CURRENT_MEETING_REPORT_


Reported by Cyndi Mills/BBN

AGENDA


   o Bounding the Charter.
   o Form a Working Group
   o Requirements Discussion:  Draft Minutes below.


Minutes


  1. Summary
     Agreed to form an Internet Accounting working group.  Cyndi Mills
     will chair it and write the charter.  This working group is in the
     Network Management Area under Dave Crocker.
  2. Bounding the Charter:
     We need to examine a wide range of policies to understand what set
     of information is required to satisfy the billing and reporting
     requirements, bearing in mind realistic requirements and
     restrictions regarding:
       o Availability of Information,
       o Performance, and
       o Accuracy.
     Policy Disclaimer:  Neither issues surrounding how policies are set
     nor how they are formulated will be addressed by this group.
     2.1 OSI Accounting
     Brian Handspicker, ANSI X3T5.4 OSI Management Accounting Ad Hoc
     Group Leader, presented the OSI view of accounting.  The OSI
     Accounting working group is defining the collection service and
     protocols.  The OSI group is not addressing the content information
     to be measured and reported by the collection service.  Suggest
     that the IETF working group coordinate with the OSI accounting
     group so as not to duplicate effort.
     Meter <--> Collector <--> Application
     Application:  The application manipulates the billing data in
     accordance with policy, and determines which information will be
     requested from the metering devices.
     Collector:  The collector is responsible for integrity and security
     of the data during transport from the meter to the application.
     Meters:  Meters perform the measurement and aggregate the results.
     The characteristics of the meter may be implementation-specific.
     2.2 Data Generation vs.  Data Collection vs.  Billing Application
     The generation of accounting data (the meter function) is the focus
     of this IETF group.  First, we need to determine what information
     will satisfy the widest possible range of policies, and what the
     constraints are.  Secondly, we should cover local storage and
     aggregation techniques.

                                   1






   Data collection protocols, i.e.  methods for carrying accounting
   data, are under development in ANSI. Accounting data may be carried
   by a combination of protocols, including network management
   protocols such as OSI Accounting, SNMP, CMIP. The selection of
   collection protocol(s) should be deferred until the structure and
   constraints of the carried data are known.
   The billing process, i.e.  the processing of the accounting data,
   is beyond the scope of this group.  Billing methods, tariffs, and
   exceptions tend to be unique to each organization.
   2.3 Network-Level vs.  Host-Level
   The information available to the meter depends on its location in
   the network.  One of the major issues here is attribution - with
   what granularity can we account for the source and destination of
   network traffic?  Can we track the source/destination of a packet
   to the autonomous network, the network number, the host address,
   the user, or to a charge number on one of a user's many projects?
   For network meters, a function attached to the routers, this
   information is limited to what can be extracted from the IP packet
   flow.  Various counters may be implemented, but attribution of the
   packet to a source is limited to the information available in the
   IP address (and the protocol ID of the protocol carried).  There is
   no unique identifier in the packet for a user.
   Host meters are more flexible.  They have direct knowledge of the
   user and his operation, and are in a position to implement
   user-level accounting in accordance with the behavior of a specific
   operating system.
   This working group will concentrate on network-level meters.  The
   discussion section covers a number of background arguments for this
   restriction.
3. Discussion
   The Internet community is made up of:
     o Network providers, e.g.  backbone and regional networks, who
       usually own the transmission media, regulate or own the
       routers, but disown the hosts.  Internet accounting is for the
       benefit of the network provider, an aid in the implementation
       of the network provider's policy.  In networks with chargeback
       policies, accounting may be the sole source of funding for the
       network.
     o Network users, e.g.  hosts, individual users, and projects.
       These are the consumers of network services.  From an
       accounting point of view, these are the end-users, the finest
       granularity of attribution.
     o Stuck in the middle.  These are the entities that are both
       providers and consumers of network services.  Hosts and
       regional networks are frequently in this category.  They
       receive service from the network and provide network service to
       the user.  In addition to compensating other network providers
       for network services rendered, they must assist in allocating
       responsibility for those services received and provided to
       end-users.
   The phone company analogy was used frequently to illustrate several
   interrelated points.

     o Regional/Local Operating Providers:  The Bell Operating

                                 2






         Companies (BOCs) serve as the network connection point for
         subscribers.  They maintain directories and connectivity
         information, because they control the end-users' connections.
       o Long-Distance Providers:  AT&T and MCI are backbone services.
       o PBX Installations:  A subscriber may be a single telephone, or
         a private telephone network.  The private telephone network is
         analogous to the LAN: it receives a bulk bill from the regional
         BOC and it is responsible for maintaining its own records to
         allocate costs back to its local users.


The potential billing models between a long-distance provider and a
middleman (BOC) provider in the phone company model illustrated some of
the issues.

