Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully.

Slides:



Advertisements
Similar presentations
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Advertisements

William Stallings Data and Computer Communications 7th Edition
CCNA – Network Fundamentals
OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
Chapter 7 – Transport Layer Protocols
Document Exchange Protocol Service Management Validation (message correlation) Service Management Validation (message correlation) invoker updates data.
Chapter 5 Network Security Protocols in Practice Part I
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Folie 1 Service Oriented Architecture - Prototyping study - DLR/GSOC Author: S.Gully.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1 6/22/ :39 Chapter 9Fiber Channel1 Rivier College CS575: Advanced LANs Chapter 9: Fibre Channel.
Internet Networking Spring 2003
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Gursharan Singh Tatla Transport Layer 16-May
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Transport Layer Computer Networks. 2 Where are we?
1 SSDG Connector Overview. 2 Applications Connectors SSDG SSDG Stack Service Access Providers (SAP) or Service providers (SP)‏ Implemented by IA Consultancy.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
Presentation on Osi & TCP/IP MODEL
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Data Link Control Protocols
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
James Holladay, Mario Sweeney, Vu Tran. Web Services Presentation Web Services Theory James Holladay Tools – Visual Studio Vu Tran Tools – Net Beans Mario.
Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network.
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
University of the Western Cape Chapter 12: The Transport Layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Computer Emergency Notification System (CENS)
(Business) Process Centric Exchanges
MESSAGE ORIENTED MODEL (MOM). Slide 2CITE 4420 Message Oriented Model Message-Oriented Model (MOM)
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Data Communications and Networks
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
1 Transmission Control Protocol (TCP) RFC: Introduction The TCP is intended to provide a reliable process-to-process communication service in a.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Chapter 4 Introduction to Network Layer
THE OSI MODEL By: Omari Dasent.
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
TCP Transport layer Er. Vikram Dhiman LPU.
Chapter 4 Introduction to Network Layer
CPEG514 Advanced Computer Networkst
OSI Model OSI MODEL.
Changes to SAE State Machine
Transport Layer 9/22/2019.
Presentation transcript:

Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 2 Idea Use the SM&C MAL as underlying communication service in the SM Document Exchange protocol Document Exchange Protocol SM&C MAL ?

Folie 3 Req.Nr.RequirementMAL compliance UCS The underlying communication service shall be reliable – that is, the underlying communication service must ensure that every document sent from a communication entity is actually delivered to the destination communication entity. compliant UCS The underlying communication service shall authenticate the Network Source of each document carried by the service and validate that the Network Source is permitted to send documents to the Network Destination. NOTES 1.As used in this Recommended Standard, Network Source and Network Destination refer to the SM entities as they are known to the underlying communication service. 2.The format of the identification of the Network Source and Network Destination within the underlying communication technology is dependent upon that technology. 3.References [18], [19], and [20] specify the security mechanisms for authentication, data privacy, and data integrity that are recommended for use when the SCCS-SM documents are encoded as XML documents References [18], [19], and [20] specify the security mechanisms for authentication, data privacy, and data integrity that are recommended for use when the SCCS-SM documents are encoded as XML documents compliant (Directory + Login services) UCS Documents for which the Network Source cannot be authenticated and recognized shall be discarded by the communication service. NOTE -There is no requirement on the underlying communication service to notify the Network Source when a document is dropped because of failure to authenticate the Network Source or recognize it on behalf of the intended Network Destination. Only when the underlying communication service authenticates the Network Source and recognizes it as a legitimate Network Source for the intended Network Destination does it deliver the document to the Network Destination compliant Requirements (1/2)

Folie 4 Requirements (2/2) Req.Nr.RequirementMAL compliance UPS The underlying communication service shall supply the authenticated identity of the Network Source of the document to the SM document exchange protocol. NOTE -As specified in 3.3 the SM document exchange protocol uses that authenticated identity for the purposes of (a) verifying the authority of the SM entity located at the Network Source to issue documents in the context of the Service Agreement that is identified in the message, and (b) allowing the document exchange protocol and the SCCS-SM applications that use it to know where to send responses, if necessary. compliant MPS The underlying communication service shall provide the ability for an SM entity to send documents to two logically separate ports on a peer SM entity. These logically separate ports, the SM message set port and the SM exception response port, are used by the document exchange protocol to separate SM operation message traffic from protocol exception reporting traffic. not compliant (MAL has only 1 address / end point) Solution: SM Service must implements virtual ports A (send/receive request/response) and port B (send / receive Error) as a layer over the MAL

