home *** CD-ROM | disk | FTP | other *** search
Text File | 1991-04-20 | 92.3 KB | 4,171 lines |
-
-
-
-
- RFC - 869
-
-
-
-
-
-
- A Host Monitoring Protocol
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Robert M. Hinden
-
-
-
-
-
- BBN Communications Corporation
-
-
-
-
-
- December 1983
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- RFC-869 December 1983
-
-
-
- Table of Contents
-
-
-
-
-
- 1 Introduction.......................................... 1
-
- 2 General Description................................... 3
-
- 3 Relationship to Other Protocols....................... 6
-
- 4 Protocol Operation.................................... 7
-
- 5 Header Formats....................................... 12
- 5.1 IP Headers......................................... 12
- 5.2 HMP Header......................................... 13
-
- 6 HMP Monitoring Center Message Formats................ 16
- 6.1 Message Type 100: Polling Message.................. 16
- 6.2 Message Type 101: Error in Poll.................... 18
- 6.3 Message Type 102: Control acknowledgment........... 20
-
- A Appendix A - IMP Monitoring.......................... 21
- A.1 Message Type 1: IMP Trap........................... 21
- A.2 Message Type 2: IMP status......................... 24
- A.3 Message Type 3: IMP Modem Throughput............... 29
- A.4 Message Type 4: IMP Host Throughput................ 32
-
- B Appendix B - TAC Monitoring.......................... 35
- B.1 Message Type 1: TAC Trap Message................... 35
- B.2 Message Type 2: TAC Status......................... 38
- B.3 Message Type 3: TAC Throughput..................... 42
-
- C Appendix C - Gateway Monitoring...................... 47
- C.1 Gateway Parameters................................. 47
- C.2 Message Type 1: Gateway Trap....................... 48
- C.3 Message Type 2: Gateway Status..................... 51
- C.4 Message Type 3: Gateway Throughput................. 58
- C.5 Message Type 4: Gateway Host Traffic Matrix........ 64
- C.6 Message Type 6: Gateway Routing.................... 67
-
-
-
-
-
-
-
-
-
-
- -i-
-
-
- RFC-869 December 1983
- Replaces IEN-197
-
-
- A Host Monitoring Protocol
-
-
-
-
-
- 1 Introduction
-
-
- The Host Monitoring Protocol (HMP) is used to collect
-
- information from hosts in various networks. A host is
-
- defined as an addressable Internet entity that can send and
-
- receive messages; this includes hosts such as server hosts,
-
- personal work stations, terminal concentrators, packet switches,
-
- and gateways. At present the Host Monitoring Protocol is being
-
- used to collect information from Internet Gateways and TACs, and
-
- implementations are being designed for other hosts. It is
-
- designed to monitor hosts spread over the internet as well as
-
- hosts in a single network.
-
-
- This document is organized into three parts. Section 2 and
-
- 3 contains a general description of the Host Monitoring protocol
-
- and its relationship to other protocols. Section 4 describes
-
- how it operates. Section 5 and 6 contain the descriptions and
-
- formats of the HMP messages. These are followed by appendices
-
- containing the formats of messages sent by some of the hosts that
-
- use the HMP to collect their monitoring information. These
-
- appendicies included as examples only and are not part of the HMP
-
- protocol.
-
-
-
-
- -1-
-
-
- RFC-869 December 1983
-
-
-
- This document replaces the previous HMP document "IEN-197, A
-
- Host Monitoring Protocol."
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -2-
-
-
- RFC-869 December 1983
-
-
-
- 2 General Description
-
-
- The Host Monitoring Protocol is a transaction-oriented
-
- (i.e., connection-less) transport protocol. It was designed to
-
- facilitate certain simple interactions between two internet
-
- entities, one of which may be considered to be "monitoring" the
-
- other. (In discussing the protocol we will sometimes speak of a
-
- "monitoring host" and a "monitored entity".) HMP was intended to
-
- be a useful transport protocol for applications that involve any
-
- or all of the following three different kinds of interactions:
-
-
- - The monitored entity sometimes needs to send unsolicited
- datagrams to the monitoring host. The monitoring host
- should be able to tell when messages from the monitored
- entity have been lost in transit, and it should be able to
- determine the order in which the messages were sent, but the
- application does not require that all messages be received
- or that they be received strictly in the same sequence in
- which they were sent.
-
- - The monitoring host needs to gather data from the monitored
- entity by using a query-response protocol at the application
- level. It is important to be able to determine which query
- is being answered by a particular response, and to determine
- whether successive responses are duplicates of previous
- ones.
-
- - The monitoring host must be able to initiate certain control
- functions in the monitored entity, possibly including the
- setting of parameters in the monitored entity. The
- monitoring host needs to know if the control function has
- been carried out.
-
-
- In addition, we assume that a given monitoring host may be
-
- monitoring several different types of entities simultaneously,
-
- and may be gathering several different types of data from a given
-
-
-
- -3-
-
-
- RFC-869 December 1983
-
-
-
- type of monitored entity. Several different monitoring hosts may
-
- be monitoring a given entity, and several processes on the same
-
- host may even be monitoring the same entity.
-
-
- Messages from the monitoring host to the monitored entity
-
- are called "polls". They need to contain enough information to
-
- allow the monitored entity to make the following determinations:
-
-
- - The monitored entity must be able to determine that this
- message is in fact a poll from a monitoring host. The
- "system type," "message type," and "password" fields in the
- HMP header have been defined to meet this need.
-
- - The monitored entity may need to be able to identify the
- particular process on the monitoring host that sent this
- poll, so it can send its response back to the right process.
- The "port number" field in the HMP header has been defined
- to meet this need.
-
- - The monitored entity must be able to indicate to the
- monitoring host, in its response, precisely which query is
- being answered by a particular response. The "sequence
- number field" has been defined to meet this need.
-
- - The monitored entity must be able to determine just what
- kind of action the monitoring host is requesting. That is,
- the HMP transport protocol must provide some way of
- multiplexing and demultiplexing the various higher-level
- applications which use it. The "R-message type" and "R-
- subtype" fields of the polling message have been defined to
- meet this need.
-
-
- Messages from the monitored entity to the monitoring host
-
- need to contain enough information to enable the monitoring host
-
- to make the following determination:
-
-
- - The monitoring host must be able to route this message to
- the correct process. The "port number" field meets this
- need.
-
-
- -4-
-
-
- RFC-869 December 1983
-
-
-
- - The monitoring host must be able to match up received
- messages with the polls, if any, that elicited them. The
- "returned sequence number" field in the HMP header has been
- defined to meet this need.
-
- - The monitoring host must be able to determine which higher
- level application should receive a particular message. The
- "system type" and "message type" fields are used for this
- purpose.
-
- - The monitoring host must be able to determine whether some
- messages of a given type were lost in transit, and whether
- messages have arrived out of sequence. Although this
- function, strictly speaking, belongs to the application and
- not to the transport layer, the HMP header contains a
- "sequence number" for this purpose.
-
-
- In addition, a simple one's complement checksum is provided
-
- in the HMP header to detect data corruption during transmission.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -5-
-
-
- RFC-869 December 1983
-
-
-
- 3 Relationship to Other Protocols
-
-
- The Host Monitoring Protocol is a transport protocol
-
- designed to fit into the layered internet protocol environment.
-
- It operates on top of the Internet/ICMP protocol and under
-
- applications that require its services. This relationship is
-
- illustrated in the following diagram:
-
-
- +------+ +------+ +-------+ +------+
- |TELNET| ...| FTP | |GATEWAY| ... | TAC | Application Layer
- +------+ +------+ +-------+ +------+
- | | | |
- | | | |
- |__________| |_____________|
- | |
- +------+ +-------+
- | TCP | | HMP | Transport Layer
- +------+ +-------+
- | |
- | |
- +-------------------------------------+
- | Internet Protocol & ICMP | Internetwork Layer
- +-------------------------------------+
- |
- +------------------------+
- | Local Network Protocol | Network Layer
- +------------------------+
-
-
- If internetwork services are not required it should be possible
-
- to run the HMP without an Internetwork layer. As long as HMPs'
-
- service requirnments (addressing, protocol demultiplexing, and
-
- occasional delivery) are met it should run over a variety of
-
- protocols.
