yes it will. I gave example to make sure we were on the
> > >         same page. They would not go in the req doc.
> > >
> > > > >
> > > > >         1) send the DP with each flow.
> > > > >         2) send the DP with an ID. Then each flow contains
> > > > >            a DP-ID field.
> > > > >         3) Send the DP for noraml operation and the DP for
> > > > >            overload situation. Then only state changes need
> > > > >            to be delivered.
> > > > >
> > > > >         #3 above seems to be what you are talking about.
> > > > >
> > > > >         However, I think we need to define DP as a term and the set of
> > > > >         possible fields and functions first. Add the requirement of mapping
> > > > >         a flow to a DP.
> > > >
> > > > As I see DP is a function of  {1.metering process(s) employed,  2. exporter state,
> > > > 3. fields collected}.
> > >
> > >         I don't see a direct relationship #1 and #2/#3. For example
> > >         I could have a DP of source and dest IP but collect (i.e. report)
> > >         Src/Dst AS number. Also, the state may change from normal
> > >         to overload with no change in DP but rather a dropping of
> > >         additional flows.
> >
> > It depends on the overload policy.
> > * If it is such that say more aggregation (by using less fields) is done in
> > the case of an overload (which effecively reduces the # of records
> > exported) then there is a relation between 1 & fields exported (may not
> > be the fields collected as I mentioned above).
> > * If there are fields extracted in the packet path which are not directly
> > derived from the packet (like AS #) in the case of an overload, one may
> > not collect these fields in the packet path itself.
> > * When the exporter state is changed to overload, the metering process
> > may be changed from sampling interval X to Y.
>
>         That is why I said "direct" relationship. There may be
>         a secondary relationship but one does not drive the
>         other.

I think I am getting a sense of what you are speaking. Let me re-state it in my own
words and you can correct me if I'm wrong.
- A flow is distinguished by the metering process(es) done on the packet, what
   information is collected out from these operations and any other auxiliary operations
   done using the collected information.
- The metering process(es) itself may change based on the exporter state in which case
   it results in an entirely different flow.

Thanks
Ganesh



-ganesh

>
>
>         Thus, state is not a defining feature of DP.
>
>         Paul
>
> >
> > Thanks
> > Ganesh
> >
> > >
> > >
> > >         I think DP stands pretty much on its own.
> >
> > > In other words
> > >         fields collected and the state are not part of the DP
> > >         definition. Those things may influence which DP is used
> > >         but they are not part of the DP definition itself.
> > >
> > >         But I think we are getting a little ahead of the game.
> > >         We need to define DP and its fields and functions.
> > >
> > >         Once we have consensus that we need to define DP and its
> > >         fields and functions and we agree we need to map flow
> > >         to DP, then we can kick off the discussion.
> > >
> > > > There is a furthur inter dependency between
> > > > * 2&1 (with the exporter state change metering could change),
> > > > * 2 & 3 (with the exporter state change fields collected could change),
> > > > * 1 & 3 (fields are input tometering functions).
> > > >
> > > > Am I missing anything?
> > > >
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 20:38:34 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA10299
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 20:38:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wXO1-0000y9-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 19:29:09 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wXNz-0000xl-00
	for ipfix-req@net.doit.wisc.edu; Tue, 01 Oct 2002 19:29:07 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g920SYE19356;
	Tue, 1 Oct 2002 17:28:34 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g920SjV11168;
	Tue, 1 Oct 2002 19:28:46 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX734XN>; Tue, 1 Oct 2002 17:28:31 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C0419F77E@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] Requirements draft issues - Reinaldo 3
Date: Tue, 1 Oct 2002 17:28:32 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C269AA.A303366E"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C269AA.A303366E
Content-Type: text/plain;
	charset="iso-8859-1"

Issue Number : Reinaldo 3

Issue:

I'm looking to understand/really clarify this requirement. It seems
ambiguous...at least to me. I do not understand what is the meaning/purpose
of "-->abscence<-- of reliability....MUST be indicated". Shouldn't we just
rephrase that by just saying that the protocol MUST be reliable, provide
in-sequence delivery and retransmission? 

It seems to me we should have 2 options: 

1. The IPfix protocol runs over TCP or SCTP 
2. The ipfix protocol does not run over TCP or TCP but provide a service
equal or in excess to what is provided by TCP/SCTP in terms of reliability,
congestion awareness and in-sequence delivery.

Reading this text I feel there is a third option which is: 

3. "the protocol should run over TCP or SCTP, but you can sidestep this
requirement by putting a sequence number on the application layer and/or
providing 'abscence' of reliability"...

Or maybe one should ask what's the definition of a reliable protocol as far
as the ipfix protocol is concerned... 

"6.3.2.  Reliability 

   Absence of reliability of the data transfer, for example caused by 
   loss or reordering of packets containing flow information, MUST be 
   indicated. 

   Please note that if an unreliable transport protocol is used, 
   reliability can be provided by higher layers. In such a case only 
   lack of overall reliability MUST be indicated. For example reordering 
   could be dealt with by adding a sequence number to each packet." 


Proposed Solution:

clean up the text, clarify what is a reliable protocol/what to expect from
one, possibly incorporate the two options suggested above.

 

------_=_NextPart_001_01C269AA.A303366E
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>Requirements draft issues - Reinaldo 3</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Issue Number : Reinaldo 3</FONT>
</P>

<P><FONT SIZE=3D2>Issue:</FONT>
</P>

<P><FONT SIZE=3D2>I'm looking to understand/really clarify this =
requirement. It seems ambiguous...at least to me. I do not understand =
what is the meaning/purpose of &quot;--&gt;abscence&lt;-- of =
reliability....MUST be indicated&quot;. Shouldn't we just rephrase that =
by just saying that the protocol MUST be reliable, provide in-sequence =
delivery and retransmission? </FONT></P>

<P><FONT SIZE=3D2>It seems to me we should have 2 options: </FONT>
</P>

<P><FONT SIZE=3D2>1. The IPfix protocol runs over TCP or SCTP </FONT>
<BR><FONT SIZE=3D2>2. The ipfix protocol does not run over TCP or TCP =
but provide a service equal or in excess to what is provided by =
TCP/SCTP in terms of reliability, congestion awareness and in-sequence =
delivery.</FONT></P>

<P><FONT SIZE=3D2>Reading this text I feel there is a third option =
which is: </FONT>
</P>

<P><FONT SIZE=3D2>3. &quot;the protocol should run over TCP or SCTP, =
but you can sidestep this requirement by putting a sequence number on =
the application layer and/or providing 'abscence' of =
reliability&quot;...</FONT></P>

<P><FONT SIZE=3D2>Or maybe one should ask what's the definition of a =
reliable protocol as far as the ipfix protocol is concerned... </FONT>
</P>

<P><FONT SIZE=3D2>&quot;6.3.2.&nbsp; Reliability </FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; Absence of reliability of the data =
transfer, for example caused by </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; loss or reordering of packets =
containing flow information, MUST be </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; indicated. </FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; Please note that if an unreliable =
transport protocol is used, </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; reliability can be provided by higher =
layers. In such a case only </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; lack of overall reliability MUST be =
indicated. For example reordering </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; could be dealt with by adding a =
sequence number to each packet.&quot; </FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Proposed Solution:</FONT>
</P>

<P><FONT SIZE=3D2>clean up the text, clarify what is a reliable =
protocol/what to expect from one, possibly incorporate the two options =
suggested above.</FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C269AA.A303366E--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  1 23:51:14 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA14621
	for <ipfix-archive@lists.ietf.org>; Tue, 1 Oct 2002 23:51:14 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17waPY-0005ua-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 01 Oct 2002 22:42:57 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17waPW-0005u1-00; Tue, 01 Oct 2002 22:42:54 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g923gLE26436;
	Tue, 1 Oct 2002 20:42:21 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g923gVV22398;
	Tue, 1 Oct 2002 22:42:32 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX73V07>; Tue, 1 Oct 2002 20:42:17 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C0419F82D@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: calato@riverstonenet.com, Peter Ludemann <peter.ludemann@xacct.com>
Cc: req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: RE: [ipfix-req] IPFIX Requirement draft status - section 5.8
Date: Tue, 1 Oct 2002 20:42:18 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C269C5.B4D5B676"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C269C5.B4D5B676
Content-Type: text/plain;
	charset="iso-8859-1"

Hello Paul,

I think that the ipfix *Architecture* needs to cover more than the protocol.
But the protocol should cover only..the protocol. Maybe the right word is
"solution"...

I mean, the solution/architecture ( IPfix internal device implementation +
IPfix protocol) must meet certain requirements (metering, observations
domains, scalability, etc, etc)...

But the evaluation of the protocol part IMO shouldn't take into
consideration metering requirements such as the one I posted. Let's see if
there are other opinions on this besides Peter's. 

regards,

Reinaldo

> -----Original Message-----
> From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
> Sent: Tuesday, October 01, 2002 9:49 AM
> To: Peter Ludemann
> Cc: Penno, Reinaldo [BL60:0430:EXCH]; req;
> ipfix-eval-team@net.doit.wisc.edu
> Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
> 
> 
> 
> I think maybe you are using to narrow a definition of the
> term "protocol". The IPFIX protocol specification needs to 
> cover more than the message format and message exchange. 
> 
> Paul
> 

------_=_NextPart_001_01C269C5.B4D5B676
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] IPFIX Requirement draft status - section =
5.8</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hello Paul,</FONT>
</P>

<P><FONT SIZE=3D2>I think that the ipfix *Architecture* needs to cover =
more than the protocol. But the protocol should cover only..the =
protocol. Maybe the right word is &quot;solution&quot;...</FONT></P>

<P><FONT SIZE=3D2>I mean, the solution/architecture ( IPfix internal =
device implementation + IPfix protocol) must meet certain requirements =
(metering, observations domains, scalability, etc, etc)...</FONT></P>

<P><FONT SIZE=3D2>But the evaluation of the protocol part IMO shouldn't =
take into consideration metering requirements such as the one I posted. =
Let's see if there are other opinions on this besides Peter's. =
</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: calato@riverstonenet.com [<A =
HREF=3D"mailto:calato@riverstonenet.com">mailto:calato@riverstonenet.com=
</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, October 01, 2002 9:49 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Peter Ludemann</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Penno, Reinaldo [BL60:0430:EXCH]; =
req;</FONT>
<BR><FONT SIZE=3D2>&gt; ipfix-eval-team@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] IPFIX Requirement =
draft status - section 5.8</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I think maybe you are using to narrow a =
definition of the</FONT>
<BR><FONT SIZE=3D2>&gt; term &quot;protocol&quot;. The IPFIX protocol =
specification needs to </FONT>
<BR><FONT SIZE=3D2>&gt; cover more than the message format and message =
exchange. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Paul</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C269C5.B4D5B676--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 02:10:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA26108
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 02:10:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wcaD-0001V7-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 01:02:05 -0500
Received: from palrel12.hp.com ([156.153.255.237])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wcaB-0001UG-00; Wed, 02 Oct 2002 01:02:03 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP
	id 2FC47E00775; Tue,  1 Oct 2002 23:01:49 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id XAA19781;
	Tue, 1 Oct 2002 23:01:43 -0700 (PDT)
Received: from cup.hp.com ([15.244.160.26]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021002063240.HBDD18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 1 Oct 2002 23:32:40 -0700
Message-ID: <3D9A8B91.30005@cup.hp.com>
Date: Tue, 01 Oct 2002 23:00:49 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:0.9.2) Gecko/20010726 Netscape6/6.1
X-Accept-Language: en-us
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
Cc: calato@riverstonenet.com, Peter Ludemann <peter.ludemann@xacct.com>,
        req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
References: <7B802811BE77D51189910002A55CFD2C0419F82D@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Reinaldo,

   I completely agree that there are requirement aspects
that have nothing to do with the export protocol.  Given
the focus on protocols, changing non-protocol requirements
now only confuses things.

Regards,

   Jeff Meyer


Reinaldo Penno wrote:

> Hello Paul,
> 
> I think that the ipfix *Architecture* needs to cover more than the 
> protocol. But the protocol should cover only..the protocol. Maybe the 
> right word is "solution"...
> 
> I mean, the solution/architecture ( IPfix internal device implementation 
> + IPfix protocol) must meet certain requirements (metering, observations 
> domains, scalability, etc, etc)...
> 
> But the evaluation of the protocol part IMO shouldn't take into 
> consideration metering requirements such as the one I posted. Let's see 
> if there are other opinions on this besides Peter's.
> 
> regards,
> 
> Reinaldo
> 
>  > -----Original Message-----
>  > From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
>  > Sent: Tuesday, October 01, 2002 9:49 AM
>  > To: Peter Ludemann
>  > Cc: Penno, Reinaldo [BL60:0430:EXCH]; req;
>  > ipfix-eval-team@net.doit.wisc.edu
>  > Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
>  >
>  >
>  >
>  > I think maybe you are using to narrow a definition of the
>  > term "protocol". The IPFIX protocol specification needs to
>  > cover more than the message format and message exchange.
>  >
>  > Paul
>  >
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 02:41:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA10767
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 02:41:10 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wd5E-0002IB-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 01:34:08 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17wd5C-0002I6-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 01:34:06 -0500
Received: (qmail 21687 invoked from network); 2 Oct 2002 06:33:58 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 2 Oct 2002 06:33:58 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g926b6s08951;
	Tue, 1 Oct 2002 23:37:06 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Jeff Meyer" <jeffm@cup.hp.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Tue, 1 Oct 2002 23:34:04 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <3D98D86D.3060104@cup.hp.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

My comments on Jeff Meyer's comments (hopefully this discussion won't get
indented too many levels by those who rebut me).

    - IPDR  - much richer and more formal extensibility model,
        leveraging industry standard XML-Schema.
        Compactness as good as other candidates (after
        negotiation of "templates"/"descriptors"), simple
        set of operations.

I would argue that a hierarchical format is a Bad Thing. History repeats
itself; and the XML people are finding out what old-timers already knew:
that there were good reasons why relational databases supplanted
hierarchical and network databases on the 1970s ... if anybody wishes me to
bore them with the details, just ask ... or read other people's opinions
such as http://www.dbazine.com/pascal4.html

    - Diameter - less compact due to AVP encoding model.  Extensibility
        model formalized, but not provided as a machine readable
        document.  Overhead of acking makes this seem too heavyweight
        for the requirements as specified.  Finally the requirement
        for a recorder to support the SCTP protocol seems prohibitive,
        since this may require kernel support lacking on several OS's.

    - LFAP - has a limited (numeric id based) extensibility model.
        Protocol is relatively simple.  The encoding is tag/len/value
        meaning it will be less compact than IPDR or NFv9.

Compactness is a Good Thing when sending thousands of records per
second. This is not just an issue of bandwidth; it is also an issue
of processing time -- if you know exactly how a record is laid out,
you can process it faster. In some cases, you can avoid copy operations,
which can be a significant cost at high data rates. I don't see how
tag/len/value encoding can have as high performance as externally
defined formats.

BTW, doesn't the Diameter spec say that it can use UDP, TCP, or SCTP?
(I would love to require SCTP for CRANE; but as it is not wide-spread
yet, we must allow the possibility of TCP for now.)

    - NFv9  - compact, but extensibility model (templates) don't
        provide the set of information which IPDR does.  Relatively
        simple.

    - CRANE - proprietary vendor format.  More complex than is
        needed for IPFIX use case (20 different operation codes).
        Template based (like NFv9), has similar lack of formalism
        in actual definition of extensions.

"Proprietary vendor format" is irrelevant. Netscape, LFAP, NetFlow will
all be released under IETF rules if they are adopted as standards.

The alleged complexity in CRANE is to provide the necessary level of
reliability and flexibility in the templates. One specific design goal
was to allow the exporter to be informed of which fields were needed,
so that it could adjust its processing accordingly (for our PacketSight
probe, we can see roughly 3:1 performance change, depending on the
amount of metrics and attributes that are collected). If these are left
out, the number of operation codes drops by 1/3. Remove the operations
for multiplexing sessions on a connection (which would be unnecessary
if we could mandate SCTP) and we're down to 11 operations. 4 of these
are for flow control; 3 are for status reporting.

Anyway, the number of operations is irrelevant (most of the template
operations have similar content) ... the tricky thing in implementing
CRANE is getting the reliability and fail-over definitions just right.

As to "lack of formalism", which appears to be a sin shared by
all by IPDR ... all I can say is that I have taken enough
graduate-level courses in formal semantics to have become
deeply sceptical of any claim of a "formal model". (Anybody remember
the 2nd Algol-68 Report?) In the end, everything boils down to
agreements about the meanings of words. And there's nothing
stopping future standards that define precisely the meanings
of "upstreamByteCount", "applicationResponseTime", etc. which can
then be used by everybody. (Or some kind of registration process,
such as IANA's.)

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 02:47:11 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA10867
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 02:47:10 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wd9G-0002OG-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 01:38:18 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17wd9E-0002O5-00
	for ipfix-req@net.doit.wisc.edu; Wed, 02 Oct 2002 01:38:16 -0500
Received: (qmail 21816 invoked from network); 2 Oct 2002 06:38:08 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 2 Oct 2002 06:38:08 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g926fEs08999;
	Tue, 1 Oct 2002 23:41:15 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Reinaldo Penno" <rpenno@nortelnetworks.com>, <calato@riverstonenet.com>
Cc: "req" <ipfix-req@net.doit.wisc.edu>, <ipfix-eval-team@net.doit.wisc.edu>
Subject: RE: [ipfix-req] IPFIX Requirement draft status - section 5.8
Date: Tue, 1 Oct 2002 23:38:12 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNCEFEDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0074_01C269A3.9B401890"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <7B802811BE77D51189910002A55CFD2C0419F82D@zsc3c032.us.nortel.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This is a multi-part message in MIME format.

------=_NextPart_000_0074_01C269A3.9B401890
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

RE: [ipfix-req] IPFIX Requirement draft status - section 5.8I would like to
make a stronger statement than has been attributed to me:
  a.. The protocol should cover only the issues of delivering data from the
exporter to the collector. It must be expressive enough to contain all the
data defined in the data model.
  b.. The data model should cover the identification of the metrics and
attributes, their meanings, and how they are grouped together.
  c.. The architecture should cover issues such as where data are observed,
what data are required and what are optional, when reliability is needed,
how the data can be manipulated (e.g., calculating bandwidth), etc., etc.
This is classic computer science "divide and conquer".

Each layer from protocol, to data model, to architecture, is more complex
and more likely to cause argument. So, I have confined my comments to the
protocol, even though we also have a "probe" and would like to see
standardization of its metrics and attributes.

In the end, even the most formal models end up with words describing bits.
(And, yes, I would include denotational semantics and related esoterica in
this sweeping statement.) So, there must be precise agreement on the
definitions of the data types and the standard names used. As a simple
example, from our PacketSight probe, does "response time" for HTTP flows
mean:
  a.. TCP-level response (time between seeing the SYN and ACKs)
  b.. TCP/application-level response (time between sending the SYN and
sending the first GET)
  c.. application-level response (time between the first or last packet of
an HTTP GET and the first or last packet of the response or of the first or
last packet of the payload) [6 possibilities]
  d.. how should application-level response be interpreted for status
responses such as 3xx (redirection), 404 (file not found), or 5xx (server
error)?
  e.. does the definition take into account out-of-order or duplicate
packets?
  f.. what is the application-level definition with persistent connections?
  g.. etc., etc.
(which is why I've been leaving myself out of the discussions -- I just
don't have time to discuss these interesting issues.)

We anticipate standard names for some measurements being defined in the
future; but we also wish a protocol that is completely open, so that people
can define whatever they want. In a sense, it is like a high performance
ODBC, which only requires that both client and server agree on the meanings
of the record fields.

By the way, we intend to use CRANE for more than just IP flow export ...
other candidate uses include collecting telephony CDRs, QoS metrics
(formerly done with SNMP), web server logs, etc.

- peter
  -----Original Message-----
  From: Reinaldo Penno [mailto:rpenno@nortelnetworks.com]
  Sent: Tuesday, October 01, 2002 8:42 PM
  To: calato@riverstonenet.com; Peter Ludemann
  Cc: req; ipfix-eval-team@net.doit.wisc.edu
  Subject: RE: [ipfix-req] IPFIX Requirement draft status - section 5.8


  Hello Paul,

  I think that the ipfix *Architecture* needs to cover more than the
protocol. But the protocol should cover only..the protocol. Maybe the right
word is "solution"...

  I mean, the solution/architecture ( IPfix internal device implementation +
IPfix protocol) must meet certain requirements (metering, observations
domains, scalability, etc, etc)...

  But the evaluation of the protocol part IMO shouldn't take into
consideration metering requirements such as the one I posted. Let's see if
there are other opinions on this besides Peter's.

  regards,

  Reinaldo

  > -----Original Message-----
  > From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
  > Sent: Tuesday, October 01, 2002 9:49 AM
  > To: Peter Ludemann
  > Cc: Penno, Reinaldo [BL60:0430:EXCH]; req;
  > ipfix-eval-team@net.doit.wisc.edu
  > Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
  >
  >
  >
  > I think maybe you are using to narrow a definition of the
  > term "protocol". The IPFIX protocol specification needs to
  > cover more than the message format and message exchange.
  >
  > Paul
  >


------=_NextPart_000_0074_01C269A3.9B401890
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>RE: [ipfix-req] IPFIX Requirement draft status - =
section 5.8</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2719.2200" name=3DGENERATOR></HEAD>
<BODY>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>I=20
would like to make a stronger statement than has been attributed to=20
me:</FONT></SPAN></DIV>
<UL>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>The=20
  protocol should cover <EM>only</EM> the issues of delivering data from =
the=20
  exporter to the collector. It must be expressive enough to contain all =
the=20
  data defined in the data model.</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>The=20
  data model should cover the&nbsp;identification of the metrics and =
attributes,=20
  their meanings, and how they are grouped together.</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>The=20
  architecture should cover issues such as where data are observed, what =
data=20
  are required and what are optional, when reliability is needed, how =
the data=20
  can be manipulated (e.g., calculating bandwidth), etc.,=20
etc.</FONT></SPAN></LI></UL>
<DIV><SPAN class=3D629004603-02102002></SPAN><SPAN =
class=3D629004603-02102002><FONT=20
face=3DTahoma color=3D#0000ff size=3D2>This is classic computer science =
"divide and=20
conquer".</FONT></SPAN></DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2>Each&nbsp;layer from protocol, to data model, to =
architecture,&nbsp;is=20
more complex and more likely to cause argument. So, I have confined=20
my&nbsp;comments&nbsp;to the protocol, even though we also have a =
"probe" and=20
would like to see standardization of its metrics and=20
attributes.</FONT></SPAN></DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>In=20
the end, even the most formal models end up with words describing bits. =
(And,=20
yes, I would include denotational semantics and related esoterica in =
this=20
sweeping statement.) So, there must be precise agreement on the =
definitions of=20
the data types and the standard names used. As a simple example, from =
our=20
PacketSight probe, does "response time" for HTTP flows =
mean:</FONT></SPAN></DIV>
<UL>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
  size=3D2>TCP-level response (time between seeing the SYN and=20
  ACKs)</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
  size=3D2>TCP/application-level response (time between sending the SYN =
and=20
  sending&nbsp;the first GET)</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002></SPAN><SPAN =
class=3D629004603-02102002><FONT=20
  face=3DTahoma color=3D#0000ff size=3D2>application-level response =
(time=20
  between&nbsp;the first or last packet of an&nbsp;HTTP GET and the =
first or=20
  last packet of the response or of the first or last packet of the =
payload) [6=20
  possibilities]</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>how=20
  should application-level response be interpreted for status responses =
such as=20
  3xx (redirection), 404 (file not found),&nbsp;or 5xx (server=20
  error)?</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002></SPAN><SPAN =
class=3D629004603-02102002><FONT=20
  face=3DTahoma color=3D#0000ff size=3D2>does&nbsp;the =
definition&nbsp;take into=20
  account out-of-order or duplicate packets?</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>what=20
  is the application-level definition with persistent=20
  connections?</FONT></SPAN></LI>
  <LI><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
  size=3D2>etc., etc.</FONT></SPAN></LI></UL>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2>(which is why I've been leaving myself out of the discussions =
-- I just=20
don't have time to discuss these&nbsp;interesting =
issues.)</FONT></SPAN></DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>We=20
anticipate standard names for some measurements being defined in the =
future; but=20
we also wish a protocol that is completely open, so that people can =
define=20
whatever they want. In a sense, it is like a high performance ODBC, =
which only=20
requires that both client and server agree on the meanings of the record =

fields.</FONT></SPAN></DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>By=20
the way, we intend to use CRANE for more than just IP flow export ...=20
other&nbsp;candidate uses include collecting telephony CDRs, QoS metrics =

(formerly done with SNMP), web server logs, etc.</FONT></SPAN></DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D629004603-02102002><FONT face=3DTahoma =
color=3D#0000ff size=3D2>-=20
peter</FONT></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px =
solid; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader dir=3Dltr align=3Dleft><FONT =
face=3DTahoma=20
  size=3D2>-----Original Message-----<BR><B>From:</B> Reinaldo Penno=20
  [mailto:rpenno@nortelnetworks.com]<BR><B>Sent:</B> Tuesday, October =
01, 2002=20
  8:42 PM<BR><B>To:</B> calato@riverstonenet.com; Peter =
Ludemann<BR><B>Cc:</B>=20
  req; ipfix-eval-team@net.doit.wisc.edu<BR><B>Subject:</B> RE: =
[ipfix-req]=20
  IPFIX Requirement draft status - section 5.8<BR><BR></DIV></FONT>
  <P><FONT size=3D2>Hello Paul,</FONT> </P>
  <P><FONT size=3D2>I think that the ipfix *Architecture* needs to cover =
more than=20
  the protocol. But the protocol should cover only..the protocol. Maybe =
the=20
  right word is "solution"...</FONT></P>
  <P><FONT size=3D2>I mean, the solution/architecture ( IPfix internal =
device=20
  implementation + IPfix protocol) must meet certain requirements =
(metering,=20
  observations domains, scalability, etc, etc)...</FONT></P>
  <P><FONT size=3D2>But the evaluation of the protocol part IMO =
shouldn't take=20
  into consideration metering requirements such as the one I posted. =
Let's see=20
  if there are other opinions on this besides Peter's. </FONT></P>
  <P><FONT size=3D2>regards,</FONT> </P>
  <P><FONT size=3D2>Reinaldo</FONT> </P>
  <P><FONT size=3D2>&gt; -----Original Message-----</FONT> <BR><FONT =
size=3D2>&gt;=20
  From: calato@riverstonenet.com [<A=20
  =
href=3D"mailto:calato@riverstonenet.com">mailto:calato@riverstonenet.com<=
/A>]</FONT>=20
  <BR><FONT size=3D2>&gt; Sent: Tuesday, October 01, 2002 9:49 AM</FONT> =
<BR><FONT=20
  size=3D2>&gt; To: Peter Ludemann</FONT> <BR><FONT size=3D2>&gt; Cc: =
Penno,=20
  Reinaldo [BL60:0430:EXCH]; req;</FONT> <BR><FONT size=3D2>&gt;=20
  ipfix-eval-team@net.doit.wisc.edu</FONT> <BR><FONT size=3D2>&gt; =
Subject: Re:=20
  [ipfix-req] IPFIX Requirement draft status - section 5.8</FONT> =
<BR><FONT=20
  size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt; </FONT><BR><FONT =
size=3D2>&gt;=20
  </FONT><BR><FONT size=3D2>&gt; I think maybe you are using to narrow a =

  definition of the</FONT> <BR><FONT size=3D2>&gt; term "protocol". The =
IPFIX=20
  protocol specification needs to </FONT><BR><FONT size=3D2>&gt; cover =
more than=20
  the message format and message exchange. </FONT><BR><FONT =
size=3D2>&gt;=20
  </FONT><BR><FONT size=3D2>&gt; Paul</FONT> <BR><FONT size=3D2>&gt;=20
</FONT></P></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_0074_01C269A3.9B401890--


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 02:57:19 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA10992
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 02:57:19 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wdLG-0002ls-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 01:50:42 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17wdLC-0002ll-00
	for ipfix-req@net.doit.wisc.edu; Wed, 02 Oct 2002 01:50:38 -0500
Received: (qmail 22056 invoked from network); 2 Oct 2002 06:50:30 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 2 Oct 2002 06:50:30 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g926rds09083;
	Tue, 1 Oct 2002 23:53:39 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <calato@riverstonenet.com>, "Reinaldo Penno" <rpenno@nortelnetworks.com>
Cc: "req" <ipfix-req@net.doit.wisc.edu>, <ipfix-eval-team@net.doit.wisc.edu>
Subject: RE: [ipfix-req] IPFIX Requirement draft status - section 6.3.2
Date: Tue, 1 Oct 2002 23:50:37 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNOEFEDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <3D99B6AF.5B2FD5E1@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote Tuesday, October 01, 2002 7:53 AM
(with various [snip]s):

> 	3. Transport reliability
> 	4. Application layer reliability
> 	5. Tracking data loss (statistics)
> 
> 	With #3 a certain amount of data may be lost when the
> 	connection goes down but given a valid connection the 
> 	data has guaranteed delivery.

And there must be sufficient information so that de-duplication
can be done at the receiving end (it is impossible to design
fail-over such that no duplicates occur).
 
> 	With #4, the application needs to acknowledge receipt
> 	of messages .... Does [ACK] only mean message received
> 	or does it mean message recieved and processed (i.e. persisted
> 	in case of failure).

I am not sure that this is part of the protocol (for example, the
TCP spec does not make this clear; but all TCP implementations that
I know of send ACK only at the socket level -- but there is nothing
stopping somebody from implementing TCP such that the ACK happens
when the data have been fully processed ... in fact, the existence
of such implementations would have greatly simplified our work).

However, a useful implementation would ACK only when the data have
been processed in such a way as to allow recovery after a crash.
Otherwise, there's not much point in having a reliable protocol:
ordinary TCP would suffice.
 
> Also, since different applications require different levels of
> reliability, is this aspect tunable? The main reason, I think, for
> making it tunable would be if there is a significant performance
> difference between the levels.

The protocol must not prevent an efficient reliability mechanism at
the receiver. I think it is sufficient that the protocol allows a
delay of reception of ACKs (e.g., records 1-100 are sent, and then
ACK for 1-50 is received).

- peter



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 03:22:32 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA11404
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 03:22:31 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wdiU-0003QK-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 02:14:42 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17wdiS-0003Pg-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 02:14:40 -0500
Received: (qmail 25572 invoked by uid 10041); 2 Oct 2002 07:14:09 -0000
Date: Wed, 2 Oct 2002 00:14:09 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
Message-ID: <20021002071409.GY1995@riverstonenet.com>
References: <3D98D86D.3060104@cup.hp.com> <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Tue, Oct 01, 2002 at 11:34:04PM -0700, Peter Ludemann wrote:
>Compactness is a Good Thing when sending thousands of records per
>second. This is not just an issue of bandwidth; it is also an issue
>of processing time -- if you know exactly how a record is laid out,
>you can process it faster. In some cases, you can avoid copy operations,
>which can be a significant cost at high data rates. I don't see how
>tag/len/value encoding can have as high performance as externally
>defined formats.

Having spent a few years debugging snmp agents/mgmt apps, 
I believe compact formats may imply a tradeoff with 
debugging and diagnosis capability. 

Unless your modified tcpdump is capable of caching the template and
its offsets, one can't simply figure out from a given pdu 
if something is askew.
Detecting encoding errors (off by one, etc) in such protocols
I think will be rather difficult. 

If one reads the LFAP protocol spec, specifically the List IE, 
one can see that even AVPs values can be compacted by 
being able to use repeat counts. BGP over TCP seems to be doing just 
fine scaling with its avp encoding scheme to send thousands of 
route entries.
 
I would really like to see us figure out the overall "bandwidth usage" 
and "cpu/memory usage" in a real network protocol than judging just 
one aspect such as compact encoding.
Factors such as protocol statefullness and cpu time to process
any given PDU come into play and may overshadow any one aspect of
the the initial (useful) criteria posted.

Since all the prospective protocols have existed for some time in 
their current form in real networks, it shouldn't be hard to gather 
some real data. Dave Plonka probably already has some sort of test
bed/sample input :-)

Regards,
Mike MacFaden

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 04:37:39 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA12535
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 04:37:39 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17weqV-00059r-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 03:27:03 -0500
Received: from mailhub.fokus.gmd.de ([193.174.154.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17weqS-00059S-00; Wed, 02 Oct 2002 03:27:00 -0500
Received: from fokus.gmd.de (dhcp229 [195.37.78.229])
	by mailhub.fokus.gmd.de (8.11.6/8.11.6) with ESMTP id g928OCe00789;
	Wed, 2 Oct 2002 10:24:12 +0200 (MEST)
Message-ID: <3D9AAC79.4070501@fokus.gmd.de>
Date: Wed, 02 Oct 2002 10:21:13 +0200
From: Sebastian Zander <zander@fokus.gmd.de>
Organization: Fraunhofer FOKUS
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-DE; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: de-DE
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: calato@riverstonenet.com, Peter Ludemann <peter.ludemann@xacct.com>,
        req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
References: <7B802811BE77D51189910002A55CFD2C0419F82D@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi Reinaldo,

the requirements draft lists requirments for IP flow export. It is not
limited to protocol requirements. I completly agree to you that some
of the requirments are not applicable for the protocol but I assume that
the eval team will not consider those.

Cheers,

Sebastian

Reinaldo Penno wrote:

> Hello Paul,
> 
> I think that the ipfix *Architecture* needs to cover more than the 
> protocol. But the protocol should cover only..the protocol. Maybe the 
> right word is "solution"...
> 
> I mean, the solution/architecture ( IPfix internal device implementation 
> + IPfix protocol) must meet certain requirements (metering, observations 
> domains, scalability, etc, etc)...
> 
> But the evaluation of the protocol part IMO shouldn't take into 
> consideration metering requirements such as the one I posted. Let's see 
> if there are other opinions on this besides Peter's.
> 
> regards,
> 
> Reinaldo
> 
>  > -----Original Message-----
>  > From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
>  > Sent: Tuesday, October 01, 2002 9:49 AM
>  > To: Peter Ludemann
>  > Cc: Penno, Reinaldo [BL60:0430:EXCH]; req;
>  > ipfix-eval-team@net.doit.wisc.edu
>  > Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
>  >
>  >
>  >
>  > I think maybe you are using to narrow a definition of the
>  > term "protocol". The IPFIX protocol specification needs to
>  > cover more than the message format and message exchange.
>  >
>  > Paul
>  >
> 


-- 
Sebastian Zander                         E-mail: zander@fokus.fhg.de
FhI FOKUS / Global Networking (GloNe)    Tel: +49-30-3463-7287
Kaiserin-Augusta-Allee 31                Fax: +49-30-3463-8287
D-10589 Berlin, Germany                  www.fokus.fhg.de/usr/sebastian.zander




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 04:48:01 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA12663
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 04:48:01 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wf1I-0005V0-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 03:38:12 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17wf1G-0005Ut-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 03:38:10 -0500
Received: (qmail 24609 invoked from network); 2 Oct 2002 08:38:02 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 2 Oct 2002 08:38:02 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g928fCs09874;
	Wed, 2 Oct 2002 01:41:12 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Michael MacFaden" <mrm@riverstonenet.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Wed, 2 Oct 2002 01:38:09 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNMEFIDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <20021002071409.GY1995@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Michael MacFaden wrote Wednesday, October 02, 2002 12:14 AM

> Having spent a few years debugging snmp agents/mgmt apps,
> I believe compact formats may imply a tradeoff with
> debugging and diagnosis capability.

Agree ... (optional) MD5 checksums would have saved me a few
grey hairs. One unnamed embedded OS's faulty TCP stacks didn't
would have been detected much faster with this ...

> Unless your modified tcpdump is capable of caching the template and
> its offsets, one can't simply figure out from a given pdu
> if something is askew.
> Detecting encoding errors (off by one, etc) in such protocols
> I think will be rather difficult.

I have a Perl script that you might enjoy. But it only works
with CRANE. :-)
[Hint: do this in two steps: first step extracts records from
the stream and deals with issues such as retransmits; second
step interprets the records]

> If one reads the LFAP protocol spec, specifically the List IE,
> one can see that even AVPs values can be compacted by
> being able to use repeat counts. BGP over TCP seems to be doing just
> fine scaling with its avp encoding scheme to send thousands of
> route entries.

Agreed.

However, we have encountered some situations where saving a single
copy operation per output recordcan make all the difference between
being able to deliver the data and not. It's highly unlikely that
an application will keep data in AVP form, so AVP requires copies.
If the protocol packs the data into something that a C programmer
might do with a "struct", then memory-to-memory copying can be
avoided.

> I would really like to see us figure out the overall "bandwidth usage"
> and "cpu/memory usage" in a real network protocol than judging just
> one aspect such as compact encoding.
> Factors such as protocol statefullness and cpu time to process
> any given PDU come into play and may overshadow any one aspect of
> the the initial (useful) criteria posted.

My experience is that once you go past a few thousand records per
second, life becomes miserable in determining processing bottlenecks.
For example, timeliness of ACKs can be important (especially when
ACKs are constrained by persistency issues). When you get into the
10Ks/sec range, a certain amount of purple magic smoke helps.

> Since all the prospective protocols have existed for some time in
> their current form in real networks, it shouldn't be hard to gather
> some real data. Dave Plonka probably already has some sort of test
> bed/sample input :-)

Well, I don't think he has CRANE, unless he has implemented it from
scratch. :-) As things stand, even I can't give you a maximum throughput
number right now for CRANEbecause my testbed is transitioning to a
"new improved" collector. Also, your mileage will vary, depending a
lot on length of records, type of data (string? numbers? and delicate
tuning issues on the TCP stacks. (Please, nobody mention VPNs and
"long fat pipes" and "TCP selective acknowledgment" ...
http://www.erg.abdn.ac.uk/public_html/research/satcom/tcp-evol.html)

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 05:35:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA13294
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 05:35:29 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wfkk-0006l1-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 04:25:10 -0500
Received: from mailhub.fokus.gmd.de ([193.174.154.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wfkh-0006ko-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 04:25:08 -0500
Received: from fokus.gmd.de (dhcp229 [195.37.78.229])
	by mailhub.fokus.gmd.de (8.11.6/8.11.6) with ESMTP id g929HSe12444;
	Wed, 2 Oct 2002 11:17:28 +0200 (MEST)
Message-ID: <3D9AB8F5.4070209@fokus.gmd.de>
Date: Wed, 02 Oct 2002 11:14:29 +0200
From: Sebastian Zander <zander@fokus.gmd.de>
Organization: Fraunhofer FOKUS
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-DE; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: de-DE
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: Jeff Meyer <jeffm@cup.hp.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

First, for me as an advocate I find it somewhat inappropriate to comment on
other advocate drafts because I am biased of course ;). It would be a good
thing if there are other people not directly releated to the advocates who
have some opinions on the protocols. But this is only my personal feeling.

Peter Ludemann wrote:

> My comments on Jeff Meyer's comments (hopefully this discussion won't get
> indented too many levels by those who rebut me).


Lets find out by adding another level :)

 
>     - IPDR  - much richer and more formal extensibility model,
>         leveraging industry standard XML-Schema.
>         Compactness as good as other candidates (after
>         negotiation of "templates"/"descriptors"), simple
>         set of operations.
> 
> I would argue that a hierarchical format is a Bad Thing. History repeats
> itself; and the XML people are finding out what old-timers already knew:
> that there were good reasons why relational databases supplanted
> hierarchical and network databases on the 1970s ... if anybody wishes me to
> bore them with the details, just ask ... or read other people's opinions
> such as http://www.dbazine.com/pascal4.html
> 
>     - Diameter - less compact due to AVP encoding model.  Extensibility
>         model formalized, but not provided as a machine readable
>         document.  Overhead of acking makes this seem too heavyweight
>         for the requirements as specified.  Finally the requirement
>         for a recorder to support the SCTP protocol seems prohibitive,
>         since this may require kernel support lacking on several OS's.


The Diameter message definition is of course machine readable. Without
the acking there is no application layer reliability which is IMHO a bad
idea for accounting. Since one important application for IPFIX is accounting
I am wondering how how this can be done reliably without. Maybe there
could be a mode without acking for those who don't need it.

You are right that the SCTP requirement is somewhat prohibitive but I
would love to see SCTP become wide-spead. If SCTP should not make it than
probably Diameter will be run mostly over TCP.

 
>     - LFAP - has a limited (numeric id based) extensibility model.
>         Protocol is relatively simple.  The encoding is tag/len/value
>         meaning it will be less compact than IPDR or NFv9.
> 
> Compactness is a Good Thing when sending thousands of records per
> second. This is not just an issue of bandwidth; it is also an issue
> of processing time -- if you know exactly how a record is laid out,
> you can process it faster. In some cases, you can avoid copy operations,
> which can be a significant cost at high data rates. I don't see how
> tag/len/value encoding can have as high performance as externally
> defined formats.


Compactness is important but not everything. Human readability is often a nice
feature. HTTP, RTSP, SIP are following this philosophy. And an HTTP server
needs to process as much transactions/s as possible. On the other hand maybe
the IPFIX protocol will be so simple that this is not an issue. However
parsing the records is not the complete protocol. There is other stuff
do to such as security etc.

BTW templates could be used with Diameter as well. Templates and data can be
encoded as compound AVPs avoiding tag/len overhead. Most IPFIX attributes
are not yet defined within Diameter anyway. But again I think the record
format is only a part of the protocol. There is other stuff like the message
exchange, security, vendor extensibility mechanism, capability exchange etc.


> BTW, doesn't the Diameter spec say that it can use UDP, TCP, or SCTP?


It can use TCP, SCTP but not UDP.

> (I would love to require SCTP for CRANE; but as it is not wide-spread
> yet, we must allow the possibility of TCP for now.)


Probably this is true for Diameter as well

 
>     - NFv9  - compact, but extensibility model (templates) don't
>         provide the set of information which IPDR does.  Relatively
>         simple.
> 
>     - CRANE - proprietary vendor format.  More complex than is
>         needed for IPFIX use case (20 different operation codes).
>         Template based (like NFv9), has similar lack of formalism
>         in actual definition of extensions.
> 
> "Proprietary vendor format" is irrelevant. Netscape, LFAP, NetFlow will
> all be released under IETF rules if they are adopted as standards.
> 
> The alleged complexity in CRANE is to provide the necessary level of
> reliability and flexibility in the templates. One specific design goal
> was to allow the exporter to be informed of which fields were needed,
> so that it could adjust its processing accordingly (for our PacketSight
> probe, we can see roughly 3:1 performance change, depending on the
> amount of metrics and attributes that are collected). If these are left
> out, the number of operation codes drops by 1/3. Remove the operations
> for multiplexing sessions on a connection (which would be unnecessary
> if we could mandate SCTP) and we're down to 11 operations. 4 of these
> are for flow control; 3 are for status reporting.
> 
> Anyway, the number of operations is irrelevant (most of the template
> operations have similar content) ... the tricky thing in implementing
> CRANE is getting the reliability and fail-over definitions just right.
> 
> As to "lack of formalism", which appears to be a sin shared by
> all by IPDR ... all I can say is that I have taken enough
> graduate-level courses in formal semantics to have become
> deeply sceptical of any claim of a "formal model". (Anybody remember
> the 2nd Algol-68 Report?) In the end, everything boils down to
> agreements about the meanings of words. And there's nothing
> stopping future standards that define precisely the meanings
> of "upstreamByteCount", "applicationResponseTime", etc. which can
> then be used by everybody. (Or some kind of registration process,
> such as IANA's.)
> 
> - peter
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 
> 


Cheers,

Sebastian

-- 
Sebastian Zander                         E-mail: zander@fokus.fhg.de
FhI FOKUS / Global Networking (GloNe)    Tel: +49-30-3463-7287
Kaiserin-Augusta-Allee 31                Fax: +49-30-3463-8287
D-10589 Berlin, Germany                  www.fokus.fhg.de/usr/sebastian.zander




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 08:40:50 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA17072
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 08:40:50 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wicL-00059C-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 07:28:41 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wicH-00058L-00; Wed, 02 Oct 2002 07:28:37 -0500
Received: from riverstonenet.com ([134.141.180.89]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 2 Oct 2002 05:28:04 -0700
Message-ID: <3D9AE5E5.A9C17CFE@riverstonenet.com>
Date: Wed, 02 Oct 2002 08:26:13 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: Peter Ludemann <peter.ludemann@xacct.com>,
        req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 5.8
References: <7B802811BE77D51189910002A55CFD2C0419F82D@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 02 Oct 2002 12:28:04.0694 (UTC) FILETIME=[27F0C760:01C26A0F]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Reinaldo Penno wrote:
> 
> Hello Paul,
> 
> I think that the ipfix *Architecture* needs to cover more than the
> protocol. But the protocol should cover only..the protocol. Maybe the
> right word is "solution"...
> 
> I mean, the solution/architecture ( IPfix internal device
> implementation + IPfix protocol) must meet certain requirements
> (metering, observations domains, scalability, etc, etc)...
> 
> But the evaluation of the protocol part IMO shouldn't take into
> consideration metering requirements such as the one I posted. Let's
> see if there are other opinions on this besides Peter's.

	Agreed. Your choice of terms works for me as well.
	Basically "messages & message formats" == "protocol"
	and "protocol + processing/semantics" == "architecture".

	Paul
> 
> regards,
> 
> Reinaldo
> 
> > -----Original Message-----
> > From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
> > Sent: Tuesday, October 01, 2002 9:49 AM
> > To: Peter Ludemann
> > Cc: Penno, Reinaldo [BL60:0430:EXCH]; req;
> > ipfix-eval-team@net.doit.wisc.edu
> > Subject: Re: [ipfix-req] IPFIX Requirement draft status - section
> 5.8
> >
> >
> >
> > I think maybe you are using to narrow a definition of the
> > term "protocol". The IPFIX protocol specification needs to
> > cover more than the message format and message exchange.
> >
> > Paul
> >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 08:53:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA17716
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 08:53:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wipk-0005Vw-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 07:42:32 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wipg-0005VA-00; Wed, 02 Oct 2002 07:42:28 -0500
Received: from riverstonenet.com ([134.141.180.89]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 2 Oct 2002 05:41:55 -0700
Message-ID: <3D9AE924.5E1DA94C@riverstonenet.com>
Date: Wed, 02 Oct 2002 08:40:04 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        req <ipfix-req@net.doit.wisc.edu>, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 6.3.2
References: <AMEKJFAIEIKCBNABBMPNOEFEDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 02 Oct 2002 12:41:55.0714 (UTC) FILETIME=[17445E20:01C26A11]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> calato@riverstonenet.com wrote Tuesday, October 01, 2002 7:53 AM
> (with various [snip]s):
> 
> >       3. Transport reliability
> >       4. Application layer reliability
> >       5. Tracking data loss (statistics)
> >
> >       With #3 a certain amount of data may be lost when the
> >       connection goes down but given a valid connection the
> >       data has guaranteed delivery.
> 
> And there must be sufficient information so that de-duplication
> can be done at the receiving end (it is impossible to design
> fail-over such that no duplicates occur).
> 
> >       With #4, the application needs to acknowledge receipt
> >       of messages .... Does [ACK] only mean message received
> >       or does it mean message recieved and processed (i.e. persisted
> >       in case of failure).
> 
> I am not sure that this is part of the protocol (for example, the
> TCP spec does not make this clear; but all TCP implementations that
> I know of send ACK only at the socket level -- but there is nothing
> stopping somebody from implementing TCP such that the ACK happens
> when the data have been fully processed ... in fact, the existence
> of such implementations would have greatly simplified our work).
> 
> However, a useful implementation would ACK only when the data have
> been processed in such a way as to allow recovery after a crash.
> Otherwise, there's not much point in having a reliable protocol:
> ordinary TCP would suffice.

	This is why we need to define it as part of the
	protocol. Otherwise some implementations will ack as
	soon as the message is seen and others will ack after
	the message is persisted. The former doesn't provide
	any crash protection and thus, as you stated, might as well
	just use TCP.

> 
> > Also, since different applications require different levels of
> > reliability, is this aspect tunable? The main reason, I think, for
> > making it tunable would be if there is a significant performance
> > difference between the levels.
> 
> The protocol must not prevent an efficient reliability mechanism at
> the receiver. I think it is sufficient that the protocol allows a
> delay of reception of ACKs (e.g., records 1-100 are sent, and then
> ACK for 1-50 is received).

	Right, but my question is do we define one level or reliability
	for all	or allow multiple levels. One level for all IMHO significantly
	reduces the specification, implementation and inter operability
	issues. However, allowing multiples may allow significant
	performance increases when the extra reliability is not needed.
	I'm not sure which is the best way to go.

	Paul

> 
> - peter

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 09:05:00 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA18392
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 09:05:00 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wj2q-0005w9-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 07:56:04 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wj2n-0005vm-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 07:56:01 -0500
Received: from riverstonenet.com ([134.141.180.89]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 2 Oct 2002 05:55:28 -0700
Message-ID: <3D9AEC51.BA498740@riverstonenet.com>
Date: Wed, 02 Oct 2002 08:53:37 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: Michael MacFaden <mrm@riverstonenet.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFIDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 02 Oct 2002 12:55:29.0016 (UTC) FILETIME=[FC086780:01C26A12]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> Michael MacFaden wrote Wednesday, October 02, 2002 12:14 AM
> 
> > Having spent a few years debugging snmp agents/mgmt apps,
> > I believe compact formats may imply a tradeoff with
> > debugging and diagnosis capability.
> 
> Agree ... (optional) MD5 checksums would have saved me a few
> grey hairs. One unnamed embedded OS's faulty TCP stacks didn't
> would have been detected much faster with this ...
> 
> > Unless your modified tcpdump is capable of caching the template and
> > its offsets, one can't simply figure out from a given pdu
> > if something is askew.
> > Detecting encoding errors (off by one, etc) in such protocols
> > I think will be rather difficult.
> 
> I have a Perl script that you might enjoy. But it only works
> with CRANE. :-)
> [Hint: do this in two steps: first step extracts records from
> the stream and deals with issues such as retransmits; second
> step interprets the records]
> 
> > If one reads the LFAP protocol spec, specifically the List IE,
> > one can see that even AVPs values can be compacted by
> > being able to use repeat counts. BGP over TCP seems to be doing just
> > fine scaling with its avp encoding scheme to send thousands of
> > route entries.
> 
> Agreed.
> 
> However, we have encountered some situations where saving a single
> copy operation per output recordcan make all the difference between
> being able to deliver the data and not. It's highly unlikely that
> an application will keep data in AVP form, so AVP requires copies.
> If the protocol packs the data into something that a C programmer
> might do with a "struct", then memory-to-memory copying can be
> avoided.

	Having done a fair amount of tuning on a collector I find
	it interesting that your performance hinged on a memory
	copy. In my experince performance was limited by how fast the 
	disk writes are. 
> 
> > I would really like to see us figure out the overall "bandwidth usage"
> > and "cpu/memory usage" in a real network protocol than judging just
> > one aspect such as compact encoding.
> > Factors such as protocol statefullness and cpu time to process
> > any given PDU come into play and may overshadow any one aspect of
> > the the initial (useful) criteria posted.
> 
> My experience is that once you go past a few thousand records per
> second, life becomes miserable in determining processing bottlenecks.
> For example, timeliness of ACKs can be important (especially when
> ACKs are constrained by persistency issues). When you get into the
> 10Ks/sec range, a certain amount of purple magic smoke helps.
> 
> > Since all the prospective protocols have existed for some time in
> > their current form in real networks, it shouldn't be hard to gather
> > some real data. Dave Plonka probably already has some sort of test
> > bed/sample input :-)
> 
> Well, I don't think he has CRANE, unless he has implemented it from
> scratch. :-) As things stand, even I can't give you a maximum throughput
> number right now for CRANEbecause my testbed is transitioning to a
> "new improved" collector. Also, your mileage will vary, depending a
> lot on length of records, type of data (string? numbers? and delicate
> tuning issues on the TCP stacks. (Please, nobody mention VPNs and
> "long fat pipes" and "TCP selective acknowledgment" ...
> http://www.erg.abdn.ac.uk/public_html/research/satcom/tcp-evol.html)
> 
> - peter
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 09:09:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA18691
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 09:09:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wj8o-00065f-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 08:02:14 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wj8m-00064n-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 08:02:12 -0500
Received: from riverstonenet.com ([134.141.180.89]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 2 Oct 2002 06:01:39 -0700
Message-ID: <3D9AEDC2.14852887@riverstonenet.com>
Date: Wed, 02 Oct 2002 08:59:46 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Sebastian Zander <zander@fokus.gmd.de>
CC: Peter Ludemann <peter.ludemann@xacct.com>, Jeff Meyer <jeffm@cup.hp.com>,
        ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9AB8F5.4070209@fokus.gmd.de>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 02 Oct 2002 13:01:40.0255 (UTC) FILETIME=[D94EFAF0:01C26A13]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Sebastian Zander wrote:
> 
> First, for me as an advocate I find it somewhat inappropriate to comment on
> other advocate drafts because I am biased of course ;). It would be a good
> thing if there are other people not directly releated to the advocates who
> have some opinions on the protocols. But this is only my personal feeling.

	For the most part I have refrained for the same reason.

	Unfortunately the advocates are likely the ones in the best
	position to comment. So we've taken 5 strong voices out of the
	discussion. At some point we'll we'll need to open the
	flood gates. Maybe after the evals come out.
	
	Paul
> 
> Peter Ludemann wrote:
> 
> > My comments on Jeff Meyer's comments (hopefully this discussion won't get
> > indented too many levels by those who rebut me).
> 
> Lets find out by adding another level :)
> 
> 
> >     - IPDR  - much richer and more formal extensibility model,
> >         leveraging industry standard XML-Schema.
> >         Compactness as good as other candidates (after
> >         negotiation of "templates"/"descriptors"), simple
> >         set of operations.
> >
> > I would argue that a hierarchical format is a Bad Thing. History repeats
> > itself; and the XML people are finding out what old-timers already knew:
> > that there were good reasons why relational databases supplanted
> > hierarchical and network databases on the 1970s ... if anybody wishes me to
> > bore them with the details, just ask ... or read other people's opinions
> > such as http://www.dbazine.com/pascal4.html
> >
> >     - Diameter - less compact due to AVP encoding model.  Extensibility
> >         model formalized, but not provided as a machine readable
> >         document.  Overhead of acking makes this seem too heavyweight
> >         for the requirements as specified.  Finally the requirement
> >         for a recorder to support the SCTP protocol seems prohibitive,
> >         since this may require kernel support lacking on several OS's.
> 
> The Diameter message definition is of course machine readable. Without
> the acking there is no application layer reliability which is IMHO a bad
> idea for accounting. Since one important application for IPFIX is accounting
> I am wondering how how this can be done reliably without. Maybe there
> could be a mode without acking for those who don't need it.
> 
> You are right that the SCTP requirement is somewhat prohibitive but I
> would love to see SCTP become wide-spead. If SCTP should not make it than
> probably Diameter will be run mostly over TCP.
> 
> 
> >     - LFAP - has a limited (numeric id based) extensibility model.
> >         Protocol is relatively simple.  The encoding is tag/len/value
> >         meaning it will be less compact than IPDR or NFv9.
> >
> > Compactness is a Good Thing when sending thousands of records per
> > second. This is not just an issue of bandwidth; it is also an issue
> > of processing time -- if you know exactly how a record is laid out,
> > you can process it faster. In some cases, you can avoid copy operations,
> > which can be a significant cost at high data rates. I don't see how
> > tag/len/value encoding can have as high performance as externally
> > defined formats.
> 
> Compactness is important but not everything. Human readability is often a nice
> feature. HTTP, RTSP, SIP are following this philosophy. And an HTTP server
> needs to process as much transactions/s as possible. On the other hand maybe
> the IPFIX protocol will be so simple that this is not an issue. However
> parsing the records is not the complete protocol. There is other stuff
> do to such as security etc.
> 
> BTW templates could be used with Diameter as well. Templates and data can be
> encoded as compound AVPs avoiding tag/len overhead. Most IPFIX attributes
> are not yet defined within Diameter anyway. But again I think the record
> format is only a part of the protocol. There is other stuff like the message
> exchange, security, vendor extensibility mechanism, capability exchange etc.
> 
> > BTW, doesn't the Diameter spec say that it can use UDP, TCP, or SCTP?
> 
> It can use TCP, SCTP but not UDP.
> 
> > (I would love to require SCTP for CRANE; but as it is not wide-spread
> > yet, we must allow the possibility of TCP for now.)
> 
> Probably this is true for Diameter as well
> 
> 
> >     - NFv9  - compact, but extensibility model (templates) don't
> >         provide the set of information which IPDR does.  Relatively
> >         simple.
> >
> >     - CRANE - proprietary vendor format.  More complex than is
> >         needed for IPFIX use case (20 different operation codes).
> >         Template based (like NFv9), has similar lack of formalism
> >         in actual definition of extensions.
> >
> > "Proprietary vendor format" is irrelevant. Netscape, LFAP, NetFlow will
> > all be released under IETF rules if they are adopted as standards.
> >
> > The alleged complexity in CRANE is to provide the necessary level of
> > reliability and flexibility in the templates. One specific design goal
> > was to allow the exporter to be informed of which fields were needed,
> > so that it could adjust its processing accordingly (for our PacketSight
> > probe, we can see roughly 3:1 performance change, depending on the
> > amount of metrics and attributes that are collected). If these are left
> > out, the number of operation codes drops by 1/3. Remove the operations
> > for multiplexing sessions on a connection (which would be unnecessary
> > if we could mandate SCTP) and we're down to 11 operations. 4 of these
> > are for flow control; 3 are for status reporting.
> >
> > Anyway, the number of operations is irrelevant (most of the template
> > operations have similar content) ... the tricky thing in implementing
> > CRANE is getting the reliability and fail-over definitions just right.
> >
> > As to "lack of formalism", which appears to be a sin shared by
> > all by IPDR ... all I can say is that I have taken enough
> > graduate-level courses in formal semantics to have become
> > deeply sceptical of any claim of a "formal model". (Anybody remember
> > the 2nd Algol-68 Report?) In the end, everything boils down to
> > agreements about the meanings of words. And there's nothing
> > stopping future standards that define precisely the meanings
> > of "upstreamByteCount", "applicationResponseTime", etc. which can
> > then be used by everybody. (Or some kind of registration process,
> > such as IANA's.)
> >
> > - peter
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >
> 
> Cheers,
> 
> Sebastian
> 
> --
> Sebastian Zander                         E-mail: zander@fokus.fhg.de
> FhI FOKUS / Global Networking (GloNe)    Tel: +49-30-3463-7287
> Kaiserin-Augusta-Allee 31                Fax: +49-30-3463-8287
> D-10589 Berlin, Germany                  www.fokus.fhg.de/usr/sebastian.zander
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 11:23:30 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA24415
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 11:23:30 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wlEK-0001mF-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 10:16:04 -0500
Received: from mailhost2.auckland.ac.nz ([130.216.1.4])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wlEB-0001lx-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 10:15:55 -0500
Received: from mailhost.auckland.ac.nz (IDENT:mirapoint@mailhost [130.216.191.61])
	by mailhost2.auckland.ac.nz (8.9.2/8.9.2/8.9.2-ua) with ESMTP id DAA10981
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 3 Oct 2002 03:15:52 +1200 (NZST)
Received: from postbox.auckland.ac.nz (postbox.auckland.ac.nz [130.216.191.126])
	by mailhost.auckland.ac.nz (Mirapoint Messaging Server MOS 3.2.1.6-EA)
	with ESMTP id AIJ78144;
	Thu, 3 Oct 2002 03:15:51 +1200 (NZST)
Received: from localhost (hotlava.auckland.ac.nz [130.216.191.123])
	by postbox.auckland.ac.nz (8.11.6/8.11.6) with ESMTP id g92FFpJ10987
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 3 Oct 2002 03:15:51 +1200
Received: from 129.69.30.65 ([129.69.30.65]) 
	by hotlava.auckland.ac.nz (IMP) with HTTP 
	for <jbro111@postbox.auckland.ac.nz>; Thu,  3 Oct 2002 03:15:51 +1200
Message-ID: <1033571751.3d9b0da788782@hotlava.auckland.ac.nz>
Date: Thu,  3 Oct 2002 03:15:51 +1200
From: Nevil Brownlee <n.brownlee@auckland.ac.nz>
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Re: Discussion of Candidate Protocols
MIME-Version: 1.0
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
User-Agent: Internet Messaging Program (IMP) 4.0-cvs
X-Originating-IP: 129.69.30.65
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


Hi all:

Sebastian and Paul have made very polite remarks about the advocates
holding back from discussing the candidate protocols.  But there's
no need for that!  Do please feel free to comment on the other proposals,
robust debate on the list will help everyone understand the differences
between the protocols.

Cheers, Nevil

-----------------------------------------------------------------------
   Nevil Brownlee                   Director, Technology Development
   Phone: +64 9 373 7599 x8941      ITSS, The University of Auckland
   FAX: +64 9 373 7021      Private Bag 92019, Auckland, New Zealand

-------------------------------------------------
This mail sent through IMP: http://horde.org/imp/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  2 23:52:58 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA16299
	for <ipfix-archive@lists.ietf.org>; Wed, 2 Oct 2002 23:52:58 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17wwna-0000Vu-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 02 Oct 2002 22:37:14 -0500
Received: from [208.253.219.211] (helo=narus.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17wwnY-0000VF-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 02 Oct 2002 22:37:12 -0500
Received: from franklin.narus.com (franklin.narus.com [192.168.7.140])
	by narus.com (8.11.6/8.11.6) with ESMTP id g933YWu05534;
	Wed, 2 Oct 2002 20:34:33 -0700
Received: by franklin.narus.com with Internet Mail Service (5.5.2655.55)
	id <4CNBFRCR>; Wed, 2 Oct 2002 20:34:33 -0700
Message-ID: <580E532D9F7A9B4BAE8A130848E0DDA702083A03@franklin.narus.com>
From: Stas Khirman <StasK@Narus.com>
To: "'Peter Ludemann'" <peter.ludemann@xacct.com>,
        Jeff Meyer
	 <jeffm@cup.hp.com>, ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Wed, 2 Oct 2002 20:34:28 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2655.55)
Content-Type: text/plain;
	charset="iso-8859-1"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Peter Ludemann wrote:
> My comments on Jeff Meyer's comments (hopefully this 
> discussion won't get
> indented too many levels by those who rebut me).
> 
>     - IPDR  - much richer and more formal extensibility model,
>         leveraging industry standard XML-Schema.
>         Compactness as good as other candidates (after
>         negotiation of "templates"/"descriptors"), simple
>         set of operations.
> 
> I would argue that a hierarchical format is a Bad Thing. 
> History repeats
> itself; and the XML people are finding out what old-timers 
> already knew:
> that there were good reasons why relational databases supplanted
> hierarchical and network databases on the 1970s ... if 
> anybody wishes me to
> bore them with the details, just ask ... or read other 
> people's opinions
> such as http://www.dbazine.com/pascal4.html

I do not think that relational/XML database example is valid at this point -
even good old DB applications aren't build on top of one big flat table. In
general, telecommunication applications are dealing with complex structural
objects. It is why virtually all Telco standards are based on structural
data/signal representations (old good ASN.1!).  IPDR.org had recognized that
we are not dealing with a "flat" objects - it is why structural ( I prefer
this term over "hierarchical") representation are suggested. XML is chosen
as a convenient tool to express and validate this structure. BTW, earliest
IPDR draft used traditional ASN.1 approach, but it had been replaced by XML
- myriad debugging, testing, support, processing and so on tools are
available (many for free). Binary encoded IPDR ( as suggested in IETF
submission) is free from major XML obstacles (transmission overhead and
parsing performance) but retain major XML advantages (structure,
extensibility, possibility for verification and wide set of tools to
support).
Bottom line: IPDR suggest to use structural, formal , extensible model to
complex objects reports. XML is just a tool to express this formalization
(one of many!!).

> 
>     - Diameter - less compact due to AVP encoding model.  
> Extensibility
>         model formalized, but not provided as a machine readable
>         document.  Overhead of acking makes this seem too heavyweight
>         for the requirements as specified.  Finally the requirement
>         for a recorder to support the SCTP protocol seems prohibitive,
>         since this may require kernel support lacking on several OS's.
> 
>     - LFAP - has a limited (numeric id based) extensibility model.
>         Protocol is relatively simple.  The encoding is tag/len/value
>         meaning it will be less compact than IPDR or NFv9.
> 
> Compactness is a Good Thing when sending thousands of records per
> second. This is not just an issue of bandwidth; it is also an issue
> of processing time -- if you know exactly how a record is laid out,
> you can process it faster. In some cases, you can avoid copy 
> operations,
> which can be a significant cost at high data rates. I don't see how
> tag/len/value encoding can have as high performance as externally
> defined formats.
> 

Hm, I do not think that memcopy operation could have a significant impact.
Let's assume we are dealing with 10,000 records per second 100 bytes each.
It is mean that in worst case we have to copy 1Mbyte - 250,000 copy
operations per second on 32 bit processor. I'm sure it will take only a
fraction of one percent on any normal CPU, am I wrong? BTW, majority of TCP
stack implementations are doing few memory copies anyway. 


> BTW, doesn't the Diameter spec say that it can use UDP, TCP, or SCTP?
> (I would love to require SCTP for CRANE; but as it is not wide-spread
> yet, we must allow the possibility of TCP for now.)
> 
>     - NFv9  - compact, but extensibility model (templates) don't
>         provide the set of information which IPDR does.  Relatively
>         simple.
> 
>     - CRANE - proprietary vendor format.  More complex than is
>         needed for IPFIX use case (20 different operation codes).
>         Template based (like NFv9), has similar lack of formalism
>         in actual definition of extensions.
> 
> "Proprietary vendor format" is irrelevant. Netscape, LFAP, 
> NetFlow will
> all be released under IETF rules if they are adopted as standards.
> 

Availability of the open-source tested multi-vendor implementation is not a
negligible reason for protocol choice. I have no detailed information about
DIAMETER, but IPDR implementation is tested, corrected, extended and adopted
by collective effort of something like 20-30 vendors ( Jeff , please correct
me if I'm wrong in numbers).


> The alleged complexity in CRANE is to provide the necessary level of
> reliability and flexibility in the templates. One specific design goal
> was to allow the exporter to be informed of which fields were needed,
> so that it could adjust its processing accordingly (for our 
> PacketSight
> probe, we can see roughly 3:1 performance change, depending on the
> amount of metrics and attributes that are collected). If 
> these are left
> out, the number of operation codes drops by 1/3. Remove the operations
> for multiplexing sessions on a connection (which would be unnecessary
> if we could mandate SCTP) and we're down to 11 operations. 4 of these
> are for flow control; 3 are for status reporting.

Indeed, CRANE capability to eliminate some of attributes is a nice feature,
however it is not clear why it have to be done using in-band signaling. It
certainly overcomplicates protocol and make it hard manageable when someone
deal with one to many ( multiple consumers) communication. Also, many
accounting applications have to use "store and forward" model which breaks
in-band configuration approach. In IPDR case, configuration could be
expressed as a specific XML-Schema and delivered to IPDR producer out-band (
it is not clear if this configuration step have to be standardized at all -
any ideas are very welcome). Transmitted IPDR records always refer to
specification used to produce them - you could store records for years
without fear to lost association with a specification.
IPDR ability to specify in machine/human readable format structure of
transmitted information is a crucial feature when you deal with a
financially sensitive information. This feature provide consuming
application with abilities to verify, store , convert, process or transform
into another format without fear of misconfiguration or version
incompatibility. (Elimination of the external registration process is one
more small, but nice advantage - just remember RADIUS port conflict
problem.)



Disclaimer: Being a author of early IPDR drafts, I have to be considered as
a VERY biased IPDR advocate.


Regards
Stas Khirman

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct  3 12:28:25 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22793
	for <ipfix-archive@lists.ietf.org>; Thu, 3 Oct 2002 12:28:24 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17x8UR-0005lJ-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 03 Oct 2002 11:06:15 -0500
Received: from palrel12.hp.com ([156.153.255.237])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17x8UP-0005lA-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 03 Oct 2002 11:06:13 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP
	id 542D2E00EDD; Thu,  3 Oct 2002 09:06:12 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id JAA17663;
	Thu, 3 Oct 2002 09:06:07 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021003163711.HCWJ18196.simail.cup.hp.com@cup.hp.com>;
          Thu, 3 Oct 2002 09:37:11 -0700
Message-ID: <3D9C6B6C.6010803@cup.hp.com>
Date: Thu, 03 Oct 2002 09:08:12 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   In this message I just wanted to respond the the
discussion around "hierarchical formats".  Since
the comment indicates the author has not actually
read IPDR...

   The current version of IPDR does in fact require
that data be delivered in First Normal Form (just
like Relational DB's).

   IPDR specifies a SUBSET of the rich (overly so?)
vocabulary of XML Schema.

   So, if you look at the schema proposed for IPFIX
(in Appendix A of the Advocacy draft), you will see
that all of the values are laid out side by side,
no nested structures, no repeating of fields.

   <complexType name="SimpleV4Flow">
     <extension base="ipdr:IPDR">
       <sequence>
         <element ref="sourceAddress" minOccurs="1"/>
         <element ref="destinationAddress" minOccurs="1"/>
         <element ref="protocolIdentifier" minOccurs="1"/>
         <element ref="sourcePort" minOccurs="1"/>
         <element ref="destinationPort" minOccurs="1"/>
         <element ref="ingressPort" minOccurs="1"/>
         <element ref="egressPort" minOccurs="1"/>
         <element ref="packetCount" minOccurs="1"/>
         <element ref="byteCount" minOccurs="1"/>
         <element ref="classOfService" minOccurs="0"/>
         <element ref="flowLabel" minOccurs="0"/>
         <element ref="flowCreationTime" minOccurs="1"/>
         <element ref="flowEndTime" minOccurs="1"/>
         <element ref="tcpControlBits" minOccurs="0"/>
         <element ref="samplingInterval" minOccurs="0"/>
         <element ref="samplingAlgorithm" minOccurs="0"/>
         <element ref="sourceExporterAddress" minOccurs="1"/>
       </sequence>
     </extension>
   </complexType>

   Also to clarify.  The proposed protocol uses Compact
IPDR format.  The wire protocol IS NOT XML, rather XML
is simply used to model the data which is sent.  So
in the example above, the record representing
a flow would have a descriptor identifying the type
of IPDRRecord being encoded followed by the
integer values one next to the other (i.e. 4 bytes/
field).

   Now this modelling has the benefit that it ALSO
defines an equivalent XML encoding for the same
compact content.  And in addition, since it is FNF,
the definition can also be used to define how this
information is to be stored in a DB.

   So you have one description language, based on
XML Schema, a wire protocol, a binary format,
an XML format and a DB mapper, in a single document.


   Show me how that is done w/ the  other proposed
drafts?


Regards,

   Jeff Meyer

P.S.  I am in the process of defining extensions to
IPDR to enable more structured data.  (i.e. repeating
fields and fields which are not of a primitive type).
However this capability does not appear to be required
for IPFIX.

The bottom line however is that flat data



Peter Ludemann wrote:

> My comments on Jeff Meyer's comments (hopefully this discussion won't get
> indented too many levels by those who rebut me).
> 
>     - IPDR  - much richer and more formal extensibility model,
>         leveraging industry standard XML-Schema.
>         Compactness as good as other candidates (after
>         negotiation of "templates"/"descriptors"), simple
>         set of operations.
> 
> I would argue that a hierarchical format is a Bad Thing. History repeats
> itself; and the XML people are finding out what old-timers already knew:
> that there were good reasons why relational databases supplanted
> hierarchical and network databases on the 1970s ... if anybody wishes me to
> bore them with the details, just ask ... or read other people's opinions
> such as http://www.dbazine.com/pascal4.html




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct  3 14:02:03 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA28224
	for <ipfix-archive@lists.ietf.org>; Thu, 3 Oct 2002 14:02:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xA7p-0000O5-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 03 Oct 2002 12:51:01 -0500
Received: from palrel10.hp.com ([156.153.255.245])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xA7n-0000Nu-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 03 Oct 2002 12:50:59 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP id 8851EC00460
	for <ipfix-eval@net.doit.wisc.edu>; Thu,  3 Oct 2002 10:50:58 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id KAA22615
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 3 Oct 2002 10:50:53 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021003182158.HDAZ18196.simail.cup.hp.com@cup.hp.com>
          for <ipfix-eval@net.doit.wisc.edu>;
          Thu, 3 Oct 2002 11:21:58 -0700
Message-ID: <3D9C83FB.2060605@cup.hp.com>
Date: Thu, 03 Oct 2002 10:52:59 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   I didn't complete my closing remark before
hitting send...

    The bottom line however is that flat data
representations (First Normal Form) do have
benefits in the ability to map directly to
a relational DB table, and as such, can simplify the
processing model for operating on large sets
of events.  When possible, mapping recorded usage
information to a flat structure is going to
increase the likelihood that off the shelf tools
can operate on it (think Excel spreadsheet).

-- Jeff


Jeff Meyer wrote:

> Hi,
> 
>   In this message I just wanted to respond the the
> discussion around "hierarchical formats".  Since
> the comment indicates the author has not actually
> read IPDR...
> 
>   The current version of IPDR does in fact require
> that data be delivered in First Normal Form (just
> like Relational DB's).
> 
>   IPDR specifies a SUBSET of the rich (overly so?)
> vocabulary of XML Schema.
> 
>   So, if you look at the schema proposed for IPFIX
> (in Appendix A of the Advocacy draft), you will see
> that all of the values are laid out side by side,
> no nested structures, no repeating of fields.
> 
>   <complexType name="SimpleV4Flow">
>     <extension base="ipdr:IPDR">
>       <sequence>
>         <element ref="sourceAddress" minOccurs="1"/>
>         <element ref="destinationAddress" minOccurs="1"/>
>         <element ref="protocolIdentifier" minOccurs="1"/>
>         <element ref="sourcePort" minOccurs="1"/>
>         <element ref="destinationPort" minOccurs="1"/>
>         <element ref="ingressPort" minOccurs="1"/>
>         <element ref="egressPort" minOccurs="1"/>
>         <element ref="packetCount" minOccurs="1"/>
>         <element ref="byteCount" minOccurs="1"/>
>         <element ref="classOfService" minOccurs="0"/>
>         <element ref="flowLabel" minOccurs="0"/>
>         <element ref="flowCreationTime" minOccurs="1"/>
>         <element ref="flowEndTime" minOccurs="1"/>
>         <element ref="tcpControlBits" minOccurs="0"/>
>         <element ref="samplingInterval" minOccurs="0"/>
>         <element ref="samplingAlgorithm" minOccurs="0"/>
>         <element ref="sourceExporterAddress" minOccurs="1"/>
>       </sequence>
>     </extension>
>   </complexType>
> 
>   Also to clarify.  The proposed protocol uses Compact
> IPDR format.  The wire protocol IS NOT XML, rather XML
> is simply used to model the data which is sent.  So
> in the example above, the record representing
> a flow would have a descriptor identifying the type
> of IPDRRecord being encoded followed by the
> integer values one next to the other (i.e. 4 bytes/
> field).
> 
>   Now this modelling has the benefit that it ALSO
> defines an equivalent XML encoding for the same
> compact content.  And in addition, since it is FNF,
> the definition can also be used to define how this
> information is to be stored in a DB.
> 
>   So you have one description language, based on
> XML Schema, a wire protocol, a binary format,
> an XML format and a DB mapper, in a single document.
> 
> 
>   Show me how that is done w/ the  other proposed
> drafts?
> 
> 
> Regards,
> 
>   Jeff Meyer
> 
> P.S.  I am in the process of defining extensions to
> IPDR to enable more structured data.  (i.e. repeating
> fields and fields which are not of a primitive type).
> However this capability does not appear to be required
> for IPFIX.
> 
> The bottom line however is that flat data
> 
> 
> 
> Peter Ludemann wrote:
> 
>> My comments on Jeff Meyer's comments (hopefully this discussion won't get
>> indented too many levels by those who rebut me).
>>
>>     - IPDR  - much richer and more formal extensibility model,
>>         leveraging industry standard XML-Schema.
>>         Compactness as good as other candidates (after
>>         negotiation of "templates"/"descriptors"), simple
>>         set of operations.
>>
>> I would argue that a hierarchical format is a Bad Thing. History repeats
>> itself; and the XML people are finding out what old-timers already knew:
>> that there were good reasons why relational databases supplanted
>> hierarchical and network databases on the 1970s ... if anybody wishes 
>> me to
>> bore them with the details, just ask ... or read other people's opinions
>> such as http://www.dbazine.com/pascal4.html
> 
> 
> 
> 
> 
> -- 
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message 
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct  3 15:58:35 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA03081
	for <ipfix-archive@lists.ietf.org>; Thu, 3 Oct 2002 15:58:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xBzY-0003JN-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 03 Oct 2002 14:50:36 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xBzW-0003Io-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 03 Oct 2002 14:50:34 -0500
Received: (qmail 29351 invoked by uid 10041); 3 Oct 2002 19:50:03 -0000
Date: Thu, 3 Oct 2002 12:50:03 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
Message-ID: <20021003195003.GE6062@riverstonenet.com>
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3D9C6B6C.6010803@cup.hp.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Thu, Oct 03, 2002 at 09:08:12AM -0700, Jeff Meyer wrote:
>  So you have one description language, based on
>XML Schema, a wire protocol, a binary format,
>an XML format and a DB mapper, in a single document.
>
>
>  Show me how that is done w/ the  other proposed
>drafts?

My main issue with such a system is do we *require*
such complexity if a simple numbering of fields
will do just fine? 

I'd really like to see the IPIFIX protocol do one thing 
and do it very well.

Delivering IP header information, as has been done
for a very long time now with NetFlow and others,
only really needs a clear definition 
of is being collected, how it is collected, 
and how to signal when the collector can't 
collect a paritcular piece of data ala RDBMS 
null indicator.  

The LFAP data spec clearly defines what is being
collected and like NetFlow are purpose built
targeted protocols. They not generic data movers.

This makes them simple as can be, consistent and 
extremely interoperable.

Regards,
Mike MacFaden


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct  3 17:42:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA06110
	for <ipfix-archive@lists.ietf.org>; Thu, 3 Oct 2002 17:42:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xDZh-0005tu-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 03 Oct 2002 16:32:01 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xDZe-0005ta-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 03 Oct 2002 16:31:58 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g93LVvO23006;
	Thu, 3 Oct 2002 17:31:57 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Thu, 3 Oct 2002 17:31:48 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E61C@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660BCEB9@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Gentle people,

My existing flow record generators provide jitter and loss
information in flow data records.  How do I do that with an
LFAP or netflow strategy?

Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street, Suite 18K
New York, New York  10022

carter@qosient.com
Phone +1 212 588-9133
Fax   +1 212 588-9134
http://qosient.com
 

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
Behalf Of Michael MacFaden
Sent: Thursday, October 03, 2002 3:50 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols


On Thu, Oct 03, 2002 at 09:08:12AM -0700, Jeff Meyer wrote:
>  So you have one description language, based on
>XML Schema, a wire protocol, a binary format,
>an XML format and a DB mapper, in a single document.
>
>
>  Show me how that is done w/ the  other proposed
>drafts?

My main issue with such a system is do we *require*
such complexity if a simple numbering of fields
will do just fine? 

I'd really like to see the IPIFIX protocol do one thing 
and do it very well.

Delivering IP header information, as has been done
for a very long time now with NetFlow and others,
only really needs a clear definition 
of is being collected, how it is collected, 
and how to signal when the collector can't 
collect a paritcular piece of data ala RDBMS 
null indicator.  

The LFAP data spec clearly defines what is being
collected and like NetFlow are purpose built
targeted protocols. They not generic data movers.

This makes them simple as can be, consistent and 
extremely interoperable.

Regards,
Mike MacFaden


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say "unsubscribe
ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct  3 18:19:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06954
	for <ipfix-archive@lists.ietf.org>; Thu, 3 Oct 2002 18:19:10 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xEBI-0006xK-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 03 Oct 2002 17:10:52 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xEBG-0006wh-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 03 Oct 2002 17:10:50 -0500
Received: (qmail 18838 invoked by uid 10041); 3 Oct 2002 22:10:20 -0000
Date: Thu, 3 Oct 2002 15:10:20 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
Message-ID: <20021003221019.GJ6062@riverstonenet.com>
References: <5C8959A16A71B449AE793CF52FBBED660BCEB9@ptah.newyork.qosient.com> <5C8959A16A71B449AE793CF52FBBED6607E61C@ptah.newyork.qosient.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607E61C@ptah.newyork.qosient.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Thu, Oct 03, 2002 at 05:31:48PM -0400, Carter Bullard wrote:
>My existing flow record generators provide jitter and loss
>information in flow data records.  How do I do that with an
>LFAP or netflow strategy?

For LFAP, build your collector as one normally would and
then just follow section 2.45 of 
http://www.ietf.org/internet-drafts/draft-riverstone-lfap-data-01.txt

My point was/is simply this. 
We should consider the feature/complexity tradeoff 
for each criteria considered in context of the problem 
being solved. 

My personal belief is that IPFIX does not stand for 
GDMP (Generic Data Mover Protocol). 

Regards,
Mike MacFaden

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct  3 20:15:32 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA08987
	for <ipfix-archive@lists.ietf.org>; Thu, 3 Oct 2002 20:15:32 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xG0R-00022w-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 03 Oct 2002 19:07:47 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xG0P-00022q-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 03 Oct 2002 19:07:45 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9407iO23166;
	Thu, 3 Oct 2002 20:07:44 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Thu, 3 Oct 2002 20:07:35 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660BCF51@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Mike,
   Thanks, but I want to note that netflow cannot support
much in the way of extensions, so simply describing existing
practice and defining a standard to support those observations
is not going to do the job for my customers.

   In writing this response I found myself criticizing LFAP
quite a bit, and I didn't really want to do that, but I'm going to
leave some of my issues in hopes that it will help the process.
I hope that some do find it useful, and I welcome any comment.

   One question.  None of the candidates are perfect.  If we
adopt one, what will be the process that we go through to
'correct' any issues?  I'm sure it has been described, but
could someone paraphrase?

Thanks,

Carter


Comments on LFAP as IPFIX candidate.


I don't see that LFAP is a solution to the flow record transport
problems that I worry about, which is the efficient, reliable
and secure transport of any vendors flow records, and I'm
particularly concerned with at least one of the basic architectural
positions that LFAP takes, the protocol complexity and
its Information Model.

The biggest issue with the architecture is timestamps.  My
understanding reading the lfap-eval, is that timestamps 
relate to the flow cache rather than the wire-line timestamps of
the packet stream that is being monitored.  If true, I believe
that this is huge problem, as it will introduce a lot of
timestamp variance that cannot be adjusted for, rendering
the data very limited in its usefulness.  The IPPM framework
devotes a large amount of time and effort describing how a monitor
should deal with timestamps of packets, and an IPFIX monitor
should comply with the IPPM framework on this.  Anything less
would be networking 'malpractice', if there ever could be such
a thing.

I think the protocol has too many message types.  Don't need
a separate turn for VR/VRA, and AR/ARA you should be able to
present the VR/CR/AR information elements in a single message and
then get a single response.

The concept that you can support the division of FAR and FUN
messages generate great potential problems.  If I connect at some
arbitrary point and don't receive the FAR message, how do I
process FUN messages, which don't have flow descriptors?

With regard to the Information Model,  I sense that I would
put my entire record in a single vendor specific IE and leave it
at that.  While a drastic statement, its not too far from the
truth.

Just to innumerate a few problems I have with LFAP's basic
data definitions, and this is not an exhaustive set, of course.

Best time granularity of 10's of milliseconds (1/100th of a sec)
is not good, uSec minimum, nanoSec preferable.

The requirement that the FAS/CCE's must be globally unique, and then
you start adding ones to them on roll over (how do you ensure that
the FAS is still globally unique?) is a big issue (locally unique?)

The concepts of the Flow Qualifier checkpoint and priority are
completely proprietary, they should be vendor specific OIDs?

64 bit counters for packets and bytes in every record, when over
90% of all flows have less than 256 packets and 8K of bytes in the
entire flow?  We should have 1, 2, 4 and 8 byte counter IEs as
needed, don't you think?

The IpId field is 16 bits but the IE to report it is 64 bits long.
Why not a 32 bit field for those special values that are 8-16 bits
long?  Why not have a composite IE, like an IP header attribute
IE, which could have the IpId, Tos, TTL, and option indicators all
in a single IE?  Why not an IE for the classic 5-tuple flow?

Minor points, but important points for my products.

Carter
 

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
Behalf Of Michael MacFaden
Sent: Thursday, October 03, 2002 6:10 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols


On Thu, Oct 03, 2002 at 05:31:48PM -0400, Carter Bullard wrote:
>My existing flow record generators provide jitter and loss information 
>in flow data records.  How do I do that with an LFAP or netflow 
>strategy?

For LFAP, build your collector as one normally would and
then just follow section 2.45 of 
http://www.ietf.org/internet-drafts/draft-riverstone-lfap-data-01.txt

My point was/is simply this. 
We should consider the feature/complexity tradeoff 
for each criteria considered in context of the problem 
being solved. 

My personal belief is that IPFIX does not stand for 
GDMP (Generic Data Mover Protocol). 

Regards,
Mike MacFaden

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say "unsubscribe
ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 05:30:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27006
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 05:30:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xOZy-0007ch-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 04:17:02 -0500
Received: from mailhub.fokus.gmd.de ([193.174.154.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xOZw-0007cH-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 04:17:00 -0500
Received: from fokus.gmd.de (dhcp229 [195.37.78.229])
	by mailhub.fokus.gmd.de (8.11.6/8.11.6) with ESMTP id g9499Oe04494;
	Fri, 4 Oct 2002 11:09:24 +0200 (MEST)
Message-ID: <3D9D5A10.2030906@fokus.gmd.de>
Date: Fri, 04 Oct 2002 11:06:24 +0200
From: Sebastian Zander <zander@fokus.gmd.de>
Organization: Fraunhofer FOKUS
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-DE; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: de-DE
MIME-Version: 1.0
To: Jeff Meyer <jeffm@cup.hp.com>
CC: Peter Ludemann <peter.ludemann@xacct.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Jeff Meyer wrote:

[...]
> 
>   So you have one description language, based on
> XML Schema, a wire protocol, a binary format,
> an XML format and a DB mapper, in a single document.
> 
> 
>   Show me how that is done w/ the  other proposed
> drafts?

Jeff,


its very nice to have these things but I don't think its
a good idea to have them in one document. IMHO the main
focus here is on the protocol. Working on all the things
at once will only slow down the standardization process.
I am also wondering if the IETF would ever standardize
things like binary formats. Probably not.

Furthermore I am not convinced that it is a good idea to
standardize things like DB mapper or binary formats. E.g.
there exist a number of different formats and some people
may want to continue using them. But informational RFCs
could cover all these things.

To summarize my point: the evaluation should focus on the
protocol and its capabilities and not on things storage
formats etc.

BTW Diameter has a proposed XML definition as well
(draft-frascone-aaa-xml-dictionary-00.html). Another proposal
was to use SMIng (draft-schoenw-sming-dia-00.txt).

Cheers,

Sebastian


-- 
Sebastian Zander                         E-mail: zander@fokus.fhg.de
FhI FOKUS / Global Networking (GloNe)    Tel: +49-30-3463-7287
Kaiserin-Augusta-Allee 31                Fax: +49-30-3463-8287
D-10589 Berlin, Germany                  www.fokus.fhg.de/usr/sebastian.zander




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 12:30:14 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12107
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 12:30:13 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xVB2-0004E1-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 11:19:44 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xVB0-0004DL-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 11:19:42 -0500
Received: from riverstonenet.com ([134.141.180.93]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Fri, 4 Oct 2002 09:19:07 -0700
Message-ID: <3D9DBF0A.1DCD90FE@riverstonenet.com>
Date: Fri, 04 Oct 2002 12:17:14 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: carter@qosient.com
CC: "'Michael MacFaden'" <mrm@riverstonenet.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 04 Oct 2002 16:19:07.0824 (UTC) FILETIME=[C3D60B00:01C26BC1]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter Bullard wrote:
> 
> Hey Mike,
>    Thanks, but I want to note that netflow cannot support
> much in the way of extensions, so simply describing existing
> practice and defining a standard to support those observations
> is not going to do the job for my customers.
> 
>    In writing this response I found myself criticizing LFAP
> quite a bit, and I didn't really want to do that, but I'm going to
> leave some of my issues in hopes that it will help the process.
> I hope that some do find it useful, and I welcome any comment.
> 
>    One question.  None of the candidates are perfect.  If we
> adopt one, what will be the process that we go through to
> 'correct' any issues?  I'm sure it has been described, but
> could someone paraphrase?

	I assumed the adopted protocol would be a starting point
	and need modification to better suit IPFIX needs. Just
	my 2 cents.

	More below...
> 
> Thanks,
> 
> Carter
> 
> Comments on LFAP as IPFIX candidate.
> 
> I don't see that LFAP is a solution to the flow record transport
> problems that I worry about, which is the efficient, reliable
> and secure transport of any vendors flow records, and I'm
> particularly concerned with at least one of the basic architectural
> positions that LFAP takes, the protocol complexity and
> its Information Model.

	It is a bit difficult to address these general comments so
	I'll stick to addressing specific items you mentioned
	below. If you care to elaborate on any of the above I'll
	do my best to clarify.
> 
> The biggest issue with the architecture is timestamps.  My
> understanding reading the lfap-eval, is that timestamps
> relate to the flow cache rather than the wire-line timestamps of
> the packet stream that is being monitored.  

	Not true at all. In the eval I mentioned that timestamps
	need some clarification and here is why. There are 2 types.

		1) cache timeout
		2) wire-line timestamps.

	My main point is that we (IPFIX) need to support both types
	and we need to know which which one is being used.
	But both can be handled via LFAP. 

> If true, I believe
> that this is huge problem, as it will introduce a lot of
> timestamp variance that cannot be adjusted for, rendering
> the data very limited in its usefulness.  The IPPM framework
> devotes a large amount of time and effort describing how a monitor
> should deal with timestamps of packets, and an IPFIX monitor
> should comply with the IPPM framework on this.  Anything less
> would be networking 'malpractice', if there ever could be such
> a thing.
> 
> I think the protocol has too many message types.  Don't need
> a separate turn for VR/VRA, and AR/ARA you should be able to
> present the VR/CR/AR information elements in a single message and
> then get a single response.

	When you are negotiating version number you cannot
	do anything until the version is agreed upon. Otherwise
	you cannot reliably decode the message formats. Hence VR/VRA
	first.

	There are a couple of benefits of the CR message. First it provides 
	a list of other servers known to the device. **IF** the servers 
	attempt to do any load balancing the device can now be redirected 
	to another known server early on. The CR is also here for security 
	purposes. You don't want to allow someone to do a DOS attack on your 
	sever by connecting and blasting it with messages. The protocol message 
	sequence was designed to help with that problem. 

	The AR/ARA then allows an exchange of information and was
	designed for flexibility and extensibility.

	The amount of time it takes to send the messages is a non-issue
	since it is only done once at session start and is infinitesimal 
	when compared to the rest of the session.

	So there are good reasons for the message exchange. It is 
	a balance between simplicity, extensibility and security.
	Big topics handled by 3 little messages.

> 
> The concept that you can support the division of FAR and FUN
> messages generate great potential problems.  If I connect at some
> arbitrary point and don't receive the FAR message, how do I
> process FUN messages, which don't have flow descriptors?

	You are absolutely correct. This is probably the biggest
	difference for LFAP. 

	As I mentioned in the eval, I think the LFAP spec
	should be modified to allow measured attributes (bytes,
	packets, etc...) in the FAR. This is a trivial change
	and provides the ability to send complete flows in one message. 
	This is the easy problem to solve.

	The problem with the one shot messages is storage. The device
	now needs to store all the attributes until it is time to
	send the message. When you have millions of flows this can
	be a huge problem! Or if the device is small it can be a large
	problem. And as the number of attributes to report grows it
	makes the problem worse.

	Solving this problem is much more difficult than allowing
	LFAP to send one shot messages.

	LFAP has solved this problem by splitting up the attributes 
	and allowing them to be reported independently. 

	
	The answer to your specific question "you" don't connect
	to the device, the device connects to you. But that just
	moves the problem, what happens if the device looses the
	connection to one server and connects to another.

	You could resend all the FAR's but that would create
	a lot of extra burden on the device. So we chose to 
	let the servers handle the failover case. FUN records
	with no descriptior are sent to a single sever.
	Similarly, FAR records which don't have a closing FUN
	are sent to the single server.  (FYI - long lived flows, 
	may have several FUNs.) In this way only failover flows
	need to get resolved and that should be a fraction 
	of the total number of flows.

	
> 
> With regard to the Information Model,  I sense that I would
> put my entire record in a single vendor specific IE and leave it
> at that.  While a drastic statement, its not too far from the
> truth.

	
	I understand the statement but I don't understand how
	it fits in the IPFIX context.

	IPFIX is trying to standardize 2 things...

		1) The data that is exported
		2) The way in which data is exported. 

	If you have to put all your data in the vendor-specific field 
	then IPFIX only accomplished 1 of those 2 things. LFAP's data
	model provides a better starting point than most but is by no 
	means perfect. If adopted, I'm sure it will need to be modified.

> 
> Just to innumerate a few problems I have with LFAP's basic
> data definitions, and this is not an exhaustive set, of course.
> 
> Best time granularity of 10's of milliseconds (1/100th of a sec)
> is not good, uSec minimum, nanoSec preferable.

	No problem. 1/100th of a second is good enough for
	cache timeout. The definition for wire-line timestamps
	can be nanoSec.
> 
> The requirement that the FAS/CCE's must be globally unique, and then
> you start adding ones to them on roll over (how do you ensure that
> the FAS is still globally unique?) is a big issue (locally unique?)

	 
	I'm not sure what you mean by a unique FAS/CCE. What
	part are you referencing?	

> 
> The concepts of the Flow Qualifier checkpoint and priority are
> completely proprietary, they should be vendor specific OIDs?

	You may be right on that.
> 
> 64 bit counters for packets and bytes in every record, when over
> 90% of all flows have less than 256 packets and 8K of bytes in the
> entire flow?  We should have 1, 2, 4 and 8 byte counter IEs as
> needed, don't you think?

	I would agree to that.
> 
> The IpId field is 16 bits but the IE to report it is 64 bits long.
> Why not a 32 bit field for those special values that are 8-16 bits
> long?  Why not have a composite IE, like an IP header attribute
> IE, which could have the IpId, Tos, TTL, and option indicators all
> in a single IE?  Why not an IE for the classic 5-tuple flow?
> 
> Minor points, but important points for my products.

	All good points. As I said LFAP has a good data model 
	starting point but would need the input of people such 
	as yourself.

	Paul
> 
> Carter
> 
> 
> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
> Behalf Of Michael MacFaden
> Sent: Thursday, October 03, 2002 6:10 PM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> 
> On Thu, Oct 03, 2002 at 05:31:48PM -0400, Carter Bullard wrote:
> >My existing flow record generators provide jitter and loss information
> >in flow data records.  How do I do that with an LFAP or netflow
> >strategy?
> 
> For LFAP, build your collector as one normally would and
> then just follow section 2.45 of
> http://www.ietf.org/internet-drafts/draft-riverstone-lfap-data-01.txt
> 
> My point was/is simply this.
> We should consider the feature/complexity tradeoff
> for each criteria considered in context of the problem
> being solved.
> 
> My personal belief is that IPFIX does not stand for
> GDMP (Generic Data Mover Protocol).
> 
> Regards,
> Mike MacFaden
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say "unsubscribe
> ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 12:57:01 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12877
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 12:57:01 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xVeH-00050P-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 11:49:57 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xVeE-00050H-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 11:49:55 -0500
Received: (qmail 31378 invoked from network); 4 Oct 2002 16:49:52 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 4 Oct 2002 16:49:52 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g94Gqus05246;
	Fri, 4 Oct 2002 09:52:56 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <calato@riverstonenet.com>, "Sebastian Zander" <zander@fokus.gmd.de>
Cc: "Jeff Meyer" <jeffm@cup.hp.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Fri, 4 Oct 2002 09:49:45 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNAEIADHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <3D9AEDC2.14852887@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote Wednesday, October 02, 2002 6:00 AM:

> 	Unfortunately the advocates are likely the ones in the best
> 	position to comment. So we've taken 5 strong voices out of the
> 	discussion. At some point we'll we'll need to open the
> 	flood gates. Maybe after the evals come out.

I too have restrained, but no more! Diogenes-like, I shall
carry my lantern, searching for Truth. Alas, my Silicon Valley
bathtub carries a million dollar mortgage, so I must work 36 hours
a day at XACCT to keep the bankers away, but that won't bias
my opinions.

I think that my biases should be obvious (I come from a world
where protocols are a means to an end and the end is usually
a big database) but if anybody wants a more extensive list of
my background and biases, I'll be happy to provide them.

- peter ludemann
  principal engineer
  xacct technologies

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 13:02:35 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13184
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 13:02:35 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xVk3-00059R-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 11:55:55 -0500
Received: from palrel13.hp.com ([156.153.255.238])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xVk1-00059L-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 11:55:53 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP
	id 5CEA2400224; Fri,  4 Oct 2002 09:55:50 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id JAA15577;
	Fri, 4 Oct 2002 09:55:45 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021004172655.HEKH18196.simail.cup.hp.com@cup.hp.com>;
          Fri, 4 Oct 2002 10:26:55 -0700
Message-ID: <3D9DC88F.9060507@cup.hp.com>
Date: Fri, 04 Oct 2002 09:57:51 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Sebastian Zander <zander@fokus.gmd.de>
Cc: Peter Ludemann <peter.ludemann@xacct.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com> <3D9D5A10.2030906@fokus.gmd.de>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   There seems to be some confusion over the separation
between a formal, machine readable description of
the data model (as IPDR defines), and the requirements put
on an implementation (especially in an IPFIX Middlebox).

   Presumably folks are familiar with SNMP and the
separation between what a MIB defines and how the
protocol operates.

   Basically IPDR's use of XML schema is producing a
MIB for sets of accounting information.


   Why not use MIB's?  Well, SNMP is really geared towards
providing views/access into a current system state.  Historical
information tends to be global or other coarse grain
counters.  Fine grain counters in SNMP are hindered by
SNMP's OID indexing model (i.e. you end up with something
like RMON, a clever use of SNMP, but not much fun to
code to).

   IP Flow information is just a specifically defined
set of metrics which are being collected based on
certain observed network traffic.   It just so happens
that this can produce a huge amount of info, which
often cannot be stored on the device itself for any
period of time.  For this reason, using SNMP for gathering
flow info is probably a bad idea, and I'm glad to
see no one signed up as the SNMPv3 advocate ;-)


   But the essential concept of MIBs, which SMIng is also
looking at revising is important.  The extensibility
model which MIBs provided for SNMP is what has led
to its large scale adoption for many problem domains.

   It just so happens that the profile of flow exporting
is not appropriate for the SNMP domain.


   However, the statement that IP flow is somehow unique
in its data requirements and as such a more generalized
"data mover" is somehow problematic, is just plain wrong.

   As a mediation product vendor I see lots of devices
with lots of vendor specific protocols.  And there
are several which have the same protocol requirements
as IPFIX.  Just different data models.

   Consider a middlebox which looks not only at flows,
but also at protocols above layer 4.  Would it not
make sense for the additional information produced
by this to use the same basic protocol as IPFIX?

   IPFIX does identify extensibility as a requirement,
is there some bounded set of extensions which are
envisioned?

   If not, then a trivial numeric id scheme is a pretty
lousy namespace to work from.  Diameter's vendorId/
avaCode model is not much better, but at least has
some partitioning.


   The only possible unique aspect I could picture is
based on observing NFv2,5,7.  In all of these versions,
all data items were fixed width (typically 32-bit
integers).  So...  If IPFIX wants to say that only
fixed with data values may be sent via the IPFIX
protocol, then I'd say, maybe you could optimize
beyond IPDR for that.


   A minimal implementation of IPDR on a middlebox
would NOT need to have any XML knowledge whatsoever.
As a producer, the system could merely hardcode the
information model produced (or make it configurable).

   The encoding itself follows XDR format, which has
worked alright for NFS and RPC, and is the precursor
to the encoding for DCE and CORBA encoding.  It is
a very simple model.  Read RFC 1832.  An implementation
for what IPDR requires is pretty trivial.  IPDR
members have access to opensource for this in
both Java and C.  And as Stas pointed out in an
earlier memo there are > 10 implementations out
there.

   The other benefits from IPDR which I cited, such
as XML mapping, DB, binary file format, etc. are
just that, additional benefits.  They ARE NOT
REQUIRED to be implemented.


Regards,

   Jeff Meyer




Sebastian Zander wrote:

> Jeff Meyer wrote:
> 
> [...]
> 
>>
>>   So you have one description language, based on
>> XML Schema, a wire protocol, a binary format,
>> an XML format and a DB mapper, in a single document.
>>
>>
>>   Show me how that is done w/ the  other proposed
>> drafts?
> 
> 
> Jeff,
> 
> 
> its very nice to have these things but I don't think its
> a good idea to have them in one document. IMHO the main
> focus here is on the protocol. Working on all the things
> at once will only slow down the standardization process.
> I am also wondering if the IETF would ever standardize
> things like binary formats. Probably not.
> 
> Furthermore I am not convinced that it is a good idea to
> standardize things like DB mapper or binary formats. E.g.
> there exist a number of different formats and some people
> may want to continue using them. But informational RFCs
> could cover all these things.
> 
> To summarize my point: the evaluation should focus on the
> protocol and its capabilities and not on things storage
> formats etc.
> 
> BTW Diameter has a proposed XML definition as well
> (draft-frascone-aaa-xml-dictionary-00.html). Another proposal
> was to use SMIng (draft-schoenw-sming-dia-00.txt).
> 
> Cheers,
> 
> Sebastian
> 
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 13:17:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13822
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 13:17:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xVlM-0005C6-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 11:57:16 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xVlK-0005Al-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 11:57:14 -0500
Received: from riverstonenet.com ([134.141.180.93]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Fri, 4 Oct 2002 09:56:40 -0700
Message-ID: <3D9DC7D7.D5F3320D@riverstonenet.com>
Date: Fri, 04 Oct 2002 12:54:47 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: Sebastian Zander <zander@fokus.gmd.de>, Jeff Meyer <jeffm@cup.hp.com>,
        ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNAEIADHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 04 Oct 2002 16:56:41.0087 (UTC) FILETIME=[02E2B0F0:01C26BC7]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> calato@riverstonenet.com wrote Wednesday, October 02, 2002 6:00 AM:
> 
> >       Unfortunately the advocates are likely the ones in the best
> >       position to comment. So we've taken 5 strong voices out of the
> >       discussion. At some point we'll we'll need to open the
> >       flood gates. Maybe after the evals come out.
> 
> I too have restrained, but no more! Diogenes-like, I shall
> carry my lantern, searching for Truth. Alas, my Silicon Valley
> bathtub carries a million dollar mortgage, so I must work 36 hours
> a day at XACCT to keep the bankers away, but that won't bias
> my opinions.
> 
> I think that my biases should be obvious (I come from a world
> where protocols are a means to an end and the end is usually
> a big database) but if anybody wants a more extensive list of
> my background and biases, I'll be happy to provide them.

	I think the mortgage information will suffice :-)
> 
> - peter ludemann
>   principal engineer
>   xacct technologies

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 14:03:50 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA15224
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 14:03:49 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xWh7-0006ZV-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 12:56:57 -0500
Received: from mailhub.lawrence.edu ([143.44.65.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xWh6-0006ZO-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 12:56:56 -0500
Received: from lawrence.edu ([143.44.97.19])
 by lawrence.edu (PMDF V6.1-1 #30572)
 with ESMTPA id <0H3G01E6HXY11Y@lawrence.edu> for ipfix-eval@net.doit.wisc.edu;
 Fri, 04 Oct 2002 12:58:50 -0500 (CDT)
Date: Fri, 04 Oct 2002 12:56:55 -0500
From: Robert Lowe <robert.h.lowe@lawrence.edu>
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
To: Jeff Meyer <jeffm@cup.hp.com>
Cc: Sebastian Zander <zander@fokus.gmd.de>,
        Peter Ludemann <peter.ludemann@xacct.com>,
        ipfix-eval@net.doit.wisc.edu
Message-id: <3D9DD667.110220E2@lawrence.edu>
Organization: Lawrence University
MIME-version: 1.0
X-Mailer: Mozilla 4.77 [en] (Windows NT 5.0; U)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
X-Accept-Language: en
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com>
 <3D9C6B6C.6010803@cup.hp.com> <3D9D5A10.2030906@fokus.gmd.de>
 <3D9DC88F.9060507@cup.hp.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Jeff Meyer wrote:

Attention: lurker factor in play...

> An implementation
> for what IPDR requires is pretty trivial.  IPDR
> members have access to opensource for this in
> both Java and C.

The common definition of opensource includes descriptives such
as "publicly-available" and "no-strings-attached".  You seem 
like a pretty good evangelist for IPDR, but once someone starts 
passing the collection plate, using the word "opensource" only 
sullies the good name of the sacred cow of 21st century computing 
with the marketeer's comparison to a members-only reference 
implementation.  Some words don't have increasing degrees of 
comparison.  You can be dead, but you can't be 'deader', and in 
my book, open is open, not open for a fee.  Grammer lesson and 
rant off...

-Robert

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 15:15:59 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17670
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 15:15:59 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xXjZ-0000kf-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 14:03:33 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xXjX-0000kW-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 14:03:31 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id PAA24045
	for <ipfix-eval@net.doit.wisc.edu>; Fri, 4 Oct 2002 15:15:11 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma024024; Fri, 4 Oct 02 15:14:52 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <S4ZY4B88>; Fri, 4 Oct 2002 14:57:53 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA256D5A@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Fri, 4 Oct 2002 15:03:15 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26BD8.62564A23"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26BD8.62564A23
Content-Type: text/plain

A question: Are there intellectual property claims against IPDR? There
probably are for all the protocols proposed; I just don't remember seeing
anything mentioned and want to make sure all the cards are on the table.

dbh

> -----Original Message-----
> From: Robert Lowe [mailto:robert.h.lowe@lawrence.edu]
> Sent: Friday, October 04, 2002 1:57 PM
> To: Jeff Meyer
> Cc: Sebastian Zander; Peter Ludemann; ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> 
> 
> Jeff Meyer wrote:
> 
> Attention: lurker factor in play...
> 
> > An implementation
> > for what IPDR requires is pretty trivial.  IPDR
> > members have access to opensource for this in
> > both Java and C.
> 
> The common definition of opensource includes descriptives such
> as "publicly-available" and "no-strings-attached".  You seem 
> like a pretty good evangelist for IPDR, but once someone starts 
> passing the collection plate, using the word "opensource" only 
> sullies the good name of the sacred cow of 21st century computing 
> with the marketeer's comparison to a members-only reference 
> implementation.  Some words don't have increasing degrees of 
> comparison.  You can be dead, but you can't be 'deader', and in 
> my book, open is open, not open for a fee.  Grammer lesson and 
> rant off...
> 
> -Robert
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C26BD8.62564A23
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DUS-ASCII">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Discussion of Candidate Protocols</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>A question: Are there intellectual property claims =
against IPDR? There probably are for all the protocols proposed; I just =
don't remember seeing anything mentioned and want to make sure all the =
cards are on the table.</FONT></P>

<P><FONT SIZE=3D2>dbh</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Robert Lowe [<A =
HREF=3D"mailto:robert.h.lowe@lawrence.edu">mailto:robert.h.lowe@lawrence=
.edu</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Friday, October 04, 2002 1:57 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Sebastian Zander; Peter Ludemann; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] Discussion of =
Candidate Protocols</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Jeff Meyer wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Attention: lurker factor in play...</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; An implementation</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; for what IPDR requires is pretty =
trivial.&nbsp; IPDR</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; members have access to opensource for this =
in</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; both Java and C.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; The common definition of opensource includes =
descriptives such</FONT>
<BR><FONT SIZE=3D2>&gt; as &quot;publicly-available&quot; and =
&quot;no-strings-attached&quot;.&nbsp; You seem </FONT>
<BR><FONT SIZE=3D2>&gt; like a pretty good evangelist for IPDR, but =
once someone starts </FONT>
<BR><FONT SIZE=3D2>&gt; passing the collection plate, using the word =
&quot;opensource&quot; only </FONT>
<BR><FONT SIZE=3D2>&gt; sullies the good name of the sacred cow of 21st =
century computing </FONT>
<BR><FONT SIZE=3D2>&gt; with the marketeer's comparison to a =
members-only reference </FONT>
<BR><FONT SIZE=3D2>&gt; implementation.&nbsp; Some words don't have =
increasing degrees of </FONT>
<BR><FONT SIZE=3D2>&gt; comparison.&nbsp; You can be dead, but you =
can't be 'deader', and in </FONT>
<BR><FONT SIZE=3D2>&gt; my book, open is open, not open for a =
fee.&nbsp; Grammer lesson and </FONT>
<BR><FONT SIZE=3D2>&gt; rant off...</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -Robert</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26BD8.62564A23--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 15:51:21 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA19006
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 15:51:21 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xYEi-0001fj-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 14:35:44 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xYEg-0001f5-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 14:35:42 -0500
Received: from riverstonenet.com ([134.141.180.93]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Fri, 4 Oct 2002 12:35:08 -0700
Message-ID: <3D9DECFC.87159370@riverstonenet.com>
Date: Fri, 04 Oct 2002 15:33:16 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <6D745637A7E0F94DA070743C55CDA9BA256D5A@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 04 Oct 2002 19:35:09.0428 (UTC) FILETIME=[264C6340:01C26BDD]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> "Harrington, David" wrote:
> 
> A question: Are there  IPDR? There
> probably are for all the protocols proposed; I just don't remember
> seeing anything mentioned and want to make sure all the cards are on
> the table.
> 

	Just FYI, there are no intellectual property claims against LFAP.

	Paul
> dbh
> 
> > -----Original Message-----
> > From: Robert Lowe [mailto:robert.h.lowe@lawrence.edu]
> > Sent: Friday, October 04, 2002 1:57 PM
> > To: Jeff Meyer
> > Cc: Sebastian Zander; Peter Ludemann; ipfix-eval@net.doit.wisc.edu
> > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> >
> >
> > Jeff Meyer wrote:
> >
> > Attention: lurker factor in play...
> >
> > > An implementation
> > > for what IPDR requires is pretty trivial.  IPDR
> > > members have access to opensource for this in
> > > both Java and C.
> >
> > The common definition of opensource includes descriptives such
> > as "publicly-available" and "no-strings-attached".  You seem
> > like a pretty good evangelist for IPDR, but once someone starts
> > passing the collection plate, using the word "opensource" only
> > sullies the good name of the sacred cow of 21st century computing
> > with the marketeer's comparison to a members-only reference
> > implementation.  Some words don't have increasing degrees of
> > comparison.  You can be dead, but you can't be 'deader', and in
> > my book, open is open, not open for a fee.  Grammer lesson and
> > rant off...
> >
> > -Robert
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 16:01:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA19429
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 16:01:10 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xYVi-00022Z-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 14:53:18 -0500
Received: from palrel10.hp.com ([156.153.255.245])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xYVg-00022S-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 14:53:16 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id C152DC00164; Fri,  4 Oct 2002 12:53:13 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id MAA25960;
	Fri, 4 Oct 2002 12:53:08 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021004202419.HERQ18196.simail.cup.hp.com@cup.hp.com>;
          Fri, 4 Oct 2002 13:24:19 -0700
Message-ID: <3D9DF222.1000703@cup.hp.com>
Date: Fri, 04 Oct 2002 12:55:14 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Robert Lowe <robert.h.lowe@lawrence.edu>
Cc: Sebastian Zander <zander@fokus.gmd.de>,
        Peter Ludemann <peter.ludemann@xacct.com>,
        ipfix-eval@net.doit.wisc.edu, protocol@ipdr.metratech.com
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com> <3D9D5A10.2030906@fokus.gmd.de> <3D9DC88F.9060507@cup.hp.com> <3D9DD667.110220E2@lawrence.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Robert,

   Good point.  This is currently a reference implementation.

   Although I've advocated to move it to complete opensource,
e.g. SourceForge, this has not happened, YET.

Regards,

   Jeff Meyer


Robert Lowe wrote:

> Jeff Meyer wrote:
> 
> Attention: lurker factor in play...
> 
> 
>>An implementation
>>for what IPDR requires is pretty trivial.  IPDR
>>members have access to opensource for this in
>>both Java and C.
>>
> 
> The common definition of opensource includes descriptives such
> as "publicly-available" and "no-strings-attached".  You seem 
> like a pretty good evangelist for IPDR, but once someone starts 
> passing the collection plate, using the word "opensource" only 
> sullies the good name of the sacred cow of 21st century computing 
> with the marketeer's comparison to a members-only reference 
> implementation.  Some words don't have increasing degrees of 
> comparison.  You can be dead, but you can't be 'deader', and in 
> my book, open is open, not open for a fee.  Grammer lesson and 
> rant off...
> 
> -Robert
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 16:05:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA19542
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 16:05:28 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xYad-0002AS-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 14:58:23 -0500
Received: from palrel12.hp.com ([156.153.255.237])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xYab-0002AM-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 14:58:21 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP
	id 5BD5BE005A6; Fri,  4 Oct 2002 12:58:20 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id MAA26179;
	Fri, 4 Oct 2002 12:58:15 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021004202926.HERV18196.simail.cup.hp.com@cup.hp.com>;
          Fri, 4 Oct 2002 13:29:26 -0700
Message-ID: <3D9DF355.2010306@cup.hp.com>
Date: Fri, 04 Oct 2002 13:00:21 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <6D745637A7E0F94DA070743C55CDA9BA256D5A@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

David,

   Section 1.3 in the IPDR Advocacy draft states:

     1.3 Patent Protection

    There are no known patents which apply to or affect the
    right to freely use this technology.

   I have been assured that this is the case.

Regards,

   Jeff Meyer


Harrington, David wrote:

> A question: Are there intellectual property claims against IPDR? There 
> probably are for all the protocols proposed; I just don't remember 
> seeing anything mentioned and want to make sure all the cards are on the 
> table.
> 
> dbh
> 
>  > -----Original Message-----
>  > From: Robert Lowe [mailto:robert.h.lowe@lawrence.edu]
>  > Sent: Friday, October 04, 2002 1:57 PM
>  > To: Jeff Meyer
>  > Cc: Sebastian Zander; Peter Ludemann; ipfix-eval@net.doit.wisc.edu
>  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>  >
>  >
>  > Jeff Meyer wrote:
>  >
>  > Attention: lurker factor in play...
>  >
>  > > An implementation
>  > > for what IPDR requires is pretty trivial.  IPDR
>  > > members have access to opensource for this in
>  > > both Java and C.
>  >
>  > The common definition of opensource includes descriptives such
>  > as "publicly-available" and "no-strings-attached".  You seem
>  > like a pretty good evangelist for IPDR, but once someone starts
>  > passing the collection plate, using the word "opensource" only
>  > sullies the good name of the sacred cow of 21st century computing
>  > with the marketeer's comparison to a members-only reference
>  > implementation.  Some words don't have increasing degrees of
>  > comparison.  You can be dead, but you can't be 'deader', and in
>  > my book, open is open, not open for a fee.  Grammer lesson and
>  > rant off...
>  >
>  > -Robert
>  >
>  > --
>  > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
>  > in message body
>  > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>  > "unsubscribe ipfix" in message body
>  > Archive     http://ipfix.doit.wisc.edu/archive/
>  >
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 17:49:33 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA23257
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 17:49:32 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xaBy-0004jx-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 16:41:02 -0500
Received: from palrel11.hp.com ([156.153.255.246])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xaBw-0004jj-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 16:41:00 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel11.hp.com (Postfix) with ESMTP
	id 6F17A600285; Fri,  4 Oct 2002 14:40:59 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id OAA03135;
	Fri, 4 Oct 2002 14:40:54 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021004221205.HEUZ18196.simail.cup.hp.com@cup.hp.com>;
          Fri, 4 Oct 2002 15:12:05 -0700
Message-ID: <3D9E0B64.8020404@cup.hp.com>
Date: Fri, 04 Oct 2002 14:43:00 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Sebastian Zander <zander@fokus.gmd.de>
Cc: Peter Ludemann <peter.ludemann@xacct.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com> <3D9D5A10.2030906@fokus.gmd.de>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Sebastian,

   Diameter's XML draft is pretty close to IPDR, thanks
for the pointer.

   The trick used by IPDR, however, is to write directly
using XML-Schema's directives for defining information
models, and reuse XML-Schema's existing data type
set rather than inventing new names.  Diameter uses
the older DTD definition syntax to define a grammar
from scratch.

   The benefit of the IPDR model is that you not only have
a description language (for mapping to various serialization
protocols, e.g. Compact IPDR...), but a validateable XML
representation of that data immediately falls out, if
you are interested in having an XML representation.


   Note that the document itself only contains descriptive
information about the information items (elements and
groups of elements).  How one maps from this information
set to Compact IPDR or DB tables, is established by
convention, documented in a separate RFC/spec.  So, I don't
think your concern about putting too much in the document
is an issue.


   I don't understand your comment:

 > I am also wondering if the IETF would ever standardize
 > things like binary formats. Probably not.

   Diameter protocol messages define a binary payload,
as do many other IETF protocols?

Regards,

   Jeff Meyer





Sebastian Zander wrote:

> Jeff Meyer wrote:
> 
> [...]
> 
>>
>>   So you have one description language, based on
>> XML Schema, a wire protocol, a binary format,
>> an XML format and a DB mapper, in a single document.
>>
>>
>>   Show me how that is done w/ the  other proposed
>> drafts?
> 
> 
> Jeff,
> 
> 
> its very nice to have these things but I don't think its
> a good idea to have them in one document. IMHO the main
> focus here is on the protocol. Working on all the things
> at once will only slow down the standardization process.
> I am also wondering if the IETF would ever standardize
> things like binary formats. Probably not.
> 
> Furthermore I am not convinced that it is a good idea to
> standardize things like DB mapper or binary formats. E.g.
> there exist a number of different formats and some people
> may want to continue using them. But informational RFCs
> could cover all these things.
> 
> To summarize my point: the evaluation should focus on the
> protocol and its capabilities and not on things storage
> formats etc.
> 
> BTW Diameter has a proposed XML definition as well
> (draft-frascone-aaa-xml-dictionary-00.html). Another proposal
> was to use SMIng (draft-schoenw-sming-dia-00.txt).
> 
> Cheers,
> 
> Sebastian
> 
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 17:50:58 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA23293
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 17:50:57 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xaAm-0004ha-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 16:39:48 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xaAj-0004hQ-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 16:39:45 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id RAA00031
	for <ipfix-eval@net.doit.wisc.edu>; Fri, 4 Oct 2002 17:51:25 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma000023; Fri, 4 Oct 02 17:50:34 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <S4ZY41ZF>; Fri, 4 Oct 2002 17:33:34 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA075831@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Fri, 4 Oct 2002 17:38:56 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26BEE.70EB4478"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26BEE.70EB4478
Content-Type: text/plain

Hi,

Let me be clear that I am advocating no particular solution. I am trying to
cut through any hype and understand the technical pros and cons of each
approach.

Am I biased? You decide. I don't believe so, and want to dispel any bias
assumptions.
I am a network management technology analyst for the CTO of Enterasys (which
used to be Cabletron).

1) I analyzed LFAP in 1999(?) for its potential as an industry standard and
found it lacking. Paul has since addressed most of the points I raised, and
we've had many discussions about its pros and cons. It has both.
2) I was a member of the IPDR and reviewed their early specs. I did not find
it compelling. Its development in a fee-based members-only forum limited the
industry's ability to review it as it developed. There were obviously many
talented individuals involved, but some companies had a larger influence in
its design, which makes me believe it may not be very vendor-neutral. It
included a number of people from telco companies, where usage accounting and
billing has a long history. I pushed for a while to have them submit it to
the IETF, but they resisted. As a long-time IETFer, I didn't see much
justification for not working within an open standards organization like the
IETF. 
3) I have some serious reservations about Netflow's technical design,
especially after talking candidly with many Cisco developers at IETF
meetings. Nonetheless, I promoted the replacement of LFAP with Netflow in
Enterasys devices because of Netflow's wide-spread deployment and
third-party application support. We did not want to be in the LFAP
accounting application business. Cisco is our primary competitor, and I
would like to see them not control the flow accounting standard. I believe
Netflow has both pros and cons technically.
4) Xacct sought out Enterasys as a potential partner in 2000(?). I did the
technology analysis on CRANE for the due diligence. My largest concern was
the proprietary nature of the protocol. Just like IPDR, it was developed in
a members-only agreement and was denied the opportunity for wide-spread
industry review. This was done to capture the intellectaul property rights
before making it public. Another major concern was the push for
standardizing "buckets for transporting proprietary data in"; I don't
believe that transporting a lot of proprietary data models really helps
standardization and interoperability. CRANE has pros and cons.
5) I co-authored RFC2975 "Introduction to Internet Accounting" which
discusses many of the requirements identified here.
6) As the co-chair of SNMPv3 WG, I am glad nobody proposed SNMP as an IPFIX
candidate because it would likely not be very satisfactory for flow
accounting purposes. SNMP has pros and cons, but I don't think SNMP (as
currently defined) is well suited to this particular task.

I am not advocating any particular solution, and I believe all the proposals
offer some benefits for the stated purpose.

That being said, I have chosen to reply to Jeff's mail because it uses SNMP
for comparison and I fail to fully understand the point being made. 

Comments inline.

dbh

> -----Original Message-----
> From: Jeff Meyer [mailto:jeffm@cup.hp.com]
> Sent: Friday, October 04, 2002 12:58 PM
> To: Sebastian Zander
> Cc: Peter Ludemann; ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> 
> 
> Hi,
> 
>    There seems to be some confusion over the separation
> between a formal, machine readable description of
> the data model (as IPDR defines), and the requirements put
> on an implementation (especially in an IPFIX Middlebox).
> 
>    Presumably folks are familiar with SNMP and the
> separation between what a MIB defines and how the
> protocol operates.
> 
>    Basically IPDR's use of XML schema is producing a
> MIB for sets of accounting information.
> 

So IPDR provides a formal machine readable description of a data model just
as SNMP does. The difference is IPDR uses an XML schema and MIBs use SMI
schemas.

OK. 

> 
>    Why not use MIB's?  Well, SNMP is really geared towards
> providing views/access into a current system state. Historical
> information tends to be global or other coarse grain
> counters.  Fine grain counters in SNMP are hindered by
> SNMP's OID indexing model (i.e. you end up with something
> like RMON, a clever use of SNMP, but not much fun to
> code to).

You make these assertions about SNMP, without any supporting analysis. You
seem to do this as the setup for a comparison with IPDR's XML schema, but
you don't follow through. 

When you say SNMP is geared towards providing views/access into a current
system state, are you talking about the SNMP protocol being geared to this,
or is it just that currently existing SNMP mibs seem geared to this task?

You talk about historical information being global or coarse-grain counters.
Again, are you talking about the SNMP protocol constraining this, or is this
an artifact of the mibs that have been defined? How does XML do this
differently? If we can model this in XML, couldn't we also model this in a
mib? (Does this mean you're advocating SNMP as a viable solution? ;-)

I am missing the point about how OIDs hinder fine-grained counters. An OID
is used to name an object such as a counter. I don't think the naming has a
significant effect on how fine-grained the counter is. Are you asserting
that somehow XML-naming better supports fine-grained counters?

Can you explain further?
> 
>    IP Flow information is just a specifically defined
> set of metrics which are being collected based on
> certain observed network traffic.   

SNMP mibs typically are also a specifically defined set of metrics which are
being collected based on certain observed network traffic, such as bytes
in/out or the RMON flow statistics, or other events. So IP Flow information
is just a specifically defined set of metrics, like a MIB. Are you
advocating we solve the problem by writing a mib module for IP Flows?

> It just so happens
> that this can produce a huge amount of info, which
> often cannot be stored on the device itself for any
> period of time.  For this reason, using SNMP for gathering
> flow info is probably a bad idea, and I'm glad to
> see no one signed up as the SNMPv3 advocate ;-)

Off-loading large amounts of information quickly could be done using SNMP
Informs. I certainly agree that using SNMP to gather flow info is probably a
bad idea if you mean gathering it up and waiting for applications to poll
for it. I would have concerns about the efficiency of SNMP Informs compared
to a protocol designed to handle off-loading large quantities of flow
information quickly. See RFC2975.

As you pointed out, SNMP makes a clear separation between the data modeling
and the transport mechanism. I wouldn't recommend SNMPv3 for IPFIX primarily
because of the transport constraints associated with 484 byte messages over
UDP, lack of support for streaming data, and repetitive OID attribute
identifiers, not because of the data modeling capabilities.

I don't see that an XML data model addresses those problems.
> 
> 
>    But the essential concept of MIBs, which SMIng is also
> looking at revising is important. 

I disagree that SMIng is looking at revising the essential concept of MIBs.
They are looking at revising the SMI to improve ease-of-use and add
object-orientation. The essential concept of MIBs as "data models that are
extensible without protocol changes" remains the same.

> The extensibility
> model which MIBs provided for SNMP is what has led
> to its large scale adoption for many problem domains.

Agreed. An extensible data model has been important to SNMP's large scale
adoption, and I believe an extensible data model should be supported by
IPFIX. Keep in mind however, that there  are trade-offs. An extensible data
model adds overhead and complexity, which may reduce the efficiency of an
extensible IPFIX. 

A vendor-extensible data modeling language also leads to many vendor
extensions which greatly reduces standardization and the ability to
aggregate/compare/contrast information from multiple vendors. This has been
a major factor in SNMP applications all offering similar limited sets of
functionality, and the large number of applications that are little more
than mib browsers - device vendors do not provide solid support for
fully-compliant industry standard mib implementations, but rather offer lots
of proprietary mib data using a standardized modeling language and a
standardized transport mechanism.

The more data elements that can be named, the longer the names need to be to
differentiate them. OIDs work well in SNMP to provide a data naming space
that can be extended as needed without naming conflicts. Integers work well
in LFAP to name a limited set of data elements. 

XML is extensible, and will suffer the tradeoffs of long names and lots of
proprietary extensions just like SNMP.

> 
>    It just so happens that the profile of flow exporting
> is not appropriate for the SNMP domain.

Here you lose me. What is the "profile" you refer to that makes flow
exporting inappropriate for the SNMP domain? How does IPDR deal with those
same profile characteristics differently than SNMP and the other IPFIX
proposals?
> 
> 
>    However, the statement that IP flow is somehow unique
> in its data requirements and as such a more generalized
> "data mover" is somehow problematic, is just plain wrong.

If your argument is that IP flow is just another data model and that a
generalized "data mover" is acceptable, then are you advocating we model IP
flow in a MIB and move the data using SNMP? 

If your argument is that IP flow is just another data model and that a
generalized "data mover" is acceptable as long as it meets performance
requirements, then would a MIB transported over another protocol be
acceptable? or would a mib transported over an SNMP that supported TCP,
larger messages, and OID suppression/compression be acceptable? If so, you
might want to check on some of the work being done by the EOS WG.

> 
>    As a mediation product vendor I see lots of devices
> with lots of vendor specific protocols.  And there
> are several which have the same protocol requirements
> as IPFIX.  Just different data models.
> 
>    Consider a middlebox which looks not only at flows,
> but also at protocols above layer 4.  Would it not
> make sense for the additional information produced
> by this to use the same basic protocol as IPFIX?

So you're arguing that if IPFIX already solves the protocol problems
associated with fast-offloading of bulk data, it should be reused for
transporting any type of data?

Let me make sure I follow your logic:
You're arguing that we should keep the data model and protocol separate.
You're arguing that we should reuse rather than develop more task-specific
protocols.

Then shouldn't you also be advocating using existing mechanisms for data
modeling of formal, machine readable descriptions of the data model, such as
the SMI rather than XML?

> 
>    IPFIX does identify extensibility as a requirement,
> is there some bounded set of extensions which are
> envisioned?
> 

One of the real strengths of SNMP's MIB approach is the allocation of a
partitioned namespace, because industry standard data models were developed,
and because the enterprise-specific namespace encouraged vendors to use
SNMP. 

One of the real strengths of SNMP's MIB approach is the specification of a
common data modeling language, with very limited syntax options, that allows
machine-parsing of any mib and display of any mib information.

One of the real weaknesses of SNMP's MIB approach is the allocation of an
enterprise-specific namespace, because vendors used it to develop
proprietary data models which hindered interoperability across vendors. 

I think it is very important to understand the tradeoffs involved in
deciding how extensible something should be.

>    If not, then a trivial numeric id scheme is a pretty
> lousy namespace to work from.  Diameter's vendorId/
> avaCode model is not much better, but at least has
> some partitioning.

SNMP's OID hierarchy has been found to be a good namespace to work from for
its extensibility aspects and partitioning, and it has lots of room for
extension. Are you advocating SNMP again? tsk, tsk. ;-)

> 
> 
>    The only possible unique aspect I could picture is
> based on observing NFv2,5,7.  In all of these versions,
> all data items were fixed width (typically 32-bit
> integers).  So...  If IPFIX wants to say that only
> fixed with data values may be sent via the IPFIX
> protocol, then I'd say, maybe you could optimize
> beyond IPDR for that.
> 
> 
>    A minimal implementation of IPDR on a middlebox
> would NOT need to have any XML knowledge whatsoever.
> As a producer, the system could merely hardcode the
> information model produced (or make it configurable).
> 
>    The encoding itself follows XDR format, which has
> worked alright for NFS and RPC, and is the precursor
> to the encoding for DCE and CORBA encoding.  It is
> a very simple model.  Read RFC 1832.  An implementation
> for what IPDR requires is pretty trivial.  IPDR
> members have access to opensource for this in
> both Java and C.  And as Stas pointed out in an
> earlier memo there are > 10 implementations out
> there.
> 
>    The other benefits from IPDR which I cited, such
> as XML mapping, DB, binary file format, etc. are
> just that, additional benefits.  They ARE NOT
> REQUIRED to be implemented.
> 
> 
> Regards,
> 
>    Jeff Meyer
> 
> 
> 
> 
> Sebastian Zander wrote:
> 
> > Jeff Meyer wrote:
> > 
> > [...]
> > 
> >>
> >>   So you have one description language, based on
> >> XML Schema, a wire protocol, a binary format,
> >> an XML format and a DB mapper, in a single document.
> >>
> >>
> >>   Show me how that is done w/ the  other proposed
> >> drafts?
> > 
> > 
> > Jeff,
> > 
> > 
> > its very nice to have these things but I don't think its
> > a good idea to have them in one document. IMHO the main
> > focus here is on the protocol. Working on all the things
> > at once will only slow down the standardization process.
> > I am also wondering if the IETF would ever standardize
> > things like binary formats. Probably not.
> > 
> > Furthermore I am not convinced that it is a good idea to
> > standardize things like DB mapper or binary formats. E.g.
> > there exist a number of different formats and some people
> > may want to continue using them. But informational RFCs
> > could cover all these things.
> > 
> > To summarize my point: the evaluation should focus on the
> > protocol and its capabilities and not on things storage
> > formats etc.
> > 
> > BTW Diameter has a proposed XML definition as well
> > (draft-frascone-aaa-xml-dictionary-00.html). Another proposal
> > was to use SMIng (draft-schoenw-sming-dia-00.txt).
> > 
> > Cheers,
> > 
> > Sebastian
> > 
> > 
> 
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C26BEE.70EB4478
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DUS-ASCII">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Discussion of Candidate Protocols</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hi,</FONT>
</P>

<P><FONT SIZE=3D2>Let me be clear that I am advocating no particular =
solution. I am trying to cut through any hype and understand the =
technical pros and cons of each approach.</FONT></P>

<P><FONT SIZE=3D2>Am I biased? You decide. I don't believe so, and want =
to dispel any bias assumptions.</FONT>
<BR><FONT SIZE=3D2>I am a network management technology analyst for the =
CTO of Enterasys (which used to be Cabletron).</FONT>
</P>

<P><FONT SIZE=3D2>1) I analyzed LFAP in 1999(?) for its potential as an =
industry standard and found it lacking. Paul has since addressed most =
of the points I raised, and we've had many discussions about its pros =
and cons. It has both.</FONT></P>

<P><FONT SIZE=3D2>2) I was a member of the IPDR and reviewed their =
early specs. I did not find it compelling. Its development in a =
fee-based members-only forum limited the industry's ability to review =
it as it developed. There were obviously many talented individuals =
involved, but some companies had a larger influence in its design, =
which makes me believe it may not be very vendor-neutral. It included a =
number of people from telco companies, where usage accounting and =
billing has a long history. I pushed for a while to have them submit it =
to the IETF, but they resisted. As a long-time IETFer, I didn't see =
much justification for not working within an open standards =
organization like the IETF. </FONT></P>

<P><FONT SIZE=3D2>3) I have some serious reservations about Netflow's =
technical design, especially after talking candidly with many Cisco =
developers at IETF meetings. Nonetheless, I promoted the replacement of =
LFAP with Netflow in Enterasys devices because of Netflow's wide-spread =
deployment and third-party application support. We did not want to be =
in the LFAP accounting application business. Cisco is our primary =
competitor, and I would like to see them not control the flow =
accounting standard. I believe Netflow has both pros and cons =
technically.</FONT></P>

<P><FONT SIZE=3D2>4) Xacct sought out Enterasys as a potential partner =
in 2000(?). I did the technology analysis on CRANE for the due =
diligence. My largest concern was the proprietary nature of the =
protocol. Just like IPDR, it was developed in a members-only agreement =
and was denied the opportunity for wide-spread industry review. This =
was done to capture the intellectaul property rights before making it =
public. Another major concern was the push for standardizing =
&quot;buckets for transporting proprietary data in&quot;; I don't =
believe that transporting a lot of proprietary data models really helps =
standardization and interoperability. CRANE has pros and =
cons.</FONT></P>

<P><FONT SIZE=3D2>5) I co-authored RFC2975 &quot;Introduction to =
Internet Accounting&quot; which discusses many of the requirements =
identified here.</FONT></P>

<P><FONT SIZE=3D2>6) As the co-chair of SNMPv3 WG, I am glad nobody =
proposed SNMP as an IPFIX candidate because it would likely not be very =
satisfactory for flow accounting purposes. SNMP has pros and cons, but =
I don't think SNMP (as currently defined) is well suited to this =
particular task.</FONT></P>

<P><FONT SIZE=3D2>I am not advocating any particular solution, and I =
believe all the proposals offer some benefits for the stated =
purpose.</FONT></P>

<P><FONT SIZE=3D2>That being said, I have chosen to reply to Jeff's =
mail because it uses SNMP for comparison and I fail to fully understand =
the point being made. </FONT></P>

<P><FONT SIZE=3D2>Comments inline.</FONT>
</P>

<P><FONT SIZE=3D2>dbh</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Jeff Meyer [<A =
HREF=3D"mailto:jeffm@cup.hp.com">mailto:jeffm@cup.hp.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Friday, October 04, 2002 12:58 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Sebastian Zander</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Peter Ludemann; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] Discussion of =
Candidate Protocols</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Hi,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; There seems to be some =
confusion over the separation</FONT>
<BR><FONT SIZE=3D2>&gt; between a formal, machine readable description =
of</FONT>
<BR><FONT SIZE=3D2>&gt; the data model (as IPDR defines), and the =
requirements put</FONT>
<BR><FONT SIZE=3D2>&gt; on an implementation (especially in an IPFIX =
Middlebox).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Presumably folks are familiar =
with SNMP and the</FONT>
<BR><FONT SIZE=3D2>&gt; separation between what a MIB defines and how =
the</FONT>
<BR><FONT SIZE=3D2>&gt; protocol operates.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Basically IPDR's use of XML =
schema is producing a</FONT>
<BR><FONT SIZE=3D2>&gt; MIB for sets of accounting information.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

<P><FONT SIZE=3D2>So IPDR provides a formal machine readable =
description of a data model just as SNMP does. The difference is IPDR =
uses an XML schema and MIBs use SMI schemas.</FONT></P>

<P><FONT SIZE=3D2>OK. </FONT>
</P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Why not use MIB's?&nbsp; =
Well, SNMP is really geared towards</FONT>
<BR><FONT SIZE=3D2>&gt; providing views/access into a current system =
state. Historical</FONT>
<BR><FONT SIZE=3D2>&gt; information tends to be global or other coarse =
grain</FONT>
<BR><FONT SIZE=3D2>&gt; counters.&nbsp; Fine grain counters in SNMP are =
hindered by</FONT>
<BR><FONT SIZE=3D2>&gt; SNMP's OID indexing model (i.e. you end up with =
something</FONT>
<BR><FONT SIZE=3D2>&gt; like RMON, a clever use of SNMP, but not much =
fun to</FONT>
<BR><FONT SIZE=3D2>&gt; code to).</FONT>
</P>

<P><FONT SIZE=3D2>You make these assertions about SNMP, without any =
supporting analysis. You seem to do this as the setup for a comparison =
with IPDR's XML schema, but you don't follow through. </FONT></P>

<P><FONT SIZE=3D2>When you say SNMP is geared towards providing =
views/access into a current system state, are you talking about the =
SNMP protocol being geared to this, or is it just that currently =
existing SNMP mibs seem geared to this task?</FONT></P>

<P><FONT SIZE=3D2>You talk about historical information being global or =
coarse-grain counters. Again, are you talking about the SNMP protocol =
constraining this, or is this an artifact of the mibs that have been =
defined? How does XML do this differently? If we can model this in XML, =
couldn't we also model this in a mib? (Does this mean you're advocating =
SNMP as a viable solution? ;-)</FONT></P>

<P><FONT SIZE=3D2>I am missing the point about how OIDs hinder =
fine-grained counters. An OID is used to name an object such as a =
counter. I don't think the naming has a significant effect on how =
fine-grained the counter is. Are you asserting that somehow XML-naming =
better supports fine-grained counters?</FONT></P>

<P><FONT SIZE=3D2>Can you explain further?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; IP Flow information is just a =
specifically defined</FONT>
<BR><FONT SIZE=3D2>&gt; set of metrics which are being collected based =
on</FONT>
<BR><FONT SIZE=3D2>&gt; certain observed network traffic.&nbsp;&nbsp; =
</FONT>
</P>

<P><FONT SIZE=3D2>SNMP mibs typically are also a specifically defined =
set of metrics which are being collected based on certain observed =
network traffic, such as bytes in/out or the RMON flow statistics, or =
other events. So IP Flow information is just a specifically defined set =
of metrics, like a MIB. Are you advocating we solve the problem by =
writing a mib module for IP Flows?</FONT></P>

<P><FONT SIZE=3D2>&gt; It just so happens</FONT>
<BR><FONT SIZE=3D2>&gt; that this can produce a huge amount of info, =
which</FONT>
<BR><FONT SIZE=3D2>&gt; often cannot be stored on the device itself for =
any</FONT>
<BR><FONT SIZE=3D2>&gt; period of time.&nbsp; For this reason, using =
SNMP for gathering</FONT>
<BR><FONT SIZE=3D2>&gt; flow info is probably a bad idea, and I'm glad =
to</FONT>
<BR><FONT SIZE=3D2>&gt; see no one signed up as the SNMPv3 advocate =
;-)</FONT>
</P>

<P><FONT SIZE=3D2>Off-loading large amounts of information quickly =
could be done using SNMP Informs. I certainly agree that using SNMP to =
gather flow info is probably a bad idea if you mean gathering it up and =
waiting for applications to poll for it. I would have concerns about =
the efficiency of SNMP Informs compared to a protocol designed to =
handle off-loading large quantities of flow information quickly. See =
RFC2975.</FONT></P>

<P><FONT SIZE=3D2>As you pointed out, SNMP makes a clear separation =
between the data modeling and the transport mechanism. I wouldn't =
recommend SNMPv3 for IPFIX primarily because of the transport =
constraints associated with 484 byte messages over UDP, lack of support =
for streaming data, and repetitive OID attribute identifiers, not =
because of the data modeling capabilities.</FONT></P>

<P><FONT SIZE=3D2>I don't see that an XML data model addresses those =
problems.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; But the essential concept of =
MIBs, which SMIng is also</FONT>
<BR><FONT SIZE=3D2>&gt; looking at revising is important. </FONT>
</P>

<P><FONT SIZE=3D2>I disagree that SMIng is looking at revising the =
essential concept of MIBs. They are looking at revising the SMI to =
improve ease-of-use and add object-orientation. The essential concept =
of MIBs as &quot;data models that are extensible without protocol =
changes&quot; remains the same.</FONT></P>

<P><FONT SIZE=3D2>&gt; The extensibility</FONT>
<BR><FONT SIZE=3D2>&gt; model which MIBs provided for SNMP is what has =
led</FONT>
<BR><FONT SIZE=3D2>&gt; to its large scale adoption for many problem =
domains.</FONT>
</P>

<P><FONT SIZE=3D2>Agreed. An extensible data model has been important =
to SNMP's large scale adoption, and I believe an extensible data model =
should be supported by IPFIX. Keep in mind however, that there&nbsp; =
are trade-offs. An extensible data model adds overhead and complexity, =
which may reduce the efficiency of an extensible IPFIX. </FONT></P>

<P><FONT SIZE=3D2>A vendor-extensible data modeling language also leads =
to many vendor extensions which greatly reduces standardization and the =
ability to aggregate/compare/contrast information from multiple =
vendors. This has been a major factor in SNMP applications all offering =
similar limited sets of functionality, and the large number of =
applications that are little more than mib browsers - device vendors do =
not provide solid support for fully-compliant industry standard mib =
implementations, but rather offer lots of proprietary mib data using a =
standardized modeling language and a standardized transport =
mechanism.</FONT></P>

<P><FONT SIZE=3D2>The more data elements that can be named, the longer =
the names need to be to differentiate them. OIDs work well in SNMP to =
provide a data naming space that can be extended as needed without =
naming conflicts. Integers work well in LFAP to name a limited set of =
data elements. </FONT></P>

<P><FONT SIZE=3D2>XML is extensible, and will suffer the tradeoffs of =
long names and lots of proprietary extensions just like SNMP.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; It just so happens that the =
profile of flow exporting</FONT>
<BR><FONT SIZE=3D2>&gt; is not appropriate for the SNMP domain.</FONT>
</P>

<P><FONT SIZE=3D2>Here you lose me. What is the &quot;profile&quot; you =
refer to that makes flow exporting inappropriate for the SNMP domain? =
How does IPDR deal with those same profile characteristics differently =
than SNMP and the other IPFIX proposals?</FONT></P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; However, the statement that =
IP flow is somehow unique</FONT>
<BR><FONT SIZE=3D2>&gt; in its data requirements and as such a more =
generalized</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;data mover&quot; is somehow problematic, =
is just plain wrong.</FONT>
</P>

<P><FONT SIZE=3D2>If your argument is that IP flow is just another data =
model and that a generalized &quot;data mover&quot; is acceptable, then =
are you advocating we model IP flow in a MIB and move the data using =
SNMP? </FONT></P>

<P><FONT SIZE=3D2>If your argument is that IP flow is just another data =
model and that a generalized &quot;data mover&quot; is acceptable as =
long as it meets performance requirements, then would a MIB transported =
over another protocol be acceptable? or would a mib transported over an =
SNMP that supported TCP, larger messages, and OID =
suppression/compression be acceptable? If so, you might want to check =
on some of the work being done by the EOS WG.</FONT></P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; As a mediation product vendor =
I see lots of devices</FONT>
<BR><FONT SIZE=3D2>&gt; with lots of vendor specific protocols.&nbsp; =
And there</FONT>
<BR><FONT SIZE=3D2>&gt; are several which have the same protocol =
requirements</FONT>
<BR><FONT SIZE=3D2>&gt; as IPFIX.&nbsp; Just different data =
models.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Consider a middlebox which =
looks not only at flows,</FONT>
<BR><FONT SIZE=3D2>&gt; but also at protocols above layer 4.&nbsp; =
Would it not</FONT>
<BR><FONT SIZE=3D2>&gt; make sense for the additional information =
produced</FONT>
<BR><FONT SIZE=3D2>&gt; by this to use the same basic protocol as =
IPFIX?</FONT>
</P>

<P><FONT SIZE=3D2>So you're arguing that if IPFIX already solves the =
protocol problems associated with fast-offloading of bulk data, it =
should be reused for transporting any type of data?</FONT></P>

<P><FONT SIZE=3D2>Let me make sure I follow your logic:</FONT>
<BR><FONT SIZE=3D2>You're arguing that we should keep the data model =
and protocol separate.</FONT>
<BR><FONT SIZE=3D2>You're arguing that we should reuse rather than =
develop more task-specific protocols.</FONT>
</P>

<P><FONT SIZE=3D2>Then shouldn't you also be advocating using existing =
mechanisms for data modeling of formal, machine readable descriptions =
of the data model, such as the SMI rather than XML?</FONT></P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; IPFIX does identify =
extensibility as a requirement,</FONT>
<BR><FONT SIZE=3D2>&gt; is there some bounded set of extensions which =
are</FONT>
<BR><FONT SIZE=3D2>&gt; envisioned?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

<P><FONT SIZE=3D2>One of the real strengths of SNMP's MIB approach is =
the allocation of a partitioned namespace, because industry standard =
data models were developed, and because the enterprise-specific =
namespace encouraged vendors to use SNMP. </FONT></P>

<P><FONT SIZE=3D2>One of the real strengths of SNMP's MIB approach is =
the specification of a common data modeling language, with very limited =
syntax options, that allows machine-parsing of any mib and display of =
any mib information.</FONT></P>

<P><FONT SIZE=3D2>One of the real weaknesses of SNMP's MIB approach is =
the allocation of an enterprise-specific namespace, because vendors =
used it to develop proprietary data models which hindered =
interoperability across vendors. </FONT></P>

<P><FONT SIZE=3D2>I think it is very important to understand the =
tradeoffs involved in deciding how extensible something should =
be.</FONT>
</P>

<P><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; If not, then a trivial numeric =
id scheme is a pretty</FONT>
<BR><FONT SIZE=3D2>&gt; lousy namespace to work from.&nbsp; Diameter's =
vendorId/</FONT>
<BR><FONT SIZE=3D2>&gt; avaCode model is not much better, but at least =
has</FONT>
<BR><FONT SIZE=3D2>&gt; some partitioning.</FONT>
</P>

<P><FONT SIZE=3D2>SNMP's OID hierarchy has been found to be a good =
namespace to work from for its extensibility aspects and partitioning, =
and it has lots of room for extension. Are you advocating SNMP again? =
tsk, tsk. ;-)</FONT></P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; The only possible unique =
aspect I could picture is</FONT>
<BR><FONT SIZE=3D2>&gt; based on observing NFv2,5,7.&nbsp; In all of =
these versions,</FONT>
<BR><FONT SIZE=3D2>&gt; all data items were fixed width (typically =
32-bit</FONT>
<BR><FONT SIZE=3D2>&gt; integers).&nbsp; So...&nbsp; If IPFIX wants to =
say that only</FONT>
<BR><FONT SIZE=3D2>&gt; fixed with data values may be sent via the =
IPFIX</FONT>
<BR><FONT SIZE=3D2>&gt; protocol, then I'd say, maybe you could =
optimize</FONT>
<BR><FONT SIZE=3D2>&gt; beyond IPDR for that.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; A minimal implementation of =
IPDR on a middlebox</FONT>
<BR><FONT SIZE=3D2>&gt; would NOT need to have any XML knowledge =
whatsoever.</FONT>
<BR><FONT SIZE=3D2>&gt; As a producer, the system could merely hardcode =
the</FONT>
<BR><FONT SIZE=3D2>&gt; information model produced (or make it =
configurable).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; The encoding itself follows =
XDR format, which has</FONT>
<BR><FONT SIZE=3D2>&gt; worked alright for NFS and RPC, and is the =
precursor</FONT>
<BR><FONT SIZE=3D2>&gt; to the encoding for DCE and CORBA =
encoding.&nbsp; It is</FONT>
<BR><FONT SIZE=3D2>&gt; a very simple model.&nbsp; Read RFC 1832.&nbsp; =
An implementation</FONT>
<BR><FONT SIZE=3D2>&gt; for what IPDR requires is pretty trivial.&nbsp; =
IPDR</FONT>
<BR><FONT SIZE=3D2>&gt; members have access to opensource for this =
in</FONT>
<BR><FONT SIZE=3D2>&gt; both Java and C.&nbsp; And as Stas pointed out =
in an</FONT>
<BR><FONT SIZE=3D2>&gt; earlier memo there are &gt; 10 implementations =
out</FONT>
<BR><FONT SIZE=3D2>&gt; there.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; The other benefits from IPDR =
which I cited, such</FONT>
<BR><FONT SIZE=3D2>&gt; as XML mapping, DB, binary file format, etc. =
are</FONT>
<BR><FONT SIZE=3D2>&gt; just that, additional benefits.&nbsp; They ARE =
NOT</FONT>
<BR><FONT SIZE=3D2>&gt; REQUIRED to be implemented.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Regards,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Sebastian Zander wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Jeff Meyer wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; [...]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp; So you have one =
description language, based on</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; XML Schema, a wire protocol, a binary =
format,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; an XML format and a DB mapper, in a =
single document.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp; Show me how that is done =
w/ the&nbsp; other proposed</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; drafts?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Jeff,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; its very nice to have these things but I =
don't think its</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; a good idea to have them in one document. =
IMHO the main</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; focus here is on the protocol. Working on =
all the things</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; at once will only slow down the =
standardization process.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I am also wondering if the IETF would ever =
standardize</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; things like binary formats. Probably =
not.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Furthermore I am not convinced that it is =
a good idea to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; standardize things like DB mapper or =
binary formats. E.g.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; there exist a number of different formats =
and some people</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; may want to continue using them. But =
informational RFCs</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; could cover all these things.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; To summarize my point: the evaluation =
should focus on the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; protocol and its capabilities and not on =
things storage</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; formats etc.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; BTW Diameter has a proposed XML definition =
as well</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; =
(draft-frascone-aaa-xml-dictionary-00.html). Another proposal</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; was to use SMIng =
(draft-schoenw-sming-dia-00.txt).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Cheers,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sebastian</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26BEE.70EB4478--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 18:30:20 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA24422
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 18:30:20 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xaqA-0005lb-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 17:22:34 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xaq8-0005lV-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 17:22:32 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id SAA00535;
	Fri, 4 Oct 2002 18:27:34 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma000527; Fri, 4 Oct 02 18:26:45 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <S4ZY4FDT>; Fri, 4 Oct 2002 18:09:46 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA256D5F@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: "'Jeff Meyer'" <jeffm@cup.hp.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Fri, 4 Oct 2002 18:15:06 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26BF3.0B2310CF"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26BF3.0B2310CF
Content-Type: text/plain

Hi Jeff,

Since IPDR is forum based, rather than a vendor proposal, have you been
assured that all the members of the forum will submit IPR Notices to the
IETF stating this? or that a joint notice from IPDR.org will be filed?

dbh

> -----Original Message-----
> From: Jeff Meyer [mailto:jeffm@cup.hp.com]
> Sent: Friday, October 04, 2002 4:00 PM
> To: Harrington, David
> Cc: ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> 
> 
> David,
> 
>    Section 1.3 in the IPDR Advocacy draft states:
> 
>      1.3 Patent Protection
> 
>     There are no known patents which apply to or affect the
>     right to freely use this technology.
> 
>    I have been assured that this is the case.
> 
> Regards,
> 
>    Jeff Meyer
> 
> 
> Harrington, David wrote:
> 
> > A question: Are there intellectual property claims against 
> IPDR? There 
> > probably are for all the protocols proposed; I just don't remember 
> > seeing anything mentioned and want to make sure all the 
> cards are on the 
> > table.
> > 
> > dbh
> > 
> >  > -----Original Message-----
> >  > From: Robert Lowe [mailto:robert.h.lowe@lawrence.edu]
> >  > Sent: Friday, October 04, 2002 1:57 PM
> >  > To: Jeff Meyer
> >  > Cc: Sebastian Zander; Peter Ludemann; 
> ipfix-eval@net.doit.wisc.edu
> >  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> >  >
> >  >
> >  > Jeff Meyer wrote:
> >  >
> >  > Attention: lurker factor in play...
> >  >
> >  > > An implementation
> >  > > for what IPDR requires is pretty trivial.  IPDR
> >  > > members have access to opensource for this in
> >  > > both Java and C.
> >  >
> >  > The common definition of opensource includes descriptives such
> >  > as "publicly-available" and "no-strings-attached".  You seem
> >  > like a pretty good evangelist for IPDR, but once someone starts
> >  > passing the collection plate, using the word "opensource" only
> >  > sullies the good name of the sacred cow of 21st century computing
> >  > with the marketeer's comparison to a members-only reference
> >  > implementation.  Some words don't have increasing degrees of
> >  > comparison.  You can be dead, but you can't be 'deader', and in
> >  > my book, open is open, not open for a fee.  Grammer lesson and
> >  > rant off...
> >  >
> >  > -Robert
> >  >
> >  > --
> >  > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> >  > in message body
> >  > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >  > "unsubscribe ipfix" in message body
> >  > Archive     http://ipfix.doit.wisc.edu/archive/
> >  >
> > 
> 
> 
> 

------_=_NextPart_001_01C26BF3.0B2310CF
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DUS-ASCII">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Discussion of Candidate Protocols</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hi Jeff,</FONT>
</P>

<P><FONT SIZE=3D2>Since IPDR is forum based, rather than a vendor =
proposal, have you been assured that all the members of the forum will =
submit IPR Notices to the IETF stating this? or that a joint notice =
from IPDR.org will be filed?</FONT></P>

<P><FONT SIZE=3D2>dbh</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Jeff Meyer [<A =
HREF=3D"mailto:jeffm@cup.hp.com">mailto:jeffm@cup.hp.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Friday, October 04, 2002 4:00 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Harrington, David</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] Discussion of =
Candidate Protocols</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; David,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Section 1.3 in the IPDR =
Advocacy draft states:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1.3 Patent =
Protection</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; There are no known =
patents which apply to or affect the</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; right to freely use =
this technology.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; I have been assured that this =
is the case.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Regards,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Harrington, David wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; A question: Are there intellectual =
property claims against </FONT>
<BR><FONT SIZE=3D2>&gt; IPDR? There </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; probably are for all the protocols =
proposed; I just don't remember </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; seeing anything mentioned and want to make =
sure all the </FONT>
<BR><FONT SIZE=3D2>&gt; cards are on the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; table.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; dbh</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; -----Original =
Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; From: Robert Lowe [<A =
HREF=3D"mailto:robert.h.lowe@lawrence.edu">mailto:robert.h.lowe@lawrence=
.edu</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Sent: Friday, October 04, 2002 =
1:57 PM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; To: Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Cc: Sebastian Zander; Peter =
Ludemann; </FONT>
<BR><FONT SIZE=3D2>&gt; ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Subject: Re: [ipfix-eval] =
Discussion of Candidate Protocols</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Jeff Meyer wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Attention: lurker factor in =
play...</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; &gt; An implementation</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; &gt; for what IPDR requires is =
pretty trivial.&nbsp; IPDR</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; &gt; members have access to =
opensource for this in</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; &gt; both Java and C.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; The common definition of =
opensource includes descriptives such</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; as =
&quot;publicly-available&quot; and =
&quot;no-strings-attached&quot;.&nbsp; You seem</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; like a pretty good evangelist =
for IPDR, but once someone starts</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; passing the collection plate, =
using the word &quot;opensource&quot; only</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; sullies the good name of the =
sacred cow of 21st century computing</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; with the marketeer's comparison =
to a members-only reference</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; implementation.&nbsp; Some =
words don't have increasing degrees of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; comparison.&nbsp; You can be =
dead, but you can't be 'deader', and in</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; my book, open is open, not open =
for a fee.&nbsp; Grammer lesson and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; rant off...</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; -Robert</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; &quot;unsubscribe ipfix&quot; =
in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; =
<A HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26BF3.0B2310CF--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 18:37:16 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA24722
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 18:37:15 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xayC-0005yH-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 17:30:52 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xayA-0005x5-00; Fri, 04 Oct 2002 17:30:50 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g94MUIGU018113;
	Sat, 5 Oct 2002 00:30:18 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g94MUI4m018110;
	Sat, 5 Oct 2002 00:30:18 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: ipfix-req@net.doit.wisc.edu
Cc: Reinaldo Penno <rpenno@nortelnetworks.com>,
        ipfix-eval-team@net.doit.wisc.edu
Subject: [ipfix-req] Data Export Reliability Requirement
 [was: Re: IPFIX Requirement draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C04119EF5@zsc3c032.us.nortel.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <7B802811BE77D51189910002A55CFD2C04119EF5@zsc3c032.us.nortel.com>
Date: 05 Oct 2002 00:30:17 +0200
Message-ID: <aan0ptygzq.fsf@limmat.switch.ch>
Lines: 53
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Mon, 30 Sep 2002 03:00:03 -0700, "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
> I'm looking to understand/really clarify this requirement. It seems
> ambiguous...at least to me. I do not understand what is the
> meaning/purpose of "-->abscence<-- of reliability....MUST be
> indicated".

Yes, that just sounds weird.  (High) reliability should be a goal for
the exporting process, not something that can be readily measured, or
even less is "present" or "absent" at a given time during the
operation of an IPFIX implementation.

reqs-06> Absence of reliability of the data transfer, for example caused by
reqs-06> loss or reordering of packets containing flow information, MUST be
reqs-06> indicated.

Why not write something like this instead:

  "If some flow information data cannot be delivered to the collector
   in a timely manner, the amount of missing flow information data
   MUST be indicated to the collector.  Possible reasons for failure
   to deliver data include loss of packets on the network path, or
   resource shortage at the exporter."

I removed packet reordering as an example for reasons to lose data
because I don't think it's that relevant in practice.  From
operational experience, I think overflows at the exporter are a much
more likely source of data loss.

An indication of the amount of data lost is more useful than an
unspecific indication of "absence of reliability" and should be
relatively easy to provide.

reqs-06> Please note that if an unreliable transport protocol is used,
reqs-06> reliability can be provided by higher layers. In such a case
reqs-06> only lack of overall reliability MUST be indicated.

And end-to-end purist might argue that even if the underlying
transport protocol is used, reliability must be provided at higher
layers too.  See the "application layer ACK" debate on the ipfix-req
list a few days ago.

  "Reliability can be supported by suitable transport protocols.  In
  any case only end-to-end flow information loss between exporter and
  collector need be indicated."

reqs-06> For example reordering could be dealt with by adding a
reqs-06> sequence number to each packet.

Or order may not be relevant since the exact arrival time of a piece
of flow information doesn't matter - the timestamps in the flow record
will provide sufficient sequence information for the collector.
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 19:39:37 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA25980
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 19:39:36 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xbob-0007K5-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 18:25:01 -0500
Received: from [208.253.219.211] (helo=narus.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xboY-0007JS-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 18:24:58 -0500
Received: from franklin.narus.com (franklin.narus.com [192.168.7.140])
	by narus.com (8.11.6/8.11.6) with ESMTP id g94NM1u18141;
	Fri, 4 Oct 2002 16:22:01 -0700
Received: by franklin.narus.com with Internet Mail Service (5.5.2655.55)
	id <4CNBFRWW>; Fri, 4 Oct 2002 16:22:01 -0700
Message-ID: <580E532D9F7A9B4BAE8A130848E0DDA702083A1D@franklin.narus.com>
From: Stas Khirman <StasK@Narus.com>
To: "'Harrington, David'" <dbh@enterasys.com>,
        "'Jeff Meyer'"
	 <jeffm@cup.hp.com>, ipfix-eval@net.doit.wisc.edu
Cc: "'scotton@compuserve.com'" <scotton@compuserve.com>,
        "'kensarno@ipdr.org'" <kensarno@ipdr.org>,
        "'aheintz@ipdr.org'"
	 <aheintz@ipdr.org>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Fri, 4 Oct 2002 16:22:01 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2655.55)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26BFC.D7801020"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26BFC.D7801020
Content-Type: text/plain;
	charset="iso-8859-1"

I think that some clarification have to be made: Every and each IPDR
participating companies signed "release of intellectual rights" document. At
least it was a primary condition for participation ( and I hope that
IPDR.org administrative staff have all paperwork in order). 
 
Certainly, I am not lawyer,  but on my humble opinion all IPDR rights belong
today to IPDR.org and not to any separate member-company. Submitting IPDR
draft to IETF, IPDR.org is shows readiness to share all intellectual rights
with IETF and (automatically) with a general public (I think IETF follows
GPL policy).  
 
I'm forwarding this message to few IPDR key people and appreciate if they
provide IPFIX with a more formal information and legal questions
clarification .
 
 
Stas

-----Original Message-----
From: Harrington, David [mailto:dbh@enterasys.com]
Sent: Friday, October 04, 2002 3:15 PM
To: 'Jeff Meyer'
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols



Hi Jeff, 

Since IPDR is forum based, rather than a vendor proposal, have you been
assured that all the members of the forum will submit IPR Notices to the
IETF stating this? or that a joint notice from IPDR.org will be filed?

dbh 

> -----Original Message----- 
> From: Jeff Meyer [ mailto:jeffm@cup.hp.com <mailto:jeffm@cup.hp.com> ] 
> Sent: Friday, October 04, 2002 4:00 PM 
> To: Harrington, David 
> Cc: ipfix-eval@net.doit.wisc.edu 
> Subject: Re: [ipfix-eval] Discussion of Candidate Protocols 
> 
> 
> David, 
> 
>    Section 1.3 in the IPDR Advocacy draft states: 
> 
>      1.3 Patent Protection 
> 
>     There are no known patents which apply to or affect the 
>     right to freely use this technology. 
> 
>    I have been assured that this is the case. 
> 
> Regards, 
> 
>    Jeff Meyer 
> 
> 
> Harrington, David wrote: 
> 
> > A question: Are there intellectual property claims against 
> IPDR? There 
> > probably are for all the protocols proposed; I just don't remember 
> > seeing anything mentioned and want to make sure all the 
> cards are on the 
> > table. 
> > 
> > dbh 
> > 
> >  > -----Original Message----- 
> >  > From: Robert Lowe [ mailto:robert.h.lowe@lawrence.edu
<mailto:robert.h.lowe@lawrence.edu> ] 
> >  > Sent: Friday, October 04, 2002 1:57 PM 
> >  > To: Jeff Meyer 
> >  > Cc: Sebastian Zander; Peter Ludemann; 
> ipfix-eval@net.doit.wisc.edu 
> >  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols 
> >  > 
> >  > 
> >  > Jeff Meyer wrote: 
> >  > 
> >  > Attention: lurker factor in play... 
> >  > 
> >  > > An implementation 
> >  > > for what IPDR requires is pretty trivial.  IPDR 
> >  > > members have access to opensource for this in 
> >  > > both Java and C. 
> >  > 
> >  > The common definition of opensource includes descriptives such 
> >  > as "publicly-available" and "no-strings-attached".  You seem 
> >  > like a pretty good evangelist for IPDR, but once someone starts 
> >  > passing the collection plate, using the word "opensource" only 
> >  > sullies the good name of the sacred cow of 21st century computing 
> >  > with the marketeer's comparison to a members-only reference 
> >  > implementation.  Some words don't have increasing degrees of 
> >  > comparison.  You can be dead, but you can't be 'deader', and in 
> >  > my book, open is open, not open for a fee.  Grammer lesson and 
> >  > rant off... 
> >  > 
> >  > -Robert 
> >  > 
> >  > -- 
> >  > Help        mailto:majordomo@net.doit.wisc.edu
<mailto:majordomo@net.doit.wisc.edu>  and say "help" 
> >  > in message body 
> >  > Unsubscribe mailto:majordomo@net.doit.wisc.edu
<mailto:majordomo@net.doit.wisc.edu>  and say 
> >  > "unsubscribe ipfix" in message body 
> >  > Archive     http://ipfix.doit.wisc.edu/archive/
<http://ipfix.doit.wisc.edu/archive/>  
> >  > 
> > 
> 
> 
> 


------_=_NextPart_001_01C26BFC.D7801020
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>RE: [ipfix-eval] Discussion of Candidate Protocols</TITLE>

<META content="MSHTML 5.50.4807.2300" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff size=2>I 
think that some clarification have to be made: Every and each IPDR participating 
companies signed "release of intellectual rights" document. At least it was a 
primary condition&nbsp;for participation ( and I hope that IPDR.org 
administrative staff have all paperwork in order). </FONT></SPAN></DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff 
size=2>Certainly, I am not lawyer,&nbsp; but on my humble opinion all IPDR 
rights belong today to IPDR.org and not to any separate member-company. 
Submitting IPDR draft&nbsp;to IETF, IPDR.org is shows readiness to share all 
intellectual rights with IETF and (automatically) with a general public (I think 
IETF follows GPL policy). &nbsp;</FONT></SPAN></DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN><SPAN class=949082122-04102002><FONT face=Arial 
color=#0000ff size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff size=2>I'm 
forwarding this message to few IPDR key people and appreciate if they provide 
IPFIX with a more formal information and legal questions 
clarification&nbsp;.</FONT></SPAN></DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=949082122-04102002><FONT face=Arial color=#0000ff 
size=2>Stas</FONT></SPAN></DIV>
<BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Harrington, David 
  [mailto:dbh@enterasys.com]<BR><B>Sent:</B> Friday, October 04, 2002 3:15 
  PM<BR><B>To:</B> 'Jeff Meyer'<BR><B>Cc:</B> 
  ipfix-eval@net.doit.wisc.edu<BR><B>Subject:</B> RE: [ipfix-eval] Discussion of 
  Candidate Protocols<BR><BR></FONT></DIV>
  <P><FONT size=2>Hi Jeff,</FONT> </P>
  <P><FONT size=2>Since IPDR is forum based, rather than a vendor proposal, have 
  you been assured that all the members of the forum will submit IPR Notices to 
  the IETF stating this? or that a joint notice from IPDR.org will be 
  filed?</FONT></P>
  <P><FONT size=2>dbh</FONT> </P>
  <P><FONT size=2>&gt; -----Original Message-----</FONT> <BR><FONT size=2>&gt; 
  From: Jeff Meyer [<A 
  href="mailto:jeffm@cup.hp.com">mailto:jeffm@cup.hp.com</A>]</FONT> <BR><FONT 
  size=2>&gt; Sent: Friday, October 04, 2002 4:00 PM</FONT> <BR><FONT 
  size=2>&gt; To: Harrington, David</FONT> <BR><FONT size=2>&gt; Cc: 
  ipfix-eval@net.doit.wisc.edu</FONT> <BR><FONT size=2>&gt; Subject: Re: 
  [ipfix-eval] Discussion of Candidate Protocols</FONT> <BR><FONT size=2>&gt; 
  </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; David,</FONT> 
  <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp; Section 
  1.3 in the IPDR Advocacy draft states:</FONT> <BR><FONT size=2>&gt; 
  </FONT><BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1.3 Patent 
  Protection</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
  size=2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; There are no known patents which apply to 
  or affect the</FONT> <BR><FONT size=2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; right to 
  freely use this technology.</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
  size=2>&gt;&nbsp;&nbsp;&nbsp; I have been assured that this is the 
  case.</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; 
  Regards,</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
  size=2>&gt;&nbsp;&nbsp;&nbsp; Jeff Meyer</FONT> <BR><FONT size=2>&gt; 
  </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; Harrington, David 
  wrote:</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; &gt; A 
  question: Are there intellectual property claims against </FONT><BR><FONT 
  size=2>&gt; IPDR? There </FONT><BR><FONT size=2>&gt; &gt; probably are for all 
  the protocols proposed; I just don't remember </FONT><BR><FONT size=2>&gt; 
  &gt; seeing anything mentioned and want to make sure all the </FONT><BR><FONT 
  size=2>&gt; cards are on the </FONT><BR><FONT size=2>&gt; &gt; table.</FONT> 
  <BR><FONT size=2>&gt; &gt; </FONT><BR><FONT size=2>&gt; &gt; dbh</FONT> 
  <BR><FONT size=2>&gt; &gt; </FONT><BR><FONT size=2>&gt; &gt;&nbsp; &gt; 
  -----Original Message-----</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; From: 
  Robert Lowe [<A 
  href="mailto:robert.h.lowe@lawrence.edu">mailto:robert.h.lowe@lawrence.edu</A>]</FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt; Sent: Friday, October 04, 2002 1:57 
  PM</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; To: Jeff Meyer</FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt; Cc: Sebastian Zander; Peter Ludemann; 
  </FONT><BR><FONT size=2>&gt; ipfix-eval@net.doit.wisc.edu</FONT> <BR><FONT 
  size=2>&gt; &gt;&nbsp; &gt; Subject: Re: [ipfix-eval] Discussion of Candidate 
  Protocols</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT 
  size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; Jeff 
  Meyer wrote:</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT 
  size=2>&gt; &gt;&nbsp; &gt; Attention: lurker factor in play...</FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; 
  &gt; &gt; An implementation</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; &gt; 
  for what IPDR requires is pretty trivial.&nbsp; IPDR</FONT> <BR><FONT 
  size=2>&gt; &gt;&nbsp; &gt; &gt; members have access to opensource for this 
  in</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; &gt; both Java and C.</FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; 
  &gt; The common definition of opensource includes descriptives such</FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt; as "publicly-available" and 
  "no-strings-attached".&nbsp; You seem</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; 
  &gt; like a pretty good evangelist for IPDR, but once someone starts</FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt; passing the collection plate, using the 
  word "opensource" only</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; sullies 
  the good name of the sacred cow of 21st century computing</FONT> <BR><FONT 
  size=2>&gt; &gt;&nbsp; &gt; with the marketeer's comparison to a members-only 
  reference</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; implementation.&nbsp; 
  Some words don't have increasing degrees of</FONT> <BR><FONT size=2>&gt; 
  &gt;&nbsp; &gt; comparison.&nbsp; You can be dead, but you can't be 'deader', 
  and in</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; my book, open is open, not 
  open for a fee.&nbsp; Grammer lesson and</FONT> <BR><FONT size=2>&gt; 
  &gt;&nbsp; &gt; rant off...</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; 
  &gt;</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; -Robert</FONT> <BR><FONT 
  size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; 
  --</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; 
  Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A 
  href="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> 
  and say "help"</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; in message 
  body</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; Unsubscribe <A 
  href="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> 
  and say</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; "unsubscribe ipfix" in 
  message body</FONT> <BR><FONT size=2>&gt; &gt;&nbsp; &gt; 
  Archive&nbsp;&nbsp;&nbsp;&nbsp; <A target=_blank 
  href="http://ipfix.doit.wisc.edu/archive/">http://ipfix.doit.wisc.edu/archive/</A></FONT> 
  <BR><FONT size=2>&gt; &gt;&nbsp; &gt;</FONT> <BR><FONT size=2>&gt; &gt; 
  </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT 
  size=2>&gt; </FONT></P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C26BFC.D7801020--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 19:57:45 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA26336
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 19:57:45 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xcDx-0000Av-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 18:51:13 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xcDu-0000A6-00
	for ipfix-req@net.doit.wisc.edu; Fri, 04 Oct 2002 18:51:10 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g94NocGU018247;
	Sat, 5 Oct 2002 01:50:38 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g94Nobxg018244;
	Sat, 5 Oct 2002 01:50:37 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: "Reinaldo Penno" <rpenno@nortelnetworks.com>
Cc: req <ipfix-req@net.doit.wisc.edu>
Subject: Re: [ipfix-req] Requirements drafts,  NATed flows and VPNs
References: <7B802811BE77D51189910002A55CFD2C0411A1DC@zsc3c032.us.nortel.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <7B802811BE77D51189910002A55CFD2C0411A1DC@zsc3c032.us.nortel.com>
Date: 05 Oct 2002 01:50:37 +0200
Message-ID: <aabs69yd9u.fsf@limmat.switch.ch>
Lines: 41
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

[ipfix-eval-team removed from list of recipients, since this seems
 purely a requirements issue.]

