throbber
Network Working Group N. Brownlee
`Request for Comments: 2063 The University of Auckland
`Category: Experimental C. Mills
` BBN Systems and Technologies
` G. Ruth
` GTE Laboratories, Inc.
` January 1997
`
` Traffic Flow Measurement: Architecture
`
`Status of this Memo
`
` This memo defines an Experimental Protocol for the Internet
` community. This memo does not specify an Internet standard of any
` kind. Discussion and suggestions for improvement are requested.
` Distribution of this memo is unlimited.
`
`Abstract
`
` This document describes an architecture for the measurement and
` reporting of network traffic flows, discusses how this relates to an
` overall network traffic flow architecture, and describes how it can
` be used within the Internet. It is intended to provide a starting
` point for the Realtime Traffic Flow Measurement Working Group.
`
`Table of Contents
`
` 1 Statement of Purpose and Scope 2
` 2 Traffic Flow Measurement Architecture 4
` 2.1 Meters and Traffic Flows . . . . . . . . . . . . . . . . . . 4
` 2.2 Interaction Between METER and METER READER . . . . . . . . . 6
` 2.3 Interaction Between MANAGER and METER . . . . . . . . . . . 6
` 2.4 Interaction Between MANAGER and METER READER . . . . . . . . 7
` 2.5 Multiple METERs or METER READERs . . . . . . . . . . . . . . 7
` 2.6 Interaction Between MANAGERs (MANAGER - MANAGER) . . . . . . 8
` 2.7 METER READERs and APPLICATIONs . . . . . . . . . . . . . . . 8
` 3 Traffic Flows and Reporting Granularity 9
` 3.1 Flows and their Attributes . . . . . . . . . . . . . . . . . 9
` 3.2 Granularity of Flow Measurements . . . . . . . . . . . . . . 11
` 3.3 Rolling Counters, Timestamps, Report-in-One-Bucket-Only . . 13
` 4 Meters 15
` 4.1 Meter Structure . . . . . . . . . . . . . . . . . . . . . . 15
` 4.2 Flow Table . . . . . . . . . . . . . . . . . . . . . . . . . 17
` 4.3 Packet Handling, Packet Matching . . . . . . . . . . . . . . 17
` 4.4 Rules and Rule Sets . . . . . . . . . . . . . . . . . . . . 21
` 4.5 Maintaining the Flow Table . . . . . . . . . . . . . . . . . 24
` 4.6 Handling Increasing Traffic Levels . . . . . . . . . . . . . 25
`
`Brownlee, et. al. Experimental [Page 1]
`
`Ericsson Exhibit 1021
`Page 1
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` 5 Meter Readers 26
` 5.1 Identifying Flows in Flow Records . . . . . . . . . . . . . 26
` 5.2 Usage Records, Flow Data Files . . . . . . . . . . . . . . . 27
` 5.3 Meter to Meter Reader: Usage Record Transmission. . . . . . 27
` 6 Managers 28
` 6.1 Between Manager and Meter: Control Functions . . . . . . . 28
` 6.2 Between Manager and Meter Reader: Control Functions . . . 29
` 6.3 Exception Conditions . . . . . . . . . . . . . . . . . . . . 31
` 6.4 Standard Rule Sets . . . . . . . . . . . . . . . . . . . . 32
` 7 APPENDICES 33
` 7.1 Appendix A: Network Characterisation . . . . . . . . . . . . 33
` 7.2 Appendix B: Recommended Traffic Flow Measurement Capabilities 34
` 7.3 Appendix C: List of Defined Flow Attributes . . . . . . . . 35
` 7.4 Appendix D: List of Meter Control Variables . . . . . . . . 36
` 8 Acknowledgments 36
` 9 References 37
`10 Security Considerations 37
`11 Authors’ Addresses 37
`
`1 Statement of Purpose and Scope
`
` This document describes an architecture for traffic flow measurement
` and reporting for data networks which has the following
` characteristics:
`
` - The traffic flow model can be consistently applied to any
` protocol/application at any network layer (e.g. network,
` transport, application layers).
`
` - Traffic flow attributes are defined in such a way that they are
` valid for multiple networking protocol stacks, and that traffic
` flow measurement implementations are useful in MULTI-PROTOCOL
` environments.
`
` - Users may specify their traffic flow measurement requirements
` in a simple manner, allowing them to collect the flow data they
` need while ignoring other traffic.
