Digital Technical Journal, Volume 5, Number 1 Dtj_v05 01_1993 Dtj V05 01 1993

dtj_v05-01_1993 dtj_v05-01_1993

User Manual: dtj_v05-01_1993

Open the PDF directly: View PDF PDF.
Page Count: 147

DownloadDigital Technical Journal, Volume 5, Number 1 Dtj_v05-01_1993 Dtj V05-01 1993
Open PDF In BrowserView PDF
DECnet Open Networking

Digital Technical Journal
Digital Equipment Corporation

Volume 5 Number 1

Winrer 1993

Editorial

Jane C. Blake, Editor
Helen L. Patterson, Associate Editor
Kathleen M. Stetson, Associate Editor

Circulation

Catherine M. Phillips, Administrator

Production

Terri Autieri, Production Editor

Anne S. Katzeff, Typographer
Peter R. Woodbury,

Advisory Board

U lustrator

Samuel H. Fuller, Chairman
Richard W Beane

Donald Z. Harbert

Richard]. Hollingsworth
Alan G. Nemeth
jeffrey H. Rudy
Stan Smits
Michael C. Thurk
Gayn B. Winters
The Digital

Technicaljournal is a refereed journal published quarterly by Digital

Equipment Corporation, 146 Main Street ML01-3/B68, Maynard, Massachusetts

01754-2571. Subscriptions to the journal are $40.00 for four issues and must be pre­

paid in U.S. funds. University and college professors and Ph.D. students in the electrical

engineering and computer science fields receive complimentary subscriptions upon

request. Orders, inquiries, and address changes should be sent to the Digital Technical
journal at the published-by address. Inquiries can also be sent electronically to
DTJ@CRL.DEC.COM. Single copies and back issues are available for $ 16.00 each from

Digital Press of Digital Equipment Corporation, 129 Parker Street, Maynard, MA 01754.
Digital employees may send subscription orders on the ENET to RDVAX::JOURNAL
or by interoffice mail to mailstop ML01-3/B68. Orders should include badge number,
site location code, and address. All employees must advise of changes of address.
Comments on the content of any paper are welcomed and may be sent to the editor
at the published-by or network address.
Copyright© 1993 Digital Equipment Corporation. Copying without fee is permitted
provided that such copies are made for use in educational institutions by faculty
members and are not distributed for commercial advantage. Abstracting with credit
of Digital Equipment Corporation's authorship is permitted . All rights reserved.
The information in the journal is subject to change without notice and should not be

construed as a commitment by Digital Equipment Corporation. Digital Equipment

Corporation assumes no responsibility for any errors that may appear in the journal.

ISSN 0898 -901X

Documentation Number EY-M7 70E-DP
The following are trademarks of Digital Equipment Corporation: ADVANTAGE­
NETWORKS, Alpha AXP , the Alpha AXP logo, AXP , Bookreader, DEC, DEC 3000 AXP,
DEC FDD!controller, DEC OSF/1 AXP , DEC LANcontroller, DEC WANcontroller,
DECbridge, DECchip 21064, DECconcentrator, DEChub, DECmcc, DECnet, DECnet/SNA,
DECnet-VAX, DECnet/OSI for Open VMS, DECnet/OSI for ULTRIX, DECNlS 500/600,
DECstation, DECthreads, DECUS, Digital, the Digital logo, DNA, LANbridge, L AT,
Open VMS, Open VMS on Alpha AXP, POLYCENTER, POLYCENTER Network Manager 200,
POLYCENTER Network Manager 400, POLYCENTER SNA Manager, RS232, ThinWire,
TURBOchannel, ULTRIX, VAX, VMS, and VMSciuster.
Advanced System Management and SOLVE: Connect for EM A are trademarks of System
Center, Inc.
AppleTalk is a registered trademark of Apple Computer, Inc.
BSD is a trademark of the University of California at Berkeley.
FastPacket, StrataCom, and IPX are registered trademarks of StrataCom, Inc.

Cover Design

Our cover illustrates an image of the

simplicity of data sharing as experienced
by system users interconnected through a

IBM and NetView are registered trademarks oflnternational Business Machines
Corporation.
Motif, OSF, and OSF/1 are registered trademarks of Open Software Foundation, Inc.
NetWare and Novell are registered trademarks of Novell, lnc.

global network; papers in this issue describe

NFS is a registered trademark of Sun Microsystems, Inc.

the depth and complexity of technologies

Presto serve is a trademark of Legato Systems, Inc.

and products that make the simplicity of

System V is a trademark of American Telephone and Telegraph Company.

data exchange possible.

UNIX is a registered trademark of UNIX System Laboratories, Inc.

The cover design is by Deb Anderson of

X/Open is a trademark ofx;Open Company Limited.

Quantic Communications, Inc.

Book production was done by Quantic Communications, Inc.

I

Contents
10 Foreword
Anthony G. Lauck
DECnet Open Networking

12 Overview of Digital's Open Networking
John Harper
21

The DECnet/OSifor OpenVMS Ver sion 5.5 Implementation
Lawrence Yetto, Dorothy Noren Millbrandt, Yanick Pouffary,
Daniel). Ryan , J r. , and D av id). Sullivan

34

The ULTRIX Implementation of DECnet/OSI
Kim A. Buxton, Edward). Fe rris, and Andrew K . Nash

44 High-performa nce TCP/IP and UDP/IP Networking
in DEC OSF/1 for Alpha A XP
Chran-Ham Chang, Richard Flower, john Forecast, Heather Gray,
Wil l iam R. Hawe, K . K . Ramakrishnan, Ashok P. Nadkarni,
Uttam N. Sh ikarp u r, and Kathleen M. Wilde
62

Routing Architecture
Radia) . Pe rlman, Ross W Calion , and I. M ichael C. Shand

70 Digital's Multiprotocol Routing Software Design
Graham R. Cobb and El.liot C. Gerberg
84

The DECNIS 500/600 Multiprotocol Bridge/Router
and Gateway
Stewart F Bryant and David L.A. Brash

99

Fra�ne Relay Networks
Robe rt). Roden and Deborah Tay le r

107 An Implementation o f the OS/ Upper Layers
and Applications
D avid C. Robinson, Lawrence N. Friedman,
and Scott A. Wattum
117 Network Management
Mark W Sylor, Frands Dolan, and David G. Shurtleff

130 Design of the DECmcc Management Director
Col in Strutt and james A. Swist

I

Editor's Introduction
protocols, and the network i n terface. They then
detail the optimizations made fo r high performance.

Rou t i ng data through networks with thousands
of nodes is a very diffi c u l t task. Ra d i a Perlman, Ross
Ca lion, and M i ke Shand desc ribe how the Phase V
routing arch i tecture addresses rout i n g complexity.
Focusing on the IS-IS protocol, they pose problems
a routi ng protocol could experience, pres e n t al ter­
native solu tions, and expl a i n the IS - IS approach.
The chal lenges i n developing m u l t iprotocol rout­
ing software for i nternetworking across LANs, WANs,
and d ial-up n e t works are presented i n the paper by

Jane C. Blake

Gra ham Cobb and E l l iot Gerberg. They h ig h l ight

Editor

the importance of the stability of the rou t i ng algo­
rithms, u s i ng the D EC WAN router and DECNIS prod­

Ten years ago, a network of 200 nodes was con­

u c ts as a basis for d isc ussing a l ternative designs.

sidered very large with u n cert a i n managea b i l i t y.

Stewart Bryan t and David Brash then focus on

100,000

details of the h igh-performance DECNIS 500/600

nodes in open, d istributed system env i ronments

bridge/router and gateway. They discuss the archi­

Today, Digita l 's n e t works accommodate

a n d resolve the complexities of i ncompat i b i l i t y

tecture and the algorithm for d istri b u ted forward­

among multivendor systems. Ten years from today,

i ng that i ncreases scal able performance. Both the

n e t work systems comprising a million-plus nodes

hardware a nd the software are described.

wi l l be b u i l t based upon the D igital architectures
and technologies described in this issue.

In additi on to rou t i ng , the subject of clara transfer
of h igh-speecl, bursty traffic using a simpl ified form

John Harper provides an i nformative overview of

of packet switching is described . Robert Rod e n and

advances made with each phase of the D ig i t a l Net­

Deborah Tay ler discuss frame relay networks, their

work Architecture, now in Phase V He describes
the architectural layers and d is t i ngu ishes D ig ital's

u n iq u e characteristics, and the care needed i n pro­
tocol selection and congestion hand l ing.

approach to network services and m a nagement

The above d iscussions of data transfe r a n d rout­

from t ha t of others in the i ndustry. His paper offers

ing occ u r a t t he lower layers of the network archi­

context for those that follow.
The Phase V architecture p rov ides the m igration

tecture. Dave Robi ns o n , Larry Fried m a n , and Scott
Wat t u m present an overview of the upper layers

to open systems from previous phases of D ECnet. I n

and

impleme n t i n g Phase

throughp u t and m i n imize con nection del ays.

V,

designers of two DECnet

describe

implementations

that

m aximize

products for the Op enVMS and ULTRlX ope r a t i ng

Network m a n ageme n t is critica l to the rel iable

systems shared several goals: extend network access

function of the networ k . As Mark Sylor, Frank

i n a m u ltivendor environment, use standard p roto­

Dolan, a n d Dave S h u r t leff tell u s in their paper,

cols, and protect customers' software investments.

Phase V manageme n t is based on a new architec­

Larry Yetto, Dotsie M i l l brandt, Yanick Pou ffa ry, D a n

ture that e ncompasses man agement of the n e t work

Ryan , a n d David Sul livan describe the D ECne t/OSI

and systems. They expl a i n the decision to move

for OpenVMS implemen t a tion and give deta i l s of

management respons i b i l i ty to the subsystem arch i­

t he s ig nifican tly different design of Phase V net­

tecture, and a l so describe the entity mode l . The

work m a n agement. In their paper on D ECnet/OSI

next paper e l aborates on the d irector portion of the

for ULTRJX, Kim Buxton, Ed Ferris, and Andrew

man agement

Nash stress the importance of the protocol swi t c h

M anagement D irector. Col i n Stru t t and Jim Swist

tables i n a multiprotocol env i ronmen t . DECnet/OSI

review the design of this platform for developi n g

for ULTRJX incorporates OS! , TCP/IP, and X.25.
I n the broad ly accepted TCP/IP protocol area,
D ig i t a l has developed a h igh-performance TCP/JP
implementation that takes advantage of the ful l FDDJ
bandwi d t h .

K.K. Ramakrishnan and members of the

development team review the characteristics of the
Alpha AXP workstation, OSF/1 operating system, the

2

arch i tectu re,

cal led

the

DECmcc

management capabil ities, t h e modu larity o f which
a l lows future modules to be added dynamically
The e d i tors thank John Harper for h is help in
selecting the content of t h is issue.

I

Biographies

David L.A.

Brash
David Brash, a consu l tant engineer, joined Digital's
Networks Engineering Group in 198 5 to lead the hardware development of the
MicroServer communications server (DEMSA). As the technical leader for the
DECNIS 500/600 hardware platforms, David contributed to the architectu re,
backplane specification, module and ASIC designs and monitored correctness.
He was an active member of the IEEE Futurebus+ working group. He is currently
leading a group supporting Alpha design wins in Europe. David holds a B.Sc. in

electrical and electronic engineering from the University of Strathclyde.

Stewart F. Bryant

A

consulting engineer with Networks and Commu­
nications in Reading, England, Stewart Bl)'ant worked on the advanced develop­
ment program that developed the DECNIS 600 architecture. D u ring the last six

months of the program, he was its technical leader, focusing on implementation
issues. P r ior to this work, Stewart was the hardware and firmware architect for
the MicroServer hardware platform. He earned a P h . D. in physics from I mperial
Col lege in 1978. He is a member of the I nstitute of E lectrical Engineers and has
been a Chartered Engineer since 1985.

Kim A. Buxton

Kim Buxton is a principal software engineer in the Networks
and Communications Group. During t he past seven years, Kim has been work­
ing on DECnet and osr for UNIX operating systems. She is currently the project
leader of the DECnet/OSI for DEC OSF/1 AXP release. Prior to assuming the role of
project leader, Kim worked on network management, session control, and trans­
port protocols for DECnet-ULTRIX products. S he has worked in the area of net­
works and communications since joining Digital in 1980. S he earned her B.S.
degree in mathematics and secondary education from the University of lowell.

Ross W . Calion

As a member of Digital's Network Architecture Group from
1988 to 1993, Ross Calion worked on routing algorithm and addressing issues.
He was a primary author of the Integrated IS-IS protocol and of the guide! ines for

using NSAP addresses in the I nternet. P reviously, he was employed by Bolt
Beranek and Newman as a senior scientist and helped develop the ISO CLNP pro­
tocol. Ross received a B.Sc. ( 19 69) in mathematics from MIT and an M .Sc. (197 7 ) in
operations research from Stanford University. He is currently employed as a con­
sulting engineer at Wel l fleet Communications.

Chran-Ham Chang
Chran-Ham Chang is a principal software engineer in the
UNIX System Engineering Group and a member of the FAST TCP/IP project team.
Since joining Digi t al in 1987, Chran has contributed to the development of vari­

ous E thernet and FOO l device d rivers on both the ULTRIX and DEC OSF/ 1 AXP
systems. He was also involved in the U LTRIX network performance analysis and
tools design. Prior to this, Chran worked as a software specialist in Taiwan for a
distributor of D igital's products. He received an M .S. i n computer science from
the New jersey Institute of Technology.

3

Biographies

Graham Cobb is a consulting engineer in the Internet

Graham R. Cobb

Products Engineering Group and was software project leader for the DECNIS
'500/600 router development. Graham holds an MA in mathematics from the
University of Cambridge ancl joined Digital as a communications software engi­
neer in 1982. He has worked on many Digital communications products, includ­
ing X.2'5 products and routers, and was a major contributor to the DEC WAN router
100/'500 software immediately prior to leading the DECNIS development. Most
recently, Graham has been working on new-generation routing software.

Francis Dolan

Frank Dolan is a consultant engineer with Digital's Telecommu­

nication Business Group Engineering in Valbonne, France. He is currently the
project manager and technical leader of the GD.MO translator, a tool being devel­
oped to support the DECmcc/TeMIP OS! access module and OSI agent presenta­
tion module. Prior to this work, Frank was the architect of several Phase V DNA

specifications, including DDCMP network management, OS! transport, and
network routing accounting. He was also an active member of OS! management
standards committees. Frank has filed one European patent application.

Ed Ferris is a principal engineer in the Networks and

Edward J. Ferris

Communications Group. During the past seven years, Ed has been working on
DECnet-

LTRIX. He is currently one of the technical leaders of the DECnet/OSI

for DEC OSF/1 AXP release. Ed has primarily worked at the data link and network
protocol layers. He has worked on networks and communication products since

joining Digital in 1982. Ed earned a B.A. in English from the University
of Massachusetts and a B.S. in computer engineering from Boston University.

Richard Flower

Richard Flower works on system performance issues in

multiprocessors, networking, distributed systems, workstations, and memory
hierarchies. T he need for accurate time-stamping events across multiple systems
led him to develop the QUIPU performance monitor. The use of this monitor led
to performance improvements in networking, drivers, ami RPC. Richard earned

a B.S.E.E. from Stanford University (with great distinction) and a Ph.D. in com­

puter science from MIT. Prior to joining Digital, he was a professor at the
University of Illinois. Richard is a member of Phi Beta Kappa and Tau Beta Pi.

john

1\ �
....
�· · .

.e
:
�

.r '

.

..
_.

. . ...

-

-

- - ....'ov
.-

�

4

Forecast

A

software

consultant

engineer

with

the

Networks

Engineering Advanced Development Group, John Forecast addresses network
performance issues associated with the transmission of audio and video data
through existing networks. .John joined Digital in the United Kingdom in 1974
and moved to the United States to help design DECnet-RSX Phase 2 products,
DECnet Phase rv, and DECnet implementations on

U LTIUX ancl System V UNIX.

John also worked o n file servers for VMS and a prototype public key authentica­
tion system. He holds a Ph.D. from the University of Essex.

I
Lawrence N. Friedman

Principal engineer Lawrence Friedman is a technical

leader in the OS! Applications Group. He joined Digital in

1989

and is the project

leader for ULTRIX FTAJ\1 V l .O and V l . l . In addition to his project responsibilities,
Larry is Digital's representative to the National Institute of Standards and
Technologies
and Phase

3

(NIST) FTAM SIG

and was the editor of the

documents from

1990

1992.

to

NIST FTAM SIG

Phase

FTAM File Store Management International Standard Profile. Larry holds a

(1978)

2

He is currently the editor for the

B .A .

in music from Boston University.

Elliot C. Gerberg

Elliot Gerberg is a senior engineering manager in Digital's

Networks Engineering Division, managing the Routing Engineering Group

(USA).

Since joining Digital in

ing the

DEUNA,

1977,

he has worked on numerous projects includ­

Digital's first LAJ'l adapter; the DECserver

cost terminal server; the

SGEC,

100,

interface; and various multiprotocol routers. Elliot has a

SUNY

Digital's first low­

a high-performance Ethernet semiconductor

B.S.

in physics from

and an M.S. in computer science from Boston University. He holds profes­

sional memberships with the IEEE, the ACM, and the Internet Society.

Heather Gray

A principal engineer in the

UNIX

Software Group

(USG),

Heather Gray is the technical leader for networking performance on the DEC

OSF/1 AXP product family. Heather's current focus is the development ofiP multi­
cast on DEC OSF/1 A.'(P. She has been involved with the development of Digital
networking software (TCP/IP, DECnet, and OS!) since 198 6 . Prior to joining USG,
Heather was project leader for the Internet Portal Y l .2 product. She came to
Digital in

1984,

after working on communication and process control systems at

Broken Hill Proprietary Co., Ltd.

john Harper

(BHP)

in Australia.

As technical director of the Corporate Backbone Networks

Group in NAC, john Harper directed the development of the DECnet Phase V
architecture. Until last year john also chaired the
which deals with standards for the

OS!

ISO

Committee JTCl/SC6/WG2,

network layer. He joined Digital in

1974

after receiving a degree in computer studies (1st class honors) from the
University of Lancaster. john has ten patents (filed or issued) on computer net­
works and has published several conference papers on that subject. He has made
numerous contributions to standards for computer networks.

William R. Hawe

A senior consulting engineer, Bill Hawe manages the

LAN

Architecture Group. He is involved in designing architectures for new net­
working technologies. Bill helped design the FDDI and extended LAN architec­

tures. While in the Corporate Research Group, he worked on the Ethernet
design with Xerox and Intel and analyzed the performance of new communica­
tions technologies. Before joining Digital in

1980,

Bill taught electrical engineer­

ing and networking at the University of Massachusetts, where he earned a B .S. E. E.
and an M.S.E.E. He has published numerous papers and holds several patents.

5

Biographies

Dorothy Noren Millbrandt

Dotsie Millbrandt is a principal software engi­

neer and a co-project leader for Common Network Management. Currently she
is developing management components that will work across all the DECnet/OSI
platforms: OpenVMS, OSF/1, and ULTRlX. Dotsie was the project leader for the
MOP component and the trace facility and has worked on OST transport and con­
figuration software. Prior to this work, she was a project leader and microcode
developer for DSB32 and KJ.\1\'11 synchronous communications controllers in the

CSS Network Systems Group.

