分享
 
 
 

RFC869 - Host Monitoring Protocol

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

RFC- 869

A Host Monitoring Protocol

Robert M. Hinden

BBN Communications Corporation

December 1983

RFC-869 December 1983

Table of Contents

1 IntrodUCtion.......................................... 1

2 General Description................................... 3

3 Relationship to Other Protocols....................... 6

4 Protocol Operation.................................... 7

5 Header Formats....................................... 12

5.1 IP Headers......................................... 12

5.2 HMP Header......................................... 13

6 HMP Monitoring Center Message Formats................ 16

6.1 Message Type 100: Polling Message.................. 16

6.2 Message Type 101: Error in Poll.................... 18

6.3 Message Type 102: Control acknowledgment........... 20

A Appendix A - IMP Monitoring.......................... 21

A.1 Message Type 1: IMP Trap........................... 21

A.2 Message Type 2: IMP status......................... 24

A.3 Message Type 3: IMP Modem Throughput............... 29

A.4 Message Type 4: IMP Host Throughput................ 32

B Appendix B - TAC Monitoring.......................... 35

B.1 Message Type 1: TAC Trap Message................... 35

B.2 Message Type 2: TAC Status......................... 38

B.3 Message Type 3: TAC Throughput..................... 42

C Appendix C - Gateway Monitoring...................... 47

C.1 Gateway Parameters................................. 47

C.2 Message Type 1: Gateway Trap....................... 48

C.3 Message Type 2: Gateway Status..................... 51

C.4 Message Type 3: Gateway Throughput................. 58

C.5 Message Type 4: Gateway Host Traffic Matrix........ 64

C.6 Message Type 6: Gateway Routing.................... 67

-i-

RFC-869 December 1983

Replaces IEN-197

A Host Monitoring Protocol

1 Introduction

The Host Monitoring Protocol (HMP) is used to collect

information from hosts in various networks. A host is

defined as an addressable Internet entity that can send and

receive messages; this includes hosts such as server hosts,

personal work stations, terminal concentrators, packet switches,

and gateways. At present the Host Monitoring Protocol is being

used to collect information from Internet Gateways and TACs, and

implementations are being designed for other hosts. It is

designed to monitor hosts spread over the internet as well as

hosts in a single network.

This document is organized into three parts. Section 2 and

3 contains a general description of the Host Monitoring protocol

and its relationship to other protocols. Section 4 describes

how it operates. Section 5 and 6 contain the descriptions and

formats of the HMP messages. These are followed by appendices

containing the formats of messages sent by some of the hosts that

use the HMP to collect their monitoring information. These

appendicies included as examples only and are not part of the HMP

protocol.

-1-

RFC-869 December 1983

This document replaces the previous HMP document "IEN-197, A

Host Monitoring Protocol."

-2-

RFC-869 December 1983

2 General Description

The Host Monitoring Protocol is a transaction-oriented

(i.e., connection-less) transport protocol. It was designed to

facilitate certain simple interactions between two internet

entities, one of which may be considered to be "monitoring" the

other. (In discussing the protocol we will sometimes speak of a

"monitoring host" and a "monitored entity".) HMP was intended to

be a useful transport protocol for applications that involve any

or all of the following three different kinds of interactions:

- The monitored entity sometimes needs to send unsolicited

datagrams to the monitoring host. The monitoring host

should be able to tell when messages from the monitored

entity have been lost in transit, and it should be able to

determine the order in which the messages were sent, but the

application does not require that all messages be received

or that they be received strictly in the same sequence in

which they were sent.

- The monitoring host needs to gather data from the monitored

entity by using a query-response protocol at the application

level. It is important to be able to determine which query

is being answered by a particular response, and to determine

whether successive responses are duplicates of previous

ones.

- The monitoring host must be able to initiate certain control

functions in the monitored entity, possibly including the

setting of parameters in the monitored entity. The

monitoring host needs to know if the control function has

been carried out.

In addition, we assume that a given monitoring host may be

monitoring several different types of entities simultaneously,

and may be gathering several different types of data from a given

-3-

RFC-869 December 1983

type of monitored entity. Several different monitoring hosts may

be monitoring a given entity, and several processes on the same

host may even be monitoring the same entity.

Messages from the monitoring host to the monitored entity

are called "polls". They need to contain enough information to

allow the monitored entity to make the following determinations:

- The monitored entity must be able to determine that this

message is in fact a poll from a monitoring host. The

"system type," "message type," and "passWord" fields in the

HMP header have been defined to meet this need.

- The monitored entity may need to be able to identify the

particular process on the monitoring host that sent this

poll, so it can send its response back to the right process.

The "port number" field in the HMP header has been defined

to meet this need.

- The monitored entity must be able to indicate to the

monitoring host, in its response, precisely which query is

being answered by a particular response. The "sequence

number field" has been defined to meet this need.

- The monitored entity must be able to determine just what

kind of action the monitoring host is requesting. That is,

the HMP transport protocol must provide some way of

multiplexing and demultiplexing the various higher-level

applications which use it. The "R-message type" and "R-

suBType" fields of the polling message have been defined to

meet this need.

Messages from the monitored entity to the monitoring host

need to contain enough information to enable the monitoring host

to make the following determination:

- The monitoring host must be able to route this message to

the correct process. The "port number" field meets this

need.

-4-

RFC-869 December 1983

- The monitoring host must be able to match up received

messages with the polls, if any, that elicited them. The

"returned sequence number" field in the HMP header has been

defined to meet this need.

- The monitoring host must be able to determine which higher

level application should receive a particular message. The

"system type" and "message type" fields are used for this

purpose.

- The monitoring host must be able to determine whether some

messages of a given type were lost in transit, and whether

messages have arrived out of sequence. Although this

function, strictly speaking, belongs to the application and

not to the transport layer, the HMP header contains a

"sequence number" for this purpose.

In addition, a simple one's complement checksum is provided

in the HMP header to detect data corruption during transmission.

-5-

RFC-869 December 1983

3 Relationship to Other Protocols

The Host Monitoring Protocol is a transport protocol

designed to fit into the layered internet protocol environment.

It operates on top of the Internet/ICMP protocol and under

applications that require its services. This relationship is

illustrated in the following diagram:

+------+ +------+ +-------+ +------+

TELNET ... FTP GATEWAY ... TAC Application Layer

+------+ +------+ +-------+ +------+

__________ _____________

+------+ +-------+

TCP HMP Transport Layer

+------+ +-------+

+-------------------------------------+

Internet Protocol & ICMP Internetwork Layer

+-------------------------------------+

+------------------------+

Local Network Protocol Network Layer

+------------------------+

If internetwork services are not required it should be possible

to run the HMP without an Internetwork layer. As long as HMPs'

service requirnments (addressing, protocol demultiplexing, and

occasional delivery) are met it should run over a variety of

protocols.

