CASP – Cross- Application Signaling Protocol Henning Schulzrinne August 27, 2002.

Slides:



Advertisements
Similar presentations
Internet Area IPv6 Multi-Addressing, Locators and Paths.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 Overview Brent Frye EECS710. Overview Google Drive Microsoft Cloud Drive Dropbox Paid-for alternatives 2.
1 IPv6. 2 Problem: 32-bit address space will be completely allocated by Solution: Design a new IP with a larger address space, called the IP version.
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Laboratório de Teleprocessamento e Redes1 Unix Network Programming Prof. Nelson Fonseca
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5-1 Internet Protocol (IP): Packet Format, Fragmentation, Options Shivkumar Kalyanaraman Rensselaer.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
CASP – Future Work Plans and Ideas Henning Schulzrinne & LQS team August 27, 2002.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Telcordia - June 21, Internet data-plane signaling - revisiting RSVP Henning Schulzrinne Dept. of Computer Science Columbia University
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Multicast Communication
Trade-offs and open issues with path discovery and transport or not all requirements are orthogonal… Henning Schulzrinne Columbia University
5/12/05CS118/Spring051 A Day in the Life of an HTTP Query 1.HTTP Brower application Socket interface 3.TCP 4.IP 5.Ethernet 2.DNS query 6.IP router 7.Running.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
The Design Space for NSIS Signaling Protocols Henning Schulzrinne Columbia University NSIS working group interim meeting February 2003,
Summary of Certification Process (part 1). IPv6 Client IPv6 packets inside IPv4 packets.
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. IP version 6 Asst. Prof. Chaiporn Jaikaeo,
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Modest networking Henning Schulzrinne Columbia University MIND Workshop – London, Oct. 7, 2002 Keynote Address Joint work with Maria Papadopouli Hannes.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
NTLP Design Considerations draft-mcdonald-nsis-ntlp-considerations-00.txt NSIS Interim Meeting – Columbia University February 2003.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Teacher:Quincy Wu Presented by: Ying-Neng Hseih
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Transport Protocols.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
EE 122: Integrated Services Ion Stoica November 13, 2002.
SIP questions Henning Schulzrinne Columbia University IRT Lab Siemens Munich -- January 2003.
Label Distribution Protocols LDP: hop-by-hop routing RSVP-TE: explicit routing CR-LDP: another explicit routing protocol, no longer under development.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Network Layer Security Network Systems Security Mort Anvari.
CSCI 465 D ata Communications and Networks Lecture 25 Martin van Bommel CSCI 465 Data Communications & Networks 1.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
IPSecurity.
Chapter 18 IP Security  IP Security (IPSec)
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Long-haul Transport Protocols
IPv6 / IP Next Generation
Magda El Zarki Professor, ICS UC, Irvine
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Guide to TCP/IP Fourth Edition
Anup K.Talukdar B.R.Badrinath Arup Acharya
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
Fred Kuhns Applied Research Laboratory
Computer Networks Protocols
NTLP strawman draft-schulzrinne-gimps
Internet Protocol version 6 (IPv6)
Presentation transcript:

CASP – Cross- Application Signaling Protocol Henning Schulzrinne August 27, 2002

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 2 Overview Protocol properties Message delivery Transport protocol usage Message forwarding Message format Next-hop discovery –Scout protocol Mobility and route changes Protocol heritage

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 3 What is CASP? Generic signaling service –establishes state along path of data –one sender, typically one receiver can be multiple receivers  multicast –can be used for QoS per-flow or per-class reservation –but not restricted to that avoid restricting users of protocol (and religious arguments): –sender vs. receiver orientation –more or less closely tied to data path router-by-router network (AS) path

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 4 CASP network model – on-path CASP nodes form CASP chain not every node processes all client protocols: –non-CASP node: regular router –omnivorous: processes all CASP messages –selective: bypassed by CASP messages with unknown client protocols QoS midcom QoS selective omnivorous CASP chain

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 5 CASP network model – out-of-path Also route network-by-network can combine router-by-router with out-of-path messaging AS 1249 AS15465 AS17 Bandwidth broker NAC CASP data