Ashok P. Nadkarni

A principal software engineer in the Windows NT

Systems Group, Ashok Nadkarni is working on a port of native Novell NetWare to
Alpha �'

l � LAN SEGMENT FRAME RELAY SERVICE I � LAN SEGMENT A RA E�=�=:=g=�==Y:)� T= K=i=N= '----.....,;:-----' Figure I 100 !6-bit CCITT cyclic Typical Frame Relay Configuration Vol. 5 No. I Wi11ter I'J9.l Digital Technical jour11al Frame Relay Networks • Frame relay addressing, using headers of 2, 3, or backward 4 octets in length. F igure 2 shows the frame relay (BECN) bit, and the discard e l igibility (DE) indica­ reserved in each octet to i nd icate whether or not Avoidance section. header formats. An extended address (E/A) bit is congestion notification tor, which are discussed in the Congestion the octet is the last one in the header. Permanent Virtual Circuit Control Procedures Most of the header represents the data link con­ nection identifier (DLCI), which identifies the Frame relay PVCs provide point-to-point connec­ frame's virtual circu i t . The header may also con­ tions between users. Although the PVCs are set up tain a DLCI or control indicator (D/C) to indicate for long periods of time, they can still be con­ whether the rem aining six bits are to be i nter­ sidered preted as lower DLCI bits or as control bits. For virtual connections because network resources (i.e., buffers and bandwidth) are not con­ a l ignment with LAP-D, the header also contains a sumed unless data is being t ransferred . bit to d iscriminate between commands and For interface management p u rposes, the frame responses (C/R). This bit is not used for support­ relay i n terface includes control procedures based ing frame rel ay access. on the LMI definition contained in the original The DLCI influences the rou t i ng of the frame to m u l t ivendor specification. These procedures use the desired destination. The DLCI is also used to messages carried over a separate PVC identified by m u ltiplex PVCs onto the physical l i nk and enables each endpoint to communicate with an in-channel signaling DLCJ. The management mes­ sages are transferred across the interface using data mu ltiple dest inations by means of a single l ink u n nu mbered i nformation frames, as defined network access. DLC!s may h ave either global o r in CCITI Recommendation Q.922 6 The messages local significance in t h e network. ln t h e global use a format similar to that defined in CCITI case, the scope of the DLCI extends throughout Recommendation Q.931 for ISDN sign a l i ng in sup­ the network such that a particular DLCI always port of cal l control and feature invocation.7 Each identifies the same destination, thus making the message is formed from a set of standardized infor­ frame relay network look more l ike a LAN. ln the m ation elements defining the message type and local case, the scope of the DLCI is l im ited to the associated parameters. The control procedures per­ particu lar interface. When loc a l DLCis are used , form three main functions: the same DLCI can be reused at another interface • to represent a d ifferent connection. • explicit L ink i n tegrity verification initiated by the user device and m aintained o n a continuous basis. Congestion control and avoidance information. This fu nction allows each entity to be confident The frame relay header also contains the forward that the other is operational and that the physical expl icit congestion notification (FECN) bit, the l i nk is in tact. DLCI (6 HIGH-ORDER BITS) C/R E/A = 0 DE EIA C/R E/A = 0 DE E/A = 0 DLCI (6 LOW-ORDER BITS) D/C E/A = 1 DLCI (6 H IGH-ORDER BITS) C/R E/A = 0 DE E/A = 0 I DLCI (4 LOW-ORDER BITS) DLCI (6 HIG H-ORDER BITS) I DLCI (4 BITS) I DLCI (4 BITS) FECN FECN FECN I I I BECN BECN BECN 1 E/A = 0 DLCI (7 BITS) DLCI OR CONTROL (6 LOW-ORDER BITS) Figure 2 Digital Technical journal = Vol. 5 No. 1 D/C E!A = 1 Frame Relay Header Formats Winter 1993 101 DECnet Open Networking • • When requested by the user, fu I I status network report providing details of a l l PVCs. The user wou ld normally request such a report at start-up and then periodically. Notification by the network of changes in i ndi­ vidual PVC status, including the add ition of a PVC and a change in PVC state (active/inactive). The management protocol is defined in Annex D of Al'JS I T 1 . 617, with equivalent fu nctiona l ity also defined in CCITT Recom mendation Q.933, Annex A H Y Effect 011 Higher-level Protocols Frame relay provides a m u l t iplexed PVC interface and, with regard to routi ng software, can be mod­ eled as a set of point-to-point J i nks. However, the characteristics of the frame relay service d iffer from normal point-to-point J i nks. The m ajor differences are as fol lows: • Round-trip delay across a frame relay network is norm a l l y longer than the delay across a dedi­ cated point-to-point l ink. • PVC throughput can be as h igh as 2 megabits per second (Mb/s), whereas many existing leased l ines operate at lower rates. • A single frame relay i n terface can have m u ltiple virtual connections (each one going to a dif ferent clestin ation) as compared to the tradi­ tional point-to-point l i nk, which supports a single connection. Given the specific characteristics j ust described, a frame relay interface m ay h ave many more pack­ ets in transit than a conventional point-to-point l ink. Consequently, a n acknowledged data l in k pro­ tocol whose procedures i nclude retransmission of data frames is of l imited use in this environment. For a large nu mber of virtual connections, the mem­ ory requ ired to store the data frames pend ing acknowledgment wou ld be prohibitive. In addition, if frames are being discarded due to congestion in the frame relay subnetwork, the retransmission pol icy would i ncrease, rather than recover from, this congestion . I nstead, an u nacknowledged data l i nk layer should be used. Using an u nacknow ledged data l in k protocol has implications for the rou ting l ayer operating over frame relay. In particu l ar, the data I i n k can no longer be considered rel iable, and the routing pro­ tocol must accommodate this characteristic. 1 02 Congestion A·voidance When a frame relay network becomes congested, network devices have no option but to d rop frames once their bu ffers become fu l l . With an unacknowl­ edged data l i nk layer, the user device will not be informed if a data frame is lost. This lack of expl icit signa l ing when operating over frame relay net­ works pl aces a requirement on the higher protocol layers in the end-system equipment. The OS! trans­ port layer p rotocol demonstrates how to deal with this type of characteristic . The destination end system's transport implementation detects data Joss and requests the source to retransmit the frame. The implementation reduces the source's credit to one, thus closing the source's transmit window and, in effect, reducing traffic through the con­ gested path. Frame relay networks are prone to congestion. Consider the scenario shown i n Figure 3. Note that the committed information rate (CJR) represents minimum guarameed throughput. In the configura­ tion shown, the network device can support two PVCs : one r u n ning at 64 kil obits per second (kb/s) and the other at 128 kb/s. With no back pressure appl ied across the frame relay i nterface, in the worse case, the network device will become con­ gested. The router can send frames into the network or a particular PVC at I Mb/s that will then be forwarded at a much s lower rate. Once the network device's butlers are fu l l , it will discard frames. As a result, rou ting and bridging control messages may be lost, thus causing the routi ng topology to become u nstable. Since this, in turn, will li kely lead to looping packets, a network melt­ down cou ld resu lt. I n addition, if data frames are lost, the higher­ layer protocols in the end system (e .g. , the OS! transport layer) discover this situation and retrans­ mit the lost frames. Repeated transm ission of the - r- ROUTER (USER DEVICE) - FRAME RELAY INTERFACE 1 M BIS LINE LAN SEGMENT FRAME RELAY NODE (NETWORK DEVICE) n 64 KBIS C I R LINE Figure 3 n 1 28 KBIS C I R LINE EYample Configuration ofFrame Relay Jntelface Rate and Permanent Virtual Circuit Throughput Vol. 5 No. I Winter I'J9.i Digital Teclmical journal Frame Relay Networks same data causes the effect ive end-to-end through­ Since the loss of rou ting control messages can p u t to drop wel l below the m i n i m u m guaranteed cause network instabil ity, a n a l ternative approach is to adopt m an u a l configuration . Static network throughput. The frame relay header has several mechanisms configu rations use reachable add resses to provide that can be used to apply the appropriate back pres­ rou ting information such that the transm ission sure to prevent congest ion. o f rout i ng contro l traffic is not required. Conse­ • The FECN bit is set by the network when a frame experiences congest ion as it traverses the network . In OSI and DECnet Phase V environ­ ments, this bit can be mapped onto the conges­ tion-experienced network l ayer bit PDU. in the header This PDU, when of the subse­ quently d e l ivered to the destination, a l lows the destination to d iscover that the path is con­ gested and to notify the source transport to decrease its window and thus place less demand on the network. Standardization work is c u r­ rent ly under way to add similar support to the • I n addition, the user device could implement rate-based transmission to ensure that virtual cir­ cuits are not congested. However, a means of notify­ ing the user device of the C I R of a virtual circuit was included only as a n optional extension in the LMI specification, and use of such a method wou ld destroy one of the major benefits of frame relay, i .e . , the capabi l i t y t o a l locate bandwidth on demand. I n practice, network devices have l i mited i nter­ nal buffering to store frames; this is reflected in the CIR assigned to PVCs. Consequently, data loss occurs transmission control protocol/internet protocol if user devices consistently transm i t data on a PVC (TCP/IP). faster than its associated CIR. Adequate procedures The BECN bit is set by the network when a frame traverses a congested virtual circ u i t in the oppo­ s i te d irection. This ind icator is not perfect, because there is no guarantee that traffic will be generated i n this d irection on the virtual circ u i t . A source that detects it is transmit ting o n a con­ gested path is expected to reduce its offered load . • quently, the routing behavior is independent of the p e rformance of the network. The DE bit, if set, ind icates that d uring co nges­ tion the frame should be the first d iscarded. The procedures for decid i ng to set this b i t are not clearly defined . This bit cou ld be set by (1) the entry node of the network, e . g . , when the input offered load i s too high, o r (2) the source user equipment, e . g . , to d iscriminate data frames from the more important rou ting control messages. and CPLs that cope with congested situations h ave yet to be developed and standardized. As a resu l t , s u c h situations may l e a d to unfairness in a m u lti­ vendor environment where those u s e rs who sup­ port congestion avoidance wi l l lose bandwidth to those who d o not. Products Below we describe examples of frame relay prod­ ucts: the StrataCom IPX FastPacket equ ipment, which provides the frame relay network ; D igital 's D EC N I S and 500/600 and WANrouter 100/500, which support the frame relay service by accessing the i nterface as user equ ipment. The StrataCom JPX FastPacket Product Family The StrataCom IPX FastPacket product family can Other methods can be used to avoid the conse­ be used to b u i l d networks that support both cir­ quences of congestion and hence frame loss. The c u i t -mode voice and data as wel l as frame relay. LM l defined i n the m u l tivendor frame relay specifi­ Within the network, the StrataCom IPX FastPacket that nodes c o m m u n icate using a technique based on included a threshold notification bit i n the PVC sta­ cel l switching, which i nvolves the transmission of cation contained an optional extension tus i nformation element of one of the messages. small , The threshold n o t ification bit provided a means of functions provide services on top of the basic t rans­ al lowing asynchronously mission network. Strata Com uses a hardware-based i nfor m a user device that a particu lar PVC connec­ switching technique resu l t ing in very high-speed a network device to fixed- length cells. Add itional, high-level (100,000 to 1 ,000,000 cel ls per second) . tion was congested. The user device could then switching stop transm i t t ing data on the connection u n t i l the With such high throughputs and low delays, these network device informed it that the congestion was networks have been used for carrying voice, video, al leviated. and data traffic. Digital Technical jourual Vol. 5 No. I Winter 1993 1 03 DEC net Open Networking The Strata Com I PX FastPacket network is config­ ured by network management to provide the required virtual circuits between users. The StrataCom cel l switching mechanism adopts a sin­ gle-eel I format for the transmission of all types of information, with each cel l containing addressing information. Routing tables within the network nodes use this addressing information to forward the traffic along the desired virtual circuit. Since i n a n y particu lar connection the path used for the sequence of cel ls is always the same, cel l ordering is maintained. Intel l igent interfaces at the edge of the network provide the functions required for spe­ cific services such as voice and data. Figure 4 i l l ustrates the concept employed by StrataCom of building service-specific functions on top of a common cell switch i ng technology. The fig­ ure shows examples of various types of external interfaces. For the frame relay i nterface, StrataCom sup­ ports the optional featu res defined to address con­ gestion. The J PX FastPacket node provides the optional expl icit congestion i n d icators defined in the frame header, w h ich are set based on averaging queues that build up in the IPX FastPacket nodes i n the network. Support is also provided for the optional threshold notification feature defined as part of the LMI ; the actual threshold values, together with buffer configuration, can be configured by the network manager. Frame Relay Support in Digital's Family of Multiprotocol Routers D igital has provided frame relay support i n its fam­ ily of m u l tiprotocol routers that employ the OS! intermediate system-to-intermediate system (IS-IS) routing protocol . Frame relay user device func­ tionality is i mplemented i n the DECNIS V2.1 soft­ ware for either the DECNIS 500 or the DECNIS 600 hardware units, and i n the DEC WAN router v 1 .0 software for either the DEMSB or the DEMSA hard­ ware units. Part of the development of the frame relay sup­ port involved cooperating with StrataCom to pro­ duce a working frame relay specification. In particular, extensions were added to the LM I to pro­ vide appropriate congestion control procedures. Digital's software supports the Frame Relay SpeciJication with Extensions, Revision 1 .0, written by Strata Com and the relevant Ai\ISI TlS l standards ..'. J .o.s The software has been tested and is known to be compatible with the StrataCom IPX FastPacket 16/32 equ ipment with Frame Relay I nterface Card Software. I B n COMPUTER n FRAME RELAY I NTERFACE I DATA CI RCUIT MODE I NTERFACE SERV ICE-SPEC I FI C FUNCTIONS COMMON CELL SWITC H I NG PRIVATE BRANCH EXCHANGE VOICE C I RCUIT MODE INTERFACE < I > DIG ITAL TRANSMISSION DATA C I RCUIT MODE INTERFACE ROUTER Figure 4 1 04 VOICE C I RCUIT MODE INTERFACE I P R IVATE BRANCH EXCHANGE FRAME RELAY INTERFACE B Sample StrataCom Network Configuration Vol 5 No. I Winter 1993 Digital Technical journal Frame Relay Netwo-rks The DECNIS ami WAJ'lrouter implementations use frames across the interface, as wel l as annexes the point-to-point protocol (PPP) for the transmis­ concerned with local management (e .g., notifica­ sion of multiprotocol datagrams over point -to­ point l inks. PPP is defined in Requests for Comment (RFCs) 1331 and 1332, with bridging extensions specified in RFC 1 2 20; support for DECnet Phase IV is defined i n RFC 1376 and for osr in RFC 1 37 7 1 0- 1 4 Congestion avoidance procedures include support tion of PVC status) .' Although a l l implementations to date have focused on a PVC-based interface, svc access is defined in ANSI TJ. 61 7, DSSJ -Signaling Specification fo-r Frame Relay Bea-rer Service. 8 E ach of these T l S l standards has an equivalent cenT recommendation, as shown in Table 1 . for both the threshold notification signal in the LMI (when available) and the FECN. The threshold notifi­ cation signal causes the end system to modify its rate of data transmission. Receipt of a frame with the FECN bit set causes the equivalent bit i n the network layer PDU header to be set, which i n turn causes the end systems to reduce their offered traf­ fic. The BECN and DE bits are never set or examined . Other Current Activities The Internet Engineering Task Force (IETF) is developing specifications for RFCs related to the frame relay technology. A specification called M u ltiprotocol Interconnect over Frame Relay defines an encapsulation mechanism for support­ ing multiple protocols over frame relay networks. Related Activities To allow use of the simple network management Various committees are involved in activities related protocol (SNMP), an experimental management to the frame relay technology. These activities information base (MIB) for frame relay DTEs is also include standards work, specifications, and efforts under development. to address technical issues such as interoperabil ity. To promote the frame relay technology, a Frame Relay Forum has been set up in both North America Standards and Europe. A technical committee bas been estab­ The overall frame relay network architecture is defined in ANSI TJ. 606, Frame Relay Bea-re-r l ished to add ress issues related to the technology in terms of its interoperability and evolution in mu lti­ Se-rvice-A-rchitectural F-ramewo-rk and Se-rvice vendor environments. This committee actively par­ DescrzjJtion. 1 Access is provided by the frame relay ticipates with the standards bodies and develops interface, which is defined in various Al'JSI stan­ implementation agreements and interoperabil ity dards for both permanent and switched virtual cir­ test procedures. Work continues to define a cuits . ANSI Tl. 618, DSSJ -Co-re A spects of Frame network-to-network control interface, m u l ticast­ P-rotocol fo-r Use with Frame Relay Bea-re-r Se-rvice ing capabilities, mul tiple protocol encapsu lation, contains a definition of the protocol for exchanging and interworking with other technologies, such as Ta ble 1 Cu rrent Status of Frame Relay Sta n d a rd i za t i on Standard ANSI Status CCITT Status Remarks Arch itect u re T1 .606 Standard 1 .233 Standard Replaces 1.222 Congestion Add e n d u m Standard 1.370 Standard Management to T1 .606 Standard 0.922 Sta ndard and SVC Desc ription Pri nciples Data T1 .61 8 Tra nsfe r Core Aspects (Annex A corresponds standard to T1 .61 8) T1 .61 7 Standard 0.933 Stan dard Management I nc l u ded Standard I n c l uded Standard Procedu res in T1 .61 7 for PVCs Annex D Access Signaling Most important frame relay for SVCs Digital Technical Journal Vol. 5 No. 1 in 0.933 Annex A Winter 1993 Concepts accepted i n CCITI 1 05 DECnet Op en Networking the sw itched m u lti megabit data service (SMDS) 4. defined by Bell Commun ications Research, Inc. 1 ' The c e l l swi tch i ng adopted by StrataCom within 60- 108 kHz Group Band Circuits (Geneva: International conform with emerging CCITT recom mendations f()r broad band ISDN J 6 These recommendations Teleco m m u n ications Union, 1976) '5. A NSI T/. 618: DSS 1 - Core Aspects of frame Protocol fo r Use with Frame Relay Bearer defines a standard ce l l structure and ATM adaptation Seruice (New Yor k : American National Stan­ l ayers (AALs) for parti c u l a r higher-level fun ctions. Summary V35: Data Tmns­ mission at 48 Kilobits per Second U�ing their network is expected to change over time to cover asynchronous transfer mode (ATM), which ccrrr Recommendation dards Institute, I n c . , 1990). 6. CC./7T Recommendation Q.922: ISDN User­ Network Interface Layer 3 Spenfication for Frame relay is a simpl ified form of packet-mode swi tching that, at least i n theory, provides access Basic Call Control (Geneva: I nterna tional to h igh bandwidth on demand, d i rect connectivity Telecom munications Union, 1991). to a J I other points in the network, and consump­ t i o n of only the bandwi d th actually used . Thus, 7. to the customer, the frame relay techno logy offers a red uction in the response time. 8. (Geneva: Intern a t i o n a l ANW Tl. 61 7. DSSJ -S(!{naling Spe etficatiu n j()r Frame Relay Bearer Service (New York: Rou ters con nected to a frame relay network can frame relay network requ i re that special care be Services Telecom m u n ications U n i o n , I991 ). American National Standards I ns t i tu te , I nc . , consider the m u l t iplexed , PVC interface as a set of point-to-point I i nks. The special characteristics of a Link Lc�ver Specification for Frame Mode Bearer cost of transmission l i nes and equi pment and i mp roved p erfo r m a nce and COTT Recommendation Q.931: ISDN Data 1990). 9. taken i n sel ecting the data l in k protocols and in CC/Tf' Draft Recommendation Q. 933: ISDN Signalling Specification for Fra me Mode hand I ing congestion. Bearer Serv ices (Geneva: I nternational Te lecomm u n ications Union, 1991 ). Acknowledgments The a u thors t han k StrataCom, Inc. for provi ding 10. sign ifican t input on cell switch ing technology and Point-to-Poin t Protocol for the Transmission of fi!Iulti-protoco! Datagrams over Point-to­ Point Links, I n ternet Engineering Task Force its use i n t heir I PX FastPacket equ ipment. The RFC 1 331 (May 1992). authors woul d also l i ke to ackn owledge Cl iff Development Group who consu l ted in Digit a l 's i n i­ The PPP Internet Protocol Control Protocol (JPCP), Internet Engineeri ng Task Force RFC t i a l frame relay implementation . 1 352 ( May 1992). Didcock of the Computer I ntegrated Telephony 12. References 1. 