-6-

RFC-869 December 1983

4 Protocol Operation

The HMP is built around the idea that most of the

intelligence needed to monitor a host should reside in a

monitoring center, not in the host. The host should be required

only to collect data and send it to the monitoring center, either

spontaneously or on request from the monitoring center. The host

is not responsible for insuring that the data arrives reliably

(except that it checksums the data); instead, the monitoring

center is responsible for ensuring that the data it requests is

received correctly.

Consequently, the HMP is based on polling hosts for

messages. When the monitoring center requires a particular type

of data (e.g., throughput data), it sends a poll to the host

requesting that type of report. The host, upon receiving the

poll, responds with its latest set of collected data. If the

host finds that the poll is incorrect (e.g., if the poll was for

throughput data and the host is not collecting throughput data),

it responds with an error message. The monitoring center waits a

reasonable length of time for the host to answer its poll. If no

response is received, it sends another poll for the same data.

In this way, if either a poll or the response is lost, the

correct data is still collected.

-7-

RFC-869 December 1983

The HMP is used to collect three different classes of data:

o Spontaneous Events (or Traps)

o Current status

o Statistical data collected over time

These classes of data allow a host to send data in a manner best

suited to the data. For instance, the host may quickly inform

the monitoring center that a particular event has happened by

sending a trap message, while the monitoring center is reliably

collecting the host's throughput and accounting data.

Traps report spontaneous events, as they occur, to the

monitoring center. In order to insure their prompt delivery, the

traps are sent as datagrams with no reliability mechanisms

(except checksums) such as acknowledgments and retransmissions.

Trap messages usually contain an identifier to indicate which

event is being reported, the local time in the host that the

event occured, and data pertinent to the event. The data portion

is intended to be host and event specific.

Status information, the second type of data collected by the

Host Monitoring Protocol describes the current state of the host.

Status information is useful at one point, but it does not have

to be collected cumulatively over a certain period of time. Only

the latest status is of interest; old status provides no useful

information. The monitoring center collects status information

-8-

RFC-869 December 1983

by sending a poll for status to a host. Upon receiving the poll,

the host responds with its latest status information, always

creating a new status message. If the monitoring center does not

receive a response to its poll, it sends another poll. The

monitoring center can decide if the host is up or down based on

whether the host responds to its polls.

The third type of data collected by the HMP is statistical

data. These are measurements taken over time, such as the number

of packets sent or received by a host and the count of packets

dropped for a particular reason. It is important that none of

this type of data be lost. Statistical data is collected in a

host over a time interval. When the collection time interval

eXPires, the current data is copied to another area, and the

counters are cleared. The copied data is sent to the monitoring

center when the host receives a poll requesting statistical

information. If another poll is received before the collection

time interval has expired, the data in the buffer is sent again.

The monitoring center can detect duplicate messages by using the

sequence number in the header of the message, since each type of

statistical data has its own sequence number counter.

The collection frequency for statistics messages from a

particular host must be relatively long compared to the average

round trip message time between the monitoring center and that

host inorder to allow the monitoring center to re-poll if it does

-9-

RFC-869 December 1983

not receive an answer. With this restriction, it should be

possible to avoid missing any statistics messages. Each

statistics message contains a field giving the local time when

the data was collected and the time at which the message was

sent. This information allows the monitoring center to schedule

when it sends a poll so that the poll arrives near the beginning

of each collection period. This ensures that if a message is

lost, the monitoring center will have sufficient time to poll

again for the statistics message for that period.

The HMP also includes a provision to send data to and read

parameters in hosts. The data may be used to set switches or

interval timers used to control measurements in a host, or to

control the host itself (e.g. a restart switch). The format of

the data and parameters is host specific.

To send data to a host, the monitoring center sends the host

a poll for a control-acknowledgment message. This poll message

includes the type of the data and the data being sent. When the

host receives this poll, it processes the data and responds with

a control-acknowledgment message.

To read parameters in a host, the monitoring center will

send a poll for parameters to the host. This poll includes the

type of the parameters being read. When the host receives this

poll, it will send the parameters of the requested type to the

-10-

RFC-869 December 1983

monitoring center in a parameters message.

-11-

RFC-869 December 1983

5 Header Formats

Host Monitor Protocol messages have the following format:

+----------------+

Local Network

Header(s)

+----------------+

IP header

+----------------+

HMP

Header

+----------------+

D

A

T

A

+----------------+

Padding

+----------------+

5.1 IP Headers

HMP messages are sent using the version 4 IP header as described

in RFC-791 "Internet Protocol." The HMP protocol number is 20

(decimal). The time to live field should be set to a reasonable

value for the hosts being monitored.

All other fields should be set as specified in RFC-791.

-12-

RFC-869 December 1983

5.2 HMP Header

The HMP header format is:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 System Type Message Type

+---------------+---------------+

1 Port Number Control Flag

+---------------+---------------+

2 Sequence Number

+---------------+---------------+

3 Password or Returned Seq. #

+---------------+---------------+

4 One's Complement Checksum

+---------------+---------------+

HMP FIELDS:

System Type

Message Type

The combination of system type and message type determines

the format of the data in the monitoring message.

The system types which have been defined are:

System Type Meaning

----------------+-----------------

1 Monitoring Host

2 IMP

3 TAC

4 Gateway

5 SIMP

6 BBN VAX/C70 TCP

7 PAD

8 Reserved

9 TIU

10 FEP

11 Cronus Host

12 Cronus MCS

-13-

RFC-869 December 1983

Message types are defined and used for each system type

according to the needs of that system. The message types

currently defined are:

Type Description

----------+--------------------------

1 Trap

2 Status

3 Thruput

4 HTM - Host Traffic Matrix

5 Parameters

6 Routing

7 Call Accounting

100 Poll

101 Error

102 Control Acknowledgment

Port Number

This field can be used to multiplex similar messages to/from

different processes in one host. It is currently unused.

Control Flag

This field is used to pass control information. Currently

Bit 15 is defined as the "More bit" which is used in a

message in responce to a poll to indicate that there is more

data to poll for.

Sequence Number

Every message contains a sequence number. The sequence

number is incremented when each new message of that type is

sent.

