Congestion Safety Changes and Issues draft-ietf-sip-congestsafe-01.

Slides:



Advertisements
Similar presentations
Communication Service Identifier Requirements on SIP draft-loreto-3gpp-ics-requirements.txt
Advertisements

CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Network Layer Packet Forwarding IS250 Spring 2010
IP Basics. Physical Link Network IP ARP ICMP RoutingTables.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
IP Basics. IP encapsulates TCP IP packets travel through many different routers (hops) before reaching it’s destination MTU variation at the physical.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
TCP/IP Basics A review for firewall configuration.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
A question of protocol Geoff Huston APNIC 36. Originally there was RFC791: “All hosts must be prepared to accept datagrams of up to 576 octets (whether.
TCP/IP Web Design & Layout January 23, TCP/IP For Dummies  The guts and the rules of the Internet and World Wide Web. A set of protocols, services,
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Internet Control Message Protocol (ICMP)
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part XI Internetworking Part 2.4 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 4 Introduction to Network.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
Transport Layer: TCP and UDP. Overview of TCP/IP protocols Comparing TCP and UDP TCP connection: establishment, data transfer, and termination Allocation.
Protocols Rules governing the communication process, the language of the deal between the devices, must reflect Layers protocols define format, order of.
Switching Techniques Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
 Circuit Switching  Packet Switching  Message Switching WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 21 Internetworking Part 2 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
The Internet Protocol Dr. Adil Yousif. 2  IP (Internet Protocol) is a Network Layer Protocol. Orientation.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
E Multimedia Communications Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore – , India Multimedia.
CS 4396 Computer Networks Lab
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
SIP working group IETF#70 Essential corrections Keith Drage.
Requirements for Peer protocol draft-jiang-p2psip-peer-protocol-requirement-00.txt Jiang XingFeng (Johnson) P2PSIP WG, IETF #68.
RFC3261 (Almost) Robert Sparks. SIPiT 10 2 Status of the New SIP RFC Passed IETF Last Call In the RFC Editor queue Author’s 48 hours review imminent IMPORTANT:
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
SIP Congestion Safety Open Issues. Background SIP over UDP uses retransmissions timers within each transaction with exponential backoffs to provide reliability.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP - The Internet Protocol
sip-identity-04 Added new response codes for various conditions
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
Transcoding Framework
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
IP - The Internet Protocol
IP - The Internet Protocol
I. Basic Network Concepts
IP Encapsulation, Fragmentation, and Reassembly
Chapter 20 Network Layer: Internet Protocol
Transcoding Framework
IP - The Internet Protocol
Jiang XingFeng (Johnson) P2PSIP WG, IETF #68
Net 323 D: Networks Protocols
IP - The Internet Protocol
IP - The Internet Protocol
Revisiting Path Switch
32 bit destination IP address
draft-venaas-bier-mtud-01
Presentation transcript:

Congestion Safety Changes and Issues draft-ietf-sip-congestsafe-01

Background SIP can use UDP, and a proxy can switch from TCP/SCTP to UDP without the knowledge or consent of the originating UA UAs consequently do not have knowledge of end-to-end MTU or link conditions SIP messages (requests or responses) can be large enough and frequent enough to create congestion issues on some links

Previous draft Defined Require header for congestion safety insertable by UAs, ostensibly for sending large requests safely Defined policy for transmitting requests in a relatively safe manner that includes proxies Did not address transmitting responses, which has been added in current draft

Why are Safe Responses hard? Response routing must follow inverse of path taken by requests (the VIA path), no options. Responses may be larger than requests, creating problems (ex. fragmentation) that didn’t affect the request.

Response Handling in Draft Hypothesis: if the request arrived ok, a response of equal or smaller size is no less likely to be ok. Rule: A “safe” UAS responding to a request may not send a response that is larger than the request unless the request was marked congestion safe using Require mechanism A “safe” UAS responds with 514 “Response Could Not Be Sent Safely” if rule not met

Issues with new approach Responses not “guaranteed” congestion-safe unless requests use safety mechanism Better than what we have now? Is it good enough?