11. ing, I nternet Engineering Tas k Force R.FC 1 2 20 A NSI TJ. 606: Fra me Relay Bearer Serl'ice­ Arc/.Jitectural Fra mework and Seruice [)escriptimz (New York: American National (Ap r i l 1991 ) . 13. Standards Institute, I nc . , 1990). 2. CUTT Recomm endation X.25: InteJfa.ce between Data Terminal Equipment (DTL) 14. Control Protocol PPP OS! Network Layer Control Protocol (OSI 1377 (November 1992). 1'5. Betlcore TR-TS V-000772, Generic System tmrks !Jy Dedicated Circuit (Geneva: Interna­ Requirements in Support of Switched Multi­ tiona l Teleco m m u n ications Union, 198R). Megabit Data Seruice, Bel l Com m u n ications Research, Inc. (May 1991 ) . Fmme Relay ,�jJecijication with Extensions, Re t•ision 1 0, C i sco Systems, Digital Equ ip­ ment Corporation, Northern Telecom. In c . , and StrataCom, Inc. (September 1990). [ ( )(i w DECnet Phase (JJ NCP) , I nternet Engineering Tas k Force RFC NLCP), Internet Engineeri ng Tas k Force RFC (lXI:) fo r Tenninals Operating in the Packet 3. PPP 1 376 (November 1992) . and Data Circuit-terminating Equipment /Vlode and Connected to Public Data Net­ Point-to-Point Protocol EYtensiunsfor Bridg­ 16. CCJ7T Drajt Recom mendation I. 121: Broad­ band Aspects of ISDN (Geneva: I nternational Telec o m m u n i cations union, 1991 ) . �-bt. 5 No. I Winter /'J')3 Digital Technical ]ou rual David C. Robinson Lawrence N. Friednum Scott A. Wattum An Implementation ofthe OS/ Upper Layers andAppUcatUms Above the transport layet; the open systems interconnection (OS!) basic reference model describes se1'eral application standards supported by a common upper lCf:)'er protocol stack. Digital's high-performance implementation of the upper layers of the protocol stack concentrates on maximizing data throughput while minimizing con­ nection establishment delay A n additional benefit deriuedfrom the implementa­ tion is that; for· normal data exchanges, the delive1y delCf:J' is also minimized. The implementation features of Digital's two 051 applications-file transfer, access, and management (FTAt'vf) and virtual terminal (VT)-include the use of common code to facilitate portability and efficient buffer management to improve performance. The open systems i nterconnecti o n (OSI) basic reference model defined in the International Organization for Standardization standard ISO 7498-1 specifies a l:lyered protocol model consisting of seven layers. 1 By convention, the first four layers­ physica l, data l i n k , network. and transport-are referred to as the lower layers 2 These layers pro­ vide a basic com m u nication serv ice by rel iably transferring unstructured user data through one or more networks. The rem aining layers-session, presentation, and appl icatio n-build on the lower l ayers to provide serv ices that structure data exchanges and maintain i n formation in data exchanges to support d istributed appli cations . • ISO 8824 -Abstract Syntax Notation One (ASN . I ) • ISO 8825-Basic Encod ing Ru les (BER) • ISO 8649 and ISO 8650-Association Control Service E lement (ACSE) This section gives an overview of the serv ices defined in these standards. The later sections File Transfer, Access, and Management Implementation and Virtual Te r m i na l I mplementation discuss two appl ication-specific standards. Session Layer The transport layer service faci l i tates the exchange These three layers a r e known c o l lective ly as the of u nstructured bytes (i .e. , octets) of data. How­ upper layers. ever, exchanges between components of a d istrib­ This paper first gives an overview of the OS! u ted appl ication are often structured. The function upper layers and of two application standards-file of the session laye r is to standardize some of the ter m i n a l (VT). The d iscussion that fol lows co ncen­ structure to the transport layer exchanges. trates on the features of D igita l 's implementation of the upper layers and the two appl ications, with three phases typical of a l l connection-oriented ser­ transfer, access, and management (FfA.M ) and virtual emphasis on novel imp.lementation approaches. common exch anges by suppl y i ng serv ices that add The session-con nection-oriented service has the vices: connection establ ish ment, data transfer, and connecti o n release. All structuring of the data Summary of OS/ Upper Layer Standards accompl ished by using e i ther tokens or synchro­ The appl ication-independent parts of the OSI upper n izati o n . Hence, the connection establish ment and exchanges occurs in the data transfer phase and is layers are defined in the fol lowing standards: • ISO 8326 and ISO 8 327-Session Connection Oriented Service and Protocol • release phases are not d isc ussed further i n this paper. Tokens are used to control wh ich peer session user of a session connection is permitted to invoke ISO Hb'22 and ISO 882 3 - Presentation Connec­ a particular service or group of services. The tion Oriented Service and Protocol sess ion layer a l so provides services to exchange Digital Technical journal lkJI. 5 No. I Winler JY9.> 1 07 DEC net Open Networking tokens between peer session users. There are tou r Presentation L ayer types o f tokens. D ifferent compu ter architectures and compi lers 1 . Data , for control l ing h a l f-duplex data exchanges use different internal representations (i . e . , con­ 2. Release, fo r contro l l ing wh ich session user can initiate the release of a session connection of the mi nor synchronization service 4 . Major/Activit}', for contro l l ing the issui ng of major synchronization and activity services For example, when the data token has been nego­ tiated on a session connection, sess ion data can be sent only by the end that cu rrently has the token . Exchanging the data token bet ween t h e session users provides a half-duplex data service. The data transfer phase provides synchroniza­ tion by al lowing session users to insert major and minor synchron ization points into the data being transmitted . Optional ly, each direction of flow can have its own set of synchronization points. Figure 1 i l lustrates a data exchange structured as a single dialog unit. A d ialog unit begins at a major synchronization point and terminates either at a new major synchron ization point or by the release of the session connection. Further structure is pos­ sible within the dialog unit by inserting minor syn­ chronization points. session synchronization services between representations is necessary when com­ mu nicating between d issimilar arch itectures. The 3. Synchronize-mi nor, for controll ing the issu ing The crete syntax) for data values. Therefore, conversion al low appl ications to insert synchronization points into their data exchanges. These points are appl ication specific. The session service a lso provides a resyn­ chronization service to a l low a session user to request irs peer to resynchron ize to an earl ier synchronization point, for example, to a previous point in a file transfe r. Activities provide an additional structuring ser­ vice. An activity represents a l ogical piece of work. At any moment in time, there is at most one activity intent of the presentation layer is to a l low com mu­ nicating peers to negotiate the data representation to be used on a presentation connection. The presen tation standards, ISO HH2 2 and ISO 8823, d istingu ish between abstract syn tax and transfer syntax. Abstract syntax is the definition of a data type independent of its representation. Typica l ly, data types are defined using the ASN.l standard , ISO 8824, which was developed for this purpose. ASN . l bas a number of primitive data types, including INTEGER, REAL, and BOOLEAN , as wel l as a col lection of constructed data types, includ ing sn and SEQUENCE O F . These primitive and const ructed data types can be used to define the abstract syntax of complex data types such as appl ication protocol data units. A transfer syntax is the exte rna l com mu nication representation of an abstract syntax. Values from the abstract syntax are encoded according to the ru les defined in the transfer syntax. A common way to define a trans fer syntax is in terms of encoding ru les. For example, these ru les may indicate how an INTEGER value is represented or how to encode a SEQUENCE OF data type. A widely used transfer syntax is the basic encodi ng rules specification, ISO 8b'25. An abstract syntax can be encoded using diffe r­ ent transfer syntaxes, of which there are many. The role of the p resentation l ayer is to negotiate the set of abstract syntaxes to be used on a particu lar pre­ sentation connection and to select a compatible transfer syntax fo r each of these abstract syntaxes. This process ensures that both peers agree on the data representation to be used in data exchanges. per session con nection. However, several activities can exist du ring the l ifetime of a session connec­ Application Layer tion, and a n activity can span session connections. The appl ication layer supports distributed interac­ The synchronization services can be used with tive processing, that is, the com m u n ication aspects activities services. 1...--- MAJOR of distributed appl ications such as FlAM (defined DIALOG UNIT ------+ MINOR MINOR MINOR MAJOR by ISO 8571 ), directory serv ice (defined by ISO 9594), and VT (defined by ISO 9040 and ISO 904 1 ) . Unlike for the session and presentation layers, nu merous appl ication l ayer protocols and serv ices exist-at least as many as t here are d istributed applications. Figure 1 Data Exchange Structured as a Dialog Unit 1 08 The appl ication layer structure specified in ISO 9545 defines a model for combining these Vol. 5 Nu. I \Vinter 199.1 Digital Technical journal A n Implementation of the OS! Upper Layers and Applications protocols in the same syste m . The fu nctions for a 1 . Ama lgam a t i ng upper laye r state tables. The ser­ part i c u l a r appl ica tion are grouped together to fo rm vic es prov i ded by the presentation and session an application serv ice e lement (ASE). FTAJ\'1, VT, and layers are similar. Al so, connection establ ish­ d i recto ry servic e are examples of ASEs and are the ment a nd release i n the ACSE is basical l y the same basic b u i l d i ng blocks of the appl ication laye r. One as i n the other two upper layers. The refo re, the o r more ASEs are combi ned to fo r m an application three state tables can be combi ned i nto a sin gle entity (AE). An AE represents a set of com m u n i ca­ state table, tion resources and can be thought of as a program red uci ng the ove r head . Th is a m a lgamation el im­ on a d i sk. An i n vocat ion of a n AE (i . e . , execution of i n ates the need to m a nage l i nks between state the program) can contain one or m o re i nstances of tables, requ i res all predicates to be tested in only an ASE w i t h one or m o re application ass ociation s, one place, and generates only one state transi­ i . e . , application layer connect i o ns. The AE speciJ ica­ tion or action per i nbound event. tion a l so defines the ru les for i nteraction between ASEs operating over the same associ a t i o n as wel l as interac tions between associations. A n ASE required by all appl icati o ns is cal led the assoc iation control service eleme nt (ACSE). The ACSE, defined by ISO 8649 and ISO 8650, i s the ser­ v ice and protocol requ i red to establ i s h an appl ica­ tion ass ociation . Therefo re , an AE a lways contains at least the ACSE. thus improving perfo r mance by 2. Treating the presentation service P-DATA as a special ca se. The prese n t a t i o n service P-DATA is the most frequently used service, and hence, its performance has the greatest i mpact o n data t h rough p u t . By fas t - l a n i ng the processing of the P-DATA service, the normal overheads associated w i t h the combined state table p rocessing are avo ided . sentation connection; no other appl i c a t ion associa­ 3. Good bu ffe r m a nagement. The new appl ication tion can share thi s presentation connection. I n this efficient use of bu ffers. We e l i m i nated a l l copy­ way, a p p l ications ga i n access to the pre sentation i ng of user data within OSAK by taking advantage An appl ication association is mapped onto a pre­ progr a m m i ng interface (API) to OSAK enables of user bu ffe rs. O n an outbound service, an and session data phase services. OSAK user is requested to leave space at the start New OS/ Upper Layer Implementation Digital's im plementation of the OS! upper l ayers, nam ely OSAK, i n cl udes session, pre sentation, a n d ACSE services. Users of OSAK c a n thus establ i s h appl ication associations and u s e session and pre­ sentation services d u ring the data transfer phase. mation (PCI) to the user bu ffe r. This bu ffer is tl1en sent to the transport provi der. Otherwise, we al locate an OSAK-specific bu ffe r using a user­ suppl ied memory a l location rout ine. Before receiving a n i n bound service, the user m ust pass a t least one u ser bu ffer to OSAK. Th is Aims bu ffe r i s used to receive the inbound transport In 1988, when Digital decided to p roduce a new version of the user data . If there is suffic ient space, we add the OSI upper l ayer protocol control infor­ of OSAK, t h ree aims were considered event ( both user data a nd upper l ayer PC! ) . The upper l ayer PCl is decoded before the user param ount: h igh perto r mance, m a i ntai nabi l it y, and bu ffers portabi li ty. extremely efficient, t h is approach has the advan­ are re turned. In addition to bei ng tage of a l lowing OSAK users to exert i nbound Performance High performance of the OS! upper layers is essential to prod ucin g competit ive OS! products. Because a l l OSI appl ications use these upper l ayers, the performance of OSAK affects these appl ications. Therefore, OSAK aims to ma x i m ize data through p u t and to mi nim ize connection estab­ l ishment delays. Th is i mproved p e rfor mance is ach ieved by m a x i m izing the use of the communica­ t i on pipe and m i n i m izing the local processing requirements. The process involves Digital Technical ]our·rwl H1l. 5 No. I flow control; if OSAK i s not given any bu ffers, no transport events will be received. Al so, t h is buf fering scheme si mpl ifies resource ma nagement i n OSA K . As OSAK does not have any of its own resources, they a l l come from OSAK users. One OSAK user cannot interfere w i t h the operation of another OSAK user by consuming all OSAK resources. 4 . Parsing only the upper l ayer headers. The pre­ sentation layer standards model the m a pping Winter 199.) 1 09 DECnet Open Networking between concrete ( i nternal) a nd transfer (exter­ and n a l ) representa tion of data values. In particular, platforms. The only major difference between the presen tation state tables con tain predicates to verify that a l l user data is from a current pre­ thus ass ists port i ng applications between the versions for the ULTRIX and the OpenVMS operating systems is the way events are signaled . encoding ami decoding is i n the appl icat ion The ULTRIX i mplementat i o n supports both a pol l­ itself, OSAK does not implement these predi­ W i th the po! J i ng mode l , the OSAK user repeated ly cates. Hather, OSAK assumes t ha t i ts users have c a l l s OSAK rou tines to test for completion of an correct l y encoded their own p rotocol and w i l l event; the rou tines used are osak_col lect_pb( ) sentation con text. Since the best place for detect a n y problems when decod ing. 5. Trading memory for performance. AJI encoding and decoding of upper layer PCI is done with i n - l ine code. More compact coding i s possible using subroutines but at the cost of perfo r mance. 6. M i n i mi zing pa rameter checking. Most parame­ ters are poi nters to user buffers. To check the ing model a n d a n event - driven or bloc k i ng model. or osa k_get_event( ) . In the blo c k i ng model, the OSAK user blocks awaiting the event, with the osa k_select( ) rou t i ne . These three routines are avai l able t o O p e n V i'vt S applicatio ns. In a d d i t i o n , the OpenVMS i m p lemen­ tation supports event notification by asynchronous system traps (ASTs). A l so, the OSAK API is similar to XAP, the X/Open consequen tly, costly. Therefore, OSAK assumes AP I to the OS! upper layers. To support OSAK on that the p o i nters do i n deed point to t he user's is common to all platforms. The main differe nces v a l i d i ty of a l l pointers is t i me- consu mi ng and, m u ltiple platforms, as far as p ossible, OSAK code a re the in terface to the transport layer and the memory. Main tainability O p e nVMS support for ASTs. O ve r 90 p e rcent of the The code for t he new ve rsion of OSAK is easier to maint ain than the previous code. As stated earl ier in this section, a major step i n improving the m a i ntainability was the use of amal­ code i s common to the ULTRJX and the OpenVMS ve rsions. gamated state tables. A s ingle state table e l i m i nates Performance Measurements l i nks between tables, reduces the amount of main­ Two performance metrics, t hroughp ut and connec­ tenance req u i red , and thus s i mp l ifies the code. In tion establ ishment delay, were measured between add ition, using a s i ngle table makes it easier to seri­ two DECstation 3100 workstations connected by a al ize events. With m u l t iple state tables, an i nbound transport event can trigger a conf l i c t i n g state cha nge in the session state table at the same t i me a user request is changing the presentation stare l ightly l oaded Ethernet c o m m u nications network. The DECstari o n machi nes were r u n n i ng lll..TRIX V4.2 with DECnet-ULTRJX V5.1 . OSAK accessed OSI transport through the X/Open transport in terface nection ensures that only one event ( i . e . , either a ( XTI) in non blocking mode. user or a transport event) is active in the state table were used: an initiator and a responder. The initiator at any given time. 1 . Establ ishes a n association. table. Usi ng a single state table for a particu lar con­ The state tables are w r i t ten in M4 macroproces­ sor notation. Thus, the OSAK state table defi n ition is similar to a n OSI protocol specification ; this improves readabi l i ty. Macros are al so used exten­ sive ly to hand le common bu ffe r m a n i p u l a t i o n a n d the encode a n d decode fu nctions. Alt hough macros are preferred over subro u t i nes to i mp rove perfor­ mance, macros can be converted , at the expense of slower performance, should a more compact ver­ sion of OSAK be required. Po rtability The new version of OSAK is designed to facil itate portabil i t y of appl ications using both the OSAK API and OSAK i tself. The new O SA K API is designed to be com mon across a l l p latforms I I0 For throughput measureme nts, two p rograms 2 . Reads the system time. ') Transmits 2,000 buffers of data as quickly as pos­ s ible . These user bu ffers con t a i n suffic ient space for the upper layer headers. When a send request fa ils due to flow contro l , the sender waits using the lJLTRJX system call select(2) u n t i l the flow control is removed. The sender then col lects the user buffe rs with the osak_col lect_pb( ) ro u tine before con t i n u i ng wi th the send loop. 4. Reads the system t i me and calcu lates the time req u i red to transmit the 2,000 bu ffers. 5. Heleases the association. 1-rJI. 5 No. I Winter 1993 Digital Technical journal A n Implementation of the 0)1 UjJjJer Layers and Applications The responder i n bound even t. A l s o, for the s m a l l buffe rs, a sign ifi­ cant amount of t i me is consu med by in i t i a l izing the 1. Accepts a n association request user parameter b.lock before ret urning it to the user. 2. Loops, w a i t i ng for a transport event using the ! J LTRJX system c a l l select(2), and then collects We also used the throughp u t program to mea­ sure the connection esta b l ishment time. The pro­ the data using the osak_get_eve n t ( ) rou t i ne gram read the system t i me before and after the u n t i l a l l 2,000 b u ffe rs have been received ass ociation esta bl ishment phase; the average con­ 3. Responds to the request to release the association Ta ble 1 records the t h rough put measurements nect i o n establ ishment time was 0.08 seconds. In add i t i o n , tests on the new OpenVMS impl emen ta­ t ion i n d icate that throughput im proved two to fo r various b u ffer s i zes ranging from 10 to 16,000 three fo ld as compared to the OSAK code in the pre­ ( 16K) octets per buffer. v i ously ex isting Open VMS i mplementations. The data presented i n Table I ind icates that for Both the throughput and profile data ind icate smal l bu ffers, the throughput is poor. This low per­ that the transport perfo r m a nce dominates the per­ fo rma nce is due to the system overhead associated formance of w i t h processing a send request, in dependent of the design goa l of red ucing the overhead of t he OSI amount of data to be trans m i t ted . However, the upper l a yers to a very l ow leve l . Meeting this goa l thro u ghp u t r a pid ly i m p roves u n t i l the bu ffe r size OSA K. Therefore, OSAK has met its was necessary because poor OSAK performance reaches 4K octets. From this size on, the through­ wou l d impact a l l OSI appl icati ons supported by put measurement is a l most flat at between 507K OSAK. Wh i l e further reductions i n overhead are and 528K octets per second. The variation is due to possible, such savi ngs would be a t the expense of fragment a t i o n i n the lower l ayers. The n u mber of OSl upper .layer fu nctionality. send requests flow controlled represents the n u m­ ber of t i m es a send request was del ayed beca use of flow co ntrol by the transport service in the course of trans m i t ting the 2, 000 b u ffe rs. We profiled the i n i t i a tor and the responder. For bu ffers ranging i n size from 1 0 to 16K octets, the i n i­ tia tor spent more than 90 percent of the time i n transport. For t he responder, t h e percent o f t i me spent in transport varied between 60 percent for 1 0 - octet b u ffe rs and 92 perce n t for 8K-octet buffe rs. The rema i n ing t i me was spent primari l y i n select(2), waiting fo r and Table 1 processing the next File Transfer, Access, and Management Implementation This section pr >s · n b a s u m mary of the ISO FTA:'vl s t a n d a rd and deta i l s of Digital 's implementation of this standard . Summary of the ISO FTAJM. Standard ISO 8571 File Transfer, Access, and Management (FTAM) is a five-pan standard cons isting of a general i ntrod u c t i o n , a defi ni t i o n of the v i rtual file store, the file service, the fi le protocol defi n i t io n s, and the protocol i mplement ation co nformance sta te­ Throughput Measurements for Digital's OSI Upper Layer I m plementation m e n t proforma . The I'TA.J'vl sta ndard defines an ASE for transferrin g fi les and defi nes a framework fo r fi le access and file m a nagement. Number of FTA,\1 ser vice ami proto­ Buffer Size T h roughput Send Requests Initiator and Re:-.jJ oJtder (Octets) ( K i l ooctets/s) Flow Control led col actions are based on a c l i e n t - server mod e l . In 6.60 56.80 21 6.00 2 4 35 794 862 1 ' 1 51 10 1 00 51 2 1 , 024 2,048 4,096 6,000 8,1 24 8,1 25 1 0,000 1 3 ,000 1 6,000 266.60 372.60 453.70 507.00 528.80 507. 