-
-
-
-
-
-
-
- -6-
-
-
- RFC-869 December 1983
-
-
-
- 4 Protocol Operation
-
-
- The HMP is built around the idea that most of the
-
- intelligence needed to monitor a host should reside in a
-
- monitoring center, not in the host. The host should be required
-
- only to collect data and send it to the monitoring center, either
-
- spontaneously or on request from the monitoring center. The host
-
- is not responsible for insuring that the data arrives reliably
-
- (except that it checksums the data); instead, the monitoring
-
- center is responsible for ensuring that the data it requests is
-
- received correctly.
-
-
- Consequently, the HMP is based on polling hosts for
-
- messages. When the monitoring center requires a particular type
-
- of data (e.g., throughput data), it sends a poll to the host
-
- requesting that type of report. The host, upon receiving the
-
- poll, responds with its latest set of collected data. If the
-
- host finds that the poll is incorrect (e.g., if the poll was for
-
- throughput data and the host is not collecting throughput data),
-
- it responds with an error message. The monitoring center waits a
-
- reasonable length of time for the host to answer its poll. If no
-
- response is received, it sends another poll for the same data.
-
- In this way, if either a poll or the response is lost, the
-
- correct data is still collected.
-
-
-
-
-
-
- -7-
-
-
- RFC-869 December 1983
-
-
-
- The HMP is used to collect three different classes of data:
-
-
- o Spontaneous Events (or Traps)
-
- o Current status
-
- o Statistical data collected over time
-
-
- These classes of data allow a host to send data in a manner best
-
- suited to the data. For instance, the host may quickly inform
-
- the monitoring center that a particular event has happened by
-
- sending a trap message, while the monitoring center is reliably
-
- collecting the host's throughput and accounting data.
-
-
- Traps report spontaneous events, as they occur, to the
-
- monitoring center. In order to insure their prompt delivery, the
-
- traps are sent as datagrams with no reliability mechanisms
-
- (except checksums) such as acknowledgments and retransmissions.
-
- Trap messages usually contain an identifier to indicate which
-
- event is being reported, the local time in the host that the
-
- event occured, and data pertinent to the event. The data portion
-
- is intended to be host and event specific.
-
-
- Status information, the second type of data collected by the
-
- Host Monitoring Protocol describes the current state of the host.
-
- Status information is useful at one point, but it does not have
-
- to be collected cumulatively over a certain period of time. Only
-
- the latest status is of interest; old status provides no useful
-
- information. The monitoring center collects status information
-
-
- -8-
-
-
- RFC-869 December 1983
-
-
-
- by sending a poll for status to a host. Upon receiving the poll,
-
- the host responds with its latest status information, always
-
- creating a new status message. If the monitoring center does not
-
- receive a response to its poll, it sends another poll. The
-
- monitoring center can decide if the host is up or down based on
-
- whether the host responds to its polls.
-
-
- The third type of data collected by the HMP is statistical
-
- data. These are measurements taken over time, such as the number
-
- of packets sent or received by a host and the count of packets
-
- dropped for a particular reason. It is important that none of
-
- this type of data be lost. Statistical data is collected in a
-
- host over a time interval. When the collection time interval
-
- expires, the current data is copied to another area, and the
-
- counters are cleared. The copied data is sent to the monitoring
-
- center when the host receives a poll requesting statistical
-
- information. If another poll is received before the collection
-
- time interval has expired, the data in the buffer is sent again.
-
- The monitoring center can detect duplicate messages by using the
-
- sequence number in the header of the message, since each type of
-
- statistical data has its own sequence number counter.
-
-
- The collection frequency for statistics messages from a
-
- particular host must be relatively long compared to the average
-
- round trip message time between the monitoring center and that
-
- host inorder to allow the monitoring center to re-poll if it does
-
-
- -9-
-
-
- RFC-869 December 1983
-
-
-
- not receive an answer. With this restriction, it should be
-
- possible to avoid missing any statistics messages. Each
-
- statistics message contains a field giving the local time when
-
- the data was collected and the time at which the message was
-
- sent. This information allows the monitoring center to schedule
-
- when it sends a poll so that the poll arrives near the beginning
-
- of each collection period. This ensures that if a message is
-
- lost, the monitoring center will have sufficient time to poll
-
- again for the statistics message for that period.
-
-
- The HMP also includes a provision to send data to and read
-
- parameters in hosts. The data may be used to set switches or
-
- interval timers used to control measurements in a host, or to
-
- control the host itself (e.g. a restart switch). The format of
-
- the data and parameters is host specific.
-
-
- To send data to a host, the monitoring center sends the host
-
- a poll for a control-acknowledgment message. This poll message
-
- includes the type of the data and the data being sent. When the
-
- host receives this poll, it processes the data and responds with
-
- a control-acknowledgment message.
-
-
- To read parameters in a host, the monitoring center will
-
- send a poll for parameters to the host. This poll includes the
-
- type of the parameters being read. When the host receives this
-
- poll, it will send the parameters of the requested type to the
-
-
-
- -10-
-
-
- RFC-869 December 1983
-
-
-
- monitoring center in a parameters message.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -11-
-
-
- RFC-869 December 1983
-
-
-
- 5 Header Formats
-
-
- Host Monitor Protocol messages have the following format:
-
- +----------------+
- | Local Network |
- | Header(s) |
- +----------------+
- | IP header |
- +----------------+
- | HMP |
- | Header |
- | |
- +----------------+
- | D |
- | A |
- | T |
- | A |
- +----------------+
- | Padding |
- +----------------+
-
-
-
-
-
- 5.1 IP Headers
-
- HMP messages are sent using the version 4 IP header as described
- in RFC-791 "Internet Protocol." The HMP protocol number is 20
- (decimal). The time to live field should be set to a reasonable
- value for the hosts being monitored.
-
- All other fields should be set as specified in RFC-791.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -12-
-
-
- RFC-869 December 1983
-
-
-
- 5.2 HMP Header
-
- The HMP header format is:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | System Type | Message Type |
- +---------------+---------------+
- 1 | Port Number | Control Flag |
- +---------------+---------------+
- 2 | Sequence Number |
- +---------------+---------------+
- 3 | Password or Returned Seq. # |
- +---------------+---------------+
- 4 | One's Complement Checksum |
- +---------------+---------------+
-
- HMP FIELDS:
-
- System Type
- Message Type
-
- The combination of system type and message type determines
- the format of the data in the monitoring message.
-
- The system types which have been defined are:
-
-
- System Type | Meaning
- ----------------+-----------------
- 1 | Monitoring Host
- 2 | IMP
- 3 | TAC
- 4 | Gateway
- 5 | SIMP
- 6 | BBN VAX/C70 TCP
- 7 | PAD
- 8 | Reserved
- 9 | TIU
- 10 | FEP
- 11 | Cronus Host
- 12 | Cronus MCS
-
-
-
-
-
-
-
-
- -13-
-
-
- RFC-869 December 1983
-
-
-
- Message types are defined and used for each system type
- according to the needs of that system. The message types
- currently defined are:
-
-
-
- Type | Description
- ----------+--------------------------
- |
- 1 | Trap
- 2 | Status
- 3 | Thruput
- 4 | HTM - Host Traffic Matrix
- 5 | Parameters
- 6 | Routing
- 7 | Call Accounting
- |
- 100 | Poll
- 101 | Error
- 102 | Control Acknowledgment
-
-
-
-
- Port Number
-
- This field can be used to multiplex similar messages to/from
- different processes in one host. It is currently unused.
-
- Control Flag
-
- This field is used to pass control information. Currently
- Bit 15 is defined as the "More bit" which is used in a
- message in responce to a poll to indicate that there is more
- data to poll for.