`
` - The data reduction effort to produce requested traffic flow
` information is placed as near as possible to the network
` measurement point. This reduces the volume of data to be
` obtained (and transmitted across the network for storage),
` and minimises the amount of processing required in traffic
` flow analysis applications.
`
`Brownlee, et. al. Experimental [Page 2]
`
`Ericsson Exhibit 1021
`Page 2
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` The architecture specifies common metrics for measuring traffic
` flows. By using the same metrics, traffic flow data can be exchanged
` and compared across multiple platforms. Such data is useful for:
`
` - Understanding the behaviour of existing networks,
`
` - Planning for network development and expansion,
`
` - Quantification of network performance,
`
` - Verifying the quality of network service, and
`
` - Attribution of network usage to users.
`
` The traffic flow measurement architecture is deliberately structured
` so that specific protocol implementations may extend coverage to
` multi-protocol environments and to other protocol layers, such as
` usage measurement for application-level services. Use of the same
` model for both network- and application-level measurement may
` simplify the development of generic analysis applications which
` process and/or correlate any or all levels of traffic and usage
` information. Within this docuemt the term ’usage data’ is used as a
` generic term for the data obtained using the traffic flow measurement
` architecture.
`
` This document is not a protocol specification. It specifies and
` structures the information that a traffic flow measurement system
` needs to collect, describes requirements that such a system must
` meet, and outlines tradeoffs which may be made by an implementor.
`
` For performance reasons, it may be desirable to use traffic
` information gathered through traffic flow measurement in lieu of
` network statistics obtained in other ways. Although the
` quantification of network performance is not the primary purpose of
` this architecture, the measured traffic flow data may be used as an
` indication of network performance.
`
` A cost recovery structure decides "who pays for what." The major
` issue here is how to construct a tariff (who gets billed, how much,
` for which things, based on what information, etc). Tariff issues
` include fairness, predictability (how well can subscribers forecast
` their network charges), practicality (of gathering the data and
` administering the tariff), incentives (e.g. encouraging off-peak
` use), and cost recovery goals (100% recovery, subsidisation, profit
` making). Issues such as these are not covered here.
`
` Background information explaining why this approach was selected is
` provided by ’Traffic Flow Measurement: Background’ RFC [1].
`
`Brownlee, et. al. Experimental [Page 3]
`
`Ericsson Exhibit 1021
`Page 3
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
`2 Traffic Flow Measurement Architecture
`
` A traffic flow measurement system is used by network Operations
` personnel for managing and developing a network. It provides a tool
` for measuring and understanding the network’s traffic flows. This
` information is useful for many purposes, as mentioned in section 1
` (above).
`
` The following sections outline a model for traffic flow measurement,
` which draws from working drafts of the OSI accounting model [2].
` Future extensions are anticipated as the model is refined to address
` additional protocol layers.
`
`2.1 Meters and Traffic Flows
`
` At the heart of the traffic measurement model are network entities
` called traffic METERS. Meters count certain attributes (such as
` numbers of packets and bytes) and classify them as belonging to
` ACCOUNTABLE ENTITIES using other attributes (such as source and
` destination addresses). An accountable entity is someone who (or
` something which) is responsible for some activitiy on the network.
` It may be a user, a host system, a network, a group of networks, etc,
` depending on the granularity specified by the meter’s configuration.
`
` We assume that routers or traffic monitors throughout a network are
` instrumented with meters to measure traffic. Issues surrounding the
` choice of meter placement are discussed in the ’Traffic Flow
` Measurement: Background’ RFC [1]. An important aspect of meters is
` that they provide a way of succinctly aggregating entity usage
` information.
`
` For the purpose of traffic flow measurement we define the concept of
` a TRAFFIC FLOW, which is an artificial logical equivalent to a call
` or connection. A flow is a portion of traffic, delimited by a start
` and stop time, that was generated by a particular accountable entity.
` Attribute values (source/destination addresses, packet counts, byte
` counts, etc.) associated with a flow are aggregate quantities
` reflecting events which take place in the DURATION between the start
` and stop times. The start time of a flow is fixed for a given flow;
` the end time may increase with the age of the flow.