1 0 527.20 The i n i t iator is responsi ble for starting fi l e ser­ v i c e activity and controls the protocol a c t i o ns that take p l ace du ring the d i alog (or FlAM associati on) b e t ween two FTAM appl ications. For exampl e , the 1 ,21 7 i nitiator has to request that a n FTAM association be 596 651 751 522.20 505.27 D igital Technical Journal the FTA.M standard, the cl ient is referred to as the i n i­ t i ator, and the server is referred to as the responder. establ i shed, that a fi le be opened o n a remote sys­ tem , and that a file be reacl from a remote system . 1 ,1 0 1 1 , 279 Vol. 5 No. I Winter The responder passively reacts to the requests of the peer i n i t i ator. The resp onder is res ponsible for 1993 111 DEC net Open Networking ma naging the virtual fi le store and mapping any vir­ tual file attributes into local fi le attributes. Virtual File Store Many arch itectures and imple­ mentations of file systems exist, and storing and accessing data can d iffer from one system to another. Therefore, a mechanism is needed to describe files and their attribu tes independent of any particu lar architecture or implementation . The mechanism used in the FTAM is cal led the virtual file store. The FTAM v irtual fi le store model consists of file attribu tes, activity a t tributes, file access struc­ ture, and document types. File attribu tes describe the properties of the file, which include the size and the date of creation. FI'AM file at tributes also defi ne the types of actions that can be performed on a file. Read access or create access are examples of file actions. into subsets of related services. The subsets of func­ tiona l ity are cal led fu nctional un its. Functional u n its are used by the FTAIV! protocol to convey a user's requirements. For example, the standard defines the read fu nctional u ni t , which al lows a n implementation t o read whole files, a n d the file access unit, which a l lows an implement a t i o n to access records in the file. In addition, the FTA.i\1 standard defines the follow­ i ng classes of fi le service: transfer, m a nage ment, transfer and m anagement, access, and uncon­ strained . Each service class is composed of a set of fu nctional units. For example, an FTAM implementa­ tion that supports the transfer service class wi l l be able to either read or write files. New FTAM Standard Work Modifications to the FTAIVl standard are in progress in the ISO . The most Activity attributes are properties of the file, important modification is the file store m anage­ which are in effect for only the d uration of the FTA.i\1. ment addendum, which specifies how wild cards, associa tion. Examples of activity attribu tes are file d irectories, and refe rences ( l i nks) to files are to current access request, curre nt i n i t iator identity, be hand led in an OS! environment. The addendum and current concurrency control. Current access also specifies how to manipul ate groups of files. In request conveys the access control appl ied to the the cu rrent version of the standard , only o ne file file, e.g., read or write access. Current i n itiator iden­ can be selected at a time. tity conveys the name of the initiator accessing the virtual file store. Current concurrency control con­ veys the status of the locks appl ied by the initiator. Digital's FTAM Implementation D igital's FlAM prod ucts, ava i l able for the OpenVMS The FTA.i\1. file access structure is hierarchical and and ULTRIX operating systems, support FTA.M appli­ produces a n ordered tree that consists of one or cations i n both the role of i nitiator and the role of more nodes. Th is file access structure is defined in responder. The initiator applications a l low users to ASN.l and can be used to convey the structure of copy, delete, rename, l ist, and append files. In the a wide variety of files. OpenVMS version, the i n itiator applications are Tn the FTAM v irtual fi le store model, document integrated i n to the O igital Command La nguage types spec ify the semantics of a file's contents. The (DCL) so that the user can continue to use the FTA.i\1 standard defines four document types. COPY, • FTA.i\1.- 1 , u nstructured text files • FTAM-2, sequential text files • FTA.i\1-3, u nstructured binary files • FTANI-4, sequen t ial binary files The virtual file store model provides a framework for defining many d ifferent file types, i n c l u ding those not supported by the standard ized document types. The U.S. National I nstitute of Standards and Tech nologies (NI ST) has used the virtual file store model to define document types to support various file types, such as indexed files. FTAM File Service DELETE, D I RECfORY, and RENAME com­ m ands. Where the FTA.i\1 service and protocol is used to support t hese commands, the additional qual ifier /APPLICATlON=FTAM is required . I n the ULTIUX version, the same fu nctional ity is provided using the set of commands ocp, orm, ols, ocat, and omv. These commands have the same seman­ tics as the corresponding ULTRIX com m a nds cp. rm, Is, cat, and mv, respectively, and are similar to the set of DECnet file transfer util ities of dcp, d r m , d is, and dcat. (Note that the set does not include dmv.) The responder applications a l low users to cre­ ate, read , write, delete, and rename files. File access, i . e . , the location of specific records in a fi le, The FTA.M file service is a func­ is al so supported by the responder appl ications. tional base for remote file operations. Fu nctionality The OpenViVIS responder application supports file defined by the FTAM file service is broken clown locking and recoverable file transfer. I 12 Vnl. 5 No. I Winter I'J character 1 1 .3 DECnet Open Networking as an ind ication of the intent to delete , whereas the desired profile. The responder is responsible for other systems may expect the user to enter a accepting the peer association request and for creat­ character. VT resolves these diffe r­ ing an interactive context for the remote peer user. ences by translating the local action into a virtual On the OpenVMS system, the VT protocol init ia­ action. The action in our example becomes the tor is invoked by the DCL command SET HOST/VTP; virtual actions of decrementing the current cursor on the ULTRJX system, the VT protocol in itiator is position and erasing the character at the current invoked using the ologi.n command. locat ion . A cooperating i mplementation would The VT implementa­ then translate these virtual actions into an appro­ Implementation Features priate local action. tion uses the OSAK interface out! ined ea r l ier in the The VT protocol is very powerful in the respect paper. The goals of the VT implementation were to that the protocol definition provides many options provide a high ly portable, very efficient, and easily and featu res that allow the support of complex ter­ extensible code. minal models. During association establ ishment, To achieve the goal of portabil i ty, the implemen­ cooperating implementations agree o n the subset tation was divided into two major components: o f the protocol and the terminal model to be used. in terface to the OS! environment and the non-OSI The protocol subset and terminal model are i nterfaces (e.g. , to terminals). The OS! component referred to as the profile. In addition, VT provides is completely portable to mu ltiple platforms. The two modes of operation: asynchronous (A-mode), non -OSJ component is platform specific and must which may be thought of as fu l l-duplex operation, be rewritten for each u n ique platform. The i nter­ and synchronous (S-mode), which may be thought face between these components consists of six basic fu nctions, which must be supported on all of as half-duplex operation. The ISO base standards define two basic profiles, one for each mode. Additional profiles have a lso been defined (or are being prepared) by the platforms. • Attach/detach-to attach and detach the non­ OSI environment • Open/c lose-to open or close a specific connec­ regional OSI workshops. Currently, the OpenVMS and ULTRIX implemen tations of the VT protocol tion into the non-OSI environment both support the following profiles: 1 . TELNET-1988, which mimics the basic functional­ ity found in the transmission control protocol/ internet protocol teletype network (TCP/IP TELJ'\JET) environment • Read/write-to read or write data between the OS! and the non-OSI environments Because each function is simple and clearly defined, the amount of platform-specific code 2. Transparent, which allows the send ing and receiving of uninterpreted data 3. A-mode-default, which provides basic A-mode functiona l ity required for implementation is minimal . For exam­ ple, t he read function on the U LTRJX implementa­ tion is only 10 lines of code. The implementation is therefore highly extensible to different platforms. Performance of the VT protocol i m p lementation Digital's VT Implementation is enhanced by using preal located b u ffe r pools. This approach to buffer management el iminates the Digital 's VT implemen tation provides both initiator overhead of dynamically allocating buffers. and responder capabil ities. I n addition to describ­ Our VT protocol implementation not only ing the features of the implementatio n, this section implements the ISO VT protocol but a lso provides compares the VT protocol with other network ter­ a gateway to and from other te rminal protocol envi­ minal protocols. ronments. We provide gateways to TELNET and to the Local Area Transport (LAT) on both the The VT implementation OpenVMS and the ULTRIX versions. Jn addition, we for both the U LTRIX and the OpenVMS systems pro­ have a VT;com mand terminal (VT/CTERJ\1) gateway vides the capability to act as either an initiator (a on the ULTRIX version. Initiator and Responder terminal implementation) or a responder (a host Comparison establishing an association with the responder Network Terminal Protocols based on information provided by the user, such as with network terminal protocols deal with echo 114 Vol. 5 No. I of the VT Protocol implementation). The initiator is responsible for Winter 1993 with Other Most comparisons Digital Technical journal An implementation of the OSi Upper Layers and Applications response time, that is, how long it takes for a char­ acter to echo to a d isplay after being typed a t the Acknowledgments The au thors wou ld l ike to thank their colleagues for keyboard. YT, l i ke TELNET and CTERJVI , c a n operate reviewing previous drafts of this paper. In particu­ in two different echo modes: rem ote, where the lar, we wou ld l i k e to thank Chris Gu nner and Nick echo is achieved by means of the remote host; and Emery, who were instrumenta l in revising the OSAK loca l , where the echo is accompl ished through the API, local host. A number of factors contribute to advanced development code into the product. and the OSAK team, who converted the response time in a remote echo situation. includ ing protocol overhead and l ine speed. TELNET has l it t l e protocol overhead; in fac t, for m o s t situatio ns, transferring normal data requires no additional overhead. VT protocol overhead is approxim ately 30 to 1 for a typical A-mode profi le, that is, 30 octets are required to carry 1 octet of user data. VT over­ head may seem excessive when compared with TELNET. However, the VT protocol provides many add i t ional capabi lities that TELNET does not, such as the abi l ity to accurately model d ifferent terminal environments. Additional ly, the 30 octets of over­ head does not increase significantly when larger amounts of user data are transferred . The largest gains for the VT are in the area of S-mode profiles. S-mode profiles enable most char­ acter echoing to be done locally By using an app ro­ priate S-mode profile, the VT implementation can provide sophisticated local terminal operations. References 1 . ]. Harper, "Overview of Digit a l 's Open Net­ working," Digital Technical jo urnal, vol. 5, no. 1 ( Winter 1993, this issue): 1 2 - 20. 2. L. Yet to et a l . , "The D ECnet/051 for OpenVMS Version 5.5 Implementation," Digital Technical jou rnal, vol . 5, no. 1 ( Winter 1993, this issue): 21- 33. 3. P Lawrence a nd C. Makemson, "G uide to ISO Virtual Te rminal Standards," Information Tech­ nology Standards Unit (UK), Department of Trade and Industry (March 1988). Genera/ References ancl then to transmit it a l l at once to the remote lnfonnation Processing Systems, Open Systerns Interconnection, Part 1 : Basic Reference Model host. The ability to process large amounts of termi­ reference no. ISO 7498-1 , 1984). Thus, it is possible to edit an entire screen of text nal input as batch jobs has many advantages, incl ud­ ( I nternational Orga nization fo r Standardization, ing reduced network bandwidth requirements, Information Technology, Open Systems Intercon­ reduced CPU requirements of the remote host nection: Connection Oriented Session Service (since the remote host is no longer involved in char­ Definition ( I n ternational Organization for Stan­ acter echo), and i ncreased user satisfaction (since dardization, reference no. ISO 8326, 1987). users experience no network delays fo r character echo). Information Technology, Open .�ystems intercon­ nection: Connection Oriented Session Protocol Definition ( International Organization for Stan­ Summary dardization, reference no. 150 8327, 1987). G oals common to the OSAK, FTAM, ami YT protocol projects included good performance and portabil­ ity of implementation. Perform ance is espec i a l l y important for OSAK, because i t supports a l l othe r OS[ applications. Maxim izing the use of common code and reducing system dependencies i n the three projects significantly reduced the engineer­ ing effort to port an implemen tation from one p lat­ form to another. This savings in human resources is Information Processing -�)'Stems, Open .�ystems Interconnection, File Transje1; Access, and Man­ agement: Part 1 , General Introduction; Part 2, Virtual File Store; Part 3, File Service Definition; Part 4, File Protocol .'ijJecification; and Part 5, Protocol Implementation Conformance State­ ment Proforma ( I nternationa l Organization for Standardization, reference no. ISO 8571 , 1988). necessa ry, given the growing set of hardware and information Processing Systems, Open Systems operating platforms supported by Digital. Equally Interconnection: Seruice Definition for the Associ­ important is the integration of OS! applications with ation their non -OSI cou nterparts, fo r examp le, the ocp Organization for Standardization, reference no. ISO and ologin functions and the protocol gateways. 8649, 1988). Digital Techuicttljournal Vol. 5 No. J Winter 1993 Control Service Elem ent ( I n ternational 1 15 DEC net Open Networking information Processing Systerns, Open Systems Information Processing Systems, Open Systems Interconnection: Protocol Specification for the Interconnection: Specification of Basic .Encoding Control Service Element (Interna­ Rules fo r Abstract Syn tax Notation One (ASN. l) tional Organization for Standardization, reference ( Internationa l O rganization for Standardization, no. ISO 8650, 1988) reference no. ISO 8825, 1987). Association Information Processing Systems, Open 5j,stems Interconnection: Connection Oriented Presenta­ tion Service Definition (International Organization fo r Standardiza tion, reference no. ISO 8822, 1988). Information Processing Systems, Open 5)stems Interconnection: Connection Oriented Presenta­ tion Protocol Specification ( International Organi­ zation for Standardization, reference no. ISO 8823, 1988) Information Technology, Open .s:vstems Intercon­ nection: Virtual Terminal Basic Class Service ( I n ternational Organization for Standardization , reference no. ISO 9040, 1990). Information Technology, Open 5)stems Intercon­ nection: Virtual Terminal Basic Class Protocol (Intern a t ional O rganization for Standardization, reference no. ISO 904 1 , 1990) Information Processing Systems, Open Systems Information Processing Systems, Open Systems Interconnection: Spenfication of Abstract Syn tax Interconnection: Notation One (A SN. l) ( I nternational Organization for Standard ization , reference no. ISO 8824, 1987). 1 I6 Application Lc�yer Structure (Internation a l Organization for Standardization, reference no. ISO 9545, 1989). Vol 5 No. I lrlirller IYY. J Digital Technical journal Mark W. Sylor Francis Dolan David G. Shurtlef f Network Management DECnet/051 Phase V incorporates a new network management architecture based on Digital's Ente1prise Manage1nent Architecture (El11A). The ElltlA entity model was developed to manage all entities in a consistent manner, structuring any manage­ able component regardless of its internal comple.:'(ity. The DNA CMIP management protocol was developed in conjunction with the model to express the basic concepts in the entity model. Phase V network management is extensible; the Phase V management architecture transparently assimilates new deuices and technolo­ gies. Phase V was designed to be em open architecture. Management ofDECnet/051 Phase V components is effective in a multi vendor network. Network m a n agement has been an in tegral part of DECnet since 1976 when Phase I I was cleveloped . 1 Even at that early stage of t h e DECnet arch i tecture, tecture had to become as extensible as the network architecture. F i n a l ly, since Phase V was designed to be an open a n effective management capabil ity was recognized arc h i tecture, ma nagement of Phase V components as an essential part of an orga n i zed approach to would have to be effec tive in a m u ltivendor net­ V, the DECnet work. Our design had to ensure t h a t the a b i l i t y to network ma nagement architecture has undergone provide effective management of network compo­ a nents was independent of the vendors suppl y i ng networ k i ng. Now in DECnet Phase major revision based on D i g i t a l 's En terprise Management Archi tecture (EMA). This paper gives a n overview of some of the key features and func­ t i o ns of EMA a n d of DECnet Phase ageme n t . See the V network m an­ "Overview of D ig i t a l 's Open them. The i n d i v i d u a l m anagement mechanisms used in Phase IV could have been extended to accommo­ date all the changes plan ned fo r Phase V. However, Networking" paper in this issu e fo r an overview of we fel t i t was time to re visit the basic network man­ the guiding princ iples, backgro u n d , and archi tec­ agement arch itecture to see if we cou ld find a u n i­ ture of DECnet Phase V2 Our initial fied work on Phase V ind icated t h a t changes were needed i n the network management architecture to support the broad range of network­ ing functions plan ned for Phase V F i rst, network approach that wou l d provide a superior sol u t i o n . Enterprise Management Architecture V development project by m a n agers wo uld have to be able to manage a l l the We began our Phase Phase V components i n a consistent man ner. A exa m i ni n g i n deta i l the requ irements fo r a new method was needed to b u i l d Phase V ma nagement network ma nagement archi tecture. Our goal was to components t h a t wou ld give the same general look design a n open arch itecture that al lowed fo r consis­ and fee l and the same model i n g approach to a l l tent m a nagement of an extensible array of network components. compo nents in a m u l t i vendor environment. As we Seco n d , Phase V n e t wo r k ma nagement wo u l d iden t i fied the specific requ i rements t ha t wou ld V network archi­ have to be ad dressed to meet this goa l , we rea l ized have t o b e exte nsible. T h e Phase tecture was being designed to a ll ow the use of m u l­ that we had the oppor t u n ity to develop an archi tec­ tiple modu les that would provide the same o r ture that went beyond ma nagem e n t of Phase s i m i l a r services a t each layer and to s i m u l t aneously works. We real i zed support mul tiple-layer protocols in a netwo r k . arch i tecture fo r the ma nagement of both networks Therefore, that we could V net­ provide an V ma nage­ and systems. The arch i tectu re eventual ly became ment arc h i tecture to transpare n t ly assi m i late new known as the En terprise Mana gement Arc h itecture devices and technologies. Our ma nagement archi- or EMA. we designed Digital Technical journal the Phase Vr;t. 5 No. J Winter 1993 l l7 DECnet Open Networking Early in the project, we recogn ized that the con­ ceptual separation of manageable components from the software that manages them was a fu nda­ mental design pri nciple. EMA therefore d istin­ guished entities, the basic components of the network that had to be managed, from directors, the software systems and accompanying applica­ tions used by managers to manage the components, as shown in Figure 1. formal ly, an entity was further spl it into a ser­ vice element, a ma naged object, and an agent. The service element is the portion of the entity that per­ forms the primary function of the entity, e.g., a data l in k layer protocol module whose primary purpose is com m u nication with a peer protocol module on another machine. The managed object encapsu­ lates the software that implements the fu nctions supported by the entity for its own management. For exa mple, it responds to management requests for the current val ues of state variables or to requests for the values of certai n configuration vari­ ables to be set to n ew values. The agent is the soft­ ware that provides the