-
- Sequence Number
-
- Every message contains a sequence number. The sequence
- number is incremented when each new message of that type is
- sent.
-
- Password or Returned Sequence Number
-
- The Password field of a polling message from an monitoring
- center contains a password to verify that the monitoring
- center is allowed to gather information. Responses to
- polling messages copy the Sequence Number from the
- polling message and return it in this field for
-
-
- -14-
-
-
- RFC-869 December 1983
-
-
-
- identification and round-trip time calculations.
-
- Checksum
-
- The Checksum field is the one's complement of the one's
- complement sum of all the 16-bit words in the header and
- data area.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -15-
-
-
- RFC-869 December 1983
-
-
-
- 6 HMP Monitoring Center Message Formats
-
- 6.1 Message Type 100: Polling Message
-
- Description
-
- The monitoring center will send polls to the hosts it is
- monitoring to collect their monitoring data. When the host
- receives a poll it will return a message of the type
- requested. It will only answer a poll with the correct
- system type and password and will return an error message
- (Message Type 101) if it receives a poll for the wrong
- system type or an unsupported message type.
-
- The Poll message includes a facility to send data to a
- monitored host. The poll message to send data consists of a
- poll for a Control Acknowledgment message (type 102)
- followed by the data. The R-Subtype specifies the type of
- the data that is being sent. When the monitored host
- receives a Poll for a Control acknowledgment, it processes
- the data, and then responds with an Control acknowledgment
- message. If the monitored host can not process the data, it
- should respond with an error message.
-
- A poll to read parameters consists a poll for a Parameters
- message. The R-Subtype specifies the type of parameters
- being read. When the monitored host receives a poll for a
- Parameters message, it responds with a Parameters message
- containing the requested information.
-
- A polling message has the following form:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | R-Message Type| R-Subtype |
- +---------------+---------------+
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- 1 | Data |
- + +
- 2 | |
- + +
- . .
- . .
- n | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
-
-
-
- -16-
-
-
- RFC-869 December 1983
-
-
-
- HMP FIELDS
-
- System Type
-
- The type of machine being polled.
-
- Message Type
-
- Polling Message = 100
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- The sequence number identifies the polling request. The
- Monitoring Center will maintain separate sequence numbers
- for each host it monitors. This sequence number is returned
- in the response to a poll and the monitoring center will use
- this information to associate polls with their responses and
- to determine round trip times.
-
- Password
-
- The monitoring password.
-
- POLL FIELDS
-
- R-Message Type
-
- The message type requested.
-
- R-Subtype
-
- This field is used when sending data and reading parameters
- and it specifies the type of the data being sent or
- parameters being read.
-
- Data
-
- When the poll is requesting a Control Acknowledgment
- message, data is included in the poll message. A poll for
- any other type of message does not include any data . The
- contents of the data is host specific.
-
-
- -17-
-
-
- RFC-869 December 1983
-
-
-
- 6.2 Message Type 101: Error in Poll
-
- Description
-
- This message is sent in response to a faulty poll and
- specifies the nature of the error.
-
- An error message has the following form:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | Error Type |
- +---------------+---------------+
- 1 | R-Message Type| R-Subtype |
- +---------------+---------------+
-
- HMP FIELDS
-
- System Type
-
- The type of machine sending message.
-
- Message Type
-
- Error Message = 101
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time an error message is
- sent.
-
- Returned Sequence Number
-
- The Sequence Number of the polling message which caused the
- error.
-
-
-
-
-
-
-
- -18-
-
-
- RFC-869 December 1983
-
-
-
- ERROR MESSAGE FIELDS
-
- Error Type
-
- This field specifies the nature of the error in the poll.
- The following error types have been defined.
-
-
- 1 = Reason unspecified.
- 2 = Bad R-Message Type.
- 3 = Bad R-Subtype.
- 4 = Unknown parameter
- 5 = Invalid parameter value
- 6 = Invalid parameter/value format
- 7 = Machine in Loader
-
- R-Message Type
- R-Subtype
-
- These fields identify the poll request in error.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -19-
-
-
- RFC-869 December 1983
-
-
-
- 6.3 Message Type 102: Control acknowledgment
-
- Description
-
- This message is sent in response to a poll for this type of
- message. It is used to acknowledge poll messages that are
- used to set parameters in the monitored host.
-
- The Control acknowledgment has no fields other than the HMP
- header.
-
- HMP FIELDS
-
- System Type
-
- The type of the system sending the message.
-
- Message Type
-
- Control acknowledgment = 102
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a Control
- acknowledgment message is sent.
-
- Returned Sequence Number
-
- The Sequence Number of the polling message which requested
- this message.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -20-
-
-
- RFC-869 December 1983
-
-
-
- A Appendix A - IMP Monitoring
-
- A.1 Message Type 1: IMP Trap
-
- Description
-
- When a trap occurs, it is buffered in the IMP and sent as
- soon as possible. Trap messages are unsolicited. If traps
- happen in close sequence, several traps may be sent in one
- message.
-
- Through the use of sequence numbers, it will be possible to
- determine how many traps are being lost. If it is
- discovered that many are lost, a polling scheme might be
- implemented for traps.
-
- A IMP trap message has the following form:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | # of traps lost |
- +---------------+---------------+
- 1 : first :
- . : trap :
- . : data :
- . +---------------+---------------+
- . : additional :
- . : trap :
- . : data :
- +---------------+---------------+
-
-
- HMP Fields
-
- System Type
-
- IMP = 2
-
- Message Type
-
- IMP Trap Message = 1
-
- Port Number
-
- Unused
-
-
-
-
-
- -21-
-
-
- RFC-869 December 1983
-
-
-
- Control Flag
-
- Unused
-
- Password
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the HM can order the received trap messages and
- detect missed messages.
-
- IMP TRAP FIELDS
-
- # of traps lost
-
- Under certain conditions, an IMP may overflow its internal
- trap buffers and be unable to save traps to send. This
- counter keeps track of such occurrences.
-
- Trap Reports
-
- There can be several blocks of trap data in each message.
- The format for each such block is below.
-
-
-
- +---------------+---------------+
- | Size |
- +---------------+---------------+
- | Time |
- +---------------+---------------+
- | Trap ID |
- +---------------+---------------+
- : Trap :
- : Data :
- +---------------+---------------+
-
-
- Size
-
- Size is the number of 16 bit words in the trap, not counting
- the size field.
-
- Time
-
- The time (in 640 ms. units) at which the trap occurred.
-
-
- -22-
-
-
- RFC-869 December 1983
-
-
-
- This field is used to sequence the traps in a message and
- associate groups of traps.
-
- Trap ID
-
- This is usually the program counter at the trap. The ID
- identifies the trap, and does not have to be a program
- counter, provided it uniquely identifies the trap.
-
- Trap Data
-
- The IMP returns data giving more information about the trap.
- There are usually two entries: the values in the accumulator
- and the index register at the occurrence of the trap.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -23-
-
-
- RFC-869 December 1983
-
-
-
- A.2 Message Type 2: IMP status
-
- Description
-
- The status message gives a quick summary of the state of the
- IMP. Status of the most important features of the IMP are
- reported as well as the current configuration of the
- machine.
-
- The format of the status message is as follows:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | Software Version Number |
- +---------------+---------------+
- | Last Trap Message |
- +---------------+---------------+
- | Max # Hosts | Max # Modems |
- +---------------+---------------+
- | Max # Channels| Max # IMPs |
- +---------------+---------------+
- | Package bits 0-15. |
- +---------------+---------------+
- 5 | Package bits 16.-31. |
- +---------------+---------------+
- | |
- + Crash +
- | |
- + Data +
- | |
- +---------------+---------------+
- | Anomalies |
- +---------------+---------------+
- 10 | Free Pool | S+F Pool |
- +---------------+---------------+
- |Reassembly Pool| Allocated Pool|
- +---------------+---------------+
- | HIHD0 | HIHD1 | HIHD2 | HIHD3 |
- . +---------------+---------------+
- . : HIHD4 | ............... :
- . +---------------+---------------+
- (cont.)