I am opposed to this proposal because it opens a can of worms if we
start to try to accomodate arbitrary services and middleboxes.

What about those cool rate shapers that fiddle with TCP window sizes?
If they support IPFIX, the window-fiddle-factor field ist a must!
What about "cookie-cutting" layer 4-7 switches? The cookie field is a
must! VoIP switches? etc. etc.

Please let's try to stick with the core goal of looking at IP (v4&v6)
packets and the "transport" protocol or next header.

Anything else should be optional and left to other documents.  The
IPFIX protocol just should support enough extensibility to allow this.

My counter-proposal would be to drop the MPLS label requirement from
the requirements draft.
-- 
Simon.

On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
> I think there are some important packet fields/scenarios that should
> be included in the requirements draft.

> 1 - We discussed a long time ago to include the VPN-ID as one of the
> parameters exported. If Ipfix will be used in VPN environments for
> accouting, QoS, monitoring, etc, this field is a must.

> 2 - There is mention to intrusion detection/security as one of the
> applications for IPfix, but there is no requirement to export NATed
> flows (before and after).

> In a device that supports NAT (traditional, layer 7 interception,
> whatever) and it's going to use IPfix for security/intrusion
> detection, dealing with NAT is must. There is no way a intrusion
> detection device will find attacker/attacked properly without both
> sides of a NAT flow. Not to mention accouting, billing, etc.

> I would propose to include both items on the requirements draft.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 20:11:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA26582
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 20:11:50 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xcPX-0000Tx-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 19:03:11 -0500
Received: from rip.psg.com ([147.28.0.39])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xcPW-0000Tr-00
	for ipfix-req@net.doit.wisc.edu; Fri, 04 Oct 2002 19:03:10 -0500
Received: from localhost ([127.0.0.1] helo=rip.psg.com.psg.com)
	by rip.psg.com with esmtp (Exim 4.10)
	id 17xcPT-0004B2-00; Fri, 04 Oct 2002 17:03:07 -0700
From: Randy Bush <randy@psg.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
To: Simon Leinen <simon@limmat.switch.ch>
Cc: "Reinaldo Penno" <rpenno@nortelnetworks.com>,
        req <ipfix-req@net.doit.wisc.edu>
Subject: Re: [ipfix-req] Requirements drafts,  NATed flows and VPNs
References: <7B802811BE77D51189910002A55CFD2C0411A1DC@zsc3c032.us.nortel.com>
	<aabs69yd9u.fsf@limmat.switch.ch>
Message-Id: <E17xcPT-0004B2-00@rip.psg.com>
Date: Fri, 04 Oct 2002 17:03:07 -0700
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Please let's try to stick with the core goal of looking at IP (v4&v6)
> packets and the "transport" protocol or next header.

i think that was the intent of this wg's charter.

randy, with ad hat on


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 20:20:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA26701
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 20:20:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xcWE-0000iL-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 19:10:06 -0500
Received: from palrel13.hp.com ([156.153.255.238])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xcWD-0000iF-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 04 Oct 2002 19:10:05 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP
	id 733AB400393; Fri,  4 Oct 2002 17:10:04 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id RAA11994;
	Fri, 4 Oct 2002 17:09:59 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021005004110.HEZF18196.simail.cup.hp.com@cup.hp.com>;
          Fri, 4 Oct 2002 17:41:10 -0700
Message-ID: <3D9E2E54.7040608@cup.hp.com>
Date: Fri, 04 Oct 2002 17:12:05 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>, ipfix-eval@net.doit.wisc.edu,
        Aron Heintz <aheintz@ipdr.org>
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <6D745637A7E0F94DA070743C55CDA9BA256D5F@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

David,

   I believe the legal agreement signed by IPDR members
passes the rights to IPDR itself.  IPDR's board has
approved this submission activity.

   I'll forward this onto the IPDR President for further
clarification.

-- Jeff

Harrington, David wrote:

> Hi Jeff,
> 
> Since IPDR is forum based, rather than a vendor proposal, have you been 
> assured that all the members of the forum will submit IPR Notices to the 
> IETF stating this? or that a joint notice from IPDR.org will be filed?
> 
> dbh
> 
>  > -----Original Message-----
>  > From: Jeff Meyer [mailto:jeffm@cup.hp.com]
>  > Sent: Friday, October 04, 2002 4:00 PM
>  > To: Harrington, David
>  > Cc: ipfix-eval@net.doit.wisc.edu
>  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>  >
>  >
>  > David,
>  >
>  >    Section 1.3 in the IPDR Advocacy draft states:
>  >
>  >      1.3 Patent Protection
>  >
>  >     There are no known patents which apply to or affect the
>  >     right to freely use this technology.
>  >
>  >    I have been assured that this is the case.
>  >
>  > Regards,
>  >
>  >    Jeff Meyer
>  >
>  >
>  > Harrington, David wrote:
>  >
>  > > A question: Are there intellectual property claims against
>  > IPDR? There
>  > > probably are for all the protocols proposed; I just don't remember
>  > > seeing anything mentioned and want to make sure all the
>  > cards are on the
>  > > table.
>  > >
>  > > dbh
>  > >
>  > >  > -----Original Message-----
>  > >  > From: Robert Lowe [mailto:robert.h.lowe@lawrence.edu]
>  > >  > Sent: Friday, October 04, 2002 1:57 PM
>  > >  > To: Jeff Meyer
>  > >  > Cc: Sebastian Zander; Peter Ludemann;
>  > ipfix-eval@net.doit.wisc.edu
>  > >  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>  > >  >
>  > >  >
>  > >  > Jeff Meyer wrote:
>  > >  >
>  > >  > Attention: lurker factor in play...
>  > >  >
>  > >  > > An implementation
>  > >  > > for what IPDR requires is pretty trivial.  IPDR
>  > >  > > members have access to opensource for this in
>  > >  > > both Java and C.
>  > >  >
>  > >  > The common definition of opensource includes descriptives such
>  > >  > as "publicly-available" and "no-strings-attached".  You seem
>  > >  > like a pretty good evangelist for IPDR, but once someone starts
>  > >  > passing the collection plate, using the word "opensource" only
>  > >  > sullies the good name of the sacred cow of 21st century computing
>  > >  > with the marketeer's comparison to a members-only reference
>  > >  > implementation.  Some words don't have increasing degrees of
>  > >  > comparison.  You can be dead, but you can't be 'deader', and in
>  > >  > my book, open is open, not open for a fee.  Grammer lesson and
>  > >  > rant off...
>  > >  >
>  > >  > -Robert
>  > >  >
>  > >  > --
>  > >  > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
>  > >  > in message body
>  > >  > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>  > >  > "unsubscribe ipfix" in message body
>  > >  > Archive     http://ipfix.doit.wisc.edu/archive/
>  > >  >
>  > >
>  >
>  >
>  >
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 21:44:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28089
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 21:44:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xdso-0002qm-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 20:37:30 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xdsm-0002pp-00
	for ipfix-req@net.doit.wisc.edu; Fri, 04 Oct 2002 20:37:28 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g951atY04083;
	Fri, 4 Oct 2002 18:36:55 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g951b6q10338;
	Fri, 4 Oct 2002 20:37:07 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7PVPW>; Fri, 4 Oct 2002 18:36:52 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Simon Leinen <simon@limmat.switch.ch>
Cc: req <ipfix-req@net.doit.wisc.edu>
Subject: RE: [ipfix-req] Requirements drafts,  NATed flows and VPNs
Date: Fri, 4 Oct 2002 18:36:52 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26C0F.AE89F542"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26C0F.AE89F542
Content-Type: text/plain;
	charset="iso-8859-1"

that's fair...but the premise was the statement in the draft that IPfix
could be used for intrusion detection. Given that intrusion detection
devices get all their data from port mirroring; the limited subset of data
provided by IPfix + issues such as the lack of NAT visibility (which are
directly related to the statement) makes me wonder if we shouldn't take that
statement out.

well, somebody could always argue that IPfix can do some intrusion
detection...but I really do not think it's a good fit. The "some" argument
could be expanded to include all kinds of applications.

I could also agree we should drop the MPLS label requirement. Otherwise one
should ask why not export information about other tunneling protocols such
as L2TP/GRE/IPSEC information also. 

regards,

Reinaldo



> -----Original Message-----
> From: Simon Leinen [mailto:simon@limmat.switch.ch]
> Sent: Friday, October 04, 2002 4:51 PM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: req
> Subject: Re: [ipfix-req] Requirements drafts, NATed flows and VPNs
> 
> 
> [ipfix-eval-team removed from list of recipients, since this seems
>  purely a requirements issue.]
> 
> I am opposed to this proposal because it opens a can of worms if we
> start to try to accomodate arbitrary services and middleboxes.
> 
> What about those cool rate shapers that fiddle with TCP window sizes?
> If they support IPFIX, the window-fiddle-factor field ist a must!
> What about "cookie-cutting" layer 4-7 switches? The cookie field is a
> must! VoIP switches? etc. etc.
> 
> Please let's try to stick with the core goal of looking at IP (v4&v6)
> packets and the "transport" protocol or next header.
> 
> Anything else should be optional and left to other documents.  The
> IPFIX protocol just should support enough extensibility to allow this.
> 
> My counter-proposal would be to drop the MPLS label requirement from
> the requirements draft.
> -- 
> Simon.
> 
> On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno" 
> <rpenno@nortelnetworks.com> said:
> > I think there are some important packet fields/scenarios that should
> > be included in the requirements draft.
> 
> > 1 - We discussed a long time ago to include the VPN-ID as one of the
> > parameters exported. If Ipfix will be used in VPN environments for
> > accouting, QoS, monitoring, etc, this field is a must.
> 
> > 2 - There is mention to intrusion detection/security as one of the
> > applications for IPfix, but there is no requirement to export NATed
> > flows (before and after).
> 
> > In a device that supports NAT (traditional, layer 7 interception,
> > whatever) and it's going to use IPfix for security/intrusion
> > detection, dealing with NAT is must. There is no way a intrusion
> > detection device will find attacker/attacked properly without both
> > sides of a NAT flow. Not to mention accouting, billing, etc.
> 
> > I would propose to include both items on the requirements draft.
> 

------_=_NextPart_001_01C26C0F.AE89F542
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] Requirements drafts,  NATed flows and =
VPNs</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>that's fair...but the premise was the statement in =
the draft that IPfix could be used for intrusion detection. Given that =
intrusion detection devices get all their data from port mirroring; the =
limited subset of data provided by IPfix + issues such as the lack of =
NAT visibility (which are directly related to the statement) makes me =
wonder if we shouldn't take that statement out.</FONT></P>

<P><FONT SIZE=3D2>well, somebody could always argue that IPfix can do =
some intrusion detection...but I really do not think it's a good fit. =
The &quot;some&quot; argument could be expanded to include all kinds of =
applications.</FONT></P>

<P><FONT SIZE=3D2>I could also agree we should drop the MPLS label =
requirement. Otherwise one should ask why not export information about =
other tunneling protocols such as L2TP/GRE/IPSEC information also. =
</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>
<BR>
<BR>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Simon Leinen [<A =
HREF=3D"mailto:simon@limmat.switch.ch">mailto:simon@limmat.switch.ch</A>=
]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Friday, October 04, 2002 4:51 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: req</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] Requirements drafts, =
NATed flows and VPNs</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; [ipfix-eval-team removed from list of =
recipients, since this seems</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; purely a requirements issue.]</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I am opposed to this proposal because it opens =
a can of worms if we</FONT>
<BR><FONT SIZE=3D2>&gt; start to try to accomodate arbitrary services =
and middleboxes.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; What about those cool rate shapers that fiddle =
with TCP window sizes?</FONT>
<BR><FONT SIZE=3D2>&gt; If they support IPFIX, the window-fiddle-factor =
field ist a must!</FONT>
<BR><FONT SIZE=3D2>&gt; What about &quot;cookie-cutting&quot; layer 4-7 =
switches? The cookie field is a</FONT>
<BR><FONT SIZE=3D2>&gt; must! VoIP switches? etc. etc.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Please let's try to stick with the core goal of =
looking at IP (v4&amp;v6)</FONT>
<BR><FONT SIZE=3D2>&gt; packets and the &quot;transport&quot; protocol =
or next header.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Anything else should be optional and left to =
other documents.&nbsp; The</FONT>
<BR><FONT SIZE=3D2>&gt; IPFIX protocol just should support enough =
extensibility to allow this.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; My counter-proposal would be to drop the MPLS =
label requirement from</FONT>
<BR><FONT SIZE=3D2>&gt; the requirements draft.</FONT>
<BR><FONT SIZE=3D2>&gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; Simon.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Mon, 30 Sep 2002 10:26:36 -0700, =
&quot;Reinaldo Penno&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;rpenno@nortelnetworks.com&gt; said:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I think there are some important packet =
fields/scenarios that should</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; be included in the requirements =
draft.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; 1 - We discussed a long time ago to =
include the VPN-ID as one of the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; parameters exported. If Ipfix will be used =
in VPN environments for</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; accouting, QoS, monitoring, etc, this =
field is a must.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; 2 - There is mention to intrusion =
detection/security as one of the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; applications for IPfix, but there is no =
requirement to export NATed</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; flows (before and after).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; In a device that supports NAT =
(traditional, layer 7 interception,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; whatever) and it's going to use IPfix for =
security/intrusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; detection, dealing with NAT is must. There =
is no way a intrusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; detection device will find =
attacker/attacked properly without both</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; sides of a NAT flow. Not to mention =
accouting, billing, etc.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I would propose to include both items on =
the requirements draft.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26C0F.AE89F542--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct  4 21:55:48 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28151
	for <ipfix-archive@lists.ietf.org>; Fri, 4 Oct 2002 21:55:48 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xdzs-0002y4-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 04 Oct 2002 20:44:48 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xdzq-0002xn-00; Fri, 04 Oct 2002 20:44:46 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g951iDY04217;
	Fri, 4 Oct 2002 18:44:13 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g951iOq10466;
	Fri, 4 Oct 2002 20:44:25 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7PVQQ>; Fri, 4 Oct 2002 18:44:10 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Simon Leinen <simon@limmat.switch.ch>, ipfix-req@net.doit.wisc.edu
Cc: ipfix-eval-team@net.doit.wisc.edu
Subject: [ipfix-req] RE: Data Export Reliability Requirement [was: Re: IPFIX Requireme
	nt draft status - section 6.3.2]
Date: Fri, 4 Oct 2002 18:44:10 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26C10.B3AE8712"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26C10.B3AE8712
Content-Type: text/plain;
	charset="iso-8859-1"



> -----Original Message-----
> From: Simon Leinen [mailto:simon@limmat.switch.ch]
> Sent: Friday, October 04, 2002 3:30 PM
> To: ipfix-req@net.doit.wisc.edu
> Cc: Penno, Reinaldo [BL60:0430:EXCH]; 
> ipfix-eval-team@net.doit.wisc.edu
> Subject: Data Export Reliability Requirement [was: Re: IPFIX 
> Requirement
> draft status - section 6.3.2]
> 
> 
> On Mon, 30 Sep 2002 03:00:03 -0700, "Reinaldo Penno" 
> <rpenno@nortelnetworks.com> said:
> > I'm looking to understand/really clarify this requirement. It seems
> > ambiguous...at least to me. I do not understand what is the
> > meaning/purpose of "-->abscence<-- of reliability....MUST be
> > indicated".
> 
> Yes, that just sounds weird.  (High) reliability should be a goal for
> the exporting process, not something that can be readily measured, or
> even less is "present" or "absent" at a given time during the
> operation of an IPFIX implementation.
> 
> reqs-06> Absence of reliability of the data transfer, for 
> example caused by
> reqs-06> loss or reordering of packets containing flow 
> information, MUST be
> reqs-06> indicated.
> 
> Why not write something like this instead:
> 
>   "If some flow information data cannot be delivered to the collector
>    in a timely manner, the amount of missing flow information data
>    MUST be indicated to the collector.  Possible reasons for failure
>    to deliver data include loss of packets on the network path, or
>    resource shortage at the exporter."

But how the exporter would know which records were lost in the network
unless we have (application layer) ACKs? 

> 
> I removed packet reordering as an example for reasons to lose data
> because I don't think it's that relevant in practice.  From
> operational experience, I think overflows at the exporter are a much
> more likely source of data loss.
> 
> An indication of the amount of data lost is more useful than an
> unspecific indication of "absence of reliability" and should be
> relatively easy to provide.
> 
> reqs-06> Please note that if an unreliable transport protocol is used,
> reqs-06> reliability can be provided by higher layers. In such a case
> reqs-06> only lack of overall reliability MUST be indicated.
> 
> And end-to-end purist might argue that even if the underlying
> transport protocol is used, reliability must be provided at higher
> layers too.  See the "application layer ACK" debate on the ipfix-req
> list a few days ago.
> 
>   "Reliability can be supported by suitable transport protocols.  In
>   any case only end-to-end flow information loss between exporter and
>   collector need be indicated."
> 
> reqs-06> For example reordering could be dealt with by adding a
> reqs-06> sequence number to each packet.

when I read this whole section of the requirement draft I'm not sure what
are "exactly" the requirements. It's vague, full of loopholes due to the
"CANs" associated with specific situations...

> 
> Or order may not be relevant since the exact arrival time of a piece
> of flow information doesn't matter - the timestamps in the flow record
> will provide sufficient sequence information for the collector.
> -- 
> Simon.
> 

------_=_NextPart_001_01C26C10.B3AE8712
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2655.35">
<TITLE>RE: Data Export Reliability Requirement [was: Re: IPFIX Requirement draft status - section 6.3.2]</TITLE>
</HEAD>
<BODY>
<BR>
<BR>

<P><FONT SIZE=2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; From: Simon Leinen [<A HREF="mailto:simon@limmat.switch.ch">mailto:simon@limmat.switch.ch</A>]</FONT>
<BR><FONT SIZE=2>&gt; Sent: Friday, October 04, 2002 3:30 PM</FONT>
<BR><FONT SIZE=2>&gt; To: ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; Cc: Penno, Reinaldo [BL60:0430:EXCH]; </FONT>
<BR><FONT SIZE=2>&gt; ipfix-eval-team@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; Subject: Data Export Reliability Requirement [was: Re: IPFIX </FONT>
<BR><FONT SIZE=2>&gt; Requirement</FONT>
<BR><FONT SIZE=2>&gt; draft status - section 6.3.2]</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; On Mon, 30 Sep 2002 03:00:03 -0700, &quot;Reinaldo Penno&quot; </FONT>
<BR><FONT SIZE=2>&gt; &lt;rpenno@nortelnetworks.com&gt; said:</FONT>
<BR><FONT SIZE=2>&gt; &gt; I'm looking to understand/really clarify this requirement. It seems</FONT>
<BR><FONT SIZE=2>&gt; &gt; ambiguous...at least to me. I do not understand what is the</FONT>
<BR><FONT SIZE=2>&gt; &gt; meaning/purpose of &quot;--&gt;abscence&lt;-- of reliability....MUST be</FONT>
<BR><FONT SIZE=2>&gt; &gt; indicated&quot;.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Yes, that just sounds weird.&nbsp; (High) reliability should be a goal for</FONT>
<BR><FONT SIZE=2>&gt; the exporting process, not something that can be readily measured, or</FONT>
<BR><FONT SIZE=2>&gt; even less is &quot;present&quot; or &quot;absent&quot; at a given time during the</FONT>
<BR><FONT SIZE=2>&gt; operation of an IPFIX implementation.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; Absence of reliability of the data transfer, for </FONT>
<BR><FONT SIZE=2>&gt; example caused by</FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; loss or reordering of packets containing flow </FONT>
<BR><FONT SIZE=2>&gt; information, MUST be</FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; indicated.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Why not write something like this instead:</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp; &quot;If some flow information data cannot be delivered to the collector</FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp;&nbsp; in a timely manner, the amount of missing flow information data</FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp;&nbsp; MUST be indicated to the collector.&nbsp; Possible reasons for failure</FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp;&nbsp; to deliver data include loss of packets on the network path, or</FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp;&nbsp; resource shortage at the exporter.&quot;</FONT>
</P>

<P><FONT SIZE=2>But how the exporter would know which records were lost in the network unless we have (application layer) ACKs? </FONT>
</P>

<P><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; I removed packet reordering as an example for reasons to lose data</FONT>
<BR><FONT SIZE=2>&gt; because I don't think it's that relevant in practice.&nbsp; From</FONT>
<BR><FONT SIZE=2>&gt; operational experience, I think overflows at the exporter are a much</FONT>
<BR><FONT SIZE=2>&gt; more likely source of data loss.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; An indication of the amount of data lost is more useful than an</FONT>
<BR><FONT SIZE=2>&gt; unspecific indication of &quot;absence of reliability&quot; and should be</FONT>
<BR><FONT SIZE=2>&gt; relatively easy to provide.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; Please note that if an unreliable transport protocol is used,</FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; reliability can be provided by higher layers. In such a case</FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; only lack of overall reliability MUST be indicated.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; And end-to-end purist might argue that even if the underlying</FONT>
<BR><FONT SIZE=2>&gt; transport protocol is used, reliability must be provided at higher</FONT>
<BR><FONT SIZE=2>&gt; layers too.&nbsp; See the &quot;application layer ACK&quot; debate on the ipfix-req</FONT>
<BR><FONT SIZE=2>&gt; list a few days ago.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp; &quot;Reliability can be supported by suitable transport protocols.&nbsp; In</FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp; any case only end-to-end flow information loss between exporter and</FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp; collector need be indicated.&quot;</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; For example reordering could be dealt with by adding a</FONT>
<BR><FONT SIZE=2>&gt; reqs-06&gt; sequence number to each packet.</FONT>
</P>

<P><FONT SIZE=2>when I read this whole section of the requirement draft I'm not sure what are &quot;exactly&quot; the requirements. It's vague, full of loopholes due to the &quot;CANs&quot; associated with specific situations...</FONT></P>

<P><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Or order may not be relevant since the exact arrival time of a piece</FONT>
<BR><FONT SIZE=2>&gt; of flow information doesn't matter - the timestamps in the flow record</FONT>
<BR><FONT SIZE=2>&gt; will provide sufficient sequence information for the collector.</FONT>
<BR><FONT SIZE=2>&gt; -- </FONT>
<BR><FONT SIZE=2>&gt; Simon.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26C10.B3AE8712--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct  5 05:59:03 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA12857
	for <ipfix-archive@lists.ietf.org>; Sat, 5 Oct 2002 05:59:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xlSE-0006o4-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 05 Oct 2002 04:42:34 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17xlSB-0006mt-00; Sat, 05 Oct 2002 04:42:31 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g959fxGU018601;
	Sat, 5 Oct 2002 11:41:59 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g959fwiI018598;
	Sat, 5 Oct 2002 11:41:58 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: "Reinaldo Penno" <rpenno@nortelnetworks.com>
Cc: ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: [ipfix-req] Re: Data Export Reliability Requirement [was: Re: IPFIX Requireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com>
Date: 05 Oct 2002 11:41:58 +0200
Message-ID: <aavg4hb4t5.fsf@limmat.switch.ch>
Lines: 41
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
>> From: Simon Leinen [mailto:simon@limmat.switch.ch]
>> "If some flow information data cannot be delivered to the collector
>> in a timely manner, the amount of missing flow information data
>> MUST be indicated to the collector.  Possible reasons for failure
>> to deliver data include loss of packets on the network path, or
>> resource shortage at the exporter."

> But how the exporter would know which records were lost in the
> network unless we have (application layer) ACKs?

I see - my "MUST be indicated" is confusing too.  The exporter
wouldn't need to know, but the collector must be able to determine
that something was lost, and "how much", where I intentionally leave
open the accuracy - the collector won't be able to reconstruct
everything anyway.  So what about this:

   "If some flow information data cannot be delivered to the collector
   in a timely manner, the collector MUST be able to estimate the
   amount of data missing.  Possible reasons for failure to deliver
   data include loss of packets on the network path, or resource
   shortage at the exporter."

As an example, the flow export mechanism I use sends me packets of
flow records, and each packet has a flow record sequence number.  So I
can determine exactly how many flows I have missed.  This information
is important for diagnosis of situations where there is information
loss (some, but not all of this information loss would have been
prevented by using a reliable transport protocol).

For my particular applications, I'm mostly interested in the byte
amounts of metered traffic.  So if a flow export protocol had sequence
numbers representing the cumulative total bytes metered, that would be
very useful to me - I really would like to know what percentage of
traffic could not be accounted for.  (In addition to that, I would
still want to know how many flow records I missed.)
-- 
Simon Leinen				       simon@babar.switch.ch
SWITCH				   http://www.switch.ch/misc/leinen/

	       Computers hate being anthropomorphized.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct  5 12:58:12 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA19118
	for <ipfix-archive@lists.ietf.org>; Sat, 5 Oct 2002 12:58:11 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xs7H-0002tQ-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 05 Oct 2002 11:49:23 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xs7F-0002tJ-00
	for ipfix-eval@net.doit.wisc.edu; Sat, 05 Oct 2002 11:49:21 -0500
Received: (qmail 16969 invoked from network); 5 Oct 2002 16:49:15 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 5 Oct 2002 16:49:15 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g95GqMs26977;
	Sat, 5 Oct 2002 09:52:23 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <carter@qosient.com>, "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Sat, 5 Oct 2002 09:49:16 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNEEIHDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter Bullard wrote Thursday, October 03, 2002 5:08 PM:

> I don't see that LFAP is a solution to the flow record transport
> problems that I worry about, which is the efficient, reliable
> and secure transport of any vendors flow records, and I'm
> particularly concerned with at least one of the basic architectural
> positions that LFAP takes, the protocol complexity and
> its Information Model.

As a general comment, could we leave out the Information Model in
these discussion, unless we're discussing data types. I thought
that we were just discussing the protocols and not the semantics
of the data (i.e., the form, not the content).
 
> The biggest issue with the architecture is timestamps.  My
> understanding reading the lfap-eval, is that timestamps 
> relate to the flow cache rather than the wire-line timestamps of
> the packet stream that is being monitored.  ...  Anything less
> would be networking 'malpractice', if there ever could be such
> a thing.

This is an example of a statement that does not belong in this
discussion, but does belong in a discussion on the data model,
information model, or architecture. IMHO.
 
...

> With regard to the Information Model,  I sense that I would
> put my entire record in a single vendor specific IE and leave it
> at that.  While a drastic statement, its not too far from the
> truth.

This is true of any protocol that supports a "blob" data type,
although it's arguably violating the spirit of the specification.
 
...
 
> Best time granularity of 10's of milliseconds (1/100th of a sec)
> is not good, uSec minimum, nanoSec preferable.

Agreed ... for our PacketSight probe, we use nanoseconds.

I should add that the CRANE specification is lacking a few useful
time types also. We hadn't decided on the full list, so left them
out of the draft. (e.g., a nanosecond time that uses two 32-bit
values [seconds, nanoseconds] instead of a 64-bit value). Adding
them to CRANE is trivial.

...

> 64 bit counters for packets and bytes in every record, when over
> 90% of all flows have less than 256 packets and 8K of bytes in the
> entire flow?  We should have 1, 2, 4 and 8 byte counter IEs as
> needed, don't you think?

This is why we provided the full range of 8, 16, 32, 64 bit counters,
both signed and unsigned. (We were also debating whether these would
be described as gauges or counters but decided that that would be left
to the semantics of the fields; this decision might be revisited in
the future.) Also, we decided to output in host byte order, not in
network byte order, so that little-endian machines wouldn't pay
a performance penalty (the assumption being that the receiver has more
CPU and also has fewer realtime constraints).

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct  5 14:38:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA20942
	for <ipfix-archive@lists.ietf.org>; Sat, 5 Oct 2002 14:38:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xthc-0005FX-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 05 Oct 2002 13:31:00 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xthZ-0005FQ-00
	for ipfix-req@net.doit.wisc.edu; Sat, 05 Oct 2002 13:30:57 -0500
Received: (qmail 19386 invoked from network); 5 Oct 2002 18:30:51 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 5 Oct 2002 18:30:51 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g95IY1s03843;
	Sat, 5 Oct 2002 11:34:01 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-req@net.doit.wisc.edu>
Cc: <ipfix-eval-team@net.doit.wisc.edu>
Subject: [ipfix-req] RE: Data Export Reliability Requirement [was: Re: IPFIX Requirement draft status - section 6.3.2]
Date: Sat, 5 Oct 2002 11:30:55 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNMEIJDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

This note is in two parts: comments on reliability requirements as for the
export protocol and comments on how data loss is reported. I've added
snippets on how we do this in CRANE and suggest that the other protocol
experts describe how they support these functionalities.

At the protocol level, the minimal requirement is that there be some kind of
ACK from the collector to the exporter (as Reinaldo Penno noted). We also
need some kind of unique key that allows de-duplication at the collector.
[In CRANE, we use the exporter "boot time" + 32-bit record sequence number;
the de-duplicator takes multiple data streams from the CRANE collectors and
de-duplicates them.]

(I assume that everyone agrees that de-duplication is required at the
collector.)

For a high-availability solution, we should have the ability to send to
multiple collectors and for the exporter to be able to switch from one
collector to another. The timing issues for fail-over are outside the
protocol; but the capabilities must be part of it. [In our CRANE
implementation, we use a timeout on ACKs for switching to the alternate
receiver. We intend to improve this in future with some kind of load
balancing by observing the rate at which data is being ACKed. It turns out
to be a bit tricky to get this working well for both high-speed transmission
(3000+ rec/sec) and low-speed (1 rec/sec or slower). We only send an ACK
only when the data has been persisted - this behavior is outside the scope
of the protocol itself and therefore should be a SHOULD, not a MUST in the
standard.]

However, there is still the possibility of data loss: the exporter may have
data areas fill up before an ACK arrives. The exporter must therefore throw
away some data. The exporter knows AT LEAST how many records were received
(it is possible that more were received, but the ACKs were lost). So, if the
exporter is forced to throw away data, it can report about what it threw
away.
   (There are other causes of data loss than running of memory:
    such as running out of CPU, or acting as a proxy and losing
    data; these can all be covered by a similar mechanism.)

There will inevitably be some information loss in reporting data loss. The
minimal information that the exporter needs to keep is: number of records
not ACKed, totals for the metrics that were not ACKed.

The information that are kept about data loss are application-dependent --
which totals are important? is some high-level aggregation on the exporter
possible? etc. For a specific data model (e.g., the standard data exported
by Cisco routers using NetFlow v8), a separate specification could state
exactly what must be reported for data loss. [Note: NetFlow v8 is only being
used as an example of data *content* - because the protocol lacks
reliability, the collector can only report statistics such as number of
records that were lost, detected by sequence number gaps.] The separate
specification could also state the rules for throwing away data: e.g., throw
away oldest, newest, smallest, etc.

As an example of data loss reporting, suppose that we are exporting a single
metric and that the statistics on the exporter are:
     # flow records sent (not counting retransmitted) 1000
     # flow records ACKed                              900
     sum of metric all records                       10000
     sum of metric in all ACKed records               8000
From which we derive the following:
     average metric per record                          10
     average metric per ACKed record                     8.889
     average metric per un-ACKed record                 20
And on the receiver, we have:
     # flow records received (de-duplicated)           950
     sum of metric in all received records            9200
     average metric per received record                  9.684
The receiver notes that it did not receive 50 records; it can estimate the
sum of metric in these as 50 * 20 = 1000, for an estimated total of the
metric of 10200. (Something fancier could be done by using variance
calculations, combined with other metrics.)

[In CRANE, we provide two mechanisms for reporting loss:
 - the exporter can define an additional set of fields that it
   exports periodically with data loss values;
 - a status request from the collector, also reported as a set
   of fields.
 The content of these records is defined by the exporter, using the general
template mechanism.]

So, to sum up:
   - require application-level ACKs in the protocol (SHOULD be after
     data are persisted)
   - require enable de-duplication of received records
   - require mechanism for reporting data loss in the exporter -
     the details of this mechanism are outside the scope of the
     protocol except that the protocol must be general enough to
     allow them
   - individual information models (which use the flow export protocol)
     SHOULD describe data loss reporting

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct  5 14:41:19 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA21096
	for <ipfix-archive@lists.ietf.org>; Sat, 5 Oct 2002 14:41:19 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xtlZ-0005PC-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 05 Oct 2002 13:35:05 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xtlX-0005P6-00
	for ipfix-eval@net.doit.wisc.edu; Sat, 05 Oct 2002 13:35:03 -0500
Received: (qmail 19492 invoked from network); 5 Oct 2002 18:34:57 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 5 Oct 2002 18:34:57 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g95Ic6s03875;
	Sat, 5 Oct 2002 11:38:07 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Harrington, David" <dbh@enterasys.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Sat, 5 Oct 2002 11:35:01 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNOEIJDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0016_01C26C63.3DDD4A70"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <6D745637A7E0F94DA070743C55CDA9BA075831@NHROCMBX1.ets.enterasys.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This is a multi-part message in MIME format.

------=_NextPart_000_0016_01C26C63.3DDD4A70
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

RE: [ipfix-eval] Discussion of Candidate ProtocolsDavid Harrington wrote
Friday, October 04, 2002 2:39 PM :
  4) Xacct sought out Enterasys as a potential partner in 2000(?). I did the
technology analysis on CRANE for the due diligence. My largest concern was
the proprietary nature of the protocol. Just like IPDR, it was developed in
a members-only agreement and was denied the opportunity for wide-spread
industry review. This was done to capture the intellectaul property rights
before making it public. Another major concern was the push for
standardizing "buckets for transporting proprietary data in"; I don't
believe that transporting a lot of proprietary data models really helps
standardization and interoperability. CRANE has pros and cons.

The CRANE spec will not be "proprietary" if adopted, so do you have any
other significant objections to it (there have been some improvements since
2000)? Even if it isn't adopted, I still appreciate criticism, so that I can
improve it as a product.

- peter

------=_NextPart_000_0016_01C26C63.3DDD4A70
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>RE: [ipfix-eval] Discussion of Candidate =
Protocols</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2719.2200" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT size=3D2><SPAN class=3D911463018-05102002><FONT =
face=3DTahoma>
<DIV><FONT face=3DTahoma><FONT size=3D2><SPAN=20
class=3D911463018-05102002>David&nbsp;</SPAN>Harrington<SPAN=20
class=3D911463018-05102002>&nbsp;wrote </SPAN>Friday, October 04, 2002 =
2:39=20
PM<SPAN =
class=3D911463018-05102002>&nbsp;:&nbsp;</SPAN></FONT></FONT></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px =
solid; MARGIN-RIGHT: 0px">
  <P><FONT size=3D2>4) Xacct sought out Enterasys as a potential partner =
in=20
  2000(?). I did the technology analysis on CRANE for the due diligence. =
My=20
  largest concern was the proprietary nature of the protocol. Just like =
IPDR, it=20
  was developed in a members-only agreement and was denied the =
opportunity for=20
  wide-spread industry review. This was done to capture the intellectaul =

  property rights before making it public. Another major concern was the =
push=20
  for standardizing "buckets for transporting proprietary data in"; I =
don't=20
  believe that transporting a lot of proprietary data models really =
helps=20
  standardization and interoperability. CRANE has pros and cons.<SPAN=20
  class=3D911463018-05102002><FONT=20
face=3DTahoma>&nbsp;</FONT></SPAN></FONT></P></BLOCKQUOTE></FONT></SPAN><=
/FONT></DIV>
<DIV><FONT size=3D2><SPAN class=3D911463018-05102002><FONT =
face=3DTahoma>The CRANE=20
spec will not be "proprietary" if adopted,</FONT>&nbsp;<FONT =
face=3DTahoma>so do=20
you have any other significant objections to it (there have been some=20
improvements since 2000)? Even if it isn't adopted, I still appreciate=20
criticism, so that I can improve it as a =
product.</FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DTahoma size=3D2><SPAN=20
class=3D911463018-05102002></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DTahoma size=3D2><SPAN class=3D911463018-05102002>-=20
peter</SPAN></FONT></DIV></BODY></HTML>

------=_NextPart_000_0016_01C26C63.3DDD4A70--


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct  5 15:02:40 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA21565
	for <ipfix-archive@lists.ietf.org>; Sat, 5 Oct 2002 15:02:40 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xu5V-0005ts-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 05 Oct 2002 13:55:41 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xu5T-0005tm-00
	for ipfix-eval@net.doit.wisc.edu; Sat, 05 Oct 2002 13:55:40 -0500
Received: (qmail 19683 invoked from network); 5 Oct 2002 18:55:33 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 5 Oct 2002 18:55:33 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g95Iwis04614
	for <ipfix-eval@net.doit.wisc.edu>; Sat, 5 Oct 2002 11:58:44 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Sat, 5 Oct 2002 11:55:38 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNOEIKDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <3D9DC88F.9060507@cup.hp.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Jeff Meyer wrote Friday, October 04, 2002 9:58 AM:

>    There seems to be some confusion over the separation
> between a formal, machine readable description of
> the data model (as IPDR defines), and the requirements put
> on an implementation (especially in an IPFIX Middlebox).

YES ... so, can we all agree that data model issues are not
part of this discussion?

[snip]
 
>    However, the statement that IP flow is somehow unique
> in its data requirements and as such a more generalized
> "data mover" is somehow problematic, is just plain wrong.

YES!
 
>    As a mediation product vendor I see lots of devices
> with lots of vendor specific protocols.  And there
> are several which have the same protocol requirements
> as IPFIX.  Just different data models.

YES!

The data models need to also be aligned; but just dealing
with all the protocols is a headache, especially with the
unreliable protocols such as NetFlow and SNMP (RADIUS is
an "almost reliable" protocol and therefore isn't quite
so difficult).

[snip]

> ...  If IPFIX wants to say that only
> fixed with data values may be sent via the IPFIX
> protocol, then I'd say, maybe you could optimize
> beyond IPDR for that.

CRANE imposes only the header overhead on each record.
The data are also sent in the "native" form for the
exporter (I'll comment on XDR later).

However, I think that a numeric-only protocol is not
sufficient. As soon as metrics are collected at the
application level, people want attributes, such as
URL path, response status, payload type, etc. which
are either difficult or impossible to encode as number.
 
>    A minimal implementation of IPDR on a middlebox
> would NOT need to have any XML knowledge whatsoever.
> As a producer, the system could merely hardcode the
> information model produced (or make it configurable).

Likewise for CRANE, the box could simply reject all
requests to limit the fields that are exported, by
hardcoding the templates. However, processing the
templates is somewhat easier in CRANE because of their
fixed layout, not requiring an XML engine (yes, I know
that an XML engine can be quite compact; but it's not
common on network elements, at least not now).
 
>    The encoding itself follows XDR format, which has
> worked alright for NFS and RPC, and is the precursor
> to the encoding for DCE and CORBA encoding.

We looked at XDR and rejected it because it can be a
little "heavy" for CPU-constrained devices (e.g., CSU/DSU,
"cable routers", etc.). We prefer exporting in the
"native" format (big- or little-endian) with template
flags to allow decoding at the receiver. Of course,
we don't prevent export in XDR (big-endian) form.


- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct  5 15:14:41 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA21668
	for <ipfix-archive@lists.ietf.org>; Sat, 5 Oct 2002 15:14:41 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17xuHP-0006EF-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 05 Oct 2002 14:07:59 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17xuHN-0006EA-00
	for ipfix-eval@net.doit.wisc.edu; Sat, 05 Oct 2002 14:07:57 -0500
Received: (qmail 19817 invoked from network); 5 Oct 2002 19:07:51 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 5 Oct 2002 19:07:51 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g95JB0s04689;
	Sat, 5 Oct 2002 12:11:01 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Cc: "Stas Khirman" <StasK@Narus.com>, <calato@riverstonenet.com>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Sat, 5 Oct 2002 12:07:55 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNOEILDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <580E532D9F7A9B4BAE8A130848E0DDA702083A03@franklin.narus.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Stas Khirman wrote Wednesday, October 02, 2002 8:34 PM:

> Hm, I do not think that memcopy operation could have a significant impact.
> Let's assume we are dealing with 10,000 records per second 100 bytes each.
> It is mean that in worst case we have to copy 1Mbyte - 250,000 copy
> operations per second on 32 bit processor. I'm sure it will take only a
> fraction of one percent on any normal CPU, am I wrong? BTW,
> majority of TCP
> stack implementations are doing few memory copies anyway.

And some TCP implementations are zero-copy.

All I can tell you is that one of our partners had memory bandwidth
issues getting data off the collection board into main memory
for transmission; and that minimizing memory-to-memory operations
was important.

calato@riverstonenet.com wrote Wednesday, October 02, 2002 5:54 AM:

> 	Having done a fair amount of tuning on a collector I find
> 	it interesting that your performance hinged on a memory
> 	copy. In my experince performance was limited by how fast the
> 	disk writes are.

I agree on the collector performance tends to be constrained by I/O.
But collectors are often bigger boxes (also doing other things
with the collected data, such as aggregating, correlating,
filtering, etc.) and have less stringent real-time requirements.

Usually reliable sources have told me that certain vendors' switches
quietly stop collecting flow statistics when CPU exceeds 70% or so.
These same sources have therefore installed probes to collect the
data. So, minimising CPU usage on the network element is important!

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 06:58:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA12978
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 06:58:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yVQL-0000kC-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 05:47:41 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yVQJ-0000jZ-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 07 Oct 2002 05:47:39 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g97Al7GU025376;
	Mon, 7 Oct 2002 12:47:07 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g97Al4cH025373;
	Mon, 7 Oct 2002 12:47:04 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: calato@riverstonenet.com
Cc: Peter Ludemann <peter.ludemann@xacct.com>,
        Michael MacFaden <mrm@riverstonenet.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFIDHAA.peter.ludemann@xacct.com>
	<3D9AEC51.BA498740@riverstonenet.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <3D9AEC51.BA498740@riverstonenet.com>
Date: 07 Oct 2002 12:47:04 +0200
Message-ID: <aau1jyfrvb.fsf@limmat.switch.ch>
Lines: 28
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Wed, 02 Oct 2002 08:53:37 -0400, calato@riverstonenet.com said:
> Peter Ludemann wrote:
>> However, we have encountered some situations where saving a single
>> copy operation per output recordcan make all the difference between
>> being able to deliver the data and not. It's highly unlikely that
>> an application will keep data in AVP form, so AVP requires copies.
>> If the protocol packs the data into something that a C programmer
>> might do with a "struct", then memory-to-memory copying can be
>> avoided.

> 	Having done a fair amount of tuning on a collector I find it
> 	interesting that your performance hinged on a memory copy. In
> 	my experince performance was limited by how fast the disk
> 	writes are.

Some collectors will write large amounts of data to disk - if this is
the main bottleneck I'd assume that they use the accounting data
without too heavy processing (or they need a better approach to disk
I/O, such as direct I/O, scatter/gather interfaces, faster disks etc.).

Unnecessary copying should be avoided mainly because memory bandwidth
doesn't seem to grow as fast as other performance dimensions.
Personally I think this is more of an issue than for example
byte-order optimizations.

Regards,
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 10:19:14 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20197
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 10:19:14 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yYbD-0001N3-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 09:11:07 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yYbA-0001La-00; Mon, 07 Oct 2002 09:11:04 -0500
Received: from riverstonenet.com ([134.141.180.78]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 7 Oct 2002 07:10:31 -0700
Message-ID: <3DA19565.5E831D0D@riverstonenet.com>
Date: Mon, 07 Oct 2002 10:08:37 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: ipfix-req@net.doit.wisc.edu, Reinaldo Penno <rpenno@nortelnetworks.com>,
        ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Data Export Reliability Requirement[was: Re: IPFIX 
 Requirement draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C04119EF5@zsc3c032.us.nortel.com> <aan0ptygzq.fsf@limmat.switch.ch>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 07 Oct 2002 14:10:31.0785 (UTC) FILETIME=[4BF52D90:01C26E0B]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Simon Leinen wrote:
> 
> On Mon, 30 Sep 2002 03:00:03 -0700, "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
> > I'm looking to understand/really clarify this requirement. It seems
> > ambiguous...at least to me. I do not understand what is the
> > meaning/purpose of "-->abscence<-- of reliability....MUST be
> > indicated".
> 
> Yes, that just sounds weird.  (High) reliability should be a goal for
> the exporting process, not something that can be readily measured, or
> even less is "present" or "absent" at a given time during the
> operation of an IPFIX implementation.
> 
> reqs-06> Absence of reliability of the data transfer, for example caused by
> reqs-06> loss or reordering of packets containing flow information, MUST be
> reqs-06> indicated.
> 
> Why not write something like this instead:
> 
>   "If some flow information data cannot be delivered to the collector
>    in a timely manner, the amount of missing flow information data
>    MUST be indicated to the collector.  Possible reasons for failure
>    to deliver data include loss of packets on the network path, or
>    resource shortage at the exporter."

	I like this. 

	One question, why did you add "in a timely manner". What not just
	leave it at "cannot be delivered".

	Also, at some point need a clear definition of what "missing flow 
	information data" really means. Is it a byte and packet count, is
	it IPFIX messages? Both?

> 
> I removed packet reordering as an example for reasons to lose data
> because I don't think it's that relevant in practice.  From
> operational experience, I think overflows at the exporter are a much
> more likely source of data loss.

	Too early to make this call. It could be that packet reordering
	does cause a loss of data. But that analysis can't happen until
	we have a protocol.
> 
> An indication of the amount of data lost is more useful than an
> unspecific indication of "absence of reliability" and should be
> relatively easy to provide.

	Agreed.
> 
> reqs-06> Please note that if an unreliable transport protocol is used,
> reqs-06> reliability can be provided by higher layers. In such a case
> reqs-06> only lack of overall reliability MUST be indicated.
> 
> And end-to-end purist might argue that even if the underlying
> transport protocol is used, reliability must be provided at higher
> layers too.  See the "application layer ACK" debate on the ipfix-req
> list a few days ago.
> 
>   "Reliability can be supported by suitable transport protocols.  In
>   any case only end-to-end flow information loss between exporter and
>   collector need be indicated."
> 
> reqs-06> For example reordering could be dealt with by adding a
> reqs-06> sequence number to each packet.
> 
> Or order may not be relevant since the exact arrival time of a piece
> of flow information doesn't matter - the timestamps in the flow record
> will provide sufficient sequence information for the collector.

	The thing I don't like about going down this road is the
	potential storage and processing requirements needed at the 
	collector. Also, how do I know that when processing a timestamp 
	at 10:00 that another one is coming for 9:59?

	Paul

> --
> Simon.
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 10:32:50 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20920
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 10:32:50 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yYp8-0001yb-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 09:25:30 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yYp6-0001x2-00; Mon, 07 Oct 2002 09:25:28 -0500
Received: from riverstonenet.com ([134.141.180.78]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 7 Oct 2002 07:24:56 -0700
Message-ID: <3DA198C6.CC26BCCD@riverstonenet.com>
Date: Mon, 07 Oct 2002 10:23:02 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>, ipfix-req@net.doit.wisc.edu,
        ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was: Re: IPFIX 
 Requireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 07 Oct 2002 14:24:57.0015 (UTC) FILETIME=[4FACCC70:01C26E0D]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Simon Leinen wrote:
> 
> On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
> >> From: Simon Leinen [mailto:simon@limmat.switch.ch]
> >> "If some flow information data cannot be delivered to the collector
> >> in a timely manner, the amount of missing flow information data
> >> MUST be indicated to the collector.  Possible reasons for failure
> >> to deliver data include loss of packets on the network path, or
> >> resource shortage at the exporter."
> 
> > But how the exporter would know which records were lost in the
> > network unless we have (application layer) ACKs?
> 
> I see - my "MUST be indicated" is confusing too.  The exporter
> wouldn't need to know, but the collector must be able to determine
> that something was lost, and "how much", where I intentionally leave
> open the accuracy - the collector won't be able to reconstruct
> everything anyway.  So what about this:
> 
>    "If some flow information data cannot be delivered to the collector
>    in a timely manner, the collector MUST be able to estimate the
>    amount of data missing.  Possible reasons for failure to deliver
>    data include loss of packets on the network path, or resource
>    shortage at the exporter."

	Not sure I like that. How about when the exporter starts
	talking to another collector. How about in overload mode
	when the collector is just dropping flows. 

	I think the exporter is in the best position to estimate how 
	much data was lost. Once more of the protocol is nailed down 
	we can better define how to measure loss.
> 
> As an example, the flow export mechanism I use sends me packets of
> flow records, and each packet has a flow record sequence number.  So I
> can determine exactly how many flows I have missed.  This information
> is important for diagnosis of situations where there is information
> loss (some, but not all of this information loss would have been
> prevented by using a reliable transport protocol).
> 
> For my particular applications, I'm mostly interested in the byte
> amounts of metered traffic.  So if a flow export protocol had sequence
> numbers representing the cumulative total bytes metered, that would be
> very useful to me - I really would like to know what percentage of
> traffic could not be accounted for.  (In addition to that, I would
> still want to know how many flow records I missed.)
> --
> Simon Leinen                                   simon@babar.switch.ch
> SWITCH                             http://www.switch.ch/misc/leinen/
> 
>                Computers hate being anthropomorphized.
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 10:33:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20971
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 10:33:01 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yYm1-0001qj-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 09:22:17 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yYlz-0001pD-00; Mon, 07 Oct 2002 09:22:15 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g97ELg721863;
	Mon, 7 Oct 2002 16:21:42 +0200 (CEST)
Message-ID: <3DA19874.7040702@cisco.com>
Date: Mon, 07 Oct 2002 16:21:40 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: ipfix-req@net.doit.wisc.edu, Reinaldo Penno
 <rpenno@nortelnetworks.com>,
        ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Data Export Reliability Requirement [was: Re: IPFIX
 Requirement draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C04119EF5@zsc3c032.us.nortel.com> <aan0ptygzq.fsf@limmat.switch.ch>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Reinaldo, Paul, Peter and Simon,

[I've been trying to compile all ideas in order to reply]

6.3.2.  Reliability

   Absence of reliability of the data transfer, for example caused by
   loss or reordering of packets containing flow information, MUST be
   indicated.

   Please note that if an unreliable transport protocol is used,
   reliability can be provided by higher layers. In such a case only
   lack of overall reliability MUST be indicated. For example reordering
   could be dealt with by adding a sequence number to each packet.

As Peter pointed out, the idea behing this requirement is that: the 
connection between the exporting process and collecting process could be 
broken for a certain time; slow ACK, no routing, etc... or the router 
could have some problems: queue full
So we must at least indicate to the collecting process that some data 
where lost somewhere (on the exporting process or along the path)

Paul divided into a few categories:

	1. Congestion awareness.
	2. Message ordering
	3. Transport reliability
	4. Application layer reliability
	5. Tracking data loss (statistics)

	1. Taken into consideration by the section 6.3.1 "Congestion Awareness"

	2. Paul is right: depends on the protocol. Not sure we need a special section for that

	3. The transport protocol reliability would be a completely new requirement, no even part of the charter. Unless you only mean by this: when the transport connection breaks. If this is the case, then see #4.

	4. If you want ACK at the application level, this would be a completely new requirement. Actually the goal of section 6.3.2 "Reliability" was to take care of that issue, without requiring ACK at the application level (which I personally think is not possible due to the amount of traffic exported). Simon's comment on removing the "message ordering" from section 6.3.2 makes sense (see #2 where the message ordering depends on the transport protocol). I vote for Simon's proposal.

    "If some flow information data cannot be delivered to the collector
    in a timely manner, the amount of missing flow information data
    MUST be indicated to the collector. Possible reasons for failure
    to deliver data include loss of packets on the network path, or
    resource shortage at the exporter."

                5. I think this is taken into consideration by the text 
in #4.

What do you think?

Regards, Benoit

>On Mon, 30 Sep 2002 03:00:03 -0700, "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
>  
>
>>I'm looking to understand/really clarify this requirement. It seems
>>ambiguous...at least to me. I do not understand what is the
>>meaning/purpose of "-->abscence<-- of reliability....MUST be
>>indicated".
>>    
>>
>
>Yes, that just sounds weird.  (High) reliability should be a goal for
>the exporting process, not something that can be readily measured, or
>even less is "present" or "absent" at a given time during the
>operation of an IPFIX implementation.
>
>reqs-06> Absence of reliability of the data transfer, for example caused by
>reqs-06> loss or reordering of packets containing flow information, MUST be
>reqs-06> indicated.
>
>Why not write something like this instead:
>
>  "If some flow information data cannot be delivered to the collector
>   in a timely manner, the amount of missing flow information data
>   MUST be indicated to the collector.  Possible reasons for failure
>   to deliver data include loss of packets on the network path, or
>   resource shortage at the exporter."
>
>I removed packet reordering as an example for reasons to lose data
>because I don't think it's that relevant in practice.  From
>operational experience, I think overflows at the exporter are a much
>more likely source of data loss.
>
>An indication of the amount of data lost is more useful than an
>unspecific indication of "absence of reliability" and should be
>relatively easy to provide.
>
>reqs-06> Please note that if an unreliable transport protocol is used,
>reqs-06> reliability can be provided by higher layers. In such a case
>reqs-06> only lack of overall reliability MUST be indicated.
>
>And end-to-end purist might argue that even if the underlying
>transport protocol is used, reliability must be provided at higher
>layers too.  See the "application layer ACK" debate on the ipfix-req
>list a few days ago.
>
>  "Reliability can be supported by suitable transport protocols.  In
>  any case only end-to-end flow information loss between exporter and
>  collector need be indicated."
>
>reqs-06> For example reordering could be dealt with by adding a
>reqs-06> sequence number to each packet.
>
>Or order may not be relevant since the exact arrival time of a piece
>of flow information doesn't matter - the timestamps in the flow record
>will provide sufficient sequence information for the collector.
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 10:47:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA21751
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 10:47:10 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yYyf-0002GU-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 09:35:21 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yYyd-0002FT-00; Mon, 07 Oct 2002 09:35:20 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g97EYg706676;
	Mon, 7 Oct 2002 16:34:42 +0200 (CEST)
Message-ID: <3DA19B80.80600@cisco.com>
Date: Mon, 07 Oct 2002 16:34:40 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>, ipfix-req@net.doit.wisc.edu,
        ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was: Re:
 IPFIX Requireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

All,

[In my previous email, I thought I took the latest email in the thread, 
I was wrong. Sorry!]

>On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
>  
>
>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
>>>"If some flow information data cannot be delivered to the collector
>>>in a timely manner, the amount of missing flow information data
>>>MUST be indicated to the collector.  Possible reasons for failure
>>>to deliver data include loss of packets on the network path, or
>>>resource shortage at the exporter."
>>>      
>>>
>
>  
>
>>But how the exporter would know which records were lost in the
>>network unless we have (application layer) ACKs?
>>    
>>
>
>I see - my "MUST be indicated" is confusing too.  The exporter
>wouldn't need to know, but the collector must be able to determine
>that something was lost, and "how much", where I intentionally leave
>open the accuracy - the collector won't be able to reconstruct
>everything anyway.  So what about this:
>
>   "If some flow information data cannot be delivered to the collector
>   in a timely manner, the collector MUST be able to estimate the
>   amount of data missing.  Possible reasons for failure to deliver
>   data include loss of packets on the network path, or resource
>   shortage at the exporter."
>
>As an example, the flow export mechanism I use sends me packets of
>flow records, and each packet has a flow record sequence number.  So I
>can determine exactly how many flows I have missed.  This information
>is important for diagnosis of situations where there is information
>loss (some, but not all of this information loss would have been
>prevented by using a reliable transport protocol).
>
The sequence ID per observation domain on the exporter is exactly what 
we use in NetFlow to detect we lost some export packets.
And we don't need application level ACK.

Regards, Benoit.

>
>For my particular applications, I'm mostly interested in the byte
>amounts of metered traffic.  So if a flow export protocol had sequence
>numbers representing the cumulative total bytes metered, that would be
>very useful to me - I really would like to know what percentage of
>traffic could not be accounted for.  (In addition to that, I would
>still want to know how many flow records I missed.)
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 10:49:06 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA21800
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 10:49:05 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yZ0M-0002JF-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 09:37:06 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yZ0K-0002Hz-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 07 Oct 2002 09:37:04 -0500
Received: from riverstonenet.com ([134.141.180.78]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 7 Oct 2002 07:36:32 -0700
Message-ID: <3DA19B7E.7DF5421A@riverstonenet.com>
Date: Mon, 07 Oct 2002 10:34:38 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNOEIKDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 07 Oct 2002 14:36:32.0836 (UTC) FILETIME=[EE6AA840:01C26E0E]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> Jeff Meyer wrote Friday, October 04, 2002 9:58 AM:
> 
> >    There seems to be some confusion over the separation
> > between a formal, machine readable description of
> > the data model (as IPDR defines), and the requirements put
> > on an implementation (especially in an IPFIX Middlebox).
> 
> YES ... so, can we all agree that data model issues are not
> part of this discussion?

	No. We have no interoperability without a data model.

> 
> [snip]
> 
> >    However, the statement that IP flow is somehow unique
> > in its data requirements and as such a more generalized
> > "data mover" is somehow problematic, is just plain wrong.
> 
> YES!

	No. Generalized data movers are not the problem.
	Defining a protocol that is well defined enough so
	that many device vendors can export data and many
	application vendors can process the data regardless
	of the device is problematic if all you define is a 
	general purpose data mover.

> 
> >    As a mediation product vendor I see lots of devices
> > with lots of vendor specific protocols.  And there
> > are several which have the same protocol requirements
> > as IPFIX.  Just different data models.
> 
> YES!
> 
> The data models need to also be aligned; but just dealing
> with all the protocols is a headache, especially with the
> unreliable protocols such as NetFlow and SNMP (RADIUS is
> an "almost reliable" protocol and therefore isn't quite
> so difficult).
> 
> [snip]
> 
> > ...  If IPFIX wants to say that only
> > fixed with data values may be sent via the IPFIX
> > protocol, then I'd say, maybe you could optimize
> > beyond IPDR for that.
> 
> CRANE imposes only the header overhead on each record.
> The data are also sent in the "native" form for the
> exporter (I'll comment on XDR later).
> 
> However, I think that a numeric-only protocol is not
> sufficient. As soon as metrics are collected at the
> application level, people want attributes, such as
> URL path, response status, payload type, etc. which
> are either difficult or impossible to encode as number.

	I'll just quote Randy's message...

	>> Please let's try to stick with the core goal of looking at IP
(v4&v6)
	>> packets and the "transport" protocol or next header.
	 >
	 > i think that was the intent of this wg's charter.
	 >
	 > randy, with ad hat on


	Paul


> 
> >    A minimal implementation of IPDR on a middlebox
> > would NOT need to have any XML knowledge whatsoever.
> > As a producer, the system could merely hardcode the
> > information model produced (or make it configurable).
> 
> Likewise for CRANE, the box could simply reject all
> requests to limit the fields that are exported, by
> hardcoding the templates. However, processing the
> templates is somewhat easier in CRANE because of their
> fixed layout, not requiring an XML engine (yes, I know
> that an XML engine can be quite compact; but it's not
> common on network elements, at least not now).
> 
> >    The encoding itself follows XDR format, which has
> > worked alright for NFS and RPC, and is the precursor
> > to the encoding for DCE and CORBA encoding.
> 
> We looked at XDR and rejected it because it can be a
> little "heavy" for CPU-constrained devices (e.g., CSU/DSU,
> "cable routers", etc.). We prefer exporting in the
> "native" format (big- or little-endian) with template
> flags to allow decoding at the receiver. Of course,
> we don't prevent export in XDR (big-endian) form.
> 
> - peter
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 11:03:46 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22217
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 11:03:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yZCU-0002g8-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 09:49:38 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yZCS-0002fN-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 07 Oct 2002 09:49:36 -0500
Received: from riverstonenet.com ([134.141.180.78]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 7 Oct 2002 07:49:04 -0700
Message-ID: <3DA19E6E.A018857B@riverstonenet.com>
Date: Mon, 07 Oct 2002 10:47:10 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: Peter Ludemann <peter.ludemann@xacct.com>,
        Michael MacFaden <mrm@riverstonenet.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFIDHAA.peter.ludemann@xacct.com>
		<3D9AEC51.BA498740@riverstonenet.com> <aau1jyfrvb.fsf@limmat.switch.ch>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 07 Oct 2002 14:49:05.0190 (UTC) FILETIME=[AEDAC460:01C26E10]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Simon Leinen wrote:
> 
> On Wed, 02 Oct 2002 08:53:37 -0400, calato@riverstonenet.com said:
> > Peter Ludemann wrote:
> >> However, we have encountered some situations where saving a single
> >> copy operation per output recordcan make all the difference between
> >> being able to deliver the data and not. It's highly unlikely that
> >> an application will keep data in AVP form, so AVP requires copies.
> >> If the protocol packs the data into something that a C programmer
> >> might do with a "struct", then memory-to-memory copying can be
> >> avoided.
> 
> >       Having done a fair amount of tuning on a collector I find it
> >       interesting that your performance hinged on a memory copy. In
> >       my experince performance was limited by how fast the disk
> >       writes are.
> 
> Some collectors will write large amounts of data to disk - if this is
> the main bottleneck I'd assume that they use the accounting data
> without too heavy processing (or they need a better approach to disk
> I/O, such as direct I/O, scatter/gather interfaces, faster disks etc.).

	I don't follow. Are you saying I/O isn't typically 
	the bottleneck at the collector?

> 
> Unnecessary copying should be avoided mainly because memory bandwidth
> doesn't seem to grow as fast as other performance dimensions.
> Personally I think this is more of an issue than for example
> byte-order optimizations.

	I think there are lots of other issues that come into
	play before memory copies do. malloc and free are typically
	to big culprits of CPU usage. A design that causes lots
	of task switching is another. Your program needs to be
	pretty finely tuned before memory copy shows up, assuming
	the app is not just plain silly about memory copies.

> 
> Regards,
> --
> Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 11:42:13 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23664
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 11:42:12 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yZkx-0003ee-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 10:25:15 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yZkv-0003dO-00; Mon, 07 Oct 2002 10:25:13 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g97FO0729419;
	Mon, 7 Oct 2002 17:24:00 +0200 (CEST)
Message-ID: <3DA1A710.9080308@cisco.com>
Date: Mon, 07 Oct 2002 17:24:00 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Simon Leinen <simon@limmat.switch.ch>,
        Reinaldo Penno
 <rpenno@nortelnetworks.com>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was: Re:
 IPFIX  Requireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch> <3DA198C6.CC26BCCD@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

>Simon Leinen wrote:
>  
>
>>On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
>>    
>>
>>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
>>>>"If some flow information data cannot be delivered to the collector
>>>>in a timely manner, the amount of missing flow information data
>>>>MUST be indicated to the collector.  Possible reasons for failure
>>>>to deliver data include loss of packets on the network path, or
>>>>resource shortage at the exporter."
>>>>        
>>>>
>>>But how the exporter would know which records were lost in the
>>>network unless we have (application layer) ACKs?
>>>      
>>>
>>I see - my "MUST be indicated" is confusing too.  The exporter
>>wouldn't need to know, but the collector must be able to determine
>>that something was lost, and "how much", where I intentionally leave
>>open the accuracy - the collector won't be able to reconstruct
>>everything anyway.  So what about this:
>>
>>   "If some flow information data cannot be delivered to the collector
>>   in a timely manner, the collector MUST be able to estimate the
>>   amount of data missing.  Possible reasons for failure to deliver
>>   data include loss of packets on the network path, or resource
>>   shortage at the exporter."
>>
I even prefer this proposal compared to the previous one from Simon.

>>    
>>
>
>	Not sure I like that. How about when the exporter starts
>	talking to another collector. How about in overload mode
>	when the collector is just dropping flows.
>
What is the issue, you could add "overload on the collector" in the list 
of example?
What is important is the collector must know the amount of data missing, 
whereever it comes from: exporter, path or collector.
If you send this information from the exporter, you could possibly not 
report missing information.
Ex:
- the transport session breaks, what happened to the flow records which 
were sent?
- the transport protocol acknowlegde some packets but they are not 
handled correctly by the collector (CPU too busy)

BTW, I agree with you Paul about the "timely manner" which is confusing 
and maybe not necessary.

Regards, Benoit.

> 
>
>	I think the exporter is in the best position to estimate how 
>	much data was lost. Once more of the protocol is nailed down 
>	we can better define how to measure loss.
>  
>
>>As an example, the flow export mechanism I use sends me packets of
>>flow records, and each packet has a flow record sequence number.  So I
>>can determine exactly how many flows I have missed.  This information
>>is important for diagnosis of situations where there is information
>>loss (some, but not all of this information loss would have been
>>prevented by using a reliable transport protocol).
>>
>>For my particular applications, I'm mostly interested in the byte
>>amounts of metered traffic.  So if a flow export protocol had sequence
>>numbers representing the cumulative total bytes metered, that would be
>>very useful to me - I really would like to know what percentage of
>>traffic could not be accounted for.  (In addition to that, I would
>>still want to know how many flow records I missed.)
>>--
>>Simon Leinen                                   simon@babar.switch.ch
>>SWITCH                             http://www.switch.ch/misc/leinen/
>>
>>               Computers hate being anthropomorphized.
>>
>>--
>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>"unsubscribe ipfix" in message body
>>Archive     http://ipfix.doit.wisc.edu/archive/
>>    
>>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 12:00:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24492
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 12:00:09 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yaC3-0004R9-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 10:53:15 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yaC1-0004QO-00; Mon, 07 Oct 2002 10:53:13 -0500
Received: from riverstonenet.com ([134.141.180.78]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 7 Oct 2002 08:52:39 -0700
Message-ID: <3DA1AD55.8573BDE0@riverstonenet.com>
Date: Mon, 07 Oct 2002 11:50:45 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Simon Leinen <simon@limmat.switch.ch>,
        Reinaldo Penno <rpenno@nortelnetworks.com>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was: Re:IPFIX  
 Requireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch> <3DA198C6.CC26BCCD@riverstonenet.com> <3DA1A710.9080308@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 07 Oct 2002 15:52:40.0582 (UTC) FILETIME=[91016260:01C26E19]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Benoit Claise wrote:
> 
> Paul,
> 
> >Simon Leinen wrote:
> >
> >
> >>On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
> >>
> >>
> >>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
> >>>>"If some flow information data cannot be delivered to the collector
> >>>>in a timely manner, the amount of missing flow information data
> >>>>MUST be indicated to the collector.  Possible reasons for failure
> >>>>to deliver data include loss of packets on the network path, or
> >>>>resource shortage at the exporter."
> >>>>
> >>>>
> >>>But how the exporter would know which records were lost in the
> >>>network unless we have (application layer) ACKs?
> >>>
> >>>
> >>I see - my "MUST be indicated" is confusing too.  The exporter
> >>wouldn't need to know, but the collector must be able to determine
> >>that something was lost, and "how much", where I intentionally leave
> >>open the accuracy - the collector won't be able to reconstruct
> >>everything anyway.  So what about this:
> >>
> >>   "If some flow information data cannot be delivered to the collector
> >>   in a timely manner, the collector MUST be able to estimate the
> >>   amount of data missing.  Possible reasons for failure to deliver
> >>   data include loss of packets on the network path, or resource
> >>   shortage at the exporter."
> >>
> I even prefer this proposal compared to the previous one from Simon.
> 
> >>
> >>
> >
> >       Not sure I like that. How about when the exporter starts
> >       talking to another collector. How about in overload mode
> >       when the collector is just dropping flows.
> >
> What is the issue, you could add "overload on the collector" in the list
> of example?
> What is important is the collector must know the amount of data missing,
> whereever it comes from: exporter, path or collector.
> If you send this information from the exporter, you could possibly not
> report missing information.
> Ex:
> - the transport session breaks, what happened to the flow records which
> were sent?

	Exaclty, see below.

> - the transport protocol acknowlegde some packets but they are not
> handled correctly by the collector (CPU too busy)

	Again, I think it is difficult to describe how to measure loss
	without a protocol definition to analyze. 

	But my view is that we will be in a **better** position (not perfect)
	to design a solution by measuring data loss from the exporter's
perspective
	rather than the collector. The reason being the exporter talks
	to many collectors and thus has the common view, not the collector.

	So lets assume we have a simple message level ACK for every 100
	messages. I have an outstanding ACK when the device looses connectivity
	to the collector. So the device resends the 100 messages to 
	collector #2. No need to report any data loss.

	If on the other hand if the device never resends those messages
(because of
	a design choice) then the device needs to report the potential loss 
	to the new collector (or how ever that info is to be retrieved, maybe
SNMP).
	
	If we examine this from the collector perspective, lets assume it never
	receives any of the 100 messages that were outstanding. How does it
	even know to report a loss. 

	If somehow it detected the loss, how does it know the messages
	were resent?

	If the collector recieved the messages but just the ACK got lost and 
	the exporter resent the messages, it didin't report a loss anyway. If 
	the exporter didn't resend then it falsely reported the loss. But I 
	think this is preferrable to the collector scenario where no loss was 
	reported when there was one. If I as the administrator know that the
	potential loss is the upper bound then the operator can make an
informed 
	decision to look into the matter futher or not.

	I don't think we can design a 100% guaranteed solution but one
	from the exporter's perspective I think lends itself to better
	possibilities.

	Paul

> 
> BTW, I agree with you Paul about the "timely manner" which is confusing
> and maybe not necessary.
> 
> Regards, Benoit.
> 
> >
> >
> >       I think the exporter is in the best position to estimate how
> >       much data was lost. Once more of the protocol is nailed down
> >       we can better define how to measure loss.
> >
> >
> >>As an example, the flow export mechanism I use sends me packets of
> >>flow records, and each packet has a flow record sequence number.  So I
> >>can determine exactly how many flows I have missed.  This information
> >>is important for diagnosis of situations where there is information
> >>loss (some, but not all of this information loss would have been
> >>prevented by using a reliable transport protocol).
> >>
> >>For my particular applications, I'm mostly interested in the byte
> >>amounts of metered traffic.  So if a flow export protocol had sequence
> >>numbers representing the cumulative total bytes metered, that would be
> >>very useful to me - I really would like to know what percentage of
> >>traffic could not be accounted for.  (In addition to that, I would
> >>still want to know how many flow records I missed.)
> >>--
> >>Simon Leinen                                   simon@babar.switch.ch
> >>SWITCH                             http://www.switch.ch/misc/leinen/
> >>
> >>               Computers hate being anthropomorphized.
> >>
> >>--
> >>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >>"unsubscribe ipfix" in message body
> >>Archive     http://ipfix.doit.wisc.edu/archive/
> >>
> >>
> >
> >--
> >Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >"unsubscribe ipfix" in message body
> >Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct  7 18:59:06 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA09178
	for <ipfix-archive@lists.ietf.org>; Mon, 7 Oct 2002 18:59:06 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17ygJ9-0001Wd-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 07 Oct 2002 17:24:59 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17ygJ7-0001WX-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 07 Oct 2002 17:24:57 -0500
Received: (qmail 531 invoked from network); 7 Oct 2002 22:24:54 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 7 Oct 2002 22:24:54 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g97MS5s31951
	for <ipfix-eval@net.doit.wisc.edu>; Mon, 7 Oct 2002 15:28:05 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: Performance (was: Discussion of Candidate Protocols)
Date: Mon, 7 Oct 2002 15:24:57 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNKEKGDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <aau1jyfrvb.fsf@limmat.switch.ch>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

(This is a fairly minor point but I'd just like to have my "last word" :-)

Simon Leinen wrote Monday, October 07, 2002 3:47 AM:

> Some collectors will write large amounts of data to disk - if this is
> the main bottleneck I'd assume that they use the accounting data
> without too heavy processing (or they need a better approach to disk
> I/O, such as direct I/O, scatter/gather interfaces, faster disks etc.).

Yes. Especially scatter/gather.

> Unnecessary copying should be avoided mainly because memory bandwidth
> doesn't seem to grow as fast as other performance dimensions.
> Personally I think this is more of an issue than for example
> byte-order optimizations.

If the exporter must do byte-swapping it must do copying. That's why we
avoided XDR.

calato@riverstonenet.com wrote Monday, October 07, 2002 7:47 AM:

> 	I think there are lots of other issues that come into
> 	play before memory copies do. malloc and free are typically
> 	to big culprits of CPU usage. A design that causes lots
> 	of task switching is another. Your program needs to be
> 	pretty finely tuned before memory copy shows up, assuming
> 	the app is not just plain silly about memory copies.

Which is why Un*x kernels keep pools of memory, use mbufs, etc. Anybody who
uses malloc/free in high-performance code needs some re-education.

But I'm talking about already highly tuned situations, running on small
boxes (no fans, low power CPUs) ... we've encountered situations where bus
bandwidth is a significant performance issue, and there's no point in
putting in roadblocks (such as potential byte-swapping by forcing use of XDR
or forcing field copies because the output format doesn't fit in an obvious
way to the internal data structures).

Even in high-performance situations, export of measurements is treated as an
extra cost, to be minimised. As I recall, on telephone switches the goal was
for operational measurements to take less than 5% of the system CPU.

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 03:07:04 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA02020
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 03:07:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yoFF-0007YG-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 01:53:29 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17yoFD-0007Y8-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 01:53:27 -0500
Received: (qmail 15700 invoked from network); 8 Oct 2002 06:53:22 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 8 Oct 2002 06:53:22 -0000
Received: from peter ([192.168.254.163])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g986uXs25171
	for <ipfix-eval@net.doit.wisc.edu>; Mon, 7 Oct 2002 23:56:34 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: Discussion of Candidate Protocols - data model; broadcast vs reliable
Date: Mon, 7 Oct 2002 23:53:25 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNEEKODHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <3DA19B7E.7DF5421A@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

This note discusses two things:
 - whether we need a data model to define the protocol
   (I claim that we do not)
 - cost of UDP broadcast vs minimalist reliable transport
   (I claim that there is very little difference)

calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:

> Peter Ludemann wrote:
[snip]
> > YES ... so, can we all agree that data model issues are not
> > part of this discussion?
>
> 	No. We have no interoperability without a data model.

I agree that we need a data model. I don't see why it should affect the
discussion of the export protocol. The only requirements on the export
protocol are that it exhibit the desired reliability and efficiency; and
that it be able to transport all the data types required by the data models.
If we can agree on all the data types, then we can define the protocol; this
does not require defining the entire data model.

[After all, SNMP is defined independently of the various MIBs - which
correspond to the data model]

> 	No. Generalized data movers are not the problem.
> 	Defining a protocol that is well defined enough so
> 	that many device vendors can export data and many
> 	application vendors can process the data regardless
> 	of the device is problematic if all you define is a
> 	general purpose data mover.

But deciding on an adequate "generalized data mover" is the point of this
evaluation process, I thought. I expect that there will be multiple data
models, for the various kinds of generalized devices. (e.g., for our probe,
we've defined three generic groupings of data: volume metrics; QoS metrics;
usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
RADIUS's vendor-specific attributes).


There is one place where the nature of the data might intersect with the
protocol -- the high-volume metrics such as exported by NetFlow; and where
the claim is that a reliable protocol is an unnecessary overhead. So, let me
discuss this a bit more.

The argument is that with high volume export it is preferable to do
multi-cast UDP with sequence numbers; data loss can be detected by noting
which sequence numbers are missing ... and reliability can be increased by
having multiple receivers and de-duplicating what they receive.

For such a situation, the reliable protocol's *implementation* would not
keep a queue of data to retransmit on fail-over; it would only keep enough
buffer to deal with TCP's or SCTP's flow control and to handle bursts of
records. ACKs would be used only to notice when data are not received at the
other end and to cause fail-over. TCP "write would block" also causes
fail-over.

I would argue that the cost of exporting this way is very similar to that of
the UDP broadcast. And on the receiving end, it is *much* easier to handle
than a UDP-broadcast, which also needs stronger hardware because of the
higher de-duplication load.

Can be about the same for both:
- data copying (if scatter/gather is used)
- protocol overhead (sequence number, template ID, etc.)

The possible extra cost of the "reliable" export version is:
- timer for noticing when ACK isn't received [trivial cost]
- TCP vs UDP (little difference with modern implementations)
- TCP retransmit with packet loss (typically very low)
- cost of fail-over when no ACK received or write would block

The savings and benefits of the "reliable" version are:
- fewer packet writes (broadcast requires 2x as many packets;
  and TCP can pack more efficiently because records can
  span packets)
- lower network traffic (which adds to reliability)
- smaller machines for receiving
- more accurate estimate of loss due to lack of reliability
- can handle congestion

[As an aside, even with the UDP-broadcast version, the exporter ought to
compute totals for the various metrics and output those from time to time,
to provide a more accurate understanding of data loss. Perhaps such totals
are already available in the MIBs, but there remains the issue of how to
correlate with the sequence numbers of the exported data.]

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 06:36:11 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA05421
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 06:36:11 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yrXz-00009M-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 05:25:03 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yrXw-000088-00; Tue, 08 Oct 2002 05:25:00 -0500
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-121.cisco.com [144.254.7.121])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g98AOH702521;
	Tue, 8 Oct 2002 12:24:18 +0200 (CEST)
Message-ID: <3DA2B251.2060700@cisco.com>
Date: Tue, 08 Oct 2002 12:24:17 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Simon Leinen <simon@limmat.switch.ch>,
        Reinaldo Penno
 <rpenno@nortelnetworks.com>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was: Re:IPFIX
   Requireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch> <3DA198C6.CC26BCCD@riverstonenet.com> <3DA1A710.9080308@cisco.com> <3DA1AD55.8573BDE0@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

>>>      
>>>
>>>>On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
>>>>
>>>>
>>>>        
>>>>
>>>>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
>>>>>>"If some flow information data cannot be delivered to the collector
>>>>>>in a timely manner, the amount of missing flow information data
>>>>>>MUST be indicated to the collector.  Possible reasons for failure
>>>>>>to deliver data include loss of packets on the network path, or
>>>>>>resource shortage at the exporter."
>>>>>>
>>>>>>
>>>>>>            
>>>>>>
>>>>>But how the exporter would know which records were lost in the
>>>>>network unless we have (application layer) ACKs?
>>>>>
>>>>>
>>>>>          
>>>>>
>>>>I see - my "MUST be indicated" is confusing too.  The exporter
>>>>wouldn't need to know, but the collector must be able to determine
>>>>that something was lost, and "how much", where I intentionally leave
>>>>open the accuracy - the collector won't be able to reconstruct
>>>>everything anyway.  So what about this:
>>>>
>>>>  "If some flow information data cannot be delivered to the collector
>>>>  in a timely manner, the collector MUST be able to estimate the
>>>>  amount of data missing.  Possible reasons for failure to deliver
>>>>  data include loss of packets on the network path, or resource
>>>>  shortage at the exporter."
>>>>
>>>>        
>>>>
>>I even prefer this proposal compared to the previous one from Simon.
>>
>>    
>>
>>>>        
>>>>
>>>      Not sure I like that. How about when the exporter starts
>>>      talking to another collector. How about in overload mode
>>>      when the collector is just dropping flows.
>>>
>>>      
>>>
>>What is the issue, you could add "overload on the collector" in the list
>>of example?
>>What is important is the collector must know the amount of data missing,
>>whereever it comes from: exporter, path or collector.
>>If you send this information from the exporter, you could possibly not
>>report missing information.
>>Ex:
>>- the transport session breaks, what happened to the flow records which
>>were sent?
>>    
>>
>
>	Exaclty, see below.
>
>  
>
>>- the transport protocol acknowlegde some packets but they are not
>>handled correctly by the collector (CPU too busy)
>>    
>>
>
>	Again, I think it is difficult to describe how to measure loss
>	without a protocol definition to analyze. 
>
Agreed. So maybe we should maybe postpone the discussion...

>
>	But my view is that we will be in a **better** position (not perfect)
>	to design a solution by measuring data loss from the exporter's
>perspective
>	rather than the collector. The reason being the exporter talks
>	to many collectors and thus has the common view, not the collector.
>
>	So lets assume we have a simple message level ACK for every 100
>	messages. I have an outstanding ACK when the device looses connectivity
>	to the collector. So the device resends the 100 messages to 
>	collector #2. No need to report any data loss.
>
>	If on the other hand if the device never resends those messages
>(because of
>	a design choice) then the device needs to report the potential loss 
>	to the new collector (or how ever that info is to be retrieved, maybe
>SNMP).
>	
>	If we examine this from the collector perspective, lets assume it never
>	receives any of the 100 messages that were outstanding. How does it
>	even know to report a loss. 
>
For example, by using a meaningfull sequence ID; increased by the number 
of flow records in the export packet

>
>	If somehow it detected the loss, how does it know the messages
>	were resent?
>
Again with the sequence ID because there is no gap.

>
>	If the collector recieved the messages but just the ACK got lost and 
>	the exporter resent the messages, it didin't report a loss anyway. If 
>	the exporter didn't resend then it falsely reported the loss. But I 
>	think this is preferrable to the collector scenario where no loss was 
>	reported when there was one. If I as the administrator know that the
>	potential loss is the upper bound then the operator can make an
>informed 
>	decision to look into the matter futher or not.
>
>	I don't think we can design a 100% guaranteed solution but one
>	from the exporter's perspective I think lends itself to better
>	possibilities.
>  
>
I really think that the solution is a mix of both: report loss on the 
collector and on the exporter.
Collector loss can be due to: exporter, path, collector
Exporter loss can be due to: exporter, path
The collector loss will be greather than the exporter loss.
But for me, what really counts is the loss of flow records saved on my 
hard disk, so from a collector point of view.

Regards, Benoit.

>  
>

>  
>
>>BTW, I agree with you Paul about the "timely manner" which is confusing
>>and maybe not necessary.
>>
>>Regards, Benoit.
>>
>>    
>>
>>>      I think the exporter is in the best position to estimate how
>>>      much data was lost. Once more of the protocol is nailed down
>>>      we can better define how to measure loss.
>>>
>>>
>>>      
>>>
>>>>As an example, the flow export mechanism I use sends me packets of
>>>>flow records, and each packet has a flow record sequence number.  So I
>>>>can determine exactly how many flows I have missed.  This information
>>>>is important for diagnosis of situations where there is information
>>>>loss (some, but not all of this information loss would have been
>>>>prevented by using a reliable transport protocol).
>>>>
>>>>For my particular applications, I'm mostly interested in the byte
>>>>amounts of metered traffic.  So if a flow export protocol had sequence
>>>>numbers representing the cumulative total bytes metered, that would be
>>>>very useful to me - I really would like to know what percentage of
>>>>traffic could not be accounted for.  (In addition to that, I would
>>>>still want to know how many flow records I missed.)
>>>>--
>>>>Simon Leinen                                   simon@babar.switch.ch
>>>>SWITCH                             http://www.switch.ch/misc/leinen/
>>>>
>>>>              Computers hate being anthropomorphized.
>>>>
>>>>--
>>>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>>>"unsubscribe ipfix" in message body
>>>>Archive     http://ipfix.doit.wisc.edu/archive/
>>>>
>>>>
>>>>        
>>>>
>>>--
>>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>>"unsubscribe ipfix" in message body
>>>Archive     http://ipfix.doit.wisc.edu/archive/
>>>
>>>
>>>      
>>>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 08:14:50 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA08351
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 08:14:49 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yt2G-0003Vt-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 07:00:24 -0500
Received: from mailhub.fokus.gmd.de ([193.174.154.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yt2E-0003Vm-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 07:00:22 -0500
Received: from fokus.gmd.de (dhcp229 [195.37.78.229])
	by mailhub.fokus.gmd.de (8.11.6/8.11.6) with ESMTP id g98Bqje15876;
	Tue, 8 Oct 2002 13:52:45 +0200 (MEST)
Message-ID: <3DA2C64C.7050307@fokus.gmd.de>
Date: Tue, 08 Oct 2002 13:49:32 +0200
From: Sebastian Zander <zander@fokus.gmd.de>
Organization: Fraunhofer FOKUS
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; de-DE; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: de-DE
MIME-Version: 1.0
To: Jeff Meyer <jeffm@cup.hp.com>
CC: Peter Ludemann <peter.ludemann@xacct.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com> <3D9D5A10.2030906@fokus.gmd.de> <3D9E0B64.8020404@cup.hp.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Jeff,

Jeff Meyer wrote:

> Sebastian,
> 
>   Diameter's XML draft is pretty close to IPDR, thanks
> for the pointer.
> 
>   The trick used by IPDR, however, is to write directly
> using XML-Schema's directives for defining information
> models, and reuse XML-Schema's existing data type
> set rather than inventing new names.  Diameter uses
> the older DTD definition syntax to define a grammar
> from scratch.


Yes I know that schemas have some advantages over DTDs but
one could define XML schema for Diameter as well. My point
is to focus on the protocol and not on the data model
representation/description. But I agree that a data
representation with XML would be nice to have.

 
>   The benefit of the IPDR model is that you not only have
> a description language (for mapping to various serialization
> protocols, e.g. Compact IPDR...), but a validateable XML
> representation of that data immediately falls out, if
> you are interested in having an XML representation.
> 
> 
>   Note that the document itself only contains descriptive
> information about the information items (elements and
> groups of elements).  How one maps from this information
> set to Compact IPDR or DB tables, is established by
> convention, documented in a separate RFC/spec.  So, I don't
> think your concern about putting too much in the document
> is an issue.
> 
> 
>   I don't understand your comment:


Sorry I was not sure what you meant with "binary format"
but now I understand that your protocol supports binary encoding
as well as XML right?

 
>  > I am also wondering if the IETF would ever standardize
>  > things like binary formats. Probably not.
> 
>   Diameter protocol messages define a binary payload,
> as do many other IETF protocols?

Diameter can handle binary as well as non binary payload
(UTF).

Cheers,

Sebastian

-- 
Sebastian Zander                         E-mail: zander@fokus.fhg.de
FhI FOKUS / Global Networking (GloNe)    Tel: +49-30-3463-7287
Kaiserin-Augusta-Allee 31                Fax: +49-30-3463-8287
D-10589 Berlin, Germany                  www.fokus.fhg.de/usr/sebastian.zander




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 09:48:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA12863
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 09:48:29 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yuXu-0006Qh-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 08:37:10 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yuXr-0006PG-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 08:37:07 -0500
Received: from riverstonenet.com ([134.141.180.94]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 8 Oct 2002 06:36:35 -0700
Message-ID: <3DA2DEF0.27DF61DB@riverstonenet.com>
Date: Tue, 08 Oct 2002 09:34:40 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Performance (was: Discussion of Candidate 
 Protocols)
References: <AMEKJFAIEIKCBNABBMPNKEKGDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 08 Oct 2002 13:36:35.0928 (UTC) FILETIME=[B8E7CD80:01C26ECF]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> (This is a fairly minor point but I'd just like to have my "last word" :-)
> 
> Simon Leinen wrote Monday, October 07, 2002 3:47 AM:
> 
> > Some collectors will write large amounts of data to disk - if this is
> > the main bottleneck I'd assume that they use the accounting data
> > without too heavy processing (or they need a better approach to disk
> > I/O, such as direct I/O, scatter/gather interfaces, faster disks etc.).
> 
> Yes. Especially scatter/gather.
> 
> > Unnecessary copying should be avoided mainly because memory bandwidth
> > doesn't seem to grow as fast as other performance dimensions.
> > Personally I think this is more of an issue than for example
> > byte-order optimizations.
> 
> If the exporter must do byte-swapping it must do copying. That's why we
> avoided XDR.
> 
> calato@riverstonenet.com wrote Monday, October 07, 2002 7:47 AM:
> 
> >       I think there are lots of other issues that come into
> >       play before memory copies do. malloc and free are typically
> >       to big culprits of CPU usage. A design that causes lots
> >       of task switching is another. Your program needs to be
> >       pretty finely tuned before memory copy shows up, assuming
> >       the app is not just plain silly about memory copies.
> 
> Which is why Un*x kernels keep pools of memory, use mbufs, etc. Anybody who
> uses malloc/free in high-performance code needs some re-education.
> 
> But I'm talking about already highly tuned situations, running on small
> boxes (no fans, low power CPUs) ... we've encountered situations where bus
> bandwidth is a significant performance issue, and there's no point in
> putting in roadblocks (such as potential byte-swapping by forcing use of XDR
> or forcing field copies because the output format doesn't fit in an obvious
> way to the internal data structures).
> 
> Even in high-performance situations, export of measurements is treated as an
> extra cost, to be minimised. As I recall, on telephone switches the goal was
> for operational measurements to take less than 5% of the system CPU.

	All good points. I understand better now where you are
	coming from.

	Paul
> 
> - peter
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 10:04:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA14049
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 10:04:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yure-00075F-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 08:57:34 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yurc-00074T-00; Tue, 08 Oct 2002 08:57:32 -0500
Received: from riverstonenet.com ([134.141.180.94]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 8 Oct 2002 06:56:58 -0700
Message-ID: <3DA2E3B7.7779228@riverstonenet.com>
Date: Tue, 08 Oct 2002 09:55:03 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Simon Leinen <simon@limmat.switch.ch>,
        Reinaldo Penno <rpenno@nortelnetworks.com>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was: 
 Re:IPFIXRequireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch> <3DA198C6.CC26BCCD@riverstonenet.com> <3DA1A710.9080308@cisco.com> <3DA1AD55.8573BDE0@riverstonenet.com> <3DA2B251.2060700@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 08 Oct 2002 13:56:59.0303 (UTC) FILETIME=[92180370:01C26ED2]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


> >
> >       Again, I think it is difficult to describe how to measure loss
> >       without a protocol definition to analyze.
> >
> Agreed. So maybe we should maybe postpone the discussion...
> 

	Lets do that. 

	However, I think this discussion shows the req section should be a 
	little more general to leave open implementation details. Here is 
	my proposal..

	
 	If flow information is lost, a means to gauge the amount of
	loss MUST be available from the Exporter, Collector or both. 
	Possible reasons for flow data loss include loss of packets on 
	the network path, resource shortage at the exporter, Collector
	crash, etc...

	Paul


Benoit Claise wrote:
> 
> Paul,
> 
> >>>
> >>>
> >>>>On Fri, 4 Oct 2002 18:44:10 -0700 , "Reinaldo Penno" <rpenno@nortelnetworks.com> said:
> >>>>
> >>>>
> >>>>
> >>>>
> >>>>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
> >>>>>>"If some flow information data cannot be delivered to the collector
> >>>>>>in a timely manner, the amount of missing flow information data
> >>>>>>MUST be indicated to the collector.  Possible reasons for failure
> >>>>>>to deliver data include loss of packets on the network path, or
> >>>>>>resource shortage at the exporter."
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>But how the exporter would know which records were lost in the
> >>>>>network unless we have (application layer) ACKs?
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>I see - my "MUST be indicated" is confusing too.  The exporter
> >>>>wouldn't need to know, but the collector must be able to determine
> >>>>that something was lost, and "how much", where I intentionally leave
> >>>>open the accuracy - the collector won't be able to reconstruct
> >>>>everything anyway.  So what about this:
> >>>>
> >>>>  "If some flow information data cannot be delivered to the collector
> >>>>  in a timely manner, the collector MUST be able to estimate the
> >>>>  amount of data missing.  Possible reasons for failure to deliver
> >>>>  data include loss of packets on the network path, or resource
> >>>>  shortage at the exporter."
> >>>>
> >>>>
> >>>>
> >>I even prefer this proposal compared to the previous one from Simon.
> >>
> >>
> >>
> >>>>
> >>>>
> >>>      Not sure I like that. How about when the exporter starts
> >>>      talking to another collector. How about in overload mode
> >>>      when the collector is just dropping flows.
> >>>
> >>>
> >>>
> >>What is the issue, you could add "overload on the collector" in the list
> >>of example?
> >>What is important is the collector must know the amount of data missing,
> >>whereever it comes from: exporter, path or collector.
> >>If you send this information from the exporter, you could possibly not
> >>report missing information.
> >>Ex:
> >>- the transport session breaks, what happened to the flow records which
> >>were sent?
> >>
> >>
> >
> >       Exaclty, see below.
> >
> >
> >
> >>- the transport protocol acknowlegde some packets but they are not
> >>handled correctly by the collector (CPU too busy)
> >>
> >>
> >
> >       Again, I think it is difficult to describe how to measure loss
> >       without a protocol definition to analyze.
> >
> Agreed. So maybe we should maybe postpone the discussion...
> 
> >
> >       But my view is that we will be in a **better** position (not perfect)
> >       to design a solution by measuring data loss from the exporter's
> >perspective
> >       rather than the collector. The reason being the exporter talks
> >       to many collectors and thus has the common view, not the collector.
> >
> >       So lets assume we have a simple message level ACK for every 100
> >       messages. I have an outstanding ACK when the device looses connectivity
> >       to the collector. So the device resends the 100 messages to
> >       collector #2. No need to report any data loss.
> >
> >       If on the other hand if the device never resends those messages
> >(because of
> >       a design choice) then the device needs to report the potential loss
> >       to the new collector (or how ever that info is to be retrieved, maybe
> >SNMP).
> >
> >       If we examine this from the collector perspective, lets assume it never
> >       receives any of the 100 messages that were outstanding. How does it
> >       even know to report a loss.
> >
> For example, by using a meaningfull sequence ID; increased by the number
> of flow records in the export packet
> 
> >
> >       If somehow it detected the loss, how does it know the messages
> >       were resent?
> >
> Again with the sequence ID because there is no gap.
> 
> >
> >       If the collector recieved the messages but just the ACK got lost and
> >       the exporter resent the messages, it didin't report a loss anyway. If
> >       the exporter didn't resend then it falsely reported the loss. But I
> >       think this is preferrable to the collector scenario where no loss was
> >       reported when there was one. If I as the administrator know that the
> >       potential loss is the upper bound then the operator can make an
> >informed
> >       decision to look into the matter futher or not.
> >
> >       I don't think we can design a 100% guaranteed solution but one
> >       from the exporter's perspective I think lends itself to better
> >       possibilities.
> >
> >
> I really think that the solution is a mix of both: report loss on the
> collector and on the exporter.
> Collector loss can be due to: exporter, path, collector
> Exporter loss can be due to: exporter, path
> The collector loss will be greather than the exporter loss.
> But for me, what really counts is the loss of flow records saved on my
> hard disk, so from a collector point of view.
> 
> Regards, Benoit.
> 
> >
> >
> 
> >
> >
> >>BTW, I agree with you Paul about the "timely manner" which is confusing
> >>and maybe not necessary.
> >>
> >>Regards, Benoit.
> >>
> >>
> >>
> >>>      I think the exporter is in the best position to estimate how
> >>>      much data was lost. Once more of the protocol is nailed down
> >>>      we can better define how to measure loss.
> >>>
> >>>
> >>>
> >>>
> >>>>As an example, the flow export mechanism I use sends me packets of
> >>>>flow records, and each packet has a flow record sequence number.  So I
> >>>>can determine exactly how many flows I have missed.  This information
> >>>>is important for diagnosis of situations where there is information
> >>>>loss (some, but not all of this information loss would have been
> >>>>prevented by using a reliable transport protocol).
> >>>>
> >>>>For my particular applications, I'm mostly interested in the byte
> >>>>amounts of metered traffic.  So if a flow export protocol had sequence
> >>>>numbers representing the cumulative total bytes metered, that would be
> >>>>very useful to me - I really would like to know what percentage of
> >>>>traffic could not be accounted for.  (In addition to that, I would
> >>>>still want to know how many flow records I missed.)
> >>>>--
> >>>>Simon Leinen                                   simon@babar.switch.ch
> >>>>SWITCH                             http://www.switch.ch/misc/leinen/
> >>>>
> >>>>              Computers hate being anthropomorphized.
> >>>>
> >>>>--
> >>>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >>>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >>>>"unsubscribe ipfix" in message body
> >>>>Archive     http://ipfix.doit.wisc.edu/archive/
> >>>>
> >>>>
> >>>>
> >>>>
> >>>--
> >>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >>>"unsubscribe ipfix" in message body
> >>>Archive     http://ipfix.doit.wisc.edu/archive/
> >>>
> >>>
> >>>
> >>>

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 10:50:33 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA16309
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 10:50:32 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yvZp-0000km-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 09:43:13 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yvZn-0000jz-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 09:43:11 -0500
Received: from riverstonenet.com ([134.141.180.94]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 8 Oct 2002 07:42:39 -0700
Message-ID: <3DA2EE6C.EBE67BCD@riverstonenet.com>
Date: Tue, 08 Oct 2002 10:40:44 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data model; 
 broadcast vs reliable
References: <AMEKJFAIEIKCBNABBMPNEEKODHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 08 Oct 2002 14:42:39.0939 (UTC) FILETIME=[F3A3E130:01C26ED8]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> This note discusses two things:
>  - whether we need a data model to define the protocol
>    (I claim that we do not)
>  - cost of UDP broadcast vs minimalist reliable transport
>    (I claim that there is very little difference)
> 
> calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> 
> > Peter Ludemann wrote:
> [snip]
> > > YES ... so, can we all agree that data model issues are not
> > > part of this discussion?
> >
> >       No. We have no interoperability without a data model.
> 
> I agree that we need a data model. I don't see why it should affect the
> discussion of the export protocol. The only requirements on the export
> protocol are that it exhibit the desired reliability and efficiency; and
> that it be able to transport all the data types required by the data models.
> If we can agree on all the data types, then we can define the protocol; this
> does not require defining the entire data model.

	If I don't have a data model, how do I evaluate wether or not
	message ordering is a problem? If I don't have a data model how
	do I know I need a message for start of flow and end of flow versus
	one message that says here is a flow? If I don't have a data model
	how do I know I need a message to synchronize timestamps? If I don't
	have a data model, how do I know I can optimize by not encrypting
messages
	that only contain usage data (e.g. number of bytes, packets, etc...)

	We're not specifying the Bulk Data Export Protocol, we are are
specifying 
	a highly optimized IP Flow Information eXport protocol. The data model
	drives requirements to the protocol, not the other way around.

> 
> [After all, SNMP is defined independently of the various MIBs - which
> correspond to the data model]
> 
> >       No. Generalized data movers are not the problem.
> >       Defining a protocol that is well defined enough so
> >       that many device vendors can export data and many
> >       application vendors can process the data regardless
> >       of the device is problematic if all you define is a
> >       general purpose data mover.
> 
> But deciding on an adequate "generalized data mover" is the point of this
> evaluation process, I thought. I expect that there will be multiple data
> models, for the various kinds of generalized devices. (e.g., for our probe,
> we've defined three generic groupings of data: volume metrics; QoS metrics;
> usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> RADIUS's vendor-specific attributes).
> 
> There is one place where the nature of the data might intersect with the
> protocol -- the high-volume metrics such as exported by NetFlow; and where
> the claim is that a reliable protocol is an unnecessary overhead. So, let me
> discuss this a bit more.
> 
> The argument is that with high volume export it is preferable to do
> multi-cast UDP with sequence numbers; data loss can be detected by noting
> which sequence numbers are missing ... and reliability can be increased by
> having multiple receivers and de-duplicating what they receive.
> 
> For such a situation, the reliable protocol's *implementation* would not
> keep a queue of data to retransmit on fail-over; it would only keep enough
> buffer to deal with TCP's or SCTP's flow control and to handle bursts of
> records. ACKs would be used only to notice when data are not received at the
> other end and to cause fail-over. TCP "write would block" also causes
> fail-over.
> 
> I would argue that the cost of exporting this way is very similar to that of
> the UDP broadcast. And on the receiving end, it is *much* easier to handle
> than a UDP-broadcast, which also needs stronger hardware because of the
> higher de-duplication load.
> 
> Can be about the same for both:
> - data copying (if scatter/gather is used)
> - protocol overhead (sequence number, template ID, etc.)
> 
> The possible extra cost of the "reliable" export version is:
> - timer for noticing when ACK isn't received [trivial cost]
> - TCP vs UDP (little difference with modern implementations)
> - TCP retransmit with packet loss (typically very low)
> - cost of fail-over when no ACK received or write would block
> 
> The savings and benefits of the "reliable" version are:
> - fewer packet writes (broadcast requires 2x as many packets;
>   and TCP can pack more efficiently because records can
>   span packets)
> - lower network traffic (which adds to reliability)
> - smaller machines for receiving
> - more accurate estimate of loss due to lack of reliability
> - can handle congestion
> 
> [As an aside, even with the UDP-broadcast version, the exporter ought to
> compute totals for the various metrics and output those from time to time,
> to provide a more accurate understanding of data loss. Perhaps such totals
> are already available in the MIBs, but there remains the issue of how to
> correlate with the sequence numbers of the exported data.]
> 
> - peter
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 11:53:07 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19254
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 11:53:07 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17ywQ0-0002SA-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 10:37:08 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17ywPy-0002S0-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 10:37:06 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id LAA25015
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 8 Oct 2002 11:48:51 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma024987; Tue, 8 Oct 02 11:47:59 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <S4ZYV19F>; Tue, 8 Oct 2002 11:30:53 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA07583F@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] RE: Discussion of Candidate Protocols - data mod
	el; broadcast vs reliable
Date: Tue, 8 Oct 2002 11:36:17 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26EE0.71A937BD"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26EE0.71A937BD
Content-Type: text/plain

Hi,

You again have invoked SNMP design to justify your opinion. But I think you
overestimate how much the data model and export protocol are separated in
the design of SNMP.

The SMI and the Elements of Procedure define the bindings between the
protocol and the mibs. As you point out, the export protocol needs to be
able to transport the allowed data types. But it needs to do more than that.

The SNMP protocol is also bound to the actions that can be performed on the
data (get/set/trap) and the types of errors that can occur during
processing. Error codes are defined relative to the actions, and are
deliberately NOT defined relative to what is being managed, i.e. there are
no mib-specific error codes. That helped make SNMP simple.

SNMPv3 adds security to SNMP. Security should be an important part of IPFIX
as well, since the exported data is often used for billing. If the export
protocol were totally separate from the data, then SNMPv3 might have just
used IPSec to secure the protocol. But an important part of SNMP security
is to secure the DATA, not just the message. 

To secure the DATA, it is important to understand and to be able to specify
who can do what operations to which subset of data. In IPFIX terms it will
be important to control who is allowed to be the target of exported data,
and to define which exported data they can receive. It is necessary to have
a clearly defined mechanism for addressing the data elements (the mib
objects in SNMP) so they can be referenced in messages and/or security
mechanisms. You cannot just allow any type of data to be passed in a generic
bucket, because then you cannot apply access controls to that data.

Therefore, it is important to define the actions, the errors, the data
types, the addressing namespace, and the procedures to be followed by
senders and recievers as part of defining the export protocol. To understand
further some of the elements that may need to be defined based on the SNMP
model, I suggest you read the SMING WG requirements document (RFC3216).

dbh

> -----Original Message-----
> From: Peter Ludemann [mailto:peter.ludemann@xacct.com] 
> Sent: Tuesday, October 08, 2002 2:53 AM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: [ipfix-eval] RE: Discussion of Candidate Protocols - 
> data model; broadcast vs reliable
> 
> 
> This note discusses two things:
>  - whether we need a data model to define the protocol
>    (I claim that we do not)
>  - cost of UDP broadcast vs minimalist reliable transport
>    (I claim that there is very little difference)
> 
> calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> 
> > Peter Ludemann wrote:
> [snip]
> > > YES ... so, can we all agree that data model issues are not
> > > part of this discussion?
> >
> > 	No. We have no interoperability without a data model.
> 
> I agree that we need a data model. I don't see why it should 
> affect the
> discussion of the export protocol. The only requirements on the export
> protocol are that it exhibit the desired reliability and 
> efficiency; and
> that it be able to transport all the data types required by 
> the data models.
> If we can agree on all the data types, then we can define the 
> protocol; this
> does not require defining the entire data model.
> 
> [After all, SNMP is defined independently of the various MIBs - which
> correspond to the data model]
> 
> > 	No. Generalized data movers are not the problem.
> > 	Defining a protocol that is well defined enough so
> > 	that many device vendors can export data and many
> > 	application vendors can process the data regardless
> > 	of the device is problematic if all you define is a
> > 	general purpose data mover.
> 
> But deciding on an adequate "generalized data mover" is the 
> point of this
> evaluation process, I thought. I expect that there will be 
> multiple data
> models, for the various kinds of generalized devices. (e.g., 
> for our probe,
> we've defined three generic groupings of data: volume 
> metrics; QoS metrics;
> usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> RADIUS's vendor-specific attributes).
> 
> 
> There is one place where the nature of the data might 
> intersect with the
> protocol -- the high-volume metrics such as exported by 
> NetFlow; and where
> the claim is that a reliable protocol is an unnecessary 
> overhead. So, let me
> discuss this a bit more.
> 
> The argument is that with high volume export it is preferable to do
> multi-cast UDP with sequence numbers; data loss can be 
> detected by noting
> which sequence numbers are missing ... and reliability can be 
> increased by
> having multiple receivers and de-duplicating what they receive.
> 
> For such a situation, the reliable protocol's 
> *implementation* would not
> keep a queue of data to retransmit on fail-over; it would 
> only keep enough
> buffer to deal with TCP's or SCTP's flow control and to 
> handle bursts of
> records. ACKs would be used only to notice when data are not 
> received at the
> other end and to cause fail-over. TCP "write would block" also causes
> fail-over.
> 
> I would argue that the cost of exporting this way is very 
> similar to that of
> the UDP broadcast. And on the receiving end, it is *much* 
> easier to handle
> than a UDP-broadcast, which also needs stronger hardware 
> because of the
> higher de-duplication load.
> 
> Can be about the same for both:
> - data copying (if scatter/gather is used)
> - protocol overhead (sequence number, template ID, etc.)
> 
> The possible extra cost of the "reliable" export version is:
> - timer for noticing when ACK isn't received [trivial cost]
> - TCP vs UDP (little difference with modern implementations)
> - TCP retransmit with packet loss (typically very low)
> - cost of fail-over when no ACK received or write would block
> 
> The savings and benefits of the "reliable" version are:
> - fewer packet writes (broadcast requires 2x as many packets;
>   and TCP can pack more efficiently because records can
>   span packets)
> - lower network traffic (which adds to reliability)
> - smaller machines for receiving
> - more accurate estimate of loss due to lack of reliability
> - can handle congestion
> 
> [As an aside, even with the UDP-broadcast version, the 
> exporter ought to
> compute totals for the various metrics and output those from 
> time to time,
> to provide a more accurate understanding of data loss. 
> Perhaps such totals
> are already available in the MIBs, but there remains the 
> issue of how to
> correlate with the sequence numbers of the exported data.]
> 
> - peter
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C26EE0.71A937BD
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DUS-ASCII">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] RE: Discussion of Candidate Protocols - data =
model; broadcast vs reliable</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hi,</FONT>
</P>

<P><FONT SIZE=3D2>You again have invoked SNMP design to justify your =
opinion. But I think you overestimate how much the data model and =
export protocol are separated in the design of SNMP.</FONT></P>

<P><FONT SIZE=3D2>The SMI and the Elements of Procedure define the =
bindings between the protocol and the mibs. As you point out, the =
export protocol needs to be able to transport the allowed data types. =
But it needs to do more than that.</FONT></P>

<P><FONT SIZE=3D2>The SNMP protocol is also bound to the actions that =
can be performed on the data (get/set/trap) and the types of errors =
that can occur during processing. Error codes are defined relative to =
the actions, and are deliberately NOT defined relative to what is being =
managed, i.e. there are no mib-specific error codes. That helped make =
SNMP simple.</FONT></P>

<P><FONT SIZE=3D2>SNMPv3 adds security to SNMP. Security should be an =
important part of IPFIX as well, since the exported data is often used =
for billing. If the export protocol were totally separate from the =
data, then SNMPv3 might have just used IPSec to secure the protocol. =
But an important part of SNMP security&nbsp; is to secure the DATA, not =
just the message. </FONT></P>

<P><FONT SIZE=3D2>To secure the DATA, it is important to understand and =
to be able to specify who can do what operations to which subset of =
data. In IPFIX terms it will be important to control who is allowed to =
be the target of exported data, and to define which exported data they =
can receive. It is necessary to have a clearly defined mechanism for =
addressing the data elements (the mib objects in SNMP) so they can be =
referenced in messages and/or security mechanisms. You cannot just =
allow any type of data to be passed in a generic bucket, because then =
you cannot apply access controls to that data.</FONT></P>

<P><FONT SIZE=3D2>Therefore, it is important to define the actions, the =
errors, the data types, the addressing namespace, and the procedures to =
be followed by senders and recievers as part of defining the export =
protocol. To understand further some of the elements that may need to =
be defined based on the SNMP model, I suggest you read the SMING WG =
requirements document (RFC3216).</FONT></P>

<P><FONT SIZE=3D2>dbh</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Peter Ludemann [<A =
HREF=3D"mailto:peter.ludemann@xacct.com">mailto:peter.ludemann@xacct.com=
</A>] </FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, October 08, 2002 2:53 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [ipfix-eval] RE: Discussion of =
Candidate Protocols - </FONT>
<BR><FONT SIZE=3D2>&gt; data model; broadcast vs reliable</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; This note discusses two things:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; - whether we need a data model to define =
the protocol</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; (I claim that we do =
not)</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; - cost of UDP broadcast vs minimalist =
reliable transport</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; (I claim that there is very =
little difference)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; calato@riverstonenet.com wrote Monday, October =
07, 2002 7:35 AM:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Peter Ludemann wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; [snip]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; YES ... so, can we all agree that =
data model issues are not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; part of this discussion?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; No. We have no =
interoperability without a data model.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I agree that we need a data model. I don't see =
why it should </FONT>
<BR><FONT SIZE=3D2>&gt; affect the</FONT>
<BR><FONT SIZE=3D2>&gt; discussion of the export protocol. The only =
requirements on the export</FONT>
<BR><FONT SIZE=3D2>&gt; protocol are that it exhibit the desired =
reliability and </FONT>
<BR><FONT SIZE=3D2>&gt; efficiency; and</FONT>
<BR><FONT SIZE=3D2>&gt; that it be able to transport all the data types =
required by </FONT>
<BR><FONT SIZE=3D2>&gt; the data models.</FONT>
<BR><FONT SIZE=3D2>&gt; If we can agree on all the data types, then we =
can define the </FONT>
<BR><FONT SIZE=3D2>&gt; protocol; this</FONT>
<BR><FONT SIZE=3D2>&gt; does not require defining the entire data =
model.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; [After all, SNMP is defined independently of =
the various MIBs - which</FONT>
<BR><FONT SIZE=3D2>&gt; correspond to the data model]</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; No. Generalized data =
movers are not the problem.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; Defining a protocol =
that is well defined enough so</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; that many device =
vendors can export data and many</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; application vendors can =
process the data regardless</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; of the device is =
problematic if all you define is a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; general purpose data =
mover.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; But deciding on an adequate &quot;generalized =
data mover&quot; is the </FONT>
<BR><FONT SIZE=3D2>&gt; point of this</FONT>
<BR><FONT SIZE=3D2>&gt; evaluation process, I thought. I expect that =
there will be </FONT>
<BR><FONT SIZE=3D2>&gt; multiple data</FONT>
<BR><FONT SIZE=3D2>&gt; models, for the various kinds of generalized =
devices. (e.g., </FONT>
<BR><FONT SIZE=3D2>&gt; for our probe,</FONT>
<BR><FONT SIZE=3D2>&gt; we've defined three generic groupings of data: =
volume </FONT>
<BR><FONT SIZE=3D2>&gt; metrics; QoS metrics;</FONT>
<BR><FONT SIZE=3D2>&gt; usage metrics and attributes -- similarly, =
SNMP's enterprise MIBs and</FONT>
<BR><FONT SIZE=3D2>&gt; RADIUS's vendor-specific attributes).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; There is one place where the nature of the data =
might </FONT>
<BR><FONT SIZE=3D2>&gt; intersect with the</FONT>
<BR><FONT SIZE=3D2>&gt; protocol -- the high-volume metrics such as =
exported by </FONT>
<BR><FONT SIZE=3D2>&gt; NetFlow; and where</FONT>
<BR><FONT SIZE=3D2>&gt; the claim is that a reliable protocol is an =
unnecessary </FONT>
<BR><FONT SIZE=3D2>&gt; overhead. So, let me</FONT>
<BR><FONT SIZE=3D2>&gt; discuss this a bit more.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; The argument is that with high volume export it =
is preferable to do</FONT>
<BR><FONT SIZE=3D2>&gt; multi-cast UDP with sequence numbers; data loss =
can be </FONT>
<BR><FONT SIZE=3D2>&gt; detected by noting</FONT>
<BR><FONT SIZE=3D2>&gt; which sequence numbers are missing ... and =
reliability can be </FONT>
<BR><FONT SIZE=3D2>&gt; increased by</FONT>
<BR><FONT SIZE=3D2>&gt; having multiple receivers and de-duplicating =
what they receive.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; For such a situation, the reliable protocol's =
</FONT>
<BR><FONT SIZE=3D2>&gt; *implementation* would not</FONT>
<BR><FONT SIZE=3D2>&gt; keep a queue of data to retransmit on =
fail-over; it would </FONT>
<BR><FONT SIZE=3D2>&gt; only keep enough</FONT>
<BR><FONT SIZE=3D2>&gt; buffer to deal with TCP's or SCTP's flow =
control and to </FONT>
<BR><FONT SIZE=3D2>&gt; handle bursts of</FONT>
<BR><FONT SIZE=3D2>&gt; records. ACKs would be used only to notice when =
data are not </FONT>
<BR><FONT SIZE=3D2>&gt; received at the</FONT>
<BR><FONT SIZE=3D2>&gt; other end and to cause fail-over. TCP =
&quot;write would block&quot; also causes</FONT>
<BR><FONT SIZE=3D2>&gt; fail-over.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I would argue that the cost of exporting this =
way is very </FONT>
<BR><FONT SIZE=3D2>&gt; similar to that of</FONT>
<BR><FONT SIZE=3D2>&gt; the UDP broadcast. And on the receiving end, it =
is *much* </FONT>
<BR><FONT SIZE=3D2>&gt; easier to handle</FONT>
<BR><FONT SIZE=3D2>&gt; than a UDP-broadcast, which also needs stronger =
hardware </FONT>
<BR><FONT SIZE=3D2>&gt; because of the</FONT>
<BR><FONT SIZE=3D2>&gt; higher de-duplication load.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Can be about the same for both:</FONT>
<BR><FONT SIZE=3D2>&gt; - data copying (if scatter/gather is =
used)</FONT>
<BR><FONT SIZE=3D2>&gt; - protocol overhead (sequence number, template =
ID, etc.)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; The possible extra cost of the =
&quot;reliable&quot; export version is:</FONT>
<BR><FONT SIZE=3D2>&gt; - timer for noticing when ACK isn't received =
[trivial cost]</FONT>
<BR><FONT SIZE=3D2>&gt; - TCP vs UDP (little difference with modern =
implementations)</FONT>
<BR><FONT SIZE=3D2>&gt; - TCP retransmit with packet loss (typically =
very low)</FONT>
<BR><FONT SIZE=3D2>&gt; - cost of fail-over when no ACK received or =
write would block</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; The savings and benefits of the =
&quot;reliable&quot; version are:</FONT>
<BR><FONT SIZE=3D2>&gt; - fewer packet writes (broadcast requires 2x as =
many packets;</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; and TCP can pack more efficiently =
because records can</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; span packets)</FONT>
<BR><FONT SIZE=3D2>&gt; - lower network traffic (which adds to =
reliability)</FONT>
<BR><FONT SIZE=3D2>&gt; - smaller machines for receiving</FONT>
<BR><FONT SIZE=3D2>&gt; - more accurate estimate of loss due to lack of =
reliability</FONT>
<BR><FONT SIZE=3D2>&gt; - can handle congestion</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; [As an aside, even with the UDP-broadcast =
version, the </FONT>
<BR><FONT SIZE=3D2>&gt; exporter ought to</FONT>
<BR><FONT SIZE=3D2>&gt; compute totals for the various metrics and =
output those from </FONT>
<BR><FONT SIZE=3D2>&gt; time to time,</FONT>
<BR><FONT SIZE=3D2>&gt; to provide a more accurate understanding of =
data loss. </FONT>
<BR><FONT SIZE=3D2>&gt; Perhaps such totals</FONT>
<BR><FONT SIZE=3D2>&gt; are already available in the MIBs, but there =
remains the </FONT>
<BR><FONT SIZE=3D2>&gt; issue of how to</FONT>
<BR><FONT SIZE=3D2>&gt; correlate with the sequence numbers of the =
exported data.]</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; - peter</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26EE0.71A937BD--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 13:19:07 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA22698
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 13:19:06 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yxsR-00052C-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 12:10:35 -0500
Received: from palrel11.hp.com ([156.153.255.246])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yxsP-000522-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 12:10:33 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel11.hp.com (Postfix) with ESMTP
	id 7398160094F; Tue,  8 Oct 2002 10:10:26 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id KAA00342;
	Tue, 8 Oct 2002 10:10:20 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021008174152.HIJX18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 8 Oct 2002 10:41:52 -0700
Message-ID: <3DA311FD.3030305@cup.hp.com>
Date: Tue, 08 Oct 2002 10:12:29 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Sebastian Zander <zander@fokus.gmd.de>
Cc: Peter Ludemann <peter.ludemann@xacct.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFDDHAA.peter.ludemann@xacct.com> <3D9C6B6C.6010803@cup.hp.com> <3D9D5A10.2030906@fokus.gmd.de> <3D9E0B64.8020404@cup.hp.com> <3DA2C64C.7050307@fokus.gmd.de>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Sebastian,

   Responses inline...

Regards,

   Jeff Meyer

Sebastian Zander wrote:

> Jeff,
> 
> Jeff Meyer wrote:
> 
>> Sebastian,
>>
>>   Diameter's XML draft is pretty close to IPDR, thanks
>> for the pointer.
>>
>>   The trick used by IPDR, however, is to write directly
>> using XML-Schema's directives for defining information
>> models, and reuse XML-Schema's existing data type
>> set rather than inventing new names.  Diameter uses
>> the older DTD definition syntax to define a grammar
>> from scratch.
> 
> 
> 
> Yes I know that schemas have some advantages over DTDs but
> one could define XML schema for Diameter as well. My point
> is to focus on the protocol and not on the data model
> representation/description. But I agree that a data
> representation with XML would be nice to have.
> 


Well, I'd say consider the whole package.  IPDR has the
properties described today.  I'll be writing a larger
response to David Harrington's questions.

If we are just interested in the wireline protocol and
not extensibility, then the Schema part would be irrelevant.

However since extensibility is identified as a requirement,
I would not simply write off the fact that SOME extensibility
model exists.  Rather I would want to evaluate the model
overall.


> 
>>   The benefit of the IPDR model is that you not only have
>> a description language (for mapping to various serialization
>> protocols, e.g. Compact IPDR...), but a validateable XML
>> representation of that data immediately falls out, if
>> you are interested in having an XML representation.
>>
>>
>>   Note that the document itself only contains descriptive
>> information about the information items (elements and
>> groups of elements).  How one maps from this information
>> set to Compact IPDR or DB tables, is established by
>> convention, documented in a separate RFC/spec.  So, I don't
>> think your concern about putting too much in the document
>> is an issue.
>>
>>
>>   I don't understand your comment:
> 
> 
> 
> Sorry I was not sure what you meant with "binary format"
> but now I understand that your protocol supports binary encoding
> as well as XML right?


Yes.  There is an example in the IPDR base specification
(NDM-U 3.1) which illustrates the XML and equivalent
binary format for a given message.

   http://www.ipdr.org/documents/NDM-U_3.1.pdf

See p. 44 (section 4.3.2.1)


> 
> 
>>  > I am also wondering if the IETF would ever standardize
>>  > things like binary formats. Probably not.
>>
>>   Diameter protocol messages define a binary payload,
>> as do many other IETF protocols?
> 
> 
> Diameter can handle binary as well as non binary payload
> (UTF).


IPDR also specifies UTF8 as the binary "encoding" model for
strings.  (For US ASCII, UTF8 is equivalent to the ASCII
string itself).


> 
> Cheers,
> 
> Sebastian
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 13:42:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA23432
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 13:42:15 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yyDI-0005e0-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 12:32:09 -0500
Received: from palrel13.hp.com ([156.153.255.238])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yyDF-0005c2-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 12:32:05 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP
	id 09E564008C7; Tue,  8 Oct 2002 10:31:04 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id KAA01283;
	Tue, 8 Oct 2002 10:30:58 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021008180230.HIKX18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 8 Oct 2002 11:02:30 -0700
Message-ID: <3DA316D4.7080003@cup.hp.com>
Date: Tue, 08 Oct 2002 10:33:08 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Performance (was: Discussion of Candidate Protocols)
References: <AMEKJFAIEIKCBNABBMPNKEKGDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   The comment about XDR requiring byte swapping is FUD.

   As far as I can tell, all the candidate protocols
use Network Byte order.  So depending on your system
architecture you'll need to byte swap for all of them.
Nothing unique about XDR.

   If you don't want to do byte swapping try CORBA,
however if you have two machines w/ different
(big-endian, little-endian) architectures talking,
I'm hard pressed to see how one side doesn't have
to byte swap.

Regards,

   Jeff Meyer


Peter Ludemann wrote:

> (This is a fairly minor point but I'd just like to have my "last word" :-)
> 
> Simon Leinen wrote Monday, October 07, 2002 3:47 AM:
> 
> 
>>Some collectors will write large amounts of data to disk - if this is
>>the main bottleneck I'd assume that they use the accounting data
>>without too heavy processing (or they need a better approach to disk
>>I/O, such as direct I/O, scatter/gather interfaces, faster disks etc.).
>>
> 
> Yes. Especially scatter/gather.
> 
> 
>>Unnecessary copying should be avoided mainly because memory bandwidth
>>doesn't seem to grow as fast as other performance dimensions.
>>Personally I think this is more of an issue than for example
>>byte-order optimizations.
>>
> 
> If the exporter must do byte-swapping it must do copying. That's why we
> avoided XDR.
> 
> calato@riverstonenet.com wrote Monday, October 07, 2002 7:47 AM:
> 
> 
>>	I think there are lots of other issues that come into
>>	play before memory copies do. malloc and free are typically
>>	to big culprits of CPU usage. A design that causes lots
>>	of task switching is another. Your program needs to be
>>	pretty finely tuned before memory copy shows up, assuming
>>	the app is not just plain silly about memory copies.
>>
> 
> Which is why Un*x kernels keep pools of memory, use mbufs, etc. Anybody who
> uses malloc/free in high-performance code needs some re-education.
> 
> But I'm talking about already highly tuned situations, running on small
> boxes (no fans, low power CPUs) ... we've encountered situations where bus
> bandwidth is a significant performance issue, and there's no point in
> putting in roadblocks (such as potential byte-swapping by forcing use of XDR
> or forcing field copies because the output format doesn't fit in an obvious
> way to the internal data structures).
> 
> Even in high-performance situations, export of measurements is treated as an
> extra cost, to be minimised. As I recall, on telephone switches the goal was
> for operational measurements to take less than 5% of the system CPU.
> 
> - peter
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 13:54:12 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA23865
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 13:54:12 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yyRq-00065U-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 12:47:10 -0500
Received: from palrel12.hp.com ([156.153.255.237])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yyRo-00065M-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 12:47:08 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP
	id CC724E005B7; Tue,  8 Oct 2002 10:47:07 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id KAA02318;
	Tue, 8 Oct 2002 10:46:59 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021008181831.HILP18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 8 Oct 2002 11:18:31 -0700
Message-ID: <3DA31A94.9090905@cup.hp.com>
Date: Tue, 08 Oct 2002 10:49:08 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data mod	el; broadcast vs reliable
References: <6D745637A7E0F94DA070743C55CDA9BA07583F@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

David,

   I believe that two separate folks "invoked SNMP", first
myself, Jeff Meyer (for IPDR), and then Peter Ludemann
(for XACCT).

-- Jeff

Harrington, David wrote:

> Hi,
> 
> You again have invoked SNMP design to justify your opinion. But I think 
> you overestimate how much the data model and export protocol are 
> separated in the design of SNMP.
> 
> The SMI and the Elements of Procedure define the bindings between the 
> protocol and the mibs. As you point out, the export protocol needs to be 
> able to transport the allowed data types. But it needs to do more than that.
> 
> The SNMP protocol is also bound to the actions that can be performed on 
> the data (get/set/trap) and the types of errors that can occur during 
> processing. Error codes are defined relative to the actions, and are 
> deliberately NOT defined relative to what is being managed, i.e. there 
> are no mib-specific error codes. That helped make SNMP simple.
> 
> SNMPv3 adds security to SNMP. Security should be an important part of 
> IPFIX as well, since the exported data is often used for billing. If the 
> export protocol were totally separate from the data, then SNMPv3 might 
> have just used IPSec to secure the protocol. But an important part of 
> SNMP security  is to secure the DATA, not just the message.
> 
> To secure the DATA, it is important to understand and to be able to 
> specify who can do what operations to which subset of data. In IPFIX 
> terms it will be important to control who is allowed to be the target of 
> exported data, and to define which exported data they can receive. It is 
> necessary to have a clearly defined mechanism for addressing the data 
> elements (the mib objects in SNMP) so they can be referenced in messages 
> and/or security mechanisms. You cannot just allow any type of data to be 
> passed in a generic bucket, because then you cannot apply access 
> controls to that data.
> 
> Therefore, it is important to define the actions, the errors, the data 
> types, the addressing namespace, and the procedures to be followed by 
> senders and recievers as part of defining the export protocol. To 
> understand further some of the elements that may need to be defined 
> based on the SNMP model, I suggest you read the SMING WG requirements 
> document (RFC3216).
> 
> dbh
> 
>  > -----Original Message-----
>  > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
>  > Sent: Tuesday, October 08, 2002 2:53 AM
>  > To: ipfix-eval@net.doit.wisc.edu
>  > Subject: [ipfix-eval] RE: Discussion of Candidate Protocols -
>  > data model; broadcast vs reliable
>  >
>  >
>  > This note discusses two things:
>  >  - whether we need a data model to define the protocol
>  >    (I claim that we do not)
>  >  - cost of UDP broadcast vs minimalist reliable transport
>  >    (I claim that there is very little difference)
>  >
>  > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
>  >
>  > > Peter Ludemann wrote:
>  > [snip]
>  > > > YES ... so, can we all agree that data model issues are not
>  > > > part of this discussion?
>  > >
>  > >     No. We have no interoperability without a data model.
>  >
>  > I agree that we need a data model. I don't see why it should
>  > affect the
>  > discussion of the export protocol. The only requirements on the export
>  > protocol are that it exhibit the desired reliability and
>  > efficiency; and
>  > that it be able to transport all the data types required by
>  > the data models.
>  > If we can agree on all the data types, then we can define the
>  > protocol; this
>  > does not require defining the entire data model.
>  >
>  > [After all, SNMP is defined independently of the various MIBs - which
>  > correspond to the data model]
>  >
>  > >     No. Generalized data movers are not the problem.
>  > >     Defining a protocol that is well defined enough so
>  > >     that many device vendors can export data and many
>  > >     application vendors can process the data regardless
>  > >     of the device is problematic if all you define is a
>  > >     general purpose data mover.
>  >
>  > But deciding on an adequate "generalized data mover" is the
>  > point of this
>  > evaluation process, I thought. I expect that there will be
>  > multiple data
>  > models, for the various kinds of generalized devices. (e.g.,
>  > for our probe,
>  > we've defined three generic groupings of data: volume
>  > metrics; QoS metrics;
>  > usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
>  > RADIUS's vendor-specific attributes).
>  >
>  >
>  > There is one place where the nature of the data might
>  > intersect with the
>  > protocol -- the high-volume metrics such as exported by
>  > NetFlow; and where
>  > the claim is that a reliable protocol is an unnecessary
>  > overhead. So, let me
>  > discuss this a bit more.
>  >
>  > The argument is that with high volume export it is preferable to do
>  > multi-cast UDP with sequence numbers; data loss can be
>  > detected by noting
>  > which sequence numbers are missing ... and reliability can be
>  > increased by
>  > having multiple receivers and de-duplicating what they receive.
>  >
>  > For such a situation, the reliable protocol's
>  > *implementation* would not
>  > keep a queue of data to retransmit on fail-over; it would
>  > only keep enough
>  > buffer to deal with TCP's or SCTP's flow control and to
>  > handle bursts of
>  > records. ACKs would be used only to notice when data are not
>  > received at the
>  > other end and to cause fail-over. TCP "write would block" also causes
>  > fail-over.
>  >
>  > I would argue that the cost of exporting this way is very
>  > similar to that of
>  > the UDP broadcast. And on the receiving end, it is *much*
>  > easier to handle
>  > than a UDP-broadcast, which also needs stronger hardware
>  > because of the
>  > higher de-duplication load.
>  >
>  > Can be about the same for both:
>  > - data copying (if scatter/gather is used)
>  > - protocol overhead (sequence number, template ID, etc.)
>  >
>  > The possible extra cost of the "reliable" export version is:
>  > - timer for noticing when ACK isn't received [trivial cost]
>  > - TCP vs UDP (little difference with modern implementations)
>  > - TCP retransmit with packet loss (typically very low)
>  > - cost of fail-over when no ACK received or write would block
>  >
>  > The savings and benefits of the "reliable" version are:
>  > - fewer packet writes (broadcast requires 2x as many packets;
>  >   and TCP can pack more efficiently because records can
>  >   span packets)
>  > - lower network traffic (which adds to reliability)
>  > - smaller machines for receiving
>  > - more accurate estimate of loss due to lack of reliability
>  > - can handle congestion
>  >
>  > [As an aside, even with the UDP-broadcast version, the
>  > exporter ought to
>  > compute totals for the various metrics and output those from
>  > time to time,
>  > to provide a more accurate understanding of data loss.
>  > Perhaps such totals
>  > are already available in the MIBs, but there remains the
>  > issue of how to
>  > correlate with the sequence numbers of the exported data.]
>  >
>  > - peter
>  >
>  >
>  > --
>  > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
>  > in message body
>  > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>  > "unsubscribe ipfix" in message body
>  > Archive     http://ipfix.doit.wisc.edu/archive/
>  >
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 14:02:45 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA24237
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 14:02:45 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yyVB-0006En-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 12:50:37 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17yyV9-0006Ee-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 12:50:35 -0500
Received: (qmail 16498 invoked from network); 8 Oct 2002 17:50:29 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 8 Oct 2002 17:50:29 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g98Hris20015
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 8 Oct 2002 10:53:44 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] RE: Performance (was: Discussion of Candidate Protocols)
Date: Tue, 8 Oct 2002 10:50:33 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNEELHDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <3DA316D4.7080003@cup.hp.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Jeff Meyer wrote Tuesday, October 08, 2002 10:33 AM:

>    The comment about XDR requiring byte swapping is FUD.

Comparing me with Microsoft Marketing ... I'm flattered. :-)

>    As far as I can tell, all the candidate protocols
> use Network Byte order.  So depending on your system
> architecture you'll need to byte swap for all of them.
> Nothing unique about XDR.

Not true for CRANE, which uses network byte order only for the template
negotiation and for the message headers. For the actual data, it uses
whatever the exporting device wants.

>    If you don't want to do byte swapping try CORBA,
> however if you have two machines w/ different
> (big-endian, little-endian) architectures talking,
> I'm hard pressed to see how one side doesn't have
> to byte swap.

For CRANE, the *receiver* does the byte swapping, if needed. But the
assumption is that the receiver has more CPU and is not as real-time
constrained. Of course, if you want to do everything in network byte order,
CRANE allows that too (just specify big-endian for the data transmission).

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 14:43:52 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA25772
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 14:43:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yz81-0007LJ-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 13:30:45 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yz7z-0007Kb-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 13:30:43 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id OAA04197;
	Tue, 8 Oct 2002 14:35:30 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma004175; Tue, 8 Oct 02 14:34:43 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <S4ZYVH74>; Tue, 8 Oct 2002 14:17:38 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA256D7D@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: "'Jeff Meyer'" <jeffm@cup.hp.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] RE: Discussion of Candidate Protocols - data mod
		el; broadcast vs reliable
Date: Tue, 8 Oct 2002 14:23:04 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26EF7.BDFAF10F"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26EF7.BDFAF10F
Content-Type: text/plain

Hi,

I stand corrected. Please ignore the word "again" in my first sentence.

Dbh

> -----Original Message-----
> From: Jeff Meyer [mailto:jeffm@cup.hp.com] 
> Sent: Tuesday, October 08, 2002 1:49 PM
> To: Harrington, David
> Cc: ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] RE: Discussion of Candidate 
> Protocols - data mod el; broadcast vs reliable
> 
> 
> David,
> 
>    I believe that two separate folks "invoked SNMP", first
> myself, Jeff Meyer (for IPDR), and then Peter Ludemann
> (for XACCT).
> 
> -- Jeff
> 
> Harrington, David wrote:
> 
> > Hi,
> > 
> > You again have invoked SNMP design to justify your opinion. 
> But I think 
> > you overestimate how much the data model and export protocol are 
> > separated in the design of SNMP.
> > 
> > The SMI and the Elements of Procedure define the bindings 
> between the 
> > protocol and the mibs. As you point out, the export 
> protocol needs to be 
> > able to transport the allowed data types. But it needs to 
> do more than that.
> > 
> > The SNMP protocol is also bound to the actions that can be 
> performed on 
> > the data (get/set/trap) and the types of errors that can 
> occur during 
> > processing. Error codes are defined relative to the 
> actions, and are 
> > deliberately NOT defined relative to what is being managed, 
> i.e. there 
> > are no mib-specific error codes. That helped make SNMP simple.
> > 
> > SNMPv3 adds security to SNMP. Security should be an 
> important part of 
> > IPFIX as well, since the exported data is often used for 
> billing. If the 
> > export protocol were totally separate from the data, then 
> SNMPv3 might 
> > have just used IPSec to secure the protocol. But an 
> important part of 
> > SNMP security  is to secure the DATA, not just the message.
> > 
> > To secure the DATA, it is important to understand and to be able to 
> > specify who can do what operations to which subset of data. 
> In IPFIX 
> > terms it will be important to control who is allowed to be 
> the target of 
> > exported data, and to define which exported data they can 
> receive. It is 
> > necessary to have a clearly defined mechanism for 
> addressing the data 
> > elements (the mib objects in SNMP) so they can be 
> referenced in messages 
> > and/or security mechanisms. You cannot just allow any type 
> of data to be 
> > passed in a generic bucket, because then you cannot apply access 
> > controls to that data.
> > 
> > Therefore, it is important to define the actions, the 
> errors, the data 
> > types, the addressing namespace, and the procedures to be 
> followed by 
> > senders and recievers as part of defining the export protocol. To 
> > understand further some of the elements that may need to be defined 
> > based on the SNMP model, I suggest you read the SMING WG 
> requirements 
> > document (RFC3216).
> > 
> > dbh
> > 
> >  > -----Original Message-----
> >  > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> >  > Sent: Tuesday, October 08, 2002 2:53 AM
> >  > To: ipfix-eval@net.doit.wisc.edu
> >  > Subject: [ipfix-eval] RE: Discussion of Candidate Protocols -
> >  > data model; broadcast vs reliable
> >  >
> >  >
> >  > This note discusses two things:
> >  >  - whether we need a data model to define the protocol
> >  >    (I claim that we do not)
> >  >  - cost of UDP broadcast vs minimalist reliable transport
> >  >    (I claim that there is very little difference)
> >  >
> >  > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> >  >
> >  > > Peter Ludemann wrote:
> >  > [snip]
> >  > > > YES ... so, can we all agree that data model issues are not
> >  > > > part of this discussion?
> >  > >
> >  > >     No. We have no interoperability without a data model.
> >  >
> >  > I agree that we need a data model. I don't see why it should
> >  > affect the
> >  > discussion of the export protocol. The only requirements 
> on the export
> >  > protocol are that it exhibit the desired reliability and
> >  > efficiency; and
> >  > that it be able to transport all the data types required by
> >  > the data models.
> >  > If we can agree on all the data types, then we can define the
> >  > protocol; this
> >  > does not require defining the entire data model.
> >  >
> >  > [After all, SNMP is defined independently of the various 
> MIBs - which
> >  > correspond to the data model]
> >  >
> >  > >     No. Generalized data movers are not the problem.
> >  > >     Defining a protocol that is well defined enough so
> >  > >     that many device vendors can export data and many
> >  > >     application vendors can process the data regardless
> >  > >     of the device is problematic if all you define is a
> >  > >     general purpose data mover.
> >  >
> >  > But deciding on an adequate "generalized data mover" is the
> >  > point of this
> >  > evaluation process, I thought. I expect that there will be
> >  > multiple data
> >  > models, for the various kinds of generalized devices. (e.g.,
> >  > for our probe,
> >  > we've defined three generic groupings of data: volume
> >  > metrics; QoS metrics;
> >  > usage metrics and attributes -- similarly, SNMP's 
> enterprise MIBs and
> >  > RADIUS's vendor-specific attributes).
> >  >
> >  >
> >  > There is one place where the nature of the data might
> >  > intersect with the
> >  > protocol -- the high-volume metrics such as exported by
> >  > NetFlow; and where
> >  > the claim is that a reliable protocol is an unnecessary
> >  > overhead. So, let me
> >  > discuss this a bit more.
> >  >
> >  > The argument is that with high volume export it is 
> preferable to do
> >  > multi-cast UDP with sequence numbers; data loss can be
> >  > detected by noting
> >  > which sequence numbers are missing ... and reliability can be
> >  > increased by
> >  > having multiple receivers and de-duplicating what they receive.
> >  >
> >  > For such a situation, the reliable protocol's
> >  > *implementation* would not
> >  > keep a queue of data to retransmit on fail-over; it would
> >  > only keep enough
> >  > buffer to deal with TCP's or SCTP's flow control and to
> >  > handle bursts of
> >  > records. ACKs would be used only to notice when data are not
> >  > received at the
> >  > other end and to cause fail-over. TCP "write would 
> block" also causes
> >  > fail-over.
> >  >
> >  > I would argue that the cost of exporting this way is very
> >  > similar to that of
> >  > the UDP broadcast. And on the receiving end, it is *much*
> >  > easier to handle
> >  > than a UDP-broadcast, which also needs stronger hardware
> >  > because of the
> >  > higher de-duplication load.
> >  >
> >  > Can be about the same for both:
> >  > - data copying (if scatter/gather is used)
> >  > - protocol overhead (sequence number, template ID, etc.)
> >  >
> >  > The possible extra cost of the "reliable" export version is:
> >  > - timer for noticing when ACK isn't received [trivial cost]
> >  > - TCP vs UDP (little difference with modern implementations)
> >  > - TCP retransmit with packet loss (typically very low)
> >  > - cost of fail-over when no ACK received or write would block
> >  >
> >  > The savings and benefits of the "reliable" version are:
> >  > - fewer packet writes (broadcast requires 2x as many packets;
> >  >   and TCP can pack more efficiently because records can
> >  >   span packets)
> >  > - lower network traffic (which adds to reliability)
> >  > - smaller machines for receiving
> >  > - more accurate estimate of loss due to lack of reliability
> >  > - can handle congestion
> >  >
> >  > [As an aside, even with the UDP-broadcast version, the
> >  > exporter ought to
> >  > compute totals for the various metrics and output those from
> >  > time to time,
> >  > to provide a more accurate understanding of data loss.
> >  > Perhaps such totals
> >  > are already available in the MIBs, but there remains the
> >  > issue of how to
> >  > correlate with the sequence numbers of the exported data.]
> >  >
> >  > - peter
> >  >
> >  >
> >  > --
> >  > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> >  > in message body
> >  > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >  > "unsubscribe ipfix" in message body
> >  > Archive     http://ipfix.doit.wisc.edu/archive/
> >  >
> > 
> 
> 
> 

------_=_NextPart_001_01C26EF7.BDFAF10F
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=US-ASCII">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2655.35">
<TITLE>RE: [ipfix-eval] RE: Discussion of Candidate Protocols - data mod	el; broadcast vs reliable</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>Hi,</FONT>
</P>

<P><FONT SIZE=2>I stand corrected. Please ignore the word &quot;again&quot; in my first sentence.</FONT>
</P>

<P><FONT SIZE=2>Dbh</FONT>
</P>

<P><FONT SIZE=2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; From: Jeff Meyer [<A HREF="mailto:jeffm@cup.hp.com">mailto:jeffm@cup.hp.com</A>] </FONT>
<BR><FONT SIZE=2>&gt; Sent: Tuesday, October 08, 2002 1:49 PM</FONT>
<BR><FONT SIZE=2>&gt; To: Harrington, David</FONT>
<BR><FONT SIZE=2>&gt; Cc: ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; Subject: Re: [ipfix-eval] RE: Discussion of Candidate </FONT>
<BR><FONT SIZE=2>&gt; Protocols - data mod el; broadcast vs reliable</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; David,</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp;&nbsp; I believe that two separate folks &quot;invoked SNMP&quot;, first</FONT>
<BR><FONT SIZE=2>&gt; myself, Jeff Meyer (for IPDR), and then Peter Ludemann</FONT>
<BR><FONT SIZE=2>&gt; (for XACCT).</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; -- Jeff</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Harrington, David wrote:</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; Hi,</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; You again have invoked SNMP design to justify your opinion. </FONT>
<BR><FONT SIZE=2>&gt; But I think </FONT>
<BR><FONT SIZE=2>&gt; &gt; you overestimate how much the data model and export protocol are </FONT>
<BR><FONT SIZE=2>&gt; &gt; separated in the design of SNMP.</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; The SMI and the Elements of Procedure define the bindings </FONT>
<BR><FONT SIZE=2>&gt; between the </FONT>
<BR><FONT SIZE=2>&gt; &gt; protocol and the mibs. As you point out, the export </FONT>
<BR><FONT SIZE=2>&gt; protocol needs to be </FONT>
<BR><FONT SIZE=2>&gt; &gt; able to transport the allowed data types. But it needs to </FONT>
<BR><FONT SIZE=2>&gt; do more than that.</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; The SNMP protocol is also bound to the actions that can be </FONT>
<BR><FONT SIZE=2>&gt; performed on </FONT>
<BR><FONT SIZE=2>&gt; &gt; the data (get/set/trap) and the types of errors that can </FONT>
<BR><FONT SIZE=2>&gt; occur during </FONT>
<BR><FONT SIZE=2>&gt; &gt; processing. Error codes are defined relative to the </FONT>
<BR><FONT SIZE=2>&gt; actions, and are </FONT>
<BR><FONT SIZE=2>&gt; &gt; deliberately NOT defined relative to what is being managed, </FONT>
<BR><FONT SIZE=2>&gt; i.e. there </FONT>
<BR><FONT SIZE=2>&gt; &gt; are no mib-specific error codes. That helped make SNMP simple.</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; SNMPv3 adds security to SNMP. Security should be an </FONT>
<BR><FONT SIZE=2>&gt; important part of </FONT>
<BR><FONT SIZE=2>&gt; &gt; IPFIX as well, since the exported data is often used for </FONT>
<BR><FONT SIZE=2>&gt; billing. If the </FONT>
<BR><FONT SIZE=2>&gt; &gt; export protocol were totally separate from the data, then </FONT>
<BR><FONT SIZE=2>&gt; SNMPv3 might </FONT>
<BR><FONT SIZE=2>&gt; &gt; have just used IPSec to secure the protocol. But an </FONT>
<BR><FONT SIZE=2>&gt; important part of </FONT>
<BR><FONT SIZE=2>&gt; &gt; SNMP security&nbsp; is to secure the DATA, not just the message.</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; To secure the DATA, it is important to understand and to be able to </FONT>
<BR><FONT SIZE=2>&gt; &gt; specify who can do what operations to which subset of data. </FONT>
<BR><FONT SIZE=2>&gt; In IPFIX </FONT>
<BR><FONT SIZE=2>&gt; &gt; terms it will be important to control who is allowed to be </FONT>
<BR><FONT SIZE=2>&gt; the target of </FONT>
<BR><FONT SIZE=2>&gt; &gt; exported data, and to define which exported data they can </FONT>
<BR><FONT SIZE=2>&gt; receive. It is </FONT>
<BR><FONT SIZE=2>&gt; &gt; necessary to have a clearly defined mechanism for </FONT>
<BR><FONT SIZE=2>&gt; addressing the data </FONT>
<BR><FONT SIZE=2>&gt; &gt; elements (the mib objects in SNMP) so they can be </FONT>
<BR><FONT SIZE=2>&gt; referenced in messages </FONT>
<BR><FONT SIZE=2>&gt; &gt; and/or security mechanisms. You cannot just allow any type </FONT>
<BR><FONT SIZE=2>&gt; of data to be </FONT>
<BR><FONT SIZE=2>&gt; &gt; passed in a generic bucket, because then you cannot apply access </FONT>
<BR><FONT SIZE=2>&gt; &gt; controls to that data.</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; Therefore, it is important to define the actions, the </FONT>
<BR><FONT SIZE=2>&gt; errors, the data </FONT>
<BR><FONT SIZE=2>&gt; &gt; types, the addressing namespace, and the procedures to be </FONT>
<BR><FONT SIZE=2>&gt; followed by </FONT>
<BR><FONT SIZE=2>&gt; &gt; senders and recievers as part of defining the export protocol. To </FONT>
<BR><FONT SIZE=2>&gt; &gt; understand further some of the elements that may need to be defined </FONT>
<BR><FONT SIZE=2>&gt; &gt; based on the SNMP model, I suggest you read the SMING WG </FONT>
<BR><FONT SIZE=2>&gt; requirements </FONT>
<BR><FONT SIZE=2>&gt; &gt; document (RFC3216).</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; dbh</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; From: Peter Ludemann [<A HREF="mailto:peter.ludemann@xacct.com">mailto:peter.ludemann@xacct.com</A>]</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Sent: Tuesday, October 08, 2002 2:53 AM</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; To: ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Subject: [ipfix-eval] RE: Discussion of Candidate Protocols -</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; data model; broadcast vs reliable</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; This note discusses two things:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;&nbsp; - whether we need a data model to define the protocol</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;&nbsp;&nbsp;&nbsp; (I claim that we do not)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;&nbsp; - cost of UDP broadcast vs minimalist reliable transport</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;&nbsp;&nbsp;&nbsp; (I claim that there is very little difference)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt; Peter Ludemann wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; [snip]</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt; &gt; YES ... so, can we all agree that data model issues are not</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt; &gt; part of this discussion?</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; No. We have no interoperability without a data model.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; I agree that we need a data model. I don't see why it should</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; affect the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; discussion of the export protocol. The only requirements </FONT>
<BR><FONT SIZE=2>&gt; on the export</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; protocol are that it exhibit the desired reliability and</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; efficiency; and</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; that it be able to transport all the data types required by</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; the data models.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; If we can agree on all the data types, then we can define the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; protocol; this</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; does not require defining the entire data model.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; [After all, SNMP is defined independently of the various </FONT>
<BR><FONT SIZE=2>&gt; MIBs - which</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; correspond to the data model]</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; No. Generalized data movers are not the problem.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Defining a protocol that is well defined enough so</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; that many device vendors can export data and many</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; application vendors can process the data regardless</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; of the device is problematic if all you define is a</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; general purpose data mover.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; But deciding on an adequate &quot;generalized data mover&quot; is the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; point of this</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; evaluation process, I thought. I expect that there will be</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; multiple data</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; models, for the various kinds of generalized devices. (e.g.,</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; for our probe,</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; we've defined three generic groupings of data: volume</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; metrics; QoS metrics;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; usage metrics and attributes -- similarly, SNMP's </FONT>
<BR><FONT SIZE=2>&gt; enterprise MIBs and</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; RADIUS's vendor-specific attributes).</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; There is one place where the nature of the data might</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; intersect with the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; protocol -- the high-volume metrics such as exported by</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; NetFlow; and where</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; the claim is that a reliable protocol is an unnecessary</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; overhead. So, let me</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; discuss this a bit more.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; The argument is that with high volume export it is </FONT>
<BR><FONT SIZE=2>&gt; preferable to do</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; multi-cast UDP with sequence numbers; data loss can be</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; detected by noting</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; which sequence numbers are missing ... and reliability can be</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; increased by</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; having multiple receivers and de-duplicating what they receive.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; For such a situation, the reliable protocol's</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; *implementation* would not</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; keep a queue of data to retransmit on fail-over; it would</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; only keep enough</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; buffer to deal with TCP's or SCTP's flow control and to</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; handle bursts of</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; records. ACKs would be used only to notice when data are not</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; received at the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; other end and to cause fail-over. TCP &quot;write would </FONT>
<BR><FONT SIZE=2>&gt; block&quot; also causes</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; fail-over.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; I would argue that the cost of exporting this way is very</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; similar to that of</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; the UDP broadcast. And on the receiving end, it is *much*</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; easier to handle</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; than a UDP-broadcast, which also needs stronger hardware</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; because of the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; higher de-duplication load.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Can be about the same for both:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - data copying (if scatter/gather is used)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - protocol overhead (sequence number, template ID, etc.)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; The possible extra cost of the &quot;reliable&quot; export version is:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - timer for noticing when ACK isn't received [trivial cost]</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - TCP vs UDP (little difference with modern implementations)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - TCP retransmit with packet loss (typically very low)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - cost of fail-over when no ACK received or write would block</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; The savings and benefits of the &quot;reliable&quot; version are:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - fewer packet writes (broadcast requires 2x as many packets;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;&nbsp;&nbsp; and TCP can pack more efficiently because records can</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;&nbsp;&nbsp; span packets)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - lower network traffic (which adds to reliability)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - smaller machines for receiving</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - more accurate estimate of loss due to lack of reliability</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - can handle congestion</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; [As an aside, even with the UDP-broadcast version, the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; exporter ought to</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; compute totals for the various metrics and output those from</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; time to time,</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; to provide a more accurate understanding of data loss.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Perhaps such totals</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; are already available in the MIBs, but there remains the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; issue of how to</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; correlate with the sequence numbers of the exported data.]</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; - peter</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; --</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say &quot;help&quot;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26EF7.BDFAF10F--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 15:22:38 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA27492
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 15:22:37 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17yzkV-0000gd-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 14:10:31 -0500
Received: from palrel10.hp.com ([156.153.255.245])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17yzkT-0000gR-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 14:10:29 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 11B4AC008A7; Tue,  8 Oct 2002 12:10:29 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id MAA07523;
	Tue, 8 Oct 2002 12:10:23 -0700 (PDT)
Received: from cup.hp.com ([15.244.165.172]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021008194155.HIPA18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 8 Oct 2002 12:41:55 -0700
Message-ID: <3DA32DA0.2060409@cup.hp.com>
Date: Tue, 08 Oct 2002 12:10:24 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Performance (was: Discussion of Candidate Protocols)
References: <AMEKJFAIEIKCBNABBMPNEELHDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter,

   Thanks for the clarification.

-- Jeff Meyer


Peter Ludemann wrote:

>Jeff Meyer wrote Tuesday, October 08, 2002 10:33 AM:
>
>  
>
>>   The comment about XDR requiring byte swapping is FUD.
>>    
>>
>
>Comparing me with Microsoft Marketing ... I'm flattered. :-)
>
>  
>
>>   As far as I can tell, all the candidate protocols
>>use Network Byte order.  So depending on your system
>>architecture you'll need to byte swap for all of them.
>>Nothing unique about XDR.
>>    
>>
>
>Not true for CRANE, which uses network byte order only for the template
>negotiation and for the message headers. For the actual data, it uses
>whatever the exporting device wants.
>
>  
>
>>   If you don't want to do byte swapping try CORBA,
>>however if you have two machines w/ different
>>(big-endian, little-endian) architectures talking,
>>I'm hard pressed to see how one side doesn't have
>>to byte swap.
>>    
>>
>
>For CRANE, the *receiver* does the byte swapping, if needed. But the
>assumption is that the receiver has more CPU and is not as real-time
>constrained. Of course, if you want to do everything in network byte order,
>CRANE allows that too (just specify big-endian for the data transmission).
>
>- peter
>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 16:05:49 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA28972
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 16:05:48 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17z0Tn-0001xK-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 14:57:19 -0500
Received: from palrel13.hp.com ([156.153.255.238])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17z0Tl-0001xD-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 08 Oct 2002 14:57:17 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel13.hp.com (Postfix) with ESMTP
	id A4E84400547; Tue,  8 Oct 2002 12:57:16 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id MAA09726;
	Tue, 8 Oct 2002 12:57:11 -0700 (PDT)
Received: from cup.hp.com ([15.244.162.101]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021008202843.HIRL18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 8 Oct 2002 13:28:43 -0700
Message-ID: <3DA33896.9070300@cup.hp.com>
Date: Tue, 08 Oct 2002 12:57:10 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <6D745637A7E0F94DA070743C55CDA9BA075831@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

David,

  Quite a lot of info and questions in your e-mail.

  Regarding your evaluation of IPDR.  If you evaluated this a year ago,
then you wouldn't have seen the additional work for the compact IPDR
format in addition to XML. Since the IPDR advocacy draft is focused
just on Compact IPDR, you might want to read the latest spec (NDM-U
3.1)

  Regarding SNMP and MIBs.  It sounds like we are in violent agreement
that a MIB could be written to address the delivery of IPFIX data via 
SNMP, using
either informs or by defining some indexing scheme to allow individual
flow records to be pulled via get, getnext or getbulk; it's just that it 
wouldn't
produce very satisfactory results.

  My advocacy for IPDR's XML-Schema based approach to data modelling
is based on the following two shortcomings I see with MIBs as they stand
today for accounting information like IPFIX:

   1.  SMI's definition language is based on a subset of ASN.1, although 
this
     has stood in good stead these years, I would submit that the 
toolset available
     for processing XML documents is larger and will continue to outpace
     ASN.1.     In the SMIng draft, the issues on p. 52 state:
       

   Learn from ODL, XML, ODBMS -  Look at the ODL proposal from TINAC.
      Look at the XML schema work from W3C.  Look at the ODBMS work.


 2. SMIv1 and v2 all require each use of an identifier to
   have an OID bound to it.  In section 3.3 of the SMIng 
   draft they explicitly state that OIDs should not be used
   for any bindings other than SNMP or COPS.


 So I believe that the IPDR XML-Schema subset defined today
will address the needs of IPFIX.  I believe the proposed 
protocol using this data model will efficiently address the
transfer and other requirements.

  I also believe that this approach (with some extensions
using the XML-Schema "annotation" mechanism), could better
address the problem space defined by SMIng, than the
current draft.  But that's another topic...

  Some additional comments inline.


Regards,

  Jeff Meyer

Harrington, David wrote:

> Hi,
>
> Let me be clear that I am advocating no particular solution. I am 
> trying to cut through any hype and understand the technical pros and 
> cons of each approach.
>
> Am I biased? You decide. I don't believe so, and want to dispel any 
> bias assumptions.
> I am a network management technology analyst for the CTO of Enterasys 
> (which used to be Cabletron).
>
> 1) I analyzed LFAP in 1999(?) for its potential as an industry 
> standard and found it lacking. Paul has since addressed most of the 
> points I raised, and we've had many discussions about its pros and 
> cons. It has both.
>
> 2) I was a member of the IPDR and reviewed their early specs. I did 
> not find it compelling. Its development in a fee-based members-only 
> forum limited the industry's ability to review it as it developed. 
> There were obviously many talented individuals involved, but some 
> companies had a larger influence in its design, which makes me believe 
> it may not be very vendor-neutral. It included a number of people from 
> telco companies, where usage accounting and billing has a long 
> history. I pushed for a while to have them submit it to the IETF, but 
> they resisted. As a long-time IETFer, I didn't see much justification 
> for not working within an open standards organization like the IETF.
>
> 3) I have some serious reservations about Netflow's technical design, 
> especially after talking candidly with many Cisco developers at IETF 
> meetings. Nonetheless, I promoted the replacement of LFAP with Netflow 
> in Enterasys devices because of Netflow's wide-spread deployment and 
> third-party application support. We did not want to be in the LFAP 
> accounting application business. Cisco is our primary competitor, and 
> I would like to see them not control the flow accounting standard. I 
> believe Netflow has both pros and cons technically.
>
> 4) Xacct sought out Enterasys as a potential partner in 2000(?). I did 
> the technology analysis on CRANE for the due diligence. My largest 
> concern was the proprietary nature of the protocol. Just like IPDR, it 
> was developed in a members-only agreement and was denied the 
> opportunity for wide-spread industry review. This was done to capture 
> the intellectaul property rights before making it public. Another 
> major concern was the push for standardizing "buckets for transporting 
> proprietary data in"; I don't believe that transporting a lot of 
> proprietary data models really helps standardization and 
> interoperability. CRANE has pros and cons.
>
> 5) I co-authored RFC2975 "Introduction to Internet Accounting" which 
> discusses many of the requirements identified here.
>
> 6) As the co-chair of SNMPv3 WG, I am glad nobody proposed SNMP as an 
> IPFIX candidate because it would likely not be very satisfactory for 
> flow accounting purposes. SNMP has pros and cons, but I don't think 
> SNMP (as currently defined) is well suited to this particular task.
>
> I am not advocating any particular solution, and I believe all the 
> proposals offer some benefits for the stated purpose.
>
> That being said, I have chosen to reply to Jeff's mail because it uses 
> SNMP for comparison and I fail to fully understand the point being made.
>
> Comments inline.
>
> dbh
>
> > -----Original Message-----
> > From: Jeff Meyer [mailto:jeffm@cup.hp.com]
> > Sent: Friday, October 04, 2002 12:58 PM
> > To: Sebastian Zander
> > Cc: Peter Ludemann; ipfix-eval@net.doit.wisc.edu
> > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
> >
> >
> > Hi,
> >
> >    There seems to be some confusion over the separation
> > between a formal, machine readable description of
> > the data model (as IPDR defines), and the requirements put
> > on an implementation (especially in an IPFIX Middlebox).
> >
> >    Presumably folks are familiar with SNMP and the
> > separation between what a MIB defines and how the
> > protocol operates.
> >
> >    Basically IPDR's use of XML schema is producing a
> > MIB for sets of accounting information.
> >
>
> So IPDR provides a formal machine readable description of a data model 
> just as SNMP does. The difference is IPDR uses an XML schema and MIBs 
> use SMI schemas.
>
> OK.
>
> >
> >    Why not use MIB's?  Well, SNMP is really geared towards
> > providing views/access into a current system state. Historical
> > information tends to be global or other coarse grain
> > counters.  Fine grain counters in SNMP are hindered by
> > SNMP's OID indexing model (i.e. you end up with something
> > like RMON, a clever use of SNMP, but not much fun to
> > code to).
>
> You make these assertions about SNMP, without any supporting analysis. 
> You seem to do this as the setup for a comparison with IPDR's XML 
> schema, but you don't follow through.
>
> When you say SNMP is geared towards providing views/access into a 
> current system state, are you talking about the SNMP protocol being 
> geared to this, or is it just that currently existing SNMP mibs seem 
> geared to this task?
>
> You talk about historical information being global or coarse-grain 
> counters. Again, are you talking about the SNMP protocol constraining 
> this, or is this an artifact of the mibs that have been defined? How 
> does XML do this differently? If we can model this in XML, couldn't we 
> also model this in a mib? (Does this mean you're advocating SNMP as a 
> viable solution? ;-)
>

We could define a MIB yes, see the two shortcomings I've outlined in the 
introduction.

> I am missing the point about how OIDs hinder fine-grained counters. An 
> OID is used to name an object such as a counter. I don't think the 
> naming has a significant effect on how fine-grained the counter is. 
> Are you asserting that somehow XML-naming better supports fine-grained 
> counters?
>

If you want to define the information produced by IPFIX in a MIB, then I 
would
expect it to be in the form of a table definition, since a given 
category of IPFIX
"records" will all have the same field information.

In defining a table in SNMP, you need to address SNMPs requirement about
being able to lexicographically order each information item.  So the 
indexing
scheme would need srcip,dstip,srcport,dstport and time at least to make a
unique index.

In the XML model you define the record information (using the complexType
declaration) and there is no requirement around defining an indexing scheme.

So I not saying it couldn't be done, just that it introduces information 
which
is not (in my opinion) useful for the IPFIX requirements.

> Can you explain further?
> >
> >    IP Flow information is just a specifically defined
> > set of metrics which are being collected based on
> > certain observed network traffic.  
>
> SNMP mibs typically are also a specifically defined set of metrics 
> which are being collected based on certain observed network traffic, 
> such as bytes in/out or the RMON flow statistics, or other events. So 
> IP Flow information is just a specifically defined set of metrics, 
> like a MIB. Are you advocating we solve the problem by writing a mib 
> module for IP Flows?
>

No, see above.

> > It just so happens
> > that this can produce a huge amount of info, which
> > often cannot be stored on the device itself for any
> > period of time.  For this reason, using SNMP for gathering
> > flow info is probably a bad idea, and I'm glad to
> > see no one signed up as the SNMPv3 advocate ;-)
>
> Off-loading large amounts of information quickly could be done using 
> SNMP Informs. I certainly agree that using SNMP to gather flow info is 
> probably a bad idea if you mean gathering it up and waiting for 
> applications to poll for it. I would have concerns about the 
> efficiency of SNMP Informs compared to a protocol designed to handle 
> off-loading large quantities of flow information quickly. See RFC2975.
>
> As you pointed out, SNMP makes a clear separation between the data 
> modeling and the transport mechanism. I wouldn't recommend SNMPv3 for 
> IPFIX primarily because of the transport constraints associated with 
> 484 byte messages over UDP, lack of support for streaming data, and 
> repetitive OID attribute identifiers, not because of the data modeling 
> capabilities.
>
> I don't see that an XML data model addresses those problems.
>

See above.

>
> >
> >
> >    But the essential concept of MIBs, which SMIng is also
> > looking at revising is important.
>
> I disagree that SMIng is looking at revising the essential concept of 
> MIBs. They are looking at revising the SMI to improve ease-of-use and 
> add object-orientation. The essential concept of MIBs as "data models 
> that are extensible without protocol changes" remains the same.
>

One key revision is the restriction of OID usage to SNMP and COPS. 
 IPFIX does
not need OIDs.

> > The extensibility
> > model which MIBs provided for SNMP is what has led
> > to its large scale adoption for many problem domains.
>
> Agreed. An extensible data model has been important to SNMP's large 
> scale adoption, and I believe an extensible data model should be 
> supported by IPFIX. Keep in mind however, that there  are trade-offs. 
> An extensible data model adds overhead and complexity, which may 
> reduce the efficiency of an extensible IPFIX.
>
> A vendor-extensible data modeling language also leads to many vendor 
> extensions which greatly reduces standardization and the ability to 
> aggregate/compare/contrast information from multiple vendors. This has 
> been a major factor in SNMP applications all offering similar limited 
> sets of functionality, and the large number of applications that are 
> little more than mib browsers - device vendors do not provide solid 
> support for fully-compliant industry standard mib implementations, but 
> rather offer lots of proprietary mib data using a standardized 
> modeling language and a standardized transport mechanism.
>
> The more data elements that can be named, the longer the names need to 
> be to differentiate them. OIDs work well in SNMP to provide a data 
> naming space that can be extended as needed without naming conflicts. 
> Integers work well in LFAP to name a limited set of data elements.
>
> XML is extensible, and will suffer the tradeoffs of long names and 
> lots of proprietary extensions just like SNMP.
>

Indeed, good points, but there are also plenty of very useful "RFC 
standard MIBs", these
do not suffer this problem.

Likewise the IPDR schema definition for IPFIX requirements should be 
standardized.

> >
> >    It just so happens that the profile of flow exporting
> > is not appropriate for the SNMP domain.
>
> Here you lose me. What is the "profile" you refer to that makes flow 
> exporting inappropriate for the SNMP domain? How does IPDR deal with 
> those same profile characteristics differently than SNMP and the other 
> IPFIX proposals?
>

By "profile" I mean the volume of information.

> >
> >
> >    However, the statement that IP flow is somehow unique
> > in its data requirements and as such a more generalized
> > "data mover" is somehow problematic, is just plain wrong.
>
> If your argument is that IP flow is just another data model and that a 
> generalized "data mover" is acceptable, then are you advocating we 
> model IP flow in a MIB and move the data using SNMP?
>

No, but something like SNMP which addresses the requirements of IPFIX.

> If your argument is that IP flow is just another data model and that a 
> generalized "data mover" is acceptable as long as it meets performance 
> requirements, then would a MIB transported over another protocol be 
> acceptable? or would a mib transported over an SNMP that supported 
> TCP, larger messages, and OID suppression/compression be acceptable? 
> If so, you might want to check on some of the work being done by the 
> EOS WG.
>
> >
> >    As a mediation product vendor I see lots of devices
> > with lots of vendor specific protocols.  And there
> > are several which have the same protocol requirements
> > as IPFIX.  Just different data models.
> >
> >    Consider a middlebox which looks not only at flows,
> > but also at protocols above layer 4.  Would it not
> > make sense for the additional information produced
> > by this to use the same basic protocol as IPFIX?
>
> So you're arguing that if IPFIX already solves the protocol problems 
> associated with fast-offloading of bulk data, it should be reused for 
> transporting any type of data?
>
> Let me make sure I follow your logic:
> You're arguing that we should keep the data model and protocol separate.
> You're arguing that we should reuse rather than develop more 
> task-specific protocols.
>
> Then shouldn't you also be advocating using existing mechanisms for 
> data modeling of formal, machine readable descriptions of the data 
> model, such as the SMI rather than XML?
>

You've got all the arguments above, but the conclusion is different
based on my statement above.

> >
> >    IPFIX does identify extensibility as a requirement,
> > is there some bounded set of extensions which are
> > envisioned?
> >
>
> One of the real strengths of SNMP's MIB approach is the allocation of 
> a partitioned namespace, because industry standard data models were 
> developed, and because the enterprise-specific namespace encouraged 
> vendors to use SNMP.
>
> One of the real strengths of SNMP's MIB approach is the specification 
> of a common data modeling language, with very limited syntax options, 
> that allows machine-parsing of any mib and display of any mib information.
>
> One of the real weaknesses of SNMP's MIB approach is the allocation of 
> an enterprise-specific namespace, because vendors used it to develop 
> proprietary data models which hindered interoperability across vendors.
>
> I think it is very important to understand the tradeoffs involved in 
> deciding how extensible something should be.
>
> >    If not, then a trivial numeric id scheme is a pretty
> > lousy namespace to work from.  Diameter's vendorId/
> > avaCode model is not much better, but at least has
> > some partitioning.
>
> SNMP's OID hierarchy has been found to be a good namespace to work 
> from for its extensibility aspects and partitioning, and it has lots 
> of room for extension. Are you advocating SNMP again? tsk, tsk. ;-)
>
> >
> >
> >    The only possible unique aspect I could picture is
> > based on observing NFv2,5,7.  In all of these versions,
> > all data items were fixed width (typically 32-bit
> > integers).  So...  If IPFIX wants to say that only
> > fixed with data values may be sent via the IPFIX
> > protocol, then I'd say, maybe you could optimize
> > beyond IPDR for that.
> >
> >
> >    A minimal implementation of IPDR on a middlebox
> > would NOT need to have any XML knowledge whatsoever.
> > As a producer, the system could merely hardcode the
> > information model produced (or make it configurable).
> >
> >    The encoding itself follows XDR format, which has
> > worked alright for NFS and RPC, and is the precursor
> > to the encoding for DCE and CORBA encoding.  It is
> > a very simple model.  Read RFC 1832.  An implementation
> > for what IPDR requires is pretty trivial.  IPDR
> > members have access to opensource for this in
> > both Java and C.  And as Stas pointed out in an
> > earlier memo there are > 10 implementations out
> > there.
> >
> >    The other benefits from IPDR which I cited, such
> > as XML mapping, DB, binary file format, etc. are
> > just that, additional benefits.  They ARE NOT
> > REQUIRED to be implemented.
> >
> >
> > Regards,
> >
> >    Jeff Meyer
> >
> >
> >
> >
> > Sebastian Zander wrote:
> >
> > > Jeff Meyer wrote:
> > >
> > > [...]
> > >
> > >>
> > >>   So you have one description language, based on
> > >> XML Schema, a wire protocol, a binary format,
> > >> an XML format and a DB mapper, in a single document.
> > >>
> > >>
> > >>   Show me how that is done w/ the  other proposed
> > >> drafts?
> > >
> > >
> > > Jeff,
> > >
> > >
> > > its very nice to have these things but I don't think its
> > > a good idea to have them in one document. IMHO the main
> > > focus here is on the protocol. Working on all the things
> > > at once will only slow down the standardization process.
> > > I am also wondering if the IETF would ever standardize
> > > things like binary formats. Probably not.
> > >
> > > Furthermore I am not convinced that it is a good idea to
> > > standardize things like DB mapper or binary formats. E.g.
> > > there exist a number of different formats and some people
> > > may want to continue using them. But informational RFCs
> > > could cover all these things.
> > >
> > > To summarize my point: the evaluation should focus on the
> > > protocol and its capabilities and not on things storage
> > > formats etc.
> > >
> > > BTW Diameter has a proposed XML definition as well
> > > (draft-frascone-aaa-xml-dictionary-00.html). Another proposal
> > > was to use SMIng (draft-schoenw-sming-dia-00.txt).
> > >
> > > Cheers,
> > >
> > > Sebastian
> > >
> > >
> >
> >
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 18:47:22 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA02712
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 18:47:22 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17z2zh-0006Z5-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 17:38:25 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17z2zf-0006YP-00
	for ipfix-req@net.doit.wisc.edu; Tue, 08 Oct 2002 17:38:23 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g98MboR08087;
	Tue, 8 Oct 2002 15:37:51 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g98Mc2e14384;
	Tue, 8 Oct 2002 17:38:02 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7QVQT>; Tue, 8 Oct 2002 15:37:47 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C042EE871@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Benoit Claise <bclaise@cisco.com>
Cc: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: RE: [ipfix-req] Requirements draft issues - Reinaldo 2
Date: Tue, 8 Oct 2002 15:37:47 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26F1B.5360B6C4"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26F1B.5360B6C4
Content-Type: text/plain;
	charset="iso-8859-1"

sorry for the late response...some of these issues were already discussed on
recent threads.

