Modelling and Analysis of the CES Protocol of H.245 Lin Liu and Jonathan Billington Computer Systems Engineering Centre University of South Australia.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
Primitives for Achieving Reliability 3035/GZ01 Networked Systems Kyle Jamieson Department of Computer Science University College London.
Introduction 1 Lecture 13 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
Intermediate TCP/IP TCP Operation.
Ensuring the Reliability of Data Delivery © 2004 Cisco Systems, Inc. All rights reserved. Establishing a TCP Connection INTRO v2.0—6-1.
CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
Chapter 7 – Transport Layer Protocols
UNIT 07 Process – to – Process Delivery: UDP,TCP and SCTP
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Sweep-line Analysis of DCCP Connection Management Somsak Vanit-Anunchai Jonathan Billington Guy Edward Gallasch 25 th October 2006.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
1 Computer Systems Engineering Centre University of South Australia An Abstract Model of Routing in Mobile Ad Hoc Networks Cong Yuan, Jonathan Billington,
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 Reliable Data Transfer. 2 r Problem: Reliability  Want an abstraction of a reliable link even though packets can be corrupted or get lost r Solution:
University of South Australia CPN’05 Oct Enhancing the CES Protocol and its Verification Lin Liu 1,2 and Jonathan Billington 2 1 School of Computer.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
Chapter 16 Stream Control Transmission Protocol (SCTP)
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
26-TCP Dr. John P. Abraham Professor UTPA. TCP  Transmission control protocol, another transport layer protocol.  Reliable delivery  Tcp must compensate.
University of the Western Cape Chapter 12: The Transport Layer.
3: Transport Layer 3a-1 8: Principles of Reliable Data Transfer Last Modified: 10/15/2015 7:04:07 PM Slides adapted from: J.F Kurose and K.W. Ross,
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Protocols Rules governing the communication process, the language of the deal between the devices, must reflect Layers protocols define format, order of.
Switching Techniques Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
Computer Networks with Internet Technology William Stallings
23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
3 June Paris Seminar Modelling and Analysis of TCP’s Connection Management Procedures Jonathan Billington and Bing Han Computer Systems Engineering.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
ECE 4110 – Internetwork Programming
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
Transport Layer: Sliding Window Reliability
1 FIT1005 Topic 6 - Data Link Layer Reference: Chapter 7 -Stallings.
Guide to TCP/IP Fourth Edition
4343 X2 – The Transport Layer Tanenbaum Ch.6.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
Data Link Layer. Data link layer The communication between two machines that can directly communicate with each other. Basic property – If bit A is sent.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 7 Data & computer.
Data Link Layer.
Performance Evaluation of L3 Transport Protocols for IEEE Richard Rouil, Nada Golmie and David Griffith National Institute of Standards and Technology.
B. R. Chandavarkar CSE Dept., NITK Surathkal
Process-to-Process Delivery, TCP and UDP protocols
Transport Layer Unit 5.
Process-to-Process Delivery:
CS412 Introduction to Computer Networking & Telecommunication
Dr. John P. Abraham Professor UTPA
CS4470 Computer Networking Protocols
Dr. John P. Abraham Professor UTPA
Circuit Switching Packet Switching Message Switching
Hongchao Zhou, Xiaohong Guan, Chengjie Wu
Presentation transcript:

Modelling and Analysis of the CES Protocol of H.245 Lin Liu and Jonathan Billington Computer Systems Engineering Centre University of South Australia

Background Part of an ongoing project on modelling and analysing Internet multimedia protocols with CPNs, which is focused on ITU-T recommendation H.323. H.323 is a key standard for multimedia communications over packet-based networks, e.g. the Internet. The CES protocol is a sub-protocol of ITU-T recommendation H.245, which is one of the core protocols of the H.323 standard. UniSA

Outline The CES protocol Modelling and analysis results of The CES protocol with a reliable transport medium The CES protocol with an unreliable transport medium Conclusion and future work UniSA

The CES Protocol The Capability Exchange Signalling (CES) protocol is used by a communication party to inform its peer of its multimedia receive and transmit capabilities. OK, John. Thank you. Hi Mary, I can only transmit and receive audio. UniSA

UniSA Primitives and messages in the CES entities Primitives and messages in the CES entities