Folie 5 Document Exchange Protocol Sequence Diagram SM Service must implement check and send exception response SM Service must implement check and send exception response SM Service must implement check and send exception response

Folie 6 Message structure The MessageSet / Message structure should map the following class structures. SmMessageSet Class Diagram SM Service must define the SmMessageSet as „data“ part of the MAL messages

Folie 7 Document Exchange - Two phase Operation Procedure Pattern The two-phase operation procedure pattern begin with the Invoker sending an operation invocation message. The performer starts a timer and return a successfulReturn if he can perform the invocation under time or a FailedReturn / FailedReturnWithDenial if not. SM Service must manage the timer SM Service should use a MAL REQUEST IP: -REQUEST contains the invocation -RESPONSE contains the Sucess- fullReturn, FailedReturn or Failed- ReturnWithDenial -RESPONSE ERROR could be send in case of an exception error

Folie 8 MAL – REQUEST Interaction Pattern ? What is about a Return message that generates an exception ???

Folie 9 Document Exchange - Three phase Operation Procedure Pattern The three-phase operation procedure pattern begin with the Invoker sending an operation invocation message. The performer estimate how long it will take to process the operation, starts a timer and return an acknowledgeReturn containing the time estimation information “expectedDispositionTime”. The Invoker starts a timer upon receiving the acknowledge and wait for a return. The Performer performs the invocated operation it possible and return a sucessfullReturn, or returns a failedReturn/failedReturnWithDenial if the operation could not be preformed or the timer ran out before. SM Service must manage the performer and invoker timers SM Service should use a MAL INVOKE IP to map this operation: -INVOKE contains the invocation -ACK contains the acknowledgement -ACK ERROR could be sent in case of an exception error -RESPONSE contains the Sucess- fullReturn, FailedReturn or Failed- ReturnWithDenial -RESPONSE ERROR could be send in case of an exception error

Folie 10 MAL – INVOKE Interaction Pattern ? What is about an Acknowledge or Return message that generate an exception ???

Folie 11 Document Exchange - Notify Operation Procedure Pattern The notify operation procedure begin with the Notifier sending a notification message. The Recipent should then confirm to the Notifier that the notification has been received by sending a confirmation message. SM Service must manage the notifier and recipient timers SM Service should use a MAL REQUEST IP to map this operation: -REQUEST contains the notification -RESPONSE contains the confir- mation -RESPONSE ERROR could be sent in case of an exception error

Folie 12 MAL – REQUEST Interaction Pattern ? What is about a Confirmation message that generatess an exception ???

Folie 13 Other Solution – use MAL SUBMIT IP for each send message Each send message operation should use the MAL SUBMIT IP: -SUBMIT contains the sended message -ACK is not used -ERROR could be send in case of an exception error SM Service have to define the two-phase, three-phase and notifica- tion operations as multiple MAL SUBMIT IPs and implement the operation flow control !!!

Folie 14 Conclusion Using the SM&C MAL as underlying communication service in the SM Document Exchange protocol is possible. A “Document Exchange Service Layer” should be developed, that implement the following features, common to all SM service operations: 1) Use a MAL SUBMIT IP for sending each message / messageSet: The SUBMIT message will contain the message/messageSet -> this will arrive to a virtual “message port” The ACK message will not be used The ACK ERROR message will contain the exception responses -> this will arrive to a virtual “exception port” 2) Take the SmMessageSet for the “data part” of the MAL message 3) Implement the syntax validation + increment number check + notification check on each message 4) Generate and take care of the timer(s) 5) Build and control the 2-phase, 3-phase and notification operation procedure patterns Based on that “Document Exchange Service Layer”, SM services can be defined that correspond to the Service Package, Configuration Profile, Trajectory Prediction and Service Agreement operations.