Anyway, my qyestion still holds. Although the architecture draft is frozen,
should we port the requirementes found there to the requirements draft, e.g,
failover capabilities?

regards,

Reinaldo

> -----Original Message-----
> From: Benoit Claise [mailto:bclaise@cisco.com]
> Sent: Tuesday, October 01, 2002 4:07 AM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: Juergen Quittek; ipfix-req@net.doit.wisc.edu
> Subject: Re: [ipfix-req] Requirements draft issues - Reinaldo 2
> 
> 
> Reinaldo,
> 
> > Issue Number : Reinaldo 2
> >
> > Issue:
> >
> > In the beggining of section 5.1 it is stated that
> >
> > "This is based on the requirements specified in the requirement
> >    document [2]."
> >
> You are referring to
> http://www.ietf.org/internet-drafts/draft-ietf-ipfix-architect
ure-02.txt
But the architecture draft work is on hold until we have consensus on 
the requirement draft and selected the candidate protocol.

Regards, Benoit.

> But I couldn't find a peer of some of the requirements from 
> architecture draft on the requirements draft. Will these be included 
> on the requirements draft? Excluded from the architecture? For example....
>
> 5.1.2. IPFIX Protocol on IPFIX Device (At Export Process)
>
>      1. Ability to detect loss of connectivity with the collector and
>         trigger the appropriate action (eg. a switch over to an
>         alternate collector.) <---
>      2. Optionally export flow records to multiple collectors.
>      3. Optionally re-transmit lost flow records. <---
>      4. Exchange control information from the collector, monitor export
>         process and detect any overload in the process of exporting. 
> <--- P
>
>
> Proposed Solution:
>
> I would suggest to just take out the requirement section from the 
> architecture draft and incorporate the relevant parts into the 
> requirements draft to avoid confusion and repetition. If people do not 
> agree it would be good if the editors of both documents would put them 
> side by side and compare the wording.
>




------_=_NextPart_001_01C26F1B.5360B6C4
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] Requirements draft issues - Reinaldo 2</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>sorry for the late response...some of these issues =
were already discussed on recent threads.</FONT>
</P>

<P><FONT SIZE=3D2>Anyway, my qyestion still holds. Although the =
architecture draft is frozen, should we port the requirementes found =
there to the requirements draft, e.g, failover capabilities?</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Benoit Claise [<A =
HREF=3D"mailto:bclaise@cisco.com">mailto:bclaise@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, October 01, 2002 4:07 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Juergen Quittek; =
ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] Requirements draft =
issues - Reinaldo 2</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Issue Number : Reinaldo 2</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Issue:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; In the beggining of section 5.1 it is =
stated that</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;This is based on the requirements =
specified in the requirement</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; document =
[2].&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; You are referring to</FONT>
<BR><FONT SIZE=3D2>&gt; <A =
HREF=3D"http://www.ietf.org/internet-drafts/draft-ietf-ipfix-architect" =
TARGET=3D"_blank">http://www.ietf.org/internet-drafts/draft-ietf-ipfix-a=
rchitect</A></FONT>
<BR><FONT SIZE=3D2>ure-02.txt</FONT>
<BR><FONT SIZE=3D2>But the architecture draft work is on hold until we =
have consensus on </FONT>
<BR><FONT SIZE=3D2>the requirement draft and selected the candidate =
protocol.</FONT>
</P>

<P><FONT SIZE=3D2>Regards, Benoit.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; But I couldn't find a peer of some of the =
requirements from </FONT>
<BR><FONT SIZE=3D2>&gt; architecture draft on the requirements draft. =
Will these be included </FONT>
<BR><FONT SIZE=3D2>&gt; on the requirements draft? Excluded from the =
architecture? For example....</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; 5.1.2. IPFIX Protocol on IPFIX Device (At =
Export Process)</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1. Ability to =
detect loss of connectivity with the collector and</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
trigger the appropriate action (eg. a switch over to an</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
alternate collector.) &lt;---</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2. Optionally =
export flow records to multiple collectors.</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3. Optionally =
re-transmit lost flow records. &lt;---</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4. Exchange =
control information from the collector, monitor export</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
process and detect any overload in the process of exporting. </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;--- P</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; Proposed Solution:</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; I would suggest to just take out the =
requirement section from the </FONT>
<BR><FONT SIZE=3D2>&gt; architecture draft and incorporate the relevant =
parts into the </FONT>
<BR><FONT SIZE=3D2>&gt; requirements draft to avoid confusion and =
repetition. If people do not </FONT>
<BR><FONT SIZE=3D2>&gt; agree it would be good if the editors of both =
documents would put them </FONT>
<BR><FONT SIZE=3D2>&gt; side by side and compare the wording.</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
</P>
<BR>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C26F1B.5360B6C4--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct  8 18:51:41 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA02789
	for <ipfix-archive@lists.ietf.org>; Tue, 8 Oct 2002 18:51:41 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17z36U-0006kh-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 08 Oct 2002 17:45:26 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17z36T-0006jK-00
	for ipfix-req@net.doit.wisc.edu; Tue, 08 Oct 2002 17:45:25 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g98MirR08627
	for <ipfix-req@net.doit.wisc.edu>; Tue, 8 Oct 2002 15:44:53 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7QVS9>; Tue, 8 Oct 2002 15:44:52 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C042EE87E@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] Requirements draft issues - Reinaldo 4 - ICMP Codes/sub-codes
Date: Tue, 8 Oct 2002 15:44:53 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26F1C.513F3C02"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26F1C.513F3C02
Content-Type: text/plain;
	charset="iso-8859-1"

Issue Number : Reinaldo 4 

Issue: 

In the requirements draft it says the IP protocol type must be exported, but
there is no mention of ICMP codes/sub codes. I think there is no need to
stress that this information is critical to security/intrusion detection
even traffic profiling.

Proposed Solution: 

Include ICMP codes/sub-codes as MUST for security applications and SHOULD in
general. 

regards,

Reinaldo


------_=_NextPart_001_01C26F1C.513F3C02
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE> Requirements draft issues - Reinaldo 4 - ICMP =
Codes/sub-codes</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Issue Number : Reinaldo 4 </FONT>
</P>

<P><FONT SIZE=3D2>Issue: </FONT>
</P>

<P><FONT SIZE=3D2>In the requirements draft it says the IP protocol =
type must be exported, but there is no mention of ICMP codes/sub codes. =
I think there is no need to stress that this information is critical to =
security/intrusion detection even traffic profiling.</FONT></P>

<P><FONT SIZE=3D2>Proposed Solution: </FONT>
</P>

<P><FONT SIZE=3D2>Include ICMP codes/sub-codes as MUST for security =
applications and SHOULD in general. </FONT>
</P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26F1C.513F3C02--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 02:29:12 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA04995
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 02:29:11 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zACV-00043h-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 01:20:07 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17zACU-00043a-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 01:20:06 -0500
Received: (qmail 17377 invoked from network); 9 Oct 2002 06:19:57 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 9 Oct 2002 06:19:57 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g996NDs27447
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 8 Oct 2002 23:23:14 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;  broadcast vs reliable
Date: Tue, 8 Oct 2002 23:20:03 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNEEMHDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <3DA2EE6C.EBE67BCD@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote Tuesday, October 08, 2002 7:41 AM

> Peter Ludemann wrote:
[snip]
> > I agree that we need a data model. I don't see why it should affect the
> > discussion of the export protocol. The only requirements on the export
> > protocol are that it exhibit the desired reliability and efficiency;
> > and that it be able to transport all the data types required by the
> > data models. If we can agree on all the data types, then we can
> > define the protocol; this does not require defining the entire data
model.
>
> 	If I don't have a data model, how do I evaluate wether or not
> 	message ordering is a problem? If I don't have a data model how
> 	do I know I need a message for start of flow and end of flow versus
> 	one message that says here is a flow? If I don't have a data model
> 	how do I know I need a message to synchronize timestamps? If I don't
> 	have a data model, how do I know I can optimize by not encrypting
>      messages that only contain usage data (e.g. number of bytes,
>      packets, etc...)
>
> 	We're not specifying the Bulk Data Export Protocol, we are are
>      specifying a highly optimized IP Flow Information eXport protocol.
>      The data model drives requirements to the protocol, not the other
>      way around.

[snip]

Maybe we're just arguing over terminology, but I'm not sure.

In the database world, the term "data model" usually means:
  - the table fields' meanings (semantics + type + attributes
    such as "not null")
  - constraints amongst records within a table (uniqueness)
  - the relationships amongst tables (foreign keys for joins)

Maybe I missed something in all the emails, but I thought that
the export data was to be one record per "flow". There can be
relationships between flows (e.g., parent/child, such as when
dealing with multi-layer protocols like H.323). These have an
obvious representation in a database. The other obvious
representation is the master/detail style, with a master record
containing summaries and a set of details which reference the
master's unique id.

Suppose we're dealing with a long-running flow, whose output
is split into a number of slices. Then the obvious record
format is something like this:
    flow_id, start_time, end_time, metric1, metric2, ...
and to aggregate all the information for one flow:
    select flow_id,
           min(start_time),
           max(end_time),
           sum(metric1),
           ...
    from data_table
    where flow_id = ...
    group by flow_id
A similar query will get me the master/detail summaries.
I can tell whether a flow is finished or not by the presence
or absence of end_time.

So, I don't understand the problem with beginning and end
of flow that you describe ... each individual record just
contains a slice and the determination of how to process
the record is done downstream [of course, it doesn't have
to be in a database; it could be in a stream processor].
We do this kind of stuff all the time when we deploy our
systems and we haven't seen the need for anything fancier
than fairly straightforward individual records. Often there's
a need to do downstream interpretation of fields (e.g.,
map an IP address to a customer based on information from
a RADIUS server); but it's stuff that a database designer
would consider pretty simple (the volumes of data and the
real-time requirements are what make life interesting).

How does "message to synchronize timestamps" fit into the
data model? The timestamp fields are just values, whose
definition is determined by an agreement between the
exporter and the collector (is it local time or UTC?
accuracy? synchronized with other data sources? etc.)

Encryption ... that should be specified by the templates
or field definitions during the data definition - just
specify whether particular records or fields within
records ought to be encrypted.

So, to me any flow export data model will consist of
individual records, whose fields are all of a set of
pre-defined data types. That is, the export protocol
implies a schema for defining individual data models.
The data model allows multiple record types (templates),
which are multiplexed onto the output and distinguished
by one or more fields in the records (for downstream
processing, you might put the different record types
into different tables).

But I wonder whether I'm missing your point, so please tell
me where my response doesn't answer your questions.

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 04:50:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA07495
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 04:50:15 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zCIV-0001E1-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 03:34:27 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zCIS-0001Bo-00; Wed, 09 Oct 2002 03:34:24 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g998XZ726578;
	Wed, 9 Oct 2002 10:33:39 +0200 (CEST)
Message-ID: <3DA3E9DE.3020609@cisco.com>
Date: Wed, 09 Oct 2002 10:33:34 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Simon Leinen <simon@limmat.switch.ch>,
        Reinaldo Penno
 <rpenno@nortelnetworks.com>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was:  Re:IPFIXRequireme
 nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch> <3DA198C6.CC26BCCD@riverstonenet.com> <3DA1A710.9080308@cisco.com> <3DA1AD55.8573BDE0@riverstonenet.com> <3DA2B251.2060700@cisco.com> <3DA2E3B7.7779228@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote:

>>>      Again, I think it is difficult to describe how to measure loss
>>>      without a protocol definition to analyze.
>>>
>>>      
>>>
>>Agreed. So maybe we should maybe postpone the discussion...
>>
>>    
>>
>
>	Lets do that. 
>
>	However, I think this discussion shows the req section should be a 
>	little more general to leave open implementation details. Here is 
>	my proposal..
>
>	
> 	If flow information is lost, a means to gauge the amount of
>	loss MUST be available from the Exporter, Collector or both. 
>	Possible reasons for flow data loss include loss of packets on 
>	the network path, resource shortage at the exporter, Collector
>	crash, etc...
>
>	Paul
>
I would prefer Simon's proposal.

 "If some flow information data cannot be delivered to the collector
  in a timely manner, the collector MUST be able to estimate the
  amount of data missing.  Possible reasons for failure to deliver
  data include loss of packets on the network path, or resource
  shortage at the exporter."

Unless you want to say:
 	If flow information is lost, a means to gauge the amount of
	loss MUST be available from the Exporter _or the_ Collector or both. 
	Possible reasons for flow data loss include loss of packets on 
	the network path, resource shortage at the exporter, Collector
	crash, etc...

Regards, Benoit.



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 08:04:12 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA11842
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 08:04:12 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zFRI-0002tA-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 06:55:44 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zFRG-0002sR-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 06:55:43 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g99Bsp722691;
	Wed, 9 Oct 2002 13:54:51 +0200 (CEST)
Message-ID: <3DA4190B.30504@cisco.com>
Date: Wed, 09 Oct 2002 13:54:51 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: carter@qosient.com
CC: "'Michael MacFaden'" <mrm@riverstonenet.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi Carter and all,

>Hey Mike,
>   Thanks, but I want to note that netflow cannot support
>much in the way of extensions, so simply describing existing
>practice and defining a standard to support those observations
>is not going to do the job for my customers.
>
I'm not sure I understand the statement above.

First of all, from the charter:

    "The reported flow information will include both (1) those
    attributes derived from the IP packet headers such as source and
    destination address, protocol, and port number and (2) those
    attributes often known only to the exporter such as ingress and
    egress ports, IP (sub)net mask,
    autonomous system numbers and perhaps sub-IP-layer information. "

Netflow (obviously) contains all this data types, and much more are in 
the pipe. I don't think we are lacking many data types regarding _flow 
record._
So yes, we are compliant with the requirements. BTW, I agree with Paul 
that we maybe don't want to standardize the "generalized data movers" 
protocol.
Note: Looking at the latest emails on the mailing list, I sometimes feel 
that we are trying to solve just too many problems at the same time and 
that prevents us from going forward! Example: fail-over, data 
synchronization at the collectors, load balancing, extensibility of 
everything you can think of, etc... I think we should focus on the 
charter and on the requirement draft. Or at  least work step by step: 
some work items could be done in a phase 2.

Second of all, it seems that netflow is seen on this mailing list as 
being non extensible. This is not correct!
Netflow version 9 has specifically been designed to be extensible.
You gave the example of the jitter. Well if you have this information on 
the exporter, nothing prevents the netflow v9 protocol to send this 
information to the collector.
Netflow version 9 can be used: non only to send flow records information 
but also information about the metering process (ex: number of flows 
exported/non exported). From there, again, we can export basically 
anything... even a MIB variable. Just define a new data type and you can 
use in the template.
An example? you would like to send the CPU utilization with every single 
flow records, this is possible ... in theory... I wrote "an example", 
not "a good example" :)

Regards, Benoit.

>
>   In writing this response I found myself criticizing LFAP
>quite a bit, and I didn't really want to do that, but I'm going to
>leave some of my issues in hopes that it will help the process.
>I hope that some do find it useful, and I welcome any comment.
>
>   One question.  None of the candidates are perfect.  If we
>adopt one, what will be the process that we go through to
>'correct' any issues?  I'm sure it has been described, but
>could someone paraphrase?
>
>Thanks,
>
>Carter
>
>
>Comments on LFAP as IPFIX candidate.
>
>
>I don't see that LFAP is a solution to the flow record transport
>problems that I worry about, which is the efficient, reliable
>and secure transport of any vendors flow records, and I'm
>particularly concerned with at least one of the basic architectural
>positions that LFAP takes, the protocol complexity and
>its Information Model.
>
>The biggest issue with the architecture is timestamps.  My
>understanding reading the lfap-eval, is that timestamps 
>relate to the flow cache rather than the wire-line timestamps of
>the packet stream that is being monitored.  If true, I believe
>that this is huge problem, as it will introduce a lot of
>timestamp variance that cannot be adjusted for, rendering
>the data very limited in its usefulness.  The IPPM framework
>devotes a large amount of time and effort describing how a monitor
>should deal with timestamps of packets, and an IPFIX monitor
>should comply with the IPPM framework on this.  Anything less
>would be networking 'malpractice', if there ever could be such
>a thing.
>
>I think the protocol has too many message types.  Don't need
>a separate turn for VR/VRA, and AR/ARA you should be able to
>present the VR/CR/AR information elements in a single message and
>then get a single response.
>
>The concept that you can support the division of FAR and FUN
>messages generate great potential problems.  If I connect at some
>arbitrary point and don't receive the FAR message, how do I
>process FUN messages, which don't have flow descriptors?
>
>With regard to the Information Model,  I sense that I would
>put my entire record in a single vendor specific IE and leave it
>at that.  While a drastic statement, its not too far from the
>truth.
>
>Just to innumerate a few problems I have with LFAP's basic
>data definitions, and this is not an exhaustive set, of course.
>
>Best time granularity of 10's of milliseconds (1/100th of a sec)
>is not good, uSec minimum, nanoSec preferable.
>
>The requirement that the FAS/CCE's must be globally unique, and then
>you start adding ones to them on roll over (how do you ensure that
>the FAS is still globally unique?) is a big issue (locally unique?)
>
>The concepts of the Flow Qualifier checkpoint and priority are
>completely proprietary, they should be vendor specific OIDs?
>
>64 bit counters for packets and bytes in every record, when over
>90% of all flows have less than 256 packets and 8K of bytes in the
>entire flow?  We should have 1, 2, 4 and 8 byte counter IEs as
>needed, don't you think?
>
>The IpId field is 16 bits but the IE to report it is 64 bits long.
>Why not a 32 bit field for those special values that are 8-16 bits
>long?  Why not have a composite IE, like an IP header attribute
>IE, which could have the IpId, Tos, TTL, and option indicators all
>in a single IE?  Why not an IE for the classic 5-tuple flow?
>
>Minor points, but important points for my products.
>
>Carter
> 
>
>-----Original Message-----
>From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
>Behalf Of Michael MacFaden
>Sent: Thursday, October 03, 2002 6:10 PM
>To: ipfix-eval@net.doit.wisc.edu
>Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>
>
>On Thu, Oct 03, 2002 at 05:31:48PM -0400, Carter Bullard wrote:
>  
>
>>My existing flow record generators provide jitter and loss information 
>>in flow data records.  How do I do that with an LFAP or netflow 
>>strategy?
>>    
>>
>
>For LFAP, build your collector as one normally would and
>then just follow section 2.45 of 
>http://www.ietf.org/internet-drafts/draft-riverstone-lfap-data-01.txt
>
>My point was/is simply this. 
>We should consider the feature/complexity tradeoff 
>for each criteria considered in context of the problem 
>being solved. 
>
>My personal belief is that IPFIX does not stand for 
>GDMP (Generic Data Mover Protocol). 
>
>Regards,
>Mike MacFaden
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
>body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say "unsubscribe
>ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>
>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 08:05:08 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA11865
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 08:05:08 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zFUM-0002w9-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 06:58:54 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zFUK-0002vm-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 06:58:53 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g99Bvx725923;
	Wed, 9 Oct 2002 13:58:04 +0200 (CEST)
Message-ID: <3DA419C7.90205@cisco.com>
Date: Wed, 09 Oct 2002 13:57:59 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <6D745637A7E0F94DA070743C55CDA9BA075831@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

David,

> 3) I have some serious reservations about Netflow's technical design, 
> especially after talking candidly with many Cisco developers at IETF 
> meetings. Nonetheless, I promoted the replacement of LFAP with Netflow 
> in Enterasys devices because of Netflow's wide-spread deployment and 
> third-party application support. We did not want to be in the LFAP 
> accounting application business. Cisco is our primary competitor, and 
> I would like to see them not control the flow accounting standard. I 
> believe Netflow has both pros and cons technically.
>
Any serious reservations about NetFlow's technical design that you would 
like to share?

Regards, Benoit.





--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 08:45:12 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA13299
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 08:45:12 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zG4F-0004Tr-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 07:35:59 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zG4C-0004QM-00; Wed, 09 Oct 2002 07:35:56 -0500
Received: from riverstonenet.com ([134.141.180.97]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 9 Oct 2002 05:35:23 -0700
Message-ID: <3DA42217.7F8F4A59@riverstonenet.com>
Date: Wed, 09 Oct 2002 08:33:27 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Simon Leinen <simon@limmat.switch.ch>,
        Reinaldo Penno <rpenno@nortelnetworks.com>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was:  
 Re:IPFIXRequirement draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C0426C5F2@zsc3c032.us.nortel.com> <aavg4hb4t5.fsf@limmat.switch.ch> <3DA198C6.CC26BCCD@riverstonenet.com> <3DA1A710.9080308@cisco.com> <3DA1AD55.8573BDE0@riverstonenet.com> <3DA2B251.2060700@cisco.com> <3DA2E3B7.7779228@riverstonenet.com> <3DA3E9DE.3020609@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 09 Oct 2002 12:35:24.0103 (UTC) FILETIME=[56BD8570:01C26F90]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Benoit Claise wrote:
> 
> calato@riverstonenet.com wrote:
> 
> >>>      Again, I think it is difficult to describe how to measure loss
> >>>      without a protocol definition to analyze.
> >>>
> >>>
> >>>
> >>Agreed. So maybe we should maybe postpone the discussion...
> >>
> >>
> >>
> >
> >       Lets do that.
> >
> >       However, I think this discussion shows the req section should be a
> >       little more general to leave open implementation details. Here is
> >       my proposal..
> >
> >
> >       If flow information is lost, a means to gauge the amount of
> >       loss MUST be available from the Exporter, Collector or both.
> >       Possible reasons for flow data loss include loss of packets on
> >       the network path, resource shortage at the exporter, Collector
> >       crash, etc...
> >
> >       Paul
> >
> I would prefer Simon's proposal.
> 
>  "If some flow information data cannot be delivered to the collector
>   in a timely manner, the collector MUST be able to estimate the
>   amount of data missing.  Possible reasons for failure to deliver
>   data include loss of packets on the network path, or resource
>   shortage at the exporter."

	I have 3 concerns with Simon's proposal. 

	1) It appears to limit info on data loss to delivery of messages. 
	   I think the door should be left open, in the requiremetns anyway,
	   for application level info  not just message delivery.

	2) It limits the data loss info to the collector. As I said before
	   it **may** be better at the Exporter. We wont know until we have
	    more detail on the protocol.

	3) The added phrase "in a timely manner" is a bit confusing to me.

	

> 
> Unless you want to say:
>         If flow information is lost, a means to gauge the amount of
>         loss MUST be available from the Exporter _or the_ Collector or both.
>         Possible reasons for flow data loss include loss of packets on
>         the network path, resource shortage at the exporter, Collector
>         crash, etc...
> 

	This is fine with me.

	Paul
	
> Regards, Benoit.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 09:14:54 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA14783
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 09:14:54 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zGVS-0005XB-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 08:04:07 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zGVQ-0005Tq-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 08:04:05 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g99D3B701557;
	Wed, 9 Oct 2002 15:03:16 +0200 (CEST)
Message-ID: <3DA4290F.8080804@cisco.com>
Date: Wed, 09 Oct 2002 15:03:11 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;
 broadcast vs reliable
References: <6D745637A7E0F94DA070743C55CDA9BA07583F@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

David,

> Hi,
>
> You again have invoked SNMP design to justify your opinion. But I 
> think you overestimate how much the data model and export protocol are 
> separated in the design of SNMP.
>
> The SMI and the Elements of Procedure define the bindings between the 
> protocol and the mibs. As you point out, the export protocol needs to 
> be able to transport the allowed data types. But it needs to do more 
> than that.
>
> The SNMP protocol is also bound to the actions that can be performed 
> on the data (get/set/trap) and the types of errors that can occur 
> during processing. Error codes are defined relative to the actions, 
> and are deliberately NOT defined relative to what is being managed, 
> i.e. there are no mib-specific error codes. That helped make SNMP simple.
>
> SNMPv3 adds security to SNMP. Security should be an important part of 
> IPFIX as well, since the exported data is often used for billing. If 
> the export protocol were totally separate from the data, then SNMPv3 
> might have just used IPSec to secure the protocol. But an important 
> part of SNMP security  is to secure the DATA, not just the message.
>
> To secure the DATA, it is important to understand and to be able to 
> specify who can do what operations to which subset of data.
>
Do you think this is really important?

> In IPFIX terms it will be important to control who is allowed to be 
> the target of exported data, and to define which exported data they 
> can receive. It is necessary to have a clearly defined mechanism for 
> addressing the data elements (the mib objects in SNMP) so they can be 
> referenced in messages and/or security mechanisms. You cannot just 
> allow any type of data to be passed in a generic bucket, because then 
> you cannot apply access controls to that data.
>
How is this issue addressed now? If you have the router password, you're 
supposed to be the admin, so you can configure what you want (read: 
export any flow data type to any collector). If we had a configuration 
MIB, you can do what you want with community string.
Why would you need a higher level of configuration control in the IPFIX 
protocol itself?

So to come back to your sentence: "To secure the DATA, it is important 
to understand and to be able to specify who can do what operations to 
which subset of data."
The only operations I can think of is: export
How you would do it practically? Associate a list of possible targets 
next to the each data types?

I'm not convinced this feature would be useful.

Regards, Benoit.

> Therefore, it is important to define the actions, the errors, the data 
> types, the addressing namespace, and the procedures to be followed by 
> senders and recievers as part of defining the export protocol. To 
> understand further some of the elements that may need to be defined 
> based on the SNMP model, I suggest you read the SMING WG requirements 
> document (RFC3216).
>
> dbh
>
> > -----Original Message-----
> > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > Sent: Tuesday, October 08, 2002 2:53 AM
> > To: ipfix-eval@net.doit.wisc.edu
> > Subject: [ipfix-eval] RE: Discussion of Candidate Protocols -
> > data model; broadcast vs reliable
> >
> >
> > This note discusses two things:
> >  - whether we need a data model to define the protocol
> >    (I claim that we do not)
> >  - cost of UDP broadcast vs minimalist reliable transport
> >    (I claim that there is very little difference)
> >
> > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> >
> > > Peter Ludemann wrote:
> > [snip]
> > > > YES ... so, can we all agree that data model issues are not
> > > > part of this discussion?
> > >
> > >     No. We have no interoperability without a data model.
> >
> > I agree that we need a data model. I don't see why it should
> > affect the
> > discussion of the export protocol. The only requirements on the export
> > protocol are that it exhibit the desired reliability and
> > efficiency; and
> > that it be able to transport all the data types required by
> > the data models.
> > If we can agree on all the data types, then we can define the
> > protocol; this
> > does not require defining the entire data model.
> >
> > [After all, SNMP is defined independently of the various MIBs - which
> > correspond to the data model]
> >
> > >     No. Generalized data movers are not the problem.
> > >     Defining a protocol that is well defined enough so
> > >     that many device vendors can export data and many
> > >     application vendors can process the data regardless
> > >     of the device is problematic if all you define is a
> > >     general purpose data mover.
> >
> > But deciding on an adequate "generalized data mover" is the
> > point of this
> > evaluation process, I thought. I expect that there will be
> > multiple data
> > models, for the various kinds of generalized devices. (e.g.,
> > for our probe,
> > we've defined three generic groupings of data: volume
> > metrics; QoS metrics;
> > usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> > RADIUS's vendor-specific attributes).
> >
> >
> > There is one place where the nature of the data might
> > intersect with the
> > protocol -- the high-volume metrics such as exported by
> > NetFlow; and where
> > the claim is that a reliable protocol is an unnecessary
> > overhead. So, let me
> > discuss this a bit more.
> >
> > The argument is that with high volume export it is preferable to do
> > multi-cast UDP with sequence numbers; data loss can be
> > detected by noting
> > which sequence numbers are missing ... and reliability can be
> > increased by
> > having multiple receivers and de-duplicating what they receive.
> >
> > For such a situation, the reliable protocol's
> > *implementation* would not
> > keep a queue of data to retransmit on fail-over; it would
> > only keep enough
> > buffer to deal with TCP's or SCTP's flow control and to
> > handle bursts of
> > records. ACKs would be used only to notice when data are not
> > received at the
> > other end and to cause fail-over. TCP "write would block" also causes
> > fail-over.
> >
> > I would argue that the cost of exporting this way is very
> > similar to that of
> > the UDP broadcast. And on the receiving end, it is *much*
> > easier to handle
> > than a UDP-broadcast, which also needs stronger hardware
> > because of the
> > higher de-duplication load.
> >
> > Can be about the same for both:
> > - data copying (if scatter/gather is used)
> > - protocol overhead (sequence number, template ID, etc.)
> >
> > The possible extra cost of the "reliable" export version is:
> > - timer for noticing when ACK isn't received [trivial cost]
> > - TCP vs UDP (little difference with modern implementations)
> > - TCP retransmit with packet loss (typically very low)
> > - cost of fail-over when no ACK received or write would block
> >
> > The savings and benefits of the "reliable" version are:
> > - fewer packet writes (broadcast requires 2x as many packets;
> >   and TCP can pack more efficiently because records can
> >   span packets)
> > - lower network traffic (which adds to reliability)
> > - smaller machines for receiving
> > - more accurate estimate of loss due to lack of reliability
> > - can handle congestion
> >
> > [As an aside, even with the UDP-broadcast version, the
> > exporter ought to
> > compute totals for the various metrics and output those from
> > time to time,
> > to provide a more accurate understanding of data loss.
> > Perhaps such totals
> > are already available in the MIBs, but there remains the
> > issue of how to
> > correlate with the sequence numbers of the exported data.]
> >
> > - peter
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 09:29:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA15560
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 09:29:56 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zGo2-0006W5-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 08:23:18 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zGo1-0006V8-00
	for ipfix-req@net.doit.wisc.edu; Wed, 09 Oct 2002 08:23:17 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g99DMc721598;
	Wed, 9 Oct 2002 15:22:39 +0200 (CEST)
Message-ID: <3DA42D9E.1080209@cisco.com>
Date: Wed, 09 Oct 2002 15:22:38 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: Simon Leinen <simon@limmat.switch.ch>, req
 <ipfix-req@net.doit.wisc.edu>
Subject: drop MPLS from the requirement (was  [ipfix-req] Requirements drafts,
  NATed flows and VPNs)
References: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Reinaldo, Simon,

> that's fair...but the premise was the statement in the draft that 
> IPfix could be used for intrusion detection. Given that intrusion 
> detection devices get all their data from port mirroring; the limited 
> subset of data provided by IPfix + issues such as the lack of NAT 
> visibility (which are directly related to the statement) makes me 
> wonder if we shouldn't take that statement out.
>
> well, somebody could always argue that IPfix can do some intrusion 
> detection...but I really do not think it's a good fit. The "some" 
> argument could be expanded to include all kinds of applications.
>
> I could also agree we should drop the MPLS label requirement. 
> Otherwise one should ask why not export information about other 
> tunneling protocols such as L2TP/GRE/IPSEC information also.
>
I understand your concerns about MPLS. Not really an IP flow!
However, it seems to me that there is a difference between your examples 
L2TP/GRE/IPSEC and the MPLS label requirement.
Your examples affect only the 2 end routers (for example, where the GRE 
tunnel starts and ends). While MPLS affects all the routers in the core.
So without this requirement, we would be blind in a MPLS core: not able 
to export a single flow record!

Any other tought!

Regards, Benoit

> regards,
>
> Reinaldo
>
>
>
> > -----Original Message-----
> > From: Simon Leinen [mailto:simon@limmat.switch.ch]
> > Sent: Friday, October 04, 2002 4:51 PM
> > To: Penno, Reinaldo [BL60:0430:EXCH]
> > Cc: req
> > Subject: Re: [ipfix-req] Requirements drafts, NATed flows and VPNs
> >
> >
> > [ipfix-eval-team removed from list of recipients, since this seems
> >  purely a requirements issue.]
> >
> > I am opposed to this proposal because it opens a can of worms if we
> > start to try to accomodate arbitrary services and middleboxes.
> >
> > What about those cool rate shapers that fiddle with TCP window sizes?
> > If they support IPFIX, the window-fiddle-factor field ist a must!
> > What about "cookie-cutting" layer 4-7 switches? The cookie field is a
> > must! VoIP switches? etc. etc.
> >
> > Please let's try to stick with the core goal of looking at IP (v4&v6)
> > packets and the "transport" protocol or next header.
> >
> > Anything else should be optional and left to other documents.  The
> > IPFIX protocol just should support enough extensibility to allow this.
> >
> > My counter-proposal would be to drop the MPLS label requirement from
> > the requirements draft.
> > --
> > Simon.
> >
> > On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno"
> > <rpenno@nortelnetworks.com> said:
> > > I think there are some important packet fields/scenarios that should
> > > be included in the requirements draft.
> >
> > > 1 - We discussed a long time ago to include the VPN-ID as one of the
> > > parameters exported. If Ipfix will be used in VPN environments for
> > > accouting, QoS, monitoring, etc, this field is a must.
> >
> > > 2 - There is mention to intrusion detection/security as one of the
> > > applications for IPfix, but there is no requirement to export NATed
> > > flows (before and after).
> >
> > > In a device that supports NAT (traditional, layer 7 interception,
> > > whatever) and it's going to use IPfix for security/intrusion
> > > detection, dealing with NAT is must. There is no way a intrusion
> > > detection device will find attacker/attacked properly without both
> > > sides of a NAT flow. Not to mention accouting, billing, etc.
> >
> > > I would propose to include both items on the requirements draft.
> >
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 10:21:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA18928
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 10:21:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zHbu-0000tJ-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 09:14:50 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zHbs-0000sd-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 09:14:48 -0500
Received: from riverstonenet.com ([134.141.180.97]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 9 Oct 2002 07:14:15 -0700
Message-ID: <3DA43944.60264032@riverstonenet.com>
Date: Wed, 09 Oct 2002 10:12:20 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;  
 broadcast vs reliable
References: <AMEKJFAIEIKCBNABBMPNEEMHDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 09 Oct 2002 14:14:16.0336 (UTC) FILETIME=[26A07100:01C26F9E]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Peter Ludemann wrote:
> 
> calato@riverstonenet.com wrote Tuesday, October 08, 2002 7:41 AM
> 
> > Peter Ludemann wrote:
> [snip]
> > > I agree that we need a data model. I don't see why it should affect the
> > > discussion of the export protocol. The only requirements on the export
> > > protocol are that it exhibit the desired reliability and efficiency;
> > > and that it be able to transport all the data types required by the
> > > data models. If we can agree on all the data types, then we can
> > > define the protocol; this does not require defining the entire data
> model.
> >
> >       If I don't have a data model, how do I evaluate wether or not
> >       message ordering is a problem? If I don't have a data model how
> >       do I know I need a message for start of flow and end of flow versus
> >       one message that says here is a flow? If I don't have a data model
> >       how do I know I need a message to synchronize timestamps? If I don't
> >       have a data model, how do I know I can optimize by not encrypting
> >      messages that only contain usage data (e.g. number of bytes,
> >      packets, etc...)
> >
> >       We're not specifying the Bulk Data Export Protocol, we are are
> >      specifying a highly optimized IP Flow Information eXport protocol.
> >      The data model drives requirements to the protocol, not the other
> >      way around.
> 
> [snip]
> 
> Maybe we're just arguing over terminology, but I'm not sure.
> 
> In the database world, the term "data model" usually means:
>   - the table fields' meanings (semantics + type + attributes
>     such as "not null")
>   - constraints amongst records within a table (uniqueness)
>   - the relationships amongst tables (foreign keys for joins)

	In my mind the data model for a stream does share some
	characteristics with a data model of a database.

	However, and I'm no data modeling expert, it seems to me that
	with a database you have a representation of information
	in an existing data set. With a stream you have a represention
	spread out over time. I don't mean timestamps, I mean the time 
	between delivery of one message and delivery of another.

> 
> Maybe I missed something in all the emails, but I thought that
> the export data was to be one record per "flow". 

	Exactly the point of why we need to have the data model.
	One of the questions answered by that is whether or not
	a flow is represented in a single message or over a set
	of messages.
	
	For example, with long standing flows why do I need to repeat 
	all the flow attributes when I just want to update the byte 
	count? I'm not advocating one position or another in this
	particular issue, I'm just using it to show how the data model	
	affects the protocol.

> There can be
> relationships between flows (e.g., parent/child, such as when
> dealing with multi-layer protocols like H.323). These have an
> obvious representation in a database. The other obvious
> representation is the master/detail style, with a master record
> containing summaries and a set of details which reference the
> master's unique id.
> 
> Suppose we're dealing with a long-running flow, whose output
> is split into a number of slices. Then the obvious record
> format is something like this:
>     flow_id, start_time, end_time, metric1, metric2, ...
> and to aggregate all the information for one flow:
>     select flow_id,
>            min(start_time),
>            max(end_time),
>            sum(metric1),
>            ...
>     from data_table
>     where flow_id = ...
>     group by flow_id
> A similar query will get me the master/detail summaries.
> I can tell whether a flow is finished or not by the presence
> or absence of end_time.
> 
> So, I don't understand the problem with beginning and end
> of flow that you describe ... each individual record just
> contains a slice and the determination of how to process

	Again, how it is represented in a database may not
	be the best way to represent it in a stream.

> the record is done downstream [of course, it doesn't have
> to be in a database; it could be in a stream processor].
> We do this kind of stuff all the time when we deploy our
> systems and we haven't seen the need for anything fancier
> than fairly straightforward individual records. Often there's
> a need to do downstream interpretation of fields (e.g.,
> map an IP address to a customer based on information from
> a RADIUS server); but it's stuff that a database designer
> would consider pretty simple (the volumes of data and the
> real-time requirements are what make life interesting).
> 
> How does "message to synchronize timestamps" fit into the
> data model? The timestamp fields are just values, whose
> definition is determined by an agreement between the
> exporter and the collector (is it local time or UTC?
> accuracy? synchronized with other data sources? etc.)

	Lets suppose there is an option, for small devices,
	to report time in terms of sysuptime. The collector
	has 2 choices. 1) It can assume the message was delivered
	relatively quickly and use its current time. 2) If the
	protocol provides a way to obtain the sysuptime to
	current time it can use that info for all subsequent
	messages.

	If I don't have view into the data being sent and
	its meaning, how do I know the protocol needs
	to have support for option #2?


> 
> Encryption ... that should be specified by the templates
> or field definitions during the data definition - just
> specify whether particular records or fields within
> records ought to be encrypted.

	You seem to peer down into the data being sent
	when it is convenient to do so. 

	How did you know the protocol needed to offer 
	encryption features?

	Why did you allow individual fields to be encrypted?
	Do we really need that level of granularity and
	complexity?

	Why are templates providing encryption information?
	Why not just use IPsec and have no knowledge in
	the protocol at all? 

	General data movers will provide lots of features 
	to fit a wide variety of applications. IPFIX data
	movers will provide features optimized for providing
	IP flow data.

	Paul

> 
> So, to me any flow export data model will consist of
> individual records, whose fields are all of a set of
> pre-defined data types. That is, the export protocol
> implies a schema for defining individual data models.
> The data model allows multiple record types (templates),
> which are multiplexed onto the output and distinguished
> by one or more fields in the records (for downstream
> processing, you might put the different record types
> into different tables).
> 
> But I wonder whether I'm missing your point, so please tell
> me where my response doesn't answer your questions.
> 
> - peter
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 10:42:34 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20124
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 10:42:34 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zHt2-0001QT-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 09:32:32 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zHsz-0001PO-00
	for ipfix-req@net.doit.wisc.edu; Wed, 09 Oct 2002 09:32:29 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g99EVhY20199;
	Wed, 9 Oct 2002 07:31:43 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7Q50Y>; Wed, 9 Oct 2002 07:31:42 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C042EEAE7@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Benoit Claise <bclaise@cisco.com>
Cc: Simon Leinen <simon@limmat.switch.ch>, req
	 <ipfix-req@net.doit.wisc.edu>
Subject: RE: drop MPLS from the requirement (was  [ipfix-req] Requirements
	 drafts, NATed flows and VPNs)
Date: Wed, 9 Oct 2002 07:31:42 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26FA0.95EBBC20"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26FA0.95EBBC20
Content-Type: text/plain;
	charset="iso-8859-1"

Hello Benoit, 

there is one exception which is L2TP, where you can have L2TP tunnel
switching, or L2TP multi-hop as some used to call. In this case the behavior
is exactly as MPLS, the difference is that L2TPv2 runs over UDP/IP. L2TPv3
runs over IP. 

Since L2TP tunnel switching is widely deployed I would say we should include
it also or drop them both...

regards,

Reinaldo

> -----Original Message-----
> From: Benoit Claise [mailto:bclaise@cisco.com]
> Sent: Wednesday, October 09, 2002 6:23 AM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: Simon Leinen; req
> Subject: drop MPLS from the requirement (was [ipfix-req] Requirements
> drafts, NATed flows and VPNs)
> 
> 
> Reinaldo, Simon,
> 
> > that's fair...but the premise was the statement in the draft that 
> > IPfix could be used for intrusion detection. Given that intrusion 
> > detection devices get all their data from port mirroring; 
> the limited 
> > subset of data provided by IPfix + issues such as the lack of NAT 
> > visibility (which are directly related to the statement) makes me 
> > wonder if we shouldn't take that statement out.
> >
> > well, somebody could always argue that IPfix can do some intrusion 
> > detection...but I really do not think it's a good fit. The "some" 
> > argument could be expanded to include all kinds of applications.
> >
> > I could also agree we should drop the MPLS label requirement. 
> > Otherwise one should ask why not export information about other 
> > tunneling protocols such as L2TP/GRE/IPSEC information also.
> >
> I understand your concerns about MPLS. Not really an IP flow!
> However, it seems to me that there is a difference between 
> your examples 
> L2TP/GRE/IPSEC and the MPLS label requirement.
> Your examples affect only the 2 end routers (for example, 
> where the GRE 
> tunnel starts and ends). While MPLS affects all the routers 
> in the core.
> So without this requirement, we would be blind in a MPLS 
> core: not able 
> to export a single flow record!
> 
> Any other tought!
> 
> Regards, Benoit
> 
> > regards,
> >
> > Reinaldo
> >
> >
> >
> > > -----Original Message-----
> > > From: Simon Leinen [mailto:simon@limmat.switch.ch]
> > > Sent: Friday, October 04, 2002 4:51 PM
> > > To: Penno, Reinaldo [BL60:0430:EXCH]
> > > Cc: req
> > > Subject: Re: [ipfix-req] Requirements drafts, NATed flows and VPNs
> > >
> > >
> > > [ipfix-eval-team removed from list of recipients, since this seems
> > >  purely a requirements issue.]
> > >
> > > I am opposed to this proposal because it opens a can of 
> worms if we
> > > start to try to accomodate arbitrary services and middleboxes.
> > >
> > > What about those cool rate shapers that fiddle with TCP 
> window sizes?
> > > If they support IPFIX, the window-fiddle-factor field ist a must!
> > > What about "cookie-cutting" layer 4-7 switches? The 
> cookie field is a
> > > must! VoIP switches? etc. etc.
> > >
> > > Please let's try to stick with the core goal of looking 
> at IP (v4&v6)
> > > packets and the "transport" protocol or next header.
> > >
> > > Anything else should be optional and left to other documents.  The
> > > IPFIX protocol just should support enough extensibility 
> to allow this.
> > >
> > > My counter-proposal would be to drop the MPLS label 
> requirement from
> > > the requirements draft.
> > > --
> > > Simon.
> > >
> > > On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno"
> > > <rpenno@nortelnetworks.com> said:
> > > > I think there are some important packet 
> fields/scenarios that should
> > > > be included in the requirements draft.
> > >
> > > > 1 - We discussed a long time ago to include the VPN-ID 
> as one of the
> > > > parameters exported. If Ipfix will be used in VPN 
> environments for
> > > > accouting, QoS, monitoring, etc, this field is a must.
> > >
> > > > 2 - There is mention to intrusion detection/security as 
> one of the
> > > > applications for IPfix, but there is no requirement to 
> export NATed
> > > > flows (before and after).
> > >
> > > > In a device that supports NAT (traditional, layer 7 
> interception,
> > > > whatever) and it's going to use IPfix for security/intrusion
> > > > detection, dealing with NAT is must. There is no way a intrusion
> > > > detection device will find attacker/attacked properly 
> without both
> > > > sides of a NAT flow. Not to mention accouting, billing, etc.
> > >
> > > > I would propose to include both items on the requirements draft.
> > >
> >
> 
> 
> 
> 

------_=_NextPart_001_01C26FA0.95EBBC20
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: drop MPLS from the requirement (was  [ipfix-req] =
Requirements drafts, NATed flows and VPNs)</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hello Benoit, </FONT>
</P>

<P><FONT SIZE=3D2>there is one exception which is L2TP, where you can =
have L2TP tunnel switching, or L2TP multi-hop as some used to call. In =
this case the behavior is exactly as MPLS, the difference is that =
L2TPv2 runs over UDP/IP. L2TPv3 runs over IP. </FONT></P>

<P><FONT SIZE=3D2>Since L2TP tunnel switching is widely deployed I =
would say we should include it also or drop them both...</FONT>
</P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Benoit Claise [<A =
HREF=3D"mailto:bclaise@cisco.com">mailto:bclaise@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Wednesday, October 09, 2002 6:23 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Simon Leinen; req</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: drop MPLS from the requirement (was =
[ipfix-req] Requirements</FONT>
<BR><FONT SIZE=3D2>&gt; drafts, NATed flows and VPNs)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo, Simon,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that's fair...but the premise was the =
statement in the draft that </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; IPfix could be used for intrusion =
detection. Given that intrusion </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; detection devices get all their data from =
port mirroring; </FONT>
<BR><FONT SIZE=3D2>&gt; the limited </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; subset of data provided by IPfix + issues =
such as the lack of NAT </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; visibility (which are directly related to =
the statement) makes me </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; wonder if we shouldn't take that statement =
out.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; well, somebody could always argue that =
IPfix can do some intrusion </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; detection...but I really do not think it's =
a good fit. The &quot;some&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; argument could be expanded to include all =
kinds of applications.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I could also agree we should drop the MPLS =
label requirement. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Otherwise one should ask why not export =
information about other </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; tunneling protocols such as L2TP/GRE/IPSEC =
information also.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; I understand your concerns about MPLS. Not =
really an IP flow!</FONT>
<BR><FONT SIZE=3D2>&gt; However, it seems to me that there is a =
difference between </FONT>
<BR><FONT SIZE=3D2>&gt; your examples </FONT>
<BR><FONT SIZE=3D2>&gt; L2TP/GRE/IPSEC and the MPLS label =
requirement.</FONT>
<BR><FONT SIZE=3D2>&gt; Your examples affect only the 2 end routers =
(for example, </FONT>
<BR><FONT SIZE=3D2>&gt; where the GRE </FONT>
<BR><FONT SIZE=3D2>&gt; tunnel starts and ends). While MPLS affects all =
the routers </FONT>
<BR><FONT SIZE=3D2>&gt; in the core.</FONT>
<BR><FONT SIZE=3D2>&gt; So without this requirement, we would be blind =
in a MPLS </FONT>
<BR><FONT SIZE=3D2>&gt; core: not able </FONT>
<BR><FONT SIZE=3D2>&gt; to export a single flow record!</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Any other tought!</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Regards, Benoit</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; regards,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Reinaldo</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; From: Simon Leinen [<A =
HREF=3D"mailto:simon@limmat.switch.ch">mailto:simon@limmat.switch.ch</A>=
]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Sent: Friday, October 04, 2002 4:51 =
PM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; To: Penno, Reinaldo =
[BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Cc: req</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Subject: Re: [ipfix-req] Requirements =
drafts, NATed flows and VPNs</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; [ipfix-eval-team removed from list of =
recipients, since this seems</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;&nbsp; purely a requirements =
issue.]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; I am opposed to this proposal because =
it opens a can of </FONT>
<BR><FONT SIZE=3D2>&gt; worms if we</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; start to try to accomodate arbitrary =
services and middleboxes.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; What about those cool rate shapers =
that fiddle with TCP </FONT>
<BR><FONT SIZE=3D2>&gt; window sizes?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; If they support IPFIX, the =
window-fiddle-factor field ist a must!</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; What about &quot;cookie-cutting&quot; =
layer 4-7 switches? The </FONT>
<BR><FONT SIZE=3D2>&gt; cookie field is a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; must! VoIP switches? etc. etc.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Please let's try to stick with the =
core goal of looking </FONT>
<BR><FONT SIZE=3D2>&gt; at IP (v4&amp;v6)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; packets and the &quot;transport&quot; =
protocol or next header.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Anything else should be optional and =
left to other documents.&nbsp; The</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; IPFIX protocol just should support =
enough extensibility </FONT>
<BR><FONT SIZE=3D2>&gt; to allow this.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; My counter-proposal would be to drop =
the MPLS label </FONT>
<BR><FONT SIZE=3D2>&gt; requirement from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; the requirements draft.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Simon.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; On Mon, 30 Sep 2002 10:26:36 -0700, =
&quot;Reinaldo Penno&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &lt;rpenno@nortelnetworks.com&gt; =
said:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I think there are some important =
packet </FONT>
<BR><FONT SIZE=3D2>&gt; fields/scenarios that should</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; be included in the requirements =
draft.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; 1 - We discussed a long time ago =
to include the VPN-ID </FONT>
<BR><FONT SIZE=3D2>&gt; as one of the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; parameters exported. If Ipfix =
will be used in VPN </FONT>
<BR><FONT SIZE=3D2>&gt; environments for</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; accouting, QoS, monitoring, etc, =
this field is a must.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; 2 - There is mention to =
intrusion detection/security as </FONT>
<BR><FONT SIZE=3D2>&gt; one of the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; applications for IPfix, but =
there is no requirement to </FONT>
<BR><FONT SIZE=3D2>&gt; export NATed</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; flows (before and after).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; In a device that supports NAT =
(traditional, layer 7 </FONT>
<BR><FONT SIZE=3D2>&gt; interception,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; whatever) and it's going to use =
IPfix for security/intrusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; detection, dealing with NAT is =
must. There is no way a intrusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; detection device will find =
attacker/attacked properly </FONT>
<BR><FONT SIZE=3D2>&gt; without both</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; sides of a NAT flow. Not to =
mention accouting, billing, etc.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I would propose to include both =
items on the requirements draft.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26FA0.95EBBC20--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 10:57:30 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20813
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 10:57:30 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zI8r-00020m-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 09:48:53 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zI8p-0001w2-00; Wed, 09 Oct 2002 09:48:51 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g99EiOY22312;
	Wed, 9 Oct 2002 07:44:24 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7Q6CK>; Wed, 9 Oct 2002 07:44:23 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C042EEAFE@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Benoit Claise <bclaise@cisco.com>, calato@riverstonenet.com
Cc: Simon Leinen <simon@limmat.switch.ch>, ipfix-req@net.doit.wisc.edu,
        ipfix-eval-team@net.doit.wisc.edu
Subject: RE: [ipfix-req] Re: Data Export Reliability Requirement [was:  Re
	:IPFIXRequireme nt draft status - section 6.3.2]
Date: Wed, 9 Oct 2002 07:44:23 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26FA2.5BC11BC4"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26FA2.5BC11BC4
Content-Type: text/plain;
	charset="iso-8859-1"

One thing is bothering me..

How could you gauge the amount of ->flow information<- lost (as stated
below) by just looking at sequence numbers? Without some sort of ack
mechanim, mind you.

It seems to me the best you can do is to report the amount of application
layer packets dropped. Since a packet can have a bunch of records, you would
never know the amount of flow information lost...am I missing something?

regards,

Renaldo

> -----Original Message-----
> From: Benoit Claise [mailto:bclaise@cisco.com]
> Sent: Wednesday, October 09, 2002 1:34 AM
> To: calato@riverstonenet.com
> Cc: Simon Leinen; Penno, Reinaldo [BL60:0430:EXCH];
> ipfix-req@net.doit.wisc.edu; ipfix-eval-team@net.doit.wisc.edu
> Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was:
> Re:IPFIXRequireme nt draft status - section 6.3.2]
> 
> 
> calato@riverstonenet.com wrote:
> 
> >>>      Again, I think it is difficult to describe how to 
> measure loss
> >>>      without a protocol definition to analyze.
> >>>
> >>>      
> >>>
> >>Agreed. So maybe we should maybe postpone the discussion...
> >>
> >>    
> >>
> >
> >	Lets do that. 
> >
> >	However, I think this discussion shows the req section 
> should be a 
> >	little more general to leave open implementation 
> details. Here is 
> >	my proposal..
> >
> >	
> > 	If flow information is lost, a means to gauge the amount of
> >	loss MUST be available from the Exporter, Collector or both. 
> >	Possible reasons for flow data loss include loss of packets on 
> >	the network path, resource shortage at the exporter, Collector
> >	crash, etc...
> >
> >	Paul
> >
> I would prefer Simon's proposal.
> 
>  "If some flow information data cannot be delivered to the collector
>   in a timely manner, the collector MUST be able to estimate the
>   amount of data missing.  Possible reasons for failure to deliver
>   data include loss of packets on the network path, or resource
>   shortage at the exporter."
> 
> Unless you want to say:
>  	If flow information is lost, a means to gauge the amount of
> 	loss MUST be available from the Exporter _or the_ 
> Collector or both. 
> 	Possible reasons for flow data loss include loss of packets on 
> 	the network path, resource shortage at the exporter, Collector
> 	crash, etc...
> 
> Regards, Benoit.
> 
> 
> 

------_=_NextPart_001_01C26FA2.5BC11BC4
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] Re: Data Export Reliability Requirement [was:  =
Re:IPFIXRequireme nt draft status - section 6.3.2]</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>One thing is bothering me..</FONT>
</P>

<P><FONT SIZE=3D2>How could you gauge the amount of -&gt;flow =
information&lt;- lost (as stated below) by just looking at sequence =
numbers? Without some sort of ack mechanim, mind you.</FONT></P>

<P><FONT SIZE=3D2>It seems to me the best you can do is to report the =
amount of application layer packets dropped. Since a packet can have a =
bunch of records, you would never know the amount of flow information =
lost...am I missing something?</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Renaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Benoit Claise [<A =
HREF=3D"mailto:bclaise@cisco.com">mailto:bclaise@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Wednesday, October 09, 2002 1:34 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: calato@riverstonenet.com</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Simon Leinen; Penno, Reinaldo =
[BL60:0430:EXCH];</FONT>
<BR><FONT SIZE=3D2>&gt; ipfix-req@net.doit.wisc.edu; =
ipfix-eval-team@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] Re: Data Export =
Reliability Requirement [was:</FONT>
<BR><FONT SIZE=3D2>&gt; Re:IPFIXRequireme nt draft status - section =
6.3.2]</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; calato@riverstonenet.com wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Again, I think it is difficult to describe how to </FONT>
<BR><FONT SIZE=3D2>&gt; measure loss</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
without a protocol definition to analyze.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Agreed. So maybe we should maybe =
postpone the discussion...</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Lets do that. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; However, I think =
this discussion shows the req section </FONT>
<BR><FONT SIZE=3D2>&gt; should be a </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; little more =
general to leave open implementation </FONT>
<BR><FONT SIZE=3D2>&gt; details. Here is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; my =
proposal..</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &nbsp;&nbsp;&nbsp; If flow information is =
lost, a means to gauge the amount of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; loss MUST be =
available from the Exporter, Collector or both. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Possible reasons =
for flow data loss include loss of packets on </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; the network path, =
resource shortage at the exporter, Collector</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; crash, =
etc...</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Paul</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; I would prefer Simon's proposal.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; &quot;If some flow information data =
cannot be delivered to the collector</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; in a timely manner, the collector =
MUST be able to estimate the</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; amount of data missing.&nbsp; =
Possible reasons for failure to deliver</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; data include loss of packets on the =
network path, or resource</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; shortage at the =
exporter.&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Unless you want to say:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; If flow =
information is lost, a means to gauge the amount of</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; loss MUST be =
available from the Exporter _or the_ </FONT>
<BR><FONT SIZE=3D2>&gt; Collector or both. </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Possible reasons =
for flow data loss include loss of packets on </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the network =
path, resource shortage at the exporter, Collector</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; crash, =
etc...</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Regards, Benoit.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26FA2.5BC11BC4--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 10:59:28 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20849
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 10:59:28 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zIAc-00022h-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 09:50:42 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zIAb-000223-00
	for ipfix-req@net.doit.wisc.edu; Wed, 09 Oct 2002 09:50:41 -0500
Received: from riverstonenet.com ([134.141.180.97]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 9 Oct 2002 07:49:49 -0700
Message-ID: <3DA44199.41211CB8@riverstonenet.com>
Date: Wed, 09 Oct 2002 10:47:53 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        Simon Leinen <simon@limmat.switch.ch>,
        req <ipfix-req@net.doit.wisc.edu>
Subject: Re: drop MPLS from the requirement (was  [ipfix-req] Requirements 
 drafts,NATed flows and VPNs)
References: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com> <3DA42D9E.1080209@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 09 Oct 2002 14:49:49.0954 (UTC) FILETIME=[1E5CB620:01C26FA3]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Benoit Claise wrote:
> 
> Reinaldo, Simon,
> 
> > that's fair...but the premise was the statement in the draft that
> > IPfix could be used for intrusion detection. Given that intrusion
> > detection devices get all their data from port mirroring; the limited
> > subset of data provided by IPfix + issues such as the lack of NAT
> > visibility (which are directly related to the statement) makes me
> > wonder if we shouldn't take that statement out.
> >
> > well, somebody could always argue that IPfix can do some intrusion
> > detection...but I really do not think it's a good fit. The "some"
> > argument could be expanded to include all kinds of applications.
> >
> > I could also agree we should drop the MPLS label requirement.
> > Otherwise one should ask why not export information about other
> > tunneling protocols such as L2TP/GRE/IPSEC information also.
> >
> I understand your concerns about MPLS. Not really an IP flow!
> However, it seems to me that there is a difference between your examples
> L2TP/GRE/IPSEC and the MPLS label requirement.
> Your examples affect only the 2 end routers (for example, where the GRE
> tunnel starts and ends). While MPLS affects all the routers in the core.
> So without this requirement, we would be blind in a MPLS core: not able
> to export a single flow record!
> 
> Any other tought!

	Just a question. In the core all you have is the label to
	distinguish by. You might be able to get the FEC info
	but are there other attributes which can be reported?

	Paul

> 
> Regards, Benoit
> 
> > regards,
> >
> > Reinaldo
> >
> >
> >
> > > -----Original Message-----
> > > From: Simon Leinen [mailto:simon@limmat.switch.ch]
> > > Sent: Friday, October 04, 2002 4:51 PM
> > > To: Penno, Reinaldo [BL60:0430:EXCH]
> > > Cc: req
> > > Subject: Re: [ipfix-req] Requirements drafts, NATed flows and VPNs
> > >
> > >
> > > [ipfix-eval-team removed from list of recipients, since this seems
> > >  purely a requirements issue.]
> > >
> > > I am opposed to this proposal because it opens a can of worms if we
> > > start to try to accomodate arbitrary services and middleboxes.
> > >
> > > What about those cool rate shapers that fiddle with TCP window sizes?
> > > If they support IPFIX, the window-fiddle-factor field ist a must!
> > > What about "cookie-cutting" layer 4-7 switches? The cookie field is a
> > > must! VoIP switches? etc. etc.
> > >
> > > Please let's try to stick with the core goal of looking at IP (v4&v6)
> > > packets and the "transport" protocol or next header.
> > >
> > > Anything else should be optional and left to other documents.  The
> > > IPFIX protocol just should support enough extensibility to allow this.
> > >
> > > My counter-proposal would be to drop the MPLS label requirement from
> > > the requirements draft.
> > > --
> > > Simon.
> > >
> > > On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno"
> > > <rpenno@nortelnetworks.com> said:
> > > > I think there are some important packet fields/scenarios that should
> > > > be included in the requirements draft.
> > >
> > > > 1 - We discussed a long time ago to include the VPN-ID as one of the
> > > > parameters exported. If Ipfix will be used in VPN environments for
> > > > accouting, QoS, monitoring, etc, this field is a must.
> > >
> > > > 2 - There is mention to intrusion detection/security as one of the
> > > > applications for IPfix, but there is no requirement to export NATed
> > > > flows (before and after).
> > >
> > > > In a device that supports NAT (traditional, layer 7 interception,
> > > > whatever) and it's going to use IPfix for security/intrusion
> > > > detection, dealing with NAT is must. There is no way a intrusion
> > > > detection device will find attacker/attacked properly without both
> > > > sides of a NAT flow. Not to mention accouting, billing, etc.
> > >
> > > > I would propose to include both items on the requirements draft.
> > >
> >
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 11:18:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21429
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 11:18:29 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zIKc-0002Kf-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 10:01:02 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zIKa-0002Jk-00; Wed, 09 Oct 2002 10:01:00 -0500
Received: from riverstonenet.com ([134.141.180.97]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 9 Oct 2002 08:00:27 -0700
Message-ID: <3DA44413.29E89B57@riverstonenet.com>
Date: Wed, 09 Oct 2002 10:58:27 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: Benoit Claise <bclaise@cisco.com>, Simon Leinen <simon@limmat.switch.ch>,
        ipfix-req@net.doit.wisc.edu, ipfix-eval-team@net.doit.wisc.edu
Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was:  
 Re:IPFIXRequireme nt draft status - section 6.3.2]
References: <7B802811BE77D51189910002A55CFD2C042EEAFE@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 09 Oct 2002 15:00:28.0259 (UTC) FILETIME=[9AD25330:01C26FA4]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Reinaldo Penno wrote:
> 
> One thing is bothering me..
> 
> How could you gauge the amount of ->flow information<- lost (as stated
> below) by just looking at sequence numbers? Without some sort of ack
> mechanim, mind you.
> 
> It seems to me the best you can do is to report the amount of
> application layer packets dropped. Since a packet can have a bunch of
> records, you would never know the amount of flow information lost...am
> I missing something?

	That is why we postponed the discussion of how this accomplished
	until the protocol is a little more concrete.

	I would agree that just counting the messages dropped is a pretty
	weak gauge. That said, it is one that indicates more than zero and 
	you could use it at least as a relative measure. Hopefully we can
	do better.

	Paul
> 
> regards,
> 
> Renaldo
> 
> > -----Original Message-----
> > From: Benoit Claise [mailto:bclaise@cisco.com]
> > Sent: Wednesday, October 09, 2002 1:34 AM
> > To: calato@riverstonenet.com
> > Cc: Simon Leinen; Penno, Reinaldo [BL60:0430:EXCH];
> > ipfix-req@net.doit.wisc.edu; ipfix-eval-team@net.doit.wisc.edu
> > Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement
> [was:
> > Re:IPFIXRequireme nt draft status - section 6.3.2]
> >
> >
> > calato@riverstonenet.com wrote:
> >
> > >>>      Again, I think it is difficult to describe how to
> > measure loss
> > >>>      without a protocol definition to analyze.
> > >>>
> > >>>
> > >>>
> > >>Agreed. So maybe we should maybe postpone the discussion...
> > >>
> > >>
> > >>
> > >
> > >     Lets do that.
> > >
> > >     However, I think this discussion shows the req section
> > should be a
> > >     little more general to leave open implementation
> > details. Here is
> > >     my proposal..
> > >
> > >
> > >     If flow information is lost, a means to gauge the amount of
> > >     loss MUST be available from the Exporter, Collector or both.
> > >     Possible reasons for flow data loss include loss of packets on
> 
> > >     the network path, resource shortage at the exporter, Collector
> 
> > >     crash, etc...
> > >
> > >     Paul
> > >
> > I would prefer Simon's proposal.
> >
> >  "If some flow information data cannot be delivered to the collector
> 
> >   in a timely manner, the collector MUST be able to estimate the
> >   amount of data missing.  Possible reasons for failure to deliver
> >   data include loss of packets on the network path, or resource
> >   shortage at the exporter."
> >
> > Unless you want to say:
> >       If flow information is lost, a means to gauge the amount of
> >       loss MUST be available from the Exporter _or the_
> > Collector or both.
> >       Possible reasons for flow data loss include loss of packets on
> 
> >       the network path, resource shortage at the exporter, Collector
> 
> >       crash, etc...
> >
> > Regards, Benoit.
> >
> >
> >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 11:28:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21874
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 11:28:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zIZs-0002m5-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 10:16:48 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zIZq-0002lR-00
	for ipfix-req@net.doit.wisc.edu; Wed, 09 Oct 2002 10:16:46 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g99FG5720757;
	Wed, 9 Oct 2002 17:16:05 +0200 (CEST)
Message-ID: <3DA44834.4030706@cisco.com>
Date: Wed, 09 Oct 2002 17:16:04 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        Simon Leinen
 <simon@limmat.switch.ch>,
        req <ipfix-req@net.doit.wisc.edu>
Subject: Re: drop MPLS from the requirement (was  [ipfix-req] Requirements
  drafts,NATed flows and VPNs)
References: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com> <3DA42D9E.1080209@cisco.com> <3DA44199.41211CB8@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote:

>Benoit Claise wrote:
>  
>
>>Reinaldo, Simon,
>>
>>    
>>
>>>that's fair...but the premise was the statement in the draft that
>>>IPfix could be used for intrusion detection. Given that intrusion
>>>detection devices get all their data from port mirroring; the limited
>>>subset of data provided by IPfix + issues such as the lack of NAT
>>>visibility (which are directly related to the statement) makes me
>>>wonder if we shouldn't take that statement out.
>>>
>>>well, somebody could always argue that IPfix can do some intrusion
>>>detection...but I really do not think it's a good fit. The "some"
>>>argument could be expanded to include all kinds of applications.
>>>
>>>I could also agree we should drop the MPLS label requirement.
>>>Otherwise one should ask why not export information about other
>>>tunneling protocols such as L2TP/GRE/IPSEC information also.
>>>
>>>      
>>>
>>I understand your concerns about MPLS. Not really an IP flow!
>>However, it seems to me that there is a difference between your examples
>>L2TP/GRE/IPSEC and the MPLS label requirement.
>>Your examples affect only the 2 end routers (for example, where the GRE
>>tunnel starts and ends). While MPLS affects all the routers in the core.
>>So without this requirement, we would be blind in a MPLS core: not able
>>to export a single flow record!
>>
>>Any other tought!
>>    
>>
>
>	Just a question. In the core all you have is the label to
>	distinguish by. You might be able to get the FEC info
>	but are there other attributes which can be reported?
>
which can be reported? Yes.
For example: underlying label(s), experimental bits, flow records about 
the underlying packets, etc...

Regards, Benoit.

>
>	Paul
>
>  
>
>>Regards, Benoit
>>
>>    
>>
>>>regards,
>>>
>>>Reinaldo
>>>
>>>
>>>
>>>      
>>>
>>>>-----Original Message-----
>>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
>>>>Sent: Friday, October 04, 2002 4:51 PM
>>>>To: Penno, Reinaldo [BL60:0430:EXCH]
>>>>Cc: req
>>>>Subject: Re: [ipfix-req] Requirements drafts, NATed flows and VPNs
>>>>
>>>>
>>>>[ipfix-eval-team removed from list of recipients, since this seems
>>>> purely a requirements issue.]
>>>>
>>>>I am opposed to this proposal because it opens a can of worms if we
>>>>start to try to accomodate arbitrary services and middleboxes.
>>>>
>>>>What about those cool rate shapers that fiddle with TCP window sizes?
>>>>If they support IPFIX, the window-fiddle-factor field ist a must!
>>>>What about "cookie-cutting" layer 4-7 switches? The cookie field is a
>>>>must! VoIP switches? etc. etc.
>>>>
>>>>Please let's try to stick with the core goal of looking at IP (v4&v6)
>>>>packets and the "transport" protocol or next header.
>>>>
>>>>Anything else should be optional and left to other documents.  The
>>>>IPFIX protocol just should support enough extensibility to allow this.
>>>>
>>>>My counter-proposal would be to drop the MPLS label requirement from
>>>>the requirements draft.
>>>>--
>>>>Simon.
>>>>
>>>>On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno"
>>>><rpenno@nortelnetworks.com> said:
>>>>        
>>>>
>>>>>I think there are some important packet fields/scenarios that should
>>>>>be included in the requirements draft.
>>>>>          
>>>>>
>>>>>1 - We discussed a long time ago to include the VPN-ID as one of the
>>>>>parameters exported. If Ipfix will be used in VPN environments for
>>>>>accouting, QoS, monitoring, etc, this field is a must.
>>>>>          
>>>>>
>>>>>2 - There is mention to intrusion detection/security as one of the
>>>>>applications for IPfix, but there is no requirement to export NATed
>>>>>flows (before and after).
>>>>>          
>>>>>
>>>>>In a device that supports NAT (traditional, layer 7 interception,
>>>>>whatever) and it's going to use IPfix for security/intrusion
>>>>>detection, dealing with NAT is must. There is no way a intrusion
>>>>>detection device will find attacker/attacked properly without both
>>>>>sides of a NAT flow. Not to mention accouting, billing, etc.
>>>>>          
>>>>>
>>>>>I would propose to include both items on the requirements draft.
>>>>>          
>>>>>
>>--
>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>"unsubscribe ipfix" in message body
>>Archive     http://ipfix.doit.wisc.edu/archive/
>>    
>>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 12:16:18 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23924
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 12:16:18 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zJKe-0004E8-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 11:05:08 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zJKd-0004D1-00
	for ipfix-req@net.doit.wisc.edu; Wed, 09 Oct 2002 11:05:07 -0500
Received: from riverstonenet.com ([134.141.180.97]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 9 Oct 2002 09:04:32 -0700
Message-ID: <3DA4531C.F489E0C6@riverstonenet.com>
Date: Wed, 09 Oct 2002 12:02:36 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        Simon Leinen <simon@limmat.switch.ch>,
        req <ipfix-req@net.doit.wisc.edu>
Subject: Re: drop MPLS from the requirement (was  [ipfix-req] 
 Requirementsdrafts,NATed flows and VPNs)
References: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com> <3DA42D9E.1080209@cisco.com> <3DA44199.41211CB8@riverstonenet.com> <3DA44834.4030706@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 09 Oct 2002 16:04:32.0793 (UTC) FILETIME=[8E57A890:01C26FAD]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Benoit Claise wrote:
> 
> calato@riverstonenet.com wrote:
> 
> >Benoit Claise wrote:
> >
> >
> >>Reinaldo, Simon,
> >>
> >>
> >>
> >>>that's fair...but the premise was the statement in the draft that
> >>>IPfix could be used for intrusion detection. Given that intrusion
> >>>detection devices get all their data from port mirroring; the limited
> >>>subset of data provided by IPfix + issues such as the lack of NAT
> >>>visibility (which are directly related to the statement) makes me
> >>>wonder if we shouldn't take that statement out.
> >>>
> >>>well, somebody could always argue that IPfix can do some intrusion
> >>>detection...but I really do not think it's a good fit. The "some"
> >>>argument could be expanded to include all kinds of applications.
> >>>
> >>>I could also agree we should drop the MPLS label requirement.
> >>>Otherwise one should ask why not export information about other
> >>>tunneling protocols such as L2TP/GRE/IPSEC information also.
> >>>
> >>>
> >>>
> >>I understand your concerns about MPLS. Not really an IP flow!
> >>However, it seems to me that there is a difference between your examples
> >>L2TP/GRE/IPSEC and the MPLS label requirement.
> >>Your examples affect only the 2 end routers (for example, where the GRE
> >>tunnel starts and ends). While MPLS affects all the routers in the core.
> >>So without this requirement, we would be blind in a MPLS core: not able
> >>to export a single flow record!
> >>
> >>Any other tought!
> >>
> >>
> >
> >       Just a question. In the core all you have is the label to
> >       distinguish by. You might be able to get the FEC info
> >       but are there other attributes which can be reported?
> >
> which can be reported? Yes.
> For example: underlying label(s), experimental bits, 

	OK.

> flow records about the underlying packets, etc...
> 
	Not sure  what you mean here can you elaborate?

	I couldn't think of any packet level attributes
	to report which is why I'm trying to get more of
	a handle on this.

	Paul


> Regards, Benoit.
> 
> >
> >       Paul
> >
> >
> >
> >>Regards, Benoit
> >>
> >>
> >>
> >>>regards,
> >>>
> >>>Reinaldo
> >>>
> >>>
> >>>
> >>>
> >>>
> >>>>-----Original Message-----
> >>>>From: Simon Leinen [mailto:simon@limmat.switch.ch]
> >>>>Sent: Friday, October 04, 2002 4:51 PM
> >>>>To: Penno, Reinaldo [BL60:0430:EXCH]
> >>>>Cc: req
> >>>>Subject: Re: [ipfix-req] Requirements drafts, NATed flows and VPNs
> >>>>
> >>>>
> >>>>[ipfix-eval-team removed from list of recipients, since this seems
> >>>> purely a requirements issue.]
> >>>>
> >>>>I am opposed to this proposal because it opens a can of worms if we
> >>>>start to try to accomodate arbitrary services and middleboxes.
> >>>>
> >>>>What about those cool rate shapers that fiddle with TCP window sizes?
> >>>>If they support IPFIX, the window-fiddle-factor field ist a must!
> >>>>What about "cookie-cutting" layer 4-7 switches? The cookie field is a
> >>>>must! VoIP switches? etc. etc.
> >>>>
> >>>>Please let's try to stick with the core goal of looking at IP (v4&v6)
> >>>>packets and the "transport" protocol or next header.
> >>>>
> >>>>Anything else should be optional and left to other documents.  The
> >>>>IPFIX protocol just should support enough extensibility to allow this.
> >>>>
> >>>>My counter-proposal would be to drop the MPLS label requirement from
> >>>>the requirements draft.
> >>>>--
> >>>>Simon.
> >>>>
> >>>>On Mon, 30 Sep 2002 10:26:36 -0700, "Reinaldo Penno"
> >>>><rpenno@nortelnetworks.com> said:
> >>>>
> >>>>
> >>>>>I think there are some important packet fields/scenarios that should
> >>>>>be included in the requirements draft.
> >>>>>
> >>>>>
> >>>>>1 - We discussed a long time ago to include the VPN-ID as one of the
> >>>>>parameters exported. If Ipfix will be used in VPN environments for
> >>>>>accouting, QoS, monitoring, etc, this field is a must.
> >>>>>
> >>>>>
> >>>>>2 - There is mention to intrusion detection/security as one of the
> >>>>>applications for IPfix, but there is no requirement to export NATed
> >>>>>flows (before and after).
> >>>>>
> >>>>>
> >>>>>In a device that supports NAT (traditional, layer 7 interception,
> >>>>>whatever) and it's going to use IPfix for security/intrusion
> >>>>>detection, dealing with NAT is must. There is no way a intrusion
> >>>>>detection device will find attacker/attacked properly without both
> >>>>>sides of a NAT flow. Not to mention accouting, billing, etc.
> >>>>>
> >>>>>
> >>>>>I would propose to include both items on the requirements draft.
> >>>>>
> >>>>>
> >>--
> >>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >>"unsubscribe ipfix" in message body
> >>Archive     http://ipfix.doit.wisc.edu/archive/
> >>
> >>

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 13:22:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA26261
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 13:22:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zKM2-00069v-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 12:10:38 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zKM0-00069H-00; Wed, 09 Oct 2002 12:10:36 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g99HA4In024776;
	Wed, 9 Oct 2002 10:10:04 -0700 (PDT)
Date: Wed, 9 Oct 2002 10:10:04 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Reinaldo Penno <rpenno@nortelnetworks.com>
cc: Benoit Claise <bclaise@cisco.com>, <calato@riverstonenet.com>,
        Simon Leinen <simon@limmat.switch.ch>, <ipfix-req@net.doit.wisc.edu>,
        <ipfix-eval-team@net.doit.wisc.edu>
Subject: RE: [ipfix-req] Re: Data Export Reliability Requirement [was: 
 Re:IPFIXRequireme nt draft status - section 6.3.2]
In-Reply-To: <7B802811BE77D51189910002A55CFD2C042EEAFE@zsc3c032.us.nortel.com>
Message-ID: <Pine.GSO.4.44.0210091008180.4765-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

One possibility is Exporter keeping track of number of flow records that
it had sent and periodically communicating this information to the
collector.

-vamsi

On Wed, 9 Oct 2002, Reinaldo Penno wrote:

> One thing is bothering me..
>
> How could you gauge the amount of ->flow information<- lost (as stated
> below) by just looking at sequence numbers? Without some sort of ack
> mechanim, mind you.
>
> It seems to me the best you can do is to report the amount of application
> layer packets dropped. Since a packet can have a bunch of records, you would
> never know the amount of flow information lost...am I missing something?
>
> regards,
>
> Renaldo
>
> > -----Original Message-----
> > From: Benoit Claise [mailto:bclaise@cisco.com]
> > Sent: Wednesday, October 09, 2002 1:34 AM
> > To: calato@riverstonenet.com
> > Cc: Simon Leinen; Penno, Reinaldo [BL60:0430:EXCH];
> > ipfix-req@net.doit.wisc.edu; ipfix-eval-team@net.doit.wisc.edu
> > Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was:
> > Re:IPFIXRequireme nt draft status - section 6.3.2]
> >
> >
> > calato@riverstonenet.com wrote:
> >
> > >>>      Again, I think it is difficult to describe how to
> > measure loss
> > >>>      without a protocol definition to analyze.
> > >>>
> > >>>
> > >>>
> > >>Agreed. So maybe we should maybe postpone the discussion...
> > >>
> > >>
> > >>
> > >
> > >	Lets do that.
> > >
> > >	However, I think this discussion shows the req section
> > should be a
> > >	little more general to leave open implementation
> > details. Here is
> > >	my proposal..
> > >
> > >
> > > 	If flow information is lost, a means to gauge the amount of
> > >	loss MUST be available from the Exporter, Collector or both.
> > >	Possible reasons for flow data loss include loss of packets on
> > >	the network path, resource shortage at the exporter, Collector
> > >	crash, etc...
> > >
> > >	Paul
> > >
> > I would prefer Simon's proposal.
> >
> >  "If some flow information data cannot be delivered to the collector
> >   in a timely manner, the collector MUST be able to estimate the
> >   amount of data missing.  Possible reasons for failure to deliver
> >   data include loss of packets on the network path, or resource
> >   shortage at the exporter."
> >
> > Unless you want to say:
> >  	If flow information is lost, a means to gauge the amount of
> > 	loss MUST be available from the Exporter _or the_
> > Collector or both.
> > 	Possible reasons for flow data loss include loss of packets on
> > 	the network path, resource shortage at the exporter, Collector
> > 	crash, etc...
> >
> > Regards, Benoit.
> >
> >
> >
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 13:26:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA26431
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 13:26:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zKPn-0006HM-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 12:14:31 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17zKPm-0006HE-00
	for ipfix-req@net.doit.wisc.edu; Wed, 09 Oct 2002 12:14:30 -0500
Received: (qmail 19376 invoked from network); 9 Oct 2002 17:14:26 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 9 Oct 2002 17:14:26 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g99HHYs29748;
	Wed, 9 Oct 2002 10:17:34 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Vamsidhar Valluri" <vvalluri@cisco.com>,
        "Reinaldo Penno" <rpenno@nortelnetworks.com>
Cc: "Benoit Claise" <bclaise@cisco.com>, <calato@riverstonenet.com>,
        "Simon Leinen" <simon@limmat.switch.ch>, <ipfix-req@net.doit.wisc.edu>,
        <ipfix-eval-team@net.doit.wisc.edu>
Subject: RE: [ipfix-req] Re: Data Export Reliability Requirement [was:  Re:IPFIXRequireme nt draft status - section 6.3.2]
Date: Wed, 9 Oct 2002 10:14:24 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNOENEDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <Pine.GSO.4.44.0210091008180.4765-100000@vvalluri-u10.cisco.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

I suggest number of records + some important totals (I described this more
fully in one of my emails)

> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> Of Vamsidhar Valluri
> Sent: Wednesday, October 09, 2002 10:10 AM
> To: Reinaldo Penno
> Cc: Benoit Claise; calato@riverstonenet.com; Simon Leinen;
> ipfix-req@net.doit.wisc.edu; ipfix-eval-team@net.doit.wisc.edu
> Subject: RE: [ipfix-req] Re: Data Export Reliability Requirement [was:
> Re:IPFIXRequireme nt draft status - section 6.3.2]
>
>
> One possibility is Exporter keeping track of number of flow records that
> it had sent and periodically communicating this information to the
> collector.
>
> -vamsi
>
> On Wed, 9 Oct 2002, Reinaldo Penno wrote:
>
> > One thing is bothering me..
> >
> > How could you gauge the amount of ->flow information<- lost (as stated
> > below) by just looking at sequence numbers? Without some sort of ack
> > mechanim, mind you.
> >
> > It seems to me the best you can do is to report the amount of
> application
> > layer packets dropped. Since a packet can have a bunch of
> records, you would
> > never know the amount of flow information lost...am I missing something?
> >
> > regards,
> >
> > Renaldo
> >
> > > -----Original Message-----
> > > From: Benoit Claise [mailto:bclaise@cisco.com]
> > > Sent: Wednesday, October 09, 2002 1:34 AM
> > > To: calato@riverstonenet.com
> > > Cc: Simon Leinen; Penno, Reinaldo [BL60:0430:EXCH];
> > > ipfix-req@net.doit.wisc.edu; ipfix-eval-team@net.doit.wisc.edu
> > > Subject: Re: [ipfix-req] Re: Data Export Reliability Requirement [was:
> > > Re:IPFIXRequireme nt draft status - section 6.3.2]
> > >
> > >
> > > calato@riverstonenet.com wrote:
> > >
> > > >>>      Again, I think it is difficult to describe how to
> > > measure loss
> > > >>>      without a protocol definition to analyze.
> > > >>>
> > > >>>
> > > >>>
> > > >>Agreed. So maybe we should maybe postpone the discussion...
> > > >>
> > > >>
> > > >>
> > > >
> > > >	Lets do that.
> > > >
> > > >	However, I think this discussion shows the req section
> > > should be a
> > > >	little more general to leave open implementation
> > > details. Here is
> > > >	my proposal..
> > > >
> > > >
> > > > 	If flow information is lost, a means to gauge the amount of
> > > >	loss MUST be available from the Exporter, Collector or both.
> > > >	Possible reasons for flow data loss include loss of packets on
> > > >	the network path, resource shortage at the exporter, Collector
> > > >	crash, etc...
> > > >
> > > >	Paul
> > > >
> > > I would prefer Simon's proposal.
> > >
> > >  "If some flow information data cannot be delivered to the collector
> > >   in a timely manner, the collector MUST be able to estimate the
> > >   amount of data missing.  Possible reasons for failure to deliver
> > >   data include loss of packets on the network path, or resource
> > >   shortage at the exporter."
> > >
> > > Unless you want to say:
> > >  	If flow information is lost, a means to gauge the amount of
> > > 	loss MUST be available from the Exporter _or the_
> > > Collector or both.
> > > 	Possible reasons for flow data loss include loss of packets on
> > > 	the network path, resource shortage at the exporter, Collector
> > > 	crash, etc...
> > >
> > > Regards, Benoit.
> > >
> > >
> > >
> >
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 13:50:40 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27187
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 13:50:40 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zKrZ-00075d-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 12:43:13 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zKrX-00074j-00; Wed, 09 Oct 2002 12:43:11 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g99HgRq20118;
	Wed, 9 Oct 2002 10:42:27 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g99HgcA08474;
	Wed, 9 Oct 2002 12:42:38 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7Q8D8>; Wed, 9 Oct 2002 10:42:23 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C042EED9E@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Peter Ludemann <peter.ludemann@xacct.com>,
        Vamsidhar Valluri
	 <vvalluri@cisco.com>
Cc: Benoit Claise <bclaise@cisco.com>, calato@riverstonenet.com,
        Simon Leinen <simon@limmat.switch.ch>, ipfix-req@net.doit.wisc.edu,
        ipfix-eval-team@net.doit.wisc.edu
Subject: RE: [ipfix-req] Re: Data Export Reliability Requirement [was:  Re
	:IPFIXRequireme nt draft status - section 6.3.2]
Date: Wed, 9 Oct 2002 10:42:24 -0700 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26FBB.3A1B9990"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26FBB.3A1B9990
Content-Type: text/plain;
	charset="iso-8859-1"

This one?

"As an example of data loss reporting, suppose that we are exporting a
single
metric and that the statistics on the exporter are:
     # flow records sent (not counting retransmitted) 1000
     # flow records ACKed                              900
     sum of metric all records                       10000
     sum of metric in all ACKed records               8000
From which we derive the following:
     average metric per record                          10
     average metric per ACKed record                     8.889
     average metric per un-ACKed record                 20
And on the receiver, we have:
     # flow records received (de-duplicated)           950
     sum of metric in all received records            9200
     average metric per received record                  9.684
The receiver notes that it did not receive 50 records; it can estimate the
sum of metric in these as 50 * 20 = 1000, for an estimated total of the
metric of 10200. (Something fancier could be done by using variance
calculations, combined with other metrics.)

[In CRANE, we provide two mechanisms for reporting loss:
 - the exporter can define an additional set of fields that it
   exports periodically with data loss values;
 - a status request from the collector, also reported as a set
   of fields.
 The content of these records is defined by the exporter, using the general
template mechanism.]

So, to sum up:
   - require application-level ACKs in the protocol (SHOULD be after
     data are persisted)
   - require enable de-duplication of received records
   - require mechanism for reporting data loss in the exporter -
     the details of this mechanism are outside the scope of the
     protocol except that the protocol must be general enough to
     allow them
   - individual information models (which use the flow export protocol)
     SHOULD describe data loss reporting"



------_=_NextPart_001_01C26FBB.3A1B9990
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] Re: Data Export Reliability Requirement [was:  =
Re:IPFIXRequireme nt draft status - section 6.3.2]</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>This one?</FONT>
</P>

<P><FONT SIZE=3D2>&quot;As an example of data loss reporting, suppose =
that we are exporting a single</FONT>
<BR><FONT SIZE=3D2>metric and that the statistics on the exporter =
are:</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; # flow records sent (not =
counting retransmitted) 1000</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; # flow records =
ACKed&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 900</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; sum of metric all =
records&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
10000</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; sum of metric in all ACKed =
records&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; 8000</FONT>
<BR><FONT SIZE=3D2>From which we derive the following:</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; average metric per =
record&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp; 10</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; average metric per ACKed =
record&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 8.889</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; average metric per un-ACKed =
record&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 20</FONT>
<BR><FONT SIZE=3D2>And on the receiver, we have:</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; # flow records received =
(de-duplicated)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; 950</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; sum of metric in all =
received =
records&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
; 9200</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; average metric per received =
record&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9.684</FONT>
<BR><FONT SIZE=3D2>The receiver notes that it did not receive 50 =
records; it can estimate the</FONT>
<BR><FONT SIZE=3D2>sum of metric in these as 50 * 20 =3D 1000, for an =
estimated total of the</FONT>
<BR><FONT SIZE=3D2>metric of 10200. (Something fancier could be done by =
using variance</FONT>
<BR><FONT SIZE=3D2>calculations, combined with other metrics.)</FONT>
</P>

<P><FONT SIZE=3D2>[In CRANE, we provide two mechanisms for reporting =
loss:</FONT>
<BR><FONT SIZE=3D2>&nbsp;- the exporter can define an additional set of =
fields that it</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; exports periodically with data loss =
values;</FONT>
<BR><FONT SIZE=3D2>&nbsp;- a status request from the collector, also =
reported as a set</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; of fields.</FONT>
<BR><FONT SIZE=3D2>&nbsp;The content of these records is defined by the =
exporter, using the general</FONT>
<BR><FONT SIZE=3D2>template mechanism.]</FONT>
</P>

<P><FONT SIZE=3D2>So, to sum up:</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; - require application-level ACKs in the =
protocol (SHOULD be after</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; data are persisted)</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; - require enable de-duplication of =
received records</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; - require mechanism for reporting data =
loss in the exporter -</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; the details of this =
mechanism are outside the scope of the</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; protocol except that the =
protocol must be general enough to</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; allow them</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; - individual information models (which =
use the flow export protocol)</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; SHOULD describe data loss =
reporting&quot;</FONT>
</P>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C26FBB.3A1B9990--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 13:53:34 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27256
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 13:53:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zKpL-000721-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 12:40:55 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zKpJ-00071r-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 12:40:53 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id NAA19394
	for <ipfix-eval@net.doit.wisc.edu>; Wed, 9 Oct 2002 13:52:37 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma019385; Wed, 9 Oct 02 13:52:30 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <S4ZYVXZV>; Wed, 9 Oct 2002 13:35:24 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA075841@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Wed, 9 Oct 2002 13:40:52 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C26FBB.038A55B5"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C26FBB.038A55B5
Content-Type: text/plain

Hi,

Comments inline.

> -----Original Message-----
> From: Jeff Meyer [mailto:jeffm@cup.hp.com]
... 
>   My advocacy for IPDR's XML-Schema based approach to data modelling
> is based on the following two shortcomings I see with MIBs as 
> they stand
> today for accounting information like IPFIX:
> 
>    1.  SMI's definition language is based on a subset of 
> ASN.1, although this has stood in good stead these years, I would submit
that the 
> toolset available
>      for processing XML documents is larger and will continue 
> to outpace ASN.1.     In the SMIng draft, the issues on p. 52 state:
>        
> 
>    Learn from ODL, XML, ODBMS -  Look at the ODL proposal from TINAC.
>       Look at the XML schema work from W3C.  Look at the ODBMS work.
> 
In order to properly understand context, it is important to identify WHICH
draft you are referring to, and to understand how that draft fits into the
work of the WG. The draft you reference is one proposal that has been
submitted to the WG for consideration. If I submitted a proposal to the
IPFIX WG and my proposal included a statement "learn from Fortran" that
wouldn't imply that the IPFIX WG agreed that Fortran was the language of
choice. If you look at the RFC produced by the SMING WG, which shows the
requirements that the WG agrees on, you will find no mention of XML.

That is not to say that the members of the WG aren't looking at XML and
other languages for good ideas (as the proceedings show), but they have
explicitly chosen to continue using ASN.1 until it is shown that ASN.1
cannot provide the necessary expressiveness. 

But I'm not arguing for ASN.1, nor am I arguing against XML. I believe the
benefit of having available tools must be considered when selecting a data
definition language.

> 
>  2. SMIv1 and v2 all require each use of an identifier to
>    have an OID bound to it.  In section 3.3 of the SMIng 
>    draft they explicitly state that OIDs should not be used
>    for any bindings other than SNMP or COPS.

An OID is simply a compact mechanism for identifying/addressing a data
element. The OID 1.3.6.1.2.25.3.6.1.1.6 is more compact on the wire than
iso.org.dod.internet.mib-2.host.hrDevice.hrDiskStorageTable.hrDiskStorageEnt
ry.hrDiskStorageAccess.6 (although obviously not as user-friendly).

The SMIng draft you cite is only an individual submission. They do not
explicitly state that OIDs should not be used for any bindings other than
SNMP or COPS. In the limited universe of mappings they discuss, only SNMP
and COPS/PR currently use OIDs. Protocol-specific mappings are done outside
the protocol-independent modeling portions in their proposed design. OIDs
should not be used in the protocol-independent modeling portions of their
design, because OIDs are protocol-specific.

Section 3.3 says:

   The ObjectIdentifier base type represents administratively assigned
   names for use with SNMP and COPS-PR.  This type SHOULD NOT be used in
   protocol independant SMIng modules.  It is meant to be used in SNMP
   and COPS-PR mappings of attributes of type Pointer (Section 3.2).
> 
>  So I believe that the IPDR XML-Schema subset defined today
> will address the needs of IPFIX.  I believe the proposed 
> protocol using this data model will efficiently address the
> transfer and other requirements.
> 
> > I am missing the point about how OIDs hinder fine-grained 
> counters. An 
> > OID is used to name an object such as a counter. I don't think the 
> > naming has a significant effect on how fine-grained the counter is. 
> > Are you asserting that somehow XML-naming better supports 
> fine-grained 
> > counters?
> >
> 
> If you want to define the information produced by IPFIX in a 
> MIB, then I 
> would
> expect it to be in the form of a table definition, since a given 
> category of IPFIX
> "records" will all have the same field information.
> 
> In defining a table in SNMP, you need to address SNMPs 
> requirement about
> being able to lexicographically order each information item.  So the 
> indexing
> scheme would need srcip,dstip,srcport,dstport and time at 
> least to make a
> unique index.
> 
> In the XML model you define the record information (using the 
> complexType
> declaration) and there is no requirement around defining an 
> indexing scheme.
> 
> So I not saying it couldn't be done, just that it introduces 
> information 
> which
> is not (in my opinion) useful for the IPFIX requirements.

That would be one way to design the table, but you could also define the
table with a unique integer index, so exporting a particular fine-grained
counter's value would require using a varbind with an OID to identify the
table, the column and the instance  (FlowTableEntry.FGCounter.4) plus the
type and value of the counter instance. 

The varbind does not require all the src,dst,etc information be encoded in
each counter update, althoguh you might want it reported once so the
receiver knows which flow the index refers to. If the difficulty of
multi-field lexicographical indexing is the answer, then I think the issue
is merely a misunderstanding of indexing requirements.

But let's talk about your proposal. How does using XML's complexType
declaration better support fine-grained counters? Can you compare how to
export the value of the same counter instance I used above using your
proposal? When you define XML record information, aren't you in fact
describing the equivalent of a row of SNMP data? and when you want to
reference a particular field, isn't that roughly the same as identifying a
table column in SNMP? and when you identify a counter instance in XML isn't
that roughly the same as identifying a counter instance in SNMP?

In either case, you need to identify the table, the field, and the instance
in order to identify the element whose value is being exported. So I'm not
seeing the difference.

> 
> > >    But the essential concept of MIBs, which SMIng is also
> > > looking at revising is important.
> >
> > I disagree that SMIng is looking at revising the essential 
> concept of 
> > MIBs. They are looking at revising the SMI to improve 
> ease-of-use and 
> > add object-orientation. The essential concept of MIBs as 
> "data models 
> > that are extensible without protocol changes" remains the same.
> >
> 
> One key revision is the restriction of OID usage to SNMP and COPS. 
>  IPFIX does
> not need OIDs.

I don't know anybody that is arguing for OIDs for IPFIX. I'm merely trying
to understand the points of your initial mail, and to correct
misunderstandings of what SMIng is doing.

As mentioned above, the draft you read is only one proposal, and it has
placed a restriction on its own design. The SMING WG is making no such
revision to mibs, nor are they revising the essential concept of mibs; they
are merely extending the SMI to be more expressive and user-friendly.

dbh


------_=_NextPart_001_01C26FBB.038A55B5
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DUS-ASCII">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Discussion of Candidate Protocols</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hi,</FONT>
</P>

<P><FONT SIZE=3D2>Comments inline.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Jeff Meyer [<A =
HREF=3D"mailto:jeffm@cup.hp.com">mailto:jeffm@cup.hp.com</A>]</FONT>
<BR><FONT SIZE=3D2>... </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; My advocacy for IPDR's XML-Schema =
based approach to data modelling</FONT>
<BR><FONT SIZE=3D2>&gt; is based on the following two shortcomings I =
see with MIBs as </FONT>
<BR><FONT SIZE=3D2>&gt; they stand</FONT>
<BR><FONT SIZE=3D2>&gt; today for accounting information like =
IPFIX:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; 1.&nbsp; SMI's definition =
language is based on a subset of </FONT>
<BR><FONT SIZE=3D2>&gt; ASN.1, although this has stood in good stead =
these years, I would submit that the </FONT>
<BR><FONT SIZE=3D2>&gt; toolset available</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; for processing =
XML documents is larger and will continue </FONT>
<BR><FONT SIZE=3D2>&gt; to outpace ASN.1.&nbsp;&nbsp;&nbsp;&nbsp; In =
the SMIng draft, the issues on p. 52 state:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Learn from ODL, XML, ODBMS =
-&nbsp; Look at the ODL proposal from TINAC.</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Look at the =
XML schema work from W3C.&nbsp; Look at the ODBMS work.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>In order to properly understand context, it is =
important to identify WHICH draft you are referring to, and to =
understand how that draft fits into the work of the WG. The draft you =
reference is one proposal that has been submitted to the WG for =
consideration. If I submitted a proposal to the IPFIX WG and my =
proposal included a statement &quot;learn from Fortran&quot; that =
wouldn't imply that the IPFIX WG agreed that Fortran was the language =
of choice. If you look at the RFC produced by the SMING WG, which shows =
the requirements that the WG agrees on, you will find no mention of =
XML.</FONT></P>

<P><FONT SIZE=3D2>That is not to say that the members of the WG aren't =
looking at XML and other languages for good ideas (as the proceedings =
show), but they have explicitly chosen to continue using ASN.1 until it =
is shown that ASN.1 cannot provide the necessary expressiveness. =
</FONT></P>

<P><FONT SIZE=3D2>But I'm not arguing for ASN.1, nor am I arguing =
against XML. I believe the benefit of having available tools must be =
considered when selecting a data definition language.</FONT></P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; 2. SMIv1 and v2 all require each use of =
an identifier to</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; have an OID bound to =
it.&nbsp; In section 3.3 of the SMIng </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; draft they explicitly state =
that OIDs should not be used</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; for any bindings other than =
SNMP or COPS.</FONT>
</P>

<P><FONT SIZE=3D2>An OID is simply a compact mechanism for =
identifying/addressing a data element. The OID 1.3.6.1.2.25.3.6.1.1.6 =
is more compact on the wire than</FONT></P>

<P><FONT =
SIZE=3D2>iso.org.dod.internet.mib-2.host.hrDevice.hrDiskStorageTable.hrD=
iskStorageEntry.hrDiskStorageAccess.6 (although obviously not as =
user-friendly).</FONT></P>

<P><FONT SIZE=3D2>The SMIng draft you cite is only an individual =
submission. They do not explicitly state that OIDs should not be used =
for any bindings other than SNMP or COPS. In the limited universe of =
mappings they discuss, only SNMP and COPS/PR currently use OIDs. =
Protocol-specific mappings are done outside the protocol-independent =
modeling portions in their proposed design. OIDs should not be used in =
the protocol-independent modeling portions of their design, because =
OIDs are protocol-specific.</FONT></P>

<P><FONT SIZE=3D2>Section 3.3 says:</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; The ObjectIdentifier base type =
represents administratively assigned</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; names for use with SNMP and =
COPS-PR.&nbsp; This type SHOULD NOT be used in</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; protocol independant SMIng =
modules.&nbsp; It is meant to be used in SNMP</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; and COPS-PR mappings of attributes of =
type Pointer (Section 3.2).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; So I believe that the IPDR XML-Schema =
subset defined today</FONT>
<BR><FONT SIZE=3D2>&gt; will address the needs of IPFIX.&nbsp; I =
believe the proposed </FONT>
<BR><FONT SIZE=3D2>&gt; protocol using this data model will efficiently =
address the</FONT>
<BR><FONT SIZE=3D2>&gt; transfer and other requirements.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I am missing the point about how OIDs =
hinder fine-grained </FONT>
<BR><FONT SIZE=3D2>&gt; counters. An </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; OID is used to name an object such as a =
counter. I don't think the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; naming has a significant effect on how =
fine-grained the counter is. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Are you asserting that somehow XML-naming =
better supports </FONT>
<BR><FONT SIZE=3D2>&gt; fine-grained </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; counters?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; If you want to define the information produced =
by IPFIX in a </FONT>
<BR><FONT SIZE=3D2>&gt; MIB, then I </FONT>
<BR><FONT SIZE=3D2>&gt; would</FONT>
<BR><FONT SIZE=3D2>&gt; expect it to be in the form of a table =
definition, since a given </FONT>
<BR><FONT SIZE=3D2>&gt; category of IPFIX</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;records&quot; will all have the same =
field information.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; In defining a table in SNMP, you need to =
address SNMPs </FONT>
<BR><FONT SIZE=3D2>&gt; requirement about</FONT>
<BR><FONT SIZE=3D2>&gt; being able to lexicographically order each =
information item.&nbsp; So the </FONT>
<BR><FONT SIZE=3D2>&gt; indexing</FONT>
<BR><FONT SIZE=3D2>&gt; scheme would need srcip,dstip,srcport,dstport =
and time at </FONT>
<BR><FONT SIZE=3D2>&gt; least to make a</FONT>
<BR><FONT SIZE=3D2>&gt; unique index.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; In the XML model you define the record =
information (using the </FONT>
<BR><FONT SIZE=3D2>&gt; complexType</FONT>
<BR><FONT SIZE=3D2>&gt; declaration) and there is no requirement around =
defining an </FONT>
<BR><FONT SIZE=3D2>&gt; indexing scheme.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; So I not saying it couldn't be done, just that =
it introduces </FONT>
<BR><FONT SIZE=3D2>&gt; information </FONT>
<BR><FONT SIZE=3D2>&gt; which</FONT>
<BR><FONT SIZE=3D2>&gt; is not (in my opinion) useful for the IPFIX =
requirements.</FONT>
</P>

<P><FONT SIZE=3D2>That would be one way to design the table, but you =
could also define the table with a unique integer index, so exporting a =
particular fine-grained counter's value would require using a varbind =
with an OID to identify the table, the column and the instance&nbsp; =
(FlowTableEntry.FGCounter.4) plus the type and value of the counter =
instance. </FONT></P>

<P><FONT SIZE=3D2>The varbind does not require all the src,dst,etc =
information be encoded in each counter update, althoguh you might want =
it reported once so the receiver knows which flow the index refers to. =
If the difficulty of multi-field lexicographical indexing is the =
answer, then I think the issue is merely a misunderstanding of indexing =
requirements.</FONT></P>

<P><FONT SIZE=3D2>But let's talk about your proposal. How does using =
XML's complexType declaration better support fine-grained counters? Can =
you compare how to export the value of the same counter instance I used =
above using your proposal? When you define XML record information, =
aren't you in fact describing the equivalent of a row of SNMP data? and =
when you want to reference a particular field, isn't that roughly the =
same as identifying a table column in SNMP? and when you identify a =
counter instance in XML isn't that roughly the same as identifying a =
counter instance in SNMP?</FONT></P>

<P><FONT SIZE=3D2>In either case, you need to identify the table, the =
field, and the instance in order to identify the element whose value is =
being exported. So I'm not seeing the difference.</FONT></P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp; But the essential =
concept of MIBs, which SMIng is also</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; looking at revising is =
important.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I disagree that SMIng is looking at =
revising the essential </FONT>
<BR><FONT SIZE=3D2>&gt; concept of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; MIBs. They are looking at revising the SMI =
to improve </FONT>
<BR><FONT SIZE=3D2>&gt; ease-of-use and </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; add object-orientation. The essential =
concept of MIBs as </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;data models </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that are extensible without protocol =
changes&quot; remains the same.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; One key revision is the restriction of OID =
usage to SNMP and COPS. </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; IPFIX does</FONT>
<BR><FONT SIZE=3D2>&gt; not need OIDs.</FONT>
</P>

<P><FONT SIZE=3D2>I don't know anybody that is arguing for OIDs for =
IPFIX. I'm merely trying to understand the points of your initial mail, =
and to correct misunderstandings of what SMIng is doing.</FONT></P>

<P><FONT SIZE=3D2>As mentioned above, the draft you read is only one =
proposal, and it has placed a restriction on its own design. The SMING =
WG is making no such revision to mibs, nor are they revising the =
essential concept of mibs; they are merely extending the SMI to be more =
expressive and user-friendly.</FONT></P>

<P><FONT SIZE=3D2>dbh</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C26FBB.038A55B5--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 14:31:08 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA28705
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 14:31:07 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zLU5-0000Ux-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 13:23:01 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zLU3-0000TQ-00; Wed, 09 Oct 2002 13:22:59 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g99IMRIn028008;
	Wed, 9 Oct 2002 11:22:27 -0700 (PDT)
Date: Wed, 9 Oct 2002 11:22:27 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Reinaldo Penno <rpenno@nortelnetworks.com>
cc: Peter Ludemann <peter.ludemann@xacct.com>,
        Benoit Claise <bclaise@cisco.com>, <calato@riverstonenet.com>,
        Simon Leinen <simon@limmat.switch.ch>, <ipfix-req@net.doit.wisc.edu>,
        <ipfix-eval-team@net.doit.wisc.edu>
Subject: RE: [ipfix-req] Re: Data Export Reliability Requirement [was: 
 Re:IPFIXRequireme nt draft status - section 6.3.2]
In-Reply-To: <7B802811BE77D51189910002A55CFD2C042EED9E@zsc3c032.us.nortel.com>
Message-ID: <Pine.GSO.4.44.0210091111470.26778-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Please see inline

On Wed, 9 Oct 2002, Reinaldo Penno wrote:

> This one?
>
> "As an example of data loss reporting, suppose that we are exporting a
> single
> metric and that the statistics on the exporter are:
>      # flow records sent (not counting retransmitted) 1000
>      # flow records ACKed                              900
>      sum of metric all records                       10000
>      sum of metric in all ACKed records               8000
> From which we derive the following:
>      average metric per record                          10
>      average metric per ACKed record                     8.889
>      average metric per un-ACKed record                 20
> And on the receiver, we have:
>      # flow records received (de-duplicated)           950
>      sum of metric in all received records            9200
>      average metric per received record                  9.684
> The receiver notes that it did not receive 50 records; it can estimate the
> sum of metric in these as 50 * 20 = 1000, for an estimated total of the
> metric of 10200. (Something fancier could be done by using variance
> calculations, combined with other metrics.)
>
> [In CRANE, we provide two mechanisms for reporting loss:
>  - the exporter can define an additional set of fields that it
>    exports periodically with data loss values;
>  - a status request from the collector, also reported as a set
>    of fields.
>  The content of these records is defined by the exporter, using the general
> template mechanism.]

With Netflow Version 9 we can export Total number of export packets and
flow records sent using Option templates. For the example above with
Version 9 we can report

  -Total number of records sent
  -If configured on the exporter we can send sum of metric of all records

Collector can get an idea of average metric per record and
apply same value to missed records (missed records = Number of records
sent - Number of records received)

-vamsi

>
> So, to sum up:
>    - require application-level ACKs in the protocol (SHOULD be after
>      data are persisted)
>    - require enable de-duplication of received records
>    - require mechanism for reporting data loss in the exporter -
>      the details of this mechanism are outside the scope of the
>      protocol except that the protocol must be general enough to
>      allow them
>    - individual information models (which use the flow export protocol)
>      SHOULD describe data loss reporting"
>
>
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct  9 18:00:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06061
	for <ipfix-archive@lists.ietf.org>; Wed, 9 Oct 2002 18:00:56 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zOk9-000676-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 09 Oct 2002 16:51:49 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zOk8-00066t-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 09 Oct 2002 16:51:48 -0500
Received: from mira-sjcd-1.cisco.com (IDENT:mirapoint@mira-sjcd-1.cisco.com [171.69.43.44])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g99LpHIm013459;
	Wed, 9 Oct 2002 14:51:17 -0700 (PDT)
Received: from cisco.com (dhcp-171-71-137-27.cisco.com [171.71.137.27])
	by mira-sjcd-1.cisco.com (Mirapoint Messaging Server MOS 3.1.0.66-GA)
	with ESMTP id AAN35585;
	Wed, 9 Oct 2002 14:52:12 -0700 (PDT)
Message-ID: <3DA4A4D6.6E7787E6@cisco.com>
Date: Wed, 09 Oct 2002 14:51:18 -0700
From: Ganesh Sadasivan <gsadasiv@cisco.com>
X-Mailer: Mozilla 4.76 [en]C-CCK-MCD   (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data model; 
 broadcast vs reliable
References: <AMEKJFAIEIKCBNABBMPNEEKODHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit



Peter Ludemann wrote:

> This note discusses two things:
>  - whether we need a data model to define the protocol
>    (I claim that we do not)

Agreed.

>
>  - cost of UDP broadcast vs minimalist reliable transport
>    (I claim that there is very little difference)

What do you mean by "minimalist reliable transport" ?
Since congestion awareness is mandatory, I don't know
why UDP is a topic of discussion here. See my comments inline.

>
>
> calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
>
> > Peter Ludemann wrote:
> [snip]
> > > YES ... so, can we all agree that data model issues are not
> > > part of this discussion?
> >
> >       No. We have no interoperability without a data model.
>
> I agree that we need a data model. I don't see why it should affect the
> discussion of the export protocol. The only requirements on the export
> protocol are that it exhibit the desired reliability and efficiency; and
> that it be able to transport all the data types required by the data models.
> If we can agree on all the data types, then we can define the protocol; this
> does not require defining the entire data model.
>
> [After all, SNMP is defined independently of the various MIBs - which
> correspond to the data model]
>
> >       No. Generalized data movers are not the problem.
> >       Defining a protocol that is well defined enough so
> >       that many device vendors can export data and many
> >       application vendors can process the data regardless
> >       of the device is problematic if all you define is a
> >       general purpose data mover.
>
> But deciding on an adequate "generalized data mover" is the point of this
> evaluation process, I thought. I expect that there will be multiple data
> models, for the various kinds of generalized devices. (e.g., for our probe,
> we've defined three generic groupings of data: volume metrics; QoS metrics;
> usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> RADIUS's vendor-specific attributes).
>
> There is one place where the nature of the data might intersect with the
> protocol -- the high-volume metrics such as exported by NetFlow; and where
> the claim is that a reliable protocol is an unnecessary overhead. So, let me
> discuss this a bit more.
>
> The argument is that with high volume export it is preferable to do
> multi-cast UDP with sequence numbers; data loss can be detected by noting
> which sequence numbers are missing ... and reliability can be increased by
> having multiple receivers and de-duplicating what they receive.

One does not need to multicast UDP to indicate missing reliability.

>
>
> For such a situation, the reliable protocol's *implementation* would not
> keep a queue of data to retransmit on fail-over; it would only keep enough
> buffer to deal with TCP's or SCTP's flow control and to handle bursts of
> records. ACKs would be used only to notice when data are not received at the
> other end and to cause fail-over. TCP "write would block" also causes
> fail-over.

So records can be lost in both cases. Also in a continuous export (in the case of

high volume export) the rate of ACKs is once every 2 send packets.

>
>
> I would argue that the cost of exporting this way is very similar to that of
> the UDP broadcast.

Are you talking w.r.t the end-point (exporter & collector) or the network itself.

For the former, the processing overhead is much higher in TCP.

> And on the receiving end, it is *much* easier to handle
> than a UDP-broadcast, which also needs stronger hardware because of the
> higher de-duplication load.
>
> Can be about the same for both:
> - data copying (if scatter/gather is used)
> - protocol overhead (sequence number, template ID, etc.)

In a typical datapath the instruction ration of UDP to TCP is
multi-fold. I don't know how you can tell that the protocol
overhead is the same.

>
>
> The possible extra cost of the "reliable" export version is:
> - timer for noticing when ACK isn't received [trivial cost]
> - TCP vs UDP (little difference with modern implementations)
> - TCP retransmit with packet loss (typically very low)
> - cost of fail-over when no ACK received or write would block
>
> The savings and benefits of the "reliable" version are:
> - fewer packet writes (broadcast requires 2x as many packets;
>   and TCP can pack more efficiently because records can
>   span packets)

As mentioned above if the  absence of reliability is what we want,
then we need not do a UDP broadcast.

>
> - lower network traffic (which adds to reliability)

>
> - smaller machines for receiving

what does this mean?
thanks
Ganesh

>
> - more accurate estimate of loss due to lack of reliability
> - can handle congestion
>
> [As an aside, even with the UDP-broadcast version, the exporter ought to
> compute totals for the various metrics and output those from time to time,
> to provide a more accurate understanding of data loss. Perhaps such totals
> are already available in the MIBs, but there remains the issue of how to
> correlate with the sequence numbers of the exported data.]
>
> - peter
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 03:23:03 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA24493
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 03:23:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zXHv-0004cm-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 01:59:15 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17zXHo-0004cX-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 01:59:12 -0500
Received: (qmail 25743 invoked from network); 10 Oct 2002 06:59:03 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 10 Oct 2002 06:59:03 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9A72Fs03456;
	Thu, 10 Oct 2002 00:02:15 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <calato@riverstonenet.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;   broadcast vs reliable
Date: Wed, 9 Oct 2002 23:59:03 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNCEODDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <3DA43944.60264032@riverstonenet.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote Wednesday, October 09, 2002 7:12 AM:
> 	In my mind the data model for a stream does share some
> 	characteristics with a data model of a database.
> 
> 	However, and I'm no data modeling expert, it seems to me that
> 	with a database you have a representation of information
> 	in an existing data set. With a stream you have a represention
> 	spread out over time. I don't mean timestamps, I mean the time 
> 	between delivery of one message and delivery of another.

I don't understand the point; if you want time intervals, you can
just subtract the timestamps. This is provided by SQL extensions
from Oracle and Teradata, amongst others; or by use of stored
procedures.

(If you're talking about jitter ... this is a flow-specific value
and would be output as a variance parameter with the flow.)
 
> > Maybe I missed something in all the emails, but I thought that
> > the export data was to be one record per "flow". 
> 
> 	Exactly the point of why we need to have the data model.
> 	One of the questions answered by that is whether or not
> 	a flow is represented in a single message or over a set
> 	of messages.
> 	
> 	For example, with long standing flows why do I need to repeat 
> 	all the flow attributes when I just want to update the byte 
> 	count? I'm not advocating one position or another in this
> 	particular issue, I'm just using it to show how the data model	
> 	affects the protocol.

This sounds like the classic master/detail database design (the name
derives from a typical invoice which has a number of line items
and a summary with the totals, name and address, etc.). The master
and detail records are distinguished by a "type" field which would
allow streaming into different database tables; and the two kinds
of records are tied together by the flow ID.

So, as long as the protocol allows more than one kind of record
to be output, this can be done. No need to duplicate data
unnecessarily.

[snip: my description of how to slice a flow over time]

> 	Again, how it is represented in a database may not
> 	be the best way to represent it in a stream.

Given that we can need to transmit only the data that are needed,
I don't see the problem. My example had some fields repeated for
every record; but it could have easily been done with the
master/detail style to reduce the amount of data.
 
> > How does "message to synchronize timestamps" fit into the
> > data model? The timestamp fields are just values, whose
> > definition is determined by an agreement between the
> > exporter and the collector (is it local time or UTC?
> > accuracy? synchronized with other data sources? etc.)
> 
> 	Lets suppose there is an option, for small devices,
> 	to report time in terms of sysuptime. The collector
> 	has 2 choices. 1) It can assume the message was delivered
> 	relatively quickly and use its current time. 2) If the
> 	protocol provides a way to obtain the sysuptime to
> 	current time it can use that info for all subsequent
> 	messages.
>
> 	If I don't have view into the data being sent and
> 	its meaning, how do I know the protocol needs
> 	to have support for option #2?

Why do you need the collector to ask the device about its
notion of the time? You could just as easily define a record
which reports the device's idea of the time. With a reliable
protocol, the information is guaranteed delivered.

Anyway, CRANE allows both possibilities: the STATUS REQ
message from the collector is answered by an arbitrary
record, which could include such information. (That is,
CRANE is designed to work primarily in push mode, but allows
pull when needed ... perhaps "STATUS" is a bit of a misnomer.)

[CRANE also has the device report its idea of boot time as
part of the initial handshake ... that information was intended
for de-duplication in case the device rebooted; but obviously
the boot time can also be used to compute times from sysuptime.
But I'd hardly accept or reject any protocol for the absence
or presence of this feature, as long as there is some method
of distinguishing records across re-boot]

> > Encryption ... that should be specified by the templates
> > or field definitions during the data definition - just
> > specify whether particular records or fields within
> > records ought to be encrypted.
> 
> 	You seem to peer down into the data being sent
> 	when it is convenient to do so. 

It just seems to me that whoever defines the data is
the best person to decide on encryption needs.
 
> 	How did you know the protocol needed to offer 
> 	encryption features?

I don't understand ... anyway, our general view is that
encryption should be provided by IPsec (the principal
of layering).

My experience with databases is that fine control of access
to fields is difficult to do. David Harrington's comments on
this have merit; but they go far beyond just the data export
and collection - there is also access to data once it's collected.

This certainly gives us something to discuss at future WG meetings. :-)

> 	Why did you allow individual fields to be encrypted?
> 	Do we really need that level of granularity and
> 	complexity?

CRANE doesn't even have encryption; as mentioned above we
suggest the use of IPsec.

> 	Why are templates providing encryption information?
> 	Why not just use IPsec and have no knowledge in
> 	the protocol at all? 
> 
> 	General data movers will provide lots of features 
> 	to fit a wide variety of applications. IPFIX data
> 	movers will provide features optimized for providing
> 	IP flow data.

But all the proposals are extensible to some degree, so they
are general data movers to that extent. I don't see how being
"general" is any kind of disadvantage for a protocol, as long
as it doesn't introduce unnecessary overhead.

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 03:23:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA24506
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 03:23:14 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zXN9-0004xL-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 02:04:39 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 17zXN7-0004xA-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 02:04:37 -0500
Received: (qmail 26077 invoked from network); 10 Oct 2002 07:04:33 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 10 Oct 2002 07:04:33 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9A77ks08018;
	Thu, 10 Oct 2002 00:07:46 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Ganesh Sadasivan" <gsadasiv@cisco.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;  broadcast vs reliable
Date: Thu, 10 Oct 2002 00:04:34 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNIEODDHAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <3DA4A4D6.6E7787E6@cisco.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Sorry for bringing up the topic of UDP ... I mis-read a thread and thought
that UDP was coming back on the table.

It is not clear to me how any protocol that does not contain
application-level ACKs can be fully reliable, even if layered over TCP or
SCTP. This is because the transport-layer acknowledgment only means that the
data have arrived at the other machine, not that the application has
actually processed it. (There's nothing preventing a TCP or SCTP stack from
allowing application-level acknowledgment; but I'm not aware of any for TCP
and my reading of the API in RFC 2960 indicates that the acknowledgment is
transport-level.)

As to my comment about UDP vs TCP for performance ... this is probably
irrelevant for the current discussion because the proposal is that IPFIX
would use NetFlow over TCP or SCTP. In such a case, a UDP-with-reliability
protocol (which NetFlow isn't; but, for example, NFS is) ends up being about
the same performance as TCP. Clearly, the path length with pure UDP would be
less than for TCP because UDP is just "fire and forget". However, if
broadcast is being used to increase reliability (as Ganesh points out, this
isn't necessary; but if there is no ACK mechanism, then the only choice is
to broadcast to all collectors), then the path length increases. Whether
outputting 2 UDP packets is a longer or shorter instruction path length than
sending a single TCP packet, I don't know.

Slight change of subject: could NetFlow be easily extended to handle data
that isn't fixed-length (e.g., HTTP URLs)? I know that in NetFlow's current
use, there's no need for such attribute export; but there are smart devices
that look deeper into packets for smart switching or firewalling, which can
use such information and might want to export it. [Probes can also export
such information.]

Time for me to shut up and go on vacation.

- peter

> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> Of Ganesh Sadasivan
> Sent: Wednesday, October 09, 2002 2:51 PM
> To: Peter Ludemann
> Cc: ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data
> model; broadcast vs reliable
>
>
>
>
> Peter Ludemann wrote:
>
> > This note discusses two things:
> >  - whether we need a data model to define the protocol
> >    (I claim that we do not)
>
> Agreed.
>
> >
> >  - cost of UDP broadcast vs minimalist reliable transport
> >    (I claim that there is very little difference)
>
> What do you mean by "minimalist reliable transport" ?
> Since congestion awareness is mandatory, I don't know
> why UDP is a topic of discussion here. See my comments inline.
>
> >
> >
> > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> >
> > > Peter Ludemann wrote:
> > [snip]
> > > > YES ... so, can we all agree that data model issues are not
> > > > part of this discussion?
> > >
> > >       No. We have no interoperability without a data model.
> >
> > I agree that we need a data model. I don't see why it should affect the
> > discussion of the export protocol. The only requirements on the export
> > protocol are that it exhibit the desired reliability and efficiency; and
> > that it be able to transport all the data types required by the
> data models.
> > If we can agree on all the data types, then we can define the
> protocol; this
> > does not require defining the entire data model.
> >
> > [After all, SNMP is defined independently of the various MIBs - which
> > correspond to the data model]
> >
> > >       No. Generalized data movers are not the problem.
> > >       Defining a protocol that is well defined enough so
> > >       that many device vendors can export data and many
> > >       application vendors can process the data regardless
> > >       of the device is problematic if all you define is a
> > >       general purpose data mover.
> >
> > But deciding on an adequate "generalized data mover" is the
> point of this
> > evaluation process, I thought. I expect that there will be multiple data
> > models, for the various kinds of generalized devices. (e.g.,
> for our probe,
> > we've defined three generic groupings of data: volume metrics;
> QoS metrics;
> > usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> > RADIUS's vendor-specific attributes).
> >
> > There is one place where the nature of the data might intersect with the
> > protocol -- the high-volume metrics such as exported by
> NetFlow; and where
> > the claim is that a reliable protocol is an unnecessary
> overhead. So, let me
> > discuss this a bit more.
> >
> > The argument is that with high volume export it is preferable to do
> > multi-cast UDP with sequence numbers; data loss can be detected
> by noting
> > which sequence numbers are missing ... and reliability can be
> increased by
> > having multiple receivers and de-duplicating what they receive.
>
> One does not need to multicast UDP to indicate missing reliability.
>
> >
> >
> > For such a situation, the reliable protocol's *implementation* would not
> > keep a queue of data to retransmit on fail-over; it would only
> keep enough
> > buffer to deal with TCP's or SCTP's flow control and to handle bursts of
> > records. ACKs would be used only to notice when data are not
> received at the
> > other end and to cause fail-over. TCP "write would block" also causes
> > fail-over.
>
> So records can be lost in both cases. Also in a continuous export
> (in the case of
>
> high volume export) the rate of ACKs is once every 2 send packets.
>
> >
> >
> > I would argue that the cost of exporting this way is very
> similar to that of
> > the UDP broadcast.
>
> Are you talking w.r.t the end-point (exporter & collector) or the
> network itself.
>
> For the former, the processing overhead is much higher in TCP.
>
> > And on the receiving end, it is *much* easier to handle
> > than a UDP-broadcast, which also needs stronger hardware because of the
> > higher de-duplication load.
> >
> > Can be about the same for both:
> > - data copying (if scatter/gather is used)
> > - protocol overhead (sequence number, template ID, etc.)
>
> In a typical datapath the instruction ration of UDP to TCP is
> multi-fold. I don't know how you can tell that the protocol
> overhead is the same.
>
> >
> >
> > The possible extra cost of the "reliable" export version is:
> > - timer for noticing when ACK isn't received [trivial cost]
> > - TCP vs UDP (little difference with modern implementations)
> > - TCP retransmit with packet loss (typically very low)
> > - cost of fail-over when no ACK received or write would block
> >
> > The savings and benefits of the "reliable" version are:
> > - fewer packet writes (broadcast requires 2x as many packets;
> >   and TCP can pack more efficiently because records can
> >   span packets)
>
> As mentioned above if the  absence of reliability is what we want,
> then we need not do a UDP broadcast.
>
> >
> > - lower network traffic (which adds to reliability)
>
> >
> > - smaller machines for receiving
>
> what does this mean?
> thanks
> Ganesh
>
> >
> > - more accurate estimate of loss due to lack of reliability
> > - can handle congestion
> >
> > [As an aside, even with the UDP-broadcast version, the exporter ought to
> > compute totals for the various metrics and output those from
> time to time,
> > to provide a more accurate understanding of data loss. Perhaps
> such totals
> > are already available in the MIBs, but there remains the issue of how to
> > correlate with the sequence numbers of the exported data.]
> >
> > - peter
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 04:46:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA25693
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 04:46:15 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zYpp-0007cl-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 03:38:21 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zYpn-0007ca-00
	for ipfix-req@net.doit.wisc.edu; Thu, 10 Oct 2002 03:38:19 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9A8be707860;
	Thu, 10 Oct 2002 10:37:40 +0200 (CEST)
Message-ID: <3DA53C53.8000701@cisco.com>
Date: Thu, 10 Oct 2002 10:37:39 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        Simon Leinen
 <simon@limmat.switch.ch>,
        req <ipfix-req@net.doit.wisc.edu>
Subject: Re: drop MPLS from the requirement (was  [ipfix-req]  Requirementsdrafts,NATed
 flows and VPNs)
References: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com> <3DA42D9E.1080209@cisco.com> <3DA44199.41211CB8@riverstonenet.com> <3DA44834.4030706@cisco.com> <3DA4531C.F489E0C6@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

>>>>        
>>>>
>>>      Just a question. In the core all you have is the label to
>>>      distinguish by. You might be able to get the FEC info
>>>      but are there other attributes which can be reported?
>>>
>>>      
>>>
>>which can be reported? Yes.
>>For example: underlying label(s), experimental bits, 
>>    
>>
>
>	OK.
>
>  
>
>>flow records about the underlying packets, etc...
>>
>>    
>>
>	Not sure  what you mean here can you elaborate?
>
>	I couldn't think of any packet level attributes
>	to report which is why I'm trying to get more of
>	a handle on this.
>  
>
Let's take the example of MPLS/VPN.
You may want to report the top label FEC, the second label (VPN), the 
TOS and the Src/Dst IP of the IP packet below the labels... depending 
what you intend to do with the flow records.

Regards, Benoit.



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 08:31:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA00711
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 08:31:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zcG0-00079F-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 07:17:36 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zcFx-00078a-00
	for ipfix-req@net.doit.wisc.edu; Thu, 10 Oct 2002 07:17:33 -0500
Received: from riverstonenet.com ([134.141.180.77]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Thu, 10 Oct 2002 05:17:01 -0700
Message-ID: <3DA56F48.ED436E82@riverstonenet.com>
Date: Thu, 10 Oct 2002 08:15:04 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>,
        Simon Leinen <simon@limmat.switch.ch>,
        req <ipfix-req@net.doit.wisc.edu>
Subject: Re: drop MPLS from the requirement (was  [ipfix-req]  
 Requirementsdrafts,NATedflows and VPNs)
References: <7B802811BE77D51189910002A55CFD2C0426C5EF@zsc3c032.us.nortel.com> <3DA42D9E.1080209@cisco.com> <3DA44199.41211CB8@riverstonenet.com> <3DA44834.4030706@cisco.com> <3DA4531C.F489E0C6@riverstonenet.com> <3DA53C53.8000701@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 10 Oct 2002 12:17:01.0703 (UTC) FILETIME=[F0126170:01C27056]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Benoit Claise wrote:
> 
> Paul,
> 
> >>>>
> >>>>
> >>>      Just a question. In the core all you have is the label to
> >>>      distinguish by. You might be able to get the FEC info
> >>>      but are there other attributes which can be reported?
> >>>
> >>>
> >>>
> >>which can be reported? Yes.
> >>For example: underlying label(s), experimental bits,
> >>
> >>
> >
> >       OK.
> >
> >
> >
> >>flow records about the underlying packets, etc...
> >>
> >>
> >>
> >       Not sure  what you mean here can you elaborate?
> >
> >       I couldn't think of any packet level attributes
> >       to report which is why I'm trying to get more of
> >       a handle on this.
> >
> >
> Let's take the example of MPLS/VPN.
> You may want to report the top label FEC, the second label (VPN), the
> TOS and the Src/Dst IP of the IP packet below the labels... depending
> what you intend to do with the flow records.

	This is where I get confused. I thought at the transit switches
	(which I assume is what the switches in the core are) the packet 
	was switched based solely on the label. So the src/dst IP can change 
	from packet to packet.  I guess it is possible to still decode more
	of the packet but that kind of defeats the purpose of MPLS.

	Paul

	

> 
> Regards, Benoit.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 09:50:45 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA04188
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 09:50:45 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zdaK-0001b4-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 08:42:40 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zdaH-0001aS-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 08:42:38 -0500
Received: from riverstonenet.com ([134.141.180.77]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Thu, 10 Oct 2002 06:42:06 -0700
Message-ID: <3DA58339.DF0F38B9@riverstonenet.com>
Date: Thu, 10 Oct 2002 09:40:09 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;   
 broadcast vs reliable
References: <AMEKJFAIEIKCBNABBMPNCEODDHAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 10 Oct 2002 13:42:06.0816 (UTC) FILETIME=[D2F4CE00:01C27062]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

In order to follow one idea from start to end, here are several excerpts
from
our exchange so far...

Peter:
------
> I agree that we need a data model. I don't see why it should affect the
> discussion of the export protocol.

Paul
----
>         If I don't have a data model, how do I evaluate whether or not
>         message ordering is a problem?

Peter
----
> Maybe I missed something in all the emails, but I thought that
> the export data was to be one record per "flow".

Paul
----
>         For example, with long standing flows why do I need to repeat 
>         all the flow attributes when I just want to update the byte 
>         count? I'm not advocating one position or another in this
>         particular issue, I'm just using it to show how the data model  
>         affects the protocol.

Peter
-----
> So, as long as the protocol allows more than one kind of record
> to be output, this can be done. No need to duplicate data
> unnecessarily.



        Now we have a message ordering problem which needs to be
addressed.
        Either sequence numbers need to be introduced into the messages
or
        a reliable transport is needed.

        If IPFIX's data model does not allow the splitting up of
information
        then then there is no ordering problem and no requirement for
sequence
        numbers or a reliable transport (at least not driven by the data
model).

        This is not the only example of the data model imposing
requirements
        on the protocol. But if I can show one, I'm hoping you'll agree
that
        there must be others.

        Paul

        P.S. - you can have the last word when you get back from
vacation :-)

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 13:53:30 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA17667
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 13:53:29 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zhHD-00002o-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 12:39:11 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zhHA-00001u-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 12:39:08 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9AHcbIn021372;
	Thu, 10 Oct 2002 10:38:37 -0700 (PDT)
Date: Thu, 10 Oct 2002 10:38:37 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Carter Bullard <carter@qosient.com>
cc: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
Message-ID: <Pine.GSO.4.44.0210101035050.4915-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Hi Carter,

On Thu, 3 Oct 2002, Carter Bullard wrote:

> Hey Mike,
>    Thanks, but I want to note that netflow cannot support
> much in the way of extensions, so simply describing existing
> practice and defining a standard to support those observations
> is not going to do the job for my customers.

sorry for bringing this up late but are you saying even with netflow
version 9 we cannot provide support for additional features??? Have you
considered Option template secyion in version 9 Spec???

thanks
-vamsi

>
>    In writing this response I found myself criticizing LFAP
> quite a bit, and I didn't really want to do that, but I'm going to
> leave some of my issues in hopes that it will help the process.
> I hope that some do find it useful, and I welcome any comment.
>
>    One question.  None of the candidates are perfect.  If we
> adopt one, what will be the process that we go through to
> 'correct' any issues?  I'm sure it has been described, but
> could someone paraphrase?
>
> Thanks,
>
> Carter
>
>
> Comments on LFAP as IPFIX candidate.
>
>
> I don't see that LFAP is a solution to the flow record transport
> problems that I worry about, which is the efficient, reliable
> and secure transport of any vendors flow records, and I'm
> particularly concerned with at least one of the basic architectural
> positions that LFAP takes, the protocol complexity and
> its Information Model.
>
> The biggest issue with the architecture is timestamps.  My
> understanding reading the lfap-eval, is that timestamps
> relate to the flow cache rather than the wire-line timestamps of
> the packet stream that is being monitored.  If true, I believe
> that this is huge problem, as it will introduce a lot of
> timestamp variance that cannot be adjusted for, rendering
> the data very limited in its usefulness.  The IPPM framework
> devotes a large amount of time and effort describing how a monitor
> should deal with timestamps of packets, and an IPFIX monitor
> should comply with the IPPM framework on this.  Anything less
> would be networking 'malpractice', if there ever could be such
> a thing.
>
> I think the protocol has too many message types.  Don't need
> a separate turn for VR/VRA, and AR/ARA you should be able to
> present the VR/CR/AR information elements in a single message and
> then get a single response.
>
> The concept that you can support the division of FAR and FUN
> messages generate great potential problems.  If I connect at some
> arbitrary point and don't receive the FAR message, how do I
> process FUN messages, which don't have flow descriptors?
>
> With regard to the Information Model,  I sense that I would
> put my entire record in a single vendor specific IE and leave it
> at that.  While a drastic statement, its not too far from the
> truth.
>
> Just to innumerate a few problems I have with LFAP's basic
> data definitions, and this is not an exhaustive set, of course.
>
> Best time granularity of 10's of milliseconds (1/100th of a sec)
> is not good, uSec minimum, nanoSec preferable.
>
> The requirement that the FAS/CCE's must be globally unique, and then
> you start adding ones to them on roll over (how do you ensure that
> the FAS is still globally unique?) is a big issue (locally unique?)
>
> The concepts of the Flow Qualifier checkpoint and priority are
> completely proprietary, they should be vendor specific OIDs?
>
> 64 bit counters for packets and bytes in every record, when over
> 90% of all flows have less than 256 packets and 8K of bytes in the
> entire flow?  We should have 1, 2, 4 and 8 byte counter IEs as
> needed, don't you think?
>
> The IpId field is 16 bits but the IE to report it is 64 bits long.
> Why not a 32 bit field for those special values that are 8-16 bits
> long?  Why not have a composite IE, like an IP header attribute
> IE, which could have the IpId, Tos, TTL, and option indicators all
> in a single IE?  Why not an IE for the classic 5-tuple flow?
>
> Minor points, but important points for my products.
>
> Carter
>
>
> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
> Behalf Of Michael MacFaden
> Sent: Thursday, October 03, 2002 6:10 PM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>
>
> On Thu, Oct 03, 2002 at 05:31:48PM -0400, Carter Bullard wrote:
> >My existing flow record generators provide jitter and loss information
> >in flow data records.  How do I do that with an LFAP or netflow
> >strategy?
>
> For LFAP, build your collector as one normally would and
> then just follow section 2.45 of
> http://www.ietf.org/internet-drafts/draft-riverstone-lfap-data-01.txt
>
> My point was/is simply this.
> We should consider the feature/complexity tradeoff
> for each criteria considered in context of the problem
> being solved.
>
> My personal belief is that IPFIX does not stand for
> GDMP (Generic Data Mover Protocol).
>
> Regards,
> Mike MacFaden
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say "unsubscribe
> ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 14:34:46 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA19050
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 14:34:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zi1J-0001Ks-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 13:26:49 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zi1D-0001Js-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 13:26:43 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9AIQCIn023526;
	Thu, 10 Oct 2002 11:26:12 -0700 (PDT)
Date: Thu, 10 Oct 2002 11:26:12 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Peter Ludemann <peter.ludemann@xacct.com>
cc: Ganesh Sadasivan <gsadasiv@cisco.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;
  broadcast vs reliable
In-Reply-To: <AMEKJFAIEIKCBNABBMPNIEODDHAA.peter.ludemann@xacct.com>
Message-ID: <Pine.GSO.4.44.0210101116400.4915-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Peter,
  Please see inline

On Thu, 10 Oct 2002, Peter Ludemann wrote:

> Sorry for bringing up the topic of UDP ... I mis-read a thread and thought
> that UDP was coming back on the table.
>
> It is not clear to me how any protocol that does not contain
> application-level ACKs can be fully reliable, even if layered over TCP or
> SCTP. This is because the transport-layer acknowledgment only means that the
> data have arrived at the other machine, not that the application has
> actually processed it. (There's nothing preventing a TCP or SCTP stack from
> allowing application-level acknowledgment; but I'm not aware of any for TCP
> and my reading of the API in RFC 2960 indicates that the acknowledgment is
> transport-level.)
>
> As to my comment about UDP vs TCP for performance ... this is probably
> irrelevant for the current discussion because the proposal is that IPFIX
> would use NetFlow over TCP or SCTP. In such a case, a UDP-with-reliability
> protocol (which NetFlow isn't; but, for example, NFS is) ends up being about
> the same performance as TCP. Clearly, the path length with pure UDP would be
> less than for TCP because UDP is just "fire and forget". However, if
> broadcast is being used to increase reliability (as Ganesh points out, this
> isn't necessary; but if there is no ACK mechanism, then the only choice is
> to broadcast to all collectors), then the path length increases. Whether
> outputting 2 UDP packets is a longer or shorter instruction path length than
> sending a single TCP packet, I don't know.
>
> Slight change of subject: could NetFlow be easily extended to handle data
> that isn't fixed-length (e.g., HTTP URLs)? I know that in NetFlow's current
> use, there's no need for such attribute export; but there are smart devices
> that look deeper into packets for smart switching or firewalling, which can
> use such information and might want to export it. [Probes can also export
> such information.]
>


Example: If we want to send a variable length field we use repeat count


Suppose we want to send string "abc"

Netflow version 9 Template

<----2 bytes ----->
------------------
header...
------------------
Field 1 Type = REPEAT_COUNT
------------------
Field 1 Length = 2 bytes
-----------------
Field 2 Type = CHAR_VARIABLE_LEN
-----------------
Field 2 Length = 1 byte
-----------------
.......

Corresponding Netflow version 9 Data record

<-----2 bytes------>
-------------------
Header .....
-------------------
   3 = ( Next field (Field 2) is repeated 3 times)
-------------------
 a      |   b
-------------------
 c      | ......
-------------------

-vamsi

> Time for me to shut up and go on vacation.
>
> - peter
>
> > -----Original Message-----
> > From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> > Of Ganesh Sadasivan
> > Sent: Wednesday, October 09, 2002 2:51 PM
> > To: Peter Ludemann
> > Cc: ipfix-eval@net.doit.wisc.edu
> > Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data
> > model; broadcast vs reliable
> >
> >
> >
> >
> > Peter Ludemann wrote:
> >
> > > This note discusses two things:
> > >  - whether we need a data model to define the protocol
> > >    (I claim that we do not)
> >
> > Agreed.
> >
> > >
> > >  - cost of UDP broadcast vs minimalist reliable transport
> > >    (I claim that there is very little difference)
> >
> > What do you mean by "minimalist reliable transport" ?
> > Since congestion awareness is mandatory, I don't know
> > why UDP is a topic of discussion here. See my comments inline.
> >
> > >
> > >
> > > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> > >
> > > > Peter Ludemann wrote:
> > > [snip]
> > > > > YES ... so, can we all agree that data model issues are not
> > > > > part of this discussion?
> > > >
> > > >       No. We have no interoperability without a data model.
> > >
> > > I agree that we need a data model. I don't see why it should affect the
> > > discussion of the export protocol. The only requirements on the export
> > > protocol are that it exhibit the desired reliability and efficiency; and
> > > that it be able to transport all the data types required by the
> > data models.
> > > If we can agree on all the data types, then we can define the
> > protocol; this
> > > does not require defining the entire data model.
> > >
> > > [After all, SNMP is defined independently of the various MIBs - which
> > > correspond to the data model]
> > >
> > > >       No. Generalized data movers are not the problem.
> > > >       Defining a protocol that is well defined enough so
> > > >       that many device vendors can export data and many
> > > >       application vendors can process the data regardless
> > > >       of the device is problematic if all you define is a
> > > >       general purpose data mover.
> > >
> > > But deciding on an adequate "generalized data mover" is the
> > point of this
> > > evaluation process, I thought. I expect that there will be multiple data
> > > models, for the various kinds of generalized devices. (e.g.,
> > for our probe,
> > > we've defined three generic groupings of data: volume metrics;
> > QoS metrics;
> > > usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> > > RADIUS's vendor-specific attributes).
> > >
> > > There is one place where the nature of the data might intersect with the
> > > protocol -- the high-volume metrics such as exported by
> > NetFlow; and where
> > > the claim is that a reliable protocol is an unnecessary
> > overhead. So, let me
> > > discuss this a bit more.
> > >
> > > The argument is that with high volume export it is preferable to do
> > > multi-cast UDP with sequence numbers; data loss can be detected
> > by noting
> > > which sequence numbers are missing ... and reliability can be
> > increased by
> > > having multiple receivers and de-duplicating what they receive.
> >
> > One does not need to multicast UDP to indicate missing reliability.
> >
> > >
> > >
> > > For such a situation, the reliable protocol's *implementation* would not
> > > keep a queue of data to retransmit on fail-over; it would only
> > keep enough
> > > buffer to deal with TCP's or SCTP's flow control and to handle bursts of
> > > records. ACKs would be used only to notice when data are not
> > received at the
> > > other end and to cause fail-over. TCP "write would block" also causes
> > > fail-over.
> >
> > So records can be lost in both cases. Also in a continuous export
> > (in the case of
> >
> > high volume export) the rate of ACKs is once every 2 send packets.
> >
> > >
> > >
> > > I would argue that the cost of exporting this way is very
> > similar to that of
> > > the UDP broadcast.
> >
> > Are you talking w.r.t the end-point (exporter & collector) or the
> > network itself.
> >
> > For the former, the processing overhead is much higher in TCP.
> >
> > > And on the receiving end, it is *much* easier to handle
> > > than a UDP-broadcast, which also needs stronger hardware because of the
> > > higher de-duplication load.
> > >
> > > Can be about the same for both:
> > > - data copying (if scatter/gather is used)
> > > - protocol overhead (sequence number, template ID, etc.)
> >
> > In a typical datapath the instruction ration of UDP to TCP is
> > multi-fold. I don't know how you can tell that the protocol
> > overhead is the same.
> >
> > >
> > >
> > > The possible extra cost of the "reliable" export version is:
> > > - timer for noticing when ACK isn't received [trivial cost]
> > > - TCP vs UDP (little difference with modern implementations)
> > > - TCP retransmit with packet loss (typically very low)
> > > - cost of fail-over when no ACK received or write would block
> > >
> > > The savings and benefits of the "reliable" version are:
> > > - fewer packet writes (broadcast requires 2x as many packets;
> > >   and TCP can pack more efficiently because records can
> > >   span packets)
> >
> > As mentioned above if the  absence of reliability is what we want,
> > then we need not do a UDP broadcast.
> >
> > >
> > > - lower network traffic (which adds to reliability)
> >
> > >
> > > - smaller machines for receiving
> >
> > what does this mean?
> > thanks
> > Ganesh
> >
> > >
> > > - more accurate estimate of loss due to lack of reliability
> > > - can handle congestion
> > >
> > > [As an aside, even with the UDP-broadcast version, the exporter ought to
> > > compute totals for the various metrics and output those from
> > time to time,
> > > to provide a more accurate understanding of data loss. Perhaps
> > such totals
> > > are already available in the MIBs, but there remains the issue of how to
> > > correlate with the sequence numbers of the exported data.]
> > >
> > > - peter
> > >
> > > --
> > > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > in message body
> > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > "unsubscribe ipfix" in message body
> > > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> > message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 15:07:25 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20013
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 15:07:25 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17ziSo-0002Aw-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 13:55:14 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17ziSn-00029i-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 13:55:13 -0500
Received: from mira-sjcd-1.cisco.com (IDENT:mirapoint@mira-sjcd-1.cisco.com [171.69.43.44])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9AIsgIm011930;
	Thu, 10 Oct 2002 11:54:42 -0700 (PDT)
Received: from cisco.com (dhcp-171-71-137-27.cisco.com [171.71.137.27])
	by mira-sjcd-1.cisco.com (Mirapoint Messaging Server MOS 3.1.0.66-GA)
	with ESMTP id AAN68596;
	Thu, 10 Oct 2002 11:55:37 -0700 (PDT)
Message-ID: <3DA5CCF0.B4668375@cisco.com>
Date: Thu, 10 Oct 2002 11:54:40 -0700
From: Ganesh Sadasivan <gsadasiv@cisco.com>
X-Mailer: Mozilla 4.76 [en]C-CCK-MCD   (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: Vamsidhar Valluri <vvalluri@cisco.com>
CC: Peter Ludemann <peter.ludemann@xacct.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data 
 model;broadcast vs reliable
References: <Pine.GSO.4.44.0210101116400.4915-100000@vvalluri-u10.cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit



Vamsidhar Valluri wrote:

> Peter,
>   Please see inline
>
> On Thu, 10 Oct 2002, Peter Ludemann wrote:
>
> > Sorry for bringing up the topic of UDP ... I mis-read a thread and thought
> > that UDP was coming back on the table.
> >
> > It is not clear to me how any protocol that does not contain
> > application-level ACKs can be fully reliable, even if layered over TCP or
> > SCTP. This is because the transport-layer acknowledgment only means that the
> > data have arrived at the other machine, not that the application has
> > actually processed it. (There's nothing preventing a TCP or SCTP stack from
> > allowing application-level acknowledgment; but I'm not aware of any for TCP
> > and my reading of the API in RFC 2960 indicates that the acknowledgment is
> > transport-level.)
> >
> > As to my comment about UDP vs TCP for performance ... this is probably
> > irrelevant for the current discussion because the proposal is that IPFIX
> > would use NetFlow over TCP or SCTP. In such a case, a UDP-with-reliability
> > protocol (which NetFlow isn't; but, for example, NFS is) ends up being about
> > the same performance as TCP. Clearly, the path length with pure UDP would be
> > less than for TCP because UDP is just "fire and forget". However, if
> > broadcast is being used to increase reliability (as Ganesh points out, this
> > isn't necessary; but if there is no ACK mechanism, then the only choice is
> > to broadcast to all collectors), then the path length increases. Whether
> > outputting 2 UDP packets is a longer or shorter instruction path length than
> > sending a single TCP packet, I don't know.
> >
> > Slight change of subject: could NetFlow be easily extended to handle data
> > that isn't fixed-length (e.g., HTTP URLs)? I know that in NetFlow's current
> > use, there's no need for such attribute export; but there are smart devices
> > that look deeper into packets for smart switching or firewalling, which can
> > use such information and might want to export it. [Probes can also export
> > such information.]
> >

Yes the current requirements for netflow does not need it to send variable
length fields, but it can be easily extended as Vamsi explained below using
a "length" field in data records.
-ganesh

>
>
> Example: If we want to send a variable length field we use repeat count
>
> Suppose we want to send string "abc"
>
> Netflow version 9 Template
>
> <----2 bytes ----->
> ------------------
> header...
> ------------------
> Field 1 Type = REPEAT_COUNT
> ------------------
> Field 1 Length = 2 bytes
> -----------------
> Field 2 Type = CHAR_VARIABLE_LEN
> -----------------
> Field 2 Length = 1 byte
> -----------------
> .......
>
> Corresponding Netflow version 9 Data record
>
> <-----2 bytes------>
> -------------------
> Header .....
> -------------------
>    3 = ( Next field (Field 2) is repeated 3 times)
> -------------------
>  a      |   b
> -------------------
>  c      | ......
> -------------------
>
> -vamsi
>
> > Time for me to shut up and go on vacation.
> >
> > - peter
> >
> > > -----Original Message-----
> > > From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> > > Of Ganesh Sadasivan
> > > Sent: Wednesday, October 09, 2002 2:51 PM
> > > To: Peter Ludemann
> > > Cc: ipfix-eval@net.doit.wisc.edu
> > > Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data
> > > model; broadcast vs reliable
> > >
> > >
> > >
> > >
> > > Peter Ludemann wrote:
> > >
> > > > This note discusses two things:
> > > >  - whether we need a data model to define the protocol
> > > >    (I claim that we do not)
> > >
> > > Agreed.
> > >
> > > >
> > > >  - cost of UDP broadcast vs minimalist reliable transport
> > > >    (I claim that there is very little difference)
> > >
> > > What do you mean by "minimalist reliable transport" ?
> > > Since congestion awareness is mandatory, I don't know
> > > why UDP is a topic of discussion here. See my comments inline.
> > >
> > > >
> > > >
> > > > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> > > >
> > > > > Peter Ludemann wrote:
> > > > [snip]
> > > > > > YES ... so, can we all agree that data model issues are not
> > > > > > part of this discussion?
> > > > >
> > > > >       No. We have no interoperability without a data model.
> > > >
> > > > I agree that we need a data model. I don't see why it should affect the
> > > > discussion of the export protocol. The only requirements on the export
> > > > protocol are that it exhibit the desired reliability and efficiency; and
> > > > that it be able to transport all the data types required by the
> > > data models.
> > > > If we can agree on all the data types, then we can define the
> > > protocol; this
> > > > does not require defining the entire data model.
> > > >
> > > > [After all, SNMP is defined independently of the various MIBs - which
> > > > correspond to the data model]
> > > >
> > > > >       No. Generalized data movers are not the problem.
> > > > >       Defining a protocol that is well defined enough so
> > > > >       that many device vendors can export data and many
> > > > >       application vendors can process the data regardless
> > > > >       of the device is problematic if all you define is a
> > > > >       general purpose data mover.
> > > >
> > > > But deciding on an adequate "generalized data mover" is the
> > > point of this
> > > > evaluation process, I thought. I expect that there will be multiple data
> > > > models, for the various kinds of generalized devices. (e.g.,
> > > for our probe,
> > > > we've defined three generic groupings of data: volume metrics;
> > > QoS metrics;
> > > > usage metrics and attributes -- similarly, SNMP's enterprise MIBs and
> > > > RADIUS's vendor-specific attributes).
> > > >
> > > > There is one place where the nature of the data might intersect with the
> > > > protocol -- the high-volume metrics such as exported by
> > > NetFlow; and where
> > > > the claim is that a reliable protocol is an unnecessary
> > > overhead. So, let me
> > > > discuss this a bit more.
> > > >
> > > > The argument is that with high volume export it is preferable to do
> > > > multi-cast UDP with sequence numbers; data loss can be detected
> > > by noting
> > > > which sequence numbers are missing ... and reliability can be
> > > increased by
> > > > having multiple receivers and de-duplicating what they receive.
> > >
> > > One does not need to multicast UDP to indicate missing reliability.
> > >
> > > >
> > > >
> > > > For such a situation, the reliable protocol's *implementation* would not
> > > > keep a queue of data to retransmit on fail-over; it would only
> > > keep enough
> > > > buffer to deal with TCP's or SCTP's flow control and to handle bursts of
> > > > records. ACKs would be used only to notice when data are not
> > > received at the
> > > > other end and to cause fail-over. TCP "write would block" also causes
> > > > fail-over.
> > >
> > > So records can be lost in both cases. Also in a continuous export
> > > (in the case of
> > >
> > > high volume export) the rate of ACKs is once every 2 send packets.
> > >
> > > >
> > > >
> > > > I would argue that the cost of exporting this way is very
> > > similar to that of
> > > > the UDP broadcast.
> > >
> > > Are you talking w.r.t the end-point (exporter & collector) or the
> > > network itself.
> > >
> > > For the former, the processing overhead is much higher in TCP.
> > >
> > > > And on the receiving end, it is *much* easier to handle
> > > > than a UDP-broadcast, which also needs stronger hardware because of the
> > > > higher de-duplication load.
> > > >
> > > > Can be about the same for both:
> > > > - data copying (if scatter/gather is used)
> > > > - protocol overhead (sequence number, template ID, etc.)
> > >
> > > In a typical datapath the instruction ration of UDP to TCP is
> > > multi-fold. I don't know how you can tell that the protocol
> > > overhead is the same.
> > >
> > > >
> > > >
> > > > The possible extra cost of the "reliable" export version is:
> > > > - timer for noticing when ACK isn't received [trivial cost]
> > > > - TCP vs UDP (little difference with modern implementations)
> > > > - TCP retransmit with packet loss (typically very low)
> > > > - cost of fail-over when no ACK received or write would block
> > > >
> > > > The savings and benefits of the "reliable" version are:
> > > > - fewer packet writes (broadcast requires 2x as many packets;
> > > >   and TCP can pack more efficiently because records can
> > > >   span packets)
> > >
> > > As mentioned above if the  absence of reliability is what we want,
> > > then we need not do a UDP broadcast.
> > >
> > > >
> > > > - lower network traffic (which adds to reliability)
> > >
> > > >
> > > > - smaller machines for receiving
> > >
> > > what does this mean?
> > > thanks
> > > Ganesh
> > >
> > > >
> > > > - more accurate estimate of loss due to lack of reliability
> > > > - can handle congestion
> > > >
> > > > [As an aside, even with the UDP-broadcast version, the exporter ought to
> > > > compute totals for the various metrics and output those from
> > > time to time,
> > > > to provide a more accurate understanding of data loss. Perhaps
> > > such totals
> > > > are already available in the MIBs, but there remains the issue of how to
> > > > correlate with the sequence numbers of the exported data.]
> > > >
> > > > - peter
> > > >
> > > > --
> > > > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > > in message body
> > > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > > "unsubscribe ipfix" in message body
> > > > Archive     http://ipfix.doit.wisc.edu/archive/
> > >
> > >
> > > --
> > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> > > message body
> > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > "unsubscribe ipfix" in message body
> > > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 15:11:44 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20169
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 15:11:44 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17ziWh-0002GT-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 13:59:15 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17ziWf-0002Fa-00; Thu, 10 Oct 2002 13:59:13 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9AIwb727950;
	Thu, 10 Oct 2002 11:58:37 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9AIwmJ20360;
	Thu, 10 Oct 2002 13:58:48 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7RKRT>; Thu, 10 Oct 2002 11:58:33 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04350D05@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Vamsidhar Valluri <vvalluri@cisco.com>,
        Peter Ludemann
	 <peter.ludemann@xacct.com>,
        ipfix-req@net.doit.wisc.edu
Cc: Ganesh Sadasivan <gsadasiv@cisco.com>, ipfix-eval@net.doit.wisc.edu
Subject: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of C
	andidate Protocols - data model; broadcast vs reliable 
Date: Thu, 10 Oct 2002 11:58:35 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C2708F.08E664CA"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C2708F.08E664CA
Content-Type: text/plain;
	charset="iso-8859-1"

that was a valid question..I was thinking about it myself (not specially in
terms of netflow, tough.)

Although we are concerned with the basic packet fields, it is expected that
variable lenght fields like URLs, SDP headers, HTTP headers, etc will be
widely used. IMHO we should look a little bit down the road in order to
guarantee some lifetime for the protocol without many revisions. 

It seems to me that the requirements doc should provide/ask that the
protocol (data model) must support variable length fields now or be readily
extensible. Maybe some text in section 6.2.


regards,

Reinaldo

> -----Original Message-----
> From: Vamsidhar Valluri [mailto:vvalluri@cisco.com]
> Sent: Thursday, October 10, 2002 11:26 AM
> To: Peter Ludemann
> Cc: Ganesh Sadasivan; ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data
> model; broadcast vs reliable
> 
> 
> Peter,
>   Please see inline
> 
> On Thu, 10 Oct 2002, Peter Ludemann wrote:
> 
> > Sorry for bringing up the topic of UDP ... I mis-read a 
> thread and thought
> > that UDP was coming back on the table.
> >
> > It is not clear to me how any protocol that does not contain
> > application-level ACKs can be fully reliable, even if 
> layered over TCP or
> > SCTP. This is because the transport-layer acknowledgment 
> only means that the
> > data have arrived at the other machine, not that the application has
> > actually processed it. (There's nothing preventing a TCP or 
> SCTP stack from
> > allowing application-level acknowledgment; but I'm not 
> aware of any for TCP
> > and my reading of the API in RFC 2960 indicates that the 
> acknowledgment is
> > transport-level.)
> >
> > As to my comment about UDP vs TCP for performance ... this 
> is probably
> > irrelevant for the current discussion because the proposal 
> is that IPFIX
> > would use NetFlow over TCP or SCTP. In such a case, a 
> UDP-with-reliability
> > protocol (which NetFlow isn't; but, for example, NFS is) 
> ends up being about
> > the same performance as TCP. Clearly, the path length with 
> pure UDP would be
> > less than for TCP because UDP is just "fire and forget". However, if
> > broadcast is being used to increase reliability (as Ganesh 
> points out, this
> > isn't necessary; but if there is no ACK mechanism, then the 
> only choice is
> > to broadcast to all collectors), then the path length 
> increases. Whether
> > outputting 2 UDP packets is a longer or shorter instruction 
> path length than
> > sending a single TCP packet, I don't know.
> >
> > Slight change of subject: could NetFlow be easily extended 
> to handle data
> > that isn't fixed-length (e.g., HTTP URLs)? I know that in 
> NetFlow's current
> > use, there's no need for such attribute export; but there 
> are smart devices
> > that look deeper into packets for smart switching or 
> firewalling, which can
> > use such information and might want to export it. [Probes 
> can also export
> > such information.]
> >
> 
> 
> Example: If we want to send a variable length field we use 
> repeat count
> 
> 
> Suppose we want to send string "abc"
> 
> Netflow version 9 Template
> 
> <----2 bytes ----->
> ------------------
> header...
> ------------------
> Field 1 Type = REPEAT_COUNT
> ------------------
> Field 1 Length = 2 bytes
> -----------------
> Field 2 Type = CHAR_VARIABLE_LEN
> -----------------
> Field 2 Length = 1 byte
> -----------------
> .......
> 
> Corresponding Netflow version 9 Data record
> 
> <-----2 bytes------>
> -------------------
> Header .....
> -------------------
>    3 = ( Next field (Field 2) is repeated 3 times)
> -------------------
>  a      |   b
> -------------------
>  c      | ......
> -------------------
> 
> -vamsi
> 
> > Time for me to shut up and go on vacation.
> >
> > - peter
> >
> > > -----Original Message-----
> > > From: majordomo listserver 
> [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> > > Of Ganesh Sadasivan
> > > Sent: Wednesday, October 09, 2002 2:51 PM
> > > To: Peter Ludemann
> > > Cc: ipfix-eval@net.doit.wisc.edu
> > > Subject: Re: [ipfix-eval] RE: Discussion of Candidate 
> Protocols - data
> > > model; broadcast vs reliable
> > >
> > >
> > >
> > >
> > > Peter Ludemann wrote:
> > >
> > > > This note discusses two things:
> > > >  - whether we need a data model to define the protocol
> > > >    (I claim that we do not)
> > >
> > > Agreed.
> > >
> > > >
> > > >  - cost of UDP broadcast vs minimalist reliable transport
> > > >    (I claim that there is very little difference)
> > >
> > > What do you mean by "minimalist reliable transport" ?
> > > Since congestion awareness is mandatory, I don't know
> > > why UDP is a topic of discussion here. See my comments inline.
> > >
> > > >
> > > >
> > > > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> > > >
> > > > > Peter Ludemann wrote:
> > > > [snip]
> > > > > > YES ... so, can we all agree that data model issues are not
> > > > > > part of this discussion?
> > > > >
> > > > >       No. We have no interoperability without a data model.
> > > >
> > > > I agree that we need a data model. I don't see why it 
> should affect the
> > > > discussion of the export protocol. The only 
> requirements on the export
> > > > protocol are that it exhibit the desired reliability 
> and efficiency; and
> > > > that it be able to transport all the data types required by the
> > > data models.
> > > > If we can agree on all the data types, then we can define the
> > > protocol; this
> > > > does not require defining the entire data model.
> > > >
> > > > [After all, SNMP is defined independently of the 
> various MIBs - which
> > > > correspond to the data model]
> > > >
> > > > >       No. Generalized data movers are not the problem.
> > > > >       Defining a protocol that is well defined enough so
> > > > >       that many device vendors can export data and many
> > > > >       application vendors can process the data regardless
> > > > >       of the device is problematic if all you define is a
> > > > >       general purpose data mover.
> > > >
> > > > But deciding on an adequate "generalized data mover" is the
> > > point of this
> > > > evaluation process, I thought. I expect that there will 
> be multiple data
> > > > models, for the various kinds of generalized devices. (e.g.,
> > > for our probe,
> > > > we've defined three generic groupings of data: volume metrics;
> > > QoS metrics;
> > > > usage metrics and attributes -- similarly, SNMP's 
> enterprise MIBs and
> > > > RADIUS's vendor-specific attributes).
> > > >
> > > > There is one place where the nature of the data might 
> intersect with the
> > > > protocol -- the high-volume metrics such as exported by
> > > NetFlow; and where
> > > > the claim is that a reliable protocol is an unnecessary
> > > overhead. So, let me
> > > > discuss this a bit more.
> > > >
> > > > The argument is that with high volume export it is 
> preferable to do
> > > > multi-cast UDP with sequence numbers; data loss can be detected
> > > by noting
> > > > which sequence numbers are missing ... and reliability can be
> > > increased by
> > > > having multiple receivers and de-duplicating what they receive.
> > >
> > > One does not need to multicast UDP to indicate missing 
> reliability.
> > >
> > > >
> > > >
> > > > For such a situation, the reliable protocol's 
> *implementation* would not
> > > > keep a queue of data to retransmit on fail-over; it would only
> > > keep enough
> > > > buffer to deal with TCP's or SCTP's flow control and to 
> handle bursts of
> > > > records. ACKs would be used only to notice when data are not
> > > received at the
> > > > other end and to cause fail-over. TCP "write would 
> block" also causes
> > > > fail-over.
> > >
> > > So records can be lost in both cases. Also in a continuous export
> > > (in the case of
> > >
> > > high volume export) the rate of ACKs is once every 2 send packets.
> > >
> > > >
> > > >
> > > > I would argue that the cost of exporting this way is very
> > > similar to that of
> > > > the UDP broadcast.
> > >
> > > Are you talking w.r.t the end-point (exporter & collector) or the
> > > network itself.
> > >
> > > For the former, the processing overhead is much higher in TCP.
> > >
> > > > And on the receiving end, it is *much* easier to handle
> > > > than a UDP-broadcast, which also needs stronger 
> hardware because of the
> > > > higher de-duplication load.
> > > >
> > > > Can be about the same for both:
> > > > - data copying (if scatter/gather is used)
> > > > - protocol overhead (sequence number, template ID, etc.)
> > >
> > > In a typical datapath the instruction ration of UDP to TCP is
> > > multi-fold. I don't know how you can tell that the protocol
> > > overhead is the same.
> > >
> > > >
> > > >
> > > > The possible extra cost of the "reliable" export version is:
> > > > - timer for noticing when ACK isn't received [trivial cost]
> > > > - TCP vs UDP (little difference with modern implementations)
> > > > - TCP retransmit with packet loss (typically very low)
> > > > - cost of fail-over when no ACK received or write would block
> > > >
> > > > The savings and benefits of the "reliable" version are:
> > > > - fewer packet writes (broadcast requires 2x as many packets;
> > > >   and TCP can pack more efficiently because records can
> > > >   span packets)
> > >
> > > As mentioned above if the  absence of reliability is what we want,
> > > then we need not do a UDP broadcast.
> > >
> > > >
> > > > - lower network traffic (which adds to reliability)
> > >
> > > >
> > > > - smaller machines for receiving
> > >
> > > what does this mean?
> > > thanks
> > > Ganesh
> > >
> > > >
> > > > - more accurate estimate of loss due to lack of reliability
> > > > - can handle congestion
> > > >
> > > > [As an aside, even with the UDP-broadcast version, the 
> exporter ought to
> > > > compute totals for the various metrics and output those from
> > > time to time,
> > > > to provide a more accurate understanding of data loss. Perhaps
> > > such totals
> > > > are already available in the MIBs, but there remains 
> the issue of how to
> > > > correlate with the sequence numbers of the exported data.]
> > > >
> > > > - peter
> > > >
> > > > --
> > > > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > > in message body
> > > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > > "unsubscribe ipfix" in message body
> > > > Archive     http://ipfix.doit.wisc.edu/archive/
> > >
> > >
> > > --
> > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> > > message body
> > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > "unsubscribe ipfix" in message body
> > > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C2708F.08E664CA
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of =
Candidate Protocols - data model; broadcast vs reliable </TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>that was a valid question..I was thinking about it =
myself (not specially in terms of netflow, tough.)</FONT>
</P>

<P><FONT SIZE=3D2>Although we are concerned with the basic packet =
fields, it is expected that variable lenght fields like URLs, SDP =
headers, HTTP headers, etc will be widely used. IMHO we should look a =
little bit down the road in order to guarantee some lifetime for the =
protocol without many revisions. </FONT></P>

<P><FONT SIZE=3D2>It seems to me that the requirements doc should =
provide/ask that the protocol (data model) must support variable length =
fields now or be readily extensible. Maybe some text in section =
6.2.</FONT></P>
<BR>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Vamsidhar Valluri [<A =
HREF=3D"mailto:vvalluri@cisco.com">mailto:vvalluri@cisco.com</A>]</FONT>=

<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 11:26 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Peter Ludemann</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Ganesh Sadasivan; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] RE: Discussion of =
Candidate Protocols - data</FONT>
<BR><FONT SIZE=3D2>&gt; model; broadcast vs reliable</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Peter,</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; Please see inline</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Thu, 10 Oct 2002, Peter Ludemann =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sorry for bringing up the topic of UDP ... =
I mis-read a </FONT>
<BR><FONT SIZE=3D2>&gt; thread and thought</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that UDP was coming back on the =
table.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It is not clear to me how any protocol =
that does not contain</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; application-level ACKs can be fully =
reliable, even if </FONT>
<BR><FONT SIZE=3D2>&gt; layered over TCP or</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; SCTP. This is because the transport-layer =
acknowledgment </FONT>
<BR><FONT SIZE=3D2>&gt; only means that the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; data have arrived at the other machine, =
not that the application has</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; actually processed it. (There's nothing =
preventing a TCP or </FONT>
<BR><FONT SIZE=3D2>&gt; SCTP stack from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; allowing application-level acknowledgment; =
but I'm not </FONT>
<BR><FONT SIZE=3D2>&gt; aware of any for TCP</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; and my reading of the API in RFC 2960 =
indicates that the </FONT>
<BR><FONT SIZE=3D2>&gt; acknowledgment is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; transport-level.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; As to my comment about UDP vs TCP for =
performance ... this </FONT>
<BR><FONT SIZE=3D2>&gt; is probably</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; irrelevant for the current discussion =
because the proposal </FONT>
<BR><FONT SIZE=3D2>&gt; is that IPFIX</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; would use NetFlow over TCP or SCTP. In =
such a case, a </FONT>
<BR><FONT SIZE=3D2>&gt; UDP-with-reliability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; protocol (which NetFlow isn't; but, for =
example, NFS is) </FONT>
<BR><FONT SIZE=3D2>&gt; ends up being about</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the same performance as TCP. Clearly, the =
path length with </FONT>
<BR><FONT SIZE=3D2>&gt; pure UDP would be</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; less than for TCP because UDP is just =
&quot;fire and forget&quot;. However, if</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; broadcast is being used to increase =
reliability (as Ganesh </FONT>
<BR><FONT SIZE=3D2>&gt; points out, this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; isn't necessary; but if there is no ACK =
mechanism, then the </FONT>
<BR><FONT SIZE=3D2>&gt; only choice is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; to broadcast to all collectors), then the =
path length </FONT>
<BR><FONT SIZE=3D2>&gt; increases. Whether</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; outputting 2 UDP packets is a longer or =
shorter instruction </FONT>
<BR><FONT SIZE=3D2>&gt; path length than</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; sending a single TCP packet, I don't =
know.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Slight change of subject: could NetFlow be =
easily extended </FONT>
<BR><FONT SIZE=3D2>&gt; to handle data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that isn't fixed-length (e.g., HTTP URLs)? =
I know that in </FONT>
<BR><FONT SIZE=3D2>&gt; NetFlow's current</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use, there's no need for such attribute =
export; but there </FONT>
<BR><FONT SIZE=3D2>&gt; are smart devices</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that look deeper into packets for smart =
switching or </FONT>
<BR><FONT SIZE=3D2>&gt; firewalling, which can</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use such information and might want to =
export it. [Probes </FONT>
<BR><FONT SIZE=3D2>&gt; can also export</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; such information.]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Example: If we want to send a variable length =
field we use </FONT>
<BR><FONT SIZE=3D2>&gt; repeat count</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Suppose we want to send string =
&quot;abc&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Netflow version 9 Template</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;----2 bytes -----&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------</FONT>
<BR><FONT SIZE=3D2>&gt; header...</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Type =3D REPEAT_COUNT</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Length =3D 2 bytes</FONT>
<BR><FONT SIZE=3D2>&gt; -----------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Type =3D CHAR_VARIABLE_LEN</FONT>
<BR><FONT SIZE=3D2>&gt; -----------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Length =3D 1 byte</FONT>
<BR><FONT SIZE=3D2>&gt; -----------------</FONT>
<BR><FONT SIZE=3D2>&gt; .......</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Corresponding Netflow version 9 Data =
record</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;-----2 bytes------&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt; Header .....</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; 3 =3D ( Next field (Field 2) =
is repeated 3 times)</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp; b</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | =
......</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -vamsi</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Time for me to shut up and go on =
vacation.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; - peter</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; From: majordomo listserver </FONT>
<BR><FONT SIZE=3D2>&gt; [<A =
HREF=3D"mailto:majordomo@mil.doit.wisc.edu">mailto:majordomo@mil.doit.wi=
sc.edu</A>]On Behalf</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Of Ganesh Sadasivan</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Sent: Wednesday, October 09, 2002 =
2:51 PM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; To: Peter Ludemann</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Cc: =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Subject: Re: [ipfix-eval] RE: =
Discussion of Candidate </FONT>
<BR><FONT SIZE=3D2>&gt; Protocols - data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; model; broadcast vs reliable</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Peter Ludemann wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; This note discusses two =
things:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - whether we need a data =
model to define the protocol</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
we do not)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Agreed.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - cost of UDP broadcast vs =
minimalist reliable transport</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
there is very little difference)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; What do you mean by &quot;minimalist =
reliable transport&quot; ?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Since congestion awareness is =
mandatory, I don't know</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; why UDP is a topic of discussion =
here. See my comments inline.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; calato@riverstonenet.com wrote =
Monday, October 07, 2002 7:35 AM:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; Peter Ludemann =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [snip]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; YES ... so, can we all =
agree that data model issues are not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; part of this =
discussion?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. We have no =
interoperability without a data model.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I agree that we need a data =
model. I don't see why it </FONT>
<BR><FONT SIZE=3D2>&gt; should affect the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discussion of the export =
protocol. The only </FONT>
<BR><FONT SIZE=3D2>&gt; requirements on the export</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol are that it exhibit the =
desired reliability </FONT>
<BR><FONT SIZE=3D2>&gt; and efficiency; and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; that it be able to transport all =
the data types required by the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; data models.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; If we can agree on all the data =
types, then we can define the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; protocol; this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; does not require defining the =
entire data model.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [After all, SNMP is defined =
independently of the </FONT>
<BR><FONT SIZE=3D2>&gt; various MIBs - which</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correspond to the data =
model]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. Generalized data movers =
are not the problem.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Defining a protocol that is =
well defined enough so</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that many device vendors can =
export data and many</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application vendors can =
process the data regardless</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of the device is problematic =
if all you define is a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; general purpose data =
mover.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; But deciding on an adequate =
&quot;generalized data mover&quot; is the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; point of this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; evaluation process, I thought. I =
expect that there will </FONT>
<BR><FONT SIZE=3D2>&gt; be multiple data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; models, for the various kinds of =
generalized devices. (e.g.,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; for our probe,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; we've defined three generic =
groupings of data: volume metrics;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; QoS metrics;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; usage metrics and attributes -- =
similarly, SNMP's </FONT>
<BR><FONT SIZE=3D2>&gt; enterprise MIBs and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; RADIUS's vendor-specific =
attributes).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; There is one place where the =
nature of the data might </FONT>
<BR><FONT SIZE=3D2>&gt; intersect with the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol -- the high-volume =
metrics such as exported by</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; NetFlow; and where</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the claim is that a reliable =
protocol is an unnecessary</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead. So, let me</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discuss this a bit more.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The argument is that with high =
volume export it is </FONT>
<BR><FONT SIZE=3D2>&gt; preferable to do</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; multi-cast UDP with sequence =
numbers; data loss can be detected</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; by noting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; which sequence numbers are =
missing ... and reliability can be</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; increased by</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; having multiple receivers and =
de-duplicating what they receive.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; One does not need to multicast UDP to =
indicate missing </FONT>
<BR><FONT SIZE=3D2>&gt; reliability.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; For such a situation, the =
reliable protocol's </FONT>
<BR><FONT SIZE=3D2>&gt; *implementation* would not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; keep a queue of data to =
retransmit on fail-over; it would only</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; keep enough</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; buffer to deal with TCP's or =
SCTP's flow control and to </FONT>
<BR><FONT SIZE=3D2>&gt; handle bursts of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; records. ACKs would be used only =
to notice when data are not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; received at the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; other end and to cause =
fail-over. TCP &quot;write would </FONT>
<BR><FONT SIZE=3D2>&gt; block&quot; also causes</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; fail-over.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; So records can be lost in both cases. =
Also in a continuous export</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; (in the case of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; high volume export) the rate of ACKs =
is once every 2 send packets.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I would argue that the cost of =
exporting this way is very</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; similar to that of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the UDP broadcast.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Are you talking w.r.t the end-point =
(exporter &amp; collector) or the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; network itself.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; For the former, the processing =
overhead is much higher in TCP.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; And on the receiving end, it is =
*much* easier to handle</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; than a UDP-broadcast, which also =
needs stronger </FONT>
<BR><FONT SIZE=3D2>&gt; hardware because of the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; higher de-duplication =
load.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Can be about the same for =
both:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - data copying (if =
scatter/gather is used)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - protocol overhead (sequence =
number, template ID, etc.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; In a typical datapath the instruction =
ration of UDP to TCP is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; multi-fold. I don't know how you can =
tell that the protocol</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead is the same.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The possible extra cost of the =
&quot;reliable&quot; export version is:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - timer for noticing when ACK =
isn't received [trivial cost]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP vs UDP (little difference =
with modern implementations)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP retransmit with packet =
loss (typically very low)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - cost of fail-over when no ACK =
received or write would block</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The savings and benefits of the =
&quot;reliable&quot; version are:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - fewer packet writes (broadcast =
requires 2x as many packets;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; and TCP can pack =
more efficiently because records can</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; span packets)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; As mentioned above if the&nbsp; =
absence of reliability is what we want,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; then we need not do a UDP =
broadcast.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - lower network traffic (which =
adds to reliability)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - smaller machines for =
receiving</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; what does this mean?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; thanks</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Ganesh</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - more accurate estimate of loss =
due to lack of reliability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - can handle congestion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [As an aside, even with the =
UDP-broadcast version, the </FONT>
<BR><FONT SIZE=3D2>&gt; exporter ought to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; compute totals for the various =
metrics and output those from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; time to time,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; to provide a more accurate =
understanding of data loss. Perhaps</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; such totals</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; are already available in the =
MIBs, but there remains </FONT>
<BR><FONT SIZE=3D2>&gt; the issue of how to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correlate with the sequence =
numbers of the exported data.]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - peter</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; =
<A HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; in</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;help&quot; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C2708F.08E664CA--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 15:32:48 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20894
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 15:32:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zit1-0002v8-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 14:22:19 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17ziWf-0002Fa-00; Thu, 10 Oct 2002 13:59:13 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9AIwb727950;
	Thu, 10 Oct 2002 11:58:37 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9AIwmJ20360;
	Thu, 10 Oct 2002 13:58:48 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7RKRT>; Thu, 10 Oct 2002 11:58:33 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04350D05@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Vamsidhar Valluri <vvalluri@cisco.com>,
        Peter Ludemann
	 <peter.ludemann@xacct.com>,
        ipfix-req@net.doit.wisc.edu
Cc: Ganesh Sadasivan <gsadasiv@cisco.com>, ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-req] Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of C
	andidate Protocols - data model; broadcast vs reliable 
Date: Thu, 10 Oct 2002 11:58:35 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C2708F.08E664CA"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C2708F.08E664CA
Content-Type: text/plain;
	charset="iso-8859-1"

that was a valid question..I was thinking about it myself (not specially in
terms of netflow, tough.)