`
` For connectionless network protocols such as IP there is by
` definition no way to tell whether a packet with a particular
` source/destination combination is part of a stream of packets or not
` - each packet is completely independent. A traffic meter has, as
` part of its configuration, a set of ’rules’ which specify the flows
` of interest, in terms of the values of their attributes. It derives
` attribute values from each observed packet, and uses these to decide
`
`Brownlee, et. al. Experimental [Page 4]
`
`Ericsson Exhibit 1021
`Page 4
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` which flow they belong to. Classifying packets into ’flows’ in this
` way provides an economical and practical way to measure network
` traffic and ascribe it to accountable entities.
`
` Usage information which is not deriveable from traffic flows may also
` be of interest. For example, an application may wish to record
` accesses to various different information resources or a host may
` wish to record the username (subscriber id) for a particular network
` session. Provision is made in the traffic flow architecture to do
` this. In the future the measurement model will be extended to gather
` such information from applications and hosts so as to provide values
` for higher-layer flow attributes.
`
` As well as FLOWS and METERS, the traffic flow measurement model
` includes MANAGERS, METER READERS and ANALYSIS APPLICAIONS, which are
` explained in following sections. The relationships between them are
` shown by the diagram below. Numbers on the diagram refer to sections
` in this document.
`
` MANAGER
` / \
` 2.3 / \ 2.4
` / \
` / \ ANALYSIS
` METER <-----> METER READER <-----> APPLICATION
` 2.2 2.7
`
` - MANAGER: A traffic measurement manager is an application which
` configures ’meter’ entities and controls ’meter reader’ entities.
` It uses the data requirements of analysis applications to determine
` the appropriate configurations for each meter, and the proper
` operation of each meter reader. It may well be convenient to
` combine the functions of meter reader and manager within a single
` network entity.
`
` - METER: Meters are placed at measurement points determined by
` network Operations personnel. Each meter selectively records
` network activity as directed by its configuration settings. It can
` also aggregate, transform and further process the recorded activity
` before the data is stored. The processed and stored results are
` called the ’usage data.’
`
` - METER READER: A meter reader reliably transports usage data from
` meters so that it is available to analysis applications.
`
`Brownlee, et. al. Experimental [Page 5]
`
`Ericsson Exhibit 1021
`Page 5
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` - ANALYSIS APPLICATION: An analysis application processes the usage
` data so as to provide information and reports which are useful for
` network engineering and management purposes. Examples include:
`
` - TRAFFIC FLOW MATRICES, showing the total flow rates for
` many of the possible paths within an internet.
`
` - FLOW RATE FREQUENCY DISTRIBUTIONS, indicating how flow
` rates vary with time.
`
` - USAGE DATA showing the total traffic volumes sent and
` received by particular hosts.
`
` The operation of the traffic measurement system as a whole is best
` understood by considering the interactions between its components.
` These are described in the following sections.
`
`2.2 Interaction Between METER and METER READER
`
` The information which travels along this path is the usage data
` itself. A meter holds usage data in an array of flow data records
` known as the FLOW TABLE. A meter reader may collect the data in any
` suitable manner. For example it might upload a copy of the whole
` flow table using a file transfer protocol, or read the records in the
` current flow set one at a time using a suitable data transfer
` protocol. Note that the meter reader need not read complete flow
` data records, a subset of their attribute values may well be
` sufficient.
`
` A meter reader may collect usage data from one or more meters. Data
` may be collected from the meters at any time. There is no
` requirement for collections to be synchronized in any way.
`
`2.3 Interaction Between MANAGER and METER
`
` A manager is responsible for configuring and controlling one or more
` meters. At the time of writing a meter can only be controlled by a
` single manager; in the future this restriction may be relaxed. Each
` meter’s configuration includes information such as:
`
` - Flow specifications, e.g. which traffic flows are to be measured,
` how they are to be aggregated, and any data the meter is required
` to compute for each flow being measured.
`
` - Meter control parameters, e.g. the maximum size of its flow table,
` the ’inactivity’ time for flows (if no packets belonging to a flow
` are seen for this time the flow is considered to have ended, i.e.
` to have become idle).
`
`Brownlee, et. al. Experimental [Page 6]
`
`Ericsson Exhibit 1021
`Page 6
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` - Sampling rate. Normally every packet will be observed. It may
` sometimes be necessary to use sampling techniques to observe only
` some of the packets. (Sampling algorithms are not prescribed by
` the architecture; it should be noted that before using sampling one
` should verify the statistical validity of the algorithm used).
` Current experience with the measurement architecture shows that a
` carefully-designed and implemented meter compresses the data such
` that in normal LANs and WANs of today sampling is really not
` needed.
