CURRENT_MEETING_REPORT_


Reported by Michael Erlinger/Micro Technology

Remote LAN Monitoring Minutes

Three separate meetings were held with the primary Agenda to review the
RLANMIB MIB proposed by Steve Waldbusser.  The MIB had been distributed
to the mail list and copies were available at the meeting.
The driving focus of the current MIB is to quickly get a consensus on an
RLANMIB that can act as a standard.  For this reason, various issues
have been moved to future MIBs.
In general the MIB document should have more verbiage describing the MIB
and the general philosophy that was followed.
Memory management and table size issues were discussed at length.  The
only consensus reached is that memory management is a problem and that
the various probes will find their own way to control memory.
A philosophic question was raised and not debated:  What is the
difference between a monitor and an analyzer?  This needs to be
discussed more to better decide on the RLANMIB.
During the discussions about multiple managers and table ownership, the
point was made that the probabil- ity of multiple manager collisions was
in fact quite high, since access to probe tables is often the result of
network problems (during which more than one manager may rush to fix).
MIB development needs to recognize this point.
It was decided that a RLANMIB meeting should be held prior to the next
IETF. The date of this meeting will be decided after a new version of
the MIB document is made available to the mailing list.  The Chair will
be responsible for choosing the date and location.
A few general points were discussed as foundation principles for the
RLANMIB:


   o Probes will be used simultaneous by more than one network
     management station.

   o Probe resources will be a constant concern, a method must be found
     that would allow a probe to determine which dynamic tables, in
     particular those associated with a NMS, can be deleted.

   o Accepting the simultaneous use of the probe, the MIB should insure
     the isolated use by each NMS.

   o Accepting the simultaneous use of the probe, the MIB should allow
     for the sharing of use by each NMS.

                                   1






MIB Review

Etherstats Table

Various entries are the same as other MIBs, (ethernet), while other
entries are new.  Two justifications for this approach:


  1. Probes have the primary task of monitoring so the additional
     resources should not be a concern;

  2. Probes operate in promiscuous mode, so they will produce different
     values.


MIB should spell out whether good and/or bad packets are included in a
count.  In general this information should be added to all counter
descriptions.
MIB should spell out that:  All counts exclude framing - start with
destination address and continue through CRC.
In particular, all packets are included in each bucket because segment
utilization includes both good and bad packets.

Etherstats Counters



                `64                   64--1518                  ~1518
             |------------------------------------------------------------
       CRC   |  collision                crc/align                jabber
       error |  fragments
             |-------------------------------------------------------------
       NONE  |  runt                    good                     oversize



It was noted that the etherSTatsPkts64Octets counter was missing -- to
be added in next version.



Inclusive or exclusive will be added to text describing various packet
counters.

Etherhistory Table


                                   2






Circular rollover:  when the N buckets are full you continue to have
only N buckets, loosing the oldest bucket.
Interval change semantics:  It is viewed that a change in interval is
the same as deleting the current control entry and starting a new one,
i.e., the existing N buckets are lost and a new N buckets with the
current interval are allowed to exist in the system (actual allocation
of buckets is an agent task).
Change  #  of buckets semantics:  Changing the number of buckets should
not invalidate the current buckets.  This will be explained in the
document.  In particular, changing to a greater number of buckets, just
adds more buckets to that history sequence.  Reducing the number of
buckets deletes the oldest buckets until the required number are left.
What about time stamping the bucket contents?  Adding an end time to the
bucket has little meaning because granularity is probably 1 sec and is
thus not very meaningful.  Buckets are not real-time.  Finally, could
use the start time of the next bucket as the end time of the current
bucket.
Discussion of starting a table entry:  The entry starts when the VALID
is set.  Valid could be set in the same PDU as all the other entries
because a set is viewed as an atomic operation.
How to determine if probe lost data:  Use dropevents to determine if
probe lost some events.
Utilization will be changed from tenths of a percent to hundredths of a
percent.



Utilization discussion:  Because everyone determines utilization
differently (some use various hardware tests), it was decided that the
utilization value is a standard way of presenting a non-standard value.
A request was made for max available history buckets counter
(etherHistory 3??).  Someone said this is necessary in all dynamic
tables and quite useful for the management station user interface

Ether Host Tables
The etherhostorder table will be ordered by time of 1st transmission --
still 1 to N.
Much discussion and much debate about the problem of deleting stations
from the table and still maintaining the ordering.  This is an open
issue which must be explained in the document.
The host table ordered by natural index is being used to serve two
purposes:  fast download of the whole table and new station detection.
The first requires a con- tiguous index space (necessitating
renumbering) and the second requires monotonically increasing indices.
The resolution was to create two tables instead of one (although Steve
said he would try to figure out a way to shrink them back into one
table).