Although we are concerned with the basic packet fields, it is expected that
variable lenght fields like URLs, SDP headers, HTTP headers, etc will be
widely used. IMHO we should look a little bit down the road in order to
guarantee some lifetime for the protocol without many revisions. 

It seems to me that the requirements doc should provide/ask that the
protocol (data model) must support variable length fields now or be readily
extensible. Maybe some text in section 6.2.


regards,

Reinaldo

> -----Original Message-----
> From: Vamsidhar Valluri [mailto:vvalluri@cisco.com]
> Sent: Thursday, October 10, 2002 11:26 AM
> To: Peter Ludemann
> Cc: Ganesh Sadasivan; ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data
> model; broadcast vs reliable
> 
> 
> Peter,
>   Please see inline
> 
> On Thu, 10 Oct 2002, Peter Ludemann wrote:
> 
> > Sorry for bringing up the topic of UDP ... I mis-read a 
> thread and thought
> > that UDP was coming back on the table.
> >
> > It is not clear to me how any protocol that does not contain
> > application-level ACKs can be fully reliable, even if 
> layered over TCP or
> > SCTP. This is because the transport-layer acknowledgment 
> only means that the
> > data have arrived at the other machine, not that the application has
> > actually processed it. (There's nothing preventing a TCP or 
> SCTP stack from
> > allowing application-level acknowledgment; but I'm not 
> aware of any for TCP
> > and my reading of the API in RFC 2960 indicates that the 
> acknowledgment is
> > transport-level.)
> >
> > As to my comment about UDP vs TCP for performance ... this 
> is probably
> > irrelevant for the current discussion because the proposal 
> is that IPFIX
> > would use NetFlow over TCP or SCTP. In such a case, a 
> UDP-with-reliability
> > protocol (which NetFlow isn't; but, for example, NFS is) 
> ends up being about
> > the same performance as TCP. Clearly, the path length with 
> pure UDP would be
> > less than for TCP because UDP is just "fire and forget". However, if
> > broadcast is being used to increase reliability (as Ganesh 
> points out, this
> > isn't necessary; but if there is no ACK mechanism, then the 
> only choice is
> > to broadcast to all collectors), then the path length 
> increases. Whether
> > outputting 2 UDP packets is a longer or shorter instruction 
> path length than
> > sending a single TCP packet, I don't know.
> >
> > Slight change of subject: could NetFlow be easily extended 
> to handle data
> > that isn't fixed-length (e.g., HTTP URLs)? I know that in 
> NetFlow's current
> > use, there's no need for such attribute export; but there 
> are smart devices
> > that look deeper into packets for smart switching or 
> firewalling, which can
> > use such information and might want to export it. [Probes 
> can also export
> > such information.]
> >
> 
> 
> Example: If we want to send a variable length field we use 
> repeat count
> 
> 
> Suppose we want to send string "abc"
> 
> Netflow version 9 Template
> 
> <----2 bytes ----->
> ------------------
> header...
> ------------------
> Field 1 Type = REPEAT_COUNT
> ------------------
> Field 1 Length = 2 bytes
> -----------------
> Field 2 Type = CHAR_VARIABLE_LEN
> -----------------
> Field 2 Length = 1 byte
> -----------------
> .......
> 
> Corresponding Netflow version 9 Data record
> 
> <-----2 bytes------>
> -------------------
> Header .....
> -------------------
>    3 = ( Next field (Field 2) is repeated 3 times)
> -------------------
>  a      |   b
> -------------------
>  c      | ......
> -------------------
> 
> -vamsi
> 
> > Time for me to shut up and go on vacation.
> >
> > - peter
> >
> > > -----Original Message-----
> > > From: majordomo listserver 
> [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> > > Of Ganesh Sadasivan
> > > Sent: Wednesday, October 09, 2002 2:51 PM
> > > To: Peter Ludemann
> > > Cc: ipfix-eval@net.doit.wisc.edu
> > > Subject: Re: [ipfix-eval] RE: Discussion of Candidate 
> Protocols - data
> > > model; broadcast vs reliable
> > >
> > >
> > >
> > >
> > > Peter Ludemann wrote:
> > >
> > > > This note discusses two things:
> > > >  - whether we need a data model to define the protocol
> > > >    (I claim that we do not)
> > >
> > > Agreed.
> > >
> > > >
> > > >  - cost of UDP broadcast vs minimalist reliable transport
> > > >    (I claim that there is very little difference)
> > >
> > > What do you mean by "minimalist reliable transport" ?
> > > Since congestion awareness is mandatory, I don't know
> > > why UDP is a topic of discussion here. See my comments inline.
> > >
> > > >
> > > >
> > > > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM:
> > > >
> > > > > Peter Ludemann wrote:
> > > > [snip]
> > > > > > YES ... so, can we all agree that data model issues are not
> > > > > > part of this discussion?
> > > > >
> > > > >       No. We have no interoperability without a data model.
> > > >
> > > > I agree that we need a data model. I don't see why it 
> should affect the
> > > > discussion of the export protocol. The only 
> requirements on the export
> > > > protocol are that it exhibit the desired reliability 
> and efficiency; and
> > > > that it be able to transport all the data types required by the
> > > data models.
> > > > If we can agree on all the data types, then we can define the
> > > protocol; this
> > > > does not require defining the entire data model.
> > > >
> > > > [After all, SNMP is defined independently of the 
> various MIBs - which
> > > > correspond to the data model]
> > > >
> > > > >       No. Generalized data movers are not the problem.
> > > > >       Defining a protocol that is well defined enough so
> > > > >       that many device vendors can export data and many
> > > > >       application vendors can process the data regardless
> > > > >       of the device is problematic if all you define is a
> > > > >       general purpose data mover.
> > > >
> > > > But deciding on an adequate "generalized data mover" is the
> > > point of this
> > > > evaluation process, I thought. I expect that there will 
> be multiple data
> > > > models, for the various kinds of generalized devices. (e.g.,
> > > for our probe,
> > > > we've defined three generic groupings of data: volume metrics;
> > > QoS metrics;
> > > > usage metrics and attributes -- similarly, SNMP's 
> enterprise MIBs and
> > > > RADIUS's vendor-specific attributes).
> > > >
> > > > There is one place where the nature of the data might 
> intersect with the
> > > > protocol -- the high-volume metrics such as exported by
> > > NetFlow; and where
> > > > the claim is that a reliable protocol is an unnecessary
> > > overhead. So, let me
> > > > discuss this a bit more.
> > > >
> > > > The argument is that with high volume export it is 
> preferable to do
> > > > multi-cast UDP with sequence numbers; data loss can be detected
> > > by noting
> > > > which sequence numbers are missing ... and reliability can be
> > > increased by
> > > > having multiple receivers and de-duplicating what they receive.
> > >
> > > One does not need to multicast UDP to indicate missing 
> reliability.
> > >
> > > >
> > > >
> > > > For such a situation, the reliable protocol's 
> *implementation* would not
> > > > keep a queue of data to retransmit on fail-over; it would only
> > > keep enough
> > > > buffer to deal with TCP's or SCTP's flow control and to 
> handle bursts of
> > > > records. ACKs would be used only to notice when data are not
> > > received at the
> > > > other end and to cause fail-over. TCP "write would 
> block" also causes
> > > > fail-over.
> > >
> > > So records can be lost in both cases. Also in a continuous export
> > > (in the case of
> > >
> > > high volume export) the rate of ACKs is once every 2 send packets.
> > >
> > > >
> > > >
> > > > I would argue that the cost of exporting this way is very
> > > similar to that of
> > > > the UDP broadcast.
> > >
> > > Are you talking w.r.t the end-point (exporter & collector) or the
> > > network itself.
> > >
> > > For the former, the processing overhead is much higher in TCP.
> > >
> > > > And on the receiving end, it is *much* easier to handle
> > > > than a UDP-broadcast, which also needs stronger 
> hardware because of the
> > > > higher de-duplication load.
> > > >
> > > > Can be about the same for both:
> > > > - data copying (if scatter/gather is used)
> > > > - protocol overhead (sequence number, template ID, etc.)
> > >
> > > In a typical datapath the instruction ration of UDP to TCP is
> > > multi-fold. I don't know how you can tell that the protocol
> > > overhead is the same.
> > >
> > > >
> > > >
> > > > The possible extra cost of the "reliable" export version is:
> > > > - timer for noticing when ACK isn't received [trivial cost]
> > > > - TCP vs UDP (little difference with modern implementations)
> > > > - TCP retransmit with packet loss (typically very low)
> > > > - cost of fail-over when no ACK received or write would block
> > > >
> > > > The savings and benefits of the "reliable" version are:
> > > > - fewer packet writes (broadcast requires 2x as many packets;
> > > >   and TCP can pack more efficiently because records can
> > > >   span packets)
> > >
> > > As mentioned above if the  absence of reliability is what we want,
> > > then we need not do a UDP broadcast.
> > >
> > > >
> > > > - lower network traffic (which adds to reliability)
> > >
> > > >
> > > > - smaller machines for receiving
> > >
> > > what does this mean?
> > > thanks
> > > Ganesh
> > >
> > > >
> > > > - more accurate estimate of loss due to lack of reliability
> > > > - can handle congestion
> > > >
> > > > [As an aside, even with the UDP-broadcast version, the 
> exporter ought to
> > > > compute totals for the various metrics and output those from
> > > time to time,
> > > > to provide a more accurate understanding of data loss. Perhaps
> > > such totals
> > > > are already available in the MIBs, but there remains 
> the issue of how to
> > > > correlate with the sequence numbers of the exported data.]
> > > >
> > > > - peter
> > > >
> > > > --
> > > > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > > in message body
> > > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > > "unsubscribe ipfix" in message body
> > > > Archive     http://ipfix.doit.wisc.edu/archive/
> > >
> > >
> > > --
> > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> > > message body
> > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > > "unsubscribe ipfix" in message body
> > > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C2708F.08E664CA
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of =
Candidate Protocols - data model; broadcast vs reliable </TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>that was a valid question..I was thinking about it =
myself (not specially in terms of netflow, tough.)</FONT>
</P>

<P><FONT SIZE=3D2>Although we are concerned with the basic packet =
fields, it is expected that variable lenght fields like URLs, SDP =
headers, HTTP headers, etc will be widely used. IMHO we should look a =
little bit down the road in order to guarantee some lifetime for the =
protocol without many revisions. </FONT></P>

<P><FONT SIZE=3D2>It seems to me that the requirements doc should =
provide/ask that the protocol (data model) must support variable length =
fields now or be readily extensible. Maybe some text in section =
6.2.</FONT></P>
<BR>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Vamsidhar Valluri [<A =
HREF=3D"mailto:vvalluri@cisco.com">mailto:vvalluri@cisco.com</A>]</FONT>=

<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 11:26 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Peter Ludemann</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Ganesh Sadasivan; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] RE: Discussion of =
Candidate Protocols - data</FONT>
<BR><FONT SIZE=3D2>&gt; model; broadcast vs reliable</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Peter,</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; Please see inline</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Thu, 10 Oct 2002, Peter Ludemann =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sorry for bringing up the topic of UDP ... =
I mis-read a </FONT>
<BR><FONT SIZE=3D2>&gt; thread and thought</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that UDP was coming back on the =
table.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It is not clear to me how any protocol =
that does not contain</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; application-level ACKs can be fully =
reliable, even if </FONT>
<BR><FONT SIZE=3D2>&gt; layered over TCP or</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; SCTP. This is because the transport-layer =
acknowledgment </FONT>
<BR><FONT SIZE=3D2>&gt; only means that the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; data have arrived at the other machine, =
not that the application has</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; actually processed it. (There's nothing =
preventing a TCP or </FONT>
<BR><FONT SIZE=3D2>&gt; SCTP stack from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; allowing application-level acknowledgment; =
but I'm not </FONT>
<BR><FONT SIZE=3D2>&gt; aware of any for TCP</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; and my reading of the API in RFC 2960 =
indicates that the </FONT>
<BR><FONT SIZE=3D2>&gt; acknowledgment is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; transport-level.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; As to my comment about UDP vs TCP for =
performance ... this </FONT>
<BR><FONT SIZE=3D2>&gt; is probably</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; irrelevant for the current discussion =
because the proposal </FONT>
<BR><FONT SIZE=3D2>&gt; is that IPFIX</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; would use NetFlow over TCP or SCTP. In =
such a case, a </FONT>
<BR><FONT SIZE=3D2>&gt; UDP-with-reliability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; protocol (which NetFlow isn't; but, for =
example, NFS is) </FONT>
<BR><FONT SIZE=3D2>&gt; ends up being about</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the same performance as TCP. Clearly, the =
path length with </FONT>
<BR><FONT SIZE=3D2>&gt; pure UDP would be</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; less than for TCP because UDP is just =
&quot;fire and forget&quot;. However, if</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; broadcast is being used to increase =
reliability (as Ganesh </FONT>
<BR><FONT SIZE=3D2>&gt; points out, this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; isn't necessary; but if there is no ACK =
mechanism, then the </FONT>
<BR><FONT SIZE=3D2>&gt; only choice is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; to broadcast to all collectors), then the =
path length </FONT>
<BR><FONT SIZE=3D2>&gt; increases. Whether</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; outputting 2 UDP packets is a longer or =
shorter instruction </FONT>
<BR><FONT SIZE=3D2>&gt; path length than</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; sending a single TCP packet, I don't =
know.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Slight change of subject: could NetFlow be =
easily extended </FONT>
<BR><FONT SIZE=3D2>&gt; to handle data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that isn't fixed-length (e.g., HTTP URLs)? =
I know that in </FONT>
<BR><FONT SIZE=3D2>&gt; NetFlow's current</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use, there's no need for such attribute =
export; but there </FONT>
<BR><FONT SIZE=3D2>&gt; are smart devices</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that look deeper into packets for smart =
switching or </FONT>
<BR><FONT SIZE=3D2>&gt; firewalling, which can</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use such information and might want to =
export it. [Probes </FONT>
<BR><FONT SIZE=3D2>&gt; can also export</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; such information.]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Example: If we want to send a variable length =
field we use </FONT>
<BR><FONT SIZE=3D2>&gt; repeat count</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Suppose we want to send string =
&quot;abc&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Netflow version 9 Template</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;----2 bytes -----&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------</FONT>
<BR><FONT SIZE=3D2>&gt; header...</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Type =3D REPEAT_COUNT</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Length =3D 2 bytes</FONT>
<BR><FONT SIZE=3D2>&gt; -----------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Type =3D CHAR_VARIABLE_LEN</FONT>
<BR><FONT SIZE=3D2>&gt; -----------------</FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Length =3D 1 byte</FONT>
<BR><FONT SIZE=3D2>&gt; -----------------</FONT>
<BR><FONT SIZE=3D2>&gt; .......</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Corresponding Netflow version 9 Data =
record</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;-----2 bytes------&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt; Header .....</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; 3 =3D ( Next field (Field 2) =
is repeated 3 times)</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp; b</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | =
......</FONT>
<BR><FONT SIZE=3D2>&gt; -------------------</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -vamsi</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Time for me to shut up and go on =
vacation.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; - peter</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; From: majordomo listserver </FONT>
<BR><FONT SIZE=3D2>&gt; [<A =
HREF=3D"mailto:majordomo@mil.doit.wisc.edu">mailto:majordomo@mil.doit.wi=
sc.edu</A>]On Behalf</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Of Ganesh Sadasivan</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Sent: Wednesday, October 09, 2002 =
2:51 PM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; To: Peter Ludemann</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Cc: =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Subject: Re: [ipfix-eval] RE: =
Discussion of Candidate </FONT>
<BR><FONT SIZE=3D2>&gt; Protocols - data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; model; broadcast vs reliable</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Peter Ludemann wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; This note discusses two =
things:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - whether we need a data =
model to define the protocol</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
we do not)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Agreed.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - cost of UDP broadcast vs =
minimalist reliable transport</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
there is very little difference)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; What do you mean by &quot;minimalist =
reliable transport&quot; ?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Since congestion awareness is =
mandatory, I don't know</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; why UDP is a topic of discussion =
here. See my comments inline.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; calato@riverstonenet.com wrote =
Monday, October 07, 2002 7:35 AM:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; Peter Ludemann =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [snip]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; YES ... so, can we all =
agree that data model issues are not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; part of this =
discussion?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. We have no =
interoperability without a data model.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I agree that we need a data =
model. I don't see why it </FONT>
<BR><FONT SIZE=3D2>&gt; should affect the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discussion of the export =
protocol. The only </FONT>
<BR><FONT SIZE=3D2>&gt; requirements on the export</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol are that it exhibit the =
desired reliability </FONT>
<BR><FONT SIZE=3D2>&gt; and efficiency; and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; that it be able to transport all =
the data types required by the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; data models.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; If we can agree on all the data =
types, then we can define the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; protocol; this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; does not require defining the =
entire data model.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [After all, SNMP is defined =
independently of the </FONT>
<BR><FONT SIZE=3D2>&gt; various MIBs - which</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correspond to the data =
model]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. Generalized data movers =
are not the problem.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Defining a protocol that is =
well defined enough so</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that many device vendors can =
export data and many</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application vendors can =
process the data regardless</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of the device is problematic =
if all you define is a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; general purpose data =
mover.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; But deciding on an adequate =
&quot;generalized data mover&quot; is the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; point of this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; evaluation process, I thought. I =
expect that there will </FONT>
<BR><FONT SIZE=3D2>&gt; be multiple data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; models, for the various kinds of =
generalized devices. (e.g.,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; for our probe,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; we've defined three generic =
groupings of data: volume metrics;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; QoS metrics;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; usage metrics and attributes -- =
similarly, SNMP's </FONT>
<BR><FONT SIZE=3D2>&gt; enterprise MIBs and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; RADIUS's vendor-specific =
attributes).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; There is one place where the =
nature of the data might </FONT>
<BR><FONT SIZE=3D2>&gt; intersect with the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol -- the high-volume =
metrics such as exported by</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; NetFlow; and where</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the claim is that a reliable =
protocol is an unnecessary</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead. So, let me</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discuss this a bit more.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The argument is that with high =
volume export it is </FONT>
<BR><FONT SIZE=3D2>&gt; preferable to do</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; multi-cast UDP with sequence =
numbers; data loss can be detected</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; by noting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; which sequence numbers are =
missing ... and reliability can be</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; increased by</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; having multiple receivers and =
de-duplicating what they receive.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; One does not need to multicast UDP to =
indicate missing </FONT>
<BR><FONT SIZE=3D2>&gt; reliability.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; For such a situation, the =
reliable protocol's </FONT>
<BR><FONT SIZE=3D2>&gt; *implementation* would not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; keep a queue of data to =
retransmit on fail-over; it would only</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; keep enough</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; buffer to deal with TCP's or =
SCTP's flow control and to </FONT>
<BR><FONT SIZE=3D2>&gt; handle bursts of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; records. ACKs would be used only =
to notice when data are not</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; received at the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; other end and to cause =
fail-over. TCP &quot;write would </FONT>
<BR><FONT SIZE=3D2>&gt; block&quot; also causes</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; fail-over.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; So records can be lost in both cases. =
Also in a continuous export</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; (in the case of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; high volume export) the rate of ACKs =
is once every 2 send packets.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I would argue that the cost of =
exporting this way is very</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; similar to that of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the UDP broadcast.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Are you talking w.r.t the end-point =
(exporter &amp; collector) or the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; network itself.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; For the former, the processing =
overhead is much higher in TCP.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; And on the receiving end, it is =
*much* easier to handle</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; than a UDP-broadcast, which also =
needs stronger </FONT>
<BR><FONT SIZE=3D2>&gt; hardware because of the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; higher de-duplication =
load.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Can be about the same for =
both:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - data copying (if =
scatter/gather is used)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - protocol overhead (sequence =
number, template ID, etc.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; In a typical datapath the instruction =
ration of UDP to TCP is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; multi-fold. I don't know how you can =
tell that the protocol</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead is the same.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The possible extra cost of the =
&quot;reliable&quot; export version is:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - timer for noticing when ACK =
isn't received [trivial cost]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP vs UDP (little difference =
with modern implementations)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP retransmit with packet =
loss (typically very low)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - cost of fail-over when no ACK =
received or write would block</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The savings and benefits of the =
&quot;reliable&quot; version are:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - fewer packet writes (broadcast =
requires 2x as many packets;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; and TCP can pack =
more efficiently because records can</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; span packets)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; As mentioned above if the&nbsp; =
absence of reliability is what we want,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; then we need not do a UDP =
broadcast.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - lower network traffic (which =
adds to reliability)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - smaller machines for =
receiving</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; what does this mean?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; thanks</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Ganesh</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - more accurate estimate of loss =
due to lack of reliability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - can handle congestion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [As an aside, even with the =
UDP-broadcast version, the </FONT>
<BR><FONT SIZE=3D2>&gt; exporter ought to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; compute totals for the various =
metrics and output those from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; time to time,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; to provide a more accurate =
understanding of data loss. Perhaps</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; such totals</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; are already available in the =
MIBs, but there remains </FONT>
<BR><FONT SIZE=3D2>&gt; the issue of how to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correlate with the sequence =
numbers of the exported data.]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - peter</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; =
<A HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; in</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;help&quot; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C2708F.08E664CA--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 18:51:04 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA26377
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 18:51:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zlwn-0000Jv-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 17:38:25 -0500
Received: from central.switch.ch ([130.59.4.1])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zlwj-0000J7-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 17:38:22 -0500
Received: from router.sl.switch.ch ([130.59.25.161] helo=celeste.switch.ch)
	by central.switch.ch with esmtp (Exim 3.20 #1)
	id 17zlvO-0006pp-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 11 Oct 2002 00:37:02 +0200
From: Simon Leinen <simon@limmat.switch.ch>
Message-ID: <15782.316.24510.824822@celeste.switch.ch>
Date: Fri, 11 Oct 2002 00:37:47 +0200
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="a844rAv8m3"
Content-Transfer-Encoding: 7bit
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Simon's evaluation draft contribution
X-Mailer: VM 7.05 under Emacs 21.2.90.1
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>


--a844rAv8m3
Content-Type: text/plain; charset=us-ascii
Content-Description: message body and .signature
Content-Transfer-Encoding: 7bit

This is my first contribution as a member of the IPFIX protocol
evaluation team.  Sorry about the delay.  I'm on vacation until next
Tuesday (October 15), and I'm able to access my mail only very
infrequently.  This and the bad weather finally helped me find some
time to work on an evaluation draft.  It is modeled roughly rather
than slavishly after the "IPFIX Protocol Evaluation" template that I
think Juergen has circulated based on similar work in MIDCOM.

Please feel free to use this material as you see fit, borrowing freely
and changing what doesn't enjoy rough evaluation team consensus.  Note
that I haven't seen anything circulating on the IPFIX mailing lists
over the past few days.

I'm not familiar with the I-D publication procedure.  If you think it
would make sense to publish my document in the I-D repository for
reference, I certainly won't mind if someone puts it there.
-- 
Simon.

--a844rAv8m3
Content-Type: text/plain
Content-Disposition: inline;
	filename="draft-leinen-ipfix-eval-00.txt"
Content-Transfer-Encoding: 7bit


Internet Draft                                              Simon Leinen
Document: draft-leinen-ipfix-eval-00.txt                          SWITCH
Expires: April 2003

                                                            October 2002


           Individual Evaluation Of IPFIX Protocol Candidates

                    <draft-leinen-ipfix-eval-00.txt>

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of [RFC 2026]. Internet-Drafts are
   working documents of the Internet Engineering Task Force (IETF), its
   areas, and its working groups. Note that other groups may also
   distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   Distribution of this document is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002). All Rights Reserved.


Abstract

   This document contains one individual evaluation team member's
   contribution to the selection process for an IP Flow Information
   Export (IPFIX) protocol.  The five candidate protocols are outlined
   and grouped in broad categories, and evaluated against a some
   specific requirements.








Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 1]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


Table of Contents

   1 Introduction .................................................    2
   2 Protocol Summaries ...........................................    2
   2.1 CRANE ......................................................    2
   2.1.1 CRANE Protocol Operation .................................    3
   2.1.2 CRANE Data Encoding ......................................    3
   2.2 Diameter ...................................................    3
   2.2.1 Diameter Protocol Operation ..............................    4
   2.2.2 Diameter Data Encoding ...................................    4
   2.3 LFAP .......................................................    4
   2.3.1 LFAP Protocol Operation ..................................    4
   2.3.2 LFAP Data Encoding .......................................    5
   2.4 NetFlow v9 .................................................    5
   2.4.1 NetFlow Protocol Operation ...............................    5
   2.4.2 NetFlow Data Encoding ....................................    5
   2.5 Streaming IPDR .............................................    5
   2.5.1 Streaming IPDR Protocol Operation ........................    6
   2.5.2 Streaming IPDR Data Encoding .............................    6
   3 Broad Classification of Candidate Protocols ..................    6
   3.1 Design Goals ...............................................    6
   3.1.1 High-Performance Flow Metering (NetFlow, LFAP) ...........    6
   3.1.2 Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE) .....    7
   3.1.3 General-Purpose AAA (Diameter) ...........................    7
   3.2 Data Representation ........................................    7
   3.2.1 Externally Described Encoding (CRANE, IPDR, NetFlow) .....    7
   3.2.2 Partly Self-describing Encoding (Diameter, LFAP) .........    8
   3.3 Protocol Flow ..............................................    8
   3.3.1 Mainly Unidirectional Protocols (IPDR, NetFlow) ..........    8
   3.3.2 Bidirectional Protocols (CRANE, LFAP) ....................    8
   3.3.3 Unidirectional after Negotiation (Diameter) ..............    9
   4 Item-Level Compliance Evaluation .............................    9
   4.1 Meter Reliability (5.1) ....................................    9
   4.2 Sampling (5.2) .............................................   10
   4.3 Overload Behaviour (5.3) ...................................   10
   4.4 Information Model (6.1) ....................................   11
   4.5 Data Model (6.2) ...........................................   11
   4.5.1 Data Model Extensibility .................................   11
   4.5.2 Flexible Flow Record Definition ..........................   12
   4.6 Data Transfer (6.3) ........................................   12
   4.6.1 Congestion Awareness (6.3.1) .............................   12
   4.6.2 Reliability (6.3.2) ......................................   12
   4.6.3 Security (6.3.2) .........................................   13
   4.6.3.1 IPSEC and TLS ..........................................   13
   4.6.3.2 Application-level Security .............................   13
   4.6.4 Push and Pull Mode Reporting (6.4) .......................   14
   4.6.5 Regular Reporting Interval (6.5) .........................   14
   4.6.6 Notification on Specific Events (6.6) ....................   14
   4.6.7 Anonymization (6.7) ......................................   15
   4.6.8 Several Collecting Processes (8.3) .......................   15


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 2]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   5 Opinionated Conclusions ......................................   15
   6 Security Considerations ......................................   17
   7 References ...................................................   17
   8 Author's Address .............................................   18
   9 Full Copyright Statement .....................................   19


1.  Introduction

   The IP Flow Information Export (IPFIX) Working Group has been
   chartered to select a protocol for the export of flow information
   from traffic-observing devices (such as routers or dedicated probes).
   To this end, an evaluation team was formed to evaluate submitted
   protocols.  Each protocol is represented by an advocate, who
   submitted a specific evaluation draft for the respective protocol
   against the requirements document [IPFIX-REQ].  The specification of
   each protocol was itself available as one or several Internet-Drafts,
   sometimes referring normatively to documents from outside the IETF.

   This document contains the author's personal evaluation of the
   submitted protocols with respect to the requirements document, and on
   a more general level, to the working group charter.  It is intended
   to serve as input for the deliberations of the evaluation team.

   The following IPFIX candidate protocol submissions were evaluated:

      -  CRANE [CRANE], [CRANE-EVAL]

      -  Diameter [DIAMETER], [DIAMETER-EVAL]

      -  LFAP [LFAP], [LFAP-EVAL]

      -  NetFlow v9 [NETFLOWV9], [NETFLOWV9-EVAL]

      -  Streaming IPDR [IPDR], [IPDR-EVAL]

   This document uses terminology defined in [IPFIX-REQ] intermixed with
   that from submissions to explain the mapping between the two.

2.  Protocol Summaries

   In the following, each candidate protocol is described briefly,
   highlighting its specific distinguishing features.

2.1.  CRANE

   XACCT's Common Reliable Accounting for Network Element Protocol
   Version 1.0 [CRANE] [CRANE-EVAL] is described as a protocol for the
   transmission of accounting information from "Network Elements" to
   "mediation" and "business support systems".


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 3]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


2.1.1.  CRANE Protocol Operation

   The exporting side is the CRANE client, the collecting side the CRANE
   server.  Note that it is the server that is responsible for
   initiating the connection to the client.  A client can have multiple
   simultaneous connections to different servers for robustness.  Each
   server has an associated priority.  A client only exports to the
   server with the highest priority that is perceived operational.

   Clients and servers exchange messages over a reliable protocol such
   as TCP [TCP] or (preferably) SCTP [SCTP].  The protocol uses
   application-layer acknowledgements as an indication of successful
   processing by the server.  Strong authentication or data
   confidentiality aren't support by the protocol, but can be supported
   by lower-layer mechanisms such as IPSEC [IPSEC] or TLS [TLS].

   The protocol is bidirectional over the entire duration of a session.
   There are 20 different message types.  The protocol supports template
   negotiation, not only at startup but also later on in a session, as
   well as general status inquiries.  There is a separate version
   negotiation protocol defined over UDP.

2.1.2.  CRANE Data Encoding

   Data encoding is based on templates.  Templates contain "keys"
   representing items in data records.  Clients (exporters) publish
   templates to servers (collectors).  Servers can then select the
   subset of fields in a template that they are interested in.  The
   client will suppress keys that haven't been selected by the server.

   Data records contain references to template and configuration
   instances.  They also carry sequence numbers (DSNs for Data Sequence
   Numbers).  These sequence numbers can be used to de-duplicate data
   records that have been delivered multiple times during failover/fail-
   back in redundant configurations.  A "duplicate" bit is set in these
   situations as a hint for the de-duplication process.

   The encoding of (flow information) data records themselves is very
   compact.  The client (exporter) can choose to send data in big-endian
   (network byte order) or little-endian format.  There are eighteen
   fixed-size key types, as well as five variable-length string and
   binary data (BLOB) types.

2.2.  Diameter

   Diameter [DIAMETER] [DIAMETER-EVAL] is an evolution of the Remote
   Authentication Dial In User Service (RADIUS) protocol [RADIUS].
   RADIUS is widely used to outsource authentication and authorization
   in dialup access environments.  Diameter is a generalized and
   extensible protocol intended to support Authentication, Authorization


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 4]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   and Accounting (AAA) requirements of different applications.  Dialup
   and Mobile IPv4 are examples of such applications defined in the
   IETF.

2.2.1.  Diameter Protocol Operation

   Diameter is a peer-to-peer protocol.  The base protocol defines
   fourteen command codes, organized as seven request/response command
   pairs.  Presumably, only a subset of these would be used in a pure
   IPFIX application.  Diameter includes capability negotiation and
   error notifications.  Diameter operates over TCP or (preferred) SCTP.
   There is a framework for end-to-end security, the mechanisms for
   which are defined in a separate document.  IPSEC or TLS can be used
   to provide authentication or encryption at the underlying layers.

2.2.2.  Diameter Data Encoding

   Diameter conveys data in the form of attribute/value pairs (AVPs).
   An AVP consists of eight bytes of header plus the space to store the
   data, which depends on the data format.  There are numerous
   predefined AVP data formats, including signed and unsigned integer
   types, each in 32 and 64 bit variants, IPv4 and IPv6 addresses, as
   well as others.  The advocacy draft [DIAMETER-EVAL] suggests that the
   predefined data formats IPFilterRule and/or QoSFilterRule could be
   extended to represent IP Flow Information.  Such rules are
   represented as readable UTF-8 strings.  Alternatively, new AVPs could
   be defined to represent flow information.

2.3.  LFAP

   LFAP [LFAP] [LFAP-DATA] [LFAP-EVAL] started out as the "Lightweight
   Flow Admission Protocol" and was used to outsource shortcut creation
   decisions on flow-based routers, as well as to provide per-flow
   statistics.  Later versions removed the admission function and
   changed the name to "Lightweight Flow Accounting Protocol"

2.3.1.  LFAP Protocol Operation

   The exporter in LFAP is called the Connection Control Entity (CCE),
   and the collector is the Flow Accounting Server (FAS).  These
   entities communicate with each other over a TCP connection.  LFAP
   knows thirteen message types, including operations for connection
   management, version negotiation, flow information messages and
   administrative requests.  Authentication and encryption can be
   provided by IPSEC or TLS at lower layers.  Additionally, the LFAP
   protocol itself supports four levels of security using HMAC-MD5
   authentication and DES-CBC encryption.

   A distinguishing feature is that LFAP has two different message types
   for flow information: A Flow Accounting Request (FAR) message is sent


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 5]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   when a new flow is identified at the CCE (meter/exporter).
   Accounting information is sent later in one or multiple Flow Update
   Notification (FUN) messages.  A collector must match each FUN to a
   Flow ID previously sent in a FAR.

   The LFAP document also defines a set of useful statistics about the
   accounting process.  A separate MIB document [LFAP-MIB] is provided
   for management of LFAP entities using SNMP.

2.3.2.  LFAP Data Encoding

   LFAP encodes data in a Type/Length/Value format with four bytes of
   overhead per data item (two bytes for the type and two bytes for the
   length field).

2.4.  NetFlow v9

   NetFlow v9 [NETFLOWV9] [NETFLOWV9-EVAL] is a generalized version of
   Cisco's NetFlow protocol.  Previous versions of NetFlow, in
   particular version 5, have been widely implemented and used for the
   exporting and collecting of IP flow information.

2.4.1.  NetFlow Protocol Operation

   NetFlow uses a very simple protocol, with the exporter sending
   template, options, and data "FlowSets" to the collector.  FlowSets
   are sequences of data records of similar format.  NetFlow is the only
   one of the candidate protocols that has always worked over UDP [UDP].
   Because of the simple unidirectional nature of the protocol, it
   should be relatively straightforward to add mappings to other
   transport protocols such as SCTP or TCP.  The current NetFlow v9
   draft fails to specify such a mapping, but the advocacy draft
   suggests an SCTP transport to make NetFlow congestion-friendly.

2.4.2.  NetFlow Data Encoding

   NetFlow v9 uses a template facility to describe exported data.  The
   data itself is represented in a compact way using network byte order.

2.5.  Streaming IPDR

   Streaming IPDR [IPDR] [IPDR-EVAL] is an application of the Network
   Data Management-Usage (NDM-U) For IP Services specification version
   3.1 [NDM-U-3.1].  It has been developed by the Internet Protocol
   Detail Record Organization (IPDR, Inc. or ipdr.org).  The terminology
   used is similar to CRANE's, talking about Service Elements (SEs),
   mediation systems and Business Support Systems (BSS).





Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 6]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


2.5.1.  Streaming IPDR Protocol Operation

   Streaming IPDR operates over TCP.  There is a "Trivial TCP Delivery"
   mode as well as an "Acknowledged TCP Delivery" or "Reliable
   Streaming" mode.  The latter uses application-layer acknowledgements
   for increased reliability.

   The protocol is basically unidirectional.  The exporter opens a
   connection towards the collector, then sends a header followed by a
   set of record descriptors.  Then it can send "Usage Event" records
   corresponding to these descriptors until the connection is
   terminated.  New record descriptors can be sent at any time.
   Messages carry sequence numbers that are used for de-duplication
   during failover.  They are also referenced by application-level
   acknowledgements when Reliable Streaming is used.

2.5.2.  Streaming IPDR Data Encoding

   IPDR uses an information modeling technique based on the XML-Schema
   language [XML].  Data can be represented in XML or in a streamlined
   encoding based on the External Data Representation [XDR].  XDR forms
   the basis of Sun's Remote Procedure Call and Network File System
   protocols, and has proven to be both space- and processing-efficient.

3.  Broad Classification of Candidate Protocols

   In order to evaluate the candidate protocols against the higher-level
   requirements laid out in the IPFIX Working Group charter, it is
   useful to group them into broader categories.

3.1.  Design Goals

   One way to look at the candidate protocols is to study the goals that
   have directed their respective design.  Note that the intention is
   not to exclude protocols that have been designed with a different
   class of applications in mind, but simply to better understand the
   different tradeoffs that distinguish the protocols.

3.1.1.  High-Performance Flow Metering (NetFlow, LFAP)

   Of the candidate protocols, Cisco's NetFlow is the purest example of
   a highly specialized protocol that has been designed with the sole
   objective of conveying accounting data from flow-aware routers at
   high rates.  Starting from a fixed set of accounting fields, it has
   been extended a few times over the years to support additional fields
   and various types of aggregation in the metering/exporting process.

   Riverstone's LFAP is similarily focused, except that it originated in
   a protocol to outsource the decision whether to create shortcuts in
   flow-based routers.  This is still manifest in an increased emphasis


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 7]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   on reliable operation, and in the split reporting of flow information
   using Flow Accounting Request (FAR) and Flow Update Notification
   (FUN) messages.

3.1.2.  Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE)

   Streaming IPDR and CRANE describe themselves as protocols to
   facilitate the reliable transfer of accounting information between
   Network Elements (or more generally "Service Elements" in the case of
   IPDR) and Mediation Systems or Business Support Systems (BSS).  They
   reflect a view of the accounting problem and of network system
   architectures that originates in traditional "vertically integrated"
   telecommunications.

   Both protocols also emphasize extensibility with the goal of
   applicability to a wide range of accounting tasks.

   IPDR is based on NDM-U, which uses the XML-Schema language for
   machine-readable specification of accounting data structures, while
   using the efficient XDR encoding for the actual data transfer.

   CRANE uses templates to describe exported data.  These templates are
   negotiated between collector and exporter and can change during a
   session.

3.1.3.  General-Purpose AAA (Diameter)

   Diameter is another example of a broader-purpose protocol, in that it
   covers aspects of authentication and authorization as well as
   accounting.  This explains its strong emphasis on security and
   reliability.  The design also takes into account various types of
   intermediate agents.

3.2.  Data Representation

   IPFIX is intended to be deployed, among others, in high-speed routers
   and to be used for exporting detailed flow data at high flow rates.
   Therefore it is useful to look at the tradeoffs between the
   efficiency of data representation and the extensibility of data
   models.  The two main efficiency goals should be (1) to minimize the
   export data rate and (2) to minimize data encoding overhead in the
   exporter.  The overhead of decoding flow data at the collector is
   deemed less critical, and is partly covered by efficiency target (2),
   since an encoding that is easy on the encoder is often also easy on
   the decoder.

3.2.1.  Externally Described Encoding (CRANE, IPDR, NetFlow)

   The protcols in this group use an external mechanism to fully
   describe the format in which flow data is encoded.  The mechanisms


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 8]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   are "templates" in the case of CRANE and NetFlow, and a subset of the
   XML-Schema language, or alternatively XDR IDL, for IPDR.

   A fully external data format description allows for very compact
   encoding, with data components such as 32-bit integers taking up only
   four octets.  The XDR representation used in IPDR additionally
   ensures that larger fields are always aligned on 32-bit boundaries,
   which can reduce processing requirements at both the exporter and the
   collector, at a slight cost of space (thus bandwidth) due to padding.

3.2.2.  Partly Self-describing Encoding (Diameter, LFAP)

   Diameter and LFAP represent flow data using Type/Length/Value
   encodings.  While this makes it possible to partly decode flow data
   without full context information - possibly useful for debugging - it
   does increase the encoding size and thus the bandwidth requirements
   both on the wire and in the exporter and collector.

3.3.  Protocol Flow

   Another criterion for classification is the flow of protocol messages
   between exporter and collector.

3.3.1.  Mainly Unidirectional Protocols (IPDR, NetFlow)

   In IPDR and NetFlow, the data flow is essentially from exporter to
   collector, with the collector only sending acknowledgements.  The
   protocols send data descriptions (templates) on session
   establishment, and then start sending flow export data based on these
   templates.  "Meta-information" about the operational status of the
   metering and exporting processes (for example about the sampling
   parameters in force at a given moment) is conveyed using a special
   type of "Option" template in NetFlow v9.  IPDR currently doesn't have
   definitions for such "meta-data" types, but they could easily be
   defined outside the protocol proper.

3.3.2.  Bidirectional Protocols (CRANE, LFAP)

   CRANE allows for negotiation of the templates used for data export at
   the start of a session, and also allows negotiated template updates
   later on.  CRANE sessions include an exporter and potentially several
   collectors, so these negotiations can involve more than two parties.

   LFAP has an initial phase of version negotiation, followed by a phase
   of "data negotiation".  After these startup phases, the exporter
   sends FAR and FUN messages to the collector.  However, either party
   may also send Administrative Request (AR) messages to the other, and
   will normally receive Administrative Request Answers (ARA) in
   response.  Administrative Requests can be used for status inquiries,
   including information about a specific active flow, or for


Simon Leinen         draft-leinen-ipfix-eval-00.txt             [Page 9]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   negotiation of the "Information Elements" that the collector wants
   the exporter to export.

3.3.3.  Unidirectional after Negotiation (Diameter)

   Diameter has a general capabilities negotiation mechanism.  The use
   of Diameter for IPFIX hasn't been described in sufficient detail to
   determine how capabilities negotiation would be used.  After
   negotiation, the protocol would operate in essentially unidirectional
   mode, with Accounting-Request (ACR) messages flowing from the
   exporter to the collector, and Accounting-Answer (ACA) messages
   flowing back.

4.  Item-Level Compliance Evaluation

   The template for protocol advocates noted that not all requirements
   in [IPFIX-REQ] apply directly to the flow export protocol.  In
   particular, sections 4 (Distinguishing Flows) and 5 (Metering
   Process) mainly specify requirements on the metering mechanism that
   "feeds" the exporter.  However, in some cases they require
   information about the metering process to be reported to collectors,
   so the flow export protocol must support conveying this information.

4.1.  Meter Reliability (5.1)

   CRANE, Diameter, IPDR consider requirement 5.1 (reliability of the
   metering process or indication of "missing reliability" out of scope
   for the IPFIX protocol, which presumably means that they assume the
   metering process to be reliable.

   The NetFlow v9 advocacy draft takes a similar stance when it claims
   "Total Compliance. The metering process is reliable."  (although this
   has been documented not to be true for all current Cisco
   implementations of NetFlow v5).

   LFAP is the only protocol that explicitly addresses the possibility
   that data might be lost in the metering process, and provides useful
   statistics the collectors to estimate not just the amount of flow
   data that was lost, but also the amount of data not unaccounted for.

   Note that in the general case, it can be considered unrealistic to
   assume total reliability of a flow-based metering process in all
   situations, unless sampling or coarse flow definitions are used.
   With the fine-grained flow classification mechanisms mandated by
   IPFIX, it is easy to imagine traffic where each - possibly very small
   - packet would create a new flow.  This kind of traffic is in fact
   encountered in practice during aggressive port scans, and will
   eventually lead to table overflows or exceeding of memory bandwidth
   at the meter.



Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 10]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   While some of these situations can be handled by dropping data later
   on in the exporter, data transfer, or collector, or by transitioning
   the meter to sampling mode (or increasing the sampling interval), it
   will sometimes be considered the lesser evil to simply report on the
   data that couldn't be accounted for.  Currently LFAP is the only
   protocol that supports this.

4.2.  Sampling (5.2)

   CRANE and IPDR don't mention the possibility of sampling.  This is
   natural because they are targeted towards telco-grade accounting,
   where sampling would be considered inadmissible.  Since support for
   sampling is a "MAY" requirement, its lack could be tolerated, but
   severely restricts the applicability of these protocols in places of
   high aggregation, where absolute precision is not necessary.  This
   includes applications such as traffic profiling, traffic engineering,
   and large-scale attack/intrusion detection, but also usage-based
   accounting applications where charging based on sampling is agreed
   upon.

   The Diameter advocate acknowledges the existence of sampling and
   suggests to define new (grouped) AVPs to carry information about the
   sampling parameters in use.

   LFAP does not currently support sampling, although its advocate
   contends that adding support for this would be relatively
   straightforward, without going into too much detail.

   NetFlow v9 does support sampling (and many implementations and
   deployments of sampled NetFlow exist for previous NetFlow versions).
   Option Data is supposed to convey sampling configuration, although no
   sampling-related field types have yet been defined in the draft.

4.3.  Overload Behaviour (5.3)

   The requirements document suggests that meters adapt to overload
   situations, for example by changing to sampling (or reducing the
   sampling rate if sampling is already in effect), by changing the flow
   definition to coarser flow categories (thinning), by stopping to
   meter, or by reducing packet processing.

   In these situations, the requirements document mandates that flow
   information from before the modification of metering behavior can be
   cleanly distinguished from flow information from after the
   modification.  For the suggested mitigation methods of sampling or
   thinning, this essentially means that all existing flows have to be
   expired, and an entirely new set of flows must be started.  This is
   undesirable because it causes a peak of resource usage in an already
   overloaded situation.



Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 11]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   LFAP and NetFlow claim to handle this requirement, both by supporting
   only the simple overload mitigation methods that don't require the
   entire set of existing flows to be expired.  The NetFlow advocate
   claims that the reporting requirement could be easily met by expiring
   existing flows with the old template, while sending a new template
   for new flows.  While it is true that NetFlow handles this
   requirement in a very graceful manner, the general performance issue
   remains.

   CRANE, Diameter, and IPDR consider the requirement out of scope for
   the protocol, although Diameter summarily acknowledges the possible
   need for new AVP definitions related to mitigation methods.

4.4.  Information Model (6.1)

   All candidate protocols have information models that can represent
   all required and all optional attributes.  The Diameter contribution
   lacks some detail on how exactly the IPFIX-specific attributes should
   be mapped.

4.5.  Data Model (6.2)

4.5.1.  Data Model Extensibility

   Each candidate protocol defines a data model that allows for some
   degree of extensibility.

   CRANE uses Keys to specify fields in templates.  A key "specification
   MUST consist of the description and the data type of the accounting
   item." Apparently extensibility is intended, but I'm not sure whether
   adding a new Key really only involves writing a textual description
   and deciding upon a base type.  Every Key also has a 32-bit Key ID,
   but from the current specification they don't seem to carry global
   semantics.

   Diameter's Attribute/Value Pairs (AVP) have a 32-bit identifier (AVP
   Code) administered by IANA.  In addition, there is an optional 32-bit
   Vendor-ID that can contain an SMI Enterprise Number for vendor-
   defined attributes.  If the Vendor-ID (and a corresponding flag in
   the attribute) is set, the AVP Code becomes local to that vendor.

   IPDR uses a subset of the XML-Schema language for extensibility, thus
   allowing for vendor- and application-specific extensions of the data
   model.

   In LFAP, flow attributes are defined as Information Elements.  There
   is a 16-bit IE type code (which is carried in the export protocol for
   every IE).  One type code is reserved for vendor-specific extensions.
   Arbitrary sub-types of the vendor-specific IE can be defined using
   ASN.1 Object IDs (OIDs).


Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 12]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   In NetFlow v9 as reviewed, data items are identified by a sixteen-bit
   field type.  26 field types are defined in the draft.  The draft
   suggests to look check a Web page at Cisco Systems' site for the
   current list of field types.  It would be preferable if the
   administration of the field type space would be delegated to IANA.

4.5.2.  Flexible Flow Record Definition

   All protocols allow for flexible flow record definitions.  CRANE and
   LFAP make the selection/negotiation of the attributes to be included
   in flow records a part of the protocol, the other protocols leave
   this to outside configuration mechanisms.

4.6.  Data Transfer (6.3)

4.6.1.  Congestion Awareness (6.3.1)

   All protocols except for NetFlow v9 operate over a single TCP or SCTP
   transport connection, and inherit the congestion-friendliness of
   these protcols.

   NetFlow v9 has been defined to operate over UDP, but claims to be
   transport-independent and could also be mapped on SCTP or TCP as a
   transport protocol.  The details of such mappings haven't been
   specified, although doing so should have been straightforward given
   the unidirectional nature of this protocol.

4.6.2.  Reliability (6.3.2)

   In my opinion, the reliability requirement hasn't yet been
   satisfactorily defined in the requirements draft.  Here are a few
   observations regarding the candidate protocols' approaches to
   reliability.  Note that the requirement for multiple collectors (8.3)
   also touches on the issue of reliability.

   CRANE, Diameter, and IPDR, as protocols that strive to be carrier-
   grade accounting protocols, understandably exhibit a strong emphasis
   on near-total reliability of the flow export process.  All three
   protocols use application-level acknowledgements (in case of IPDR,
   optionally) to include the entire collection process in the feedback
   loop.  Indications of "lack of reliability" (lost flow data) are
   somewhat unnatural to these protocols, because they take every effort
   to never lose anything.  These protocols seem suitable in situations
   where one would rather drop a packet than forward it unaccounted for.

   LFAP has application-level acknowledgements, and it also reports
   detailed statistics about lost flows and the amount of data that
   couldn't be accounted for.  It represents a middle ground in that it
   acknowledges that accounting reliability will sometimes be sacrificed
   for the benefit of other tasks, such as switching packets, and


Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 13]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   provides the tools to gracefully deal with such situations.

   NetFlow v9 is the only protocol for which the use of a "reliable"
   transport protocol is optional, and the only protocol that doesn't
   support application-level acknowledgements.  In all fairness, it
   should be noted that it is a very simple and efficient protocol, so
   in an actual deployment it might exhibit a higher level of
   reliability than some of the other protocols would given the same
   amount of resources.

4.6.3.  Security (6.3.2)

4.6.3.1.  IPSEC and TLS

   All protocols can use, and their descriptions in fact recommend to
   use, lower-layer security mechanisms such as IPSEC and, with the
   exception of NetFlow v9 over UDP, TLS.  It can be argued that in all
   envisioned usage scenarios for IPFIX, both IPSEC and TLS provide
   sufficient protection against the main identified threats of flow
   data disclosure and forgery.

   The Diameter draft is the only protocol definition that goes into
   sufficent level of detail with respect to the application of these
   mechanisms, in particular the negotiation of certificates and ciphers
   in TLS, and the use of IKE [IKE] for IPSEC.  Diameter also mandates
   that either IPSEC or TLS be used.

4.6.3.2.  Application-level Security

   Diameter suggests an additional end-to-end security framework for
   dealing with untrusted third-party agents.  I am not entirely
   convinced that this additional evel of security justifies the
   additional complexity in the context of IPFIX.

   LFAP [LFAP] is the only other protocol that includes some higher-
   level security mechanisms, providing four levels of security
   including no security, authenticated peers, flow data authentication,
   and flow data encryption using HMAC-MD5-96 and DES-CBC.

   As far as I can judge - not being a security expert -, LFAP's built-
   in support for authentication and encryption doesn't provide
   significant additional security compared with the use of TLS or
   IPSEC.  It is potentially useful in situations where TLS or IPSEC are
   unavailable for some reason, although in the context of IPFIX
   scenarios it should be possible to assume support for these lower-
   layer mechanisms if the participating devices are capable of the
   necessary cryptographic methods at all.





Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 14]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


4.6.4.  Push and Pull Mode Reporting (6.4)

   All protocols support the mandatory "push" mode.

   The optional "pull" mode could be supported relatively easily in
   Diameter, and is foreseen in NDM-U, the basis of the Streaming IPDR
   proposal.  CRANE, LFAP and NetFlow don't have a "pull" mode.  For
   CRANE and LFAP, adding one would not violate the spirit of the
   protocols because they are already two-way, and in fact LFAP already
   foresees inquiries about specific active flows using Administrative
   Request (AR) messages with a RETURN_INDICATED_FLOWS Command Code IE.

4.6.5.  Regular Reporting Interval (6.5)

   It is not clear whether this ("SHOULD") requirement applies to the
   protocol or merely to the configurability of reporting/timeout
   parameters in the export process.

4.6.6.  Notification on Specific Events (6.6)

   The specific events listed in the requirements documents as examples
   for "specific events" are "the arrival of the first packet of a new
   flow and the termination of a flow after flow timeout".  For the
   former, only LFAP explicitly generates messages upon creation of a
   new flow.  NetFlow always exported flow information on expiry of
   flows, either due to timeout or due to an indication of flow
   termination.  The other protocols are unspecific about when flow
   information is exported.

   On "specific events" in general, all protocols have some mechanism
   that could be used for notification of asynchronous events.  An
   example for such an event would be that the sampling rate of the
   meter was changed in response to a change in the load on the
   exporting process.

   CRANE has Status Request/Status Response messages, but as defined,
   Status Requests can only be issued by the server (collector), so they
   cannot be used by the server to signal asynchronous events.  As in
   IPDR, this could be circumvented by defining templates for meta-
   information.

   Diameter could use special Accounting-Request messages for event
   notification.

   IPDR would presumably define pseudo-"Usage Events" using an XML
   Schema so that events can be reported along with usage data.

   LFAP has Administrative Requests (AR) that can be initiated from
   either side.  The currently defined ARs are all information inquiries
   or reconfiguration requests, but new ARs could be defined to provide


Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 15]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   unsolicited information about specific asynchronous events.  The LFAP
   MIB also defines some traps/notifications.  SNMP notifications are
   useful to signal events to a network management system, but they are
   less attractive as a mechanism to signal events that should be
   somehow handled by a collector.

   In NetFlow v9, Option Data FlowSets are defined to convey information
   about the metering and export processes.  But the current draft
   specifies that Option Data should be exported periodically, so they
   aren't directly applicable for asynchronous events.  However they
   would be if the restriction to periodical reporting were relaxed.

4.6.7.  Anonymization (6.7)

   None of the protocols include explicit support for anonymization.
   All protocols could be extended to convey when and how anonymization
   is being performed by an exporter, using mechanisms similar to those
   that would be used to report on sampling.  However it can be argued
   that anonymization it more "static" in the sense that it will be
   either configured at the exporter or not, and that the collector can
   be made aware of this by means outside the IPFIX protocol.

4.6.8.  Several Collecting Processes (8.3)

   CRANE, Diameter, and IPDR all support multiple collectors in a backup
   configuration.  The failover case is analyzed in some detail, with
   support for data buffering and de-duplication in failover situations.

   NetFlow takes a more simple-minded approach in that it allows
   multiple (currently: two) collectors to be configured in an exporter.
   Both collectors will generally receive all data and could use
   sequence numbers and inter-collector communication to de-duplicate
   them.  This is a simple way to improve availability but may also be
   considered to be wasteful, both in terms of bandwidth and in terms of
   other exporter resources.  With the current UDP mapping it is easy
   enough to send multiple copies of datagrams to different collectors,
   but when SCTP or TCP is used, sending all data over multiple
   connections will exacerbate performance issues.

   I don't entirely understand how failover is handled in LFAP, where
   flow information is separated into FAR and FUN messages.  In
   particular, when the primary FAS A fails and the CCE starts sending
   to secondary FAS B, will it send B FUNs that refer to Flow IDs whose
   FARs had only been sent to A?

5.  Opinionated Conclusions

   Every candidate protocol has its strengths and weaknesses.  If the
   primary goal of the IPFIX standardization effort were to define a
   carrier-grade accounting protocol that can also be used to carry IP


Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 16]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   flow information, then one of CRANE, Diameter and Streaming IPDR
   would probably be the candidate of choice.

   But since the goal is to standardize existing practice in the area of
   IP Flow Information Export, it makes sense to analyze why previous
   versions of NetFlow have been so widely implemented and used.  The
   strong position of Cisco in the router market certainly played a
   major role, but we should not underestimate the value of having a
   simple and streamlined protocol that "does one thing and does it
   well".  It has been extremely easy to write NetFlow collecting
   processes, as all the protocol demands from a collector is to sit
   there and receive data.  This model is no longer adequate when one
   wants to support increased levels of reliability or dynamically
   changing semantics for data export.  But NetFlow remains a simple
   protocol, mainly by leaving out issues of configuration/negotiation.

   The biggest issue with NetFlow is that so far it could not resolve
   itself to mandate a reliable (and congestion-friendly) transport.
   This could easily be fixed, and bring with it some additional
   possibilities for simplifications.  For example it would no longer be
   necessary to periodically retransmit Template FlowSets, and Option
   Data FlowSets could become a more versatile way of reporting meta-
   information about the metering and exporting processes either
   synchronously or asynchronously.  Application-level acknowledgements
   - possibly as an option - would be a low-impact addition to improve
   overall reliability.

   LFAP is also relatively focused on flow information export, but
   carries around too much baggage from its youth as the Lightweight
   Flow Admission Protocol.  The bidirectional nature and large number
   of message types in the protocol are one symptom of this, the
   separation of flow information into FARs and FUNs - which must be
   matched at the collector - are another.  Data encoding is less space-
   efficient than that of CRANE, NetFlow or IPDR, and will present a
   performance issue at high flow rates.

   LFAP's indications of unaccounted data and its MIB are excellent
   features that would be very useful in many operational situations.

   I contend that the overall goals of the IPFIX WG charter would best
   be served by starting with NetFlow v9, working on lacking mechanisms
   in the areas of transport, reliability, and redundant configurations,
   and doing so very carefully in order to retain as much simplicity as
   possible and to avoid overloading the protocol.  By starting from the
   simplest protocol that meets a large percentage of the specific
   requirements, we can hope to arrive at a protocol that meets all
   requirements and still allows widespread and cost-effective
   implementation.




Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 17]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


6.  Security Considerations

   The security mechanisms of the candidate protocols were discussed in
   the section about the Security requirement (6.3.2).

7.  References

[IPFIX-REQ] J. Quittek et al., "Requirements for IP Flow Information
            Export", draft-ietf-ipfix-reqs-06.txt, work in progress,
            September 2002.

[CRANE]     K. Zhang, E. Elkin, "XACCT's Common Reliable Accounting for
            Network Element (CRANE) Protocol Specification Version 1.0",
            draft-kzhang-crane-protocol-05.txt, work in progress, August
            2002.

[CRANE-EVAL]
            K. Zhang, E. Elkin, P. Ludemann, "Evaluation of the CRANE
            Protocol Against IPFIX Requirements", draft-kzhang-ipfix-
            eval-CRANE-00.txt, work in progress, September 2002.

[DIAMETER]  P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko,
            "Diameter Base Protocol", draft-ietf-aaa-diameter-12.txt,
            work in progress, July 2002.

[DIAMETER-EVAL]
            S. Zander, "Evaluation of the Diameter Protocol Against
            IPFIX Requirements", draft-zander-ipfix-eval-
            diameter-00.txt, work in progress, September 2002.

[LFAP]      P. Calato, M. MacFaden, "Light-weight Flow Accounting
            Protocol Specification Version 5.0", draft-riverstone-
            lfap-01.txt, work in progress, June 2002.

[LFAP-DATA] P. Calato, M. MacFaden, "Light-weight Flow Accounting
            Protocol Data Definition Specification Version 5.0", draft-
            riverstone-lfap-data-01.txt, work in progress, June 2002.

[LFAP-EVAL] P. Calato, "Evaluation of Protocol LFAP Against IPFIX
            Requirements", draft-calato-ipfix-lfap-eval-05.txt, work in
            progress, August 2002.

[LFAP-MIB]  ??? "Light-weight Flow Accounting Protocol Management
            Information Base???", draft-???.txt, work in progress,
            September??? 2002.

[NETFLOWV9] B. Claise, "Cisco Systems NetFlow services Export Version
            9", draft-bclaise-netflow-9-01.txt, work in progress,
            October 2002.



Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 18]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


[NETFLOWV9-EVAL]
            B. Claise, "Evaluation Of NetFlow Version 9 Against IPFIX
            Requirements", draft-claise-ipfix-eval-netflow-02.txt, work
            in progress, October 2002.

[IPDR]      J. Meyer, "Reliable Streaming Internet Protocol Detail
            Records", draft-meyer-ipdr-streaming-00.txt, work in
            progress, August 2002.

[IPDR-EVAL] J. Meyer, "Evaluation Of Streaming IPDR Against IPFIX
            Requirements", draft-meyer-ipfix-IPDR-eval-00.txt, work in
            progress, September 2002.

[NDM-U-3.1] Internet Protocol Detail Record Organization, "Network Data
            Management - Usage (NDM-U) For IP-Based Services Version
            3.1", April 2002.

[IPSEC]     S. Kent, et al. "Security Architecture for the Internet
            Protocol", RFC 2401, November 1998.

[IKE]       D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)",
            RFC 2409, November 1998.

[TLS]       T. Dierks, et al. "The TLS Protocol, Version 1.0", RFC 2246,
            January 1999.

[RADIUS]    C. Rigney, A. Rubens, W. Simpson, S. Willens, "Remote
            Authentication Dial In User Service (RADIUS)", RFC 2865,
            June 2000.

[TCP]       J. Postel, "Transmission Control Protocol", RFC 793, January
            1981.

[UDP]       J. Postel, "User Datagram Protocol" RFC 768, August 1980.

[SCTP]      R. Stewart et al., "Stream Control Transmission Protocol",
            RFC 2960. October 2000.

[XML]       World Wide Web Consortium, "Extensible Markup Language (XML)
            1.0", W3C XML, February 1998.

[XDR]       R. Srinivasan, "XDR: External Data Representation Standard",
            RFC 1832, August 1995.

8.  Author's Address

     Simon Leinen  <simon@limmat.switch.ch>
     SWITCH
     Limmatquai 138
     P.O. Box


Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 19]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


     8021 Zurich
     Switzerland
     phone: +41 1 268 1530


9.  Full Copyright Statement

   Copyright (C) The Internet Society (2002). All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the  purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.




















Simon Leinen         draft-leinen-ipfix-eval-00.txt            [Page 20]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002



--a844rAv8m3--


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 19:41:59 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA26378
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 18:51:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zm2L-0000SI-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 17:44:09 -0500
Received: from smtp.desyne.com ([64.124.142.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zm2J-0000SB-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 10 Oct 2002 17:44:07 -0500
Received: from AHEINTZPC ([208.46.98.198])
	by smtp.desyne.com (8.11.4/8.11.3) with SMTP id g9AMi9720383;
	Thu, 10 Oct 2002 18:44:09 -0400
From: "Aron Heintz" <aheintz@ipdr.org>
To: <ipfix-eval@net.doit.wisc.edu>, "Harrington, David" <dbh@enterasys.com>,
        "Jeff Meyer" <jeff_meyer2@hp.com>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Thu, 10 Oct 2002 17:47:22 -0500
Message-ID: <EOEAKGOHDKBHBDKCNFFJGEABCPAA.aheintz@ipdr.org>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <EOEAKGOHDKBHBDKCNFFJEEPOCOAA.aheintz@ipdr.org>
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300
Importance: Normal
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

	Following are comments on openness and likelihood of adoption (some given
in relative ignorance of your technical problem domain - sorry).

	It seems to me that NDM-U wins the "free, open, and widely deployed" crown
hands down.  NDM-U 3.1 is completely free and publicly available (see
below).  By the end of this year, more than 70% of the mediation and billing
packages (by market share) will have proven NDM-U 3.1 *real-world*
interoperability.

	What could be more important than this?  It appears that some of you are
debating minor technical points when you might approach the question "Who is
going to receive the data we are sending?  How do they want to see it?"
Technologies do not win by virtue of their theoretical perfection.  The OSI
model is close to theoretical perfection.  TCP/IP is not.

	Do you want to attach yourself to a technology created, supported, and
propagated by a single vendor?  If not, narrow your field to NDM-U vs.
Diameter.  You will also find that NDM-U technology *is* close to
perfection, thanks to 40+ vendors and service provider heavyweights putting
their combined engineering talent into the design process.

	IPDR Organization is 100% open to any entity (person or corporation) who
wishes to participate.  In three years, 60+ vendors have chosen to do so,
representing most of the packages you might send IPFIX records to.  Members
requested the legal structure of a non-profit with an IPR-membership
agreement for two purposes:

	a) Provide a safe environment for technical exchange. Engineers can lay
down competitive concerns to be completely open and unconcerned with IPR and
legal impediments.  IPR checks can safely happen after the engineering
collaboration occurs, so there is no development time is lost to a-priori
legal queries.
	b) To harness members' financial contributions towards more rapid progress.

	All members confirm that the IPR they contribute is free and clear of
obligations for the Organization and therefore available for free public
distribution.  The exact IPR agreement can be found on the IPDR web site,
but highlights include:

"2.1	Subject to the provisions of Section 5 of this Agreement, upon
contribution of a Contributed Document to the Group, Member hereby grants to
the Group, the other Members and the public, a worldwide, irrevocable,
non-exclusive, royalty free license to the Contributed Document, to use,
copy, execute, reproduce, modify, translate, prepare derivative works in the
Group's name based upon all or any portion thereof, disclose, distribute,
(other than for profit), and otherwise deal with such Contributed Document.

9.1	Either Party may terminate the Agreement without cause. Upon such
termination, Member shall continue to perform in accordance with the
Agreement to the extent that Member has: (1) relinquished any or all of its
rights, including without limitation any and all patent rights; and (2)
granted the Group, the public domain or others, any rights under the
Agreement, including without limitation, any and all licenses."

	As a result of this structure, IPDR Members have made incredible progress
in three years, include multiple revisions and finally a mature version of a
specification that has been *proven* by interoperability amongst a dozen
packages.  I challenge you to find another (business systems) standard that
has gone from conception to widespread *industrial* practice so fast.

	IPDR Organization is completely commited to open flow of information.  The
top two value statements confirmed by the Board are: 1 - Focus direction
through consensus 2 - Open gathering of ideas and information.

	Jeff Meyer, as Chair of the Protocols Working group, has my highest
confidence in representing NDM-U 3.1 as a technology.  NDM-U 3.1 and all
associated IPR has been released to the public for royalty-free use and
redistribution.  David (below) mentions the need to submit IPR forms - I can
have those processed as necessary. I would expect any additional work that
is done within IPFIX and extends NDM-U 3.1 to be subject to the normal IETF
rules and restrictions.

Aron Heintz
President, IPDR Organization


-----Original Message-----
From: Jeff Meyer [mailto:jeffm@cup.hp.com]
Sent: Friday, October 04, 2002 19:12
To: Harrington, David; ipfix-eval@net.doit.wisc.edu; Aron Heintz
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols


David,

   I believe the legal agreement signed by IPDR members
passes the rights to IPDR itself.  IPDR's board has
approved this submission activity.

   I'll forward this onto the IPDR President for further
clarification.

-- Jeff

Harrington, David wrote:

> Hi Jeff,
>
> Since IPDR is forum based, rather than a vendor proposal, have you been
> assured that all the members of the forum will submit IPR Notices to the
> IETF stating this? or that a joint notice from IPDR.org will be filed?
>
> dbh
>
>  > -----Original Message-----
>  > From: Jeff Meyer [mailto:jeffm@cup.hp.com]
>  > Sent: Friday, October 04, 2002 4:00 PM
>  > To: Harrington, David
>  > Cc: ipfix-eval@net.doit.wisc.edu
>  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>  >
>  >
>  > David,
>  >
>  >    Section 1.3 in the IPDR Advocacy draft states:
>  >
>  >      1.3 Patent Protection
>  >
>  >     There are no known patents which apply to or affect the
>  >     right to freely use this technology.
>  >
>  >    I have been assured that this is the case.
>  >
>  > Regards,
>  >
>  >    Jeff Meyer
>  >
>  >
>  > Harrington, David wrote:
>  >
>  > > A question: Are there intellectual property claims against
>  > IPDR? There
>  > > probably are for all the protocols proposed; I just don't remember
>  > > seeing anything mentioned and want to make sure all the
>  > cards are on the
>  > > table.
>  > >
>  > > dbh
>  > >
>  > >  > -----Original Message-----
>  > >  > From: Robert Lowe [mailto:robert.h.lowe@lawrence.edu]
>  > >  > Sent: Friday, October 04, 2002 1:57 PM
>  > >  > To: Jeff Meyer
>  > >  > Cc: Sebastian Zander; Peter Ludemann;
>  > ipfix-eval@net.doit.wisc.edu
>  > >  > Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>  > >  >
>  > >  >
>  > >  > Jeff Meyer wrote:
>  > >  >
>  > >  > Attention: lurker factor in play...
>  > >  >
>  > >  > > An implementation
>  > >  > > for what IPDR requires is pretty trivial.  IPDR
>  > >  > > members have access to opensource for this in
>  > >  > > both Java and C.
>  > >  >
>  > >  > The common definition of opensource includes descriptives such
>  > >  > as "publicly-available" and "no-strings-attached".  You seem
>  > >  > like a pretty good evangelist for IPDR, but once someone starts
>  > >  > passing the collection plate, using the word "opensource" only
>  > >  > sullies the good name of the sacred cow of 21st century computing
>  > >  > with the marketeer's comparison to a members-only reference
>  > >  > implementation.  Some words don't have increasing degrees of
>  > >  > comparison.  You can be dead, but you can't be 'deader', and in
>  > >  > my book, open is open, not open for a fee.  Grammer lesson and
>  > >  > rant off...
>  > >  >
>  > >  > -Robert
>  > >  >
>  > >  > --
>  > >  > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
>  > >  > in message body
>  > >  > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>  > >  > "unsubscribe ipfix" in message body
>  > >  > Archive     http://ipfix.doit.wisc.edu/archive/
>  > >  >
>  > >
>  >
>  >
>  >
>





--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 19:50:59 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA27009
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 19:50:58 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zmvA-00021C-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 18:40:48 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zmv7-00020b-00; Thu, 10 Oct 2002 18:40:45 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9ANAr702463;
	Thu, 10 Oct 2002 16:10:54 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9ANB5J00430;
	Thu, 10 Oct 2002 18:11:05 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7RNKT>; Thu, 10 Oct 2002 16:10:50 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04350FE4@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ipfix-req@net.doit.wisc.edu
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion 
	of C andidate Protocols - data model; broadcast vs reliable 
Date: Thu, 10 Oct 2002 16:10:51 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C270B2.46CD53CA"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C270B2.46CD53CA
Content-Type: text/plain;
	charset="iso-8859-1"

another one...what happens when a variable lenght field cannot fit in a
single transport packet? And if there are packet drops? One thing is loose
the whole flow record another is to get part of it and probably incorrect
data if it cannot be determined that that flow record has two parts.


-----Original Message-----
From: Penno, Reinaldo [BL60:0430:EXCH] 
Sent: Thursday, October 10, 2002 11:59 AM
To: Vamsidhar Valluri; Peter Ludemann; ipfix-req@net.doit.wisc.edu
Cc: Ganesh Sadasivan; ipfix-eval@net.doit.wisc.edu
Subject: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of C
andidate Protocols - data model; broadcast vs reliable 


that was a valid question..I was thinking about it myself (not specially in
terms of netflow, tough.) 
Although we are concerned with the basic packet fields, it is expected that
variable lenght fields like URLs, SDP headers, HTTP headers, etc will be
widely used. IMHO we should look a little bit down the road in order to
guarantee some lifetime for the protocol without many revisions. 
It seems to me that the requirements doc should provide/ask that the
protocol (data model) must support variable length fields now or be readily
extensible. Maybe some text in section 6.2.


regards, 
Reinaldo 
> -----Original Message----- 
> From: Vamsidhar Valluri [mailto:vvalluri@cisco.com] 
> Sent: Thursday, October 10, 2002 11:26 AM 
> To: Peter Ludemann 
> Cc: Ganesh Sadasivan; ipfix-eval@net.doit.wisc.edu 
> Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data 
> model; broadcast vs reliable 
> 
> 
> Peter, 
>   Please see inline 
> 
> On Thu, 10 Oct 2002, Peter Ludemann wrote: 
> 
> > Sorry for bringing up the topic of UDP ... I mis-read a 
> thread and thought 
> > that UDP was coming back on the table. 
> > 
> > It is not clear to me how any protocol that does not contain 
> > application-level ACKs can be fully reliable, even if 
> layered over TCP or 
> > SCTP. This is because the transport-layer acknowledgment 
> only means that the 
> > data have arrived at the other machine, not that the application has 
> > actually processed it. (There's nothing preventing a TCP or 
> SCTP stack from 
> > allowing application-level acknowledgment; but I'm not 
> aware of any for TCP 
> > and my reading of the API in RFC 2960 indicates that the 
> acknowledgment is 
> > transport-level.) 
> > 
> > As to my comment about UDP vs TCP for performance ... this 
> is probably 
> > irrelevant for the current discussion because the proposal 
> is that IPFIX 
> > would use NetFlow over TCP or SCTP. In such a case, a 
> UDP-with-reliability 
> > protocol (which NetFlow isn't; but, for example, NFS is) 
> ends up being about 
> > the same performance as TCP. Clearly, the path length with 
> pure UDP would be 
> > less than for TCP because UDP is just "fire and forget". However, if 
> > broadcast is being used to increase reliability (as Ganesh 
> points out, this 
> > isn't necessary; but if there is no ACK mechanism, then the 
> only choice is 
> > to broadcast to all collectors), then the path length 
> increases. Whether 
> > outputting 2 UDP packets is a longer or shorter instruction 
> path length than 
> > sending a single TCP packet, I don't know. 
> > 
> > Slight change of subject: could NetFlow be easily extended 
> to handle data 
> > that isn't fixed-length (e.g., HTTP URLs)? I know that in 
> NetFlow's current 
> > use, there's no need for such attribute export; but there 
> are smart devices 
> > that look deeper into packets for smart switching or 
> firewalling, which can 
> > use such information and might want to export it. [Probes 
> can also export 
> > such information.] 
> > 
> 
> 
> Example: If we want to send a variable length field we use 
> repeat count 
> 
> 
> Suppose we want to send string "abc" 
> 
> Netflow version 9 Template 
> 
> <----2 bytes -----> 
> ------------------ 
> header... 
> ------------------ 
> Field 1 Type = REPEAT_COUNT 
> ------------------ 
> Field 1 Length = 2 bytes 
> ----------------- 
> Field 2 Type = CHAR_VARIABLE_LEN 
> ----------------- 
> Field 2 Length = 1 byte 
> ----------------- 
> ....... 
> 
> Corresponding Netflow version 9 Data record 
> 
> <-----2 bytes------> 
> ------------------- 
> Header ..... 
> ------------------- 
>    3 = ( Next field (Field 2) is repeated 3 times) 
> ------------------- 
>  a      |   b 
> ------------------- 
>  c      | ...... 
> ------------------- 
> 
> -vamsi 
> 
> > Time for me to shut up and go on vacation. 
> > 
> > - peter 
> > 
> > > -----Original Message----- 
> > > From: majordomo listserver 
> [mailto:majordomo@mil.doit.wisc.edu]On Behalf 
> > > Of Ganesh Sadasivan 
> > > Sent: Wednesday, October 09, 2002 2:51 PM 
> > > To: Peter Ludemann 
> > > Cc: ipfix-eval@net.doit.wisc.edu 
> > > Subject: Re: [ipfix-eval] RE: Discussion of Candidate 
> Protocols - data 
> > > model; broadcast vs reliable 
> > > 
> > > 
> > > 
> > > 
> > > Peter Ludemann wrote: 
> > > 
> > > > This note discusses two things: 
> > > >  - whether we need a data model to define the protocol 
> > > >    (I claim that we do not) 
> > > 
> > > Agreed. 
> > > 
> > > > 
> > > >  - cost of UDP broadcast vs minimalist reliable transport 
> > > >    (I claim that there is very little difference) 
> > > 
> > > What do you mean by "minimalist reliable transport" ? 
> > > Since congestion awareness is mandatory, I don't know 
> > > why UDP is a topic of discussion here. See my comments inline. 
> > > 
> > > > 
> > > > 
> > > > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM: 
> > > > 
> > > > > Peter Ludemann wrote: 
> > > > [snip] 
> > > > > > YES ... so, can we all agree that data model issues are not 
> > > > > > part of this discussion? 
> > > > > 
> > > > >       No. We have no interoperability without a data model. 
> > > > 
> > > > I agree that we need a data model. I don't see why it 
> should affect the 
> > > > discussion of the export protocol. The only 
> requirements on the export 
> > > > protocol are that it exhibit the desired reliability 
> and efficiency; and 
> > > > that it be able to transport all the data types required by the 
> > > data models. 
> > > > If we can agree on all the data types, then we can define the 
> > > protocol; this 
> > > > does not require defining the entire data model. 
> > > > 
> > > > [After all, SNMP is defined independently of the 
> various MIBs - which 
> > > > correspond to the data model] 
> > > > 
> > > > >       No. Generalized data movers are not the problem. 
> > > > >       Defining a protocol that is well defined enough so 
> > > > >       that many device vendors can export data and many 
> > > > >       application vendors can process the data regardless 
> > > > >       of the device is problematic if all you define is a 
> > > > >       general purpose data mover. 
> > > > 
> > > > But deciding on an adequate "generalized data mover" is the 
> > > point of this 
> > > > evaluation process, I thought. I expect that there will 
> be multiple data 
> > > > models, for the various kinds of generalized devices. (e.g., 
> > > for our probe, 
> > > > we've defined three generic groupings of data: volume metrics; 
> > > QoS metrics; 
> > > > usage metrics and attributes -- similarly, SNMP's 
> enterprise MIBs and 
> > > > RADIUS's vendor-specific attributes). 
> > > > 
> > > > There is one place where the nature of the data might 
> intersect with the 
> > > > protocol -- the high-volume metrics such as exported by 
> > > NetFlow; and where 
> > > > the claim is that a reliable protocol is an unnecessary 
> > > overhead. So, let me 
> > > > discuss this a bit more. 
> > > > 
> > > > The argument is that with high volume export it is 
> preferable to do 
> > > > multi-cast UDP with sequence numbers; data loss can be detected 
> > > by noting 
> > > > which sequence numbers are missing ... and reliability can be 
> > > increased by 
> > > > having multiple receivers and de-duplicating what they receive. 
> > > 
> > > One does not need to multicast UDP to indicate missing 
> reliability. 
> > > 
> > > > 
> > > > 
> > > > For such a situation, the reliable protocol's 
> *implementation* would not 
> > > > keep a queue of data to retransmit on fail-over; it would only 
> > > keep enough 
> > > > buffer to deal with TCP's or SCTP's flow control and to 
> handle bursts of 
> > > > records. ACKs would be used only to notice when data are not 
> > > received at the 
> > > > other end and to cause fail-over. TCP "write would 
> block" also causes 
> > > > fail-over. 
> > > 
> > > So records can be lost in both cases. Also in a continuous export 
> > > (in the case of 
> > > 
> > > high volume export) the rate of ACKs is once every 2 send packets. 
> > > 
> > > > 
> > > > 
> > > > I would argue that the cost of exporting this way is very 
> > > similar to that of 
> > > > the UDP broadcast. 
> > > 
> > > Are you talking w.r.t the end-point (exporter & collector) or the 
> > > network itself. 
> > > 
> > > For the former, the processing overhead is much higher in TCP. 
> > > 
> > > > And on the receiving end, it is *much* easier to handle 
> > > > than a UDP-broadcast, which also needs stronger 
> hardware because of the 
> > > > higher de-duplication load. 
> > > > 
> > > > Can be about the same for both: 
> > > > - data copying (if scatter/gather is used) 
> > > > - protocol overhead (sequence number, template ID, etc.) 
> > > 
> > > In a typical datapath the instruction ration of UDP to TCP is 
> > > multi-fold. I don't know how you can tell that the protocol 
> > > overhead is the same. 
> > > 
> > > > 
> > > > 
> > > > The possible extra cost of the "reliable" export version is: 
> > > > - timer for noticing when ACK isn't received [trivial cost] 
> > > > - TCP vs UDP (little difference with modern implementations) 
> > > > - TCP retransmit with packet loss (typically very low) 
> > > > - cost of fail-over when no ACK received or write would block 
> > > > 
> > > > The savings and benefits of the "reliable" version are: 
> > > > - fewer packet writes (broadcast requires 2x as many packets; 
> > > >   and TCP can pack more efficiently because records can 
> > > >   span packets) 
> > > 
> > > As mentioned above if the  absence of reliability is what we want, 
> > > then we need not do a UDP broadcast. 
> > > 
> > > > 
> > > > - lower network traffic (which adds to reliability) 
> > > 
> > > > 
> > > > - smaller machines for receiving 
> > > 
> > > what does this mean? 
> > > thanks 
> > > Ganesh 
> > > 
> > > > 
> > > > - more accurate estimate of loss due to lack of reliability 
> > > > - can handle congestion 
> > > > 
> > > > [As an aside, even with the UDP-broadcast version, the 
> exporter ought to 
> > > > compute totals for the various metrics and output those from 
> > > time to time, 
> > > > to provide a more accurate understanding of data loss. Perhaps 
> > > such totals 
> > > > are already available in the MIBs, but there remains 
> the issue of how to 
> > > > correlate with the sequence numbers of the exported data.] 
> > > > 
> > > > - peter 
> > > > 
> > > > -- 
> > > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> > > in message body 
> > > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > > > "unsubscribe ipfix" in message body 
> > > > Archive     http://ipfix.doit.wisc.edu/archive/ 
> > > 
> > > 
> > > -- 
> > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in 
> > > message body 
> > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > > "unsubscribe ipfix" in message body 
> > > Archive     http://ipfix.doit.wisc.edu/archive/ 
> > 
> > 
> > -- 
> > Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body 
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > "unsubscribe ipfix" in message body 
> > Archive     http://ipfix.doit.wisc.edu/archive/ 
> > 
> 
> 
> -- 
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body 
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> "unsubscribe ipfix" in message body 
> Archive     http://ipfix.doit.wisc.edu/archive/ 
> 

------_=_NextPart_001_01C270B2.46CD53CA
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion =
of C andidate Protocols - data model; broadcast vs reliable </TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>another one...what happens when a variable lenght =
field cannot fit in a single transport packet? And if there are packet =
drops? One thing is loose the whole flow record another is to get part =
of it and probably incorrect data if it cannot be determined that that =
flow record has two parts.</FONT></P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Penno, Reinaldo [BL60:0430:EXCH] </FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, October 10, 2002 11:59 AM</FONT>
<BR><FONT SIZE=3D2>To: Vamsidhar Valluri; Peter Ludemann; =
ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>Cc: Ganesh Sadasivan; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>Subject: Variable Length Fields : was RE: =
[ipfix-eval] RE: Discussion of C andidate Protocols - data model; =
broadcast vs reliable </FONT></P>
<BR>

<P><FONT SIZE=3D2>that was a valid question..I was thinking about it =
myself (not specially in terms of netflow, tough.) </FONT>
<BR><FONT SIZE=3D2>Although we are concerned with the basic packet =
fields, it is expected that variable lenght fields like URLs, SDP =
headers, HTTP headers, etc will be widely used. IMHO we should look a =
little bit down the road in order to guarantee some lifetime for the =
protocol without many revisions. </FONT></P>

<P><FONT SIZE=3D2>It seems to me that the requirements doc should =
provide/ask that the protocol (data model) must support variable length =
fields now or be readily extensible. Maybe some text in section =
6.2.</FONT></P>
<BR>

<P><FONT SIZE=3D2>regards, </FONT>
<BR><FONT SIZE=3D2>Reinaldo </FONT>
<BR><FONT SIZE=3D2>&gt; -----Original Message----- </FONT>
<BR><FONT SIZE=3D2>&gt; From: Vamsidhar Valluri [<A =
HREF=3D"mailto:vvalluri@cisco.com">mailto:vvalluri@cisco.com</A>] =
</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 11:26 AM =
</FONT>
<BR><FONT SIZE=3D2>&gt; To: Peter Ludemann </FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Ganesh Sadasivan; =
ipfix-eval@net.doit.wisc.edu </FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] RE: Discussion of =
Candidate Protocols - data </FONT>
<BR><FONT SIZE=3D2>&gt; model; broadcast vs reliable </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Peter, </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; Please see inline </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Thu, 10 Oct 2002, Peter Ludemann wrote: =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sorry for bringing up the topic of UDP ... =
I mis-read a </FONT>
<BR><FONT SIZE=3D2>&gt; thread and thought </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that UDP was coming back on the table. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It is not clear to me how any protocol =
that does not contain </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; application-level ACKs can be fully =
reliable, even if </FONT>
<BR><FONT SIZE=3D2>&gt; layered over TCP or </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; SCTP. This is because the transport-layer =
acknowledgment </FONT>
<BR><FONT SIZE=3D2>&gt; only means that the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; data have arrived at the other machine, =
not that the application has </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; actually processed it. (There's nothing =
preventing a TCP or </FONT>
<BR><FONT SIZE=3D2>&gt; SCTP stack from </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; allowing application-level acknowledgment; =
but I'm not </FONT>
<BR><FONT SIZE=3D2>&gt; aware of any for TCP </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; and my reading of the API in RFC 2960 =
indicates that the </FONT>
<BR><FONT SIZE=3D2>&gt; acknowledgment is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; transport-level.) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; As to my comment about UDP vs TCP for =
performance ... this </FONT>
<BR><FONT SIZE=3D2>&gt; is probably </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; irrelevant for the current discussion =
because the proposal </FONT>
<BR><FONT SIZE=3D2>&gt; is that IPFIX </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; would use NetFlow over TCP or SCTP. In =
such a case, a </FONT>
<BR><FONT SIZE=3D2>&gt; UDP-with-reliability </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; protocol (which NetFlow isn't; but, for =
example, NFS is) </FONT>
<BR><FONT SIZE=3D2>&gt; ends up being about </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the same performance as TCP. Clearly, the =
path length with </FONT>
<BR><FONT SIZE=3D2>&gt; pure UDP would be </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; less than for TCP because UDP is just =
&quot;fire and forget&quot;. However, if </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; broadcast is being used to increase =
reliability (as Ganesh </FONT>
<BR><FONT SIZE=3D2>&gt; points out, this </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; isn't necessary; but if there is no ACK =
mechanism, then the </FONT>
<BR><FONT SIZE=3D2>&gt; only choice is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; to broadcast to all collectors), then the =
path length </FONT>
<BR><FONT SIZE=3D2>&gt; increases. Whether </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; outputting 2 UDP packets is a longer or =
shorter instruction </FONT>
<BR><FONT SIZE=3D2>&gt; path length than </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; sending a single TCP packet, I don't know. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Slight change of subject: could NetFlow be =
easily extended </FONT>
<BR><FONT SIZE=3D2>&gt; to handle data </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that isn't fixed-length (e.g., HTTP URLs)? =
I know that in </FONT>
<BR><FONT SIZE=3D2>&gt; NetFlow's current </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use, there's no need for such attribute =
export; but there </FONT>
<BR><FONT SIZE=3D2>&gt; are smart devices </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that look deeper into packets for smart =
switching or </FONT>
<BR><FONT SIZE=3D2>&gt; firewalling, which can </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use such information and might want to =
export it. [Probes </FONT>
<BR><FONT SIZE=3D2>&gt; can also export </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; such information.] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Example: If we want to send a variable length =
field we use </FONT>
<BR><FONT SIZE=3D2>&gt; repeat count </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Suppose we want to send string &quot;abc&quot; =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Netflow version 9 Template </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;----2 bytes -----&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------ </FONT>
<BR><FONT SIZE=3D2>&gt; header... </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------ </FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Type =3D REPEAT_COUNT </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------ </FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Length =3D 2 bytes </FONT>
<BR><FONT SIZE=3D2>&gt; ----------------- </FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Type =3D CHAR_VARIABLE_LEN </FONT>
<BR><FONT SIZE=3D2>&gt; ----------------- </FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Length =3D 1 byte </FONT>
<BR><FONT SIZE=3D2>&gt; ----------------- </FONT>
<BR><FONT SIZE=3D2>&gt; ....... </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Corresponding Netflow version 9 Data record =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;-----2 bytes------&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt; Header ..... </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; 3 =3D ( Next field (Field 2) =
is repeated 3 times) </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp; b </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | ...... =
</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -vamsi </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Time for me to shut up and go on vacation. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; - peter </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -----Original Message----- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; From: majordomo listserver </FONT>
<BR><FONT SIZE=3D2>&gt; [<A =
HREF=3D"mailto:majordomo@mil.doit.wisc.edu">mailto:majordomo@mil.doit.wi=
sc.edu</A>]On Behalf </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Of Ganesh Sadasivan </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Sent: Wednesday, October 09, 2002 =
2:51 PM </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; To: Peter Ludemann </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Cc: ipfix-eval@net.doit.wisc.edu =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Subject: Re: [ipfix-eval] RE: =
Discussion of Candidate </FONT>
<BR><FONT SIZE=3D2>&gt; Protocols - data </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; model; broadcast vs reliable </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Peter Ludemann wrote: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; This note discusses two things: =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - whether we need a data =
model to define the protocol </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
we do not) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Agreed. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - cost of UDP broadcast vs =
minimalist reliable transport </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
there is very little difference) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; What do you mean by &quot;minimalist =
reliable transport&quot; ? </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Since congestion awareness is =
mandatory, I don't know </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; why UDP is a topic of discussion =
here. See my comments inline. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; calato@riverstonenet.com wrote =
Monday, October 07, 2002 7:35 AM: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; Peter Ludemann wrote: =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [snip] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; YES ... so, can we all =
agree that data model issues are not </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; part of this =
discussion? </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. We have no =
interoperability without a data model. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I agree that we need a data =
model. I don't see why it </FONT>
<BR><FONT SIZE=3D2>&gt; should affect the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discussion of the export =
protocol. The only </FONT>
<BR><FONT SIZE=3D2>&gt; requirements on the export </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol are that it exhibit the =
desired reliability </FONT>
<BR><FONT SIZE=3D2>&gt; and efficiency; and </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; that it be able to transport all =
the data types required by the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; data models. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; If we can agree on all the data =
types, then we can define the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; protocol; this </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; does not require defining the =
entire data model. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [After all, SNMP is defined =
independently of the </FONT>
<BR><FONT SIZE=3D2>&gt; various MIBs - which </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correspond to the data model] =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. Generalized data movers =
are not the problem. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Defining a protocol that is =
well defined enough so </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that many device vendors can =
export data and many </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application vendors can =
process the data regardless </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of the device is problematic =
if all you define is a </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; general purpose data mover. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; But deciding on an adequate =
&quot;generalized data mover&quot; is the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; point of this </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; evaluation process, I thought. I =
expect that there will </FONT>
<BR><FONT SIZE=3D2>&gt; be multiple data </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; models, for the various kinds of =
generalized devices. (e.g., </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; for our probe, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; we've defined three generic =
groupings of data: volume metrics; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; QoS metrics; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; usage metrics and attributes -- =
similarly, SNMP's </FONT>
<BR><FONT SIZE=3D2>&gt; enterprise MIBs and </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; RADIUS's vendor-specific =
attributes). </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; There is one place where the =
nature of the data might </FONT>
<BR><FONT SIZE=3D2>&gt; intersect with the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol -- the high-volume =
metrics such as exported by </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; NetFlow; and where </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the claim is that a reliable =
protocol is an unnecessary </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead. So, let me </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discuss this a bit more. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The argument is that with high =
volume export it is </FONT>
<BR><FONT SIZE=3D2>&gt; preferable to do </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; multi-cast UDP with sequence =
numbers; data loss can be detected </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; by noting </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; which sequence numbers are =
missing ... and reliability can be </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; increased by </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; having multiple receivers and =
de-duplicating what they receive. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; One does not need to multicast UDP to =
indicate missing </FONT>
<BR><FONT SIZE=3D2>&gt; reliability. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; For such a situation, the =
reliable protocol's </FONT>
<BR><FONT SIZE=3D2>&gt; *implementation* would not </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; keep a queue of data to =
retransmit on fail-over; it would only </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; keep enough </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; buffer to deal with TCP's or =
SCTP's flow control and to </FONT>
<BR><FONT SIZE=3D2>&gt; handle bursts of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; records. ACKs would be used only =
to notice when data are not </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; received at the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; other end and to cause =
fail-over. TCP &quot;write would </FONT>
<BR><FONT SIZE=3D2>&gt; block&quot; also causes </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; fail-over. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; So records can be lost in both cases. =
Also in a continuous export </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; (in the case of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; high volume export) the rate of ACKs =
is once every 2 send packets. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I would argue that the cost of =
exporting this way is very </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; similar to that of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the UDP broadcast. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Are you talking w.r.t the end-point =
(exporter &amp; collector) or the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; network itself. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; For the former, the processing =
overhead is much higher in TCP. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; And on the receiving end, it is =
*much* easier to handle </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; than a UDP-broadcast, which also =
needs stronger </FONT>
<BR><FONT SIZE=3D2>&gt; hardware because of the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; higher de-duplication load. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Can be about the same for both: =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - data copying (if =
scatter/gather is used) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - protocol overhead (sequence =
number, template ID, etc.) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; In a typical datapath the instruction =
ration of UDP to TCP is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; multi-fold. I don't know how you can =
tell that the protocol </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead is the same. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The possible extra cost of the =
&quot;reliable&quot; export version is: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - timer for noticing when ACK =
isn't received [trivial cost] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP vs UDP (little difference =
with modern implementations) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP retransmit with packet =
loss (typically very low) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - cost of fail-over when no ACK =
received or write would block </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The savings and benefits of the =
&quot;reliable&quot; version are: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - fewer packet writes (broadcast =
requires 2x as many packets; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; and TCP can pack =
more efficiently because records can </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; span packets) =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; As mentioned above if the&nbsp; =
absence of reliability is what we want, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; then we need not do a UDP broadcast. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - lower network traffic (which =
adds to reliability) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - smaller machines for receiving =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; what does this mean? </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; thanks </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Ganesh </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - more accurate estimate of loss =
due to lack of reliability </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - can handle congestion </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [As an aside, even with the =
UDP-broadcast version, the </FONT>
<BR><FONT SIZE=3D2>&gt; exporter ought to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; compute totals for the various =
metrics and output those from </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; time to time, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; to provide a more accurate =
understanding of data loss. Perhaps </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; such totals </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; are already available in the =
MIBs, but there remains </FONT>
<BR><FONT SIZE=3D2>&gt; the issue of how to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correlate with the sequence =
numbers of the exported data.] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - peter </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; in message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; =
<A HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; in </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;help&quot; in message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;unsubscribe ipfix&quot; in message =
body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body </FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message body =
</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C270B2.46CD53CA--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 10 20:17:14 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA27256
	for <ipfix-archive@lists.ietf.org>; Thu, 10 Oct 2002 20:17:14 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17znGf-0002e3-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 10 Oct 2002 19:03:01 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zmv7-00020b-00; Thu, 10 Oct 2002 18:40:45 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9ANAr702463;
	Thu, 10 Oct 2002 16:10:54 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9ANB5J00430;
	Thu, 10 Oct 2002 18:11:05 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7RNKT>; Thu, 10 Oct 2002 16:10:50 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04350FE4@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ipfix-req@net.doit.wisc.edu
Cc: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-req] RE: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion 
	of C andidate Protocols - data model; broadcast vs reliable 
Date: Thu, 10 Oct 2002 16:10:51 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C270B2.46CD53CA"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C270B2.46CD53CA
Content-Type: text/plain;
	charset="iso-8859-1"

another one...what happens when a variable lenght field cannot fit in a
single transport packet? And if there are packet drops? One thing is loose
the whole flow record another is to get part of it and probably incorrect
data if it cannot be determined that that flow record has two parts.


-----Original Message-----
From: Penno, Reinaldo [BL60:0430:EXCH] 
Sent: Thursday, October 10, 2002 11:59 AM
To: Vamsidhar Valluri; Peter Ludemann; ipfix-req@net.doit.wisc.edu
Cc: Ganesh Sadasivan; ipfix-eval@net.doit.wisc.edu
Subject: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of C
andidate Protocols - data model; broadcast vs reliable 


that was a valid question..I was thinking about it myself (not specially in
terms of netflow, tough.) 
Although we are concerned with the basic packet fields, it is expected that
variable lenght fields like URLs, SDP headers, HTTP headers, etc will be
widely used. IMHO we should look a little bit down the road in order to
guarantee some lifetime for the protocol without many revisions. 
It seems to me that the requirements doc should provide/ask that the
protocol (data model) must support variable length fields now or be readily
extensible. Maybe some text in section 6.2.


regards, 
Reinaldo 
> -----Original Message----- 
> From: Vamsidhar Valluri [mailto:vvalluri@cisco.com] 
> Sent: Thursday, October 10, 2002 11:26 AM 
> To: Peter Ludemann 
> Cc: Ganesh Sadasivan; ipfix-eval@net.doit.wisc.edu 
> Subject: Re: [ipfix-eval] RE: Discussion of Candidate Protocols - data 
> model; broadcast vs reliable 
> 
> 
> Peter, 
>   Please see inline 
> 
> On Thu, 10 Oct 2002, Peter Ludemann wrote: 
> 
> > Sorry for bringing up the topic of UDP ... I mis-read a 
> thread and thought 
> > that UDP was coming back on the table. 
> > 
> > It is not clear to me how any protocol that does not contain 
> > application-level ACKs can be fully reliable, even if 
> layered over TCP or 
> > SCTP. This is because the transport-layer acknowledgment 
> only means that the 
> > data have arrived at the other machine, not that the application has 
> > actually processed it. (There's nothing preventing a TCP or 
> SCTP stack from 
> > allowing application-level acknowledgment; but I'm not 
> aware of any for TCP 
> > and my reading of the API in RFC 2960 indicates that the 
> acknowledgment is 
> > transport-level.) 
> > 
> > As to my comment about UDP vs TCP for performance ... this 
> is probably 
> > irrelevant for the current discussion because the proposal 
> is that IPFIX 
> > would use NetFlow over TCP or SCTP. In such a case, a 
> UDP-with-reliability 
> > protocol (which NetFlow isn't; but, for example, NFS is) 
> ends up being about 
> > the same performance as TCP. Clearly, the path length with 
> pure UDP would be 
> > less than for TCP because UDP is just "fire and forget". However, if 
> > broadcast is being used to increase reliability (as Ganesh 
> points out, this 
> > isn't necessary; but if there is no ACK mechanism, then the 
> only choice is 
> > to broadcast to all collectors), then the path length 
> increases. Whether 
> > outputting 2 UDP packets is a longer or shorter instruction 
> path length than 
> > sending a single TCP packet, I don't know. 
> > 
> > Slight change of subject: could NetFlow be easily extended 
> to handle data 
> > that isn't fixed-length (e.g., HTTP URLs)? I know that in 
> NetFlow's current 
> > use, there's no need for such attribute export; but there 
> are smart devices 
> > that look deeper into packets for smart switching or 
> firewalling, which can 
> > use such information and might want to export it. [Probes 
> can also export 
> > such information.] 
> > 
> 
> 
> Example: If we want to send a variable length field we use 
> repeat count 
> 
> 
> Suppose we want to send string "abc" 
> 
> Netflow version 9 Template 
> 
> <----2 bytes -----> 
> ------------------ 
> header... 
> ------------------ 
> Field 1 Type = REPEAT_COUNT 
> ------------------ 
> Field 1 Length = 2 bytes 
> ----------------- 
> Field 2 Type = CHAR_VARIABLE_LEN 
> ----------------- 
> Field 2 Length = 1 byte 
> ----------------- 
> ....... 
> 
> Corresponding Netflow version 9 Data record 
> 
> <-----2 bytes------> 
> ------------------- 
> Header ..... 
> ------------------- 
>    3 = ( Next field (Field 2) is repeated 3 times) 
> ------------------- 
>  a      |   b 
> ------------------- 
>  c      | ...... 
> ------------------- 
> 
> -vamsi 
> 
> > Time for me to shut up and go on vacation. 
> > 
> > - peter 
> > 
> > > -----Original Message----- 
> > > From: majordomo listserver 
> [mailto:majordomo@mil.doit.wisc.edu]On Behalf 
> > > Of Ganesh Sadasivan 
> > > Sent: Wednesday, October 09, 2002 2:51 PM 
> > > To: Peter Ludemann 
> > > Cc: ipfix-eval@net.doit.wisc.edu 
> > > Subject: Re: [ipfix-eval] RE: Discussion of Candidate 
> Protocols - data 
> > > model; broadcast vs reliable 
> > > 
> > > 
> > > 
> > > 
> > > Peter Ludemann wrote: 
> > > 
> > > > This note discusses two things: 
> > > >  - whether we need a data model to define the protocol 
> > > >    (I claim that we do not) 
> > > 
> > > Agreed. 
> > > 
> > > > 
> > > >  - cost of UDP broadcast vs minimalist reliable transport 
> > > >    (I claim that there is very little difference) 
> > > 
> > > What do you mean by "minimalist reliable transport" ? 
> > > Since congestion awareness is mandatory, I don't know 
> > > why UDP is a topic of discussion here. See my comments inline. 
> > > 
> > > > 
> > > > 
> > > > calato@riverstonenet.com wrote Monday, October 07, 2002 7:35 AM: 
> > > > 
> > > > > Peter Ludemann wrote: 
> > > > [snip] 
> > > > > > YES ... so, can we all agree that data model issues are not 
> > > > > > part of this discussion? 
> > > > > 
> > > > >       No. We have no interoperability without a data model. 
> > > > 
> > > > I agree that we need a data model. I don't see why it 
> should affect the 
> > > > discussion of the export protocol. The only 
> requirements on the export 
> > > > protocol are that it exhibit the desired reliability 
> and efficiency; and 
> > > > that it be able to transport all the data types required by the 
> > > data models. 
> > > > If we can agree on all the data types, then we can define the 
> > > protocol; this 
> > > > does not require defining the entire data model. 
> > > > 
> > > > [After all, SNMP is defined independently of the 
> various MIBs - which 
> > > > correspond to the data model] 
> > > > 
> > > > >       No. Generalized data movers are not the problem. 
> > > > >       Defining a protocol that is well defined enough so 
> > > > >       that many device vendors can export data and many 
> > > > >       application vendors can process the data regardless 
> > > > >       of the device is problematic if all you define is a 
> > > > >       general purpose data mover. 
> > > > 
> > > > But deciding on an adequate "generalized data mover" is the 
> > > point of this 
> > > > evaluation process, I thought. I expect that there will 
> be multiple data 
> > > > models, for the various kinds of generalized devices. (e.g., 
> > > for our probe, 
> > > > we've defined three generic groupings of data: volume metrics; 
> > > QoS metrics; 
> > > > usage metrics and attributes -- similarly, SNMP's 
> enterprise MIBs and 
> > > > RADIUS's vendor-specific attributes). 
> > > > 
> > > > There is one place where the nature of the data might 
> intersect with the 
> > > > protocol -- the high-volume metrics such as exported by 
> > > NetFlow; and where 
> > > > the claim is that a reliable protocol is an unnecessary 
> > > overhead. So, let me 
> > > > discuss this a bit more. 
> > > > 
> > > > The argument is that with high volume export it is 
> preferable to do 
> > > > multi-cast UDP with sequence numbers; data loss can be detected 
> > > by noting 
> > > > which sequence numbers are missing ... and reliability can be 
> > > increased by 
> > > > having multiple receivers and de-duplicating what they receive. 
> > > 
> > > One does not need to multicast UDP to indicate missing 
> reliability. 
> > > 
> > > > 
> > > > 
> > > > For such a situation, the reliable protocol's 
> *implementation* would not 
> > > > keep a queue of data to retransmit on fail-over; it would only 
> > > keep enough 
> > > > buffer to deal with TCP's or SCTP's flow control and to 
> handle bursts of 
> > > > records. ACKs would be used only to notice when data are not 
> > > received at the 
> > > > other end and to cause fail-over. TCP "write would 
> block" also causes 
> > > > fail-over. 
> > > 
> > > So records can be lost in both cases. Also in a continuous export 
> > > (in the case of 
> > > 
> > > high volume export) the rate of ACKs is once every 2 send packets. 
> > > 
> > > > 
> > > > 
> > > > I would argue that the cost of exporting this way is very 
> > > similar to that of 
> > > > the UDP broadcast. 
> > > 
> > > Are you talking w.r.t the end-point (exporter & collector) or the 
> > > network itself. 
> > > 
> > > For the former, the processing overhead is much higher in TCP. 
> > > 
> > > > And on the receiving end, it is *much* easier to handle 
> > > > than a UDP-broadcast, which also needs stronger 
> hardware because of the 
> > > > higher de-duplication load. 
> > > > 
> > > > Can be about the same for both: 
> > > > - data copying (if scatter/gather is used) 
> > > > - protocol overhead (sequence number, template ID, etc.) 
> > > 
> > > In a typical datapath the instruction ration of UDP to TCP is 
> > > multi-fold. I don't know how you can tell that the protocol 
> > > overhead is the same. 
> > > 
> > > > 
> > > > 
> > > > The possible extra cost of the "reliable" export version is: 
> > > > - timer for noticing when ACK isn't received [trivial cost] 
> > > > - TCP vs UDP (little difference with modern implementations) 
> > > > - TCP retransmit with packet loss (typically very low) 
> > > > - cost of fail-over when no ACK received or write would block 
> > > > 
> > > > The savings and benefits of the "reliable" version are: 
> > > > - fewer packet writes (broadcast requires 2x as many packets; 
> > > >   and TCP can pack more efficiently because records can 
> > > >   span packets) 
> > > 
> > > As mentioned above if the  absence of reliability is what we want, 
> > > then we need not do a UDP broadcast. 
> > > 
> > > > 
> > > > - lower network traffic (which adds to reliability) 
> > > 
> > > > 
> > > > - smaller machines for receiving 
> > > 
> > > what does this mean? 
> > > thanks 
> > > Ganesh 
> > > 
> > > > 
> > > > - more accurate estimate of loss due to lack of reliability 
> > > > - can handle congestion 
> > > > 
> > > > [As an aside, even with the UDP-broadcast version, the 
> exporter ought to 
> > > > compute totals for the various metrics and output those from 
> > > time to time, 
> > > > to provide a more accurate understanding of data loss. Perhaps 
> > > such totals 
> > > > are already available in the MIBs, but there remains 
> the issue of how to 
> > > > correlate with the sequence numbers of the exported data.] 
> > > > 
> > > > - peter 
> > > > 
> > > > -- 
> > > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> > > in message body 
> > > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > > > "unsubscribe ipfix" in message body 
> > > > Archive     http://ipfix.doit.wisc.edu/archive/ 
> > > 
> > > 
> > > -- 
> > > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in 
> > > message body 
> > > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > > "unsubscribe ipfix" in message body 
> > > Archive     http://ipfix.doit.wisc.edu/archive/ 
> > 
> > 
> > -- 
> > Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body 
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > "unsubscribe ipfix" in message body 
> > Archive     http://ipfix.doit.wisc.edu/archive/ 
> > 
> 
> 
> -- 
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body 
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> "unsubscribe ipfix" in message body 
> Archive     http://ipfix.doit.wisc.edu/archive/ 
> 

------_=_NextPart_001_01C270B2.46CD53CA
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion =
of C andidate Protocols - data model; broadcast vs reliable </TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>another one...what happens when a variable lenght =
field cannot fit in a single transport packet? And if there are packet =
drops? One thing is loose the whole flow record another is to get part =
of it and probably incorrect data if it cannot be determined that that =
flow record has two parts.</FONT></P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Penno, Reinaldo [BL60:0430:EXCH] </FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, October 10, 2002 11:59 AM</FONT>
<BR><FONT SIZE=3D2>To: Vamsidhar Valluri; Peter Ludemann; =
ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>Cc: Ganesh Sadasivan; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>Subject: Variable Length Fields : was RE: =
[ipfix-eval] RE: Discussion of C andidate Protocols - data model; =
broadcast vs reliable </FONT></P>
<BR>

<P><FONT SIZE=3D2>that was a valid question..I was thinking about it =
myself (not specially in terms of netflow, tough.) </FONT>
<BR><FONT SIZE=3D2>Although we are concerned with the basic packet =
fields, it is expected that variable lenght fields like URLs, SDP =
headers, HTTP headers, etc will be widely used. IMHO we should look a =
little bit down the road in order to guarantee some lifetime for the =
protocol without many revisions. </FONT></P>

<P><FONT SIZE=3D2>It seems to me that the requirements doc should =
provide/ask that the protocol (data model) must support variable length =
fields now or be readily extensible. Maybe some text in section =
6.2.</FONT></P>
<BR>

<P><FONT SIZE=3D2>regards, </FONT>
<BR><FONT SIZE=3D2>Reinaldo </FONT>
<BR><FONT SIZE=3D2>&gt; -----Original Message----- </FONT>
<BR><FONT SIZE=3D2>&gt; From: Vamsidhar Valluri [<A =
HREF=3D"mailto:vvalluri@cisco.com">mailto:vvalluri@cisco.com</A>] =
</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 11:26 AM =
</FONT>
<BR><FONT SIZE=3D2>&gt; To: Peter Ludemann </FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Ganesh Sadasivan; =
ipfix-eval@net.doit.wisc.edu </FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] RE: Discussion of =
Candidate Protocols - data </FONT>
<BR><FONT SIZE=3D2>&gt; model; broadcast vs reliable </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Peter, </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp; Please see inline </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Thu, 10 Oct 2002, Peter Ludemann wrote: =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sorry for bringing up the topic of UDP ... =
I mis-read a </FONT>
<BR><FONT SIZE=3D2>&gt; thread and thought </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that UDP was coming back on the table. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It is not clear to me how any protocol =
that does not contain </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; application-level ACKs can be fully =
reliable, even if </FONT>
<BR><FONT SIZE=3D2>&gt; layered over TCP or </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; SCTP. This is because the transport-layer =
acknowledgment </FONT>
<BR><FONT SIZE=3D2>&gt; only means that the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; data have arrived at the other machine, =
not that the application has </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; actually processed it. (There's nothing =
preventing a TCP or </FONT>
<BR><FONT SIZE=3D2>&gt; SCTP stack from </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; allowing application-level acknowledgment; =
but I'm not </FONT>
<BR><FONT SIZE=3D2>&gt; aware of any for TCP </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; and my reading of the API in RFC 2960 =
indicates that the </FONT>
<BR><FONT SIZE=3D2>&gt; acknowledgment is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; transport-level.) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; As to my comment about UDP vs TCP for =
performance ... this </FONT>
<BR><FONT SIZE=3D2>&gt; is probably </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; irrelevant for the current discussion =
because the proposal </FONT>
<BR><FONT SIZE=3D2>&gt; is that IPFIX </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; would use NetFlow over TCP or SCTP. In =
such a case, a </FONT>
<BR><FONT SIZE=3D2>&gt; UDP-with-reliability </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; protocol (which NetFlow isn't; but, for =
example, NFS is) </FONT>
<BR><FONT SIZE=3D2>&gt; ends up being about </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the same performance as TCP. Clearly, the =
path length with </FONT>
<BR><FONT SIZE=3D2>&gt; pure UDP would be </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; less than for TCP because UDP is just =
&quot;fire and forget&quot;. However, if </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; broadcast is being used to increase =
reliability (as Ganesh </FONT>
<BR><FONT SIZE=3D2>&gt; points out, this </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; isn't necessary; but if there is no ACK =
mechanism, then the </FONT>
<BR><FONT SIZE=3D2>&gt; only choice is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; to broadcast to all collectors), then the =
path length </FONT>
<BR><FONT SIZE=3D2>&gt; increases. Whether </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; outputting 2 UDP packets is a longer or =
shorter instruction </FONT>
<BR><FONT SIZE=3D2>&gt; path length than </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; sending a single TCP packet, I don't know. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Slight change of subject: could NetFlow be =
easily extended </FONT>
<BR><FONT SIZE=3D2>&gt; to handle data </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that isn't fixed-length (e.g., HTTP URLs)? =
I know that in </FONT>
<BR><FONT SIZE=3D2>&gt; NetFlow's current </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use, there's no need for such attribute =
export; but there </FONT>
<BR><FONT SIZE=3D2>&gt; are smart devices </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; that look deeper into packets for smart =
switching or </FONT>
<BR><FONT SIZE=3D2>&gt; firewalling, which can </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; use such information and might want to =
export it. [Probes </FONT>
<BR><FONT SIZE=3D2>&gt; can also export </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; such information.] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Example: If we want to send a variable length =
field we use </FONT>
<BR><FONT SIZE=3D2>&gt; repeat count </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Suppose we want to send string &quot;abc&quot; =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Netflow version 9 Template </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;----2 bytes -----&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------ </FONT>
<BR><FONT SIZE=3D2>&gt; header... </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------ </FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Type =3D REPEAT_COUNT </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------ </FONT>
<BR><FONT SIZE=3D2>&gt; Field 1 Length =3D 2 bytes </FONT>
<BR><FONT SIZE=3D2>&gt; ----------------- </FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Type =3D CHAR_VARIABLE_LEN </FONT>
<BR><FONT SIZE=3D2>&gt; ----------------- </FONT>
<BR><FONT SIZE=3D2>&gt; Field 2 Length =3D 1 byte </FONT>
<BR><FONT SIZE=3D2>&gt; ----------------- </FONT>
<BR><FONT SIZE=3D2>&gt; ....... </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Corresponding Netflow version 9 Data record =
</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;-----2 bytes------&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt; Header ..... </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; 3 =3D ( Next field (Field 2) =
is repeated 3 times) </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|&nbsp;&nbsp; b </FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | ...... =
</FONT>
<BR><FONT SIZE=3D2>&gt; ------------------- </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -vamsi </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Time for me to shut up and go on vacation. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; - peter </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -----Original Message----- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; From: majordomo listserver </FONT>
<BR><FONT SIZE=3D2>&gt; [<A =
HREF=3D"mailto:majordomo@mil.doit.wisc.edu">mailto:majordomo@mil.doit.wi=
sc.edu</A>]On Behalf </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Of Ganesh Sadasivan </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Sent: Wednesday, October 09, 2002 =
2:51 PM </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; To: Peter Ludemann </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Cc: ipfix-eval@net.doit.wisc.edu =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Subject: Re: [ipfix-eval] RE: =
Discussion of Candidate </FONT>
<BR><FONT SIZE=3D2>&gt; Protocols - data </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; model; broadcast vs reliable </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Peter Ludemann wrote: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; This note discusses two things: =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - whether we need a data =
model to define the protocol </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
we do not) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Agreed. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp; - cost of UDP broadcast vs =
minimalist reliable transport </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp; (I claim that =
there is very little difference) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; What do you mean by &quot;minimalist =
reliable transport&quot; ? </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Since congestion awareness is =
mandatory, I don't know </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; why UDP is a topic of discussion =
here. See my comments inline. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; calato@riverstonenet.com wrote =
Monday, October 07, 2002 7:35 AM: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; Peter Ludemann wrote: =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [snip] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; YES ... so, can we all =
agree that data model issues are not </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; &gt; part of this =
discussion? </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. We have no =
interoperability without a data model. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I agree that we need a data =
model. I don't see why it </FONT>
<BR><FONT SIZE=3D2>&gt; should affect the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discussion of the export =
protocol. The only </FONT>
<BR><FONT SIZE=3D2>&gt; requirements on the export </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol are that it exhibit the =
desired reliability </FONT>
<BR><FONT SIZE=3D2>&gt; and efficiency; and </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; that it be able to transport all =
the data types required by the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; data models. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; If we can agree on all the data =
types, then we can define the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; protocol; this </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; does not require defining the =
entire data model. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [After all, SNMP is defined =
independently of the </FONT>
<BR><FONT SIZE=3D2>&gt; various MIBs - which </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correspond to the data model] =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No. Generalized data movers =
are not the problem. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Defining a protocol that is =
well defined enough so </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that many device vendors can =
export data and many </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; application vendors can =
process the data regardless </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of the device is problematic =
if all you define is a </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; general purpose data mover. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; But deciding on an adequate =
&quot;generalized data mover&quot; is the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; point of this </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; evaluation process, I thought. I =
expect that there will </FONT>
<BR><FONT SIZE=3D2>&gt; be multiple data </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; models, for the various kinds of =
generalized devices. (e.g., </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; for our probe, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; we've defined three generic =
groupings of data: volume metrics; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; QoS metrics; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; usage metrics and attributes -- =
similarly, SNMP's </FONT>
<BR><FONT SIZE=3D2>&gt; enterprise MIBs and </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; RADIUS's vendor-specific =
attributes). </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; There is one place where the =
nature of the data might </FONT>
<BR><FONT SIZE=3D2>&gt; intersect with the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; protocol -- the high-volume =
metrics such as exported by </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; NetFlow; and where </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the claim is that a reliable =
protocol is an unnecessary </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead. So, let me </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; discuss this a bit more. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The argument is that with high =
volume export it is </FONT>
<BR><FONT SIZE=3D2>&gt; preferable to do </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; multi-cast UDP with sequence =
numbers; data loss can be detected </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; by noting </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; which sequence numbers are =
missing ... and reliability can be </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; increased by </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; having multiple receivers and =
de-duplicating what they receive. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; One does not need to multicast UDP to =
indicate missing </FONT>
<BR><FONT SIZE=3D2>&gt; reliability. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; For such a situation, the =
reliable protocol's </FONT>
<BR><FONT SIZE=3D2>&gt; *implementation* would not </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; keep a queue of data to =
retransmit on fail-over; it would only </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; keep enough </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; buffer to deal with TCP's or =
SCTP's flow control and to </FONT>
<BR><FONT SIZE=3D2>&gt; handle bursts of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; records. ACKs would be used only =
to notice when data are not </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; received at the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; other end and to cause =
fail-over. TCP &quot;write would </FONT>
<BR><FONT SIZE=3D2>&gt; block&quot; also causes </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; fail-over. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; So records can be lost in both cases. =
Also in a continuous export </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; (in the case of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; high volume export) the rate of ACKs =
is once every 2 send packets. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; I would argue that the cost of =
exporting this way is very </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; similar to that of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; the UDP broadcast. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Are you talking w.r.t the end-point =
(exporter &amp; collector) or the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; network itself. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; For the former, the processing =
overhead is much higher in TCP. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; And on the receiving end, it is =
*much* easier to handle </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; than a UDP-broadcast, which also =
needs stronger </FONT>
<BR><FONT SIZE=3D2>&gt; hardware because of the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; higher de-duplication load. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Can be about the same for both: =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - data copying (if =
scatter/gather is used) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - protocol overhead (sequence =
number, template ID, etc.) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; In a typical datapath the instruction =
ration of UDP to TCP is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; multi-fold. I don't know how you can =
tell that the protocol </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; overhead is the same. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The possible extra cost of the =
&quot;reliable&quot; export version is: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - timer for noticing when ACK =
isn't received [trivial cost] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP vs UDP (little difference =
with modern implementations) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - TCP retransmit with packet =
loss (typically very low) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - cost of fail-over when no ACK =
received or write would block </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; The savings and benefits of the =
&quot;reliable&quot; version are: </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - fewer packet writes (broadcast =
requires 2x as many packets; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; and TCP can pack =
more efficiently because records can </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;&nbsp;&nbsp; span packets) =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; As mentioned above if the&nbsp; =
absence of reliability is what we want, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; then we need not do a UDP broadcast. =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - lower network traffic (which =
adds to reliability) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - smaller machines for receiving =
</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; what does this mean? </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; thanks </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Ganesh </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - more accurate estimate of loss =
due to lack of reliability </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - can handle congestion </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; [As an aside, even with the =
UDP-broadcast version, the </FONT>
<BR><FONT SIZE=3D2>&gt; exporter ought to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; compute totals for the various =
metrics and output those from </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; time to time, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; to provide a more accurate =
understanding of data loss. Perhaps </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; such totals </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; are already available in the =
MIBs, but there remains </FONT>
<BR><FONT SIZE=3D2>&gt; the issue of how to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; correlate with the sequence =
numbers of the exported data.] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; - peter </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; in message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; =
<A HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; in </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &quot;unsubscribe ipfix&quot; in =
message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; =
Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;help&quot; in message body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;unsubscribe ipfix&quot; in message =
body </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body </FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message body =
</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A> </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C270B2.46CD53CA--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 11 08:50:32 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA19667
	for <ipfix-archive@lists.ietf.org>; Fri, 11 Oct 2002 08:50:32 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 17zz57-0007Ig-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 11 Oct 2002 07:39:53 -0500
Received: from palrel12.hp.com ([156.153.255.237])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 17zz53-0007IZ-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 11 Oct 2002 07:39:49 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP
	id 4974BE00996; Fri, 11 Oct 2002 05:39:46 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id FAA25417;
	Fri, 11 Oct 2002 05:39:40 -0700 (PDT)
Received: from cup.hp.com ([15.244.162.17]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021011131127.HMWM18196.simail.cup.hp.com@cup.hp.com>;
          Fri, 11 Oct 2002 06:11:27 -0700
Message-ID: <3DA6C68E.70403@cup.hp.com>
Date: Fri, 11 Oct 2002 05:39:42 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Harrington, David" <dbh@enterasys.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <6D745637A7E0F94DA070743C55CDA9BA075841@NHROCMBX1.ets.enterasys.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

Let me try to illustrate by example the difference between the IPDR
technique of XML-Schema based definition of information items and
the current SNMP SMI model.  And the rationale for "not just using
SMI".

The bottom line is that IPDR XML-Schema promotes the use of the
same name when the same information item appears in multiple "tables"
whereas SMI, by nature of SNMP's indexing scheme ends up redeclaring the
same item if it appears in more than one table.

Consider MIB-II, the numeric identifier of the interface card in MIB-II is
used in the interface table, as well as the IP address table, the
route table and the net to media table.

So it is defined four times as:

   ifIndex
   ipAdEntIfIndex
   ipRouteIfIndex
   ipNetToMediaIfIndex

And you end up with descriptions of these secondary redefinitions
with statements like:

  "The index value which uniquely identifies the
   interface to which this entry is applicable.  The
   interface identified by a particular value of this
   index is the same interface as identified by the
   same value of ifIndex."


The interface identifier is also used in many other MIBs, and
all are required to redefine this information element, because
of the way SNMP accesses information.  This makes sense for
SNMP, but since we aren't using SNMP as the mover of information,
it is an annoyance. 

Renaming the same item, makes correlation and information management
more complex than simply calling the same thing by a single name.



In the IPFIX space we will have at least two logical tables,
to which the flow exporter may be adding rows:

  - one for IPv6
  - one for IPv4

In the initial IPDR XML-Schema defined for IPFIX, the names of
the fields which are common to both tables are defined only
once.  E.g.  there is only a definition of "sourcePort" not
an "ipV4sourcePort" and a "ipV6sourcePort".



Regards,

  Jeff Meyer

Harrington, David wrote:

> Hi,
>
> Comments inline.
>
> > -----Original Message-----
> > From: Jeff Meyer [mailto:jeffm@cup.hp.com]
> ...
> >   My advocacy for IPDR's XML-Schema based approach to data modelling
> > is based on the following two shortcomings I see with MIBs as
> > they stand
> > today for accounting information like IPFIX:
> >
> >    1.  SMI's definition language is based on a subset of
> > ASN.1, although this has stood in good stead these years, I would 
> submit that the
> > toolset available
> >      for processing XML documents is larger and will continue
> > to outpace ASN.1.     In the SMIng draft, the issues on p. 52 state:
> >       
> >
> >    Learn from ODL, XML, ODBMS -  Look at the ODL proposal from TINAC.
> >       Look at the XML schema work from W3C.  Look at the ODBMS work.
> >
> In order to properly understand context, it is important to identify 
> WHICH draft you are referring to, and to understand how that draft 
> fits into the work of the WG. The draft you reference is one proposal 
> that has been submitted to the WG for consideration. If I submitted a 
> proposal to the IPFIX WG and my proposal included a statement "learn 
> from Fortran" that wouldn't imply that the IPFIX WG agreed that 
> Fortran was the language of choice. If you look at the RFC produced by 
> the SMING WG, which shows the requirements that the WG agrees on, you 
> will find no mention of XML.
>
> That is not to say that the members of the WG aren't looking at XML 
> and other languages for good ideas (as the proceedings show), but they 
> have explicitly chosen to continue using ASN.1 until it is shown that 
> ASN.1 cannot provide the necessary expressiveness.
>
> But I'm not arguing for ASN.1, nor am I arguing against XML. I believe 
> the benefit of having available tools must be considered when 
> selecting a data definition language.
>
> >
> >  2. SMIv1 and v2 all require each use of an identifier to
> >    have an OID bound to it.  In section 3.3 of the SMIng
> >    draft they explicitly state that OIDs should not be used
> >    for any bindings other than SNMP or COPS.
>
> An OID is simply a compact mechanism for identifying/addressing a data 
> element. The OID 1.3.6.1.2.25.3.6.1.1.6 is more compact on the wire than
>
> iso.org.dod.internet.mib-2.host.hrDevice.hrDiskStorageTable.hrDiskStorageEntry.hrDiskStorageAccess.6 
> (although obviously not as user-friendly).
>
> The SMIng draft you cite is only an individual submission. They do not 
> explicitly state that OIDs should not be used for any bindings other 
> than SNMP or COPS. In the limited universe of mappings they discuss, 
> only SNMP and COPS/PR currently use OIDs. Protocol-specific mappings 
> are done outside the protocol-independent modeling portions in their 
> proposed design. OIDs should not be used in the protocol-independent 
> modeling portions of their design, because OIDs are protocol-specific.
>
> Section 3.3 says:
>
>    The ObjectIdentifier base type represents administratively assigned
>    names for use with SNMP and COPS-PR.  This type SHOULD NOT be used in
>    protocol independant SMIng modules.  It is meant to be used in SNMP
>    and COPS-PR mappings of attributes of type Pointer (Section 3.2).
> >
> >  So I believe that the IPDR XML-Schema subset defined today
> > will address the needs of IPFIX.  I believe the proposed
> > protocol using this data model will efficiently address the
> > transfer and other requirements.
> >
> > > I am missing the point about how OIDs hinder fine-grained
> > counters. An
> > > OID is used to name an object such as a counter. I don't think the
> > > naming has a significant effect on how fine-grained the counter is.
> > > Are you asserting that somehow XML-naming better supports
> > fine-grained
> > > counters?
> > >
> >
> > If you want to define the information produced by IPFIX in a
> > MIB, then I
> > would
> > expect it to be in the form of a table definition, since a given
> > category of IPFIX
> > "records" will all have the same field information.
> >
> > In defining a table in SNMP, you need to address SNMPs
> > requirement about
> > being able to lexicographically order each information item.  So the
> > indexing
> > scheme would need srcip,dstip,srcport,dstport and time at
> > least to make a
> > unique index.
> >
> > In the XML model you define the record information (using the
> > complexType
> > declaration) and there is no requirement around defining an
> > indexing scheme.
> >
> > So I not saying it couldn't be done, just that it introduces
> > information
> > which
> > is not (in my opinion) useful for the IPFIX requirements.
>
> That would be one way to design the table, but you could also define 
> the table with a unique integer index, so exporting a particular 
> fine-grained counter's value would require using a varbind with an OID 
> to identify the table, the column and the instance  
> (FlowTableEntry.FGCounter.4) plus the type and value of the counter 
> instance.
>
> The varbind does not require all the src,dst,etc information be 
> encoded in each counter update, althoguh you might want it reported 
> once so the receiver knows which flow the index refers to. If the 
> difficulty of multi-field lexicographical indexing is the answer, then 
> I think the issue is merely a misunderstanding of indexing requirements.
>
> But let's talk about your proposal. How does using XML's complexType 
> declaration better support fine-grained counters? Can you compare how 
> to export the value of the same counter instance I used above using 
> your proposal? When you define XML record information, aren't you in 
> fact describing the equivalent of a row of SNMP data? and when you 
> want to reference a particular field, isn't that roughly the same as 
> identifying a table column in SNMP? and when you identify a counter 
> instance in XML isn't that roughly the same as identifying a counter 
> instance in SNMP?
>
> In either case, you need to identify the table, the field, and the 
> instance in order to identify the element whose value is being 
> exported. So I'm not seeing the difference.
>
> >
> > > >    But the essential concept of MIBs, which SMIng is also
> > > > looking at revising is important.
> > >
> > > I disagree that SMIng is looking at revising the essential
> > concept of
> > > MIBs. They are looking at revising the SMI to improve
> > ease-of-use and
> > > add object-orientation. The essential concept of MIBs as
> > "data models
> > > that are extensible without protocol changes" remains the same.
> > >
> >
> > One key revision is the restriction of OID usage to SNMP and COPS.
> >  IPFIX does
> > not need OIDs.
>
> I don't know anybody that is arguing for OIDs for IPFIX. I'm merely 
> trying to understand the points of your initial mail, and to correct 
> misunderstandings of what SMIng is doing.
>
> As mentioned above, the draft you read is only one proposal, and it 
> has placed a restriction on its own design. The SMING WG is making no 
> such revision to mibs, nor are they revising the essential concept of 
> mibs; they are merely extending the SMI to be more expressive and 
> user-friendly.
>
> dbh
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 15 02:04:03 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA15525
	for <ipfix-archive@lists.ietf.org>; Tue, 15 Oct 2002 02:04:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181KWI-0004uX-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 15 Oct 2002 00:45:30 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 181KWF-0004uN-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 15 Oct 2002 00:45:27 -0500
Received: (qmail 29603 invoked from network); 15 Oct 2002 05:45:23 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 15 Oct 2002 05:45:23 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9F5mgu29562;
	Mon, 14 Oct 2002 22:48:42 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <simon@limmat.switch.ch>
Cc: <ipfix-eval@net.doit.wisc.edu>,
        "Peter Ludemann" <peter.ludemann@xacct.com>
Subject: RE: Re: [ipfix-eval] Simon's evaluation draft contribution
Date: Mon, 14 Oct 2002 22:45:24 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDIEBBCPAA.givoly@xacct.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Simon,

I truly appreciate your comprehensive analysis of all protocols in question.

May I try to make a few corrections regarding CRANE:

One of its main design goals was, in fact, efficiency. Under circumstances
in which exists no network congestion or failure in receivers (servers) it
has been benchmarked to perform 90% performance of NetFlow v5 (which is even
more efficient than NetFlow v9). In fact, performance/efficiency/scalability
has been a design goal. The goals of CRANE are, in the following order:
- Reliability - working with carriers on absorbing usage information from
routers for the purpose of usage-sensitive billing has lead us to believe
that the weakest link in the chain is the interface between the mediation
system and the network/service element. This was the prime goal of
developing an additional protocol where NetFlow provided an efficient
solution.
- Scalable - both in the sense of a large, distributed network as well as in
the sense of efficiency - making the overall cost of collecting usage
information least while maintaining the rest of the requirements.

Basically, CRANE does embody your main conclusion - we came to develop it
due to the shortcoming of all other existing flow export protocols at the
time (NetFlow v1-v8, LFAP v1-4, RADIUS, DIAMETER, SNMP and TopFlow as well
as other protocols not evaluated here used in Telco applications, such as
AMA, ASN.1, etc.). All we essentially did was add reliability and
extensibility. Our desire was not to necessitate the need for any further
protocol replacement, so for this we added the version and template
negotiation.

I believe not enough emphasis has been placed on the backward and forward
compatibility, available in modem communications and in fax communications
today due to negotiation protocols that then set the feature/capabilities of
the subsequent dialog. The template negotiation, and the preceding UDP-based
protocol-version negotiation, both offer the protocol the ability to be
upgraded over time with minimum consequences. It is our expectation that
network/service elements would implement one version of the protocol while
servers would implement any number of versions concurrently and communicate
freely with network/service elements of various versions.

Regarding NetFlow v9. I don't believe that adding reliability is a simple
thing based on our extensive experience hardening NetFlow-based solutions
and analyzing their reliability. Today, the naive assumption is that this
would be done based on some distributed voting algorithm. Those aware of the
domain of distributed voting must realize that a majority vote would require
3 redundant collectors. Other more computationally complex and less reliable
voting methods can settle for less redundancy, but these introduce
compromise. First of all, NetFlow currently offers only two. Performing
back-end de-duplication may require persistence of all records and detailed
comparison. Basically, adding reliability mechanisms over NetFlow v9 offsets
the benefit of having a simple protocol. The network/service element can
export data at a higher rate, but there is excessive cost at the receiving
end. This is not required by LFAP, CRANE, DIAMETER or IPDR to achieve higher
levels of reliability.

Regarding LFAP. To best of my understanding, fail-over may cause some data
loss during fail-over (Paul/Mike, please correct me if I'm wrong).
Therefore, the protocol accepts this and reports on potential data loss.
Using templates, or any form of reporting via protocol extensions, supported
by CRANE, IPDR and DIAMETER, it is possible to report loss of usage data,
sampling, or any other form of modification of data attributes. The fact
that templates can be negotiated during sessions with CRANE, provides the
added value that features can be added that weren't configured originally
(perhaps due to user intervention). This avoids the need to bring down the
connection during configuration changes that are likely to occur throughout
a deployment.

Minor corrections:
2.1.2 - you mention that the client will suppress keys unselected by Server,
however, the client can do this optionally, to allow the client the utmost
flexibility to achieve best efficiency from perspective of client. It may
make sense for clients to know if no consumer is interested in the
information provided. For fields that are expensive to populate, the client
may elect to avoid generating their value if no consumer is interested in
them, however, in other cases, clients may find it more efficient to export
everything and have the consumer sort out what to do with the data. This
provides flexibility as well as efficiency.

4.2 - CRANE is oblivious as to whether sampling has taken place or not. An
easy extension would be to use different templates - one for sampled data
and one for non-sampled data and to have both work alternatively or
concurrently. Our experience leads us to believe that sample-based billing
is a very unlikely usage despite the prolonged debate on the matter.
However, I completely agree that there are many other applications that may
be satisfied by sampled data, and there is no limitation on whether to use
them or not. I believe there is great benefit in separating the data models
and the transport. Flow control available within CRANE implementations can
be used to throttle producer and to allow for transition between sampled and
non-sampled mode - if both are supported. As this is subject to specific
applications, it may need additional refinement as part of the requirement
specification.

4.3 - If distinct templates are added for sampled mode of operation, then
providing attributes to describe the sampling parameters can be easily
included or implied by selection of specific templates. Flow control can be
used to select mode of sampling.

5. As mentioned above, evolution of CRANE came from the deficiencies in
NetFlow v1-v8, LFAP v1-4, RADIUS, DIAMETER, SNMP and TopFlow as well as
other protocols not evaluated here. Carriers have much criticism as to the
cost of converting non-fault-tolerant flow-based exports mechanisms to
carrier-grade-reliable. We have attempted to address this need with CRANE
while not compromising the performance. Since we expect that carriers and
equipment vendors would want a protocol that is extensible to support any
future data export need, we added requirements such as flexibility and
extensibility.

I contend that what we did with CRANE is, in fact, exactly what you actually
recommend to do - that is: start with something simple like NetFlow and
update it by adding transport, reliability, and redundant configurations. We
also added extensibility. What other requirements have we dealt with? None,
essentially. What has been added in CRANE beyond these requirements that is
not truly required in a protocol we intend to avoid replacing?

Thanks again for your comprehensive analysis. Comments are more than
welcome.

Tal
____________________________________________

Tal Givoly
Chief Scientist
XACCT Technologies, Inc.
2900 Lakeside Drive
Santa Clara, CA 95054
http://www.xacct.com

Direct:  408-330-5747
Tel:     408-654-9900 x 5747
Fax:     408-654-9904
E-mail:  mailto:givoly@xacct.com
____________________________________________


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 15 08:50:55 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA29458
	for <ipfix-archive@lists.ietf.org>; Tue, 15 Oct 2002 08:50:54 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181Qsx-0003Tu-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 15 Oct 2002 07:33:19 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181Qst-0003TI-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 15 Oct 2002 07:33:16 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9FCWc325192;
	Tue, 15 Oct 2002 05:32:38 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7STP4>; Tue, 15 Oct 2002 05:32:37 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C043D16DC@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Simon Leinen <simon@limmat.switch.ch>, ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's evaluation draft contribution
Date: Tue, 15 Oct 2002 05:32:37 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27446.F177D3D0"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27446.F177D3D0
Content-Type: text/plain;
	charset="iso-8859-1"

I thought you all were going to send me a draft just like Simon and I would
edit them together...so we would contribute as a team and not as separate
drafts. And the deadline was october 8th for you to send me your comments.

regards,

Reinaldo

> -----Original Message-----
> From: Simon Leinen [mailto:simon@limmat.switch.ch]
> Sent: Thursday, October 10, 2002 3:38 PM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: [ipfix-eval] Simon's evaluation draft contribution
> 
> 
> This is my first contribution as a member of the IPFIX protocol
> evaluation team.  Sorry about the delay.  I'm on vacation until next
> Tuesday (October 15), and I'm able to access my mail only very
> infrequently.  This and the bad weather finally helped me find some
> time to work on an evaluation draft.  It is modeled roughly rather
> than slavishly after the "IPFIX Protocol Evaluation" template that I
> think Juergen has circulated based on similar work in MIDCOM.
> 
> Please feel free to use this material as you see fit, borrowing freely
> and changing what doesn't enjoy rough evaluation team consensus.  Note
> that I haven't seen anything circulating on the IPFIX mailing lists
> over the past few days.
> 
> I'm not familiar with the I-D publication procedure.  If you think it
> would make sense to publish my document in the I-D repository for
> reference, I certainly won't mind if someone puts it there.
> -- 
> Simon.
> 

------_=_NextPart_001_01C27446.F177D3D0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Simon's evaluation draft contribution</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I thought you all were going to send me a draft just =
like Simon and I would edit them together...so we would contribute as a =
team and not as separate drafts. And the deadline was october 8th for =
you to send me your comments.</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Simon Leinen [<A =
HREF=3D"mailto:simon@limmat.switch.ch">mailto:simon@limmat.switch.ch</A>=
]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 3:38 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [ipfix-eval] Simon's evaluation draft =
contribution</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; This is my first contribution as a member of =
the IPFIX protocol</FONT>
<BR><FONT SIZE=3D2>&gt; evaluation team.&nbsp; Sorry about the =
delay.&nbsp; I'm on vacation until next</FONT>
<BR><FONT SIZE=3D2>&gt; Tuesday (October 15), and I'm able to access my =
mail only very</FONT>
<BR><FONT SIZE=3D2>&gt; infrequently.&nbsp; This and the bad weather =
finally helped me find some</FONT>
<BR><FONT SIZE=3D2>&gt; time to work on an evaluation draft.&nbsp; It =
is modeled roughly rather</FONT>
<BR><FONT SIZE=3D2>&gt; than slavishly after the &quot;IPFIX Protocol =
Evaluation&quot; template that I</FONT>
<BR><FONT SIZE=3D2>&gt; think Juergen has circulated based on similar =
work in MIDCOM.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Please feel free to use this material as you =
see fit, borrowing freely</FONT>
<BR><FONT SIZE=3D2>&gt; and changing what doesn't enjoy rough =
evaluation team consensus.&nbsp; Note</FONT>
<BR><FONT SIZE=3D2>&gt; that I haven't seen anything circulating on the =
IPFIX mailing lists</FONT>
<BR><FONT SIZE=3D2>&gt; over the past few days.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I'm not familiar with the I-D publication =
procedure.&nbsp; If you think it</FONT>
<BR><FONT SIZE=3D2>&gt; would make sense to publish my document in the =
I-D repository for</FONT>
<BR><FONT SIZE=3D2>&gt; reference, I certainly won't mind if someone =
puts it there.</FONT>
<BR><FONT SIZE=3D2>&gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; Simon.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27446.F177D3D0--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 15 09:09:46 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA00191
	for <ipfix-archive@lists.ietf.org>; Tue, 15 Oct 2002 09:09:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181RLE-0004Mi-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 15 Oct 2002 08:02:32 -0500
Received: from mgw-dax2.ext.nokia.com ([63.78.179.217])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181RLC-0004MX-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 15 Oct 2002 08:02:30 -0500
Received: from davir04nok.americas.nokia.com (davir04nok.americas.nokia.com [172.18.242.87])
	by mgw-dax2.ext.nokia.com (Switch-2.2.1/Switch-2.2.0) with ESMTP id g9FD3BM27300
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 15 Oct 2002 08:03:12 -0500 (CDT)
Received: from daebh002.NOE.Nokia.com (unverified) by davir04nok.americas.nokia.com
 (Content Technologies SMTPRS 4.2.5) with ESMTP id <T5df37bfbf2ac12f257079@davir04nok.americas.nokia.com>;
 Tue, 15 Oct 2002 08:02:27 -0500
Received: from bsebe001.NOE.Nokia.com ([172.19.160.13]) by daebh002.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.5329);
	 Tue, 15 Oct 2002 08:01:52 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.0.6249.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C2744B.075872FC"
Subject: RE: [ipfix-eval] Simon's evaluation draft contribution
Date: Tue, 15 Oct 2002 09:01:51 -0400
Message-ID: <DC504E9C3384054C8506D3E6BB0124607AE459@bsebe001.americas.nokia.com>
Thread-Topic: [ipfix-eval] Simon's evaluation draft contribution
Thread-Index: AcJ0SivkBKAC8YS2Thab+V8cRxH/ggAAIKTg
From: <ram.gopal@nokia.com>
To: <rpenno@nortelnetworks.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
X-OriginalArrivalTime: 15 Oct 2002 13:01:52.0792 (UTC) FILETIME=[0826B980:01C2744B]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This is a multi-part message in MIME format.

------_=_NextPart_001_01C2744B.075872FC
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hello Reinaldo,
=20
I was under the impression that deadline to draft individual evaluation =
is tomorrow. Then someone takes responsibility to  merge the document.=20
=20
I will send out by tomorrow the evaluation document.
Regards
Ramg

-----Original Message-----
From: ext Reinaldo Penno [mailto:rpenno@nortelnetworks.com]
Sent: Tuesday, October 15, 2002 8:33 AM
To: Simon Leinen; ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's evaluation draft contribution



I thought you all were going to send me a draft just like Simon and I =
would edit them together...so we would contribute as a team and not as =
separate drafts. And the deadline was october 8th for you to send me =
your comments.

regards,=20

Reinaldo=20

> -----Original Message-----=20
> From: Simon Leinen [ mailto:simon@limmat.switch.ch]=20
> Sent: Thursday, October 10, 2002 3:38 PM=20
> To: ipfix-eval@net.doit.wisc.edu=20
> Subject: [ipfix-eval] Simon's evaluation draft contribution=20
>=20
>=20
> This is my first contribution as a member of the IPFIX protocol=20
> evaluation team.  Sorry about the delay.  I'm on vacation until next=20
> Tuesday (October 15), and I'm able to access my mail only very=20
> infrequently.  This and the bad weather finally helped me find some=20
> time to work on an evaluation draft.  It is modeled roughly rather=20
> than slavishly after the "IPFIX Protocol Evaluation" template that I=20
> think Juergen has circulated based on similar work in MIDCOM.=20
>=20
> Please feel free to use this material as you see fit, borrowing freely =

> and changing what doesn't enjoy rough evaluation team consensus.  Note =

> that I haven't seen anything circulating on the IPFIX mailing lists=20
> over the past few days.=20
>=20
> I'm not familiar with the I-D publication procedure.  If you think it=20
> would make sense to publish my document in the I-D repository for=20
> reference, I certainly won't mind if someone puts it there.=20
> --=20
> Simon.=20
>=20


------_=_NextPart_001_01C2744B.075872FC
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<TITLE>RE: [ipfix-eval] Simon's evaluation draft contribution</TITLE>

<META content=3D"MSHTML 5.50.4611.1300" name=3DGENERATOR></HEAD>
<BODY>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =
size=3D2>Hello=20
Reinaldo,</FONT></SPAN></DIV>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =

size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =
size=3D2>I was=20
under the impression that deadline to draft individual evaluation is =
tomorrow.=20
Then someone takes responsibility to&nbsp; merge the document.=20
</FONT></SPAN></DIV>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =

size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =
size=3D2>I will=20
send out by tomorrow the evaluation document.</FONT></SPAN></DIV>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =

size=3D2>Regards</FONT></SPAN></DIV>
<DIV><SPAN class=3D316225912-15102002><FONT face=3DArial color=3D#0000ff =

size=3D2>Ramg</FONT></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px =
solid; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader dir=3Dltr align=3Dleft><FONT =
face=3DTahoma=20
  size=3D2>-----Original Message-----<BR><B>From:</B> ext Reinaldo Penno =

  [mailto:rpenno@nortelnetworks.com]<BR><B>Sent:</B> Tuesday, October =
15, 2002=20
  8:33 AM<BR><B>To:</B> Simon Leinen;=20
  ipfix-eval@net.doit.wisc.edu<BR><B>Subject:</B> RE: [ipfix-eval] =
Simon's=20
  evaluation draft contribution<BR><BR></FONT></DIV>
  <P><FONT size=3D2>I thought you all were going to send me a draft just =
like=20
  Simon and I would edit them together...so we would contribute as a =
team and=20
  not as separate drafts. And the deadline was october 8th for you to =
send me=20
  your comments.</FONT></P>
  <P><FONT size=3D2>regards,</FONT> </P>
  <P><FONT size=3D2>Reinaldo</FONT> </P>
  <P><FONT size=3D2>&gt; -----Original Message-----</FONT> <BR><FONT =
size=3D2>&gt;=20
  From: Simon Leinen [<A=20
  =
href=3D"mailto:simon@limmat.switch.ch">mailto:simon@limmat.switch.ch</A>]=
</FONT>=20
  <BR><FONT size=3D2>&gt; Sent: Thursday, October 10, 2002 3:38 =
PM</FONT>=20
  <BR><FONT size=3D2>&gt; To: ipfix-eval@net.doit.wisc.edu</FONT> =
<BR><FONT=20
  size=3D2>&gt; Subject: [ipfix-eval] Simon's evaluation draft =
contribution</FONT>=20
  <BR><FONT size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt; =
</FONT><BR><FONT=20
  size=3D2>&gt; This is my first contribution as a member of the IPFIX=20
  protocol</FONT> <BR><FONT size=3D2>&gt; evaluation team.&nbsp; Sorry =
about the=20
  delay.&nbsp; I'm on vacation until next</FONT> <BR><FONT size=3D2>&gt; =
Tuesday=20
  (October 15), and I'm able to access my mail only very</FONT> =
<BR><FONT=20
  size=3D2>&gt; infrequently.&nbsp; This and the bad weather finally =
helped me=20
  find some</FONT> <BR><FONT size=3D2>&gt; time to work on an evaluation =

  draft.&nbsp; It is modeled roughly rather</FONT> <BR><FONT =
size=3D2>&gt; than=20
  slavishly after the "IPFIX Protocol Evaluation" template that I</FONT> =

  <BR><FONT size=3D2>&gt; think Juergen has circulated based on similar =
work in=20
  MIDCOM.</FONT> <BR><FONT size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt; =
Please feel=20
  free to use this material as you see fit, borrowing freely</FONT> =
<BR><FONT=20
  size=3D2>&gt; and changing what doesn't enjoy rough evaluation team=20
  consensus.&nbsp; Note</FONT> <BR><FONT size=3D2>&gt; that I haven't =
seen=20
  anything circulating on the IPFIX mailing lists</FONT> <BR><FONT =
size=3D2>&gt;=20
  over the past few days.</FONT> <BR><FONT size=3D2>&gt; =
</FONT><BR><FONT=20
  size=3D2>&gt; I'm not familiar with the I-D publication =
procedure.&nbsp; If you=20
  think it</FONT> <BR><FONT size=3D2>&gt; would make sense to publish my =
document=20
  in the I-D repository for</FONT> <BR><FONT size=3D2>&gt; reference, I =
certainly=20
  won't mind if someone puts it there.</FONT> <BR><FONT size=3D2>&gt; -- =

  </FONT><BR><FONT size=3D2>&gt; Simon.</FONT> <BR><FONT size=3D2>&gt;=20
</FONT></P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C2744B.075872FC--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 15 09:20:34 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA00632
	for <ipfix-archive@lists.ietf.org>; Tue, 15 Oct 2002 09:20:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181RSE-0004eF-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 15 Oct 2002 08:09:46 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181RSC-0004dL-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 15 Oct 2002 08:09:44 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9FD9B328332;
	Tue, 15 Oct 2002 06:09:11 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9FD9N423512;
	Tue, 15 Oct 2002 08:09:23 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7STV0>; Tue, 15 Oct 2002 06:09:09 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C043D16F7@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ram.gopal@nokia.com
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's evaluation draft contribution
Date: Tue, 15 Oct 2002 06:09:07 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C2744C.0AAB8B8A"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C2744C.0AAB8B8A
Content-Type: text/plain;
	charset="iso-8859-1"

This is the last email I remember from Nevil to the list about this topic.

"
As a way to preceed, would it be sensible for each of the team members
to send their version of the Evaluation draft, or maybe just their
notes about each protocol, to Reinaldo by about 8 October so that he
can produce a first draft which the team can comment on? If everyone
could manage that, we'd have a good chance of publishing the -00.txt
version by 18 October."

I understand it as the deadline for the team submission is october 18th, but
the individual ones should have been before that so I have time to stich
them together, send back to you guys for agreement and then send another
version to the list. After that I edit the draft based on discussions on the
main list.

regards,

Reinaldo


-----Original Message-----
From: ram.gopal@nokia.com [mailto:ram.gopal@nokia.com]
Sent: Tuesday, October 15, 2002 6:02 AM
To: Penno, Reinaldo [BL60:0430:EXCH]
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's evaluation draft contribution


Hello Reinaldo,

I was under the impression that deadline to draft individual evaluation is
tomorrow. Then someone takes responsibility to  merge the document. 

I will send out by tomorrow the evaluation document.
Regards
Ramg
-----Original Message-----
From: ext Reinaldo Penno [mailto:rpenno@nortelnetworks.com]
Sent: Tuesday, October 15, 2002 8:33 AM
To: Simon Leinen; ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's evaluation draft contribution


I thought you all were going to send me a draft just like Simon and I would
edit them together...so we would contribute as a team and not as separate
drafts. And the deadline was october 8th for you to send me your comments.
regards, 
Reinaldo 
> -----Original Message----- 
> From: Simon Leinen [mailto:simon@limmat.switch.ch] 
> Sent: Thursday, October 10, 2002 3:38 PM 
> To: ipfix-eval@net.doit.wisc.edu 
> Subject: [ipfix-eval] Simon's evaluation draft contribution 
> 
> 
> This is my first contribution as a member of the IPFIX protocol 
> evaluation team.  Sorry about the delay.  I'm on vacation until next 
> Tuesday (October 15), and I'm able to access my mail only very 
> infrequently.  This and the bad weather finally helped me find some 
> time to work on an evaluation draft.  It is modeled roughly rather 
> than slavishly after the "IPFIX Protocol Evaluation" template that I 
> think Juergen has circulated based on similar work in MIDCOM. 
> 
> Please feel free to use this material as you see fit, borrowing freely 
> and changing what doesn't enjoy rough evaluation team consensus.  Note 
> that I haven't seen anything circulating on the IPFIX mailing lists 
> over the past few days. 
> 
> I'm not familiar with the I-D publication procedure.  If you think it 
> would make sense to publish my document in the I-D repository for 
> reference, I certainly won't mind if someone puts it there. 
> -- 
> Simon. 
> 

------_=_NextPart_001_01C2744C.0AAB8B8A
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Simon's evaluation draft contribution</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>This is the last email I remember from Nevil to the =
list about this topic.</FONT>
</P>

<P><FONT SIZE=3D2>&quot;</FONT>
<BR><FONT SIZE=3D2>As a way to preceed, would it be sensible for each =
of the team members</FONT>
<BR><FONT SIZE=3D2>to send their version of the Evaluation draft, or =
maybe just their</FONT>
<BR><FONT SIZE=3D2>notes about each protocol, to Reinaldo by about 8 =
October so that he</FONT>
<BR><FONT SIZE=3D2>can produce a first draft which the team can comment =
on? If everyone</FONT>
<BR><FONT SIZE=3D2>could manage that, we'd have a good chance of =
publishing the -00.txt</FONT>
<BR><FONT SIZE=3D2>version by 18 October.&quot;</FONT>
</P>

<P><FONT SIZE=3D2>I understand it as the deadline for the team =
submission is october 18th, but the individual ones should have been =
before that so I have time to stich them together, send back to you =
guys for agreement and then send another version to the list. After =
that I edit the draft based on discussions on the main list.</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: ram.gopal@nokia.com [<A =
HREF=3D"mailto:ram.gopal@nokia.com">mailto:ram.gopal@nokia.com</A>]</FON=
T>
<BR><FONT SIZE=3D2>Sent: Tuesday, October 15, 2002 6:02 AM</FONT>
<BR><FONT SIZE=3D2>To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>Cc: ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [ipfix-eval] Simon's evaluation draft =
contribution</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Hello Reinaldo,</FONT>
</P>

<P><FONT SIZE=3D2>I was under the impression that deadline to draft =
individual evaluation is tomorrow. Then someone takes responsibility =
to&nbsp; merge the document. </FONT></P>

<P><FONT SIZE=3D2>I will send out by tomorrow the evaluation =
document.</FONT>
<BR><FONT SIZE=3D2>Regards</FONT>
<BR><FONT SIZE=3D2>Ramg</FONT>
<BR><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: ext Reinaldo Penno [<A =
HREF=3D"mailto:rpenno@nortelnetworks.com">mailto:rpenno@nortelnetworks.c=
om</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: Tuesday, October 15, 2002 8:33 AM</FONT>
<BR><FONT SIZE=3D2>To: Simon Leinen; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [ipfix-eval] Simon's evaluation draft =
contribution</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>I thought you all were going to send me a draft just =
like Simon and I would edit them together...so we would contribute as a =
team and not as separate drafts. And the deadline was october 8th for =
you to send me your comments.</FONT></P>

<P><FONT SIZE=3D2>regards, </FONT>
<BR><FONT SIZE=3D2>Reinaldo </FONT>
<BR><FONT SIZE=3D2>&gt; -----Original Message----- </FONT>
<BR><FONT SIZE=3D2>&gt; From: Simon Leinen [<A =
HREF=3D"mailto:simon@limmat.switch.ch">mailto:simon@limmat.switch.ch</A>=
] </FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 3:38 PM =
</FONT>
<BR><FONT SIZE=3D2>&gt; To: ipfix-eval@net.doit.wisc.edu </FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [ipfix-eval] Simon's evaluation draft =
contribution </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; This is my first contribution as a member of =
the IPFIX protocol </FONT>
<BR><FONT SIZE=3D2>&gt; evaluation team.&nbsp; Sorry about the =
delay.&nbsp; I'm on vacation until next </FONT>
<BR><FONT SIZE=3D2>&gt; Tuesday (October 15), and I'm able to access my =
mail only very </FONT>
<BR><FONT SIZE=3D2>&gt; infrequently.&nbsp; This and the bad weather =
finally helped me find some </FONT>
<BR><FONT SIZE=3D2>&gt; time to work on an evaluation draft.&nbsp; It =
is modeled roughly rather </FONT>
<BR><FONT SIZE=3D2>&gt; than slavishly after the &quot;IPFIX Protocol =
Evaluation&quot; template that I </FONT>
<BR><FONT SIZE=3D2>&gt; think Juergen has circulated based on similar =
work in MIDCOM. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Please feel free to use this material as you =
see fit, borrowing freely </FONT>
<BR><FONT SIZE=3D2>&gt; and changing what doesn't enjoy rough =
evaluation team consensus.&nbsp; Note </FONT>
<BR><FONT SIZE=3D2>&gt; that I haven't seen anything circulating on the =
IPFIX mailing lists </FONT>
<BR><FONT SIZE=3D2>&gt; over the past few days. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I'm not familiar with the I-D publication =
procedure.&nbsp; If you think it </FONT>
<BR><FONT SIZE=3D2>&gt; would make sense to publish my document in the =
I-D repository for </FONT>
<BR><FONT SIZE=3D2>&gt; reference, I certainly won't mind if someone =
puts it there. </FONT>
<BR><FONT SIZE=3D2>&gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; Simon. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C2744C.0AAB8B8A--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 16 03:34:00 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA21161
	for <ipfix-archive@lists.ietf.org>; Wed, 16 Oct 2002 03:34:00 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181iXD-0003Hu-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 16 Oct 2002 02:24:03 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181iXB-0003HB-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 16 Oct 2002 02:24:01 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9G7NRIn012829;
	Wed, 16 Oct 2002 00:23:27 -0700 (PDT)
Date: Wed, 16 Oct 2002 00:23:27 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Simon Leinen <simon@limmat.switch.ch>
cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
In-Reply-To: <15782.316.24510.824822@celeste.switch.ch>
Message-ID: <Pine.GSO.4.44.0210160020380.3182-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Some minor comments

4.6.6.  Notification on Specific Events (6.6)

   In NetFlow v9, Option Data FlowSets are defined to convey information
   about the metering and export processes.  But the current draft
   specifies that Option Data should be exported periodically, so they
   aren't directly applicable for asynchronous events.  However they
   would be if the restriction to periodical reporting were relaxed.

- Config changes are reported asynchronously with Netflow V9. Periodicity
is relaxed for special events

regards
-vamsi



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 16 14:29:35 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA08350
	for <ipfix-archive@lists.ietf.org>; Wed, 16 Oct 2002 14:29:35 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181sMS-0007Hy-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 16 Oct 2002 12:53:36 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181sMP-0007H0-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 16 Oct 2002 12:53:33 -0500
Received: from riverstonenet.com ([134.141.180.71]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Wed, 16 Oct 2002 09:31:19 -0700
Message-ID: <3DAD93E2.1ED20572@riverstonenet.com>
Date: Wed, 16 Oct 2002 12:29:22 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
References: <15782.316.24510.824822@celeste.switch.ch>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 16 Oct 2002 16:31:20.0451 (UTC) FILETIME=[75790D30:01C27531]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Nice job overall!

Here are the points where there is some misunderstanding
regarding LFAP...

	1) The FAR/FUN reporting is and implementation concern.
	   The amount of storage needed per flow was too high to
	   send all the data at flow expiration time.

	    NOTE - LFAP can support reporting all information in	
  		   one message by simply modifying the spec
		   to allow usage attributes to be placed in
		   the FAR message (i.e. a wording change only) 

		   The Other protocols will have a much harder time
		   supporting split information reporting. I think
		   this is an important point.


        2) The encoding using the multi-record obtains nearly all
           the bandwidth savings of templates without the loss
           of debugability.

        3) The number of messages increased AFTER we decided to
           become an accounting only protocol. The messages were
           added to simplify implementation which leads to more
	   reliable implementations by various parties. We could have done 
           it with 4 messages FAR/FUN/AR/ARA. Most of the new messages
came
	   from reviewing the AR commands. There are no messages leftover 
	   from the admission version of the protocol.

	4) I agree that reliability requirement hasn't yet been satisfactorily
	   defined in the requirements draft. Therefore, I think it is
	   difficult to evaluate protocols in this realm. Furthermore,
	   the question of reliability at what cost needs to be understood.
	   For example, storing data which has not been ACKed is expensive
	   and limited (i.e. you can't consume all the memory on the device).

	5) The "Regular Reporting Interval" also needs to be viewed from
	   an efficiency perspective. Repeating all the attributes with
	   each update is expensive. 

	6) LFAP failover was discussed on the list in a response to a 
	   question raised by Reinaldo.

Paul

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 16 16:38:05 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA11571
	for <ipfix-archive@lists.ietf.org>; Wed, 16 Oct 2002 16:38:04 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181ujD-00049o-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 16 Oct 2002 15:25:15 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181uj8-00048S-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 16 Oct 2002 15:25:10 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9GKOce10343
	for <ipfix-eval@net.doit.wisc.edu>; Wed, 16 Oct 2002 13:24:38 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7TDW6>; Wed, 16 Oct 2002 13:24:37 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C044486A5@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Let's not get into this slippery slope
Date: Wed, 16 Oct 2002 13:24:37 -0700
Importance: high
X-Priority: 1
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27552.0C2660C8"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27552.0C2660C8
Content-Type: text/plain;
	charset="iso-8859-1"

Hello,

I saw this message in MIDCOM WG and since we are using kind of the same
procedures to evaluate protocols I thought it would be interesting to get
this perspective. I kind of share Jiri's concerns that we might be here
years later still debating which protocol is best in the main ipfix list...

I'm less worried about the simplicity factor since I think most candidates
are simple (with the exception of Diameter). Some are more simple than
others but in the end it's just a few (sometime optional) messages back and
forth.

No, I do not have any proposals at this time on a different evaluation
method or how to avoid this (possible) problem...

-----Original Message----- 
From: Jiri Kuthan [mailto:jiri.kuthan@fokus.fraunhofer.de] 
Sent: 16 October 2002 14:36 
To: Juergen Quittek; midcom@ietf.org 
Subject: Re: [midcom] Protocol selection procedure 



At 11:06 AM 10/16/2002, Juergen Quittek wrote: 
>Hi all, 
> 
>Maybe I'm too impatient, but I want to get an idea how we are 
>going to select the midcom protocol. 
> 
>We have our requirements, we have an almost completed evaluation 
>of five protocols, and we are getting towards an idea of the 
>semantics of the protocol. This is apparently sufficient preparation 
>for starting to think about the decision process. 
> 
>Unfortunately, the evaluation did not identify a clearly superior 
>candidate, but found that there are several ones that are suited. 

I actually think this protocol shopping is a bug in strategy. With 
some effort very many protocols may be tweaked to make requirements 
happy, each having some cons and prons. The result seems questionnable 
-- after two years of advocating why one's pet better than someone else's, 
we may easily end up with a suboptimal protocol. I would not be surprised 
to see too big complexity, because of reusing a protocol for too many 
purposes. 

I saw few simple proposals on the table and would prefer going ahead with 
them. Simplicity is good and actually should be boldly stated as R0. 

-Jiri 

------_=_NextPart_001_01C27552.0C2660C8
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>Let's not get into this slippery slope</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hello,</FONT>
</P>

<P><FONT SIZE=3D2>I saw this message in MIDCOM WG and since we are =
using kind of the same procedures to evaluate protocols I thought it =
would be interesting to get this perspective. I kind of share Jiri's =
concerns that we might be here years later still debating which =
protocol is best in the main ipfix list...</FONT></P>

<P><FONT SIZE=3D2>I'm less worried about the simplicity factor since I =
think most candidates are simple (with the exception of Diameter). Some =
are more simple than others but in the end it's just a few (sometime =
optional) messages back and forth.</FONT></P>

<P><FONT SIZE=3D2>No, I do not have any proposals at this time on a =
different evaluation method or how to avoid this (possible) =
problem...</FONT></P>

<P><FONT SIZE=3D2>-----Original Message----- </FONT>
<BR><FONT SIZE=3D2>From: Jiri Kuthan [<A =
HREF=3D"mailto:jiri.kuthan@fokus.fraunhofer.de">mailto:jiri.kuthan@fokus=
.fraunhofer.de</A>] </FONT>
<BR><FONT SIZE=3D2>Sent: 16 October 2002 14:36 </FONT>
<BR><FONT SIZE=3D2>To: Juergen Quittek; midcom@ietf.org </FONT>
<BR><FONT SIZE=3D2>Subject: Re: [midcom] Protocol selection procedure =
</FONT>
</P>
<BR>
<BR>

<P><FONT SIZE=3D2>At 11:06 AM 10/16/2002, Juergen Quittek wrote: =
</FONT>
<BR><FONT SIZE=3D2>&gt;Hi all, </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;Maybe I'm too impatient, but I want to get an =
idea how we are </FONT>
<BR><FONT SIZE=3D2>&gt;going to select the midcom protocol. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;We have our requirements, we have an almost =
completed evaluation </FONT>
<BR><FONT SIZE=3D2>&gt;of five protocols, and we are getting towards an =
idea of the </FONT>
<BR><FONT SIZE=3D2>&gt;semantics of the protocol. This is apparently =
sufficient preparation </FONT>
<BR><FONT SIZE=3D2>&gt;for starting to think about the decision =
process. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;Unfortunately, the evaluation did not identify a =
clearly superior </FONT>
<BR><FONT SIZE=3D2>&gt;candidate, but found that there are several ones =
that are suited. </FONT>
</P>

<P><FONT SIZE=3D2>I actually think this protocol shopping is a bug in =
strategy. With </FONT>
<BR><FONT SIZE=3D2>some effort very many protocols may be tweaked to =
make requirements </FONT>
<BR><FONT SIZE=3D2>happy, each having some cons and prons. The result =
seems questionnable </FONT>
<BR><FONT SIZE=3D2>-- after two years of advocating why one's pet =
better than someone else's, </FONT>
<BR><FONT SIZE=3D2>we may easily end up with a suboptimal protocol. I =
would not be surprised </FONT>
<BR><FONT SIZE=3D2>to see too big complexity, because of reusing a =
protocol for too many </FONT>
<BR><FONT SIZE=3D2>purposes. </FONT>
</P>

<P><FONT SIZE=3D2>I saw few simple proposals on the table and would =
prefer going ahead with </FONT>
<BR><FONT SIZE=3D2>them. Simplicity is good and actually should be =
boldly stated as R0. </FONT>
</P>

<P><FONT SIZE=3D2>-Jiri </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27552.0C2660C8--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 16 18:29:14 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA13933
	for <ipfix-archive@lists.ietf.org>; Wed, 16 Oct 2002 18:29:12 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 181wRj-0007Xy-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 16 Oct 2002 17:15:20 -0500
Received: from mgw-dax1.ext.nokia.com ([63.78.179.216])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 181wRg-0007Xp-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 16 Oct 2002 17:15:16 -0500
Received: from davir01nok.americas.nokia.com (davir01nok.americas.nokia.com [172.18.242.84])
	by mgw-dax1.ext.nokia.com (Switch-2.2.1/Switch-2.2.0) with ESMTP id g9GMFsx18548
	for <ipfix-eval@net.doit.wisc.edu>; Wed, 16 Oct 2002 17:15:54 -0500 (CDT)
Received: from daebh001.NOE.Nokia.com (unverified) by davir01nok.americas.nokia.com
 (Content Technologies SMTPRS 4.2.5) with ESMTP id <T5dfa9c6b45ac12f254079@davir01nok.americas.nokia.com> for <ipfix-eval@net.doit.wisc.edu>;
 Wed, 16 Oct 2002 17:15:13 -0500
Received: from bsebe001.NOE.Nokia.com ([172.19.160.13]) by daebh001.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.5329);
	 Wed, 16 Oct 2002 15:15:13 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.0.6249.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----_=_NextPart_001_01C27561.7F3188EF"
Subject: [ipfix-eval] Gopal's evaluation draft contribution
Date: Wed, 16 Oct 2002 18:15:12 -0400
Message-ID: <DC504E9C3384054C8506D3E6BB0124607AE460@bsebe001.americas.nokia.com>
X-MS-Has-Attach: yes
Thread-Topic: [ipfix-eval] Simon's evaluation draft contribution
Thread-Index: AcJwr/deOiA93C+WR2mx3vG+ceBgMgEsQv1Q
From: <ram.gopal@nokia.com>
To: <ipfix-eval@net.doit.wisc.edu>
X-OriginalArrivalTime: 16 Oct 2002 22:15:13.0437 (UTC) FILETIME=[7FB0DCD0:01C27561]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This is a multi-part message in MIME format.

