Reliability further points for discussion prepared for discussion at the IRTF Delay-Tolerant Networking session IETF 73, Minneapolis, November 2008. draft-irtf-dtnrg-bundle-checksum.

Slides:



Advertisements
Similar presentations
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Chapter 7 – Transport Layer Protocols
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
Network Layer and Transport Layer.
Internet Networking Spring 2003
Network Architectures Week 3 Part 2. Comparing The Internet & OSI.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
1 Introduction to TCP/IP. 2 Agenda What Is TCP/IP? IP Addressing.
Gursharan Singh Tatla Transport Layer 16-May
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Glenn Research Center Networks & Architectures Branch Communications Technology IETF73 - IRTF DTNRG Meeting November Space-based DTN Low Earth Orbit.
© 2009 The MITRE Corporation. All rights reserved. Joint DTN / SOIS Meeting April 22, 2009 Colorado Springs, CO.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Mukesh N. Tekwani Elphinstone College Mumbai
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP: A Closer Look Transmission Control Protocol.
University of the Western Cape Chapter 12: The Transport Layer.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
SIS-DTN WG Meeting Thursday Afternoon
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Communications Services Connection Oriented Service  A connection is established  Data is sent or received over this connection  Connection may be terminated.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Presented by Rebecca Meinhold But How Does the Internet Work?
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Computer Network Overview Ikjun Yeom. 2 What is a computer network? a collection of computing nodes and links connecting the nodes why we need it? –to.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-73 – Minneapolis.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Introduction to TCP/IP. Agenda What Is TCP/IP? IP Addressing.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
Chapter 9: Transport Layer
Virtual Private Networks
Instructor Materials Chapter 9: Transport Layer
ETR-NASA DTN Phase-1 Test Results
Recall IPv4 Datagram Format
Subject Name: Computer Communication Networks Subject Code: 10EC71
IP - The Internet Protocol
Chapter 20 Network Layer: Internet Protocol
CPEG514 Advanced Computer Networkst
Net 323 D: Networks Protocols
IP - The Internet Protocol
OSI Reference Model Unit II
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
ITIS 6167/8167: Network and Information Security
IP - The Internet Protocol
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Chapter 8 – Data switching and routing
Presentation transcript:

Reliability further points for discussion prepared for discussion at the IRTF Delay-Tolerant Networking session IETF 73, Minneapolis, November draft-irtf-dtnrg-bundle-checksum Lloyd Wood, Wesley M. Eddy and Will Ivancic Cisco Systems, Verizon/NASA, NASA Glenn.

22draft-irtf-dtnrg-bundle-checksum rapid closed-loop feedback between source and destination open loop due to less or no direct connectivity between source and destination; no end-to-end loop; no permanent path more reliance on separate closed loops between each pair of nodes with local checking for e.g. custody transfer and to increase throughput little need for resends between or checking at nodes when resends can easily and quickly be done end-to-end over the whole path instead Terrestrial fixed Internet Delay-tolerant network

33draft-irtf-dtnrg-bundle-checksum Bundling compared to IPv6  IPv6 packets don’t get fragmented and reassembled in the network. Bundles do.  IPv6 runs in a tight, closed, end-to-end control loop. Bundles don’t. Open loop between applications.  IPv6 can leave all its checking to the endhosts and applications, thanks to closed control loops and fast resends. Bundling can’t.  DTN networks must take a different approach to reliability.

44draft-irtf-dtnrg-bundle-checksum secure PIB as in bundle security drafts as in draft-irtf-dtnrg-bundle-checksum insecure ciphersuite source destination shared or private keys shared keys only Control loops: security and custody transfer #1

55draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #2 secure PIB insecure ciphersuite source destination custody transfer receipts shared or private keys shared keys only

66draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #3 secure PIB insecure ciphersuite source destination originals discarded new custodian shared or private keys shared keys only

77draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #4 secure PIB insecure ciphersuite source destination originals discarded memory corruption of bundles new custodian shared or private keys shared keys only

88draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #5 secure PIB insecure ciphersuite source destination fails insecure ciphersuite check before sending no way of verifying content. presumed good and sent on. resend requested shared or private keys shared keys only

99draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #6 secure PIB insecure ciphersuite source destination discarded; re-requested. PIB fails check; discarded shared or private keys shared keys only

10 draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #7 secure PIB insecure ciphersuite source destination rerequest secure bundle shared or private keys shared keys only

11 draft-irtf-dtnrg-bundle-checksum Control loops: security and custody transfer #8 secure PIB insecure ciphersuite source destination Insecure bundle that can be checked in-transit has arrived faster. shared or private keys shared keys only

12 draft-irtf-dtnrg-bundle-checksum can be verified at each intermediate node, leading to faster resends and tighter control loops Tradeoffs PIB secure bundle insecure payload using INSECURE ciphersuite can also be used by applications implementing their own e2esecurity opaque to intermediate nodes; longer control loops

13 draft-irtf-dtnrg-bundle-checksum Best of both worlds – end-to-end secure end-to-end payload wrapping e2e reliability checksum which can be checked at each nodes allows for fast resends if errors are detected push an e2e reliability checksum on after the secure PIB is used.

14 draft-irtf-dtnrg-bundle-checksum direct over UDP (not yet agreed) Bundle Protocol UDP User Datagram Protocol TCP Transmission Control Protocol (widely used, but some deployment differences) SaratogaLicklider (LTP) IP Internet Protocol Data-link: Ethernet, Frame Relay etc. CCSDS protocols for custom space links Direct convergence layer adapter How should a convergence layer support reliability? Most Bundle Protocol use is over IP. What reliability should direct-over-UDP offer?

15 draft-irtf-dtnrg-bundle-checksum 150MB image transferred from UK-DMC satellite using Bundle Protocol over Saratoga with proactive fragmentation, 25 August TIME Magazine best inventions of the year #9 Orbital Internet, 10 November 2008 issue. We have experienced reliability problems when testing the Bundle Protocol in space…. Not checking bundles for errors before forwarding can increase resend times and overall network utilization. Errors are only noticed afterwards by the user, rather than being caught early in the network

16 draft-irtf-dtnrg-bundle-checksum More discussion is needed. thankyou.