分享
 
 
 

RFC1021 - High-level Entity Management System (HEMS)

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group C. Partridge

Request For Comment: 1021 BBN/NNSC

G. Trewitt

Stanford

October 1987

THE HIGH-LEVEL ENTITY MANAGEMENT SYSTEM (HEMS)

STATUS OF THIS MEMO

An overview of the RFCs which comprise the High-Level Entity

Management System is provided. This system is eXPerimental, and is

currently being tested in portions of the Internet. It is hoped that

this work will help lead to a standard for IP internetwork

management. Distribution of this memo is unlimited.

INTRODUCTION

Until recently, a majority of critical components in IP networks,

such as gateways, have come from a very small set of vendors. While

each vendor had their own set of management protocols and mechanisms,

the collection was small, and a knowledgeable system administrator

could be expected to learn them all.

Now, however, the number of vendors has grown quite large, and the

lack of an accepted standard for management of network components is

causing severe management problems. Compounding this problem is the

explosive growth of the connected IP networks known as the Internet.

The combination of increased size and heterogeneity is making

internetwork management extremely difficult. This memo discusses an

effort to devise a standard protocol for all devices, which should

help alleviate the management problem.

The RFCs that currently define the High-Level Entity Management

System are this memo along with RFC-1022, 1024, and 1023. This list

is expected to change and grow over time, and readers are strongly

encouraged to check the RFCIndex to find the most current versions.

MONITORING AND CONTROL

Historically, the IP community has divided network management into

two distinct types of activities: monitoring and control. Monitoring

is the activity of extracting or collecting data from the network or

a part of the network to observe its behavior. Control is the

activity of taking actions to effect changes in the behavior of the

network or a part of the network in real-time, typically in an

attempt to improve the network's performance.

Note that the ability to control presupposes the ability to monitor.

Changing the behavior of the network without being able to observe

the effects of the changes is not useful. On the other hand,

monitoring without control makes some sense. Simply understanding

what is causing a network to misbehave can be useful.

Control is also a more difficult functionality to define. Control

operations other than the most generic, are usually device-specific.

The problem is not just a matter of providing a mechanism for

control, but also defining a set of control operations which are

generally applicable across a diverse set of devices. Permitting

remote applications to exercise control over an entity also implies

the need for a suite of safeguards to ensure that unauthorized

applications cannot harm the network.

Because monitoring is the key first step, in this initial design of

the system, the authors have concentrated more heavily on the

problems of effective monitoring. Although the basic control

mechanisms are defined, many components need for control, such as

strong Access control mechanisms, have not been fully defined.

OVERVIEW OF THE HEMS

The HEMS is made up of three parts: a query processor which can

reside on any addressable entity, an event generator which also

resides on entities, and applications which know how to send requests

to the query processor and interpret the replies. The query

processor and applications communicate using a message protocol which

runs over a standard transport protocol.

The Query Processor

The query processor is the key to the management system. It

interprets all monitoring and control requests. For optimal network

management, we would like to see query processors on most network

entities.

To encourage the implementations of query processors, one of the

primary goals in designing the query processor was to make it as

small and simple as possible, consistent with management

requirements.

Defining the management requirements was no small task, since the

networking community has not yet reached a consensus about what kinds

of monitoring information should be available from network entities,

nor what control functions are required to properly manage those

entities. The standards for HEMS were developed through discussions

with several interest groups, and represent the authors' best effort

to distill the varying sets of needs.

The authors settled on a system which was extensible, robust and

host-architecture independent, and as simple as possible, consistent

with the other goals. Extensibility was essential because it is

clear that management needs will continue to evolve, and a closed

system which could not be changed would be obsolete almost as soon as

it was defined. Unfortunately, extensibility is also the requirement

least consistent with simplicity since the need to make the system

extensible led the authors to use self-describing data formats and an

interpreted query language.

A robust system is required if the system is to be useful for

diagnosing network failures. If the monitoring system cannot survive

at least moderate network failures, it is not useful.

The query processor is designed to be highly extensible. An

application sends the query processor instructions about objects to

be examined or changed. The query processor locates the objects in

its host entity, and performs the requested operations. The objects

are self-describing, using the binary-encoding scheme defined in ISO

Standard ASN.1. Care has been taken to use a limited set of the

ASN.1 coding set, so that query processor's handling of data can be

optimized.

