Moby Dick Consolidated System Integration Plan
Moby Dick Consolidated System Integration Plan
Moby Dick Consolidated System Integration Plan
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
D0103v1.doc Version 1 6.7.2003<br />
Access Router<br />
AAAC Client<br />
Integrated<br />
Logger<br />
QoS Manager<br />
Integrated<br />
Logger<br />
Local<br />
Log<br />
Audit<br />
Trail<br />
Auditing<br />
Local<br />
Log Mgmt<br />
Central Log<br />
Mgmt<br />
Figure 92: Auditing and Logging Architecture<br />
The task carried out by the Integrated Logger should not significantly affect the tasks of the hosting<br />
entity, i.e., the AAAC Client and the QoS Manager. This is the reason why the event logs are not s ent<br />
directly to a central Audit Trail, which may last longer due to the network communication overhead.<br />
Since QoS Manager does not aware of NAI, a way to map a CoA to NAI needs to be found to allow for<br />
logging of NAI in the service authorization event logs. This mapping can be done with the help of the<br />
AAAC Client, who knows exactly which NAI a certain CoA belongs to, as long as the MN having this<br />
CoA is currently registered by this AAAC Client. Because this is a logging issue, the required<br />
communication will be carried out between the AAAC Client’s Integrated Logger and the QoS Manager’s<br />
Integrated Logger. The information on CoA-NAI mapping will be provided to the Integrated Logger by<br />
the AAAC Client.<br />
The Local Log is not implemented as a flat file, but as a MySQL database. This requires a running<br />
MySQL server in each Access Router. Logs that have been successfully sent to the Central Log<br />
Management will be deleted from the Local Log. In this regard MySQL provides for a reliable and easy<br />
manipulation of event logs.<br />
Since each Local Log Management in each Access Router is connected to the Central Log Management,<br />
the data transfer need to be controlled, so that no packet loss occurs due to buffer overflow.<br />
The Audit Trail is a MySQL database, which has the same structure as the Local Log. It stores the event<br />
logs collected from every Local Log before being processed by the Auditing module. Logs in the Audit<br />
Trail that have been completely processed will be deleted or moved into data archives by the Auditing<br />
module. The result of the auditing process is a report telling whether or not violation to each commitment<br />
has occurred. This report is written into different flat files for each customer in case of user registration<br />
and service authorization, and for each entity in case of entity availability.<br />
4.5.6.4 Data Structures<br />
Based on the logging requirements, five types of events have been identified, which can be separated into<br />
three groups. The five types of events are Entity Availability Event, User Registration Request Event,<br />
User Registration Response Event, Service Authorization Request Event, and Service Authorization<br />
Response Event. The three groups are obviously Entity Availability Event Group, User Registration<br />
Event Group, and Service Authorization Event Group. All event logs in a group will be stored in the same<br />
MySQL table in the Local Log, and after being collected in the same MySQL table in the Audit Trail.<br />
The three tables corresponding to the three groups are named SoL (Sign of Life), UsrReg (User<br />
Registration), and SvcAuth (Service Authorization). The following subsections describe the data structure<br />
of each table.<br />
4.5.6.4.1 Sign of Life<br />
MySQL Table: SoL<br />
D0103v1.doc 137 / 168