                                   3






Table deletion:  It was decided that most tables need a deletion
capability and that the MAC address is the most secure way to do
deletion.  Other indices may actually change.
After much debate about the TOP N table, it was decided that there are
three options:

  1. Leave the table as it currently is;
  2. Nuke the whole idea;
  3. Expand the table to a series of tables -- a control table that
     describes each of the actual top N tables.

Some discussion about probe reaction when a table that is already
``valid'' is set to ``valid''.  It was decided that the proper agent
action is ``no-op''.

Ether Traffic Matrix Tables

Change ``etherSDTableSize'' to ``etherMatrixTableSize''
The Filter table again raised the issue of NMS control of specific
tables and the Probe/Agent's ability to garbage collect.
The idea of a X.Y index for each dynamic NMS related table was
discussed.  A central table would exist in which each NMS specified its
own unique X value.  The NMS would also specify the time in sections for
which X related tables should be maintained by the Agent.  If the time
decrements to 0, the Agent can reclaim all tables and table entries
related to the NMS. The NMS can periodically restart the countdown
clock.  Thus, an NMS knows its own unique ID, can keep all its tables
active (since it knows the time value entered into the station), the NMS
can force deletion of all its tables by entering 0 into the time field,
and yet the Agent can delete tables related to a particular NMS that is
no longer active.  Also, if this table includes the IP address or some
other know NMS address, all NMSs can determine what other NMSs are using
dynamic tables in the agent.

Buffer Control Table
Steve will add a variable to the buffer control table that holds the max
available entries in the capture table.
There was some discussion about how an agent would treat a set request
in which either (or both) buffer- ControlCaptureSliceSize or
bufferControlUsedBuffers were zero.  Does this constitute a space
reservation?  Can the agent return BadValue?  No resolution of this
question.
All state variables in control tables will have an Invalid state added
(enfferControlState == stopWhenFull) implies that any filters which are
supposed to ``turnOn'' that buffer, will not, once the buffer has
reached the full state.

                                   4






A variable should be added to the bufferControlTable containing the
value of sysUpTime when the buffer was first turned on.
The syntax of ``captureBufferPacketTime'' will be changed from TimeTicks
to an integer containing the number of milliseconds since the buffer was
turned on.
Steve stated that the intent of the log table was to keep the most
recent events (once it started wrapping).
There was some discussion on numbering traps in the global environment.
Steve will give it some more thought.
We need to add a notificationIndex to the logTable.

Notification Table
A minimal time was spent discussing the Notification Table.  Traps were
referenced to the Notification Table, but not discussed in detail.

Off Line
Overhead associated with updating the etherhistory table.
Steve will write up a mail message that will explain his approach to
fast table dumping and the type of per- formance that he obtained.

Topics for Later Discussion
A table describing thresholds will be added at a later time, hopefully
in the next version of the MIB.

Deferred Topics
Various topics are being deferred to RLANMIB 2 in the interest of
expediently getting a RLANMIB 1 into test and evaluation.



Peaks:  Peaks are difficult especially in handling slid- ing time
windows.  If discrete time is used, then it is possible to miss peaks.
In determining which type of peaks will be captured, e.g., utilization,
broadcasts, etc., it was realized that peaks could double the size of
the history table.  Peaks should be time tagged, not just captured in
the history table.  Peaks really fall into the threshold area.
The concept of protocol bitmasks for each station and protocol
percentages for the segment were discussed at length.  The consensus was
to let this area go until RLANMIB 2.  Questions that seemed open:
protocols to be included in the bitmask; how far down the stack proto-
col counting occurs; and general utilization of this feature.

Attendees


                                   5






William Anderson         wda@mitre.org
William Barns            barns@gateway.mitre.org
Steve Bostock            steveb@novell.com
Kurt Dobbins             dobbins@ctron.com
Bill Durham              durham@MDC.COM
Gary Ellis               garye@hpspd.spd.hp.com
Fred Engel               engel@concord.com
Mike Erlinger            mike@mti.com
Bill Fardy               fardy@ctron.com
Martin Gray              mg@spider.co.uk
Mike Janson              mjanson@mot.com
Kenneth Key              key@cs.utk.gdy
Cheryl Krupczak          clefor@secola.columbia.ncr.com
Donna McMaster           dmcmaster@synoptics.com
Lynn Monsanto            monsanto@eng.sun.com
David Perkins            dave_perkins@3com.com
Ron Poppen-Chambers      rpc@hpcnd.cnd.hp.com
Rehmi Post               rehmi@ftp.com
Ron Roberts              roberts@jessica.stanford.edu
Kary Robertson           kr@concord.com.kr
Jonathan Saperia         saperia@decwrl.enet.dec.com
Greg Satz                satz@cisco.com
Mark Schaefer            schaefer@davidsys.com
Dror Shindelman          pbrenner@sparta.spartacus.com
Anil Singhal
Sudhanshu Verma          verma@hpindbu.cup.hp.com
Steven Waldbusser        steven.waldbusser@andrew.cmu.edu
Steve Witten
Wing Fai Wong            wfwong@malta.sbi.com



                                   6