------_=_NextPart_001_01C27561.7F3188EF
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Greetings,

Please find the individual evaluation of IPFIX protocol candidates. I =
used the templates prepared=20
by J. Quittek and thank for his work it saves lot of time.

Feel free to comment on this material.=20


Thanks and Regards
Ram Gopal. L =20

------_=_NextPart_001_01C27561.7F3188EF
Content-Type: text/plain;
	name="draft-gopal-ipfix-eval-00.txt"
Content-Description: draft-gopal-ipfix-eval-00.txt
Content-Disposition: attachment;
	filename="draft-gopal-ipfix-eval-00.txt"
Content-Transfer-Encoding: base64
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------_=_NextPart_001_01C27561.7F3188EF--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 17 02:56:30 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA02492
	for <ipfix-archive@lists.ietf.org>; Thu, 17 Oct 2002 02:56:30 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1824Rs-0005Qj-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 17 Oct 2002 01:48:00 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1824Rr-0005Px-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 17 Oct 2002 01:47:59 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9H6lOIn021180;
	Wed, 16 Oct 2002 23:47:24 -0700 (PDT)
Date: Wed, 16 Oct 2002 23:47:24 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Tal Givoly <givoly@xacct.com>
cc: simon@limmat.switch.ch, <ipfix-eval@net.doit.wisc.edu>,
        Peter Ludemann <peter.ludemann@xacct.com>
Subject: RE: Re: [ipfix-eval] Simon's evaluation draft contribution
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
Message-ID: <Pine.GSO.4.44.0210162333250.4606-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Tal,
  Please see inline

Regarding NetFlow v9. I don't believe that adding reliability is a simple
thing based on our extensive experience hardening NetFlow-based solutions
and analyzing their reliability.

vamsi>CRANE has done a good job in addressing drawbacks of earlier netflow
versions w.r.t reliability. Hopefully this experience will help us to
comeup with a good solution.

 Today, the naive assumption is that this
would be done based on some distributed voting algorithm. Those aware of
the
domain of distributed voting must realize that a majority vote would
require
3 redundant collectors. Other more computationally complex and less
reliable
voting methods can settle for less redundancy, but these introduce
compromise.

vamsi> I guess link level fail over can be addressed by transport
protocols like SCTP (may be multi-homing). For server(collector)
redundancy we can look at RSERPOOL.

 First of all, NetFlow currently offers only two. Performing
back-end de-duplication may require persistence of all records and
detailed comparison. Basically, adding reliability mechanisms over NetFlow
v9 offsets the benefit of having a simple protocol.

vamsi> Sure, it depends on how simple are the extensions related to
reliability.

thanks
-vamsi

 The network/service element can
export data at a higher rate, but there is excessive cost at the receiving
end. This is not required by LFAP, CRANE, DIAMETER or IPDR to achieve
higher
levels of reliability.



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 17 09:21:09 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA09909
	for <ipfix-archive@lists.ietf.org>; Thu, 17 Oct 2002 09:21:08 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 182ADJ-0001fw-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 17 Oct 2002 07:57:21 -0500
Received: from ctron-dnm.enterasys.com ([12.25.1.120] ident=firewall-user)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 182ADH-0001fp-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 17 Oct 2002 07:57:19 -0500
Received: (from uucp@localhost)
	by ctron-dnm.enterasys.com (8.8.7/8.8.7) id JAA17624
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 17 Oct 2002 09:09:05 -0400 (EDT)
Received: from unknown(134.141.77.96) by ctron-dnm.enterasys.com via smap (4.1)
	id xma017603; Thu, 17 Oct 02 09:08:42 -0400
Received: by cnc-exc1.enterasys.com with Internet Mail Service (5.5.2653.19)
	id <VBYMK3WH>; Thu, 17 Oct 2002 08:51:25 -0400
Message-ID: <6D745637A7E0F94DA070743C55CDA9BA075851@NHROCMBX1.ets.enterasys.com>
From: "Harrington, David" <dbh@enterasys.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Let's not get into this slippery slope
Date: Thu, 17 Oct 2002 08:57:03 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C275DC.B0775332"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C275DC.B0775332
Content-Type: text/plain;
	charset="iso-8859-1"

I recommend that if there are multiple protocols that meet most
requirements, and that the requirements which are not met are not
show-stoppers, so it is difficult to select a protocol based on technical
comparisons, then the tie should be broken by looking at the likelihood of
acceptance in the marketplace.
 
Given two technically comparable candidates, we should consider the
likelihood that vendors will ship the protocol in their devices and that
vendors' customers will deploy the functionality in their networks.
 
It doesn't matter what the IETF says is a standard if nobody uses it. The
market is the most important decider of industry standards.
 
Some words of wisdom from the SNMPv3 co-chair.
dbh
---
David Harrington           
dbh@enterasys.com          
co-chair, IETF SNMPv3 WG


-----Original Message-----
From: Reinaldo Penno [mailto:rpenno@nortelnetworks.com]
Sent: Wednesday, October 16, 2002 4:25 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Let's not get into this slippery slope
Importance: High



Hello, 

I saw this message in MIDCOM WG and since we are using kind of the same
procedures to evaluate protocols I thought it would be interesting to get
this perspective. I kind of share Jiri's concerns that we might be here
years later still debating which protocol is best in the main ipfix list...

I'm less worried about the simplicity factor since I think most candidates
are simple (with the exception of Diameter). Some are more simple than
others but in the end it's just a few (sometime optional) messages back and
forth.

No, I do not have any proposals at this time on a different evaluation
method or how to avoid this (possible) problem...

-----Original Message----- 
From: Jiri Kuthan [ mailto:jiri.kuthan@fokus.fraunhofer.de
<mailto:jiri.kuthan@fokus.fraunhofer.de> ] 
Sent: 16 October 2002 14:36 
To: Juergen Quittek; midcom@ietf.org 
Subject: Re: [midcom] Protocol selection procedure 



At 11:06 AM 10/16/2002, Juergen Quittek wrote: 
>Hi all, 
> 
>Maybe I'm too impatient, but I want to get an idea how we are 
>going to select the midcom protocol. 
> 
>We have our requirements, we have an almost completed evaluation 
>of five protocols, and we are getting towards an idea of the 
>semantics of the protocol. This is apparently sufficient preparation 
>for starting to think about the decision process. 
> 
>Unfortunately, the evaluation did not identify a clearly superior 
>candidate, but found that there are several ones that are suited. 

I actually think this protocol shopping is a bug in strategy. With 
some effort very many protocols may be tweaked to make requirements 
happy, each having some cons and prons. The result seems questionnable 
-- after two years of advocating why one's pet better than someone else's, 
we may easily end up with a suboptimal protocol. I would not be surprised 
to see too big complexity, because of reusing a protocol for too many 
purposes. 

I saw few simple proposals on the table and would prefer going ahead with 
them. Simplicity is good and actually should be boldly stated as R0. 

-Jiri 


------_=_NextPart_001_01C275DC.B0775332
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<TITLE>Let's not get into this slippery slope</TITLE>

<META content=3D"MSHTML 6.00.2716.2200" name=3DGENERATOR></HEAD>
<BODY>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff size=3D2>I=20
recommend that if there are multiple protocols that meet most =
requirements, and=20
that the requirements which are not met are not show-stoppers, so it is =

difficult to select a protocol based on technical comparisons, then the =
tie=20
should be broken by looking at the likelihood of acceptance in the=20
marketplace.</FONT></SPAN></DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff size=3D2>Given=20
two technically comparable candidates, we should consider the =
likelihood that=20
vendors will ship the protocol in their devices and that vendors' =
customers will=20
deploy the functionality in their networks.</FONT></SPAN></DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff size=3D2>It=20
doesn't matter what the IETF says is a standard if nobody uses it. The =
market is=20
the most important decider of industry standards.</FONT></SPAN></DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff size=3D2>Some=20
words of wisdom from the SNMPv3 co-chair.</FONT></SPAN></DIV>
<DIV><SPAN class=3D692055212-17102002><FONT face=3DArial =
color=3D#0000ff=20
size=3D2>dbh</FONT></SPAN></DIV>
<DIV><SPAN class=3D692055212-17102002>
<P><FONT size=3D2>---<BR>David=20
Harrington&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;<BR>dbh@enterasys.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;<BR>co-chair,=20
IETF SNMPv3 WG<BR></FONT></P></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px =
solid; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader dir=3Dltr align=3Dleft><FONT =
face=3DTahoma=20
  size=3D2>-----Original Message-----<BR><B>From:</B> Reinaldo Penno=20
  [mailto:rpenno@nortelnetworks.com]<BR><B>Sent:</B> Wednesday, October =
16, 2002=20
  4:25 PM<BR><B>To:</B> ipfix-eval@net.doit.wisc.edu<BR><B>Subject:</B> =

  [ipfix-eval] Let's not get into this slippery =
slope<BR><B>Importance:</B>=20
  High<BR><BR></FONT></DIV>
  <P><FONT size=3D2>Hello,</FONT> </P>
  <P><FONT size=3D2>I saw this message in MIDCOM WG and since we are =
using kind of=20
  the same procedures to evaluate protocols I thought it would be =
interesting to=20
  get this perspective. I kind of share Jiri's concerns that we might =
be here=20
  years later still debating which protocol is best in the main ipfix=20
  list...</FONT></P>
  <P><FONT size=3D2>I'm less worried about the simplicity factor since =
I think=20
  most candidates are simple (with the exception of Diameter). Some are =
more=20
  simple than others but in the end it's just a few (sometime optional) =
messages=20
  back and forth.</FONT></P>
  <P><FONT size=3D2>No, I do not have any proposals at this time on a =
different=20
  evaluation method or how to avoid this (possible) =
problem...</FONT></P>
  <P><FONT size=3D2>-----Original Message----- </FONT><BR><FONT =
size=3D2>From: Jiri=20
  Kuthan [<A=20
  =
href=3D"mailto:jiri.kuthan@fokus.fraunhofer.de">mailto:jiri.kuthan@fokus=
.fraunhofer.de</A>]=20
  </FONT><BR><FONT size=3D2>Sent: 16 October 2002 14:36 =
</FONT><BR><FONT=20
  size=3D2>To: Juergen Quittek; midcom@ietf.org </FONT><BR><FONT =
size=3D2>Subject:=20
  Re: [midcom] Protocol selection procedure </FONT></P><BR><BR>
  <P><FONT size=3D2>At 11:06 AM 10/16/2002, Juergen Quittek wrote:=20
  </FONT><BR><FONT size=3D2>&gt;Hi all, </FONT><BR><FONT size=3D2>&gt;=20
  </FONT><BR><FONT size=3D2>&gt;Maybe I'm too impatient, but I want to =
get an idea=20
  how we are </FONT><BR><FONT size=3D2>&gt;going to select the midcom =
protocol.=20
  </FONT><BR><FONT size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt;We have =
our=20
  requirements, we have an almost completed evaluation </FONT><BR><FONT =

  size=3D2>&gt;of five protocols, and we are getting towards an idea of =
the=20
  </FONT><BR><FONT size=3D2>&gt;semantics of the protocol. This is =
apparently=20
  sufficient preparation </FONT><BR><FONT size=3D2>&gt;for starting to =
think about=20
  the decision process. </FONT><BR><FONT size=3D2>&gt; </FONT><BR><FONT =

  size=3D2>&gt;Unfortunately, the evaluation did not identify a clearly =
superior=20
  </FONT><BR><FONT size=3D2>&gt;candidate, but found that there are =
several ones=20
  that are suited. </FONT></P>
  <P><FONT size=3D2>I actually think this protocol shopping is a bug in =
strategy.=20
  With </FONT><BR><FONT size=3D2>some effort very many protocols may be =
tweaked to=20
  make requirements </FONT><BR><FONT size=3D2>happy, each having some =
cons and=20
  prons. The result seems questionnable </FONT><BR><FONT size=3D2>-- =
after two=20
  years of advocating why one's pet better than someone else's, =
</FONT><BR><FONT=20
  size=3D2>we may easily end up with a suboptimal protocol. I would not =
be=20
  surprised </FONT><BR><FONT size=3D2>to see too big complexity, =
because of=20
  reusing a protocol for too many </FONT><BR><FONT size=3D2>purposes. =
</FONT></P>
  <P><FONT size=3D2>I saw few simple proposals on the table and would =
prefer going=20
  ahead with </FONT><BR><FONT size=3D2>them. Simplicity is good and =
actually=20
  should be boldly stated as R0. </FONT></P>
  <P><FONT size=3D2>-Jiri </FONT></P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C275DC.B0775332--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 17 14:05:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA20148
	for <ipfix-archive@lists.ietf.org>; Thu, 17 Oct 2002 14:05:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 182EXo-0002Hs-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 17 Oct 2002 12:34:48 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 182EXn-0002Hb-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 17 Oct 2002 12:34:47 -0500
Received: (qmail 19522 invoked from network); 17 Oct 2002 17:34:36 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 17 Oct 2002 17:34:35 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9HHbxu00772;
	Thu, 17 Oct 2002 10:37:59 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <calato@riverstonenet.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;    broadcast vs reliable
Date: Thu, 17 Oct 2002 10:34:37 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNIEAPDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
In-Reply-To: <3DA58339.DF0F38B9@riverstonenet.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul:

I'm back from vacation and ready to have my last word on this. :-)

[I wonder whether instead of a week in hotel rooms in Atlanta, we should all
book a week on a sailboat in British Columbia or New Zealand and sort out
our issues whilst cruising down the fjords ... ]

My comments interspersed near the end (thank-you for condensing this
discussion so nicely).
But to summarize them:

   - the protocol needs a unique key for each record, to allow
de-duplication.

   - the data model needs a unique key for each record, to
     allow classic database manipulations.

   - the two keys MAY be the same but in general will be different.

   - the issues of a reliable protocol and the data model are independent.

- peter


> calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40 AM:
>
>
> In order to follow one idea from start to end, here are several excerpts
> from our exchange so far...
>
> Peter:
> ------
> > I agree that we need a data model. I don't see why it should affect the
> > discussion of the export protocol.
>
> Paul
> ----
> >         If I don't have a data model, how do I evaluate whether or not
> >         message ordering is a problem?
>
> Peter
> ----
> > Maybe I missed something in all the emails, but I thought that
> > the export data was to be one record per "flow".
>
> Paul
> ----
> >         For example, with long standing flows why do I need to repeat
> >         all the flow attributes when I just want to update the byte
> >         count? I'm not advocating one position or another in this
> >         particular issue, I'm just using it to show how the data model
> >         affects the protocol.
>
> Peter
> -----
> > So, as long as the protocol allows more than one kind of record
> > to be output, this can be done. No need to duplicate data
> > unnecessarily.
>
>
>
>         Now we have a message ordering problem which needs to be
>         addressed. Either sequence numbers need to be introduced
>         into the messages or a reliable transport is needed.
>
>         If IPFIX's data model does not allow the splitting up of
>         information then then there is no ordering problem and no
>         requirement for sequence numbers or a reliable transport
>         (at least not driven by the data model).

The issues of reliable transport and sequence numbering are independent.

Putting on my database designer hat for a moment ... a classic "database
beginner's mistake" is to not have a 'primary key' for records -- that is a
unique distinguishing identifier for each record. In the case of IPFIX, an
obvious 'primary key' is the sequence number (or, in the case of CRANE, the
exporter's "boot time" + sequence number). This is needed anyway for
deduplication, so it ought to be a basic requirement.

However, the sequence number isn't a particularly good choice because it's
not "natural" for the data exported. A better choice would be a time-stamp
that fits with the data (e.g., time stamp of the last packet seen) +
information that uniquely identifies the flow (e.g., IP-port pairs + time
stamp of first packet seen). The exact nature of this unique key is
determined by the data model and should (in general) *not* be part of the
protocol.

Switching to my protocol-design hat ... even a reliable protocol can still
result in lost records; "reliable" simply means that every attempt is made
to deliver the data and if that fails you know when you've lost data [and,
with a good design, you can have some idea of how much has been lost - but,
as I mentioned in an earlier note
(http://ipfix.doit.wisc.edu/archive/1207.html -- see also
http://ipfix.doit.wisc.edu/archive/1255.html), the data model determines the
lost data information also]. If there is failure in delivering the data, a
fail-over might re-send some data that have already been received (because
the ACKs were lost), so the protocol needs unique identification of records
to allow de-duplication. It might be tempting to use the protocol's unique
identification to estimate data loss; but you'll get better results if the
data loss information is more closely tied to the data model.

>         This is not the only example of the data model imposing
>         requirements on the protocol. But if I can show one,
>         I'm hoping you'll agree that there must be others.

I hope you'll agree that the data model does not impose any additional
requirements on the protocol for this situation.

>         Paul
>
>         P.S. - you can have the last word when you get back from
>         vacation :-)

Done. :-)

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 17 16:46:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25621
	for <ipfix-archive@lists.ietf.org>; Thu, 17 Oct 2002 16:46:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 182HKt-0000sE-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 17 Oct 2002 15:33:39 -0500
Received: from [198.235.53.73] (helo=tormx2x.amdocs.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 182HKr-0000rI-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 17 Oct 2002 15:33:37 -0500
Received: from amdocs.com (tormx3 [198.235.53.43])
	by tormx2x.amdocs.com (8.10.1/8.9.3) with ESMTP id g9HKAeB16275
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 17 Oct 2002 16:10:40 -0400 (EDT)
Received: from torex1gen.corp.amdocs.com (localhost [127.0.0.1])
	by amdocs.com (8.10.2+Sun/8.9.3) with ESMTP id g9HKbaP15005
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 17 Oct 2002 16:37:36 -0400 (EDT)
Received: by torex1gen.corp.amdocs.com with Internet Mail Service (5.5.2653.19)
	id <VBP6BVHJ>; Thu, 17 Oct 2002 16:31:54 -0400
Message-ID: <1607D3EC1FCA2E4F8A078CDC2CFF880B01E11F76@torex1gen.corp.amdocs.com>
From: Mark Farmer <mark.farmer@amdocs.com>
To: "'ipfix-eval@net.doit.wisc.edu'" <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
Date: Thu, 17 Oct 2002 16:31:54 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-type: multipart/mixed; boundary="=_IS_MIME_Boundary"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

--=_IS_MIME_Boundary
Content-Type: text/plain;
	charset="iso-8859-1"

Just a quick word of support from the billing vendor community. Amdocs was a founding member of the IPDR organization and joined two years ago to contribute to the development of an open-standard for usage collection. We did this because of the proprietary record formats produced by every network element we were required to interface to which added time to integration and cost to the customer for implementations. 

The largest players in the billing vendor community have joined this organization and as of the recent compliance testing, IPDR has been implemented in the products of vendors representing 90% of the billing market place with also a majority of the mediation vendors certified as well. It IS the standard for billing record formats for IP services. The standard has also been implemented in a number of large telecommunications carriers and is in production today with several more coming. Until the recent 3.x specification was introduced it was not really ready for prime time. With 3.x and the use of XDR, we are satisfied that it provides compression levels over the verbose XML that satisfy performance requirements along with the extensive benefits of structure and extensibility that Jeff Meyer has already mentioned. 

We are very interested in being able to move IPDR from it's current file based protocols to a full real-time streaming model to meet requirements in pre-paid services and other business models that require immediate delivery of billing information to our systems. I would like to voice the support of our organization for adopting IPDR into the IPFIX work to leverage the adoption that has already taken place further.

Mark Farmer
Director Product Marketing
Amdocs 

http://www.amdocs.com



From: Aron Heintz (aheintz@ipdr.org <mailto:aheintz@ipdr.org?subject=RE:%20[ipfix-eval]%20Discussion%20of%20Candidate%20Protocols>)
Date: Thu Oct 10 2002 - 17:47:22 CDT 
*	Next message: Reinaldo Penno: "RE: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of C andidate Protocols - data model; broadcast vs reliable" <1268.html> 
*	Previous message: Simon Leinen: "[ipfix-eval] Simon's evaluation draft contribution" <1266.html> 
*	Maybe reply: Aron Heintz: "RE: [ipfix-eval] Discussion of Candidate Protocols" <1154.html> 
	Following are comments on openness and likelihood of adoption (some given
in relative ignorance of your technical problem domain - sorry).

	It seems to me that NDM-U wins the "free, open, and widely deployed" crown
hands down.  NDM-U 3.1 is completely free and publicly available (see
below).  By the end of this year, more than 70% of the mediation and billing
packages (by market share) will have proven NDM-U 3.1 *real-world*
interoperability.

	What could be more important than this?  It appears that some of you are
debating minor technical points when you might approach the question "Who is
going to receive the data we are sending?  How do they want to see it?"
Technologies do not win by virtue of their theoretical perfection.  The OSI
model is close to theoretical perfection.  TCP/IP is not.

	Do you want to attach yourself to a technology created, supported, and
propagated by a single vendor?  If not, narrow your field to NDM-U vs.
Diameter.  You will also find that NDM-U technology *is* close to
perfection, thanks to 40+ vendors and service provider heavyweights putting
their combined engineering talent into the design process.

	IPDR Organization is 100% open to any entity (person or corporation) who
wishes to participate.  In three years, 60+ vendors have chosen to do so,
representing most of the packages you might send IPFIX records to.  Members
requested the legal structure of a non-profit with an IPR-membership
agreement for two purposes:

	a) Provide a safe environment for technical exchange. Engineers can lay
down competitive concerns to be completely open and unconcerned with IPR and
legal impediments.  IPR checks can safely happen after the engineering
collaboration occurs, so there is no development time is lost to a-priori
legal queries.
	b) To harness members' financial contributions towards more rapid progress.

	All members confirm that the IPR they contribute is free and clear of
obligations for the Organization and therefore available for free public
distribution.  The exact IPR agreement can be found on the IPDR web site,
but highlights include:

"2.1	Subject to the provisions of Section 5 of this Agreement, upon
contribution of a Contributed Document to the Group, Member hereby grants to
the Group, the other Members and the public, a worldwide, irrevocable,
non-exclusive, royalty free license to the Contributed Document, to use,
copy, execute, reproduce, modify, translate, prepare derivative works in the
Group's name based upon all or any portion thereof, disclose, distribute,
(other than for profit), and otherwise deal with such Contributed Document.

9.1	Either Party may terminate the Agreement without cause. Upon such
termination, Member shall continue to perform in accordance with the
Agreement to the extent that Member has: (1) relinquished any or all of its
rights, including without limitation any and all patent rights; and (2)
granted the Group, the public domain or others, any rights under the
Agreement, including without limitation, any and all licenses."

	As a result of this structure, IPDR Members have made incredible progress
in three years, include multiple revisions and finally a mature version of a
specification that has been *proven* by interoperability amongst a dozen
packages.  I challenge you to find another (business systems) standard that
has gone from conception to widespread *industrial* practice so fast.

	IPDR Organization is completely commited to open flow of information.  The
top two value statements confirmed by the Board are: 1 - Focus direction
through consensus 2 - Open gathering of ideas and information.

	Jeff Meyer, as Chair of the Protocols Working group, has my highest
confidence in representing NDM-U 3.1 as a technology.  NDM-U 3.1 and all
associated IPR has been released to the public for royalty-free use and
redistribution.  David (below) mentions the need to submit IPR forms - I can
have those processed as necessary. I would expect any additional work that
is done within IPFIX and extends NDM-U 3.1 to be subject to the normal IETF
rules and restrictions.

Aron Heintz
President, IPDR Organization


-----Original Message-----
From: Jeff Meyer [mailto:jeffm@cup.hp.com <mailto:jeffm@cup.hp.com?subject=RE:%20[ipfix-eval]%20Discussion%20of%20Candidate%20Protocols>]
Sent: Friday, October 04, 2002 19:12
To: Harrington, David; ipfix-eval@net.doit.wisc.edu <mailto:ipfix-eval@net.doit.wisc.edu?subject=RE:%20[ipfix-eval]%20Discussion%20of%20Candidate%20Protocols>; Aron Heintz
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols


David,

   I believe the legal agreement signed by IPDR members
passes the rights to IPDR itself.  IPDR's board has
approved this submission activity.

   I'll forward this onto the IPDR President for further
clarification.

-- Jeff

....snip

end


--=_IS_MIME_Boundary
Content-Type: text/plain;charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-------------------------------------------------------------------------------------

The information contained in this message is proprietary of Amdocs,
protected from disclosure, and may be privileged.
The information is intended to be conveyed only to the designated recipient(s)
of the message. If the reader of this message is not the intended recipient,
you are hereby notified that any dissemination, use, distribution or copying of 
this communication is strictly prohibited and may be unlawful. 
If you have received this communication in error, please notify us immediately
by replying to the message and deleting it from your computer.
Thank you.

-------------------------------------------------------------------------------------

--=_IS_MIME_Boundary--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 17 17:11:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA26218
	for <ipfix-archive@lists.ietf.org>; Thu, 17 Oct 2002 17:11:22 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 182HmS-0001hA-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 17 Oct 2002 16:02:08 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 182HmQ-0001g4-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 17 Oct 2002 16:02:06 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9HL1C604975;
	Thu, 17 Oct 2002 14:01:13 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <TWX7TPL3>; Thu, 17 Oct 2002 14:01:12 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04449065@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: "Harrington, David" <dbh@enterasys.com>, ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Let's not get into this slippery slope
Date: Thu, 17 Oct 2002 14:01:11 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27620.52CBC152"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27620.52CBC152
Content-Type: text/plain;
	charset="iso-8859-1"

Hello David,

-----Original Message-----
From: Harrington, David [mailto:dbh@enterasys.com]
Sent: Thursday, October 17, 2002 5:57 AM
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Let's not get into this slippery slope


I recommend that if there are multiple protocols that meet most
requirements, and that the requirements which are not met are not
show-stoppers, so it is difficult to select a protocol based on technical
comparisons, then the tie should be broken by looking at the likelihood of
acceptance in the marketplace.
 
Given two technically comparable candidates, we should consider the
likelihood that vendors will ship the protocol in their devices and that
vendors' customers will deploy the functionality in their networks. 
 
well, the vendors might put anything in their devices. IPfix alone, as a
self contained entity, is just a way of exporting IP information and saving
it on some storage. One important piece should be the willingness of
application vendors to build things based on the data available through the
protocol. Because in the end what customers want is the traffic profiling
reports, intrusion detection alarms, mediation to other systems, etc, etc. 
 
I also miss service providers on this list. 
 
It doesn't matter what the IETF says is a standard if nobody uses it. The
market is the most important decider of industry standards. 
 
agree, I'm assuming the market in the IPfix case is (vendors of hardware+
application vendors + ISPs.). 
 
Some words of wisdom from the SNMPv3 co-chair.
dbh
---
David Harrington           
dbh@enterasys.com          
co-chair, IETF SNMPv3 WG


-----Original Message-----
From: Reinaldo Penno [mailto:rpenno@nortelnetworks.com]
Sent: Wednesday, October 16, 2002 4:25 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Let's not get into this slippery slope
Importance: High



Hello, 

I saw this message in MIDCOM WG and since we are using kind of the same
procedures to evaluate protocols I thought it would be interesting to get
this perspective. I kind of share Jiri's concerns that we might be here
years later still debating which protocol is best in the main ipfix list...

I'm less worried about the simplicity factor since I think most candidates
are simple (with the exception of Diameter). Some are more simple than
others but in the end it's just a few (sometime optional) messages back and
forth.

No, I do not have any proposals at this time on a different evaluation
method or how to avoid this (possible) problem...

-----Original Message----- 
From: Jiri Kuthan [ mailto:jiri.kuthan@fokus.fraunhofer.de
<mailto:jiri.kuthan@fokus.fraunhofer.de> ] 
Sent: 16 October 2002 14:36 
To: Juergen Quittek; midcom@ietf.org 
Subject: Re: [midcom] Protocol selection procedure 



At 11:06 AM 10/16/2002, Juergen Quittek wrote: 
>Hi all, 
> 
>Maybe I'm too impatient, but I want to get an idea how we are 
>going to select the midcom protocol. 
> 
>We have our requirements, we have an almost completed evaluation 
>of five protocols, and we are getting towards an idea of the 
>semantics of the protocol. This is apparently sufficient preparation 
>for starting to think about the decision process. 
> 
>Unfortunately, the evaluation did not identify a clearly superior 
>candidate, but found that there are several ones that are suited. 

I actually think this protocol shopping is a bug in strategy. With 
some effort very many protocols may be tweaked to make requirements 
happy, each having some cons and prons. The result seems questionnable 
-- after two years of advocating why one's pet better than someone else's, 
we may easily end up with a suboptimal protocol. I would not be surprised 
to see too big complexity, because of reusing a protocol for too many 
purposes. 

I saw few simple proposals on the table and would prefer going ahead with 
them. Simplicity is good and actually should be boldly stated as R0. 

-Jiri 


------_=_NextPart_001_01C27620.52CBC152
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>Let's not get into this slippery slope</TITLE>

<META content="MSHTML 5.50.4916.2300" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial color=#800000 size=2><SPAN class=074055320-17102002>Hello 
David,</SPAN></FONT></DIV>
<BLOCKQUOTE dir=ltr 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Harrington, David 
  [mailto:dbh@enterasys.com]<BR><B>Sent:</B> Thursday, October 17, 2002 5:57 
  AM<BR><B>To:</B> ipfix-eval@net.doit.wisc.edu<BR><B>Subject:</B> RE: 
  [ipfix-eval] Let's not get into this slippery slope<BR><BR></FONT></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial color=#0000ff size=2>I 
  recommend that if there are multiple protocols that meet most requirements, 
  and that the requirements which are not met are not show-stoppers, so it is 
  difficult to select a protocol based on technical comparisons, then the tie 
  should be broken by looking at the likelihood of acceptance in the 
  marketplace.</FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#0000ff><FONT 
  size=2>Given two technically comparable candidates, we should consider the 
  likelihood that vendors will ship the protocol in their devices and that 
  vendors' customers will deploy the functionality in their networks.<SPAN 
  class=074055320-17102002>&nbsp;</SPAN></FONT></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#0000ff><FONT 
  size=2><SPAN 
  class=074055320-17102002></SPAN></FONT></FONT></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#800000 
  size=2><SPAN class=074055320-17102002>well, the vendors might put anything in 
  their devices. IPfix alone, as a self contained entity, is just a way of 
  exporting IP information and saving it on some storage.&nbsp;One important 
  piece should be the willingness of application vendors to build things based 
  on the data available through the protocol. Because in the end 
  what&nbsp;customers want is the&nbsp;traffic profiling reports, intrusion 
  detection alarms, mediation to other systems, etc, etc. 
  </SPAN></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#800000 
  size=2><SPAN class=074055320-17102002></SPAN></FONT></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#800000 
  size=2><SPAN class=074055320-17102002>I also miss service providers on this 
  list. </SPAN></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#800000 
  size=2><SPAN class=074055320-17102002></SPAN></FONT></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#0000ff><FONT 
  size=2>It doesn't matter what the IETF says is a standard if nobody uses it. 
  The market is the most important decider of industry standards.<SPAN 
  class=074055320-17102002>&nbsp;</SPAN></FONT></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#0000ff><FONT 
  size=2><SPAN 
  class=074055320-17102002></SPAN></FONT></FONT></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial><FONT color=#800000 
  size=2><SPAN class=074055320-17102002>agree, I'm assuming the market in the 
  IPfix case&nbsp;is (vendors of hardware+&nbsp;application vendors + ISPs.). 
  </SPAN></FONT></FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial color=#0000ff 
  size=2></FONT></SPAN>&nbsp;</DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial color=#0000ff size=2>Some 
  words of wisdom from the SNMPv3 co-chair.</FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002><FONT face=Arial color=#0000ff 
  size=2>dbh</FONT></SPAN></DIV>
  <DIV><SPAN class=692055212-17102002>
  <P><FONT size=2>---<BR>David 
  Harrington&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<BR>dbh@enterasys.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<BR>co-chair, 
  IETF SNMPv3 WG<BR></FONT></P></SPAN></DIV>
  <BLOCKQUOTE dir=ltr 
  style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
    <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
    size=2>-----Original Message-----<BR><B>From:</B> Reinaldo Penno 
    [mailto:rpenno@nortelnetworks.com]<BR><B>Sent:</B> Wednesday, October 16, 
    2002 4:25 PM<BR><B>To:</B> ipfix-eval@net.doit.wisc.edu<BR><B>Subject:</B> 
    [ipfix-eval] Let's not get into this slippery slope<BR><B>Importance:</B> 
    High<BR><BR></FONT></DIV>
    <P><FONT size=2>Hello,</FONT> </P>
    <P><FONT size=2>I saw this message in MIDCOM WG and since we are using kind 
    of the same procedures to evaluate protocols I thought it would be 
    interesting to get this perspective. I kind of share Jiri's concerns that we 
    might be here years later still debating which protocol is best in the main 
    ipfix list...</FONT></P>
    <P><FONT size=2>I'm less worried about the simplicity factor since I think 
    most candidates are simple (with the exception of Diameter). Some are more 
    simple than others but in the end it's just a few (sometime optional) 
    messages back and forth.</FONT></P>
    <P><FONT size=2>No, I do not have any proposals at this time on a different 
    evaluation method or how to avoid this (possible) problem...</FONT></P>
    <P><FONT size=2>-----Original Message----- </FONT><BR><FONT size=2>From: 
    Jiri Kuthan [<A 
    href="mailto:jiri.kuthan@fokus.fraunhofer.de">mailto:jiri.kuthan@fokus.fraunhofer.de</A>] 
    </FONT><BR><FONT size=2>Sent: 16 October 2002 14:36 </FONT><BR><FONT 
    size=2>To: Juergen Quittek; midcom@ietf.org </FONT><BR><FONT size=2>Subject: 
    Re: [midcom] Protocol selection procedure </FONT></P><BR><BR>
    <P><FONT size=2>At 11:06 AM 10/16/2002, Juergen Quittek wrote: 
    </FONT><BR><FONT size=2>&gt;Hi all, </FONT><BR><FONT size=2>&gt; 
    </FONT><BR><FONT size=2>&gt;Maybe I'm too impatient, but I want to get an 
    idea how we are </FONT><BR><FONT size=2>&gt;going to select the midcom 
    protocol. </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt;We have 
    our requirements, we have an almost completed evaluation </FONT><BR><FONT 
    size=2>&gt;of five protocols, and we are getting towards an idea of the 
    </FONT><BR><FONT size=2>&gt;semantics of the protocol. This is apparently 
    sufficient preparation </FONT><BR><FONT size=2>&gt;for starting to think 
    about the decision process. </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT 
    size=2>&gt;Unfortunately, the evaluation did not identify a clearly superior 
    </FONT><BR><FONT size=2>&gt;candidate, but found that there are several ones 
    that are suited. </FONT></P>
    <P><FONT size=2>I actually think this protocol shopping is a bug in 
    strategy. With </FONT><BR><FONT size=2>some effort very many protocols may 
    be tweaked to make requirements </FONT><BR><FONT size=2>happy, each having 
    some cons and prons. The result seems questionnable </FONT><BR><FONT 
    size=2>-- after two years of advocating why one's pet better than someone 
    else's, </FONT><BR><FONT size=2>we may easily end up with a suboptimal 
    protocol. I would not be surprised </FONT><BR><FONT size=2>to see too big 
    complexity, because of reusing a protocol for too many </FONT><BR><FONT 
    size=2>purposes. </FONT></P>
    <P><FONT size=2>I saw few simple proposals on the table and would prefer 
    going ahead with </FONT><BR><FONT size=2>them. Simplicity is good and 
    actually should be boldly stated as R0. </FONT></P>
    <P><FONT size=2>-Jiri </FONT></P></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C27620.52CBC152--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 17 17:59:48 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27453
	for <ipfix-archive@lists.ietf.org>; Thu, 17 Oct 2002 17:59:48 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 182IWp-00031n-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 17 Oct 2002 16:50:03 -0500
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 182IWn-00030a-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 17 Oct 2002 16:50:02 -0500
Received: from cisco.com (bclaise-isdn-home3.cisco.com [10.49.4.220])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9HLnN713108;
	Thu, 17 Oct 2002 23:49:24 +0200 (CEST)
Message-ID: <3DAF3063.3050904@cisco.com>
Date: Thu, 17 Oct 2002 23:49:23 +0200
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Mark Farmer <mark.farmer@amdocs.com>
CC: "'ipfix-eval@net.doit.wisc.edu'" <ipfix-eval@net.doit.wisc.edu>
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <1607D3EC1FCA2E4F8A078CDC2CFF880B01E11F76@torex1gen.corp.amdocs.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Mark,

>Just a quick word of support from the billing vendor community. Amdocs was a founding member of the IPDR organization and joined two years ago to contribute to the development of an open-standard for usage collection. We did this because of the proprietary record formats produced by every network element we were required to interface to which added time to integration and cost to the customer for implementations. 
>
>The largest players in the billing vendor community have joined this organization and as of the recent compliance testing, IPDR has been implemented in the products of vendors representing 90% of the billing market place with also a majority of the mediation vendors certified as well. It IS the standard for billing record formats for IP services. 
>
Maybe between the mediation device(s)  and billing application(s)!
But on how many Network Element vendors is it deployed today?
This remarks relates to David Harrington's comment (and the follow up 
from Reinaldo): "Given two technically comparable candidates, we should 
consider the likelihood that vendors will ship the protocol in their 
devices and that vendors' customers will deploy the functionality in 
their networks." 

As a side note, billing is just one aspsect of IPFIX

Regards, Benoit.

>The standard has also been implemented in a number of large telecommunications carriers and is in production today with several more coming. Until the recent 3.x specification was introduced it was not really ready for prime time. With 3.x and the use of XDR, we are satisfied that it provides compression levels over the verbose XML that satisfy performance requirements along with the extensive benefits of structure and extensibility that Jeff Meyer has already mentioned. 
>
>We are very interested in being able to move IPDR from it's current file based protocols to a full real-time streaming model to meet requirements in pre-paid services and other business models that require immediate delivery of billing information to our systems. I would like to voice the support of our organization for adopting IPDR into the IPFIX work to leverage the adoption that has already taken place further.
>
>Mark Farmer
>Director Product Marketing
>Amdocs 
>
>http://www.amdocs.com
>
>
>
>From: Aron Heintz (aheintz@ipdr.org <mailto:aheintz@ipdr.org?subject=RE:%20[ipfix-eval]%20Discussion%20of%20Candidate%20Protocols>)
>Date: Thu Oct 10 2002 - 17:47:22 CDT 
>*	Next message: Reinaldo Penno: "RE: Variable Length Fields : was RE: [ipfix-eval] RE: Discussion of C andidate Protocols - data model; broadcast vs reliable" <1268.html> 
>*	Previous message: Simon Leinen: "[ipfix-eval] Simon's evaluation draft contribution" <1266.html> 
>*	Maybe reply: Aron Heintz: "RE: [ipfix-eval] Discussion of Candidate Protocols" <1154.html> 
>	Following are comments on openness and likelihood of adoption (some given
>in relative ignorance of your technical problem domain - sorry).
>
>	It seems to me that NDM-U wins the "free, open, and widely deployed" crown
>hands down.  NDM-U 3.1 is completely free and publicly available (see
>below).  By the end of this year, more than 70% of the mediation and billing
>packages (by market share) will have proven NDM-U 3.1 *real-world*
>interoperability.
>
>	What could be more important than this?  It appears that some of you are
>debating minor technical points when you might approach the question "Who is
>going to receive the data we are sending?  How do they want to see it?"
>Technologies do not win by virtue of their theoretical perfection.  The OSI
>model is close to theoretical perfection.  TCP/IP is not.
>
>	Do you want to attach yourself to a technology created, supported, and
>propagated by a single vendor?  If not, narrow your field to NDM-U vs.
>Diameter.  You will also find that NDM-U technology *is* close to
>perfection, thanks to 40+ vendors and service provider heavyweights putting
>their combined engineering talent into the design process.
>
>	IPDR Organization is 100% open to any entity (person or corporation) who
>wishes to participate.  In three years, 60+ vendors have chosen to do so,
>representing most of the packages you might send IPFIX records to.  Members
>requested the legal structure of a non-profit with an IPR-membership
>agreement for two purposes:
>
>	a) Provide a safe environment for technical exchange. Engineers can lay
>down competitive concerns to be completely open and unconcerned with IPR and
>legal impediments.  IPR checks can safely happen after the engineering
>collaboration occurs, so there is no development time is lost to a-priori
>legal queries.
>	b) To harness members' financial contributions towards more rapid progress.
>
>	All members confirm that the IPR they contribute is free and clear of
>obligations for the Organization and therefore available for free public
>distribution.  The exact IPR agreement can be found on the IPDR web site,
>but highlights include:
>
>"2.1	Subject to the provisions of Section 5 of this Agreement, upon
>contribution of a Contributed Document to the Group, Member hereby grants to
>the Group, the other Members and the public, a worldwide, irrevocable,
>non-exclusive, royalty free license to the Contributed Document, to use,
>copy, execute, reproduce, modify, translate, prepare derivative works in the
>Group's name based upon all or any portion thereof, disclose, distribute,
>(other than for profit), and otherwise deal with such Contributed Document.
>
>9.1	Either Party may terminate the Agreement without cause. Upon such
>termination, Member shall continue to perform in accordance with the
>Agreement to the extent that Member has: (1) relinquished any or all of its
>rights, including without limitation any and all patent rights; and (2)
>granted the Group, the public domain or others, any rights under the
>Agreement, including without limitation, any and all licenses."
>
>	As a result of this structure, IPDR Members have made incredible progress
>in three years, include multiple revisions and finally a mature version of a
>specification that has been *proven* by interoperability amongst a dozen
>packages.  I challenge you to find another (business systems) standard that
>has gone from conception to widespread *industrial* practice so fast.
>
>	IPDR Organization is completely commited to open flow of information.  The
>top two value statements confirmed by the Board are: 1 - Focus direction
>through consensus 2 - Open gathering of ideas and information.
>
>	Jeff Meyer, as Chair of the Protocols Working group, has my highest
>confidence in representing NDM-U 3.1 as a technology.  NDM-U 3.1 and all
>associated IPR has been released to the public for royalty-free use and
>redistribution.  David (below) mentions the need to submit IPR forms - I can
>have those processed as necessary. I would expect any additional work that
>is done within IPFIX and extends NDM-U 3.1 to be subject to the normal IETF
>rules and restrictions.
>
>Aron Heintz
>President, IPDR Organization
>
>
>-----Original Message-----
>From: Jeff Meyer [mailto:jeffm@cup.hp.com <mailto:jeffm@cup.hp.com?subject=RE:%20[ipfix-eval]%20Discussion%20of%20Candidate%20Protocols>]
>Sent: Friday, October 04, 2002 19:12
>To: Harrington, David; ipfix-eval@net.doit.wisc.edu <mailto:ipfix-eval@net.doit.wisc.edu?subject=RE:%20[ipfix-eval]%20Discussion%20of%20Candidate%20Protocols>; Aron Heintz
>Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
>
>
>David,
>
>   I believe the legal agreement signed by IPDR members
>passes the rights to IPDR itself.  IPDR's board has
>approved this submission activity.
>
>   I'll forward this onto the IPDR President for further
>clarification.
>
>-- Jeff
>
>....snip
>
>end
>
>  
>
>------------------------------------------------------------------------
>
>-------------------------------------------------------------------------------------
>
>The information contained in this message is proprietary of Amdocs,
>protected from disclosure, and may be privileged.
>The information is intended to be conveyed only to the designated recipient(s)
>of the message. If the reader of this message is not the intended recipient,
>you are hereby notified that any dissemination, use, distribution or copying of 
>this communication is strictly prohibited and may be unlawful. 
>If you have received this communication in error, please notify us immediately
>by replying to the message and deleting it from your computer.
>Thank you.
>
>-------------------------------------------------------------------------------------
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 18 20:10:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA13007
	for <ipfix-archive@lists.ietf.org>; Fri, 18 Oct 2002 20:10:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 182h3R-0003v8-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 18 Oct 2002 19:01:21 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 182h3P-0003uy-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 18 Oct 2002 19:01:19 -0500
Received: (qmail 31654 invoked from network); 19 Oct 2002 00:01:15 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 19 Oct 2002 00:01:15 -0000
Received: from Givoly (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9J04Yu04461;
	Fri, 18 Oct 2002 17:04:34 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Vamsidhar Valluri" <vvalluri@cisco.com>
Cc: <simon@limmat.switch.ch>, <ipfix-eval@net.doit.wisc.edu>,
        "Peter Ludemann" <peter.ludemann@xacct.com>
Subject: RE: Re: [ipfix-eval] Simon's evaluation draft contribution
Date: Fri, 18 Oct 2002 17:01:13 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEDOCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <Pine.GSO.4.44.0210162333250.4606-100000@vvalluri-u10.cisco.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Vamsi,

Please see inline:

vamsi>CRANE has done a good job in addressing drawbacks of earlier netflow
versions w.r.t reliability. Hopefully this experience will help us to
comeup with a good solution.

tal> CRANE would not have become such an efficient and reliable solution had
we not learned from our experience working with NetFlow, efficiently
processing it and hardening its usage for business-critical applications.
NetFlow definitely helped pave the way for the industry awareness to
flow-level granularity of information as well as meaningful aggregates (as
of v8). We also worked closely with Cisco on extending it to support
customer needs with features added in v8 and v9.

vamsi> I guess link level fail over can be addressed by transport
protocols like SCTP (may be multi-homing). For server(collector)
redundancy we can look at RSERPOOL.

tal> One of the problems is that the whole issue of application-level
acknowledgement must be added and actual bi-directional communication is
implied by this - something totally absent of NetFlow v9. Just adding SCTP
doesn't address the reliability requirement without more significant
modifications. Furthermore, the SCTP layer would not provide hints for
efficient de-duplication. The flow export protocol itself must be
instrumented to support efficient fault tolerance through minimal redundancy
(typically, it is more efficient if it isn't even co-located).

Furthermore, as I commented earlier, replicating the stream in any form to
multiple recipients creates one of the most expensive forms of
fault-tolerance offered by a protocol. Multiple receivers would need to
consume the data and a voting algorithm would need to be used to select the
correct result. With majority voting (or other voting algorithms), this
would require 2n+1 redundancy, i.e. 3 nodes to sustain a single failure.

For all these replicated streams, in order to avoid single-point failures,
you would need:
- separate controllers/network interfaces
- network bandwidth allocated to all receivers throughout the WAN, including
independent paths (VCs to all redundant collection units)
- computer systems running the receivers, processing full load (not just
load of a potentially failed node).
- excessive persistence at nodes and/or "thick" communication pipes between
nodes - to perform voting algorithms

This basically prevents N-M redundancy (N active nodes and M standby nodes).
For instance, using reliability methods employed in CRANE it is perfectly
feasible to have 10 distributed primary collection points with 2 regional or
centralized secondary units. If any of the primary distributed collection
points fails, data is sent to one of the 2 secondary regionally located
servers. Data can be efficiently de-duplicated between these streams.

The issue of cost-effective reliability is a major concern to carriers.
One-to-one or, as in NetFlow v9's case, One-to-two redundancy, is
unacceptable in terms of cost.

When considering the cost of a solution, the cost of software development
should also be factored in. The cost to develop NetFlow v9-based solutions
that do not include reliability are, indeed, low. However, the cost to
develop a reliable solution for NetFlow is very high due to complexity of
distributed voting algorithms and fault-tolerant on non-cooperating sensors
(which is what we have here).

Rather than make the network/service element non-cooperative to reliable
data collection, I believe IPFIX would benefit dramatically by making it
cost-effective to develop and deploy both efficient and reliable solutions.

vamsi> Sure, it depends on how simple are the extensions related to
reliability.

tal> We have several proposed protocol options here. We can either begin
with a non-reliable solution and extend it by bolting on reliability
extensions or take a solution that already has reliability designed-in. I
admit that complexity of a protocol does increase somewhat when reliability
is introduced. However, the runtime benefits are very significant (as
described above) when deploying reliable solutions. Furthermore, the impact
when the reliability is not needed is negligible on the network/service
element.

Tal

-----Original Message-----
From: Vamsidhar Valluri [mailto:vvalluri@cisco.com]
Sent: Wednesday, October 16, 2002 11:47 PM
To: Tal Givoly
Cc: simon@limmat.switch.ch; ipfix-eval@net.doit.wisc.edu; Peter Ludemann
Subject: RE: Re: [ipfix-eval] Simon's evaluation draft contribution


Tal,
  Please see inline

Regarding NetFlow v9. I don't believe that adding reliability is a simple
thing based on our extensive experience hardening NetFlow-based solutions
and analyzing their reliability.

vamsi>CRANE has done a good job in addressing drawbacks of earlier netflow
versions w.r.t reliability. Hopefully this experience will help us to
comeup with a good solution.

 Today, the naive assumption is that this
would be done based on some distributed voting algorithm. Those aware of
the
domain of distributed voting must realize that a majority vote would
require
3 redundant collectors. Other more computationally complex and less
reliable
voting methods can settle for less redundancy, but these introduce
compromise.

vamsi> I guess link level fail over can be addressed by transport
protocols like SCTP (may be multi-homing). For server(collector)
redundancy we can look at RSERPOOL.

 First of all, NetFlow currently offers only two. Performing
back-end de-duplication may require persistence of all records and
detailed comparison. Basically, adding reliability mechanisms over NetFlow
v9 offsets the benefit of having a simple protocol.

vamsi> Sure, it depends on how simple are the extensions related to
reliability.

thanks
-vamsi

 The network/service element can
export data at a higher rate, but there is excessive cost at the receiving
end. This is not required by LFAP, CRANE, DIAMETER or IPDR to achieve
higher
levels of reliability.


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 02:21:35 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA19321
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 02:21:34 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183Vl0-0005pd-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 01:09:42 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 183Vky-0005pW-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 01:09:40 -0500
Received: (qmail 2966 invoked from network); 21 Oct 2002 06:09:28 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 21 Oct 2002 06:09:28 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9L6Cxu20440
	for <ipfix-eval@net.doit.wisc.edu>; Sun, 20 Oct 2002 23:13:00 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Gopal's evaluation draft contribution
Date: Sun, 20 Oct 2002 23:09:38 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNGEDKDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Importance: Normal
In-Reply-To: <DC504E9C3384054C8506D3E6BB0124607AE460@bsebe001.americas.nokia.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

ram.gopal@nokia.com wrote Wednesday, October 16, 2002 3:15 PM in an
attachment:

>   [3.1.5. Time Synchronization (5.5)]
>
>   It my impression that by correlating server boot
>   time and client boot time each flow record may be
>   analyzed. To be clarified with the protocol authors?

The "boot time" in CRANE is intended mainly to allow deduplication when the
exporter restarts. There is no connection between any of the client or
server boot times. The exported data can, of course, contain time stamps -
how these relate to the boot time is up to the data model.

The initial connection to a data exporter has a server (collector) boot
time, but it's not clear to me how the exporter could use that to set its
own clock. Any clock information sent from the collector would either be a
rather crude mechanism or would require re-inventing NTP. [There is also the
separate issue of synchronization amongst the servers (collectors) -- again,
NTP is our solution.]

We have used standard NTP for synchronizing redundant probes with sufficient
precision to allow de-duplication (for billing purposes, the customer wanted
redundant probes). So, from our experience, synchronization is outside the
flow export protocol's scope and is best done with NTP (for the really
precision-minded, there are NTP servers that use GPS time signals; but we
haven't needed to use these).

(You'll notice a theme here: we use TCP or SCTP for transport-level
reliability, IPsec for security, NTP for time synchronization, decouple the
data model from the protocol, etc. Why re-invent wheels or have unnecessary
dependencies?)

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 10:11:37 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA29457
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 10:11:37 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183d0R-0005EQ-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 08:54:07 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 183d0P-0005Dz-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 08:54:05 -0500
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 21 Oct 2002 06:53:33 -0700
Message-ID: <3DB40667.F4355180@riverstonenet.com>
Date: Mon, 21 Oct 2002 09:51:35 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: ram.gopal@nokia.com
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Gopal's evaluation draft contribution
References: <DC504E9C3384054C8506D3E6BB0124607AE460@bsebe001.americas.nokia.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 21 Oct 2002 13:53:34.0411 (UTC) FILETIME=[3F56B9B0:01C27909]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


I expected to see some conclusions.

Paul

ram.gopal@nokia.com wrote:
> 
> Greetings,
> 
> Please find the individual evaluation of IPFIX protocol candidates. I used the templates prepared
> by J. Quittek and thank for his work it saves lot of time.
> 
> Feel free to comment on this material.
> 
> Thanks and Regards
> Ram Gopal. L
> 
>   ------------------------------------------------------------------------
>                                        Name: draft-gopal-ipfix-eval-00.txt
>    draft-gopal-ipfix-eval-00.txt       Type: Plain Text (text/plain)
>                                    Encoding: base64
>                                 Description: draft-gopal-ipfix-eval-00.txt

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 10:16:48 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA29624
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 10:16:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183dDG-0005ft-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 09:07:22 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 183dDE-0005es-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 09:07:20 -0500
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 21 Oct 2002 07:06:48 -0700
Message-ID: <3DB40982.EDF8F917@riverstonenet.com>
Date: Mon, 21 Oct 2002 10:04:50 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Re: Discussion of Candidate Protocols - data model;    broadcast vs 
 reliable
References: <AMEKJFAIEIKCBNABBMPNIEAPDIAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 21 Oct 2002 14:06:48.0968 (UTC) FILETIME=[18EE8080:01C2790B]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


You address de-duplication and data loss but some how missed
message ordering which was my only point.

If the data in the messages is independant I can process
immediately. If not, I need to know if they came in order
before I can process the message. In this case nothing
is lost and nothing is resent, the messages just arrived 
out of order.

Paul



Peter Ludemann wrote:
> 
> Paul:
> 
> I'm back from vacation and ready to have my last word on this. :-)
> 
> [I wonder whether instead of a week in hotel rooms in Atlanta, we should all
> book a week on a sailboat in British Columbia or New Zealand and sort out
> our issues whilst cruising down the fjords ... ]
> 
> My comments interspersed near the end (thank-you for condensing this
> discussion so nicely).
> But to summarize them:
> 
>    - the protocol needs a unique key for each record, to allow
> de-duplication.
> 
>    - the data model needs a unique key for each record, to
>      allow classic database manipulations.
> 
>    - the two keys MAY be the same but in general will be different.
> 
>    - the issues of a reliable protocol and the data model are independent.
> 
> - peter
> 
> > calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40 AM:
> >
> >
> > In order to follow one idea from start to end, here are several excerpts
> > from our exchange so far...
> >
> > Peter:
> > ------
> > > I agree that we need a data model. I don't see why it should affect the
> > > discussion of the export protocol.
> >
> > Paul
> > ----
> > >         If I don't have a data model, how do I evaluate whether or not
> > >         message ordering is a problem?
> >
> > Peter
> > ----
> > > Maybe I missed something in all the emails, but I thought that
> > > the export data was to be one record per "flow".
> >
> > Paul
> > ----
> > >         For example, with long standing flows why do I need to repeat
> > >         all the flow attributes when I just want to update the byte
> > >         count? I'm not advocating one position or another in this
> > >         particular issue, I'm just using it to show how the data model
> > >         affects the protocol.
> >
> > Peter
> > -----
> > > So, as long as the protocol allows more than one kind of record
> > > to be output, this can be done. No need to duplicate data
> > > unnecessarily.
> >
> >
> >
> >         Now we have a message ordering problem which needs to be
> >         addressed. Either sequence numbers need to be introduced
> >         into the messages or a reliable transport is needed.
> >
> >         If IPFIX's data model does not allow the splitting up of
> >         information then then there is no ordering problem and no
> >         requirement for sequence numbers or a reliable transport
> >         (at least not driven by the data model).
> 
> The issues of reliable transport and sequence numbering are independent.
> 
> Putting on my database designer hat for a moment ... a classic "database
> beginner's mistake" is to not have a 'primary key' for records -- that is a
> unique distinguishing identifier for each record. In the case of IPFIX, an
> obvious 'primary key' is the sequence number (or, in the case of CRANE, the
> exporter's "boot time" + sequence number). This is needed anyway for
> deduplication, so it ought to be a basic requirement.
> 
> However, the sequence number isn't a particularly good choice because it's
> not "natural" for the data exported. A better choice would be a time-stamp
> that fits with the data (e.g., time stamp of the last packet seen) +
> information that uniquely identifies the flow (e.g., IP-port pairs + time
> stamp of first packet seen). The exact nature of this unique key is
> determined by the data model and should (in general) *not* be part of the
> protocol.
> 
> Switching to my protocol-design hat ... even a reliable protocol can still
> result in lost records; "reliable" simply means that every attempt is made
> to deliver the data and if that fails you know when you've lost data [and,
> with a good design, you can have some idea of how much has been lost - but,
> as I mentioned in an earlier note
> (http://ipfix.doit.wisc.edu/archive/1207.html -- see also
> http://ipfix.doit.wisc.edu/archive/1255.html), the data model determines the
> lost data information also]. If there is failure in delivering the data, a
> fail-over might re-send some data that have already been received (because
> the ACKs were lost), so the protocol needs unique identification of records
> to allow de-duplication. It might be tempting to use the protocol's unique
> identification to estimate data loss; but you'll get better results if the
> data loss information is more closely tied to the data model.
> 
> >         This is not the only example of the data model imposing
> >         requirements on the protocol. But if I can show one,
> >         I'm hoping you'll agree that there must be others.
> 
> I hope you'll agree that the data model does not impose any additional
> requirements on the protocol for this situation.
> 
> >         Paul
> >
> >         P.S. - you can have the last word when you get back from
> >         vacation :-)
> 
> Done. :-)
> 
> - peter

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 10:30:22 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA00546
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 10:30:21 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183dPz-000654-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 09:20:31 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 183dPx-00064w-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 09:20:29 -0500
Received: (qmail 1099 invoked from network); 21 Oct 2002 14:20:27 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 21 Oct 2002 14:20:27 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9LENmu28460;
	Mon, 21 Oct 2002 07:23:48 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Cc: <calato@riverstonenet.com>
Subject: [ipfix-eval] RE: Discussion of Candidate Protocols - data model;    broadcast vs  reliable
Date: Mon, 21 Oct 2002 07:20:25 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNCEDPDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Importance: Normal
In-Reply-To: <3DB40982.EDF8F917@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote Monday, October 21, 2002 7:05 AM:

> You address de-duplication and data loss but some how missed
> message ordering which was my only point.
>
> If the data in the messages is independant I can process
> immediately. If not, I need to know if they came in order
> before I can process the message. In this case nothing
> is lost and nothing is resent, the messages just arrived
> out of order.

Because TCP or SCTP is used, the data will arrive in exported order (with
possible duplicates).

However, just because the data arrive in order doesn't mean that the
exporter produces them in order. (With our PacketSight probe, the flows can
be exported every "n" minutes, whether they are finished or still active --
the order of export is determined by hash tables in the probe because
sorting into order would be too expensive; further sorting may be needed
downstream to combine multiple partial records for a long flow).

To order the flow data, it is necessary to have some kind of sequence data
in the exported records. This is just part of the data model (you'll need it
in the database) ... for PacketSight, we use the nanosecond timestamp of the
first packet for the flow but you might want to use something different
[this is still not an absolute guarantee of ordering: if two probes are
reading the same data they might order two flows differently because of
microsecond non-determinacy in the handling of packets in the two separate
NIC drivers].

Again, this ordering information doesn't require anything special from the
protocol; it's all in the data model.

- peter

> Paul
>
>
>
> Peter Ludemann wrote:
> >
> > Paul:
> >
> > I'm back from vacation and ready to have my last word on this. :-)
> >
> > [I wonder whether instead of a week in hotel rooms in Atlanta,
> we should all
> > book a week on a sailboat in British Columbia or New Zealand
> and sort out
> > our issues whilst cruising down the fjords ... ]
> >
> > My comments interspersed near the end (thank-you for condensing this
> > discussion so nicely).
> > But to summarize them:
> >
> >    - the protocol needs a unique key for each record, to allow
> > de-duplication.
> >
> >    - the data model needs a unique key for each record, to
> >      allow classic database manipulations.
> >
> >    - the two keys MAY be the same but in general will be different.
> >
> >    - the issues of a reliable protocol and the data model are
> independent.
> >
> > - peter
> >
> > > calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40 AM:
> > >
> > >
> > > In order to follow one idea from start to end, here are
> several excerpts
> > > from our exchange so far...
> > >
> > > Peter:
> > > ------
> > > > I agree that we need a data model. I don't see why it
> should affect the
> > > > discussion of the export protocol.
> > >
> > > Paul
> > > ----
> > > >         If I don't have a data model, how do I evaluate
> whether or not
> > > >         message ordering is a problem?
> > >
> > > Peter
> > > ----
> > > > Maybe I missed something in all the emails, but I thought that
> > > > the export data was to be one record per "flow".
> > >
> > > Paul
> > > ----
> > > >         For example, with long standing flows why do I need
> to repeat
> > > >         all the flow attributes when I just want to update the byte
> > > >         count? I'm not advocating one position or another in this
> > > >         particular issue, I'm just using it to show how the
> data model
> > > >         affects the protocol.
> > >
> > > Peter
> > > -----
> > > > So, as long as the protocol allows more than one kind of record
> > > > to be output, this can be done. No need to duplicate data
> > > > unnecessarily.
> > >
> > >
> > >
> > >         Now we have a message ordering problem which needs to be
> > >         addressed. Either sequence numbers need to be introduced
> > >         into the messages or a reliable transport is needed.
> > >
> > >         If IPFIX's data model does not allow the splitting up of
> > >         information then then there is no ordering problem and no
> > >         requirement for sequence numbers or a reliable transport
> > >         (at least not driven by the data model).
> >
> > The issues of reliable transport and sequence numbering are independent.
> >
> > Putting on my database designer hat for a moment ... a classic "database
> > beginner's mistake" is to not have a 'primary key' for records
> -- that is a
> > unique distinguishing identifier for each record. In the case
> of IPFIX, an
> > obvious 'primary key' is the sequence number (or, in the case
> of CRANE, the
> > exporter's "boot time" + sequence number). This is needed anyway for
> > deduplication, so it ought to be a basic requirement.
> >
> > However, the sequence number isn't a particularly good choice
> because it's
> > not "natural" for the data exported. A better choice would be a
> time-stamp
> > that fits with the data (e.g., time stamp of the last packet seen) +
> > information that uniquely identifies the flow (e.g., IP-port
> pairs + time
> > stamp of first packet seen). The exact nature of this unique key is
> > determined by the data model and should (in general) *not* be
> part of the
> > protocol.
> >
> > Switching to my protocol-design hat ... even a reliable
> protocol can still
> > result in lost records; "reliable" simply means that every
> attempt is made
> > to deliver the data and if that fails you know when you've lost
> data [and,
> > with a good design, you can have some idea of how much has been
> lost - but,
> > as I mentioned in an earlier note
> > (http://ipfix.doit.wisc.edu/archive/1207.html -- see also
> > http://ipfix.doit.wisc.edu/archive/1255.html), the data model
> determines the
> > lost data information also]. If there is failure in delivering
> the data, a
> > fail-over might re-send some data that have already been
> received (because
> > the ACKs were lost), so the protocol needs unique
> identification of records
> > to allow de-duplication. It might be tempting to use the
> protocol's unique
> > identification to estimate data loss; but you'll get better
> results if the
> > data loss information is more closely tied to the data model.
> >
> > >         This is not the only example of the data model imposing
> > >         requirements on the protocol. But if I can show one,
> > >         I'm hoping you'll agree that there must be others.
> >
> > I hope you'll agree that the data model does not impose any additional
> > requirements on the protocol for this situation.
> >
> > >         Paul
> > >
> > >         P.S. - you can have the last word when you get back from
> > >         vacation :-)
> >
> > Done. :-)
> >
> > - peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 11:22:45 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA02648
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 11:22:45 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183eCg-0007WU-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 10:10:50 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 183eCe-0007VU-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 10:10:48 -0500
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 21 Oct 2002 08:10:15 -0700
Message-ID: <3DB41860.8E889F3C@riverstonenet.com>
Date: Mon, 21 Oct 2002 11:08:16 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Re: Discussion of Candidate Protocols - data model;    broadcast vs  
 reliable
References: <AMEKJFAIEIKCBNABBMPNCEDPDIAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 21 Oct 2002 15:10:16.0025 (UTC) FILETIME=[F61D4C90:01C27913]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


So you do require something of the protocol to solve this problem!

Paul

Peter Ludemann wrote:
> 
> calato@riverstonenet.com wrote Monday, October 21, 2002 7:05 AM:
> 
> > You address de-duplication and data loss but some how missed
> > message ordering which was my only point.
> >
> > If the data in the messages is independant I can process
> > immediately. If not, I need to know if they came in order
> > before I can process the message. In this case nothing
> > is lost and nothing is resent, the messages just arrived
> > out of order.
> 
> Because TCP or SCTP is used, the data will arrive in exported order (with
> possible duplicates).
> 
> However, just because the data arrive in order doesn't mean that the
> exporter produces them in order. (With our PacketSight probe, the flows can
> be exported every "n" minutes, whether they are finished or still active --
> the order of export is determined by hash tables in the probe because
> sorting into order would be too expensive; further sorting may be needed
> downstream to combine multiple partial records for a long flow).
> 
> To order the flow data, it is necessary to have some kind of sequence data
> in the exported records. This is just part of the data model (you'll need it
> in the database) ... for PacketSight, we use the nanosecond timestamp of the
> first packet for the flow but you might want to use something different
> [this is still not an absolute guarantee of ordering: if two probes are
> reading the same data they might order two flows differently because of
> microsecond non-determinacy in the handling of packets in the two separate
> NIC drivers].
> 
> Again, this ordering information doesn't require anything special from the
> protocol; it's all in the data model.
> 
> - peter
> 
> > Paul
> >
> >
> >
> > Peter Ludemann wrote:
> > >
> > > Paul:
> > >
> > > I'm back from vacation and ready to have my last word on this. :-)
> > >
> > > [I wonder whether instead of a week in hotel rooms in Atlanta,
> > we should all
> > > book a week on a sailboat in British Columbia or New Zealand
> > and sort out
> > > our issues whilst cruising down the fjords ... ]
> > >
> > > My comments interspersed near the end (thank-you for condensing this
> > > discussion so nicely).
> > > But to summarize them:
> > >
> > >    - the protocol needs a unique key for each record, to allow
> > > de-duplication.
> > >
> > >    - the data model needs a unique key for each record, to
> > >      allow classic database manipulations.
> > >
> > >    - the two keys MAY be the same but in general will be different.
> > >
> > >    - the issues of a reliable protocol and the data model are
> > independent.
> > >
> > > - peter
> > >
> > > > calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40 AM:
> > > >
> > > >
> > > > In order to follow one idea from start to end, here are
> > several excerpts
> > > > from our exchange so far...
> > > >
> > > > Peter:
> > > > ------
> > > > > I agree that we need a data model. I don't see why it
> > should affect the
> > > > > discussion of the export protocol.
> > > >
> > > > Paul
> > > > ----
> > > > >         If I don't have a data model, how do I evaluate
> > whether or not
> > > > >         message ordering is a problem?
> > > >
> > > > Peter
> > > > ----
> > > > > Maybe I missed something in all the emails, but I thought that
> > > > > the export data was to be one record per "flow".
> > > >
> > > > Paul
> > > > ----
> > > > >         For example, with long standing flows why do I need
> > to repeat
> > > > >         all the flow attributes when I just want to update the byte
> > > > >         count? I'm not advocating one position or another in this
> > > > >         particular issue, I'm just using it to show how the
> > data model
> > > > >         affects the protocol.
> > > >
> > > > Peter
> > > > -----
> > > > > So, as long as the protocol allows more than one kind of record
> > > > > to be output, this can be done. No need to duplicate data
> > > > > unnecessarily.
> > > >
> > > >
> > > >
> > > >         Now we have a message ordering problem which needs to be
> > > >         addressed. Either sequence numbers need to be introduced
> > > >         into the messages or a reliable transport is needed.
> > > >
> > > >         If IPFIX's data model does not allow the splitting up of
> > > >         information then then there is no ordering problem and no
> > > >         requirement for sequence numbers or a reliable transport
> > > >         (at least not driven by the data model).
> > >
> > > The issues of reliable transport and sequence numbering are independent.
> > >
> > > Putting on my database designer hat for a moment ... a classic "database
> > > beginner's mistake" is to not have a 'primary key' for records
> > -- that is a
> > > unique distinguishing identifier for each record. In the case
> > of IPFIX, an
> > > obvious 'primary key' is the sequence number (or, in the case
> > of CRANE, the
> > > exporter's "boot time" + sequence number). This is needed anyway for
> > > deduplication, so it ought to be a basic requirement.
> > >
> > > However, the sequence number isn't a particularly good choice
> > because it's
> > > not "natural" for the data exported. A better choice would be a
> > time-stamp
> > > that fits with the data (e.g., time stamp of the last packet seen) +
> > > information that uniquely identifies the flow (e.g., IP-port
> > pairs + time
> > > stamp of first packet seen). The exact nature of this unique key is
> > > determined by the data model and should (in general) *not* be
> > part of the
> > > protocol.
> > >
> > > Switching to my protocol-design hat ... even a reliable
> > protocol can still
> > > result in lost records; "reliable" simply means that every
> > attempt is made
> > > to deliver the data and if that fails you know when you've lost
> > data [and,
> > > with a good design, you can have some idea of how much has been
> > lost - but,
> > > as I mentioned in an earlier note
> > > (http://ipfix.doit.wisc.edu/archive/1207.html -- see also
> > > http://ipfix.doit.wisc.edu/archive/1255.html), the data model
> > determines the
> > > lost data information also]. If there is failure in delivering
> > the data, a
> > > fail-over might re-send some data that have already been
> > received (because
> > > the ACKs were lost), so the protocol needs unique
> > identification of records
> > > to allow de-duplication. It might be tempting to use the
> > protocol's unique
> > > identification to estimate data loss; but you'll get better
> > results if the
> > > data loss information is more closely tied to the data model.
> > >
> > > >         This is not the only example of the data model imposing
> > > >         requirements on the protocol. But if I can show one,
> > > >         I'm hoping you'll agree that there must be others.
> > >
> > > I hope you'll agree that the data model does not impose any additional
> > > requirements on the protocol for this situation.
> > >
> > > >         Paul
> > > >
> > > >         P.S. - you can have the last word when you get back from
> > > >         vacation :-)
> > >
> > > Done. :-)
> > >
> > > - peter

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 12:02:53 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA04013
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 12:02:53 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183elA-0000kD-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 10:46:28 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 183el8-0000k7-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 10:46:26 -0500
Received: (qmail 7042 invoked from network); 21 Oct 2002 15:46:24 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 21 Oct 2002 15:46:24 -0000
Received: from peter ([192.168.254.171])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9LFnfu30397;
	Mon, 21 Oct 2002 08:49:42 -0700
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Cc: <calato@riverstonenet.com>
Subject: RE: [ipfix-eval] Re: Discussion of Candidate Protocols - data model;    broadcast vs   reliable
Date: Mon, 21 Oct 2002 08:46:19 -0700
Message-ID: <AMEKJFAIEIKCBNABBMPNKEEBDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Importance: Normal
In-Reply-To: <3DB41860.8E889F3C@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

calato@riverstonenet.com wrote Monday, October 21, 2002 8:08 AM:

> So you do require something of the protocol to solve this problem!
>
> Paul

In the sense that the protocol must be reliable, allow deduplication, and
support for certain data types: yes. In the sense that the protocol needs to
be know something of the data model: no.

In my view, the order of arrival of records is not very important because
the records will probably have to be deduplicated, reordered, and aggregated
anyway [but they should at least be "almost" in order, to make the
deduplication and reordering easier]; but the order of data is important in
the sense that if data spans packets then the packets must be received in
order (as with TCP or SCTP but not UDP) -- and this is especially important
with variable-length data (e.g., URLs).

Having said that, CRANE does ensure that the records arrive in the order
that they were sent; and it relies on the sequence numbering of the records
to verify that the protocol is working correctly. Downstream deduplication
can take advantage of this ... but it's not part of the data model as such.

- peter

> Peter Ludemann wrote:
> >
> > calato@riverstonenet.com wrote Monday, October 21, 2002 7:05 AM:
> >
> > > You address de-duplication and data loss but some how missed
> > > message ordering which was my only point.
> > >
> > > If the data in the messages is independant I can process
> > > immediately. If not, I need to know if they came in order
> > > before I can process the message. In this case nothing
> > > is lost and nothing is resent, the messages just arrived
> > > out of order.
> >
> > Because TCP or SCTP is used, the data will arrive in exported
> order (with
> > possible duplicates).
> >
> > However, just because the data arrive in order doesn't mean that the
> > exporter produces them in order. (With our PacketSight probe,
> the flows can
> > be exported every "n" minutes, whether they are finished or
> still active --
> > the order of export is determined by hash tables in the probe because
> > sorting into order would be too expensive; further sorting may be needed
> > downstream to combine multiple partial records for a long flow).
> >
> > To order the flow data, it is necessary to have some kind of
> sequence data
> > in the exported records. This is just part of the data model
> (you'll need it
> > in the database) ... for PacketSight, we use the nanosecond
> timestamp of the
> > first packet for the flow but you might want to use something different
> > [this is still not an absolute guarantee of ordering: if two probes are
> > reading the same data they might order two flows differently because of
> > microsecond non-determinacy in the handling of packets in the
> two separate
> > NIC drivers].
> >
> > Again, this ordering information doesn't require anything
> special from the
> > protocol; it's all in the data model.
> >
> > - peter
> >
> > > Paul
> > >
> > >
> > >
> > > Peter Ludemann wrote:
> > > >
> > > > Paul:
> > > >
> > > > I'm back from vacation and ready to have my last word on this. :-)
> > > >
> > > > [I wonder whether instead of a week in hotel rooms in Atlanta,
> > > we should all
> > > > book a week on a sailboat in British Columbia or New Zealand
> > > and sort out
> > > > our issues whilst cruising down the fjords ... ]
> > > >
> > > > My comments interspersed near the end (thank-you for condensing this
> > > > discussion so nicely).
> > > > But to summarize them:
> > > >
> > > >    - the protocol needs a unique key for each record, to allow
> > > > de-duplication.
> > > >
> > > >    - the data model needs a unique key for each record, to
> > > >      allow classic database manipulations.
> > > >
> > > >    - the two keys MAY be the same but in general will be different.
> > > >
> > > >    - the issues of a reliable protocol and the data model are
> > > independent.
> > > >
> > > > - peter
> > > >
> > > > > calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40 AM:
> > > > >
> > > > >
> > > > > In order to follow one idea from start to end, here are
> > > several excerpts
> > > > > from our exchange so far...
> > > > >
> > > > > Peter:
> > > > > ------
> > > > > > I agree that we need a data model. I don't see why it
> > > should affect the
> > > > > > discussion of the export protocol.
> > > > >
> > > > > Paul
> > > > > ----
> > > > > >         If I don't have a data model, how do I evaluate
> > > whether or not
> > > > > >         message ordering is a problem?
> > > > >
> > > > > Peter
> > > > > ----
> > > > > > Maybe I missed something in all the emails, but I thought that
> > > > > > the export data was to be one record per "flow".
> > > > >
> > > > > Paul
> > > > > ----
> > > > > >         For example, with long standing flows why do I need
> > > to repeat
> > > > > >         all the flow attributes when I just want to
> update the byte
> > > > > >         count? I'm not advocating one position or
> another in this
> > > > > >         particular issue, I'm just using it to show how the
> > > data model
> > > > > >         affects the protocol.
> > > > >
> > > > > Peter
> > > > > -----
> > > > > > So, as long as the protocol allows more than one kind of record
> > > > > > to be output, this can be done. No need to duplicate data
> > > > > > unnecessarily.
> > > > >
> > > > >
> > > > >
> > > > >         Now we have a message ordering problem which needs to be
> > > > >         addressed. Either sequence numbers need to be introduced
> > > > >         into the messages or a reliable transport is needed.
> > > > >
> > > > >         If IPFIX's data model does not allow the splitting up of
> > > > >         information then then there is no ordering problem and no
> > > > >         requirement for sequence numbers or a reliable transport
> > > > >         (at least not driven by the data model).
> > > >
> > > > The issues of reliable transport and sequence numbering are
> independent.
> > > >
> > > > Putting on my database designer hat for a moment ... a
> classic "database
> > > > beginner's mistake" is to not have a 'primary key' for records
> > > -- that is a
> > > > unique distinguishing identifier for each record. In the case
> > > of IPFIX, an
> > > > obvious 'primary key' is the sequence number (or, in the case
> > > of CRANE, the
> > > > exporter's "boot time" + sequence number). This is needed anyway for
> > > > deduplication, so it ought to be a basic requirement.
> > > >
> > > > However, the sequence number isn't a particularly good choice
> > > because it's
> > > > not "natural" for the data exported. A better choice would be a
> > > time-stamp
> > > > that fits with the data (e.g., time stamp of the last packet seen) +
> > > > information that uniquely identifies the flow (e.g., IP-port
> > > pairs + time
> > > > stamp of first packet seen). The exact nature of this unique key is
> > > > determined by the data model and should (in general) *not* be
> > > part of the
> > > > protocol.
> > > >
> > > > Switching to my protocol-design hat ... even a reliable
> > > protocol can still
> > > > result in lost records; "reliable" simply means that every
> > > attempt is made
> > > > to deliver the data and if that fails you know when you've lost
> > > data [and,
> > > > with a good design, you can have some idea of how much has been
> > > lost - but,
> > > > as I mentioned in an earlier note
> > > > (http://ipfix.doit.wisc.edu/archive/1207.html -- see also
> > > > http://ipfix.doit.wisc.edu/archive/1255.html), the data model
> > > determines the
> > > > lost data information also]. If there is failure in delivering
> > > the data, a
> > > > fail-over might re-send some data that have already been
> > > received (because
> > > > the ACKs were lost), so the protocol needs unique
> > > identification of records
> > > > to allow de-duplication. It might be tempting to use the
> > > protocol's unique
> > > > identification to estimate data loss; but you'll get better
> > > results if the
> > > > data loss information is more closely tied to the data model.
> > > >
> > > > >         This is not the only example of the data model imposing
> > > > >         requirements on the protocol. But if I can show one,
> > > > >         I'm hoping you'll agree that there must be others.
> > > >
> > > > I hope you'll agree that the data model does not impose any
> additional
> > > > requirements on the protocol for this situation.
> > > >
> > > > >         Paul
> > > > >
> > > > >         P.S. - you can have the last word when you get back from
> > > > >         vacation :-)
> > > >
> > > > Done. :-)
> > > >
> > > > - peter
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 12:13:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA04504
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 12:13:14 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183f4G-0001Ml-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 11:06:12 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 183f4E-0001M0-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 11:06:10 -0500
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 21 Oct 2002 09:05:35 -0700
Message-ID: <3DB42559.FC7C4DDB@riverstonenet.com>
Date: Mon, 21 Oct 2002 12:03:37 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Peter Ludemann <peter.ludemann@xacct.com>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Re: Discussion of Candidate Protocols - data model;    
 broadcast vs   reliable
References: <AMEKJFAIEIKCBNABBMPNKEEBDIAA.peter.ludemann@xacct.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 21 Oct 2002 16:05:36.0208 (UTC) FILETIME=[B1190500:01C2791B]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


The fact that you meet the requirement does not change the
fact that the data model created the requirement. If the
data model spans messages, the ordering problem is a requirement
on the protocol.

I've tried to narrow the discussion down to one simple example to
show the connection between the data model and protocol requirements.

I've either succeeded or failed. In either case I've said enough.

Paul


Peter Ludemann wrote:
> 
> calato@riverstonenet.com wrote Monday, October 21, 2002 8:08 AM:
> 
> > So you do require something of the protocol to solve this problem!
> >
> > Paul
> 
> In the sense that the protocol must be reliable, allow deduplication, and
> support for certain data types: yes. In the sense that the protocol needs to
> be know something of the data model: no.
> 
> In my view, the order of arrival of records is not very important because
> the records will probably have to be deduplicated, reordered, and aggregated
> anyway [but they should at least be "almost" in order, to make the
> deduplication and reordering easier]; but the order of data is important in
> the sense that if data spans packets then the packets must be received in
> order (as with TCP or SCTP but not UDP) -- and this is especially important
> with variable-length data (e.g., URLs).
> 
> Having said that, CRANE does ensure that the records arrive in the order
> that they were sent; and it relies on the sequence numbering of the records
> to verify that the protocol is working correctly. Downstream deduplication
> can take advantage of this ... but it's not part of the data model as such.
> 
> - peter
> 
> > Peter Ludemann wrote:
> > >
> > > calato@riverstonenet.com wrote Monday, October 21, 2002 7:05 AM:
> > >
> > > > You address de-duplication and data loss but some how missed
> > > > message ordering which was my only point.
> > > >
> > > > If the data in the messages is independant I can process
> > > > immediately. If not, I need to know if they came in order
> > > > before I can process the message. In this case nothing
> > > > is lost and nothing is resent, the messages just arrived
> > > > out of order.
> > >
> > > Because TCP or SCTP is used, the data will arrive in exported
> > order (with
> > > possible duplicates).
> > >
> > > However, just because the data arrive in order doesn't mean that the
> > > exporter produces them in order. (With our PacketSight probe,
> > the flows can
> > > be exported every "n" minutes, whether they are finished or
> > still active --
> > > the order of export is determined by hash tables in the probe because
> > > sorting into order would be too expensive; further sorting may be needed
> > > downstream to combine multiple partial records for a long flow).
> > >
> > > To order the flow data, it is necessary to have some kind of
> > sequence data
> > > in the exported records. This is just part of the data model
> > (you'll need it
> > > in the database) ... for PacketSight, we use the nanosecond
> > timestamp of the
> > > first packet for the flow but you might want to use something different
> > > [this is still not an absolute guarantee of ordering: if two probes are
> > > reading the same data they might order two flows differently because of
> > > microsecond non-determinacy in the handling of packets in the
> > two separate
> > > NIC drivers].
> > >
> > > Again, this ordering information doesn't require anything
> > special from the
> > > protocol; it's all in the data model.
> > >
> > > - peter
> > >
> > > > Paul
> > > >
> > > >
> > > >
> > > > Peter Ludemann wrote:
> > > > >
> > > > > Paul:
> > > > >
> > > > > I'm back from vacation and ready to have my last word on this. :-)
> > > > >
> > > > > [I wonder whether instead of a week in hotel rooms in Atlanta,
> > > > we should all
> > > > > book a week on a sailboat in British Columbia or New Zealand
> > > > and sort out
> > > > > our issues whilst cruising down the fjords ... ]
> > > > >
> > > > > My comments interspersed near the end (thank-you for condensing this
> > > > > discussion so nicely).
> > > > > But to summarize them:
> > > > >
> > > > >    - the protocol needs a unique key for each record, to allow
> > > > > de-duplication.
> > > > >
> > > > >    - the data model needs a unique key for each record, to
> > > > >      allow classic database manipulations.
> > > > >
> > > > >    - the two keys MAY be the same but in general will be different.
> > > > >
> > > > >    - the issues of a reliable protocol and the data model are
> > > > independent.
> > > > >
> > > > > - peter
> > > > >
> > > > > > calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40 AM:
> > > > > >
> > > > > >
> > > > > > In order to follow one idea from start to end, here are
> > > > several excerpts
> > > > > > from our exchange so far...
> > > > > >
> > > > > > Peter:
> > > > > > ------
> > > > > > > I agree that we need a data model. I don't see why it
> > > > should affect the
> > > > > > > discussion of the export protocol.
> > > > > >
> > > > > > Paul
> > > > > > ----
> > > > > > >         If I don't have a data model, how do I evaluate
> > > > whether or not
> > > > > > >         message ordering is a problem?
> > > > > >
> > > > > > Peter
> > > > > > ----
> > > > > > > Maybe I missed something in all the emails, but I thought that
> > > > > > > the export data was to be one record per "flow".
> > > > > >
> > > > > > Paul
> > > > > > ----
> > > > > > >         For example, with long standing flows why do I need
> > > > to repeat
> > > > > > >         all the flow attributes when I just want to
> > update the byte
> > > > > > >         count? I'm not advocating one position or
> > another in this
> > > > > > >         particular issue, I'm just using it to show how the
> > > > data model
> > > > > > >         affects the protocol.
> > > > > >
> > > > > > Peter
> > > > > > -----
> > > > > > > So, as long as the protocol allows more than one kind of record
> > > > > > > to be output, this can be done. No need to duplicate data
> > > > > > > unnecessarily.
> > > > > >
> > > > > >
> > > > > >
> > > > > >         Now we have a message ordering problem which needs to be
> > > > > >         addressed. Either sequence numbers need to be introduced
> > > > > >         into the messages or a reliable transport is needed.
> > > > > >
> > > > > >         If IPFIX's data model does not allow the splitting up of
> > > > > >         information then then there is no ordering problem and no
> > > > > >         requirement for sequence numbers or a reliable transport
> > > > > >         (at least not driven by the data model).
> > > > >
> > > > > The issues of reliable transport and sequence numbering are
> > independent.
> > > > >
> > > > > Putting on my database designer hat for a moment ... a
> > classic "database
> > > > > beginner's mistake" is to not have a 'primary key' for records
> > > > -- that is a
> > > > > unique distinguishing identifier for each record. In the case
> > > > of IPFIX, an
> > > > > obvious 'primary key' is the sequence number (or, in the case
> > > > of CRANE, the
> > > > > exporter's "boot time" + sequence number). This is needed anyway for
> > > > > deduplication, so it ought to be a basic requirement.
> > > > >
> > > > > However, the sequence number isn't a particularly good choice
> > > > because it's
> > > > > not "natural" for the data exported. A better choice would be a
> > > > time-stamp
> > > > > that fits with the data (e.g., time stamp of the last packet seen) +
> > > > > information that uniquely identifies the flow (e.g., IP-port
> > > > pairs + time
> > > > > stamp of first packet seen). The exact nature of this unique key is
> > > > > determined by the data model and should (in general) *not* be
> > > > part of the
> > > > > protocol.
> > > > >
> > > > > Switching to my protocol-design hat ... even a reliable
> > > > protocol can still
> > > > > result in lost records; "reliable" simply means that every
> > > > attempt is made
> > > > > to deliver the data and if that fails you know when you've lost
> > > > data [and,
> > > > > with a good design, you can have some idea of how much has been
> > > > lost - but,
> > > > > as I mentioned in an earlier note
> > > > > (http://ipfix.doit.wisc.edu/archive/1207.html -- see also
> > > > > http://ipfix.doit.wisc.edu/archive/1255.html), the data model
> > > > determines the
> > > > > lost data information also]. If there is failure in delivering
> > > > the data, a
> > > > > fail-over might re-send some data that have already been
> > > > received (because
> > > > > the ACKs were lost), so the protocol needs unique
> > > > identification of records
> > > > > to allow de-duplication. It might be tempting to use the
> > > > protocol's unique
> > > > > identification to estimate data loss; but you'll get better
> > > > results if the
> > > > > data loss information is more closely tied to the data model.
> > > > >
> > > > > >         This is not the only example of the data model imposing
> > > > > >         requirements on the protocol. But if I can show one,
> > > > > >         I'm hoping you'll agree that there must be others.
> > > > >
> > > > > I hope you'll agree that the data model does not impose any
> > additional
> > > > > requirements on the protocol for this situation.
> > > > >
> > > > > >         Paul
> > > > > >
> > > > > >         P.S. - you can have the last word when you get back from
> > > > > >         vacation :-)
> > > > >
> > > > > Done. :-)
> > > > >
> > > > > - peter
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> > message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 21 14:27:26 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA09429
	for <ipfix-archive@lists.ietf.org>; Mon, 21 Oct 2002 14:27:26 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183h4U-0005HA-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 21 Oct 2002 13:14:34 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 183h4R-0005H3-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 21 Oct 2002 13:14:32 -0500
Received: (qmail 17227 invoked from network); 21 Oct 2002 18:14:29 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 21 Oct 2002 18:14:29 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9LIHmu01380;
	Mon, 21 Oct 2002 11:17:49 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <calato@riverstonenet.com>
Cc: <ipfix-eval@net.doit.wisc.edu>,
        "Peter Ludemann" <peter.ludemann@xacct.com>
Subject: RE: [ipfix-eval] Re: Discussion of Candidate Protocols - data model;     broadcast vs   reliable
Date: Mon, 21 Oct 2002 11:14:25 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDGEEKCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <3DB42559.FC7C4DDB@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

Please note that after debating the importance of message ordering, Peter
did mention below that the protocol does ensure in-order arrival of messages
sent. In fact, it even ensures in-order arrival in case of failure of one
(or more) servers/receivers.

So if in-order arrival is a requirement of any particular data modely you
envision, then there is indeeed full support within the CRANE protocol.

I tend to agree with you that there would be cases where in-order arrival
may be dictated by the data model (e.g. change in sampling technique while
retaining the same templates, it is so desired) - and, therefore, these
would be fully supportable.

Tal

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of calato@riverstonenet.com
Sent: Monday, October 21, 2002 9:04 AM
To: Peter Ludemann
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Re: Discussion of Candidate Protocols - data
model; broadcast vs reliable



The fact that you meet the requirement does not change the
fact that the data model created the requirement. If the
data model spans messages, the ordering problem is a requirement
on the protocol.

I've tried to narrow the discussion down to one simple example to
show the connection between the data model and protocol requirements.

I've either succeeded or failed. In either case I've said enough.

Paul


Peter Ludemann wrote:
>
> calato@riverstonenet.com wrote Monday, October 21, 2002 8:08 AM:
>
> > So you do require something of the protocol to solve this problem!
> >
> > Paul
>
> In the sense that the protocol must be reliable, allow deduplication, and
> support for certain data types: yes. In the sense that the protocol needs
to
> be know something of the data model: no.
>
> In my view, the order of arrival of records is not very important because
> the records will probably have to be deduplicated, reordered, and
aggregated
> anyway [but they should at least be "almost" in order, to make the
> deduplication and reordering easier]; but the order of data is important
in
> the sense that if data spans packets then the packets must be received in
> order (as with TCP or SCTP but not UDP) -- and this is especially
important
> with variable-length data (e.g., URLs).
>
> Having said that, CRANE does ensure that the records arrive in the order
> that they were sent; and it relies on the sequence numbering of the
records
> to verify that the protocol is working correctly. Downstream deduplication
> can take advantage of this ... but it's not part of the data model as
such.
>
> - peter
>
> > Peter Ludemann wrote:
> > >
> > > calato@riverstonenet.com wrote Monday, October 21, 2002 7:05 AM:
> > >
> > > > You address de-duplication and data loss but some how missed
> > > > message ordering which was my only point.
> > > >
> > > > If the data in the messages is independant I can process
> > > > immediately. If not, I need to know if they came in order
> > > > before I can process the message. In this case nothing
> > > > is lost and nothing is resent, the messages just arrived
> > > > out of order.
> > >
> > > Because TCP or SCTP is used, the data will arrive in exported
> > order (with
> > > possible duplicates).
> > >
> > > However, just because the data arrive in order doesn't mean that the
> > > exporter produces them in order. (With our PacketSight probe,
> > the flows can
> > > be exported every "n" minutes, whether they are finished or
> > still active --
> > > the order of export is determined by hash tables in the probe because
> > > sorting into order would be too expensive; further sorting may be
needed
> > > downstream to combine multiple partial records for a long flow).
> > >
> > > To order the flow data, it is necessary to have some kind of
> > sequence data
> > > in the exported records. This is just part of the data model
> > (you'll need it
> > > in the database) ... for PacketSight, we use the nanosecond
> > timestamp of the
> > > first packet for the flow but you might want to use something
different
> > > [this is still not an absolute guarantee of ordering: if two probes
are
> > > reading the same data they might order two flows differently because
of
> > > microsecond non-determinacy in the handling of packets in the
> > two separate
> > > NIC drivers].
> > >
> > > Again, this ordering information doesn't require anything
> > special from the
> > > protocol; it's all in the data model.
> > >
> > > - peter
> > >
> > > > Paul
> > > >
> > > >
> > > >
> > > > Peter Ludemann wrote:
> > > > >
> > > > > Paul:
> > > > >
> > > > > I'm back from vacation and ready to have my last word on this. :-)
> > > > >
> > > > > [I wonder whether instead of a week in hotel rooms in Atlanta,
> > > > we should all
> > > > > book a week on a sailboat in British Columbia or New Zealand
> > > > and sort out
> > > > > our issues whilst cruising down the fjords ... ]
> > > > >
> > > > > My comments interspersed near the end (thank-you for condensing
this
> > > > > discussion so nicely).
> > > > > But to summarize them:
> > > > >
> > > > >    - the protocol needs a unique key for each record, to allow
> > > > > de-duplication.
> > > > >
> > > > >    - the data model needs a unique key for each record, to
> > > > >      allow classic database manipulations.
> > > > >
> > > > >    - the two keys MAY be the same but in general will be
different.
> > > > >
> > > > >    - the issues of a reliable protocol and the data model are
> > > > independent.
> > > > >
> > > > > - peter
> > > > >
> > > > > > calato@riverstonenet.com wrote Thursday, October 10, 2002 6:40
AM:
> > > > > >
> > > > > >
> > > > > > In order to follow one idea from start to end, here are
> > > > several excerpts
> > > > > > from our exchange so far...
> > > > > >
> > > > > > Peter:
> > > > > > ------
> > > > > > > I agree that we need a data model. I don't see why it
> > > > should affect the
> > > > > > > discussion of the export protocol.
> > > > > >
> > > > > > Paul
> > > > > > ----
> > > > > > >         If I don't have a data model, how do I evaluate
> > > > whether or not
> > > > > > >         message ordering is a problem?
> > > > > >
> > > > > > Peter
> > > > > > ----
> > > > > > > Maybe I missed something in all the emails, but I thought that
> > > > > > > the export data was to be one record per "flow".
> > > > > >
> > > > > > Paul
> > > > > > ----
> > > > > > >         For example, with long standing flows why do I need
> > > > to repeat
> > > > > > >         all the flow attributes when I just want to
> > update the byte
> > > > > > >         count? I'm not advocating one position or
> > another in this
> > > > > > >         particular issue, I'm just using it to show how the
> > > > data model
> > > > > > >         affects the protocol.
> > > > > >
> > > > > > Peter
> > > > > > -----
> > > > > > > So, as long as the protocol allows more than one kind of
record
> > > > > > > to be output, this can be done. No need to duplicate data
> > > > > > > unnecessarily.
> > > > > >
> > > > > >
> > > > > >
> > > > > >         Now we have a message ordering problem which needs to be
> > > > > >         addressed. Either sequence numbers need to be introduced
> > > > > >         into the messages or a reliable transport is needed.
> > > > > >
> > > > > >         If IPFIX's data model does not allow the splitting up of
> > > > > >         information then then there is no ordering problem and
no
> > > > > >         requirement for sequence numbers or a reliable transport
> > > > > >         (at least not driven by the data model).
> > > > >
> > > > > The issues of reliable transport and sequence numbering are
> > independent.
> > > > >
> > > > > Putting on my database designer hat for a moment ... a
> > classic "database
> > > > > beginner's mistake" is to not have a 'primary key' for records
> > > > -- that is a
> > > > > unique distinguishing identifier for each record. In the case
> > > > of IPFIX, an
> > > > > obvious 'primary key' is the sequence number (or, in the case
> > > > of CRANE, the
> > > > > exporter's "boot time" + sequence number). This is needed anyway
for
> > > > > deduplication, so it ought to be a basic requirement.
> > > > >
> > > > > However, the sequence number isn't a particularly good choice
> > > > because it's
> > > > > not "natural" for the data exported. A better choice would be a
> > > > time-stamp
> > > > > that fits with the data (e.g., time stamp of the last packet seen)
+
> > > > > information that uniquely identifies the flow (e.g., IP-port
> > > > pairs + time
> > > > > stamp of first packet seen). The exact nature of this unique key
is
> > > > > determined by the data model and should (in general) *not* be
> > > > part of the
> > > > > protocol.
> > > > >
> > > > > Switching to my protocol-design hat ... even a reliable
> > > > protocol can still
> > > > > result in lost records; "reliable" simply means that every
> > > > attempt is made
> > > > > to deliver the data and if that fails you know when you've lost
> > > > data [and,
> > > > > with a good design, you can have some idea of how much has been
> > > > lost - but,
> > > > > as I mentioned in an earlier note
> > > > > (http://ipfix.doit.wisc.edu/archive/1207.html -- see also
> > > > > http://ipfix.doit.wisc.edu/archive/1255.html), the data model
> > > > determines the
> > > > > lost data information also]. If there is failure in delivering
> > > > the data, a
> > > > > fail-over might re-send some data that have already been
> > > > received (because
> > > > > the ACKs were lost), so the protocol needs unique
> > > > identification of records
> > > > > to allow de-duplication. It might be tempting to use the
> > > > protocol's unique
> > > > > identification to estimate data loss; but you'll get better
> > > > results if the
> > > > > data loss information is more closely tied to the data model.
> > > > >
> > > > > >         This is not the only example of the data model imposing
> > > > > >         requirements on the protocol. But if I can show one,
> > > > > >         I'm hoping you'll agree that there must be others.
> > > > >
> > > > > I hope you'll agree that the data model does not impose any
> > additional
> > > > > requirements on the protocol for this situation.
> > > > >
> > > > > >         Paul
> > > > > >
> > > > > >         P.S. - you can have the last word when you get back from
> > > > > >         vacation :-)
> > > > >
> > > > > Done. :-)
> > > > >
> > > > > - peter
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in
> > message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 05:38:47 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA09882
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 05:38:47 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183vHy-0000tA-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 04:25:26 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 183vHv-0000rP-00
	for ipfix-req@net.doit.wisc.edu; Tue, 22 Oct 2002 04:25:23 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9M9OnY66542
	for <ipfix-req@net.doit.wisc.edu>; Tue, 22 Oct 2002 11:24:50 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP id 0790E617FD
	for <ipfix-req@net.doit.wisc.edu>; Tue, 22 Oct 2002 11:24:49 +0200 (CEST)
Date: Tue, 22 Oct 2002 11:24:46 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] list of issues
Message-ID: <7605466.1035285886@[192.168.102.164]>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Dear all,

Since the posting of the last requirements I-D, I took some
'vacation' from the ipfix list. Now I find that I missed
participating in some very interesting discussions.

Below I try to summarize raised requriements issues.
It might be incomplete. Please add issues I missed.

My intention is to check all issues and identify an already
existing consensus, or to trigger completion of the discussion
on these issues in order to get consesus soon.

If you want to contribute to the further discussion of these
issues, please use separate emails per issues and please state
the issue in the subject field. ("Re: list of issues" is not
really helpful for continuing the MPLS label discussion).

    Juergen


Reinaldo-1a: adding a VPN-ID attribute in section 6.1

    I think this is a good point. Still I have three questions:
    - Would it be a MUST, a SHOULD, or a MAY?
    - Shall we ask it to be required only where applicable (on devices
      supporting VPN-IDs?
    - Is it required too much for an IP meter? (see MPLS label discussion)

Reinaldo-1b: export NATed flows (before and after)

    We already discussed this issue earlier this year and decided to not
    stating a requirement. However, it is already considered by the
    information model I-D.

Reinaldo-2a: Add failover requirements, for example on the ability
             to detect loss of connectivity with the collector and
             trigger the appropriate action (eg. a switch over to
             an alternate collector.)

    I haven't seen many responses on that. Is this a nice-to-have
    or a MUST?
    What would be appropriate actions?
    Is the requirement just "do something senseful in case of
    loosing a connection (or something like this) to the collector?

Reinaldo-2b: Add optional export of flow records to multiple collectors

    This is already covered.

Reinaldo-2c: Add optional re-transmission of lost flow records.

    This should be part of the requirements discussion (see Reinaldo-3).

Reinaldo-2d: Add: Exchange control information from the collector, monitor
             export process and detect any overload in the process of
             exporting.

    I do not think, an exchange of control information from the collector
    is required.

    Monitoring the exporter and detecting overload is not explicitly
    discussed, but implied in the reliability requirement ("indicate
    missing reliability"). Is a clarification needed that for indicating
    missing reliability a detection of overload is required?

Reinaldo-3: Rephrase or modify Section 6.3.2. "Reliability"

    There was an extended discussion on this. Can one of the participants
    tell me what he considers to be the consensus concerning the new
    phrasing.

Reinaldo-4: Add MUST requirement for exporting ICMP codes in Section 6.1

    There were not many responses on this suggestion. Personally, I do
    not consider it a MUST, but a nice-to-have.

Reinaldo-5: Remove Section 5.8. "Ignore Port Copy"?

    This is not a strong requirement. It's a nice-to-have.
    Is there a consesus on either keeping or removing it?

Reinaldo-6: Section 6.6. "Anonymization"

    As far as I understood the discussion, there was a request to more
    clearly state what kind/level of anonymization is required. I find
    this hard to decide. Therefore, I suggest keeping the more vague
    current version.

Simon-1: Drop MPLS label

   This covers two sections:
       - Requiring the metering process to be able to separate flows by the MPLS label
       - requiring the ability to export the MPLS label or FEC

   It has been discussed controversially for a long time. I still do not see
   a clear consensus on this issue. Fortunaltely, I do not see a considerable
   impact on the protocol evaluation.



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 10:23:18 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA18637
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 10:23:18 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 183ziA-0002cG-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 09:08:46 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 183zi7-0002bO-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 09:08:44 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9ME8DY81789
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 22 Oct 2002 16:08:13 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP id C43CF61E8A
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 22 Oct 2002 16:08:11 +0200 (CEST)
Date: Tue, 22 Oct 2002 16:08:11 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Simon's and Ram's evaluations
Message-ID: <24609576.1035302891@[192.168.102.164]>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Dear all,

I agree almost completely with Simons evaluation. In Ram's
evaluation I like the classification of compliancy per item.
Maybe it can be formatted a bit more compact, for example:

  "3.1.1.Reliability (5.1)

      LFAP: T     CRANE: E     IDPR: E     NetFlow: E     Diameter: E"


In the conclusion section I think a table summarizing the
classification would be helpful. I put my evaluation into an example
for such a table below. It is almost completely consistent with Simon's
evaluation and has a few differences to Ram's one:

   LFAP   CRANE  IDPR   Net-   Dia-
                        Flow   meter
    T      E      E      E      E     Reliability (5.1)
    E      F      F      T      E     Sampling (5.2)
    T      E      E      T      E     Overload Behavior (5.3)
    T      T      T      T      T     Timestamps (5.4)
    T      T      E      T      T     Time Synchronization (5.5)
    T      T      E      T      T     Flow Expiration (5.6)
    ?      ?      ?      ?      ?     Multicast Flows (5.7)
    ?      ?      ?      ?      ?     Ignore Port Copy (5.8)
    T      T      T      T      T     Information Model (6.1)
    T      T      T      T      T     Data Model (6.2)
    T      T      T      T      T     Congestion Awareness (6.3.1)
    T      T      T      P      T     Reliability (6.3.2)
    T      T      T      P      T     Security (6.3.3)
    T      T      T      T      T     Push Mode Reporting (6.4)
    F      F      E      F      E     Pull Mode Reporting (6.4)
    T      T      T      T      T     Regular Report. Interval (6.5)
    T      T      T      T      T     Notif. on Specif. Events (6.6)
    E      E      E      E      E     Anonymization (6.7)
    T      T      T      T      T     Openness (8.1)
    T      T      T      T      T     Scalability (8.2)
    T      T      P      T      T     Several Collecting Proc (8.2)
-------------------------------------------------------------------
   16     14     11     14     14     number of Ts
    2      3      6      2      5     number of Es
    0      0      1      2      0     number of Ps
    1      2      1      1      0     number of Fs

Comments (comparing to Ram's and Simon's evaluation):
5.1: Only LFAP already indicates lask of reliability
     of the metering process. The other can be extended
     to do so.
5.2: CRANE, IPDR, Diameter does not address overload behavior.
     But they can be extended to report on it.


Juergen's Conclusion

My view is a bit bit biased, because it is the view of one having to
implement the protocol on devices. Therefore, I give more weight than
others might do to the cost of the implementation, the consumption of
processing power and the memory consumption.

Therefore, I estimate simple approaches. And NetFlow is the most simple
one. Also I learned that simplicity increases reliability (or safety
of design and implementation).

I am not sure whether or not I could build a compatible implementation of
CRANE or LFAP that just ignores all configuration messages received from
a collector.

If we go for a more complex prototcol, there is the choice between
problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
more general Diameter on the other side. Diameter would be in favor
if it was used widely already and anyway be implemented on most boxes.
Since this is not the case I would go for problem-psecific protocols.

Concerning the produced flows, I clearly prefer the efficient NetFlow,
IPDR, and CRANE to LFAP and Diameter.

The item level comparison did not show a clear winner.

Considering all this I would recommend to go for NetFlow v9. If this
is not accepted because NetFlow is considered as too simple or lacking
functionality, I would recommend using IDPR.

    Juergen

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 11:32:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22289
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 11:32:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1840m2-0004U0-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 10:16:50 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1840m0-0004Tr-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 10:16:48 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9MFGlO18987;
	Tue, 22 Oct 2002 11:16:47 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Juergen Quittek'" <quittek@ccrle.nec.de>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Juergen's conclusions
Date: Tue, 22 Oct 2002 11:16:36 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607A47C@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660C78A2@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Juergen,
> 
> Juergen's Conclusion
>
[snip]
> 
> Considering all this I would recommend to go for NetFlow v9. 
> If this is not accepted because NetFlow is considered as too 
> simple or lacking functionality, I would recommend using IDPR.
>

While I like the IPDR data representation strategy and formats,
I see IPDR as a data model, providing a format for communicating
flow activity reports that a probe can generate.  But I don't
see how IPDR is a transport protocol.

My opinion is that IPFIX MUST be able to transport IPDR data,
it MUST also be able to transport native NetFlow v[1-9] data
as well.  That to me indicates that the appropriate data model
is either a superset of all the candidates, so that IPFIX can
handle all the data types, or the transport protocol supports
an opaque data object, so that vendors can transport their
native records as blobs.  NetFlow doesn't support either
strategy.  IPDR may be able to be the superset, but its doesn't
support an opaque blob.

While vendors will assure us that their methods can be extended,
I won't feel comfortable making a choice until the vendors 
demonstrate how their methods can handle the requirements.


Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street, Suite 18K
New York, New York  10022

carter@qosient.com
Phone +1 212 588-9133
Fax   +1 212 588-9134
http://qosient.com
 


>     Juergen
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 11:42:13 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22767
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 11:42:13 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 18412j-00050B-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 10:34:05 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 18412h-0004zt-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 10:34:03 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9MFXtO19097;
	Tue, 22 Oct 2002 11:33:55 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: <calato@riverstonenet.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Tue, 22 Oct 2002 11:33:42 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E67A@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660C8031@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> [snip]
> 
> consumption of 
> > processing power and the memory consumption.
> > 
> 
> 	Netflow V9 will need to me modified to allow split reporting.
> 	Many devices do not have the ability to store attributes per
flow
> 	until expiration.


When did split reporting become a requirement?




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 11:44:09 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22882
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 11:44:09 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1840ud-0004mh-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 10:25:43 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1840uc-0004lj-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 10:25:42 -0500
Received: from riverstonenet.com ([134.141.180.92]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 22 Oct 2002 08:25:09 -0700
Message-ID: <3DB56D5E.4ECF923D@riverstonenet.com>
Date: Tue, 22 Oct 2002 11:23:10 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <24609576.1035302891@[192.168.102.164]>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 22 Oct 2002 15:25:10.0322 (UTC) FILETIME=[3591F120:01C279DF]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote:
> 

[snip]

> Juergen's Conclusion
> 
> My view is a bit bit biased, because it is the view of one having to
> implement the protocol on devices. Therefore, I give more weight than
> others might do to the cost of the implementation, the consumption of
> processing power and the memory consumption.
> 

	Netflow V9 will need to me modified to allow split reporting.
	Many devices do not have the ability to store attributes per flow
	until expiration.

	This is a key diffentiator for LFAP as it allows both split reporting
	and one shot reporting.

> Therefore, I estimate simple approaches. And NetFlow is the most simple
> one. Also I learned that simplicity increases reliability (or safety
> of design and implementation).
> 
> I am not sure whether or not I could build a compatible implementation of
> CRANE or LFAP that just ignores all configuration messages received from
> a collector.

	Can you clarify what configuration messages you are refering to?

> 
> If we go for a more complex prototcol, there is the choice between
> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> more general Diameter on the other side. Diameter would be in favor
> if it was used widely already and anyway be implemented on most boxes.
> Since this is not the case I would go for problem-psecific protocols.
> 
> Concerning the produced flows, I clearly prefer the efficient NetFlow,
> IPDR, and CRANE to LFAP and Diameter.

	I disagree. LFAP's multi-record format allows the
	type information to be given once for many flows. Furthermore,
	if bandwidth is truly an issue the incremental savings of
	sending type info once per session versus once per message
	will not solve it. A higher level of aggregation will be
	the solution.

> 
> The item level comparison did not show a clear winner.
> 
> Considering all this I would recommend to go for NetFlow v9. If this
> is not accepted because NetFlow is considered as too simple or lacking
> functionality, I would recommend using IDPR.
> 
>     Juergen
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 11:49:35 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23140
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 11:49:35 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1841A5-0005Ci-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 10:41:41 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1841A4-0005CI-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 10:41:40 -0500
Received: from riverstonenet.com ([134.141.180.92]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 22 Oct 2002 08:41:09 -0700
Message-ID: <3DB5711D.1C9DCB13@riverstonenet.com>
Date: Tue, 22 Oct 2002 11:39:09 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: carter@qosient.com
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <5C8959A16A71B449AE793CF52FBBED6607E67A@ptah.newyork.qosient.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 22 Oct 2002 15:41:10.0068 (UTC) FILETIME=[719F8F40:01C279E1]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter Bullard wrote:
> 
> > [snip]
> >
> > consumption of
> > > processing power and the memory consumption.
> > >
> >
> >       Netflow V9 will need to me modified to allow split reporting.
> >       Many devices do not have the ability to store attributes per
> flow
> >       until expiration.
> 
> When did split reporting become a requirement?

	I thought that was what section 6.5.  Regular Reporting Interval
	was all about. If we want low memory consumption on the device
	this is an important requirement.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 12:21:50 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24708
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 12:21:50 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1841ay-000607-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 11:09:28 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1841aw-0005zB-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 11:09:26 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9MG8tY87844;
	Tue, 22 Oct 2002 18:08:56 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP
	id 9044661FB5; Tue, 22 Oct 2002 18:08:54 +0200 (CEST)
Date: Tue, 22 Oct 2002 18:08:53 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: calato@riverstonenet.com
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
Message-ID: <31851079.1035310133@[192.168.102.164]>
In-Reply-To: <3DB56D5E.4ECF923D@riverstonenet.com>
References:  <3DB56D5E.4ECF923D@riverstonenet.com>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

-- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:

> Juergen Quittek wrote:
>>
>
> [snip]
>
>> Juergen's Conclusion
>>
>> My view is a bit bit biased, because it is the view of one having to
>> implement the protocol on devices. Therefore, I give more weight than
>> others might do to the cost of the implementation, the consumption of
>> processing power and the memory consumption.
>>
>
> 	Netflow V9 will need to me modified to allow split reporting.
> 	Many devices do not have the ability to store attributes per flow
> 	until expiration.
> 	This is a key diffentiator for LFAP as it allows both split reporting
> 	and one shot reporting.


I see that split reporting is an advantae of LFAP concerning memory consumption.
We should mention this in the evaluation.

>> Therefore, I estimate simple approaches. And NetFlow is the most simple
>> one. Also I learned that simplicity increases reliability (or safety
>> of design and implementation).
>>
>> I am not sure whether or not I could build a compatible implementation of
>> CRANE or LFAP that just ignores all configuration messages received from
>> a collector.
>
> 	Can you clarify what configuration messages you are refering to?

"Control message" was bad phrasing. I meant AR and KA.

>>
>> If we go for a more complex prototcol, there is the choice between
>> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
>> more general Diameter on the other side. Diameter would be in favor
>> if it was used widely already and anyway be implemented on most boxes.
>> Since this is not the case I would go for problem-psecific protocols.
>>
>> Concerning the produced flows, I clearly prefer the efficient NetFlow,
>> IPDR, and CRANE to LFAP and Diameter.
>
> 	I disagree. LFAP's multi-record format allows the
> 	type information to be given once for many flows. Furthermore,
> 	if bandwidth is truly an issue the incremental savings of
> 	sending type info once per session versus once per message
> 	will not solve it. A higher level of aggregation will be
> 	the solution.

My point is that LPFAP sends at least two messages per flow (FAR and FUN).
But most of the flows on the Internet are very short-lived and can usually
be reported by a single NetFlow or IPDR message.

>>
>> The item level comparison did not show a clear winner.
>>
>> Considering all this I would recommend to go for NetFlow v9. If this
>> is not accepted because NetFlow is considered as too simple or lacking
>> functionality, I would recommend using IDPR.
>>
>>     Juergen
>>
>> --
>> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> "unsubscribe ipfix" in message body
>> Archive     http://ipfix.doit.wisc.edu/archive/



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 12:25:21 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24853
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 12:25:21 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1841aD-0005yx-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 11:08:41 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1841aC-0005ys-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 11:08:40 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9MG8cO19429;
	Tue, 22 Oct 2002 12:08:38 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: <calato@riverstonenet.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Tue, 22 Oct 2002 12:08:29 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E67B@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660C8044@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Carter Bullard wrote:
> > 
> > > [snip]
> > >
> > > consumption of
> > > > processing power and the memory consumption.
> > > >
> > >
> > >       Netflow V9 will need to me modified to allow split 
> reporting.
> > >       Many devices do not have the ability to store attributes per
> > flow
> > >       until expiration.
> > 
> > When did split reporting become a requirement?
> 
> 	I thought that was what section 6.5.  Regular Reporting Interval
> 	was all about. If we want low memory consumption on the device
> 	this is an important requirement.
> 

This is an implementation issue, and should be vendor specific.
LFAP's split reporting introduces complexity and reliability problems
that are unjustified.  There is no reason that this feature would
reduce probe memory consumption, unless you've got an incredibly
inefficient monitor to begin with.





--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 12:32:38 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25161
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 12:32:38 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1841jC-0006DJ-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 11:17:58 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1841jA-0006CN-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 11:17:56 -0500
Received: from riverstonenet.com ([134.141.180.92]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 22 Oct 2002 09:17:25 -0700
Message-ID: <3DB5799D.56AAE88F@riverstonenet.com>
Date: Tue, 22 Oct 2002 12:15:26 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: carter@qosient.com
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <5C8959A16A71B449AE793CF52FBBED6607E67B@ptah.newyork.qosient.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 22 Oct 2002 16:17:25.0956 (UTC) FILETIME=[828DB840:01C279E6]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter Bullard wrote:
> 
> > Carter Bullard wrote:
> > >
> > > > [snip]
> > > >
> > > > consumption of
> > > > > processing power and the memory consumption.
> > > > >
> > > >
> > > >       Netflow V9 will need to me modified to allow split
> > reporting.
> > > >       Many devices do not have the ability to store attributes per
> > > flow
> > > >       until expiration.
> > >
> > > When did split reporting become a requirement?
> >
> >       I thought that was what section 6.5.  Regular Reporting Interval
> >       was all about. If we want low memory consumption on the device
> >       this is an important requirement.
> >
> 
> This is an implementation issue, and should be vendor specific.
> LFAP's split reporting introduces complexity and reliability problems
> that are unjustified.  There is no reason that this feature would
> reduce probe memory consumption, unless you've got an incredibly
> inefficient monitor to begin with.

	First, this is an LFAP option, not a must. Those
	devices that don't need don't use it. For those
	that do it is key. Otherwise, 

	If turning on IPFIX capabilities chews up a ton of memory, 
	it wont be turned on. 

	Many devices do not store all the attributes that
	IPFIX can report on in the hardware entry. AS number 
	for example. That means that such attributes are stored 
	in memory per flow until report time.

	I don't believe it is vendor specific.

	Paul

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 12:39:19 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25337
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 12:39:19 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1841uq-0006ar-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 11:30:00 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1841uo-0006a5-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 11:29:58 -0500
Received: from riverstonenet.com ([134.141.180.92]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 22 Oct 2002 09:29:26 -0700
Message-ID: <3DB57C6F.CF6BC73A@riverstonenet.com>
Date: Tue, 22 Oct 2002 12:27:27 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <3DB56D5E.4ECF923D@riverstonenet.com> <31851079.1035310133@[192.168.102.164]>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 22 Oct 2002 16:29:27.0449 (UTC) FILETIME=[3098D090:01C279E8]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote:
> 
> Paul,
> 
> -- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:
> 
> > Juergen Quittek wrote:
> >>
> >
> > [snip]
> >
> >> Juergen's Conclusion
> >>
> >> My view is a bit bit biased, because it is the view of one having to
> >> implement the protocol on devices. Therefore, I give more weight than
> >> others might do to the cost of the implementation, the consumption of
> >> processing power and the memory consumption.
> >>
> >
> >       Netflow V9 will need to me modified to allow split reporting.
> >       Many devices do not have the ability to store attributes per flow
> >       until expiration.
> >       This is a key diffentiator for LFAP as it allows both split reporting
> >       and one shot reporting.
> 
> I see that split reporting is an advantae of LFAP concerning memory consumption.
> We should mention this in the evaluation.
> 
> >> Therefore, I estimate simple approaches. And NetFlow is the most simple
> >> one. Also I learned that simplicity increases reliability (or safety
> >> of design and implementation).
> >>
> >> I am not sure whether or not I could build a compatible implementation of
> >> CRANE or LFAP that just ignores all configuration messages received from
> >> a collector.
> >
> >       Can you clarify what configuration messages you are refering to?
> 
> "Control message" was bad phrasing. I meant AR and KA.

	If the client handles connection loss in someother way, 
	KA messages can be ignored.

	If the collector does not need time sync from the device
	then no AR messages are needed from the Collector. So
	the minimal message exchange would be...

	VR
	VRA
	CR  - we could even get rid of this assuming security is handled at
		the lower layers
	FER
	
> 
> >>
> >> If we go for a more complex prototcol, there is the choice between
> >> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> >> more general Diameter on the other side. Diameter would be in favor
> >> if it was used widely already and anyway be implemented on most boxes.
> >> Since this is not the case I would go for problem-psecific protocols.
> >>
> >> Concerning the produced flows, I clearly prefer the efficient NetFlow,
> >> IPDR, and CRANE to LFAP and Diameter.
> >
> >       I disagree. LFAP's multi-record format allows the
> >       type information to be given once for many flows. Furthermore,
> >       if bandwidth is truly an issue the incremental savings of
> >       sending type info once per session versus once per message
> >       will not solve it. A higher level of aggregation will be
> >       the solution.
> 
> My point is that LPFAP sends at least two messages per flow (FAR and FUN).
> But most of the flows on the Internet are very short-lived and can usually
> be reported by a single NetFlow or IPDR message.

	Not true. LFAP can allow all attributes to be reported
	in the FAR message. 
> 
> >>
> >> The item level comparison did not show a clear winner.
> >>
> >> Considering all this I would recommend to go for NetFlow v9. If this
> >> is not accepted because NetFlow is considered as too simple or lacking
> >> functionality, I would recommend using IDPR.
> >>
> >>     Juergen
> >>
> >> --
> >> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >> "unsubscribe ipfix" in message body
> >> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 13:08:52 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA26527
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 13:08:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1842MX-0007ME-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 11:58:37 -0500
Received: from login.caida.org ([192.172.226.78])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1842MV-0007M7-00
	for ipfix-req@net.doit.wisc.edu; Tue, 22 Oct 2002 11:58:35 -0500
Received: from login.caida.org (localhost [127.0.0.1])
	by login.caida.org (8.12.1/8.12.1) with ESMTP id g9MGwSkh021529
	(version=TLSv1/SSLv3 cipher=EDH-DSS-DES-CBC3-SHA bits=168 verify=NO);
	Tue, 22 Oct 2002 09:58:28 -0700 (PDT)
Received: (from dmoore@localhost)
	by login.caida.org (8.12.1/8.12.1/Submit) id g9MGwSjp021528;
	Tue, 22 Oct 2002 09:58:28 -0700 (PDT)
Date: Tue, 22 Oct 2002 09:58:27 -0700
From: David Moore <dmoore@caida.org>
To: Juergen Quittek <quittek@ccrle.nec.de>
Cc: ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues
Message-ID: <20021022095827.N4694@login.caida.org>
References: <7605466.1035285886@[192.168.102.164]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <7605466.1035285886@[192.168.102.164]>
User-Agent: Mutt/1.3.23i
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

> Reinaldo-4: Add MUST requirement for exporting ICMP codes in Section 6.1
> 
>    There were not many responses on this suggestion. Personally, I do
>    not consider it a MUST, but a nice-to-have.

I would like to see this as a MUST, because of its usefulness for
both debugging certain events and for potential security related
tracking.

-- david

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 15:08:33 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00906
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 15:08:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 18447f-0002cs-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 13:51:23 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 18447d-0002c4-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 13:51:22 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9MIodIn014435;
	Tue, 22 Oct 2002 11:50:39 -0700 (PDT)
Date: Tue, 22 Oct 2002 11:50:39 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Juergen Quittek <quittek@ccrle.nec.de>
cc: calato@riverstonenet.com, <ipfix-eval@net.doit.wisc.edu>
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
In-Reply-To: <31851079.1035310133@[192.168.102.164]>
Message-ID: <Pine.GSO.4.44.0210221149260.11084-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Jeurgen,
  Please see inline

On Tue, 22 Oct 2002, Juergen Quittek wrote:

> Paul,
>
> -- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:
>
> > Juergen Quittek wrote:
> >>
> >
> > [snip]
> >
> >> Juergen's Conclusion
> >>
> >> My view is a bit bit biased, because it is the view of one having to
> >> implement the protocol on devices. Therefore, I give more weight than
> >> others might do to the cost of the implementation, the consumption of
> >> processing power and the memory consumption.
> >>
> >
> > 	Netflow V9 will need to me modified to allow split reporting.
> > 	Many devices do not have the ability to store attributes per flow
> > 	until expiration.

At the high level, if the goal is to send periodic updates of certain
statistics related to flow then it can be done with CURRENT Netflow by
adjusting the "active timeout" value of flow entries. Ofcourse we do send
the key fields also with it unlike FUN/FAR messages. Memory consumption on
the device is specific to implemention ( i agree with Carter) and if we
 run out of memory for some reason there is always the Overload Condition
indication mentioned in the requirements.

-vamsi

> > 	This is a key diffentiator for LFAP as it allows both split reporting
> > 	and one shot reporting.
>
>
> I see that split reporting is an advantae of LFAP concerning memory consumption.
> We should mention this in the evaluation.
>
> >> Therefore, I estimate simple approaches. And NetFlow is the most simple
> >> one. Also I learned that simplicity increases reliability (or safety
> >> of design and implementation).
> >>
> >> I am not sure whether or not I could build a compatible implementation of
> >> CRANE or LFAP that just ignores all configuration messages received from
> >> a collector.
> >
> > 	Can you clarify what configuration messages you are refering to?
>
> "Control message" was bad phrasing. I meant AR and KA.
>
> >>
> >> If we go for a more complex prototcol, there is the choice between
> >> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> >> more general Diameter on the other side. Diameter would be in favor
> >> if it was used widely already and anyway be implemented on most boxes.
> >> Since this is not the case I would go for problem-psecific protocols.
> >>
> >> Concerning the produced flows, I clearly prefer the efficient NetFlow,
> >> IPDR, and CRANE to LFAP and Diameter.
> >
> > 	I disagree. LFAP's multi-record format allows the
> > 	type information to be given once for many flows. Furthermore,
> > 	if bandwidth is truly an issue the incremental savings of
> > 	sending type info once per session versus once per message
> > 	will not solve it. A higher level of aggregation will be
> > 	the solution.
>
> My point is that LPFAP sends at least two messages per flow (FAR and FUN).
> But most of the flows on the Internet are very short-lived and can usually
> be reported by a single NetFlow or IPDR message.
>
> >>
> >> The item level comparison did not show a clear winner.
> >>
> >> Considering all this I would recommend to go for NetFlow v9. If this
> >> is not accepted because NetFlow is considered as too simple or lacking
> >> functionality, I would recommend using IDPR.
> >>
> >>     Juergen
> >>
> >> --
> >> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >> "unsubscribe ipfix" in message body
> >> Archive     http://ipfix.doit.wisc.edu/archive/
>
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 15:17:43 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA01139
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 15:17:43 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1844FY-0002op-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 13:59:32 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1844FW-0002nt-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 13:59:30 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9MIwk500585;
	Tue, 22 Oct 2002 11:58:46 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBAWBS>; Tue, 22 Oct 2002 11:58:45 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04524E7D@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: carter@qosient.com, "'Juergen Quittek'" <quittek@ccrle.nec.de>,
        ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Juergen's conclusions
Date: Tue, 22 Oct 2002 11:58:44 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C279FD.0B8A1C04"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C279FD.0B8A1C04
Content-Type: text/plain;
	charset="iso-8859-1"

That hit the spot. I think Carter is right on the money on this.



> -----Original Message-----
> From: Carter Bullard [mailto:carter@qosient.com]
> Sent: Tuesday, October 22, 2002 8:17 AM
> To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Juergen's conclusions
> 
> 
> Hey Juergen,
> > 
> > Juergen's Conclusion
> >
> [snip]
> > 
> > Considering all this I would recommend to go for NetFlow v9. 
> > If this is not accepted because NetFlow is considered as too 
> > simple or lacking functionality, I would recommend using IDPR.
> >
> 
> While I like the IPDR data representation strategy and formats,
> I see IPDR as a data model, providing a format for communicating
> flow activity reports that a probe can generate.  But I don't
> see how IPDR is a transport protocol.
> 
> My opinion is that IPFIX MUST be able to transport IPDR data,
> it MUST also be able to transport native NetFlow v[1-9] data
> as well.  That to me indicates that the appropriate data model
> is either a superset of all the candidates, so that IPFIX can
> handle all the data types, or the transport protocol supports
> an opaque data object, so that vendors can transport their
> native records as blobs.  NetFlow doesn't support either
> strategy.  IPDR may be able to be the superset, but its doesn't
> support an opaque blob.
> 
> While vendors will assure us that their methods can be extended,
> I won't feel comfortable making a choice until the vendors 
> demonstrate how their methods can handle the requirements.
> 
> 
> Carter
> 
> Carter Bullard
> QoSient, LLC
> 300 E. 56th Street, Suite 18K
> New York, New York  10022
> 
> carter@qosient.com
> Phone +1 212 588-9133
> Fax   +1 212 588-9134
> http://qosient.com
>  
> 
> 
> >     Juergen
> > 
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> > in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> > 
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C279FD.0B8A1C04
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2655.35">
<TITLE>RE: [ipfix-eval] Juergen's conclusions</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>That hit the spot. I think Carter is right on the money on this.</FONT>
</P>
<BR>
<BR>

<P><FONT SIZE=2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; From: Carter Bullard [<A HREF="mailto:carter@qosient.com">mailto:carter@qosient.com</A>]</FONT>
<BR><FONT SIZE=2>&gt; Sent: Tuesday, October 22, 2002 8:17 AM</FONT>
<BR><FONT SIZE=2>&gt; To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; Subject: RE: [ipfix-eval] Juergen's conclusions</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Hey Juergen,</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; Juergen's Conclusion</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; [snip]</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; Considering all this I would recommend to go for NetFlow v9. </FONT>
<BR><FONT SIZE=2>&gt; &gt; If this is not accepted because NetFlow is considered as too </FONT>
<BR><FONT SIZE=2>&gt; &gt; simple or lacking functionality, I would recommend using IDPR.</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; While I like the IPDR data representation strategy and formats,</FONT>
<BR><FONT SIZE=2>&gt; I see IPDR as a data model, providing a format for communicating</FONT>
<BR><FONT SIZE=2>&gt; flow activity reports that a probe can generate.&nbsp; But I don't</FONT>
<BR><FONT SIZE=2>&gt; see how IPDR is a transport protocol.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; My opinion is that IPFIX MUST be able to transport IPDR data,</FONT>
<BR><FONT SIZE=2>&gt; it MUST also be able to transport native NetFlow v[1-9] data</FONT>
<BR><FONT SIZE=2>&gt; as well.&nbsp; That to me indicates that the appropriate data model</FONT>
<BR><FONT SIZE=2>&gt; is either a superset of all the candidates, so that IPFIX can</FONT>
<BR><FONT SIZE=2>&gt; handle all the data types, or the transport protocol supports</FONT>
<BR><FONT SIZE=2>&gt; an opaque data object, so that vendors can transport their</FONT>
<BR><FONT SIZE=2>&gt; native records as blobs.&nbsp; NetFlow doesn't support either</FONT>
<BR><FONT SIZE=2>&gt; strategy.&nbsp; IPDR may be able to be the superset, but its doesn't</FONT>
<BR><FONT SIZE=2>&gt; support an opaque blob.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; While vendors will assure us that their methods can be extended,</FONT>
<BR><FONT SIZE=2>&gt; I won't feel comfortable making a choice until the vendors </FONT>
<BR><FONT SIZE=2>&gt; demonstrate how their methods can handle the requirements.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Carter</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Carter Bullard</FONT>
<BR><FONT SIZE=2>&gt; QoSient, LLC</FONT>
<BR><FONT SIZE=2>&gt; 300 E. 56th Street, Suite 18K</FONT>
<BR><FONT SIZE=2>&gt; New York, New York&nbsp; 10022</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; carter@qosient.com</FONT>
<BR><FONT SIZE=2>&gt; Phone +1 212 588-9133</FONT>
<BR><FONT SIZE=2>&gt; Fax&nbsp;&nbsp; +1 212 588-9134</FONT>
<BR><FONT SIZE=2>&gt; <A HREF="http://qosient.com" TARGET="_blank">http://qosient.com</A></FONT>
<BR><FONT SIZE=2>&gt;&nbsp; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Juergen</FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; --</FONT>
<BR><FONT SIZE=2>&gt; &gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=2>&gt; &gt; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say </FONT>
<BR><FONT SIZE=2>&gt; &gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; &gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; --</FONT>
<BR><FONT SIZE=2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=2>&gt; in message body</FONT>
<BR><FONT SIZE=2>&gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say</FONT>
<BR><FONT SIZE=2>&gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C279FD.0B8A1C04--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 15:23:55 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA01314
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 15:23:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1844XL-0003Ky-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 14:17:55 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1844XJ-0003K5-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 14:17:53 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9MJHGIn003132;
	Tue, 22 Oct 2002 12:17:16 -0700 (PDT)
Date: Tue, 22 Oct 2002 12:17:16 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: calato@riverstonenet.com
cc: Juergen Quittek <quittek@ccrle.nec.de>, <ipfix-eval@net.doit.wisc.edu>
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
In-Reply-To: <3DB5A18F.CDD13B90@riverstonenet.com>
Message-ID: <Pine.GSO.4.44.0210221210550.11084-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>



On Tue, 22 Oct 2002 calato@riverstonenet.com wrote:

> Vamsidhar Valluri wrote:
> >
> > Jeurgen,
> >   Please see inline
> >
> > On Tue, 22 Oct 2002, Juergen Quittek wrote:
> >
> > > Paul,
> > >
> > > -- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:
> > >
> > > > Juergen Quittek wrote:
> > > >>
> > > >
> > > > [snip]
> > > >
> > > >> Juergen's Conclusion
> > > >>
> > > >> My view is a bit bit biased, because it is the view of one having to
> > > >> implement the protocol on devices. Therefore, I give more weight than
> > > >> others might do to the cost of the implementation, the consumption of
> > > >> processing power and the memory consumption.
> > > >>
> > > >
> > > >     Netflow V9 will need to me modified to allow split reporting.
> > > >     Many devices do not have the ability to store attributes per flow
> > > >     until expiration.
> >
> > At the high level, if the goal is to send periodic updates of certain
> > statistics related to flow then it can be done with CURRENT Netflow by
> > adjusting the "active timeout" value of flow entries. Ofcourse we do send
> > the key fields also with it unlike FUN/FAR messages. Memory consumption on
> > the device is specific to implemention ( i agree with Carter) and if we
> >  run out of memory for some reason there is always the Overload Condition
> > indication mentioned in the requirements.
>
> 	Call it implementation specific or whatever, but if I need
> 	20 extra bytes per flow for a million flows, consuming
> 	20mb of memory is going to be an issue. Not to mention the
> 	memory and CPU time to maintain the list.

Paul, as pointed out by Juergen lifetime of many flows is small.

-vamsi

>
> 	Paul
> >
> > -vamsi
> >
>
> [snip]
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 15:23:57 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA01330
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 15:23:56 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1844O8-00038v-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 14:08:24 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1844O6-00038K-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 14:08:23 -0500
Received: from riverstonenet.com ([134.141.180.92]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 22 Oct 2002 12:07:51 -0700
Message-ID: <3DB5A18F.CDD13B90@riverstonenet.com>
Date: Tue, 22 Oct 2002 15:05:51 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Vamsidhar Valluri <vvalluri@cisco.com>
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <Pine.GSO.4.44.0210221149260.11084-100000@vvalluri-u10.cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 22 Oct 2002 19:07:51.0821 (UTC) FILETIME=[51A4E3D0:01C279FE]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Vamsidhar Valluri wrote:
> 
> Jeurgen,
>   Please see inline
> 
> On Tue, 22 Oct 2002, Juergen Quittek wrote:
> 
> > Paul,
> >
> > -- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:
> >
> > > Juergen Quittek wrote:
> > >>
> > >
> > > [snip]
> > >
> > >> Juergen's Conclusion
> > >>
> > >> My view is a bit bit biased, because it is the view of one having to
> > >> implement the protocol on devices. Therefore, I give more weight than
> > >> others might do to the cost of the implementation, the consumption of
> > >> processing power and the memory consumption.
> > >>
> > >
> > >     Netflow V9 will need to me modified to allow split reporting.
> > >     Many devices do not have the ability to store attributes per flow
> > >     until expiration.
> 
> At the high level, if the goal is to send periodic updates of certain
> statistics related to flow then it can be done with CURRENT Netflow by
> adjusting the "active timeout" value of flow entries. Ofcourse we do send
> the key fields also with it unlike FUN/FAR messages. Memory consumption on
> the device is specific to implemention ( i agree with Carter) and if we
>  run out of memory for some reason there is always the Overload Condition
> indication mentioned in the requirements.

	Call it implementation specific or whatever, but if I need
	20 extra bytes per flow for a million flows, consuming
	20mb of memory is going to be an issue. Not to mention the
	memory and CPU time to maintain the list.

	Paul
> 
> -vamsi
> 

[snip]

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 15:34:41 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA01668
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 15:34:41 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1844h5-0003eV-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 14:27:59 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1844h4-0003bC-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 14:27:58 -0500
Received: from riverstonenet.com ([134.141.180.92]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 22 Oct 2002 12:25:47 -0700
Message-ID: <3DB5A5C3.37AAB13E@riverstonenet.com>
Date: Tue, 22 Oct 2002 15:23:47 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Vamsidhar Valluri <vvalluri@cisco.com>
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <Pine.GSO.4.44.0210221210550.11084-100000@vvalluri-u10.cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 22 Oct 2002 19:25:47.0600 (UTC) FILETIME=[D2DBBD00:01C27A00]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Vamsidhar Valluri wrote:
> 
> On Tue, 22 Oct 2002 calato@riverstonenet.com wrote:
> 
> > Vamsidhar Valluri wrote:
> > >
> > > Jeurgen,
> > >   Please see inline
> > >
> > > On Tue, 22 Oct 2002, Juergen Quittek wrote:
> > >
> > > > Paul,
> > > >
> > > > -- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:
> > > >
> > > > > Juergen Quittek wrote:
> > > > >>
> > > > >
> > > > > [snip]
> > > > >
> > > > >> Juergen's Conclusion
> > > > >>
> > > > >> My view is a bit bit biased, because it is the view of one having to
> > > > >> implement the protocol on devices. Therefore, I give more weight than
> > > > >> others might do to the cost of the implementation, the consumption of
> > > > >> processing power and the memory consumption.
> > > > >>
> > > > >
> > > > >     Netflow V9 will need to me modified to allow split reporting.
> > > > >     Many devices do not have the ability to store attributes per flow
> > > > >     until expiration.
> > >
> > > At the high level, if the goal is to send periodic updates of certain
> > > statistics related to flow then it can be done with CURRENT Netflow by
> > > adjusting the "active timeout" value of flow entries. Ofcourse we do send
> > > the key fields also with it unlike FUN/FAR messages. Memory consumption on
> > > the device is specific to implemention ( i agree with Carter) and if we
> > >  run out of memory for some reason there is always the Overload Condition
> > > indication mentioned in the requirements.
> >
> >       Call it implementation specific or whatever, but if I need
> >       20 extra bytes per flow for a million flows, consuming
> >       20mb of memory is going to be an issue. Not to mention the
> >       memory and CPU time to maintain the list.
> 
> Paul, as pointed out by Juergen lifetime of many flows is small.

	How does that change the memory requirement? If I've got on average
	N active flows then I have N*extra-bytes of memory at any point
	in time.

> 
> -vamsi
> 
> >
> >       Paul
> > >
> > > -vamsi
> > >
> >
> > [snip]
> >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 15:47:34 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02110
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 15:47:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1844rz-0003zn-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 14:39:15 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1844rx-0003ys-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 14:39:13 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9MJce507155;
	Tue, 22 Oct 2002 12:38:41 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9MJcq523120;
	Tue, 22 Oct 2002 14:38:52 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBAWK7>; Tue, 22 Oct 2002 12:38:37 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04524EF9@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Vamsidhar Valluri <vvalluri@cisco.com>, calato@riverstonenet.com
Cc: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Tue, 22 Oct 2002 12:38:27 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27A02.97CDADFC"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27A02.97CDADFC
Content-Type: text/plain;
	charset="iso-8859-1"



> -----Original Message-----
> From: Vamsidhar Valluri [mailto:vvalluri@cisco.com]
> Sent: Tuesday, October 22, 2002 12:17 PM
> To: calato@riverstonenet.com
> Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
> 
> 
> 
> 
> On Tue, 22 Oct 2002 calato@riverstonenet.com wrote:
> 
> > Vamsidhar Valluri wrote:
> > >
> > > Jeurgen,
> > >   Please see inline
> > >
> > > On Tue, 22 Oct 2002, Juergen Quittek wrote:
> > >
> > > > Paul,
> > > >
> > > > -- calato@riverstonenet.com wrote on 22 October 2002 
> 11:23 -0400:
> > > >
> > > > > Juergen Quittek wrote:
> > > > >>
> > > > >
> > > > > [snip]
> > > > >
> > > > >> Juergen's Conclusion
> > > > >>
> > > > >> My view is a bit bit biased, because it is the view 
> of one having to
> > > > >> implement the protocol on devices. Therefore, I give 
> more weight than
> > > > >> others might do to the cost of the implementation, 
> the consumption of
> > > > >> processing power and the memory consumption.
> > > > >>
> > > > >
> > > > >     Netflow V9 will need to me modified to allow 
> split reporting.
> > > > >     Many devices do not have the ability to store 
> attributes per flow
> > > > >     until expiration.
> > >
> > > At the high level, if the goal is to send periodic 
> updates of certain
> > > statistics related to flow then it can be done with 
> CURRENT Netflow by
> > > adjusting the "active timeout" value of flow entries. 
> Ofcourse we do send
> > > the key fields also with it unlike FUN/FAR messages. 
> Memory consumption on
> > > the device is specific to implemention ( i agree with 
> Carter) and if we
> > >  run out of memory for some reason there is always the 
> Overload Condition
> > > indication mentioned in the requirements.
> >
> > 	Call it implementation specific or whatever, but if I need
> > 	20 extra bytes per flow for a million flows, consuming
> > 	20mb of memory is going to be an issue. Not to mention the
> > 	memory and CPU time to maintain the list.
> 
> Paul, as pointed out by Juergen lifetime of many flows is small.


well, yes and no...If you look at new Internet traffic patterns (including a
recent paper by our Nevil - "Understanding Internet Traffic Streams:
Dragonflies and Tortoises"), long running flows are a big part of non-web
TCP flows. Although I consider University of Auckland an exception given
their pay per use model.

I did a recent study on a European ISP and the amount of P2P traffic (a.k.a
long running TCP flows) was just as much as normal web (in terms of flows
and much more in terms of bytes).

There are also some good stats from Dave Plonka in
http://wwwstats.net.wisc.edu/.

regards,

Reinaldo



> 
> -vamsi
> 
> >
> > 	Paul
> > >
> > > -vamsi
> > >
> >
> > [snip]
> >
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C27A02.97CDADFC
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2655.35">
<TITLE>RE: [ipfix-eval] Simon's and Ram's evaluations</TITLE>
</HEAD>
<BODY>
<BR>
<BR>

<P><FONT SIZE=2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; From: Vamsidhar Valluri [<A HREF="mailto:vvalluri@cisco.com">mailto:vvalluri@cisco.com</A>]</FONT>
<BR><FONT SIZE=2>&gt; Sent: Tuesday, October 22, 2002 12:17 PM</FONT>
<BR><FONT SIZE=2>&gt; To: calato@riverstonenet.com</FONT>
<BR><FONT SIZE=2>&gt; Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; Subject: Re: [ipfix-eval] Simon's and Ram's evaluations</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; On Tue, 22 Oct 2002 calato@riverstonenet.com wrote:</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; Vamsidhar Valluri wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; Jeurgen,</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;&nbsp;&nbsp; Please see inline</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; On Tue, 22 Oct 2002, Juergen Quittek wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; Paul,</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; -- calato@riverstonenet.com wrote on 22 October 2002 </FONT>
<BR><FONT SIZE=2>&gt; 11:23 -0400:</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt; Juergen Quittek wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt; [snip]</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt; Juergen's Conclusion</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt; My view is a bit bit biased, because it is the view </FONT>
<BR><FONT SIZE=2>&gt; of one having to</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt; implement the protocol on devices. Therefore, I give </FONT>
<BR><FONT SIZE=2>&gt; more weight than</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt; others might do to the cost of the implementation, </FONT>
<BR><FONT SIZE=2>&gt; the consumption of</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt; processing power and the memory consumption.</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Netflow V9 will need to me modified to allow </FONT>
<BR><FONT SIZE=2>&gt; split reporting.</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Many devices do not have the ability to store </FONT>
<BR><FONT SIZE=2>&gt; attributes per flow</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; until expiration.</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; At the high level, if the goal is to send periodic </FONT>
<BR><FONT SIZE=2>&gt; updates of certain</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; statistics related to flow then it can be done with </FONT>
<BR><FONT SIZE=2>&gt; CURRENT Netflow by</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; adjusting the &quot;active timeout&quot; value of flow entries. </FONT>
<BR><FONT SIZE=2>&gt; Ofcourse we do send</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; the key fields also with it unlike FUN/FAR messages. </FONT>
<BR><FONT SIZE=2>&gt; Memory consumption on</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; the device is specific to implemention ( i agree with </FONT>
<BR><FONT SIZE=2>&gt; Carter) and if we</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;&nbsp; run out of memory for some reason there is always the </FONT>
<BR><FONT SIZE=2>&gt; Overload Condition</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; indication mentioned in the requirements.</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; Call it implementation specific or whatever, but if I need</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; 20 extra bytes per flow for a million flows, consuming</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; 20mb of memory is going to be an issue. Not to mention the</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; memory and CPU time to maintain the list.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Paul, as pointed out by Juergen lifetime of many flows is small.</FONT>
</P>
<BR>

<P><FONT SIZE=2>well, yes and no...If you look at new Internet traffic patterns (including a recent paper by our Nevil - &quot;Understanding Internet Traffic Streams: Dragonflies and Tortoises&quot;), long running flows are a big part of non-web TCP flows. Although I consider University of Auckland an exception given their pay per use model.</FONT></P>

<P><FONT SIZE=2>I did a recent study on a European ISP and the amount of P2P traffic (a.k.a long running TCP flows) was just as much as normal web (in terms of flows and much more in terms of bytes).</FONT></P>

<P><FONT SIZE=2>There are also some good stats from Dave Plonka in <A HREF="http://wwwstats.net.wisc.edu/" TARGET="_blank">http://wwwstats.net.wisc.edu/</A>.</FONT>
</P>

<P><FONT SIZE=2>regards,</FONT>
</P>

<P><FONT SIZE=2>Reinaldo</FONT>
</P>
<BR>
<BR>

<P><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; -vamsi</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; Paul</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt; -vamsi</FONT>
<BR><FONT SIZE=2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; [snip]</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; --</FONT>
<BR><FONT SIZE=2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=2>&gt; in message body</FONT>
<BR><FONT SIZE=2>&gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say</FONT>
<BR><FONT SIZE=2>&gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27A02.97CDADFC--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 16:05:24 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA02507
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 16:05:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 18458p-0004TX-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 14:56:39 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 18458n-0004Sr-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 14:56:37 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9MJpp509280;
	Tue, 22 Oct 2002 12:51:51 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBAW3J>; Tue, 22 Oct 2002 12:51:50 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04524F30@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Vamsidhar Valluri <vvalluri@cisco.com>, calato@riverstonenet.com
Cc: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Tue, 22 Oct 2002 12:51:45 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27A04.73B0CE20"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27A04.73B0CE20
Content-Type: text/plain;
	charset="iso-8859-1"

 

-----Original Message-----
From: Penno, Reinaldo [BL60:0430:EXCH] 
Sent: Tuesday, October 22, 2002 12:38 PM
To: Vamsidhar Valluri; calato@riverstonenet.com
Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations





> -----Original Message----- 
> From: Vamsidhar Valluri [ mailto:vvalluri@cisco.com
<mailto:vvalluri@cisco.com> ] 
> Sent: Tuesday, October 22, 2002 12:17 PM 
> To: calato@riverstonenet.com 
> Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu 
> Subject: Re: [ipfix-eval] Simon's and Ram's evaluations 
> 
> 
> 
> 
> On Tue, 22 Oct 2002 calato@riverstonenet.com wrote: 
> 
> > Vamsidhar Valluri wrote: 
> > > 
> > > Jeurgen, 
> > >   Please see inline 
> > > 
> > > On Tue, 22 Oct 2002, Juergen Quittek wrote: 
> > > 
> > > > Paul, 
> > > > 
> > > > -- calato@riverstonenet.com wrote on 22 October 2002 
> 11:23 -0400: 
> > > > 
> > > > > Juergen Quittek wrote: 
> > > > >> 
> > > > > 
> > > > > [snip] 
> > > > > 
> > > > >> Juergen's Conclusion 
> > > > >> 
> > > > >> My view is a bit bit biased, because it is the view 
> of one having to 
> > > > >> implement the protocol on devices. Therefore, I give 
> more weight than 
> > > > >> others might do to the cost of the implementation, 
> the consumption of 
> > > > >> processing power and the memory consumption. 
> > > > >> 
> > > > > 
> > > > >     Netflow V9 will need to me modified to allow 
> split reporting. 
> > > > >     Many devices do not have the ability to store 
> attributes per flow 
> > > > >     until expiration. 
> > > 
> > > At the high level, if the goal is to send periodic 
> updates of certain 
> > > statistics related to flow then it can be done with 
> CURRENT Netflow by 
> > > adjusting the "active timeout" value of flow entries. 
> Ofcourse we do send 
> > > the key fields also with it unlike FUN/FAR messages. 
> Memory consumption on 
> > > the device is specific to implemention ( i agree with 
> Carter) and if we 
> > >  run out of memory for some reason there is always the 
> Overload Condition 
> > > indication mentioned in the requirements. 
> > 
> >     Call it implementation specific or whatever, but if I need 
> >     20 extra bytes per flow for a million flows, consuming 
> >     20mb of memory is going to be an issue. Not to mention the 
> >     memory and CPU time to maintain the list. 
> 
> Paul, as pointed out by Juergen lifetime of many flows is small. 


well, yes and no...If you look at new Internet traffic patterns (including a
recent paper by our Nevil - "Understanding Internet Traffic Streams:
Dragonflies and Tortoises"), long running flows are a big part of non-web
TCP flows. Although I consider University of Auckland an exception given
their pay per use model.  --->because they do not present this behavior as
much. 

I did a recent study on a European ISP and the amount of P2P traffic (a.k.a
long running TCP flows) was just as much as normal web (in terms of flows
and much more in terms of bytes).

There are also some good stats from Dave Plonka in
http://wwwstats.net.wisc.edu/ <http://wwwstats.net.wisc.edu/> . 

regards, 

Reinaldo 



> 
> -vamsi 
> 
> > 
> >     Paul 
> > > 
> > > -vamsi 
> > > 
> > 
> > [snip] 
> > 
> 
> 
> -- 
> Help        mailto:majordomo@net.doit.wisc.edu
<mailto:majordomo@net.doit.wisc.edu>  and say "help" 
> in message body 
> Unsubscribe mailto:majordomo@net.doit.wisc.edu
<mailto:majordomo@net.doit.wisc.edu>  and say 
> "unsubscribe ipfix" in message body 
> Archive     http://ipfix.doit.wisc.edu/archive/
<http://ipfix.doit.wisc.edu/archive/>  
> 


------_=_NextPart_001_01C27A04.73B0CE20
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>RE: [ipfix-eval] Simon's and Ram's evaluations</TITLE>

<META content="MSHTML 5.50.4916.2300" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT face=Arial color=#0000ff size=2></FONT>&nbsp;</DIV>
<BLOCKQUOTE dir=ltr 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Penno, Reinaldo 
  [BL60:0430:EXCH] <BR><B>Sent:</B> Tuesday, October 22, 2002 12:38 
  PM<BR><B>To:</B> Vamsidhar Valluri; calato@riverstonenet.com<BR><B>Cc:</B> 
  Juergen Quittek; ipfix-eval@net.doit.wisc.edu<BR><B>Subject:</B> RE: 
  [ipfix-eval] Simon's and Ram's evaluations<BR><BR></FONT></DIV><BR><BR>
  <P><FONT size=2>&gt; -----Original Message-----</FONT> <BR><FONT size=2>&gt; 
  From: Vamsidhar Valluri [<A 
  href="mailto:vvalluri@cisco.com">mailto:vvalluri@cisco.com</A>]</FONT> 
  <BR><FONT size=2>&gt; Sent: Tuesday, October 22, 2002 12:17 PM</FONT> 
  <BR><FONT size=2>&gt; To: calato@riverstonenet.com</FONT> <BR><FONT 
  size=2>&gt; Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu</FONT> <BR><FONT 
  size=2>&gt; Subject: Re: [ipfix-eval] Simon's and Ram's evaluations</FONT> 
  <BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT 
  size=2>&gt; </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; On Tue, 
  22 Oct 2002 calato@riverstonenet.com wrote:</FONT> <BR><FONT size=2>&gt; 
  </FONT><BR><FONT size=2>&gt; &gt; Vamsidhar Valluri wrote:</FONT> <BR><FONT 
  size=2>&gt; &gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; Jeurgen,</FONT> 
  <BR><FONT size=2>&gt; &gt; &gt;&nbsp;&nbsp; Please see inline</FONT> <BR><FONT 
  size=2>&gt; &gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; On Tue, 22 Oct 
  2002, Juergen Quittek wrote:</FONT> <BR><FONT size=2>&gt; &gt; &gt;</FONT> 
  <BR><FONT size=2>&gt; &gt; &gt; &gt; Paul,</FONT> <BR><FONT size=2>&gt; &gt; 
  &gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; -- 
  calato@riverstonenet.com wrote on 22 October 2002 </FONT><BR><FONT size=2>&gt; 
  11:23 -0400:</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt;</FONT> <BR><FONT 
  size=2>&gt; &gt; &gt; &gt; &gt; Juergen Quittek wrote:</FONT> <BR><FONT 
  size=2>&gt; &gt; &gt; &gt; &gt;&gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; 
  &gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt; [snip]</FONT> 
  <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; 
  &gt; &gt; &gt;&gt; Juergen's Conclusion</FONT> <BR><FONT size=2>&gt; &gt; &gt; 
  &gt; &gt;&gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;&gt; My view is 
  a bit bit biased, because it is the view </FONT><BR><FONT size=2>&gt; of one 
  having to</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;&gt; implement the 
  protocol on devices. Therefore, I give </FONT><BR><FONT size=2>&gt; more 
  weight than</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;&gt; others might 
  do to the cost of the implementation, </FONT><BR><FONT size=2>&gt; the 
  consumption of</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;&gt; processing 
  power and the memory consumption.</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; 
  &gt;&gt;</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;</FONT> <BR><FONT 
  size=2>&gt; &gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Netflow V9 will need 
  to me modified to allow </FONT><BR><FONT size=2>&gt; split reporting.</FONT> 
  <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Many devices 
  do not have the ability to store </FONT><BR><FONT size=2>&gt; attributes per 
  flow</FONT> <BR><FONT size=2>&gt; &gt; &gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; 
  until expiration.</FONT> <BR><FONT size=2>&gt; &gt; &gt;</FONT> <BR><FONT 
  size=2>&gt; &gt; &gt; At the high level, if the goal is to send periodic 
  </FONT><BR><FONT size=2>&gt; updates of certain</FONT> <BR><FONT size=2>&gt; 
  &gt; &gt; statistics related to flow then it can be done with </FONT><BR><FONT 
  size=2>&gt; CURRENT Netflow by</FONT> <BR><FONT size=2>&gt; &gt; &gt; 
  adjusting the "active timeout" value of flow entries. </FONT><BR><FONT 
  size=2>&gt; Ofcourse we do send</FONT> <BR><FONT size=2>&gt; &gt; &gt; the key 
  fields also with it unlike FUN/FAR messages. </FONT><BR><FONT size=2>&gt; 
  Memory consumption on</FONT> <BR><FONT size=2>&gt; &gt; &gt; the device is 
  specific to implemention ( i agree with </FONT><BR><FONT size=2>&gt; Carter) 
  and if we</FONT> <BR><FONT size=2>&gt; &gt; &gt;&nbsp; run out of memory for 
  some reason there is always the </FONT><BR><FONT size=2>&gt; Overload 
  Condition</FONT> <BR><FONT size=2>&gt; &gt; &gt; indication mentioned in the 
  requirements.</FONT> <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; 
  &gt; &nbsp;&nbsp;&nbsp; Call it implementation specific or whatever, but if I 
  need</FONT> <BR><FONT size=2>&gt; &gt; &nbsp;&nbsp;&nbsp; 20 extra bytes per 
  flow for a million flows, consuming</FONT> <BR><FONT size=2>&gt; &gt; 
  &nbsp;&nbsp;&nbsp; 20mb of memory is going to be an issue. Not to mention 
  the</FONT> <BR><FONT size=2>&gt; &gt; &nbsp;&nbsp;&nbsp; memory and CPU time 
  to maintain the list.</FONT> <BR><FONT size=2>&gt; </FONT><BR><FONT 
  size=2>&gt; Paul, as pointed out by Juergen lifetime of many flows is 
  small.</FONT> </P><BR>
  <P><FONT size=2>well, yes and no...If you look at new Internet traffic 
  patterns (including a recent paper by our Nevil - "Understanding Internet 
  Traffic Streams: Dragonflies and Tortoises"), long running flows are a big 
  part of non-web TCP flows. Although I consider University of Auckland an 
  exception given their pay per use model.<SPAN class=215025419-22102002><FONT 
  face=Arial color=#0000ff>&nbsp; ---&gt;because they do not present this 
  behavior as much.&nbsp;</FONT></SPAN></FONT></P>
  <P><FONT size=2>I did a recent study on a European ISP and the amount of P2P 
  traffic (a.k.a long running TCP flows) was just as much as normal web (in 
  terms of flows and much more in terms of bytes).</FONT></P>
  <P><FONT size=2>There are also some good stats from Dave Plonka in <A 
  target=_blank 
  href="http://wwwstats.net.wisc.edu/">http://wwwstats.net.wisc.edu/</A>.</FONT> 
  </P>
  <P><FONT size=2>regards,</FONT> </P>
  <P><FONT size=2>Reinaldo</FONT> </P><BR><BR>
  <P><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; -vamsi</FONT> <BR><FONT 
  size=2>&gt; </FONT><BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; 
  &gt; &nbsp;&nbsp;&nbsp; Paul</FONT> <BR><FONT size=2>&gt; &gt; &gt;</FONT> 
  <BR><FONT size=2>&gt; &gt; &gt; -vamsi</FONT> <BR><FONT size=2>&gt; &gt; 
  &gt;</FONT> <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; &gt; 
  [snip]</FONT> <BR><FONT size=2>&gt; &gt;</FONT> <BR><FONT size=2>&gt; 
  </FONT><BR><FONT size=2>&gt; </FONT><BR><FONT size=2>&gt; --</FONT> <BR><FONT 
  size=2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A 
  href="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> 
  and say "help" </FONT><BR><FONT size=2>&gt; in message body</FONT> <BR><FONT 
  size=2>&gt; Unsubscribe <A 
  href="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> 
  and say</FONT> <BR><FONT size=2>&gt; "unsubscribe ipfix" in message 
  body</FONT> <BR><FONT size=2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A 
  target=_blank 
  href="http://ipfix.doit.wisc.edu/archive/">http://ipfix.doit.wisc.edu/archive/</A></FONT> 
  <BR><FONT size=2>&gt; </FONT></P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C27A04.73B0CE20--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 17:20:30 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA05075
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 17:20:30 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1846Lu-0006eA-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 16:14:14 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 1846Ls-0006dW-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 16:14:12 -0500
Received: (qmail 4026 invoked by uid 10041); 22 Oct 2002 21:13:42 -0000
Date: Tue, 22 Oct 2002 14:13:42 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
Message-ID: <20021022211341.GD3681@riverstonenet.com>
References: <3DB5A18F.CDD13B90@riverstonenet.com> <Pine.GSO.4.44.0210221210550.11084-100000@vvalluri-u10.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.GSO.4.44.0210221210550.11084-100000@vvalluri-u10.cisco.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Tue, Oct 22, 2002 at 12:17:16PM -0700, Vamsidhar Valluri wrote:
>Paul, as pointed out by Juergen lifetime of many flows is small.

I agree the protocol should behave well in the most common case,
but this does not appear to be a sound engineering tradeoff 
(ie having a protocol behave well for only a particular flow pattern). 

And while going to overflow is a sound last
resort, maybe there are some intermediate solutions 
that indeed would work better in practice.

Regards,
Mike MacFaden

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 17:31:59 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA05326
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 17:31:58 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1846U5-0006yH-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 16:22:41 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1846U4-0006xK-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 16:22:40 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9MLM2In015012;
	Tue, 22 Oct 2002 14:22:02 -0700 (PDT)
Date: Tue, 22 Oct 2002 14:22:02 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: calato@riverstonenet.com
cc: Juergen Quittek <quittek@ccrle.nec.de>, <ipfix-eval@net.doit.wisc.edu>
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
In-Reply-To: <3DB5A5C3.37AAB13E@riverstonenet.com>
Message-ID: <Pine.GSO.4.44.0210221333110.11118-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>



On Tue, 22 Oct 2002 calato@riverstonenet.com wrote:

> Vamsidhar Valluri wrote:
> >
> > On Tue, 22 Oct 2002 calato@riverstonenet.com wrote:
> >
> > > Vamsidhar Valluri wrote:
> > > >
> > > > Jeurgen,
> > > >   Please see inline
> > > >
> > > > On Tue, 22 Oct 2002, Juergen Quittek wrote:
> > > >
> > > > > Paul,
> > > > >
> > > > > -- calato@riverstonenet.com wrote on 22 October 2002 11:23 -0400:
> > > > >
> > > > > > Juergen Quittek wrote:
> > > > > >>
> > > > > >
> > > > > > [snip]
> > > > > >
> > > > > >> Juergen's Conclusion
> > > > > >>
> > > > > >> My view is a bit bit biased, because it is the view of one having to
> > > > > >> implement the protocol on devices. Therefore, I give more weight than
> > > > > >> others might do to the cost of the implementation, the consumption of
> > > > > >> processing power and the memory consumption.
> > > > > >>
> > > > > >
> > > > > >     Netflow V9 will need to me modified to allow split reporting.
> > > > > >     Many devices do not have the ability to store attributes per flow
> > > > > >     until expiration.
> > > >
> > > > At the high level, if the goal is to send periodic updates of certain
> > > > statistics related to flow then it can be done with CURRENT Netflow by
> > > > adjusting the "active timeout" value of flow entries. Ofcourse we do send
> > > > the key fields also with it unlike FUN/FAR messages. Memory consumption on
> > > > the device is specific to implemention ( i agree with Carter) and if we
> > > >  run out of memory for some reason there is always the Overload Condition
> > > > indication mentioned in the requirements.
> > >
> > >       Call it implementation specific or whatever, but if I need
> > >       20 extra bytes per flow for a million flows, consuming
> > >       20mb of memory is going to be an issue. Not to mention the
> > >       memory and CPU time to maintain the list.
> >
> > Paul, as pointed out by Juergen lifetime of many flows is small.
>
> 	How does that change the memory requirement? If I've got on average
> 	N active flows then I have N*extra-bytes of memory at any point
> 	in time.

I agree extra memory will be consumed for Average N value. But consider
the following example(simplified) related to lifetime of flows for
statically allocated memory. Suppose cache
can hold 5K entries at a time. If there are 2K long standing flows,
whose lifetime is > 5min and 3K short lived flows whose life time
is ~1min. Considering a trivial scenario where at the start of every
minute ~3K flows are created which expire after 1 min, over a period of
5min this cache would have exported information related to 17K flows
whereas if you have 5K long standing flows, you could send information
related to only 5K flows (assuming you don't create new flows if cache is
full by expiring the old ones).

-vamsi

>
> >
> > -vamsi
> >
> > >
> > >       Paul
> > > >
> > > > -vamsi
> > > >
> > >
> > > [snip]
> > >
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 18:18:48 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06252
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 18:18:48 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1847G3-0000gV-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 17:12:15 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 1847Fy-0000gJ-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 17:12:11 -0500
Received: (qmail 27002 invoked from network); 22 Oct 2002 22:12:00 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 22 Oct 2002 22:12:00 -0000
Received: from Givoly (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9MMFRu01321;
	Tue, 22 Oct 2002 15:15:29 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <carter@qosient.com>, "'Juergen Quittek'" <quittek@ccrle.nec.de>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Juergen's conclusions
Date: Tue, 22 Oct 2002 15:11:58 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEFMCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607A47C@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter & Juergen,

CRANE clearly addresses your issue. Not only are there types for BLOBs - in
case you want opaque data transport, but there is also the ability to extend
while still maintaining negotiable data structures. Objects are packed
according to client capabilities/desires. Client can always override complex
requirements of servers (server hints to the client whether he is interested
in specific attributes and client can use this hint or ignore it - to
achieve best efficiency).

In general, CRANE always prefer client simplicity/efficiency and
deployment/development efficiency over merely protocol simplicity. Protocol
simplicity doesn't usually lead to reliable, extensible, cost-effective
deployments and developments of integration but rather the opposite.

Integration simplicity (and therefore, to some degree, usability) is a
matter of resource consumption on device (cpu, memory, etc.) and good APIs
to allow to handle all use cases while overcoming real-world issues (such as
overload behavior, etc.) (also modeled as use cases).

NetFlow is obviously too simple as it doesn't allow for reliability at a
reasonable cost. It requires rather significant extensions to become such.

I defer to Jeff regarding IPDR's support for opaque BLOB, but as far as I
can tell, as it is based on XDR, it can, be extended to support both fixed
and variable length opaque BLOBs, if it doesn't already have this. However,
IPDR doesn't seem to expose all XDR's capabilities (e.g. arrays are not
exposed via IPDR), and therefore, perhaps this is but one of the things IPDR
doesn't allow.

Tal

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of Carter Bullard
Sent: Tuesday, October 22, 2002 8:17 AM
To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Juergen's conclusions


Hey Juergen,
>
> Juergen's Conclusion
>
[snip]
>
> Considering all this I would recommend to go for NetFlow v9.
> If this is not accepted because NetFlow is considered as too
> simple or lacking functionality, I would recommend using IDPR.
>

While I like the IPDR data representation strategy and formats,
I see IPDR as a data model, providing a format for communicating
flow activity reports that a probe can generate.  But I don't
see how IPDR is a transport protocol.

My opinion is that IPFIX MUST be able to transport IPDR data,
it MUST also be able to transport native NetFlow v[1-9] data
as well.  That to me indicates that the appropriate data model
is either a superset of all the candidates, so that IPFIX can
handle all the data types, or the transport protocol supports
an opaque data object, so that vendors can transport their
native records as blobs.  NetFlow doesn't support either
strategy.  IPDR may be able to be the superset, but its doesn't
support an opaque blob.

While vendors will assure us that their methods can be extended,
I won't feel comfortable making a choice until the vendors
demonstrate how their methods can handle the requirements.


Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street, Suite 18K
New York, New York  10022

carter@qosient.com
Phone +1 212 588-9133
Fax   +1 212 588-9134
http://qosient.com



>     Juergen
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 22:19:30 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA12297
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 22:19:29 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Aux-0007AZ-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 21:06:43 -0500
Received: from palrel10.hp.com ([156.153.255.245])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184Auv-0007AR-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 21:06:41 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 6FC04C00575; Tue, 22 Oct 2002 19:06:40 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id TAA26690;
	Tue, 22 Oct 2002 19:06:26 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021023023915.HZPO18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 22 Oct 2002 19:39:15 -0700
Message-ID: <3DB604A2.80002@cup.hp.com>
Date: Tue, 22 Oct 2002 19:08:34 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: carter@qosient.com
Cc: "'Juergen Quittek'" <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Juergen's conclusions
References: <5C8959A16A71B449AE793CF52FBBED6607A47C@ptah.newyork.qosient.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   IPDR defines a data modelling capability.

   IPDR also defines a couple of serialization models.
(XML and compact).

   You can serialize to a file or you can serialize
over a network connection (for network connection,
only compact is supported).

   The former supports batch mode and the latter
supports more real time requirements (i.e. IP Flows).

   How IPDR streams over the network is described
in the specification at:

   http://www.ietf.org/internet-drafts/draft-meyer-ipdr-streaming-00.txt

   Note that the streaming model is NOT described as part
of IPDR's 3.1 specification.  But uses a minor extension
to the already defined compact format to enable both
trivial delivery and reliable delivery.


   The streaming model should be incorporated into
the next revision of IPDR.


   Transporting information equivalent to Netflow v1-9
is simply a matter of defining the appropriate
IPDR Service Definition.  The example service
definition in the appendix of the advocacy draft
should illustrate how other NFvX versions would
be modeled.


   The compact format definition of IPDR does support
a binary data type, but it is not exposed through
the data model at this point.  Since the protocol
already supports this, extending the datamodel to
allow for either the XML type "base64Binary" or
"hexBinary".  This use case had not come up with
the existing service definitions, but seems minor
to address.

Regards,

   Jeff Meyer

Carter Bullard wrote:

> Hey Juergen,
> 
>>Juergen's Conclusion
>>
>>
> [snip]
> 
>>Considering all this I would recommend to go for NetFlow v9. 
>>If this is not accepted because NetFlow is considered as too 
>>simple or lacking functionality, I would recommend using IDPR.
>>
>>
> 
> While I like the IPDR data representation strategy and formats,
> I see IPDR as a data model, providing a format for communicating
> flow activity reports that a probe can generate.  But I don't
> see how IPDR is a transport protocol.
> 
> My opinion is that IPFIX MUST be able to transport IPDR data,
> it MUST also be able to transport native NetFlow v[1-9] data
> as well.  That to me indicates that the appropriate data model
> is either a superset of all the candidates, so that IPFIX can
> handle all the data types, or the transport protocol supports
> an opaque data object, so that vendors can transport their
> native records as blobs.  NetFlow doesn't support either
> strategy.  IPDR may be able to be the superset, but its doesn't
> support an opaque blob.
> 
> While vendors will assure us that their methods can be extended,
> I won't feel comfortable making a choice until the vendors 
> demonstrate how their methods can handle the requirements.
> 
> 
> Carter
> 
> Carter Bullard
> QoSient, LLC
> 300 E. 56th Street, Suite 18K
> New York, New York  10022
> 
> carter@qosient.com
> Phone +1 212 588-9133
> Fax   +1 212 588-9134
> http://qosient.com
>  
> 
> 
> 
>>    Juergen
>>
>>--
>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
>>in message body
>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
>>"unsubscribe ipfix" in message body
>>Archive     http://ipfix.doit.wisc.edu/archive/
>>
>>
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 22 22:21:52 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA12371
	for <ipfix-archive@lists.ietf.org>; Tue, 22 Oct 2002 22:21:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184B0t-0007JV-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 22 Oct 2002 21:12:51 -0500
Received: from palrel10.hp.com ([156.153.255.245])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184B0r-0007JN-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 22 Oct 2002 21:12:49 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 1D867C00545; Tue, 22 Oct 2002 19:12:49 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id TAA27015;
	Tue, 22 Oct 2002 19:12:40 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021023024529.HZPP18196.simail.cup.hp.com@cup.hp.com>;
          Tue, 22 Oct 2002 19:45:29 -0700
Message-ID: <3DB60618.6020508@cup.hp.com>
Date: Tue, 22 Oct 2002 19:14:48 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Tal Givoly <givoly@xacct.com>
Cc: carter@qosient.com, "'Juergen Quittek'" <quittek@ccrle.nec.de>,
        ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Juergen's conclusions
References: <DLEIIIOHMNPJPNMKGEFDOEFMCPAA.givoly@xacct.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   Regarding Tal's question about arrays and other
XDR capabilities...

