Licklider Transmission Protocol (LTP) ● A point-to-point protocol for DTNs – Think of it as somewhere from layer 2 up to maybe layer 4! ● LTP is highly.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

IP Fragmentation. MTU Maximum Transmission Unit (MTU) –Largest IP packet a network will accept –Arriving IP packet may be larger IP Packet MTU.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Transmission Control Protocol (TCP)
Guide to TCP/IP, Third Edition
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Fundamentals of Computer Networks ECE 478/578 Lecture #20: Transmission Control Protocol Instructor: Loukas Lazos Dept of Electrical and Computer Engineering.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
TELE202 Lecture 14 TCP/UDP (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »TCP/UDP (1) »Source: chapter 17 ¥This Lecture »TCP/UDP (2) »Source: chapter.
SIS_DTN 1 SIS-DTN LTP Protocol Specification May 2010.
Firewalls and Intrusion Detection Systems
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Gursharan Singh Tatla Transport Layer 16-May
Module A Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Transport Layer Computer Networks. 2 Where are we?
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Delay-Tolerant Networking (DTN)
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Transmission Control Protocol TCP. Transport layer function.
More on TCP Acknowledgements Sequence Number Field Initial Sequence Number Acknowledgement Number Field.
Transport Control Protocol (TCP) Features of TCP, packet loss and retransmission, adaptive retransmission, flow control, three way handshake, congestion.
Dr. John P. Abraham Professor UTPA
1 TCP: Reliable Transport Service. 2 Transmission Control Protocol (TCP) Major transport protocol used in Internet Heavily used Completely reliable transfer.
LTP for Reliable Telecommand-2 (NGU WG) Scott Burleigh, JPL November 1, 2011 Boulder.
Karlstad University IP security Ge Zhang
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Transport Protocols.
Submission doc.: IEEE 11-13/0526r1 May 2013 Donald Eastlake, HuaweiSlide 1 Sub-Setting Date: Authors:
Guide to TCP/IP Fourth Edition
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
Retransmission. Automatic Repeat reQuest (ARQ) 2 Time Packet ACK Timeout Automatic Repeat Request –Receiver sends acknowledgment (ACK) when it receives.
UDP : User Datagram Protocol 백 일 우
© 2002, Cisco Systems, Inc. All rights reserved..
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
Cryptography CSS 329 Lecture 13:SSL.
1 Transmission Control Protocol (TCP) RFC: Introduction The TCP is intended to provide a reliable process-to-process communication service in a.
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Ch23 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Denial of Service attack in IPv6 networks and Counter measurements
Introduction to TCP/IP networking
Delay-Tolerant Networking (DTN)
CSE 4905 IPsec.
The IP, TCP, UDP protocols
Guide to TCP/IP Fourth Edition
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
Controller Area Networks (CAN)
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
ITIS 6167/8167: Network and Information Security
Session 20 INST 346 Technologies, Infrastructure and Architecture
Transport Layer 9/22/2019.
Presentation transcript:

Licklider Transmission Protocol (LTP) ● A point-to-point protocol for DTNs – Think of it as somewhere from layer 2 up to maybe layer 4! ● LTP is highly stateful – Needed to avoid negotiation exchanges – Primarily aimed at deep space DTNs but can also (I claim!) be used for many terrestrial cases ● Encoding is terse and binary

LTP layering ● LTP runs on top of some MAC layer or deep space physical layer ● LTP assumes lower layer “cues” are provided so that some infrastructure (e.g. ephemeris handler + scheduler) tells the stack when to expect to receive or transmit with a given peer.

LTP Segment Bit ^ | | Version number | Segment Type Flags | | | | | | / Session ID \ | \ / Header | | Header Extension Cnt. | Trailer Extension Cnt.| | | | | | / Header Extensions \ | \ / V | | | Segment Content | / \ \ / | | ^ | | | Trailer / Trailer Extensions \ | \ / V

LTP Encoding ● Many fields use so-called Self-Delimiting Numeric Values (SDNV) – Also used in bundling protocol – Based on ASN.1 BER encoding of OID arcs – Might change in future ● But so long as the same thing's used everywhere that's ok

LTP features ● Sessions/Segments – A single “block” is sent per “session” using multiple “segments” ● Segment size is limited by the underlying MTU – Session-ID is src-ID + number ● Recommended to use a (P)RNG for the number ● Red/green parts – Data is ACKed (red) or not (green) – Not ACKing is easier, but doesn't fulfill all appn. Requirements – Red part first (if any), then green (if any) – Each segment in a session is entirely red or entirely green

Red/Green motivation ● Lots of science data formats (e.g. images) put important information (e.g. codec, timing, orientation) at the start, followed by lots of less important detail (pixels) – Loose the codec information and the rest is useless – Losing a pixel or two (hundred) isn't that bad ● Want to have ACKs for the start of the block but not the entire block – Caller or config. determines which, if any, segments are red. Others are green.

LTP segment types ● Data segment (tx->rx) – Can be Red or Green ● Report segment (rx->tx) ● Report ACK segment (tx->rx) ● Cancel segments (tx/rx differ) – Required for loopback ● Cancel ACK segments

Data segments ● Subset of block's bytes (offset, length) ● Flags can indicate: – End of Red Part – End of Block ● EORP and EOB require report (ACK) – Unless zero red bytes

Reports ● Each report contains a set of scopes, each of which informs the transmitter that some (red)bytes have arrived safely – Report segment has a serial number (RSN) – Report segments always ACKed using RSN ● Wrinkle: reporting the “full” state might require >1 rx->tx MTU so a single “report” might need >1 RS – Spec. has some hyper-efficient ways to handle this for deep space reasons – Also allows for more “full” reporting where bandwidth less constrained

Retransmission ● Re-txing based on timeouts and counters – If EORP/EOB sent but no ACK (RS) – If RS sent but no RA – If Cx sent but no CAx ● Timers use “punctuated” time – Only decremented during periods when data could actually be arriving from the peer – E.g. Not decremented while peer is turned off

Denial of Service ● LTP nodes can be very badly affected by DoS – Took a couple of weeks to reboot MER Spirit when OS had no file handles left ● Anti-DoS features: – Random bits recommended in Session ID – Recommended random bits in report serial numbers ● Initial version had both being guessable and so potential targets for off-path attacks – Like TCP SYN flooding – Replay detection algorithm (sample) – Cookies (next slide)

LTP extensions ● Both header and trailer extensions allowed ● LTP authentication extension – Header: ciphersuite – Trailer: MAC/Signature ● LTP cookie extension – DoS would be very bad for a deep space host – Cookies aiming to protect against off-path attacks using a header extension, once turned on, only segments with cookie accepted

LTP status ● LTP specified in 3 drafts – draft-irtf-dtnrg-ltp-03.txtmain spec. – draft-irtf-dtnrg-ltp-motivation-01reasons for stuff – Draft-irtf-dtnrg-ltp-extensions-01extensions ● Main spec and motivation are just about ready for last call – Extensions a little later (sync. security stuff) ● At least two implementations I know of