27.03.2014 Views

Moby Dick Consolidated System Integration Plan

Moby Dick Consolidated System Integration Plan

Moby Dick Consolidated System Integration Plan

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

D0103v1.doc Version 1 6.7.2003<br />

Access Router<br />

AAAC Client<br />

Integrated<br />

Logger<br />

QoS Manager<br />

Integrated<br />

Logger<br />

Local<br />

Log<br />

Audit<br />

Trail<br />

Auditing<br />

Local<br />

Log Mgmt<br />

Central Log<br />

Mgmt<br />

Figure 92: Auditing and Logging Architecture<br />

The task carried out by the Integrated Logger should not significantly affect the tasks of the hosting<br />

entity, i.e., the AAAC Client and the QoS Manager. This is the reason why the event logs are not s ent<br />

directly to a central Audit Trail, which may last longer due to the network communication overhead.<br />

Since QoS Manager does not aware of NAI, a way to map a CoA to NAI needs to be found to allow for<br />

logging of NAI in the service authorization event logs. This mapping can be done with the help of the<br />

AAAC Client, who knows exactly which NAI a certain CoA belongs to, as long as the MN having this<br />

CoA is currently registered by this AAAC Client. Because this is a logging issue, the required<br />

communication will be carried out between the AAAC Client’s Integrated Logger and the QoS Manager’s<br />

Integrated Logger. The information on CoA-NAI mapping will be provided to the Integrated Logger by<br />

the AAAC Client.<br />

The Local Log is not implemented as a flat file, but as a MySQL database. This requires a running<br />

MySQL server in each Access Router. Logs that have been successfully sent to the Central Log<br />

Management will be deleted from the Local Log. In this regard MySQL provides for a reliable and easy<br />

manipulation of event logs.<br />

Since each Local Log Management in each Access Router is connected to the Central Log Management,<br />

the data transfer need to be controlled, so that no packet loss occurs due to buffer overflow.<br />

The Audit Trail is a MySQL database, which has the same structure as the Local Log. It stores the event<br />

logs collected from every Local Log before being processed by the Auditing module. Logs in the Audit<br />

Trail that have been completely processed will be deleted or moved into data archives by the Auditing<br />

module. The result of the auditing process is a report telling whether or not violation to each commitment<br />

has occurred. This report is written into different flat files for each customer in case of user registration<br />

and service authorization, and for each entity in case of entity availability.<br />

4.5.6.4 Data Structures<br />

Based on the logging requirements, five types of events have been identified, which can be separated into<br />

three groups. The five types of events are Entity Availability Event, User Registration Request Event,<br />

User Registration Response Event, Service Authorization Request Event, and Service Authorization<br />

Response Event. The three groups are obviously Entity Availability Event Group, User Registration<br />

Event Group, and Service Authorization Event Group. All event logs in a group will be stored in the same<br />

MySQL table in the Local Log, and after being collected in the same MySQL table in the Audit Trail.<br />

The three tables corresponding to the three groups are named SoL (Sign of Life), UsrReg (User<br />

Registration), and SvcAuth (Service Authorization). The following subsections describe the data structure<br />

of each table.<br />

4.5.6.4.1 Sign of Life<br />

MySQL Table: SoL<br />

D0103v1.doc 137 / 168

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!