-
-
-
-
-
-
-
-
- -24-
-
-
- RFC-869 December 1983
-
-
-
-
-
- Imp Status (cont.)
-
- . +---------------+---------------+
- . | Modem |
- . + State +
- . | Data |
- . +---------------+---------------+
- . : Modem State :
- . : Data...... :
- +---------------+---------------+
-
-
-
- HMP FIELDS
-
- System Type
-
- IMP = 2
-
- Message Type
-
- IMP status message = 2
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a status message is
- sent.
-
- Password
-
- The password contains the sequence number of the polling
- message to which this message responds.
-
- IMP STATUS FIELDS
-
- Software Version Number
-
- The IMP version number.
-
-
-
- -25-
-
-
- RFC-869 December 1983
-
-
-
- Last Trap Message
-
- Contains the sequence number of the last trap message sent
- to the HM. This will allow the HM to detect how many trap
- messages are being lost.
-
- Hosts
-
- The number of configured hosts in this system.
-
- Modems
-
- The number of configured modems in this system.
-
- Channels
-
- The maximum possible number of IMP-IMP channels in this
- system.
-
- IMPs
-
- The maximum possible number of IMPs in this system.
-
- Package Bits
-
- This is a bit encoded word that reports the set of packages
- currently loaded in the system. The table below defines the
- bits.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -26-
-
-
- RFC-869 December 1983
-
-
-
-
- Bit Package
- (octal)
- (1st Word)
- 1 VDH
- 2 Logical address tables
- 4 Mezmode
- 10 Cumulative Statistics
- 20 Trace
- 40 TTY
- 100 DDT
- 200 HDLC
- 400 HDH
- 1000 Cassette Writer
- 2000 Propagation Delay Measurement
- 4000 X25
- 10000 Profile Measurements
- 20000 Self Authenticating Password
- 40000 Host traffic Matrix
- 100000 Experimental/Special
-
- (2nd Word)
- 1 End-to-end Statistics
- 2 Store and Forward statistics
-
- Crash Data
-
- Crash data reports the circumstances surrounding an
- unexpected crash. The first word reports the location of
- the crash and the following two are the contents of the
- accumulator and index registers.
-
- Anomalies
-
- Anomalies is a collection of bit flags that indicate the
- state of various switches or processes in the IMP. These
- are very machine dependent and only a representative
- sampling of bits is listed below.
-
- Bit Meaning
- (octal)
- 20 Override ON
- 200 Trace ON
- 1000 Statistics ON
- 2000 Message Generator ON
- 4000 Packet Trace ON
- 10000 Host Data Checksum is BAD
- 20000 Reload Location SET
-
-
-
- -27-
-
-
- RFC-869 December 1983
-
-
-
- Buffer Pool Counts
-
- These are four bytes of counters indicating the current
- usage of buffers in the IMP. The four counters are: free
- buffers, store-and-forward buffers, reassembly buffers and
- allocated buffers.
-
- HIHD0 - HIHDn
-
- Each four bit HIHD field gives the state of the
- corresponding host.
-
- Value Meaning
- 0 UP
- 1 ready line down
- 2 tardy
- 3 non-existent
-
-
-
- Modem State Data
-
- Modem state data contains six fields of data distributed
- over four words. The first field (4 bits) indicates the
- line speed; the second field (4 bits) is the number of the
- modem that is used by the neighboring IMP on this line; the
- third field (8 bits) is the number of line protocol ticks
- covered by this report; the fourth (1 bit) indicates line
- down(1) or up(0); the fifth (7 bits) is the IMP number of
- neighbor IMP on the line; and the sixth (8 bits) is a count
- of missed protocol packets over the interval specified in
- the third field.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -28-
-
-
- RFC-869 December 1983
-
-
-
- A.3 Message Type 3: IMP Modem Throughput
-
- Description
-
- The modem throughput message reports traffic statistics for
- each modem in the system. The IMP will collect these data at
- regular intervals and save them awaiting a poll from the HM.
- If a period is missed by the HM, the new results simply
- overwrite the old. Two time stamps bracket the collection
- interval (data-time and prev-time) and are an indicator of
- missed reports. In addition, mess-time indicates the time
- at which the message was sent.
-
- The modem throughput message will accommodate up to fourteen
- modems in one packet. A provision is made to split this
- into multiple packets by including a modem number for the
- first entry in the packet. This field is not immediately
- useful, but if machine sizes grow beyond fourteen modems or
- if modem statistics become more detailed and use more than
- three words per modem, this can be used to keep the message
- within a single ARPANET packet.
-
- The format of the modem throughput message is as follows:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | Mess-Time |
- +---------------+---------------+
- | Software Version Number |
- +---------------+---------------+
- | Data-Time |
- +---------------+---------------+
- | Prev-Time |
- +---------------+---------------+
- | Total Modems | This Modem |
- +---------------+---------------+
- 5 | |
- . + modem +
- . | |
- . + throughput +
- . | |
- . +---------------+---------------+
- . : modem :
- . : :
- . : throughput :
- +---------------+---------------+
-
-
-
-
- -29-
-
-
- RFC-869 December 1983
-
-
-
- HMP FIELDS
-
-
- System Type
-
- IMP = 2
-
- Message Type
-
- IMP Modem Throughput message = 3
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented at each collection interval
- (i.e. when a new throughput message is assembled). The HM
- will be able to detect lost or duplicate messages by
- checking the sequence numbers.
-
- Password
-
- The password contains the sequence number of the polling
- message to which this message responds.
-
- IMP MODEM THROUGHPUT FIELDS
-
- Mess-time
-
- The time (in 640ms. units) at which the message was sent to
- the HM.
-
- Software Version Number
-
- The IMP version number.
-
- Data-Time
-
- Data-time is the time (in 640ms. units) when this set of
- data was collected. (See Description.)
-
-
-
-
-
- -30-
-
-
- RFC-869 December 1983
-
-
-
- Prev-Time
-
- Prev-time is the time (in 640 ms. units) of the previous
- collection of data (and therefore, is the time when the data
- in this message began accumulating.)
-
- Total Modems
-
- This is the number of modems in the system.
-
- This Modem
-
- This Modem is the number of the first modem reported in this
- message. Large systems that are unable to fit all their
- modem reports into a single packet may use this field to
- separate their message into smaller chunks to take advantage
- of single packet message efficiencies.
-
- Modem Throughput
-
- Modem throughput consists of three words of data
- reporting packets and words output on each modem. The
- first word counts packets output and the following two
- count word throughput. The double precision words are
- arranged high order first. (Note also that messages from
- Honeywell type machines (316s, 516s and C30s) use a fifteen
- bit low order word.) The first block reports output on the
- modem specified by "This Modem". The following blocks
- report on consecutive modems.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -31-
-
-
- RFC-869 December 1983
-
-
-
- A.4 Message Type 4: IMP Host Throughput
-
- Description
-
- The host throughput message reports traffic statistics for
- each host in the system. The IMP will collect these data at
- regular intervals and save them awaiting a poll from the HM.
- If a period is missed by the HM, the new results simply
- overwrite the old. Two time stamps bracket the collection
- interval (data-time and prev-time) and are an indicator of
- missed reports. In addition, mess-time indicates the time
- at which the message was sent.
-
- The host throughput format will hold only three hosts if
- packet boundaries are to be respected. A provision is made
- to split this into multiple packets by including a host
- number for the first entry in the packet.
-
- The format of the host throughput message is as follows:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | Mess-Time |
- +---------------+---------------+
- | Software Version Number |
- +---------------+---------------+
- | Data-Time |
- +---------------+---------------+
- | Prev-Time |
- +---------------+---------------+
- | Total Hosts | This Host |
- +---------------+---------------+
- 5 : host :
- . : throughput :
- +---------------+---------------+
-
- HMP FIELDS
-
- System Type
-
- IMP = 2
-
- Message Type
-
- IMP host Throughput message = 4
-
-
-
-
-
- -32-
-
-
- RFC-869 December 1983
-
-
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented at each collection interval
- (i.e. when a new throughput message is assembled). The HM
- will be able to detect lost or duplicate messages by
- checking the sequence numbers.