interface between the director and the managed object. The agent encodes and decodes protocol messages it exchanges with the d irector and passes requests to and receives responses from the managed object. Informally, we general ly equate the m anaged object and the entit y because the managed object defines what the manager can monitor and control in the entity. A d irector was modeled as a layered software system that provides a management-specific envi­ ronment to management appl ications. A director was split i nto a framework, a management i nforma­ tion repository ( M I R) , and separate configurable software modu les cal led management modu les. The director kernel provides common routines usefu l for the layered software modu les, includ ing 0 I / / KNOWLEDGE, POLICIES, AND PROCEDURES I 1 - - - / MANAGER Figure 1 I IS _ _ _ 1� I I I I 1 J I I I MANAGEMENT MODULES (APPLICATIONS) I I API I API I I MONITOR CONTROL ENTITIES MANAGEMENT PROTOCOL The Basic Entity/Director Split I I I I I I I I I MIR I � - _ - _r_ FRAMEWORK D I R ECTOR KERNE L MANAGED OBJECT I 1-r-:::_ -:::_ -:::_ -:::_ -:::_ -:::_ -:::_ � D I R ECTORS � - MANAGED - - - - - SYSTEM - MANAG - - - - I N G-SYSTEM I � - - - - - - - - · I I services such as d ispatch (location-transparent exchange of management requests and responses with enti ties), encodi ng/decod i ng, data access, data dictionary access, and event m anagement. Taken together, the director kernel and the agent provide a framework for managed objects and man­ agement appl ications to interact. The framework provides a n application programming in terface (API) to m anaged object and management module developers. The M I R contains data about particular entities as wel l as information about the structure and other properties of entity c lasses, which the director software also knows. Management modu les were d ist ingu ished as presentation, fu nction, or access modu les. Presen­ tation modules implement user or software access to the d irector management modu les that is device i ndependent and style dependent. Function mod­ ules provide value-added management fu nctions that are partially or completely entity indepemlent, such as n etwork fau l t diagnosis, event or alarm han­ d l i ng, or h istorical data record ing. Access modu les provide a consistent i n terface to the basic manage­ ment functions performed by entities. In add ition, they i nclude one portion that maps operations on entities i n to the appropriate protocol primitives and another portion that i mplements the protocol engine for the relevan t m anagement protoco l. Figure 2 shows t he components of a director and an entity. Although users can convenien tly interact with systems through graphical user i n terfaces (GU!s), sophisticated users wished to preserve a command line i nterface (CLI) they cou ld use to specify com­ plex management requests quickly. Therefore, we MANAG EME NT PROTOCOL - _ - _ - _ - _ - _ --:; _ GENT I MIR I I I I I � �������J - - c-:::_ -:::_ -:::_ -:::_ -:::_ -:::_ -:::_ J Figure 2 Vol. 5 No. 1 A Framework View ofEMA lfiiuler 1')93 Digital Tecbnical jourua/ Network Management developed a single, extensible command l anguage that wou ld al low human operators or software pro­ grams to com municate requests to management modu les and (u ltimately) entities in a consistent fashion. This work developed into the network control language (NCL). An NCL com mand specifies an entity, an operation to be performed by the entity, a l ist of arguments (if any), and a l ist of quali­ fiers (for specifying users, passwords, paths, fil ter­ ing values, etc.). Digital's DECmcc Management Director is an i mplementation of an EMA d irector.' The DECmcc product provides a platform for the development of new management capabil it ies and offers specific Phase V management capabi lities as we l l as a nu m­ ber of generic net'work management tools. The DECmcc director supports both GUT and NCL CLI user interfaces. of complex components, entity classes are orga­ nized into logical structures that reflect the rela­ tionsh ip of their corresponding components; individual. entities are named i n terms of that structure. The name of the top -level entity i n each structure is global ly u n ique, and i t is referred to as a global entity. Al l i ts child entities, however, have names that are unique only within the context of their level in the structure. Therefore, they are referred to as local entities. • Entity Model To manage a l l entities i n a consistent man ner, we required a single, consistent method for structuring any m anageable component (regard less of its inter­ nal complexity) and for describing its management properties: the operations that it can perform, the variables it makes available for its management, the critical occurrences it can report to managers, etc. The El'vlA entity model was developed to answer these needs. The structure of a manageable compo­ nent in this model is shown in Figure 3. Essential ly, the entity model defines techniques for specifying an object-oriented view of an entity. Each entity has the fol lowing properties: • A target entity's globa l ly unique name is con­ structed by concatenating its local name (a pair) to the local names of each of its ancestors in turn, beginn i ng with the containing global entity and endi ng with the target entity's i m med iate parent. The construction of an entity's name and the containment h ierarchy are shown in Figure 4. • A col l ection of i nternal state variables, cal led attributes, that can be read and/or modified as a result of management operations. At tributes have names unique within the context of the entity. Attributes have a type that defines the val­ ues the attribute can have. • A col lection of operations that can be per­ formed by the entity. Operati ons al low man­ agers to read attribu tes, mod ify attribu tes, and perform actions supported by the entity. Actions are entity-specific operations that resu l t in changes of state in the entity or cause the entity to perform an operation that has a defined effect. • A col lection of events that can be reported asyn­ chronously by the entity. An event is some nor­ m a l or abnormal condition within an entity, usu a l l y the resu l t of a state transition observed by its service element or its agent. Event reports are sent asynchronously to the manager; they i nd icate the type of (entity-specific) event that occurred and may also contain arguments that A position within an entity h ierarchy. To ease management of networks with large numbers l CR EATE AND DELETE GET AND SET OPERATIONS I ACTIONS NOTIFICATIONS Figure 3 { SERVICE THE ENTITY PROVIDES A MANAGED OBJECT (ENTITY) ATIRIBUTE EVENT REPORT D BEHAVIOR Structure of a Managed Object Digital Technical Journal Vol. 5 No. 1 If/inter 1993 A h ierarchical ly structured name. An individual entity's local name is constructed by concatenat­ i ng its class name to its instance identifier. The class name is a keyword that uniquely identifies the class (object type) of an entity. The instance identifier is the value of an identifying attribute used for naming i nstances of the entity's class, for which each instance of the class has a unique value. 1 19 DECnet Open Networking NODE DEC UK REO MARVIN CLASS NODE NAME = DEC . U K. REO. MARVIN STATE = ON . . . I • CLASS ROUTI NG t NODE DECUK. REO.MARVIN OSI TRANSPO RT CLASS OSI TRANSPORT MAXIMUM WINDOW = 32 l . . . NODE DEC:.UK. REO.MARVIN OSI TRANSPORT PORT %X01 75A8D9 CLASS PORT NAME = %X01 75A8D9 PROTOCOL CLASS = 4 Figure 4 k/anaged Object Naming Hierarchy further describe o r qualify the event. For exam­ ple, arguments could indicate the n umber of times the event occu rred before a report was sent to a nnou nce that a threshold was reached, or give the old a nd new states in an event that reports a state transition. • A specification of the behavior of the entity in relationship to the functions that the entity's ser­ vice element provides. This is usua l ly specified as some abstract state machine, through pseudo­ code, or as a set of precond itions, postcondi­ tions, and i nvariants. The entity model provides specific requirements and recom mendations about the way entities can be modeled in terms of these properties. These restric­ tions, placed on entity class definitions for p urposes of both interna l and global consistency, take several forms: (1) restrictions on the types and ranges of attr ibu tes that can be used for various purposes (e.g., as identifying or cou nter attribu tes); (2) con­ strain ts on operations (e.g., examine operations can have no side effects on the value of attributes whose values they report); or (3) restrictions on events (e. g . , all events and event reports must have an associated time stamp and u nique identifier). Readers familiar with open systems interconnec­ tion (OSI) management wil l find the entity model very similar to OSI 's structure of management infor­ m ation (SMl) standard:'' This is no coincidence. D u ri ng the early development of Phase V and the entity model, we recognized the need for a n open management architecture. Portions of the techno!- 1 20 ogy were therefore contributed to JSO/IEC JTC 1 SC2 l/WG4, a working group of the I n ternational Organization for Standardization (ISO) that is responsible for efforts to define standards for OSI management. Al though some details of OSI SM I and the corresponding EMA features diverged sl ightly from each other dur ing their evolution, the EMA entity model ancl OS! SMI are sti l l compatible. At this writing, work is u nder way to al ign certain parts of the EMA entity model with the final i n ternational standard (IS) versions of OS! SMI. Entities The EMA entity model describes how to specify the management of an architected subsystem . How­ ever, for Phase V, we chose to make the manage­ ment specification of a subsystem a part of the subsystem's specification. As described in the Modu les section, that may have been the most important decision made in the network manage­ ment architecture. As the entities for DECnet/OSI Phase V were defined, a collection of fol klore grew on how typi­ cal design issues cou ld or should be solved. As with any fo l k lore, these guide l i nes were p assed from one architect to another, either verbally, or as selected portions of the management specifica­ tions were copied from one subsystem to another. This fol klore is continua l ly changing, as new and better solutions are fou n d . Much of the fol klore has al ready been described 6 Some other guidelines are described below. Vol. 5 No. I Winte-r 1991 D igital Techllical jou r11a/ Network 1l1a naf,ement The Network M a n agement Specifica tion describes the central str ucture of Phase V network man agement, a n d in particu l a r defines the node provides a l l the i n formation needed by a d i rector to con nect to the node's agent and to issue m a n age­ ment d i rectives to the node or any of i t s c h i l dre n . entity class . - I n the fol lowing sections, we describe Users a n d network ma nagers rarely refer to the properties of the node entity c l a ss a n d , as a nodes by their addresses. F i rs t , it is d i fficu lt to representative example, the OSI transport module remember the addresses and second, moving the entity class. node from one place to another i n the network gen­ era l ly changes i ts address. Thus each node has a Node Entity Class s i ngle name, a DECdns fu l l name. The node knows its name DECnet/OST and address. Each node's name is stored as a DECclns network is cal led a node. The bou nds of that system ent ry, and one of the entry's DECdns attributes A computer system in the depend on the system's arc h i tectu re ; a personal holds the node's address. Thus, any director can computer (PC), a s ingle-processor workstation, a look up t h e node's name in the DECdns and the multiprocessor m a i nframe, a diskl ess system, even address associated with it, and then use any one of a VAXc l uster system can be considered a single the towers to connect to the node's agent. node. Nodes are modeled by the node entity class. A node entity has o n l y a few fu nctions in management. • onym, which is a sb;-character, Phase l V - style node A node is a global ent ity that is the p a rent fo r many subsystems and provides an agent fo r a l l of them. • A node has an identi ty, a name, and a n address that a l low it to be managed remotely. • To ensure backward comp a t i b i l i t y with DECnet Phase rv , a node also has a n a t t ribute c a l led its syn­ n ame. I f a node has a synonym name, that name is entered in a special d i rectory in the DECd ns name space as a soft l i n k to the node's Phase V name. A soft l i n k is a fo r m of al ias or i n direct poin ter, from one name to a nother, that a l l ows an e n try to be reacJ1ed by more than one name. A node plays a major role in system i n i t i a lization Each network l ayer address of the node (a node can have more than one) i s encoded in and starr-up. a standard way as a soft l i nk to the node's name. This a l lows a Identity manager (or d i rector) to translate a node a d d ress i nto the equ ivalent node name, making many d i ag­ The fol lowing a ttributes ident ify a node: • An address, the application layer a In t h e DECnet/OSI Phase V arch itecture, a port entity represents the in te rface between layers, mak­ ing v i sible to a manager how one layer (a cl ient) is OS/ Transport Module In DECnet/OSI Phase contains port, v; using the services of a lower l ayer. Ports are not cre­ the OS! transport m od u l e template, local ated by a manager; they are created w hen a cl ient of network service the service requests use of the service (by "opening access point ( NSAP) address, and m a n u facturing a port " ) . The exact information held in a port entity a u tomation protocol (MAP) en t i t ies. A local NSAP varies fo r each su bsystem. I n ge neral, a port entity e n t i t y contains remote NSAP entities. The contai n­ contains a t t r i b u tes t h a t iden t i fy the c l i e n t and the ment h ierarcl1y is shown in Figure 6. service being used, and how that serv ice is being The OS! transport module has characteristic used (e . g . , as usage cou nters). The port e n t i t y is an a t tr i b u tes. A manager can change the configura­ example of how the Ei\'lA evolved through feedback tion of the m o d u le by mod ifying its characteris­ from tic attribu tes. This is c.Jone fo r several reasons. incl u d i ng • be granted being In the case of the OSL transport module, the port on an individual port connection (TC) , and i t provides transport a window to the status information associated w i th the TC. For example, the OSI tra nsp o r t port status a t t r i b u tes 1b control the m a x i m u m n u m ber of transport give connections that can be m u l tiplexed on any sin­ • gle network connec t io n , when the OS! t ransport protocol is opera t i ng over the connection-mode • network service The n a me of the user of the OS! transport service Local and remote NSAP addresses and transport selectors Mod i ficatio n of these a t t r i b u t es is needed onl y if • the manager requires anythin g other than a stan­ dard configuration; Before entity a l so corresponds to the local end of a trans­ connection • a rc h i tects. oped and used in subsystem architectures. To control the m a x i m u m cred i t w i ndow t h a t m ay subsystem agement archi tecture. the concept was first devel­ To l i m i t the m a x i m u m permissible nu mber of active transport connections at any one t i me • the adopted as a general mechanism i n the overal l man­ The protocol class being operated o n the TC In a d d i t i o n , a port e n t i t y has cou nter attributes that wor k ing c.Jefa u l t values are record the to tal n u m b e r of ti mes something of defined for all characteristic at tributes. Status a t t r i b u tes show the c u rrent ope rating i n terest occurred on the TC. For example, there are state of t he module, e .g . , the n u mber of transport counters recording the n u mber of octets ancl proto­ connections cu rre n t ly active. Status a t tribu tes can­ col data units (POlls) sent and received. A manage­ not be m o d ified d i re ctly by a m a nager. To start the ment station can p o l l these and determine usage OSI TRANSPORT L LOCAL NSAP TEMPLATE PORT I MAP Figure 6 L 24 REMOTE NSAP Containment Hierarchy for 051 Transport Module Vol. 5 No. J Winter 1<)9.) D(�ital Technical journal Network Management over time. A port e n t i ty also main tains counters fo r The remote NSAP entity is a subent i t y of a loca l both c.l upl ic ated transport PDUs (T PDUs) c.letected NSAP e n t i t y. Each remote N SAP entity maintains a t t r i b u tes resu l t i ng from interactions and retrans m it ted TPD Us. Ta ken with the usage counter counters, these can be used to calculate error ratios between the superior loca l NSAP and a remote and rates on the TC. t ransport serv ice provid er. Events are defined fo r W hen a cl i e n t opens a port onto a service, the the remote NSAP e n t i ty, to provide immed iate noti­ c l ient can then use the service i n terface to selec t fication to the ma nager of error con ditions. For options such a s w hich features t o u s e or which p ro­ ex ample, files. M a x i m u m flex i b i l i ty, however, a l s o poses a proble m . In m a ny cases, a cl ient has l i t t l e or no • k n owledge or u ndersta nd i ng of the service options fa i l u re event occurs whenever a received TPDU ava i l able in a n un derlyi ng layer. Fu rther, i t would be unrea l istic to expect a l l cl ients of a service (or, A checksum checksu m val i d a t i o n fa i l s when per formed on • An invalid TPDU received event occurs when­ u l t i m a tely, an end us er) to acq u i re this i n - depth ever a TPDU received from the remote NSAP is knowledge. in v i o l a tion of the transport protocol One alt ernati ve was to prov ide defa u l t values for a l l the service options. However, a si ngle set of c.lefa u l t val ues satisfies only a s i ngle subset of uses. I nstead we adopted the template, which is a n entit y t h a t represents a set of related option v a l u es . A ma nager can create as many templates as required for d i ffe ren t sets of related option valu es. A c li e n t neec.ls to be configured only w i t h the s i ngle n a m e o f t h e template t o use, not t h e deta i l s o f every service option. The OS! management standards groups have adopted the template concept in the fo rm of their is incremented . Thus, even if the m a nager has con­ figured even t logging to fil ter out these eve nts, an ind ication OSI transport s e rv ice, a template name may be are happening rem a ins, teria. The event contains a n u m ber of arguments as the t i me the event occurred. The i nval id TPDU received event also has arguments that give A reason code, i n d icating in what way the TPDU was i nval ic.l, as specified i n the ISO 8073 lection of characteristic at tribu tes used to supply the operation of a TC. When a port is opened to the they wel l . All events i d e nt ify the ge nerat i ng entity and A template i n the OS! transport m o d u l e is a col­ c.lefault values fo r certain parameters that i nfluence that prompting the m a nager to change t h e fi lte r i ng cri­ • initial v a l ue managec.l object ( I VMO). Whenever an Consider this second exa mple. inval id TPDU received event is generated, a counter standard 1 c. • The part of t h e TPDU header that was inva l id • A specific D i g i t a l Network Architecture (DNA) specifiec.l by the cl ie nt. The characteristic a t t r i b u tes error code, which was added to qual ify the ISO in the temp l a te are then used as c.lefa u l t values fo r 8073 reason code and to help customers d iag­ TC parameters not suppl iec.l by the user, i n c l u d i ng , nose problems for example, • • The MAP p l aces a nu mber of requirements upon The value of the w i ndow t i m e r impleme ntations of the OSI T h e s e t of classes o f protocol that m a y be negoti­ ated fo r use on a TC • The use of checksums t ha t mi ght be negotiated fo r a TC that operates the cl ass 4 protoco l , a variant of the OS! transport protocol defined i n ISO 8073 A d e fa u l t template i s a u tomatical ly createc.l and transport protocol beyond si mple conformance to ISO 8073. The MAP entity conta ins the additional management needed to meet these extra re quirements. The MAP entity is optional; i mplementations with no busi ness requ irement to support MA.P would not provide the MAP enti ty. Supporting Mechanisms used if no templ a te is spec i fied when a port i s Network management in DECnet/05! is bui l t on a opened. number of supportin g services. Wherever possible, There is one local NSAP entity fo r each NSAP m a nageme n t uses the services of the network to SAP entity manage the network. This approach m i n i m izes the is auto m a t ically created when an NSAP address used n u m be r of spec i a l mechanisms we had to define by the OSJ transport is added to the network rout­ specifi c a l l y fo r network m a nagement. Some key ing subsystem (the adjacent lower layer). services used by network management i ncl ude adc.lrcss used by the OSI transport. A local Digital Technicaljounwl �bl. 5 No. I Winter JY9.