`Request for Comments: 2063 The University of Auckland
`Category: Experimental C. Mills
` BBN Systems and Technologies
` G. Ruth
` GTE Laboratories, Inc.
` January 1997
`
` Traffic Flow Measurement: Architecture
`
`Status of this Memo
`
` This memo defines an Experimental Protocol for the Internet
` community. This memo does not specify an Internet standard of any
` kind. Discussion and suggestions for improvement are requested.
` Distribution of this memo is unlimited.
`
`Abstract
`
` This document describes an architecture for the measurement and
` reporting of network traffic flows, discusses how this relates to an
` overall network traffic flow architecture, and describes how it can
` be used within the Internet. It is intended to provide a starting
` point for the Realtime Traffic Flow Measurement Working Group.
`
`Table of Contents
`
` 1 Statement of Purpose and Scope 2
` 2 Traffic Flow Measurement Architecture 4
` 2.1 Meters and Traffic Flows . . . . . . . . . . . . . . . . . . 4
` 2.2 Interaction Between METER and METER READER . . . . . . . . . 6
` 2.3 Interaction Between MANAGER and METER . . . . . . . . . . . 6
` 2.4 Interaction Between MANAGER and METER READER . . . . . . . . 7
` 2.5 Multiple METERs or METER READERs . . . . . . . . . . . . . . 7
` 2.6 Interaction Between MANAGERs (MANAGER - MANAGER) . . . . . . 8
` 2.7 METER READERs and APPLICATIONs . . . . . . . . . . . . . . . 8
` 3 Traffic Flows and Reporting Granularity 9
` 3.1 Flows and their Attributes . . . . . . . . . . . . . . . . . 9
` 3.2 Granularity of Flow Measurements . . . . . . . . . . . . . . 11
` 3.3 Rolling Counters, Timestamps, Report-in-One-Bucket-Only . . 13
` 4 Meters 15
` 4.1 Meter Structure . . . . . . . . . . . . . . . . . . . . . . 15
` 4.2 Flow Table . . . . . . . . . . . . . . . . . . . . . . . . . 17
` 4.3 Packet Handling, Packet Matching . . . . . . . . . . . . . . 17
` 4.4 Rules and Rule Sets . . . . . . . . . . . . . . . . . . . . 21
` 4.5 Maintaining the Flow Table . . . . . . . . . . . . . . . . . 24
` 4.6 Handling Increasing Traffic Levels . . . . . . . . . . . . . 25
`
`Brownlee, et. al. Experimental [Page 1]
`
`Ericsson Exhibit 1021
`Page 1
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` 5 Meter Readers 26
` 5.1 Identifying Flows in Flow Records . . . . . . . . . . . . . 26
` 5.2 Usage Records, Flow Data Files . . . . . . . . . . . . . . . 27
` 5.3 Meter to Meter Reader: Usage Record Transmission. . . . . . 27
` 6 Managers 28
` 6.1 Between Manager and Meter: Control Functions . . . . . . . 28
` 6.2 Between Manager and Meter Reader: Control Functions . . . 29
` 6.3 Exception Conditions . . . . . . . . . . . . . . . . . . . . 31
` 6.4 Standard Rule Sets . . . . . . . . . . . . . . . . . . . . 32
` 7 APPENDICES 33
` 7.1 Appendix A: Network Characterisation . . . . . . . . . . . . 33
` 7.2 Appendix B: Recommended Traffic Flow Measurement Capabilities 34
` 7.3 Appendix C: List of Defined Flow Attributes . . . . . . . . 35
` 7.4 Appendix D: List of Meter Control Variables . . . . . . . . 36
` 8 Acknowledgments 36
` 9 References 37
`10 Security Considerations 37
`11 Authors’ Addresses 37
`
`1 Statement of Purpose and Scope
`
` This document describes an architecture for traffic flow measurement
` and reporting for data networks which has the following
` characteristics:
`
` - The traffic flow model can be consistently applied to any
` protocol/application at any network layer (e.g. network,
` transport, application layers).
`
` - Traffic flow attributes are defined in such a way that they are
` valid for multiple networking protocol stacks, and that traffic
` flow measurement implementations are useful in MULTI-PROTOCOL
` environments.
`
` - Users may specify their traffic flow measurement requirements
` in a simple manner, allowing them to collect the flow data they
` need while ignoring other traffic.