`
`2.4 Interaction Between MANAGER and METER READER
`
` A manager is responsible for configuring and controlling one or more
` meter readers. A meter reader may only be controlled by a single
` manager. A meter reader needs to know at least the following for
` every meter is is collecting usage data from:
`
` - The meter’s unique identity, i.e. its network name or address.
`
` - How often usage data is to be collected from the meter.
`
` - Which flow records are to be collected (e.g. all active flows, the
` whole flow table, flows seen since a given time, etc.).
`
` - Which attribute values are to be collected for the required flow
` records (e.g. all attributes, or a small subset of them)
`
` Since redundant reporting may be used in order to increase the
` reliability of usage data, exchanges among multiple entities must be
` considered as well. These are discussed below.
`
`2.5 Multiple METERs or METER READERs
`
` -- METER READER A --
` / | \
` / | \
` =====METER 1 METER 2=====METER 3 METER 4=====
` \ | /
` \ | /
` -- METER READER B --
`
` Several uniquely identified meters may report to one or more meter
` readers. The diagram above gives an example of how multiple meters
` and meter readers could be used.
`
`Brownlee, et. al. Experimental [Page 7]
`
`Ericsson Exhibit 1021
`Page 7
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` In the diagram above meter 1 is read by meter reader A, and meter 4
` is read by meter reader B. Meters 1 and 4 have no redundancy; if
` either fails, usage data for their network segments will be lost.
`
` Meters 2 and 3, however, measure traffic on the same network segment.
` One of them may fail leaving the other collecting the segment’s usage
` data. Meters 2 and 3 are read by meter reader A and by meter reader
` B. If one meter reader fails, the other will continue collecting
` usage data.
`
` The architecture does not require multiple meter readers to be
` synchronized. In the situation above meter readers A and B could
` both collect usage data at the same intervals, but not neccesarily at
` the same times. Note that because collections are asynchronous it is
` unlikely that usage records from two different meter readers will
` agree exactly.
`
` If precisely synchronized collections are required this can be
` achieved by having one manager request each meter to begin collecting
` a new set of flows, then allowing all meter readers to collect the
` usage data from the old sets of flows.
`
` If there is only one meter reader and it fails, the meters continue
` to run. When the meter reader is restarted it can collect all of the
` accumulated flow data. Should this happen, time resolution will be
` lost (because of the missed collections) but overall traffic flow
` information will not. The only exception to this would occur if the
` traffic volume was sufficient to ’roll over’ counters for some flows
` during the failure; this is addressed in the section on ’Rolling
` Counters.’
`
`2.6 Interaction Between MANAGERs (MANAGER - MANAGER)
`
` Synchronization between multiple management systems is the province
` of network management protocols. This traffic flow measurement
` architecture specifies only the network management controls necessary
` to perform the traffic flow measurement function and does not address
` the more global issues of simultaneous or interleaved (possibly
` conflicting) commands from multiple network management stations or
` the process of transferring control from one network management
` station to another.
`
`2.7 METER READERs and APPLICATIONs
`
` Once a collection of usage data has been assembled by a meter reader
` it can be processed by an analysis application. Details of analysis
` applications - such as the reports they produce and the data they
` require - are outside the scope of this architecture.
`
`Brownlee, et. al. Experimental [Page 8]
`
`Ericsson Exhibit 1021
`Page 8
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` It should be noted, however, that analysis applications will often
` require considerable amounts of input data. An important part of
` running a traffic flow measurement system is the storage and regular
` reduction of flow data so as to produce daily, weekly or monthly
` summary files for further analysis. Again, details of such data
` handling are outside the scope of this architecture.
`
`3 Traffic Flows and Reporting Granularity
`
` A flow was defined in section 2.1 above in abstract terms as follows:
`
` "A TRAFFIC FLOW is an artifical logical equivalent to a call or
` connection, belonging to an ACCOUNTABLE ENTITY."
`
` In practical terms, a flow is a stream of packets passing across a
` network between two end points (or being sent from a single end
` point), which have been summarized by a traffic meter for analysis
` purposes.
`
`3.1 Flows and their Attributes
`
` Every traffic meter maintains a table of ’flow records’ for flows
` seen by the meter. A flow record holds the values of the ATTRIBUTES
` of interest for its flow. These attributes might include:
`
` - ADDRESSES for the flow’s source and destination. These comprise
` the protocol type, the source and destination addresses at various
` network layers (extracted from the packet), and the number of the
` interface on which the packet was observed.