Password or Returned Sequence Number

The Password field of a polling message from an monitoring

center contains a password to verify that the monitoring

center is allowed to gather information. Responses to

polling messages copy the Sequence Number from the

polling message and return it in this field for

-14-

RFC-869 December 1983

identification and round-trip time calculations.

Checksum

The Checksum field is the one's complement of the one's

complement sum of all the 16-bit words in the header and

data area.

-15-

RFC-869 December 1983

6 HMP Monitoring Center Message Formats

6.1 Message Type 100: Polling Message

Description

The monitoring center will send polls to the hosts it is

monitoring to collect their monitoring data. When the host

receives a poll it will return a message of the type

requested. It will only answer a poll with the correct

system type and password and will return an error message

(Message Type 101) if it receives a poll for the wrong

system type or an unsupported message type.

The Poll message includes a facility to send data to a

monitored host. The poll message to send data consists of a

poll for a Control Acknowledgment message (type 102)

followed by the data. The R-Subtype specifies the type of

the data that is being sent. When the monitored host

receives a Poll for a Control acknowledgment, it processes

the data, and then responds with an Control acknowledgment

message. If the monitored host can not process the data, it

should respond with an error message.

A poll to read parameters consists a poll for a Parameters

message. The R-Subtype specifies the type of parameters

being read. When the monitored host receives a poll for a

Parameters message, it responds with a Parameters message

containing the requested information.

A polling message has the following form:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 R-Message Type R-Subtype

+---------------+---------------+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

1 Data

+ +

2

+ +

. .

. .

n

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

-16-

RFC-869 December 1983

HMP FIELDS

System Type

The type of machine being polled.

Message Type

Polling Message = 100

Port Number

Unused

Control Flag

Unused

Sequence Number

The sequence number identifies the polling request. The

Monitoring Center will maintain separate sequence numbers

for each host it monitors. This sequence number is returned

in the response to a poll and the monitoring center will use

this information to associate polls with their responses and

to determine round trip times.

Password

The monitoring password.

POLL FIELDS

R-Message Type

The message type requested.

R-Subtype

This field is used when sending data and reading parameters

and it specifies the type of the data being sent or

parameters being read.

Data

When the poll is requesting a Control Acknowledgment

message, data is included in the poll message. A poll for

any other type of message does not include any data . The

contents of the data is host specific.

-17-

RFC-869 December 1983

6.2 Message Type 101: Error in Poll

Description

This message is sent in response to a faulty poll and

specifies the nature of the error.

An error message has the following form:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Error Type

+---------------+---------------+

1 R-Message Type R-Subtype

+---------------+---------------+

HMP FIELDS

System Type

The type of machine sending message.

Message Type

Error Message = 101

Port Number

Unused

Control Flag

Unused

Sequence Number

A 16 bit number incremented each time an error message is

sent.

Returned Sequence Number

The Sequence Number of the polling message which caused the

error.

-18-

RFC-869 December 1983

ERROR MESSAGE FIELDS

Error Type

This field specifies the nature of the error in the poll.

The following error types have been defined.

1 = Reason unspecified.

2 = Bad R-Message Type.

3 = Bad R-Subtype.

4 = Unknown parameter

5 = Invalid parameter value

6 = Invalid parameter/value format

7 = Machine in Loader

R-Message Type

R-Subtype

These fields identify the poll request in error.

-19-

RFC-869 December 1983

6.3 Message Type 102: Control acknowledgment

Description

This message is sent in response to a poll for this type of

message. It is used to acknowledge poll messages that are

used to set parameters in the monitored host.

The Control acknowledgment has no fields other than the HMP

header.

HMP FIELDS

System Type

The type of the system sending the message.

Message Type

Control acknowledgment = 102

Port Number

Unused

Control Flag

Unused

Sequence Number

A 16 bit number incremented each time a Control

acknowledgment message is sent.

Returned Sequence Number

The Sequence Number of the polling message which requested

this message.

-20-

RFC-869 December 1983

A Appendix A - IMP Monitoring

A.1 Message Type 1: IMP Trap

Description

When a trap occurs, it is buffered in the IMP and sent as

soon as possible. Trap messages are unsolicited. If traps

happen in close sequence, several traps may be sent in one

message.

Through the use of sequence numbers, it will be possible to

determine how many traps are being lost. If it is

discovered that many are lost, a polling scheme might be

implemented for traps.

A IMP trap message has the following form:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 # of traps lost

+---------------+---------------+

1 : first :

. : trap :

. : data :

. +---------------+---------------+

. : additional :

. : trap :

. : data :

+---------------+---------------+

HMP Fields

System Type

IMP = 2

Message Type

IMP Trap Message = 1

Port Number

Unused

-21-

RFC-869 December 1983

Control Flag

Unused

Password

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the HM can order the received trap messages and

detect missed messages.

IMP TRAP FIELDS

# of traps lost

Under certain conditions, an IMP may overflow its internal

trap buffers and be unable to save traps to send. This

counter keeps track of such occurrences.

Trap Reports

There can be several blocks of trap data in each message.

The format for each such block is below.

+---------------+---------------+

Size

+---------------+---------------+

Time

+---------------+---------------+

Trap ID

+---------------+---------------+

: Trap :

: Data :

+---------------+---------------+

Size

Size is the number of 16 bit words in the trap, not counting

the size field.

Time

The time (in 640 ms. units) at which the trap occurred.

-22-

RFC-869 December 1983

This field is used to sequence the traps in a message and

associate groups of traps.

Trap ID

This is usually the program counter at the trap. The ID

identifies the trap, and does not have to be a program

counter, provided it uniquely identifies the trap.

Trap Data

The IMP returns data giving more information about the trap.

There are usually two entries: the values in the accumulator

and the index register at the occurrence of the trap.

-23-

RFC-869 December 1983

A.2 Message Type 2: IMP status

Description

The status message gives a quick summary of the state of the

IMP. Status of the most important features of the IMP are

reported as well as the current configuration of the

machine.

The format of the status message is as follows:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Software Version Number

+---------------+---------------+

Last Trap Message

+---------------+---------------+

Max # Hosts Max # Modems

+---------------+---------------+

Max # Channels Max # IMPs

+---------------+---------------+

Package bits 0-15.

+---------------+---------------+

5 Package bits 16.-31.

+---------------+---------------+

+ Crash +

+ Data +

+---------------+---------------+

Anomalies

+---------------+---------------+

10 Free Pool S+F Pool

+---------------+---------------+

Reassembly Pool Allocated Pool

+---------------+---------------+

HIHD0 HIHD1 HIHD2 HIHD3

. +---------------+---------------+

. : HIHD4 ............... :

. +---------------+---------------+

(cont.)