`
` - The data reduction effort to produce requested traffic flow
` information is placed as near as possible to the network
` measurement point. This reduces the volume of data to be
` obtained (and transmitted across the network for storage),
` and minimises the amount of processing required in traffic
` flow analysis applications.
`
`Brownlee, et. al. Experimental [Page 2]
`
`Ericsson Exhibit 1021
`Page 2
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` The architecture specifies common metrics for measuring traffic
` flows. By using the same metrics, traffic flow data can be exchanged
` and compared across multiple platforms. Such data is useful for:
`
` - Understanding the behaviour of existing networks,
`
` - Planning for network development and expansion,
`
` - Quantification of network performance,
`
` - Verifying the quality of network service, and
`
` - Attribution of network usage to users.
`
` The traffic flow measurement architecture is deliberately structured
` so that specific protocol implementations may extend coverage to
` multi-protocol environments and to other protocol layers, such as
` usage measurement for application-level services. Use of the same
` model for both network- and application-level measurement may
` simplify the development of generic analysis applications which
` process and/or correlate any or all levels of traffic and usage
` information. Within this docuemt the term ’usage data’ is used as a
` generic term for the data obtained using the traffic flow measurement
` architecture.
`
` This document is not a protocol specification. It specifies and
` structures the information that a traffic flow measurement system
` needs to collect, describes requirements that such a system must
` meet, and outlines tradeoffs which may be made by an implementor.
`
` For performance reasons, it may be desirable to use traffic
` information gathered through traffic flow measurement in lieu of
` network statistics obtained in other ways. Although the
` quantification of network performance is not the primary purpose of
` this architecture, the measured traffic flow data may be used as an
` indication of network performance.
`
` A cost recovery structure decides "who pays for what." The major
` issue here is how to construct a tariff (who gets billed, how much,
` for which things, based on what information, etc). Tariff issues
` include fairness, predictability (how well can subscribers forecast
` their network charges), practicality (of gathering the data and
` administering the tariff), incentives (e.g. encouraging off-peak
` use), and cost recovery goals (100% recovery, subsidisation, profit
` making). Issues such as these are not covered here.
`
` Background information explaining why this approach was selected is
` provided by ’Traffic Flow Measurement: Background’ RFC [1].
`
`Brownlee, et. al. Experimental [Page 3]
`
`Ericsson Exhibit 1021
`Page 3
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
`2 Traffic Flow Measurement Architecture
`
` A traffic flow measurement system is used by network Operations
` personnel for managing and developing a network. It provides a tool
` for measuring and understanding the network’s traffic flows. This
` information is useful for many purposes, as mentioned in section 1
` (above).
`
` The following sections outline a model for traffic flow measurement,
` which draws from working drafts of the OSI accounting model [2].
` Future extensions are anticipated as the model is refined to address
` additional protocol layers.
`
`2.1 Meters and Traffic Flows
`
` At the heart of the traffic measurement model are network entities
` called traffic METERS. Meters count certain attributes (such as
` numbers of packets and bytes) and classify them as belonging to
` ACCOUNTABLE ENTITIES using other attributes (such as source and
` destination addresses). An accountable entity is someone who (or
` something which) is responsible for some activitiy on the network.
` It may be a user, a host system, a network, a group of networks, etc,
` depending on the granularity specified by the meter’s configuration.
`
` We assume that routers or traffic monitors throughout a network are
` instrumented with meters to measure traffic. Issues surrounding the
` choice of meter placement are discussed in the ’Traffic Flow
` Measurement: Background’ RFC [1]. An important aspect of meters is
` that they provide a way of succinctly aggregating entity usage
` information.
`
` For the purpose of traffic flow measurement we define the concept of
` a TRAFFIC FLOW, which is an artificial logical equivalent to a call
` or connection. A flow is a portion of traffic, delimited by a start
` and stop time, that was generated by a particular accountable entity.
` Attribute values (source/destination addresses, packet counts, byte
` counts, etc.) associated with a flow are aggregate quantities
` reflecting events which take place in the DURATION between the start
` and stop times. The start time of a flow is fixed for a given flow;
` the end time may increase with the age of the flow.