`
` - First and last TIMES when packets were seen for this flow, i.e.
` the ’creation’ and ’last activity’ times for the flow.
`
` - COUNTS for ’forward’ (source to destination) and ’backward’
` (destination to source) components (e.g. packets and bytes) of the
` flow’s traffic. The specifying of ’source’ and ’destination’ for
` flows is discussed in the section on packet matching below.
`
` - OTHER attributes, e.g. information computed by the meter.
`
` A flow’s ACCOUNTABLE ENTITY is specified by the values of its ADDRESS
` attributes. For example, if a flow’s address attributes specified
` only that "source address = IP address 10.1.0.1," then all IP packets
` from and to that address would be counted in that flow. If a flow’s
` address list were specified as "source address = IP address 10.1.0.1,
` destination address = IP address 26.1.0.1" then only IP packets
` between 10.1.0.1 and 26.1.0.1 would be counted in that flow.
`
`Brownlee, et. al. Experimental [Page 9]
`
`Ericsson Exhibit 1021
`Page 9
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` The addresses specifying a flow’s address attributes may include one
` or more of the following types:
`
` - The INTERFACE NUMBER for the flow, i.e. the interface on which the
` meter measured the traffic. Together with a unique address for the
` meter this uniquely identifies a particular physical-level port.
`
` - The ADJACENT ADDRESS, i.e. the [n-1] layer address of the
` immediate source or destination on the path of the packet. For
` example, if flow measurement is being performed at the IP layer on
` an Ethernet LAN [3], an adjacent address is a six-octet Media
` Access Control (MAC) address. For a host connected to the same LAN
` segment as the meter the adjacent address will be the MAC address
` of that host. For hosts on other LAN segments it will be the MAC
` address of the adjacent (upstream or downstream) router carrying
` the traffic flow.
`
` - The PEER ADDRESS, which identifies the source or destination of the
` PEER-LEVEL packet. The form of a peer address will depend on the
` network-layer protocol in use, and the network layer [n] at which
` traffic measurement is being performed.
`
` - The TRANSPORT ADDRESS, which identifies the source or destination
` port for the packet, i.e. its [n+1] layer address. For example,
` if flow measurement is being performed at the IP layer a transport
` address is a two-octet UDP or TCP port number.
`
` The four definitions above specify addresses for each of the four
` lowest layers of the OSI reference model, i.e. Physical layer, Link
` layer, Network layer and Transport layer. A FLOW RECORD stores both
` the VALUE for each of its addresses (as described above) and a MASK
` specifying which bits of the address value are being used and which
` are ignored. Note that if address bits are being ignored the meter
` will set them to zero, however their actual values are undefined.
`
` One of the key features of the traffic measurement architecture is
` that attributes have essentially the same meaning for different
` protocols, so that analysis applications can use the same reporting
` formats for all protocols. This is straightforward for peer
` addresses; although the form of addresses differs for the various
` protocols, the meaning of a ’peer address’ remains the same. It
` becomes harder to maintain this correspondence at higher layers - for
` example, at the Network layer IP, Novell IPX and AppleTalk all use
` port numbers as a ’transport address,’ but CLNP and DECnet have no
` notion of ports. Further work is needed here, particularly in
` selecting attributes which will be suitable for the higher layers of
` the OSI reference model.
`
`Brownlee, et. al. Experimental [Page 10]
`
`Ericsson Exhibit 1021
`Page 10
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` Reporting by adjacent intermediate sources and destinations or simply
` by meter interface (most useful when the meter is embedded in a
` router) supports hierarchical Internet reporting schemes as described
` in the ’Traffic Flow Measurement: Background’ RFC [1]. That is, it
` allows backbone and regional networks to measure usage to just the
` next lower level of granularity (i.e. to the regional and
` stub/enterprise levels, respectively), with the final breakdown
` according to end user (e.g. to source IP address) performed by the
` stub/enterprise networks.
`
` In cases where network addresses are dynamically allocated (e.g.
` mobile subscribers), further subscriber identification will be
` necessary if flows are to ascribed to individual users. Provision is
` made to further specify the accountable entity through the use of an
` optional SUBSCRIBER ID as part of the flow id. A subscriber ID may
` be associated with a particular flow either through the current rule
` set or by proprietary means within a meter, for example via protocol
` exchanges with one or more (multi-user) hosts. At this time a
` subscriber ID is an arbitrary text string; later versions of the
` architecture may specify its contents on more detail.