-
- Password
-
- The password contains the sequence number of the polling
- message to which this message responds.
-
- IMP HOST THROUGHPUT FIELDS
-
- Mess-time
-
- The time (in 640ms. units) at which the message was sent to
- the HM.
-
- Software Version Number
-
- The IMP version number.
-
- Data-Time
-
- Data-time is the time (in 640ms. units) when this set of
- data was collected. (See Description.)
-
- Prev-Time
-
- Prev-time is the time (in 640 ms. units) of the previous
- collection of data (and therefore, is the time when the data
- in this message began accumulating.)
-
- Total Hosts
-
- The total number of hosts in this system.
-
- This Host
-
- This host is the number of the first host reported in this
-
-
- -33-
-
-
- RFC-869 December 1983
-
-
-
- message. Large systems that are unable to fit all their
- host reports into a single packet may use this field to
- separate their message into smaller chunks to take advantage
- of single packet message efficiencies.
-
- Host Throughput
-
- Each host throughput block consists of eight words in the
- following format:
-
- +---------------+---------------+
- | messages to network |
- +---------------+---------------+
- | messages from network |
- +---------------+---------------+
- | packets to net |
- +---------------+---------------+
- | packets from net |
- +---------------+---------------+
- | messages to local |
- +---------------+---------------+
- | messages from local |
- +---------------+---------------+
- | packets to local |
- +---------------+---------------+
- | packets from local |
- +---------------+---------------+
-
- Each host throughput message will contain several blocks of
- data. The first block will contain data for the host
- specified in First Host Number. Following blocks will
- contain data for consecutive hosts. All counters are single
- precision.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -34-
-
-
- RFC-869 December 1983
-
-
-
- B Appendix B - TAC Monitoring
-
- B.1 Message Type 1: TAC Trap Message
-
- Description
-
- When a trap occurs, it is buffered in the TAC and sent as
- soon as possible. Trap messages are unsolicited. If traps
- happen in close sequence, several traps may be sent in one
- message.
-
- Through the use of sequence numbers, it will be possible to
- determine how many traps are being lost. If it is
- discovered that many are lost, a polling scheme might be
- implemented for traps.
-
- A TAC trap message has the following form:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | Version # |
- +---------------+---------------+
- 1 : first :
- . : trap :
- . : data :
- . +---------------+---------------+
- . : additional :
- . : trap :
- . : data :
- +---------------+---------------+
-
-
- HMP FIELDS
-
- System Type
-
- TAC = 3
-
- Message Type
-
- TAC Trap Message = 1
-
- Port Number
-
- Unused
-
-
-
-
-
- -35-
-
-
- RFC-869 December 1983
-
-
-
- Control Flag
-
- Unused
-
- Password or Returned Sequence Number
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the HM can order the received trap messages and
- detect missed messages.
-
- TAC TRAP FIELDS
-
- Version #
-
- The version # of the TAC Software.
-
- Trap Reports
-
- There can be several blocks of trap data in each message.
-
- The format of the trap data is as follows:
-
-
- +---------------+---------------+
- | Size |
- +---------------+---------------+
- | Time |
- +---------------+---------------+
- | Trap ID |
- +---------------+---------------+
- : Trap :
- : Data :
- +---------------+---------------+
- | Count |
- +-------------------------------+
-
- Size
-
- Size is the number of 16 bit words in the trap, not counting
- the size field.
-
- Time
-
- The time (in 640ms. units) at which the trap occurred. This
- field is used to sequence the traps in a message and
-
-
- -36-
-
-
- RFC-869 December 1983
-
-
-
- associate groups of traps.
-
- Trap ID
-
- This is (usually) the program counter at the trap. The ID
- identifies the trap, and does not have to be a program
- counter, provided that it uniquely identifies the trap.
-
- Trap Data
-
- The TAC returns data giving more information about the trap.
- There are usually two entries: the values in the accumulator
- and the index register at the occurrence of the trap.
-
- Count
-
- The TAC Counts repetitions of the same trap ID and reports
- this count here.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -37-
-
-
- RFC-869 December 1983
-
-
-
- B.2 Message Type 2: TAC Status
-
- Description
-
- The status message gives a quick summary of the state of the
- TAC. Status of the most important features of the TAC are
- reported as well as the current configuration of the
- machine.
-
-
- A TAC status message has the following form:
-
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- ---------------+---------------+
- 0 | Version Number |
- +---------------+---------------+
- | Last Trap Message |
- +---------------+---------------+
- | Bit Flags |
- +---------------+---------------+
- | Free PDB count |
- +---------------+---------------+
- | Free MBLK count |
- +---------------+---------------+
- 5 | # of TCP connections |
- +---------------+---------------+
- | # of NCP connections |
- +---------------+---------------+
- | INA A Register |
- +---------------+---------------+
- | INA X Register |
- +---------------+---------------+
- | INA B Register |
- +---------------+---------------+
- l0 | restart/reload |
- +---------------+---------------+
- | |
- + Crash +
- | |
- + Data +
- 13 | |
- +---------------+---------------+
-
-
-
-
-
-
-
- -38-
-
-
- RFC-869 December 1983
-
-
-
- HMP FIELDS
-
- System Type
-
- TAC = 3
-
- Message Type
-
- TAC Status Message = 2
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a status message is
- sent.
-
- Returned Sequence Number
-
- Contains the sequence number from the polling message
- requesting this report.
-
- TAC STATUS FIELDS
-
- Version Number
-
- The TAC's software version number.
-
- Last Trap Message
-
- Contains the sequence number of the last trap message sent
- to the HM. This will allow the HM to detect how many trap
- messages are being lost.
-
-
-
-
-
-
-
-
-
-
-
-
- -39-
-
-
- RFC-869 December 1983
-
-
-
- Bit Flags
-
- There are sixteen bit flags available for reporting the
- state of various switches (hardware and software) in the
- TAC. The bits are numbered as follows for purposes of the
- discussion below.
-
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | | | | | | | | | | | | | | | | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- The bit flags report the status of the following:
-
- Bit Meaning
- 15 0 => DDT override off; 1 => override on.
- 11-14 0 => Sense Switch n is off; 1 => SSn on.
- 10 0 => Traps to remote monitor;
- 1 => Traps to console.
- 9 1 => Message generator on.
- 0-8 unused
-
- Free PDB count
-
- The number of PDBs on the free queue.
-
- Free MBLK count
-
- The number of MBLKs on the free queue.
-
- # of TCP connections
- # of NCP connections
-
- The number of open connections for each protocol.
-
- INA Report
-
- These three fields report the values retained by an INA 1011
- instruction in a C/30. This instruction returns micro-
- machine status and errors. In a #316, the fields are
- meaningless.
-
-
-
-
-
-
-
-
- -40-
-
-
- RFC-869 December 1983
-
-
-
- Restart/Reload
-
- This word reports a restart or reload of the TAC
-
- Value Meaning
- 1 restarted
- 2 reloaded
-
-
- Crash Data
-
- Crash data reports the circumstances surrounding an
- unexpected crash. The first word reports the location of
- the crash and the following two are the contents of the
- accumulator and index registers.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -41-
-
-
- RFC-869 December 1983
-
-
-
- B.3 Message Type 3: TAC Throughput
-
- Description
-
- The TAC throughput message reports statistics for the
- various modules of the TAC. The TAC will collect these data
- at regular intervals and save them awaiting a poll from the
- HM. If a period is missed by the HM, the new results simply
- overwrite the old. Two time stamps bracket the collection
- interval (data-time and prev-time) and are an indicator of
- missed reports. In addition, mess-time indicates the time
- at which the message was sent.
