1 Comments on Delay Tolerant Network (DTN) October, 2008 Berlin, Germany Takahiro Yamada, JAXA/ISAS.

Slides:



Advertisements
Similar presentations
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
1 CNPA B Nasser S. Abouzakhar Queuing Disciplines Week 8 – Lecture 2 16 th November, 2009.
Intermediate TCP/IP TCP Operation.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
Chapter 7 – Transport Layer Protocols
Packet Switching Network One of the common communications method is packet switching, which divides messages into packets and sends each packet individually.packet.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #2 Header Compression.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
Internet Networking Spring 2003
CSCE 515: Computer Network Programming TCP Details Wenyuan Xu Department of Computer Science and Engineering.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
1 Internet Networking Spring 2006 Tutorial 14 Header Compression.
1 Internet Networking Spring 2002 Tutorial 2 IP Checksum, Fragmentation.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Gursharan Singh Tatla Transport Layer 16-May
Module A Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Process-to-Process Delivery:
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network Architecture & Standards
© 2009 The MITRE Corporation. All rights reserved. Joint DTN / SOIS Meeting April 22, 2009 Colorado Springs, CO.
1 In-Space Cross Support Using Delay / Disruption Tolerant Networking Keith Scott 15 October, 2008 Berlin, Germany October 15, 2008.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP: A Closer Look Transmission Control Protocol.
University of the Western Cape Chapter 12: The Transport Layer.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Transmission Control Protocol
More on TCP Acknowledgements Sequence Number Field Initial Sequence Number Acknowledgement Number Field.
V. Tsaoussidis, DUTH – Greece
SIS-DTN WG Meeting Thursday Afternoon
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Transmission Control Protocol (TCP)
Outline Motivation Protocol Terminology Implementation architecture SDNV Addressing scheme Bundle format Primary block Generic Block Processing Bundle.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
Network Models.
Internet Architecture. 2 INTRODUCTION INTERNET developed by a community of researchers centered around the Defense Advanced Research Projects Agency (DARPA)
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
1 Systems Architecture WG: Charter and Work Plan October 23, 2003 Takahiro Yamada, JAXA/ISAS.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Data Link Layer.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Network Models.
Chapter 9: Transport Layer
Reliable Transmission
Instructor Materials Chapter 9: Transport Layer
Internet Networking recitation #9
ETR-NASA DTN Phase-1 Test Results
21-2 ICMP(Internet control message protocol)
Systems Architecture WG: Charter and Work Plan
Data Communications and Networking Pipelined reliable data transfer
Internet Networking Spring 2002
Stream Control Transmission Protocol (SCTP)
Process-to-Process Delivery:
Internet Networking recitation #10
Chapter 15. Internet Protocol
Process-to-Process Delivery: UDP, TCP
Error Checking continued
Transport Layer 9/22/2019.
Presentation transcript:

1 Comments on Delay Tolerant Network (DTN) October, 2008 Berlin, Germany Takahiro Yamada, JAXA/ISAS

2 Purpose of This Presentation  I reviewed the following specifications (finally!).  RFC 4838: Delay-Tolerant Networking Architecture  RFC 5050: Bundle Protocol Specification  draft-irtf-dtnrg-ltp-motivation-07: Licklider Transmission Protocol - Motivation  draft-irtf-dtnrg-ltp-10: Licklider Transmission Protocol - Specification  This presentation describes some comments on these specifications derived from our experience in developing both onboard and ground data systems form many science missions (including deep space missions) at JAXA/ISAS.

3 Class of Service (Priority) 1/3  The Bundle Protocol has four priority levels indicated by bits 7 and 8 in the Bundle Processing Control Flags (4.2 of RFC 5050).  However, there are many deep space missions that use many (for example, ) priority levels for controlling the order of transmission from an onboard data storage (which may be a custodian) to the earth (or to the next node). These priority levels are usually indicated by or associated with APIDs and/or some other field in the packet secondary header.  Furthermore, on some missions, the priority level for some types of data changes depending on the occasion (for example, we give a high priority to thruster data after a maneuver).  We would appreciate it if the Bundle Protocol had a finer and more flexible mechanism for handling and controlling the priority of bundles.

4 Class of Service (Priority) 2/3  A possible solution is to use a Flow Label used in CFDP to control the order of transmission from nodes (which include custodians). A Flow Label is associated with each bundle and the assignment of its value is determined by the node that generates the bundle. Therefore, the meaning of the Flow Label values is determined by the source endpoint ID or by a group of endpoint IDs that share a method for controlling Flow Label values.  How Flow Label values should be mapped to the orders of transmission should be informed by some node using a bundle management protocol.  A similar thing can be done by using the source endpoint ID to determine the order of transmission (that is, source endpoint IDs map to priority levels), but I’m not sure this is practical.

5 Class of Service (Priority) 3/3  Furthermore, we sometimes want to give a high priority to bundles generated during a certain time period (for example, during a maneuver).  Therefore, having a standard creation timestamp in the bundle header (4.5.1 of RFC 5050) is a good idea.  We would be happier if there were a mechanism to inform a node (which may be a custodian) what bundles should be transferred first based on the value of the creation timestamp of the bundles stored at that node (using a bundle management protocol).

6 Bundle Sequence Number  We sometimes want to know whether or not there are missing bundles generated by a node (source endpoint).  For this purpose, we would appreciate having a bundle sequence number in the bundle header.

7 Bundle Management Protocol  It would be convenient for some missions if there were a protocol for managing bundles stored at a node (which may be a custodian).  This Bundle Management Protocol would do the following:  Instruct a node to send a report to another node what bundles it has in its storage.  Inform a node how Flow Label values should be mapped to the orders of transmission from that node.  Inform a node what bundles should be transmitted first from that node based on the value of the creation timestamp.

8 Linkage between BP and LTP  Let’s suppose that a bundle is sent from a node to another node using LTP. For some reason, the LTP engine at the sending node sends the bundle in five LTP segments.  Let’s suppose that the first three segments arrived at the receiving node (and were acknowledged by the receiver), but the last two segments did not. The session ends at this condition.  It would be nice if the receiving bundle agent could create a fragment of the original bundle from the three segments that were received correctly, and the sending bundle agent could create another fragment from the two remaining segments and retransmit it to the receiving node during the next session or to another node during a different session.  Is this mechanism too complex?