Interplanetary Networking Issues Dai Stanton DTN working Group Input October 2009.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
CCSDS Cross Support Services Issue 0.1 October, 2008 Takahiro Yamada, JAXA/ISAS Peter Shames, NASA/JPL.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Jaringan Komputer Lanjut Packet Switching Network.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
End-to-End Arguments in System Design J.H. Saltzer, D.P. Reed and D.D Clark M.I.T. Laboratory for Computer Science Presented by Jimmy Pierce.
Semester Copyright USM EEE442 Computer Networks Internetworking En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Lect-1: IntroductionComputer Networks : An Introduction to Computer Networks Handout #1: Introduction Additional Reading Text book: Chaps.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
G O D D A R D S P A C E F L I G H T C E N T E R 1 The Trade Between CCSDS and HDLC Framing on Global Precipitation Measurement David Everett and Jonathan.
Switching Techniques Student: Blidaru Catalina Elena.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
2004 International Telemetering Conference20 October CCSDS FILE DELIVERY PROTOCOL INTER-IMPLEMENTATION TESTING FINAL REPORT TESTING OF A DTN PROTOCOL.
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
SIS_DTN 1 SIS-DTN Forward Planning October 2013 San Antonio Fall 2013.
Glenn Research Center Networks & Architectures Branch Communications Technology IETF73 - IRTF DTNRG Meeting November Space-based DTN Low Earth Orbit.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
© 2009 The MITRE Corporation. All rights reserved. Joint DTN / SOIS Meeting April 22, 2009 Colorado Springs, CO.
International Workshop on Satellite and Space Communications 2009, IWSSC 2009, 9-11 September 2009, Siena, Italy Evaluation of CCSDS File Delivery Protocol.
1 In-Space Cross Support Using Delay / Disruption Tolerant Networking Keith Scott 15 October, 2008 Berlin, Germany October 15, 2008.
1 DATE SIS-DTN WG Meeting October 16, 2008 Berlin, Germany.
SISG - SSI ADD Service, Physical, and Protocol View Document Figures Ver 0.4, 2 Sept 09 Peter Shames, et al.
Paper Group: 12 Data Transport in Challenged Networks Above papers are original works of respective authors, referenced here for academic purposes only.
June 2004 SIW-4 - IP in Space Implementation Guide 1 Handbook for Using IP Protocols for Space Missions James Rash - NASA/GSFC Keith Hogie, Ed Criscuolo,
Delay-Tolerant Networking (DTN)
Page No. 1 Kelvin Nichols Payload Operations and Integration Center EO50 Delay Tolerant Networking (DTN) Implementation on the International Space Station.
10-Dec-2012-cesg-1 Presentation to ESTEC NH Conference Centre, Nordwijkerhout, Netherlands Hosted by ESA/ESTEC 8 April 2014 CCSDS Space Internetworking.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
V. Tsaoussidis, DUTH – Greece
SIS-DTN WG Meeting Thursday Afternoon
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
CCSDS Security WG meeting October 2008, hosted by DLR at DIN premises (Berlin) 1 Data Link Security BOF An ESA contribution on Lessons Learned and Issues/Questions.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ESA UNCLASSIFIED – For Official Use Network Layer Security - Food for Thought D. Fischer, I Aguilar-Sanchez CCSDS Fall Meetings.
Outline Motivation Protocol Terminology Implementation architecture SDNV Addressing scheme Bundle format Primary block Generic Block Processing Bundle.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Outline Introduction Existing solutions for ad hoc
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
1 CCSDS Security Working Group Spring Meeting Colorado Springs Security Architecture January 19 th 2007.
CSTS File Transfer Service CS File Transfer Specification – Initial Discussions IOAG Service Catalogue #1 Scope Candidate Applications File Content.
CCSDS Fall Meeting at ESTEC
1. Layered Architecture of Communication Networks: OSI Reference Model.
The CCSDS Cislunar Communications Architecture Keith Scott The MITRE Corporation CCSDS Meeting January 2007.
20 November 2008 SB-1 First Look at the Deep Impact DTN Experiment (DINET) Scott Burleigh Jet Propulsion Laboratory California Institute of Technology.
NASA MSFC Mission Operations Laboratory MSFC NASA MSFC Mission Operations Laboratory Ku - Band, DTN, and enhanced payload utilization.
BITTT—Beijing Institute of Tracking and Telecommunications Technology
CCSDS Security Working Group Application Layer Security Discussion Mike Pajevski NASA/JPL October 2008.
17 November Asynchronous Message Service (1 of 3) In addition to file transfer, event-driven asynchronous message exchange may also be useful for.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
K. Salah1 Security Protocols in the Internet IPSec.
Reliability further points for discussion prepared for discussion at the IRTF Delay-Tolerant Networking session IETF 73, Minneapolis, November draft-irtf-dtnrg-bundle-checksum.
Page No. 1 Overview Kelvin Nichols Payload Operations and Integration Center EO50 SSCN Delay Tolerant Networking (DTN)
KM SDLS Extended Procedures YB
The CCSDS Security WG is chartered to:
Delay-Tolerant Networking (DTN)
Interplanetary Networking Issues
Delay-Tolerant Networking for CisLunar Operations
Service, Physical, and Protocol View Document Figures
Understand the OSI Model Part 2
DTN Bundle Protocol on the IETF Standards Track
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Chapter 3: Open Systems Interconnection (OSI) Model
Presentation transcript:

Interplanetary Networking Issues Dai Stanton DTN working Group Input October 2009

ESA Requirements From recent studies: – ESA Mission Operations personnel have a strong requirement to manage queues in relay/intermediate nodes based on application layer content. E.g. Deleting or reordering the forwarding of individual files. This is because, unlike IP networks, mission circumstances may change whilst data is in transit. – Pre-emption is required at file level. – The interface between ESA mission and other users (e.g. PIs, POCC) must include an application layer safety firewall in the forward direction. – Direct TM/TC capability is always required at orbiter/lander interface. – Requirement for reliable downlink to POCCs with NAKS routed through MCC.

Requirements Implications Issues: – Disassociation of the DTN bundles from their application semantics means that, at relaying nodes, it is not possible to perform operations based on these semantics such as deleting data, re-ordering queues, pre-empting transmission or resolving resource conflicts. – In CFDP it is possible to identify which PDUs are associated with, for instance, which command file at all points in the transmission path. Implications: – Active application layer intervention is always needed at orbiter relay for direct TM/TC. – Active application layer intervention is always needed at MCC for safety firewall. – Active application layer intervention is always needed at all disjoint relays for content based queue management. – Active application layer intervention needed to integrate POCC NAKs into command stream. Conclusion: – Planetary Internetworking operations cannot be fulfilled purely by a network layer protocol.

DTN Advantages over Current Protocols DTN Advantages: – Consideration of security aspects such as authentication, confidentiality and data integrity; – Dynamic and static routing capabilities for rapidly reconfiguring networks; – Reactive fragmentation to use alternative onward relaying paths as they become available; – Integrated universal addressing applicable to all data types; However.... – Security can be added to CFDP by external mechanism; – Dynamic routing is not seen as a requirement in the foreseeable future; – Pro-active fragmentation at source is sufficient to cope with predictable orbital disruption; – Universal addressing is also inherent in CFDP and thus not an issue if we move to file based operations.

Regarding Earth Station Networks Commitment of data to an Earth Station would need to take account of the spacecraft visibility to the ES with sufficient margin to account for an unknown retransmission volume or risk data being held up at the station until the next contact. Earth station links to the MCC should be inherently available and treating them as subnetwork layer resources avoids this problem. There is no advantage in treating ES as custody transfer nodes and there is a big disadvantage with committing data, via CFDP or DTN, to a non-disjoint resource.

DTN Service and Application Layer Responsibilities BP provides a reliable data transfer service. However there are no guarantees on when or in which order data will arrive. It is therefore left to the user to provide additional sequencing mechanisms. BP gives no indication of data completeness or duplication deletion. It is up to the user application to provide mechanisms to decide whether at any point in a data set/stream, all previous data has been received and to detect and delete duplicate data. Dealing with these aspects in the end applications on and end-to- end, rather than hop-by hop, basis may prove costly in terms of risk, delay and efficiency. The GB, or indeed RFC5050, does not clearly define these service characteristics or perform any analysis of the end-to-end implications of the service. IP is designed to work in conjunction with transport layer and above protocols to provide a useable service to applications. DTN currently does not address these issues in a holistic manner.

Operating CFDP over DTN DTN architecture includes CFDP in end systems to provide filestore/user interfaces. How do fragmentation mechanisms in CFDP and in BP interact? Which class of CFDP? Class 1 does not provide confirmation but Class 2 incorporates retransmission which may adversely interact with BP reliability. Does DTN work over a service with the characteristics in the previous slide?

Conclusions Deployment of a Space Internetworking layer analogous to IP is superficially attractive. However: this cannot occur without consideration of the functionality and feasibility of accompanying protocols to provide a usable service; operational requirements mitigate against a simplistic solution when in-transit data may need to be manipulated, safety firewalls need to be put in place, direct TM/TC is required and end-to-end interaction between e.g. payload and POCC needs to be controlled. Consideration of these aspects is not evident in the Green Book or in the RFCs. All envisaged ESA internetworking requirements can be fulfilled using existing CCSDS recommendations.

Current Interplanetary Networking using existing CCSDS Standards

Proposed Interplanetary Networking Using DTN