A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel.

Slides:



Advertisements
Similar presentations
Presenter: Anika Aziz National Institute of Informatics (NII), The Graduate University for Advanced Studies, Tokyo, Japan.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
OSI Model OSI MODEL.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
S. Burleigh, A. Hoke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, H. Weiss An approach to Interplanetary Internet Presented by Fabián E. Bustamante.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
1 6/14/ :27 CS575Internetworking & Routers1 Rivier College CS575: Advanced LANs Chapter 13: Internetworking & Routers.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
CS 268: Lecture 2 (Layering & End-to-End Arguments)
Protocols and the TCP/IP Suite
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Data and Computer Communications
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Switching Techniques Student: Blidaru Catalina Elena.
Data Communications and Networking
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Active Network Applications Tom Anderson University of Washington.
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
CS 268: Lecture 3 (Layering & End-to-End Arguments)
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Protocols and the TCP/IP Suite
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
10/8/2015CST Computer Networks1 IP Routing CST 415.
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
Paper Group: 12 Data Transport in Challenged Networks Above papers are original works of respective authors, referenced here for academic purposes only.
The OSI Model.
Protocols Rules governing the communication process, the language of the deal between the devices, must reflect Layers protocols define format, order of.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
A Delay-Tolerant Network Architecture for Challenged Internets
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
TCP/IP Protocol Architecture CSE 3213 – Fall
Routing and Routing Protocols
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Protocol Layering Chapter 11.
Or Sheffet Nov. 5 th, 2010 A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture.
Mobile IP 순천향대학교 전산학과 문종식
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
Networking Devices.
A Delay-Tolerant Network Architecture for Challenged Internets
A Delay-Tolerant Network Architecture for Challenged Internets
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Computer Networking A Top-Down Approach Featuring the Internet
Anup K.Talukdar B.R.Badrinath Arup Acharya
Presentation transcript:

A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel

Internet Service Model  TCP/IP based  End to end IPC using concatenation of potentially dissimilar link layer technologies  Packet-switched model of service  A number of key assumptions…

Key Assumptions  Assumptions  End to end path exists b/w data source and its peer(s)  Maximum RTT b/w any node pairs is not excessive  End to end packet drop probability is low  A class of challenged networks violate one or more of the assumptions

Examples of challenged networks  Terrestrial Mobile Networks  Unexpectedly partitioned due to node mobility, changes in signal strength etc.  Exotic Media Networks  High latencies with predictable interruption, suffer outage due to environmental conditions etc.  Military Ad-hoc Networks  Hostile environments  Mobility, environmental factors, or intentional jamming may cause disconnection  Data traffic competing for bandwidth

Characteristics of these networks  Path and Link characteristics  High latency, low data rate  Disconnection  Long queuing times  Network Architectures  Interoperability considerations  Security  End system characteristics  Limited longevity  Low duty cycle operation  Limited resources

Adapt Internet to these environments?  Link-repair approaches  Engineer problem links to appear more similar to the types of links for which TCP/IP was designed  “fool” the internet protocols: strive to maintain end-to-end reliability etc.  Attach these networks to the edge of the Internet  Use of a special proxy agent  Provides access to and from challenged networks from the Internet  No support for using such networks for data transit

Link repair approaches  In-network entities (“middle boxes”)  Performance Enhancing Proxies (PEPs) & protocol boosters  Contain state necessary for connection violating the Internet fate sharing principles  Confound end-to-end diagnostics and reliability, increase system complexity if mobility is frequent  Pose a significant challenge for end-to-end security mechanisms

Application Layer proxies  Provide specialized Internet-to-”special network” name mapping & protocol translation  Used at the edge of special networks  Disadvantage: their specificity  Either respond to a specialized set of commands or act as raw data conduits  Limit the ability to re-use proxies for different applications  Fail to take advantage of special resources (storage, processing capabilities etc.)

Electronic Mail  Asynchronous message delivery system  Provides an abstraction that comes close to addressing many problems  Flexible naming, asynchronous message-based operation etc.  Falls short  Lack of dynamic routing  Weakly defined delivery semantics  lack of consistent API

What’s the most desirable framework?  A network service and API providing non-interactive messaging  System should combine some overlay routing capability (such as in P2P systems) with delay-tolerant and disconnection-tolerant properties of e- mail

Delay Tolerant Message Based Overlay Architecture  Based on abstraction of message switching  Message aggregates known as “bundles”  Routers that handle them are called “bundle forwarders” or DTN gateways  Architecture provides a store-and-forward gateway function between various network architectures

Regions and DTN gateways  Two nodes are in the same region if they can communicate without using DTN gateways  DTN gateway  Point through which data must pass in order to gain entry to a region  Can serve as a basis for both translation and well as a point to enforce policy and control

Name Tuples  Identifiers for objects or groups of objects  DTN name tuple {Region Name, Entity Name}  First portion is a globally unique, hierarchically structured region name  Interpreted by DTN gateways to find the path(s) to one or more DTN gateways at the edge of the specified region  Second portion identifies a name resolvable within the specified region  Need not be unique outside the region

Name resolution  Only region identifier is used for routing a message that is in transit across a collection of regions  Entity name information is locally interpreted in the destination region  Form of late binding

A Postal Class of Service  Priority based resource allocation  Adopt a subset of the types of services provided by US Postal Service  Attractive characteristics  Low, ordinary and high priority delivery  Return receipt, delivery records

Path Selection and Scheduling  Architecture targeted at networks where an end-to-end path can’t be assumed to exist  Routes are comprised of a cascade of time- dependent contacts (communication opportunities)  Particular details of path selection and scheduling - heavily influenced by region- specific routing protocols and algorithms

Custody Transfer and Reliability  Custody transfer: acknowledged delivery of a message from one DTN hop to the next and corresponding passing of reliable delivery responsibility.  End hosts do not ordinarily need to keep a copy of data that has been custodially transferred to a DTN next hop  Custody transfer can be viewed as a performance optimization for end-to-end reliability that involves endpoint movement

Convergence Layers and Retransmission  Facilities provided by transport protocols in use within the regions may vary significantly  Bundle forwarding assumes underlying reliable delivery capability with message boundaries when performing custody transfer  Transport protocols lacking these features must be augmented  Include transport-protocol-specific convergence layers

Time Synchronization  Coarse Level  Identifying message fragments  Purging messages that have exceeded their source specified lifetimes  Stringent constraints  Scheduling, path selection  Congestion management

Security  Verifiable access to the carriage of traffic at a particular class of service  Avoid carrying traffic potentially long distances that is later found to be prohibited  Each message includes an immutable “postage stamp” containing  Verifiable identity of sender, an approval, class of service etc.  Credentials checked at each DTN hop by routers; use of public key cryptography

Congestion and Flow Control  Flow control: limiting the sending rate of a DTN node to its next (DTN) hop  Attempt to take advantage of underlying protocols’ mechanisms  Congestion control: handling of contention for the persistent storage of a DTN gateway  Shared priority queue for allocating custody storage

Application Interface  Applications must be careful not to expect timely responses  Must be capable of operating in a region where a request/response RTT may exceed the longevity of the client and server processes  Structured to continue operating in the face of reboots or network partitioning as much as possible

Conclusion  Design embraces notion of message switching with in-network storage & retransmission, late-binding of names & routing tolerant of network partitions  Puts forth several design decisions worthy of consideration

Questions?