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 6 CASP protocol structure client layer does the real work: –reserve resources –open firewall ports –… messaging layer: –establishes and tears down state –negotiates features and capabilities transport layer: –reliable transport client layer (C) messaging layer (M) transport layer (T) scout protocol UDP IP router alert messaging layer (M)

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 7 CASP messages Regular CASP messages –establish or tear down state –carry client protocol Scout messages –discover next hop Hop-by-hop reliability Generated by any node along the chain

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 8 CASP transport protocol usage Most signaling messages are small and infrequent but: –not all applications  e.g., mobile code for active networks –digital signatures –re-"dialing" when resources are busy Need: –reliability  to avoid long setup delays –flow control  avoid overloading signaling server –congestion control  avoid overloading network –fragmentation of long signaling messages –in-sequence delivery  avoid race conditions –transport-layer security  integrity, privacy This defines standard reliable transport protocols: –TCP –SCTP Avoid re-inventing wheel  see SIP experience

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 9 CASP transport protocol usage One transport connection  many M- & C-layer sessions may use multiple TCP/SCTP ports can use TLS for transport-layer security –compared to IPsec, well-exercised key establishment –not quite clear what the principal is re-use of transport  –no overhead of TCP and SCTP session establishment –avoid TLS session setup –better timer estimates –SCTP avoids HOL blocking

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 10 Message forwarding Route stateless or state-full: –stateless: record route and retrace –state-full: based on next-hop information in CASP node Destination: –address  look at destination address –address + record  record route –route  based on recorded route –state forward  based on next-hop state –state backward  based on previous-hop state State: –no-op  leave state as is –ADD  add message (and maybe client) state –DEL  delete message state

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 11 Message format No M-layer distinction between requests and responses –just routed in different directions –client protocol may define requests and responses Common header defines: –destination flag –state flag –session identifier –traffic selector: identify traffic "covered" by this session –message sequence number –response sequence number –message cookie  avoid IP address impersonation –origin address  may not be data source or sink –destination address or scope common headerextensionsclient protocol data

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 12 Message format, cont'd Limit session lifetime Avoid loops  hop counter Mobility: –dead branch removal flag –branch identifier Record route: gathers up addresses of CASP nodes visited Route: addresses that CASP message should visit

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 13 Capability negotiation CASP has named capabilities –including client protocols Three mechanisms: –discovery: count capabilities along a path "10 out of 15 can do QoS" –record: record capabilities for each node –require: for scout message, only stop once node supports all capabilities (or-of-and) avoid protocol versioning

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 14 Next-hop discovery Next-in-path service –enhanced routing protocols  distribute information about node capabilities in OSPF –routing protocol with probing –service discovery, e.g., SLP –first hop, e.g., router advertisements –DHCP –scout protocol Next AS service –touch down once per autonomous system (AS) –new DNS name space: ASN.as.arpa, e.g., 17.as.arpa –use new DNS NAPTR and SRV for lookup similar to SIP approach

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 15 Next-hop discovery scout messages are special CASP messages limited < MTU size addressed to session destination UDP with router alert option  get looked at by each router reflected when matching CASP node found next IP hop CASP aware? existing transport connection? use scout to find next CASP hop establish transport connection N Y N Y done

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 16 Mobility and route changes avoids session identification by end point addresses avoid use of traffic selector as session identifier remove dead branch discovers new route on refresh ADD B=2 DEL (B=2) B=1

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 17 The weight of CASP CASP state = transport state + CASP M-state + client state M-state = two sockets transport state = O(100) bytes  10,000 users consume 1 MB

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 18 Conclusion CASP = unified infrastructure for data-affiliated sessions avoid making assumptions except that sessions wants to "visit" data nodes or networks not just mobility, but also mobility protocol framework in place –but need to work out packet formats

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 19 CASP properties Network friendly –congestion-controlled –re-use of state across applications transport neutral –any reliable protocol –initially, TCP and SCTP policy neutral –no particular AAA policy or protocol –interaction with COPS, DIAMETER needs work soft state –per-node time-out –explicit removal extensible –data format –negotiation

© Siemens, 2001ICM templ-1-o-example.ppt 12/07/2001Page 20 CASP properties, cont'd. Topology hiding –not recommended, but possible Light weight –implementation complexity –security associations (re-use) –may not need kernel implementation