   Some of this discussion occurred on earlier threads,
but I'll repeat:

   IPDR today defines records which are (in
database parlance) First Normal Form.  Meaning
that all the fields are of a primitive type
and none of the fields repeat.

   From a processing and storage perspective
FNF is quite desireable and should be encouraged.
NF data is FNF, as are the other Service definitions
created by IPDR to date.

   There is a proposed extension (backward compatable)
to IPDR to enable both substructures and repeating
fields (arrays) submitted w/in IPDR.  However it
is not required for IPFIX and (to repeat) should
be discouraged when FNF is sufficient.


Regards,

   Jeff Meyer



Tal Givoly wrote:

> Carter & Juergen,
> 
> CRANE clearly addresses your issue. Not only are there types for BLOBs - in
> case you want opaque data transport, but there is also the ability to extend
> while still maintaining negotiable data structures. Objects are packed
> according to client capabilities/desires. Client can always override complex
> requirements of servers (server hints to the client whether he is interested
> in specific attributes and client can use this hint or ignore it - to
> achieve best efficiency).
> 
> In general, CRANE always prefer client simplicity/efficiency and
> deployment/development efficiency over merely protocol simplicity. Protocol
> simplicity doesn't usually lead to reliable, extensible, cost-effective
> deployments and developments of integration but rather the opposite.
> 
> Integration simplicity (and therefore, to some degree, usability) is a
> matter of resource consumption on device (cpu, memory, etc.) and good APIs
> to allow to handle all use cases while overcoming real-world issues (such as
> overload behavior, etc.) (also modeled as use cases).
> 
> NetFlow is obviously too simple as it doesn't allow for reliability at a
> reasonable cost. It requires rather significant extensions to become such.
> 
> I defer to Jeff regarding IPDR's support for opaque BLOB, but as far as I
> can tell, as it is based on XDR, it can, be extended to support both fixed
> and variable length opaque BLOBs, if it doesn't already have this. However,
> IPDR doesn't seem to expose all XDR's capabilities (e.g. arrays are not
> exposed via IPDR), and therefore, perhaps this is but one of the things IPDR
> doesn't allow.
> 
> Tal
> 
> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> Of Carter Bullard
> Sent: Tuesday, October 22, 2002 8:17 AM
> To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Juergen's conclusions
> 
> 
> Hey Juergen,
> 
>>Juergen's Conclusion
>>
>>
> [snip]
> 
>>Considering all this I would recommend to go for NetFlow v9.
>>If this is not accepted because NetFlow is considered as too
>>simple or lacking functionality, I would recommend using IDPR.
>>
>>
> 
> While I like the IPDR data representation strategy and formats,
> I see IPDR as a data model, providing a format for communicating
> flow activity reports that a probe can generate.  But I don't
> see how IPDR is a transport protocol.
> 
> My opinion is that IPFIX MUST be able to transport IPDR data,
> it MUST also be able to transport native NetFlow v[1-9] data
> as well.  That to me indicates that the appropriate data model
> is either a superset of all the candidates, so that IPFIX can
> handle all the data types, or the transport protocol supports
> an opaque data object, so that vendors can transport their
> native records as blobs.  NetFlow doesn't support either
> strategy.  IPDR may be able to be the superset, but its doesn't
> support an opaque blob.
> 
> While vendors will assure us that their methods can be extended,
> I won't feel comfortable making a choice until the vendors
> demonstrate how their methods can handle the requirements.
> 
> 
> Carter
> 
> Carter Bullard
> QoSient, LLC
> 300 E. 56th Street, Suite 18K
> New York, New York  10022
> 
> carter@qosient.com
> Phone +1 212 588-9133
> Fax   +1 212 588-9134
> http://qosient.com
> 
> 
> 
> 
>>    Juergen
>>
>>--
>>Help        mailto:majordomo@net.doit.wisc.edu and say "help"
>>in message body
>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>"unsubscribe ipfix" in message body
>>Archive     http://ipfix.doit.wisc.edu/archive/
>>
>>
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 03:31:13 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA10529
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 03:31:13 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Fqx-000041-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 02:22:55 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184Fqv-00003t-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 02:22:53 -0500
Received: (qmail 25387 invoked from network); 23 Oct 2002 07:22:44 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 23 Oct 2002 07:22:44 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9N7QEu10236;
	Wed, 23 Oct 2002 00:26:14 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Juergen Quittek" <quittek@ccrle.nec.de>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Wed, 23 Oct 2002 00:22:46 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDIEGDCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <24609576.1035302891@[192.168.102.164]>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen,

<snip>
5.1: Only LFAP already indicates lask of reliability
     of the metering process. The other can be extended
     to do so.
<snip>

Quoting from the requirements:

5.1.  Reliability

   The metering process MUST either be reliable or missing reliability
   MUST be known and indicated. The metering process is reliable if each
   packet passing the observation point is metered according to the
   configuration of the metering process. If, e.g. due to some overload,
   not all passing packets can be included into the metering process,
   then the metering process MUST be able to detect this failure and to
   report about it.

Tal> The way I interpret this requirement is is that EITHER an accurate
depiction of events observed by the Observation Point and metered by the
Metering Process MUST be delivered to a Collecting Process OR an indication
that the Metering Process didn't process the data reliably MUST be delivered
to the collection process.

Basically - that either of these messages MUST be delivered to the
Collection
Process.

CRANE obviously supports this. CRANE imposes no constraints on the Metering
Process. Therefore, it is the Metering Process' responsibility to indicate,
perhaps with two different types of events whether it reliably metered or
not.
In fact, this indication MUST get to a Collection Process.

I contest that NetFlow FAILS this requirement while CRANE nor Diameter fail
this requirement. It is subject to debate on whether LFAP or IPDR meet this
requirement or must be extended to meet this requirement.

Therefore, I ask you to reconsider your scoring of this important item.

Tal
____________________________________________

Tal Givoly
Chief Scientist
XACCT Technologies, Inc.
2900 Lakeside Drive
Santa Clara, CA 95054
http://www.xacct.com

Direct:  408-330-5747
Tel:     408-654-9900 x 5747
Fax:     408-654-9904
E-mail:  mailto:givoly@xacct.com
____________________________________________


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 03:31:46 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA10587
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 03:31:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Fr3-00004K-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 02:23:01 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184Fr1-00004A-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 02:22:59 -0500
Received: (qmail 25406 invoked from network); 23 Oct 2002 07:22:49 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 23 Oct 2002 07:22:49 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9N7QJu10246;
	Wed, 23 Oct 2002 00:26:19 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <ram.gopal@nokia.com>, "Juergen Quittek" <quittek@ccrle.nec.de>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Gopal's evaluation draft contribution
Date: Wed, 23 Oct 2002 00:22:51 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEGDCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <DC504E9C3384054C8506D3E6BB0124607AE460@bsebe001.americas.nokia.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Ram,

As I really liked the fact that Juergen layed out his evaluation
in a matrix. Therefore, for the group's convenience, I took the
liberty and tabularized your evaluation according to the same type
of matrix (with the content you provided, however excluding the
comments).

If you feel this is useful to maintain, I encourage you to
double-check, in case I copied something incorrectly. I had
to make some interpretation of items that had numbering mismatch
with labels - perhaps you would like to clarify them as well.

Ram's evaluation scoresheet:

   LFAP   CRANE  IDPR   Net-   Dia-
                        Flow   meter
    P      T      E      P      E     Reliability (5.1)
    F      F      F      ?      E     Sampling (5.2)
    T      F      E      T      F     Overload Behavior (5.3)
    T      T      T      T      T     Timestamps (5.4)
    T      T      E      T      T     Time Synchronization (5.5)
    T      T      E      T      T     Flow Expiration (5.6)
    E      ?      ?      ?      ?     Multicast Flows (5.7)
    E      E      F      E      F     Ignore Port Copy (5.8)
    T      T      T      T      T     Information Model (6.1)
    T      T      T      T      T     Data Model (6.2)
    T      T      T      E      T     Congestion Awareness (6.3.1)
    T      T      T      T      T     Reliability (6.3.2)
    T      T      T      E      T     Security (6.3.3)
    E      E      E      E      T     Push/Pull/Regular Reporting (6.4/5)
    T      T      T      T      T     Notif. on Specif. Events (6.6)
    E      E      E      E      E     Anonymization (6.7)
    T      T      E      T      T     Configuration of Metering (7.1)
    E      T      E      T      T     Configuration of Exporting (7.2)
    E      ?      ?      ?      T     Openness (8.1)
    T      T      E      T      T     Several Collecting Proc (8.3)
    T      T      F      ?      T     Special Device Consideration (9)
    T      T      T      E      T     Security Considerations (10)
-------------------------------------------------------------------
   14     15      8     11     16     number of Ts
    6      3      9      6      3     number of Es
    1      0      0      1      0     number of Ps
    1      2      3      0      2     number of Fs
    0      2      2      4      1     number of ?s

I believe it is also very important to note whether the requirement
stipulated MAY/SHOULD/MUST, etc. By numerically comparing these
protocols against the overall list of requirements as equals, it is
difficult to capture the DEGREE of compliance with the requirements.

Perhaps a column should be added to highlight this?

From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of ram.gopal@nokia.com
Sent: Wednesday, October 16, 2002 3:15 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Gopal's evaluation draft contribution


Greetings,

Please find the individual evaluation of IPFIX protocol candidates. I used
the templates prepared
by J. Quittek and thank for his work it saves lot of time.

Feel free to comment on this material.


Thanks and Regards
Ram Gopal. L


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 03:35:33 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA10664
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 03:35:33 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Fr0-000049-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 02:22:58 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184Fqy-000040-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 02:22:56 -0500
Received: (qmail 25400 invoked from network); 23 Oct 2002 07:22:46 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 23 Oct 2002 07:22:46 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9N7QHu10243;
	Wed, 23 Oct 2002 00:26:17 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Juergen Quittek" <quittek@ccrle.nec.de>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs. Overload
Date: Wed, 23 Oct 2002 00:22:48 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDMEGDCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <24609576.1035302891@[192.168.102.164]>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen,

<snip>
5.2: CRANE, IPDR, Diameter does not address overload behavior.
     But they can be extended to report on it.
<snip>

I believe there may be a typo - you mention "5.2 overload behavior", however
5.2 is, in fact, sampling behavior. Which did you mean that you differ with
compared to Simon's review?

Regarding Sampling Behavior (and this is in response to both your
evaluations
as well as Simon's), both evaluations conclude that that CRANE Fails to meet
this requirement.

CRANE clearly allows distinguishing between sampled data and non-sampled
data.
As CRANE, similarly to IPDR and Diameter, doesn't impose any restrictions
on the Metering Process, the latter can easily submit sampled data in
a dedicated Template. Even if you consider that there is no intrinsic
support
specifically for Sampling Behavior within the protocol itself, it is
definitely
Extendable to that degree, would you not agree?


On the other hand, I don't quite understand how NetFlow v9 actually supports
multiple concurrent Templates by the same Export Process. As NetFlow v9
Templates are indistinguishable (they are changed rapidly and not negotiated
with no uniquely describing attributes!). Therefore, NetFlow v9 cannot
support both sampled and non-sampled mode of operations in any
combination - a requirement that is implied by the Sampling Requirement
(for at least some length of overlap time).

Perhaps this question should be directed to the NetFlow protocol advocate:

- How can multiple Templates coexist?
- If, in fact, it is possible for multiple Templates to coexist, please
  elaborate how are these distinguished by recipients based on the current
  protocol draft?

  For instance, how would a Collection Process differentiate between sampled
  and non-sampled data? How would this be done if both are being exported
  concurrently?

Thanks for any clarification.

Tal



-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of Juergen Quittek
Sent: Tuesday, October 22, 2002 7:08 AM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Simon's and Ram's evaluations


Dear all,

I agree almost completely with Simons evaluation. In Ram's
evaluation I like the classification of compliancy per item.
Maybe it can be formatted a bit more compact, for example:

  "3.1.1.Reliability (5.1)

      LFAP: T     CRANE: E     IDPR: E     NetFlow: E     Diameter: E"


In the conclusion section I think a table summarizing the
classification would be helpful. I put my evaluation into an example
for such a table below. It is almost completely consistent with Simon's
evaluation and has a few differences to Ram's one:

   LFAP   CRANE  IDPR   Net-   Dia-
                        Flow   meter
    T      E      E      E      E     Reliability (5.1)
    E      F      F      T      E     Sampling (5.2)
    T      E      E      T      E     Overload Behavior (5.3)
    T      T      T      T      T     Timestamps (5.4)
    T      T      E      T      T     Time Synchronization (5.5)
    T      T      E      T      T     Flow Expiration (5.6)
    ?      ?      ?      ?      ?     Multicast Flows (5.7)
    ?      ?      ?      ?      ?     Ignore Port Copy (5.8)
    T      T      T      T      T     Information Model (6.1)
    T      T      T      T      T     Data Model (6.2)
    T      T      T      T      T     Congestion Awareness (6.3.1)
    T      T      T      P      T     Reliability (6.3.2)
    T      T      T      P      T     Security (6.3.3)
    T      T      T      T      T     Push Mode Reporting (6.4)
    F      F      E      F      E     Pull Mode Reporting (6.4)
    T      T      T      T      T     Regular Report. Interval (6.5)
    T      T      T      T      T     Notif. on Specif. Events (6.6)
    E      E      E      E      E     Anonymization (6.7)
    T      T      T      T      T     Openness (8.1)
    T      T      T      T      T     Scalability (8.2)
    T      T      P      T      T     Several Collecting Proc (8.2)
-------------------------------------------------------------------
   16     14     11     14     14     number of Ts
    2      3      6      2      5     number of Es
    0      0      1      2      0     number of Ps
    1      2      1      1      0     number of Fs

Comments (comparing to Ram's and Simon's evaluation):
5.1: Only LFAP already indicates lask of reliability
     of the metering process. The other can be extended
     to do so.
5.2: CRANE, IPDR, Diameter does not address overload behavior.
     But they can be extended to report on it.


Juergen's Conclusion

My view is a bit bit biased, because it is the view of one having to
implement the protocol on devices. Therefore, I give more weight than
others might do to the cost of the implementation, the consumption of
processing power and the memory consumption.

Therefore, I estimate simple approaches. And NetFlow is the most simple
one. Also I learned that simplicity increases reliability (or safety
of design and implementation).

I am not sure whether or not I could build a compatible implementation of
CRANE or LFAP that just ignores all configuration messages received from
a collector.

If we go for a more complex prototcol, there is the choice between
problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
more general Diameter on the other side. Diameter would be in favor
if it was used widely already and anyway be implemented on most boxes.
Since this is not the case I would go for problem-psecific protocols.

Concerning the produced flows, I clearly prefer the efficient NetFlow,
IPDR, and CRANE to LFAP and Diameter.

The item level comparison did not show a clear winner.

Considering all this I would recommend to go for NetFlow v9. If this
is not accepted because NetFlow is considered as too simple or lacking
functionality, I would recommend using IDPR.

    Juergen

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 04:46:05 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA11529
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 04:46:04 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184H1E-0002Qu-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 03:37:36 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184H1C-0002Qm-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 03:37:34 -0500
Received: (qmail 29939 invoked from network); 23 Oct 2002 08:37:25 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 23 Oct 2002 08:37:25 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9N8evu11301;
	Wed, 23 Oct 2002 01:40:57 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Juergen Quittek" <quittek@ccrle.nec.de>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Wed, 23 Oct 2002 01:37:29 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEGGCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDIEGDCPAA.givoly@xacct.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen,

<snip>
5.1: Only LFAP already indicates lask of reliability
     of the metering process. The other can be extended
     to do so.
<snip>

Quoting from the requirements:

5.1.  Reliability

   The metering process MUST either be reliable or missing reliability
   MUST be known and indicated. The metering process is reliable if each
   packet passing the observation point is metered according to the
   configuration of the metering process. If, e.g. due to some overload,
   not all passing packets can be included into the metering process,
   then the metering process MUST be able to detect this failure and to
   report about it.

Tal> The way I interpret this requirement is is that EITHER an accurate
depiction of events observed by the Observation Point and metered by the
Metering Process MUST be delivered to a Collecting Process OR an indication
that the Metering Process didn't process the data reliably MUST be delivered
to the collection process.

More concisely, that either of these messages MUST be delivered to the
Collection Process.

CRANE obviously supports this. CRANE imposes no constraints on the Metering
Process. Therefore, it is the Metering Process' responsibility to indicate,
perhaps with two different types of events whether it reliably metered or
not. In fact, this indication MUST get to a Collection Process.

I contest that NetFlow FAILS this requirement while CRANE nor Diameter fail
this requirement. It is subject to debate on whether LFAP or IPDR meet this
requirement or must be extended to meet this requirement.

Therefore, I ask you to reconsider your scoring of this important item.

Tal
____________________________________________

Tal Givoly
Chief Scientist
XACCT Technologies, Inc.
2900 Lakeside Drive
Santa Clara, CA 95054
http://www.xacct.com

Direct:  408-330-5747
Tel:     408-654-9900 x 5747
Fax:     408-654-9904
E-mail:  mailto:givoly@xacct.com
____________________________________________


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 05:46:20 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA12325
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 05:46:19 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Hyh-0004SK-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 04:39:03 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184Hyf-0004RM-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 04:39:01 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9N9cQY10254;
	Wed, 23 Oct 2002 11:38:26 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP
	id EC4EF62689; Wed, 23 Oct 2002 11:38:24 +0200 (CEST)
Date: Wed, 23 Oct 2002 11:38:24 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: Tal Givoly <givoly@xacct.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Message-ID: <7657140.1035373104@[192.168.102.164]>
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDIEGDCPAA.givoly@xacct.com>
References:  <DLEIIIOHMNPJPNMKGEFDIEGDCPAA.givoly@xacct.com>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Tal,

The way I see it, all protocols can easily be extended to meet
this requirement, by adding a reliability attribute to each
flow record (just one bit), to the templates, or other messages.

My point in the evaluation was, that only LFAP has this feature
already defined. And only LFAP meets it without further extension.

    Juergen


-- Tal Givoly wrote on 23 October 2002 00:22 -0700:

> Juergen,
>
> <snip>
> 5.1: Only LFAP already indicates lask of reliability
>      of the metering process. The other can be extended
>      to do so.
> <snip>
>
> Quoting from the requirements:
>
> 5.1.  Reliability
>
>    The metering process MUST either be reliable or missing reliability
>    MUST be known and indicated. The metering process is reliable if each
>    packet passing the observation point is metered according to the
>    configuration of the metering process. If, e.g. due to some overload,
>    not all passing packets can be included into the metering process,
>    then the metering process MUST be able to detect this failure and to
>    report about it.
>
> Tal> The way I interpret this requirement is is that EITHER an accurate
> depiction of events observed by the Observation Point and metered by the
> Metering Process MUST be delivered to a Collecting Process OR an indication
> that the Metering Process didn't process the data reliably MUST be delivered
> to the collection process.
>
> Basically - that either of these messages MUST be delivered to the
> Collection
> Process.
>
> CRANE obviously supports this. CRANE imposes no constraints on the Metering
> Process. Therefore, it is the Metering Process' responsibility to indicate,
> perhaps with two different types of events whether it reliably metered or
> not.
> In fact, this indication MUST get to a Collection Process.
>
> I contest that NetFlow FAILS this requirement while CRANE nor Diameter fail
> this requirement. It is subject to debate on whether LFAP or IPDR meet this
> requirement or must be extended to meet this requirement.
>
> Therefore, I ask you to reconsider your scoring of this important item.
>
> Tal
> ____________________________________________
>
> Tal Givoly
> Chief Scientist
> XACCT Technologies, Inc.
> 2900 Lakeside Drive
> Santa Clara, CA 95054
> http://www.xacct.com
>
> Direct:  408-330-5747
> Tel:     408-654-9900 x 5747
> Fax:     408-654-9904
> E-mail:  mailto:givoly@xacct.com
> ____________________________________________
>



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 05:53:39 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA12399
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 05:53:39 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184I6X-0004i7-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 04:47:09 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184I6W-0004gu-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 04:47:08 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9N9kbY10710;
	Wed, 23 Oct 2002 11:46:37 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP
	id 342F96267A; Wed, 23 Oct 2002 11:46:36 +0200 (CEST)
Date: Wed, 23 Oct 2002 11:46:36 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: Tal Givoly <givoly@xacct.com>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs. Overload
Message-ID: <8148587.1035373596@[192.168.102.164]>
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDMEGDCPAA.givoly@xacct.com>
References:  <DLEIIIOHMNPJPNMKGEFDMEGDCPAA.givoly@xacct.com>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Tal,

-- Tal Givoly wrote on 23 October 2002 00:22 -0700:

> Juergen,
>
> <snip>
> 5.2: CRANE, IPDR, Diameter does not address overload behavior.
>      But they can be extended to report on it.
> <snip>
>
> I believe there may be a typo - you mention "5.2 overload behavior", however
> 5.2 is, in fact, sampling behavior. Which did you mean that you differ with
> compared to Simon's review?

My apologies for the typo. It should be "5.2 Sampling". I wrote the note
because my evaluation differs from Ram's one.

> Regarding Sampling Behavior (and this is in response to both your
> evaluations
> as well as Simon's), both evaluations conclude that that CRANE Fails to meet
> this requirement.
>
> CRANE clearly allows distinguishing between sampled data and non-sampled
> data.
> As CRANE, similarly to IPDR and Diameter, doesn't impose any restrictions
> on the Metering Process, the latter can easily submit sampled data in
> a dedicated Template. Even if you consider that there is no intrinsic
> support
> specifically for Sampling Behavior within the protocol itself, it is
> definitely
> Extendable to that degree, would you not agree?

I see your point. Both CRANE and IPDR can be extended by flow attributes
indicating sampling configuration. Therefore, they should get an 'E' for 5.2
instead of an 'F'.

    Juergen

> On the other hand, I don't quite understand how NetFlow v9 actually supports
> multiple concurrent Templates by the same Export Process. As NetFlow v9
> Templates are indistinguishable (they are changed rapidly and not negotiated
> with no uniquely describing attributes!). Therefore, NetFlow v9 cannot
> support both sampled and non-sampled mode of operations in any
> combination - a requirement that is implied by the Sampling Requirement
> (for at least some length of overlap time).
>
> Perhaps this question should be directed to the NetFlow protocol advocate:
>
> - How can multiple Templates coexist?
> - If, in fact, it is possible for multiple Templates to coexist, please
>   elaborate how are these distinguished by recipients based on the current
>   protocol draft?
>
>   For instance, how would a Collection Process differentiate between sampled
>   and non-sampled data? How would this be done if both are being exported
>   concurrently?
>
> Thanks for any clarification.
>
> Tal
>
>
>
> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> Of Juergen Quittek
> Sent: Tuesday, October 22, 2002 7:08 AM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: [ipfix-eval] Simon's and Ram's evaluations
>
>
> Dear all,
>
> I agree almost completely with Simons evaluation. In Ram's
> evaluation I like the classification of compliancy per item.
> Maybe it can be formatted a bit more compact, for example:
>
>   "3.1.1.Reliability (5.1)
>
>       LFAP: T     CRANE: E     IDPR: E     NetFlow: E     Diameter: E"
>
>
> In the conclusion section I think a table summarizing the
> classification would be helpful. I put my evaluation into an example
> for such a table below. It is almost completely consistent with Simon's
> evaluation and has a few differences to Ram's one:
>
>    LFAP   CRANE  IDPR   Net-   Dia-
>                         Flow   meter
>     T      E      E      E      E     Reliability (5.1)
>     E      F      F      T      E     Sampling (5.2)
>     T      E      E      T      E     Overload Behavior (5.3)
>     T      T      T      T      T     Timestamps (5.4)
>     T      T      E      T      T     Time Synchronization (5.5)
>     T      T      E      T      T     Flow Expiration (5.6)
>     ?      ?      ?      ?      ?     Multicast Flows (5.7)
>     ?      ?      ?      ?      ?     Ignore Port Copy (5.8)
>     T      T      T      T      T     Information Model (6.1)
>     T      T      T      T      T     Data Model (6.2)
>     T      T      T      T      T     Congestion Awareness (6.3.1)
>     T      T      T      P      T     Reliability (6.3.2)
>     T      T      T      P      T     Security (6.3.3)
>     T      T      T      T      T     Push Mode Reporting (6.4)
>     F      F      E      F      E     Pull Mode Reporting (6.4)
>     T      T      T      T      T     Regular Report. Interval (6.5)
>     T      T      T      T      T     Notif. on Specif. Events (6.6)
>     E      E      E      E      E     Anonymization (6.7)
>     T      T      T      T      T     Openness (8.1)
>     T      T      T      T      T     Scalability (8.2)
>     T      T      P      T      T     Several Collecting Proc (8.2)
> -------------------------------------------------------------------
>    16     14     11     14     14     number of Ts
>     2      3      6      2      5     number of Es
>     0      0      1      2      0     number of Ps
>     1      2      1      1      0     number of Fs
>
> Comments (comparing to Ram's and Simon's evaluation):
> 5.1: Only LFAP already indicates lask of reliability
>      of the metering process. The other can be extended
>      to do so.
> 5.2: CRANE, IPDR, Diameter does not address overload behavior.
>      But they can be extended to report on it.
>
>
> Juergen's Conclusion
>
> My view is a bit bit biased, because it is the view of one having to
> implement the protocol on devices. Therefore, I give more weight than
> others might do to the cost of the implementation, the consumption of
> processing power and the memory consumption.
>
> Therefore, I estimate simple approaches. And NetFlow is the most simple
> one. Also I learned that simplicity increases reliability (or safety
> of design and implementation).
>
> I am not sure whether or not I could build a compatible implementation of
> CRANE or LFAP that just ignores all configuration messages received from
> a collector.
>
> If we go for a more complex prototcol, there is the choice between
> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> more general Diameter on the other side. Diameter would be in favor
> if it was used widely already and anyway be implemented on most boxes.
> Since this is not the case I would go for problem-psecific protocols.
>
> Concerning the produced flows, I clearly prefer the efficient NetFlow,
> IPDR, and CRANE to LFAP and Diameter.
>
> The item level comparison did not show a clear winner.
>
> Considering all this I would recommend to go for NetFlow v9. If this
> is not accepted because NetFlow is considered as too simple or lacking
> functionality, I would recommend using IDPR.
>
>     Juergen
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 14:08:53 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA27806
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 14:08:53 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Pdb-0004bE-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 12:49:47 -0500
Received: from mailhost2.auckland.ac.nz ([130.216.191.4])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184PdY-0004b2-00
	for ipfix@net.doit.wisc.edu; Wed, 23 Oct 2002 12:49:44 -0500
Received: from mailhost.auckland.ac.nz (IDENT:mirapoint@mailhost [130.216.191.61])
	by mailhost2.auckland.ac.nz (8.9.2/8.9.2/8.9.2-ua) with ESMTP id GAA21517
	for <ipfix@net.doit.wisc.edu>; Thu, 24 Oct 2002 06:49:42 +1300 (NZDT)
Received: from postbox.auckland.ac.nz (postbox.auckland.ac.nz [130.216.191.126])
	by mailhost.auckland.ac.nz (Mirapoint Messaging Server MOS 3.2.1.6-EA)
	with ESMTP id AIY51675;
	Thu, 24 Oct 2002 06:49:41 +1300 (NZDT)
Received: from localhost (hotlava.auckland.ac.nz [130.216.191.123])
	by postbox.auckland.ac.nz (8.11.6/8.11.6) with ESMTP id g9NHnfM22198
	for <ipfix@net.doit.wisc.edu>; Thu, 24 Oct 2002 06:49:41 +1300
Received: from dyn43.caida.org (dyn43.caida.org [192.172.226.43]) 
	by hotlava.auckland.ac.nz (IMP) with HTTP 
	for <jbro111@postbox.auckland.ac.nz>; Thu, 24 Oct 2002 06:49:41 +1300
Message-ID: <1035395381.3db6e1357af41@hotlava.auckland.ac.nz>
Date: Thu, 24 Oct 2002 06:49:41 +1300
From: Nevil Brownlee <n.brownlee@auckland.ac.nz>
To: ipfix@net.doit.wisc.edu
Subject: [ipfix] WG status, Atlanta aganeda draft
MIME-Version: 1.0
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
User-Agent: Internet Messaging Program (IMP) 4.0-cvs
X-Originating-IP: 192.172.226.43
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


Hi all:

We're getting ready for the IPFIX meeting at the Atlanta IETF.
Here's a list of our current drafts, and a draft agenda for that
meeting.  You'll note that we're aiming to have the Evaluation
Report draft submitted before the -00 draft cutoff date (28 Oct).

Cheers, Nevil


IPFIX WG: Document status, 23 Oct 02

Evaluation drafts:
  Advocate (individual) drafts  (published)
    draft-calato-ipfix-lfap-eval-00.txt
    draft-claise-ipfix-eval-netflow-03.txt
    draft-kzhang-ipfix-eval-crane-00.txt
    draft-meyer-ipfix-ipdr-eval-00.txt
    draft-zander-ipfix-diameter-eval-00.txt

  Evaluation Review (WG) draft  (PENDING)
    draft-ietf-ipfix-evaluation-00.txt

WG drafts:
  Under discussion
    draft-ietf-ipfix-reqs-06.txt

  On hold until evaluation complete:
    draft-ietf-ipfix-architecture-02.txt
    draft-ietf-ipfix-data-00.txt  (EXPIRED)

  Proposed WG draft
    draft-zseby-ipfix-applicability-00.txt


Draft IPFIX Agenda for Atlanta
------------------------------

1) Agenda Review

2) Requirements Draft
   + Review of -06 revision
   + Open issues

3) Evaluation Process
   + Report
   + Discussion: how to proceed
     - Can we reach consensus on one of the candidates? 
     - What changes are *required* in the chosen protocol?

4) Review of WG Milestones


Revised Milestones

  Done        Submit Revised Internet-Draft on IP Flow Export Requirements 
  Done        Submit Internet-Draft on IP Flow Export Architecture 
  Done        Submit Internet-Draft on IP Flow Export Data Model 
  Done        Submit Advocate Internet-Drafts for Candidate Protocols

* Nov 02      Submit Internet-Draft on IPFIX Protocol Evaluation Report

* Dec 02      Submit Internet-Draft on IP Flow Export Applicability Statement


* Feb 03      Select IPFIX protocol, revise Architecture and Data Model drafts


  Apr 03      Submit IPFX-REQUIREMENTS to IESG for publication 
                as Informational RFC 

* Apr 03      Submit IPFIX Protocol Evaluation Report to IESG for publication
                as Informational RFC


  Aug 03      Submit IPFX-ARCHITECTURE to IESG for publication
                as Proposed Standard RFC
  Aug 03      Submit IPFX-DATAMODEL to IESG for publication 
                as Informational RFC 
* Aug 03      Submit IPFX-APPLICABILITY to IESG for publication 
                as Informational RFC 

* indicates new milestones


-----------------------------------------------------------------------
   Nevil Brownlee                   Director, Technology Development
   Phone: +64 9 373 7599 x8941      ITSS, The University of Auckland
   FAX: +64 9 373 7021      Private Bag 92019, Auckland, New Zealand

-------------------------------------------------
This mail sent through IMP: http://horde.org/imp/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 15:29:43 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02117
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 15:29:43 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Qzj-00076i-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 14:16:43 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184Qzh-000766-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 14:16:41 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9NJG2In028230;
	Wed, 23 Oct 2002 12:16:02 -0700 (PDT)
Date: Wed, 23 Oct 2002 12:16:02 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Tal Givoly <givoly@xacct.com>
cc: Juergen Quittek <quittek@ccrle.nec.de>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDIEGDCPAA.givoly@xacct.com>
Message-ID: <Pine.GSO.4.44.0210231054570.11177-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Please see inline

On Wed, 23 Oct 2002, Tal Givoly wrote:

> Juergen,
>
> <snip>
> 5.1: Only LFAP already indicates lask of reliability
>      of the metering process. The other can be extended
>      to do so.
> <snip>
>
> Quoting from the requirements:
>
> 5.1.  Reliability
>
>    The metering process MUST either be reliable or missing reliability
>    MUST be known and indicated. The metering process is reliable if each
>    packet passing the observation point is metered according to the
>    configuration of the metering process. If, e.g. due to some overload,
>    not all passing packets can be included into the metering process,
>    then the metering process MUST be able to detect this failure and to
>    report about it.
>
> Tal> The way I interpret this requirement is is that EITHER an accurate
> depiction of events observed by the Observation Point and metered by the
> Metering Process MUST be delivered to a Collecting Process OR an indication
> that the Metering Process didn't process the data reliably MUST be delivered
> to the collection process.
>
> Basically - that either of these messages MUST be delivered to the
> Collection
> Process.
>
> CRANE obviously supports this. CRANE imposes no constraints on the Metering
> Process. Therefore, it is the Metering Process' responsibility to indicate,
> perhaps with two different types of events whether it reliably metered or
> not.
> In fact, this indication MUST get to a Collection Process.
>
> I contest that NetFlow FAILS this requirement while CRANE nor Diameter fail
> this requirement. It is subject to debate on whether LFAP or IPDR meet this
> requirement or must be extended to meet this requirement.

This needs further explanation than what is presented in our netflow-eval-draft.
There are two scenarios (both are implementation specific)

1. flow metering process is implemented in such a way that on certain
overload conditions it will switch states from a) full flow accounting to
b) no-flow accounting. In state b) metering process maintain somekind of
counters which keep track of number of packets for which flow accountig
was not performed. I guess LFAB does in this fashion.

2. flow metering process is implemented in such a way that all packets
going through that observation point are always accounted. In case of
abnormal conditions packets may be dropped before any packet
forwarding process (here control has not even reached flow metering
process) can be done. I am not sure how CRANE can send this information to
collector????


Regarding the contest that Netflow "FAILS" this requirement, i would like
to point to Netflow on Cat6K which maintains counters in terms of packets
for netflow-cache misses due to overload conditions.This was primarily
used for debugging but with Netflow Version 9, using
option template we can send these counters to the collector. This meets
the requirement.

thanks
-vamsi




>
> Therefore, I ask you to reconsider your scoring of this important item.
>
> Tal
> ____________________________________________
>
> Tal Givoly
> Chief Scientist
> XACCT Technologies, Inc.
> 2900 Lakeside Drive
> Santa Clara, CA 95054
> http://www.xacct.com
>
> Direct:  408-330-5747
> Tel:     408-654-9900 x 5747
> Fax:     408-654-9904
> E-mail:  mailto:givoly@xacct.com
> ____________________________________________
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 15:34:12 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02301
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 15:34:11 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184R5B-0007Jp-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 14:22:21 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184R5A-0007Io-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 14:22:20 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9NJLgIn001455;
	Wed, 23 Oct 2002 12:21:42 -0700 (PDT)
Date: Wed, 23 Oct 2002 12:21:42 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Tal Givoly <givoly@xacct.com>
cc: Juergen Quittek <quittek@ccrle.nec.de>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDOEGGCPAA.givoly@xacct.com>
Message-ID: <Pine.GSO.4.44.0210231217410.12087-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>



On Wed, 23 Oct 2002, Tal Givoly wrote:

> Juergen,
>
> <snip>
> 5.1: Only LFAP already indicates lask of reliability
>      of the metering process. The other can be extended
>      to do so.
> <snip>
>
> Quoting from the requirements:
>
> 5.1.  Reliability
>
>    The metering process MUST either be reliable or missing reliability
>    MUST be known and indicated. The metering process is reliable if each
>    packet passing the observation point is metered according to the
>    configuration of the metering process. If, e.g. due to some overload,
>    not all passing packets can be included into the metering process,
>    then the metering process MUST be able to detect this failure and to
>    report about it.
>
> Tal> The way I interpret this requirement is is that EITHER an accurate
> depiction of events observed by the Observation Point and metered by the
> Metering Process MUST be delivered to a Collecting Process OR an indication
> that the Metering Process didn't process the data reliably MUST be delivered
> to the collection process.
>
> More concisely, that either of these messages MUST be delivered to the
> Collection Process.
>
> CRANE obviously supports this. CRANE imposes no constraints on the Metering
> Process. Therefore, it is the Metering Process' responsibility to indicate,
> perhaps with two different types of events whether it reliably metered or
> not. In fact, this indication MUST get to a Collection Process.
>
> I contest that NetFlow FAILS this requirement while CRANE nor Diameter fail
> this requirement. It is subject to debate on whether LFAP or IPDR meet this
> requirement or must be extended to meet this requirement.

Please see my previous email. Same explanation applies here.

-vamsi



>
> Therefore, I ask you to reconsider your scoring of this important item.
>
> Tal
> ____________________________________________
>
> Tal Givoly
> Chief Scientist
> XACCT Technologies, Inc.
> 2900 Lakeside Drive
> Santa Clara, CA 95054
> http://www.xacct.com
>
> Direct:  408-330-5747
> Tel:     408-654-9900 x 5747
> Fax:     408-654-9904
> E-mail:  mailto:givoly@xacct.com
> ____________________________________________
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 16:03:45 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA03500
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 16:03:45 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184Rd9-0000Ku-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 14:57:27 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184Rd7-0000Ji-00
	for ipfix-req@net.doit.wisc.edu; Wed, 23 Oct 2002 14:57:25 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9NJuks27964;
	Wed, 23 Oct 2002 12:56:46 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBA73W>; Wed, 23 Oct 2002 12:56:46 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04582DD7@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] List of open issues - Please post your comments
Date: Wed, 23 Oct 2002 12:56:45 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27ACE.508A24BC"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27ACE.508A24BC
Content-Type: text/plain;
	charset="iso-8859-1"

Folks on the list,

a lot of the open issues here have impact on the evaluation of the
protocols. If we do not reach a consensus we are going to be on this on-hold
position where we cannot complete the full evalation because the
requirements themselves are not completed.

So, if you have any opnion regarding these open issues, please speak up.

regards,

Reinaldo

> -----Original Message-----
> From: Juergen Quittek [mailto:quittek@ccrle.nec.de]
> Sent: Tuesday, October 22, 2002 2:25 AM
> To: ipfix-req@net.doit.wisc.edu
> Subject: [ipfix-req] list of issues
> 
> 
> Dear all,
> 
> Since the posting of the last requirements I-D, I took some
> 'vacation' from the ipfix list. Now I find that I missed
> participating in some very interesting discussions.
> 
> Below I try to summarize raised requriements issues.
> It might be incomplete. Please add issues I missed.
> 
> My intention is to check all issues and identify an already
> existing consensus, or to trigger completion of the discussion
> on these issues in order to get consesus soon.
> 
> If you want to contribute to the further discussion of these
> issues, please use separate emails per issues and please state
> the issue in the subject field. ("Re: list of issues" is not
> really helpful for continuing the MPLS label discussion).
> 
>     Juergen
> 
> 
> Reinaldo-1a: adding a VPN-ID attribute in section 6.1
> 
>     I think this is a good point. Still I have three questions:
>     - Would it be a MUST, a SHOULD, or a MAY?
>     - Shall we ask it to be required only where applicable (on devices
>       supporting VPN-IDs?
>     - Is it required too much for an IP meter? (see MPLS 
> label discussion)
> 
> Reinaldo-1b: export NATed flows (before and after)
> 
>     We already discussed this issue earlier this year and 
> decided to not
>     stating a requirement. However, it is already considered by the
>     information model I-D.
> 
> Reinaldo-2a: Add failover requirements, for example on the ability
>              to detect loss of connectivity with the collector and
>              trigger the appropriate action (eg. a switch over to
>              an alternate collector.)
> 
>     I haven't seen many responses on that. Is this a nice-to-have
>     or a MUST?
>     What would be appropriate actions?
>     Is the requirement just "do something senseful in case of
>     loosing a connection (or something like this) to the collector?
> 
> Reinaldo-2b: Add optional export of flow records to multiple 
> collectors
> 
>     This is already covered.
> 
> Reinaldo-2c: Add optional re-transmission of lost flow records.
> 
>     This should be part of the requirements discussion (see 
> Reinaldo-3).
> 
> Reinaldo-2d: Add: Exchange control information from the 
> collector, monitor
>              export process and detect any overload in the process of
>              exporting.
> 
>     I do not think, an exchange of control information from 
> the collector
>     is required.
> 
>     Monitoring the exporter and detecting overload is not explicitly
>     discussed, but implied in the reliability requirement ("indicate
>     missing reliability"). Is a clarification needed that for 
> indicating
>     missing reliability a detection of overload is required?
> 
> Reinaldo-3: Rephrase or modify Section 6.3.2. "Reliability"
> 
>     There was an extended discussion on this. Can one of the 
> participants
>     tell me what he considers to be the consensus concerning the new
>     phrasing.
> 
> Reinaldo-4: Add MUST requirement for exporting ICMP codes in 
> Section 6.1
> 
>     There were not many responses on this suggestion. Personally, I do
>     not consider it a MUST, but a nice-to-have.
> 
> Reinaldo-5: Remove Section 5.8. "Ignore Port Copy"?
> 
>     This is not a strong requirement. It's a nice-to-have.
>     Is there a consesus on either keeping or removing it?
> 
> Reinaldo-6: Section 6.6. "Anonymization"
> 
>     As far as I understood the discussion, there was a request to more
>     clearly state what kind/level of anonymization is required. I find
>     this hard to decide. Therefore, I suggest keeping the more vague
>     current version.
> 
> Simon-1: Drop MPLS label
> 
>    This covers two sections:
>        - Requiring the metering process to be able to 
> separate flows by the MPLS label
>        - requiring the ability to export the MPLS label or FEC
> 
>    It has been discussed controversially for a long time. I 
> still do not see
>    a clear consensus on this issue. Fortunaltely, I do not 
> see a considerable
>    impact on the protocol evaluation.
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C27ACE.508A24BC
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>List of open issues - Please post your comments</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Folks on the list,</FONT>
</P>

<P><FONT SIZE=3D2>a lot of the open issues here have impact on the =
evaluation of the protocols. If we do not reach a consensus we are =
going to be on this on-hold position where we cannot complete the full =
evalation because the requirements themselves are not =
completed.</FONT></P>

<P><FONT SIZE=3D2>So, if you have any opnion regarding these open =
issues, please speak up.</FONT>
</P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Juergen Quittek [<A =
HREF=3D"mailto:quittek@ccrle.nec.de">mailto:quittek@ccrle.nec.de</A>]</F=
ONT>
<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, October 22, 2002 2:25 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [ipfix-req] list of issues</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Dear all,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Since the posting of the last requirements I-D, =
I took some</FONT>
<BR><FONT SIZE=3D2>&gt; 'vacation' from the ipfix list. Now I find that =
I missed</FONT>
<BR><FONT SIZE=3D2>&gt; participating in some very interesting =
discussions.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Below I try to summarize raised requriements =
issues.</FONT>
<BR><FONT SIZE=3D2>&gt; It might be incomplete. Please add issues I =
missed.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; My intention is to check all issues and =
identify an already</FONT>
<BR><FONT SIZE=3D2>&gt; existing consensus, or to trigger completion of =
the discussion</FONT>
<BR><FONT SIZE=3D2>&gt; on these issues in order to get consesus =
soon.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; If you want to contribute to the further =
discussion of these</FONT>
<BR><FONT SIZE=3D2>&gt; issues, please use separate emails per issues =
and please state</FONT>
<BR><FONT SIZE=3D2>&gt; the issue in the subject field. (&quot;Re: list =
of issues&quot; is not</FONT>
<BR><FONT SIZE=3D2>&gt; really helpful for continuing the MPLS label =
discussion).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Juergen</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-1a: adding a VPN-ID attribute in =
section 6.1</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; I think this is a good =
point. Still I have three questions:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; - Would it be a MUST, a =
SHOULD, or a MAY?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; - Shall we ask it to be =
required only where applicable (on devices</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supporting =
VPN-IDs?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; - Is it required too =
much for an IP meter? (see MPLS </FONT>
<BR><FONT SIZE=3D2>&gt; label discussion)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-1b: export NATed flows (before and =
after)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; We already discussed =
this issue earlier this year and </FONT>
<BR><FONT SIZE=3D2>&gt; decided to not</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; stating a requirement. =
However, it is already considered by the</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; information model =
I-D.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2a: Add failover requirements, for =
example on the ability</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; to detect loss of connectivity with the collector =
and</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; trigger the appropriate action (eg. a switch over =
to</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; an alternate collector.)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; I haven't seen many =
responses on that. Is this a nice-to-have</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; or a MUST?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; What would be =
appropriate actions?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Is the requirement just =
&quot;do something senseful in case of</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; loosing a connection =
(or something like this) to the collector?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2b: Add optional export of flow =
records to multiple </FONT>
<BR><FONT SIZE=3D2>&gt; collectors</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; This is already =
covered.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2c: Add optional re-transmission of =
lost flow records.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; This should be part of =
the requirements discussion (see </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-3).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2d: Add: Exchange control information =
from the </FONT>
<BR><FONT SIZE=3D2>&gt; collector, monitor</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; export process and detect any overload in the =
process of</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; exporting.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; I do not think, an =
exchange of control information from </FONT>
<BR><FONT SIZE=3D2>&gt; the collector</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; is required.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Monitoring the exporter =
and detecting overload is not explicitly</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; discussed, but implied =
in the reliability requirement (&quot;indicate</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; missing =
reliability&quot;). Is a clarification needed that for </FONT>
<BR><FONT SIZE=3D2>&gt; indicating</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; missing reliability a =
detection of overload is required?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-3: Rephrase or modify Section 6.3.2. =
&quot;Reliability&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; There was an extended =
discussion on this. Can one of the </FONT>
<BR><FONT SIZE=3D2>&gt; participants</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; tell me what he =
considers to be the consensus concerning the new</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; phrasing.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-4: Add MUST requirement for exporting =
ICMP codes in </FONT>
<BR><FONT SIZE=3D2>&gt; Section 6.1</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; There were not many =
responses on this suggestion. Personally, I do</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; not consider it a MUST, =
but a nice-to-have.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-5: Remove Section 5.8. &quot;Ignore =
Port Copy&quot;?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; This is not a strong =
requirement. It's a nice-to-have.</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Is there a consesus on =
either keeping or removing it?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-6: Section 6.6. =
&quot;Anonymization&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; As far as I understood =
the discussion, there was a request to more</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; clearly state what =
kind/level of anonymization is required. I find</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; this hard to decide. =
Therefore, I suggest keeping the more vague</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; current version.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Simon-1: Drop MPLS label</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; This covers two =
sections:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; - =
Requiring the metering process to be able to </FONT>
<BR><FONT SIZE=3D2>&gt; separate flows by the MPLS label</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; - =
requiring the ability to export the MPLS label or FEC</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; It has been discussed =
controversially for a long time. I </FONT>
<BR><FONT SIZE=3D2>&gt; still do not see</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; a clear consensus on this =
issue. Fortunaltely, I do not </FONT>
<BR><FONT SIZE=3D2>&gt; see a considerable</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; impact on the protocol =
evaluation.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27ACE.508A24BC--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 16:04:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA03513
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 16:04:09 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184RX0-0000AI-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 14:51:06 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184RWx-00009L-00
	for ipfix-req@net.doit.wisc.edu; Wed, 23 Oct 2002 14:51:03 -0500
Received: from zrc2s0jx.nortelnetworks.com (zrc2s0jx.nortelnetworks.com [47.103.122.112])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9NJoVs26775;
	Wed, 23 Oct 2002 12:50:31 -0700 (PDT)
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9NJogQ21079;
	Wed, 23 Oct 2002 14:50:43 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBA7L0>; Wed, 23 Oct 2002 12:50:28 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04582DC3@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: RE: [ipfix-req] list of issues - Reinaldo-6
Date: Wed, 23 Oct 2002 12:50:27 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27ACD.6F56259A"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27ACD.6F56259A
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

This is Sebastian proposal based on our thread. The only issue I have =
is
that there is no such thing as partial anonymization. There only is
anonymization and partial disclosure of information. Just a little =
change of
words but I think it makes a significant difference.

Besides that I think Sebastian text should be included on the =
requirements
draft.=20

> -----Original Message-----
> From: Sebastian Zander [mailto:zander@fokus.gmd.de]
> Sent: Thursday, October 10, 2002 1:38 AM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: Tanja Zseby; Benoit Claise; J=FCrgen Quittek
> Subject: Re: [ipfix-req] IPFIX Requirement draft status - section 6.6
>=20
>=20
> Reinaldo,
>=20
> I completly agree with you that using a bigger prefix does not =
provide
> complete anonymization. Actually what your proposing is adding a
> statement like "It MUST NOT be possible for someone besides the =
entity
> which anonymizes the data to derive information from the anonymized
> attribute(s) which can be used for partial or complete=20
> identification."
> Would be fine with me to add something like this. But somebody might
> pop up demanding something like partial anonymization... As=20
> an alternative
> we could define anonymization in the terminology.
>=20
> But an advocacy draft can always claim to comply to req X by=20
> doing Y and
> if you think Y is not a proper solution for X please post it=20
> to the eval
> team and the list.
>=20
> Cheers,
>=20
> Sebastian




> -----Original Message-----
> From: Juergen Quittek [mailto:quittek@ccrle.nec.de]
> Sent: Tuesday, October 22, 2002 2:25 AM
> To: ipfix-req@net.doit.wisc.edu
> Subject: [ipfix-req] list of issues
>=20
>=20
> Dear all,
>=20
> Since the posting of the last requirements I-D, I took some
> 'vacation' from the ipfix list. Now I find that I missed
> participating in some very interesting discussions.
>=20
> Below I try to summarize raised requriements issues.
> It might be incomplete. Please add issues I missed.
>=20
> My intention is to check all issues and identify an already
> existing consensus, or to trigger completion of the discussion
> on these issues in order to get consesus soon.
>=20
> If you want to contribute to the further discussion of these
> issues, please use separate emails per issues and please state
> the issue in the subject field. ("Re: list of issues" is not
> really helpful for continuing the MPLS label discussion).
>=20
>     Juergen
>=20
>=20
> Reinaldo-1a: adding a VPN-ID attribute in section 6.1
>=20
>     I think this is a good point. Still I have three questions:
>     - Would it be a MUST, a SHOULD, or a MAY?
>     - Shall we ask it to be required only where applicable (on =
devices
>       supporting VPN-IDs?
>     - Is it required too much for an IP meter? (see MPLS=20
> label discussion)
>=20
> Reinaldo-1b: export NATed flows (before and after)
>=20
>     We already discussed this issue earlier this year and=20
> decided to not
>     stating a requirement. However, it is already considered by the
>     information model I-D.
>=20
> Reinaldo-2a: Add failover requirements, for example on the ability
>              to detect loss of connectivity with the collector and
>              trigger the appropriate action (eg. a switch over to
>              an alternate collector.)
>=20
>     I haven't seen many responses on that. Is this a nice-to-have
>     or a MUST?
>     What would be appropriate actions?
>     Is the requirement just "do something senseful in case of
>     loosing a connection (or something like this) to the collector?
>=20
> Reinaldo-2b: Add optional export of flow records to multiple=20
> collectors
>=20
>     This is already covered.
>=20
> Reinaldo-2c: Add optional re-transmission of lost flow records.
>=20
>     This should be part of the requirements discussion (see=20
> Reinaldo-3).
>=20
> Reinaldo-2d: Add: Exchange control information from the=20
> collector, monitor
>              export process and detect any overload in the process of
>              exporting.
>=20
>     I do not think, an exchange of control information from=20
> the collector
>     is required.
>=20
>     Monitoring the exporter and detecting overload is not explicitly
>     discussed, but implied in the reliability requirement ("indicate
>     missing reliability"). Is a clarification needed that for=20
> indicating
>     missing reliability a detection of overload is required?
>=20
> Reinaldo-3: Rephrase or modify Section 6.3.2. "Reliability"
>=20
>     There was an extended discussion on this. Can one of the=20
> participants
>     tell me what he considers to be the consensus concerning the new
>     phrasing.
>=20
> Reinaldo-4: Add MUST requirement for exporting ICMP codes in=20
> Section 6.1
>=20
>     There were not many responses on this suggestion. Personally, I =
do
>     not consider it a MUST, but a nice-to-have.
>=20
> Reinaldo-5: Remove Section 5.8. "Ignore Port Copy"?
>=20
>     This is not a strong requirement. It's a nice-to-have.
>     Is there a consesus on either keeping or removing it?
>=20
> Reinaldo-6: Section 6.6. "Anonymization"
>=20
>     As far as I understood the discussion, there was a request to =
more
>     clearly state what kind/level of anonymization is required. I =
find
>     this hard to decide. Therefore, I suggest keeping the more vague
>     current version.
>=20
> Simon-1: Drop MPLS label
>=20
>    This covers two sections:
>        - Requiring the metering process to be able to=20
> separate flows by the MPLS label
>        - requiring the ability to export the MPLS label or FEC
>=20
>    It has been discussed controversially for a long time. I=20
> still do not see
>    a clear consensus on this issue. Fortunaltely, I do not=20
> see a considerable
>    impact on the protocol evaluation.
>=20
>=20
>=20
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help"=20
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>=20

------_=_NextPart_001_01C27ACD.6F56259A
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] list of issues - Reinaldo-6</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>This is Sebastian proposal based on our thread. The =
only issue I have is that there is no such thing as partial =
anonymization. There only is anonymization and partial disclosure of =
information. Just a little change of words but I think it makes a =
significant difference.</FONT></P>

<P><FONT SIZE=3D2>Besides that I think Sebastian text should be =
included on the requirements draft. </FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Sebastian Zander [<A =
HREF=3D"mailto:zander@fokus.gmd.de">mailto:zander@fokus.gmd.de</A>]</FON=
T>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 10, 2002 1:38 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Tanja Zseby; Benoit Claise; J=FCrgen =
Quittek</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] IPFIX Requirement =
draft status - section 6.6</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I completly agree with you that using a bigger =
prefix does not provide</FONT>
<BR><FONT SIZE=3D2>&gt; complete anonymization. Actually what your =
proposing is adding a</FONT>
<BR><FONT SIZE=3D2>&gt; statement like &quot;It MUST NOT be possible =
for someone besides the entity</FONT>
<BR><FONT SIZE=3D2>&gt; which anonymizes the data to derive information =
from the anonymized</FONT>
<BR><FONT SIZE=3D2>&gt; attribute(s) which can be used for partial or =
complete </FONT>
<BR><FONT SIZE=3D2>&gt; identification.&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; Would be fine with me to add something like =
this. But somebody might</FONT>
<BR><FONT SIZE=3D2>&gt; pop up demanding something like partial =
anonymization... As </FONT>
<BR><FONT SIZE=3D2>&gt; an alternative</FONT>
<BR><FONT SIZE=3D2>&gt; we could define anonymization in the =
terminology.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; But an advocacy draft can always claim to =
comply to req X by </FONT>
<BR><FONT SIZE=3D2>&gt; doing Y and</FONT>
<BR><FONT SIZE=3D2>&gt; if you think Y is not a proper solution for X =
please post it </FONT>
<BR><FONT SIZE=3D2>&gt; to the eval</FONT>
<BR><FONT SIZE=3D2>&gt; team and the list.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Cheers,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Sebastian</FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Juergen Quittek [<A =
HREF=3D"mailto:quittek@ccrle.nec.de">mailto:quittek@ccrle.nec.de</A>]</F=
ONT>
<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, October 22, 2002 2:25 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [ipfix-req] list of issues</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Dear all,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Since the posting of the last requirements I-D, =
I took some</FONT>
<BR><FONT SIZE=3D2>&gt; 'vacation' from the ipfix list. Now I find that =
I missed</FONT>
<BR><FONT SIZE=3D2>&gt; participating in some very interesting =
discussions.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Below I try to summarize raised requriements =
issues.</FONT>
<BR><FONT SIZE=3D2>&gt; It might be incomplete. Please add issues I =
missed.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; My intention is to check all issues and =
identify an already</FONT>
<BR><FONT SIZE=3D2>&gt; existing consensus, or to trigger completion of =
the discussion</FONT>
<BR><FONT SIZE=3D2>&gt; on these issues in order to get consesus =
soon.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; If you want to contribute to the further =
discussion of these</FONT>
<BR><FONT SIZE=3D2>&gt; issues, please use separate emails per issues =
and please state</FONT>
<BR><FONT SIZE=3D2>&gt; the issue in the subject field. (&quot;Re: list =
of issues&quot; is not</FONT>
<BR><FONT SIZE=3D2>&gt; really helpful for continuing the MPLS label =
discussion).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Juergen</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-1a: adding a VPN-ID attribute in =
section 6.1</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; I think this is a good =
point. Still I have three questions:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; - Would it be a MUST, a =
SHOULD, or a MAY?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; - Shall we ask it to be =
required only where applicable (on devices</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; supporting =
VPN-IDs?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; - Is it required too =
much for an IP meter? (see MPLS </FONT>
<BR><FONT SIZE=3D2>&gt; label discussion)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-1b: export NATed flows (before and =
after)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; We already discussed =
this issue earlier this year and </FONT>
<BR><FONT SIZE=3D2>&gt; decided to not</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; stating a requirement. =
However, it is already considered by the</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; information model =
I-D.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2a: Add failover requirements, for =
example on the ability</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; to detect loss of connectivity with the collector =
and</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; trigger the appropriate action (eg. a switch over =
to</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; an alternate collector.)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; I haven't seen many =
responses on that. Is this a nice-to-have</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; or a MUST?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; What would be =
appropriate actions?</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Is the requirement just =
&quot;do something senseful in case of</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; loosing a connection =
(or something like this) to the collector?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2b: Add optional export of flow =
records to multiple </FONT>
<BR><FONT SIZE=3D2>&gt; collectors</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; This is already =
covered.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2c: Add optional re-transmission of =
lost flow records.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; This should be part of =
the requirements discussion (see </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-3).</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-2d: Add: Exchange control information =
from the </FONT>
<BR><FONT SIZE=3D2>&gt; collector, monitor</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; export process and detect any overload in the =
process of</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; exporting.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; I do not think, an =
exchange of control information from </FONT>
<BR><FONT SIZE=3D2>&gt; the collector</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; is required.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Monitoring the exporter =
and detecting overload is not explicitly</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; discussed, but implied =
in the reliability requirement (&quot;indicate</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; missing =
reliability&quot;). Is a clarification needed that for </FONT>
<BR><FONT SIZE=3D2>&gt; indicating</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; missing reliability a =
detection of overload is required?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-3: Rephrase or modify Section 6.3.2. =
&quot;Reliability&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; There was an extended =
discussion on this. Can one of the </FONT>
<BR><FONT SIZE=3D2>&gt; participants</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; tell me what he =
considers to be the consensus concerning the new</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; phrasing.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-4: Add MUST requirement for exporting =
ICMP codes in </FONT>
<BR><FONT SIZE=3D2>&gt; Section 6.1</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; There were not many =
responses on this suggestion. Personally, I do</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; not consider it a MUST, =
but a nice-to-have.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-5: Remove Section 5.8. &quot;Ignore =
Port Copy&quot;?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; This is not a strong =
requirement. It's a nice-to-have.</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Is there a consesus on =
either keeping or removing it?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Reinaldo-6: Section 6.6. =
&quot;Anonymization&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; As far as I understood =
the discussion, there was a request to more</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; clearly state what =
kind/level of anonymization is required. I find</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; this hard to decide. =
Therefore, I suggest keeping the more vague</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; current version.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Simon-1: Drop MPLS label</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; This covers two =
sections:</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; - =
Requiring the metering process to be able to </FONT>
<BR><FONT SIZE=3D2>&gt; separate flows by the MPLS label</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; - =
requiring the ability to export the MPLS label or FEC</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; It has been discussed =
controversially for a long time. I </FONT>
<BR><FONT SIZE=3D2>&gt; still do not see</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; a clear consensus on this =
issue. Fortunaltely, I do not </FONT>
<BR><FONT SIZE=3D2>&gt; see a considerable</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; impact on the protocol =
evaluation.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27ACD.6F56259A--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 16:34:57 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA04580
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 16:34:56 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184S7n-0001Gj-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 15:29:07 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184S7l-0001Fi-00
	for ipfix-req@net.doit.wisc.edu; Wed, 23 Oct 2002 15:29:05 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9NKSQs03413;
	Wed, 23 Oct 2002 13:28:26 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBA7YC>; Wed, 23 Oct 2002 13:28:26 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04582E4F@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Date: Wed, 23 Oct 2002 13:28:25 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27AD2.BD1C97E6"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27AD2.BD1C97E6
Content-Type: text/plain;
	charset="iso-8859-1"

I think Carter's proposal (about opaque blobs) should be included on the
requirements draft.

I'm reposting it here since although we discussed on the eval list, IMO we
should put the text formally on the requiments draft. 

regards,

Reinaldo

> -----Original Message-----
> From: Carter Bullard [mailto:carter@qosient.com]
> Sent: Tuesday, October 22, 2002 8:17 AM
> To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Juergen's conclusions
> 
> 
> Hey Juergen,
> > 
> > Juergen's Conclusion
> >
> [snip]
> > 
> > Considering all this I would recommend to go for NetFlow v9. 
> > If this is not accepted because NetFlow is considered as too 
> > simple or lacking functionality, I would recommend using IDPR.
> >
> 
> While I like the IPDR data representation strategy and formats,
> I see IPDR as a data model, providing a format for communicating
> flow activity reports that a probe can generate.  But I don't
> see how IPDR is a transport protocol.
> 
> My opinion is that IPFIX MUST be able to transport IPDR data,
> it MUST also be able to transport native NetFlow v[1-9] data
> as well.  That to me indicates that the appropriate data model
> is either a superset of all the candidates, so that IPFIX can
> handle all the data types, or the transport protocol supports
> an opaque data object, so that vendors can transport their
> native records as blobs.  NetFlow doesn't support either
> strategy.  IPDR may be able to be the superset, but its doesn't
> support an opaque blob.
> 
> While vendors will assure us that their methods can be extended,
> I won't feel comfortable making a choice until the vendors 
> demonstrate how their methods can handle the requirements.
> 
> 
> Carter
> 
> Carter Bullard
> QoSient, LLC
> 300 E. 56th Street, Suite 18K
> New York, New York  10022
> 
> carter@qosient.com
> Phone +1 212 588-9133
> Fax   +1 212 588-9134
> http://qosient.com

------_=_NextPart_001_01C27AD2.BD1C97E6
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE> list of issues - Reinaldo - 7 (or Carter -1)</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I think Carter's proposal (about opaque blobs) should =
be included on the requirements draft.</FONT>
</P>

<P><FONT SIZE=3D2>I'm reposting it here since although we discussed on =
the eval list, IMO we should put the text formally on the requiments =
draft. </FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Carter Bullard [<A =
HREF=3D"mailto:carter@qosient.com">mailto:carter@qosient.com</A>]</FONT>=

<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, October 22, 2002 8:17 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: 'Juergen Quittek'; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: RE: [ipfix-eval] Juergen's =
conclusions</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Hey Juergen,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Juergen's Conclusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; [snip]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Considering all this I would recommend to =
go for NetFlow v9. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; If this is not accepted because NetFlow is =
considered as too </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; simple or lacking functionality, I would =
recommend using IDPR.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; While I like the IPDR data representation =
strategy and formats,</FONT>
<BR><FONT SIZE=3D2>&gt; I see IPDR as a data model, providing a format =
for communicating</FONT>
<BR><FONT SIZE=3D2>&gt; flow activity reports that a probe can =
generate.&nbsp; But I don't</FONT>
<BR><FONT SIZE=3D2>&gt; see how IPDR is a transport protocol.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; My opinion is that IPFIX MUST be able to =
transport IPDR data,</FONT>
<BR><FONT SIZE=3D2>&gt; it MUST also be able to transport native =
NetFlow v[1-9] data</FONT>
<BR><FONT SIZE=3D2>&gt; as well.&nbsp; That to me indicates that the =
appropriate data model</FONT>
<BR><FONT SIZE=3D2>&gt; is either a superset of all the candidates, so =
that IPFIX can</FONT>
<BR><FONT SIZE=3D2>&gt; handle all the data types, or the transport =
protocol supports</FONT>
<BR><FONT SIZE=3D2>&gt; an opaque data object, so that vendors can =
transport their</FONT>
<BR><FONT SIZE=3D2>&gt; native records as blobs.&nbsp; NetFlow doesn't =
support either</FONT>
<BR><FONT SIZE=3D2>&gt; strategy.&nbsp; IPDR may be able to be the =
superset, but its doesn't</FONT>
<BR><FONT SIZE=3D2>&gt; support an opaque blob.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; While vendors will assure us that their methods =
can be extended,</FONT>
<BR><FONT SIZE=3D2>&gt; I won't feel comfortable making a choice until =
the vendors </FONT>
<BR><FONT SIZE=3D2>&gt; demonstrate how their methods can handle the =
requirements.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Carter</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Carter Bullard</FONT>
<BR><FONT SIZE=3D2>&gt; QoSient, LLC</FONT>
<BR><FONT SIZE=3D2>&gt; 300 E. 56th Street, Suite 18K</FONT>
<BR><FONT SIZE=3D2>&gt; New York, New York&nbsp; 10022</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; carter@qosient.com</FONT>
<BR><FONT SIZE=3D2>&gt; Phone +1 212 588-9133</FONT>
<BR><FONT SIZE=3D2>&gt; Fax&nbsp;&nbsp; +1 212 588-9134</FONT>
<BR><FONT SIZE=3D2>&gt; <A HREF=3D"http://qosient.com" =
TARGET=3D"_blank">http://qosient.com</A></FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27AD2.BD1C97E6--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Wed Oct 23 18:11:55 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA07042
	for <ipfix-archive@lists.ietf.org>; Wed, 23 Oct 2002 18:11:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184TW5-0003dg-00
	for ipfix-list@mil.doit.wisc.edu; Wed, 23 Oct 2002 16:58:17 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184TW4-0003dJ-00
	for ipfix-eval@net.doit.wisc.edu; Wed, 23 Oct 2002 16:58:16 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9NLvcIn010257;
	Wed, 23 Oct 2002 14:57:39 -0700 (PDT)
Date: Wed, 23 Oct 2002 14:57:38 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Tal Givoly <givoly@xacct.com>
cc: Juergen Quittek <quittek@ccrle.nec.de>, <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs. Overload
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDMEGDCPAA.givoly@xacct.com>
Message-ID: <Pine.GSO.4.44.0210231426040.12087-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Tal,
  Please see inline

On Wed, 23 Oct 2002, Tal Givoly wrote:

> Juergen,
>
> <snip>
> 5.2: CRANE, IPDR, Diameter does not address overload behavior.
>      But they can be extended to report on it.
> <snip>
>
> I believe there may be a typo - you mention "5.2 overload behavior", however
> 5.2 is, in fact, sampling behavior. Which did you mean that you differ with
> compared to Simon's review?
>
> Regarding Sampling Behavior (and this is in response to both your
> evaluations
> as well as Simon's), both evaluations conclude that that CRANE Fails to meet
> this requirement.
>
> CRANE clearly allows distinguishing between sampled data and non-sampled
> data.
> As CRANE, similarly to IPDR and Diameter, doesn't impose any restrictions
> on the Metering Process, the latter can easily submit sampled data in
> a dedicated Template. Even if you consider that there is no intrinsic
> support
> specifically for Sampling Behavior within the protocol itself, it is
> definitely
> Extendable to that degree, would you not agree?
>
>
> On the other hand, I don't quite understand how NetFlow v9 actually supports
> multiple concurrent Templates by the same Export Process. As NetFlow v9
> Templates are indistinguishable (they are changed rapidly and not negotiated
> with no uniquely describing attributes!). Therefore, NetFlow v9 cannot
> support both sampled and non-sampled mode of operations in any
> combination - a requirement that is implied by the Sampling Requirement
> (for at least some length of overlap time).

Every Template has an associated ID. Each template identifies unique set
of attributes. For packets accounted through Sampling mechanism we create
a new Template with an additional attribute called "Sampler ID". This
"Sampler ID" uniquely identifies set of Sampling attributes (Sampling
rate, Sampling algorithm etc). These sampling attributes mapped to ID are
sent in the form of option templates to the collector. Collector will map Sampling
ID to it's corresponding Option data which contains specific values
of sampling attributes which will give an idea of type of
sampling performed on that flow. If there are changes to Sampling
attributes we create new Option templates with new IDs and send to the
collector before any data corresponding to that Sampling mechanism is
exported to collector. We can do this on the fly. We need not exchange
these Template before we start Netflow accounting on the box. In short if
Metering process is doing Sampling and non-sampling of data, there exists
two templates which will uniquely identify Sampled and non-sampled flows.

Some more information:
Flows can have only IPV4, or IPV4 + BGP related, or IPV4+BGP + Multicast,
or IPV4+Multicast, or IPV6, or MPLS, or IPV6+Multicast, sampled .......

So there are lot of possible combinations, we create Template only when we
see these combinations and do not negatiate all these combinations before
hand. If the Collector can understand these attributes then our mechanism
is much more flexible.

>
> Perhaps this question should be directed to the NetFlow protocol advocate:
>
> - How can multiple Templates coexist?

Multiple Templates will exist because the attribute set is different. One
with Sampler ID and one without.


> - If, in fact, it is possible for multiple Templates to coexist, please
>   elaborate how are these distinguished by recipients based on the current
>   protocol draft?

Please see above explanation. On CCO you will find new Sampling related
Field Types, if not then they are in the process of updation.

>
>   For instance, how would a Collection Process differentiate between sampled
>   and non-sampled data? How would this be done if both are being exported
>   concurrently?

Presence of "sampler ID" attribute will differenciate Sampled from
non-sampled Data.

thanks
-vamsi

>
> Thanks for any clarification.
>
> Tal
>
>
>
> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> Of Juergen Quittek
> Sent: Tuesday, October 22, 2002 7:08 AM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: [ipfix-eval] Simon's and Ram's evaluations
>
>
> Dear all,
>
> I agree almost completely with Simons evaluation. In Ram's
> evaluation I like the classification of compliancy per item.
> Maybe it can be formatted a bit more compact, for example:
>
>   "3.1.1.Reliability (5.1)
>
>       LFAP: T     CRANE: E     IDPR: E     NetFlow: E     Diameter: E"
>
>
> In the conclusion section I think a table summarizing the
> classification would be helpful. I put my evaluation into an example
> for such a table below. It is almost completely consistent with Simon's
> evaluation and has a few differences to Ram's one:
>
>    LFAP   CRANE  IDPR   Net-   Dia-
>                         Flow   meter
>     T      E      E      E      E     Reliability (5.1)
>     E      F      F      T      E     Sampling (5.2)
>     T      E      E      T      E     Overload Behavior (5.3)
>     T      T      T      T      T     Timestamps (5.4)
>     T      T      E      T      T     Time Synchronization (5.5)
>     T      T      E      T      T     Flow Expiration (5.6)
>     ?      ?      ?      ?      ?     Multicast Flows (5.7)
>     ?      ?      ?      ?      ?     Ignore Port Copy (5.8)
>     T      T      T      T      T     Information Model (6.1)
>     T      T      T      T      T     Data Model (6.2)
>     T      T      T      T      T     Congestion Awareness (6.3.1)
>     T      T      T      P      T     Reliability (6.3.2)
>     T      T      T      P      T     Security (6.3.3)
>     T      T      T      T      T     Push Mode Reporting (6.4)
>     F      F      E      F      E     Pull Mode Reporting (6.4)
>     T      T      T      T      T     Regular Report. Interval (6.5)
>     T      T      T      T      T     Notif. on Specif. Events (6.6)
>     E      E      E      E      E     Anonymization (6.7)
>     T      T      T      T      T     Openness (8.1)
>     T      T      T      T      T     Scalability (8.2)
>     T      T      P      T      T     Several Collecting Proc (8.2)
> -------------------------------------------------------------------
>    16     14     11     14     14     number of Ts
>     2      3      6      2      5     number of Es
>     0      0      1      2      0     number of Ps
>     1      2      1      1      0     number of Fs
>
> Comments (comparing to Ram's and Simon's evaluation):
> 5.1: Only LFAP already indicates lask of reliability
>      of the metering process. The other can be extended
>      to do so.
> 5.2: CRANE, IPDR, Diameter does not address overload behavior.
>      But they can be extended to report on it.
>
>
> Juergen's Conclusion
>
> My view is a bit bit biased, because it is the view of one having to
> implement the protocol on devices. Therefore, I give more weight than
> others might do to the cost of the implementation, the consumption of
> processing power and the memory consumption.
>
> Therefore, I estimate simple approaches. And NetFlow is the most simple
> one. Also I learned that simplicity increases reliability (or safety
> of design and implementation).
>
> I am not sure whether or not I could build a compatible implementation of
> CRANE or LFAP that just ignores all configuration messages received from
> a collector.
>
> If we go for a more complex prototcol, there is the choice between
> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> more general Diameter on the other side. Diameter would be in favor
> if it was used widely already and anyway be implemented on most boxes.
> Since this is not the case I would go for problem-psecific protocols.
>
> Concerning the produced flows, I clearly prefer the efficient NetFlow,
> IPDR, and CRANE to LFAP and Diameter.
>
> The item level comparison did not show a clear winner.
>
> Considering all this I would recommend to go for NetFlow v9. If this
> is not accepted because NetFlow is considered as too simple or lacking
> functionality, I would recommend using IDPR.
>
>     Juergen
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 10:28:43 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA09645
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 10:28:43 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184iqe-0003KL-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 09:20:32 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184iqd-0003JD-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 09:20:31 -0500
Received: from riverstonenet.com ([134.141.180.93]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Thu, 24 Oct 2002 07:19:58 -0700
Message-ID: <3DB80115.620A7CB3@riverstonenet.com>
Date: Thu, 24 Oct 2002 10:17:57 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
References: <7B802811BE77D51189910002A55CFD2C04582E4F@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 24 Oct 2002 14:19:59.0302 (UTC) FILETIME=[6F3F2660:01C27B68]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Reinaldo Penno wrote:
> 
> I think Carter's proposal (about opaque blobs) should be included on
> the requirements draft.
> 

	
	Carter seems to be proposing using opaque blobs to send native netflow
	records or native IPDR records or native vendor xyz records.

	Someone needs to explain to me why we want to do that.

	How do you build any useful applications when opaque blobs are sent?
	Yes you can send them, yes you can pull the string from the message
	but then what? Most likely you end up with proprietary information
	being sent and proprietary applications making use of it. The fact
	that some standard was used to deliver it doesn't help in any way.
	Might was well use raw tcp and a well-known port number.

	What am I missing?

	Paul


> I'm reposting it here since although we discussed on the eval list,
> IMO we should put the text formally on the requiments draft.
> 
> regards,
> 
> Reinaldo
> 
> > -----Original Message-----
> > From: Carter Bullard [mailto:carter@qosient.com]
> > Sent: Tuesday, October 22, 2002 8:17 AM
> > To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
> > Subject: RE: [ipfix-eval] Juergen's conclusions
> >
> >
> > Hey Juergen,
> > >
> > > Juergen's Conclusion
> > >
> > [snip]
> > >
> > > Considering all this I would recommend to go for NetFlow v9.
> > > If this is not accepted because NetFlow is considered as too
> > > simple or lacking functionality, I would recommend using IDPR.
> > >
> >
> > While I like the IPDR data representation strategy and formats,
> > I see IPDR as a data model, providing a format for communicating
> > flow activity reports that a probe can generate.  But I don't
> > see how IPDR is a transport protocol.
> >
> > My opinion is that IPFIX MUST be able to transport IPDR data,
> > it MUST also be able to transport native NetFlow v[1-9] data
> > as well.  That to me indicates that the appropriate data model
> > is either a superset of all the candidates, so that IPFIX can
> > handle all the data types, or the transport protocol supports
> > an opaque data object, so that vendors can transport their
> > native records as blobs.  NetFlow doesn't support either
> > strategy.  IPDR may be able to be the superset, but its doesn't
> > support an opaque blob.
> >
> > While vendors will assure us that their methods can be extended,
> > I won't feel comfortable making a choice until the vendors
> > demonstrate how their methods can handle the requirements.
> >
> >
> > Carter
> >
> > Carter Bullard
> > QoSient, LLC
> > 300 E. 56th Street, Suite 18K
> > New York, New York  10022
> >
> > carter@qosient.com
> > Phone +1 212 588-9133
> > Fax   +1 212 588-9134
> > http://qosient.com

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 15:04:18 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA19996
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 15:04:17 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184n8d-0003nZ-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 13:55:23 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184n8a-0003nO-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 13:55:20 -0500
Received: (qmail 4678 invoked from network); 24 Oct 2002 18:55:14 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 24 Oct 2002 18:55:14 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9OIwhu19289;
	Thu, 24 Oct 2002 11:58:44 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Reinaldo Penno" <rpenno@nortelnetworks.com>,
        "Juergen Quittek" <quittek@ccrle.nec.de>
Cc: <ipfix-req@net.doit.wisc.edu>
Subject: RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Date: Thu, 24 Oct 2002 11:55:14 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDCEHOCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_00E3_01C27B54.36ED5CF0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <7B802811BE77D51189910002A55CFD2C04582E4F@zsc3c032.us.nortel.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This is a multi-part message in MIME format.

------=_NextPart_000_00E3_01C27B54.36ED5CF0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

list of issues - Reinaldo - 7 (or Carter -1)Reinaldo,

I agree.

Even though opaque BLOBs provide little value as a standard attribute,
extensions that include the ability to provide BLOBs are necessary, I
believe. For instance, if a future or vendor extension provides MPLS paths
or AS paths, this would allow doing so. Another extension would be to
provide more raw statistics for diagnosis - these may be proprietary
extensions. BLOBs also provide the ability to send packed arrays of
attributes that are well-defined. So it may be clearly understood from the
standard, or extensions thereof, what this BLOB means and how it is to be
processed - but the essense of being able to transport a BLOB should be a
MUST requirement.

Regards,

Tal
-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf Of
Reinaldo Penno
Sent: Wednesday, October 23, 2002 1:28 PM
To: Juergen Quittek; ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)


  I think Carter's proposal (about opaque blobs) should be included on the
requirements draft.

  I'm reposting it here since although we discussed on the eval list, IMO we
should put the text formally on the requiments draft.

  regards,

  Reinaldo

  > -----Original Message-----
  > From: Carter Bullard [mailto:carter@qosient.com]
  > Sent: Tuesday, October 22, 2002 8:17 AM
  > To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
  > Subject: RE: [ipfix-eval] Juergen's conclusions
  >
  >
  > Hey Juergen,
  > >
  > > Juergen's Conclusion
  > >
  > [snip]
  > >
  > > Considering all this I would recommend to go for NetFlow v9.
  > > If this is not accepted because NetFlow is considered as too
  > > simple or lacking functionality, I would recommend using IDPR.
  > >
  >
  > While I like the IPDR data representation strategy and formats,
  > I see IPDR as a data model, providing a format for communicating
  > flow activity reports that a probe can generate.  But I don't
  > see how IPDR is a transport protocol.
  >
  > My opinion is that IPFIX MUST be able to transport IPDR data,
  > it MUST also be able to transport native NetFlow v[1-9] data
  > as well.  That to me indicates that the appropriate data model
  > is either a superset of all the candidates, so that IPFIX can
  > handle all the data types, or the transport protocol supports
  > an opaque data object, so that vendors can transport their
  > native records as blobs.  NetFlow doesn't support either
  > strategy.  IPDR may be able to be the superset, but its doesn't
  > support an opaque blob.
  >
  > While vendors will assure us that their methods can be extended,
  > I won't feel comfortable making a choice until the vendors
  > demonstrate how their methods can handle the requirements.
  >
  >
  > Carter
  >
  > Carter Bullard
  > QoSient, LLC
  > 300 E. 56th Street, Suite 18K
  > New York, New York  10022
  >
  > carter@qosient.com
  > Phone +1 212 588-9133
  > Fax   +1 212 588-9134
  > http://qosient.com


------=_NextPart_000_00E3_01C27B54.36ED5CF0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>list of issues - Reinaldo - 7 (or Carter -1)</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2716.2200" name=3DGENERATOR></HEAD>
<BODY>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2>Reinaldo,</FONT></SPAN></DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =
size=3D2>I=20
agree. </FONT></SPAN></DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =
size=3D2>Even=20
though opaque BLOBs provide little value as a standard attribute, =
extensions=20
that include the ability to provide BLOBs are necessary, I believe. For=20
instance, if a future or vendor extension provides MPLS paths or AS =
paths, this=20
would allow doing so. Another extension would be to provide more raw =
statistics=20
for diagnosis - these may be proprietary extensions. BLOBs also provide =
the=20
ability to send packed arrays of attributes that are well-defined. So it =
may be=20
clearly understood from the standard, or extensions thereof, what this =
BLOB=20
means and how it is to be processed - but the essense of being able to =
transport=20
a BLOB should be a MUST requirement.</FONT></SPAN></DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2>Regards,</FONT></SPAN></DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D908370322-23102002><FONT face=3DArial color=3D#0000ff =

size=3D2>Tal</FONT></SPAN></DIV>
<DIV><SPAN class=3D908370322-23102002></SPAN><FONT face=3DTahoma=20
size=3D2>-----Original Message-----<BR><B>From:</B> majordomo listserver =

[mailto:majordomo@mil.doit.wisc.edu]<B>On Behalf Of </B>Reinaldo=20
Penno<BR><B>Sent:</B> Wednesday, October 23, 2002 1:28 PM<BR><B>To:</B> =
Juergen=20
Quittek; ipfix-req@net.doit.wisc.edu<BR><B>Subject:</B> [ipfix-req] list =
of=20
issues - Reinaldo - 7 (or Carter -1)<BR><BR></DIV></FONT>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
  <P><FONT size=3D2>I think Carter's proposal (about opaque blobs) =
should be=20
  included on the requirements draft.</FONT> </P>
  <P><FONT size=3D2>I'm reposting it here since although we discussed on =
the eval=20
  list, IMO we should put the text formally on the requiments draft. =
</FONT></P>
  <P><FONT size=3D2>regards,</FONT> </P>
  <P><FONT size=3D2>Reinaldo</FONT> </P>
  <P><FONT size=3D2>&gt; -----Original Message-----</FONT> <BR><FONT =
size=3D2>&gt;=20
  From: Carter Bullard [<A=20
  =
href=3D"mailto:carter@qosient.com">mailto:carter@qosient.com</A>]</FONT> =

  <BR><FONT size=3D2>&gt; Sent: Tuesday, October 22, 2002 8:17 AM</FONT> =
<BR><FONT=20
  size=3D2>&gt; To: 'Juergen Quittek'; =
ipfix-eval@net.doit.wisc.edu</FONT>=20
  <BR><FONT size=3D2>&gt; Subject: RE: [ipfix-eval] Juergen's =
conclusions</FONT>=20
  <BR><FONT size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt; =
</FONT><BR><FONT=20
  size=3D2>&gt; Hey Juergen,</FONT> <BR><FONT size=3D2>&gt; &gt; =
</FONT><BR><FONT=20
  size=3D2>&gt; &gt; Juergen's Conclusion</FONT> <BR><FONT size=3D2>&gt; =
&gt;</FONT>=20
  <BR><FONT size=3D2>&gt; [snip]</FONT> <BR><FONT size=3D2>&gt; &gt;=20
  </FONT><BR><FONT size=3D2>&gt; &gt; Considering all this I would =
recommend to go=20
  for NetFlow v9. </FONT><BR><FONT size=3D2>&gt; &gt; If this is not =
accepted=20
  because NetFlow is considered as too </FONT><BR><FONT size=3D2>&gt; =
&gt; simple=20
  or lacking functionality, I would recommend using IDPR.</FONT> =
<BR><FONT=20
  size=3D2>&gt; &gt;</FONT> <BR><FONT size=3D2>&gt; </FONT><BR><FONT =
size=3D2>&gt;=20
  While I like the IPDR data representation strategy and formats,</FONT> =

  <BR><FONT size=3D2>&gt; I see IPDR as a data model, providing a format =
for=20
  communicating</FONT> <BR><FONT size=3D2>&gt; flow activity reports =
that a probe=20
  can generate.&nbsp; But I don't</FONT> <BR><FONT size=3D2>&gt; see how =
IPDR is a=20
  transport protocol.</FONT> <BR><FONT size=3D2>&gt; </FONT><BR><FONT =
size=3D2>&gt;=20
  My opinion is that IPFIX MUST be able to transport IPDR data,</FONT> =
<BR><FONT=20
  size=3D2>&gt; it MUST also be able to transport native NetFlow v[1-9]=20
  data</FONT> <BR><FONT size=3D2>&gt; as well.&nbsp; That to me =
indicates that the=20
  appropriate data model</FONT> <BR><FONT size=3D2>&gt; is either a =
superset of=20
  all the candidates, so that IPFIX can</FONT> <BR><FONT size=3D2>&gt; =
handle all=20
  the data types, or the transport protocol supports</FONT> <BR><FONT=20
  size=3D2>&gt; an opaque data object, so that vendors can transport =
their</FONT>=20
  <BR><FONT size=3D2>&gt; native records as blobs.&nbsp; NetFlow doesn't =
support=20
  either</FONT> <BR><FONT size=3D2>&gt; strategy.&nbsp; IPDR may be able =
to be the=20
  superset, but its doesn't</FONT> <BR><FONT size=3D2>&gt; support an =
opaque=20
  blob.</FONT> <BR><FONT size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt; =
While vendors=20
  will assure us that their methods can be extended,</FONT> <BR><FONT=20
  size=3D2>&gt; I won't feel comfortable making a choice until the =
vendors=20
  </FONT><BR><FONT size=3D2>&gt; demonstrate how their methods can =
handle the=20
  requirements.</FONT> <BR><FONT size=3D2>&gt; </FONT><BR><FONT =
size=3D2>&gt;=20
  </FONT><BR><FONT size=3D2>&gt; Carter</FONT> <BR><FONT size=3D2>&gt;=20
  </FONT><BR><FONT size=3D2>&gt; Carter Bullard</FONT> <BR><FONT =
size=3D2>&gt;=20
  QoSient, LLC</FONT> <BR><FONT size=3D2>&gt; 300 E. 56th Street, Suite =
18K</FONT>=20
  <BR><FONT size=3D2>&gt; New York, New York&nbsp; 10022</FONT> =
<BR><FONT=20
  size=3D2>&gt; </FONT><BR><FONT size=3D2>&gt; carter@qosient.com</FONT> =
<BR><FONT=20
  size=3D2>&gt; Phone +1 212 588-9133</FONT> <BR><FONT size=3D2>&gt; =
Fax&nbsp;&nbsp;=20
  +1 212 588-9134</FONT> <BR><FONT size=3D2>&gt; <A =
href=3D"http://qosient.com"=20
  target=3D_blank>http://qosient.com</A></FONT> =
</P></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_00E3_01C27B54.36ED5CF0--


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 16:21:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA22022
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 16:21:15 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184oMY-00068v-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 15:13:50 -0500
Received: from palrel12.hp.com ([156.153.255.237])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184oMW-00068n-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 15:13:48 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel12.hp.com (Postfix) with ESMTP id 68157E004C6
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 24 Oct 2002 13:13:42 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id NAA23321
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 24 Oct 2002 13:13:37 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021024201336.BRH1825.simail.cup.hp.com@cup.hp.com>
          for <ipfix-eval@net.doit.wisc.edu>;
          Thu, 24 Oct 2002 13:13:36 -0700
Message-ID: <3DB854F3.7080205@cup.hp.com>
Date: Thu, 24 Oct 2002 13:15:47 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] IPDR response to evaluation drafts
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   I wanted to respond, from an IPDR perspective, to the two
evaluation drafts submitted.

   http://ipfix.doit.wisc.edu/archive/1266.html (Simon)
 
http://ipfix.doit.wisc.edu/archive/att-1277/01-draft-gopal-ipfix-eval-00.txt 
(Ram)

   At a high level, I found that Simon's draft provided a
pretty balanced view of the various candidates and their
capabilities.  In particular IPDR was accurately portrayed.

   Ram's draft seems to reflect some misconceptions about
IPDR (often misspelled as IDRP).  It is probably a combination
of the newness of IPDR in this community and the lack
of my writing ability to more clearly explain how
IPDR is used to address IPFIX.  I think Simon's
summary in section 2.5 does a good job of characterizing
IPDR.


   Specific comments on Ram's submission relative to
streaming IPDR.


2.3  "IPDR... does not explicitly describe the IPFIX
architectural requirements".

   IPDR does address the requirements for an IPFIX
exporter process, hence the advocacy draft.  Streaming
IPDR defines a lightweight accounting protocol, which
is primarily unidirectional.

   IPDR only addresses the "Exporting Process" part of
the IPFIX model and its interaction with one or more
"Collecting Processes".  CRANE, Diameter and IPDR are all
examples of protocols whose focus is solely on the
exporting process, putting no restrictions on the
behavior of the "Metering Process".  I would contend
that a clean separation of the exporting process
from the control of the meter (for instance via
a Meter-MIB) is desireable.  NetflowV9 also appears
to address only the exporting activity and not
the meter control.


3.1.x Grades and Comments

   Given the separation of most candidate protocols from
the Metering Process itself.  I am unclear how some
of these results were arrived at.

   For example in section 3.1.2 Sampling (5.2) the
discussion says that IDPR (sic) is an "F" and that
Diameter is an "E".

   As stated in the IPDR advocacy draft:

    Please note that the requirements specified in sections 4, 5 and 7.1
    of IPFIX Requirements [1] do not directly concern the IPFIX protocol,
    but the semantics of the data transferred.  They can be met easily by
    extensible protocols that do not restrict sematics of transferred
    data.  This includes the Streaming IPDR format, as the data model
    allows for arbitrary extension, following a well established
    standard, XML Schema [4].

  In Diameter, there is an explicit statement for
this requirement:

    This requirement is a metering process requirement. However the
    IPFIX protocol must support to export some information about
    sampling configuration.  New (grouped) AVPs can be defined for
    carrying the sampling configuration.


  I believe these two statements are equivalent in their approach.


  In 3.1.3 Overflow.  IPDR got an "E" and Diameter gets an "F",
where in both cases, the same logic applies as for sampling.

  Similar issues are in 3.1.5, 3.1.6, 3.1.7, and 3.1.8.

  Basically if the protocol is extensible (through standard
descriptions or templates or AVPs) then the additional
information which a Metering Process needs to provide
can be equally addressed by all candidates.  One may
argue that LFAP has explicit protocol operations to
address some meter behavior.


  In section 3.1.11, data model.  Describes the use of
XML, but does not indicate that XDR is the wire format
for the information.


  In section 3.1.15, security.  Raises the question of
whether XML security would be used.  The protocol
communication does NOT use XML, so this would not
be appropriate.  Think of SNMP.  I don't need a MIB
compiler to send an SNMP request.  Likewise with
IPDR, you don't need an XML processor to use
StreamingIPDR.


Regards,

   Jeff Meyer







--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 17:18:17 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA24076
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 17:18:17 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184pEa-00007W-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 16:09:40 -0500
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184pEY-00006a-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 16:09:38 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9OL5JB19411;
	Thu, 24 Oct 2002 16:05:20 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBDF7>; Thu, 24 Oct 2002 14:05:05 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C04583760@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: calato@riverstonenet.com
Cc: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Date: Thu, 24 Oct 2002 14:05:03 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27BA1.059F0476"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27BA1.059F0476
Content-Type: text/plain;
	charset="iso-8859-1"

I can think of several reasons (inline with Carter's or Tal's), let me you
know what you think.


1 - First of all, most IPfix applications (not the collector, mind you) read
data in special format  (mrtg, rrdtool, security tools, etc). So we need a
conversion from the format the collector saves to disk to the format the
application uses anyway. 

So when say "how you build useful applications...?", my answer is that we
are not standardizing in which format flow records are saved to disk and
applications need data in their own format anyway.   

2 - IPfix applications are not going to sweep the world right after the
standard is approved. Actually some of them might never get updated. This
provides a way for current application to continue to use old formated data,
which came in in a blob, although the export protocol used is IPfix.

3 - IMO makes extension of the data model more flexible. If I want to export
all HTTP or SDP headers, without having to ask for dozens of new IDs for
each different line in the header or combinations thereof, I can to that.
If I want to combine several different pieces of information (not necessary
proprietary information) under one field, instead of sending in different
ones, I can do that. For example, in our old discussion about NAT...If I'm
doing twice NAT, I might want to put all information about before and after
NAT in one field/blob, instead of dealing with several fields and associated
overhead.

regards,

Reinaldo 


> -----Original Message-----
> From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
> Sent: Thursday, October 24, 2002 7:18 AM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: Juergen Quittek; ipfix-req@net.doit.wisc.edu
> Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
> 
> 
> > Reinaldo Penno wrote:
> > 
> > I think Carter's proposal (about opaque blobs) should be included on
> > the requirements draft.
> > 
> 
> 	
> 	Carter seems to be proposing using opaque blobs to send 
> native netflow
> 	records or native IPDR records or native vendor xyz records.
> 
> 	Someone needs to explain to me why we want to do that.
> 
> 	How do you build any useful applications when opaque 
> blobs are sent?
> 	Yes you can send them, yes you can pull the string from 
> the message
> 	but then what? Most likely you end up with proprietary 
> information
> 	being sent and proprietary applications making use of 
> it. The fact
> 	that some standard was used to deliver it doesn't help 
> in any way.
> 	Might was well use raw tcp and a well-known port number.
> 
> 	What am I missing?
> 
> 	Paul
> 
> 
> > I'm reposting it here since although we discussed on the eval list,
> > IMO we should put the text formally on the requiments draft.
> > 
> > regards,
> > 
> > Reinaldo
> > 
> > > -----Original Message-----
> > > From: Carter Bullard [mailto:carter@qosient.com]
> > > Sent: Tuesday, October 22, 2002 8:17 AM
> > > To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
> > > Subject: RE: [ipfix-eval] Juergen's conclusions
> > >
> > >
> > > Hey Juergen,
> > > >
> > > > Juergen's Conclusion
> > > >
> > > [snip]
> > > >
> > > > Considering all this I would recommend to go for NetFlow v9.
> > > > If this is not accepted because NetFlow is considered as too
> > > > simple or lacking functionality, I would recommend using IDPR.
> > > >
> > >
> > > While I like the IPDR data representation strategy and formats,
> > > I see IPDR as a data model, providing a format for communicating
> > > flow activity reports that a probe can generate.  But I don't
> > > see how IPDR is a transport protocol.
> > >
> > > My opinion is that IPFIX MUST be able to transport IPDR data,
> > > it MUST also be able to transport native NetFlow v[1-9] data
> > > as well.  That to me indicates that the appropriate data model
> > > is either a superset of all the candidates, so that IPFIX can
> > > handle all the data types, or the transport protocol supports
> > > an opaque data object, so that vendors can transport their
> > > native records as blobs.  NetFlow doesn't support either
> > > strategy.  IPDR may be able to be the superset, but its doesn't
> > > support an opaque blob.
> > >
> > > While vendors will assure us that their methods can be extended,
> > > I won't feel comfortable making a choice until the vendors
> > > demonstrate how their methods can handle the requirements.
> > >
> > >
> > > Carter
> > >
> > > Carter Bullard
> > > QoSient, LLC
> > > 300 E. 56th Street, Suite 18K
> > > New York, New York  10022
> > >
> > > carter@qosient.com
> > > Phone +1 212 588-9133
> > > Fax   +1 212 588-9134
> > > http://qosient.com
> 

------_=_NextPart_001_01C27BA1.059F0476
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter =
-1)</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I can think of several reasons (inline with Carter's =
or Tal's), let me you know what you think.</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>1 - First of all, most IPfix applications (not the =
collector, mind you) read data in special format&nbsp; (mrtg, rrdtool, =
security tools, etc). So we need a conversion from the format the =
collector saves to disk to the format the application uses anyway. =
</FONT></P>

<P><FONT SIZE=3D2>So when say &quot;how you build useful =
applications...?&quot;, my answer is that we are not standardizing in =
which format flow records are saved to disk and applications need data =
in their own format anyway.&nbsp;&nbsp; </FONT></P>

<P><FONT SIZE=3D2>2 - IPfix applications are not going to sweep the =
world right after the standard is approved. Actually some of them might =
never get updated. This provides a way for current application to =
continue to use old formated data, which came in in a blob, although =
the export protocol used is IPfix.</FONT></P>

<P><FONT SIZE=3D2>3 - IMO makes extension of the data model more =
flexible. If I want to export all HTTP or SDP headers, without having =
to ask for dozens of new IDs for each different line in the header or =
combinations thereof, I can to that.&nbsp; If I want to combine several =
different pieces of information (not necessary proprietary information) =
under one field, instead of sending in different ones, I can do that. =
For example, in our old discussion about NAT...If I'm doing twice NAT, =
I might want to put all information about before and after NAT in one =
field/blob, instead of dealing with several fields and associated =
overhead.</FONT></P>

<P><FONT SIZE=3D2>regards,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo </FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: calato@riverstonenet.com [<A =
HREF=3D"mailto:calato@riverstonenet.com">mailto:calato@riverstonenet.com=
</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 24, 2002 7:18 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Juergen Quittek; =
ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] list of issues - =
Reinaldo - 7 (or Carter -1)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Reinaldo Penno wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I think Carter's proposal (about opaque =
blobs) should be included on</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the requirements draft.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Carter seems to =
be proposing using opaque blobs to send </FONT>
<BR><FONT SIZE=3D2>&gt; native netflow</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; records or =
native IPDR records or native vendor xyz records.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Someone needs to =
explain to me why we want to do that.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; How do you build =
any useful applications when opaque </FONT>
<BR><FONT SIZE=3D2>&gt; blobs are sent?</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yes you can send =
them, yes you can pull the string from </FONT>
<BR><FONT SIZE=3D2>&gt; the message</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; but then what? =
Most likely you end up with proprietary </FONT>
<BR><FONT SIZE=3D2>&gt; information</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; being sent and =
proprietary applications making use of </FONT>
<BR><FONT SIZE=3D2>&gt; it. The fact</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that some =
standard was used to deliver it doesn't help </FONT>
<BR><FONT SIZE=3D2>&gt; in any way.</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Might was well =
use raw tcp and a well-known port number.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; What am I =
missing?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Paul</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I'm reposting it here since although we =
discussed on the eval list,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; IMO we should put the text formally on the =
requiments draft.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; regards,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Reinaldo</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; From: Carter Bullard [<A =
HREF=3D"mailto:carter@qosient.com">mailto:carter@qosient.com</A>]</FONT>=

<BR><FONT SIZE=3D2>&gt; &gt; &gt; Sent: Tuesday, October 22, 2002 8:17 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; To: 'Juergen Quittek'; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Subject: RE: [ipfix-eval] Juergen's =
conclusions</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Hey Juergen,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Juergen's Conclusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; [snip]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; Considering all this I would =
recommend to go for NetFlow v9.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; If this is not accepted because =
NetFlow is considered as too</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt; simple or lacking functionality, =
I would recommend using IDPR.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; While I like the IPDR data =
representation strategy and formats,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; I see IPDR as a data model, providing =
a format for communicating</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; flow activity reports that a probe =
can generate.&nbsp; But I don't</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; see how IPDR is a transport =
protocol.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; My opinion is that IPFIX MUST be able =
to transport IPDR data,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; it MUST also be able to transport =
native NetFlow v[1-9] data</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; as well.&nbsp; That to me indicates =
that the appropriate data model</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; is either a superset of all the =
candidates, so that IPFIX can</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; handle all the data types, or the =
transport protocol supports</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; an opaque data object, so that =
vendors can transport their</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; native records as blobs.&nbsp; =
NetFlow doesn't support either</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; strategy.&nbsp; IPDR may be able to =
be the superset, but its doesn't</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; support an opaque blob.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; While vendors will assure us that =
their methods can be extended,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; I won't feel comfortable making a =
choice until the vendors</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; demonstrate how their methods can =
handle the requirements.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Carter</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Carter Bullard</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; QoSient, LLC</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; 300 E. 56th Street, Suite 18K</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; New York, New York&nbsp; 10022</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; carter@qosient.com</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Phone +1 212 588-9133</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; Fax&nbsp;&nbsp; +1 212 =
588-9134</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &gt; <A HREF=3D"http://qosient.com" =
TARGET=3D"_blank">http://qosient.com</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27BA1.059F0476--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:02:39 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25327
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:02:39 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184pmd-00018k-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 16:44:51 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184pma-00017Z-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 16:44:48 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g9OLiAGU024863;
	Thu, 24 Oct 2002 23:44:10 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g9OLi843024860;
	Thu, 24 Oct 2002 23:44:08 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: calato@riverstonenet.com
Cc: Peter Ludemann <peter.ludemann@xacct.com>,
        Michael MacFaden <mrm@riverstonenet.com>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Discussion of Candidate Protocols
References: <AMEKJFAIEIKCBNABBMPNMEFIDHAA.peter.ludemann@xacct.com>
	<3D9AEC51.BA498740@riverstonenet.com>
	<aau1jyfrvb.fsf@limmat.switch.ch>
	<3DA19E6E.A018857B@riverstonenet.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <3DA19E6E.A018857B@riverstonenet.com>
Date: 24 Oct 2002 23:44:08 +0200
Message-ID: <aar8efqzpz.fsf@limmat.switch.ch>
Lines: 46
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Sorry for the late response - finally catching up after vacation...

On Mon, 07 Oct 2002 10:47:10 -0400, calato@riverstonenet.com said:
> Simon Leinen wrote:
>> On Wed, 02 Oct 2002 08:53:37 -0400, calato@riverstonenet.com said:
[in response to Peter Ludemann's message]
>> >       Having done a fair amount of tuning on a collector I find
>> >       it interesting that your performance hinged on a memory
>> >       copy. In my experince performance was limited by how fast
>> >       the disk writes are.
>> 
>> Some collectors will write large amounts of data to disk - if this
>> is the main bottleneck I'd assume that they use the accounting data
>> without too heavy processing (or they need a better approach to
>> disk I/O, such as direct I/O, scatter/gather interfaces, faster
>> disks etc.).

> 	I don't follow. Are you saying I/O isn't typically the
> 	bottleneck at the collector?

That depends on what you consider a typical collector.
The one I've written as part of our accounting system has relatively
large in-core data structures, but writes a relatively small amount of
data to disk.  It performs convoluted application-specific aggregation
that doesn't really lend itself to being done in a meter/exporter in a
router.

>> Unnecessary copying should be avoided mainly because memory
>> bandwidth doesn't seem to grow as fast as other performance
>> dimensions.  Personally I think this is more of an issue than for
>> example byte-order optimizations.

> 	I think there are lots of other issues that come into
> 	play before memory copies do. malloc and free are typically
> 	to big culprits of CPU usage.

Then I'm glad I wrote my collector in Lisp, because Lisp doesn't have
either of these (I'm being serious here, the garbage collector even
keeps the working set compact over months).

>       A design that causes lots of task switching is another. Your
> 	program needs to be pretty finely tuned before memory copy
> 	shows up, assuming the app is not just plain silly about
> 	memory copies.
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:08:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25457
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:08:01 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184ps0-0001M5-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 16:50:24 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184pry-0001GN-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 16:50:22 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g9OLnoGU024871;
	Thu, 24 Oct 2002 23:49:50 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g9OLnnJP024868;
	Thu, 24 Oct 2002 23:49:49 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: calato@riverstonenet.com
Cc: carter@qosient.com, "'Michael MacFaden'" <mrm@riverstonenet.com>,
        ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Split reporting, memory consumption, and "snapshot" attributes
 [was: Discussion of Candidate Protocols]
References: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
	<3D9DBF0A.1DCD90FE@riverstonenet.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <3D9DBF0A.1DCD90FE@riverstonenet.com>
Date: 24 Oct 2002 23:49:49 +0200
Message-ID: <aaof9jqzgi.fsf_-_@limmat.switch.ch>
Lines: 99
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Fri, 04 Oct 2002 12:17:14 -0400, calato@riverstonenet.com said:
> 	The problem with the one shot messages is storage.

Sorry for the late response.  I've been trying to understand the
tradeoffs of "split reporting" (as LFAP does with its FAR/FUN
messages) and what you call "one-shot reporting", which is what
e.g. NetFlow does.

>       The device now needs to store all the attributes until it is
> 	time to send the message. When you have millions of flows this
> 	can be a huge problem! Or if the device is small it can be a
> 	large problem. And as the number of attributes to report grows
> 	it makes the problem worse.

At first I thought that this doesn't matter, because you I only
thought about two types of attributes for a flow:

1.) Attributes such as src/dst addresses etc., which are part of the
    flow "key", i.e. distinguish the flow from others.  Those must be
    stored over the entire lifetime of the flow anyway, or the meter
    wouldn't be able to match packets to flows.  With split reporting,
    they can be exported at the start of the flow versus at the end -
    no benefit here.

2.) Attributes such as octet and packet counters, which represent
    "measurements" about the flow and which have to be updated for
    every packet.  Those have to be stored and updated by the meter,
    and exported by the exporter in any case.

For these types of attributes, I think split reporting doesn't provide
any storage benefit on the exporter.  However, there is a third type
of attribute:

3.) Attributes that are neither part of the "flow key" (this notion
    isn't part of our terminology, but I find it very useful), but
    that aren't updated for every packet either.  Let's call those
    "snapshot" attributes for the sake of the discussion.

Such attributes exist in practice, although they are somewhat
problematic if you think about it.

Examples of such attributes might include the source/destination AS
number (which might either be the upstream/downstream or
origin/terminus AS number :-), source or destination address prefix
length, which are thought of as "usually" stable over the lifetime of
a flow.

In split reporting, they can be reported when the flow is created at
the meter, using something like LFAP's "FAR" message, and then the
meter (and exporter) can forget about them.

With one-shot reporting (I'm tempted to call this "unitary reporting"
because that sounds way more scientific), the meter must hold on to
these attributes until the flow can be exported (usually when it is
expired from the meter).

However...

Some of these attributes don't actually have to be stored, as they can
be computed from other attributes (that must be stored anyway) when
the flow is exported.  For example, an AS number can be computed from
the corresponding flow's IP address using a BGP table lookup on
export.

The difference is that split reporting would report those attributes
as they were valid for the first packet of a flow, while "unitary flow
export" would probably report them as of the time of export of the
flow - which usually happens closely after the last packet.  Since we
assume that these attributes generally remain stable over the lifetime
of a flow, the result should be the same in most cases.   When it
isn't (during e.g. routing changes over the lifetime of the flow), I
cannot see a clear advantage for either.

So for this sub-type of the third class of attributes there doesn't
seem to be a clear benefit with split reporting either.

For the remaining attributes in the third class, split reporting would
provide the possibility of space savings at the meter/exporter.  One
obvious such attribute is the observation time of the first packet.

The question is are there many other attributes that would fall into
this (sub-)class, and are the possible savings sufficient to make
split reporting an obvious win?

Besides complicating the protocol, split reporting does seem to
require more memory at the collector, which has to match FUNs with
FARs if it wants to combine data from both.

I'm just trying to understand the tradeoff.

> 	Solving this problem is much more difficult than allowing LFAP
> 	to send one shot messages.

(If you think there actually *is* a problem, that is :-)

> 	LFAP has solved this problem by splitting up the attributes
> 	and allowing them to be reported independently.
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:10:46 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25487
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:10:46 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184pvM-0001S8-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 16:53:52 -0500
Received: from palrel10.hp.com ([156.153.255.245])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184pvJ-0001S0-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 16:53:50 -0500
Received: from hpcuhe.cup.hp.com (hpcuhe.cup.hp.com [15.0.80.203])
	by palrel10.hp.com (Postfix) with ESMTP
	id 37E01C00A86; Thu, 24 Oct 2002 14:53:47 -0700 (PDT)
Received: from simail.cup.hp.com (imail@sim.cup.hp.com [15.16.123.26])
	by hpcuhe.cup.hp.com (8.9.3 (PHNE_18979)/8.9.3 SMKit7.02) with ESMTP id OAA01470;
	Thu, 24 Oct 2002 14:53:39 -0700 (PDT)
Received: from cup.hp.com ([15.16.124.96]) by simail.cup.hp.com
          (InterMail vM.5.01.03.01 201-253-122-118-101-20010319) with ESMTP
          id <20021024215338.BVJ1825.simail.cup.hp.com@cup.hp.com>;
          Thu, 24 Oct 2002 14:53:38 -0700
Message-ID: <3DB86C65.2010907@cup.hp.com>
Date: Thu, 24 Oct 2002 14:55:49 -0700
From: Jeff Meyer <jeffm@cup.hp.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1) Gecko/20020508 Netscape6/6.2.3
X-Accept-Language: en-us
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
Cc: calato@riverstonenet.com, Juergen Quittek <quittek@ccrle.nec.de>,
        ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
References: <7B802811BE77D51189910002A55CFD2C04583760@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi,

   I agree that opaque blobs are useful, but of the use
cases cited by Reinaldo, I agree with #3, I think #1
is interesting, but addressed directly by IPDR, and
#2 doesn't seem to really be a solution.

   A few additional notes inline...

Regards,

   Jeff Meyer

P.S.

This can be done by the IPDR Streaming protocol
today.  The group decided that the standard XML-Schema
data type named "base64Binary" would be used to represent
data items of this form in service definitions.  It will
map to the existing Compact IPDR type of "BYTE_ARRAY",
which has a type code of 7.


Reinaldo Penno wrote:

> I can think of several reasons (inline with Carter's or Tal's), let me 
> you know what you think.
> 
> 
> 1 - First of all, most IPfix applications (not the collector, mind you) 
> read data in special format  (mrtg, rrdtool, security tools, etc). So we 
> need a conversion from the format the collector saves to disk to the 
> format the application uses anyway.
> 
> So when say "how you build useful applications...?", my answer is that 
> we are not standardizing in which format flow records are saved to disk 
> and applications need data in their own format anyway.  


IPDR's serialization format defines two ways you could store
this information directly to disk, either XML or binary.

Not part of the IPFIX requirement but a side benefit of not
creating "yet another format".


> 
> 2 - IPfix applications are not going to sweep the world right after the 
> standard is approved. Actually some of them might never get updated. 
> This provides a way for current application to continue to use old 
> formated data, which came in in a blob, although the export protocol 
> used is IPfix.


I'd prefer my old application to just talk the old protocol,
i.e. NetflowV2-8.  Not to have these packets further wrapped.

As a special case of #3 below this might be interesting, but
in general I don't see it.


> 
> 3 - IMO makes extension of the data model more flexible. If I want to 
> export all HTTP or SDP headers, without having to ask for dozens of new 
> IDs for each different line in the header or combinations thereof, I can 
> to that.  If I want to combine several different pieces of information 
> (not necessary proprietary information) under one field, instead of 
> sending in different ones, I can do that. For example, in our old 
> discussion about NAT...If I'm doing twice NAT, I might want to put all 
> information about before and after NAT in one field/blob, instead of 
> dealing with several fields and associated overhead.


Header exporting or other snippets of packets is a good use
case for supporting a blob.



> 
> regards,
> 
> Reinaldo
> 
> 
>  > -----Original Message-----
>  > From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
>  > Sent: Thursday, October 24, 2002 7:18 AM
>  > To: Penno, Reinaldo [BL60:0430:EXCH]
>  > Cc: Juergen Quittek; ipfix-req@net.doit.wisc.edu
>  > Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
>  >
>  >
>  > > Reinaldo Penno wrote:
>  > >
>  > > I think Carter's proposal (about opaque blobs) should be included on
>  > > the requirements draft.
>  > >
>  >
>  >      
>  >       Carter seems to be proposing using opaque blobs to send
>  > native netflow
>  >       records or native IPDR records or native vendor xyz records.
>  >
>  >       Someone needs to explain to me why we want to do that.
>  >
>  >       How do you build any useful applications when opaque
>  > blobs are sent?
>  >       Yes you can send them, yes you can pull the string from
>  > the message
>  >       but then what? Most likely you end up with proprietary
>  > information
>  >       being sent and proprietary applications making use of
>  > it. The fact
>  >       that some standard was used to deliver it doesn't help
>  > in any way.
>  >       Might was well use raw tcp and a well-known port number.
>  >
>  >       What am I missing?
>  >
>  >       Paul
>  >
>  >
>  > > I'm reposting it here since although we discussed on the eval list,
>  > > IMO we should put the text formally on the requiments draft.
>  > >
>  > > regards,
>  > >
>  > > Reinaldo
>  > >
>  > > > -----Original Message-----
>  > > > From: Carter Bullard [mailto:carter@qosient.com]
>  > > > Sent: Tuesday, October 22, 2002 8:17 AM
>  > > > To: 'Juergen Quittek'; ipfix-eval@net.doit.wisc.edu
>  > > > Subject: RE: [ipfix-eval] Juergen's conclusions
>  > > >
>  > > >
>  > > > Hey Juergen,
>  > > > >
>  > > > > Juergen's Conclusion
>  > > > >
>  > > > [snip]
>  > > > >
>  > > > > Considering all this I would recommend to go for NetFlow v9.
>  > > > > If this is not accepted because NetFlow is considered as too
>  > > > > simple or lacking functionality, I would recommend using IDPR.
>  > > > >
>  > > >
>  > > > While I like the IPDR data representation strategy and formats,
>  > > > I see IPDR as a data model, providing a format for communicating
>  > > > flow activity reports that a probe can generate.  But I don't
>  > > > see how IPDR is a transport protocol.
>  > > >
>  > > > My opinion is that IPFIX MUST be able to transport IPDR data,
>  > > > it MUST also be able to transport native NetFlow v[1-9] data
>  > > > as well.  That to me indicates that the appropriate data model
>  > > > is either a superset of all the candidates, so that IPFIX can
>  > > > handle all the data types, or the transport protocol supports
>  > > > an opaque data object, so that vendors can transport their
>  > > > native records as blobs.  NetFlow doesn't support either
>  > > > strategy.  IPDR may be able to be the superset, but its doesn't
>  > > > support an opaque blob.
>  > > >
>  > > > While vendors will assure us that their methods can be extended,
>  > > > I won't feel comfortable making a choice until the vendors
>  > > > demonstrate how their methods can handle the requirements.
>  > > >
>  > > >
>  > > > Carter
>  > > >
>  > > > Carter Bullard
>  > > > QoSient, LLC
>  > > > 300 E. 56th Street, Suite 18K
>  > > > New York, New York  10022
>  > > >
>  > > > carter@qosient.com
>  > > > Phone +1 212 588-9133
>  > > > Fax   +1 212 588-9134
>  > > > http://qosient.com
>  >
> 




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:12:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25526
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:12:22 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184pvR-0001SL-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 16:53:57 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184pvP-0001SD-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 16:53:56 -0500
Received: (qmail 17374 invoked from network); 24 Oct 2002 21:53:49 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 24 Oct 2002 21:53:49 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9OLvJu23984;
	Thu, 24 Oct 2002 14:57:19 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Vamsidhar Valluri" <vvalluri@cisco.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs. Overload
Date: Thu, 24 Oct 2002 14:53:51 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDAEIGCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <Pine.GSO.4.44.0210231426040.12087-100000@vvalluri-u10.cisco.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Vamsi,

Let me just verify my understanding:

<snip>
packets accounted through Sampling mechanism we create a new Template with
an additional attribute called "Sampler ID".
<snip>

The templates are distinguished one from the other by the existence of
particular attributes?

Supposing you want to support many different templates (based on the
examples you provided):
1. IPv4
2. IPv4+BGP
3. IPv4+BGP+Multicast
4. IPv4+Multicast
5. IPv6
6. MPLS
7. IPv6+Multicast
8-14. Sampled (for each of above combinations) - another 7 combinations

This will all IMPLICITLY be deducted by the existence of particular
attributes?

In NFv8, for instance, there are various aggregation schemes supported by
the routers.
- Are you implying that the aggregation scheme used by the network element
would be deduced by the collector by virtue of which fields are MISSING from
the flow record?
- How would you propose extending this to have different aggregation keys
with the same attributes?

Tal

-----Original Message-----
From: Vamsidhar Valluri [mailto:vvalluri@cisco.com]
Sent: Wednesday, October 23, 2002 2:58 PM
To: Tal Givoly
Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs.
Overload


Tal,
  Please see inline

On Wed, 23 Oct 2002, Tal Givoly wrote:

> Juergen,
>
> <snip>
> 5.2: CRANE, IPDR, Diameter does not address overload behavior.
>      But they can be extended to report on it.
> <snip>
>
> I believe there may be a typo - you mention "5.2 overload behavior",
however
> 5.2 is, in fact, sampling behavior. Which did you mean that you differ
with
> compared to Simon's review?
>
> Regarding Sampling Behavior (and this is in response to both your
> evaluations
> as well as Simon's), both evaluations conclude that that CRANE Fails to
meet
> this requirement.
>
> CRANE clearly allows distinguishing between sampled data and non-sampled
> data.
> As CRANE, similarly to IPDR and Diameter, doesn't impose any restrictions
> on the Metering Process, the latter can easily submit sampled data in
> a dedicated Template. Even if you consider that there is no intrinsic
> support
> specifically for Sampling Behavior within the protocol itself, it is
> definitely
> Extendable to that degree, would you not agree?
>
>
> On the other hand, I don't quite understand how NetFlow v9 actually
supports
> multiple concurrent Templates by the same Export Process. As NetFlow v9
> Templates are indistinguishable (they are changed rapidly and not
negotiated
> with no uniquely describing attributes!). Therefore, NetFlow v9 cannot
> support both sampled and non-sampled mode of operations in any
> combination - a requirement that is implied by the Sampling Requirement
> (for at least some length of overlap time).

Every Template has an associated ID. Each template identifies unique set
of attributes. For packets accounted through Sampling mechanism we create
a new Template with an additional attribute called "Sampler ID". This
"Sampler ID" uniquely identifies set of Sampling attributes (Sampling
rate, Sampling algorithm etc). These sampling attributes mapped to ID are
sent in the form of option templates to the collector. Collector will map
Sampling
ID to it's corresponding Option data which contains specific values
of sampling attributes which will give an idea of type of
sampling performed on that flow. If there are changes to Sampling
attributes we create new Option templates with new IDs and send to the
collector before any data corresponding to that Sampling mechanism is
exported to collector. We can do this on the fly. We need not exchange
these Template before we start Netflow accounting on the box. In short if
Metering process is doing Sampling and non-sampling of data, there exists
two templates which will uniquely identify Sampled and non-sampled flows.

Some more information:
Flows can have only IPV4, or IPV4 + BGP related, or IPV4+BGP + Multicast,
or IPV4+Multicast, or IPV6, or MPLS, or IPV6+Multicast, sampled .......

So there are lot of possible combinations, we create Template only when we
see these combinations and do not negatiate all these combinations before
hand. If the Collector can understand these attributes then our mechanism
is much more flexible.

>
> Perhaps this question should be directed to the NetFlow protocol advocate:
>
> - How can multiple Templates coexist?

Multiple Templates will exist because the attribute set is different. One
with Sampler ID and one without.


> - If, in fact, it is possible for multiple Templates to coexist, please
>   elaborate how are these distinguished by recipients based on the current
>   protocol draft?

Please see above explanation. On CCO you will find new Sampling related
Field Types, if not then they are in the process of updation.

>
>   For instance, how would a Collection Process differentiate between
sampled
>   and non-sampled data? How would this be done if both are being exported
>   concurrently?

Presence of "sampler ID" attribute will differenciate Sampled from
non-sampled Data.

thanks
-vamsi

>
> Thanks for any clarification.
>
> Tal
>
>
>
> -----Original Message-----
> From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> Of Juergen Quittek
> Sent: Tuesday, October 22, 2002 7:08 AM
> To: ipfix-eval@net.doit.wisc.edu
> Subject: [ipfix-eval] Simon's and Ram's evaluations
>
>
> Dear all,
>
> I agree almost completely with Simons evaluation. In Ram's
> evaluation I like the classification of compliancy per item.
> Maybe it can be formatted a bit more compact, for example:
>
>   "3.1.1.Reliability (5.1)
>
>       LFAP: T     CRANE: E     IDPR: E     NetFlow: E     Diameter: E"
>
>
> In the conclusion section I think a table summarizing the
> classification would be helpful. I put my evaluation into an example
> for such a table below. It is almost completely consistent with Simon's
> evaluation and has a few differences to Ram's one:
>
>    LFAP   CRANE  IDPR   Net-   Dia-
>                         Flow   meter
>     T      E      E      E      E     Reliability (5.1)
>     E      F      F      T      E     Sampling (5.2)
>     T      E      E      T      E     Overload Behavior (5.3)
>     T      T      T      T      T     Timestamps (5.4)
>     T      T      E      T      T     Time Synchronization (5.5)
>     T      T      E      T      T     Flow Expiration (5.6)
>     ?      ?      ?      ?      ?     Multicast Flows (5.7)
>     ?      ?      ?      ?      ?     Ignore Port Copy (5.8)
>     T      T      T      T      T     Information Model (6.1)
>     T      T      T      T      T     Data Model (6.2)
>     T      T      T      T      T     Congestion Awareness (6.3.1)
>     T      T      T      P      T     Reliability (6.3.2)
>     T      T      T      P      T     Security (6.3.3)
>     T      T      T      T      T     Push Mode Reporting (6.4)
>     F      F      E      F      E     Pull Mode Reporting (6.4)
>     T      T      T      T      T     Regular Report. Interval (6.5)
>     T      T      T      T      T     Notif. on Specif. Events (6.6)
>     E      E      E      E      E     Anonymization (6.7)
>     T      T      T      T      T     Openness (8.1)
>     T      T      T      T      T     Scalability (8.2)
>     T      T      P      T      T     Several Collecting Proc (8.2)
> -------------------------------------------------------------------
>    16     14     11     14     14     number of Ts
>     2      3      6      2      5     number of Es
>     0      0      1      2      0     number of Ps
>     1      2      1      1      0     number of Fs
>
> Comments (comparing to Ram's and Simon's evaluation):
> 5.1: Only LFAP already indicates lask of reliability
>      of the metering process. The other can be extended
>      to do so.
> 5.2: CRANE, IPDR, Diameter does not address overload behavior.
>      But they can be extended to report on it.
>
>
> Juergen's Conclusion
>
> My view is a bit bit biased, because it is the view of one having to
> implement the protocol on devices. Therefore, I give more weight than
> others might do to the cost of the implementation, the consumption of
> processing power and the memory consumption.
>
> Therefore, I estimate simple approaches. And NetFlow is the most simple
> one. Also I learned that simplicity increases reliability (or safety
> of design and implementation).
>
> I am not sure whether or not I could build a compatible implementation of
> CRANE or LFAP that just ignores all configuration messages received from
> a collector.
>
> If we go for a more complex prototcol, there is the choice between
> problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> more general Diameter on the other side. Diameter would be in favor
> if it was used widely already and anyway be implemented on most boxes.
> Since this is not the case I would go for problem-psecific protocols.
>
> Concerning the produced flows, I clearly prefer the efficient NetFlow,
> IPDR, and CRANE to LFAP and Diameter.
>
> The item level comparison did not show a clear winner.
>
> Considering all this I would recommend to go for NetFlow v9. If this
> is not accepted because NetFlow is considered as too simple or lacking
> functionality, I would recommend using IDPR.
>
>     Juergen
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:23:39 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25684
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:23:39 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184qId-00026v-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 17:17:55 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184qIb-00026E-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 17:17:53 -0500
Received: (qmail 2190 invoked by uid 10041); 24 Oct 2002 22:17:22 -0000
Date: Thu, 24 Oct 2002 15:17:22 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Message-ID: <20021024221722.GD1687@riverstonenet.com>
References: <7B802811BE77D51189910002A55CFD2C04583760@zsc3c032.us.nortel.com> <3DB86C65.2010907@cup.hp.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3DB86C65.2010907@cup.hp.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>


On Thu, Oct 24, 2002 at 02:55:49PM -0700, Jeff Meyer wrote:
>  I agree that opaque blobs are useful, but of the use
>cases cited by Reinaldo, I agree with #3, I think #1
>is interesting, but addressed directly by IPDR, and
>#2 doesn't seem to really be a solution.

I believe supporting blobs is counter productive. 

As I have stated before, I would hope that IPFIX
does not become generic data mover protocol. 
If our data model can not represent what is to be sent, 
then that data should be transferred over some other generic protocol 
such as http, ftp or scp.

My reasoning for this is from previous experience with SNMP deployments.
In SNMP there is the OCTET STRING datatype.
It often gets abused to provide a way to move blobs since
you don't need to train an engineer on the protocol, 
it's data model and how to version the thing. 

Take the Apple Airport (karlbridge) wireless bridge for example. 
It uses SNMP and OCTET STRING blobs for configuration.
Users have to spend too time reverse engineering how use the thing
with standard tools http://www.icir.org/fenner/airport/ thanks to blobs.

LFAPv5 allows blobs since you can identify it with
an OID and OCTET STRING type. SNMP limits the blob size to < 64k
but we do not specify the actual max blob size accpted which could
lead to interperability problems between a collector(C) and exporter(E).

Regards,
Mike MacFAden


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:23:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25711
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:23:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184qGZ-00022w-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 17:15:47 -0500
Received: from sj-msg-core-1.cisco.com ([171.71.163.11])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184qGY-000220-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 17:15:46 -0500
Received: from vvalluri-u10.cisco.com (vvalluri-u10.cisco.com [128.107.162.119])
	by sj-msg-core-1.cisco.com (8.12.2/8.12.2) with ESMTP id g9OMFFPQ006705;
	Thu, 24 Oct 2002 15:15:15 -0700 (PDT)
Date: Thu, 24 Oct 2002 15:15:15 -0700 (PDT)
From: Vamsidhar Valluri <vvalluri@cisco.com>
To: Tal Givoly <givoly@xacct.com>
cc: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs. Overload
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDAEIGCPAA.givoly@xacct.com>
Message-ID: <Pine.GSO.4.44.0210241506520.13769-100000@vvalluri-u10.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

Tal,
  Please see inline

On Thu, 24 Oct 2002, Tal Givoly wrote:

> Vamsi,
>
> Let me just verify my understanding:
>
> <snip>
> packets accounted through Sampling mechanism we create a new Template with
> an additional attribute called "Sampler ID".
> <snip>
>
> The templates are distinguished one from the other by the existence of
> particular attributes?

In current netflow implementation attributes includes Key fields + flow
related statistics

>
> Supposing you want to support many different templates (based on the
> examples you provided):
> 1. IPv4
> 2. IPv4+BGP
> 3. IPv4+BGP+Multicast
> 4. IPv4+Multicast
> 5. IPv6
> 6. MPLS
> 7. IPv6+Multicast
> 8-14. Sampled (for each of above combinations) - another 7 combinations
>
> This will all IMPLICITLY be deducted by the existence of particular
> attributes?

A Template ID is decided on the basis of "Key fields + other flow fields".
If customer is not interested in receiving key fields and is interested
only in other flow fields like for example Bytes and Packet count. Then
for each different set of key fields we generate different Template
distinquished by template ID. And the mapping between Key fields and the
Template ID can be sent as Option Template and Option Data records.

>
> In NFv8, for instance, there are various aggregation schemes supported by
> the routers.
> - Are you implying that the aggregation scheme used by the network element
> would be deduced by the collector by virtue of which fields are MISSING from
> the flow record?

two cases here - currently we send key fields in the flow record. If
customer does not want key fields or wants only subset of them then the
mapping between flow Key and the Template ID will be sent as OPtion data,
since the Template ID is decided on key fields + other attributes.

> - How would you propose extending this to have different aggregation keys
> with the same attributes?

Above should explain this.

-vamsi


>
> Tal
>
> -----Original Message-----
> From: Vamsidhar Valluri [mailto:vvalluri@cisco.com]
> Sent: Wednesday, October 23, 2002 2:58 PM
> To: Tal Givoly
> Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Simon's and Ram's evaluations - Sampling vs.
> Overload
>
>
> Tal,
>   Please see inline
>
> On Wed, 23 Oct 2002, Tal Givoly wrote:
>
> > Juergen,
> >
> > <snip>
> > 5.2: CRANE, IPDR, Diameter does not address overload behavior.
> >      But they can be extended to report on it.
> > <snip>
> >
> > I believe there may be a typo - you mention "5.2 overload behavior",
> however
> > 5.2 is, in fact, sampling behavior. Which did you mean that you differ
> with
> > compared to Simon's review?
> >
> > Regarding Sampling Behavior (and this is in response to both your
> > evaluations
> > as well as Simon's), both evaluations conclude that that CRANE Fails to
> meet
> > this requirement.
> >
> > CRANE clearly allows distinguishing between sampled data and non-sampled
> > data.
> > As CRANE, similarly to IPDR and Diameter, doesn't impose any restrictions
> > on the Metering Process, the latter can easily submit sampled data in
> > a dedicated Template. Even if you consider that there is no intrinsic
> > support
> > specifically for Sampling Behavior within the protocol itself, it is
> > definitely
> > Extendable to that degree, would you not agree?
> >
> >
> > On the other hand, I don't quite understand how NetFlow v9 actually
> supports
> > multiple concurrent Templates by the same Export Process. As NetFlow v9
> > Templates are indistinguishable (they are changed rapidly and not
> negotiated
> > with no uniquely describing attributes!). Therefore, NetFlow v9 cannot
> > support both sampled and non-sampled mode of operations in any
> > combination - a requirement that is implied by the Sampling Requirement
> > (for at least some length of overlap time).
>
> Every Template has an associated ID. Each template identifies unique set
> of attributes. For packets accounted through Sampling mechanism we create
> a new Template with an additional attribute called "Sampler ID". This
> "Sampler ID" uniquely identifies set of Sampling attributes (Sampling
> rate, Sampling algorithm etc). These sampling attributes mapped to ID are
> sent in the form of option templates to the collector. Collector will map
> Sampling
> ID to it's corresponding Option data which contains specific values
> of sampling attributes which will give an idea of type of
> sampling performed on that flow. If there are changes to Sampling
> attributes we create new Option templates with new IDs and send to the
> collector before any data corresponding to that Sampling mechanism is
> exported to collector. We can do this on the fly. We need not exchange
> these Template before we start Netflow accounting on the box. In short if
> Metering process is doing Sampling and non-sampling of data, there exists
> two templates which will uniquely identify Sampled and non-sampled flows.
>
> Some more information:
> Flows can have only IPV4, or IPV4 + BGP related, or IPV4+BGP + Multicast,
> or IPV4+Multicast, or IPV6, or MPLS, or IPV6+Multicast, sampled .......
>
> So there are lot of possible combinations, we create Template only when we
> see these combinations and do not negatiate all these combinations before
> hand. If the Collector can understand these attributes then our mechanism
> is much more flexible.
>
> >
> > Perhaps this question should be directed to the NetFlow protocol advocate:
> >
> > - How can multiple Templates coexist?
>
> Multiple Templates will exist because the attribute set is different. One
> with Sampler ID and one without.
>
>
> > - If, in fact, it is possible for multiple Templates to coexist, please
> >   elaborate how are these distinguished by recipients based on the current
> >   protocol draft?
>
> Please see above explanation. On CCO you will find new Sampling related
> Field Types, if not then they are in the process of updation.
>
> >
> >   For instance, how would a Collection Process differentiate between
> sampled
> >   and non-sampled data? How would this be done if both are being exported
> >   concurrently?
>
> Presence of "sampler ID" attribute will differenciate Sampled from
> non-sampled Data.
>
> thanks
> -vamsi
>
> >
> > Thanks for any clarification.
> >
> > Tal
> >
> >
> >
> > -----Original Message-----
> > From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
> > Of Juergen Quittek
> > Sent: Tuesday, October 22, 2002 7:08 AM
> > To: ipfix-eval@net.doit.wisc.edu
> > Subject: [ipfix-eval] Simon's and Ram's evaluations
> >
> >
> > Dear all,
> >
> > I agree almost completely with Simons evaluation. In Ram's
> > evaluation I like the classification of compliancy per item.
> > Maybe it can be formatted a bit more compact, for example:
> >
> >   "3.1.1.Reliability (5.1)
> >
> >       LFAP: T     CRANE: E     IDPR: E     NetFlow: E     Diameter: E"
> >
> >
> > In the conclusion section I think a table summarizing the
> > classification would be helpful. I put my evaluation into an example
> > for such a table below. It is almost completely consistent with Simon's
> > evaluation and has a few differences to Ram's one:
> >
> >    LFAP   CRANE  IDPR   Net-   Dia-
> >                         Flow   meter
> >     T      E      E      E      E     Reliability (5.1)
> >     E      F      F      T      E     Sampling (5.2)
> >     T      E      E      T      E     Overload Behavior (5.3)
> >     T      T      T      T      T     Timestamps (5.4)
> >     T      T      E      T      T     Time Synchronization (5.5)
> >     T      T      E      T      T     Flow Expiration (5.6)
> >     ?      ?      ?      ?      ?     Multicast Flows (5.7)
> >     ?      ?      ?      ?      ?     Ignore Port Copy (5.8)
> >     T      T      T      T      T     Information Model (6.1)
> >     T      T      T      T      T     Data Model (6.2)
> >     T      T      T      T      T     Congestion Awareness (6.3.1)
> >     T      T      T      P      T     Reliability (6.3.2)
> >     T      T      T      P      T     Security (6.3.3)
> >     T      T      T      T      T     Push Mode Reporting (6.4)
> >     F      F      E      F      E     Pull Mode Reporting (6.4)
> >     T      T      T      T      T     Regular Report. Interval (6.5)
> >     T      T      T      T      T     Notif. on Specif. Events (6.6)
> >     E      E      E      E      E     Anonymization (6.7)
> >     T      T      T      T      T     Openness (8.1)
> >     T      T      T      T      T     Scalability (8.2)
> >     T      T      P      T      T     Several Collecting Proc (8.2)
> > -------------------------------------------------------------------
> >    16     14     11     14     14     number of Ts
> >     2      3      6      2      5     number of Es
> >     0      0      1      2      0     number of Ps
> >     1      2      1      1      0     number of Fs
> >
> > Comments (comparing to Ram's and Simon's evaluation):
> > 5.1: Only LFAP already indicates lask of reliability
> >      of the metering process. The other can be extended
> >      to do so.
> > 5.2: CRANE, IPDR, Diameter does not address overload behavior.
> >      But they can be extended to report on it.
> >
> >
> > Juergen's Conclusion
> >
> > My view is a bit bit biased, because it is the view of one having to
> > implement the protocol on devices. Therefore, I give more weight than
> > others might do to the cost of the implementation, the consumption of
> > processing power and the memory consumption.
> >
> > Therefore, I estimate simple approaches. And NetFlow is the most simple
> > one. Also I learned that simplicity increases reliability (or safety
> > of design and implementation).
> >
> > I am not sure whether or not I could build a compatible implementation of
> > CRANE or LFAP that just ignores all configuration messages received from
> > a collector.
> >
> > If we go for a more complex prototcol, there is the choice between
> > problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> > more general Diameter on the other side. Diameter would be in favor
> > if it was used widely already and anyway be implemented on most boxes.
> > Since this is not the case I would go for problem-psecific protocols.
> >
> > Concerning the produced flows, I clearly prefer the efficient NetFlow,
> > IPDR, and CRANE to LFAP and Diameter.
> >
> > The item level comparison did not show a clear winner.
> >
> > Considering all this I would recommend to go for NetFlow v9. If this
> > is not accepted because NetFlow is considered as too simple or lacking
> > functionality, I would recommend using IDPR.
> >
> >     Juergen
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> > body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message
> body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
>
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 18:32:03 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA25918
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 18:32:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184qQr-0002Oo-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 17:26:25 -0500
Received: from rtp-cse-133.cisco.com ([64.102.54.99])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184qQq-0002OV-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 17:26:24 -0500
Received: from localhost (chelliot@localhost) by rtp-cse-133.cisco.com (8.11.6+Sun/CA/950118) with ESMTP id g9OMPoE03120; Thu, 24 Oct 2002 18:25:50 -0400 (EDT)
Date: Thu, 24 Oct 2002 18:25:50 -0400 (EDT)
From: Chris Elliott <chelliot@cisco.com>
To: Michael MacFaden <mrm@riverstonenet.com>
cc: <ipfix-req@net.doit.wisc.edu>
Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
In-Reply-To: <20021024221722.GD1687@riverstonenet.com>
Message-ID: <Pine.GSO.4.33.0210241823340.2808-100000@rtp-cse-133.cisco.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Thu, 24 Oct 2002, Michael MacFaden wrote:

>
> On Thu, Oct 24, 2002 at 02:55:49PM -0700, Jeff Meyer wrote:
> >  I agree that opaque blobs are useful, but of the use
> >cases cited by Reinaldo, I agree with #3, I think #1
> >is interesting, but addressed directly by IPDR, and
> >#2 doesn't seem to really be a solution.
>
> I believe supporting blobs is counter productive.

I strongly agree. Opaque data types or structures are evil.

>
> As I have stated before, I would hope that IPFIX
> does not become generic data mover protocol.
> If our data model can not represent what is to be sent,
> then that data should be transferred over some other generic protocol
> such as http, ftp or scp.

Agreed.

>
> My reasoning for this is from previous experience with SNMP deployments.
> In SNMP there is the OCTET STRING datatype.
> It often gets abused to provide a way to move blobs since
> you don't need to train an engineer on the protocol,
> it's data model and how to version the thing.

And there used to be an OPAQUE data type in SNMP. It was eliminated early
on, for the same reason that we shouldn't do opaque blobs with IPFIX.

>
> Take the Apple Airport (karlbridge) wireless bridge for example.
> It uses SNMP and OCTET STRING blobs for configuration.
> Users have to spend too time reverse engineering how use the thing
> with standard tools http://www.icir.org/fenner/airport/ thanks to blobs.
>
> LFAPv5 allows blobs since you can identify it with
> an OID and OCTET STRING type. SNMP limits the blob size to < 64k
> but we do not specify the actual max blob size accpted which could
> lead to interperability problems between a collector(C) and exporter(E).
>
> Regards,
> Mike MacFAden
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>

Chris Elliott  CCIE# 2013       |         |
Customer Diagnostic Engineer   |||       |||
RTP, NC, USA                  |||||     |||||
919-392-2146              .:|||||||||:|||||||||:.
chelliot@cisco.com        c i s c o S y s t e m s


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 19:09:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA26451
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 19:09:29 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184qyo-0003SY-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 18:01:30 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184qym-0003SQ-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 18:01:28 -0500
Received: (qmail 22008 invoked from network); 24 Oct 2002 23:01:21 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 24 Oct 2002 23:01:21 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9ON4qu25620
	for <ipfix-req@net.doit.wisc.edu>; Thu, 24 Oct 2002 16:04:52 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <ipfix-req@net.doit.wisc.edu>
Subject: RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Date: Thu, 24 Oct 2002 16:01:24 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEILCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <20021024221722.GD1687@riverstonenet.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

All,

To ensure my previous posting is unambiguous - I believe BLOBs are required.
Not for the reasons of encapsulating any complete record structure or
encapsulated data type, but for extensibility allowing standard or
vendor-specific extensions that have data of the following nature:

- Any string (is support of a variable-length String data type a
requirement?)
- Strings to include header exporting
- Packet portions to include unparsed packet headers
- Arrays of partial routing information (AS paths)
- Digital signatures (for various applications, I can see this as
potentially useful)

Most of the protocols being evaluated do support BLOBs already (CRANE,
Diameter, IPDR and LFAP). One should also consider why these protocols do
so. In all those protocols it wasn't introduced to support opaque
encapsulated data but rather attributes for which finite list of
single-attribute field types may not have been sufficient (such as above
examples).

I completely appreciate the opinions that BLOBs are "evil", however this
should be a guideline in defining standard templates of attributes,
extensions, etc. For instance, we may also add that if a finite, known set,
of fields are to be used, they are not to be stored as BLOBs, or some other
phrasing to attempt avoiding the possibility of abusing the BLOBs to pack
proprietary data.

In practicality, rather than restrict the possible evolution of the
protocol, it seems to me to make sense to require capability to support this
requirement.

Tal


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 19:11:19 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA26519
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 19:11:19 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184r2J-0003dO-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 18:05:07 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184r2I-0003cN-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 18:05:06 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9ON53O17110;
	Thu, 24 Oct 2002 19:05:03 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-req@net.doit.wisc.edu>
Subject: RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Date: Thu, 24 Oct 2002 19:04:53 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607A482@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660C8B86@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Michael MacFaden sez (Thursday, October 24, 2002 6:17 PM)
> 
> As I have stated before, I would hope that IPFIX
> does not become generic data mover protocol. 
> If our data model can not represent what is to be sent, 
> then that data should be transferred over some other generic protocol 
> such as http, ftp or scp.

That of course doesn't help support vendor differentiation.
There are flow probes available that report flow jitter in
every record. LFAP doesn't have a data element for jitter,
so if there wasn't support for a blob, there would be no way to
transport this important metric.  I'm sure that you're
not serious in suggesting that we use HTTP to fetch the
jitter metric for each IPFIX flow record that is received.

I thought it was a MUST requirement to have vendor specific
blobs in IPFIX?

> 
> My reasoning for this is from previous experience with SNMP 
> deployments. In SNMP there is the OCTET STRING datatype. It 
> often gets abused to provide a way to move blobs since you 
> don't need to train an engineer on the protocol, 
> it's data model and how to version the thing. 
> 
> Take the Apple Airport (karlbridge) wireless bridge for example. 
> It uses SNMP and OCTET STRING blobs for configuration.
> Users have to spend too time reverse engineering how use the 
> thing with standard tools http://www.icir.org/fenner/airport/ 
> thanks to blobs.

But at least they are using SNMP, instead of say, Appletalk.
That says more for SNMP's utility than you want to give it
credit for.  I'm sure apple's configuration application doesn't
have any problems configuring the box.
 

Carter



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 19:32:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA26998
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 19:32:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184rKY-0004B9-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 18:23:58 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184rKW-0004B2-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 18:23:56 -0500
Received: (qmail 23455 invoked from network); 24 Oct 2002 23:23:48 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 24 Oct 2002 23:23:48 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9ONRKu26245;
	Thu, 24 Oct 2002 16:27:20 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: "Simon Leinen" <simon@limmat.switch.ch>, <calato@riverstonenet.com>
Cc: <carter@qosient.com>, "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Split reporting, memory consumption, and "snapshot" attributes [was: Discussion of Candidate Protocols]
Date: Thu, 24 Oct 2002 16:23:52 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEIMCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <aaof9jqzgi.fsf_-_@limmat.switch.ch>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Simon/Paul,

As there's been some debate regarding terminology, may I lend a slightly
DB-centric perspective: In SQL terminology, the attributes that are shared
would be identified by "First()" aggregate functions while most aggregates
would be result of aggregate functions such as "Sum()" functions.

Notice that if a device does employ "split reporting", obviously the
complexity of the collector is increased and it must create a "join" between
the two flows.

Split reporting would no longer be FNF, but instead would be 3NF -
increasing complexity in the metering process as well, if this is a
requirement.

In order to keep things simple and more broadly accepted, it seems to me
that leaving things in FNF is more likely to be adopted and implemented - a
desirable trait of any standard.

My $0.02.

Tal


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 21:03:04 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA28821
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 21:03:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184sl8-0006qW-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 19:55:30 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184sl6-0006qQ-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 24 Oct 2002 19:55:28 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9P0tOO17170;
	Thu, 24 Oct 2002 20:55:24 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Tal Givoly'" <givoly@xacct.com>,
        "'Simon Leinen'" <simon@limmat.switch.ch>, <calato@riverstonenet.com>
Cc: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Split reporting, memory consumption, and "snapshot" attributes [was: Discussion of Candidate Protocols]
Date: Thu, 24 Oct 2002 20:55:14 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607A483@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660C8BCA@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Gentle people,
   Everyone seems to take it for granted that its cool to bind
non-key attributes to aggregated data, but there are some
relational algebraic gottchas that you have to solve if
you want IPFIX data to be "correct", and Tal has touched on
one of them.  

   Split reporting assumes that there is a reason to report
transitions in non-key attribute data, but is there really
a relational algebraic basis to justify "going to the trouble"?
It really hinges on the concept of data "correctness", and
whether non-key attributes can every achieve any level of
correctness in IPFIX data.  Let me use an example to demonstrate
what I'm getting at.

   TTL will most likely be a perennial non-key attribute that
will be directly supported in the IPFIX data model.  It is one
of the simplest of the non-key attributes to deal with, because
the value is contained in the actual observed data, so the value
has some "correctness".  But, TTL can change often during the
brief life of a flow, and as a result, when an IPFIX device
reports a single value for TTL in a flow report, the value has
only limited applicability as an attribute.  It doesn't really
apply to the whole flow, it is safe to say that it applies to
at most, only one packet of the flow.

   Now reporting this non-key attribute is very useful, and it
should be done, but attempting to engineer some level of
"correctness" into this value would definitely be futile.  The
reason is that as transitions in non-key attributes reach a
certain level, and a pretty low level at that, the attempt to
maintain attribute "correctness" overwhelms the system.  In
the analysis, this is the general case for any non-key attribute
that changes, even AS number.

   So what to do?  My suggestion is to understand that non-key
attributes are not relational attributes, and as such little
engineering should be done to try to improve on the data's
"correctness".  They are interesting bits of information and can
be of value using appropriate statistical methods.  Maybe just
put a bit in the record that indicates if the value is correct
or not is all you need to do.

I hope this has been of interest.

Carter



   




> -----Original Message-----
> From: majordomo listserver 
> [mailto:majordomo@mil.doit.wisc.edu] On Behalf Of Tal Givoly
> Sent: Thursday, October 24, 2002 7:24 PM
> To: Simon Leinen; calato@riverstonenet.com
> Cc: carter@qosient.com; 'Michael MacFaden'; 
> ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Split reporting, memory 
> consumption, and "snapshot" attributes [was: Discussion of 
> Candidate Protocols]
> 
> 
> Simon/Paul,
> 
> As there's been some debate regarding terminology, may I lend 
> a slightly DB-centric perspective: In SQL terminology, the 
> attributes that are shared would be identified by "First()" 
> aggregate functions while most aggregates would be result of 
> aggregate functions such as "Sum()" functions.
> 
> Notice that if a device does employ "split reporting", 
> obviously the complexity of the collector is increased and it 
> must create a "join" between the two flows.
> 
> Split reporting would no longer be FNF, but instead would be 
> 3NF - increasing complexity in the metering process as well, 
> if this is a requirement.
> 
> In order to keep things simple and more broadly accepted, it 
> seems to me that leaving things in FNF is more likely to be 
> adopted and implemented - a desirable trait of any standard.
> 
> My $0.02.
> 
> Tal
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 22:01:07 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA00046
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 22:01:07 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184teG-0000aS-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 20:52:28 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184teC-0000VZ-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 20:52:25 -0500
Received: (qmail 5213 invoked by uid 10041); 25 Oct 2002 01:51:47 -0000
Date: Thu, 24 Oct 2002 18:51:47 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Message-ID: <20021025015147.GK1687@riverstonenet.com>
References: <5C8959A16A71B449AE793CF52FBBED660C8B86@ptah.newyork.qosient.com> <5C8959A16A71B449AE793CF52FBBED6607A482@ptah.newyork.qosient.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607A482@ptah.newyork.qosient.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Thu, Oct 24, 2002 at 07:04:53PM -0400, Carter Bullard wrote:
>> If our data model can not represent what is to be sent, 
>> then that data should be transferred over some other generic protocol 
>> such as http, ftp or scp.
>
>That of course doesn't help support vendor differentiation.

I believe the goal is to standardize what is common 
practice *today* and that the result is *interoperable*.
I think generic BLOBS simply impede interoperable collectors
from doing anything even remotely useful with the delivered data.

>I thought it was a MUST requirement to have vendor specific
>blobs in IPFIX?

I read the requirement the one could add specific type/values
from predefined datatypes or possibly extended datatypes.

So if one were to ship a something like a raw ipv4 header or 
some packet slice, it must have a specific datatype 
associated with it that defines what it is clearly.

>> Take the Apple Airport (karlbridge) wireless bridge for example. 
>
>But at least they are using SNMP, instead of say, Appletalk.
>That says more for SNMP's utility than you want to give it
>credit for.  I'm sure apple's configuration application doesn't
>have any problems configuring the box.

The "utility" you speak of simply breaks interoperability. 
The same amount of reverse engineering would have had to be 
done using AppleTalk, IPX or any other dumb transport
and will have to be redone when the vendor changes the firmware. 

Mike MacFaden

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 22:45:24 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA01120
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 22:45:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184uHD-0001fp-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 21:32:43 -0500
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184uHB-0001f8-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 21:32:41 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9P2SLE29641;
	Thu, 24 Oct 2002 19:28:21 -0700 (PDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBB103>; Thu, 24 Oct 2002 19:28:20 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C045839B1@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Date: Thu, 24 Oct 2002 19:28:21 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27BCE.2FBD4DD0"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27BCE.2FBD4DD0
Content-Type: text/plain;
	charset="iso-8859-1"

Hello Michael,

comments inline...

> -----Original Message-----
> From: Michael MacFaden [mailto:mrm@riverstonenet.com]
> Sent: Thursday, October 24, 2002 6:52 PM
> To: ipfix-req@net.doit.wisc.edu
> Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
> 
> 
> On Thu, Oct 24, 2002 at 07:04:53PM -0400, Carter Bullard wrote:
> >> If our data model can not represent what is to be sent, 
> >> then that data should be transferred over some other 
> generic protocol 
> >> such as http, ftp or scp.
> >
> >That of course doesn't help support vendor differentiation.
> 
> I believe the goal is to standardize what is common 
> practice *today* and that the result is *interoperable*.
> I think generic BLOBS simply impede interoperable collectors
> from doing anything even remotely useful with the delivered data.

We will have a standard set of type fields. All exporters and collectors
will have to comply with the minimum set described in the data model. That's
your interoperability. Blobs would be useful for certain
situations/deployment/scenarios.

When we go to a backoff we do not test all possible extensions of a
protocol, a recent example that I can give is SIP. We test the core
functionality. If you are interested in interoperating for instant messaging
or QoS then you test with some other specific vendors.

So I think it's the other way around than what you say. Interoperability and
extensibility should go together. Because if the protocol is not extensible,
THEN people will hack away the base specification to suit their customer
needs or some scenario and THEN we will have a non-interoperable protocol.
 

> 
> >I thought it was a MUST requirement to have vendor specific
> >blobs in IPFIX?
> 
> I read the requirement the one could add specific type/values
> from predefined datatypes or possibly extended datatypes.
> 
> So if one were to ship a something like a raw ipv4 header or 
> some packet slice, it must have a specific datatype 
> associated with it that defines what it is clearly.

That's the problem I foresee. Imagine how many data types we will have in
the future. All the combinations possible with all the protocols that run
over IP. Maybe what a vendor or its customer wants for a certain scenario is
a blob that contains, for instance, the DSCP field + ECN + TCP window size.
For other deployment I might need the URL + the Cache header, etc, etc.
Extrapolate that to all possible combinations and you will see the profusion
of new fields IANA will have to standardize, the size of the parser, etc 


> 
> >> Take the Apple Airport (karlbridge) wireless bridge for example. 
> >
> >But at least they are using SNMP, instead of say, Appletalk.
> >That says more for SNMP's utility than you want to give it
> >credit for.  I'm sure apple's configuration application doesn't
> >have any problems configuring the box.
> 
> The "utility" you speak of simply breaks interoperability. 
> The same amount of reverse engineering would have had to be 
> done using AppleTalk, IPX or any other dumb transport
> and will have to be redone when the vendor changes the firmware. 
> 
> Mike MacFaden
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C27BCE.2FBD4DD0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-req] list of issues - Reinaldo - 7 (or Carter =
-1)</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hello Michael,</FONT>
</P>

<P><FONT SIZE=3D2>comments inline...</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Michael MacFaden [<A =
HREF=3D"mailto:mrm@riverstonenet.com">mailto:mrm@riverstonenet.com</A>]<=
/FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Thursday, October 24, 2002 6:52 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-req] list of issues - =
Reinaldo - 7 (or Carter -1)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Thu, Oct 24, 2002 at 07:04:53PM -0400, =
Carter Bullard wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; If our data model can not represent =
what is to be sent, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; then that data should be transferred =
over some other </FONT>
<BR><FONT SIZE=3D2>&gt; generic protocol </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; such as http, ftp or scp.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;That of course doesn't help support vendor =
differentiation.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I believe the goal is to standardize what is =
common </FONT>
<BR><FONT SIZE=3D2>&gt; practice *today* and that the result is =
*interoperable*.</FONT>
<BR><FONT SIZE=3D2>&gt; I think generic BLOBS simply impede =
interoperable collectors</FONT>
<BR><FONT SIZE=3D2>&gt; from doing anything even remotely useful with =
the delivered data.</FONT>
</P>

<P><FONT SIZE=3D2>We will have a standard set of type fields. All =
exporters and collectors will have to comply with the minimum set =
described in the data model. That's your interoperability. Blobs would =
be useful for certain situations/deployment/scenarios.</FONT></P>

<P><FONT SIZE=3D2>When we go to a backoff we do not test all possible =
extensions of a protocol, a recent example that I can give is SIP. We =
test the core functionality. If you are interested in interoperating =
for instant messaging or QoS then you test with some other specific =
vendors.</FONT></P>

<P><FONT SIZE=3D2>So I think it's the other way around than what you =
say. Interoperability and extensibility should go together. Because if =
the protocol is not extensible, THEN people will hack away the base =
specification to suit their customer needs or some scenario and THEN we =
will have a non-interoperable protocol.</FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
</P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;I thought it was a MUST requirement to have =
vendor specific</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;blobs in IPFIX?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I read the requirement the one could add =
specific type/values</FONT>
<BR><FONT SIZE=3D2>&gt; from predefined datatypes or possibly extended =
datatypes.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; So if one were to ship a something like a raw =
ipv4 header or </FONT>
<BR><FONT SIZE=3D2>&gt; some packet slice, it must have a specific =
datatype </FONT>
<BR><FONT SIZE=3D2>&gt; associated with it that defines what it is =
clearly.</FONT>
</P>

<P><FONT SIZE=3D2>That's the problem I foresee. Imagine how many data =
types we will have in the future. All the combinations possible with =
all the protocols that run over IP. Maybe what a vendor or its customer =
wants for a certain scenario is a blob that contains, for instance, the =
DSCP field + ECN + TCP window size. For other deployment I might need =
the URL + the Cache header, etc, etc. Extrapolate that to all possible =
combinations and you will see the profusion of new fields IANA will =
have to standardize, the size of the parser, etc </FONT></P>
<BR>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Take the Apple Airport (karlbridge) =
wireless bridge for example. </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;But at least they are using SNMP, instead =
of say, Appletalk.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;That says more for SNMP's utility than you =
want to give it</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;credit for.&nbsp; I'm sure apple's =
configuration application doesn't</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;have any problems configuring the =
box.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; The &quot;utility&quot; you speak of simply =
breaks interoperability. </FONT>
<BR><FONT SIZE=3D2>&gt; The same amount of reverse engineering would =
have had to be </FONT>
<BR><FONT SIZE=3D2>&gt; done using AppleTalk, IPX or any other dumb =
transport</FONT>
<BR><FONT SIZE=3D2>&gt; and will have to be redone when the vendor =
changes the firmware. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Mike MacFaden</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27BCE.2FBD4DD0--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 24 23:04:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA01355
	for <ipfix-archive@lists.ietf.org>; Thu, 24 Oct 2002 23:04:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184ugS-0002Ld-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 24 Oct 2002 21:58:48 -0500
Received: from [64.95.122.60] (helo=agile.yagosys.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 184ugQ-0002Kp-00
	for ipfix-req@net.doit.wisc.edu; Thu, 24 Oct 2002 21:58:46 -0500
Received: (qmail 5687 invoked by uid 10041); 25 Oct 2002 02:58:15 -0000
Date: Thu, 24 Oct 2002 19:58:15 -0700
From: Michael MacFaden <mrm@riverstonenet.com>
To: ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1)
Message-ID: <20021025025814.GM1687@riverstonenet.com>
References: <7B802811BE77D51189910002A55CFD2C045839B1@zsc3c032.us.nortel.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <7B802811BE77D51189910002A55CFD2C045839B1@zsc3c032.us.nortel.com>
User-Agent: Mutt/1.4i
X-Operating-System: GNU/Linux 2.4.18
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
>That's the problem I foresee. Imagine how many data types we will have in
>the future. All the combinations possible with all the protocols that run
>over IP. Maybe what a vendor or its customer wants for a certain scenario is
>a blob that contains, for instance, the DSCP field + ECN + TCP window size.
>For other deployment I might need the URL + the Cache header, etc, etc.
>Extrapolate that to all possible combinations and you will see the profusion
>of new fields IANA will have to standardize, the size of the parser, etc 

I do think we all agree the protocol must be extensible as per the
requirements, but just not on the the scope yet. Some of us take
a narrow view of what the protocol should report (IPv4, IPv6 headers)
others prefer a wider view (everything else).

These divergent views will have to be considered carefully in evaluating 
how extensible the protocol should actually be. Section 6.2 of the
requirements doc could then be updated to reflect the consensus. 

I will say it one last time and shut up. 

BLOBs hinder interoperability, BLOBs are bad.

There. Peace Out.
Mike MacFaden


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 02:09:48 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA13664
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 02:09:48 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184xST-0007Kk-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 00:56:33 -0500
Received: from mgw-dax2.ext.nokia.com ([63.78.179.217])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184xSN-0007Ka-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 00:56:27 -0500
Received: from davir02nok.americas.nokia.com (davir02nok.americas.nokia.com [172.18.242.85])
	by mgw-dax2.ext.nokia.com (Switch-2.2.1/Switch-2.2.0) with ESMTP id g9P5vGU09406
	for <ipfix-eval@net.doit.wisc.edu>; Fri, 25 Oct 2002 00:57:16 -0500 (CDT)
Received: from daebh002.NOE.Nokia.com (unverified) by davir02nok.americas.nokia.com
 (Content Technologies SMTPRS 4.2.5) with ESMTP id <T5e2575894aac12f255079@davir02nok.americas.nokia.com>;
 Fri, 25 Oct 2002 00:56:25 -0500
Received: from bsebe001.NOE.Nokia.com ([172.19.160.13]) by daebh002.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.5329);
	 Fri, 25 Oct 2002 00:56:25 -0500
content-class: urn:content-classes:message
Subject: RE: [ipfix-eval] IPDR response to evaluation drafts
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
X-MimeOLE: Produced By Microsoft Exchange V6.0.6249.0
Date: Fri, 25 Oct 2002 01:56:24 -0400
Message-ID: <DC504E9C3384054C8506D3E6BB0124607AE48A@bsebe001.americas.nokia.com>
Thread-Topic: [ipfix-eval] IPDR response to evaluation drafts
Thread-Index: AcJ7mqioAM0cL1mYRB6C28BjEAsIUQATqzLQ
From: <ram.gopal@nokia.com>
To: <jeffm@cup.hp.com>, <ipfix-eval@net.doit.wisc.edu>
X-OriginalArrivalTime: 25 Oct 2002 05:56:25.0581 (UTC) FILETIME=[40E0F1D0:01C27BEB]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id CAA13664

Hello Jeff,

Comments are inline.

> Hi,
> 
>    I wanted to respond, from an IPDR perspective, to the two
> evaluation drafts submitted.
> 
>    http://ipfix.doit.wisc.edu/archive/1266.html (Simon)
>  
> http://ipfix.doit.wisc.edu/archive/att-1277/01-draft-gopal-ipf
> ix-eval-00.txt 
> (Ram)
>    Ram's draft seems to reflect some misconceptions about
> IPDR (often misspelled as IDRP).  It is probably a combination
> of the newness of IPDR in this community and the lack
> of my writing ability to more clearly explain how
> IPDR is used to address IPFIX.  I think Simon's
> summary in section 2.5 does a good job of characterizing
> IPDR.

Sorry for using wrong abbreviation.
 
> 
>    Specific comments on Ram's submission relative to
> streaming IPDR.
> 
> 
> 2.3  "IPDR... does not explicitly describe the IPFIX
> architectural requirements".
> 
>    IPDR does address the requirements for an IPFIX
> exporter process, hence the advocacy draft.  Streaming
> IPDR defines a lightweight accounting protocol, which
> is primarily unidirectional.
> 
If you read the draft for the first time after going through the IPFIX 
requirements and architecture, the draft simply explains the interactions
between two TCP endpoints and XML message schema. There is a little amount 
of discussion about the capabilities of the endpoints.  It would recommend 
by explaining few sentences in relation to IPFIX architecture.

 
> 
> 
> 3.1.x Grades and Comments
> 
>    Given the separation of most candidate protocols from
> the Metering Process itself.  I am unclear how some
> of these results were arrived at.
> 
>    For example in section 3.1.2 Sampling (5.2) the
> discussion says that IDPR (sic) is an "F" and that
> Diameter is an "E".
> 
>    As stated in the IPDR advocacy draft:
> 
>     Please note that the requirements specified in sections 
> 4, 5 and 7.1
>     of IPFIX Requirements [1] do not directly concern the 
> IPFIX protocol,
>     but the semantics of the data transferred.  They can be 
> met easily by
>     extensible protocols that do not restrict sematics of transferred
>     data.  This includes the Streaming IPDR format, as the data model
>     allows for arbitrary extension, following a well established
>     standard, XML Schema [4].

Metering process is the capability of the endpoint and it has little thing
to do with the XML scheme. 


 
>   In Diameter, there is an explicit statement for
> this requirement:
> 
>     This requirement is a metering process requirement. However the
>     IPFIX protocol must support to export some information about
>     sampling configuration.  New (grouped) AVPs can be defined for
>     carrying the sampling configuration.

Sampling is an operation ( or procesing ) capability of metering endpoint.
 
> 
>   I believe these two statements are equivalent in their approach.
> 
> 
>   In 3.1.3 Overflow.  IPDR got an "E" and Diameter gets an "F",
> where in both cases, the same logic applies as for sampling.

Can you revisit, If you feel that there is an explicit requirement of metering
in your protocol endpoint please document so.  It's good that you opened the discussion,
if you have any other hidden functions or features, please send an email  this will 
speed up the evaluation process.
 
 
 
> 
>   In section 3.1.11, data model.  Describes the use of
> XML, but does not indicate that XDR is the wire format
> for the information.
> 
> 
>   In section 3.1.15, security.  Raises the question of
> whether XML security would be used.  The protocol
> communication does NOT use XML, so this would not
> be appropriate.  Think of SNMP.  I don't need a MIB
> compiler to send an SNMP request.  Likewise with
> IPDR, you don't need an XML processor to use
> StreamingIPDR.
> 
 

Good explanation, It was more of a clarification. I have not commented anything 
against your the proposal.
As the document was silent in describing security, I gave my view on that.
 
Document initially mentioned XML and XDR. It was my impression that my TLS or IPsec can
be an ideal candidate, since XML is being used between two endpoints XML security also be 
considered.

What you represent as a flow using XML can be conveyed in wire in may different format and this 
is the basic confusion.


Regards
Ramg 
 

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 03:49:52 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA15140
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 03:49:52 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184z7z-0002tp-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 02:43:31 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184z7x-0002sx-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 02:43:29 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g9P7gvGU025355
	for <ipfix-eval@net.doit.wisc.edu>; Fri, 25 Oct 2002 09:42:57 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g9P7guZE025352
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 09:42:56 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: "Tal Givoly" <givoly@xacct.com>
Cc: <simon@limmat.switch.ch>, <ipfix-eval@net.doit.wisc.edu>,
        "Peter Ludemann" <peter.ludemann@xacct.com>
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
References: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
Date: 25 Oct 2002 09:42:56 +0200
Message-ID: <aa1y6f3qwv.fsf@limmat.switch.ch>
Lines: 37
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Mon, 14 Oct 2002 21:18:52 -0700, "Tal Givoly" <givoly@xacct.com> said:
> I truly appreciate your comprehensive analysis of all protocols in
> question.

Thanks! (I wished all specifications were as readable as the CRANE one ;-)

> May I try to make a few corrections regarding CRANE:

> One of its main design goals was, in fact, efficiency.

I'm not worried about CRANE's on-the-wire efficiency or the
possibility of high-performance implementations.

What I'm concerned about is the complexity (and associated cost of
implementation) of the CRANE protocol, in particular template
negotiation, but also status requests.

> Under circumstances in which exists no network congestion or failure
> in receivers (servers) it has been benchmarked to perform 90%
> performance of NetFlow v5 (which is even more efficient than NetFlow
> v9). In fact, performance/efficiency/scalability has been a design
> goal. The goals of CRANE are, in the following order:

> - Reliability - working with carriers on absorbing usage information
> from routers for the purpose of usage-sensitive billing has lead us
> to believe that the weakest link in the chain is the interface
> between the mediation system and the network/service element. This
> was the prime goal of developing an additional protocol where
> NetFlow provided an efficient solution.

> - Scalable - both in the sense of a large, distributed network as
> well as in the sense of efficiency - making the overall cost of
> collecting usage information least while maintaining the rest of the
> requirements.
[...]
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 03:52:54 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA15261
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 03:52:54 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 184zBL-0002zP-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 02:46:59 -0500
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 184zBJ-0002yS-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 02:46:57 -0500
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g9P7kQGU025372
	for <ipfix-eval@net.doit.wisc.edu>; Fri, 25 Oct 2002 09:46:26 +0200 (MEST)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g9P7kPM9025369
	for <ipfix-eval@net.doit.wisc.edu>; Fri, 25 Oct 2002 09:46:25 +0200 (MEST)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: "Tal Givoly" <givoly@xacct.com>
Cc: <simon@limmat.switch.ch>, <ipfix-eval@net.doit.wisc.edu>,
        "Peter Ludemann" <peter.ludemann@xacct.com>
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
References: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
Date: 25 Oct 2002 09:46:25 +0200
Message-ID: <aavg3r2c6m.fsf@limmat.switch.ch>
Lines: 76
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

> One of its main design goals was, in fact, efficiency. Under
> circumstances in which exists no network congestion or failure in
> receivers (servers) it has been benchmarked to perform 90%
> performance of NetFlow v5 (which is even more efficient than NetFlow
> v9). In fact, performance/efficiency/scalability has been a design
> goal. The goals of CRANE are, in the following order:

> - Reliability - working with carriers on absorbing usage information
> from routers for the purpose of usage-sensitive billing has lead us
> to believe that the weakest link in the chain is the interface
> between the mediation system and the network/service element. This
> was the prime goal of developing an additional protocol where
> NetFlow provided an efficient solution.

Yes, CRANE presumably (I'm not an expert in engineering protocols for
high reliability) provides features that allow telco-billing-grade
accounting systems to be built.

On the other hand (1) unreliable flow information export protocols are
heavily used, (2) even some applications that involve charging
tolerate a modest amount of data loss, and (3) total reliability
cannot be achieved in this world.

My position is that we should be careful in how far we should depart
from current (unreliable) practice in order to make the protocol
useful for applications that seem to have higher, although probably
not infinitely high, demands on reliability.

Mandating support of a "reliable" transport protocol (TCP or SCTP)
seems to be a very good first step, because this makes the
congestion-friendliness requirement easy to fulfill, uses
well-understood technology (at least for TCP :-), and creates a
feedback loop between the exporter and the collector (including the
network path between them).  This enables the entire system to adapt
to different bottlenecks.  Note that reasonable methods of adaptation
include the metering system shedding load for the export/collection
system, for example by changing to sampled accounting.  This would
probably seem scary to mediation/billing folks but is widely accepted
in the community (statically configured sampling; I think sampling
that adapts to load would be found even more acceptable).

Application-level acknowledgements are a way to further increase
reliability at relatively low cost.  (Whether those could already be
sent "when data has been written to disk" or only when the bill has
been paid is debatable.)

Sequence numbers for flow records, or bunches of flow records, are
another approach that is lightweight.  It has proven useful with
unreliable export protocols, but is also useful for de-duplication in
redundant configurations.

Beyond this I see diminishing returns.  Mechanisms for maintaining
total consistency between redundant components tend to introduce their
own reliability issues.

> - Scalable - both in the sense of a large, distributed network as
> well as in the sense of efficiency - making the overall cost of
> collecting usage information least while maintaining the rest of the
> requirements.

Frankly I cannot make out huge difference between the protocols with
respect to scalability.  Probably you are hinting at 
 
> Basically, CRANE does embody your main conclusion - we came to
> develop it due to the shortcoming of all other existing flow export
> protocols at the time (NetFlow v1-v8, LFAP v1-4, RADIUS, DIAMETER,
> SNMP and TopFlow as well as other protocols not evaluated here used
> in Telco applications, such as AMA, ASN.1, etc.). All we essentially
> did was add reliability and extensibility. Our desire was not to
> necessitate the need for any further protocol replacement, so for
> this we added the version and template negotiation.

So CRANE is like (previous) LFAP + reliability + extensibility?
(and IPDR is like (previous) NetFlow + reliability + extensibility?)
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 08:29:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA22531
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 08:29:02 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1853TB-0005RC-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 07:21:41 -0500
Received: from [147.28.4.2] (helo=roam.psg.com ident=exim)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1853T8-0005Qy-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 07:21:38 -0500
Received: from localhost
	([127.0.0.1] helo=roam.psg.com.psg.com ident=randy)
	by roam.psg.com with esmtp (Exim 4.05)
	id 1853T5-000HKt-00; Fri, 25 Oct 2002 05:21:35 -0700
From: Randy Bush <randy@psg.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
To: Simon Leinen <simon@limmat.switch.ch>
Cc: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
References: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
	<aavg3r2c6m.fsf@limmat.switch.ch>
Message-Id: <E1853T5-000HKt-00@roam.psg.com>
Date: Fri, 25 Oct 2002 05:21:35 -0700
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> My position is that we should be careful in how far we should depart
> from current (unreliable) practice in order to make the protocol
> useful for applications that seem to have higher, although probably
> not infinitely high, demands on reliability.

indeed.  folk might find it useful look at this wg's charter.  this was
meant to be a rather focused effort.

randy


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 09:47:17 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA24777
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 09:47:17 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1854fY-0007eq-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 08:38:32 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1854fW-0007dp-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 08:38:30 -0500
Received: from riverstonenet.com ([134.141.180.103]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Fri, 25 Oct 2002 06:37:57 -0700
Message-ID: <3DB948BB.50148BB5@riverstonenet.com>
Date: Fri, 25 Oct 2002 09:35:55 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: carter@qosient.com, "'Michael MacFaden'" <mrm@riverstonenet.com>,
        ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Re: Split reporting, memory consumption, and "snapshot" attributes[was: 
 Discussion of Candidate Protocols]
References: <5C8959A16A71B449AE793CF52FBBED6607A45C@ptah.newyork.qosient.com>
		<3D9DBF0A.1DCD90FE@riverstonenet.com> <aaof9jqzgi.fsf_-_@limmat.switch.ch>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 25 Oct 2002 13:37:58.0362 (UTC) FILETIME=[BB0FFBA0:01C27C2B]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit


Very nice analysis!