> l25 DECnet Open Networking • Session control • First and foremost was timin g. DNA CM I P was developed before the OSI CM IP was standardized. • DEC:c.l ns name service • D igit a l 's cl istribu tecl t i me service (DECdts) • A u n ique identifier service ( U I D) The i nevi table changes to t he standard led to many minor differences in the protocols. Stil l , because the concepts i n the EMA entity model and OSI 's SJVH are a l igned, the DNA and OSI C M I I' A few serv ices were developed specifically to protocols are fu ndamentally the same. The support network m a nagement. Most had existed i n a u thors are c u rrently m igrating DNA C M I P to OSI earlier phases of DNA. I S CMIP. The change wi l l be transparent to any user. • D NA CMIP • Event logging • MOP down-line load protocol • Appl ication loopback • on Phase IV systems to m a n age Phase V systems. DNA CMIP can be v iewed as two separate proto­ In the foJ Jowing sections, we describe DNA CMIP and event logging. cols. One protocol , management info r m a t i o n con­ trol excha nge (MICE), is used by a director to invoke a d i rect ive (get, set, acti o n , etc.) on a n entity (or entit ies). The other protoco l , management event Digital Network Architecture Common Management Infonnation Protocol notification (MEN), is used by an entity (or entities) The entity model describes w hat a n entity c a n do. Those concepts must be expressed in the manage­ ment protoco l . DNA CMIP, the management proto­ col fo r DECnet/OSI Phase V, is a n evol u t i o n of the to report events to a director. The two protocols operate over separate connection s for important reasons. • Phase rv management protocol (ca l le d NICE). The nected c.liffer. A M EN association is brought up two protocols are rem a r kably s i m i lar. Both i nclude thus controlled by the agent. A MICE association, however, i s brought u p w hen a director (or operat i o ns. The main d i fferences between the two ma nager) wishes to invoke an operation on an protocols are in the fo l lowing areas. e n t i t y, and is t h u s contro l led by the d irector. Treatment of other ope rations. In NICE, each Attempting to share control of asso ciation estab­ operat i o n required a new kind of message; in CMIP, a general extension mecha nism, the action, is provided. • l ishment was not worth the complexity. • Whenever an association is shared by two (i iffe r­ ent users, t he problem of al locating resources Naming. NICE supported a l i m i ted nu mber of fa irly to the two users must be a d d ress ed . Since e n t i t y cl asses (eight) a n d p rovided a r u d i men­ tra nsport tary nam ing h ierarchy based o n the n o t i o n of between connections, the a d d it i o n of a m u l t i­ connections deal with this issue " qua l i fying attribu tes." CMIP supports h i e rarchi­ plexing protocol at the appl i cation level (with a n cal entity names a n d is essen t i a l l y u n l i m ited in attendant flow control mechanism) was again the nu mber of entities with which it can dea l . considered to be too complex. Transport con­ S i m i l a rly, nections are not (or shou ld not be) expensive. CMIP is m u ch m o re extensible in n a m ing at tribu tes, a t tribu te gro u ps, a n d event reports. • The times at wh ich the associations are con­ when a n entity wishes to repo r t an even t , and is the set, show (also cal led get), and event report • Second, DNA CMIP operates over a DNA protocol stack, not a pure ISO stack. This al lows directors Encoding. CMIP uses ISO Abstract Syn t a x N o t a t i o n I (ASN . l ), a standard t a g , lengt h , v a l u e (TLV) encod ing of a t t ribu tes and arguments, a n d N I C E used a private TLV encoding. DNA CM IP is not qu ite the same as the rs ve rsion of OS! C M I P, a lthough it was based on the second Event Logging The e n t i t y e m i ts a n event report to the m a nager when an event occurs in an ent ity The event logging m od u l e provides a service that tran smits event reports from the repor t i ng e n t i t ies to one o r m ore sink appl ications, which are considered to be a cer­ tain kin d of d i rector in EMA. Event logging i n Phase V i s based o n concepts similar to those provided by d raft proposal of the C M I P standard. There are t wo Phase IV. Because the principal use of event logging reasons fo r this. is fo r repo rt ing fa u l ts, event logging does n o t 1 26 Vr;/. 5 No. I Winter 1993 Digital Tee/mica/ jounwl Network Management guarantee del ivery of event reports to the sink a col lection of entities and events that are either appl ication. F igure 7 shows the event logging architectur e . 1 7 passed through the fil ter or blocked by the filter. When a n event occurs within a n entity (E) i n a in an event queue within the ou tbound stream. source node, the entity invokes the PostEvent ser­ Each outbound stream 's queue server sends events Event reports passing through the fil ter are p laced vice provided by the event dispatcher (a part of the to a corresponding i nbound stream i n the sink node's agent). When posting an event , the entity appl ication. M u ltiple ou tbound streams can be set supplies its name, the type of the event, all the argu­ u p by the manager, al lowing events to be sent to ments related to the event, a time stamp of when many sink appl ications. Ou tbou nd streams are the event occurred, and a U I D assigned to the event. modeled as entities i n their own right, and standard UIDs ensure that each event can be u niquely identi­ management operations (create, get, set) are used fied, so that if a sink appl ication receives more than to configure them. one copy of an event report, it can detect the dupli­ Each i nbound stream i n a s i n k appli cation has an cat ion. Time stamps a llow the event reports t o be event receiver ( R) . I nbound streams are genera lly ordered in t ime (an i mportant step in determining created when a connection request is received causal ity). A time service (DECdts) is used to syn­ from an ou tbound stream. Events received by the chronize clocks across the network. It provides a receiver are compared against a sink fi lter and consistent view of time for correlating observations. queued to the s i n k appl ication. Thus the events An important feature for ma nagement is the i n c l u­ from m u l tiple inboun_, streams are merged. sion of an inaccuracy bound on the time stamp. The protocol used between the ou tbou nd stream The PostEvent service formats an event report and the inbound stream is the CMIP M E N protocol, and places it in an event queue (Q). Event queues which operates over a connection (using either the are l imited in the amount of memory they use; thus DECnet transport layer protocol or OSI transport). they l i mit the number of events that can be held i n The use of a connection lowers the probabil i ty that the queue. Because events can b e placed i n the a n event report wil l be lost, since the connection queue at a rate faster than the queue server (S) can hand les acknowledt5ments and retransmissions. It process them, the queue can fi l l , and any new does nor guarantee delivery, however, and events events placed in the queue w i l l be lost. The events may stil l be lost due to fa il ures of the sink appl ica­ lost event is recorded as a pseudo-event in the tion or the source node. queue (it appears as an event report from the entity holding the queue). The events lost event carries an Conclusions argument that records the number of events that Our approach to Phase V management worked were lost in a row. well . Defi n i ng the EMA entity model first provided a The queue server for the event dispatcher framework of consistency among all the architec­ compares each event report against a filter ( F ) tures. Developing a management protocol (CMIP) associated with a n ou tbound stream. The fi l ter lists expressing the basic concepts i n the entity model S I N K D I R ECTOR SOURCE NODE EVENT DI SPATCHER SINK A P PLICATION 00 F OUTBOUND STREAM INBOUND STREAM �F - � "-011@: . � LE;J s)ll o�F -11\ R I NBOUND STREAM DNA CMIP MEN PROTOCOL OUTBOUND STREAM .� R . ""'----I I ANOTHER S I N K DIRECTOR Figure 7 Digital Technical journal Vol. 5 No. 1 Winte-r 1993 ANOTHER S O U R C E NODE Event Logging 1 27 DECnet Open Networking in conj u nction with the model placed the protocol 6. in a position to meet t he needs of the model. Giving M. Sylor, "Gu ideli nes for Structuring Manage­ able E n t ities," integnlled Network Manage­ responsibility for defi ning the management of a ment /, B . Meandzija and ]. Westcott (eels.), subsystem to the architects of that subsystem made (Amsterdam: each subsystem more comrlete and coherent. As 1989): 169-183. problems were found in the model. based on lessons learned d u r i ng the specification of e n t ities, any 7 Equipment correct those problems. 8. Corporation, 1991 ) . 9. au toconfiguration, a nd self-ma nagement . Still, sim­ pl ifying the management of a Phase V network is a n important area for conti nual i mprovement. The biggest success of EMA/ P hase V management 10. 11. N . LaPel le, M . Seger, and M. Sylor, "The Evolu­ of Network Ma nagement Products," Tee/mica! Journal, 1, vol . no . 12. 3 1 3. Director," Digital DNA Maintenance Operations Protocol Func­ tional Speczfication, V4. 0. 0 (Maynard, MA: DECmcc System Reference Manual, 2 volu mes (Maynard, MA: Digital Equipment Part 1 : Management in{ormation Model, Organization for 1 (Phase V) (Maynard, MA : Digital Network Architecture (Phase V) Digital Network Architecture (Phase 15. Digital Network Architecture (Phase V) Documentation Kit No. 4 (Maynard, MA : Digital Equipment Corporatio n, Order No. (Geneva : I nternational Standard ization/In terna­ Services­ V) Documentation Kit No. 3 (Maynard, MA : D igital Equ ipment Corporation, Order No. EK-DNAP3-DK-001 , forthcoming 1993). EK-DNAP4 -DK-00 1 , 1993). tional E1ectrotecbnical Com mission, 1990). OS! il!fa nagernent inj()rmation Digital Network Architecture 14. OS! Management Information Seruices­ Structure of Management information­ 1016'5-1 1992). EK-DNAP2-DK-001 , 1993). 1 30-142 ISO/IEC DIS PE55C-TE, Digital Equ ipment Corporation, Order No. Technical journal, vol . 5, no. 1 ( Wi n ter 1993, this issue): 16. information Technology - Telecommunica­ Structure of iVltmagement 'n{onnation ­ tions and information Exchange Between Part 4: Guidelines j()r the Definition of Systems-Connection Oriented Transport 10165-4 Protocol Specification, ISO/lEC 8073 (Geneva: (Geneva: International Organ .. :arion for Stan­ International Organization for St andard iza­ Managed Objects, ISO/ I EC dard ization/intern ational Com miss ion, 1992). 1 28 tion, VJ. O. O (Maynard, MA: Digital Equipment Documentation Kit No. 2 (Maynard , MA: C. Strut t and J. Swist, " Design of the DECmcc Ma nagement '5. DNA Unique identijier Functional Specifica­ EK-DNAP 1 -DK-00 l , forthcoming 1993). no. 1 ( Wi n ter 1993, this issue): 1 2 - 20. 4. EK-DNANS-FS-002, D igital Equipment Corporation, Order No. ). Harper, " Overview of Digital's Open Net­ working," Digital Tecl:micat journal, vol. 5, 3. Order No. Documentation Kit No. (September 1986) : 1 1 7- 12 8. 2. EK­ Corporation , Order Nos. A A-PD 5 LC-TE, A A­ References Digital No. EK-DNA 1 1-FS-00 1 , 1992). areas. Systems, networks, and applications are all tion Order D igital Equipment Corporation, Order No. more than the trad itional network management I. Corporation, Corporation, Order No. EK-DNA l -Fs-001 , 1992). is its general applicability. E1\1A is bei ng appl ied to managed by EMA. Functional DNA Naming Service Functional Specifica­ reflects the overall complexity and feature-richness con trol that the manager is given. This burden is Management tion, V2. 0. 0 (Maynard , MA : D igital Equ ipment of Phase V over Phase IV as wel l as the increased eased somewhat by the use of i n tell igent clefa u J ts, Publishers, DNA02-FS-001 , 1991 ) . However, some t h i ngs d id not go as well. The Phase V was beyond anyone's expec tations. This Network Science Specification, V5. 0. 0 (Maynard, MA: D igital needed changes to t he entity model were applied to nu mber of ent i t ies, attribu tes, and operations i n DNA Elsevier DIS Electrotechnical tion/International Electrotec hnical Comm is­ sion, 1989) Vol. 5 No. I Winter l'J'J3 Digital Techt�icaljounwl Network Management 17 DNA Event Logging Functional Specification, Vl. O. O (Maynard , MA : Digital Equ ipment Cor­ porati o n , Order No. EK-DNA09-FS-001 , 1992). C. Strutt and D. Shurtleff, "Archi tecture for an Inte­ grated, Extensible E n terprise Management System," Integrated Network Management I, B. Meandzija and ). Westcott (eds.), (Amsterdam: Else vier Sci­ ence Publ ishers, 1989): 61 -72. General References tll1A Entity Model (Maynard, MA: Digital Equipme n t Corporat i o n , Order No. A A-PY7KA-TE, 1991 ). M. Sy lor, " M anaging DECnet Phase V: The E ntity DNA Network Com mand Language Functional Specification, VJ. O. O (Maynard, MA: Digital Equip­ ment Corpora tion, Order No. EK-DNAOS -fS-001, 1991 ). Mo d e l ," IEEE Networks (March 1988): 30-36. L. Fehskens, " An Architectura l Strategy fo r E nter­ S. Marti n , ]. McCa n n , and D. Ora n , " Development of Management I, B . Meandzija and ). We stcott (eds.), prise Network Management," in tegrated Network the VAX Distribu ted Name Service," Digital Techni­ (An1sterdam: E l s evier Science P u b l ishers, 1989): caljournal, vo l . 1 , no. 9 O u n e 1989): 9-15. 41-60. Digital Technical journal Vol. 5 No. I Winter 1993 1 29 Colin Strutt James A. Swist Design ofthe DECmcc Management Director The DECmcc product family represents a sigmficant achievement in the develop­ ment of enterprise management capabilities. DECmcc embodies the director por· lion ofDigital's Enterprise Management Architecture (EMA) and is both a platform for tbe development of new management capabilities and a vehicle for aiding cus­ tomers to manage their computing and communications environments. Initially, the DECmcc director was intended to facilitate sophisticated management of evolv· ing networks. In addition to network management, DECmcc has been adapted to the needs of system, applications, data, environment, and telecommunications management. The first implementations contained the DECmcc kernel, a devel· oper's toolkit, and various management modules. Development of the DECmcc director has been a agement tasks. The second, a simple command l i n e m u lt iyear effort involving m a n y groups within d i rector referred to as network c o n t r o l l a nguage, Digi t a l . When the DECmcc design was i n it i a ted i n wo u l d address the needs of more experienced man­ 1987, there was n o equ iva lent m anagement soft· agers who prefer a command l ine enviro nment.' ware i n the i ncluded , i ndustry. provided Most companies, Digital Conceived primarily as a DECnet m a nagement one o r more independent, d i rector, the DECmcc p roduct evolved to address fo cused products. Each of these dealt with m a nag­ the broader problems associated with m a n aging a ing a specific set of components such as a single complete comp u ting and communications environ· vendor's local area network (LAN ) b ridges o r pro· ment. v i d i ng a specific m a n agement appl ica t i o n such as arguably wil I never finish as net work enviro nments equ ipment inventory. This evolution is not yet finished and continue to change. capabil ities Since the development of DECmcc in 1987, the within DECnet Phase IV were reaching their l im i t , si mple network m anagement protocol (SNMP) has and t h e i n corporation o f newer co m mu n ications become widely implemented. DECmcc bas adapted technologies in to h a n d l e S N M P as wel l . I n a d d i t io n , the DECmcc Digital's network m a nagement a seam less way was beco m i ng i ncreasingly diffi c u l t . As part of the DECnet Phase V product, once a tool for the VA.,'( VMS architecture, is develop ment, work was started to rational ize m a n­ now implemented on m u l tiple p l at forms, such as agement of di stributed systems. This effort led the U LTRIX and U NIX System V Release 4 operati ng to the for m a l defi n i t io n of such concepts as the systems. d irector/en t i ty relationship, the e n t i ty model, and In this paper, we look a t the development of the the com mon ma nagement information protocol DECmcc d irector. We start by d iscussing our i ni t i a l (CM IP) . u.:1.1 These ideas formed the basis for m a n­ design ideas taken i n the perspect ive of t h e indus­ agement in Phase V and were Digi t a l 's contribu· try at the t i m e . We then describe the i n itial i mple­ tions to the open systems i n terconnect io n (OSI) mentation of DECmcc. We also present the effects ma nagement of the changing i n dustry and how DECmcc has model from the International Organization fo r Standardization (ISO). The origin a l v ision of network management i n Phase V included the concept o f two management directors. The first, a sophisticated director referred adapted over t i m e . We con clude with some of the opportu n ities fo r fu ture work. Historical Perspective to as the m a n agement control center (MCC), wou l d D igital's first network m a n agement capa bility was hand le t h e more complex, yet user-oriented, m an- del ivered in 1978 as part of the release of DECnet 1 30 Vol. 5 No. 1 Winter 1993 Digital Tech11icaljournal Design of the DECmcc Management Director Phase 11 software. Much of the DECnet product was • A command language, network control language (NCL) , was for m a l ly defined to be unambiguous then manageable, both configuring the software for i nstal !at ion as wel l as the operational aspects. The even with new e nti ties and their definitions; an main program used to perform managem e n t was associated primitive director of the same name, the network control program (NCP). At that time part of every Phase V package, replaces the NCP management mostly consisted of looking at infor­ of previous phases.5 m a t ion a nd then changing it as needed. DECnet Phase I I , however, could perform sophisticated • A management protocol called the common management information protocol (CM!P) was diagnostic loopback tests, both nonint rusive as we l l as intrusive, to d iagnose con nectivity prob­ used to commu nicate between directors and entities:i.H � lems at various layers of the protocol stack. Management formed a significan t part of the CMIP was named common a nd presumed to han­ DECnet Phase lii and DECnet Phase IV networking dle the common aspects of management across a products. Each major release contained many wide variety of m a n age ment appl ications. Some changes to manage the new fu nctional ity. However, developers suggested the possible need fo r a the DECnet management structure in place in the smal l number of special ized managemen t infor­ 1970s was becoming more diffic u l t to adapt to the mation protocols (SMIPs)-perhaps one for each requirements of the mid-l980s. For example, sup­ of the management functional areas (configura­ port was added for X.25 during Phase Ill and for tion, p e rformance, fau lt, security, and account­ Ethernet dur ing Phase IV . These releases required ing). However, CMIP proved to be sufficiently quite different management approaches than the expressive and powerful to support manage­ ment appl ications covering the management one used for Phase II. With the advent of the signifi­ cant changes to DECnet Phase V to include support functional areas. for the OSI protocol stack, another m a nagement approach was needed . A t the time the distribu ted systems management Thus in conjunction with Phase V n e twork devel­ work was initiated, Digital's networking and com­ opment, an effort was started to provide a new architectural approach to management of Phase V m u nica tions prod uct line was expanding to encom­ pass more than the DECnet networking hardware One of the key requirements was to provide the and software. Along with each product came its Phase V management needs in a way that would own management software, some of which was extend their adaptab i l i ty to the fu ture. This work tailored along the lines of the DECnet standard NCP. was referred to as distributed systems management In addition, because it add resses management of the compu t i ng opment Group was building some fa irly sophisti­ the Network Management Devel­ environment as well as management of the commu­ cated nications that DEC net comprises. Most of the initial beyond the capabilities of NCP in DECnet. The work i n distribu ted systems m a nagement con­ cerned itse l f with the aspects that applied to DECnet and the changes needed to provide manage­ management applications that went fa r developers necessarily took a different approach to management. Thus, by the l a te 1980s Digital had developed a ability of DECnet in Phase V The primary u nder­ nu mber of distinct management products. Many of lying concepts were articulated. these employed private protocols, for example • Directors are management programs used by human managers to effect management. Enti ties represent managed components to directors through software referred to as agents 6 • • • NMCC/DECnet monitor, a wide-area DECnet mon­ itoring tool, based on a graphical user interface The entity model is the u nderlying model for ma naged entities defined in terms of a n object­ • NMCC/ETHERnim, an Ethernet monitoring/ inventory test program, based on a graphical based approach. u.� • NCP for ma naging DECnet, based o n a com mand l i n e user i nterface user interface The formal specification for the classes of enti­ ties is defined in terms of Module-2+ l ike specifi­ • RBMS, Remote Bridge Monitoring Software for cations and is cal led management defi nition managing Digital's bridge fami ly, based on a com­ language (MD) ..