-24-

RFC-869 December 1983

Imp Status (cont.)

. +---------------+---------------+

. Modem

. + State +

. Data

. +---------------+---------------+

. : Modem State :

. : Data...... :

+---------------+---------------+

HMP FIELDS

System Type

IMP = 2

Message Type

IMP status message = 2

Port Number

Unused

Control Flag

Unused

Sequence Number

A 16 bit number incremented each time a status message is

sent.

Password

The password contains the sequence number of the polling

message to which this message responds.

IMP STATUS FIELDS

Software Version Number

The IMP version number.

-25-

RFC-869 December 1983

Last Trap Message

Contains the sequence number of the last trap message sent

to the HM. This will allow the HM to detect how many trap

messages are being lost.

Hosts

The number of configured hosts in this system.

Modems

The number of configured modems in this system.

Channels

The maximum possible number of IMP-IMP channels in this

system.

IMPs

The maximum possible number of IMPs in this system.

Package Bits

This is a bit encoded word that reports the set of packages

currently loaded in the system. The table below defines the

bits.

-26-

RFC-869 December 1983

Bit Package

(octal)

(1st Word)

1 VDH

2 Logical address tables

4 Mezmode

10 Cumulative Statistics

20 Trace

40 TTY

100 DDT

200 HDLC

400 HDH

1000 Cassette Writer

2000 Propagation Delay Measurement

4000 X25

10000 Profile Measurements

20000 Self Authenticating Password

40000 Host traffic Matrix

100000 Experimental/Special

(2nd Word)

1 End-to-end Statistics

2 Store and Forward statistics

Crash Data

Crash data reports the circumstances surrounding an

unexpected crash. The first word reports the location of

the crash and the following two are the contents of the

accumulator and index registers.

Anomalies

Anomalies is a collection of bit flags that indicate the

state of various switches or processes in the IMP. These

are very machine dependent and only a representative

sampling of bits is listed below.

Bit Meaning

(octal)

20 Override ON

200 Trace ON

1000 Statistics ON

2000 Message Generator ON

4000 Packet Trace ON

10000 Host Data Checksum is BAD

20000 Reload Location SET

-27-

RFC-869 December 1983

Buffer Pool Counts

These are four bytes of counters indicating the current

usage of buffers in the IMP. The four counters are: free

buffers, store-and-forward buffers, reassembly buffers and

allocated buffers.

HIHD0 - HIHDn

Each four bit HIHD field gives the state of the

corresponding host.

Value Meaning

0 UP

1 ready line down

2 tardy

3 non-existent

Modem State Data

Modem state data contains six fields of data distributed

over four words. The first field (4 bits) indicates the

line speed; the second field (4 bits) is the number of the

modem that is used by the neighboring IMP on this line; the

third field (8 bits) is the number of line protocol ticks

covered by this report; the fourth (1 bit) indicates line

down(1) or up(0); the fifth (7 bits) is the IMP number of

neighbor IMP on the line; and the sixth (8 bits) is a count

of missed protocol packets over the interval specified in

the third field.

-28-

RFC-869 December 1983

A.3 Message Type 3: IMP Modem Throughput

Description

The modem throughput message reports traffic statistics for

each modem in the system. The IMP will collect these data at

regular intervals and save them awaiting a poll from the HM.

If a period is missed by the HM, the new results simply

overwrite the old. Two time stamps bracket the collection

interval (data-time and prev-time) and are an indicator of

missed reports. In addition, mess-time indicates the time

at which the message was sent.

The modem throughput message will accommodate up to fourteen

modems in one packet. A provision is made to split this

into multiple packets by including a modem number for the

first entry in the packet. This field is not immediately

useful, but if machine sizes grow beyond fourteen modems or

if modem statistics become more detailed and use more than

three words per modem, this can be used to keep the message

within a single ARPANET packet.

The format of the modem throughput message is as follows:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Mess-Time

+---------------+---------------+

Software Version Number

+---------------+---------------+

Data-Time

+---------------+---------------+

Prev-Time

+---------------+---------------+

Total Modems This Modem

+---------------+---------------+

5

. + modem +

.

. + throughput +

.

. +---------------+---------------+

. : modem :

. : :

. : throughput :

+---------------+---------------+

-29-

RFC-869 December 1983

HMP FIELDS

System Type

IMP = 2

Message Type

IMP Modem Throughput message = 3

Port Number

Unused

Control Flag

Unused

Sequence Number

A 16 bit number incremented at each collection interval

(i.e. when a new throughput message is assembled). The HM

will be able to detect lost or duplicate messages by

checking the sequence numbers.

Password

The password contains the sequence number of the polling

message to which this message responds.

IMP MODEM THROUGHPUT FIELDS

Mess-time

The time (in 640ms. units) at which the message was sent to

the HM.

Software Version Number

The IMP version number.

Data-Time

Data-time is the time (in 640ms. units) when this set of

data was collected. (See Description.)

-30-

RFC-869 December 1983

Prev-Time

Prev-time is the time (in 640 ms. units) of the previous

collection of data (and therefore, is the time when the data

in this message began accumulating.)

Total Modems

This is the number of modems in the system.

This Modem

This Modem is the number of the first modem reported in this

message. Large systems that are unable to fit all their

modem reports into a single packet may use this field to

separate their message into smaller chunks to take advantage

of single packet message efficiencies.

Modem Throughput

Modem throughput consists of three words of data

reporting packets and words output on each modem. The

first word counts packets output and the following two

count word throughput. The double precision words are

arranged high order first. (Note also that messages from

Honeywell type machines (316s, 516s and C30s) use a fifteen

bit low order word.) The first block reports output on the

modem specified by "This Modem". The following blocks

report on consecutive modems.

-31-

RFC-869 December 1983

A.4 Message Type 4: IMP Host Throughput

Description

The host throughput message reports traffic statistics for

each host in the system. The IMP will collect these data at

regular intervals and save them awaiting a poll from the HM.

If a period is missed by the HM, the new results simply

overwrite the old. Two time stamps bracket the collection

interval (data-time and prev-time) and are an indicator of

missed reports. In addition, mess-time indicates the time

at which the message was sent.

The host throughput format will hold only three hosts if

packet boundaries are to be respected. A provision is made

to split this into multiple packets by including a host

number for the first entry in the packet.