One thing you left out is that many of the snapshot attributes
are already known by the device at the time the flow is created.
For example the dst AS has already been looked up. By waiting
until the end, you actually cause more work by doing operations
twice. Another example is we get some information from the ACL
the packet matched. This ACL processing would also have to
be done again.

In addition, there are other packet attributes such tcp flags, 
MAC address, etc... that cannot be retrieved later. Since they
are not part of the key their use would be more of a heuristic,
but may be useful none the less depending on the application.


Paul


Simon Leinen wrote:
> 
> On Fri, 04 Oct 2002 12:17:14 -0400, calato@riverstonenet.com said:
> >       The problem with the one shot messages is storage.
> 
> Sorry for the late response.  I've been trying to understand the
> tradeoffs of "split reporting" (as LFAP does with its FAR/FUN
> messages) and what you call "one-shot reporting", which is what
> e.g. NetFlow does.
> 
> >       The device now needs to store all the attributes until it is
> >       time to send the message. When you have millions of flows this
> >       can be a huge problem! Or if the device is small it can be a
> >       large problem. And as the number of attributes to report grows
> >       it makes the problem worse.
> 
> At first I thought that this doesn't matter, because you I only
> thought about two types of attributes for a flow:
> 
> 1.) Attributes such as src/dst addresses etc., which are part of the
>     flow "key", i.e. distinguish the flow from others.  Those must be
>     stored over the entire lifetime of the flow anyway, or the meter
>     wouldn't be able to match packets to flows.  With split reporting,
>     they can be exported at the start of the flow versus at the end -
>     no benefit here.
> 
> 2.) Attributes such as octet and packet counters, which represent
>     "measurements" about the flow and which have to be updated for
>     every packet.  Those have to be stored and updated by the meter,
>     and exported by the exporter in any case.
> 
> For these types of attributes, I think split reporting doesn't provide
> any storage benefit on the exporter.  However, there is a third type
> of attribute:
> 
> 3.) Attributes that are neither part of the "flow key" (this notion
>     isn't part of our terminology, but I find it very useful), but
>     that aren't updated for every packet either.  Let's call those
>     "snapshot" attributes for the sake of the discussion.
> 
> Such attributes exist in practice, although they are somewhat
> problematic if you think about it.
> 
> Examples of such attributes might include the source/destination AS
> number (which might either be the upstream/downstream or
> origin/terminus AS number :-), source or destination address prefix
> length, which are thought of as "usually" stable over the lifetime of
> a flow.
> 
> In split reporting, they can be reported when the flow is created at
> the meter, using something like LFAP's "FAR" message, and then the
> meter (and exporter) can forget about them.
> 
> With one-shot reporting (I'm tempted to call this "unitary reporting"
> because that sounds way more scientific), the meter must hold on to
> these attributes until the flow can be exported (usually when it is
> expired from the meter).
> 
> However...
> 
> Some of these attributes don't actually have to be stored, as they can
> be computed from other attributes (that must be stored anyway) when
> the flow is exported.  For example, an AS number can be computed from
> the corresponding flow's IP address using a BGP table lookup on
> export.
> 
> The difference is that split reporting would report those attributes
> as they were valid for the first packet of a flow, while "unitary flow
> export" would probably report them as of the time of export of the
> flow - which usually happens closely after the last packet.  Since we
> assume that these attributes generally remain stable over the lifetime
> of a flow, the result should be the same in most cases.   When it
> isn't (during e.g. routing changes over the lifetime of the flow), I
> cannot see a clear advantage for either.
> 
> So for this sub-type of the third class of attributes there doesn't
> seem to be a clear benefit with split reporting either.
> 
> For the remaining attributes in the third class, split reporting would
> provide the possibility of space savings at the meter/exporter.  One
> obvious such attribute is the observation time of the first packet.
> 
> The question is are there many other attributes that would fall into
> this (sub-)class, and are the possible savings sufficient to make
> split reporting an obvious win?
> 
> Besides complicating the protocol, split reporting does seem to
> require more memory at the collector, which has to match FUNs with
> FARs if it wants to combine data from both.
> 
> I'm just trying to understand the tradeoff.
> 
> >       Solving this problem is much more difficult than allowing LFAP
> >       to send one shot messages.
> 
> (If you think there actually *is* a problem, that is :-)
> 
> >       LFAP has solved this problem by splitting up the attributes
> >       and allowing them to be reported independently.
> --
> Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 11:44:15 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA28932
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 11:44:14 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1856Vr-0003P9-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 10:36:39 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1856Vp-0003OP-00
	for ipfix-req@net.doit.wisc.edu; Fri, 25 Oct 2002 10:36:37 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9PFa4Y15518;
	Fri, 25 Oct 2002 17:36:05 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP
	id F03214D8A7; Fri, 25 Oct 2002 17:35:58 +0200 (CEST)
Date: Fri, 25 Oct 2002 17:35:59 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of issues - Reinaldo - 7 (or Carter -1))
Message-ID: <18596019.1035567359@[192.168.102.164]>
In-Reply-To: <20021025025814.GM1687@riverstonenet.com>
References:  <20021025025814.GM1687@riverstonenet.com>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Let's all have a look at our charter:

1. It starts with: "There are a number of IP flow information
   export systems in common use."

2. Later it says: "This group will select a protocol ...".

3. There is no mentioning of "This group will merge all
   protocols ...".
   Also there is no mentioning of "This group will design a
   protocol."

Consequently, we should go on with what we have started already:
selecting ONE of the candidate protocol.

If the BLOB discussion ends up with saying "Just selecting one
is a bad idea, we won't do it.", then we should stop our work and
ask for re-chartering.

However, I think, charter discussion was extensive and we made
good progress based on the current charter. I definitely want
to continue this.

    Juergen


-- Michael MacFaden wrote on 24 October 2002 19:58 -0700:

> On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
>> That's the problem I foresee. Imagine how many data types we will have in
>> the future. All the combinations possible with all the protocols that run
>> over IP. Maybe what a vendor or its customer wants for a certain scenario is
>> a blob that contains, for instance, the DSCP field + ECN + TCP window size.
>> For other deployment I might need the URL + the Cache header, etc, etc.
>> Extrapolate that to all possible combinations and you will see the profusion
>> of new fields IANA will have to standardize, the size of the parser, etc
>
> I do think we all agree the protocol must be extensible as per the
> requirements, but just not on the the scope yet. Some of us take
> a narrow view of what the protocol should report (IPv4, IPv6 headers)
> others prefer a wider view (everything else).
>
> These divergent views will have to be considered carefully in evaluating
> how extensible the protocol should actually be. Section 6.2 of the
> requirements doc could then be updated to reflect the consensus.
>
> I will say it one last time and shut up.
>
> BLOBs hinder interoperability, BLOBs are bad.
>
> There. Peace Out.
> Mike MacFaden
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 11:51:56 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA29373
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 11:51:55 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1856el-0003g9-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 10:45:51 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1856ek-0003fE-00
	for ipfix-req@net.doit.wisc.edu; Fri, 25 Oct 2002 10:45:50 -0500
Received: from riverstonenet.com ([134.141.180.103]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Fri, 25 Oct 2002 08:45:17 -0700
Message-ID: <3DB96693.69111D46@riverstonenet.com>
Date: Fri, 25 Oct 2002 11:43:15 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: Re: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of issues - 
 Reinaldo - 7 (or Carter -1))
References: <20021025025814.GM1687@riverstonenet.com> <18596019.1035567359@[192.168.102.164]>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 25 Oct 2002 15:45:18.0072 (UTC) FILETIME=[84AF3780:01C27C3D]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote:
> 
> Let's all have a look at our charter:
> 
> 1. It starts with: "There are a number of IP flow information
>    export systems in common use."
> 
> 2. Later it says: "This group will select a protocol ...".
> 
> 3. There is no mentioning of "This group will merge all
>    protocols ...".
>    Also there is no mentioning of "This group will design a
>    protocol."
> 
> Consequently, we should go on with what we have started already:
> selecting ONE of the candidate protocol.
> 
> If the BLOB discussion ends up with saying "Just selecting one
> is a bad idea, we won't do it.", then we should stop our work and
> ask for re-chartering.
> 
> However, I think, charter discussion was extensive and we made
> good progress based on the current charter. I definitely want
> to continue this.


	I for one never expected to take the candidate
	protocol on an "as is" basis.

	If we decide blobs are bad then the candidate
	protocol needs to be modified accordingly.

	That applies to any other topic discussed as well.

	Paul

> 
>     Juergen
> 
> -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:
> 
> > On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
> >> That's the problem I foresee. Imagine how many data types we will have in
> >> the future. All the combinations possible with all the protocols that run
> >> over IP. Maybe what a vendor or its customer wants for a certain scenario is
> >> a blob that contains, for instance, the DSCP field + ECN + TCP window size.
> >> For other deployment I might need the URL + the Cache header, etc, etc.
> >> Extrapolate that to all possible combinations and you will see the profusion
> >> of new fields IANA will have to standardize, the size of the parser, etc
> >
> > I do think we all agree the protocol must be extensible as per the
> > requirements, but just not on the the scope yet. Some of us take
> > a narrow view of what the protocol should report (IPv4, IPv6 headers)
> > others prefer a wider view (everything else).
> >
> > These divergent views will have to be considered carefully in evaluating
> > how extensible the protocol should actually be. Section 6.2 of the
> > requirements doc could then be updated to reflect the consensus.
> >
> > I will say it one last time and shut up.
> >
> > BLOBs hinder interoperability, BLOBs are bad.
> >
> > There. Peace Out.
> > Mike MacFaden
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 13:07:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA02499
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 13:07:51 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1857pP-0005a7-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 12:00:55 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1857pN-0005ZQ-00
	for ipfix-req@net.doit.wisc.edu; Fri, 25 Oct 2002 12:00:53 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9PH0MY18218;
	Fri, 25 Oct 2002 19:00:22 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.164] (beta.heidelberg.ccrle.nec.de [192.168.102.164])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP
	id 5A42F70367; Fri, 25 Oct 2002 19:00:17 +0200 (CEST)
Date: Fri, 25 Oct 2002 19:00:16 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: calato@riverstonenet.com
Cc: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: Re: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of issues -  Reinaldo - 7 (or Carter -1))
Message-ID: <23653281.1035572416@[192.168.102.164]>
In-Reply-To: <3DB96693.69111D46@riverstonenet.com>
References:  <3DB96693.69111D46@riverstonenet.com>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

-- calato@riverstonenet.com wrote on 25 October 2002 11:43 -0400:

> Juergen Quittek wrote:
>>
>> Let's all have a look at our charter:
>>
>> 1. It starts with: "There are a number of IP flow information
>>    export systems in common use."
>>
>> 2. Later it says: "This group will select a protocol ...".
>>
>> 3. There is no mentioning of "This group will merge all
>>    protocols ...".
>>    Also there is no mentioning of "This group will design a
>>    protocol."
>>
>> Consequently, we should go on with what we have started already:
>> selecting ONE of the candidate protocol.
>>
>> If the BLOB discussion ends up with saying "Just selecting one
>> is a bad idea, we won't do it.", then we should stop our work and
>> ask for re-chartering.
>>
>> However, I think, charter discussion was extensive and we made
>> good progress based on the current charter. I definitely want
>> to continue this.
>
>
> 	I for one never expected to take the candidate
> 	protocol on an "as is" basis.
>
> 	If we decide blobs are bad then the candidate
> 	protocol needs to be modified accordingly.
>
> 	That applies to any other topic discussed as well.
>
> 	Paul

I do not have problems with giving recommendations to protocol
designers to change their protocol. But as I understood the blob
discussion, the idea was not to select one or the other protocol,
but to select several and carry them all in an opaque blob.
This is defintely more than modifying one of the protocols.

    Juergen

>>
>>     Juergen
>>
>> -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:
>>
>> > On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
>> >> That's the problem I foresee. Imagine how many data types we will have in
>> >> the future. All the combinations possible with all the protocols that run
>> >> over IP. Maybe what a vendor or its customer wants for a certain scenario is
>> >> a blob that contains, for instance, the DSCP field + ECN + TCP window size.
>> >> For other deployment I might need the URL + the Cache header, etc, etc.
>> >> Extrapolate that to all possible combinations and you will see the profusion
>> >> of new fields IANA will have to standardize, the size of the parser, etc
>> >
>> > I do think we all agree the protocol must be extensible as per the
>> > requirements, but just not on the the scope yet. Some of us take
>> > a narrow view of what the protocol should report (IPv4, IPv6 headers)
>> > others prefer a wider view (everything else).
>> >
>> > These divergent views will have to be considered carefully in evaluating
>> > how extensible the protocol should actually be. Section 6.2 of the
>> > requirements doc could then be updated to reflect the consensus.
>> >
>> > I will say it one last time and shut up.
>> >
>> > BLOBs hinder interoperability, BLOBs are bad.
>> >
>> > There. Peace Out.
>> > Mike MacFaden
>> >
>> >
>> > --
>> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> > "unsubscribe ipfix" in message body
>> > Archive     http://ipfix.doit.wisc.edu/archive/
>>
>> --
>> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> "unsubscribe ipfix" in message body
>> Archive     http://ipfix.doit.wisc.edu/archive/



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 13:16:03 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA02913
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 13:16:03 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1857xs-0005oL-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 12:09:40 -0500
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1857xq-0005no-00
	for ipfix-req@net.doit.wisc.edu; Fri, 25 Oct 2002 12:09:38 -0500
Received: from riverstonenet.com ([134.141.180.103]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Fri, 25 Oct 2002 10:09:06 -0700
Message-ID: <3DB97A38.FA7ADDE8@riverstonenet.com>
Date: Fri, 25 Oct 2002 13:07:04 -0400
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: Re: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of issues 
 -  Reinaldo - 7 (or Carter -1))
References: <3DB96693.69111D46@riverstonenet.com> <23653281.1035572416@[192.168.102.164]>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 25 Oct 2002 17:09:07.0308 (UTC) FILETIME=[3A57BAC0:01C27C49]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote:
> 
> Paul,
> 
> -- calato@riverstonenet.com wrote on 25 October 2002 11:43 -0400:
> 
> > Juergen Quittek wrote:
> >>
> >> Let's all have a look at our charter:
> >>
> >> 1. It starts with: "There are a number of IP flow information
> >>    export systems in common use."
> >>
> >> 2. Later it says: "This group will select a protocol ...".
> >>
> >> 3. There is no mentioning of "This group will merge all
> >>    protocols ...".
> >>    Also there is no mentioning of "This group will design a
> >>    protocol."
> >>
> >> Consequently, we should go on with what we have started already:
> >> selecting ONE of the candidate protocol.
> >>
> >> If the BLOB discussion ends up with saying "Just selecting one
> >> is a bad idea, we won't do it.", then we should stop our work and
> >> ask for re-chartering.
> >>
> >> However, I think, charter discussion was extensive and we made
> >> good progress based on the current charter. I definitely want
> >> to continue this.
> >
> >
> >       I for one never expected to take the candidate
> >       protocol on an "as is" basis.
> >
> >       If we decide blobs are bad then the candidate
> >       protocol needs to be modified accordingly.
> >
> >       That applies to any other topic discussed as well.
> >
> >       Paul
> 
> I do not have problems with giving recommendations to protocol
> designers to change their protocol. But as I understood the blob
> discussion, the idea was not to select one or the other protocol,
> but to select several and carry them all in an opaque blob.
> This is defintely more than modifying one of the protocols.
> 
	Sorry, my misunderstanding of your position. 
	We are in violent agreement!

	Paul

	P.S. - in the future saying something like "blobs bad" 	
	 	is more at my level :-)

>     Juergen
> 
> >>
> >>     Juergen
> >>
> >> -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:
> >>
> >> > On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
> >> >> That's the problem I foresee. Imagine how many data types we will have in
> >> >> the future. All the combinations possible with all the protocols that run
> >> >> over IP. Maybe what a vendor or its customer wants for a certain scenario is
> >> >> a blob that contains, for instance, the DSCP field + ECN + TCP window size.
> >> >> For other deployment I might need the URL + the Cache header, etc, etc.
> >> >> Extrapolate that to all possible combinations and you will see the profusion
> >> >> of new fields IANA will have to standardize, the size of the parser, etc
> >> >
> >> > I do think we all agree the protocol must be extensible as per the
> >> > requirements, but just not on the the scope yet. Some of us take
> >> > a narrow view of what the protocol should report (IPv4, IPv6 headers)
> >> > others prefer a wider view (everything else).
> >> >
> >> > These divergent views will have to be considered carefully in evaluating
> >> > how extensible the protocol should actually be. Section 6.2 of the
> >> > requirements doc could then be updated to reflect the consensus.
> >> >
> >> > I will say it one last time and shut up.
> >> >
> >> > BLOBs hinder interoperability, BLOBs are bad.
> >> >
> >> > There. Peace Out.
> >> > Mike MacFaden
> >> >
> >> >
> >> > --
> >> > Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >> > "unsubscribe ipfix" in message body
> >> > Archive     http://ipfix.doit.wisc.edu/archive/
> >>
> >> --
> >> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >> "unsubscribe ipfix" in message body
> >> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 13:36:43 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA03685
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 13:36:42 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1858ID-0006MC-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 12:30:41 -0500
Received: from usmail.xacct.com ([204.253.100.12])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1858IB-0006M7-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 12:30:39 -0500
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9P34au29479;
	Thu, 24 Oct 2002 20:04:36 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <carter@qosient.com>, "'Simon Leinen'" <simon@limmat.switch.ch>,
        <calato@riverstonenet.com>
Cc: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Split reporting, memory consumption, and "snapshot" attributes [was: Discussion of Candidate Protocols]
Date: Thu, 24 Oct 2002 20:01:09 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDKEJCCPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607A483@ptah.newyork.qosient.com>
X-RBL-Warning: (dnsbl.njabl.org) relay tested -- 1016746205
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter,

Your point is well taken. In our system, we have unique keys to describe the
values with different meaning to identify the type of aggregation performed
(key, first, last, max, min, sum, etc.). In our user presentation, we
clearly distinguish between the value by denoting it with a prefix modifier
(when presented in textual form to a user, for instance). There is a
different key to denote "Source AS" and there is another key to denote
"First Source AS". When we accumulate "Bytes" we actually say "Sum of Bytes"
rather than leaving this implicit.

The same type of issue may exist when defining units of data reported (some
devices/cards report in K bytes, etc.). Ambiguity of the meaning of an
attribute can be eliminated by denoting them with different key attribute
IDs.

Would you agree that using methods like the one mentioned above, it is
possible disambiguate the data rather than settle for a situation where the
precise meaning cannot be correct/accurate.

Tal

-----Original Message-----
From: Carter Bullard [mailto:carter@qosient.com]
Sent: Thursday, October 24, 2002 5:55 PM
To: 'Tal Givoly'; 'Simon Leinen'; calato@riverstonenet.com
Cc: 'Michael MacFaden'; ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Split reporting, memory consumption, and
"snapshot" attributes [was: Discussion of Candidate Protocols]


Gentle people,
   Everyone seems to take it for granted that its cool to bind
non-key attributes to aggregated data, but there are some
relational algebraic gottchas that you have to solve if
you want IPFIX data to be "correct", and Tal has touched on
one of them.

   Split reporting assumes that there is a reason to report
transitions in non-key attribute data, but is there really
a relational algebraic basis to justify "going to the trouble"?
It really hinges on the concept of data "correctness", and
whether non-key attributes can every achieve any level of
correctness in IPFIX data.  Let me use an example to demonstrate
what I'm getting at.

   TTL will most likely be a perennial non-key attribute that
will be directly supported in the IPFIX data model.  It is one
of the simplest of the non-key attributes to deal with, because
the value is contained in the actual observed data, so the value
has some "correctness".  But, TTL can change often during the
brief life of a flow, and as a result, when an IPFIX device
reports a single value for TTL in a flow report, the value has
only limited applicability as an attribute.  It doesn't really
apply to the whole flow, it is safe to say that it applies to
at most, only one packet of the flow.

   Now reporting this non-key attribute is very useful, and it
should be done, but attempting to engineer some level of
"correctness" into this value would definitely be futile.  The
reason is that as transitions in non-key attributes reach a
certain level, and a pretty low level at that, the attempt to
maintain attribute "correctness" overwhelms the system.  In
the analysis, this is the general case for any non-key attribute
that changes, even AS number.

   So what to do?  My suggestion is to understand that non-key
attributes are not relational attributes, and as such little
engineering should be done to try to improve on the data's
"correctness".  They are interesting bits of information and can
be of value using appropriate statistical methods.  Maybe just
put a bit in the record that indicates if the value is correct
or not is all you need to do.

I hope this has been of interest.

Carter








> -----Original Message-----
> From: majordomo listserver
> [mailto:majordomo@mil.doit.wisc.edu] On Behalf Of Tal Givoly
> Sent: Thursday, October 24, 2002 7:24 PM
> To: Simon Leinen; calato@riverstonenet.com
> Cc: carter@qosient.com; 'Michael MacFaden';
> ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Split reporting, memory
> consumption, and "snapshot" attributes [was: Discussion of
> Candidate Protocols]
>
>
> Simon/Paul,
>
> As there's been some debate regarding terminology, may I lend
> a slightly DB-centric perspective: In SQL terminology, the
> attributes that are shared would be identified by "First()"
> aggregate functions while most aggregates would be result of
> aggregate functions such as "Sum()" functions.
>
> Notice that if a device does employ "split reporting",
> obviously the complexity of the collector is increased and it
> must create a "join" between the two flows.
>
> Split reporting would no longer be FNF, but instead would be
> 3NF - increasing complexity in the metering process as well,
> if this is a requirement.
>
> In order to keep things simple and more broadly accepted, it
> seems to me that leaving things in FNF is more likely to be
> adopted and implemented - a desirable trait of any standard.
>
> My $0.02.
>
> Tal
>
>
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 13:38:38 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA03832
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 13:38:37 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1858Df-0006Fn-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 12:25:59 -0500
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1858Dd-0006Eu-00
	for ipfix-req@net.doit.wisc.edu; Fri, 25 Oct 2002 12:25:57 -0500
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9PHLiv05600;
	Fri, 25 Oct 2002 12:21:44 -0500 (CDT)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBH5Z>; Fri, 25 Oct 2002 10:21:29 -0700
Message-ID: <7B802811BE77D51189910002A55CFD2C045F06DA@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Juergen Quittek <quittek@ccrle.nec.de>, calato@riverstonenet.com
Cc: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: RE: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of i
	ssues -  Reinaldo - 7 (or Carter -1))
Date: Fri, 25 Oct 2002 10:21:30 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27C4A.F5534276"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27C4A.F5534276
Content-Type: text/plain;
	charset="iso-8859-1"



> -----Original Message-----
> From: Juergen Quittek [mailto:quittek@ccrle.nec.de]
> Sent: Friday, October 25, 2002 10:00 AM
> To: calato@riverstonenet.com
> Cc: Michael MacFaden; ipfix-req@net.doit.wisc.edu
> Subject: Re: On the BLOB issue (Reinaldo-7, was: Re: 
> [ipfix-req] list of
> issues - Reinaldo - 7 (or Carter -1))
> 
> 
> Paul,
> 
> -- calato@riverstonenet.com wrote on 25 October 2002 11:43 -0400:
> 
> > Juergen Quittek wrote:
> >>
> >> Let's all have a look at our charter:
> >>
> >> 1. It starts with: "There are a number of IP flow information
> >>    export systems in common use."
> >>
> >> 2. Later it says: "This group will select a protocol ...".
> >>
> >> 3. There is no mentioning of "This group will merge all
> >>    protocols ...".
> >>    Also there is no mentioning of "This group will design a
> >>    protocol."
> >>
> >> Consequently, we should go on with what we have started already:
> >> selecting ONE of the candidate protocol.
> >>
> >> If the BLOB discussion ends up with saying "Just selecting one
> >> is a bad idea, we won't do it.", then we should stop our work and
> >> ask for re-chartering.
> >>
> >> However, I think, charter discussion was extensive and we made
> >> good progress based on the current charter. I definitely want
> >> to continue this.
> >
> >
> > 	I for one never expected to take the candidate
> > 	protocol on an "as is" basis.
> >
> > 	If we decide blobs are bad then the candidate
> > 	protocol needs to be modified accordingly.
> >
> > 	That applies to any other topic discussed as well.
> >
> > 	Paul
> 
> I do not have problems with giving recommendations to protocol
> designers to change their protocol. But as I understood the blob
> discussion, the idea was not to select one or the other protocol,
> but to select several and carry them all in an opaque blob.
> This is defintely more than modifying one of the protocols.

Hello Juergen,

I had a different understanding. The proposal was to be able to support
opaque objects in the standard IPfix protocol. that's one thing. Now, one of
the examples of its use was being able to carry data format of a
non-standard protocol, maybe in the transition period, maybe to satisfy some
deployed customer. But that was just an example, the idea was always to
select only one protocol.

regards,

Reinaldo

> 
>     Juergen
> 
> >>
> >>     Juergen
> >>
> >> -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:
> >>
> >> > On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
> >> >> That's the problem I foresee. Imagine how many data 
> types we will have in
> >> >> the future. All the combinations possible with all the 
> protocols that run
> >> >> over IP. Maybe what a vendor or its customer wants for 
> a certain scenario is
> >> >> a blob that contains, for instance, the DSCP field + 
> ECN + TCP window size.
> >> >> For other deployment I might need the URL + the Cache 
> header, etc, etc.
> >> >> Extrapolate that to all possible combinations and you 
> will see the profusion
> >> >> of new fields IANA will have to standardize, the size 
> of the parser, etc
> >> >
> >> > I do think we all agree the protocol must be extensible 
> as per the
> >> > requirements, but just not on the the scope yet. Some of us take
> >> > a narrow view of what the protocol should report (IPv4, 
> IPv6 headers)
> >> > others prefer a wider view (everything else).
> >> >
> >> > These divergent views will have to be considered 
> carefully in evaluating
> >> > how extensible the protocol should actually be. Section 
> 6.2 of the
> >> > requirements doc could then be updated to reflect the consensus.
> >> >
> >> > I will say it one last time and shut up.
> >> >
> >> > BLOBs hinder interoperability, BLOBs are bad.
> >> >
> >> > There. Peace Out.
> >> > Mike MacFaden
> >> >
> >> >
> >> > --
> >> > Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body
> >> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >> > "unsubscribe ipfix" in message body
> >> > Archive     http://ipfix.doit.wisc.edu/archive/
> >>
> >> --
> >> Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body
> >> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >> "unsubscribe ipfix" in message body
> >> Archive     http://ipfix.doit.wisc.edu/archive/
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C27C4A.F5534276
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2655.35">
<TITLE>RE: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of issues -  Reinaldo - 7 (or Carter -1))</TITLE>
</HEAD>
<BODY>
<BR>
<BR>

<P><FONT SIZE=2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; From: Juergen Quittek [<A HREF="mailto:quittek@ccrle.nec.de">mailto:quittek@ccrle.nec.de</A>]</FONT>
<BR><FONT SIZE=2>&gt; Sent: Friday, October 25, 2002 10:00 AM</FONT>
<BR><FONT SIZE=2>&gt; To: calato@riverstonenet.com</FONT>
<BR><FONT SIZE=2>&gt; Cc: Michael MacFaden; ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=2>&gt; Subject: Re: On the BLOB issue (Reinaldo-7, was: Re: </FONT>
<BR><FONT SIZE=2>&gt; [ipfix-req] list of</FONT>
<BR><FONT SIZE=2>&gt; issues - Reinaldo - 7 (or Carter -1))</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Paul,</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; -- calato@riverstonenet.com wrote on 25 October 2002 11:43 -0400:</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt; Juergen Quittek wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; Let's all have a look at our charter:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; 1. It starts with: &quot;There are a number of IP flow information</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; export systems in common use.&quot;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; 2. Later it says: &quot;This group will select a protocol ...&quot;.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; 3. There is no mentioning of &quot;This group will merge all</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; protocols ...&quot;.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; Also there is no mentioning of &quot;This group will design a</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; protocol.&quot;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; Consequently, we should go on with what we have started already:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; selecting ONE of the candidate protocol.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; If the BLOB discussion ends up with saying &quot;Just selecting one</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; is a bad idea, we won't do it.&quot;, then we should stop our work and</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; ask for re-chartering.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; However, I think, charter discussion was extensive and we made</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; good progress based on the current charter. I definitely want</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; to continue this.</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; I for one never expected to take the candidate</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; protocol on an &quot;as is&quot; basis.</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; If we decide blobs are bad then the candidate</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; protocol needs to be modified accordingly.</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; That applies to any other topic discussed as well.</FONT>
<BR><FONT SIZE=2>&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt; &nbsp;&nbsp;&nbsp; Paul</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; I do not have problems with giving recommendations to protocol</FONT>
<BR><FONT SIZE=2>&gt; designers to change their protocol. But as I understood the blob</FONT>
<BR><FONT SIZE=2>&gt; discussion, the idea was not to select one or the other protocol,</FONT>
<BR><FONT SIZE=2>&gt; but to select several and carry them all in an opaque blob.</FONT>
<BR><FONT SIZE=2>&gt; This is defintely more than modifying one of the protocols.</FONT>
</P>

<P><FONT SIZE=2>Hello Juergen,</FONT>
</P>

<P><FONT SIZE=2>I had a different understanding. The proposal was to be able to support opaque objects in the standard IPfix protocol. that's one thing. Now, one of the examples of its use was being able to carry data format of a non-standard protocol, maybe in the transition period, maybe to satisfy some deployed customer. But that was just an example, the idea was always to select only one protocol.</FONT></P>

<P><FONT SIZE=2>regards,</FONT>
</P>

<P><FONT SIZE=2>Reinaldo</FONT>
</P>

<P><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Juergen</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Juergen</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; That's the problem I foresee. Imagine how many data </FONT>
<BR><FONT SIZE=2>&gt; types we will have in</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; the future. All the combinations possible with all the </FONT>
<BR><FONT SIZE=2>&gt; protocols that run</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; over IP. Maybe what a vendor or its customer wants for </FONT>
<BR><FONT SIZE=2>&gt; a certain scenario is</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; a blob that contains, for instance, the DSCP field + </FONT>
<BR><FONT SIZE=2>&gt; ECN + TCP window size.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; For other deployment I might need the URL + the Cache </FONT>
<BR><FONT SIZE=2>&gt; header, etc, etc.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; Extrapolate that to all possible combinations and you </FONT>
<BR><FONT SIZE=2>&gt; will see the profusion</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;&gt; of new fields IANA will have to standardize, the size </FONT>
<BR><FONT SIZE=2>&gt; of the parser, etc</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; I do think we all agree the protocol must be extensible </FONT>
<BR><FONT SIZE=2>&gt; as per the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; requirements, but just not on the the scope yet. Some of us take</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; a narrow view of what the protocol should report (IPv4, </FONT>
<BR><FONT SIZE=2>&gt; IPv6 headers)</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; others prefer a wider view (everything else).</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; These divergent views will have to be considered </FONT>
<BR><FONT SIZE=2>&gt; carefully in evaluating</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; how extensible the protocol should actually be. Section </FONT>
<BR><FONT SIZE=2>&gt; 6.2 of the</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; requirements doc could then be updated to reflect the consensus.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; I will say it one last time and shut up.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; BLOBs hinder interoperability, BLOBs are bad.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; There. Peace Out.</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; Mike MacFaden</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; --</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say </FONT>
<BR><FONT SIZE=2>&gt; &quot;help&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; --</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say </FONT>
<BR><FONT SIZE=2>&gt; &quot;help&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; --</FONT>
<BR><FONT SIZE=2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=2>&gt; in message body</FONT>
<BR><FONT SIZE=2>&gt; Unsubscribe <A HREF="mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wisc.edu</A> and say</FONT>
<BR><FONT SIZE=2>&gt; &quot;unsubscribe ipfix&quot; in message body</FONT>
<BR><FONT SIZE=2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A HREF="http://ipfix.doit.wisc.edu/archive/" TARGET="_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27C4A.F5534276--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 13:45:54 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA04196
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 13:45:54 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1858QX-0006aK-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 12:39:17 -0500
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 1858QU-0006aA-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 12:39:14 -0500
Received: (qmail 11330 invoked from network); 25 Oct 2002 17:33:28 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 25 Oct 2002 17:33:28 -0000
Received: from Givoly ([192.168.0.2])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9P2Pfu29243;
	Thu, 24 Oct 2002 19:25:41 -0700
From: "Tal Givoly" <givoly@xacct.com>
To: <ram.gopal@nokia.com>
Cc: <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Gopal's evaluation draft contribution
Date: Thu, 24 Oct 2002 19:22:13 -0700
Message-ID: <DLEIIIOHMNPJPNMKGEFDOEJACPAA.givoly@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <DC504E9C3384054C8506D3E6BB0124607AE460@bsebe001.americas.nokia.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Ram,

Below are my comments to the evaluation you provided
(http://ipfix.doit.wisc.edu/archive/att-1277/01-draft-gopal-ipfix-eval-00.tx
t). Rather than quote entire sections or portions of them, I merely refer to
section number:

2.4. NetFlow

NetFlow, as proposed, is UDP. Merely extending it to use any other protocol
(e.g. TCP) doesn't add any reliability to it. Making it reliable would
require making it bi-directional, thus adding the added features and some of
the complexity available in CRANE/Diameter/LFAP. Application-level
acknowledgement is minimally required to indicate the collection process has
actually received what has been sent reliably.

One could argue regarding what the word "reliably" means above. This could
be interpreted by some as "best effort" (send ack once data is received
in-memory), but based on the requirement draft, I believe "reliably" implies
that it must be possible to ensure the level of reliability described  here:
persisted or voted with redundant collecting processes - ensuring durability
in face of up to N failures, where N is defined by operator, usually N=1.

Making it work over TCP would, at least, ensure in-order arrival, and the
fact that template defintions arrive prior to the flow records themselves,
however this is not assured without this extension.

The dynamic nature of the templates seems to actually make them
indistinguishable from the collector's perspective (all the template defines
is what are the fields within - the identifier itself is totally dynamic and
non-negotiable). I've asked the NetFlow protocol advocate, in a separate
submission, to clarify how multiple templates are maintained concurrently -
i.e. how does the collector distinguish between them to identify their
semantics (not only record content) as they are temporary in nature. In the
response, it becomes clear that identification of different templates is
totally implicit by their attribute contents. Although this does allow for
distinction among some templates, it is an expensive way to create such a
distinction.

CRANE also allows for modification of Templates. It is, in fact, designed
for continuous operation under changed templates (see Simon's evaluation
that determines this as well).

3.1.2. Sampling (5.2)

As I explained earlier in my response to both Simon's and Juergen's
evaluation (in http://ipfix.doit.wisc.edu/archive/1316.html):

CRANE clearly allows distinguishing between sampled data and non-sampled
data. As CRANE, similarly to IPDR and Diameter, doesn't impose any
restrictions on the Metering Process, the latter can easily submit sampled
data in a dedicated Template. Even if you consider that there is no
intrinsic support specifically for Sampling Behavior within the protocol
itself, it is
definitely Extendable to that degree, would you not agree?

I fully agree with Jeff's following statement :

<snip (from http://ipfix.doit.wisc.edu/archive/1330.html) >
    CRANE, Diameter and IPDR are all examples of protocols whose focus is
solely on the exporting process, putting no restrictions on the behavior of
the "Metering Process".
<snip>

As explained by Cisco recently, NetFlow distinguishes between Sampled data
and unsampled data by the existence of attributes within flow record itself.
It too doesn't define exactly how sampling is described besides that implied
distinction.

3.1.3. Overload Behavior (5.3)

CRANE defines the interaction between the exporting process (E) and the
collecting process (C). This interaction provides specific flow control and
interfaces that allow the metering process (M) to begin performing sampling,
for instance to react to overload. The exporting process is made aware of
overload in the collecting process and redirects flows to alternative
collecting processes. The metering process, once faced with overload
conditions, can easily use templates dedicated to reporting at times of
overload, to export flow information.

Should the aforementioned behavior be reconsidered in your evaluation
concluding that CRANE fails the overload behavior?

I further believe that NetFlow v9, in fact, cannot be considered fully
compliant with overload behavior - as it doesn't react to flow control, it
cannot be aware of overload in the collecting process that may require
introducing of overload behavior. Let me expand on this: Since NetFlow v9 is
not bi-directional one cannot tell from (E) if data is lost. One would have
to check with both (C) and (E) to figure this out. This is very painful
resulting in excessive deployment costs.

It is fully implementation dependent how memory footprint is handled.
Current CRANE implementations and deployments allow the host metering
process full control of the footprint of the application completely. In
fact, the implementation allows the network element to replace all resource
allocation functions to fit the environment. Therefore, priority of the
process, its resource utilization, etc. are all subject to implementation.

3.1.7.Multicast Flows  (5.7)

Shouldn't this requirement be considered a requirement on the metering
process rather than the exporter process? As there is no restrictions
imposed by CRANE on the data export by the metering process (by virtue of
support for multiple concurrent templates), CRANE is clearly extendable to
support this requirement.

3.1.14.Reliability  (6.3.2)

As far as I understand, NetFlow doesn't indicate lack of reliability in the
protocol itself (for all cases where reliability is incomplete). It leaves
this primarily to the collecting process to resolve. Existence of sequence
numbers within the protocol implies the collector must compare these upon
receipt. When multiple collecting processes are involved (and each may see a
different subset of the UDP packets), it is a very complex function of
multiple receivers to figure out the lack of reliability.

Should that be considered totally compliant?

While it has been mentioned by several evaluators that adding reliability to
NetFlow is an "easy" thing, I believe this has yet to be satisfactorily
demonstrated do the degree that the final proposal properties (including
reliability and the complexity it may introduce), be evaluated.

3.1.23.Openness (8.1)

I agree with other evaluations that did find CRANE totally compliant with
this requirement. Furthermore, it provides full version and capability
negitiation to allow for backward and forward compatibility (a la Fax/Modem
negotiations on capabilities). I believe this is a very-nice-to-have
attribute in any protocol, especially one implemented in context of flow
information export that may have many different devices to interface with
(each of potentially different versions). Although this has not been raised
as an explicit requirement, it may be interpreted to be part of the
extensibility requirement.

Can you help me understand the question you have regarding CRANE's
compliance so that we can eliminate any doubt regarding this aspect?

Tal

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of ram.gopal@nokia.com
Sent: Wednesday, October 16, 2002 3:15 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] Gopal's evaluation draft contribution


Greetings,

Please find the individual evaluation of IPFIX protocol candidates. I used
the templates prepared
by J. Quittek and thank for his work it saves lot of time.

Feel free to comment on this material.


Thanks and Regards
Ram Gopal. L


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 14:05:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA04993
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 14:05:23 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1858ez-0006ye-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 12:54:13 -0500
Received: from mailhub.lawrence.edu ([143.44.65.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1858ex-0006yW-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 12:54:11 -0500
Received: from lawrence.edu ([143.44.97.19])
 by lawrence.edu (PMDF V6.1-1 #30572)
 with ESMTPA id <0H4J01VF4TUSPB@lawrence.edu> for ipfix-eval@net.doit.wisc.edu;
 Fri, 25 Oct 2002 12:56:52 -0500 (CDT)
Date: Fri, 25 Oct 2002 12:54:10 -0500
From: Robert Lowe <robert.h.lowe@lawrence.edu>
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
To: Simon Leinen <simon@limmat.switch.ch>
Cc: Tal Givoly <givoly@xacct.com>, ipfix-eval@net.doit.wisc.edu,
        Peter Ludemann <peter.ludemann@xacct.com>
Message-id: <3DB98542.D0FF1B7B@lawrence.edu>
Organization: Lawrence University
MIME-version: 1.0
X-Mailer: Mozilla 4.77 [en] (Windows NT 5.0; U)
Content-type: text/plain; charset=us-ascii
Content-transfer-encoding: 7bit
X-Accept-Language: en
References: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>
 <aavg3r2c6m.fsf@limmat.switch.ch>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Simon Leinen wrote:

...

> On the other hand (1) unreliable flow information export protocols are
> heavily used, (2) even some applications that involve charging
> tolerate a modest amount of data loss, and (3) total reliability
> cannot be achieved in this world.
> 
> My position is that we should be careful in how far we should depart
> from current (unreliable) practice in order to make the protocol
> useful for applications that seem to have higher, although probably
> not infinitely high, demands on reliability.
> 
> Mandating support of a "reliable" transport protocol (TCP or SCTP)
> seems to be a very good first step, because this makes the
> congestion-friendliness requirement easy to fulfill, uses
> well-understood technology (at least for TCP :-), and creates a
> feedback loop between the exporter and the collector (including the
> network path between them).  This enables the entire system to adapt
> to different bottlenecks.  Note that reasonable methods of adaptation
> include the metering system shedding load for the export/collection
> system, for example by changing to sampled accounting.  This would
> probably seem scary to mediation/billing folks but is widely accepted
> in the community (statically configured sampling; I think sampling
> that adapts to load would be found even more acceptable).

Dynamically adjusting sampling to load was discussed briefly before, 
but without a clear indication that it could be safely done.  Do you 
have experience that suggests it can be done without compromising 
data integrity?  I agree that switching to a sampling strategy under 
load could a good thing.  See:

    http://ipfix.doit.wisc.edu/archive/0079.html (and other postings 
    by Peter Phaal regarding sampling in general) 

Interestingly enough, he seemed to indicate that using UDP actually 
worked better in practice when employing packet sampling.  However, 
moving to sampling requires reliable notification/communication between 
the exporter and collector.

-Robert

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Fri Oct 25 19:50:41 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA15837
	for <ipfix-archive@lists.ietf.org>; Fri, 25 Oct 2002 19:50:40 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 185E4w-0001xE-00
	for ipfix-list@mil.doit.wisc.edu; Fri, 25 Oct 2002 18:41:23 -0500
Received: from pool-129-44-37-17.ny325.east.verizon.net ([129.44.37.17] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 185E4u-0001wY-00
	for ipfix-eval@net.doit.wisc.edu; Fri, 25 Oct 2002 18:41:21 -0500
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9PNf7O24396;
	Fri, 25 Oct 2002 19:41:07 -0400
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Tal Givoly'" <givoly@xacct.com>,
        "'Simon Leinen'" <simon@limmat.switch.ch>, <calato@riverstonenet.com>
Cc: "'Michael MacFaden'" <mrm@riverstonenet.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] Split reporting, memory consumption, and "snapshot" attributes [was: Discussion of Candidate Protocols]
Date: Fri, 25 Oct 2002 19:40:45 -0400
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E686@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660CA997@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Tal,
   Yes, this is but one of the approaches that can be
used.  My example was intended to show how a simple
apparently benign reported value, TTL, has complex
reporting issues that must be considered in order to
"do it right".  I'm confident that the IPFIX WG charter
doesn't have this work in its scope.

   I agree that sticking to the WG's simple charter
is the key, and concepts like split reporting, memory
consumption, and "snapshot" attributes, are not
in scope.

   Being able to transport existing IP flow data, is, in
my humble opinion, the most important thing IPFIX needs
to do.  But, if all it does is standardize one existing
protocol, then its work is pretty much useless to the
industry.

Carter

> -----Original Message-----
> From: Tal Givoly [mailto:givoly@xacct.com] 
> Sent: Thursday, October 24, 2002 11:01 PM
> To: carter@qosient.com; 'Simon Leinen'; calato@riverstonenet.com
> Cc: 'Michael MacFaden'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Split reporting, memory 
> consumption, and "snapshot" attributes [was: Discussion of 
> Candidate Protocols]
> 
> 
> Carter,
> 
> Your point is well taken. In our system, we have unique keys 
> to describe the
> values with different meaning to identify the type of 
> aggregation performed
> (key, first, last, max, min, sum, etc.). In our user presentation, we
> clearly distinguish between the value by denoting it with a 
> prefix modifier
> (when presented in textual form to a user, for instance). There is a
> different key to denote "Source AS" and there is another key to denote
> "First Source AS". When we accumulate "Bytes" we actually say 
> "Sum of Bytes"
> rather than leaving this implicit.
> 
> The same type of issue may exist when defining units of data 
> reported (some
> devices/cards report in K bytes, etc.). Ambiguity of the meaning of an
> attribute can be eliminated by denoting them with different 
> key attribute
> IDs.
> 
> Would you agree that using methods like the one mentioned above, it is
> possible disambiguate the data rather than settle for a 
> situation where the
> precise meaning cannot be correct/accurate.
> 
> Tal
> 
> -----Original Message-----
> From: Carter Bullard [mailto:carter@qosient.com]
> Sent: Thursday, October 24, 2002 5:55 PM
> To: 'Tal Givoly'; 'Simon Leinen'; calato@riverstonenet.com
> Cc: 'Michael MacFaden'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: [ipfix-eval] Split reporting, memory consumption, and
> "snapshot" attributes [was: Discussion of Candidate Protocols]
> 
> 
> Gentle people,
>    Everyone seems to take it for granted that its cool to bind
> non-key attributes to aggregated data, but there are some
> relational algebraic gottchas that you have to solve if
> you want IPFIX data to be "correct", and Tal has touched on
> one of them.
> 
>    Split reporting assumes that there is a reason to report
> transitions in non-key attribute data, but is there really
> a relational algebraic basis to justify "going to the trouble"?
> It really hinges on the concept of data "correctness", and
> whether non-key attributes can every achieve any level of
> correctness in IPFIX data.  Let me use an example to demonstrate
> what I'm getting at.
> 
>    TTL will most likely be a perennial non-key attribute that
> will be directly supported in the IPFIX data model.  It is one
> of the simplest of the non-key attributes to deal with, because
> the value is contained in the actual observed data, so the value
> has some "correctness".  But, TTL can change often during the
> brief life of a flow, and as a result, when an IPFIX device
> reports a single value for TTL in a flow report, the value has
> only limited applicability as an attribute.  It doesn't really
> apply to the whole flow, it is safe to say that it applies to
> at most, only one packet of the flow.
> 
>    Now reporting this non-key attribute is very useful, and it
> should be done, but attempting to engineer some level of
> "correctness" into this value would definitely be futile.  The
> reason is that as transitions in non-key attributes reach a
> certain level, and a pretty low level at that, the attempt to
> maintain attribute "correctness" overwhelms the system.  In
> the analysis, this is the general case for any non-key attribute
> that changes, even AS number.
> 
>    So what to do?  My suggestion is to understand that non-key
> attributes are not relational attributes, and as such little
> engineering should be done to try to improve on the data's
> "correctness".  They are interesting bits of information and can
> be of value using appropriate statistical methods.  Maybe just
> put a bit in the record that indicates if the value is correct
> or not is all you need to do.
> 
> I hope this has been of interest.
> 
> Carter
> 
> 
> 
> 
> 
> 
> 
> 
> > -----Original Message-----
> > From: majordomo listserver
> > [mailto:majordomo@mil.doit.wisc.edu] On Behalf Of Tal Givoly
> > Sent: Thursday, October 24, 2002 7:24 PM
> > To: Simon Leinen; calato@riverstonenet.com
> > Cc: carter@qosient.com; 'Michael MacFaden';
> > ipfix-eval@net.doit.wisc.edu
> > Subject: RE: [ipfix-eval] Split reporting, memory
> > consumption, and "snapshot" attributes [was: Discussion of
> > Candidate Protocols]
> >
> >
> > Simon/Paul,
> >
> > As there's been some debate regarding terminology, may I lend
> > a slightly DB-centric perspective: In SQL terminology, the
> > attributes that are shared would be identified by "First()"
> > aggregate functions while most aggregates would be result of
> > aggregate functions such as "Sum()" functions.
> >
> > Notice that if a device does employ "split reporting",
> > obviously the complexity of the collector is increased and it
> > must create a "join" between the two flows.
> >
> > Split reporting would no longer be FNF, but instead would be
> > 3NF - increasing complexity in the metering process as well,
> > if this is a requirement.
> >
> > In order to keep things simple and more broadly accepted, it
> > seems to me that leaving things in FNF is more likely to be
> > adopted and implemented - a desirable trait of any standard.
> >
> > My $0.02.
> >
> > Tal
> >
> >
> > --
> > Help        mailto:majordomo@net.doit.wisc.edu and say "help"
> > in message body
> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> > "unsubscribe ipfix" in message body
> > Archive     http://ipfix.doit.wisc.edu/archive/
> >
> 
> 



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sat Oct 26 14:09:54 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA10086
	for <ipfix-archive@lists.ietf.org>; Sat, 26 Oct 2002 14:09:53 -0400 (EDT)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 185VE5-0003p8-00
	for ipfix-list@mil.doit.wisc.edu; Sat, 26 Oct 2002 12:59:57 -0500
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 185VE2-0003oQ-00
	for ipfix-req@net.doit.wisc.edu; Sat, 26 Oct 2002 12:59:54 -0500
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9QHxMY39253;
	Sat, 26 Oct 2002 19:59:22 +0200 (CEST)
	(envelope-from quittek@ccrle.nec.de)
Received: from [192.168.102.32] (unknown [192.168.102.32])
	by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0) with ESMTP
	id 07FF7708B4; Sat, 26 Oct 2002 19:59:18 +0200 (CEST)
Date: Sat, 26 Oct 2002 19:59:16 +0200
From: Juergen Quittek <quittek@ccrle.nec.de>
To: Reinaldo Penno <rpenno@nortelnetworks.com>, calato@riverstonenet.com
Cc: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: RE: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of i	ssues -  Reinaldo - 7 (or Carter -1))
Message-ID: <7297873.1035662355@[192.168.102.32]>
In-Reply-To: <7B802811BE77D51189910002A55CFD2C045F06DA@zsc3c032.us.nortel.com>
References:  <7B802811BE77D51189910002A55CFD2C045F06DA@zsc3c032.us.nortel.com>
X-Mailer: Mulberry/2.1.2 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Reinaldo,

-- Reinaldo Penno wrote on 25 October 2002 10:21 -0700:

>
>
>> -----Original Message-----
>> From: Juergen Quittek [mailto:quittek@ccrle.nec.de]
>> Sent: Friday, October 25, 2002 10:00 AM
>> To: calato@riverstonenet.com
>> Cc: Michael MacFaden; ipfix-req@net.doit.wisc.edu
>> Subject: Re: On the BLOB issue (Reinaldo-7, was: Re:
>> [ipfix-req] list of
>> issues - Reinaldo - 7 (or Carter -1))
>>
>>
>> Paul,
>>
>> -- calato@riverstonenet.com wrote on 25 October 2002 11:43 -0400:
>>
>> > Juergen Quittek wrote:
>> >>
>> >> Let's all have a look at our charter:
>> >>
>> >> 1. It starts with: "There are a number of IP flow information
>> >>    export systems in common use."
>> >>
>> >> 2. Later it says: "This group will select a protocol ...".
>> >>
>> >> 3. There is no mentioning of "This group will merge all
>> >>    protocols ...".
>> >>    Also there is no mentioning of "This group will design a
>> >>    protocol."
>> >>
>> >> Consequently, we should go on with what we have started already:
>> >> selecting ONE of the candidate protocol.
>> >>
>> >> If the BLOB discussion ends up with saying "Just selecting one
>> >> is a bad idea, we won't do it.", then we should stop our work and
>> >> ask for re-chartering.
>> >>
>> >> However, I think, charter discussion was extensive and we made
>> >> good progress based on the current charter. I definitely want
>> >> to continue this.
>> >
>> >
>> > 	I for one never expected to take the candidate
>> > 	protocol on an "as is" basis.
>> >
>> > 	If we decide blobs are bad then the candidate
>> > 	protocol needs to be modified accordingly.
>> >
>> > 	That applies to any other topic discussed as well.
>> >
>> > 	Paul
>>
>> I do not have problems with giving recommendations to protocol
>> designers to change their protocol. But as I understood the blob
>> discussion, the idea was not to select one or the other protocol,
>> but to select several and carry them all in an opaque blob.
>> This is defintely more than modifying one of the protocols.
>
> Hello Juergen,
>
> I had a different understanding. The proposal was to be able to support
> opaque objects in the standard IPfix protocol. that's one thing. Now, one of
> the examples of its use was being able to carry data format of a
> non-standard protocol, maybe in the transition period, maybe to satisfy some
> deployed customer. But that was just an example, the idea was always to
> select only one protocol.

Thank you for this clarification. It looks like I completely
misunderstood the proposal.

However, if it is just carrying additional information, then the
protocol extensibility requirement in Section 6.2 should include
already adding blobs to the bsobs (binary small objects) defined
in section 6.1.

I don't think a requirement like "The protocol MUST support exporting
an additional binary attribute with a format defined by some other
protocol." needs to be added.

    Juergen

> regards,
>
> Reinaldo
>
>>
>>     Juergen
>>
>> >>
>> >>     Juergen
>> >>
>> >> -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:
>> >>
>> >> > On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
>> >> >> That's the problem I foresee. Imagine how many data
>> types we will have in
>> >> >> the future. All the combinations possible with all the
>> protocols that run
>> >> >> over IP. Maybe what a vendor or its customer wants for
>> a certain scenario is
>> >> >> a blob that contains, for instance, the DSCP field +
>> ECN + TCP window size.
>> >> >> For other deployment I might need the URL + the Cache
>> header, etc, etc.
>> >> >> Extrapolate that to all possible combinations and you
>> will see the profusion
>> >> >> of new fields IANA will have to standardize, the size
>> of the parser, etc
>> >> >
>> >> > I do think we all agree the protocol must be extensible
>> as per the
>> >> > requirements, but just not on the the scope yet. Some of us take
>> >> > a narrow view of what the protocol should report (IPv4,
>> IPv6 headers)
>> >> > others prefer a wider view (everything else).
>> >> >
>> >> > These divergent views will have to be considered
>> carefully in evaluating
>> >> > how extensible the protocol should actually be. Section
>> 6.2 of the
>> >> > requirements doc could then be updated to reflect the consensus.
>> >> >
>> >> > I will say it one last time and shut up.
>> >> >
>> >> > BLOBs hinder interoperability, BLOBs are bad.
>> >> >
>> >> > There. Peace Out.
>> >> > Mike MacFaden
>> >> >
>> >> >
>> >> > --
>> >> > Help        mailto:majordomo@net.doit.wisc.edu and say
>> "help" in message body
>> >> > Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> >> > "unsubscribe ipfix" in message body
>> >> > Archive     http://ipfix.doit.wisc.edu/archive/
>> >>
>> >> --
>> >> Help        mailto:majordomo@net.doit.wisc.edu and say
>> "help" in message body
>> >> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> >> "unsubscribe ipfix" in message body
>> >> Archive     http://ipfix.doit.wisc.edu/archive/
>>
>>
>>
>> --
>> Help        mailto:majordomo@net.doit.wisc.edu and say "help"
>> in message body
>> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> "unsubscribe ipfix" in message body
>> Archive     http://ipfix.doit.wisc.edu/archive/
>>



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sun Oct 27 17:49:13 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA11034
	for <ipfix-archive@lists.ietf.org>; Sun, 27 Oct 2002 17:49:13 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 185vwW-0002Mo-00
	for ipfix-list@mil.doit.wisc.edu; Sun, 27 Oct 2002 16:31:36 -0600
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 185vwT-0002M9-00; Sun, 27 Oct 2002 16:31:33 -0600
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9RMV1i05428;
	Sun, 27 Oct 2002 14:31:01 -0800 (PST)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBMYL>; Sun, 27 Oct 2002 14:31:00 -0800
Message-ID: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ipfix-eval@net.doit.wisc.edu
Cc: ipfix-req@net.doit.wisc.edu
Subject: [ipfix-eval] IPFix Summary
Date: Sun, 27 Oct 2002 14:30:54 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27E08.831985A2"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27E08.831985A2
Content-Type: text/plain;
	charset="iso-8859-1"

I burned a good chunk of my weekend trying to summarize our discussions. If
you think I didn't capture what was said adequately, please speak up. This
email does not substitute Juergen's on open issues, but is actually trying
to close some of those open issues. (Should I copy the main ipfix list?)

I revised most of the emails starting from Jeff Meyer's - "Discussion of
Candidate Protocols" on - 9/30.

a)Regarding metering requirements and protocol candidates.

There is consensus that the metering requirements should be N/A when
choosing the IPfix Export Protocol.

A good summary was provided by Peter.

* The protocol should cover only the issues of delivering data from the
exporter to the collector. It must be expressive 
enough to contain all the data defined in the data model. 

* The data model should cover the identification of the metrics and
attributes, their meanings, and how they are grouped 
together. 

* The architecture should cover issues such as where data are observed, what
data are required and what are optional, when 
reliability is needed, how the data can be manipulated (e.g., calculating
bandwidth), etc., etc.

b) Regarding reliability


   - Congestion awareness. 

It is covered on the requirements draft

   - Message ordering (critical when the data spans several packets, e.g.
variable length fields) 

It seems there is consensus that message ordering is important.

   - Transport reliability - 

There is some confusion around this problem since transport reliability is
*not* explicit mentioned in the reqs draft, but 
since congestion awareness is, some people take it for granted. 

   - require application-level ACKs in the protocol (SHOULD be after
     data are persisted)

There is consensus that application layer ACKs is important

   - require enable de-duplication of received records through a unique key

There is consensus that de-duplication is important.

   - Exporter should keep track of number of flow records + some important
totals
     and and periodically communicate this information to the
     collector.

There is consensus that this or some other solution to capture the 
amount of lost *flow records for each key/field* (not packets) is important


c) Regarding High-Availability

we should have the ability to send to multiple collectors and for the 
exporter to be able to switch from one collector to another.

d) Regarding Timestamps

New text for section 5.4 (Disclaimer before somebody goes for my neck: this
affects the 
architecture/requirements, not the protocol evaluation.)


   The metering process MUST be able to generate wire-line timestamps 
   (rather then flow cache timestamps) for the first and the last 
   observed packet of a flow. The timestamp resolution MUST be at least 
   the one of the sysUpTime [RFC1213], which is one centisecond.


e) Regarding the Views on the Problem

Some people advocate that exporting IP flows has nothing unique to it, it's
well known problem 
only with a different data model. I hope I captured this right. Anyway, here
it goes a quotation.

"However, the statement that IP flow is somehow unique
in its data requirements and as such a more generalized
"data mover" is somehow problematic, is just plain wrong."

f) Regarding the Field Experience of IPDR

Some people wanted more information on this, so I'm pasting an email 
from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information please
direct your 
questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.

"
-----Original Message-----
From: Aron Heintz [mailto:aheintz@ipdr.org]
Sent: Thursday, October 10, 2002 3:47 PM
To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols


 It seems to me that NDM-U wins the "free, open, and widely deployed" crown
hands down.  NDM-U 3.1 is completely free and publicly available (see
below).  By the end of this year, more than 70% of the mediation and billing
packages (by market share) will have proven NDM-U 3.1 *real-world*
interoperability.

 What could be more important than this?  It appears that some of you are
debating minor technical points when you might approach the question "Who is
going to receive the data we are sending?  How do they want to see it?"
Technologies do not win by virtue of their theoretical perfection.  The OSI
model is close to theoretical perfection.  TCP/IP is not.
"

------_=_NextPart_001_01C27E08.831985A2
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>IPFix Summary</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I burned a good chunk of my weekend trying to =
summarize our discussions. If you think I didn't capture what was said =
adequately, please speak up. This email does not substitute Juergen's =
on open issues, but is actually trying to close some of those open =
issues. (Should I copy the main ipfix list?)</FONT></P>

<P><FONT SIZE=3D2>I revised most of the emails starting from Jeff =
Meyer's - &quot;Discussion of Candidate Protocols&quot; on - =
9/30.</FONT>
</P>

<P><FONT SIZE=3D2>a)Regarding metering requirements and protocol =
candidates.</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that the metering requirements =
should be N/A when choosing the IPfix Export Protocol.</FONT>
</P>

<P><FONT SIZE=3D2>A good summary was provided by Peter.</FONT>
</P>

<P><FONT SIZE=3D2>* The protocol should cover only the issues of =
delivering data from the exporter to the collector. It must be =
expressive </FONT></P>

<P><FONT SIZE=3D2>enough to contain all the data defined in the data =
model. </FONT>
</P>

<P><FONT SIZE=3D2>* The data model should cover the identification of =
the metrics and attributes, their meanings, and how they are grouped =
</FONT></P>

<P><FONT SIZE=3D2>together. </FONT>
</P>

<P><FONT SIZE=3D2>* The architecture should cover issues such as where =
data are observed, what data are required and what are optional, when =
</FONT></P>

<P><FONT SIZE=3D2>reliability is needed, how the data can be =
manipulated (e.g., calculating bandwidth), etc., etc.</FONT>
</P>

<P><FONT SIZE=3D2>b) Regarding reliability</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Congestion awareness. </FONT>
</P>

<P><FONT SIZE=3D2>It is covered on the requirements draft</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Message ordering (critical when the =
data spans several packets, e.g. variable length fields) </FONT>
</P>

<P><FONT SIZE=3D2>It seems there is consensus that message ordering is =
important.</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Transport reliability - </FONT>
</P>

<P><FONT SIZE=3D2>There is some confusion around this problem since =
transport reliability is *not* explicit mentioned in the reqs draft, =
but </FONT></P>

<P><FONT SIZE=3D2>since congestion awareness is, some people take it =
for granted. </FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - require application-level ACKs in the =
protocol (SHOULD be after</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; data are persisted)</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that application layer ACKs is =
important</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - require enable de-duplication of =
received records through a unique key</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that de-duplication is =
important.</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Exporter should keep track of number =
of flow records + some important totals</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; and and periodically =
communicate this information to the</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; collector.</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that this or some other solution =
to capture the </FONT>
<BR><FONT SIZE=3D2>amount of lost *flow records for each key/field* =
(not packets) is important</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>c) Regarding High-Availability</FONT>
</P>

<P><FONT SIZE=3D2>we should have the ability to send to multiple =
collectors and for the </FONT>
<BR><FONT SIZE=3D2>exporter to be able to switch from one collector to =
another.</FONT>
</P>

<P><FONT SIZE=3D2>d) Regarding Timestamps</FONT>
</P>

<P><FONT SIZE=3D2>New text for section 5.4 (Disclaimer before somebody =
goes for my neck: this affects the </FONT>
<BR><FONT SIZE=3D2>architecture/requirements, not the protocol =
evaluation.)</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&nbsp;&nbsp; The metering process MUST be able to =
generate wire-line timestamps </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; (rather then flow cache timestamps) for =
the first and the last </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; observed packet of a flow. The =
timestamp resolution MUST be at least </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; the one of the sysUpTime [RFC1213], =
which is one centisecond.</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>e) Regarding the Views on the Problem</FONT>
</P>

<P><FONT SIZE=3D2>Some people advocate that exporting IP flows has =
nothing unique to it, it's well known problem </FONT>
<BR><FONT SIZE=3D2>only with a different data model. I hope I captured =
this right. Anyway, here it goes a quotation.</FONT>
</P>

<P><FONT SIZE=3D2>&quot;However, the statement that IP flow is somehow =
unique</FONT>
<BR><FONT SIZE=3D2>in its data requirements and as such a more =
generalized</FONT>
<BR><FONT SIZE=3D2>&quot;data mover&quot; is somehow problematic, is =
just plain wrong.&quot;</FONT>
</P>

<P><FONT SIZE=3D2>f) Regarding the Field Experience of IPDR</FONT>
</P>

<P><FONT SIZE=3D2>Some people wanted more information on this, so I'm =
pasting an email </FONT>
<BR><FONT SIZE=3D2>from Aron Heintz [aheintz@ipdr.org]. Any more =
in-depth information please direct your </FONT>
<BR><FONT SIZE=3D2>questions to Jeff Meyer [jeffm@cup.hp.com] or Aron =
Heitz.</FONT>
</P>

<P><FONT SIZE=3D2>&quot;</FONT>
<BR><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Aron Heintz [<A =
HREF=3D"mailto:aheintz@ipdr.org">mailto:aheintz@ipdr.org</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, October 10, 2002 3:47 PM</FONT>
<BR><FONT SIZE=3D2>To: ipfix-eval@net.doit.wisc.edu; Harrington, David; =
Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [ipfix-eval] Discussion of Candidate =
Protocols</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&nbsp;It seems to me that NDM-U wins the &quot;free, =
open, and widely deployed&quot; crown</FONT>
<BR><FONT SIZE=3D2>hands down.&nbsp; NDM-U 3.1 is completely free and =
publicly available (see</FONT>
<BR><FONT SIZE=3D2>below).&nbsp; By the end of this year, more than 70% =
of the mediation and billing</FONT>
<BR><FONT SIZE=3D2>packages (by market share) will have proven NDM-U =
3.1 *real-world*</FONT>
<BR><FONT SIZE=3D2>interoperability.</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;What could be more important than this?&nbsp; =
It appears that some of you are</FONT>
<BR><FONT SIZE=3D2>debating minor technical points when you might =
approach the question &quot;Who is</FONT>
<BR><FONT SIZE=3D2>going to receive the data we are sending?&nbsp; How =
do they want to see it?&quot;</FONT>
<BR><FONT SIZE=3D2>Technologies do not win by virtue of their =
theoretical perfection.&nbsp; The OSI</FONT>
<BR><FONT SIZE=3D2>model is close to theoretical perfection.&nbsp; =
TCP/IP is not.</FONT>
<BR><FONT SIZE=3D2>&quot;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27E08.831985A2--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sun Oct 27 18:48:04 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA11909
	for <ipfix-archive@lists.ietf.org>; Sun, 27 Oct 2002 18:48:03 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 185we0-0003SG-00
	for ipfix-list@mil.doit.wisc.edu; Sun, 27 Oct 2002 17:16:32 -0600
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 185vwT-0002M9-00; Sun, 27 Oct 2002 16:31:33 -0600
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9RMV1i05428;
	Sun, 27 Oct 2002 14:31:01 -0800 (PST)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBMYL>; Sun, 27 Oct 2002 14:31:00 -0800
Message-ID: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: ipfix-eval@net.doit.wisc.edu
Cc: ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] IPFix Summary
Date: Sun, 27 Oct 2002 14:30:54 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27E08.831985A2"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27E08.831985A2
Content-Type: text/plain;
	charset="iso-8859-1"

I burned a good chunk of my weekend trying to summarize our discussions. If
you think I didn't capture what was said adequately, please speak up. This
email does not substitute Juergen's on open issues, but is actually trying
to close some of those open issues. (Should I copy the main ipfix list?)

I revised most of the emails starting from Jeff Meyer's - "Discussion of
Candidate Protocols" on - 9/30.

a)Regarding metering requirements and protocol candidates.

There is consensus that the metering requirements should be N/A when
choosing the IPfix Export Protocol.

A good summary was provided by Peter.

* The protocol should cover only the issues of delivering data from the
exporter to the collector. It must be expressive 
enough to contain all the data defined in the data model. 

* The data model should cover the identification of the metrics and
attributes, their meanings, and how they are grouped 
together. 

* The architecture should cover issues such as where data are observed, what
data are required and what are optional, when 
reliability is needed, how the data can be manipulated (e.g., calculating
bandwidth), etc., etc.

b) Regarding reliability


   - Congestion awareness. 

It is covered on the requirements draft

   - Message ordering (critical when the data spans several packets, e.g.
variable length fields) 

It seems there is consensus that message ordering is important.

   - Transport reliability - 

There is some confusion around this problem since transport reliability is
*not* explicit mentioned in the reqs draft, but 
since congestion awareness is, some people take it for granted. 

   - require application-level ACKs in the protocol (SHOULD be after
     data are persisted)

There is consensus that application layer ACKs is important

   - require enable de-duplication of received records through a unique key

There is consensus that de-duplication is important.

   - Exporter should keep track of number of flow records + some important
totals
     and and periodically communicate this information to the
     collector.

There is consensus that this or some other solution to capture the 
amount of lost *flow records for each key/field* (not packets) is important


c) Regarding High-Availability

we should have the ability to send to multiple collectors and for the 
exporter to be able to switch from one collector to another.

d) Regarding Timestamps

New text for section 5.4 (Disclaimer before somebody goes for my neck: this
affects the 
architecture/requirements, not the protocol evaluation.)


   The metering process MUST be able to generate wire-line timestamps 
   (rather then flow cache timestamps) for the first and the last 
   observed packet of a flow. The timestamp resolution MUST be at least 
   the one of the sysUpTime [RFC1213], which is one centisecond.


e) Regarding the Views on the Problem

Some people advocate that exporting IP flows has nothing unique to it, it's
well known problem 
only with a different data model. I hope I captured this right. Anyway, here
it goes a quotation.

"However, the statement that IP flow is somehow unique
in its data requirements and as such a more generalized
"data mover" is somehow problematic, is just plain wrong."

f) Regarding the Field Experience of IPDR

Some people wanted more information on this, so I'm pasting an email 
from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information please
direct your 
questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.

"
-----Original Message-----
From: Aron Heintz [mailto:aheintz@ipdr.org]
Sent: Thursday, October 10, 2002 3:47 PM
To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
Subject: RE: [ipfix-eval] Discussion of Candidate Protocols


 It seems to me that NDM-U wins the "free, open, and widely deployed" crown
hands down.  NDM-U 3.1 is completely free and publicly available (see
below).  By the end of this year, more than 70% of the mediation and billing
packages (by market share) will have proven NDM-U 3.1 *real-world*
interoperability.

 What could be more important than this?  It appears that some of you are
debating minor technical points when you might approach the question "Who is
going to receive the data we are sending?  How do they want to see it?"
Technologies do not win by virtue of their theoretical perfection.  The OSI
model is close to theoretical perfection.  TCP/IP is not.
"

------_=_NextPart_001_01C27E08.831985A2
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>IPFix Summary</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I burned a good chunk of my weekend trying to =
summarize our discussions. If you think I didn't capture what was said =
adequately, please speak up. This email does not substitute Juergen's =
on open issues, but is actually trying to close some of those open =
issues. (Should I copy the main ipfix list?)</FONT></P>

<P><FONT SIZE=3D2>I revised most of the emails starting from Jeff =
Meyer's - &quot;Discussion of Candidate Protocols&quot; on - =
9/30.</FONT>
</P>

<P><FONT SIZE=3D2>a)Regarding metering requirements and protocol =
candidates.</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that the metering requirements =
should be N/A when choosing the IPfix Export Protocol.</FONT>
</P>

<P><FONT SIZE=3D2>A good summary was provided by Peter.</FONT>
</P>

<P><FONT SIZE=3D2>* The protocol should cover only the issues of =
delivering data from the exporter to the collector. It must be =
expressive </FONT></P>

<P><FONT SIZE=3D2>enough to contain all the data defined in the data =
model. </FONT>
</P>

<P><FONT SIZE=3D2>* The data model should cover the identification of =
the metrics and attributes, their meanings, and how they are grouped =
</FONT></P>

<P><FONT SIZE=3D2>together. </FONT>
</P>

<P><FONT SIZE=3D2>* The architecture should cover issues such as where =
data are observed, what data are required and what are optional, when =
</FONT></P>

<P><FONT SIZE=3D2>reliability is needed, how the data can be =
manipulated (e.g., calculating bandwidth), etc., etc.</FONT>
</P>

<P><FONT SIZE=3D2>b) Regarding reliability</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Congestion awareness. </FONT>
</P>

<P><FONT SIZE=3D2>It is covered on the requirements draft</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Message ordering (critical when the =
data spans several packets, e.g. variable length fields) </FONT>
</P>

<P><FONT SIZE=3D2>It seems there is consensus that message ordering is =
important.</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Transport reliability - </FONT>
</P>

<P><FONT SIZE=3D2>There is some confusion around this problem since =
transport reliability is *not* explicit mentioned in the reqs draft, =
but </FONT></P>

<P><FONT SIZE=3D2>since congestion awareness is, some people take it =
for granted. </FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - require application-level ACKs in the =
protocol (SHOULD be after</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; data are persisted)</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that application layer ACKs is =
important</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - require enable de-duplication of =
received records through a unique key</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that de-duplication is =
important.</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; - Exporter should keep track of number =
of flow records + some important totals</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; and and periodically =
communicate this information to the</FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp;&nbsp; collector.</FONT>
</P>

<P><FONT SIZE=3D2>There is consensus that this or some other solution =
to capture the </FONT>
<BR><FONT SIZE=3D2>amount of lost *flow records for each key/field* =
(not packets) is important</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>c) Regarding High-Availability</FONT>
</P>

<P><FONT SIZE=3D2>we should have the ability to send to multiple =
collectors and for the </FONT>
<BR><FONT SIZE=3D2>exporter to be able to switch from one collector to =
another.</FONT>
</P>

<P><FONT SIZE=3D2>d) Regarding Timestamps</FONT>
</P>

<P><FONT SIZE=3D2>New text for section 5.4 (Disclaimer before somebody =
goes for my neck: this affects the </FONT>
<BR><FONT SIZE=3D2>architecture/requirements, not the protocol =
evaluation.)</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&nbsp;&nbsp; The metering process MUST be able to =
generate wire-line timestamps </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; (rather then flow cache timestamps) for =
the first and the last </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; observed packet of a flow. The =
timestamp resolution MUST be at least </FONT>
<BR><FONT SIZE=3D2>&nbsp;&nbsp; the one of the sysUpTime [RFC1213], =
which is one centisecond.</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>e) Regarding the Views on the Problem</FONT>
</P>

<P><FONT SIZE=3D2>Some people advocate that exporting IP flows has =
nothing unique to it, it's well known problem </FONT>
<BR><FONT SIZE=3D2>only with a different data model. I hope I captured =
this right. Anyway, here it goes a quotation.</FONT>
</P>

<P><FONT SIZE=3D2>&quot;However, the statement that IP flow is somehow =
unique</FONT>
<BR><FONT SIZE=3D2>in its data requirements and as such a more =
generalized</FONT>
<BR><FONT SIZE=3D2>&quot;data mover&quot; is somehow problematic, is =
just plain wrong.&quot;</FONT>
</P>

<P><FONT SIZE=3D2>f) Regarding the Field Experience of IPDR</FONT>
</P>

<P><FONT SIZE=3D2>Some people wanted more information on this, so I'm =
pasting an email </FONT>
<BR><FONT SIZE=3D2>from Aron Heintz [aheintz@ipdr.org]. Any more =
in-depth information please direct your </FONT>
<BR><FONT SIZE=3D2>questions to Jeff Meyer [jeffm@cup.hp.com] or Aron =
Heitz.</FONT>
</P>

<P><FONT SIZE=3D2>&quot;</FONT>
<BR><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Aron Heintz [<A =
HREF=3D"mailto:aheintz@ipdr.org">mailto:aheintz@ipdr.org</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, October 10, 2002 3:47 PM</FONT>
<BR><FONT SIZE=3D2>To: ipfix-eval@net.doit.wisc.edu; Harrington, David; =
Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [ipfix-eval] Discussion of Candidate =
Protocols</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&nbsp;It seems to me that NDM-U wins the &quot;free, =
open, and widely deployed&quot; crown</FONT>
<BR><FONT SIZE=3D2>hands down.&nbsp; NDM-U 3.1 is completely free and =
publicly available (see</FONT>
<BR><FONT SIZE=3D2>below).&nbsp; By the end of this year, more than 70% =
of the mediation and billing</FONT>
<BR><FONT SIZE=3D2>packages (by market share) will have proven NDM-U =
3.1 *real-world*</FONT>
<BR><FONT SIZE=3D2>interoperability.</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;What could be more important than this?&nbsp; =
It appears that some of you are</FONT>
<BR><FONT SIZE=3D2>debating minor technical points when you might =
approach the question &quot;Who is</FONT>
<BR><FONT SIZE=3D2>going to receive the data we are sending?&nbsp; How =
do they want to see it?&quot;</FONT>
<BR><FONT SIZE=3D2>Technologies do not win by virtue of their =
theoretical perfection.&nbsp; The OSI</FONT>
<BR><FONT SIZE=3D2>model is close to theoretical perfection.&nbsp; =
TCP/IP is not.</FONT>
<BR><FONT SIZE=3D2>&quot;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27E08.831985A2--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Sun Oct 27 19:04:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA12083
	for <ipfix-archive@lists.ietf.org>; Sun, 27 Oct 2002 19:04:23 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 185wrH-0003oI-00
	for ipfix-list@mil.doit.wisc.edu; Sun, 27 Oct 2002 17:30:15 -0600
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 185wrF-0003n9-00
	for ipfix-req@net.doit.wisc.edu; Sun, 27 Oct 2002 17:30:13 -0600
Received: from babar.switch.ch (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g9RNTRGU027481;
	Mon, 28 Oct 2002 00:29:27 +0100 (MET)
Received: (from leinen@localhost)
	by babar.switch.ch (8.12.2+Sun/8.12.2/Submit) id g9RNTJNv027478;
	Mon, 28 Oct 2002 00:29:19 +0100 (MET)
X-Authentication-Warning: babar.switch.ch: leinen set sender to simon@limmat.switch.ch using -f
To: David Moore <dmoore@caida.org>
Cc: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-req] list of issues
References: <7605466.1035285886@[192.168.102.164]>
	<20021022095827.N4694@login.caida.org>
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
   7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
From: Simon Leinen <simon@limmat.switch.ch>
In-Reply-To: <20021022095827.N4694@login.caida.org>
Date: 28 Oct 2002 00:29:19 +0100
Message-ID: <aan0ozpik0.fsf@limmat.switch.ch>
Lines: 21
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2.90
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

On Tue, 22 Oct 2002 09:58:27 -0700, David Moore <dmoore@caida.org> said:
>> Reinaldo-4: Add MUST requirement for exporting ICMP codes in Section 6.1
>> 
>> There were not many responses on this suggestion. Personally, I do
>> not consider it a MUST, but a nice-to-have.

> I would like to see this as a MUST, because of its usefulness for
> both debugging certain events and for potential security related
> tracking.

I agree, as I have used ICMP type/codes in flow data for the same
purposes.

Note that "old" NetFlow versions (1/5/6/7) had a very efficient and
easy-to-use method of encoding the ICMP type and code in the fields
that are used for port numbers in TCP/UDP.

Things like this will probably take more effort as we move to a "real"
data model.
-- 
Simon.

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 08:17:40 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA07415
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 08:17:39 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 1869XX-0002zz-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 07:02:43 -0600
Received: from babar.switch.ch ([130.59.4.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 1869XQ-0002z3-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 07:02:36 -0600
Received: from babar (localhost [IPv6:::1])
	by babar.switch.ch (8.12.2+Sun/8.12.2) with ESMTP id g9SD1xGU028365;
	Mon, 28 Oct 2002 14:01:59 +0100 (MET)
From: Simon Leinen <simon@limmat.switch.ch>
Message-ID: <15805.13639.378299.410135@limmat.switch.ch>
Date: Mon, 28 Oct 2002 14:01:59 +0100
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="WL2A9/a8g0"
Content-Transfer-Encoding: 7bit
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] draft-leinen-ipfix-eval-contrib-00.txt
X-Mailer: VM 7.07 under Emacs 21.2.90.1
X-Face: 1Nk*r=:$IBBb8|TyRB'2WSY6u:BzMO7N)#id#-4_}MsU5?vTI?dez|JiutW4sKBLjp.l7,F
 7QOld^hORRtpCUj)!cP]gtK_SyK5FW(+o"!or:v^C^]OxX^3+IPd\z,@ttmwYVO7l`6OXXYR`
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>


--WL2A9/a8g0
Content-Type: text/plain; charset=iso-8859-1
Content-Description: message body text
Content-Transfer-Encoding: quoted-printable

I decided to submit an updated version of my "Individual Evaluation"
I-D for reference, because it contains some rationale that is missing
from the first version of the evaluation team I-D.  Since I hadn't
submitted the first version to the I-D repository, I had to change the
title rather than the serial number.  Full text is attached.

Changes from the first version (which had been circulated on the
ipfix-eval mailing list) include:

    Changed name from draft-leinen-ipfix-eval-00.txt to
    draft-leinen-ipfix-eval-contrib-00.txt.

    Added text about benefit/cost of split reporting =E0 la LFAP.

    Added text about benefits of server-selected byte ordering =E0 la
    CRANE.

    Added text about LFAP's multi-record encoding.

    Added text about NetFlow v9's periodical reporting requirement for
    option and template data, and how this could be relaxed for
    reporting asynchronous events, in particular when a reliable
    transport is used.

    (Opinionated Conclusions): Removed entire section.

    (Acknowledgements): New section.

    (References): Completed LFAP-MIB reference.
--=20
Simon.

--WL2A9/a8g0
Content-Type: text/plain
Content-Disposition: inline;
	filename="draft-leinen-ipfix-eval-contrib-00.txt"
Content-Transfer-Encoding: 7bit


Internet Draft                                              Simon Leinen
Document: draft-leinen-ipfix-eval-contrib-00.txt                  SWITCH
Expires: April 2003

                                                            October 2002


           Individual Evaluation Of IPFIX Protocol Candidates

                <draft-leinen-ipfix-eval-contrib-00.txt>

Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of [RFC 2026]. Internet-Drafts are
   working documents of the Internet Engineering Task Force (IETF), its
   areas, and its working groups. Note that other groups may also
   distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   Distribution of this document is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002). All Rights Reserved.


Abstract

   This document contains one individual evaluation team member's
   contribution to the selection process for an IP Flow Information
   Export (IPFIX) protocol.  The five candidate protocols are outlined
   and grouped in broad categories, and evaluated against specific
   requirements.








Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 1]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


Table of Contents

   1 Introduction .................................................    3
   2 Protocol Summaries ...........................................    3
   2.1 CRANE ......................................................    3
   2.1.1 CRANE Protocol Operation .................................    4
   2.1.2 CRANE Data Encoding ......................................    4
   2.2 Diameter ...................................................    4
   2.2.1 Diameter Protocol Operation ..............................    5
   2.2.2 Diameter Data Encoding ...................................    5
   2.3 LFAP .......................................................    5
   2.3.1 LFAP Protocol Operation ..................................    5
   2.3.2 LFAP Data Encoding .......................................    6
   2.4 NetFlow v9 .................................................    6
   2.4.1 NetFlow Protocol Operation ...............................    6
   2.4.2 NetFlow Data Encoding ....................................    6
   2.5 Streaming IPDR .............................................    6
   2.5.1 Streaming IPDR Protocol Operation ........................    7
   2.5.2 Streaming IPDR Data Encoding .............................    7
   3 Broad Classification of Candidate Protocols ..................    7
   3.1 Design Goals ...............................................    7
   3.1.1 High-Performance Flow Metering (NetFlow, LFAP) ...........    7
   3.1.2 Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE) .....    8
   3.1.3 General-Purpose AAA (Diameter) ...........................    8
   3.2 Data Representation ........................................    8
   3.2.1 Externally Described Encoding (CRANE, IPDR, NetFlow) .....    8
   3.2.2 Partly Self-describing Encoding (Diameter, LFAP) .........    9
   3.3 Protocol Flow ..............................................    9
   3.3.1 Mainly Unidirectional Protocols (IPDR, NetFlow) ..........    9
   3.3.2 Bidirectional Protocols (CRANE, LFAP) ....................    9
   3.3.3 Unidirectional after Negotiation (Diameter) ..............   10
   4 Item-Level Compliance Evaluation .............................   10
   4.1 Meter Reliability (5.1) ....................................   10
   4.2 Sampling (5.2) .............................................   11
   4.3 Overload Behaviour (5.3) ...................................   11
   4.4 Information Model (6.1) ....................................   12
   4.5 Data Model (6.2) ...........................................   12
   4.5.1 Data Model Extensibility .................................   12
   4.5.2 Flexible Flow Record Definition ..........................   13
   4.6 Data Transfer (6.3) ........................................   13
   4.6.1 Congestion Awareness (6.3.1) .............................   13
   4.6.2 Reliability (6.3.2) ......................................   13
   4.6.3 Security (6.3.2) .........................................   14
   4.6.3.1 IPSEC and TLS ..........................................   14
   4.6.3.2 Application-level Security .............................   14
   4.6.4 Push and Pull Mode Reporting (6.4) .......................   15
   4.6.5 Regular Reporting Interval (6.5) .........................   15
   4.6.6 Notification on Specific Events (6.6) ....................   15
   4.6.7 Anonymization (6.7) ......................................   16
   4.6.8 Several Collecting Processes (8.3) .......................   16


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 2]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   5 Opinionated Conclusions ......................................   16
   6 Security Considerations ......................................   18
   7 References ...................................................   18
   8 Author's Address .............................................   19
   9 Full Copyright Statement .....................................   20


1.  Introduction

   The IP Flow Information Export (IPFIX) Working Group has been
   chartered to select a protocol for the export of flow information
   from traffic-observing devices (such as routers or dedicated probes).
   To this end, an evaluation team was formed to evaluate submitted
   protocols.  Each protocol is represented by an advocate, who
   submitted a specific evaluation draft for the respective protocol
   against the requirements document [IPFIX-REQ].  The specification of
   each protocol was itself available as one or several Internet-Drafts,
   sometimes referring normatively to documents from outside the IETF.

   This document contains the author's personal evaluation of the
   submitted protocols with respect to the requirements document, and on
   a more general level, to the working group charter.  It is intended
   to serve as input for the deliberations of the evaluation team.

   The following IPFIX candidate protocol submissions were evaluated:

      -  CRANE [CRANE], [CRANE-EVAL]

      -  Diameter [DIAMETER], [DIAMETER-EVAL]

      -  LFAP [LFAP], [LFAP-EVAL]

      -  NetFlow v9 [NETFLOWV9], [NETFLOWV9-EVAL]

      -  Streaming IPDR [IPDR], [IPDR-EVAL]

   This document uses terminology defined in [IPFIX-REQ] intermixed with
   that from submissions to explain the mapping between the two.

2.  Protocol Summaries

   In the following, each candidate protocol is described briefly,
   highlighting its specific distinguishing features.

2.1.  CRANE

   XACCT's Common Reliable Accounting for Network Element Protocol
   Version 1.0 [CRANE] [CRANE-EVAL] is described as a protocol for the
   transmission of accounting information from "Network Elements" to
   "mediation" and "business support systems".


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 3]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


2.1.1.  CRANE Protocol Operation

   The exporting side is the CRANE client, the collecting side the CRANE
   server.  Note that it is the server that is responsible for
   initiating the connection to the client.  A client can have multiple
   simultaneous connections to different servers for robustness.  Each
   server has an associated priority.  A client only exports to the
   server with the highest priority that is perceived operational.

   Clients and servers exchange messages over a reliable protocol such
   as TCP [TCP] or (preferably) SCTP [SCTP].  The protocol uses
   application-layer acknowledgements as an indication of successful
   processing by the server.  Strong authentication or data
   confidentiality aren't support by the protocol, but can be supported
   by lower-layer mechanisms such as IPSEC [IPSEC] or TLS [TLS].

   The protocol is bidirectional over the entire duration of a session.
   There are 20 different message types.  The protocol supports template
   negotiation, not only at startup but also later on in a session, as
   well as general status inquiries.  There is a separate version
   negotiation protocol defined over UDP.

2.1.2.  CRANE Data Encoding

   Data encoding is based on templates.  Templates contain "keys"
   representing items in data records.  Clients (exporters) publish
   templates to servers (collectors).  Servers can then select the
   subset of fields in a template that they are interested in.  The
   client will suppress keys that haven't been selected by the server.

   Data records contain references to template and configuration
   instances.  They also carry sequence numbers (DSNs for Data Sequence
   Numbers).  These sequence numbers can be used to de-duplicate data
   records that have been delivered multiple times during failover/fail-
   back in redundant configurations.  A "duplicate" bit is set in these
   situations as a hint for the de-duplication process.

   The encoding of (flow information) data records themselves is very
   compact.  The client (exporter) can choose to send data in big-endian
   (network byte order) or little-endian format.  There are eighteen
   fixed-size key types, as well as five variable-length string and
   binary data (BLOB) types.

2.2.  Diameter

   Diameter [DIAMETER] [DIAMETER-EVAL] is an evolution of the Remote
   Authentication Dial In User Service (RADIUS) protocol [RADIUS].
   RADIUS is widely used to outsource authentication and authorization
   in dialup access environments.  Diameter is a generalized and
   extensible protocol intended to support Authentication, Authorization


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 4]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   and Accounting (AAA) requirements of different applications.  Dialup
   and Mobile IPv4 are examples of such applications defined in the
   IETF.

2.2.1.  Diameter Protocol Operation

   Diameter is a peer-to-peer protocol.  The base protocol defines
   fourteen command codes, organized as seven request/response command
   pairs.  Presumably, only a subset of these would be used in a pure
   IPFIX application.  Diameter includes capability negotiation and
   error notifications.  Diameter operates over TCP or (preferred) SCTP.
   There is a framework for end-to-end security, the mechanisms for
   which are defined in a separate document.  IPSEC or TLS can be used
   to provide authentication or encryption at the underlying layers.

2.2.2.  Diameter Data Encoding

   Diameter conveys data in the form of attribute/value pairs (AVPs).
   An AVP consists of eight bytes of header plus the space to store the
   data, which depends on the data format.  There are numerous
   predefined AVP data formats, including signed and unsigned integer
   types, each in 32 and 64 bit variants, IPv4 and IPv6 addresses, as
   well as others.  The advocacy draft [DIAMETER-EVAL] suggests that the
   predefined data formats IPFilterRule and/or QoSFilterRule could be
   extended to represent IP Flow Information.  Such rules are
   represented as readable UTF-8 strings.  Alternatively, new AVPs could
   be defined to represent flow information.

2.3.  LFAP

   LFAP [LFAP] [LFAP-DATA] [LFAP-EVAL] started out as the "Lightweight
   Flow Admission Protocol" and was used to outsource shortcut creation
   decisions on flow-based routers, as well as to provide per-flow
   statistics.  Later versions removed the admission function and
   changed the name to "Lightweight Flow Accounting Protocol"

2.3.1.  LFAP Protocol Operation

   The exporter in LFAP is called the Connection Control Entity (CCE),
   and the collector is the Flow Accounting Server (FAS).  These
   entities communicate with each other over a TCP connection.  LFAP
   knows thirteen message types, including operations for connection
   management, version negotiation, flow information messages and
   administrative requests.  Authentication and encryption can be
   provided by IPSEC or TLS at lower layers.  Additionally, the LFAP
   protocol itself supports four levels of security using HMAC-MD5
   authentication and DES-CBC encryption.

   A distinguishing feature is that LFAP has two different message types
   for flow information: A Flow Accounting Request (FAR) message is sent


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 5]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   when a new flow is identified at the CCE (meter/exporter).
   Accounting information is sent later in one or multiple Flow Update
   Notification (FUN) messages.  A collector must match each FUN to a
   Flow ID previously sent in a FAR.

   The LFAP document also defines a set of useful statistics about the
   accounting process.  A separate MIB document [LFAP-MIB] is provided
   for management of LFAP entities using SNMP.

2.3.2.  LFAP Data Encoding

   LFAP encodes data in a Type/Length/Value format with four bytes of
   overhead per data item (two bytes for the type and two bytes for the
   length field).

2.4.  NetFlow v9

   NetFlow v9 [NETFLOWV9] [NETFLOWV9-EVAL] is a generalized version of
   Cisco's NetFlow protocol.  Previous versions of NetFlow, in
   particular version 5, have been widely implemented and used for the
   exporting and collecting of IP flow information.

2.4.1.  NetFlow Protocol Operation

   NetFlow uses a very simple protocol, with the exporter sending
   template, options, and data "FlowSets" to the collector.  FlowSets
   are sequences of data records of similar format.  NetFlow is the only
   one of the candidate protocols that has always worked over UDP [UDP].
   Because of the simple unidirectional nature of the protocol, it
   should be relatively straightforward to add mappings to other
   transport protocols such as SCTP or TCP.  The current NetFlow v9
   draft fails to specify such a mapping, but the advocacy draft
   suggests an SCTP transport to make NetFlow congestion-friendly.

2.4.2.  NetFlow Data Encoding

   NetFlow v9 uses a template facility to describe exported data.  The
   data itself is represented in a compact way using network byte order.

2.5.  Streaming IPDR

   Streaming IPDR [IPDR] [IPDR-EVAL] is an application of the Network
   Data Management-Usage (NDM-U) For IP Services specification version
   3.1 [NDM-U-3.1].  It has been developed by the Internet Protocol
   Detail Record Organization (IPDR, Inc. or ipdr.org).  The terminology
   used is similar to CRANE's, talking about Service Elements (SEs),
   mediation systems and Business Support Systems (BSS).





Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 6]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


2.5.1.  Streaming IPDR Protocol Operation

   Streaming IPDR operates over TCP.  There is a "Trivial TCP Delivery"
   mode as well as an "Acknowledged TCP Delivery" or "Reliable
   Streaming" mode.  The latter uses application-layer acknowledgements
   for increased reliability.

   The protocol is basically unidirectional.  The exporter opens a
   connection towards the collector, then sends a header followed by a
   set of record descriptors.  Then it can send "Usage Event" records
   corresponding to these descriptors until the connection is
   terminated.  New record descriptors can be sent at any time.
   Messages carry sequence numbers that are used for de-duplication
   during failover.  They are also referenced by application-level
   acknowledgements when Reliable Streaming is used.

2.5.2.  Streaming IPDR Data Encoding

   IPDR uses an information modeling technique based on the XML-Schema
   language [XML].  Data can be represented in XML or in a streamlined
   encoding based on the External Data Representation [XDR].  XDR forms
   the basis of Sun's Remote Procedure Call and Network File System
   protocols, and has proven to be both space- and processing-efficient.

3.  Broad Classification of Candidate Protocols

   In order to evaluate the candidate protocols against the higher-level
   requirements laid out in the IPFIX Working Group charter, it is
   useful to group them into broader categories.

3.1.  Design Goals

   One way to look at the candidate protocols is to study the goals that
   have directed their respective design.  Note that the intention is
   not to exclude protocols that have been designed with a different
   class of applications in mind, but simply to better understand the
   different tradeoffs that distinguish the protocols.

3.1.1.  High-Performance Flow Metering (NetFlow, LFAP)

   Of the candidate protocols, Cisco's NetFlow is the purest example of
   a highly specialized protocol that has been designed with the sole
   objective of conveying accounting data from flow-aware routers at
   high rates.  Starting from a fixed set of accounting fields, it has
   been extended a few times over the years to support additional fields
   and various types of aggregation in the metering/exporting process.

   Riverstone's LFAP is similarily focused, except that it originated in
   a protocol to outsource the decision whether to create shortcuts in
   flow-based routers.  This is still manifest in an increased emphasis


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 7]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   on reliable operation, and in the split reporting of flow information
   using Flow Accounting Request (FAR) and Flow Update Notification
   (FUN) messages.

   It has been pointed out that split reporting as done by LFAP can
   reduce memory requirements at the exporter.  This concerns a subset
   of attributes that are neither "key" attributes which define flows,
   nor attributes such as packet or byte counters that must be updated
   for each packet anyway.  On the other hand, when there are many
   short-lived flows, the number of flow export messages will be
   significantly higher than with "unitary" flow export models, and the
   collector will have to keep state about active flows until they are
   terminated.

3.1.2.  Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE)

   Streaming IPDR and CRANE describe themselves as protocols to
   facilitate the reliable transfer of accounting information between
   Network Elements (or more generally "Service Elements" in the case of
   IPDR) and Mediation Systems or Business Support Systems (BSS).  They
   reflect a view of the accounting problem and of network system
   architectures that originates in traditional "vertically integrated"
   telecommunications.

   Both protocols also emphasize extensibility with the goal of
   applicability to a wide range of accounting tasks.

   IPDR is based on NDM-U, which uses the XML-Schema language for
   machine-readable specification of accounting data structures, while
   using the efficient XDR encoding for the actual data transfer.

   CRANE uses templates to describe exported data.  These templates are
   negotiated between collector and exporter and can change during a
   session.

3.1.3.  General-Purpose AAA (Diameter)

   Diameter is another example of a broader-purpose protocol, in that it
   covers aspects of authentication and authorization as well as
   accounting.  This explains its strong emphasis on security and
   reliability.  The design also takes into account various types of
   intermediate agents.

3.2.  Data Representation

   IPFIX is intended to be deployed, among others, in high-speed routers
   and to be used for exporting detailed flow data at high flow rates.
   Therefore it is useful to look at the tradeoffs between the
   efficiency of data representation and the extensibility of data
   models.  The two main efficiency goals should be (1) to minimize the


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 8]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   export data rate and (2) to minimize data encoding overhead in the
   exporter.  The overhead of decoding flow data at the collector is
   deemed less critical, and is partly covered by efficiency target (2),
   since an encoding that is easy on the encoder is often also easy on
   the decoder.

3.2.1.  Externally Described Encoding (CRANE, IPDR, NetFlow)

   The protcols in this group use an external mechanism to fully
   describe the format in which flow data is encoded.  The mechanisms
   are "templates" in the case of CRANE and NetFlow, and a subset of the
   XML-Schema language, or alternatively XDR IDL, for IPDR.

   A fully external data format description allows for very compact
   encoding, with data components such as 32-bit integers taking up only
   four octets.  The XDR representation used in IPDR additionally
   ensures that larger fields are always aligned on 32-bit boundaries,
   which can reduce processing requirements at both the exporter and the
   collector, at a slight cost of space (thus bandwidth) due to padding.

   Most protocols specify "network byte order" or "big-endian" format in
   the export data format.  CRANE is the only protocol where the
   exporter may choose the byte ordering.  The principal benefit is that
   this lowers the processing demand on exporters based on little-endian
   architectures.

3.2.2.  Partly Self-describing Encoding (Diameter, LFAP)

   Diameter and LFAP represent flow data using Type/Length/Value
   encodings.  While this makes it possible to partly decode flow data
   without full context information - possibly useful for debugging - it
   does increase the encoding size and thus the bandwidth requirements
   both on the wire and in the exporter and collector.

   LFAP has a "multi-record" encoding which claims to provide similar
   wire efficiency as the externally described encodings while still
   supporting diagnostic tools.

3.3.  Protocol Flow

   Another criterion for classification is the flow of protocol messages
   between exporter and collector.

3.3.1.  Mainly Unidirectional Protocols (IPDR, NetFlow)

   In IPDR and NetFlow, the data flow is essentially from exporter to
   collector, with the collector only sending acknowledgements.  The
   protocols send data descriptions (templates) on session
   establishment, and then start sending flow export data based on these
   templates.  "Meta-information" about the operational status of the


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 9]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   metering and exporting processes (for example about the sampling
   parameters in force at a given moment) is conveyed using a special
   type of "Option" template in NetFlow v9.  IPDR currently doesn't have
   definitions for such "meta-data" types, but they could easily be
   defined outside the protocol proper.

3.3.2.  Bidirectional Protocols (CRANE, LFAP)

   CRANE allows for negotiation of the templates used for data export at
   the start of a session, and also allows negotiated template updates
   later on.  CRANE sessions include an exporter and potentially several
   collectors, so these negotiations can involve more than two parties.

   LFAP has an initial phase of version negotiation, followed by a phase
   of "data negotiation".  After these startup phases, the exporter
   sends FAR and FUN messages to the collector.  However, either party
   may also send Administrative Request (AR) messages to the other, and
   will normally receive Administrative Request Answers (ARA) in
   response.  Administrative Requests can be used for status inquiries,
   including information about a specific active flow, or for
   negotiation of the "Information Elements" that the collector wants
   the exporter to export.

3.3.3.  Unidirectional after Negotiation (Diameter)

   Diameter has a general capabilities negotiation mechanism.  The use
   of Diameter for IPFIX hasn't been described in sufficient detail to
   determine how capabilities negotiation would be used.  After
   negotiation, the protocol would operate in essentially unidirectional
   mode, with Accounting-Request (ACR) messages flowing from the
   exporter to the collector, and Accounting-Answer (ACA) messages
   flowing back.

4.  Item-Level Compliance Evaluation

   The template for protocol advocates noted that not all requirements
   in [IPFIX-REQ] apply directly to the flow export protocol.  In
   particular, sections 4 (Distinguishing Flows) and 5 (Metering
   Process) mainly specify requirements on the metering mechanism that
   "feeds" the exporter.  However, in some cases they require
   information about the metering process to be reported to collectors,
   so the flow export protocol must support conveying this information.

4.1.  Meter Reliability (5.1)

   CRANE, Diameter, IPDR consider requirement 5.1 (reliability of the
   metering process or indication of "missing reliability" out of scope
   for the IPFIX protocol, which presumably means that they assume the
   metering process to be reliable.



Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 10]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   The NetFlow v9 advocacy draft takes a similar stance when it claims
   "Total Compliance. The metering process is reliable."  (although this
   has been documented not to be true for all current Cisco
   implementations of NetFlow v5).

   LFAP is the only protocol that explicitly addresses the possibility
   that data might be lost in the metering process, and provides useful
   statistics the collectors to estimate not just the amount of flow
   data that was lost, but also the amount of data not unaccounted for.

   Note that in the general case, it can be considered unrealistic to
   assume total reliability of a flow-based metering process in all
   situations, unless sampling or coarse flow definitions are used.
   With the fine-grained flow classification mechanisms mandated by
   IPFIX, it is easy to imagine traffic where each - possibly very small
   - packet would create a new flow.  This kind of traffic is in fact
   encountered in practice during aggressive port scans, and will
   eventually lead to table overflows or exceeding of memory bandwidth
   at the meter.

   While some of these situations can be handled by dropping data later
   on in the exporter, data transfer, or collector, or by transitioning
   the meter to sampling mode (or increasing the sampling interval), it
   will sometimes be considered the lesser evil to simply report on the
   data that couldn't be accounted for.  Currently LFAP is the only
   protocol that supports this.

4.2.  Sampling (5.2)

   CRANE and IPDR don't mention the possibility of sampling.  This is
   natural because they are targeted towards telco-grade accounting,
   where sampling would be considered inadmissible.  Since support for
   sampling is a "MAY" requirement, its lack could be tolerated, but
   severely restricts the applicability of these protocols in places of
   high aggregation, where absolute precision is not necessary.  This
   includes applications such as traffic profiling, traffic engineering,
   and large-scale attack/intrusion detection, but also usage-based
   accounting applications where charging based on sampling is agreed
   upon.

   The Diameter advocate acknowledges the existence of sampling and
   suggests to define new (grouped) AVPs to carry information about the
   sampling parameters in use.

   LFAP does not currently support sampling, although its advocate
   contends that adding support for this would be relatively
   straightforward, without going into too much detail.

   NetFlow v9 does support sampling (and many implementations and
   deployments of sampled NetFlow exist for previous NetFlow versions).


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 11]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   Option Data is supposed to convey sampling configuration, although no
   sampling-related field types have yet been defined in the draft.

4.3.  Overload Behaviour (5.3)

   The requirements document suggests that meters adapt to overload
   situations, for example by changing to sampling (or reducing the
   sampling rate if sampling is already in effect), by changing the flow
   definition to coarser flow categories (thinning), by stopping to
   meter, or by reducing packet processing.

   In these situations, the requirements document mandates that flow
   information from before the modification of metering behavior can be
   cleanly distinguished from flow information from after the
   modification.  For the suggested mitigation methods of sampling or
   thinning, this essentially means that all existing flows have to be
   expired, and an entirely new set of flows must be started.  This is
   undesirable because it causes a peak of resource usage in an already
   overloaded situation.

   LFAP and NetFlow claim to handle this requirement, both by supporting
   only the simple overload mitigation methods that don't require the
   entire set of existing flows to be expired.  The NetFlow advocate
   claims that the reporting requirement could be easily met by expiring
   existing flows with the old template, while sending a new template
   for new flows.  While it is true that NetFlow handles this
   requirement in a very graceful manner, the general performance issue
   remains.

   CRANE, Diameter, and IPDR consider the requirement out of scope for
   the protocol, although Diameter summarily acknowledges the possible
   need for new AVP definitions related to mitigation methods.

4.4.  Information Model (6.1)

   All candidate protocols have information models that can represent
   all required and all optional attributes.  The Diameter contribution
   lacks some detail on how exactly the IPFIX-specific attributes should
   be mapped.

4.5.  Data Model (6.2)

4.5.1.  Data Model Extensibility

   Each candidate protocol defines a data model that allows for some
   degree of extensibility.

   CRANE uses Keys to specify fields in templates.  A key "specification
   MUST consist of the description and the data type of the accounting
   item." Apparently extensibility is intended, but I'm not sure whether


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 12]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   adding a new Key really only involves writing a textual description
   and deciding upon a base type.  Every Key also has a 32-bit Key ID,
   but from the current specification they don't seem to carry global
   semantics.

   Diameter's Attribute/Value Pairs (AVP) have a 32-bit identifier (AVP
   Code) administered by IANA.  In addition, there is an optional 32-bit
   Vendor-ID that can contain an SMI Enterprise Number for vendor-
   defined attributes.  If the Vendor-ID (and a corresponding flag in
   the attribute) is set, the AVP Code becomes local to that vendor.

   IPDR uses a subset of the XML-Schema language for extensibility, thus
   allowing for vendor- and application-specific extensions of the data
   model.

   In LFAP, flow attributes are defined as Information Elements.  There
   is a 16-bit IE type code (which is carried in the export protocol for
   every IE).  One type code is reserved for vendor-specific extensions.
   Arbitrary sub-types of the vendor-specific IE can be defined using
   ASN.1 Object IDs (OIDs).

   In NetFlow v9 as reviewed, data items are identified by a sixteen-bit
   field type.  26 field types are defined in the draft.  The draft
   suggests to look check a Web page at Cisco Systems' site for the
   current list of field types.  It would be preferable if the
   administration of the field type space would be delegated to IANA.

4.5.2.  Flexible Flow Record Definition

   All protocols allow for flexible flow record definitions.  CRANE and
   LFAP make the selection/negotiation of the attributes to be included
   in flow records a part of the protocol, the other protocols leave
   this to outside configuration mechanisms.

4.6.  Data Transfer (6.3)

4.6.1.  Congestion Awareness (6.3.1)

   All protocols except for NetFlow v9 operate over a single TCP or SCTP
   transport connection, and inherit the congestion-friendliness of
   these protcols.

   NetFlow v9 has been defined to operate over UDP, but claims to be
   transport-independent and could also be mapped on SCTP or TCP as a
   transport protocol.  The details of such mappings haven't been
   specified, although doing so should have been straightforward given
   the unidirectional nature of this protocol.





Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 13]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


4.6.2.  Reliability (6.3.2)

   As of the time of this writing, the reliability requirement hasn't
   yet been satisfactorily defined in the requirements draft.  Here are
   a few observations regarding the candidate protocols' approaches to
   reliability.  Note that the requirement for multiple collectors (8.3)
   also touches on the issue of reliability.

   CRANE, Diameter, and IPDR, as protocols that strive to be carrier-
   grade accounting protocols, understandably exhibit a strong emphasis
   on near-total reliability of the flow export process.  All three
   protocols use application-level acknowledgements (in case of IPDR,
   optionally) to include the entire collection process in the feedback
   loop.  Indications of "lack of reliability" (lost flow data) are
   somewhat unnatural to these protocols, because they take every effort
   to never lose anything.  These protocols seem suitable in situations
   where one would rather drop a packet than forward it unaccounted for.

   LFAP has application-level acknowledgements, and it also reports
   detailed statistics about lost flows and the amount of data that
   couldn't be accounted for.  It represents a middle ground in that it
   acknowledges that accounting reliability will sometimes be sacrificed
   for the benefit of other tasks, such as switching packets, and
   provides the tools to gracefully deal with such situations.

   NetFlow v9 is the only protocol for which the use of a "reliable"
   transport protocol is optional, and the only protocol that doesn't
   support application-level acknowledgements.  In all fairness, it
   should be noted that it is a very simple and efficient protocol, so
   in an actual deployment it might exhibit a higher level of
   reliability than some of the other protocols would given the same
   amount of resources.

4.6.3.  Security (6.3.2)

4.6.3.1.  IPSEC and TLS

   All protocols can use, and their descriptions in fact recommend to
   use, lower-layer security mechanisms such as IPSEC and, with the
   exception of NetFlow v9 over UDP, TLS.  It can be argued that in all
   envisioned usage scenarios for IPFIX, both IPSEC and TLS provide
   sufficient protection against the main identified threats of flow
   data disclosure and forgery.

   The Diameter draft is the only protocol definition that goes into
   sufficent level of detail with respect to the application of these
   mechanisms, in particular the negotiation of certificates and ciphers
   in TLS, and the use of IKE [IKE] for IPSEC.  Diameter also mandates
   that either IPSEC or TLS be used.



Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 14]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


4.6.3.2.  Application-level Security

   Diameter suggests an additional end-to-end security framework for
   dealing with untrusted third-party agents.  I am not entirely
   convinced that this additional evel of security justifies the
   additional complexity in the context of IPFIX.

   LFAP [LFAP] is the only other protocol that includes some higher-
   level security mechanisms, providing four levels of security
   including no security, authenticated peers, flow data authentication,
   and flow data encryption using HMAC-MD5-96 and DES-CBC.

   As far as I can judge - not being a security expert -, LFAP's built-
   in support for authentication and encryption doesn't provide
   significant additional security compared with the use of TLS or
   IPSEC.  It is potentially useful in situations where TLS or IPSEC are
   unavailable for some reason, although in the context of IPFIX
   scenarios it should be possible to assume support for these lower-
   layer mechanisms if the participating devices are capable of the
   necessary cryptographic methods at all.

4.6.4.  Push and Pull Mode Reporting (6.4)

   All protocols support the mandatory "push" mode.

   The optional "pull" mode could be supported relatively easily in
   Diameter, and is foreseen in NDM-U, the basis of the Streaming IPDR
   proposal.  CRANE, LFAP and NetFlow don't have a "pull" mode.  For
   CRANE and LFAP, adding one would not violate the spirit of the
   protocols because they are already two-way, and in fact LFAP already
   foresees inquiries about specific active flows using Administrative
   Request (AR) messages with a RETURN_INDICATED_FLOWS Command Code IE.

4.6.5.  Regular Reporting Interval (6.5)

   It is not clear whether this ("SHOULD") requirement applies to the
   protocol or merely to the configurability of reporting/timeout
   parameters in the export process.

4.6.6.  Notification on Specific Events (6.6)

   The specific events listed in the requirements documents as examples
   for "specific events" are "the arrival of the first packet of a new
   flow and the termination of a flow after flow timeout".  For the
   former, only LFAP explicitly generates messages upon creation of a
   new flow.  NetFlow always exported flow information on expiry of
   flows, either due to timeout or due to an indication of flow
   termination.  The other protocols are unspecific about when flow
   information is exported.



Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 15]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   On "specific events" in general, all protocols have some mechanism
   that could be used for notification of asynchronous events.  An
   example for such an event would be that the sampling rate of the
   meter was changed in response to a change in the load on the
   exporting process.

   CRANE has Status Request/Status Response messages, but as defined,
   Status Requests can only be issued by the server (collector), so they
   cannot be used by the server to signal asynchronous events.  As in
   IPDR, this could be circumvented by defining templates for meta-
   information.

   Diameter could use special Accounting-Request messages for event
   notification.

   IPDR would presumably define pseudo-"Usage Events" using an XML
   Schema so that events can be reported along with usage data.

   LFAP has Administrative Requests (AR) that can be initiated from
   either side.  The currently defined ARs are all information inquiries
   or reconfiguration requests, but new ARs could be defined to provide
   unsolicited information about specific asynchronous events.  The LFAP
   MIB also defines some traps/notifications.  SNMP notifications are
   useful to signal events to a network management system, but they are
   less attractive as a mechanism to signal events that should be
   somehow handled by a collector.

   In NetFlow v9, Option Data FlowSets are defined to convey information
   about the metering and export processes.  The current draft specifies
   that Option Data should be exported periodically, although this
   requirement will be relaxed for asynchronous events.  It should be
   noted that periodical export of option flowsets (and also of
   templates) may have been considered necessary because NetFlow can run
   over an unreliable transport; it seems less natural when TCP or SCTP
   is used.

4.6.7.  Anonymization (6.7)

   None of the protocols include explicit support for anonymization.
   All protocols could be extended to convey when and how anonymization
   is being performed by an exporter, using mechanisms similar to those
   that would be used to report on sampling.  However it can be argued
   that anonymization it more "static" in the sense that it will be
   either configured at the exporter or not, and that the collector can
   be made aware of this by means outside the IPFIX protocol.

4.6.8.  Several Collecting Processes (8.3)

   CRANE, Diameter, and IPDR all support multiple collectors in a backup
   configuration.  The failover case is analyzed in some detail, with


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 16]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   support for data buffering and de-duplication in failover situations.

   NetFlow takes a more simple-minded approach in that it allows
   multiple (currently: two) collectors to be configured in an exporter.
   Both collectors will generally receive all data and could use
   sequence numbers and inter-collector communication to de-duplicate
   them.  This is a simple way to improve availability but may also be
   considered to be wasteful, both in terms of bandwidth and in terms of
   other exporter resources.  With the current UDP mapping it is easy
   enough to send multiple copies of datagrams to different collectors,
   but when SCTP or TCP is used, sending all data over multiple
   connections will exacerbate performance issues.

   I don't entirely understand how failover is handled in LFAP, where
   flow information is separated into FAR and FUN messages.  In
   particular, when the primary FAS A fails and the CCE starts sending
   to secondary FAS B, will it send B FUNs that refer to Flow IDs whose
   FARs had only been sent to A?

5.  Security Considerations

   The security mechanisms of the candidate protocols were discussed in
   the section about the Security requirement (6.3.2).

6.  Acknowledgements

   A draft of this document had been circulated on the ipfix-eval
   mailing list, and several participants provided valuable feedback,
   including Vamsidhar Valluri, Paul Calato, Tal Givoly, Jeff Meyer,
   Robert Lowe, Benoit Claise, and Carter Bullard.  Many of these issues
   have been discussed with the other members of the IPFIX evaluation
   team: Juergen Quittek, Reinaldo Penno, Ram Gopal, and Mark Fullmer.
   However, this draft doesn't claim to represent team consensus, just
   the views of its author.

7.  References

[IPFIX-REQ] J. Quittek et al., "Requirements for IP Flow Information
            Export", draft-ietf-ipfix-reqs-06.txt, work in progress,
            September 2002.

[CRANE]     K. Zhang, E. Elkin, "XACCT's Common Reliable Accounting for
            Network Element (CRANE) Protocol Specification Version 1.0",
            draft-kzhang-crane-protocol-05.txt, work in progress, August
            2002.

[CRANE-EVAL]
            K. Zhang, E. Elkin, P. Ludemann, "Evaluation of the CRANE
            Protocol Against IPFIX Requirements", draft-kzhang-ipfix-
            eval-CRANE-00.txt, work in progress, September 2002.


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 17]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


[DIAMETER]  P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko,
            "Diameter Base Protocol", draft-ietf-aaa-diameter-12.txt,
            work in progress, July 2002.

[DIAMETER-EVAL]
            S. Zander, "Evaluation of the Diameter Protocol Against
            IPFIX Requirements", draft-zander-ipfix-eval-
            diameter-00.txt, work in progress, September 2002.

[LFAP]      P. Calato, M. MacFaden, "Light-weight Flow Accounting
            Protocol Specification Version 5.0", draft-riverstone-
            lfap-01.txt, work in progress, June 2002.

[LFAP-DATA] P. Calato, M. MacFaden, "Light-weight Flow Accounting
            Protocol Data Definition Specification Version 5.0", draft-
            riverstone-lfap-data-01.txt, work in progress, June 2002.

[LFAP-EVAL] P. Calato, "Evaluation of Protocol LFAP Against IPFIX
            Requirements", draft-calato-ipfix-lfap-eval-05.txt, work in
            progress, August 2002.

[LFAP-MIB]  P. Calato, M. MacFaden, "Light-weight Flow Accounting
            Protocol MIB", draft-calato-lfap-mib-00.txt, work in
            progress, September 2002.

[NETFLOWV9] B. Claise, "Cisco Systems NetFlow services Export Version
            9", draft-bclaise-netflow-9-01.txt, work in progress,
            October 2002.

[NETFLOWV9-EVAL]
            B. Claise, "Evaluation Of NetFlow Version 9 Against IPFIX
            Requirements", draft-claise-ipfix-eval-netflow-02.txt, work
            in progress, October 2002.

[IPDR]      J. Meyer, "Reliable Streaming Internet Protocol Detail
            Records", draft-meyer-ipdr-streaming-00.txt, work in
            progress, August 2002.

[IPDR-EVAL] J. Meyer, "Evaluation Of Streaming IPDR Against IPFIX
            Requirements", draft-meyer-ipfix-IPDR-eval-00.txt, work in
            progress, September 2002.

[NDM-U-3.1] Internet Protocol Detail Record Organization, "Network Data
            Management - Usage (NDM-U) For IP-Based Services Version
            3.1", April 2002.

[IPSEC]     S. Kent, et al. "Security Architecture for the Internet
            Protocol", RFC 2401, November 1998.




Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 18]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


[IKE]       D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)",
            RFC 2409, November 1998.

[TLS]       T. Dierks, et al. "The TLS Protocol, Version 1.0", RFC 2246,
            January 1999.

[RADIUS]    C. Rigney, A. Rubens, W. Simpson, S. Willens, "Remote
            Authentication Dial In User Service (RADIUS)", RFC 2865,
            June 2000.

[TCP]       J. Postel, "Transmission Control Protocol", RFC 793, January
            1981.

[UDP]       J. Postel, "User Datagram Protocol" RFC 768, August 1980.

[SCTP]      R. Stewart et al., "Stream Control Transmission Protocol",
            RFC 2960. October 2000.

[XML]       World Wide Web Consortium, "Extensible Markup Language (XML)
            1.0", W3C XML, February 1998.

[XDR]       R. Srinivasan, "XDR: External Data Representation Standard",
            RFC 1832, August 1995.

8.  Author's Address

     Simon Leinen  <simon@limmat.switch.ch>
     SWITCH
     Limmatquai 138
     P.O. Box
     8021 Zurich
     Switzerland
     phone: +41 1 268 1530


9.  Full Copyright Statement

   Copyright (C) The Internet Society (2002). All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the  purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be


Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 19]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002


   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.








































Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 20]

Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002



--WL2A9/a8g0--


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 09:03:06 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA09694
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 09:03:05 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186ANa-0004PV-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 07:56:30 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186ANY-0004Oh-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 07:56:28 -0600
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-44.cisco.com [144.254.7.44])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9SDtm702127;
	Mon, 28 Oct 2002 14:55:48 +0100 (CET)
Message-ID: <3DBD41E4.8070805@cisco.com>
Date: Mon, 28 Oct 2002 14:55:48 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: carter@qosient.com
CC: "'Juergen Quittek'" <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Juergen's conclusions
References: <5C8959A16A71B449AE793CF52FBBED6607A47C@ptah.newyork.qosient.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi Carter,

>Hey Juergen,
>  
>
>>Juergen's Conclusion
>>
>>    
>>
>[snip]
>  
>
>>Considering all this I would recommend to go for NetFlow v9. 
>>If this is not accepted because NetFlow is considered as too 
>>simple or lacking functionality, I would recommend using IDPR.
>>
>>    
>>
>
>While I like the IPDR data representation strategy and formats,
>I see IPDR as a data model, providing a format for communicating
>flow activity reports that a probe can generate.  But I don't
>see how IPDR is a transport protocol.
>
>My opinion is that IPFIX MUST be able to transport IPDR data,
>it MUST also be able to transport native NetFlow v[1-9] data
>as well.  That to me indicates that the appropriate data model
>is either a superset of all the candidates, 
>
I thought this was the goal.

>so that IPFIX can
>handle all the data types, or the transport protocol supports
>an opaque data object, so that vendors can transport their
>native records as blobs.  NetFlow doesn't support either
>strategy.  
>
If you speak about NetFlow in particular, this would not be a big deal 
to some data types in the data model. As many as you want to, I would say.

Regards, Benoit

>IPDR may be able to be the superset, but its doesn't
>support an opaque blob.
>
>While vendors will assure us that their methods can be extended,
>I won't feel comfortable making a choice until the vendors 
>demonstrate how their methods can handle the requirements.
>
>
>Carter
>
>Carter Bullard
>QoSient, LLC
>300 E. 56th Street, Suite 18K
>New York, New York  10022
>
>carter@qosient.com
>Phone +1 212 588-9133
>Fax   +1 212 588-9134
>http://qosient.com
> 
>
>
>  
>
>>    Juergen
>>
>>--
>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
>>in message body
>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say 
>>"unsubscribe ipfix" in message body
>>Archive     http://ipfix.doit.wisc.edu/archive/
>>
>>    
>>
>
>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 09:52:44 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA11927
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 09:52:43 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186B98-0005dm-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 08:45:38 -0600
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186B95-0005d4-00; Mon, 28 Oct 2002 08:45:35 -0600
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 28 Oct 2002 06:45:02 -0800
Message-ID: <3DBD4CF4.A8DF6E6B@riverstonenet.com>
Date: Mon, 28 Oct 2002 09:43:00 -0500
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: ipfix-eval@net.doit.wisc.edu, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] Re: [ipfix-eval] IPFix Summary
References: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 28 Oct 2002 14:45:02.0818 (UTC) FILETIME=[99107C20:01C27E90]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Reinaldo Penno wrote:
> 
> I burned a good chunk of my weekend trying to summarize our
> discussions. If you think I didn't capture what was said adequately,
> please speak up. This email does not substitute Juergen's on open
> issues, but is actually trying to close some of those open issues.
> (Should I copy the main ipfix list?)
> 
> I revised most of the emails starting from Jeff Meyer's - "Discussion
> of Candidate Protocols" on - 9/30.
> 
> a)Regarding metering requirements and protocol candidates.
> 
> There is consensus that the metering requirements should be N/A when
> choosing the IPfix Export Protocol.
> 
> A good summary was provided by Peter.
> 
> * The protocol should cover only the issues of delivering data from
> the exporter to the collector. It must be expressive
> 
> enough to contain all the data defined in the data model.
> 
> * The data model should cover the identification of the metrics and
> attributes, their meanings, and how they are grouped
> 
> together.
> 
> * The architecture should cover issues such as where data are
> observed, what data are required and what are optional, when
> 
> reliability is needed, how the data can be manipulated (e.g.,
> calculating bandwidth), etc., etc.
> 
> b) Regarding reliability
> 
>    - Congestion awareness.
> 
> It is covered on the requirements draft
> 
>    - Message ordering (critical when the data spans several packets,
> e.g. variable length fields)
> 
> It seems there is consensus that message ordering is important.
> 
>    - Transport reliability -
> 
> There is some confusion around this problem since transport
> reliability is *not* explicit mentioned in the reqs draft, but
> 
> since congestion awareness is, some people take it for granted.
> 
>    - require application-level ACKs in the protocol (SHOULD be after
>      data are persisted)
> 
> There is consensus that application layer ACKs is important
> 

	I'm concerned that we are going towards a one size fits
	all in terms of reliability. However, with added reliability 
	comes added overhead.  So what about those applications that
	do not need such reliability and would rather take the added
	capacity?

	


>    - require enable de-duplication of received records through a
> unique key
> 
> There is consensus that de-duplication is important.
> 
>    - Exporter should keep track of number of flow records + some
> important totals
>      and and periodically communicate this information to the
>      collector.
> 
> There is consensus that this or some other solution to capture the
> amount of lost *flow records for each key/field* (not packets) is
> important
> 
> c) Regarding High-Availability
> 
> we should have the ability to send to multiple collectors and for the
> exporter to be able to switch from one collector to another.
> 

	I'm not sure what you mean here. Send each record to multiple 
	collectors or failover to another server when the current
	collector goes down?


> d) Regarding Timestamps
> 
> New text for section 5.4 (Disclaimer before somebody goes for my neck:
> this affects the
> architecture/requirements, not the protocol evaluation.)
> 
>    The metering process MUST be able to generate wire-line timestamps
>    (rather then flow cache timestamps) for the first and the last
>    observed packet of a flow. The timestamp resolution MUST be at
> least
>    the one of the sysUpTime [RFC1213], which is one centisecond.

	Making things like this a MUST does not help. Vendors
	wont or maybe can't change their hardware to comply. 

	I would advocate having 2 different timestamps. One with 
	a meaning of wire-line timestamps and the other to mean
	cache timestamp.

	Paul
> 
> e) Regarding the Views on the Problem
> 
> Some people advocate that exporting IP flows has nothing unique to it,
> it's well known problem
> only with a different data model. I hope I captured this right.
> Anyway, here it goes a quotation.
> 
> "However, the statement that IP flow is somehow unique
> in its data requirements and as such a more generalized
> "data mover" is somehow problematic, is just plain wrong."
> 
> f) Regarding the Field Experience of IPDR
> 
> Some people wanted more information on this, so I'm pasting an email
> from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information
> please direct your
> questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> 
> "
> -----Original Message-----
> From: Aron Heintz [mailto:aheintz@ipdr.org]
> Sent: Thursday, October 10, 2002 3:47 PM
> To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> 
>  It seems to me that NDM-U wins the "free, open, and widely deployed"
> crown
> hands down.  NDM-U 3.1 is completely free and publicly available (see
> below).  By the end of this year, more than 70% of the mediation and
> billing
> packages (by market share) will have proven NDM-U 3.1 *real-world*
> interoperability.
> 
>  What could be more important than this?  It appears that some of you
> are
> debating minor technical points when you might approach the question
> "Who is
> going to receive the data we are sending?  How do they want to see
> it?"
> Technologies do not win by virtue of their theoretical perfection.
> The OSI
> model is close to theoretical perfection.  TCP/IP is not.
> "

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 10:13:10 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA13148
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 10:13:10 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186BT5-0006Gn-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 09:06:15 -0600
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186B95-0005d4-00; Mon, 28 Oct 2002 08:45:35 -0600
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 28 Oct 2002 06:45:02 -0800
Message-ID: <3DBD4CF4.A8DF6E6B@riverstonenet.com>
Date: Mon, 28 Oct 2002 09:43:00 -0500
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Reinaldo Penno <rpenno@nortelnetworks.com>
CC: ipfix-eval@net.doit.wisc.edu, ipfix-req@net.doit.wisc.edu
Subject: Re: [ipfix-eval] IPFix Summary
References: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 28 Oct 2002 14:45:02.0818 (UTC) FILETIME=[99107C20:01C27E90]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

> Reinaldo Penno wrote:
> 
> I burned a good chunk of my weekend trying to summarize our
> discussions. If you think I didn't capture what was said adequately,
> please speak up. This email does not substitute Juergen's on open
> issues, but is actually trying to close some of those open issues.
> (Should I copy the main ipfix list?)
> 
> I revised most of the emails starting from Jeff Meyer's - "Discussion
> of Candidate Protocols" on - 9/30.
> 
> a)Regarding metering requirements and protocol candidates.
> 
> There is consensus that the metering requirements should be N/A when
> choosing the IPfix Export Protocol.
> 
> A good summary was provided by Peter.
> 
> * The protocol should cover only the issues of delivering data from
> the exporter to the collector. It must be expressive
> 
> enough to contain all the data defined in the data model.
> 
> * The data model should cover the identification of the metrics and
> attributes, their meanings, and how they are grouped
> 
> together.
> 
> * The architecture should cover issues such as where data are
> observed, what data are required and what are optional, when
> 
> reliability is needed, how the data can be manipulated (e.g.,
> calculating bandwidth), etc., etc.
> 
> b) Regarding reliability
> 
>    - Congestion awareness.
> 
> It is covered on the requirements draft
> 
>    - Message ordering (critical when the data spans several packets,
> e.g. variable length fields)
> 
> It seems there is consensus that message ordering is important.
> 
>    - Transport reliability -
> 
> There is some confusion around this problem since transport
> reliability is *not* explicit mentioned in the reqs draft, but
> 
> since congestion awareness is, some people take it for granted.
> 
>    - require application-level ACKs in the protocol (SHOULD be after
>      data are persisted)
> 
> There is consensus that application layer ACKs is important
> 

	I'm concerned that we are going towards a one size fits
	all in terms of reliability. However, with added reliability 
	comes added overhead.  So what about those applications that
	do not need such reliability and would rather take the added
	capacity?

	


>    - require enable de-duplication of received records through a
> unique key
> 
> There is consensus that de-duplication is important.
> 
>    - Exporter should keep track of number of flow records + some
> important totals
>      and and periodically communicate this information to the
>      collector.
> 
> There is consensus that this or some other solution to capture the
> amount of lost *flow records for each key/field* (not packets) is
> important
> 
> c) Regarding High-Availability
> 
> we should have the ability to send to multiple collectors and for the
> exporter to be able to switch from one collector to another.
> 

	I'm not sure what you mean here. Send each record to multiple 
	collectors or failover to another server when the current
	collector goes down?


> d) Regarding Timestamps
> 
> New text for section 5.4 (Disclaimer before somebody goes for my neck:
> this affects the
> architecture/requirements, not the protocol evaluation.)
> 
>    The metering process MUST be able to generate wire-line timestamps
>    (rather then flow cache timestamps) for the first and the last
>    observed packet of a flow. The timestamp resolution MUST be at
> least
>    the one of the sysUpTime [RFC1213], which is one centisecond.

	Making things like this a MUST does not help. Vendors
	wont or maybe can't change their hardware to comply. 

	I would advocate having 2 different timestamps. One with 
	a meaning of wire-line timestamps and the other to mean
	cache timestamp.

	Paul
> 
> e) Regarding the Views on the Problem
> 
> Some people advocate that exporting IP flows has nothing unique to it,
> it's well known problem
> only with a different data model. I hope I captured this right.
> Anyway, here it goes a quotation.
> 
> "However, the statement that IP flow is somehow unique
> in its data requirements and as such a more generalized
> "data mover" is somehow problematic, is just plain wrong."
> 
> f) Regarding the Field Experience of IPDR
> 
> Some people wanted more information on this, so I'm pasting an email
> from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information
> please direct your
> questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> 
> "
> -----Original Message-----
> From: Aron Heintz [mailto:aheintz@ipdr.org]
> Sent: Thursday, October 10, 2002 3:47 PM
> To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> 
>  It seems to me that NDM-U wins the "free, open, and widely deployed"
> crown
> hands down.  NDM-U 3.1 is completely free and publicly available (see
> below).  By the end of this year, more than 70% of the mediation and
> billing
> packages (by market share) will have proven NDM-U 3.1 *real-world*
> interoperability.
> 
>  What could be more important than this?  It appears that some of you
> are
> debating minor technical points when you might approach the question
> "Who is
> going to receive the data we are sending?  How do they want to see
> it?"
> Technologies do not win by virtue of their theoretical perfection.
> The OSI
> model is close to theoretical perfection.  TCP/IP is not.
> "

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 10:45:59 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15083
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 10:45:59 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186BzL-000771-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 09:39:35 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186BzJ-00076L-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 09:39:33 -0600
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-44.cisco.com [144.254.7.44])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9SFcS716544;
	Mon, 28 Oct 2002 16:38:29 +0100 (CET)
Message-ID: <3DBD59F4.5010603@cisco.com>
Date: Mon, 28 Oct 2002 16:38:28 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Randy Bush <randy@psg.com>
CC: Simon Leinen <simon@limmat.switch.ch>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's evaluation draft contribution
References: <DLEIIIOHMNPJPNMKGEFDEEBCCPAA.givoly@xacct.com>	<aavg3r2c6m.fsf@limmat.switch.ch> <E1853T5-000HKt-00@roam.psg.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Dear all,

>>My position is that we should be careful in how far we should depart
>>from current (unreliable) practice in order to make the protocol
>>useful for applications that seem to have higher, although probably
>>not infinitely high, demands on reliability.
>>    
>>
>
>indeed.  folk might find it useful look at this wg's charter.  this was
>meant to be a rather focused effort.
>
>randy
>
I could know agree with Simon and Randy.
Even if I understand the CRANE people to defend at all costs the 
reliability at all levels because their specific applications are mainly 
focused on billing, IP flows could be  used for a lot of applications 
where a few flow records lost will not be a big deal. Ex: capacity 
planning, user/application profiling, traffic engineering, etc...

Regards, Benoit.

>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 10:46:19 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15119
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 10:46:18 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186Byl-00076E-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 09:38:59 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186Byj-00075f-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 09:38:57 -0600
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-44.cisco.com [144.254.7.44])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9SFcG716287;
	Mon, 28 Oct 2002 16:38:16 +0100 (CET)
Message-ID: <3DBD59E8.8040306@cisco.com>
Date: Mon, 28 Oct 2002 16:38:16 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Tal Givoly <givoly@xacct.com>
CC: ram.gopal@nokia.com, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Gopal's evaluation draft contribution
References: <DLEIIIOHMNPJPNMKGEFDOEJACPAA.givoly@xacct.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Tal and all,

>Ram,
>
>Below are my comments to the evaluation you provided
>(http://ipfix.doit.wisc.edu/archive/att-1277/01-draft-gopal-ipfix-eval-00.tx
>t). Rather than quote entire sections or portions of them, I merely refer to
>section number:
>
>2.4. NetFlow
>
>NetFlow, as proposed, is UDP. Merely extending it to use any other protocol
>(e.g. TCP) doesn't add any reliability to it. Making it reliable would
>require making it bi-directional, thus adding the added features and some of
>the complexity available in CRANE/Diameter/LFAP. Application-level
>acknowledgement is minimally required to indicate the collection process has
>actually received what has been sent reliably.
>
>One could argue regarding what the word "reliably" means above. This could
>be interpreted by some as "best effort" (send ack once data is received
>in-memory), but based on the requirement draft, I believe "reliably" implies
>that it must be possible to ensure the level of reliability described  here:
>persisted or voted with redundant collecting processes - ensuring durability
>in face of up to N failures, where N is defined by operator, usually N=1.
>
>Making it work over TCP would, at least, ensure in-order arrival, and the
>fact that template defintions arrive prior to the flow records themselves,
>however this is not assured without this extension.
>
I've been looking for the "reliability" keywords in the requirement 
draft. 2 sections appear:

5.1.  Reliability

   The metering process MUST either be reliable or missing reliability
   MUST be known and indicated. The metering process is reliable if each
   packet passing the observation point is metered according to the
   configuration of the metering process. If, e.g. due to some overload,
   not all passing packets can be included into the metering process,
   then the metering process MUST be able to detect this failure and to
   report about it.

6.3.2.  Reliability

   Absence of reliability of the data transfer, for example caused by
   loss or reordering of packets containing flow information, MUST be
   indicated.

   Please note that if an unreliable transport protocol is used,
   reliability can be provided by higher layers. In such a case only
   lack of overall reliability MUST be indicated. For example reordering
   could be dealt with by adding a sequence number to each packet.

It seems that in the recent days discussions, we are discussing of 
reliable transport (that I just took this as an example above), 
bidirectional communications, application level ACK, load balancing, 
failover, etc... And some of them are even becoming MUST in some people 
emails.
I would simply like to stress to look back at the requirement draft, 
which is derived from the WG charter. And to use this as a basis for 
discussion.
And if there is something wrong with the requirement draft (but I think 
it's getting pretty complete after 6 iterations), let's change first the 
requirement draft.

Regards, Benoit.

>The dynamic nature of the templates seems to actually make them
>indistinguishable from the collector's perspective (all the template defines
>is what are the fields within - the identifier itself is totally dynamic and
>non-negotiable). I've asked the NetFlow protocol advocate, in a separate
>submission, to clarify how multiple templates are maintained concurrently -
>i.e. how does the collector distinguish between them to identify their
>semantics (not only record content) as they are temporary in nature. In the
>response, it becomes clear that identification of different templates is
>totally implicit by their attribute contents. Although this does allow for
>distinction among some templates, it is an expensive way to create such a
>distinction.
>
>CRANE also allows for modification of Templates. It is, in fact, designed
>for continuous operation under changed templates (see Simon's evaluation
>that determines this as well).
>
>3.1.2. Sampling (5.2)
>
>As I explained earlier in my response to both Simon's and Juergen's
>evaluation (in http://ipfix.doit.wisc.edu/archive/1316.html):
>
>CRANE clearly allows distinguishing between sampled data and non-sampled
>data. As CRANE, similarly to IPDR and Diameter, doesn't impose any
>restrictions on the Metering Process, the latter can easily submit sampled
>data in a dedicated Template. Even if you consider that there is no
>intrinsic support specifically for Sampling Behavior within the protocol
>itself, it is
>definitely Extendable to that degree, would you not agree?
>
>I fully agree with Jeff's following statement :
>
><snip (from http://ipfix.doit.wisc.edu/archive/1330.html) >
>    CRANE, Diameter and IPDR are all examples of protocols whose focus is
>solely on the exporting process, putting no restrictions on the behavior of
>the "Metering Process".
><snip>
>
>As explained by Cisco recently, NetFlow distinguishes between Sampled data
>and unsampled data by the existence of attributes within flow record itself.
>It too doesn't define exactly how sampling is described besides that implied
>distinction.
>
>3.1.3. Overload Behavior (5.3)
>
>CRANE defines the interaction between the exporting process (E) and the
>collecting process (C). This interaction provides specific flow control and
>interfaces that allow the metering process (M) to begin performing sampling,
>for instance to react to overload. The exporting process is made aware of
>overload in the collecting process and redirects flows to alternative
>collecting processes. The metering process, once faced with overload
>conditions, can easily use templates dedicated to reporting at times of
>overload, to export flow information.
>
>Should the aforementioned behavior be reconsidered in your evaluation
>concluding that CRANE fails the overload behavior?
>
>I further believe that NetFlow v9, in fact, cannot be considered fully
>compliant with overload behavior - as it doesn't react to flow control, it
>cannot be aware of overload in the collecting process that may require
>introducing of overload behavior. Let me expand on this: Since NetFlow v9 is
>not bi-directional one cannot tell from (E) if data is lost. One would have
>to check with both (C) and (E) to figure this out. This is very painful
>resulting in excessive deployment costs.
>
>It is fully implementation dependent how memory footprint is handled.
>Current CRANE implementations and deployments allow the host metering
>process full control of the footprint of the application completely. In
>fact, the implementation allows the network element to replace all resource
>allocation functions to fit the environment. Therefore, priority of the
>process, its resource utilization, etc. are all subject to implementation.
>
>3.1.7.Multicast Flows  (5.7)
>
>Shouldn't this requirement be considered a requirement on the metering
>process rather than the exporter process? As there is no restrictions
>imposed by CRANE on the data export by the metering process (by virtue of
>support for multiple concurrent templates), CRANE is clearly extendable to
>support this requirement.
>
>3.1.14.Reliability  (6.3.2)
>
>As far as I understand, NetFlow doesn't indicate lack of reliability in the
>protocol itself (for all cases where reliability is incomplete). It leaves
>this primarily to the collecting process to resolve. Existence of sequence
>numbers within the protocol implies the collector must compare these upon
>receipt. When multiple collecting processes are involved (and each may see a
>different subset of the UDP packets), it is a very complex function of
>multiple receivers to figure out the lack of reliability.
>
>Should that be considered totally compliant?
>
>While it has been mentioned by several evaluators that adding reliability to
>NetFlow is an "easy" thing, I believe this has yet to be satisfactorily
>demonstrated do the degree that the final proposal properties (including
>reliability and the complexity it may introduce), be evaluated.
>
>3.1.23.Openness (8.1)
>
>I agree with other evaluations that did find CRANE totally compliant with
>this requirement. Furthermore, it provides full version and capability
>negitiation to allow for backward and forward compatibility (a la Fax/Modem
>negotiations on capabilities). I believe this is a very-nice-to-have
>attribute in any protocol, especially one implemented in context of flow
>information export that may have many different devices to interface with
>(each of potentially different versions). Although this has not been raised
>as an explicit requirement, it may be interpreted to be part of the
>extensibility requirement.
>
>Can you help me understand the question you have regarding CRANE's
>compliance so that we can eliminate any doubt regarding this aspect?
>
>Tal
>
>-----Original Message-----
>From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
>Of ram.gopal@nokia.com
>Sent: Wednesday, October 16, 2002 3:15 PM
>To: ipfix-eval@net.doit.wisc.edu
>Subject: [ipfix-eval] Gopal's evaluation draft contribution
>
>
>Greetings,
>
>Please find the individual evaluation of IPFIX protocol candidates. I used
>the templates prepared
>by J. Quittek and thank for his work it saves lot of time.
>
>Feel free to comment on this material.
>
>
>Thanks and Regards
>Ram Gopal. L
>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 10:46:41 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15149
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 10:46:40 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186C0D-000797-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 09:40:29 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186C0C-00077p-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 09:40:28 -0600
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-44.cisco.com [144.254.7.44])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9SFdg718056;
	Mon, 28 Oct 2002 16:39:43 +0100 (CET)
Message-ID: <3DBD5A3E.6040409@cisco.com>
Date: Mon, 28 Oct 2002 16:39:42 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <24609576.1035302891@[192.168.102.164]> <3DB56D5E.4ECF923D@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Paul,

>Juergen Quittek wrote:
>  
>
>
>[snip]
>
>  
>
>>Juergen's Conclusion
>>
>>My view is a bit bit biased, because it is the view of one having to
>>implement the protocol on devices. Therefore, I give more weight than
>>others might do to the cost of the implementation, the consumption of
>>processing power and the memory consumption.
>>
>>    
>>
>
>	Netflow V9 will need to me modified to allow split reporting.
>	Many devices do not have the ability to store attributes per flow
>	until expiration.
>
>	This is a key diffentiator for LFAP as it allows both split reporting
>	and one shot reporting.
>
Do I understand correctly that with split reporting, you report a FUN 
and (at least) one FAR messages.
So basically, in order to gain some memory on the devices for long lived 
flows, you export 2 smaller messages (whose sum can only be bigger for 
short flows) to the collector for all flows, included the short ones?
We've seen on our devices that the action of exporting packets will eat 
some extra non-negligible CPU. And I think this is a concern!

Now regarding the long-lived flows.
I know that the P2P problem is growing but I would refer to this paper 
http://www.research.att.com/~duffield/pubs/DLT02-flows.pdf
You will see in there that the highest flows in terms of average packet 
number are napster and real-audio with respectively 455 and 467 packets.
What is the chance that they will produce long-lived flows? knowing that 
this timer is 30 minutes in the netflow metering process (btw, this is 
configurable)
Not much I should say!

Regards, Benoit.

>
>  
>
>>Therefore, I estimate simple approaches. And NetFlow is the most simple
>>one. Also I learned that simplicity increases reliability (or safety
>>of design and implementation).
>>
>>I am not sure whether or not I could build a compatible implementation of
>>CRANE or LFAP that just ignores all configuration messages received from
>>a collector.
>>    
>>
>
>	Can you clarify what configuration messages you are refering to?
>
>  
>
>>If we go for a more complex prototcol, there is the choice between
>>problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
>>more general Diameter on the other side. Diameter would be in favor
>>if it was used widely already and anyway be implemented on most boxes.
>>Since this is not the case I would go for problem-psecific protocols.
>>
>>Concerning the produced flows, I clearly prefer the efficient NetFlow,
>>IPDR, and CRANE to LFAP and Diameter.
>>    
>>
>
>	I disagree. LFAP's multi-record format allows the
>	type information to be given once for many flows. Furthermore,
>	if bandwidth is truly an issue the incremental savings of
>	sending type info once per session versus once per message
>	will not solve it. A higher level of aggregation will be
>	the solution.
>
>  
>
>>The item level comparison did not show a clear winner.
>>
>>Considering all this I would recommend to go for NetFlow v9. If this
>>is not accepted because NetFlow is considered as too simple or lacking
>>functionality, I would recommend using IDPR.
>>
>>    Juergen
>>
>>--
>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>"unsubscribe ipfix" in message body
>>Archive     http://ipfix.doit.wisc.edu/archive/
>>    
>>
>
>--
>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>"unsubscribe ipfix" in message body
>Archive     http://ipfix.doit.wisc.edu/archive/
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 11:00:38 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA15773
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 11:00:37 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186C6x-0007M5-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 09:47:27 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186C6u-0007Km-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 09:47:24 -0600
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-44.cisco.com [144.254.7.44])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9SFkp726420;
	Mon, 28 Oct 2002 16:46:51 +0100 (CET)
Message-ID: <3DBD5BEB.5000806@cisco.com>
Date: Mon, 28 Oct 2002 16:46:51 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Simon Leinen <simon@limmat.switch.ch>
CC: ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] draft-leinen-ipfix-eval-contrib-00.txt
References: <15805.13639.378299.410135@limmat.switch.ch>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
X-MIME-Autoconverted: from 8bit to quoted-printable by strange-brew.cisco.com id g9SFkp726420
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id LAA15773

Simon,

>I decided to submit an updated version of my "Individual Evaluation"
>I-D for reference, because it contains some rationale that is missing
>from the first version of the evaluation team I-D.  Since I hadn't
>submitted the first version to the I-D repository, I had to change the
>title rather than the serial number.  Full text is attached.
>
>Changes from the first version (which had been circulated on the
>ipfix-eval mailing list) include:
>
>    Changed name from draft-leinen-ipfix-eval-00.txt to
>    draft-leinen-ipfix-eval-contrib-00.txt.
>
>    Added text about benefit/cost of split reporting à la LFAP.
>
>    Added text about benefits of server-selected byte ordering à la
>    CRANE.
>
>    Added text about LFAP's multi-record encoding.
>
>    Added text about NetFlow v9's periodical reporting requirement for
>    option and template data, and how this could be relaxed for
>    reporting asynchronous events, in particular when a reliable
>    transport is used.
>
>    (Opinionated Conclusions): Removed entire section.
>
Why have you removed your conclusions?
After the extensive comparison you've been conducting, I was thinking 
this was the most valuable section!

Regards, Benoit.

>
>    (Acknowledgements): New section.
>
>    (References): Completed LFAP-MIB reference.
>  
>
>------------------------------------------------------------------------
>
>
>Internet Draft                                              Simon Leinen
>Document: draft-leinen-ipfix-eval-contrib-00.txt                  SWITCH
>Expires: April 2003
>
>                                                            October 2002
>
>
>           Individual Evaluation Of IPFIX Protocol Candidates
>
>                <draft-leinen-ipfix-eval-contrib-00.txt>
>
>Status of this Memo
>
>   This document is an Internet-Draft and is in full conformance with
>   all provisions of Section 10 of [RFC 2026]. Internet-Drafts are
>   working documents of the Internet Engineering Task Force (IETF), its
>   areas, and its working groups. Note that other groups may also
>   distribute working documents as Internet-Drafts.
>
>   Internet-Drafts are draft documents valid for a maximum of six months
>   and may be updated, replaced, or obsoleted by other documents at any
>   time. It is inappropriate to use Internet-Drafts as reference
>   material or to cite them other than as "work in progress."
>
>   The list of current Internet-Drafts can be accessed at
>   http://www.ietf.org/ietf/1id-abstracts.txt
>
>   The list of Internet-Draft Shadow Directories can be accessed at
>   http://www.ietf.org/shadow.html
>
>   Distribution of this document is unlimited.
>
>Copyright Notice
>
>   Copyright (C) The Internet Society (2002). All Rights Reserved.
>
>
>Abstract
>
>   This document contains one individual evaluation team member's
>   contribution to the selection process for an IP Flow Information
>   Export (IPFIX) protocol.  The five candidate protocols are outlined
>   and grouped in broad categories, and evaluated against specific
>   requirements.
>
>
>
>
>
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 1]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>Table of Contents
>
>   1 Introduction .................................................    3
>   2 Protocol Summaries ...........................................    3
>   2.1 CRANE ......................................................    3
>   2.1.1 CRANE Protocol Operation .................................    4
>   2.1.2 CRANE Data Encoding ......................................    4
>   2.2 Diameter ...................................................    4
>   2.2.1 Diameter Protocol Operation ..............................    5
>   2.2.2 Diameter Data Encoding ...................................    5
>   2.3 LFAP .......................................................    5
>   2.3.1 LFAP Protocol Operation ..................................    5
>   2.3.2 LFAP Data Encoding .......................................    6
>   2.4 NetFlow v9 .................................................    6
>   2.4.1 NetFlow Protocol Operation ...............................    6
>   2.4.2 NetFlow Data Encoding ....................................    6
>   2.5 Streaming IPDR .............................................    6
>   2.5.1 Streaming IPDR Protocol Operation ........................    7
>   2.5.2 Streaming IPDR Data Encoding .............................    7
>   3 Broad Classification of Candidate Protocols ..................    7
>   3.1 Design Goals ...............................................    7
>   3.1.1 High-Performance Flow Metering (NetFlow, LFAP) ...........    7
>   3.1.2 Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE) .....    8
>   3.1.3 General-Purpose AAA (Diameter) ...........................    8
>   3.2 Data Representation ........................................    8
>   3.2.1 Externally Described Encoding (CRANE, IPDR, NetFlow) .....    8
>   3.2.2 Partly Self-describing Encoding (Diameter, LFAP) .........    9
>   3.3 Protocol Flow ..............................................    9
>   3.3.1 Mainly Unidirectional Protocols (IPDR, NetFlow) ..........    9
>   3.3.2 Bidirectional Protocols (CRANE, LFAP) ....................    9
>   3.3.3 Unidirectional after Negotiation (Diameter) ..............   10
>   4 Item-Level Compliance Evaluation .............................   10
>   4.1 Meter Reliability (5.1) ....................................   10
>   4.2 Sampling (5.2) .............................................   11
>   4.3 Overload Behaviour (5.3) ...................................   11
>   4.4 Information Model (6.1) ....................................   12
>   4.5 Data Model (6.2) ...........................................   12
>   4.5.1 Data Model Extensibility .................................   12
>   4.5.2 Flexible Flow Record Definition ..........................   13
>   4.6 Data Transfer (6.3) ........................................   13
>   4.6.1 Congestion Awareness (6.3.1) .............................   13
>   4.6.2 Reliability (6.3.2) ......................................   13
>   4.6.3 Security (6.3.2) .........................................   14
>   4.6.3.1 IPSEC and TLS ..........................................   14
>   4.6.3.2 Application-level Security .............................   14
>   4.6.4 Push and Pull Mode Reporting (6.4) .......................   15
>   4.6.5 Regular Reporting Interval (6.5) .........................   15
>   4.6.6 Notification on Specific Events (6.6) ....................   15
>   4.6.7 Anonymization (6.7) ......................................   16
>   4.6.8 Several Collecting Processes (8.3) .......................   16
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 2]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   5 Opinionated Conclusions ......................................   16
>   6 Security Considerations ......................................   18
>   7 References ...................................................   18
>   8 Author's Address .............................................   19
>   9 Full Copyright Statement .....................................   20
>
>
>1.  Introduction
>
>   The IP Flow Information Export (IPFIX) Working Group has been
>   chartered to select a protocol for the export of flow information
>   from traffic-observing devices (such as routers or dedicated probes).
>   To this end, an evaluation team was formed to evaluate submitted
>   protocols.  Each protocol is represented by an advocate, who
>   submitted a specific evaluation draft for the respective protocol
>   against the requirements document [IPFIX-REQ].  The specification of
>   each protocol was itself available as one or several Internet-Drafts,
>   sometimes referring normatively to documents from outside the IETF.
>
>   This document contains the author's personal evaluation of the
>   submitted protocols with respect to the requirements document, and on
>   a more general level, to the working group charter.  It is intended
>   to serve as input for the deliberations of the evaluation team.
>
>   The following IPFIX candidate protocol submissions were evaluated:
>
>      -  CRANE [CRANE], [CRANE-EVAL]
>
>      -  Diameter [DIAMETER], [DIAMETER-EVAL]
>
>      -  LFAP [LFAP], [LFAP-EVAL]
>
>      -  NetFlow v9 [NETFLOWV9], [NETFLOWV9-EVAL]
>
>      -  Streaming IPDR [IPDR], [IPDR-EVAL]
>
>   This document uses terminology defined in [IPFIX-REQ] intermixed with
>   that from submissions to explain the mapping between the two.
>
>2.  Protocol Summaries
>
>   In the following, each candidate protocol is described briefly,
>   highlighting its specific distinguishing features.
>
>2.1.  CRANE
>
>   XACCT's Common Reliable Accounting for Network Element Protocol
>   Version 1.0 [CRANE] [CRANE-EVAL] is described as a protocol for the
>   transmission of accounting information from "Network Elements" to
>   "mediation" and "business support systems".
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 3]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>2.1.1.  CRANE Protocol Operation
>
>   The exporting side is the CRANE client, the collecting side the CRANE
>   server.  Note that it is the server that is responsible for
>   initiating the connection to the client.  A client can have multiple
>   simultaneous connections to different servers for robustness.  Each
>   server has an associated priority.  A client only exports to the
>   server with the highest priority that is perceived operational.
>
>   Clients and servers exchange messages over a reliable protocol such
>   as TCP [TCP] or (preferably) SCTP [SCTP].  The protocol uses
>   application-layer acknowledgements as an indication of successful
>   processing by the server.  Strong authentication or data
>   confidentiality aren't support by the protocol, but can be supported
>   by lower-layer mechanisms such as IPSEC [IPSEC] or TLS [TLS].
>
>   The protocol is bidirectional over the entire duration of a session.
>   There are 20 different message types.  The protocol supports template
>   negotiation, not only at startup but also later on in a session, as
>   well as general status inquiries.  There is a separate version
>   negotiation protocol defined over UDP.
>
>2.1.2.  CRANE Data Encoding
>
>   Data encoding is based on templates.  Templates contain "keys"
>   representing items in data records.  Clients (exporters) publish
>   templates to servers (collectors).  Servers can then select the
>   subset of fields in a template that they are interested in.  The
>   client will suppress keys that haven't been selected by the server.
>
>   Data records contain references to template and configuration
>   instances.  They also carry sequence numbers (DSNs for Data Sequence
>   Numbers).  These sequence numbers can be used to de-duplicate data
>   records that have been delivered multiple times during failover/fail-
>   back in redundant configurations.  A "duplicate" bit is set in these
>   situations as a hint for the de-duplication process.
>
>   The encoding of (flow information) data records themselves is very
>   compact.  The client (exporter) can choose to send data in big-endian
>   (network byte order) or little-endian format.  There are eighteen
>   fixed-size key types, as well as five variable-length string and
>   binary data (BLOB) types.
>
>2.2.  Diameter
>
>   Diameter [DIAMETER] [DIAMETER-EVAL] is an evolution of the Remote
>   Authentication Dial In User Service (RADIUS) protocol [RADIUS].
>   RADIUS is widely used to outsource authentication and authorization
>   in dialup access environments.  Diameter is a generalized and
>   extensible protocol intended to support Authentication, Authorization
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 4]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   and Accounting (AAA) requirements of different applications.  Dialup
>   and Mobile IPv4 are examples of such applications defined in the
>   IETF.
>
>2.2.1.  Diameter Protocol Operation
>
>   Diameter is a peer-to-peer protocol.  The base protocol defines
>   fourteen command codes, organized as seven request/response command
>   pairs.  Presumably, only a subset of these would be used in a pure
>   IPFIX application.  Diameter includes capability negotiation and
>   error notifications.  Diameter operates over TCP or (preferred) SCTP.
>   There is a framework for end-to-end security, the mechanisms for
>   which are defined in a separate document.  IPSEC or TLS can be used
>   to provide authentication or encryption at the underlying layers.
>
>2.2.2.  Diameter Data Encoding
>
>   Diameter conveys data in the form of attribute/value pairs (AVPs).
>   An AVP consists of eight bytes of header plus the space to store the
>   data, which depends on the data format.  There are numerous
>   predefined AVP data formats, including signed and unsigned integer
>   types, each in 32 and 64 bit variants, IPv4 and IPv6 addresses, as
>   well as others.  The advocacy draft [DIAMETER-EVAL] suggests that the
>   predefined data formats IPFilterRule and/or QoSFilterRule could be
>   extended to represent IP Flow Information.  Such rules are
>   represented as readable UTF-8 strings.  Alternatively, new AVPs could
>   be defined to represent flow information.
>
>2.3.  LFAP
>
>   LFAP [LFAP] [LFAP-DATA] [LFAP-EVAL] started out as the "Lightweight
>   Flow Admission Protocol" and was used to outsource shortcut creation
>   decisions on flow-based routers, as well as to provide per-flow
>   statistics.  Later versions removed the admission function and
>   changed the name to "Lightweight Flow Accounting Protocol"
>
>2.3.1.  LFAP Protocol Operation
>
>   The exporter in LFAP is called the Connection Control Entity (CCE),
>   and the collector is the Flow Accounting Server (FAS).  These
>   entities communicate with each other over a TCP connection.  LFAP
>   knows thirteen message types, including operations for connection
>   management, version negotiation, flow information messages and
>   administrative requests.  Authentication and encryption can be
>   provided by IPSEC or TLS at lower layers.  Additionally, the LFAP
>   protocol itself supports four levels of security using HMAC-MD5
>   authentication and DES-CBC encryption.
>
>   A distinguishing feature is that LFAP has two different message types
>   for flow information: A Flow Accounting Request (FAR) message is sent
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 5]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   when a new flow is identified at the CCE (meter/exporter).
>   Accounting information is sent later in one or multiple Flow Update
>   Notification (FUN) messages.  A collector must match each FUN to a
>   Flow ID previously sent in a FAR.
>
>   The LFAP document also defines a set of useful statistics about the
>   accounting process.  A separate MIB document [LFAP-MIB] is provided
>   for management of LFAP entities using SNMP.
>
>2.3.2.  LFAP Data Encoding
>
>   LFAP encodes data in a Type/Length/Value format with four bytes of
>   overhead per data item (two bytes for the type and two bytes for the
>   length field).
>
>2.4.  NetFlow v9
>
>   NetFlow v9 [NETFLOWV9] [NETFLOWV9-EVAL] is a generalized version of
>   Cisco's NetFlow protocol.  Previous versions of NetFlow, in
>   particular version 5, have been widely implemented and used for the
>   exporting and collecting of IP flow information.
>
>2.4.1.  NetFlow Protocol Operation
>
>   NetFlow uses a very simple protocol, with the exporter sending
>   template, options, and data "FlowSets" to the collector.  FlowSets
>   are sequences of data records of similar format.  NetFlow is the only
>   one of the candidate protocols that has always worked over UDP [UDP].
>   Because of the simple unidirectional nature of the protocol, it
>   should be relatively straightforward to add mappings to other
>   transport protocols such as SCTP or TCP.  The current NetFlow v9
>   draft fails to specify such a mapping, but the advocacy draft
>   suggests an SCTP transport to make NetFlow congestion-friendly.
>
>2.4.2.  NetFlow Data Encoding
>
>   NetFlow v9 uses a template facility to describe exported data.  The
>   data itself is represented in a compact way using network byte order.
>
>2.5.  Streaming IPDR
>
>   Streaming IPDR [IPDR] [IPDR-EVAL] is an application of the Network
>   Data Management-Usage (NDM-U) For IP Services specification version
>   3.1 [NDM-U-3.1].  It has been developed by the Internet Protocol
>   Detail Record Organization (IPDR, Inc. or ipdr.org).  The terminology
>   used is similar to CRANE's, talking about Service Elements (SEs),
>   mediation systems and Business Support Systems (BSS).
>
>
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 6]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>2.5.1.  Streaming IPDR Protocol Operation
>
>   Streaming IPDR operates over TCP.  There is a "Trivial TCP Delivery"
>   mode as well as an "Acknowledged TCP Delivery" or "Reliable
>   Streaming" mode.  The latter uses application-layer acknowledgements
>   for increased reliability.
>
>   The protocol is basically unidirectional.  The exporter opens a
>   connection towards the collector, then sends a header followed by a
>   set of record descriptors.  Then it can send "Usage Event" records
>   corresponding to these descriptors until the connection is
>   terminated.  New record descriptors can be sent at any time.
>   Messages carry sequence numbers that are used for de-duplication
>   during failover.  They are also referenced by application-level
>   acknowledgements when Reliable Streaming is used.
>
>2.5.2.  Streaming IPDR Data Encoding
>
>   IPDR uses an information modeling technique based on the XML-Schema
>   language [XML].  Data can be represented in XML or in a streamlined
>   encoding based on the External Data Representation [XDR].  XDR forms
>   the basis of Sun's Remote Procedure Call and Network File System
>   protocols, and has proven to be both space- and processing-efficient.
>
>3.  Broad Classification of Candidate Protocols
>
>   In order to evaluate the candidate protocols against the higher-level
>   requirements laid out in the IPFIX Working Group charter, it is
>   useful to group them into broader categories.
>
>3.1.  Design Goals
>
>   One way to look at the candidate protocols is to study the goals that
>   have directed their respective design.  Note that the intention is
>   not to exclude protocols that have been designed with a different
>   class of applications in mind, but simply to better understand the
>   different tradeoffs that distinguish the protocols.
>
>3.1.1.  High-Performance Flow Metering (NetFlow, LFAP)
>
>   Of the candidate protocols, Cisco's NetFlow is the purest example of
>   a highly specialized protocol that has been designed with the sole
>   objective of conveying accounting data from flow-aware routers at
>   high rates.  Starting from a fixed set of accounting fields, it has
>   been extended a few times over the years to support additional fields
>   and various types of aggregation in the metering/exporting process.
>
>   Riverstone's LFAP is similarily focused, except that it originated in
>   a protocol to outsource the decision whether to create shortcuts in
>   flow-based routers.  This is still manifest in an increased emphasis
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 7]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   on reliable operation, and in the split reporting of flow information
>   using Flow Accounting Request (FAR) and Flow Update Notification
>   (FUN) messages.
>
>   It has been pointed out that split reporting as done by LFAP can
>   reduce memory requirements at the exporter.  This concerns a subset
>   of attributes that are neither "key" attributes which define flows,
>   nor attributes such as packet or byte counters that must be updated
>   for each packet anyway.  On the other hand, when there are many
>   short-lived flows, the number of flow export messages will be
>   significantly higher than with "unitary" flow export models, and the
>   collector will have to keep state about active flows until they are
>   terminated.
>
>3.1.2.  Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE)
>
>   Streaming IPDR and CRANE describe themselves as protocols to
>   facilitate the reliable transfer of accounting information between
>   Network Elements (or more generally "Service Elements" in the case of
>   IPDR) and Mediation Systems or Business Support Systems (BSS).  They
>   reflect a view of the accounting problem and of network system
>   architectures that originates in traditional "vertically integrated"
>   telecommunications.
>
>   Both protocols also emphasize extensibility with the goal of
>   applicability to a wide range of accounting tasks.
>
>   IPDR is based on NDM-U, which uses the XML-Schema language for
>   machine-readable specification of accounting data structures, while
>   using the efficient XDR encoding for the actual data transfer.
>
>   CRANE uses templates to describe exported data.  These templates are
>   negotiated between collector and exporter and can change during a
>   session.
>
>3.1.3.  General-Purpose AAA (Diameter)
>
>   Diameter is another example of a broader-purpose protocol, in that it
>   covers aspects of authentication and authorization as well as
>   accounting.  This explains its strong emphasis on security and
>   reliability.  The design also takes into account various types of
>   intermediate agents.
>
>3.2.  Data Representation
>
>   IPFIX is intended to be deployed, among others, in high-speed routers
>   and to be used for exporting detailed flow data at high flow rates.
>   Therefore it is useful to look at the tradeoffs between the
>   efficiency of data representation and the extensibility of data
>   models.  The two main efficiency goals should be (1) to minimize the
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 8]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   export data rate and (2) to minimize data encoding overhead in the
>   exporter.  The overhead of decoding flow data at the collector is
>   deemed less critical, and is partly covered by efficiency target (2),
>   since an encoding that is easy on the encoder is often also easy on
>   the decoder.
>
>3.2.1.  Externally Described Encoding (CRANE, IPDR, NetFlow)
>
>   The protcols in this group use an external mechanism to fully
>   describe the format in which flow data is encoded.  The mechanisms
>   are "templates" in the case of CRANE and NetFlow, and a subset of the
>   XML-Schema language, or alternatively XDR IDL, for IPDR.
>
>   A fully external data format description allows for very compact
>   encoding, with data components such as 32-bit integers taking up only
>   four octets.  The XDR representation used in IPDR additionally
>   ensures that larger fields are always aligned on 32-bit boundaries,
>   which can reduce processing requirements at both the exporter and the
>   collector, at a slight cost of space (thus bandwidth) due to padding.
>
>   Most protocols specify "network byte order" or "big-endian" format in
>   the export data format.  CRANE is the only protocol where the
>   exporter may choose the byte ordering.  The principal benefit is that
>   this lowers the processing demand on exporters based on little-endian
>   architectures.
>
>3.2.2.  Partly Self-describing Encoding (Diameter, LFAP)
>
>   Diameter and LFAP represent flow data using Type/Length/Value
>   encodings.  While this makes it possible to partly decode flow data
>   without full context information - possibly useful for debugging - it
>   does increase the encoding size and thus the bandwidth requirements
>   both on the wire and in the exporter and collector.
>
>   LFAP has a "multi-record" encoding which claims to provide similar
>   wire efficiency as the externally described encodings while still
>   supporting diagnostic tools.
>
>3.3.  Protocol Flow
>
>   Another criterion for classification is the flow of protocol messages
>   between exporter and collector.
>
>3.3.1.  Mainly Unidirectional Protocols (IPDR, NetFlow)
>
>   In IPDR and NetFlow, the data flow is essentially from exporter to
>   collector, with the collector only sending acknowledgements.  The
>   protocols send data descriptions (templates) on session
>   establishment, and then start sending flow export data based on these
>   templates.  "Meta-information" about the operational status of the
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt         [Page 9]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   metering and exporting processes (for example about the sampling
>   parameters in force at a given moment) is conveyed using a special
>   type of "Option" template in NetFlow v9.  IPDR currently doesn't have
>   definitions for such "meta-data" types, but they could easily be
>   defined outside the protocol proper.
>
>3.3.2.  Bidirectional Protocols (CRANE, LFAP)
>
>   CRANE allows for negotiation of the templates used for data export at
>   the start of a session, and also allows negotiated template updates
>   later on.  CRANE sessions include an exporter and potentially several
>   collectors, so these negotiations can involve more than two parties.
>
>   LFAP has an initial phase of version negotiation, followed by a phase
>   of "data negotiation".  After these startup phases, the exporter
>   sends FAR and FUN messages to the collector.  However, either party
>   may also send Administrative Request (AR) messages to the other, and
>   will normally receive Administrative Request Answers (ARA) in
>   response.  Administrative Requests can be used for status inquiries,
>   including information about a specific active flow, or for
>   negotiation of the "Information Elements" that the collector wants
>   the exporter to export.
>
>3.3.3.  Unidirectional after Negotiation (Diameter)
>
>   Diameter has a general capabilities negotiation mechanism.  The use
>   of Diameter for IPFIX hasn't been described in sufficient detail to
>   determine how capabilities negotiation would be used.  After
>   negotiation, the protocol would operate in essentially unidirectional
>   mode, with Accounting-Request (ACR) messages flowing from the
>   exporter to the collector, and Accounting-Answer (ACA) messages
>   flowing back.
>
>4.  Item-Level Compliance Evaluation
>
>   The template for protocol advocates noted that not all requirements
>   in [IPFIX-REQ] apply directly to the flow export protocol.  In
>   particular, sections 4 (Distinguishing Flows) and 5 (Metering
>   Process) mainly specify requirements on the metering mechanism that
>   "feeds" the exporter.  However, in some cases they require
>   information about the metering process to be reported to collectors,
>   so the flow export protocol must support conveying this information.
>
>4.1.  Meter Reliability (5.1)
>
>   CRANE, Diameter, IPDR consider requirement 5.1 (reliability of the
>   metering process or indication of "missing reliability" out of scope
>   for the IPFIX protocol, which presumably means that they assume the
>   metering process to be reliable.
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 10]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   The NetFlow v9 advocacy draft takes a similar stance when it claims
>   "Total Compliance. The metering process is reliable."  (although this
>   has been documented not to be true for all current Cisco
>   implementations of NetFlow v5).
>
>   LFAP is the only protocol that explicitly addresses the possibility
>   that data might be lost in the metering process, and provides useful
>   statistics the collectors to estimate not just the amount of flow
>   data that was lost, but also the amount of data not unaccounted for.
>
>   Note that in the general case, it can be considered unrealistic to
>   assume total reliability of a flow-based metering process in all
>   situations, unless sampling or coarse flow definitions are used.
>   With the fine-grained flow classification mechanisms mandated by
>   IPFIX, it is easy to imagine traffic where each - possibly very small
>   - packet would create a new flow.  This kind of traffic is in fact
>   encountered in practice during aggressive port scans, and will
>   eventually lead to table overflows or exceeding of memory bandwidth
>   at the meter.
>
>   While some of these situations can be handled by dropping data later
>   on in the exporter, data transfer, or collector, or by transitioning
>   the meter to sampling mode (or increasing the sampling interval), it
>   will sometimes be considered the lesser evil to simply report on the
>   data that couldn't be accounted for.  Currently LFAP is the only
>   protocol that supports this.
>
>4.2.  Sampling (5.2)
>
>   CRANE and IPDR don't mention the possibility of sampling.  This is
>   natural because they are targeted towards telco-grade accounting,
>   where sampling would be considered inadmissible.  Since support for
>   sampling is a "MAY" requirement, its lack could be tolerated, but
>   severely restricts the applicability of these protocols in places of
>   high aggregation, where absolute precision is not necessary.  This
>   includes applications such as traffic profiling, traffic engineering,
>   and large-scale attack/intrusion detection, but also usage-based
>   accounting applications where charging based on sampling is agreed
>   upon.
>
>   The Diameter advocate acknowledges the existence of sampling and
>   suggests to define new (grouped) AVPs to carry information about the
>   sampling parameters in use.
>
>   LFAP does not currently support sampling, although its advocate
>   contends that adding support for this would be relatively
>   straightforward, without going into too much detail.
>
>   NetFlow v9 does support sampling (and many implementations and
>   deployments of sampled NetFlow exist for previous NetFlow versions).
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 11]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   Option Data is supposed to convey sampling configuration, although no
>   sampling-related field types have yet been defined in the draft.
>
>4.3.  Overload Behaviour (5.3)
>
>   The requirements document suggests that meters adapt to overload
>   situations, for example by changing to sampling (or reducing the
>   sampling rate if sampling is already in effect), by changing the flow
>   definition to coarser flow categories (thinning), by stopping to
>   meter, or by reducing packet processing.
>
>   In these situations, the requirements document mandates that flow
>   information from before the modification of metering behavior can be
>   cleanly distinguished from flow information from after the
>   modification.  For the suggested mitigation methods of sampling or
>   thinning, this essentially means that all existing flows have to be
>   expired, and an entirely new set of flows must be started.  This is
>   undesirable because it causes a peak of resource usage in an already
>   overloaded situation.
>
>   LFAP and NetFlow claim to handle this requirement, both by supporting
>   only the simple overload mitigation methods that don't require the
>   entire set of existing flows to be expired.  The NetFlow advocate
>   claims that the reporting requirement could be easily met by expiring
>   existing flows with the old template, while sending a new template
>   for new flows.  While it is true that NetFlow handles this
>   requirement in a very graceful manner, the general performance issue
>   remains.
>
>   CRANE, Diameter, and IPDR consider the requirement out of scope for
>   the protocol, although Diameter summarily acknowledges the possible
>   need for new AVP definitions related to mitigation methods.
>
>4.4.  Information Model (6.1)
>
>   All candidate protocols have information models that can represent
>   all required and all optional attributes.  The Diameter contribution
>   lacks some detail on how exactly the IPFIX-specific attributes should
>   be mapped.
>
>4.5.  Data Model (6.2)
>
>4.5.1.  Data Model Extensibility
>
>   Each candidate protocol defines a data model that allows for some
>   degree of extensibility.
>
>   CRANE uses Keys to specify fields in templates.  A key "specification
>   MUST consist of the description and the data type of the accounting
>   item." Apparently extensibility is intended, but I'm not sure whether
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 12]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   adding a new Key really only involves writing a textual description
>   and deciding upon a base type.  Every Key also has a 32-bit Key ID,
>   but from the current specification they don't seem to carry global
>   semantics.
>
>   Diameter's Attribute/Value Pairs (AVP) have a 32-bit identifier (AVP
>   Code) administered by IANA.  In addition, there is an optional 32-bit
>   Vendor-ID that can contain an SMI Enterprise Number for vendor-
>   defined attributes.  If the Vendor-ID (and a corresponding flag in
>   the attribute) is set, the AVP Code becomes local to that vendor.
>
>   IPDR uses a subset of the XML-Schema language for extensibility, thus
>   allowing for vendor- and application-specific extensions of the data
>   model.
>
>   In LFAP, flow attributes are defined as Information Elements.  There
>   is a 16-bit IE type code (which is carried in the export protocol for
>   every IE).  One type code is reserved for vendor-specific extensions.
>   Arbitrary sub-types of the vendor-specific IE can be defined using
>   ASN.1 Object IDs (OIDs).
>
>   In NetFlow v9 as reviewed, data items are identified by a sixteen-bit
>   field type.  26 field types are defined in the draft.  The draft
>   suggests to look check a Web page at Cisco Systems' site for the
>   current list of field types.  It would be preferable if the
>   administration of the field type space would be delegated to IANA.
>
>4.5.2.  Flexible Flow Record Definition
>
>   All protocols allow for flexible flow record definitions.  CRANE and
>   LFAP make the selection/negotiation of the attributes to be included
>   in flow records a part of the protocol, the other protocols leave
>   this to outside configuration mechanisms.
>
>4.6.  Data Transfer (6.3)
>
>4.6.1.  Congestion Awareness (6.3.1)
>
>   All protocols except for NetFlow v9 operate over a single TCP or SCTP
>   transport connection, and inherit the congestion-friendliness of
>   these protcols.
>
>   NetFlow v9 has been defined to operate over UDP, but claims to be
>   transport-independent and could also be mapped on SCTP or TCP as a
>   transport protocol.  The details of such mappings haven't been
>   specified, although doing so should have been straightforward given
>   the unidirectional nature of this protocol.
>
>
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 13]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>4.6.2.  Reliability (6.3.2)
>
>   As of the time of this writing, the reliability requirement hasn't
>   yet been satisfactorily defined in the requirements draft.  Here are
>   a few observations regarding the candidate protocols' approaches to
>   reliability.  Note that the requirement for multiple collectors (8.3)
>   also touches on the issue of reliability.
>
>   CRANE, Diameter, and IPDR, as protocols that strive to be carrier-
>   grade accounting protocols, understandably exhibit a strong emphasis
>   on near-total reliability of the flow export process.  All three
>   protocols use application-level acknowledgements (in case of IPDR,
>   optionally) to include the entire collection process in the feedback
>   loop.  Indications of "lack of reliability" (lost flow data) are
>   somewhat unnatural to these protocols, because they take every effort
>   to never lose anything.  These protocols seem suitable in situations
>   where one would rather drop a packet than forward it unaccounted for.
>
>   LFAP has application-level acknowledgements, and it also reports
>   detailed statistics about lost flows and the amount of data that
>   couldn't be accounted for.  It represents a middle ground in that it
>   acknowledges that accounting reliability will sometimes be sacrificed
>   for the benefit of other tasks, such as switching packets, and
>   provides the tools to gracefully deal with such situations.
>
>   NetFlow v9 is the only protocol for which the use of a "reliable"
>   transport protocol is optional, and the only protocol that doesn't
>   support application-level acknowledgements.  In all fairness, it
>   should be noted that it is a very simple and efficient protocol, so
>   in an actual deployment it might exhibit a higher level of
>   reliability than some of the other protocols would given the same
>   amount of resources.
>
>4.6.3.  Security (6.3.2)
>
>4.6.3.1.  IPSEC and TLS
>
>   All protocols can use, and their descriptions in fact recommend to
>   use, lower-layer security mechanisms such as IPSEC and, with the
>   exception of NetFlow v9 over UDP, TLS.  It can be argued that in all
>   envisioned usage scenarios for IPFIX, both IPSEC and TLS provide
>   sufficient protection against the main identified threats of flow
>   data disclosure and forgery.
>
>   The Diameter draft is the only protocol definition that goes into
>   sufficent level of detail with respect to the application of these
>   mechanisms, in particular the negotiation of certificates and ciphers
>   in TLS, and the use of IKE [IKE] for IPSEC.  Diameter also mandates
>   that either IPSEC or TLS be used.
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 14]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>4.6.3.2.  Application-level Security
>
>   Diameter suggests an additional end-to-end security framework for
>   dealing with untrusted third-party agents.  I am not entirely
>   convinced that this additional evel of security justifies the
>   additional complexity in the context of IPFIX.
>
>   LFAP [LFAP] is the only other protocol that includes some higher-
>   level security mechanisms, providing four levels of security
>   including no security, authenticated peers, flow data authentication,
>   and flow data encryption using HMAC-MD5-96 and DES-CBC.
>
>   As far as I can judge - not being a security expert -, LFAP's built-
>   in support for authentication and encryption doesn't provide
>   significant additional security compared with the use of TLS or
>   IPSEC.  It is potentially useful in situations where TLS or IPSEC are
>   unavailable for some reason, although in the context of IPFIX
>   scenarios it should be possible to assume support for these lower-
>   layer mechanisms if the participating devices are capable of the
>   necessary cryptographic methods at all.
>
>4.6.4.  Push and Pull Mode Reporting (6.4)
>
>   All protocols support the mandatory "push" mode.
>
>   The optional "pull" mode could be supported relatively easily in
>   Diameter, and is foreseen in NDM-U, the basis of the Streaming IPDR
>   proposal.  CRANE, LFAP and NetFlow don't have a "pull" mode.  For
>   CRANE and LFAP, adding one would not violate the spirit of the
>   protocols because they are already two-way, and in fact LFAP already
>   foresees inquiries about specific active flows using Administrative
>   Request (AR) messages with a RETURN_INDICATED_FLOWS Command Code IE.
>
>4.6.5.  Regular Reporting Interval (6.5)
>
>   It is not clear whether this ("SHOULD") requirement applies to the
>   protocol or merely to the configurability of reporting/timeout
>   parameters in the export process.
>
>4.6.6.  Notification on Specific Events (6.6)
>
>   The specific events listed in the requirements documents as examples
>   for "specific events" are "the arrival of the first packet of a new
>   flow and the termination of a flow after flow timeout".  For the
>   former, only LFAP explicitly generates messages upon creation of a
>   new flow.  NetFlow always exported flow information on expiry of
>   flows, either due to timeout or due to an indication of flow
>   termination.  The other protocols are unspecific about when flow
>   information is exported.
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 15]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   On "specific events" in general, all protocols have some mechanism
>   that could be used for notification of asynchronous events.  An
>   example for such an event would be that the sampling rate of the
>   meter was changed in response to a change in the load on the
>   exporting process.
>
>   CRANE has Status Request/Status Response messages, but as defined,
>   Status Requests can only be issued by the server (collector), so they
>   cannot be used by the server to signal asynchronous events.  As in
>   IPDR, this could be circumvented by defining templates for meta-
>   information.
>
>   Diameter could use special Accounting-Request messages for event
>   notification.
>
>   IPDR would presumably define pseudo-"Usage Events" using an XML
>   Schema so that events can be reported along with usage data.
>
>   LFAP has Administrative Requests (AR) that can be initiated from
>   either side.  The currently defined ARs are all information inquiries
>   or reconfiguration requests, but new ARs could be defined to provide
>   unsolicited information about specific asynchronous events.  The LFAP
>   MIB also defines some traps/notifications.  SNMP notifications are
>   useful to signal events to a network management system, but they are
>   less attractive as a mechanism to signal events that should be
>   somehow handled by a collector.
>
>   In NetFlow v9, Option Data FlowSets are defined to convey information
>   about the metering and export processes.  The current draft specifies
>   that Option Data should be exported periodically, although this
>   requirement will be relaxed for asynchronous events.  It should be
>   noted that periodical export of option flowsets (and also of
>   templates) may have been considered necessary because NetFlow can run
>   over an unreliable transport; it seems less natural when TCP or SCTP
>   is used.
>
>4.6.7.  Anonymization (6.7)
>
>   None of the protocols include explicit support for anonymization.
>   All protocols could be extended to convey when and how anonymization
>   is being performed by an exporter, using mechanisms similar to those
>   that would be used to report on sampling.  However it can be argued
>   that anonymization it more "static" in the sense that it will be
>   either configured at the exporter or not, and that the collector can
>   be made aware of this by means outside the IPFIX protocol.
>
>4.6.8.  Several Collecting Processes (8.3)
>
>   CRANE, Diameter, and IPDR all support multiple collectors in a backup
>   configuration.  The failover case is analyzed in some detail, with
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 16]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   support for data buffering and de-duplication in failover situations.
>
>   NetFlow takes a more simple-minded approach in that it allows
>   multiple (currently: two) collectors to be configured in an exporter.
>   Both collectors will generally receive all data and could use
>   sequence numbers and inter-collector communication to de-duplicate
>   them.  This is a simple way to improve availability but may also be
>   considered to be wasteful, both in terms of bandwidth and in terms of
>   other exporter resources.  With the current UDP mapping it is easy
>   enough to send multiple copies of datagrams to different collectors,
>   but when SCTP or TCP is used, sending all data over multiple
>   connections will exacerbate performance issues.
>
>   I don't entirely understand how failover is handled in LFAP, where
>   flow information is separated into FAR and FUN messages.  In
>   particular, when the primary FAS A fails and the CCE starts sending
>   to secondary FAS B, will it send B FUNs that refer to Flow IDs whose
>   FARs had only been sent to A?
>
>5.  Security Considerations
>
>   The security mechanisms of the candidate protocols were discussed in
>   the section about the Security requirement (6.3.2).
>
>6.  Acknowledgements
>
>   A draft of this document had been circulated on the ipfix-eval
>   mailing list, and several participants provided valuable feedback,
>   including Vamsidhar Valluri, Paul Calato, Tal Givoly, Jeff Meyer,
>   Robert Lowe, Benoit Claise, and Carter Bullard.  Many of these issues
>   have been discussed with the other members of the IPFIX evaluation
>   team: Juergen Quittek, Reinaldo Penno, Ram Gopal, and Mark Fullmer.
>   However, this draft doesn't claim to represent team consensus, just
>   the views of its author.
>
>7.  References
>
>[IPFIX-REQ] J. Quittek et al., "Requirements for IP Flow Information
>            Export", draft-ietf-ipfix-reqs-06.txt, work in progress,
>            September 2002.
>
>[CRANE]     K. Zhang, E. Elkin, "XACCT's Common Reliable Accounting for
>            Network Element (CRANE) Protocol Specification Version 1.0",
>            draft-kzhang-crane-protocol-05.txt, work in progress, August
>            2002.
>
>[CRANE-EVAL]
>            K. Zhang, E. Elkin, P. Ludemann, "Evaluation of the CRANE
>            Protocol Against IPFIX Requirements", draft-kzhang-ipfix-
>            eval-CRANE-00.txt, work in progress, September 2002.
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 17]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>[DIAMETER]  P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko,
>            "Diameter Base Protocol", draft-ietf-aaa-diameter-12.txt,
>            work in progress, July 2002.
>
>[DIAMETER-EVAL]
>            S. Zander, "Evaluation of the Diameter Protocol Against
>            IPFIX Requirements", draft-zander-ipfix-eval-
>            diameter-00.txt, work in progress, September 2002.
>
>[LFAP]      P. Calato, M. MacFaden, "Light-weight Flow Accounting
>            Protocol Specification Version 5.0", draft-riverstone-
>            lfap-01.txt, work in progress, June 2002.
>
>[LFAP-DATA] P. Calato, M. MacFaden, "Light-weight Flow Accounting
>            Protocol Data Definition Specification Version 5.0", draft-
>            riverstone-lfap-data-01.txt, work in progress, June 2002.
>
>[LFAP-EVAL] P. Calato, "Evaluation of Protocol LFAP Against IPFIX
>            Requirements", draft-calato-ipfix-lfap-eval-05.txt, work in
>            progress, August 2002.
>
>[LFAP-MIB]  P. Calato, M. MacFaden, "Light-weight Flow Accounting
>            Protocol MIB", draft-calato-lfap-mib-00.txt, work in
>            progress, September 2002.
>
>[NETFLOWV9] B. Claise, "Cisco Systems NetFlow services Export Version
>            9", draft-bclaise-netflow-9-01.txt, work in progress,
>            October 2002.
>
>[NETFLOWV9-EVAL]
>            B. Claise, "Evaluation Of NetFlow Version 9 Against IPFIX
>            Requirements", draft-claise-ipfix-eval-netflow-02.txt, work
>            in progress, October 2002.
>
>[IPDR]      J. Meyer, "Reliable Streaming Internet Protocol Detail
>            Records", draft-meyer-ipdr-streaming-00.txt, work in
>            progress, August 2002.
>
>[IPDR-EVAL] J. Meyer, "Evaluation Of Streaming IPDR Against IPFIX
>            Requirements", draft-meyer-ipfix-IPDR-eval-00.txt, work in
>            progress, September 2002.
>
>[NDM-U-3.1] Internet Protocol Detail Record Organization, "Network Data
>            Management - Usage (NDM-U) For IP-Based Services Version
>            3.1", April 2002.
>
>[IPSEC]     S. Kent, et al. "Security Architecture for the Internet
>            Protocol", RFC 2401, November 1998.
>
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 18]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>[IKE]       D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)",
>            RFC 2409, November 1998.
>
>[TLS]       T. Dierks, et al. "The TLS Protocol, Version 1.0", RFC 2246,
>            January 1999.
>
>[RADIUS]    C. Rigney, A. Rubens, W. Simpson, S. Willens, "Remote
>            Authentication Dial In User Service (RADIUS)", RFC 2865,
>            June 2000.
>
>[TCP]       J. Postel, "Transmission Control Protocol", RFC 793, January
>            1981.
>
>[UDP]       J. Postel, "User Datagram Protocol" RFC 768, August 1980.
>
>[SCTP]      R. Stewart et al., "Stream Control Transmission Protocol",
>            RFC 2960. October 2000.
>
>[XML]       World Wide Web Consortium, "Extensible Markup Language (XML)
>            1.0", W3C XML, February 1998.
>
>[XDR]       R. Srinivasan, "XDR: External Data Representation Standard",
>            RFC 1832, August 1995.
>
>8.  Author's Address
>
>     Simon Leinen  <simon@limmat.switch.ch>
>     SWITCH
>     Limmatquai 138
>     P.O. Box
>     8021 Zurich
>     Switzerland
>     phone: +41 1 268 1530
>
>
>9.  Full Copyright Statement
>
>   Copyright (C) The Internet Society (2002). All Rights Reserved.
>
>   This document and translations of it may be copied and furnished to
>   others, and derivative works that comment on or otherwise explain it
>   or assist in its implementation may be prepared, copied, published
>   and distributed, in whole or in part, without restriction of any
>   kind, provided that the above copyright notice and this paragraph are
>   included on all such copies and derivative works.  However, this
>   document itself may not be modified in any way, such as by removing
>   the copyright notice or references to the Internet Society or other
>   Internet organizations, except as needed for the  purpose of
>   developing Internet standards in which case the procedures for
>   copyrights defined in the Internet Standards process must be
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 19]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>   followed, or as required to translate it into languages other than
>   English.
>
>   The limited permissions granted above are perpetual and will not be
>   revoked by the Internet Society or its successors or assigns.
>
>   This document and the information contained herein is provided on an
>   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
>   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
>   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
>   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
>   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>Simon Leinen     draft-leinen-ipfix-eval-contrib-00.txt        [Page 20]
>
>Internet-Draft    Individual IPFIX Protocol Evaluation      October 2002
>
>
>  
>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 11:15:36 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA16542
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 11:15:36 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186CMp-0007n7-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 10:03:51 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186CMn-0007mL-00
	for ipfix-req@net.doit.wisc.edu; Mon, 28 Oct 2002 10:03:49 -0600
Received: from cisco.com (dhcp-peg3-vl30-144-254-7-44.cisco.com [144.254.7.44])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9SG37714938;
	Mon, 28 Oct 2002 17:03:07 +0100 (CET)
Message-ID: <3DBD5FBB.1020602@cisco.com>
Date: Mon, 28 Oct 2002 17:03:07 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: Michael MacFaden <mrm@riverstonenet.com>, ipfix-req@net.doit.wisc.edu
Subject: Re: On the BLOB issue (Reinaldo-7, was: Re: [ipfix-req] list of issues
 - Reinaldo - 7 (or Carter -1))
References: <20021025025814.GM1687@riverstonenet.com> <18596019.1035567359@[192.168.102.164]>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Just to refer to the charter one more time... IP _Flow Information_ Export
If we don't know what we export because this is not defined (read opaque 
BLOB)... then I think this WG failed to do its job.