Under the existing policy, the BOCs bill users for long-distance
services as a courtesy to the long- distance companies, who set the
rates.  Two hypothetical models for implementing this service were
discussed.

The long-distance company provides per-call detail to the BOC. The BOC
maintains the accounting data and the association of usage data with its
end-users.  The BOC generates the bill.

The BOC provides per-call "tags" to identify its end users to the
long-distance provider.  The long- distance carrier maintains the
accounting data and the association of usage data with those tags.  The
long- distance carrier generates the bills' contents.  The BOC simply
forwards the bill to the user associated with its "tags".

Under a hypothetical policy, BOCs receive an aggregate bill for
long-distance services from the backbone provider.  The BOC is treated
as a single billable entity by the long-distance service.  In this case,
the BOC is solely responsible for maintaining the accounting data and
policies which allocate those costs to users.  The BOC provides no
user-level information to the backbone provider, nor does the backbone
provider give detailed per-call accounting to the BOC. (Not
interactively, at least.)

DEFINE THE BILLABLE ENTITY FIRST. We are examining the nature of
traffic, interesting but too much for simple accounting purposes.  Start
with the definition of the "billable entity" and build up to what you
need.

DON'T INCLUDE NETWORK DESIGN AND ANALYSIS DATA. Accounting needs very
precise data about certain kinds of traffic.  Network design and
analysis needs different data, and frequently works with sampling
techniques inappropriate for accounting.  Although much of the
accounting information may be useful for network design and analysis,
covering network design and analysis requirements will overburden the
scope of this group.


                                   3






NEED TO KEEP THE ENTITY MATRIX SIMPLE. There are inherent limits in the
current situation.  Routers can't handle keeping a matrix of counters
for every possible user-user combination.  Some kind of hierarchical
billing is required.  One division is for hosts to be billed in
aggregate by the network, and leave the hosts responsible for allocating
costs to users.  However even host-host matrices can get very large.  If
each datagram entering a router is on a different source- destination
pair, thrashing could be easily induced.

WATCH OUT FOR OVERHEAD. Accounting for every packet in a fine- grain way
could result in 100may have more than 50it can be appropriately
attributed to users.  50off point for feasibility.

DIFFERENT ALGORITHMS FOR LOCAL AND LONG-DISTANCE SERVICES: Note that the
phone company uses different algorithms for local and long distance
services.  Long distance calls are handled with detailed call accounting
or aggregate counts (message units).  Local calls are handled with
simple aggregate counts (message units) or flat fees regardless of
usage.

The lesson here is that where the cost of accounting is huge in
comparison with the cost of providing the basic service, many
subscribers prefer a policy which allocates usage as a flat fee.  Some
subscribers, however, (message units), still want usage-based fees.
Phone companies provide a wide variety of such combinations of service.

WHAT ABOUT SPECIAL END-USERS? Suppose I am a long-distance carrier and I
want a particular research group to get a special rate.  In the various
models how can I ensure that their traffic and only their traffic is
billed at the reduced rate?  How do government clients get a bulk rate?

We need to consider the interaction between government and commercial
entities, e.g., what does GEC Marconi do when it wants to communicate
with NASA on commercial issues?

NEED A SET OF TEST QUESTIONS FOR PRELIMINARY VERIFICATION OF THE MODEL.
What is an accountable unit?  Examples of questions that should be
answered are how to deal with rate periods (time-of-day), special
end-users, etc.  Need many more questions.

ON FORMING A WORKING GROUP: We will see commercial services in the
Internet.  This will require accounting.  The IETF should get the
process set up first.  Good value for traffic and capacity planning, as
well.  Suggest we talk to people who are planning to offer commercial
Internet service (PSI, UUNET, Finnish PTT, SMDS) to see what kinds of
charging strategies they use.  The RACE program, with Ira Richer, is
also working on accounting issues.


ATTENDEES

    Cerf, Vinton               vcerf@nri.reston.va.us

                                   4






Crocker, Dave              dcrocker@nsl.dec.com
Crocker, Steve             crocker@tis.com
Fernandez, Louis           lfernandez@bbn.com
Handspicker, Brian D.      bd@vines.dec.com
Kirstein, Peter            kirstein@cs.ucl.ac.uk
Lazear, Walter             lazear@gateway.mitre.org
Little, Mike               little@saic.com
Morris, Dennis             morris@imo-uvax.dca.mil
Newkerk, Oscar             newkerk@decwet.dec.com
Pace, Donald               pace@fsu1.cc.fsu.edu
Saperia, Jon               saperia%tcpjon@decwrl.dec.com
Su, Zaw-Sing               zsu@tsca.istc.sri.com
Youssef, Mary              mary@ibm.com
Yuan, Aileen               aileen@gateway.mitre.org



                               5