The format of the host throughput message is as follows:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Mess-Time

+---------------+---------------+

Software Version Number

+---------------+---------------+

Data-Time

+---------------+---------------+

Prev-Time

+---------------+---------------+

Total Hosts This Host

+---------------+---------------+

5 : host :

. : throughput :

+---------------+---------------+

HMP FIELDS

System Type

IMP = 2

Message Type

IMP host Throughput message = 4

-32-

RFC-869 December 1983

Port Number

Unused

Control Flag

Unused

Sequence Number

A 16 bit number incremented at each collection interval

(i.e. when a new throughput message is assembled). The HM

will be able to detect lost or duplicate messages by

checking the sequence numbers.

Password

The password contains the sequence number of the polling

message to which this message responds.

IMP HOST THROUGHPUT FIELDS

Mess-time

The time (in 640ms. units) at which the message was sent to

the HM.

Software Version Number

The IMP version number.

Data-Time

Data-time is the time (in 640ms. units) when this set of

data was collected. (See Description.)

Prev-Time

Prev-time is the time (in 640 ms. units) of the previous

collection of data (and therefore, is the time when the data

in this message began accumulating.)

Total Hosts

The total number of hosts in this system.

This Host

This host is the number of the first host reported in this

-33-

RFC-869 December 1983

message. Large systems that are unable to fit all their

host reports into a single packet may use this field to

separate their message into smaller chunks to take advantage

of single packet message efficiencies.

Host Throughput

Each host throughput block consists of eight words in the

following format:

+---------------+---------------+

messages to network

+---------------+---------------+

messages from network

+---------------+---------------+

packets to net

+---------------+---------------+

packets from net

+---------------+---------------+

messages to local

+---------------+---------------+

messages from local

+---------------+---------------+

packets to local

+---------------+---------------+

packets from local

+---------------+---------------+

Each host throughput message will contain several blocks of

data. The first block will contain data for the host

specified in First Host Number. Following blocks will

contain data for consecutive hosts. All counters are single

precision.

-34-

RFC-869 December 1983

B Appendix B - TAC Monitoring

B.1 Message Type 1: TAC Trap Message

Description

When a trap occurs, it is buffered in the TAC and sent as

soon as possible. Trap messages are unsolicited. If traps

happen in close sequence, several traps may be sent in one

message.

Through the use of sequence numbers, it will be possible to

determine how many traps are being lost. If it is

discovered that many are lost, a polling scheme might be

implemented for traps.

A TAC trap message has the following form:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Version #

+---------------+---------------+

1 : first :

. : trap :

. : data :

. +---------------+---------------+

. : additional :

. : trap :

. : data :

+---------------+---------------+

HMP FIELDS

System Type

TAC = 3

Message Type

TAC Trap Message = 1

Port Number

Unused

-35-

RFC-869 December 1983

Control Flag

Unused

Password or Returned Sequence Number

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the HM can order the received trap messages and

detect missed messages.

TAC TRAP FIELDS

Version #

The version # of the TAC Software.

Trap Reports

There can be several blocks of trap data in each message.

The format of the trap data is as follows:

+---------------+---------------+

Size

+---------------+---------------+

Time

+---------------+---------------+

Trap ID

+---------------+---------------+

: Trap :

: Data :

+---------------+---------------+

Count

+-------------------------------+

Size

Size is the number of 16 bit words in the trap, not counting

the size field.

Time

The time (in 640ms. units) at which the trap occurred. This

field is used to sequence the traps in a message and

-36-

RFC-869 December 1983

associate groups of traps.

Trap ID

This is (usually) the program counter at the trap. The ID

identifies the trap, and does not have to be a program

counter, provided that it uniquely identifies the trap.

Trap Data

The TAC returns data giving more information about the trap.

There are usually two entries: the values in the accumulator

and the index register at the occurrence of the trap.

Count

The TAC Counts repetitions of the same trap ID and reports

this count here.

-37-

RFC-869 December 1983

B.2 Message Type 2: TAC Status

Description

The status message gives a quick summary of the state of the

TAC. Status of the most important features of the TAC are

reported as well as the current configuration of the

machine.

A TAC status message has the following form:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

---------------+---------------+

0 Version Number

+---------------+---------------+

Last Trap Message

+---------------+---------------+

Bit Flags

+---------------+---------------+

Free PDB count

+---------------+---------------+

Free MBLK count

+---------------+---------------+

5 # of TCP connections

+---------------+---------------+

# of NCP connections

+---------------+---------------+

INA A Register

+---------------+---------------+

INA X Register

+---------------+---------------+

INA B Register

+---------------+---------------+

l0 restart/reload

+---------------+---------------+

+ Crash +

+ Data +

13

+---------------+---------------+

-38-

RFC-869 December 1983

HMP FIELDS

System Type

TAC = 3

Message Type

TAC Status Message = 2

Port Number

Unused

Control Flag

Unused

Sequence Number

A 16 bit number incremented each time a status message is

sent.

Returned Sequence Number

Contains the sequence number from the polling message

requesting this report.

TAC STATUS FIELDS

Version Number

The TAC's software version number.

Last Trap Message

Contains the sequence number of the last trap message sent

to the HM. This will allow the HM to detect how many trap

messages are being lost.

-39-

RFC-869 December 1983

Bit Flags

There are sixteen bit flags available for reporting the

state of various switches (hardware and software) in the

TAC. The bits are numbered as follows for purposes of the

discussion below.

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

The bit flags report the status of the following:

Bit Meaning

15 0 => DDT override off; 1 => override on.

11-14 0 => Sense Switch n is off; 1 => SSn on.

10 0 => Traps to remote monitor;

1 => Traps to console.

9 1 => Message generator on.

0-8 unused

Free PDB count

The number of PDBs on the free queue.

Free MBLK count

The number of MBLKs on the free queue.

# of TCP connections

# of NCP connections

The number of open connections for each protocol.

INA Report

These three fields report the values retained by an INA 1011

instruction in a C/30. This instruction returns micro-

machine status and errors. In a #316, the fields are

meaningless.

-40-

RFC-869 December 1983

Restart/Reload

This word reports a restart or reload of the TAC

Value Meaning

1 restarted

2 reloaded

Crash Data

Crash data reports the circumstances surrounding an

unexpected crash. The first word reports the location of

the crash and the following two are the contents of the

accumulator and index registers.

-41-

RFC-869 December 1983

B.3 Message Type 3: TAC Throughput

Description

The TAC throughput message reports statistics for the

various modules of the TAC. The TAC will collect these data

at regular intervals and save them awaiting a poll from the

HM. If a period is missed by the HM, the new results simply

overwrite the old. Two time stamps bracket the collection

interval (data-time and prev-time) and are an indicator of

missed reports. In addition, mess-time indicates the time

at which the message was sent.

A TAC throughput message has the following form:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+---------------+---------------+

0 Mess-Time

+---------------+---------------+

Data-Time

+---------------+---------------+

Prev-Time

+---------------+---------------+

Version Number

+---------------+---------------+

Last Trap Message

+---------------+---------------+

5 Bit Flags

+---------------+---------------+

Free PDB count

+---------------+---------------+

Free MBLK count

+---------------+---------------+

# of TCP connections

+---------------+---------------+

# of NCP connections

+---------------+---------------+ ----

10 Host Input Throughput ^

+---------------+---------------+

Host Input Abort Count

+---------------+---------------+

Host Input Garbled Count

+---------------+---------------+

Host Output Throughput 1822 info.

+---------------+---------------+

(continued)

-42-

RFC-869 December 1983

TAC throughput (cont.)

+---------------+---------------+

Host Output Abort Count 1822 info.

+---------------+---------------+

15 Host Down Count v

+---------------+---------------+ ----

# of datagrams sent ^

+---------------+---------------+

# of datagrams received

+---------------+---------------+ IP info.

# of datagrams discarded

+---------------+---------------+

# of fragments received v

+---------------+---------------+

20 # of fragments discarded v

+---------------+---------------+ ----

# of segments sent ^

+---------------+---------------+

# of segments received

+---------------+---------------+

# of segments discarded

+---------------+---------------+ TCP info.

# of octets sent

+---------------+---------------+

25 # of octets received

+---------------+---------------+

# of retransmissions v

+---------------+---------------+ ----

HMP FIELDS

System Type

TAC = 3

Message Type

TAC Throughput Message = 3

Port Number

Unused

Control Flag

Unused

-43-

RFC-869 December 1983

Sequence Number

A 16 bit number incremented at each collection interval

(i.e. when a new throughput message is assembled). The HM

will be able to detect lost or duplicate messages by

checking the sequence numbers.

Returned Sequence Number

Contains the sequence number from the polling message

requesting this report.

TAC THROUGHPUT FIELDS

Mess-time

The time (in 640ms. units) at which the message was sent to

the HM.

Data-Time

Data-time is the time (in 640ms. units) when this set of

data was collected. (See Description.)

Prev-Time

Prev-time is the time (in 640 ms. units) of the previous

collection of data (and therefore, is the time when the data

in this message began accumulating.)

Version Number

The TAC's software version number.

Last Trap Message

Contains the sequence number of the last trap message sent

to the HM. This will allow the HM to detect how many trap

messages are being lost.

Bit Flags

There are sixteen bit flags available for reporting the

state of various switches (hardware and software) in the

TAC. The bits are numbered as follows for purposes of the

discussion below.

-44-

RFC-869 December 1983

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

The bit flags report the status of the following:

Bit Meaning

15 0 => DDT override off; 1 => override on.

11-14 0 => Sense Switch n is off; 1 => SSn on.

10 0 => Traps to remote monitor;

1 => Traps to console.

9 1 => Message generator on.

0-8 unused

Free PDB count

The number of PDBs on the free queue.

Free MBLK count

The number of MBLKs on the free queue.

# of TCP connections

# of NCP connections

The number of open connections for each protocol.

1822 info.

These six fields report statistics which concern the

operation of the 1822 protocol module, i.e. the interface

between the TAC and its IMP.

IP info.

These five fields report statistics which concern Internet

Protocol in the TAC.

TCP info.

-45-

RFC-869 December 1983

These six fields report statistics which concern TCP

protocol in the TAC.

-46-

RFC-869 December 1983

C Appendix C - Gateway Monitoring

C.1 Gateway Parameters

The gateway supports parameters to set Throughput and Host

traffic matrix measurements. The type of parameters and the

parameter and data pairs are as follows:

Throughput - Type = 3

Parm. Description Control Data Word

----- ----------- -----------------

1 Start/Stop 0=Stop,1=Start

2 Collection Interval Time in 1 minute

ticks

Host Traffic Matrix - Type = 4

Parm. Description Control Data Word

----- ----------- -----------------

1 Start/Stop 0=Stop,1=Start

2 Collection Interval Time in 1 minute

ticks

3 HTM Switch Control Include Control

Protocols

-47-

RFC-869 December 1983

C.2 Message Type 1: Gateway Trap

Description

When traps occur in the gateway they are buffered. At a

fixed time interval (currently 10 seconds) the gateway will

send any traps that are in the buffer to the monitoring

center. The traps are sent as unsolicited messages.

A Gateway trap message has the following format:

0 0 0 1

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Gateway Version #

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Size of Trap Entry ;First Trap

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Time of Trap

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Trap ID

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Process ID

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R0

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R2

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R3

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

(continued)

-48-

RFC-869 December 1983

Gateway Trap Message (cont'd.)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R4

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R5

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

R6

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of this Trap

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Additional Trap reports

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

HMP FIELDS

System Type

Gateway = 4

Message Type

Gateway Trap Message = 1

Port Number

Unused

Control Flag

Unused

Password or Returned Sequence Number

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the monitoring center can order the received trap

messages and detect missed messages.

-49-

RFC-869 December 1983

GATEWAY TRAP FIELDS

Gateway Version #

The software version number of the gateway sending the trap.

Trap Reports

The remainder of the trap message consists of the trap

reports. Each consists of the following fields:

Size of Trap Entry

The size in 16-bit words of the trap entry, not

including the size field.

Time of Trap

The time in (in 1/60 sec. ticks) at which the trap

occurred.

Trap ID

The number of the trap which is used to identify the

trap.

Process ID

The identifier of the process that executed the trap.

R0-R6

The registers of the machine at the occurrence of the

trap.

Count of this Trap

The number of times that this trap occurred.

-50-

RFC-869 December 1983

C.3 Message Type 2: Gateway Status

Description

The gateway status message gives a summary of the status of

the gateway. It reports information such as version number

of the gateway, buffer memory usage, interface status and

neighbor gateway status.

A Gateway Status message has the following format:

-51-

RFC-869 December 1983

0 1 1 2 3 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Version Number

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Patch Version Number

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Time Since Gateway Restart ;in minutes

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Measurement Flags ; Bit flags to indicate which

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; measurements are on, 1= On

Routing Sequence No. ; Sequence # of last routing

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; update sent

Access Table Version #

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Load Sharing Table Ver. #

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Memory in Use

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Memory Idle

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Memory Free

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# of Blks ; Memory Allocation Info

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Size of 1st Block (in bytes)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# Allocated

+-+-+-+-+-+-+-+-+

# Idle

+-+-+-+-+-+-+-+-+

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Size of n'th Block (in bytes)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# Allocated

+-+-+-+-+-+-+-+-+

# Idle

+-+-+-+-+-+-+-+-+

(continued)

-52-

RFC-869 December 1983

Gateway Status Message (cont'd.)