> mand l ine user i nterface similar to NCP Digiwl Tecbnial/ journal Vol. 5 No. I Winter 1993 1 31 DEC net Open Networking TSM , Terminal • Server Manager for managing col, a l o ng with its own management structure. As Digital's terminal server fa mi ly, based o n a networks became larger, more tha n one network command line user i nterface similar to that used manager was typically needed . in the terminal servers LTM , LAN tratiic monitor for understanding the • traffic usage and patterns of Ethernet segments, based on a graphical user interface Other manufacturers also provided management The opportunity existed to provide complete, i ntegrated network management that could be adapted to the changing needs of management. Our product goals were • face, permitting management of any component software capable of managing their devices. Some in the enterprise to be performed in a sty.le that does not depend o n the specific component vendors provided particular management appl ica­ tions that were not tied to any specific network device. These applications performed a single func­ tion, such as maintaining an inventory of equip­ • To provide i ntegration of the management data (contained in the components as seen by the ment on behalf of a manager. director) and management information (as con­ The plethora of management capabilities from structed by the director using the management many vendors created many choices for end users. data) At the same time, the diverse applications were per­ ceived as carrying significant drawbacks. Each appli­ To provide a consistent, integrated user in ter­ • To provide a consistent, extensible means of cation provided its own user interface. Each had its storing management information and of allow­ own database for storing management information . ing it to be accessed convenie ntly by mul tiple Each dealt with d ifferent management information. independent management appl ications In addition, each tool provided its own, often rudi­ mentary, independent management application. End users viewed these many products as creat­ • To provide an appl ication programming in ter­ face (API) to support management applications ing a series of problems: ( 1 ) A manager needed mul­ Obviously, an approach necessary to solve these tiple management terminals, one per product. non trivial problems was not to be a small u nder­ (2) Separate training was requ ired to use each taking; an architected approach was appropriate 6 product. (3) Confusion occurred when the user switched between mu ltiple products. (4 ) D ifferent information was available from each product, or worse, the same information was available in a d if­ ferent form. (5) There was n o abi lity to share infor­ mation between products. (6) It became difficu lt to diagnose problems that spanned multiple technolo­ gies. Other aspects of the system management per­ spective in 1986 have been described W At that time, standards for network management had not progressed very far; SNMP did not yet exist. I n fact, agreement on the overall concepts had only begun within the OS! management committees. It is with this background, then, that the design of DECmcc as a management director was u ndertaken. opportunities Of all the situations that existed in customer net­ Design Approach The solution to the problems ou t l i ned was seen to be a distributed applications environment, tailored to the specific needs of management. Quite quickly, the idea of defi n ing a modu lar and extensible envi­ ronment was selected. Management capabilities could be added in a straightforward fashion based o n an applications kernel, which could either be replicated as needed around a network, or considered as m ultiple, coop­ erating kernels support i ng a d istributed manage­ ment environment. Hence a kernel with modu les that can be added dynamically, much as applica­ tions are added to a n operating system, is funda­ mental to the design of DECmcc. The next consideration concerned the composi­ tion of the modules themselves. One approach to works in the mid-1980s, probably the most impor­ the support of multiple techno logies had one mod­ tant the real ization that networks no longer ule access each different sort of component to be consisted of equipment from a single vendor. In ma naged . Since a n umber of management applica­ was add ition, different techno logies were commonly tion fu nctions were desirable, one m ight have a used to improve a given customer's network. With module for each such function. Also one might each technology came its own management proto- have a module for each form of user i nterface to 1 32 \1JI. 5 No. I Winter J()')) DigitCll TechnicC�l]ournal Design of the DECmcc Management Director accommodate the d ifferent user inte rface styles, such as operations, attribu tes, notifications, and their command I ine or windowing. Thus, we arrived at the concept of distinguishing form, fu nction, and access. Furthermore, we defined management modu les based on presenta­ tion modu les (PMs) fo r user i nterface, function modu les (FMs) for management fu nctions, and access modu les (AlVIs) fo r accessing each d istinct technology. The DECmcc d irector structure is shown in Figure 1 . We obse rved that the EMA entity model, defined initially to meet the needs of management of enti ties, provided general ized structur i ng con­ cepts that would be appropriate fo r the direc­ tor environment as wel l. Indeed , choosing the same model to handle the needs of the d irector removed the need for a translation between the entity environment and the director enviro nment for EMA enti ties, which has proved to be advanta­ geous for the implementations. Hence the fol low­ ing en tity model concepts were also used in the director. • An object- oriented approach-encapsulating objects (entities) and their operations • l . Class data- the diction ary of all ma nagement A class structure- defi ning a ttribu tes, ope ra­ tions, and events to r each class and specifying management information using a m anagement specification language As we studied the needs for stored management information in the d irector, we identified four d if­ ferent sorts of information, distingu ished by the storage needs, nature of the contents, and the access patterns. related defin itions categorized by class, updated infrequently, but read often 2. Insta nce data-the configuration information, stored i n a global naming service, changing often, but read from many places simul taneously 3. Historical data-i nformation about specific entity instances stored over time, written incre­ men t a l ly and read sporadical ly according to the needs of appl icat ions using such data 4 . Miscellaneous data-other data needed for specific modules, such as tariff information or the defi n ition of ru les specifying alarm conditions The complete logical information store was termed the management information repository (MIR). The kernel defines an execution environment that is su itable for management modu les and sup­ ports the M IR . This was ini tially implemented in terms of technology provided completely withi n t h e director kernel. Many of t h e kernel services, however, were subsequently replaced with dis­ tribu ted systems services, incl uding mul tithread support, naming/directory service, time service, and remote procedure cal .l (RPC). It is, perhaps, interesting to note that the deci­ sion to use a m u l t i threaded approach in DECmcc was not unanimous. The alternate approach pro­ posed an asynchronous message-passing scheme. Although the decision to use a multithreaded envi­ ronment has proved to be implemen table, we did not appreciate how the performance of the mu lt i­ threading implementations wou ld affect the ability to support the needs of application environments such as DECmcc. Invoking Module Services INTERFACE As we looked at how management modu les wou ld cal l each other, we chose a fa irly straightforward approach. User interactions with a PIVI would cause MANAGEMENT KERNEL FUNCTION MODULES the PM to invoke an FM, the FM to then invoke the appropriate Al\1 , and the AJ.Vl to com municate with the desired entity The response would then be transmit ted through the AM , I' M , and PM , with the MANAGEMENT INFORMATION REPOSITORY resu l t presented to the user. Thus the simple proce­ .__"--"-----.1-...I.....J ACCESS MODULES d u re call paradigm between modu les, as shown in Figure 2, supported the needs of appl ications geared toward monitoring and control operations. However, one must consider the increase in the Figure 1 DECmcc Director Structure Digital Tee/mica/ ]ounwl Vol. 5 No. 1 Winter 1993 total number of management modu les over time, 1 33 DECnet Open Networking MANAGEMENT Dl RECTOR MANAGEMENT USERS I I PRESENTATION MODU LES I FUNCTION MODU LES I ACCESS MODULES I I I MANAGED ENTITIES Figure 2 Management il'Iodule Calling Hierarchy and the even greater increase in the total nu mber of available management services (defined by specific operations on classes of entities). Thus, it became clear that the i ntermodulc procedure caJJs could not use named procedures, as administering the names of ever-increasing nu mbers of procedures would be a burden. Instead we chose an approach whereby modu les i nvoked each other's services by referring to the operations and the objects, using a service invocation procedure known as "mcc_call." We defined the interfaces provided by the manage­ ment modu les entirely in terms of operations on objects-an object-oriented approach -but this approach d id not require the use of object-oriented languages or databases. We further observed that one cou ld decompose a management application into a number of smal ler, potentially reusable services. Hence FMs could invoke other FMs in performing their services much in the same way that applications on UNIX systems pipe resu lts from one component to another. Given the general ly extensible nature of DECmcc and the supporting mcc_call structure, this led to the con­ cept of generic applications. Being run- time driven from the class d ictionary, these applications cou ld work over a wide range of managed objects and 1 34 perform the same service for each of them without a priori knowledge of the objects. For example, one might have an FM that prov ides performance­ related services, turning error counters (obtained d irectly from the managed objects) into error rates (by simply pol l i ng for two counter values, subtract­ ing one from the other. and dividing by the time i nterval between pol ls) . A d ifferent FM might pro­ vide alarm services by notifying users of particu lar (user-specifiable) conditions, such as when a par­ ticular counter exceeds a defined threshold . Of course, managers are often more interested in error rates exceeding a given threshold. The same al arms FM could be primed to look tor an error rate; the request wou ld be passed on to the performance FM, which in turn wou l d calcu late the rate by look­ ing at successive p o l ls of the e rror cou nter. The alarms FM does not need to be aware whether the data it needs comes from the performance FM or directly from the managed object via the appropriate A.J\1 . The d isposition of the methods among modu les is b idden by the service invocation mechanism. Furthermore, the alarms FM tracks the number of times a user is notified of a problem, and this counter is available as management data. One might then want to determine the rate of user notifica­ tions (using exactly the same generic performance Fivl as before), and use the same alarms FM to notify a different user when the rate of notifications exceeds a defined threshold. This threshold m ight i nd icate that one manager is being overloaded . Thus, in this scenario we have a number of modules i nvolved in a call ing hierarchy, with the same mod­ ules appearing more than once. Figure 3 sbows the reuse of software using generic fu nction modules in DECmcc. Management Specification Language The entity model's managemen t definition lan­ guage, original ly intended for the specification of management agents, was modified and appl ied to the director environment. Director-oriented information was added to the management specifi­ cation, such as user i nterface tags for au tomatica iJy generated forms and menus. This information was named the management specification lan­ guage (MSL). An MSL compiler was defined to con­ vert MSL to an o n - l ine form, available as metadata through an on-line diction ary, the MIR class data. With the management specification i nformation available to management modules, modules cou ld Vol. 5 No. I Winter I')'J3 Digital Technicaljout·nal Design of the DECmcc Management Director NOTI FI CATI O N � ALARMS FUNCTION MODULE I Get alarm firing rate. PERFORMANCE FUNCTION MODULE I NOTIFICATION � FUNCTION M O D ULE Calculate (error) rate from two successive (error) counter values. Get error counter. ACCESS MODULE Figure 3 Test (error rate) value against threshold; if exceeded, emit notification and increment alarm firing counter. Get error rate. PERFORMANCE FUNCTION MODULE I Calculate (firing) rate from two successive (firing) counter values. Get alarm firing counter. ALARMS I Test (firing rate) value against threshold; if exceeded, emit notification and increment alarm firing counter. Return error counter from entity. Data/Control Flowfor Multiple FMs adapt their behavior as new modules were added; For FMs, we originally envisioned two sorts of this is especia l l y important for generic modules. modules: the generic FM provi d i ng the same func­ Thus the same MSL that was used to help the entity tion over a wide variety of managed objects, and a agent developers was also useful for the manage­ specific FM providing a set of functions for a single ment d irector to d r ive the extensible management class of managed object. Today, we believe one may modules. ' ' have two d i fferent sorts of generic FM : one that is Thi s d ictionary information spurred t h e defini­ specific to a technology (such as network manage­ tion and development of the generic management ment related), and another, truly generic, which is modules. The generic P.Ms provide an extensible completely i ndependent of the technology being user interface that is capable of adapting as new managed (such as an alarms FM). managed objects or applications are added. The For PMs, we recognized the need to hand le generic FMs provide consistent functions over a device-specific aspects as well as user interface broad set of managed objects. Finally, the generic style-specific aspects. Normal ly one would have A.M s support extensible management protocols, generic PMs provide user interface capabi l i ties over allowing the dynamic addition of new sorts of man­ a broad variety of managed objects and appli ca­ aged objects. tions. However, to support the specific needs of The design of the DECmcc director led to a num­ generic FMs, specific PMs might be used to provide ber of possibilities in the type and application of the appropriate user i nterface. PMs that are specific the different sorts of modu les. Initial ly A.Ms were to an FM are less useful since they do not provide a conceived as being one per management protocol, consistent user interface " look and feel." device (such as bridge, terminal server, DECnet ber of smaller, but nonetheless important, design node). Since the advent of standard protocols, such decisions were made. The concept of management which usually translated to one AM per type of During the design of the DECmcc d irector, a num­ as SNMP from the Internet community and CMIP for domains was defined as a general container mecha­ OSl management, A.Ms are now more typically generic and extensible 8.9· 1 2 A single AM covers many nism for entities, w h ich could include domains d ifferent types of device with one protocol. to Digital Technical journal Vol. 5 No. I Winter 1993 themselves. Domains therefore provide a flexible, user-specifiable organizational structure for both 1 35 DECnet Open Networking visual representation at the user interface, as wel l as a means to organize the stored management infor­ mation and associated background processing. 1'' The need to provide a consistent approach to the naming of objects within the director was estab­ l ished. This was i nitially based on D igital's dis­ tributed name service, DECdns, providing globally 3. Management of objects in the telecommu nica­ tions field , such as PBX machines, m ultiplexers, and switches1H 4 . Management of noncompu ter hardware, such as air cond itioners and buildi ng-environment controls u n ique names and network-wide access to those Note that the implementation of these exten­ names 1' Final ly, the concept of time, including the sions generally involves a relatively small invest­ sched u l i ng of operations as wel l as scope of inter­ ment, at which point the power of existing generic est for information retrieval , was included in the appl ications is au tomatical ly provided. For exam­ mcc_call API. The time concept al lows manage­ ple, in the easiest case, a new object that is manage­ ment applications to be developed that can operate able through SNMP need only have its management on historically stored information as easily as they information base (MIB) translated to MSL and loaded can on data retrieved directly from the network. 16 into the DECmcc dictionary, at which point it is A more detailed report on the design of DECmcc has been publ ished . 17 Some other aspects of the DECmcc program, while not part of the technical design , had a major accessible by the existing SNMP A.t\1 as we ll as the standard generic appl ications. In other cases, such as the air conditioning exam­ ple, it is only necessary to code an AM that part to play i n its evolution. First was the need to com mun icates to the air conditioning contro l ler provide publ ished, open definitions of the DECmcc through its private protocol. Fu nctions such as API, based on existing standards. This a llows other alarms, notifications, historical data record ing, and vendors and end users to develop their own man­ graphing are automatically provided by existing FMs agement capabil it ies to add to DECmcc. Second was and PMs upon recognit ion of the new object class. the establishment of a strategic vendor program In complex cases, object-specific FMs are written within Digital to work with other vendors, particu­ to perform such tasks as software installation and larly those that provided network technologies that disk backup control. Yet even in these cases, all complemented D igital's own offerings, to help these them develop to the DECmcc platform. Finally a through the generic PMs. fu nctions are automatically accessible design center program was insti tuted whereby the The potential tor i n terdisciplinary applications design of DECmcc would be validated, as it evolved, is now becoming possible by the normalization of against the needs of some major customers to the interfaces to objects trad itional ly hand led by ensure that i t continued to address the manage­ totally separate appl ica t ions. For example, given ment problems of those customers. Broadening the Scope the extensions described above, it is possible to write an application that activates a n emergency disk backup and switches telephone trunk traffic to Since DECmcc was designed to be able to manage another bui lding if an air conditioning failure anything that could be described by the entity occu rs. In fact, depending on how the various model, and since the entity model is a general objects are defined , it may even be possible to cre­ object-oriented framework, it fol lows that it is feasi­ ate such an application simply by writing a single ble to extend DECmcc to c lasses of managed object al arm rule. and appl ications beyond the traditional network­ oriented view of nodes, hosts, bridges, routers, etc. Evolu tion to Open Systems Some of the new classes of managed objects and With recent industry trends toward open systems new appl ications that we have seen developed environments, as wel l as the real ization that almost using DECmcc include any en terprise now comprises mul tiple hardware 1. Management of applications such as transaction was clear that DECmcc had to evolve to this new 2. Appl ications in traditional system management, only the management of objects existing on various such as user management, disk backup, software platforms, but a lso the execution of the director processors and databases and software platforms from m u ltiple vendors, it world. Among the requirements to be met were not installation , configuration maintenance, and itself on d ifferent hardware and operating system performance monitoring platforms. 1 36 W!l. 5 No. I Winter 19'J3 Digital Technical journal Design of the DECmcc Management Director These requirements d ictated two basic design ing the operating system to support a merged image activation fu nction, a feature of the VMS goals: 1 . Porta bil ity of the director kernel itself to envi­ ronments other than VAX VMS 2. Portab i l i t y of plug-in management modu les to a DEemcc director running on any supported plat­ form, and in particular, source compatibility to the greatest extent possi ble with the consider­ able suite of management modu les that existed when the porting effort started Many of the fundamental requirements for porta­ bility had already been met. All existing manage­ ment modu les were coded to the API defined i n the DECmcc System Reference Manual (SR.M), and the SR.M had I ittle code that was inherently specific to VAX or VMS. 1'> In fact, only the documented SR.NI rou­ tines were used to access DECmcc services, as wel l as many other common operating system services such as data storage and thread control. Conse­ quent ly, the kernel implementation team had the flexibility to implement these services differently on various platforms without impacting manage­ ment module source code. This was particularly implememation. 5. Through the use of various wrapper routines in the DEemcc development toolkit, we were able to al low the m anagement module developer to code entry points to the management modules without distinction to whether they were being run in an image merge or a n independent pro­ cess context. Despite these major cha nges, 85 percent of the ker­ nel code is i n fact platform independent, and we are maintaining a single source pool for DECmcc regard less of the number of platforms. To minimize the operating-system-dependent code we must maimain and to provide backward compatibility, we are also porting to VMS a number of the above technologies such as those built on DeE. At the present time we continue to broaden our open systems focus by additional ports to UNIX System V, OpenVMS on Alpha AXP, OSF!l on Alpha AXP, as well as other operating systems. true with the al l-important mcc_call service, Implementation which provided the API for i ntermodule com muni­ I n late 1990 and early 1991 , D igital delivered the cation i n a platform-independem context such that first two versions of DECmcc. Version 1 .0 was writ­ a wide variety of i merprocess or intra process com­ ten to al low other vendors to start building their munications mechanisms cou ld be chosen for the management modules; version 1 . 1 added some u nderlying implementation. components for network managers. Both releases In the ini tial porting effort, which was from VAX VMS to ruse (reduced instruction set computer) a nd VA,'< ULTRlX, some of the more important changes i n underlying implementations were ran on VAX VMS systems, either workstations or hosts. In the midd le of 1992, Digital released version 1 .2 of DEemcc, wh ich added significant capabilities 1 . The MIR was implemented over the ndbm hash database manager. An earl ier version of the MIR. was also implemented over ULTRIX SQL, which provided some large-capacity database features at the expense of significant performance. 