It is a key feature of HEMS that messages to the query processor

contain multiple instructions. The authors felt that this would give

much higher performance than a remote procedure system which limited

an application to one operation per message.

The set of maintained objects is standardized across all entities.

Every entity is required to manage a small set of objects. In

addition, entities of a particular type (e.g., a gateway) may be

required to manage a larger set of objects, which are optional on

other entities. Entities are also permitted to make additional,

entity-specific objects available to applications. A method for

discovering the existence of additional objects is defined.

The combination of self-describing data, the ability to add to the

standard data set, and a query language which can be easily enhanced

appeared to offer the necessary extensibility.

Event Generator

On many network entities, particularly critical network components

such as gateways, it is necessary to have a way for the devices to

send unsolicited status messages to network management centers. In

the IP community, these messages have historically been referred to

as "traps", but for compatibility with the ISO nomenclature, in the

HEMS system they are called "events".

In the HEMS system, events are handled as slightly specialized

replies to queries, and are sent to one or more management centers.

Like all other HEMS messages, events are formatted in ASN.1 format.

Each event is given a well-known code, which is standardized across

all entities. Provision is also made for entity specific event

codes.

Applications

The HEMS expects that applications will be more intelligent than the

query processor. Among other functions, the applications will have

to be able to identify and parse entity-specific values which may be

returned.

The details of applications are largely not discussed in the HEMS

specifications because there is very little that needs to be

standardized. Applications must send requests using the protocols

discussed in the next section, but the interfaces the applications

provide for displaying monitoring or control information are entirely

application dependent.

Protocols

Query processors and applications communicate using an application-

specific monitoring protocol, the High-Level Entity Management

Protocol (HEMP). This protocol provides the formatting rules for the

queries and their replies.

HEMP runs over a standard transport protocol. There was a certain

amount of debate in the community about what type of transport

protocol was best suited for monitoring. The key issue was how

reliable monitoring interactions needed to be.

The authors expect that three types of management activities will

predominate: status monitoring, firefighting, and event reporting.

Status monitoring is envisioned as occasional retrieval of monitoring

information, possibly in response to the receipt of event messages.

In these situations, the network is expected to be in good working

condition, and monitoring exchanges could probably comfortably work

with an unreliable transport protocol. The chance of data loss is

small, and probably not a serious problem since the data is unlikely

to be so important that it must be reliably delivered. (However, it

should be noted that some applications may prefer reliable delivery

because it is more convenient.)

Firefighting is a completely different situation. In this scenario,

one or more sites are using management applications to try to locate

and fix a network problem. Here we must assume that while the

network functions (i.e., data can get through), it is not very

healthy. We should assume that packets are being lost, that network

routes will be non-optimal and that it is essential that the

monitoring data (which is presumably diagnostic) get back to the

application and that control requests are reliably delivered to the

entity. In such circumstances, a reliable protocol is essential.

Events provide yet another bit of complexity. Events contain useful

status information, but experience suggests that this information

does not have to be delivered reliably. If the problem is serious

enough, it will re-occur and the event will be sent again.

Furthermore, events will often be sent to more than one management

center, which would appear to preclude the use of connection-

oriented, reliable protocols such as TCP for events.

The current decision has been to establish two possible transport

options for HEMS. More experimental systems may use the Versatile

Message Transaction Protocol (VMTP), an experimental IP transaction

protocol. Near term production systems can use a combination of the

Transmission Control Protocol (TCP) and the User Datagram Protocol

(UDP), as described in RFC-1022.

Compatibility with Common Management Information Protocol (CMIP)

Several groups have expressed interest in being able to develop

applications which can use both HEMS and the emerging ISO-defined

Common Management Information Protocol (CMIP). It turns out that

such a co-existence is feasible, and the authors have made an effort

to accomodate it.

At the highest level, both CMIP and HEMS perform operations on

objects stored in remote entities, and both systems use ASN.1

formatting to represent those objects. This makes it possible to

develop a standard set of interface routines which can be used to

access either system, even though underlying mechanics of the systems

are quite different.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有