Internet Draft Stephen Bush Expires in June 1997 Sunil Jagannath ITTC January 13, 1997 The Definition of Managed Objects for Virtual Network Configuration Status of this Memo This document is a submission by the Information and Telecommunica- tions Technologies Center (ITTC) at the University of Kansas. Com- ments should be submitted to sbush@tisl.ukans.edu. Distribution of this memo is unlimited. This document is an Internet-Draft. Internet-Drafts are working doc- uments of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute work- ing documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet- Drafts as reference mate- rial or to cite them other than as ``work in progress.'' To learn the current status of any Internet-Draft, please check the ``1id-abstracts.txt'' listing contained in the Internet- Drafts Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or ftp.isi.edu (US West Coast). Abstract This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it describes managed objects used for managing Virtual Network Configuration (VNC) of the Rapidly Deployable Radio Network (RDRN) Network Control Protocol (NCP). The Network Management Framework The Internet-standard Network Management Framework consists of three components. They are: Bush & Jagannath Expires in June 1997 [Page 1] Internet-Draft Virtual Network Configuration 13 January 1997 STD 16/RFC 1155 which defines the SMI, the mechanisms used for describing and naming objects for the purpose of management. STD 16/RFC 1212 defines a more concise description mechanism, which is wholly consistent with the SMI. STD 17/RFC 1213 which defines MIB-II, the core set of managed objects for the Internet suite of protocols. STD 15/RFC 1157 which defines the SNMP, the protocol used for net- work access to managed objects. The Framework permits new objects to be defined for the purpose of experimentation and evaluation. Objects Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. Objects in the MIB are defined using the subset of Abstract Syntax Notation One (ASN.1) [3] defined in the SMI. In particular, each object type is named by an OBJECT IDENTIFIER, an administratively assigned name. The object type together with an object instance serves to uniquely identify a specific instantiation of the object. For human convenience, we often use a textual string, termed the descriptor, to refer to the object type. Format of Definitions Section 5 contains the specification of all object types contained in this MIB module. The object types are defined using the conventions defined in the SMI, as amended by the extensions specified in [5,6]. Overview Network Control Protocol Terminology This section defines some of the terminology used in the Description of the Network Control Protocol [11] and [12] operation. Bush & Jagannath Expires in June 1997 [Page 2] Internet-Draft Virtual Network Configuration 13 January 1997 o "AX.25" Asynchronous X.25 Protocol (See [1]). o "Callsign" The packet radio callsign is assigned by the FCC and identifies the packet radio operator. o "Edge Switch" (ES) A node which either resides within the wireless network or at the edge of the fixed and wireless network and which serves as a base station. o "Global Positioning System" (GPS) Satellite system which provides location and time. o "Remote Node" (RN) A host with the ability to connect via a beamforming antenna to an edge switch (ES). Virtual Network Configuration Virtual Network Configuration (VNC) allows future states of a system to be predicted and used efficiently. VNC is used for the configura- tion of a wireless mobile Asynchronous Transfer Mode (ATM) network known as the Rapidly Deployable Radio Network (RDRN). Configuration in a mobile network must be a dynamic and continuous process. Fac- tors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates con- figuration changes and speeds the reconfiguration process by pre- computing and caching results. The Global Positioning System (GPS) is a key element in the implementation of this algorithm because it provides location information and accurate time for each node. The effort required to enhance network configuration with Virtual Network Configuration is minimal. New fields are added to each existing mes- sage and additional structures are added to existing processes. The benefit of prediction is gained at the cost of additional traffic and processing. Virtual Network Configuration Algorithm The Virtual Network Configuration (VNC) algorithm is an application Bush & Jagannath Expires in June 1997 [Page 3] Internet-Draft Virtual Network Configuration 13 January 1997 of a more general mechanism called Time Warp Emulation (TWE). Time Warp Emulation is a modification of Time Warp. The motivation behind TWE is to allow the actual components of a real-time system to work ahead in time in order to predict future behavior and adjust them- selves when that behavior does not match reality. This is accom- plished by realizing that there are now two types of false messages, those which arrive in the past relative to the process's Local Vir- tual Time (LVT) and those messages which have been generated which are time-stamped with the current real time, but whose values exceed some tolerance from the component's current value. The basic Time Warp mechanism is modified by adding a