-
-
- A TAC throughput message has the following form:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +---------------+---------------+
- 0 | Mess-Time |
- +---------------+---------------+
- | Data-Time |
- +---------------+---------------+
- | Prev-Time |
- +---------------+---------------+
- | Version Number |
- +---------------+---------------+
- | Last Trap Message |
- +---------------+---------------+
- 5 | Bit Flags |
- +---------------+---------------+
- | Free PDB count |
- +---------------+---------------+
- | Free MBLK count |
- +---------------+---------------+
- | # of TCP connections |
- +---------------+---------------+
- | # of NCP connections |
- +---------------+---------------+ ----
- 10 | Host Input Throughput | ^
- +---------------+---------------+ |
- | Host Input Abort Count | |
- +---------------+---------------+ |
- | Host Input Garbled Count | |
- +---------------+---------------+ |
- | Host Output Throughput | 1822 info.
- +---------------+---------------+ |
- (continued)
-
-
-
- -42-
-
-
- RFC-869 December 1983
-
-
-
-
- TAC throughput (cont.)
-
- +---------------+---------------+ |
- | Host Output Abort Count | 1822 info.
- +---------------+---------------+ |
- 15 | Host Down Count | v
- +---------------+---------------+ ----
- | # of datagrams sent | ^
- +---------------+---------------+ |
- | # of datagrams received | |
- +---------------+---------------+ IP info.
- | # of datagrams discarded | |
- +---------------+---------------+ |
- | # of fragments received | v
- +---------------+---------------+ |
- 20 | # of fragments discarded | v
- +---------------+---------------+ ----
- | # of segments sent | ^
- +---------------+---------------+ |
- | # of segments received | |
- +---------------+---------------+ |
- | # of segments discarded | |
- +---------------+---------------+ TCP info.
- | # of octets sent | |
- +---------------+---------------+ |
- 25 | # of octets received | |
- +---------------+---------------+ |
- | # of retransmissions | v
- +---------------+---------------+ ----
-
-
- HMP FIELDS
-
- System Type
-
- TAC = 3
-
- Message Type
-
- TAC Throughput Message = 3
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
-
- -43-
-
-
- RFC-869 December 1983
-
-
-
- Sequence Number
-
- A 16 bit number incremented at each collection interval
- (i.e. when a new throughput message is assembled). The HM
- will be able to detect lost or duplicate messages by
- checking the sequence numbers.
-
- Returned Sequence Number
-
- Contains the sequence number from the polling message
- requesting this report.
-
- TAC THROUGHPUT FIELDS
-
- Mess-time
-
- The time (in 640ms. units) at which the message was sent to
- the HM.
-
- Data-Time
-
- Data-time is the time (in 640ms. units) when this set of
- data was collected. (See Description.)
-
- Prev-Time
-
- Prev-time is the time (in 640 ms. units) of the previous
- collection of data (and therefore, is the time when the data
- in this message began accumulating.)
-
- Version Number
-
- The TAC's software version number.
-
- Last Trap Message
-
- Contains the sequence number of the last trap message sent
- to the HM. This will allow the HM to detect how many trap
- messages are being lost.
-
- Bit Flags
-
- There are sixteen bit flags available for reporting the
- state of various switches (hardware and software) in the
- TAC. The bits are numbered as follows for purposes of the
- discussion below.
-
-
-
-
-
- -44-
-
-
- RFC-869 December 1983
-
-
-
-
-
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | | | | | | | | | | | | | | | | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
-
-
- The bit flags report the status of the following:
-
- Bit Meaning
- 15 0 => DDT override off; 1 => override on.
- 11-14 0 => Sense Switch n is off; 1 => SSn on.
- 10 0 => Traps to remote monitor;
- 1 => Traps to console.
- 9 1 => Message generator on.
- 0-8 unused
-
-
-
- Free PDB count
-
- The number of PDBs on the free queue.
-
- Free MBLK count
-
- The number of MBLKs on the free queue.
-
- # of TCP connections
- # of NCP connections
-
- The number of open connections for each protocol.
-
- 1822 info.
-
- These six fields report statistics which concern the
- operation of the 1822 protocol module, i.e. the interface
- between the TAC and its IMP.
-
- IP info.
-
- These five fields report statistics which concern Internet
- Protocol in the TAC.
-
- TCP info.
-
-
-
- -45-
-
-
- RFC-869 December 1983
-
-
-
- These six fields report statistics which concern TCP
- protocol in the TAC.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -46-
-
-
- RFC-869 December 1983
-
-
-
- C Appendix C - Gateway Monitoring
-
- C.1 Gateway Parameters
-
- The gateway supports parameters to set Throughput and Host
- traffic matrix measurements. The type of parameters and the
- parameter and data pairs are as follows:
-
- Throughput - Type = 3
-
-
- Parm. Description Control Data Word
- ----- ----------- -----------------
-
- 1 Start/Stop 0=Stop,1=Start
- 2 Collection Interval Time in 1 minute
- ticks
-
-
- Host Traffic Matrix - Type = 4
-
-
- Parm. Description Control Data Word
- ----- ----------- -----------------
-
- 1 Start/Stop 0=Stop,1=Start
- 2 Collection Interval Time in 1 minute
- ticks
- 3 HTM Switch Control Include Control
- Protocols
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -47-
-
-
- RFC-869 December 1983
-
-
-
- C.2 Message Type 1: Gateway Trap
-
- Description
-
- When traps occur in the gateway they are buffered. At a
- fixed time interval (currently 10 seconds) the gateway will
- send any traps that are in the buffer to the monitoring
- center. The traps are sent as unsolicited messages.
-
- A Gateway trap message has the following format:
-
- 0 0 0 1
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Gateway Version # |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Size of Trap Entry | ;First Trap
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Time of Trap |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Trap ID |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Process ID |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R0 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R1 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R2 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R3 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- (continued)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -48-
-
-
- RFC-869 December 1983
-
-
-
- Gateway Trap Message (cont'd.)
-
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R4 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R5 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | R6 |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of this Trap |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- | Additional Trap reports |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- HMP FIELDS
-
- System Type
-
- Gateway = 4
-
- Message Type
-
- Gateway Trap Message = 1
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Password or Returned Sequence Number
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the monitoring center can order the received trap
- messages and detect missed messages.
-
-
-
- -49-
-
-
- RFC-869 December 1983
-
-
-
- GATEWAY TRAP FIELDS
-
- Gateway Version #
-
- The software version number of the gateway sending the trap.
-
- Trap Reports
-
- The remainder of the trap message consists of the trap
- reports. Each consists of the following fields:
-
- Size of Trap Entry
-
- The size in 16-bit words of the trap entry, not
- including the size field.
-
- Time of Trap
-
- The time in (in 1/60 sec. ticks) at which the trap
- occurred.
-
- Trap ID
-
- The number of the trap which is used to identify the
- trap.
-
- Process ID
-
- The identifier of the process that executed the trap.
-
- R0-R6
-
- The registers of the machine at the occurrence of the
- trap.
-
- Count of this Trap
-
- The number of times that this trap occurred.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -50-
-
-
- RFC-869 December 1983
-
-
-
- C.3 Message Type 2: Gateway Status
-
- Description
-
- The gateway status message gives a summary of the status of
- the gateway. It reports information such as version number
- of the gateway, buffer memory usage, interface status and
- neighbor gateway status.
-
- A Gateway Status message has the following format:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -51-
-
-
- RFC-869 December 1983
-
-
-
-
- 0 1 1 2 3 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Version Number |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Patch Version Number |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Time Since Gateway Restart | ;in minutes
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Measurement Flags | ; Bit flags to indicate which
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; measurements are on, 1= On
- | Routing Sequence No. | ; Sequence # of last routing
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; update sent
- | Access Table Version # |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Load Sharing Table Ver. # |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Memory in Use |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Memory Idle |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Memory Free |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # of Blks | ; Memory Allocation Info
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Size of 1st Block (in bytes) |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # Allocated |
- +-+-+-+-+-+-+-+-+
- | # Idle |
- +-+-+-+-+-+-+-+-+
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Size of n'th Block (in bytes) |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # Allocated |
- +-+-+-+-+-+-+-+-+
- | # Idle |
- +-+-+-+-+-+-+-+-+
- (continued)
-
-
-
-
-
-
-
-
-
-
- -52-
-
-
- RFC-869 December 1983
-
-
-
- Gateway Status Message (cont'd.)