`
` For connectionless network protocols such as IP there is by
` definition no way to tell whether a packet with a particular
` source/destination combination is part of a stream of packets or not
` - each packet is completely independent. A traffic meter has, as
` part of its configuration, a set of ’rules’ which specify the flows
` of interest, in terms of the values of their attributes. It derives
` attribute values from each observed packet, and uses these to decide
`
`Brownlee, et. al. Experimental [Page 4]
`
`Ericsson Exhibit 1021
`Page 4
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` which flow they belong to. Classifying packets into ’flows’ in this
` way provides an economical and practical way to measure network
` traffic and ascribe it to accountable entities.
`
` Usage information which is not deriveable from traffic flows may also
` be of interest. For example, an application may wish to record
` accesses to various different information resources or a host may
` wish to record the username (subscriber id) for a particular network
` session. Provision is made in the traffic flow architecture to do
` this. In the future the measurement model will be extended to gather
` such information from applications and hosts so as to provide values
` for higher-layer flow attributes.
`
` As well as FLOWS and METERS, the traffic flow measurement model
` includes MANAGERS, METER READERS and ANALYSIS APPLICAIONS, which are
` explained in following sections. The relationships between them are
` shown by the diagram below. Numbers on the diagram refer to sections
` in this document.
`
` MANAGER
` / \
` 2.3 / \ 2.4
` / \
` / \ ANALYSIS
` METER <-----> METER READER <-----> APPLICATION
` 2.2 2.7
`
` - MANAGER: A traffic measurement manager is an application which
` configures ’meter’ entities and controls ’meter reader’ entities.
` It uses the data requirements of analysis applications to determine
` the appropriate configurations for each meter, and the proper
` operation of each meter reader. It may well be convenient to
` combine the functions of meter reader and manager within a single
` network entity.
`
` - METER: Meters are placed at measurement points determined by
` network Operations personnel. Each meter selectively records
` network activity as directed by its configuration settings. It can
` also aggregate, transform and further process the recorded activity
` before the data is stored. The processed and stored results are
` called the ’usage data.’
`
` - METER READER: A meter reader reliably transports usage data from
` meters so that it is available to analysis applications.
`
`Brownlee, et. al. Experimental [Page 5]
`
`Ericsson Exhibit 1021
`Page 5
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` - ANALYSIS APPLICATION: An analysis application processes the usage
` data so as to provide information and reports which are useful for
` network engineering and management purposes. Examples include:
`
` - TRAFFIC FLOW MATRICES, showing the total flow rates for
` many of the possible paths within an internet.
`
` - FLOW RATE FREQUENCY DISTRIBUTIONS, indicating how flow
` rates vary with time.
`
` - USAGE DATA showing the total traffic volumes sent and
` received by particular hosts.
`
` The operation of the traffic measurement system as a whole is best
` understood by considering the interactions between its components.
` These are described in the following sections.
`
`2.2 Interaction Between METER and METER READER
`
` The information which travels along this path is the usage data
` itself. A meter holds usage data in an array of flow data records
` known as the FLOW TABLE. A meter reader may collect the data in any
` suitable manner. For example it might upload a copy of the whole
` flow table using a file transfer protocol, or read the records in the
` current flow set one at a time using a suitable data transfer
` protocol. Note that the meter reader need not read complete flow
` data records, a subset of their attribute values may well be
` sufficient.
`
` A meter reader may collect usage data from one or more meters. Data
` may be collected from the meters at any time. There is no
` requirement for collections to be synchronized in any way.
`
`2.3 Interaction Between MANAGER and METER
`
` A manager is responsible for configuring and controlling one or more
` meters. At the time of writing a meter can only be controlled by a
` single manager; in the future this restriction may be relaxed. Each
` meter’s configuration includes information such as:
`
` - Flow specifications, e.g. which traffic flows are to be measured,
` how they are to be aggregated, and any data the meter is required
` to compute for each flow being measured.
`
` - Meter control parameters, e.g. the maximum size of its flow table,
` the ’inactivity’ time for flows (if no packets belonging to a flow
` are seen for this time the flow is considered to have ended, i.e.
` to have become idle).
`
`Brownlee, et. al. Experimental [Page 6]
`
`Ericsson Exhibit 1021
`Page 6
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` - Sampling rate. Normally every packet will be observed. It may
` sometimes be necessary to use sampling techniques to observe only
` some of the packets. (Sampling algorithms are not prescribed by
` the architecture; it should be noted that before using sampling one
` should verify the statistical validity of the algorithm used).
` Current experience with the measurement architecture shows that a
` carefully-designed and implemented meter compresses the data such
` that in normal LANs and WANs of today sampling is really not
` needed.