verification query phase. This phase occurs when real time matches the receive time of a message in the output queue of a process. In this phase, the physical device being emulated in time is queried and the results compared with the value of the message. A value exceeding a prespeci- fied tolerance will cause a rollback of the process. The Virtual Network Configuration (VNC) algorithm can be explained by an example. A remote node's direction, velocity, bandwidth used, number of connections, past history and other factors can be used to approximate a new configuration sometime into the future. All actual configuration processes can begin to work ahead in time to where the remote node is expected to be at some point in the future. If the prediction is incorrect, but not far off, only some processing will have to be rolled back in time. For example, the beamsteering process results may have to be adjusted, but the topology and many higher level requirements will still be correct. Working ahead and rolling back to adjust for error with reality is an on-going process, which depends on the tradeoff between allowable risk and amount of process- ing time allowed into the future. Virtual Network Configuration Implementation The effort required to enhance the network configuration algorithm to include Virtual Network Configuration is minimal. Three new fields are added to each existing message: antimessage toggle, send time, and receive time. Physical processes include beamforming, topology acquisition, table updates, and all processing required for configu- ration. Each physical process is assigned a tolerance. When the value of a real message exceeds the tolerance of a predicted message stored in the send queue, the process is rolled back. Also, an additional packet type was created for updating an approxi- mation of the Global Virtual Time (GVT). Because the system is com- posed of asynchronously executing logical processes, each working ahead as quickly as possible with its own local notion of time, it is necessary to calculate the time of the system as a whole. This Bush & Jagannath Expires in June 1997 [Page 4] Internet-Draft Virtual Network Configuration 13 January 1997 system-wide time is the GVT. The difference between GVT and current time is the amount of lookahead, Lambda. Although GVT >= t where t is real time, Lambda is required because it is used to control the effi- ciency and accuracy of the system. Since the network configuration system uses a master node as described in the physical layer setup, this is a natural centralized location for a centralized GVT update method. RNs transmit their LVT to the master, the master calculates an approximate GVT and returns the result. The Rapidly Deployable Radio Network (RDRN) consists of links formed by beamforming antennas. While beamforming allows improved spectrum usage through spatial reuse, it poses a challenge to configure. Each mobile node and base station contains a GPS receiver and is aware of its current location. This information is shared among nodes and an optimal topology for beamformed links is determined. The protocol which carries this information is known as the network control proto- col (NCP). The NCP is carried over an omni-directional packet radio overlay network. See reference [8] and [9] for detailed information about the operation of NCP. Virtual Network Configuration MIB Overview A very brief overview of VNC components and operation will be pro- vided in this section. The VNC algorithm is an extension of opti- mistic parallel simulation [10] and accomplishes configuration of a mobile wireless ATM network including handoff. A driving process injects virtual messages into the VNC system. Virtual messages are similar to real messages except that they exist in the future and are thus predictions of future events. VNC consists of Logical Processes (LP) which communicate via mes- sages. An LP is comprised of a State Queue, Receive Queue, and Send Queue. Each LP State has an associated tolerance. If messages arrive out of order or beyond the given tolerance, a rollback occurs. Roll- backs produce anti-messages which cancel the effects of causality violations and inaccurate VNC predictions. The system may contain a global virtual time calculation (GVT) and global lookahead parameter (LA). The MIB objects described below manage each of these compo- nents. The GvtUpdate MIB object manages the rate at which a simple polling algorithm for GVT calculation is performed. The StepSize object controls the rate of virtual messages generation from the driving process. Definitions Bush & Jagannath Expires in June 1997 [Page 5] Internet-Draft Virtual Network Configuration 13 January 1997 RDRN-VNC-MIB DEFINITIONS ::= BEGIN IMPORTS MODULE-IDENTITY, OBJECT-TYPE, enterprises, Counter32, Integer32, TimeTicks, Unsigned32 FROM SNMPv2-SMI DisplayString, RowStatus, DateAndTime, TruthValue, TimeStamp, TAddress FROM SNMPv2-TC; RdrnVncMIB MODULE-IDENTITY ORGANIZATION "KU TISL" CONTACT-INFO " Steve Bush sbush@tisl.ukans.edu" DESCRIPTION "Experimental MIB modules for the Rapidly Deployable Radio Networks (RDRN) Project Network Control Protocol (NCP) enhanced with the Virtual Network Configuration." ::= { 1 3 6 1 3 ncp(75) 2 } vnc OBJECT IDENTIFIER ::= { ncp(75) 2 } -- -- Logical Process Table -- logicalProcess OBJECT IDENTIFIER ::= { vnc 1 } logicalProcessTable OBJECT-TYPE SYNTAX SEQUENCE OF LogicalProcessEntry ACCESS read-only STATUS mandatory DESCRIPTION "Table of VNC LP information." ::= { logicalProcess 1 } logicalProcessEntry OBJECT-TYPE SYNTAX LogicalProcessEntry ACCESS read-only STATUS mandatory ::= { logicalProcessTable 1 } LogicalProcessEntry ::= SEQUENCE { logicalProcessID Bush & Jagannath Expires in June 1997 [Page 6] Internet-Draft Virtual Network Configuration 13 January 1997 DisplayString, logicalProcessLVT INTEGER, logicalProcessQRSize INTEGER, logicalProcessQSSize INTEGER, logicalProcessRollbacks INTEGER, logicalProcessSQSize INTEGER, logicalProcessTolerance INTEGER, logicalProcessGVT INTEGER, logicalProcessLookAhead INTEGER, logicalProcessGvtUpdate INTEGER, logicalProcessStepSize INTEGER } logicalProcessID OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION "The LP identifier." ::= { logicalProcessEntry 1 } logicalProcessLVT OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the LP Local Virtual Time." ::= { logicalProcessEntry 2 } logicalProcessQRSize OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the LP Receive Queue Size." ::= { logicalProcessEntry 3 } logicalProcessQSSize OBJECT-TYPE Bush & Jagannath Expires in June 1997 [Page 7] Internet-Draft Virtual Network Configuration 13 January 1997 SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the LP send queue size." ::= { logicalProcessEntry 4 } logicalProcessRollbacks OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the number of rollbacks this LP has suffered." ::= { logicalProcessEntry 5 } logicalProcessSQSize OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the LP state queue size." ::= { logicalProcessEntry 6 } logicalProcessTolerance OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the allowable deviation between process's predicted state and the actual state." ::= { logicalProcessEntry 7 } logicalProcessGVT OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is this system's notion of Global Virtual Time." ::= { logicalProcessEntry 8 } logicalProcessLookAhead OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is this system's maximum time into which it can predict." ::= { logicalProcessEntry 9 } Bush & Jagannath Expires in June 1997 [Page 8] Internet-Draft Virtual Network Configuration 13 January 1997 logicalProcessGvtUpdate OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the GVT update rate." ::= { logicalProcessEntry 10 } logicalProcessStepSize OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION "This is the time until next virtual message." ::= { logicalProcessEntry 11 } END Security Considerations None. References [1] Rose M., and K. McCloghrie, "Structure and Identification of Management Information for TCP/IP-based internets", STD 16, RFC 1155, Performance Systems International, Hughes LAN Systems, May 1990. [2] McCloghrie K., and M. Rose, Editors, "Management Information Base for Network Management of TCP/IP-based internets", STD 17, RFC 1213, Performance Systems International, March 1991. [3] Information processing systems - Open Systems Interconnection - Specification of Abstract Syntax Notation One (ASN.1), International Organization for Standardization, International [4] Information processing systems - Open Systems Interconnection - Specification of Basic Encoding Rules for Abstract Notation One (ASN.1), International Organization for Standardization, International Standard 8825, December 1987. [5] Rose, M., and K. McCloghrie, Editors, "Concise MIB Definitions", STD 16, RFC 1212, Performance Systems International, Hughes LAN Systems, March 1991. [6] Rose, M., Editor, "A Convention for Defining Traps for use with Bush & Jagannath Expires in June 1997 [Page 9] Internet-Draft Virtual Network Configuration 13 January 1997 the SNMP", RFC 1215, Performance Systems International, March 1991. [7] McCloghrie, K., "Extensions to the Generic-Interface MIB", RFC 1229, Hughes LAN Systems, Inc., May 1991. [8] Stephen F. Bush, Sunil Jagannath, Joseph B. Evans, and Victor Frost, "A Control and Management Network for Wireless ATM Systems" in Proceedings of the International Communications Conference '96, p. 459,463 (1996 June). Online version available at: http://www.tisl.ukans.edu/~sbush/pspapers/icc96.ps [9] Stephen F. Bush, Sunil Jagannath, Ricardo Sanchez, Joseph B. Evans, Victor Frost, and K. Sam Shanmugan, Rapidly Deployable Radio Networks (RDRN) Network Architecture, Telecommunications Information Sciences Laboratory (1995 July). Online version available at: http://www.tisl.ukans.edu/~sbush/pspapers/network_arch.ps [10] D. R. Jefferson and H. A. Sowizral, Fast Concurrent Simulation Using The Time Warp Mechanism, Part I: Local Control, pp. 27-53, The Rand Corporation (1982). [11] Network Control Protocol for the Configuration of Mobile Wireless Beamformed GPS-Based Networks, , Stephen F. Bush, Sunil Jagan- nath. [12] The Definition of Managed Objects for the Configuration of Mobile Wireless Beamformed GPS-Based Networks, , Stephen F. Bush, Sunil Jagannath. Author's Address Stephen F. Bush Sunil Jagannath Information and Telecommunications Technologies Center (ITTC) University of Kansas Lawrence, Kansas 66045 Phone: (913) 864-7761 EMail: sbush@tisl.ukans.edu Bush & Jagannath Expires in June 1997 [Page 10]