-
- +-+-+-+-+-+-+-+-+
- | # of Ints. |
- +-+-+-+-+-+-+-+-+
- | Int 1 Flags | ;Interface 1 Status Flags
- +-+-+-+-+-+-+-+-+ ; Bit 0 - 1=Up, 0=Down
- ; 1 - 1=Looped, 0=Not
- +-+-+-+-+-+-+-+-+
- | Buffers | ; # of buffers on write Queue
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Time since last Status Change | ;Time since last up/dwn change
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # of Buffers Allocated |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Data Size for Interface |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Interface 1 Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- +---------------+
- | Int n Flags | ;Interface n Status Flags
- +-+-+-+-+-+-+-+-+
- | Buffers |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Time since last Status Change |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # of Buffers Allocated |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Data Size for Interface |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Interface n Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # Neighbors |
- +-+-+-+-+-+-+-+-+
- | UP/DN Flags | ;Bit flags for Up or Down
- +-+-+-+-+-+-+-+-+ ; 0 = Dwn, 1 = Up
- . ; MSB is neighbor 1
- . ; (as many bytes as necessary)
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Neighbor 1 Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Neighbor n Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
-
-
- -53-
-
-
- RFC-869 December 1983
-
-
-
- HMP FIELDS
-
- System Type
-
- Gateway = 4
-
- Message Type
-
- Gateway Status Message = 2
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Password or Returned Sequence Number
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the monitoring center can order the received trap
- messages and detect missed messages.
-
- GATEWAY STATUS FIELDS
-
- Version Number
-
- The version number of the gateway sending the Status
- message.
-
- Patch Version Number
-
- The patch version number of the gateway.
-
- Time Since Gateway Restart
-
- The time in minutes since the gateway was last restarted or
- reloaded.
-
-
-
-
-
-
-
-
- -54-
-
-
- RFC-869 December 1983
-
-
-
- Measurement Flags
-
- Flags that, if set, indicate which measurements are turned
- on. Current values are:
-
-
- Bit 0 = Message Generator
- 1 = Throughput
- 2 = Host Traffic Matrix
- 3 = Access Control 1
- 4 = Access Control 2
- 5 = Load Sharing
- 6 = EGP in Gateway
-
-
- Routing Sequence Number
-
- The sequence number of the last routing update sent by this
- gateway.
-
- Access Control Table Version #
-
- The version number of the access control table.
-
- Load Sharing Table Version #
-
- The version number of the load sharing table.
-
- Memory In Use
-
- The number of bytes of buffer memory that are currently in
- use.
-
- Memory Idle
-
- The number of bytes of buffer memory that have been
- allocated but are currently idle.
-
- Memory Free
-
- The number of bytes of buffer memory that has not been
- allocated.
-
- MEMORY ALLOCATION INFORMATION
-
- The next part of the status message contains information on
- the buffer pools in the gateway. The fields are:
-
- # of Blocks
-
-
- -55-
-
-
- RFC-869 December 1983
-
-
-
- The number of different buffer pools.
-
- Size of Block
-
- The size of this block in bytes.
-
- # Allocated
-
- The number of blocks of this size that have been
- allocated.
-
- # Idle
-
- The number of blocks of this size that are idle.
-
- GATEWAY INTERFACE FIELDS
-
- The next part of the status message are fields that provide
- information about the gateway's interfaces. The fields are:
-
- # of Interfaces
-
- The number of network interfaces that the gateway has.
-
- Interface Flags
-
- Flags that indicate the status of this interface. The
- current values are:
-
- Bit 0 - 1=Up/0=Down
- 1 - 1=Looped/0=Not Looped
-
-
- Buffers
-
- The numbers on this interfaces write queue.
-
- Time Since Last Status Change
-
- The time in minutes since this interface changed status
- (Up/Down).
-
- # of Buffers Allocated
-
- The number of buffers allocated for this interface.
-
- Data Size for Interface
-
- The buffer size required for this interface.
-
-
- -56-
-
-
- RFC-869 December 1983
-
-
-
- Interface Address
-
- The Internet address of this interface.
-
- NEIGHBOR GATEWAY FIELDS
-
- The final part of the status message consists of information
- about this gateway's neighbor gateways. The fields are:
-
- # of Neighbors
-
- The number of gateways that are neighbor gateways to
- this gateway.
-
- UP/DN Flags
-
- Bit flags to indicate if the neighbor is up or down.
-
- Neighbor Address
-
- The Internet address of the neighbor gateway.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -57-
-
-
- RFC-869 December 1983
-
-
-
- C.4 Message Type 3: Gateway Throughput
-
- Description
-
- The gateway collects throughput statistics for the gateway,
- its interfaces, and its neighbor gateways. It collects them
- for regular intervals and will save them for collection via
- a Poll message from the Monitoring host. If they are not
- collected by the end of the next interval, they will be lost
- because another copy will be put into the saved area.
-
- A Gateway Throughput message has the following format:
-
- 0 1 1 2 3 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Gateway Version Number |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Collection Time in Min |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Number of Interfaces |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Number of Neighbors |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Number of Host Unreachable | ; # of packets dropped because
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; Host was Unreachable
- | Number of Net Unreachable |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ; Net was Unreachable
-
- ; Interface Counters
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Interface Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Packets Dropped on Input |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of IP Errors |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Datagrams for Us |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Datagrams to be Forwarded |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Datagrams Looped |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- (continued)
-
-
-
-
-
-
- -58-
-
-
- RFC-869 December 1983
-
-
-
- Gateway Throughput Message (cont'd.)
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Bytes Input |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Datagrams From Us |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count that were Forwarded |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Local Net Dropped |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Queue full Dropped |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Bytes Output |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- | Counters For Additional Interfaces |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- ; Neighbor counters
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Neighbor Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Routing Updates TO |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- |Count of Routing Updates FROM |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- (continued)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -59-
-
-
- RFC-869 December 1983
-
-
-
- Gateway Throughput Message (cont'd.)
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Pkts from US sent to/via Neig |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Pkts forwarded to/via Neighb |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Datagrams Local Net Dropped |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Datagrams Queue full Dropped |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Count of Bytes send to Neighbor |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- | Counters for Additional Neighbor Gateways |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
-
- HMP FIELDS
-
- System Type
-
- Gateway = 4
-
- Message Type
-
- Gateway Throughput Message = 3
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Password or Returned Sequence Number
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the HM can order the received trap messages and
-
-
- -60-
-
-
- RFC-869 December 1983
-
-
-
- detect missed messages.
-
- GATEWAY THROUGHPUT FIELDS
-
- Gateway Version Number
-
- The software version number of the gateway sending the trap.
-
- Collection Time in Min.
-
- The time period in minutes in which the throughput data is
- to be collected.
-
- Number of Interfaces
-
- The number of interfaces this gateway has.
-
- Number of Neighbors
-
- The number of neighbor gateways this gateway has.
-
- Number of Host Unreachable
-
- The number of packets dropped because the Host was
- unreachable.
-
- Number of Net Unreachable
-
- The number of packets dropped because the Network was
- unreachable.
-
- INTERFACE COUNTERS
-
- The next part of the Throughput message contains counters
- for the gateways interfaces. Each interface has the
- following fields:
-
- Interface Address
-
- The Internet address of this interface.
-
- Packets Dropped on Input
-
- The number of packets on input to this interface
- because there were not enough buffers.
-
- Count of IP Errors
-
- The number of packets received with bad IP headers.
-
-
- -61-
-
-
- RFC-869 December 1983
-
-
-
- Count of Datagrams for Us
-
- The number of datagrams received addressed to this
- gateway.
-
- Datagrams to be Forwarded
-
- The number of datagrams were not for this gateway and
- should be sent out another interface.
-
- Count of Datagrams Looped
-
- The number of datagrams that were received on and sent
- out of this interface.
-
- Count of Bytes Input
-
- The number of bytes received on this interface.
-
- Count of Datagrams From Us
-
- The number of datagrams that originated at this
- gateway.
-
- Count that were Forwarded
-
- The number of datagrams that were forwarded to another
- gateway.
-
- Count of Local Net Dropped
-
- The number of packets that were dropped because of
- local network flow control restrictions.
-
- Count of Queue full Dropped
-
- The number of packets that were dropped because the
- output queue was full.
-
- Count of Bytes Output
-
- The number of bytes sent out on this interface.
-
-
-
-
-
-
-
-
-
- -62-
-
-
- RFC-869 December 1983
-
-
-
- NEIGHBOR COUNTERS
-
- The last part of the Throughput message are counts for each
- neighbor gateway. The fields are:
-
- Neighbor Address
-
- The Internet address of this neighbor gateway.
-
- Count of Routing Updates TO
-
- The number of routing updates sent to this neighbor
- gateway.
-
- Count of Routing Updates FROM
-
- The number of routing updates received from this
- neighbor gateway.
-
- Pkts from US sent to/via Neig
-
- The number of packets from this gateway sent to or via
- this neighbor gateway.
-
- Pkts forwarded to/via Neighb
-
- The number of packets forwarded to or via this neighbor
- gateway.
-
- Datagrams Local Net Dropped
-
- The number of datagrams dropped to this neighbor
- gateway because of local network flow control
- restrictions.
-
- Datagrams Queue full Dropped
-
- The number of datagrams dropped to this neighbor
- because the output queue was full.
-
- Count of Bytes send to Neighbor
-
- The number of bytes sent to this neighbor gateway.
-
-
-
-
-
-
-
-
- -63-
-
-
- RFC-869 December 1983
-
-
-
- C.5 Message Type 4: Gateway Host Traffic Matrix
-
- Description
-
- The Host Traffic Matrix (HTM) message contains information
- about the traffic that flows through the gateway. Each
- entry consists of the number of datagrams sent and received
- for a particular source/destination pair.
-
- A Gateway HTM message has the following format:
-
- 0 1 1 2 3 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Gateway Version Number |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Overflow counter |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Collection Time in Min |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Number of HTM entries |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | IP Source Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | IP Destination Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | IP Protocol | (unused) |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Counter for SRC -> DST datagrams |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Counter for DST -> SRC datagrams |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | |
- | Additional HTM Reports |
- | |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
-
-
-
-
-
-
-
-
- -64-
-
-
- RFC-869 December 1983
-
-
-
- HMP FIELDS
-
- System Type
-
- Gateway = 4
-
- Message Type
-
- Gateway HTM Message = 4
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Password or Returned Sequence Number
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the HM can order the received trap messages and
- detect missed messages.
-
- GATEWAY HTM FIELDS
-
- Gateway Version Number
-
- The software version number of this gateway.
-
- Overflow counter
-
- The number of HTM entries lost because the HTM buffer was
- full.
-
- Collection Time in Min
-
- The time period in minutes in which the HTM data is being
- collected.
-
- Number of HTM entries
-
- The number of HTM reports included in this message.
-
-
-
-
- -65-
-
-
- RFC-869 December 1983
-
-
-
- HTM ENTRIES
-
- The remainder of the HTM message consists of the actual HTM
- entries. Each entry consists of the following fields:
-
- IP Source Address
-
- The source Internet address of the datagrams being
- counted.
-
- IP Destination Address
-
- The destination Internet address of the datagrams being
- counted.
-
- IP Protocol
-
- The protocol number of the datagrams.
-
- Counter for SRC -> DST datagrams
-
- The number of datagrams sent in the Source to
- Destination address direction.
-
- Counter for DST -> SRC datagrams
-
- The number of datagrams sent in the Destination to
- Source address direction.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -66-
-
-
- RFC-869 December 1983
-
-
-
- C.6 Message Type 6: Gateway Routing
-
- Description
-
- The Routing message contains information about routes the
- gateway has to the networks that make up the Internet. It
- includes information about its interfaces and its neighbor
- gateways.
-
- A Gateway Routing message has the following format:
-
- 0 1 1 2 3 3
- 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Version Number |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # of Ints. |
- +-+-+-+-+-+-+-+-+
- | UP/DN Flags | ;Bit flags for Up or Down
- +-+-+-+-+-+-+-+-+ ; 0 = Dwn, 1 = Up
- . ; MSB is interface 1
- . ; (as many bytes as necessary)
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Interface 1 Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Interface n Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | # Neighbors |
- +-+-+-+-+-+-+-+-+
- | UP/DN Flags | ;Bit flags for Up or Down
- +-+-+-+-+-+-+-+-+ ; 0 = Dwn, 1 = Up
- . ; MSB is neighbor 1
- . ; (as many bytes as necessary)
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Neighbor 1 Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Neighbor n Address |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
- (continued)
-
-
-
-
- -67-
-
-
- RFC-869 December 1983
-
-
-
- Gateway Routing Message (cont'd.)
-
- +-+-+-+-+-+-+-+-+
- | # of Networks |
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Network 1 # | | | ; 1, 2, or 3 bytes
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Distance |
- +-+-+-+-+-+-+-+-+
- | Neighbor # |
- +-+-+-+-+-+-+-+-+
- .
- .
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Network n # | | | ; 1, 2, or 3 bytes
- +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
- | Distance |
- +-+-+-+-+-+-+-+-+
- | Neighbor # |
- +-+-+-+-+-+-+-+-+
-
- HMP FIELDS
-
- System Type
-
- Gateway = 4
-
- Message Type
-
- Gateway Trap Message = 6
-
- Port Number
-
- Unused
-
- Control Flag
-
- Unused
-
- Password or Returned Sequence Number
-
- Unused
-
- Sequence Number
-
- A 16 bit number incremented each time a trap message is sent
- so that the HM can order the received trap messages and
- detect missed messages.
-
-
-
- -68-
-
-
- RFC-869 December 1983
-
-
-
- GATEWAY ROUTING FIELDS
-
- Gateway Version #
-
- The software version number of the gateway sending the trap.
-
- INTERFACE FIELDS
-
- The first part of the routing message contains information
- about the gateway's interfaces. There is data for each
- interface. The fields are:
-
- # of Interfaces
-
- The number of interfaces that this gateway has.
-
- UP/DN Flags
-
- Bit flags to indicate if the Interface is up or down.
-
- Interface Address
-
- The Internet address of the Interface.
-
- NEIGHBOR FIELDS
-
- The next part of the routing message contains information
- about this gateway's neighbor gateways. The fields are:
-
- # of Neighbors
-
- The number of gateways that are neighbor gateways to
- this gateway.
-
- UP/DN Flags
-
- Bit flags to indicate if the neighbor is up or down.
-
- Neighbor Address
-
- The Internet address of the neighbor gateway.
-
- NETWORK ROUTING FIELDS
-
- The last part of the routing message contains information
- about this gateway's routes to other networks. This
- includes the distance to each network and which neighbor
- gateway is the route to the network. The fields are:
-
-
-
- -69-
-
-
- RFC-869 December 1983
-
-
-
- # of Networks
-
- The number of networks that are reachable from this
- gateway.
-
- Network #
-
- The network number of this network. This is the
- network part of the Internet address and may be one,
- two, or three bytes in length depending on whether it
- is a Class A, B, or C address.
-
- Distance
-
- The distance in hops to this network. Zero hops means
- that the network is directly connected to this gateway.
- A negative number means that the network is currently
- unreachable.
-
- Neighbor #
-
- The neighbor gateway that is the next hop to reach this
- network. This is an index into the previous
- information on this gateway's neighbor gateways. This
- field is only valid if the Distance is greater than
- zero.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -70-
-