`
`2.4 Interaction Between MANAGER and METER READER
`
` A manager is responsible for configuring and controlling one or more
` meter readers. A meter reader may only be controlled by a single
` manager. A meter reader needs to know at least the following for
` every meter is is collecting usage data from:
`
` - The meter’s unique identity, i.e. its network name or address.
`
` - How often usage data is to be collected from the meter.
`
` - Which flow records are to be collected (e.g. all active flows, the
` whole flow table, flows seen since a given time, etc.).
`
` - Which attribute values are to be collected for the required flow
` records (e.g. all attributes, or a small subset of them)
`
` Since redundant reporting may be used in order to increase the
` reliability of usage data, exchanges among multiple entities must be
` considered as well. These are discussed below.
`
`2.5 Multiple METERs or METER READERs
`
` -- METER READER A --
` / | \
` / | \
` =====METER 1 METER 2=====METER 3 METER 4=====
` \ | /
` \ | /
` -- METER READER B --
`
` Several uniquely identified meters may report to one or more meter
` readers. The diagram above gives an example of how multiple meters
` and meter readers could be used.
`
`Brownlee, et. al. Experimental [Page 7]
`
`Ericsson Exhibit 1021
`Page 7
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` In the diagram above meter 1 is read by meter reader A, and meter 4
` is read by meter reader B. Meters 1 and 4 have no redundancy; if
` either fails, usage data for their network segments will be lost.
`
` Meters 2 and 3, however, measure traffic on the same network segment.
` One of them may fail leaving the other collecting the segment’s usage
` data. Meters 2 and 3 are read by meter reader A and by meter reader
` B. If one meter reader fails, the other will continue collecting
` usage data.
`
` The architecture does not require multiple meter readers to be
` synchronized. In the situation above meter readers A and B could
` both collect usage data at the same intervals, but not neccesarily at
` the same times. Note that because collections are asynchronous it is
` unlikely that usage records from two different meter readers will
` agree exactly.
`
` If precisely synchronized collections are required this can be
` achieved by having one manager request each meter to begin collecting
` a new set of flows, then allowing all meter readers to collect the
` usage data from the old sets of flows.
`
` If there is only one meter reader and it fails, the meters continue
` to run. When the meter reader is restarted it can collect all of the
` accumulated flow data. Should this happen, time resolution will be
` lost (because of the missed collections) but overall traffic flow
` information will not. The only exception to this would occur if the
` traffic volume was sufficient to ’roll over’ counters for some flows
` during the failure; this is addressed in the section on ’Rolling
` Counters.’
`
`2.6 Interaction Between MANAGERs (MANAGER - MANAGER)
`
` Synchronization between multiple management systems is the province
` of network management protocols. This traffic flow measurement
` architecture specifies only the network management controls necessary
` to perform the traffic flow measurement function and does not address
` the more global issues of simultaneous or interleaved (possibly
` conflicting) commands from multiple network management stations or
` the process of transferring control from one network management
` station to another.
`
`2.7 METER READERs and APPLICATIONs
`
` Once a collection of usage data has been assembled by a meter reader
` it can be processed by an analysis application. Details of analysis
` applications - such as the reports they produce and the data they
` require - are outside the scope of this architecture.
`
`Brownlee, et. al. Experimental [Page 8]
`
`Ericsson Exhibit 1021
`Page 8
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` It should be noted, however, that analysis applications will often
` require considerable amounts of input data. An important part of
` running a traffic flow measurement system is the storage and regular
` reduction of flow data so as to produce daily, weekly or monthly
` summary files for further analysis. Again, details of such data
` handling are outside the scope of this architecture.
`
`3 Traffic Flows and Reporting Granularity
`
` A flow was defined in section 2.1 above in abstract terms as follows:
`
` "A TRAFFIC FLOW is an artifical logical equivalent to a call or
` connection, belonging to an ACCOUNTABLE ENTITY."
`
` In practical terms, a flow is a stream of packets passing across a
` network between two end points (or being sent from a single end
` point), which have been summarized by a traffic meter for analysis
` purposes.
`
`3.1 Flows and their Attributes
`
` Every traffic meter maintains a table of ’flow records’ for flows
` seen by the meter. A flow record holds the values of the ATTRIBUTES
` of interest for its flow. These attributes might include:
`
` - ADDRESSES for the flow’s source and destination. These comprise
` the protocol type, the source and destination addresses at various
` network layers (extracted from the packet), and the number of the
` interface on which the packet was observed.