+-+-+-+-+-+-+-+-+

# of Ints.

+-+-+-+-+-+-+-+-+

Int 1 Flags ;Interface 1 Status Flags

+-+-+-+-+-+-+-+-+ ; Bit 0 - 1=Up, 0=Down

; 1 - 1=Looped, 0=Not

+-+-+-+-+-+-+-+-+

Buffers ; # of buffers on write Queue

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Time since last Status Change ;Time since last up/dwn change

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# of Buffers Allocated

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Data Size for Interface

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Interface 1 Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

+---------------+

Int n Flags ;Interface n Status Flags

+-+-+-+-+-+-+-+-+

Buffers

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Time since last Status Change

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# of Buffers Allocated

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Data Size for Interface

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Interface n Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# Neighbors

+-+-+-+-+-+-+-+-+

UP/DN Flags ;Bit flags for Up or Down

+-+-+-+-+-+-+-+-+ ; 0 = Dwn, 1 = Up

. ; MSB is neighbor 1

. ; (as many bytes as necessary)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Neighbor 1 Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Neighbor n Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

-53-

RFC-869 December 1983

HMP FIELDS

System Type

Gateway = 4

Message Type

Gateway Status Message = 2

Port Number

Unused

Control Flag

Unused

Password or Returned Sequence Number

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the monitoring center can order the received trap

messages and detect missed messages.

GATEWAY STATUS FIELDS

Version Number

The version number of the gateway sending the Status

message.

Patch Version Number

The patch version number of the gateway.

Time Since Gateway Restart

The time in minutes since the gateway was last restarted or

reloaded.

-54-

RFC-869 December 1983

Measurement Flags

Flags that, if set, indicate which measurements are turned

on. Current values are:

Bit 0 = Message Generator

1 = Throughput

2 = Host Traffic Matrix

3 = Access Control 1

4 = Access Control 2

5 = Load Sharing

6 = EGP in Gateway

Routing Sequence Number

The sequence number of the last routing update sent by this

gateway.

Access Control Table Version #

The version number of the access control table.

Load Sharing Table Version #

The version number of the load sharing table.

Memory In Use

The number of bytes of buffer memory that are currently in

use.

Memory Idle

The number of bytes of buffer memory that have been

allocated but are currently idle.

Memory Free

The number of bytes of buffer memory that has not been

allocated.

MEMORY ALLOCATION INFORMATION

The next part of the status message contains information on

the buffer pools in the gateway. The fields are:

# of Blocks

-55-

RFC-869 December 1983

The number of different buffer pools.

Size of Block

The size of this block in bytes.

# Allocated

The number of blocks of this size that have been

allocated.

# Idle

The number of blocks of this size that are idle.

GATEWAY INTERFACE FIELDS

The next part of the status message are fields that provide

information about the gateway's interfaces. The fields are:

# of Interfaces

The number of network interfaces that the gateway has.

Interface Flags

Flags that indicate the status of this interface. The

current values are:

Bit 0 - 1=Up/0=Down

1 - 1=Looped/0=Not Looped

Buffers

The numbers on this interfaces write queue.

Time Since Last Status Change

The time in minutes since this interface changed status

(Up/Down).

# of Buffers Allocated

The number of buffers allocated for this interface.

Data Size for Interface

The buffer size required for this interface.

-56-

RFC-869 December 1983

Interface Address

The Internet address of this interface.

NEIGHBOR GATEWAY FIELDS

The final part of the status message consists of information

about this gateway's neighbor gateways. The fields are:

# of Neighbors

The number of gateways that are neighbor gateways to

this gateway.

UP/DN Flags

Bit flags to indicate if the neighbor is up or down.

Neighbor Address

The Internet address of the neighbor gateway.

-57-

RFC-869 December 1983

C.4 Message Type 3: Gateway Throughput

Description

The gateway collects throughput statistics for the gateway,

its interfaces, and its neighbor gateways. It collects them

for regular intervals and will save them for collection via

a Poll message from the Monitoring host. If they are not

collected by the end of the next interval, they will be lost

because another copy will be put into the saved area.

A Gateway Throughput message has the following format:

0 1 1 2 3 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Gateway Version Number

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Collection Time in Min

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Number of Interfaces

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Number of Neighbors

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Number of Host Unreachable ; # of packets dropped because

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; Host was Unreachable

Number of Net Unreachable

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; Net was Unreachable

; Interface Counters

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Interface Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Packets Dropped on Input

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of IP Errors

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Datagrams for Us

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Datagrams to be Forwarded

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Datagrams Looped

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

(continued)

-58-

RFC-869 December 1983

Gateway Throughput Message (cont'd.)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Bytes Input

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Datagrams From Us

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count that were Forwarded

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Local Net Dropped

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Queue full Dropped

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Bytes Output

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Counters For Additional Interfaces

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

; Neighbor counters

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Neighbor Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Routing Updates TO

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Routing Updates FROM

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

(continued)

-59-

RFC-869 December 1983

Gateway Throughput Message (cont'd.)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Pkts from US sent to/via Neig

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Pkts forwarded to/via Neighb

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Datagrams Local Net Dropped

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Datagrams Queue full Dropped

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Count of Bytes send to Neighbor

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Counters for Additional Neighbor Gateways

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

HMP FIELDS

System Type

Gateway = 4

Message Type

Gateway Throughput Message = 3

Port Number

Unused

Control Flag

Unused

Password or Returned Sequence Number

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the HM can order the received trap messages and

-60-

RFC-869 December 1983

detect missed messages.

GATEWAY THROUGHPUT FIELDS

Gateway Version Number

The software version number of the gateway sending the trap.

Collection Time in Min.

The time period in minutes in which the throughput data is

to be collected.

Number of Interfaces

The number of interfaces this gateway has.

Number of Neighbors

The number of neighbor gateways this gateway has.

Number of Host Unreachable

The number of packets dropped because the Host was

unreachable.

Number of Net Unreachable

The number of packets dropped because the Network was

unreachable.

INTERFACE COUNTERS

The next part of the Throughput message contains counters

for the gateways interfaces. Each interface has the

following fields:

Interface Address

The Internet address of this interface.

Packets Dropped on Input

The number of packets on input to this interface

because there were not enough buffers.

Count of IP Errors

The number of packets received with bad IP headers.

-61-

RFC-869 December 1983

Count of Datagrams for Us

The number of datagrams received addressed to this

gateway.

Datagrams to be Forwarded

The number of datagrams were not for this gateway and

should be sent out another interface.

Count of Datagrams Looped

The number of datagrams that were received on and sent

out of this interface.

Count of Bytes Input

The number of bytes received on this interface.

Count of Datagrams From Us

The number of datagrams that originated at this

gateway.

Count that were Forwarded

The number of datagrams that were forwarded to another

gateway.

Count of Local Net Dropped

The number of packets that were dropped because of

local network flow control restrictions.

Count of Queue full Dropped

The number of packets that were dropped because the

output queue was full.

Count of Bytes Output

The number of bytes sent out on this interface.

-62-

RFC-869 December 1983

NEIGHBOR COUNTERS

The last part of the Throughput message are counts for each

neighbor gateway. The fields are:

Neighbor Address

The Internet address of this neighbor gateway.

Count of Routing Updates TO

The number of routing updates sent to this neighbor

gateway.

Count of Routing Updates FROM

The number of routing updates received from this

neighbor gateway.

Pkts from US sent to/via Neig

The number of packets from this gateway sent to or via

this neighbor gateway.

Pkts forwarded to/via Neighb

The number of packets forwarded to or via this neighbor

gateway.

Datagrams Local Net Dropped

The number of datagrams dropped to this neighbor

gateway because of local network flow control

restrictions.

Datagrams Queue full Dropped

The number of datagrams dropped to this neighbor

because the output queue was full.

Count of Bytes send to Neighbor

The number of bytes sent to this neighbor gateway.

-63-

RFC-869 December 1983

C.5 Message Type 4: Gateway Host Traffic Matrix

Description

The Host Traffic Matrix (HTM) message contains information

about the traffic that flows through the gateway. Each

entry consists of the number of datagrams sent and received

for a particular source/destination pair.

A Gateway HTM message has the following format:

0 1 1 2 3 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Gateway Version Number

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Overflow counter

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Collection Time in Min

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Number of HTM entries

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

IP Source Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

IP Destination Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

IP Protocol (unused)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Counter for SRC -> DST datagrams

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Counter for DST -> SRC datagrams

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Additional HTM Reports

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

-64-

RFC-869 December 1983

HMP FIELDS

System Type

Gateway = 4

Message Type

Gateway HTM Message = 4

Port Number

Unused

Control Flag

Unused

Password or Returned Sequence Number

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the HM can order the received trap messages and

detect missed messages.

GATEWAY HTM FIELDS

Gateway Version Number

The software version number of this gateway.

Overflow counter

The number of HTM entries lost because the HTM buffer was

full.

Collection Time in Min

The time period in minutes in which the HTM data is being

collected.

Number of HTM entries

The number of HTM reports included in this message.

-65-

RFC-869 December 1983

HTM ENTRIES

The remainder of the HTM message consists of the actual HTM

entries. Each entry consists of the following fields:

IP Source Address

The source Internet address of the datagrams being

counted.

IP Destination Address

The destination Internet address of the datagrams being

counted.

IP Protocol

The protocol number of the datagrams.

Counter for SRC -> DST datagrams

The number of datagrams sent in the Source to

Destination address direction.

Counter for DST -> SRC datagrams

The number of datagrams sent in the Destination to

Source address direction.

-66-

RFC-869 December 1983

C.6 Message Type 6: Gateway Routing

Description

The Routing message contains information about routes the

gateway has to the networks that make up the Internet. It

includes information about its interfaces and its neighbor

gateways.

A Gateway Routing message has the following format:

0 1 1 2 3 3

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Version Number

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# of Ints.

+-+-+-+-+-+-+-+-+

UP/DN Flags ;Bit flags for Up or Down

+-+-+-+-+-+-+-+-+ ; 0 = Dwn, 1 = Up

. ; MSB is interface 1

. ; (as many bytes as necessary)

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Interface 1 Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Interface n Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

# Neighbors

+-+-+-+-+-+-+-+-+

UP/DN Flags ;Bit flags for Up or Down

+-+-+-+-+-+-+-+-+ ; 0 = Dwn, 1 = Up

. ; MSB is neighbor 1

. ; (as many bytes as necessary)

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Neighbor 1 Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Neighbor n Address

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

(continued)

-67-

RFC-869 December 1983

Gateway Routing Message (cont'd.)

+-+-+-+-+-+-+-+-+

# of Networks

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Network 1 # ; 1, 2, or 3 bytes

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Distance

+-+-+-+-+-+-+-+-+

Neighbor #

+-+-+-+-+-+-+-+-+

.

.

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Network n # ; 1, 2, or 3 bytes

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Distance

+-+-+-+-+-+-+-+-+

Neighbor #

+-+-+-+-+-+-+-+-+

HMP FIELDS

System Type

Gateway = 4

Message Type

Gateway Trap Message = 6

Port Number

Unused

Control Flag

Unused

Password or Returned Sequence Number

Unused

Sequence Number

A 16 bit number incremented each time a trap message is sent

so that the HM can order the received trap messages and

detect missed messages.

-68-

RFC-869 December 1983

GATEWAY ROUTING FIELDS

Gateway Version #

The software version number of the gateway sending the trap.

INTERFACE FIELDS

The first part of the routing message contains information

about the gateway's interfaces. There is data for each

interface. The fields are:

# of Interfaces

The number of interfaces that this gateway has.

UP/DN Flags

Bit flags to indicate if the Interface is up or down.

Interface Address

The Internet address of the Interface.

NEIGHBOR FIELDS

The next part of the routing message contains information

about this gateway's neighbor gateways. The fields are:

# of Neighbors

The number of gateways that are neighbor gateways to

this gateway.

UP/DN Flags

Bit flags to indicate if the neighbor is up or down.

Neighbor Address

The Internet address of the neighbor gateway.

NETWORK ROUTING FIELDS

The last part of the routing message contains information

about this gateway's routes to other networks. This

includes the distance to each network and which neighbor

gateway is the route to the network. The fields are:

-69-

RFC-869 December 1983

# of Networks

The number of networks that are reachable from this

gateway.

Network #

The network number of this network. This is the

network part of the Internet address and may be one,

two, or three bytes in length depending on whether it

is a Class A, B, or C address.

Distance

The distance in hops to this network. Zero hops means

that the network is directly connected to this gateway.

A negative number means that the network is currently

unreachable.

Neighbor #

The neighbor gateway that is the next hop to reach this

network. This is an index into the previous

information on this gateway's neighbor gateways. This

field is only valid if the Distance is greater than

zero.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有