Thoughts on the Firewall NAT issue* 1 Tomohiro Kudoh * I think the issue we are discussing as the “firewall issue” is almost a NAT issue (i.e. a process.

Slides:



Advertisements
Similar presentations
© 2006 Open Grid Forum Network Service Interface in a Nut Shell GEC 19, Atlanta, GA Presenter: Chin Guok (ESnet) Contributors: Tomohiro Kudoh (AIST), John.
Advertisements

Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Guide to TCP/IP, Third Edition
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
ICSA341 Data Communications and Computer Networks 1 Data Link Control •General principles.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
An Introduction to Internetworking. Algorithm for client-server communication with UDP (connectionless) A SERVER A CLIENT Create a server-socket (listener)and.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
CSIT 320 (Blum)1 Client-Server Interaction Based on Appendix 1 in Computer Networks and Internets, Comer.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
A Brief Taxonomy of Firewalls
Programming Network Servers Topic 6, Chapters 21, 22 Network Programming Kansas State University at Salina.
CS 3214 Computer Systems Godmar Back Lecture 24 Supplementary Material.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Web Services Reliability Specification (WS-Reliability) Sunil Kunisetty Oracle Corp. Jacques Durand Fujitsu Software.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 John Magee 11 July 2013 CS 101 Lecture 11: How do you “visit” a web page, revisted Slides adapted from Kurose and Ross, Computer Networking 5/e Source.
Orbited Scaling Bi-directional web applications A presentation by Michael Carter
Chapter 2 Applications and Layered Architectures Sockets.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 11: Mobile Transport Layer Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
A client transaction becomes distributed if it invokes operations in several different Servers There are two different ways that distributed transactions.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
Concurrent TCP servers. The basic idea 1 client = 1 task. The task is alive as long until the connection is closed The task closes the connection.
COMPUTER NETWORKS Hwajung Lee. Image Source:
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
R Some of these slides are from Prof Frank Lin SJSU. r Minor modifications are made. 1.
1 Network Services Interface Connection Service v2.0 Tomohiro Kudoh (AIST) (OGF NSI-WG)
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Communication Networks NETW 501 Tutorial 2
1 A Proposal of NSI CS Client REST I/F Atsuko Takefusa National Institute of Advanced Industrial Science and Technology (AIST)
© 2007 Open Grid Forum NSI CS Protocol State Machine Message Handling OGF 37.
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
HIP-Based NAT Traversal in P2P-Environments
SOCKET PROGRAMMING Presented By : Divya Sharma.
Supplementary Material
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Original slides prepared by Theo Benson
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Supplementary Material
A Typical Connection Scenario
CS 280: Summary: A day in the life of a web request
Net 431: ADVANCED COMPUTER NETWORKS
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chapter 6 The Data Link layer
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
TCP/IP Networking An Example
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Starting TCP Connection – A High Level View
An Introduction to Internetworking
Synthesis A day in the life of a web request
Process-to-Process Delivery: UDP, TCP
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Thoughts on the Firewall NAT issue* 1 Tomohiro Kudoh * I think the issue we are discussing as the “firewall issue” is almost a NAT issue (i.e. a process is not accessible using a global IP address). “Firewall” implies a lot of functionality and if there are non-NAT firewall issues they should be considered case by case basis.

At where do NAT issues exist? At a client/uRA –Clients are likely to be at behind NATs. –It will be beneficial to make a client NAT friendly. At an aggregator/uPA –Aggregators and uPAs provide services to clients/NSAs. It is natural that they have a global IP address. –(If an operator should place an aggregator / a uPA behind a NAT, they should use a conventional method to make a punch hole.) 2

Some ways to go avoid the NAT issue 1.Use of a NAT traversal scheme 2.Use Polling. Requester polls status of provider periodically. 3.Keep a connection initiated by a requester, for future messages sent from the provider. 3

Relationship with MTL Relationship of NAT issue and MTL is basically an implementation matter. 4

Coordinator and Message Transport Layer (MTL) 5 Coor is a part of NSI stack, and uses MTL to send/receive messages Coor is primarily responsible for keeping track of messaging state, e.g. Who was the message sent to Was the message received (i.e. ack’ed or MTL timeout) Who has not replied to the message (e.g. *.cf, *.fl, etc) MTL is primarily responsible for sending and receiving messages, and notifying Coor if the message was received, or if a (MTL) timeout occurs MTL interface (to Coor) has 2 simple operations: Send: waits for ack to be returned by destination MTL, or timeout happens. Timeout value is implementation dependent. NB: The MTL may be implemented to retry sending messages, but this is opaque to the Coor Receive: a thread in Coor is invoked when a message is received NSA NSI Stack Message Transport Layer Coordinator Recall MTL interface; Chin’s slide

Option A: MTL hides NAT issues Method 1, 2 or 3 is implemented under MTL I/F. MTL I/F layer supports MTL’s two simple operations (send/receive) NAT support layer supports communication over NAT. (True) MTL (like SOAP, http, TCP) exists under NAT support layer 6 NSA NSI Stack (True) Message Transport Layer Coordinator NAT support layer (Method 1,2 or 3) (fake) MTL I/F layer

Option B: over-NAT communication is supported by the Coordinagtor Method 1, 2 or 3 is implemented under MTL I/F. MTL I/F layer supports MTL’s two simple operations (send/receive) NAT support layer supports communication over NAT. (True) MTL (like SOAP, http, TCP) exists under NAT support layer 7 NSA NSI Stack Message Transport Layer Coordinator NAT support layer (Method 1,2 or 3)

Example: JAX-WS-based asynchronous operations JAX-WS-based asynchronous operation keeps a connection for a long period of time until a reply is sent back. Define waitStatus as a JAX-WS-based asynchronous operations, instead of polling-based getStatus –Reduce the number of getStatus operations –Can respond as soon as status has changed 8 Requester Provider getStatus Not_ready getStatus Reply Reply ready interval Requester Provider waitStatus(“Reply") Reply Reply ready Polling-based approachAsynchronous approach