Regards, Benoit.

> Let's all have a look at our charter:
>
> 1. It starts with: "There are a number of IP flow information
>   export systems in common use."
>
> 2. Later it says: "This group will select a protocol ...".
>
> 3. There is no mentioning of "This group will merge all
>   protocols ...".
>   Also there is no mentioning of "This group will design a
>   protocol."
>
> Consequently, we should go on with what we have started already:
> selecting ONE of the candidate protocol.
>
> If the BLOB discussion ends up with saying "Just selecting one
> is a bad idea, we won't do it.", then we should stop our work and
> ask for re-chartering.
>
> However, I think, charter discussion was extensive and we made
> good progress based on the current charter. I definitely want
> to continue this.
>
>    Juergen
>
>
> -- Michael MacFaden wrote on 24 October 2002 19:58 -0700:
>
>> On Thu, Oct 24, 2002 at 07:28:21PM -0700, Reinaldo Penno wrote:
>>
>>> That's the problem I foresee. Imagine how many data types we will 
>>> have in
>>> the future. All the combinations possible with all the protocols 
>>> that run
>>> over IP. Maybe what a vendor or its customer wants for a certain 
>>> scenario is
>>> a blob that contains, for instance, the DSCP field + ECN + TCP 
>>> window size.
>>> For other deployment I might need the URL + the Cache header, etc, etc.
>>> Extrapolate that to all possible combinations and you will see the 
>>> profusion
>>> of new fields IANA will have to standardize, the size of the parser, 
>>> etc
>>
>>
>> I do think we all agree the protocol must be extensible as per the
>> requirements, but just not on the the scope yet. Some of us take
>> a narrow view of what the protocol should report (IPv4, IPv6 headers)
>> others prefer a wider view (everything else).
>>
>> These divergent views will have to be considered carefully in evaluating
>> how extensible the protocol should actually be. Section 6.2 of the
>> requirements doc could then be updated to reflect the consensus.
>>
>> I will say it one last time and shut up.
>>
>> BLOBs hinder interoperability, BLOBs are bad.
>>
>> There. Peace Out.
>> Mike MacFaden
>>
>>
>> -- 
>> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in 
>> message body
>> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>> "unsubscribe ipfix" in message body
>> Archive     http://ipfix.doit.wisc.edu/archive/
>
>
>
>
> -- 
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in 
> message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/





--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 11:28:46 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17318
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 11:28:45 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186Cdn-0000WU-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 10:21:23 -0600
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186Cdl-0000TE-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 10:21:21 -0600
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 28 Oct 2002 08:20:48 -0800
Message-ID: <3DBD6366.9B77497D@riverstonenet.com>
Date: Mon, 28 Oct 2002 11:18:46 -0500
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <24609576.1035302891@[192.168.102.164]> <3DB56D5E.4ECF923D@riverstonenet.com> <3DBD5A3E.6040409@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 28 Oct 2002 16:20:48.0798 (UTC) FILETIME=[F9EF73E0:01C27E9D]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Benoit Claise wrote:
> 
> Paul,
> 
> >Juergen Quittek wrote:
> >
> >
> >
> >[snip]
> >
> >
> >
> >>Juergen's Conclusion
> >>
> >>My view is a bit bit biased, because it is the view of one having to
> >>implement the protocol on devices. Therefore, I give more weight than
> >>others might do to the cost of the implementation, the consumption of
> >>processing power and the memory consumption.
> >>
> >>
> >>
> >
> >       Netflow V9 will need to me modified to allow split reporting.
> >       Many devices do not have the ability to store attributes per flow
> >       until expiration.
> >
> >       This is a key diffentiator for LFAP as it allows both split reporting
> >       and one shot reporting.
> >
> Do I understand correctly that with split reporting, you report a FUN
> and (at least) one FAR messages.
> So basically, in order to gain some memory on the devices for long lived
> flows, you export 2 smaller messages (whose sum can only be bigger for
> short flows) to the collector for all flows, included the short ones?
> We've seen on our devices that the action of exporting packets will eat
> some extra non-negligible CPU. And I think this is a concern!

	I am not, repeat NOT, advocating mandatory split reporting of flows!

	In fact, I suggested in my eval that the LFAP spec should be
	modified so that "unitary" flow reporting could happen via
	one FAR message. 
> 
> Now regarding the long-lived flows.
> I know that the P2P problem is growing but I would refer to this paper
> http://www.research.att.com/~duffield/pubs/DLT02-flows.pdf
> You will see in there that the highest flows in terms of average packet
> number are napster and real-audio with respectively 455 and 467 packets.
> What is the chance that they will produce long-lived flows? knowing that
> this timer is 30 minutes in the netflow metering process (btw, this is
> configurable)
> Not much I should say!

	You missed one key point, for each flow you would still need 
	to hold on to the attributes for 30 minutes until the flow timed out
	(or how ever long it took to determine the flow should be
	deleted). 

	Plus keep in mind that devices may be reporting aggregated 
	flows where the flows stay around much longer. While the number
	may be lower than a very granular key, there may still be large
	numbers of them. Furthermore, with aggregation you need to use
	a time-out since TCP SYN,FIN don't help. Shorter time-outs cause
	a lots of flow creation which is probably what you're trying
	to avoid so the norm will likely be longer time-outs.
	
	Thus, with a split reporting option you provide the device
	implementor the ability to split report or one shot report
	(or I suppose some fancy implementation may use a combination).

	Since we would like this protocol to be implemented on lots
	of different devices, memory and CPU consumption are show stopper
	type issues. If a device can't support IPFIX without chewing up
	too many device resources it either wont get implemented or
	wont get turned on.

	Split reporting provides a necessary degree of implementation
	flexibility for both granular and aggregated flows. Yes it makes
	the Collector's job more difficult but its better than not having
	some devices support to begin with.

	Paul

> 
> Regards, Benoit.
> 
> >
> >
> >
> >>Therefore, I estimate simple approaches. And NetFlow is the most simple
> >>one. Also I learned that simplicity increases reliability (or safety
> >>of design and implementation).
> >>
> >>I am not sure whether or not I could build a compatible implementation of
> >>CRANE or LFAP that just ignores all configuration messages received from
> >>a collector.
> >>
> >>
> >
> >       Can you clarify what configuration messages you are refering to?
> >
> >
> >
> >>If we go for a more complex prototcol, there is the choice between
> >>problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> >>more general Diameter on the other side. Diameter would be in favor
> >>if it was used widely already and anyway be implemented on most boxes.
> >>Since this is not the case I would go for problem-psecific protocols.
> >>
> >>Concerning the produced flows, I clearly prefer the efficient NetFlow,
> >>IPDR, and CRANE to LFAP and Diameter.
> >>
> >>
> >
> >       I disagree. LFAP's multi-record format allows the
> >       type information to be given once for many flows. Furthermore,
> >       if bandwidth is truly an issue the incremental savings of
> >       sending type info once per session versus once per message
> >       will not solve it. A higher level of aggregation will be
> >       the solution.
> >
> >
> >
> >>The item level comparison did not show a clear winner.
> >>
> >>Considering all this I would recommend to go for NetFlow v9. If this
> >>is not accepted because NetFlow is considered as too simple or lacking
> >>functionality, I would recommend using IDPR.
> >>
> >>    Juergen
> >>
> >>--
> >>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >>"unsubscribe ipfix" in message body
> >>Archive     http://ipfix.doit.wisc.edu/archive/
> >>
> >>
> >
> >--
> >Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> >Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >"unsubscribe ipfix" in message body
> >Archive     http://ipfix.doit.wisc.edu/archive/
> >
> >

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 11:29:57 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17377
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 11:29:56 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186Cf6-0000bo-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 10:22:44 -0600
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186Cf3-0000Zh-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 10:22:41 -0600
Received: from riverstonenet.com ([134.141.180.98]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Mon, 28 Oct 2002 08:22:10 -0800
Message-ID: <3DBD63B8.D1B45A86@riverstonenet.com>
Date: Mon, 28 Oct 2002 11:20:08 -0500
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Benoit Claise <bclaise@cisco.com>
CC: Simon Leinen <simon@limmat.switch.ch>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] draft-leinen-ipfix-eval-contrib-00.txt
References: <15805.13639.378299.410135@limmat.switch.ch> <3DBD5BEB.5000806@cisco.com>
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-OriginalArrivalTime: 28 Oct 2002 16:22:10.0892 (UTC) FILETIME=[2ADE00C0:01C27E9E]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 8bit

Benoit Claise wrote:
> 
> Simon,
> 
> >I decided to submit an updated version of my "Individual Evaluation"
> >I-D for reference, because it contains some rationale that is missing
> >from the first version of the evaluation team I-D.  Since I hadn't
> >submitted the first version to the I-D repository, I had to change the
> >title rather than the serial number.  Full text is attached.
> >
> >Changes from the first version (which had been circulated on the
> >ipfix-eval mailing list) include:
> >
> >    Changed name from draft-leinen-ipfix-eval-00.txt to
> >    draft-leinen-ipfix-eval-contrib-00.txt.
> >
> >    Added text about benefit/cost of split reporting à la LFAP.
> >
> >    Added text about benefits of server-selected byte ordering à la
> >    CRANE.
> >
> >    Added text about LFAP's multi-record encoding.
> >
> >    Added text about NetFlow v9's periodical reporting requirement for
> >    option and template data, and how this could be relaxed for
> >    reporting asynchronous events, in particular when a reliable
> >    transport is used.
> >
> >    (Opinionated Conclusions): Removed entire section.
> >
> Why have you removed your conclusions?
> After the extensive comparison you've been conducting, I was thinking
> this was the most valuable section!

	I'll second that!

> 
> Regards, Benoit.
> 
> >
> >    (Acknowledgements): New section.
> >
> >    (References): Completed LFAP-MIB reference.
> >
> >

[deleted..]

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 14:43:45 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA26403
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 14:43:44 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186FfQ-0005N6-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 13:35:16 -0600
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186FfO-0005Lr-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 13:35:14 -0600
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9SJUEp19421;
	Mon, 28 Oct 2002 11:30:14 -0800 (PST)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBPYZ>; Mon, 28 Oct 2002 11:30:13 -0800
Message-ID: <7B802811BE77D51189910002A55CFD2C045F1025@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: Benoit Claise <bclaise@cisco.com>, calato@riverstonenet.com
Cc: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Mon, 28 Oct 2002 11:30:13 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27EB8.6FCEAA94"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27EB8.6FCEAA94
Content-Type: text/plain;
	charset="iso-8859-1"

well, this paper is kind of outdated...It has been more than a year after
this paper. A critical year on P2P application I might say.

> -----Original Message-----
> From: Benoit Claise [mailto:bclaise@cisco.com]
> Sent: Monday, October 28, 2002 7:40 AM
> To: calato@riverstonenet.com
> Cc: Juergen Quittek; ipfix-eval@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
> 
> 
> Paul,
> 
> >Juergen Quittek wrote:
> >  
> >
> >
> >[snip]
> >
> >  
> >
> >>Juergen's Conclusion
> >>
> >>My view is a bit bit biased, because it is the view of one having to
> >>implement the protocol on devices. Therefore, I give more 
> weight than
> >>others might do to the cost of the implementation, the 
> consumption of
> >>processing power and the memory consumption.
> >>
> >>    
> >>
> >
> >	Netflow V9 will need to me modified to allow split reporting.
> >	Many devices do not have the ability to store 
> attributes per flow
> >	until expiration.
> >
> >	This is a key diffentiator for LFAP as it allows both 
> split reporting
> >	and one shot reporting.
> >
> Do I understand correctly that with split reporting, you report a FUN 
> and (at least) one FAR messages.
> So basically, in order to gain some memory on the devices for 
> long lived 
> flows, you export 2 smaller messages (whose sum can only be 
> bigger for 
> short flows) to the collector for all flows, included the short ones?
> We've seen on our devices that the action of exporting 
> packets will eat 
> some extra non-negligible CPU. And I think this is a concern!
> 
> Now regarding the long-lived flows.
> I know that the P2P problem is growing but I would refer to 
> this paper 
> http://www.research.att.com/~duffield/pubs/DLT02-flows.pdf
> You will see in there that the highest flows in terms of 
> average packet 
> number are napster and real-audio with respectively 455 and 
> 467 packets.
> What is the chance that they will produce long-lived flows? 
> knowing that 
> this timer is 30 minutes in the netflow metering process 
> (btw, this is 
> configurable)
> Not much I should say!
> 
> Regards, Benoit.
> 
> >
> >  
> >
> >>Therefore, I estimate simple approaches. And NetFlow is the 
> most simple
> >>one. Also I learned that simplicity increases reliability (or safety
> >>of design and implementation).
> >>
> >>I am not sure whether or not I could build a compatible 
> implementation of
> >>CRANE or LFAP that just ignores all configuration messages 
> received from
> >>a collector.
> >>    
> >>
> >
> >	Can you clarify what configuration messages you are refering to?
> >
> >  
> >
> >>If we go for a more complex prototcol, there is the choice between
> >>problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
> >>more general Diameter on the other side. Diameter would be in favor
> >>if it was used widely already and anyway be implemented on 
> most boxes.
> >>Since this is not the case I would go for problem-psecific 
> protocols.
> >>
> >>Concerning the produced flows, I clearly prefer the 
> efficient NetFlow,
> >>IPDR, and CRANE to LFAP and Diameter.
> >>    
> >>
> >
> >	I disagree. LFAP's multi-record format allows the
> >	type information to be given once for many flows. Furthermore,
> >	if bandwidth is truly an issue the incremental savings of
> >	sending type info once per session versus once per message
> >	will not solve it. A higher level of aggregation will be
> >	the solution.
> >
> >  
> >
> >>The item level comparison did not show a clear winner.
> >>
> >>Considering all this I would recommend to go for NetFlow v9. If this
> >>is not accepted because NetFlow is considered as too simple 
> or lacking
> >>functionality, I would recommend using IDPR.
> >>
> >>    Juergen
> >>
> >>--
> >>Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body
> >>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >>"unsubscribe ipfix" in message body
> >>Archive     http://ipfix.doit.wisc.edu/archive/
> >>    
> >>
> >
> >--
> >Help        mailto:majordomo@net.doit.wisc.edu and say 
> "help" in message body
> >Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> >"unsubscribe ipfix" in message body
> >Archive     http://ipfix.doit.wisc.edu/archive/
> >  
> >
> 
> 
> 
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" 
> in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/
> 

------_=_NextPart_001_01C27EB8.6FCEAA94
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] Simon's and Ram's evaluations</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>well, this paper is kind of outdated...It has been =
more than a year after this paper. A critical year on P2P application I =
might say.</FONT></P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Benoit Claise [<A =
HREF=3D"mailto:bclaise@cisco.com">mailto:bclaise@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Monday, October 28, 2002 7:40 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: calato@riverstonenet.com</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: Juergen Quittek; =
ipfix-eval@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] Simon's and Ram's =
evaluations</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Paul,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Juergen Quittek wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;[snip]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Juergen's Conclusion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;My view is a bit bit biased, because it =
is the view of one having to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;implement the protocol on devices. =
Therefore, I give more </FONT>
<BR><FONT SIZE=3D2>&gt; weight than</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;others might do to the cost of the =
implementation, the </FONT>
<BR><FONT SIZE=3D2>&gt; consumption of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;processing power and the memory =
consumption.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Netflow V9 will =
need to me modified to allow split reporting.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Many devices do =
not have the ability to store </FONT>
<BR><FONT SIZE=3D2>&gt; attributes per flow</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; until =
expiration.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; This is a key =
diffentiator for LFAP as it allows both </FONT>
<BR><FONT SIZE=3D2>&gt; split reporting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; and one shot =
reporting.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; Do I understand correctly that with split =
reporting, you report a FUN </FONT>
<BR><FONT SIZE=3D2>&gt; and (at least) one FAR messages.</FONT>
<BR><FONT SIZE=3D2>&gt; So basically, in order to gain some memory on =
the devices for </FONT>
<BR><FONT SIZE=3D2>&gt; long lived </FONT>
<BR><FONT SIZE=3D2>&gt; flows, you export 2 smaller messages (whose sum =
can only be </FONT>
<BR><FONT SIZE=3D2>&gt; bigger for </FONT>
<BR><FONT SIZE=3D2>&gt; short flows) to the collector for all flows, =
included the short ones?</FONT>
<BR><FONT SIZE=3D2>&gt; We've seen on our devices that the action of =
exporting </FONT>
<BR><FONT SIZE=3D2>&gt; packets will eat </FONT>
<BR><FONT SIZE=3D2>&gt; some extra non-negligible CPU. And I think this =
is a concern!</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Now regarding the long-lived flows.</FONT>
<BR><FONT SIZE=3D2>&gt; I know that the P2P problem is growing but I =
would refer to </FONT>
<BR><FONT SIZE=3D2>&gt; this paper </FONT>
<BR><FONT SIZE=3D2>&gt; <A =
HREF=3D"http://www.research.att.com/~duffield/pubs/DLT02-flows.pdf" =
TARGET=3D"_blank">http://www.research.att.com/~duffield/pubs/DLT02-flows=
.pdf</A></FONT>
<BR><FONT SIZE=3D2>&gt; You will see in there that the highest flows in =
terms of </FONT>
<BR><FONT SIZE=3D2>&gt; average packet </FONT>
<BR><FONT SIZE=3D2>&gt; number are napster and real-audio with =
respectively 455 and </FONT>
<BR><FONT SIZE=3D2>&gt; 467 packets.</FONT>
<BR><FONT SIZE=3D2>&gt; What is the chance that they will produce =
long-lived flows? </FONT>
<BR><FONT SIZE=3D2>&gt; knowing that </FONT>
<BR><FONT SIZE=3D2>&gt; this timer is 30 minutes in the netflow =
metering process </FONT>
<BR><FONT SIZE=3D2>&gt; (btw, this is </FONT>
<BR><FONT SIZE=3D2>&gt; configurable)</FONT>
<BR><FONT SIZE=3D2>&gt; Not much I should say!</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Regards, Benoit.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Therefore, I estimate simple =
approaches. And NetFlow is the </FONT>
<BR><FONT SIZE=3D2>&gt; most simple</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;one. Also I learned that simplicity =
increases reliability (or safety</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;of design and implementation).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;I am not sure whether or not I could =
build a compatible </FONT>
<BR><FONT SIZE=3D2>&gt; implementation of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;CRANE or LFAP that just ignores all =
configuration messages </FONT>
<BR><FONT SIZE=3D2>&gt; received from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;a collector.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; Can you clarify =
what configuration messages you are refering to?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;If we go for a more complex prototcol, =
there is the choice between</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;problem-specific protocols on one side =
(IPDR, LFAP, CRANE) and the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;more general Diameter on the other =
side. Diameter would be in favor</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;if it was used widely already and =
anyway be implemented on </FONT>
<BR><FONT SIZE=3D2>&gt; most boxes.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Since this is not the case I would go =
for problem-psecific </FONT>
<BR><FONT SIZE=3D2>&gt; protocols.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Concerning the produced flows, I =
clearly prefer the </FONT>
<BR><FONT SIZE=3D2>&gt; efficient NetFlow,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;IPDR, and CRANE to LFAP and =
Diameter.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; I disagree. LFAP's =
multi-record format allows the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; type information =
to be given once for many flows. Furthermore,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; if bandwidth is =
truly an issue the incremental savings of</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; sending type info =
once per session versus once per message</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; will not solve it. =
A higher level of aggregation will be</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp; the =
solution.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;The item level comparison did not show =
a clear winner.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Considering all this I would recommend =
to go for NetFlow v9. If this</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;is not accepted because NetFlow is =
considered as too simple </FONT>
<BR><FONT SIZE=3D2>&gt; or lacking</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;functionality, I would recommend using =
IDPR.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; Juergen</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;--</FONT>
<BR><FONT SIZE=3D2>&gt; =
&gt;&gt;Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;help&quot; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&quot;unsubscribe ipfix&quot; in =
message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;--</FONT>
<BR><FONT SIZE=3D2>&gt; =
&gt;Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;help&quot; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; --</FONT>
<BR><FONT SIZE=3D2>&gt; Help&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
<A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say &quot;help&quot; </FONT>
<BR><FONT SIZE=3D2>&gt; in message body</FONT>
<BR><FONT SIZE=3D2>&gt; Unsubscribe <A =
HREF=3D"mailto:majordomo@net.doit.wisc.edu">mailto:majordomo@net.doit.wi=
sc.edu</A> and say</FONT>
<BR><FONT SIZE=3D2>&gt; &quot;unsubscribe ipfix&quot; in message =
body</FONT>
<BR><FONT SIZE=3D2>&gt; Archive&nbsp;&nbsp;&nbsp;&nbsp; <A =
HREF=3D"http://ipfix.doit.wisc.edu/archive/" =
TARGET=3D"_blank">http://ipfix.doit.wisc.edu/archive/</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27EB8.6FCEAA94--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Mon Oct 28 16:10:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA00020
	for <ipfix-archive@lists.ietf.org>; Mon, 28 Oct 2002 16:10:28 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186H2W-0000Af-00
	for ipfix-list@mil.doit.wisc.edu; Mon, 28 Oct 2002 15:03:12 -0600
Received: from sccimhc02.insightbb.com ([63.240.76.164])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186H2U-0000AP-00
	for ipfix-eval@net.doit.wisc.edu; Mon, 28 Oct 2002 15:03:11 -0600
Received: from c1926280a ([12.221.97.27]) by sccimhc02.insightbb.com
          (InterMail vM.4.01.03.27 201-229-121-127-20010626) with ESMTP
          id <20021028210237.GPMA1063.sccimhc02.insightbb.com@c1926280a>;
          Mon, 28 Oct 2002 21:02:37 +0000
From: "Ken Sarno" <kensarno@ipdr.org>
To: <ipfix-eval@net.doit.wisc.edu>
Cc: <kensarno@ipdr.org>
Subject: RE: [ipfix-eval] Simon's and Ram's evaluations
Date: Mon, 28 Oct 2002 15:03:20 -0600
Message-ID: <000001c27ec5$72160ce0$1b61dd0c@insightbb.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2627
Importance: Normal
In-Reply-To: <7B802811BE77D51189910002A55CFD2C045F1025@zsc3c032.us.nortel.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

	As a former engineer at NARUS Inc., and current Technical
Director of IPDR Organization, I'd like to comment on the importance of
variable sampling (and the general ability to dynamically modify
accounting output).  There are a variety of load conditions and customer
preferences that cause this need to arise.

	I'd also point out the NDM-U 3.1 is one of the few solutions
that gracefully accomodates this requirement today.  Because NDM-U
documents are self-describing, the producer may alternate between
sampling intervals or even change sampling strategies entirely
midstream.  The result is guaranteed to be fully comprehensible to the
consumer.

	Note that the self-describing nature of NDM-U also ensures that
BLOBs are rarely-used; most accounting record designers expose the
record details for arbitrary consumers to decode.  The danger of BLOBs
comes from other protocols that do not offer a robust extension
mechanism - designers are then forced to use opaque BLOBs.

Ken Sarno 


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 05:44:18 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA27112
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 05:44:18 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186TZM-00044I-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 04:25:56 -0600
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186TZJ-00043I-00; Tue, 29 Oct 2002 04:25:53 -0600
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9TALXI01057;
	Tue, 29 Oct 2002 02:21:35 -0800 (PST)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBTLZ>; Tue, 29 Oct 2002 02:21:32 -0800
Message-ID: <7B802811BE77D51189910002A55CFD2C045F1569@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: calato@riverstonenet.com
Cc: ipfix-eval@net.doit.wisc.edu, ipfix-req@net.doit.wisc.edu
Subject: RE: [ipfix-eval] IPFix Summary
Date: Tue, 29 Oct 2002 02:21:33 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27F34.F47016EE"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27F34.F47016EE
Content-Type: text/plain;
	charset="iso-8859-1"

Hello Paul,

comments inline...

> -----Original Message-----
> From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
> Sent: Monday, October 28, 2002 6:43 AM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: ipfix-eval@net.doit.wisc.edu; ipfix-req@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] IPFix Summary
> 
> 
> > Reinaldo Penno wrote:
> > 
> > I burned a good chunk of my weekend trying to summarize our
> > discussions. If you think I didn't capture what was said adequately,
> > please speak up. This email does not substitute Juergen's on open
> > issues, but is actually trying to close some of those open issues.
> > (Should I copy the main ipfix list?)
> > 
> > I revised most of the emails starting from Jeff Meyer's - 
> "Discussion
> > of Candidate Protocols" on - 9/30.
> > 
> > a)Regarding metering requirements and protocol candidates.
> > 
> > There is consensus that the metering requirements should be N/A when
> > choosing the IPfix Export Protocol.
> > 
> > A good summary was provided by Peter.
> > 
> > * The protocol should cover only the issues of delivering data from
> > the exporter to the collector. It must be expressive
> > 
> > enough to contain all the data defined in the data model.
> > 
> > * The data model should cover the identification of the metrics and
> > attributes, their meanings, and how they are grouped
> > 
> > together.
> > 
> > * The architecture should cover issues such as where data are
> > observed, what data are required and what are optional, when
> > 
> > reliability is needed, how the data can be manipulated (e.g.,
> > calculating bandwidth), etc., etc.
> > 
> > b) Regarding reliability
> > 
> >    - Congestion awareness.
> > 
> > It is covered on the requirements draft
> > 
> >    - Message ordering (critical when the data spans several packets,
> > e.g. variable length fields)
> > 
> > It seems there is consensus that message ordering is important.
> > 
> >    - Transport reliability -
> > 
> > There is some confusion around this problem since transport
> > reliability is *not* explicit mentioned in the reqs draft, but
> > 
> > since congestion awareness is, some people take it for granted.
> > 
> >    - require application-level ACKs in the protocol (SHOULD be after
> >      data are persisted)
> > 
> > There is consensus that application layer ACKs is important
> > 
> 
> 	I'm concerned that we are going towards a one size fits
> 	all in terms of reliability. However, with added reliability 
> 	comes added overhead.  So what about those applications that
> 	do not need such reliability and would rather take the added
> 	capacity?
> 

I noticed some discussions around this topic (billing, which requires
reliability vs traffic profiling, which does not). That's a good point.
Would you take a stab and phrase it for the requirements draft so that the
result is not ambigous and convey the necessary message? 

thanks,

Reinaldo

> 	
> 
> 
> >    - require enable de-duplication of received records through a
> > unique key
> > 
> > There is consensus that de-duplication is important.
> > 
> >    - Exporter should keep track of number of flow records + some
> > important totals
> >      and and periodically communicate this information to the
> >      collector.
> > 
> > There is consensus that this or some other solution to capture the
> > amount of lost *flow records for each key/field* (not packets) is
> > important
> > 
> > c) Regarding High-Availability
> > 
> > we should have the ability to send to multiple collectors 
> and for the
> > exporter to be able to switch from one collector to another.
> > 
> 
> 	I'm not sure what you mean here. Send each record to multiple 
> 	collectors or failover to another server when the current
> 	collector goes down?

failover.

> 
> 
> > d) Regarding Timestamps
> > 
> > New text for section 5.4 (Disclaimer before somebody goes 
> for my neck:
> > this affects the
> > architecture/requirements, not the protocol evaluation.)
> > 
> >    The metering process MUST be able to generate wire-line 
> timestamps
> >    (rather then flow cache timestamps) for the first and the last
> >    observed packet of a flow. The timestamp resolution MUST be at
> > least
> >    the one of the sysUpTime [RFC1213], which is one centisecond.
> 
> 	Making things like this a MUST does not help. Vendors
> 	wont or maybe can't change their hardware to comply. 
> 
> 	I would advocate having 2 different timestamps. One with 
> 	a meaning of wire-line timestamps and the other to mean
> 	cache timestamp.
> 
> 	Paul
> > 
> > e) Regarding the Views on the Problem
> > 
> > Some people advocate that exporting IP flows has nothing 
> unique to it,
> > it's well known problem
> > only with a different data model. I hope I captured this right.
> > Anyway, here it goes a quotation.
> > 
> > "However, the statement that IP flow is somehow unique
> > in its data requirements and as such a more generalized
> > "data mover" is somehow problematic, is just plain wrong."
> > 
> > f) Regarding the Field Experience of IPDR
> > 
> > Some people wanted more information on this, so I'm pasting an email
> > from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information
> > please direct your
> > questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> > 
> > "
> > -----Original Message-----
> > From: Aron Heintz [mailto:aheintz@ipdr.org]
> > Sent: Thursday, October 10, 2002 3:47 PM
> > To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> > Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> > 
> >  It seems to me that NDM-U wins the "free, open, and widely 
> deployed"
> > crown
> > hands down.  NDM-U 3.1 is completely free and publicly 
> available (see
> > below).  By the end of this year, more than 70% of the mediation and
> > billing
> > packages (by market share) will have proven NDM-U 3.1 *real-world*
> > interoperability.
> > 
> >  What could be more important than this?  It appears that 
> some of you
> > are
> > debating minor technical points when you might approach the question
> > "Who is
> > going to receive the data we are sending?  How do they want to see
> > it?"
> > Technologies do not win by virtue of their theoretical perfection.
> > The OSI
> > model is close to theoretical perfection.  TCP/IP is not.
> > "
> 

------_=_NextPart_001_01C27F34.F47016EE
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] IPFix Summary</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hello Paul,</FONT>
</P>

<P><FONT SIZE=3D2>comments inline...</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: calato@riverstonenet.com [<A =
HREF=3D"mailto:calato@riverstonenet.com">mailto:calato@riverstonenet.com=
</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Monday, October 28, 2002 6:43 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: ipfix-eval@net.doit.wisc.edu; =
ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] IPFix Summary</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Reinaldo Penno wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I burned a good chunk of my weekend trying =
to summarize our</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; discussions. If you think I didn't capture =
what was said adequately,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; please speak up. This email does not =
substitute Juergen's on open</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; issues, but is actually trying to close =
some of those open issues.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; (Should I copy the main ipfix =
list?)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I revised most of the emails starting from =
Jeff Meyer's - </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;Discussion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; of Candidate Protocols&quot; on - =
9/30.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; a)Regarding metering requirements and =
protocol candidates.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that the metering =
requirements should be N/A when</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; choosing the IPfix Export Protocol.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; A good summary was provided by =
Peter.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; * The protocol should cover only the =
issues of delivering data from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the exporter to the collector. It must be =
expressive</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; enough to contain all the data defined in =
the data model.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; * The data model should cover the =
identification of the metrics and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; attributes, their meanings, and how they =
are grouped</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; together.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; * The architecture should cover issues =
such as where data are</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; observed, what data are required and what =
are optional, when</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; reliability is needed, how the data can be =
manipulated (e.g.,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; calculating bandwidth), etc., etc.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; b) Regarding reliability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Congestion =
awareness.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It is covered on the requirements =
draft</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Message ordering =
(critical when the data spans several packets,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; e.g. variable length fields)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It seems there is consensus that message =
ordering is important.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Transport reliability =
-</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is some confusion around this =
problem since transport</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; reliability is *not* explicit mentioned in =
the reqs draft, but</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; since congestion awareness is, some people =
take it for granted.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - require =
application-level ACKs in the protocol (SHOULD be after</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; data are =
persisted)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that application layer =
ACKs is important</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I'm concerned =
that we are going towards a one size fits</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all in terms of =
reliability. However, with added reliability </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; comes added =
overhead.&nbsp; So what about those applications that</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; do not need such =
reliability and would rather take the added</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

<P><FONT SIZE=3D2>I noticed some discussions around this topic =
(billing, which requires reliability vs traffic profiling, which does =
not). That's a good point. Would you take a stab and phrase it for the =
requirements draft so that the result is not ambigous and convey the =
necessary message? </FONT></P>

<P><FONT SIZE=3D2>thanks,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - require enable =
de-duplication of received records through a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; unique key</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that de-duplication is =
important.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Exporter should keep =
track of number of flow records + some</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; important totals</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and and =
periodically communicate this information to the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
collector.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that this or some other =
solution to capture the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; amount of lost *flow records for each =
key/field* (not packets) is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; important</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; c) Regarding High-Availability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; we should have the ability to send to =
multiple collectors </FONT>
<BR><FONT SIZE=3D2>&gt; and for the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; exporter to be able to switch from one =
collector to another.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I'm not sure =
what you mean here. Send each record to multiple </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; collectors or =
failover to another server when the current</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; collector goes =
down?</FONT>
</P>

<P><FONT SIZE=3D2>failover.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; d) Regarding Timestamps</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; New text for section 5.4 (Disclaimer =
before somebody goes </FONT>
<BR><FONT SIZE=3D2>&gt; for my neck:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; this affects the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; architecture/requirements, not the =
protocol evaluation.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; The metering process =
MUST be able to generate wire-line </FONT>
<BR><FONT SIZE=3D2>&gt; timestamps</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; (rather then flow cache =
timestamps) for the first and the last</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; observed packet of a =
flow. The timestamp resolution MUST be at</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; least</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; the one of the sysUpTime =
[RFC1213], which is one centisecond.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Making things =
like this a MUST does not help. Vendors</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; wont or maybe =
can't change their hardware to comply. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I would advocate =
having 2 different timestamps. One with </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a meaning of =
wire-line timestamps and the other to mean</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cache =
timestamp.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Paul</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; e) Regarding the Views on the =
Problem</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Some people advocate that exporting IP =
flows has nothing </FONT>
<BR><FONT SIZE=3D2>&gt; unique to it,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; it's well known problem</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; only with a different data model. I hope I =
captured this right.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Anyway, here it goes a quotation.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;However, the statement that IP flow =
is somehow unique</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; in its data requirements and as such a =
more generalized</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;data mover&quot; is somehow =
problematic, is just plain wrong.&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; f) Regarding the Field Experience of =
IPDR</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Some people wanted more information on =
this, so I'm pasting an email</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; from Aron Heintz [aheintz@ipdr.org]. Any =
more in-depth information</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; please direct your</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; questions to Jeff Meyer [jeffm@cup.hp.com] =
or Aron Heitz.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; From: Aron Heintz [<A =
HREF=3D"mailto:aheintz@ipdr.org">mailto:aheintz@ipdr.org</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sent: Thursday, October 10, 2002 3:47 =
PM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; To: ipfix-eval@net.doit.wisc.edu; =
Harrington, David; Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Subject: RE: [ipfix-eval] Discussion of =
Candidate Protocols</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; It seems to me that NDM-U wins the =
&quot;free, open, and widely </FONT>
<BR><FONT SIZE=3D2>&gt; deployed&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; crown</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; hands down.&nbsp; NDM-U 3.1 is completely =
free and publicly </FONT>
<BR><FONT SIZE=3D2>&gt; available (see</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; below).&nbsp; By the end of this year, =
more than 70% of the mediation and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; billing</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; packages (by market share) will have =
proven NDM-U 3.1 *real-world*</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; interoperability.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; What could be more important than =
this?&nbsp; It appears that </FONT>
<BR><FONT SIZE=3D2>&gt; some of you</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; are</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; debating minor technical points when you =
might approach the question</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;Who is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; going to receive the data we are =
sending?&nbsp; How do they want to see</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; it?&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Technologies do not win by virtue of their =
theoretical perfection.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; The OSI</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; model is close to theoretical =
perfection.&nbsp; TCP/IP is not.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27F34.F47016EE--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 06:21:24 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA28500
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 06:21:24 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186UHq-00066i-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 05:11:54 -0600
Received: from h65s138a81n47.user.nortelnetworks.com ([47.81.138.65] helo=zsc3s004.nortelnetworks.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186TZJ-00043I-00; Tue, 29 Oct 2002 04:25:53 -0600
Received: from zsc4c000.us.nortel.com (zsc4c000.us.nortel.com [47.81.138.47])
	by zsc3s004.nortelnetworks.com (Switch-2.2.0/Switch-2.2.0) with ESMTP id g9TALXI01057;
	Tue, 29 Oct 2002 02:21:35 -0800 (PST)
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19)
	id <VDYBBTLZ>; Tue, 29 Oct 2002 02:21:32 -0800
Message-ID: <7B802811BE77D51189910002A55CFD2C045F1569@zsc3c032.us.nortel.com>
From: "Reinaldo Penno" <rpenno@nortelnetworks.com>
To: calato@riverstonenet.com
Cc: ipfix-eval@net.doit.wisc.edu, ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] RE: [ipfix-eval] IPFix Summary
Date: Tue, 29 Oct 2002 02:21:33 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C27F34.F47016EE"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C27F34.F47016EE
Content-Type: text/plain;
	charset="iso-8859-1"

Hello Paul,

comments inline...

> -----Original Message-----
> From: calato@riverstonenet.com [mailto:calato@riverstonenet.com]
> Sent: Monday, October 28, 2002 6:43 AM
> To: Penno, Reinaldo [BL60:0430:EXCH]
> Cc: ipfix-eval@net.doit.wisc.edu; ipfix-req@net.doit.wisc.edu
> Subject: Re: [ipfix-eval] IPFix Summary
> 
> 
> > Reinaldo Penno wrote:
> > 
> > I burned a good chunk of my weekend trying to summarize our
> > discussions. If you think I didn't capture what was said adequately,
> > please speak up. This email does not substitute Juergen's on open
> > issues, but is actually trying to close some of those open issues.
> > (Should I copy the main ipfix list?)
> > 
> > I revised most of the emails starting from Jeff Meyer's - 
> "Discussion
> > of Candidate Protocols" on - 9/30.
> > 
> > a)Regarding metering requirements and protocol candidates.
> > 
> > There is consensus that the metering requirements should be N/A when
> > choosing the IPfix Export Protocol.
> > 
> > A good summary was provided by Peter.
> > 
> > * The protocol should cover only the issues of delivering data from
> > the exporter to the collector. It must be expressive
> > 
> > enough to contain all the data defined in the data model.
> > 
> > * The data model should cover the identification of the metrics and
> > attributes, their meanings, and how they are grouped
> > 
> > together.
> > 
> > * The architecture should cover issues such as where data are
> > observed, what data are required and what are optional, when
> > 
> > reliability is needed, how the data can be manipulated (e.g.,
> > calculating bandwidth), etc., etc.
> > 
> > b) Regarding reliability
> > 
> >    - Congestion awareness.
> > 
> > It is covered on the requirements draft
> > 
> >    - Message ordering (critical when the data spans several packets,
> > e.g. variable length fields)
> > 
> > It seems there is consensus that message ordering is important.
> > 
> >    - Transport reliability -
> > 
> > There is some confusion around this problem since transport
> > reliability is *not* explicit mentioned in the reqs draft, but
> > 
> > since congestion awareness is, some people take it for granted.
> > 
> >    - require application-level ACKs in the protocol (SHOULD be after
> >      data are persisted)
> > 
> > There is consensus that application layer ACKs is important
> > 
> 
> 	I'm concerned that we are going towards a one size fits
> 	all in terms of reliability. However, with added reliability 
> 	comes added overhead.  So what about those applications that
> 	do not need such reliability and would rather take the added
> 	capacity?
> 

I noticed some discussions around this topic (billing, which requires
reliability vs traffic profiling, which does not). That's a good point.
Would you take a stab and phrase it for the requirements draft so that the
result is not ambigous and convey the necessary message? 

thanks,

Reinaldo

> 	
> 
> 
> >    - require enable de-duplication of received records through a
> > unique key
> > 
> > There is consensus that de-duplication is important.
> > 
> >    - Exporter should keep track of number of flow records + some
> > important totals
> >      and and periodically communicate this information to the
> >      collector.
> > 
> > There is consensus that this or some other solution to capture the
> > amount of lost *flow records for each key/field* (not packets) is
> > important
> > 
> > c) Regarding High-Availability
> > 
> > we should have the ability to send to multiple collectors 
> and for the
> > exporter to be able to switch from one collector to another.
> > 
> 
> 	I'm not sure what you mean here. Send each record to multiple 
> 	collectors or failover to another server when the current
> 	collector goes down?

failover.

> 
> 
> > d) Regarding Timestamps
> > 
> > New text for section 5.4 (Disclaimer before somebody goes 
> for my neck:
> > this affects the
> > architecture/requirements, not the protocol evaluation.)
> > 
> >    The metering process MUST be able to generate wire-line 
> timestamps
> >    (rather then flow cache timestamps) for the first and the last
> >    observed packet of a flow. The timestamp resolution MUST be at
> > least
> >    the one of the sysUpTime [RFC1213], which is one centisecond.
> 
> 	Making things like this a MUST does not help. Vendors
> 	wont or maybe can't change their hardware to comply. 
> 
> 	I would advocate having 2 different timestamps. One with 
> 	a meaning of wire-line timestamps and the other to mean
> 	cache timestamp.
> 
> 	Paul
> > 
> > e) Regarding the Views on the Problem
> > 
> > Some people advocate that exporting IP flows has nothing 
> unique to it,
> > it's well known problem
> > only with a different data model. I hope I captured this right.
> > Anyway, here it goes a quotation.
> > 
> > "However, the statement that IP flow is somehow unique
> > in its data requirements and as such a more generalized
> > "data mover" is somehow problematic, is just plain wrong."
> > 
> > f) Regarding the Field Experience of IPDR
> > 
> > Some people wanted more information on this, so I'm pasting an email
> > from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information
> > please direct your
> > questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> > 
> > "
> > -----Original Message-----
> > From: Aron Heintz [mailto:aheintz@ipdr.org]
> > Sent: Thursday, October 10, 2002 3:47 PM
> > To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> > Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> > 
> >  It seems to me that NDM-U wins the "free, open, and widely 
> deployed"
> > crown
> > hands down.  NDM-U 3.1 is completely free and publicly 
> available (see
> > below).  By the end of this year, more than 70% of the mediation and
> > billing
> > packages (by market share) will have proven NDM-U 3.1 *real-world*
> > interoperability.
> > 
> >  What could be more important than this?  It appears that 
> some of you
> > are
> > debating minor technical points when you might approach the question
> > "Who is
> > going to receive the data we are sending?  How do they want to see
> > it?"
> > Technologies do not win by virtue of their theoretical perfection.
> > The OSI
> > model is close to theoretical perfection.  TCP/IP is not.
> > "
> 

------_=_NextPart_001_01C27F34.F47016EE
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2655.35">
<TITLE>RE: [ipfix-eval] IPFix Summary</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hello Paul,</FONT>
</P>

<P><FONT SIZE=3D2>comments inline...</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: calato@riverstonenet.com [<A =
HREF=3D"mailto:calato@riverstonenet.com">mailto:calato@riverstonenet.com=
</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Monday, October 28, 2002 6:43 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Penno, Reinaldo [BL60:0430:EXCH]</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: ipfix-eval@net.doit.wisc.edu; =
ipfix-req@net.doit.wisc.edu</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [ipfix-eval] IPFix Summary</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Reinaldo Penno wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I burned a good chunk of my weekend trying =
to summarize our</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; discussions. If you think I didn't capture =
what was said adequately,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; please speak up. This email does not =
substitute Juergen's on open</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; issues, but is actually trying to close =
some of those open issues.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; (Should I copy the main ipfix =
list?)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; I revised most of the emails starting from =
Jeff Meyer's - </FONT>
<BR><FONT SIZE=3D2>&gt; &quot;Discussion</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; of Candidate Protocols&quot; on - =
9/30.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; a)Regarding metering requirements and =
protocol candidates.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that the metering =
requirements should be N/A when</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; choosing the IPfix Export Protocol.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; A good summary was provided by =
Peter.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; * The protocol should cover only the =
issues of delivering data from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the exporter to the collector. It must be =
expressive</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; enough to contain all the data defined in =
the data model.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; * The data model should cover the =
identification of the metrics and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; attributes, their meanings, and how they =
are grouped</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; together.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; * The architecture should cover issues =
such as where data are</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; observed, what data are required and what =
are optional, when</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; reliability is needed, how the data can be =
manipulated (e.g.,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; calculating bandwidth), etc., etc.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; b) Regarding reliability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Congestion =
awareness.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It is covered on the requirements =
draft</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Message ordering =
(critical when the data spans several packets,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; e.g. variable length fields)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; It seems there is consensus that message =
ordering is important.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Transport reliability =
-</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is some confusion around this =
problem since transport</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; reliability is *not* explicit mentioned in =
the reqs draft, but</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; since congestion awareness is, some people =
take it for granted.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - require =
application-level ACKs in the protocol (SHOULD be after</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; data are =
persisted)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that application layer =
ACKs is important</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I'm concerned =
that we are going towards a one size fits</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all in terms of =
reliability. However, with added reliability </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; comes added =
overhead.&nbsp; So what about those applications that</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; do not need such =
reliability and would rather take the added</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; capacity?</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

<P><FONT SIZE=3D2>I noticed some discussions around this topic =
(billing, which requires reliability vs traffic profiling, which does =
not). That's a good point. Would you take a stab and phrase it for the =
requirements draft so that the result is not ambigous and convey the =
necessary message? </FONT></P>

<P><FONT SIZE=3D2>thanks,</FONT>
</P>

<P><FONT SIZE=3D2>Reinaldo</FONT>
</P>

<P><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - require enable =
de-duplication of received records through a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; unique key</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that de-duplication is =
important.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; - Exporter should keep =
track of number of flow records + some</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; important totals</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and and =
periodically communicate this information to the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
collector.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There is consensus that this or some other =
solution to capture the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; amount of lost *flow records for each =
key/field* (not packets) is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; important</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; c) Regarding High-Availability</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; we should have the ability to send to =
multiple collectors </FONT>
<BR><FONT SIZE=3D2>&gt; and for the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; exporter to be able to switch from one =
collector to another.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I'm not sure =
what you mean here. Send each record to multiple </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; collectors or =
failover to another server when the current</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; collector goes =
down?</FONT>
</P>

<P><FONT SIZE=3D2>failover.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; d) Regarding Timestamps</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; New text for section 5.4 (Disclaimer =
before somebody goes </FONT>
<BR><FONT SIZE=3D2>&gt; for my neck:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; this affects the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; architecture/requirements, not the =
protocol evaluation.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; The metering process =
MUST be able to generate wire-line </FONT>
<BR><FONT SIZE=3D2>&gt; timestamps</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; (rather then flow cache =
timestamps) for the first and the last</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; observed packet of a =
flow. The timestamp resolution MUST be at</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; least</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp;&nbsp;&nbsp; the one of the sysUpTime =
[RFC1213], which is one centisecond.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Making things =
like this a MUST does not help. Vendors</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; wont or maybe =
can't change their hardware to comply. </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; I would advocate =
having 2 different timestamps. One with </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a meaning of =
wire-line timestamps and the other to mean</FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cache =
timestamp.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Paul</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; e) Regarding the Views on the =
Problem</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Some people advocate that exporting IP =
flows has nothing </FONT>
<BR><FONT SIZE=3D2>&gt; unique to it,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; it's well known problem</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; only with a different data model. I hope I =
captured this right.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Anyway, here it goes a quotation.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;However, the statement that IP flow =
is somehow unique</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; in its data requirements and as such a =
more generalized</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;data mover&quot; is somehow =
problematic, is just plain wrong.&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; f) Regarding the Field Experience of =
IPDR</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Some people wanted more information on =
this, so I'm pasting an email</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; from Aron Heintz [aheintz@ipdr.org]. Any =
more in-depth information</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; please direct your</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; questions to Jeff Meyer [jeffm@cup.hp.com] =
or Aron Heitz.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; From: Aron Heintz [<A =
HREF=3D"mailto:aheintz@ipdr.org">mailto:aheintz@ipdr.org</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Sent: Thursday, October 10, 2002 3:47 =
PM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; To: ipfix-eval@net.doit.wisc.edu; =
Harrington, David; Jeff Meyer</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Subject: RE: [ipfix-eval] Discussion of =
Candidate Protocols</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; It seems to me that NDM-U wins the =
&quot;free, open, and widely </FONT>
<BR><FONT SIZE=3D2>&gt; deployed&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; crown</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; hands down.&nbsp; NDM-U 3.1 is completely =
free and publicly </FONT>
<BR><FONT SIZE=3D2>&gt; available (see</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; below).&nbsp; By the end of this year, =
more than 70% of the mediation and</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; billing</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; packages (by market share) will have =
proven NDM-U 3.1 *real-world*</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; interoperability.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&nbsp; What could be more important than =
this?&nbsp; It appears that </FONT>
<BR><FONT SIZE=3D2>&gt; some of you</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; are</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; debating minor technical points when you =
might approach the question</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;Who is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; going to receive the data we are =
sending?&nbsp; How do they want to see</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; it?&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Technologies do not win by virtue of their =
theoretical perfection.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; The OSI</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; model is close to theoretical =
perfection.&nbsp; TCP/IP is not.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C27F34.F47016EE--

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 10:32:19 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08844
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 10:32:19 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186YCt-0005M4-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 09:23:03 -0600
Received: from odd-brew.cisco.com ([144.254.15.119] helo=strange-brew.cisco.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186YCr-0005LW-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 29 Oct 2002 09:23:01 -0600
Received: from cisco.com (bclaise-isdn-home5.cisco.com [10.49.4.222])
	by strange-brew.cisco.com (8.11.6+Sun/8.8.8) with ESMTP id g9TFMC706413;
	Tue, 29 Oct 2002 16:22:13 +0100 (CET)
Message-ID: <3DBEA7A4.1050609@cisco.com>
Date: Tue, 29 Oct 2002 16:22:12 +0100
From: Benoit Claise <bclaise@cisco.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020815
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: calato@riverstonenet.com
CC: Juergen Quittek <quittek@ccrle.nec.de>, ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] Simon's and Ram's evaluations
References: <24609576.1035302891@[192.168.102.164]> <3DB56D5E.4ECF923D@riverstonenet.com> <3DBD5A3E.6040409@cisco.com> <3DBD6366.9B77497D@riverstonenet.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hi Paul,

>Benoit Claise wrote:
>  
>
>>Paul,
>>
>>    
>>
>>>Juergen Quittek wrote:
>>>
>>>
>>>
>>>[snip]
>>>
>>>
>>>
>>>      
>>>
>>>>Juergen's Conclusion
>>>>
>>>>My view is a bit bit biased, because it is the view of one having to
>>>>implement the protocol on devices. Therefore, I give more weight than
>>>>others might do to the cost of the implementation, the consumption of
>>>>processing power and the memory consumption.
>>>>
>>>>
>>>>
>>>>        
>>>>
>>>      Netflow V9 will need to me modified to allow split reporting.
>>>      Many devices do not have the ability to store attributes per flow
>>>      until expiration.
>>>
>>>      This is a key diffentiator for LFAP as it allows both split reporting
>>>      and one shot reporting.
>>>
>>>      
>>>
>>Do I understand correctly that with split reporting, you report a FUN
>>and (at least) one FAR messages.
>>So basically, in order to gain some memory on the devices for long lived
>>flows, you export 2 smaller messages (whose sum can only be bigger for
>>short flows) to the collector for all flows, included the short ones?
>>We've seen on our devices that the action of exporting packets will eat
>>some extra non-negligible CPU. And I think this is a concern!
>>    
>>
>
>	I am not, repeat NOT, advocating mandatory split reporting of flows!
>
My misunderstanding, sorry Paul.
As a consequence, I will stop this email thread here.

Regards,  Benoit.


>
>	In fact, I suggested in my eval that the LFAP spec should be
>	modified so that "unitary" flow reporting could happen via
>	one FAR message. 
>  
>
>>Now regarding the long-lived flows.
>>I know that the P2P problem is growing but I would refer to this paper
>>http://www.research.att.com/~duffield/pubs/DLT02-flows.pdf
>>You will see in there that the highest flows in terms of average packet
>>number are napster and real-audio with respectively 455 and 467 packets.
>>What is the chance that they will produce long-lived flows? knowing that
>>this timer is 30 minutes in the netflow metering process (btw, this is
>>configurable)
>>Not much I should say!
>>    
>>
>
>	You missed one key point, for each flow you would still need 
>	to hold on to the attributes for 30 minutes until the flow timed out
>	(or how ever long it took to determine the flow should be
>	deleted). 
>
>	Plus keep in mind that devices may be reporting aggregated 
>	flows where the flows stay around much longer. While the number
>	may be lower than a very granular key, there may still be large
>	numbers of them. Furthermore, with aggregation you need to use
>	a time-out since TCP SYN,FIN don't help. Shorter time-outs cause
>	a lots of flow creation which is probably what you're trying
>	to avoid so the norm will likely be longer time-outs.
>	
>	Thus, with a split reporting option you provide the device
>	implementor the ability to split report or one shot report
>	(or I suppose some fancy implementation may use a combination).
>
>	Since we would like this protocol to be implemented on lots
>	of different devices, memory and CPU consumption are show stopper
>	type issues. If a device can't support IPFIX without chewing up
>	too many device resources it either wont get implemented or
>	wont get turned on.
>
>	Split reporting provides a necessary degree of implementation
>	flexibility for both granular and aggregated flows. Yes it makes
>	the Collector's job more difficult but its better than not having
>	some devices support to begin with.
>
>	Paul
>
>  
>
>>Regards, Benoit.
>>
>>    
>>
>>>
>>>      
>>>
>>>>Therefore, I estimate simple approaches. And NetFlow is the most simple
>>>>one. Also I learned that simplicity increases reliability (or safety
>>>>of design and implementation).
>>>>
>>>>I am not sure whether or not I could build a compatible implementation of
>>>>CRANE or LFAP that just ignores all configuration messages received from
>>>>a collector.
>>>>
>>>>
>>>>        
>>>>
>>>      Can you clarify what configuration messages you are refering to?
>>>
>>>
>>>
>>>      
>>>
>>>>If we go for a more complex prototcol, there is the choice between
>>>>problem-specific protocols on one side (IPDR, LFAP, CRANE) and the
>>>>more general Diameter on the other side. Diameter would be in favor
>>>>if it was used widely already and anyway be implemented on most boxes.
>>>>Since this is not the case I would go for problem-psecific protocols.
>>>>
>>>>Concerning the produced flows, I clearly prefer the efficient NetFlow,
>>>>IPDR, and CRANE to LFAP and Diameter.
>>>>
>>>>
>>>>        
>>>>
>>>      I disagree. LFAP's multi-record format allows the
>>>      type information to be given once for many flows. Furthermore,
>>>      if bandwidth is truly an issue the incremental savings of
>>>      sending type info once per session versus once per message
>>>      will not solve it. A higher level of aggregation will be
>>>      the solution.
>>>
>>>
>>>
>>>      
>>>
>>>>The item level comparison did not show a clear winner.
>>>>
>>>>Considering all this I would recommend to go for NetFlow v9. If this
>>>>is not accepted because NetFlow is considered as too simple or lacking
>>>>functionality, I would recommend using IDPR.
>>>>
>>>>   Juergen
>>>>
>>>>--
>>>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>>>"unsubscribe ipfix" in message body
>>>>Archive     http://ipfix.doit.wisc.edu/archive/
>>>>
>>>>
>>>>        
>>>>
>>>--
>>>Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
>>>Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
>>>"unsubscribe ipfix" in message body
>>>Archive     http://ipfix.doit.wisc.edu/archive/
>>>
>>>
>>>      
>>>




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 14:01:57 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA19751
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 14:01:56 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186bVU-0002i1-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 12:54:28 -0600
Received: from cliff.nssi.telus.com ([208.38.59.88])
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 186bVR-0002hv-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 29 Oct 2002 12:54:25 -0600
Received: (qmail 3338 invoked from network); 29 Oct 2002 18:54:24 -0000
Received: from unknown (HELO abmsg003.corp.ads) (142.178.61.86)
  by 142.178.52.236 with SMTP; 29 Oct 2002 18:54:24 -0000
Received: from 142.178.55.76 by abmsg003.corp.ads with ESMTP (Tumbleweed
 MMS SMTP Relay (MMS v4.7);); Tue, 29 Oct 2002 11:50:59 -0700
X-Server-Uuid: 62333db7-76d7-4c1e-8695-ae6a73d58b85
Received: by tac_nt1.ent.agt.ab.ca with Internet Mail Service (
 5.5.2653.19) id <NGZL4VZW>; Tue, 29 Oct 2002 11:42:39 -0700
Message-ID: <AF5043516BFED411A69D00508B104A5204950F74@tactor2.advcom.corp.ads>
From: "Mike Norris" <Mike.Norris@telus.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] IPFIX Evaluation
Date: Tue, 29 Oct 2002 11:47:09 -0700
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-WSS-ID: 11A007195376891-01-01
Content-Type: text/plain; 
 charset=iso-8859-1
Content-Transfer-Encoding: 7bit
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

I have been following with interest your discussions regarding protocol
evaluations and thought it may be useful to provide you with an industry
perspective from a major ISP.  I work for the second largest Canadian
integrated service provider offering national voice telephony, wireless and
internet capabilities.

Managing the various interfaces within our company is a complex and costly
exercise.  From our perspective we see IPDR as a key solution to our
internal interface challenges as we move towards more integrated network,
mediation, and billing capabilities.  As more groups such as Cable Labs and
IPFIX adopt NDM-U, our net cost savings rise geometrically.

We would be able to truly get "plug and play" solutions that won't tie us to
any one vendor's proprietary specifications if they maintained compliance.
Each of our vendors have responded that they are certified compliant or are
at least somewhat compliant with IPDR.  Having dealt with many forms of
proprietary formats from switching manufacturers I endorse the adoption of
an open, proven standard as the right approach.  Everyone benefits!

We are actively working on IPDR implementation for various segments of our
business and I'm pleased that IPFIX is also considering IPDR as a means of
exchange.

Mike Norris




--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 15:57:31 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA24807
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 15:57:31 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186dJA-0005Rg-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 14:49:52 -0600
Received: from cvgsinet.convergys.com ([216.68.115.250] helo=cbisinet.cbis.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186dJ8-0005RC-00
	for ipfix-eval@net.doit.wisc.edu; Tue, 29 Oct 2002 14:49:50 -0600
Received: from notes.cbis.com (cvgsmtp1.cbis.com [155.90.14.35])
	by cbisinet.cbis.com (8.9.1/8.9.1) with ESMTP id PAA27731
	for <ipfix-eval@net.doit.wisc.edu>; Tue, 29 Oct 2002 15:49:19 -0500 (EST)
From: pankaj.patel@convergys.com
Subject: [ipfix-eval] IPFIX Evaluation
To: ipfix-eval@net.doit.wisc.edu
X-Mailer: Lotus Notes Release 5.0.8  June 18, 2001
Message-ID: <OF33328C44.DE6DE419-ON85256C61.006C67CF@cbis.com>
Date: Tue, 29 Oct 2002 15:49:17 -0500
X-MIMETrack: Serialize by Router on CVGSMTP1/SRVR/CVG(Release 5.0.8 |June 18, 2001) at
 10/29/2002 03:48:54 PM
MIME-Version: 1.0
Content-type: text/plain; charset=us-ascii
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

As a I a major Billing/Customer Care and OSS Solution Provider, I would
like to provide
my views to this working group. My Company offers Product and Services to
Telcomm.
and Cable Services Providers around the world.

In order to simplify and reduce the cost of integration needs for our
clients,
we see IPDR as a key Open and Flexible Standards for Mediation and Business
Support Systems (BSS) Integration. We have been supporting the IPDR
standards
efforts since it's inception and have integrated them into our solutions.

I am glad that you are considering IPDR Standards for IPFIX Evaluation.

Pankaj Patel

--
"NOTICE:  The information contained in this electronic mail transmission is
intended by Convergys Corporation for the use of the named individual or
entity to which it is directed and may contain information that is
privileged or otherwise confidential.  If you have received this electronic
mail transmission in error, please delete it from your system without
copying or forwarding it, and notify the sender of the error by reply email
or by telephone (collect), so that the sender's address records can be
corrected."


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 16:15:07 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA25671
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 16:15:07 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186dbN-0005w3-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 15:08:41 -0600
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186dbL-0005vM-00; Tue, 29 Oct 2002 15:08:39 -0600
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9TL88Y42946;
	Tue, 29 Oct 2002 22:08:08 +0100 (CET)
	(envelope-from quittek@ccrle.nec.de)
Received: by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0, from userid 30)
	id 93E2B71C7D; Tue, 29 Oct 2002 22:07:58 +0100 (CET)
Cc: ipfix-req@net.doit.wisc.edu, ipfix-eval@net.doit.wisc.edu
X-Accept-Language: de, en
X-Priority: 3 (Normal)
X-Mailer: SKYRiXgreen_3.1 NGMime_4.2.18
references: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
From: "Juergen Quittek" <quittek@ccrle.nec.de>
MIME-Version: 1.0
subject: Re: [ipfix-eval] IPFix Summary
To: "Reinaldo Penno" <rpenno@nortelnetworks.com>
content-type: text/plain; charset="iso-8859-1"
date:  Tue, 29 Oct 2002 22:07:58 +0100
Message-Id: <20021029210758.93E2B71C7D@imap.heidelberg.ccrle.nec.de>
X-MIME-Autoconverted: from 8bit to quoted-printable by tokyo.ccrle.nec.de id g9TL88Y42946
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id QAA25671

Reinaldo,

Many thanks for this digest!

I added comments mainly having the requirements draft in mind.

    Juergen


-- Reinaldo Penno wrote on 27 October 2002 14:30 -0800:

> I burned a good chunk of my weekend trying to summarize our discussions. If
> you think I didn't capture what was said adequately, please speak up. This
> email does not substitute Juergen's on open issues, but is actually trying
> to close some of those open issues. (Should I copy the main ipfix list?)
> 
> I revised most of the emails starting from Jeff Meyer's - "Discussion of
> Candidate Protocols" on - 9/30.
> 
> a)Regarding metering requirements and protocol candidates.
> 
> There is consensus that the metering requirements should be N/A when
> choosing the IPfix Export Protocol.

There are a few exceptions: 

  - Some of the metering requirements depend on the export protocol
      - Absence of reliability of the metering protocol need to be 
        indicated to the collector (section 5.1).
      - Switch to and from overload behavoir need to be indicated 
        to the collector (section 5.3).

  - Some of the candidates, for example NetFlow, also define
    properties of the metering process. If they do so, these
    properties should be checked against the requirements.

> A good summary was provided by Peter.
> 
> * The protocol should cover only the issues of delivering data from the
> exporter to the collector. It must be expressive 
> enough to contain all the data defined in the data model. 
> 
> * The data model should cover the identification of the metrics and
> attributes, their meanings, and how they are grouped 
> together. 
> 
> * The architecture should cover issues such as where data are observed, what
> data are required and what are optional, when 
> reliability is needed, how the data can be manipulated (e.g., calculating
> bandwidth), etc., etc.
> 
> b) Regarding reliability
> 
> 
>    - Congestion awareness. 
> 
> It is covered on the requirements draft
> 
>    - Message ordering (critical when the data spans several packets, e.g.
> variable length fields) 
> 
> It seems there is consensus that message ordering is important.
> 
>    - Transport reliability - 
> 
> There is some confusion around this problem since transport reliability is
> *not* explicit mentioned in the reqs draft, but 

How do you see the difference between "transport reliability" (you are
right, it is not mentioned in the draft) and "reliability of the 
data transfer" (mentioned in the draft in Section 6.3.2.)?

> since congestion awareness is, some people take it for granted. 
> 
>    - require application-level ACKs in the protocol (SHOULD be after
>      data are persisted)
> 
> There is consensus that application layer ACKs is important

It looks like I really missed something here. 
What is an application level ACK compared to an IPFIX protocol level ACK?
Wouldn't transport level ACKs also serve quite well?

>    - require enable de-duplication of received records through a unique key
> 
> There is consensus that de-duplication is important.

That's great! 
Is there also consensus that its coverage in Section 8.3. is sufficient?

>    - Exporter should keep track of number of flow records + some important
> totals
>      and and periodically communicate this information to the
>      collector.
> 
> There is consensus that this or some other solution to capture the 
> amount of lost *flow records for each key/field* (not packets) is important

I think there is also consensus that this is a solution (a good one), 
and not a requirement.

> c) Regarding High-Availability
> 
> we should have the ability to send to multiple collectors and for the 

Does your phrase "we should" imply that, you suggest to replace the 
first "MAY" in Section 8.3 by "SHOULD"?

> exporter to be able to switch from one collector to another.

Yes, we should append some text to Section 6.3.2 covering failover.
What about:

  "If the exporting process is capable of detecting loss of connection 
   to a collecting process, it SHOULD be able to perform failover to 
   a specified backup collecting process."

> d) Regarding Timestamps
> 
> New text for section 5.4 (Disclaimer before somebody goes for my neck: this
> affects the 
> architecture/requirements, not the protocol evaluation.)
> 
> 
>    The metering process MUST be able to generate wire-line timestamps 
>    (rather then flow cache timestamps) for the first and the last 
>    observed packet of a flow. The timestamp resolution MUST be at least 
>    the one of the sysUpTime [RFC1213], which is one centisecond.

Here is a slightly different proposal. It uses pure IPFIX terminology
and does not require us to define the terms "wire-line timestamp" and
"flow cache timestamp". We haven't even defined the term "flow cache":

  "The metering process MUST be able to generate timestamps for the
   first and the last observation of a packet of a flow at the 
   observation point. The timestamp resolution MUST be at least the 
   one of the sysUpTime [RFC1213], which is one centisecond."

> e) Regarding the Views on the Problem
> 
> Some people advocate that exporting IP flows has nothing unique to it, it's
> well known problem 
> only with a different data model. I hope I captured this right. Anyway, here
> it goes a quotation.
> 
> "However, the statement that IP flow is somehow unique
> in its data requirements and as such a more generalized
> "data mover" is somehow problematic, is just plain wrong."

Still I believe you can use many generic data movers for IPFIX.
This has advantages (re-use of definition and stack implementation, 
already stable protocol, ...) as well as disadvantages (efficiency, ...)
Otherwise, we could immediatedly rule out Diameter.

> f) Regarding the Field Experience of IPDR
> 
> Some people wanted more information on this, so I'm pasting an email 
> from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information please
> direct your 
> questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> 
> "
> -----Original Message-----
> From: Aron Heintz [mailto:aheintz@ipdr.org]
> Sent: Thursday, October 10, 2002 3:47 PM
> To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> 
> 
>  It seems to me that NDM-U wins the "free, open, and widely deployed" crown
> hands down.  NDM-U 3.1 is completely free and publicly available (see
> below).  By the end of this year, more than 70% of the mediation and billing
> packages (by market share) will have proven NDM-U 3.1 *real-world*
> interoperability.
> 
>  What could be more important than this?  It appears that some of you are
> debating minor technical points when you might approach the question "Who is
> going to receive the data we are sending?  How do they want to see it?"
> Technologies do not win by virtue of their theoretical perfection.  The OSI
> model is close to theoretical perfection.  TCP/IP is not.
> "

-- 
 ‹Z@

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 16:36:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA26550
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 16:36:02 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186dve-0006VM-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 15:29:38 -0600
Received: from tokyo.ccrle.nec.de ([195.37.70.2])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186dbL-0005vM-00; Tue, 29 Oct 2002 15:08:39 -0600
Received: from imap.heidelberg.ccrle.nec.de (imap [192.168.102.11])
	by tokyo.ccrle.nec.de (8.11.6/8.11.6) with ESMTP id g9TL88Y42946;
	Tue, 29 Oct 2002 22:08:08 +0100 (CET)
	(envelope-from quittek@ccrle.nec.de)
Received: by imap.heidelberg.ccrle.nec.de (Postfix on SuSE Linux eMail Server 3.0, from userid 30)
	id 93E2B71C7D; Tue, 29 Oct 2002 22:07:58 +0100 (CET)
Cc: ipfix-req@net.doit.wisc.edu, ipfix-eval@net.doit.wisc.edu
X-Accept-Language: de, en
X-Priority: 3 (Normal)
X-Mailer: SKYRiXgreen_3.1 NGMime_4.2.18
references: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
From: "Juergen Quittek" <quittek@ccrle.nec.de>
MIME-Version: 1.0
Subject: [ipfix-req] Re: [ipfix-eval] IPFix Summary
To: "Reinaldo Penno" <rpenno@nortelnetworks.com>
content-type: text/plain; charset="iso-8859-1"
date:  Tue, 29 Oct 2002 22:07:58 +0100
Message-Id: <20021029210758.93E2B71C7D@imap.heidelberg.ccrle.nec.de>
X-MIME-Autoconverted: from 8bit to quoted-printable by tokyo.ccrle.nec.de id g9TL88Y42946
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by ietf.org id QAA26550

Reinaldo,

Many thanks for this digest!

I added comments mainly having the requirements draft in mind.

    Juergen


-- Reinaldo Penno wrote on 27 October 2002 14:30 -0800:

> I burned a good chunk of my weekend trying to summarize our discussions. If
> you think I didn't capture what was said adequately, please speak up. This
> email does not substitute Juergen's on open issues, but is actually trying
> to close some of those open issues. (Should I copy the main ipfix list?)
> 
> I revised most of the emails starting from Jeff Meyer's - "Discussion of
> Candidate Protocols" on - 9/30.
> 
> a)Regarding metering requirements and protocol candidates.
> 
> There is consensus that the metering requirements should be N/A when
> choosing the IPfix Export Protocol.

There are a few exceptions: 

  - Some of the metering requirements depend on the export protocol
      - Absence of reliability of the metering protocol need to be 
        indicated to the collector (section 5.1).
      - Switch to and from overload behavoir need to be indicated 
        to the collector (section 5.3).

  - Some of the candidates, for example NetFlow, also define
    properties of the metering process. If they do so, these
    properties should be checked against the requirements.

> A good summary was provided by Peter.
> 
> * The protocol should cover only the issues of delivering data from the
> exporter to the collector. It must be expressive 
> enough to contain all the data defined in the data model. 
> 
> * The data model should cover the identification of the metrics and
> attributes, their meanings, and how they are grouped 
> together. 
> 
> * The architecture should cover issues such as where data are observed, what
> data are required and what are optional, when 
> reliability is needed, how the data can be manipulated (e.g., calculating
> bandwidth), etc., etc.
> 
> b) Regarding reliability
> 
> 
>    - Congestion awareness. 
> 
> It is covered on the requirements draft
> 
>    - Message ordering (critical when the data spans several packets, e.g.
> variable length fields) 
> 
> It seems there is consensus that message ordering is important.
> 
>    - Transport reliability - 
> 
> There is some confusion around this problem since transport reliability is
> *not* explicit mentioned in the reqs draft, but 

How do you see the difference between "transport reliability" (you are
right, it is not mentioned in the draft) and "reliability of the 
data transfer" (mentioned in the draft in Section 6.3.2.)?

> since congestion awareness is, some people take it for granted. 
> 
>    - require application-level ACKs in the protocol (SHOULD be after
>      data are persisted)
> 
> There is consensus that application layer ACKs is important

It looks like I really missed something here. 
What is an application level ACK compared to an IPFIX protocol level ACK?
Wouldn't transport level ACKs also serve quite well?

>    - require enable de-duplication of received records through a unique key
> 
> There is consensus that de-duplication is important.

That's great! 
Is there also consensus that its coverage in Section 8.3. is sufficient?

>    - Exporter should keep track of number of flow records + some important
> totals
>      and and periodically communicate this information to the
>      collector.
> 
> There is consensus that this or some other solution to capture the 
> amount of lost *flow records for each key/field* (not packets) is important

I think there is also consensus that this is a solution (a good one), 
and not a requirement.

> c) Regarding High-Availability
> 
> we should have the ability to send to multiple collectors and for the 

Does your phrase "we should" imply that, you suggest to replace the 
first "MAY" in Section 8.3 by "SHOULD"?

> exporter to be able to switch from one collector to another.

Yes, we should append some text to Section 6.3.2 covering failover.
What about:

  "If the exporting process is capable of detecting loss of connection 
   to a collecting process, it SHOULD be able to perform failover to 
   a specified backup collecting process."

> d) Regarding Timestamps
> 
> New text for section 5.4 (Disclaimer before somebody goes for my neck: this
> affects the 
> architecture/requirements, not the protocol evaluation.)
> 
> 
>    The metering process MUST be able to generate wire-line timestamps 
>    (rather then flow cache timestamps) for the first and the last 
>    observed packet of a flow. The timestamp resolution MUST be at least 
>    the one of the sysUpTime [RFC1213], which is one centisecond.

Here is a slightly different proposal. It uses pure IPFIX terminology
and does not require us to define the terms "wire-line timestamp" and
"flow cache timestamp". We haven't even defined the term "flow cache":

  "The metering process MUST be able to generate timestamps for the
   first and the last observation of a packet of a flow at the 
   observation point. The timestamp resolution MUST be at least the 
   one of the sysUpTime [RFC1213], which is one centisecond."

> e) Regarding the Views on the Problem
> 
> Some people advocate that exporting IP flows has nothing unique to it, it's
> well known problem 
> only with a different data model. I hope I captured this right. Anyway, here
> it goes a quotation.
> 
> "However, the statement that IP flow is somehow unique
> in its data requirements and as such a more generalized
> "data mover" is somehow problematic, is just plain wrong."

Still I believe you can use many generic data movers for IPFIX.
This has advantages (re-use of definition and stack implementation, 
already stable protocol, ...) as well as disadvantages (efficiency, ...)
Otherwise, we could immediatedly rule out Diameter.

> f) Regarding the Field Experience of IPDR
> 
> Some people wanted more information on this, so I'm pasting an email 
> from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information please
> direct your 
> questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> 
> "
> -----Original Message-----
> From: Aron Heintz [mailto:aheintz@ipdr.org]
> Sent: Thursday, October 10, 2002 3:47 PM
> To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> 
> 
>  It seems to me that NDM-U wins the "free, open, and widely deployed" crown
> hands down.  NDM-U 3.1 is completely free and publicly available (see
> below).  By the end of this year, more than 70% of the mediation and billing
> packages (by market share) will have proven NDM-U 3.1 *real-world*
> interoperability.
> 
>  What could be more important than this?  It appears that some of you are
> debating minor technical points when you might approach the question "Who is
> going to receive the data we are sending?  How do they want to see it?"
> Technologies do not win by virtue of their theoretical perfection.  The OSI
> model is close to theoretical perfection.  TCP/IP is not.
> "

-- 
 ‹Z@

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 18:21:43 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA01189
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 18:21:42 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186fZQ-0001Ne-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 17:14:48 -0600
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186fZO-0001Mj-00; Tue, 29 Oct 2002 17:14:46 -0600
Received: from riverstonenet.com ([134.141.180.79]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 29 Oct 2002 15:14:12 -0800
Message-ID: <3DBF15C7.A0CE45E1@riverstonenet.com>
Date: Tue, 29 Oct 2002 18:12:07 -0500
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>, ipfix-req@net.doit.wisc.edu,
        ipfix-eval@net.doit.wisc.edu
Subject: Re: [ipfix-eval] IPFix Summary
References: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com> <20021029210758.93E2B71C7D@imap.heidelberg.ccrle.nec.de>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 29 Oct 2002 23:14:13.0279 (UTC) FILETIME=[E4F8A2F0:01C27FA0]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote:
> 

[snip]

> >    - Transport reliability -
> >
> > There is some confusion around this problem since transport reliability is
> > *not* explicit mentioned in the reqs draft, but
> 
> How do you see the difference between "transport reliability" (you are
> right, it is not mentioned in the draft) and "reliability of the
> data transfer" (mentioned in the draft in Section 6.3.2.)?

	This is an important and complex topic and I don't think
	we have discussed it adequately. I would like to see the
	list take another pass at it. 


> 
> > since congestion awareness is, some people take it for granted.
> >
> >    - require application-level ACKs in the protocol (SHOULD be after
> >      data are persisted)
> >
> > There is consensus that application layer ACKs is important
> 
> It looks like I really missed something here.
> What is an application level ACK compared to an IPFIX protocol level ACK?
> Wouldn't transport level ACKs also serve quite well?
> 
> >    - require enable de-duplication of received records through a unique key
> >
> > There is consensus that de-duplication is important.
> 
> That's great!
> Is there also consensus that its coverage in Section 8.3. is sufficient?
> 
> >    - Exporter should keep track of number of flow records + some important
> > totals
> >      and and periodically communicate this information to the
> >      collector.
> >
> > There is consensus that this or some other solution to capture the
> > amount of lost *flow records for each key/field* (not packets) is important
> 
> I think there is also consensus that this is a solution (a good one),
> and not a requirement.

	The requirement consensus, I believe, was this...

	From: http://ipfix.doit.wisc.edu/archive/1241.html

		Benoit Claise wrote:
		> 
		[snip]
		> 
		> Unless you want to say:
		>         If flow information is lost, a means to gauge the amount of
		>         loss MUST be available from the Exporter _or the_ Collector
or both.
		>         Possible reasons for flow data loss include loss of packets
on
		>         the network path, resource shortage at the exporter,
Collector
		>         crash, etc...
		> 
		
		        This is fine with me.
			
        		Paul
        

> 
> > c) Regarding High-Availability
> >
> > we should have the ability to send to multiple collectors and for the
> 
> Does your phrase "we should" imply that, you suggest to replace the
> first "MAY" in Section 8.3 by "SHOULD"?
> 
> > exporter to be able to switch from one collector to another.
> 
> Yes, we should append some text to Section 6.3.2 covering failover.
> What about:
> 
>   "If the exporting process is capable of detecting loss of connection
>    to a collecting process, it SHOULD be able to perform failover to
>    a specified backup collecting process."
> 
> > d) Regarding Timestamps
> >
> > New text for section 5.4 (Disclaimer before somebody goes for my neck: this
> > affects the
> > architecture/requirements, not the protocol evaluation.)
> >
> >
> >    The metering process MUST be able to generate wire-line timestamps
> >    (rather then flow cache timestamps) for the first and the last
> >    observed packet of a flow. The timestamp resolution MUST be at least
> >    the one of the sysUpTime [RFC1213], which is one centisecond.
> 
> Here is a slightly different proposal. It uses pure IPFIX terminology
> and does not require us to define the terms "wire-line timestamp" and
> "flow cache timestamp". We haven't even defined the term "flow cache":
> 
>   "The metering process MUST be able to generate timestamps for the
>    first and the last observation of a packet of a flow at the
>    observation point. The timestamp resolution MUST be at least the
>    one of the sysUpTime [RFC1213], which is one centisecond."

	I have trouble with these words "first and the last observation of a
packet"

	It makes the assumption that all hardware vendors timestamp each
	and every packet and many do not.

	I would prefer to have the percise definition in the data model
	and have the requirement looser, something like this...


        "The metering process MUST be able to generate timestamps for
the
         start and end of a flow. The timestamp resolution MUST be at
least 
	 of the sysUpTime [RFC1213], which is one centisecond."

	The data model can then define the precise meaning of the timestamp
	used (e.g. wire-timestamp of the last packet observed or in-activity
	timer).

	Paul



> 
> > e) Regarding the Views on the Problem
> >
> > Some people advocate that exporting IP flows has nothing unique to it, it's
> > well known problem
> > only with a different data model. I hope I captured this right. Anyway, here
> > it goes a quotation.
> >
> > "However, the statement that IP flow is somehow unique
> > in its data requirements and as such a more generalized
> > "data mover" is somehow problematic, is just plain wrong."
> 
> Still I believe you can use many generic data movers for IPFIX.
> This has advantages (re-use of definition and stack implementation,
> already stable protocol, ...) as well as disadvantages (efficiency, ...)
> Otherwise, we could immediatedly rule out Diameter.
> 
> > f) Regarding the Field Experience of IPDR
> >
> > Some people wanted more information on this, so I'm pasting an email
> > from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information please
> > direct your
> > questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> >
> > "
> > -----Original Message-----
> > From: Aron Heintz [mailto:aheintz@ipdr.org]
> > Sent: Thursday, October 10, 2002 3:47 PM
> > To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> > Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> >
> >
> >  It seems to me that NDM-U wins the "free, open, and widely deployed" crown
> > hands down.  NDM-U 3.1 is completely free and publicly available (see
> > below).  By the end of this year, more than 70% of the mediation and billing
> > packages (by market share) will have proven NDM-U 3.1 *real-world*
> > interoperability.
> >
> >  What could be more important than this?  It appears that some of you are
> > debating minor technical points when you might approach the question "Who is
> > going to receive the data we are sending?  How do they want to see it?"
> > Technologies do not win by virtue of their theoretical perfection.  The OSI
> > model is close to theoretical perfection.  TCP/IP is not.
> > "
> 
> --
>  <Z@
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Tue Oct 29 18:49:02 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA01996
	for <ipfix-archive@lists.ietf.org>; Tue, 29 Oct 2002 18:49:02 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 186g0E-00029Q-00
	for ipfix-list@mil.doit.wisc.edu; Tue, 29 Oct 2002 17:42:30 -0600
Received: from [64.95.122.60] (helo=RS-SC-EXC4.rs.riverstonenet.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 186fZO-0001Mj-00; Tue, 29 Oct 2002 17:14:46 -0600
Received: from riverstonenet.com ([134.141.180.79]) by RS-SC-EXC4.rs.riverstonenet.com with Microsoft SMTPSVC(5.0.2195.4905);
	 Tue, 29 Oct 2002 15:14:12 -0800
Message-ID: <3DBF15C7.A0CE45E1@riverstonenet.com>
Date: Tue, 29 Oct 2002 18:12:07 -0500
From: calato@riverstonenet.com
X-Mailer: Mozilla 4.75C-CCK-MCD NSCPCD475 [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: Juergen Quittek <quittek@ccrle.nec.de>
CC: Reinaldo Penno <rpenno@nortelnetworks.com>, ipfix-req@net.doit.wisc.edu,
        ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-req] Re: [ipfix-eval] IPFix Summary
References: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com> <20021029210758.93E2B71C7D@imap.heidelberg.ccrle.nec.de>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 29 Oct 2002 23:14:13.0279 (UTC) FILETIME=[E4F8A2F0:01C27FA0]
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote:
> 

[snip]

> >    - Transport reliability -
> >
> > There is some confusion around this problem since transport reliability is
> > *not* explicit mentioned in the reqs draft, but
> 
> How do you see the difference between "transport reliability" (you are
> right, it is not mentioned in the draft) and "reliability of the
> data transfer" (mentioned in the draft in Section 6.3.2.)?

	This is an important and complex topic and I don't think
	we have discussed it adequately. I would like to see the
	list take another pass at it. 


> 
> > since congestion awareness is, some people take it for granted.
> >
> >    - require application-level ACKs in the protocol (SHOULD be after
> >      data are persisted)
> >
> > There is consensus that application layer ACKs is important
> 
> It looks like I really missed something here.
> What is an application level ACK compared to an IPFIX protocol level ACK?
> Wouldn't transport level ACKs also serve quite well?
> 
> >    - require enable de-duplication of received records through a unique key
> >
> > There is consensus that de-duplication is important.
> 
> That's great!
> Is there also consensus that its coverage in Section 8.3. is sufficient?
> 
> >    - Exporter should keep track of number of flow records + some important
> > totals
> >      and and periodically communicate this information to the
> >      collector.
> >
> > There is consensus that this or some other solution to capture the
> > amount of lost *flow records for each key/field* (not packets) is important
> 
> I think there is also consensus that this is a solution (a good one),
> and not a requirement.

	The requirement consensus, I believe, was this...

	From: http://ipfix.doit.wisc.edu/archive/1241.html

		Benoit Claise wrote:
		> 
		[snip]
		> 
		> Unless you want to say:
		>         If flow information is lost, a means to gauge the amount of
		>         loss MUST be available from the Exporter _or the_ Collector
or both.
		>         Possible reasons for flow data loss include loss of packets
on
		>         the network path, resource shortage at the exporter,
Collector
		>         crash, etc...
		> 
		
		        This is fine with me.
			
        		Paul
        

> 
> > c) Regarding High-Availability
> >
> > we should have the ability to send to multiple collectors and for the
> 
> Does your phrase "we should" imply that, you suggest to replace the
> first "MAY" in Section 8.3 by "SHOULD"?
> 
> > exporter to be able to switch from one collector to another.
> 
> Yes, we should append some text to Section 6.3.2 covering failover.
> What about:
> 
>   "If the exporting process is capable of detecting loss of connection
>    to a collecting process, it SHOULD be able to perform failover to
>    a specified backup collecting process."
> 
> > d) Regarding Timestamps
> >
> > New text for section 5.4 (Disclaimer before somebody goes for my neck: this
> > affects the
> > architecture/requirements, not the protocol evaluation.)
> >
> >
> >    The metering process MUST be able to generate wire-line timestamps
> >    (rather then flow cache timestamps) for the first and the last
> >    observed packet of a flow. The timestamp resolution MUST be at least
> >    the one of the sysUpTime [RFC1213], which is one centisecond.
> 
> Here is a slightly different proposal. It uses pure IPFIX terminology
> and does not require us to define the terms "wire-line timestamp" and
> "flow cache timestamp". We haven't even defined the term "flow cache":
> 
>   "The metering process MUST be able to generate timestamps for the
>    first and the last observation of a packet of a flow at the
>    observation point. The timestamp resolution MUST be at least the
>    one of the sysUpTime [RFC1213], which is one centisecond."

	I have trouble with these words "first and the last observation of a
packet"

	It makes the assumption that all hardware vendors timestamp each
	and every packet and many do not.

	I would prefer to have the percise definition in the data model
	and have the requirement looser, something like this...


        "The metering process MUST be able to generate timestamps for
the
         start and end of a flow. The timestamp resolution MUST be at
least 
	 of the sysUpTime [RFC1213], which is one centisecond."

	The data model can then define the precise meaning of the timestamp
	used (e.g. wire-timestamp of the last packet observed or in-activity
	timer).

	Paul



> 
> > e) Regarding the Views on the Problem
> >
> > Some people advocate that exporting IP flows has nothing unique to it, it's
> > well known problem
> > only with a different data model. I hope I captured this right. Anyway, here
> > it goes a quotation.
> >
> > "However, the statement that IP flow is somehow unique
> > in its data requirements and as such a more generalized
> > "data mover" is somehow problematic, is just plain wrong."
> 
> Still I believe you can use many generic data movers for IPFIX.
> This has advantages (re-use of definition and stack implementation,
> already stable protocol, ...) as well as disadvantages (efficiency, ...)
> Otherwise, we could immediatedly rule out Diameter.
> 
> > f) Regarding the Field Experience of IPDR
> >
> > Some people wanted more information on this, so I'm pasting an email
> > from Aron Heintz [aheintz@ipdr.org]. Any more in-depth information please
> > direct your
> > questions to Jeff Meyer [jeffm@cup.hp.com] or Aron Heitz.
> >
> > "
> > -----Original Message-----
> > From: Aron Heintz [mailto:aheintz@ipdr.org]
> > Sent: Thursday, October 10, 2002 3:47 PM
> > To: ipfix-eval@net.doit.wisc.edu; Harrington, David; Jeff Meyer
> > Subject: RE: [ipfix-eval] Discussion of Candidate Protocols
> >
> >
> >  It seems to me that NDM-U wins the "free, open, and widely deployed" crown
> > hands down.  NDM-U 3.1 is completely free and publicly available (see
> > below).  By the end of this year, more than 70% of the mediation and billing
> > packages (by market share) will have proven NDM-U 3.1 *real-world*
> > interoperability.
> >
> >  What could be more important than this?  It appears that some of you are
> > debating minor technical points when you might approach the question "Who is
> > going to receive the data we are sending?  How do they want to see it?"
> > Technologies do not win by virtue of their theoretical perfection.  The OSI
> > model is close to theoretical perfection.  TCP/IP is not.
> > "
> 
> --
>  <Z@
> 
> --
> Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
> Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
> "unsubscribe ipfix" in message body
> Archive     http://ipfix.doit.wisc.edu/archive/

--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 14:36:29 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA11348
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 14:36:29 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187Kww-0002wr-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 13:25:50 -0600
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 187Kwu-0002wd-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 13:25:48 -0600
Received: (qmail 28092 invoked from network); 31 Oct 2002 19:25:29 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 31 Oct 2002 19:25:29 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9VJSXa22358
	for <ipfix-eval@net.doit.wisc.edu>; Thu, 31 Oct 2002 11:28:34 -0800
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 11:25:01 -0800
Message-ID: <AMEKJFAIEIKCBNABBMPNIENBDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0011_01C280D0.26E4D8C0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

This is a multi-part message in MIME format.

------=_NextPart_000_0011_01C280D0.26E4D8C0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

From some of the emails in the IPFIX group, there seems to be a worry that
the CRANE protocol's template negotiation is a complicated thing. This note
will explain how a minimal conforming implementation does not need to be
complex. I hope that the advantages of template negotiation are obvious: if
not, I'll write a separate note on that.

I'll present template negotiation in a series of more complex scenarios.
Each one of these scenarios is a conforming implementation of the CRANE
protocol. For simplicity, the details of the CRANE messages have been left
out; if anybody wants them, I can send a separate note.
  1.. No negotiation by collector:
    1.. Exporter says: "I am outputting fields a,b,c,d,e."
    2.. Collector says: "I agree; please send everything."
  2.. No negotiation by exporter:
    1.. Exporter says: "I am outputting fields a,b,c,d,e."
    2.. Collector says: "I only want fields a,c,e."
    3.. Exporter says: "Too bad, I'm sending all fields anyway."
    4.. Collector  replies "OK" and says to itself: "Oh well, I can just
throw away what I don't need".
  3.. Negotiation by collector and exporter:
    1.. Exporter says: "I am outputting fields a,b,c,d,e."
    2.. Collector says: "I only want fields a,c,e."
    3.. Exporter says: "Fine, I am outputting fields a,c,e." To itself, it
says: "And I can save some processing time by not computing the data for
fields b,d."
  d.. Reconnecting (negotiation has been done sometime in the past and we
want to get data transferring started as soon as possible):
    1.. Collector says to Exporter: "Tell me briefly what you're exporting"
    2.. Exporter says: "I have fields a,b,c,d,e available but am only
sending "a,c,e", as was previously agreed.
    3.. Collector says to Exporter: "Fine, send data please."
  5.. Negotiation by multiple collectors and an exporter (reliability mode
with fail-over):
    1.. Exporter says to Collector 1: "I am outputting fields a,b,c,d,e."
    2.. Collector 1 says: "I only want fields a,c,e."
    3.. Exporter says to Collector 2: "I am outputting only fields a,c,e
from the possible list of a,b,c,d,e".
    4.. Collector 2 says: But I want fields a,b,c,e."
    5.. Exporter says to Collector 1: "I am outputting fields a,b,c,e."
    6.. Collector 1 says: " I only want fields a,c,e."
    7.. Exporter says to Collector 1: "Too bad, I'm sending fields a,b,c,e
anyway."
    8.. Exporter says to Collector 2: "I'm sending fields a,b,c,e."
    9.. Collectors 1 and 2 respond with "OK".
The last scenario is a bit extreme because all the collectors should be
configured to want the same fields. But it is a possibility, if the
collectors or exporters are being upgraded in a "non-stop" environment and
the configuration is being changed on the fly (e.g., a new exporter has
additional fields; or there is a change in the amount of detail being
collected).

With multiple collectors, the exporter controls the negotiation
conversation. There is no assumption that the collectors can communicate
with each other. The exporter can decide at any point to stop the discussion
and dictate what fields will be transmitted, thus ensuring that the
conversation terminates.

As you can see, the simplest scenario (#1) requires almost no work to
implement. The exporter denies all negotiation request and always sends
everything.

- peter

------=_NextPart_000_0011_01C280D0.26E4D8C0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE></TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1106" name=3DGENERATOR></HEAD>
<BODY><FONT face=3D"Courier New" size=3D2>
<DIV><FONT size=3D+0><FONT face=3D"Trebuchet MS" size=3D2>From some of =
the emails in=20
the IPFIX group,&nbsp;there seems to be&nbsp;a worry that<SPAN=20
class=3D832362205-31102002>&nbsp;the CRANE protocol's </SPAN>template =
negotiation=20
is a complicated thing. This note will explain how a minimal conforming=20
implementation does not need to be complex. I hope that the advantages =
of=20
template negotiation are obvious: if not, I'll write a separate note on=20
that.</FONT></FONT></DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2><FONT face=3D"Trebuchet MS">I'll present template =
negotiation in=20
a series of more complex scenarios. <EM>Each one of these scenarios is a =

<U>conforming</U> implementation of the CRANE protocol. </EM>For =
simplicity, the=20
details of the CRANE messages have been left out; if anybody wants them, =
I can=20
send a separate note.</FONT></FONT></DIV>
<OL>
  <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>No negotiation by =
collector:</FONT>=20
  </FONT>
  <OL>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says: "I am =
outputting=20
    fields a,b,c,d,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS" size=3D2>Collector&nbsp;says: "I =
agree; please=20
    send everything."</FONT></LI></OL>
  <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>No negotiation by =
exporter:</FONT>=20
  </FONT>
  <OL>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says: "I am =
outputting=20
    fields a,b,c,d,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Collector&nbsp;says: =
"I only want=20
    fields a,c,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter&nbsp;says: =
"Too bad, I'm=20
    sending all fields anyway."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS" size=3D2>Collector&nbsp;<SPAN=20
    class=3D832362205-31102002>&nbsp;replies "OK" and&nbsp;</SPAN>says =
to itself:=20
    "Oh well, I can just throw away what I don't need".</FONT></LI></OL>
  <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Negotiation by =
collector and=20
  exporter:</FONT> </FONT>
  <OL>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says: "I am =
outputting=20
    fields a,b,c,d,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Collector says: "I =
only want=20
    fields a,c,e."</FONT> </FONT>
    <LI><FONT size=3D2><FONT face=3D"Trebuchet MS">Exporter says: "Fine, =
I am=20
    outputting fields a,c,e." To itself, it says: "And I can save some=20
    processing time by not computing the data for fields =
b,d."</FONT></LI></OL>
  <LI><FONT face=3D"Trebuchet MS" size=3D2><SPAN=20
  class=3D832362205-31102002>Reconnecting (negotiation has been =
done&nbsp;sometime=20
  in the past and we&nbsp;want to get&nbsp;data transferring started=20
  as&nbsp;soon as possible):</SPAN></FONT>=20
  <OL>
    <LI><FONT face=3D"Trebuchet MS" size=3D2><SPAN=20
    class=3D832362205-31102002>Collector says to Exporter: "Tell me =
briefly what=20
    you're exporting"</SPAN></FONT>=20
    <LI><FONT size=3D2><SPAN =
class=3D832362205-31102002></SPAN></FONT><FONT=20
    size=3D+0><FONT face=3D"Trebuchet MS" size=3D2><SPAN=20
    class=3D832362205-31102002>Exporter says: "I have fields a,b,c,d,e =
available=20
    but am only sending "a,c,e", as was previously =
agreed.</SPAN></FONT></FONT>=20
    <LI><FONT size=3D+0><FONT size=3D2><SPAN=20
    class=3D832362205-31102002></SPAN></FONT></FONT><FONT =
size=3D+0><FONT=20
    face=3D"Trebuchet MS" size=3D2><SPAN =
class=3D832362205-31102002>Collector says to=20
    Exporter: "Fine, send data =
please."</SPAN></FONT></FONT></FONT></LI></OL>
  <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Negotiation by multiple =
collectors=20
  and an exporter (reliability mode with fail-over):</FONT> </FONT>
  <OL>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says to =
Collector 1: "I=20
    am outputting fields a,b,c,d,e."</FONT> </FONT>
    <LI><FONT size=3D2><FONT face=3D"Trebuchet MS">Collector 1 says: "I =
only want=20
    fields a,c,e."<SPAN=20
    class=3D832362205-31102002>&nbsp;&nbsp;</SPAN></FONT></FONT>=20
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says to =
Collector 2: "I=20
    am outputting only fields a,c,e from the possible list of =
a,b,c,d,e".</FONT>=20
    </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Collector 2 says: But =
I want=20
    fields a,b,c,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says to =
Collector 1: "I=20
    am outputting fields a,b,c,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Collector 1 says: " I =
only want=20
    fields a,c,e."</FONT> </FONT>
    <LI><FONT face=3D"Trebuchet MS"><FONT size=3D2>Exporter says to =
Collector 1:=20
    "Too bad, I'm sending fields a,b,c,e anyway."</FONT> </FONT>
    <LI><FONT size=3D2><FONT face=3D"Trebuchet MS">Exporter says to =
Collector 2:=20
    "I'm sending fields a,b,c,e."<SPAN=20
    class=3D832362205-31102002>&nbsp;</SPAN></FONT></FONT></LI>
    <LI><FONT size=3D2><FONT face=3D"Trebuchet MS"><SPAN=20
    class=3D832362205-31102002>Collectors 1 and 2 respond with=20
    "OK".</SPAN></FONT></FONT></LI></OL></LI></OL>
<DIV><FONT face=3D"Trebuchet MS" size=3D2>The last scenario is<SPAN=20
class=3D832362205-31102002>&nbsp;a bit extreme</SPAN> because all the =
collectors=20
should be configured to want the same fields. But it is a possibility, =
if the=20
collectors or exporters&nbsp;are being upgraded in a "non-stop" =
environment and=20
the configuration is being changed on the fly (e.g., a new exporter has=20
additional fields; or there is a change in the&nbsp;amount of detail =
being=20
collected).</FONT></DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2>With multiple collectors, the =
exporter=20
controls the negotiation conversation. There is no assumption that the=20
collectors can communicate with each other. The exporter can decide at =
any point=20
to stop the discussion and dictate what fields will be transmitted, thus =

ensuring that the conversation terminates.</FONT></DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2>As you can see, the simplest =
scenario (#1)=20
requires almost no work to implement. The exporter denies =
all&nbsp;negotiation=20
request&nbsp;and always sends everything.</FONT></DIV>
<DIV><FONT face=3D"Trebuchet MS"></FONT>&nbsp;</DIV>
<DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2><SPAN =
class=3D832362205-31102002>-=20
peter</SPAN></FONT></DIV>
<DIV><FONT face=3D"Trebuchet MS" size=3D2><SPAN=20
class=3D832362205-31102002></SPAN></FONT>&nbsp;</DIV></DIV></FONT></BODY>=
</HTML>

------=_NextPart_000_0011_01C280D0.26E4D8C0--


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 14:58:23 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12062
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 14:58:22 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187LM6-0003bL-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 13:51:50 -0600
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 187LM3-0003b5-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 13:51:47 -0600
Received: (qmail 29644 invoked from network); 31 Oct 2002 19:51:25 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 31 Oct 2002 19:51:25 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9VJsDa22970;
	Thu, 31 Oct 2002 11:54:19 -0800
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Juergen Quittek" <quittek@ccrle.nec.de>,
        "Reinaldo Penno" <rpenno@nortelnetworks.com>
Cc: <ipfix-req@net.doit.wisc.edu>, <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: IPFix Summary
Date: Thu, 31 Oct 2002 11:50:41 -0800
Message-ID: <AMEKJFAIEIKCBNABBMPNEENCDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <20021029210758.93E2B71C7D@imap.heidelberg.ccrle.nec.de>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote Tuesday, October 29, 2002 1:08 PM:

[snip]

> >    - Transport reliability -
> >
> > There is some confusion around this problem since transport
> > reliability is *not* explicit mentioned in the reqs draft, but
>
> How do you see the difference between "transport reliability" (you are
> right, it is not mentioned in the draft) and "reliability of the
> data transfer" (mentioned in the draft in Section 6.3.2.)?

Answered below.

> > since congestion awareness is, some people take it for granted.
> >
> >    - require application-level ACKs in the protocol (SHOULD be after
> >      data are persisted)
> >
> > There is consensus that application layer ACKs is important
>
> It looks like I really missed something here.
> What is an application level ACK compared to an IPFIX protocol level ACK?
> Wouldn't transport level ACKs also serve quite well?

No, transport level ACK is merely a necessary condition, not a sufficient
condition. [OK, I exaggerate: it is possible to combine the transport and
application ACKs; but that would be similar to re-implementing TCP or SCTP
over UDP, something which the NFS folks have concluded is silly.]

1. Transportation level ACKs exist for:
  - network-level congestion awareness;
  - ensuring that all the data arrive at the other *machine*
    (not necessarily at the application: see #3) in order
    and without duplicates.

2. TCP can have quite long timeouts before it decides that
   a connection is down (in some cases, this can be hours).
   Application level ACKs allow more timely detection that
   there is a problem, and quicker fail-over.

3. TCP level ACKs only mean that the data reached the other
   machine. They do *not* mean that the data have been properly
   processed or persisted. (In theory, the collector could
   have a TCP stack that doesn't send an ACK until the
   application has handled the data; but I'm not aware of
   any such TCP implementations; they certainly would require
   a different API than the Berkeley socket API.)

4. Application level ACKs give a more accurate picture of
   how fast the data are being processed by the collector.
   With large buffers and tuning for "long fat pipes", TCP's
   ACKs (e.g., RFC 1323) may not be very indicative of how
   well the collector is able to keep up. (If the receiver
   can't keep up, eventually the buffers will fill up and
   transmission will block. But with application level ACKs,
   this can be determined more quickly and a switch over to
   an alternate receiver done sooner.)

5. The application-level ACK strategy is not prescribed in
   any of the candidate protocols, as far as I know. However,
   the usual method is to use a combination of timeout and
   volume (e.g., send an ACK at least every 1000 records or
   2 seconds, whichever comes first). Although this can be
   recommended for a protocol, it should not be mandated; for
   example, our implementation ties into a "commit/rollback"
   model of data persistency and sends an ACK whenever a "commit"
   has been done successfully (this commit is usually tied to
   volume and time, but can be triggered by other events).

(Remark #2 does not apply to SCTP but the other remarks do.)

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 14:59:17 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12115
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 14:59:17 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187LM6-0003bM-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 13:51:50 -0600
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 187LM3-0003bA-00
	for ipfix-req@net.doit.wisc.edu; Thu, 31 Oct 2002 13:51:47 -0600
Received: (qmail 29644 invoked from network); 31 Oct 2002 19:51:25 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 31 Oct 2002 19:51:25 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9VJsDa22970;
	Thu, 31 Oct 2002 11:54:19 -0800
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: "Juergen Quittek" <quittek@ccrle.nec.de>,
        "Reinaldo Penno" <rpenno@nortelnetworks.com>
Cc: <ipfix-req@net.doit.wisc.edu>, <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-req] RE: IPFix Summary
Date: Thu, 31 Oct 2002 11:50:41 -0800
Message-ID: <AMEKJFAIEIKCBNABBMPNEENCDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <20021029210758.93E2B71C7D@imap.heidelberg.ccrle.nec.de>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Juergen Quittek wrote Tuesday, October 29, 2002 1:08 PM:

[snip]

> >    - Transport reliability -
> >
> > There is some confusion around this problem since transport
> > reliability is *not* explicit mentioned in the reqs draft, but
>
> How do you see the difference between "transport reliability" (you are
> right, it is not mentioned in the draft) and "reliability of the
> data transfer" (mentioned in the draft in Section 6.3.2.)?

Answered below.

> > since congestion awareness is, some people take it for granted.
> >
> >    - require application-level ACKs in the protocol (SHOULD be after
> >      data are persisted)
> >
> > There is consensus that application layer ACKs is important
>
> It looks like I really missed something here.
> What is an application level ACK compared to an IPFIX protocol level ACK?
> Wouldn't transport level ACKs also serve quite well?

No, transport level ACK is merely a necessary condition, not a sufficient
condition. [OK, I exaggerate: it is possible to combine the transport and
application ACKs; but that would be similar to re-implementing TCP or SCTP
over UDP, something which the NFS folks have concluded is silly.]

1. Transportation level ACKs exist for:
  - network-level congestion awareness;
  - ensuring that all the data arrive at the other *machine*
    (not necessarily at the application: see #3) in order
    and without duplicates.

2. TCP can have quite long timeouts before it decides that
   a connection is down (in some cases, this can be hours).
   Application level ACKs allow more timely detection that
   there is a problem, and quicker fail-over.

3. TCP level ACKs only mean that the data reached the other
   machine. They do *not* mean that the data have been properly
   processed or persisted. (In theory, the collector could
   have a TCP stack that doesn't send an ACK until the
   application has handled the data; but I'm not aware of
   any such TCP implementations; they certainly would require
   a different API than the Berkeley socket API.)

4. Application level ACKs give a more accurate picture of
   how fast the data are being processed by the collector.
   With large buffers and tuning for "long fat pipes", TCP's
   ACKs (e.g., RFC 1323) may not be very indicative of how
   well the collector is able to keep up. (If the receiver
   can't keep up, eventually the buffers will fill up and
   transmission will block. But with application level ACKs,
   this can be determined more quickly and a switch over to
   an alternate receiver done sooner.)

5. The application-level ACK strategy is not prescribed in
   any of the candidate protocols, as far as I know. However,
   the usual method is to use a combination of timeout and
   volume (e.g., send an ACK at least every 1000 records or
   2 seconds, whichever comes first). Although this can be
   recommended for a protocol, it should not be mandated; for
   example, our implementation ties into a "commit/rollback"
   model of data persistency and sends an ACK whenever a "commit"
   has been done successfully (this commit is usually tied to
   volume and time, but can be triggered by other events).

(Remark #2 does not apply to SCTP but the other remarks do.)

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 15:04:51 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA12351
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 15:04:51 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187LSL-0003kO-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 13:58:17 -0600
Received: from pool-129-44-39-39.ny325.east.verizon.net ([129.44.39.39] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187LSI-0003kG-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 13:58:14 -0600
Received: from sphynx (sphynx [192.168.0.64])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9VJwDO19306;
	Thu, 31 Oct 2002 14:58:13 -0500
From: "Carter Bullard" <carter@qosient.com>
To: "'Peter Ludemann'" <peter.ludemann@xacct.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 14:58:04 -0500
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E6AD@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660CD76E@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Peter,
There is one combination that is missing that I think
is important.

  Exporter says: "I am outputting fields a,b,c,d,e,."
  Collector says: [no response]
  Exporter sends data.

While it may seem counter-intuitive to support this option,
it is the current state of the industry.  Can Crane handle
this type of negotiation?

Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street
Suite 18K
New York, New York 10022

+1 212 588-9133 Phone
+1 212 588-9134 Fax


-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
Behalf Of Peter Ludemann
Sent: Thursday, October 31, 2002 2:25 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] On template negotiation "complexity" in CRANE


From some of the emails in the IPFIX group, there seems to be a worry
that the CRANE protocol's template negotiation is a complicated thing.
This note will explain how a minimal conforming implementation does not
need to be complex. I hope that the advantages of template negotiation
are obvious: if not, I'll write a separate note on that.

I'll present template negotiation in a series of more complex scenarios.
Each one of these scenarios is a conforming implementation of the CRANE
protocol. For simplicity, the details of the CRANE messages have been
left out; if anybody wants them, I can send a separate note. No
negotiation by collector: 
Exporter says: "I am outputting fields a,b,c,d,e." 
Collector says: "I agree; please send everything."
No negotiation by exporter: 
Exporter says: "I am outputting fields a,b,c,d,e." 
Collector says: "I only want fields a,c,e." 
Exporter says: "Too bad, I'm sending all fields anyway." 
Collector  replies "OK" and says to itself: "Oh well, I can just throw
away what I don't need". Negotiation by collector and exporter: 
Exporter says: "I am outputting fields a,b,c,d,e." 
Collector says: "I only want fields a,c,e." 
Exporter says: "Fine, I am outputting fields a,c,e." To itself, it says:
"And I can save some processing time by not computing the data for
fields b,d." Reconnecting (negotiation has been done sometime in the
past and we want to get data transferring started as soon as possible): 
Collector says to Exporter: "Tell me briefly what you're exporting" 
Exporter says: "I have fields a,b,c,d,e available but am only sending
"a,c,e", as was previously agreed. 
Collector says to Exporter: "Fine, send data please." Negotiation by
multiple collectors and an exporter (reliability mode with fail-over): 
Exporter says to Collector 1: "I am outputting fields a,b,c,d,e." 
Collector 1 says: "I only want fields a,c,e."   
Exporter says to Collector 2: "I am outputting only fields a,c,e from
the possible list of a,b,c,d,e". 
Collector 2 says: But I want fields a,b,c,e." 
Exporter says to Collector 1: "I am outputting fields a,b,c,e." 
Collector 1 says: " I only want fields a,c,e." 
Exporter says to Collector 1: "Too bad, I'm sending fields a,b,c,e
anyway." 
Exporter says to Collector 2: "I'm sending fields a,b,c,e."  
Collectors 1 and 2 respond with "OK".
The last scenario is a bit extreme because all the collectors should be
configured to want the same fields. But it is a possibility, if the
collectors or exporters are being upgraded in a "non-stop" environment
and the configuration is being changed on the fly (e.g., a new exporter
has additional fields; or there is a change in the amount of detail
being collected).

With multiple collectors, the exporter controls the negotiation
conversation. There is no assumption that the collectors can communicate
with each other. The exporter can decide at any point to stop the
discussion and dictate what fields will be transmitted, thus ensuring
that the conversation terminates.

As you can see, the simplest scenario (#1) requires almost no work to
implement. The exporter denies all negotiation request and always sends
everything.

- peter



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 15:04:55 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA12365
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 15:04:54 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187LSS-0003ke-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 13:58:24 -0600
Received: from pool-129-44-39-39.ny325.east.verizon.net ([129.44.39.39] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187LSQ-0003kX-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 13:58:22 -0600
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9VJwLO19350;
	Thu, 31 Oct 2002 14:58:21 -0500
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Peter Ludemann'" <peter.ludemann@xacct.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: RE: [ipfix-eval] On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 14:58:08 -0500
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E6AD@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660CD76E@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Peter,
There is one combination that is missing that I think
is important.

  Exporter says: "I am outputting fields a,b,c,d,e,."
  Collector says: [no response]
  Exporter sends data.

While it may seem counter-intuitive to support this option,
it is the current state of the industry.  Can Crane handle
this type of negotiation?

Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street
Suite 18K
New York, New York 10022

+1 212 588-9133 Phone
+1 212 588-9134 Fax


-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu] On
Behalf Of Peter Ludemann
Sent: Thursday, October 31, 2002 2:25 PM
To: ipfix-eval@net.doit.wisc.edu
Subject: [ipfix-eval] On template negotiation "complexity" in CRANE


From some of the emails in the IPFIX group, there seems to be a worry
that the CRANE protocol's template negotiation is a complicated thing.
This note will explain how a minimal conforming implementation does not
need to be complex. I hope that the advantages of template negotiation
are obvious: if not, I'll write a separate note on that.

I'll present template negotiation in a series of more complex scenarios.
Each one of these scenarios is a conforming implementation of the CRANE
protocol. For simplicity, the details of the CRANE messages have been
left out; if anybody wants them, I can send a separate note. No
negotiation by collector: 
Exporter says: "I am outputting fields a,b,c,d,e." 
Collector says: "I agree; please send everything."
No negotiation by exporter: 
Exporter says: "I am outputting fields a,b,c,d,e." 
Collector says: "I only want fields a,c,e." 
Exporter says: "Too bad, I'm sending all fields anyway." 
Collector  replies "OK" and says to itself: "Oh well, I can just throw
away what I don't need". Negotiation by collector and exporter: 
Exporter says: "I am outputting fields a,b,c,d,e." 
Collector says: "I only want fields a,c,e." 
Exporter says: "Fine, I am outputting fields a,c,e." To itself, it says:
"And I can save some processing time by not computing the data for
fields b,d." Reconnecting (negotiation has been done sometime in the
past and we want to get data transferring started as soon as possible): 
Collector says to Exporter: "Tell me briefly what you're exporting" 
Exporter says: "I have fields a,b,c,d,e available but am only sending
"a,c,e", as was previously agreed. 
Collector says to Exporter: "Fine, send data please." Negotiation by
multiple collectors and an exporter (reliability mode with fail-over): 
Exporter says to Collector 1: "I am outputting fields a,b,c,d,e." 
Collector 1 says: "I only want fields a,c,e."   
Exporter says to Collector 2: "I am outputting only fields a,c,e from
the possible list of a,b,c,d,e". 
Collector 2 says: But I want fields a,b,c,e." 
Exporter says to Collector 1: "I am outputting fields a,b,c,e." 
Collector 1 says: " I only want fields a,c,e." 
Exporter says to Collector 1: "Too bad, I'm sending fields a,b,c,e
anyway." 
Exporter says to Collector 2: "I'm sending fields a,b,c,e."  
Collectors 1 and 2 respond with "OK".
The last scenario is a bit extreme because all the collectors should be
configured to want the same fields. But it is a possibility, if the
collectors or exporters are being upgraded in a "non-stop" environment
and the configuration is being changed on the fly (e.g., a new exporter
has additional fields; or there is a change in the amount of detail
being collected).

With multiple collectors, the exporter controls the negotiation
conversation. There is no assumption that the collectors can communicate
with each other. The exporter can decide at any point to stop the
discussion and dictate what fields will be transmitted, thus ensuring
that the conversation terminates.

As you can see, the simplest scenario (#1) requires almost no work to
implement. The exporter denies all negotiation request and always sends
everything.

- peter



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 15:24:08 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA13063
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 15:24:07 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187Lkp-0004Er-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 14:17:23 -0600
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 187Lkn-0004Ei-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 14:17:21 -0600
Received: (qmail 31550 invoked from network); 31 Oct 2002 20:17:00 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 31 Oct 2002 20:17:00 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9VKKCa23586;
	Thu, 31 Oct 2002 12:20:18 -0800
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <carter@qosient.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 12:16:40 -0800
Message-ID: <AMEKJFAIEIKCBNABBMPNMENDDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607E6AD@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter Bullard [mailto:carter@qosient.com] wrote Thursday, October 31, 2002
11:58 AM:

> There is one combination that is missing that I think
> is important.
>
>   Exporter says: "I am outputting fields a,b,c,d,e,."
>   Collector says: [no response]
>   Exporter sends data.
>
> While it may seem counter-intuitive to support this option,
> it is the current state of the industry.  Can Crane handle
> this type of negotiation?

Yes, but not with [no response].  [no response] is not allowed by the CRANE
protocol.  Instead, use a "I agree" response. The exporter makes the final
decision as to what is exported, so there is no problem with a single
collector just accepting whatever it is told.

Our general philosophy is to require some kind of an acknowledgment to all
messages. (Data messages are acknowledged in groups; all others are
acknowledged individually.) For some messages, acknowledgment can be
"asynchronous" (e.g., a request is sent with a request ID, which is used to
identify the response).

We think that it is a Bad Thing to allow silence to be equivalent to an
acknowledgment. This is particularly the case for a compact binary protocol:
if there is a mismatch between what the exporter is sending and what the
collector is expecting, the only indication of a problem might be when
somebody notices strange values showing up in the data.

- peter


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 15:34:40 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA13592
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 15:34:39 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187LuM-0004Vd-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 14:27:14 -0600
Received: from pool-129-44-39-39.ny325.east.verizon.net ([129.44.39.39] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187LuK-0004VW-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 14:27:12 -0600
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9VKRBO22769;
	Thu, 31 Oct 2002 15:27:11 -0500
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Peter Ludemann'" <peter.ludemann@xacct.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 15:26:52 -0500
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607E6AE@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660CD7A2@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Peter,
   I have the same protocol strategy in the Argus protocol,
where an explicit response is required.   I'm just thinking
of existing legacy flow transport strategies, where there
currently isn't even a request for data.  While not a show
stopper in any way, I think it may need to be discussed.

Regards,

Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street, Suite 18K
New York, New York  10022

carter@qosient.com
Phone +1 212 588-9133
Fax   +1 212 588-9134
http://qosient.com
 


> -----Original Message-----
> From: Peter Ludemann [mailto:peter.ludemann@xacct.com] 
> Sent: Thursday, October 31, 2002 3:17 PM
> To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> Subject: RE: On template negotiation "complexity" in CRANE
> 
> 
> Carter Bullard [mailto:carter@qosient.com] wrote Thursday, 
> October 31, 2002 11:58 AM:
> 
> > There is one combination that is missing that I think
> > is important.
> >
> >   Exporter says: "I am outputting fields a,b,c,d,e,."
> >   Collector says: [no response]
> >   Exporter sends data.
> >
> > While it may seem counter-intuitive to support this option, 
> it is the 
> > current state of the industry.  Can Crane handle this type of 
> > negotiation?
> 
> Yes, but not with [no response].  [no response] is not 
> allowed by the CRANE protocol.  Instead, use a "I agree" 
> response. The exporter makes the final decision as to what is 
> exported, so there is no problem with a single collector just 
> accepting whatever it is told.
> 
> Our general philosophy is to require some kind of an 
> acknowledgment to all messages. (Data messages are 
> acknowledged in groups; all others are acknowledged 
> individually.) For some messages, acknowledgment can be 
> "asynchronous" (e.g., a request is sent with a request ID, 
> which is used to identify the response).
> 
> We think that it is a Bad Thing to allow silence to be 
> equivalent to an acknowledgment. This is particularly the 
> case for a compact binary protocol: if there is a mismatch 
> between what the exporter is sending and what the collector 
> is expecting, the only indication of a problem might be when 
> somebody notices strange values showing up in the data.
> 
> - peter
> 
> 



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 15:54:31 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA14336
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 15:54:31 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187MEV-0004t1-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 14:48:03 -0600
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 187MEU-0004su-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 14:48:02 -0600
Received: (qmail 1059 invoked from network); 31 Oct 2002 20:47:50 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 31 Oct 2002 20:47:49 -0000
Received: from peter (inside.us.xacct.com [204.253.100.102])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9VKota24191;
	Thu, 31 Oct 2002 12:51:03 -0800
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <carter@qosient.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 12:47:22 -0800
Message-ID: <AMEKJFAIEIKCBNABBMPNIENGDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607E6AE@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter:

A minimal CRANE exporter could send only messages that say "here are the
fields, no discussion"; and a minimal CRANE receiver can always reply with
"I agree" to any template messages from the exporter. Does this meet your
criteria?

I image such a minimal implementation having a hard-coded template message
on the exporter, which is sent in response to any template information
request. On the receiver, there would also be hard-coded template, which
should be the same; if there's a difference, that indicates the exporter
isn't what was expected and the collector should report a configuration
error (e.g., via SNMP); otherwise, the collector just replies to the
exporter with "I agree" and then settles down to accept the actual data.

- peter

> -----Original Message-----
> From: Carter Bullard [mailto:carter@qosient.com]
> Sent: Thursday, October 31, 2002 12:27 PM
> To: 'Peter Ludemann'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: On template negotiation "complexity" in CRANE
>
>
> Hey Peter,
>    I have the same protocol strategy in the Argus protocol,
> where an explicit response is required.   I'm just thinking
> of existing legacy flow transport strategies, where there
> currently isn't even a request for data.  While not a show
> stopper in any way, I think it may need to be discussed.
>
> Regards,
>
> Carter
>
> Carter Bullard
> QoSient, LLC
> 300 E. 56th Street, Suite 18K
> New York, New York  10022
>
> carter@qosient.com
> Phone +1 212 588-9133
> Fax   +1 212 588-9134
> http://qosient.com
>
>
>
> > -----Original Message-----
> > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > Sent: Thursday, October 31, 2002 3:17 PM
> > To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> > Subject: RE: On template negotiation "complexity" in CRANE
> >
> >
> > Carter Bullard [mailto:carter@qosient.com] wrote Thursday,
> > October 31, 2002 11:58 AM:
> >
> > > There is one combination that is missing that I think
> > > is important.
> > >
> > >   Exporter says: "I am outputting fields a,b,c,d,e,."
> > >   Collector says: [no response]
> > >   Exporter sends data.
> > >
> > > While it may seem counter-intuitive to support this option,
> > it is the
> > > current state of the industry.  Can Crane handle this type of
> > > negotiation?
> >
> > Yes, but not with [no response].  [no response] is not
> > allowed by the CRANE protocol.  Instead, use a "I agree"
> > response. The exporter makes the final decision as to what is
> > exported, so there is no problem with a single collector just
> > accepting whatever it is told.
> >
> > Our general philosophy is to require some kind of an
> > acknowledgment to all messages. (Data messages are
> > acknowledged in groups; all others are acknowledged
> > individually.) For some messages, acknowledgment can be
> > "asynchronous" (e.g., a request is sent with a request ID,
> > which is used to identify the response).
> >
> > We think that it is a Bad Thing to allow silence to be
> > equivalent to an acknowledgment. This is particularly the
> > case for a compact binary protocol: if there is a mismatch
> > between what the exporter is sending and what the collector
> > is expecting, the only indication of a problem might be when
> > somebody notices strange values showing up in the data.
> >
> > - peter
> >
> >
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 16:35:09 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA16116
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 16:35:09 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187Mqf-0005si-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 15:27:29 -0600
Received: from pool-129-44-39-39.ny325.east.verizon.net ([129.44.39.39] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187Mqd-0005sc-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 15:27:27 -0600
Received: from SET (set [192.168.0.161])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id g9VLRRO28115;
	Thu, 31 Oct 2002 16:27:27 -0500
Reply-To: <carter@qosient.com>
From: "Carter Bullard" <carter@qosient.com>
To: "'Peter Ludemann'" <peter.ludemann@xacct.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 16:27:17 -0500
Organization: QoSient, LLC
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607A49D@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660CD7C5@ptah.newyork.qosient.com>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Peter,
I'm still thinking "here are the fields", "here is the data".
Here is an example of how this might be used.

Suppose I want to transmit flow records to a multicast address.
The sender really doesn't care if there are particular
receivers, it just needs to send data.  Each of the receivers
however, may need to know something about the data that is
being received.  One way is for the IPFIX protocol to periodically
announce its fields, for those receivers that have joined
the multicast group after the initial start of transmission.
I don't think I like receivers of a multicast IPFIX data stream
having to know the unicast address of the transmitter, in order
to discover what the output format is.

Not currently in the IPFIX set of scenarios, but definitely a
real world possibility, and one the protocol should support,
IMHO.

Carter

Carter Bullard
QoSient, LLC
300 E. 56th Street, Suite 18K
New York, New York  10022

carter@qosient.com
Phone +1 212 588-9133
Fax   +1 212 588-9134
http://qosient.com
 

> -----Original Message-----
> From: Peter Ludemann [mailto:peter.ludemann@xacct.com] 
> Sent: Thursday, October 31, 2002 3:47 PM
> To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> Subject: RE: On template negotiation "complexity" in CRANE
> 
> 
> Carter:
> 
> A minimal CRANE exporter could send only messages that say 
> "here are the fields, no discussion"; and a minimal CRANE 
> receiver can always reply with "I agree" to any template 
> messages from the exporter. Does this meet your criteria?
> 
> I image such a minimal implementation having a hard-coded 
> template message on the exporter, which is sent in response 
> to any template information request. On the receiver, there 
> would also be hard-coded template, which should be the same; 
> if there's a difference, that indicates the exporter isn't 
> what was expected and the collector should report a 
> configuration error (e.g., via SNMP); otherwise, the 
> collector just replies to the exporter with "I agree" and 
> then settles down to accept the actual data.
> 
> - peter
> 
> > -----Original Message-----
> > From: Carter Bullard [mailto:carter@qosient.com]
> > Sent: Thursday, October 31, 2002 12:27 PM
> > To: 'Peter Ludemann'; ipfix-eval@net.doit.wisc.edu
> > Subject: RE: On template negotiation "complexity" in CRANE
> >
> >
> > Hey Peter,
> >    I have the same protocol strategy in the Argus protocol,
> > where an explicit response is required.   I'm just thinking
> > of existing legacy flow transport strategies, where there currently 
> > isn't even a request for data.  While not a show stopper in 
> any way, I 
> > think it may need to be discussed.
> >
> > Regards,
> >
> > Carter
> >
> > Carter Bullard
> > QoSient, LLC
> > 300 E. 56th Street, Suite 18K
> > New York, New York  10022
> >
> > carter@qosient.com
> > Phone +1 212 588-9133
> > Fax   +1 212 588-9134
> > http://qosient.com
> >
> >
> >
> > > -----Original Message-----
> > > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > > Sent: Thursday, October 31, 2002 3:17 PM
> > > To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> > > Subject: RE: On template negotiation "complexity" in CRANE
> > >
> > >
> > > Carter Bullard [mailto:carter@qosient.com] wrote 
> Thursday, October 
> > > 31, 2002 11:58 AM:
> > >
> > > > There is one combination that is missing that I think
> > > > is important.
> > > >
> > > >   Exporter says: "I am outputting fields a,b,c,d,e,."
> > > >   Collector says: [no response]
> > > >   Exporter sends data.
> > > >
> > > > While it may seem counter-intuitive to support this option,
> > > it is the
> > > > current state of the industry.  Can Crane handle this type of 
> > > > negotiation?
> > >
> > > Yes, but not with [no response].  [no response] is not allowed by 
> > > the CRANE protocol.  Instead, use a "I agree" response. 
> The exporter 
> > > makes the final decision as to what is exported, so there is no 
> > > problem with a single collector just accepting whatever 
> it is told.
> > >
> > > Our general philosophy is to require some kind of an 
> acknowledgment 
> > > to all messages. (Data messages are acknowledged in groups; all 
> > > others are acknowledged
> > > individually.) For some messages, acknowledgment can be 
> > > "asynchronous" (e.g., a request is sent with a request 
> ID, which is 
> > > used to identify the response).
> > >
> > > We think that it is a Bad Thing to allow silence to be 
> equivalent to 
> > > an acknowledgment. This is particularly the case for a compact 
> > > binary protocol: if there is a mismatch between what the 
> exporter is 
> > > sending and what the collector is expecting, the only 
> indication of 
> > > a problem might be when somebody notices strange values 
> showing up 
> > > in the data.
> > >
> > > - peter
> > >
> > >
> >
> 
> 



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 16:35:36 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA16146
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 16:35:36 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187MsD-0005uV-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 15:29:05 -0600
Received: from smtp.desyne.com ([64.124.142.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187MsB-0005uP-00; Thu, 31 Oct 2002 15:29:03 -0600
Received: from AHEINTZPC (mail.twinoaks.org [216.174.0.170])
	by smtp.desyne.com (8.11.4/8.11.3) with SMTP id g9VLT0P25111;
	Thu, 31 Oct 2002 16:29:00 -0500
From: "Aron Heintz" <aheintz@ipdr.org>
To: <ipfix-eval@net.doit.wisc.edu>
Cc: <ipfix-req@net.doit.wisc.edu>, <dbh@enterasys.com>,
        "Reinaldo Penno" <rpenno@nortelnetworks.com>
Subject: [ipfix-eval] RE: [ipfix-req] IPFix Summary
Date: Thu, 31 Oct 2002 16:32:23 -0500
Message-ID: <EOEAKGOHDKBHBDKCNFFJCEHNCPAA.aheintz@ipdr.org>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4920.2300
In-Reply-To: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

	To quote David Harrington, cochair of the SNMPv3 IETF group:  "Given two
technically comparable candidates, we should consider the likelihood that
vendors will ship the protocol in their devices and that vendors' customers
will deploy the functionality in their networks.  The market is the most
important decider of industry standards."

    In response to Reinaldo's query regarding Field Experience of IPDR, I'd
like to submit the list of companies that contributed to the development of
the NDM-U specification.  Asterisks denote companies that are known to be
currently *using* the specification.

	Industrial users today comprise almost 30 companies, with a combined market
capitalization over $50 Billion.  IPDR offers immediate market acceptance
for IPFIX.

CHARTER MEMBERS
* Ace*Comm
* Amdocs
* Convergys
* CSG Systems, Inc.
* ECTel
* Hewlett-Packard
* Intrado
* Narus
Nortel
OneWave Technologies, Inc.
Rogers AT&T Wireless
* Sprint PCS
TeleStrategies
* Telus

SUPPORTING MEMBERS
* ADC
* American Management Systems
* Billing Concepts
Cisco
* Comptel
Cotton Management
DST Innovis
HNC Software
Illuminet
Infosys
* Marconi
* NEC America
NetTest
* Openet Telecom
Siemens
Sofrecom
Telcordia Technologies
* TSI Telecommunication Services

CURRENT ASSOCIATE AND PAST CONTRIBUTING MEMBERS
AM-Beo
Broadband Communications Solutions Corp.
Centrisoft
CPqD
* Digital Route
Enition
Formula Telecom Solutions
KORNETS
MetraTech Corp.
Portal Software
TeleGea, Inc.
Trendium
* Xacct Technologies
Abiliti Solutions
Accenture
Agilent Technologies
Alcatel
Alltel Information Services
AP Engines
Apogee Networks
Aptis
ASC Billing Solutions
Asiainfo Holdings, Inc.
AT&T
BayPackets, Inc.
Bridgewater Systems Corp
Brix Networks, Inc.
BusinessEdge Solutions
CACI
CCMI
Clarent
* Daleen
Digiquant
Digital Fuel
DMR Consulting Group
EDB4tel
EHPT USA Inc
Elron Technologies
EmpowerTel
Ericsson Telecom B.V.
Evergent Technologies
Extent Technologies
FileTek
* H.O. Systems
Hatteras Networks, Inc.
Huawei Technologies
Hughes Network Systems
Infocomm
* Info Directions
InformationView Solutions Corporation (Now Vibrant Solutions)
InfoVista Corporation
* Intec
Intel
IP23
IPCell Technologies, Inc
JAMDAT Mobile Inc.
LongBoard, Inc.
Lucent Technologies
Magardi, Inc.
Metapath Software International Ltd.
Mind CTI, Inc.
mSafe
NCR
Netcom Consultants
Netconn Solutions
NetEye
Nexus Telecom AG
Opencon Systems
P-Cube Ltd.
Pacific Bell
Packeteer, Inc.
Portal Software
Primal Systems Inc.
Proxima Systems Limited
Qubiz GmbH
Quintrex Data Systems Group
Radguard
* RateIntegration
Savera Systems
* Sepro
* Sema Telecom
Shenzhen Zhongxing-suntek Data Communication
     Co. Ltd.
Sigma Systems Group
Suntec Business Systems
TCSI Corporation
Telchemy
Teleglobe Communications Corporation
TeleKnowledge, Inc.
Telesens KCSL
Telia Mobile AB
Telution LLC
Tertio Limited
TMNG, Inc.
TopLayer Networks, Inc.
USHA Communications Technology (UBEST India)
* Virtual Summit, inc.
Vpacket.com

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf Of
Reinaldo Penno
Sent: Sunday, October 27, 2002 5:31
To: ipfix-eval@net.doit.wisc.edu
Cc: ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] IPFix Summary


I burned a good chunk of my weekend trying to summarize our discussions. If
you think I didn't capture what was said adequately, please speak up. This
email does not substitute Juergen's on open issues, but is actually trying
to close some of those open issues. (Should I copy the main ipfix list?)

a) ...
e) Regarding the Views on the Problem
Some people advocate that exporting IP flows has nothing unique to it, it's
well known problem
only with a different data model. I hope I captured this right. Anyway, here
it goes a quotation.
"However, the statement that IP flow is somehow unique
in its data requirements and as such a more generalized
"data mover" is somehow problematic, is just plain wrong."
f) Regarding the Field Experience of IPDR
Some people wanted more information on this, so I'm pasting an email
from Aron Heintz...


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 16:50:41 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA16676
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 16:50:41 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187N74-0006J7-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 15:44:26 -0600
Received: from smtp.desyne.com ([64.124.142.14])
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187MsB-0005uP-00; Thu, 31 Oct 2002 15:29:03 -0600
Received: from AHEINTZPC (mail.twinoaks.org [216.174.0.170])
	by smtp.desyne.com (8.11.4/8.11.3) with SMTP id g9VLT0P25111;
	Thu, 31 Oct 2002 16:29:00 -0500
From: "Aron Heintz" <aheintz@ipdr.org>
To: <ipfix-eval@net.doit.wisc.edu>
Cc: <ipfix-req@net.doit.wisc.edu>, <dbh@enterasys.com>,
        "Reinaldo Penno" <rpenno@nortelnetworks.com>
Subject: RE: [ipfix-req] IPFix Summary
Date: Thu, 31 Oct 2002 16:32:23 -0500
Message-ID: <EOEAKGOHDKBHBDKCNFFJCEHNCPAA.aheintz@ipdr.org>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4920.2300
In-Reply-To: <7B802811BE77D51189910002A55CFD2C045F0B93@zsc3c032.us.nortel.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

	To quote David Harrington, cochair of the SNMPv3 IETF group:  "Given two
technically comparable candidates, we should consider the likelihood that
vendors will ship the protocol in their devices and that vendors' customers
will deploy the functionality in their networks.  The market is the most
important decider of industry standards."

    In response to Reinaldo's query regarding Field Experience of IPDR, I'd
like to submit the list of companies that contributed to the development of
the NDM-U specification.  Asterisks denote companies that are known to be
currently *using* the specification.

	Industrial users today comprise almost 30 companies, with a combined market
capitalization over $50 Billion.  IPDR offers immediate market acceptance
for IPFIX.

CHARTER MEMBERS
* Ace*Comm
* Amdocs
* Convergys
* CSG Systems, Inc.
* ECTel
* Hewlett-Packard
* Intrado
* Narus
Nortel
OneWave Technologies, Inc.
Rogers AT&T Wireless
* Sprint PCS
TeleStrategies
* Telus

SUPPORTING MEMBERS
* ADC
* American Management Systems
* Billing Concepts
Cisco
* Comptel
Cotton Management
DST Innovis
HNC Software
Illuminet
Infosys
* Marconi
* NEC America
NetTest
* Openet Telecom
Siemens
Sofrecom
Telcordia Technologies
* TSI Telecommunication Services

CURRENT ASSOCIATE AND PAST CONTRIBUTING MEMBERS
AM-Beo
Broadband Communications Solutions Corp.
Centrisoft
CPqD
* Digital Route
Enition
Formula Telecom Solutions
KORNETS
MetraTech Corp.
Portal Software
TeleGea, Inc.
Trendium
* Xacct Technologies
Abiliti Solutions
Accenture
Agilent Technologies
Alcatel
Alltel Information Services
AP Engines
Apogee Networks
Aptis
ASC Billing Solutions
Asiainfo Holdings, Inc.
AT&T
BayPackets, Inc.
Bridgewater Systems Corp
Brix Networks, Inc.
BusinessEdge Solutions
CACI
CCMI
Clarent
* Daleen
Digiquant
Digital Fuel
DMR Consulting Group
EDB4tel
EHPT USA Inc
Elron Technologies
EmpowerTel
Ericsson Telecom B.V.
Evergent Technologies
Extent Technologies
FileTek
* H.O. Systems
Hatteras Networks, Inc.
Huawei Technologies
Hughes Network Systems
Infocomm
* Info Directions
InformationView Solutions Corporation (Now Vibrant Solutions)
InfoVista Corporation
* Intec
Intel
IP23
IPCell Technologies, Inc
JAMDAT Mobile Inc.
LongBoard, Inc.
Lucent Technologies
Magardi, Inc.
Metapath Software International Ltd.
Mind CTI, Inc.
mSafe
NCR
Netcom Consultants
Netconn Solutions
NetEye
Nexus Telecom AG
Opencon Systems
P-Cube Ltd.
Pacific Bell
Packeteer, Inc.
Portal Software
Primal Systems Inc.
Proxima Systems Limited
Qubiz GmbH
Quintrex Data Systems Group
Radguard
* RateIntegration
Savera Systems
* Sepro
* Sema Telecom
Shenzhen Zhongxing-suntek Data Communication
     Co. Ltd.
Sigma Systems Group
Suntec Business Systems
TCSI Corporation
Telchemy
Teleglobe Communications Corporation
TeleKnowledge, Inc.
Telesens KCSL
Telia Mobile AB
Telution LLC
Tertio Limited
TMNG, Inc.
TopLayer Networks, Inc.
USHA Communications Technology (UBEST India)
* Virtual Summit, inc.
Vpacket.com

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf Of
Reinaldo Penno
Sent: Sunday, October 27, 2002 5:31
To: ipfix-eval@net.doit.wisc.edu
Cc: ipfix-req@net.doit.wisc.edu
Subject: [ipfix-req] IPFix Summary


I burned a good chunk of my weekend trying to summarize our discussions. If
you think I didn't capture what was said adequately, please speak up. This
email does not substitute Juergen's on open issues, but is actually trying
to close some of those open issues. (Should I copy the main ipfix list?)

a) ...
e) Regarding the Views on the Problem
Some people advocate that exporting IP flows has nothing unique to it, it's
well known problem
only with a different data model. I hope I captured this right. Anyway, here
it goes a quotation.
"However, the statement that IP flow is somehow unique
in its data requirements and as such a more generalized
"data mover" is somehow problematic, is just plain wrong."
f) Regarding the Field Experience of IPDR
Some people wanted more information on this, so I'm pasting an email
from Aron Heintz...


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 18:56:24 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA20847
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 18:56:24 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187P2f-0001Hh-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 17:48:01 -0600
Received: from mailhub.xacct.com ([204.253.100.25] helo=xacct.com)
	by mil.doit.wisc.edu with smtp (Exim 3.13 #1)
	id 187P2c-0001Ha-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 17:47:58 -0600
Received: (qmail 12637 invoked from network); 31 Oct 2002 23:47:41 -0000
Received: from usmail.xacct.com (204.253.100.12)
  by mailhub.xacct.com with SMTP; 31 Oct 2002 23:47:41 -0000
Received: from peter ([192.168.254.172])
	by usmail.xacct.com (8.11.2/8.11.2) with SMTP id g9VNola28218;
	Thu, 31 Oct 2002 15:50:48 -0800
From: "Peter Ludemann" <peter.ludemann@xacct.com>
To: <carter@qosient.com>, <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 15:47:14 -0800
Message-ID: <AMEKJFAIEIKCBNABBMPNAENLDIAA.peter.ludemann@xacct.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED6607A49D@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Carter:

Well, multicast (UDP) is hardly reliable, is it?

I suppose that CRANE can be turned into an unreliable broadcast by doing as
you say: assume an "OK" response when the templates are announced. But I
wouldn't recommend this: what if the packet with the template information is
lost? Confusion downstream ...

Can broadcast of change of template could be made safe? I'd suggest instead
using a reliable channel for handling such announcements. You could use
CRANE's notion of a "configuration ID" to mark data records that are encoded
with the old templates and those that are encoded under the new templates.

- peter

> -----Original Message-----
> From: Carter Bullard [mailto:carter@qosient.com]
> Sent: Thursday, October 31, 2002 1:27 PM
> To: 'Peter Ludemann'; ipfix-eval@net.doit.wisc.edu
> Subject: RE: On template negotiation "complexity" in CRANE
>
>
> Hey Peter,
> I'm still thinking "here are the fields", "here is the data".
> Here is an example of how this might be used.
>
> Suppose I want to transmit flow records to a multicast address.
> The sender really doesn't care if there are particular
> receivers, it just needs to send data.  Each of the receivers
> however, may need to know something about the data that is
> being received.  One way is for the IPFIX protocol to periodically
> announce its fields, for those receivers that have joined
> the multicast group after the initial start of transmission.
> I don't think I like receivers of a multicast IPFIX data stream
> having to know the unicast address of the transmitter, in order
> to discover what the output format is.
>
> Not currently in the IPFIX set of scenarios, but definitely a
> real world possibility, and one the protocol should support,
> IMHO.
>
> Carter
>
> Carter Bullard
> QoSient, LLC
> 300 E. 56th Street, Suite 18K
> New York, New York  10022
>
> carter@qosient.com
> Phone +1 212 588-9133
> Fax   +1 212 588-9134
> http://qosient.com
>
>
> > -----Original Message-----
> > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > Sent: Thursday, October 31, 2002 3:47 PM
> > To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> > Subject: RE: On template negotiation "complexity" in CRANE
> >
> >
> > Carter:
> >
> > A minimal CRANE exporter could send only messages that say
> > "here are the fields, no discussion"; and a minimal CRANE
> > receiver can always reply with "I agree" to any template
> > messages from the exporter. Does this meet your criteria?
> >
> > I image such a minimal implementation having a hard-coded
> > template message on the exporter, which is sent in response
> > to any template information request. On the receiver, there
> > would also be hard-coded template, which should be the same;
> > if there's a difference, that indicates the exporter isn't
> > what was expected and the collector should report a
> > configuration error (e.g., via SNMP); otherwise, the
> > collector just replies to the exporter with "I agree" and
> > then settles down to accept the actual data.
> >
> > - peter
> >
> > > -----Original Message-----
> > > From: Carter Bullard [mailto:carter@qosient.com]
> > > Sent: Thursday, October 31, 2002 12:27 PM
> > > To: 'Peter Ludemann'; ipfix-eval@net.doit.wisc.edu
> > > Subject: RE: On template negotiation "complexity" in CRANE
> > >
> > >
> > > Hey Peter,
> > >    I have the same protocol strategy in the Argus protocol,
> > > where an explicit response is required.   I'm just thinking
> > > of existing legacy flow transport strategies, where there currently
> > > isn't even a request for data.  While not a show stopper in
> > any way, I
> > > think it may need to be discussed.
> > >
> > > Regards,
> > >
> > > Carter
> > >
> > > Carter Bullard
> > > QoSient, LLC
> > > 300 E. 56th Street, Suite 18K
> > > New York, New York  10022
> > >
> > > carter@qosient.com
> > > Phone +1 212 588-9133
> > > Fax   +1 212 588-9134
> > > http://qosient.com
> > >
> > >
> > >
> > > > -----Original Message-----
> > > > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > > > Sent: Thursday, October 31, 2002 3:17 PM
> > > > To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> > > > Subject: RE: On template negotiation "complexity" in CRANE
> > > >
> > > >
> > > > Carter Bullard [mailto:carter@qosient.com] wrote
> > Thursday, October
> > > > 31, 2002 11:58 AM:
> > > >
> > > > > There is one combination that is missing that I think
> > > > > is important.
> > > > >
> > > > >   Exporter says: "I am outputting fields a,b,c,d,e,."
> > > > >   Collector says: [no response]
> > > > >   Exporter sends data.
> > > > >
> > > > > While it may seem counter-intuitive to support this option,
> > > > it is the
> > > > > current state of the industry.  Can Crane handle this type of
> > > > > negotiation?
> > > >
> > > > Yes, but not with [no response].  [no response] is not allowed by
> > > > the CRANE protocol.  Instead, use a "I agree" response.
> > The exporter
> > > > makes the final decision as to what is exported, so there is no
> > > > problem with a single collector just accepting whatever
> > it is told.
> > > >
> > > > Our general philosophy is to require some kind of an
> > acknowledgment
> > > > to all messages. (Data messages are acknowledged in groups; all
> > > > others are acknowledged
> > > > individually.) For some messages, acknowledgment can be
> > > > "asynchronous" (e.g., a request is sent with a request
> > ID, which is
> > > > used to identify the response).
> > > >
> > > > We think that it is a Bad Thing to allow silence to be
> > equivalent to
> > > > an acknowledgment. This is particularly the case for a compact
> > > > binary protocol: if there is a mismatch between what the
> > exporter is
> > > > sending and what the collector is expecting, the only
> > indication of
> > > > a problem might be when somebody notices strange values
> > showing up
> > > > in the data.
> > > >
> > > > - peter
> > > >
> > > >
> > >
> >
> >
>


--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 19:27:22 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA21537
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 19:27:22 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187PZR-00029z-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 18:21:53 -0600
Received: from [12.33.95.3] (helo=saturn.paloma.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187PZP-00029M-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 18:21:51 -0600
Received: by saturn.paloma.com with Internet Mail Service (5.5.2655.55)
	id <VKG8GRJ7>; Thu, 31 Oct 2002 19:21:34 -0500
Message-ID: <36B82C758E262241B9C6B6646F28EEA145CBB2@saturn6.paloma.com>
From: Ory Kushnir <okushnir@amaranthllc.com>
To: ipfix-eval@net.doit.wisc.edu
Subject: RE: [ipfix-eval] RE: On template negotiation "complexity" in CRAN
	E
Date: Thu, 31 Oct 2002 19:21:18 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2655.55)
Content-Type: text/plain;
	charset="iso-8859-1"
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>

I think the relevance of this thread is proportional to the possibility (and
likelihood) of interfacing with collectors that are, on one hand, capable of
parsing IPFIX data and yet are unable to perform the desired handshake at
session commencement. Furthermore, it is assumed that it is impossible to
insert a simple proxy for establishing the session with the CRANE exporter
and delegating the data stream to the legacy collectors. This seems to be a
relatively unlikely scenario, in which it is likely that the legacy
collector(s) will have as much trouble handling other IPFIX candidates. 


Regards,
Ory Kushnir



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


From majordomo@mil.doit.wisc.edu  Thu Oct 31 19:52:49 2002
Received: from mil.doit.wisc.edu (mil.doit.wisc.edu [128.104.31.31])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA22005
	for <ipfix-archive@lists.ietf.org>; Thu, 31 Oct 2002 19:52:48 -0500 (EST)
Received: from majordomo by mil.doit.wisc.edu with local (Exim 3.13 #1)
	id 187PwL-0002cI-00
	for ipfix-list@mil.doit.wisc.edu; Thu, 31 Oct 2002 18:45:33 -0600
Received: from pool-129-44-39-39.ny325.east.verizon.net ([129.44.39.39] helo=newyork.qosient.com)
	by mil.doit.wisc.edu with esmtp (Exim 3.13 #1)
	id 187PwJ-0002cD-00
	for ipfix-eval@net.doit.wisc.edu; Thu, 31 Oct 2002 18:45:31 -0600
Received: from sphynx (sphynx [192.168.0.64])
	by newyork.qosient.com (8.11.6/8.11.0) with ESMTP id gA10jTO29147;
	Thu, 31 Oct 2002 19:45:29 -0500
From: "Carter Bullard" <carter@qosient.com>
To: "'Peter Ludemann'" <peter.ludemann@xacct.com>,
        <ipfix-eval@net.doit.wisc.edu>
Subject: [ipfix-eval] RE: On template negotiation "complexity" in CRANE
Date: Thu, 31 Oct 2002 19:45:21 -0500
Message-ID: <5C8959A16A71B449AE793CF52FBBED6607A4A1@ptah.newyork.qosient.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.3416
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
In-Reply-To: <5C8959A16A71B449AE793CF52FBBED660CF1BC@ptah.newyork.qosient.com>
Precedence: bulk
Sender: majordomo listserver <majordomo@mil.doit.wisc.edu>
Content-Transfer-Encoding: 7bit

Hey Peter,
Rather than thinking that reliability must be the driving
motivator of the protocol, think about how can the protocol
be developed to provide the most utility.  Sure, if
reliability is the big thing, it needs to be there.  If
high performance is the big thing, then other strategies
may be worth investigating.  With architectural constraints,
I can build a reliable multicast network that is more reliable
than a TCP based strategy, at high rates.  It's a good real
world example.  

Requiring the IPFIX protocol to have a bidirectional control
channel, and only support unicast transport, I think is really
"short sheeting" this modern transport protocol, IMHO.

Carter

   

> -----Original Message-----
> From: Peter Ludemann [mailto:peter.ludemann@xacct.com] 
> Sent: Thursday, October 31, 2002 6:47 PM
> To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> Subject: RE: On template negotiation "complexity" in CRANE
> 
> 
> Carter:
> 
> Well, multicast (UDP) is hardly reliable, is it?
> 
> I suppose that CRANE can be turned into an unreliable 
> broadcast by doing as
> you say: assume an "OK" response when the templates are 
> announced. But I
> wouldn't recommend this: what if the packet with the template 
> information is
> lost? Confusion downstream ...
> 
> Can broadcast of change of template could be made safe? I'd 
> suggest instead
> using a reliable channel for handling such announcements. You 
> could use
> CRANE's notion of a "configuration ID" to mark data records 
> that are encoded
> with the old templates and those that are encoded under the 
> new templates.
> 
> - peter
> 
> > -----Original Message-----
> > From: Carter Bullard [mailto:carter@qosient.com]
> > Sent: Thursday, October 31, 2002 1:27 PM
> > To: 'Peter Ludemann'; ipfix-eval@net.doit.wisc.edu
> > Subject: RE: On template negotiation "complexity" in CRANE
> >
> >
> > Hey Peter,
> > I'm still thinking "here are the fields", "here is the data".
> > Here is an example of how this might be used.
> >
> > Suppose I want to transmit flow records to a multicast address.
> > The sender really doesn't care if there are particular
> > receivers, it just needs to send data.  Each of the receivers
> > however, may need to know something about the data that is
> > being received.  One way is for the IPFIX protocol to periodically
> > announce its fields, for those receivers that have joined
> > the multicast group after the initial start of transmission.
> > I don't think I like receivers of a multicast IPFIX data stream
> > having to know the unicast address of the transmitter, in order
> > to discover what the output format is.
> >
> > Not currently in the IPFIX set of scenarios, but definitely a
> > real world possibility, and one the protocol should support,
> > IMHO.
> >
> > Carter
> >
> > Carter Bullard
> > QoSient, LLC
> > 300 E. 56th Street, Suite 18K
> > New York, New York  10022
> >
> > carter@qosient.com
> > Phone +1 212 588-9133
> > Fax   +1 212 588-9134
> > http://qosient.com
> >
> >
> > > -----Original Message-----
> > > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > > Sent: Thursday, October 31, 2002 3:47 PM
> > > To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> > > Subject: RE: On template negotiation "complexity" in CRANE
> > >
> > >
> > > Carter:
> > >
> > > A minimal CRANE exporter could send only messages that say
> > > "here are the fields, no discussion"; and a minimal CRANE
> > > receiver can always reply with "I agree" to any template
> > > messages from the exporter. Does this meet your criteria?
> > >
> > > I image such a minimal implementation having a hard-coded
> > > template message on the exporter, which is sent in response
> > > to any template information request. On the receiver, there
> > > would also be hard-coded template, which should be the same;
> > > if there's a difference, that indicates the exporter isn't
> > > what was expected and the collector should report a
> > > configuration error (e.g., via SNMP); otherwise, the
> > > collector just replies to the exporter with "I agree" and
> > > then settles down to accept the actual data.
> > >
> > > - peter
> > >
> > > > -----Original Message-----
> > > > From: Carter Bullard [mailto:carter@qosient.com]
> > > > Sent: Thursday, October 31, 2002 12:27 PM
> > > > To: 'Peter Ludemann'; ipfix-eval@net.doit.wisc.edu
> > > > Subject: RE: On template negotiation "complexity" in CRANE
> > > >
> > > >
> > > > Hey Peter,
> > > >    I have the same protocol strategy in the Argus protocol,
> > > > where an explicit response is required.   I'm just thinking
> > > > of existing legacy flow transport strategies, where 
> there currently
> > > > isn't even a request for data.  While not a show stopper in
> > > any way, I
> > > > think it may need to be discussed.
> > > >
> > > > Regards,
> > > >
> > > > Carter
> > > >
> > > > Carter Bullard
> > > > QoSient, LLC
> > > > 300 E. 56th Street, Suite 18K
> > > > New York, New York  10022
> > > >
> > > > carter@qosient.com
> > > > Phone +1 212 588-9133
> > > > Fax   +1 212 588-9134
> > > > http://qosient.com
> > > >
> > > >
> > > >
> > > > > -----Original Message-----
> > > > > From: Peter Ludemann [mailto:peter.ludemann@xacct.com]
> > > > > Sent: Thursday, October 31, 2002 3:17 PM
> > > > > To: carter@qosient.com; ipfix-eval@net.doit.wisc.edu
> > > > > Subject: RE: On template negotiation "complexity" in CRANE
> > > > >
> > > > >
> > > > > Carter Bullard [mailto:carter@qosient.com] wrote
> > > Thursday, October
> > > > > 31, 2002 11:58 AM:
> > > > >
> > > > > > There is one combination that is missing that I think
> > > > > > is important.
> > > > > >
> > > > > >   Exporter says: "I am outputting fields a,b,c,d,e,."
> > > > > >   Collector says: [no response]
> > > > > >   Exporter sends data.
> > > > > >
> > > > > > While it may seem counter-intuitive to support this option,
> > > > > it is the
> > > > > > current state of the industry.  Can Crane handle 
> this type of
> > > > > > negotiation?
> > > > >
> > > > > Yes, but not with [no response].  [no response] is 
> not allowed by
> > > > > the CRANE protocol.  Instead, use a "I agree" response.
> > > The exporter
> > > > > makes the final decision as to what is exported, so 
> there is no
> > > > > problem with a single collector just accepting whatever
> > > it is told.
> > > > >
> > > > > Our general philosophy is to require some kind of an
> > > acknowledgment
> > > > > to all messages. (Data messages are acknowledged in 
> groups; all
> > > > > others are acknowledged
> > > > > individually.) For some messages, acknowledgment can be
> > > > > "asynchronous" (e.g., a request is sent with a request
> > > ID, which is
> > > > > used to identify the response).
> > > > >
> > > > > We think that it is a Bad Thing to allow silence to be
> > > equivalent to
> > > > > an acknowledgment. This is particularly the case for a compact
> > > > > binary protocol: if there is a mismatch between what the
> > > exporter is
> > > > > sending and what the collector is expecting, the only
> > > indication of
> > > > > a problem might be when somebody notices strange values
> > > showing up
> > > > > in the data.
> > > > >
> > > > > - peter
> > > > >
> > > > >
> > > >
> > >
> > >
> >
> 
> 



--
Help        mailto:majordomo@net.doit.wisc.edu and say "help" in message body
Unsubscribe mailto:majordomo@net.doit.wisc.edu and say
"unsubscribe ipfix" in message body
Archive     http://ipfix.doit.wisc.edu/archive/