UniSA The SDL diagrams of the CES protocol The SDL diagrams of the CES protocol

UniSA Example MSCs of the CES protocol Example MSCs of the CES protocol

UniSA Example MSCs of the CES protocol Example MSCs of the CES protocol

UniSA Example MSCs of the CES protocol Example MSCs of the CES protocol

The CES Protocol with Reliable Transport Medium The CES protocol is designed to be independent of the underlying medium. When the CES protocol is applied to an H.323 system, it is required by H.323 to operate over a reliable transport layer. A reliable transport layer must preserve sequence, be error-free, and provide flow controlled transmission of messages. UniSA

UniSA Basically, each SDL state transition is modelled as a CPN transition.Basically, each SDL state transition is modelled as a CPN transition. Each CES primitive is treated as an atomic event, so when two CES primitives are included in a single SDL state transition, they are modelled as two separate CPN transitions, and a temporary state is introduced.Each CES primitive is treated as an atomic event, so when two CES primitives are included in a single SDL state transition, they are modelled as two separate CPN transitions, and a temporary state is introduced. Modelling SDL state transitions with CPNs

UniSA The Incoming CESE SDL

UniSA Modelling the CES messages

The CPN model UniSA

The declaration node UniSA

The hierarchical CPN model (1) UniSA

UniSA The top level page

UniSA The Outgoing_CESE subpage

UniSA The Incoming_CESE subpage

UniSA The hierarchical CPN model (2)

UniSA The top level page

UniSA The Outgoing_Send subpage

UniSA The Outgoing_Receive subpage

UniSA The Incoming_Receive subpage

UniSA The Incoming_send subpage

This original model has an infinite state space.This original model has an infinite state space. We investigate the following two cases:We investigate the following two cases: Model AModel A The queue length of places forChannel and revChannel is set to 3;The queue length of places forChannel and revChannel is set to 3; Modulo 2 instead of modulo 256 arithmetic.Modulo 2 instead of modulo 256 arithmetic. Model BModel B The number of times that transition TRANSFERreq occurs is limited to 2;The number of times that transition TRANSFERreq occurs is limited to 2; Modulo 2 instead of modulo 256 arithmetic.Modulo 2 instead of modulo 256 arithmetic. UniSA Analysis restrictions Analysis restrictions

The state space for Model A !!!!UniSA

The Occ graph (part) of Model A of Model A UniSA

UniSA The CES protocol can fail if wrapping of sequence numbers happens when there are n outstanding acknowledgments for modulo n arithmetic.

Two transitions should be dead when the transport medium is reliable, but they are not. The CES protocol can fail if wrapping of sequence numbers happens when there are n outstanding acknowledgments for modulo n arithmetic. This protocol could work properly if there are n outstanding acknowledgments, for modulo n arithmetic, then do not send a TerminalCapabilitySet message, set timer and report problem instead. Conclusion for Model A UniSA

The state space report for Model B UniSA

The full Occ graph of Model B UniSA

UniSA Desired terminal state and successful capability exchanges

Proper termination of exchanges and discard of expired messages UniSA

Transitions REJECTindUin and TRANSFERindT are dead transitions under the assumption of Model B. When the wrapping of sequence numbers (modulo 2) while there are 2 outstanding acknowledgments (i.e. not yet received by the outgoing CESE) does not occur, this protocol can carry out the capability exchange properly. An induction proof is needed to generalise these conclusions for arbitrary modulo arithmetic. Conclusion for Model B UniSA

The CES Protocol with Unreliable Transport Medium An unreliable transport layer may have message loss, duplication, and the ordering of the messages sent may not be preserved. We assume that each message can only be duplicated once at most. UniSA

The CPN model UniSA

The state space report Counter with limit 2Counter with limit 2 Modulo 2 arithmetic UniSA

UniSA REJECTindUin & TRANSFERindT can occur

UniSA Proper terminal states and successful capability exchanges

UniSA Inefficient behaviour

When the transport medium is unreliable, this protocol can work, but it may be inefficient. Conclusion for the Unreliable Medium Case UniSA

Conclusion Complete CPN models of the CES protocol have been created, providing a rigorous specification of the CES protocol. No matter whether the underlying medium is reliable or not, the CES protocol can fail if wrapping of sequence numbers happens when there are n outstanding acknowledgments for modulo n arithmetic. If the problem with sequence number wrap can be avoided, then when the transport layer is unreliable, the CES protocol may be inefficient. UniSA

Next step: verify the CES protocol against the service specification. We have created a complete and general CES service specification (with CPNs) and currently are working on generating the CES service language from this service model. Future work includes investigations of other parts of H.323, based on the experience and methodology gained from this pilot study. UniSA Future Work

UniSA