`
` - First and last TIMES when packets were seen for this flow, i.e.
` the ’creation’ and ’last activity’ times for the flow.
`
` - COUNTS for ’forward’ (source to destination) and ’backward’
` (destination to source) components (e.g. packets and bytes) of the
` flow’s traffic. The specifying of ’source’ and ’destination’ for
` flows is discussed in the section on packet matching below.
`
` - OTHER attributes, e.g. information computed by the meter.
`
` A flow’s ACCOUNTABLE ENTITY is specified by the values of its ADDRESS
` attributes. For example, if a flow’s address attributes specified
` only that "source address = IP address 10.1.0.1," then all IP packets
` from and to that address would be counted in that flow. If a flow’s
` address list were specified as "source address = IP address 10.1.0.1,
` destination address = IP address 26.1.0.1" then only IP packets
` between 10.1.0.1 and 26.1.0.1 would be counted in that flow.
`
`Brownlee, et. al. Experimental [Page 9]
`
`Ericsson Exhibit 1021
`Page 9
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` The addresses specifying a flow’s address attributes may include one
` or more of the following types:
`
` - The INTERFACE NUMBER for the flow, i.e. the interface on which the
` meter measured the traffic. Together with a unique address for the
` meter this uniquely identifies a particular physical-level port.
`
` - The ADJACENT ADDRESS, i.e. the [n-1] layer address of the
` immediate source or destination on the path of the packet. For
` example, if flow measurement is being performed at the IP layer on
` an Ethernet LAN [3], an adjacent address is a six-octet Media
` Access Control (MAC) address. For a host connected to the same LAN
` segment as the meter the adjacent address will be the MAC address
` of that host. For hosts on other LAN segments it will be the MAC
` address of the adjacent (upstream or downstream) router carrying
` the traffic flow.
`
` - The PEER ADDRESS, which identifies the source or destination of the
` PEER-LEVEL packet. The form of a peer address will depend on the
` network-layer protocol in use, and the network layer [n] at which
` traffic measurement is being performed.
`
` - The TRANSPORT ADDRESS, which identifies the source or destination
` port for the packet, i.e. its [n+1] layer address. For example,
` if flow measurement is being performed at the IP layer a transport
` address is a two-octet UDP or TCP port number.
`
` The four definitions above specify addresses for each of the four
` lowest layers of the OSI reference model, i.e. Physical layer, Link
` layer, Network layer and Transport layer. A FLOW RECORD stores both
` the VALUE for each of its addresses (as described above) and a MASK
` specifying which bits of the address value are being used and which
` are ignored. Note that if address bits are being ignored the meter
` will set them to zero, however their actual values are undefined.
`
` One of the key features of the traffic measurement architecture is
` that attributes have essentially the same meaning for different
` protocols, so that analysis applications can use the same reporting
` formats for all protocols. This is straightforward for peer
` addresses; although the form of addresses differs for the various
` protocols, the meaning of a ’peer address’ remains the same. It
` becomes harder to maintain this correspondence at higher layers - for
` example, at the Network layer IP, Novell IPX and AppleTalk all use
` port numbers as a ’transport address,’ but CLNP and DECnet have no
` notion of ports. Further work is needed here, particularly in
` selecting attributes which will be suitable for the higher layers of
` the OSI reference model.
`
`Brownlee, et. al. Experimental [Page 10]
`
`Ericsson Exhibit 1021
`Page 10
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` Reporting by adjacent intermediate sources and destinations or simply
` by meter interface (most useful when the meter is embedded in a
` router) supports hierarchical Internet reporting schemes as described
` in the ’Traffic Flow Measurement: Background’ RFC [1]. That is, it
` allows backbone and regional networks to measure usage to just the
` next lower level of granularity (i.e. to the regional and
` stub/enterprise levels, respectively), with the final breakdown
` according to end user (e.g. to source IP address) performed by the
` stub/enterprise networks.
`
` In cases where network addresses are dynamically allocated (e.g.
` mobile subscribers), further subscriber identification will be
` necessary if flows are to ascribed to individual users. Provision is
` made to further specify the accountable entity through the use of an
` optional SUBSCRIBER ID as part of the flow id. A subscriber ID may
` be associated with a particular flow either through the current rule
` set or by proprietary means within a meter, for example via protocol
` exchanges with one or more (multi-user) hosts. At this time a
` subscriber ID is an arbitrary text string; later versions of the
` architecture may specify its contents on more detail.
`
`3.2 Granularity of Flow Measurements
`
` GRANULARITY is the ’control knob’ by which an application and/or the
` meter can trade off the overhead associated with performing usage
` reporting against the level of detail supplied. A coarser
` granularity means a greater level of aggregation; finer granularity
` means a greater level of detail. Thus, the number of flows measured
` (and stored) at a meter can be regulated by changing the granularity
` of the accountable entity, the attributes, or the time intervals.
` Flows are like an adjustable pipe - many fine-granularity streams can
` carry the data with each stream measured individually, or data can be
` bundled in one coarse-granularity pipe.
`
` Flow granularity is controlled by adjusting the level of detail at
` which the following are reported:
`
` - The accountable entity (address attributes, discussed above).
`
` - The categorisation of packets (other attributes, discussed below).
`
` - The lifetime/duration of flows (the reporting interval needs to be
` short enough to measure them with sufficient precision).
`
`Brownlee, et. al. Experimental [Page 11]
`
`Ericsson Exhibit 1021
`Page 11
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` The set of rules controlling the determination of each packet’s
` accountable entity is known as the meter’s CURRENT RULE SET. As will
` be shown, the meter’s current rule set forms an integral part of the
` reported information, i.e. the recorded usage information cannot be
` properly interpreted without a definition of the rules used to
` collect that information.
`
` Settings for these granularity factors may vary from meter to meter.
` They are determined by the meter’s current rule set, so they will
` change if network Operations personnel reconfigure the meter to use a
` new rule set. It is expected that the collection rules will change
` rather infrequently; nonetheless, the rule set in effect at any time
` must be identifiable via a RULE SET ID. Granularity of accountable
` entities is further specified by additional ATTRIBUTES. These
` attributes include:
`
` - Meter variables such as the index of the flow’s record in the flow
` table and the rule set id for the rules which the meter was running
` while the flow was observed. The values of these attributes
` provide a way of distinguishing flows observed by a meter at
` different times.
`
` - Attributes which record information derived from other attribute
` values. Six of these are defined (SourceClass, DestClass,
` FlowClass, SourceKind, DestKind, FlowKind), and their meaning is
` determined by the meter’s rule set. For example, one could have a
` subroutine in the rule set which determined whether a source or
` destination peer address was a member of an arbitrary list of
` networks, and set SourceClass/DestClass to one if the source/dest
` peer address was in the list or to zero otherwise.
`
` - Administratively specified attributes such as Quality Of Service
` and Priority, etc. These are not defined at this time.
`
` - Higher-layer (especially application-level) attributes. These are
` not defined at this time.
`
` Settings for these granularity factors may vary from meter to meter.
` They are determined by the meter’s current rule set, so they will
` change if network Operations personnel reconfigure the meter to use a
` new rule set.
`
` The LIFETIME of a flow is the time interval which began when the
` meter observed the first packet belonging to the flow and ended when
` it saw the last packet. Flow lifetimes are very variable, but many -
` if not most - are rather short. A meter cannot measure lifetimes
` directly; instead a meter reader collects usage data for flows which
` have been active since the last collection, and an analysis
`
`Brownlee, et. al. Experimental [Page 12]
`
`Ericsson Exhibit 1021
`Page 12
`
`
`
`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` application may compare the data from each collection so as to
` determine when each flow actually stopped.
`
` The meter does, however, need to reclaim memory (i.e. records in the
` flow table) being held by idle flows. The meter configuration
` includes a variable called InactivityTimeout, which specifies the
` minimum time a meter must wait before recovering the flow’s record.
` In addition, before recovering a flow record the meter must be sure
` that the flow’s data has been collected by at least one meter reader.
`
` These ’lifetime’ issues are considered further in the section on
` meter readers (below). A complete list of the attributes currently
` defined is given in Appendix C later in this document.
`
`3.3 Rolling Counters, Timestamps, Report-in-One-Bucket-Only
`
` Once an usage record is sent, the decision needs to be made whether
` to clear any existing flow records or to maintain them and add to
` their counts when recording subsequent traffic on the same flow. The
` second method, called rolling counters, is recommended and has
` several advantages. Its primary advantage is that it provides
` greater reliability - the system can now often survive the loss of
` some usage records, such as might occur if a meter reader failed and
` later restarted