2. The operating system time i nterfaces were migrated to the d istributed time service of the Open Software Fou ndation distributed comput­ ing environment (OSF DCE). 3. The multithreading services were migrated to the DEeth reads comp o nent of the DCE. and runs on ruse ULTRIX. Later in 1992, D igital del iv­ ered POLYCENTER SNA Manager. I n conjunction with DECmcc and the SOLVE: Connect for EMA, a product from System Center, Inc., it al lows bid irec­ t ional management between IBM SNA hosts and DEemcc systems. 2o In early 1993, D igital released version 1 . 3 of DEemcc u nder the new product family name of POLYCENTER, with the POLYeENTER Framework, which is the basis for POLYCENTER Network Manager 200 and POLYeENTER Network Manager 400. This new version adds ways to provide simpler, yet powerful, integrat i o n of management capab i l i­ 4. The intermodule communication mechanisms ties; uses an OSF/Motif graphical user i nterface; a.1d (mcc_call) were implemented using R.PC tech­ provides additional development tools. These v r­ nology, with management modules running sions contain the DECmcc kerne l , a correspo ndiug as independent R.Pe server processes. This developer's toolkit, and a series of management allowed run-time extensibil ity without requir- modules, which are outl ined in Ta ble 1 . The SR.M D igital Tecb11ica l ]ounzal Vol. 5 No. I Winter 199.3 1 37 DECnet Open Networking Table 1 DECmcc Director M a nagement Modules Presentation M o d u l es Forms and Command Line PM Def i n itions Provides a command line user interface based on the NCL defi nition, together with a full-screen mode for video terminal devices. This PM also executes DECmcc command scripts. Iconic Map PM Provides an iconographic display based on OSF/Motif. It supports all the capabilities of the command li ne, but with a more usable graphical representation of the network and p u l l-down menu support. This P M also provides on-line g raph ing of management i nformation. In ad d ition, this PM can launch management applications that are not strictly part of the DECmcc environment, to provide a visual integrat ion for the manager. Notification PM Provides an interactive management d isplay of event or alarm firing conditions based on OSF/Motif. Flexible fi ltering of i nformation i s used to m i n i mize the i nformation di splayed to the manager, but the manager can search for and d i splay i nformation using various criteria such as severity level, managed object, and data and ti me. Function Modu les Registration FM Definit i o ns Provides a means for reg istering entities with the director and for maintaining reference i nformation on behalf of the entities. Domain FM Maintains the def i n itions of the various management domains, their membersh i p, and their relationships. H istorian FM Enables the capture and storage of user-specified management attributes from any entity in the network. Retrieval of the stored information by management mod u l es is provided d i rectly by the mcc_cal l API. Exporter FM Allows extraction of user-specified on-line o r stored management i nformation i n to a relational database for processing by SOL-based i nformation management tools, such as reports. Alarms FM Permits managers to specify, through rules, the set of cond itions about the network i n which they are i nterested. When the alarms FM detects a condition (the rule fi res), various notification techniques may be employed. Th ese include invoking a command script, se n d i n g ma i l , c a l l i ng a manager using an electronic beeper, or modifying an icon on the icon ic map d i splay. Perfo rmance Analyzer FM Calcu lates statistics for DEC net, transmission control protocol/internet protocol {TCP/I P), and LAN bridges, based on error and traff ic uti l i zation or other information. Diagnostic Assistant FM Helps the manager diagnose faults in a TCP/I P network, based on some of the more frequently occurring TCP/I P network problems. Autoconfiguration FMs Determ ine automatically the configuration and topology of specific portions of the network. I ncluded are FMs to determine the configu ration and topology of DECnet Phase IV networks, IP subnetworks, fiber distributed data interface (FDDI) ring maps, and LAN bridge span nin g trees. Access Modu les SN M P AM Definitions Provides access to obj ects that implement the SNMP protocol. It is a generic AM in t h e sense that it can adapt to new object def i n itions using information i n the DECmcc d i ctiona ry. New MIB definitions are provided in a standard form and translated by a M I B translation utility into the DECmcc d ictiona ry. DECnet Phase IV AM Provides access to the DEC net Phase IV i m plementations, be they hosts or servers such as routers. T h is AM i mplements the network i nformation and control exchange (NICE) protocol. DECnet/OSI Phase V AM Provides access to the DECnet/OSI Phase V i mpleme ntations, hosts, and servers. It i m plements the C M I P protocol used in Phase V. 1 38 Vol. 5 No. I Winter 19'J3 Digital Teclmicaljournal Design of the DECmcc Management Director Table 1 DECmcc Di rector M a nagement Modules (continued) Access Modules Definitions Bridge AM Supports D i gital's family of LAN bridges, i ncluding the LANbridge 1 00, LANbridge 1 50 and LANbridge 200, and the DECbridge family. It implements the RBMS protocol, which is used by the original manage­ ment product of the same name. F D D I AM Supports D i g ita l 's F D D I DECconce ntrator products and other devices that Termi nal Server AM Supports Dig ital's fam i l y of terminal servers, implementing management support the standard station management p rotocol (SMl). through the mai ntenance operations protocol (MOP). Ethernet Station AM Supports al l Ethernet and I EEE 802.3 stations that implement eith er, or Circuit AM Uses the services of other AMs to provide management of the network both, the Dig ital MOP protocol or the I EEE 802.2 XID and T EST messages. circuits that connect systems together, based on DEC net nodes, TCP/IP hosts, o r network management forum definitions. Such circuits might be si mple point-to- point or could represe nt complex multichannel circuits. Permit bidirectional management of t h e SNA environment and the DECmcc SNA AM and Agent PM management environment through a component that resides on an SNA host (either IBM's NetView or System Ce nter's Advanced System Management). Data Col lector AM Provides a means to allow other software, such as applications, to send events into DECmcc so they may be processed and analyzed along with events from devices or appl i cations that have access modules. Script AM Al lows invocation of existi ng or custom shell scri pts or command procedu res from DECmcc, and information to be returned from the scripts into DECmcc for processing and analysis by other modu les. provided the API definitions for management mod­ • u les, as provided by the kernel. Figure 4 shows a sample screen from DECmcc being used to manage a portion of a network. • • DECmcc can therefore be tailored to include the set of modules appropriate for managing the enviro n­ ment in which it is situated. In add ition, modules from other vendors can be integrated by the cus­ new management modules are added, the powerful generic capabil ities of DECmcc a l low many existing functions to be used without change. When an AM is added for a new class of resource, or when a n existing generic AM is enhanced by adding new supporting definitions i n • Make the resources known to a l l DECmcc direc­ tors in the network Digital Technical journal Vol. 5 No. I Winter 1993 in these • Display event information from these resources • Create alarm rules that can be triggered on par­ ticular conditions (polle d or u nsolicited) about these resources • • Have the relevant icons change color when the alarms fire Store, periodically, management data or infor­ mation about these resources i n the DECmcc historical data store, or export the information to a rel ational database fol lowing functions. Identify specific resource instances u niquely attributes Apply management actions to these resources the d ictionary, one can i m mediately perform the • management • tomer without involvement from D igital . As Modify resources convenient to package d ifferent modules together, providing for a flexible packaging scheme. Each Examine management attribu tes from these resources Since the DECmcc kernel is indifferent to the spe­ cific type of any management module, i t is quite Represent the resources on a n iconic display i n o n e o r more m anagement domains • • View the stored historical data Process the relational data using standard infor­ mation m a nagement tools, for example, to pro­ vide management reports 1 39 DECnet Open Networking POL V CENTER Graph N o d e 4 BILFSH User bytes received B y t e s �1� I l lJ I I I/I t o lll , . -• 34 : 4 1 35:59 36:59 3 7 : 5� 38:59 39:59 40:59 4 1 : 59 42:59 4 4 : 00 4 4 : 5� Time Minutes : Seconds 14:44 :59 User bytes sent y t e s soo 450 400 350 300 250 200 150 100 5� . . .. .. . .. . .. •J � , � �'� � ' � n:� � ' � u : � � , � �:oo � : oo «:oo « : � Time Minutes : Seconds r r Figure 4 Characte risti c s I n itial attr i b utes 14:44 :59 r Stati sti c s Screen Display of DECmcc Version 1.3 Future Work ronment management, telecommunications man­ Of course, work on a major software system such as agement, and so on. Commensurate with each of the DECmcc director is never complete. There are these general areas are technology-specific appl ica­ many areas of opportunity for additional develop­ ment. For example, DECmcc can be ported to other tions. In addition, further technology- independent generic applications can be developed. A recent industry platforms (both hardware and software). paper describes how DECmcc can be considered New objects can be managed, not only in network as a distributed appl ication and some additional management but a lso in system management, work to make use of the DECmcc concepts i n a application management, data management, envi- distributed environment.21 140 Vol. 5 No. J Winter 1993 Digital Technical Journal Design of tbe DECmcc J'.llml agement Director DECmcc is not the only management director 4. in the industry. Thus interoperability between DIVA (Phase V) Com mon Management Info r­ mation Protocol Functional Spectfication DECmcc and other management systems is another ( Maynard, MA: D igital Equipment Corpora­ area of opportunity. DECmcc already has links to other management systems, not the least being to tion, Order No. EK-DNAOl-FS-00 1 , July 1991 ) . 5. manage IBM SNA systems. Recent advances in object-oriented technology DNA (Phase V) Network Control Language Functional Specification (Maynard, MA: can be incorporated to enhance the object orienta­ Digital Equipment Corporation , Order No. tion of DECmcc. EK-DNA05-FS-00 1 , July 1991 ) . Final ly, new standard industry management pro­ tocols, new ma naged objects, and management 6. L. Febskens, "An Architectural St rategy for framework innovations are always becoming avail­ Enterprise Management," IFJP Proceedings of able. DECmcc w i l l be ta king a l l of these evolu tions the first Symposium on Integrated Network in its stride. The d istributed management environ­ iVJanagement (May 1989): 41-60. ment (DME), stil l under development by OSF, promises to bring yet more technology to which 7. DECmcc wi l l adapt readi ly. M. Sylor, " G u idelines for Structuring Manage­ able Emit ies," IFIP Proceedings of the First Symposium on Integrated Network Manage­ ment (May 1989): 169-183. Summary This paper has explained aspects of the design of DECmcc in the context of the state of the ind ustry at 8. Technology: Interconnection: the time. DECmcc has been a large undertaking, but Common Open Systems Management Information Service Definition, !SO/IEC 9595 we have been able to build and ship significant, con­ (Geneva: sistent, integrated, and yet extensible, management International Organization for Standardization/I nternational Electrotechni­ capabil i ties covering a broad range of managed cal Commission, 1990). objects. The ability for DECmcc to adapt to the changing management environments underscores Information 9. Information Technology: Open Systems the benefit of adopting an architected approach to Interconnection: implementation. information Protocol Specification, Part 1 , Common 1l1anagement ISO/JEC 9596-1 (Geneva: International Organi­ zation for Standardization/International Elec­ Acknawledgments trotechnical Com mission, 1990). The au thors would l ike to acknowledge the work of the many people in the groups, past and present, respo nsible for bringing the ideas presented in this 10. tion paper into practical real ity in the DECmcc product 11. References D. Shurtleff and C . StrLitt, " Extensibility o f an M. Malek, and M. Wal l (eds.) (New York: Entity Mode l ," JEEE Networks (March 1988): M. Sylor, F. Dola n , and D. Shurtleff, " Network Management," Digital Technical journal, Plenum Press, 1990): 129-141 . 12. Entity Model (Maynard, JYIA: Corporation, Order Digital No. PV7KA-TE, January 1993). D-igital Tecbn'ical]ournal l'bl. 5 No. I A A­ ]. Case, M . Fedor, M. Schoffstal l , and ]. Davin, "A Simple Networl' Management Protocol (SNMP)," RFC 1157 (May 1990). vol . 5, no. 1 ( Winter 1993, this issue): 1 17-129. Equipment Products," 1 , no. 3 Enterprise Management Director," Network M . Sylor, " Managing DECnet Phase Y: The EMA vol . Management and Control, A. Kershenbaum, 30-36. 3. Management (September 1986): 117-128. reviewers were very helpful. 2. of Network Digital Technical journal, set. Also, the detailed com ments of two anonymous I. N. La Pel le, M. Seger, and M. Sylor, "The Evolu­ 13. G. Stone, " In tegrated Management Technolo­ gies," AT&T UNIX Systems Management Symposium, Spring 199 1 . Winter 1993 141 DEC net Open Networking 14. C. Stru t t, "Deal ing with Scale in a n Enterprise 18. Symposium on Integrated 19. umes Network Managem ent Electronics ( M aynard, MA: Digital Order No. Equipmen t AA-PD5 LC-TE, A A­ PE55C-TE, Ap ril 1992) A. Shvartsman, "An Historical Object Base i n an Enterprise Management D irector," IFIP Network DECmcc System Reference Manual, 2 vol­ Corporation, Proceedings of the Thi-rd Symposium on Program," Engineers, 1992): 102-1 1 1 . S. Marti n , ). McCann, and D. Oran, " Develop­ Integrated Management The Institute of Electrical and 1989): 9-15. 20. ]. Fernandez and K. Winkler, " Model ing SNA Networks using the Structure of Management (April Information," 1993): 123-134 IEEE Commu nications ( M ay 1993) . C. Strutt ancl D. Shurt leff, "Architecture fo r an Integrated, 142 Telecom m u nications Operations and Management (New Yo rk : Second ment of the VAX D istribu ted Name Service," 17 " D igital 's the Digital Technical journal, vol. 1 , no. 9 (June 16. Borden, Network Network Management (April 1991 ) : 577-593. 15. ). Management Director," IFJP Proceedings of Extensible En terprise M anage­ 21. C . Stru t t , " D istribution i n an Enterprise Man­ ment Director," IFJP Proceedings of the First agement D irector," JFJP Proceedings of the Symposium on Jntegr·ated Network Manage­ Third s:vmposium on Integrated Network ment ( May 1989): 61-72. Management (April 199 3): 2 2 3 -234. Vol. 5 No. 1 Winter 1993 Digital Technica.t]ournal I Recent Digital US. Patents Thefollowing patents were recently issued to Digital Equipment Cmporation. Titles and names supplied to us by the US. Pa tent and Trademark Office are reproduced exactly as they appear on the original published patent. 5, 117, 352 5, ll 9,043 L. H . Falek Mechanism for Fail-Over Notification R. W Brown, M. D. Leis, Auto-Centered Phase-Locked Loop and E. C. Simmons 5, l l9,402 S. A. Ginzburg and ]. M. Rieger Method and Apparatus for Transmission of Local Area 5, 119,465 M. L. jack and R. T. Gumbel System for Selectively Converting Plurality of Source Data Network Signals over Unshielded Twisted Pairs Structures through Corresponding Source Intermediate Structures, and Target Intermediate Structures into Selected Target Structure 5, 1 19, 483 5, 1 19,484 W C. Madden, D. E. Sanders, Application of State Silos for Recovery fro m Memory G. M. Uhler, and W R. Wheeler Management Exceptions T. f Fox Selections between Alternate Control Word and Current Instruction Generated Control Word for ALU in Respond to ALU Output and Current Instruction 5,120,603 Magneto-Optic Recording Medium with Oriented Langmuir­ P H. Schmidt Blodgett Protect ive Layer 5, 1 2 1 ,085 R. W Brown Dual-Charge-Pump Bandwidth-Switched Phase-Locked-Loop 5, 121,260 G. ). Asakawa, R. Y Noguchi, Read Channel Optimization System and ). Rinaldis 5, 121 ,382 5, 123,091 H. S. Yang, M. W Carrafiel lo, Station- to-Station Full D uplex Communication in W Hawe, and R. W Graham a Commu nications Network Data Processing System and Method for Packetizing Data B. E. Newman from Peripherals. 5, 123,306 N. S. Saunders and D. ). Moretti Pin Pulling Tool 5, 125,083 D. B. Fite, T. Fossum, Method and Apparatus for Resolving a Variable Number 5, 125,086 R. C. Hetherington, of Potential Memory Access Conflicts in a Pipe! ined ). E. Murray, Jr., and D. A. Webb Computer System F. L. Perazzol i , Jr. Virtual Memory Paging Apparatus with Variable Size In-Page Clusters 5, 126,964 ]. H . Zurawski High Performance Bit-Sl iced Multipl ier C ircuit 5, 127,006 K. Subramanian and Fault D iagnostic System M. A. Bil lmers 5, 136,700 C. P Thacker 5, 150, 197 W R. Hamburgen Die Attach Structure and Method 5, 150,360 R. ). Perlman, W R. Hawe, and Utilization of Redundant Links in Bridges Networks Apparatus and Method for Reducing In terference in Two -Level Cache Memories A. G. Lauck 5, 161 , 19 3 B. T. Lampson, W R. Hawe, Pipelined Cryptography Processor and Method for its Use in A. Gupta, and B. A. Spinney Communication Networks 5, 179, 577 N. Ilyadis Dynamic Threshold Data Receiver for Local Area Networks 5, 185,537 T. Creedon, ]. Nolan, Gate Efficient Digital Gl itch Filter fo r Multiple and E . O' Neill Input Applications 5, 193, 151 R. )ain Delay-Based Congestion Avo idance in Computer Networks 5, 195, 181 S. Bryant and M. Seaman Message Processing System Having Separate Message Receiving and Transmitting Processors with Message P>ocess­ ing Being Distributed Between the Separate Processors Digital Techrlical journal Vol. 5 No. I Winter 1993 143 I Referees, April 1992 to December 1992 The editors acknowledge and thank the referees who have par­ ticipated in a peer review of the papers submittedfor publication in the D igital Technical )ournal. The referees ' detailed reports bcwe helped ensure that papers published in the journal offer relevant and in(onnative discus­ sions of compu ter technologies and products. The referees are computer science and engineer­ ing professionalsfrom academia and industry, including Digital:s consulting engineers. John Hauser, Un iversity of California Bil l Herrick, Digital Hai Huang, D igital Raj Ja in, D igital Ashok Joshi , D igital Alberto Leon-Garcia, University of Toronto Jeff Kalb, Maspar Computer Corporation Kim Kappel, Georgia Institute of Technology Paul K.inzelman, D igital Jam�s Kirkley, Digital Jeffery Kusk i n , Sta nford U niversity Paul Kyzivat, D igital M ike Leary, D igital Ian Lesl ie, U niversity of Cambridge Tom Levergood, Digital David Lomet , D igital Frank McCabe, D igital Ananr Agarwal, Massachusetts Institute of Technology joh n McDermott, Digital Brian Allison, D igital Pau l McJones, D igital Paul Beck, D igital Lisa Bender, Digital Will iam M ichalson , Worcester Polytechnic Insti tute Brian Bershad, Carnegie-Mel lon University Peter Mierswa, D igital D i leep Bha ndarkar, D igi tal Charles M i tche l l , Digital Meyer Bi l lmers, D igital David Mitton, Digital Verel l Boaen, D igital Fanya Montalvo, D igital Scott Bradner, Harvard University J Eliot Moss, University of Massachusetts Bevin B rett, D igital Trevor M udge , University of M ichigan Preston Briggs, Rice University B i l l Noyce, D igital Dean Brock, U niversity of North Caro lina Dave Patterson, U n iversity of Cal ifornia M ark R . Brow n , Digital Larry Peters o n , University of Arizona Randal E . Brya nt, Carnegie-Mel lon Un iversity David Piscitel lo, Bel lcore Lyman Chapi n , Bolt, Beranek and Newman George Polyzos, U niversity of Cal fornia john DiMarco, U niversity of Toronto Brian Porter, D igital James D u ckworth, \Vorcester Polytechnic I nstitute James .J, Quinn, D igital Hugh Dut·da n , D igital Farshad Rafii, Babson Co llege P h i l ip Enslow, Georgia I nstitute of Technology Hemant Rotitbor, Worcester Polytechnic Institute Deborah Estr i n , U n iversity of Sou thern Cal i fornia Pau l Rubinfeld, Digital Len Fehskens, Digital Peter Savage, Digital David Fenwick, D igital Michael Schroeder, D igital David Fite, Digital Wil l Sherwoo d , D igital john Forecast, Digital Robert Simcoe, D igital Tryggve Fossum, Digital Richard Sites, Digital M ark S. Fox, University of Toronto Ri chard Stockdale, Digital Rodney Gamach e , D igital David Stone, Digital Rick Gil lett, D igital joseph Tardo, D igital M ichael Greenwald, Stanford University Bob Tay lor, D igital Stephen Greenwood, Digital M i ke Uhler, D igital James Groch mal , Digital _lake VanNoy, D igital Robert Hagens, Un iversity of Wisconsin Wol f-Dietrich Weber, Stanford Un iversity AJf Hansen, Sintef Kathrin Wi nkler, D igital Steve Hardcastle-Ki l l e , Isode 1 44 vb/. 5 No. I Wi11ter 1993 Digital Tecfmicaljournal �amaomaTM ISSN 0898-901X Printed in U.S.A. EY-M770E-DP/93 0 5 02 1 8 . 0 Copyright © Digital Equipment Corporation. All Rights Reserved.


Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26
Create Date                     : 2006:04:14 07:43:06+01:00
Creator Tool                    : Adobe Acrobat 7.05
Modify Date                     : 2013:01:11 01:55:23Z
Metadata Date                   : 2013:01:11 01:55:23Z
Producer                        : Adobe Acrobat 10.1.4 Paper Capture Plug-in with ClearScan
Format                          : application/pdf
Title                           : Digital Technical Journal, Volume 5, Number 1: DECnet Open Networking
Creator                         : 
Document ID                     : uuid:f8230c5e-18ec-46dc-87b5-66d2d46bb9b2
Instance ID                     : uuid:12bae078-990a-463e-8747-2f88c4066bcf
Page Layout                     : SinglePage
Page Mode                       : UseOutlines
Page Count                      : 147
EXIF Metadata provided by EXIF.tools

Navigation menu