`
`3.2 Granularity of Flow Measurements
`
` GRANULARITY is the ’control knob’ by which an application and/or the
` meter can trade off the overhead associated with performing usage
` reporting against the level of detail supplied. A coarser
` granularity means a greater level of aggregation; finer granularity
` means a greater level of detail. Thus, the number of flows measured
` (and stored) at a meter can be regulated by changing the granularity
` of the accountable entity, the attributes, or the time intervals.
` Flows are like an adjustable pipe - many fine-granularity streams can
` carry the data with each stream measured individually, or data can be
` bundled in one coarse-granularity pipe.
`
` Flow granularity is controlled by adjusting the level of detail at
` which the following are reported:
`
` - The accountable entity (address attributes, discussed above).
`
` - The categorisation of packets (other attributes, discussed below).
`
` - The lifetime/duration of flows (the reporting interval needs to be
` short enough to measure them with sufficient precision).
`
`Brownlee, et. al. Experimental [Page 11]
`
`Ericsson Exhibit 1021
`Page 11
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` The set of rules controlling the determination of each packet’s
` accountable entity is known as the meter’s CURRENT RULE SET. As will
` be shown, the meter’s current rule set forms an integral part of the
` reported information, i.e. the recorded usage information cannot be
` properly interpreted without a definition of the rules used to
` collect that information.
`
` Settings for these granularity factors may vary from meter to meter.
` They are determined by the meter’s current rule set, so they will
` change if network Operations personnel reconfigure the meter to use a
` new rule set. It is expected that the collection rules will change
` rather infrequently; nonetheless, the rule set in effect at any time
` must be identifiable via a RULE SET ID. Granularity of accountable
` entities is further specified by additional ATTRIBUTES. These
` attributes include:
`
` - Meter variables such as the index of the flow’s record in the flow
` table and the rule set id for the rules which the meter was running
` while the flow was observed. The values of these attributes
` provide a way of distinguishing flows observed by a meter at
` different times.
`
` - Attributes which record information derived from other attribute
` values. Six of these are defined (SourceClass, DestClass,
` FlowClass, SourceKind, DestKind, FlowKind), and their meaning is
` determined by the meter’s rule set. For example, one could have a
` subroutine in the rule set which determined whether a source or
` destination peer address was a member of an arbitrary list of
` networks, and set SourceClass/DestClass to one if the source/dest
` peer address was in the list or to zero otherwise.
`
` - Administratively specified attributes such as Quality Of Service
` and Priority, etc. These are not defined at this time.
`
` - Higher-layer (especially application-level) attributes. These are
` not defined at this time.
`
` Settings for these granularity factors may vary from meter to meter.
` They are determined by the meter’s current rule set, so they will
` change if network Operations personnel reconfigure the meter to use a
` new rule set.
`
` The LIFETIME of a flow is the time interval which began when the
` meter observed the first packet belonging to the flow and ended when
` it saw the last packet. Flow lifetimes are very variable, but many -
` if not most - are rather short. A meter cannot measure lifetimes
` directly; instead a meter reader collects usage data for flows which
` have been active since the last collection, and an analysis
`
`Brownlee, et. al. Experimental [Page 12]
`
`Ericsson Exhibit 1021
`Page 12
`
`

`

`
`RFC 2063 Traffic Flow Measurement: Architecture January 1997
`
` application may compare the data from each collection so as to
` determine when each flow actually stopped.
`
` The meter does, however, need to reclaim memory (i.e. records in the
` flow table) being held by idle flows. The meter configuration
` includes a variable called InactivityTimeout, which specifies the
` minimum time a meter must wait before recovering the flow’s record.
` In addition, before recovering a flow record the meter must be sure
` that the flow’s data has been collected by at least one meter reader.
`
` These ’lifetime’ issues are considered further in the section on
` meter readers (below). A complete list of the attributes currently
` defined is given in Appendix C later in this document.
`
`3.3 Rolling Counters, Timestamps, Report-in-One-Bucket-Only
`
` Once an usage record is sent, the decision needs to be made whether
` to clear any existing flow records or to maintain them and add to
` their counts when recording subsequent traffic on the same flow. The
` second method, called rolling counters, is recommended and has
` several advantages. Its primary advantage is that it provides
` greater reliability - the system can now often survive the loss of
` some usage records, such as might occur if a meter reader failed and
` later restarted

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket