A Delay-Tolerant Network Architecture for Challenged Internets
Download
Report
Transcript A Delay-Tolerant Network Architecture for Challenged Internets
A Delay-Tolerant Network
Architecture for Challenged
Internets
Kevin Fall
July 7, 2015
Anshul Kantawala
1
Challenged Networks
Terrestrial mobile networks
Unexpected partitions due to node
mobility or RF interference
Periodic, predictable partitions
e.g. Commuter bus acting as store and
forward switch
July 7, 2015
Anshul Kantawala
2
Challenged Networks (cont.)
Exotic Media Networks
Near-Earth satellites, very long-distance
radio (deep space) etc.
High latencies with predictable interruption
Outage due to environmental conditions
Predictably available store and forward
network service – e.g. low-earth orbiting
satellites
July 7, 2015
Anshul Kantawala
3
Challenged Networks (cont.)
Military Ad-Hoc Networks
Operate in hostile environments
mobile nodes, environmental factors or
intentional jamming cause disconnections
Data traffic may be pre-empted by
higher priority voice traffic
Strong infrastructure protection
requirements
July 7, 2015
Anshul Kantawala
4
Challenged Networks (cont.)
Sensor networks
Limited end-node power, memory and
CPU capability
Thousands or millions of nodes per
network
Communication scheduled to conserve
power
Interfaced to other networks using proxy
nodes
July 7, 2015
Anshul Kantawala
5
Current Solutions
Link-repair approach
Engineer problem links to appear similar
to regular links
Use proxy agents
Attach challenged networks at edges
using proxy agents
Does not provide a general way to use
these networks for data transit
July 7, 2015
Anshul Kantawala
6
Characteristics of Challenged
Networks
Path and Link characteristics
Network architectures
End System characteristics
July 7, 2015
Anshul Kantawala
7
Path and Link characteristics
High latency, low data rate
e.g. 10 kbps, 1-2 second latencies
Asymmetric data rates
e.g. remote instruments – large return
channel, small uplink for device control
Protocols should be terse and dynamic
control functions performed open-loop or
hop-by-hop
July 7, 2015
Anshul Kantawala
8
Path and Link characteristics
Disconnection
Non-faulty disconnections
Motion
Predictable: satellite passes, bus acts as router
Random: motion of nodes/routers, interference
Low-duty-cycle operation
Routing subsystem should not treat
predictable disconnections as faults and
can use this information to pre-schedule
messages
July 7, 2015
Anshul Kantawala
9
Path and Link characteristics
Long queueing times
Conventional networks rarely greater
than a second
Challenged network could be hours or
days due to disconnection
July 7, 2015
Anshul Kantawala
10
Network Architectures
Interoperability considerations
Networks may use application-specific
framing formats, data packet size
restrictions, limited node addressing and
naming etc.
Security
End-to-end approach not attractive
Require end-to-end exchanges of keys
Undesirable to carry traffic to destination
before authentication/access control check
July 7, 2015
Anshul Kantawala
11
End System Characteristics
Limited longevity
Round-trip time may exceed node’s
lifetime making ACK-based policies
useless
Low duty cycle operation
Disconnection affects routing protocols
Limited resources
Affects ability to store and retransmit
data due to limited memory
July 7, 2015
Anshul Kantawala
12
Can we use TCP/IP?
Transport layer (TCP)
High latency and moderate to high loss
rates severely limit TCP’s performance
Network layer (IP)
Performance affected by loss of
fragments
Routing
High latency will cause current routing
protocols to incorrectly label links as
non-operational
July 7, 2015
Anshul Kantawala
13
Proxies and Protocol Boosters
Proxies and protocol boosters are
inherently fragile
Increase system complexity if mobility is
frequent
May require both directions to flow
through the proxy – fail for asymmetric
routing
Application proxies have limited re-use
abilities and may fail to take advantage
of special resources of the proxy node
July 7, 2015
Anshul Kantawala
14
Delay Tolerant Message-Oriented
Overlay Architecture
July 7, 2015
Anshul Kantawala
15
Abstraction
Message switching
Use message aggregates or “bundles”
Allows network’s path selection and scheduling
functions a-priori knowledge of the size and
performance requirements of data transfers
Overlay architecture
DTN will operate over existing protocol stacks
and provide a gateway when a node touches two
or more dissimilar networks
July 7, 2015
Anshul Kantawala
16
Regions and DTN Gateways
DTN gateways are interconnection points
between dissimilar network protocol and
addressing families called regions
e.g. Internet-like, Ad-hoc, Mobile etc.
DTN gateways
Perform reliable message routing
Perform security checks
Store messages for reliable delivery
Resolve globally-significant name tuples to
locally-resolvable names for internal destined
traffic
July 7, 2015
Anshul Kantawala
17
Name Tuples
Two variable length portions
Region name
Globally-unique hierarchically structured region
name
Used by DTN gateways for forwarding messages
Entity name
Resolvable within the specified region, need not
be unique outside it
E.g. { internet.icann.int, http://www.ietf.org/ }
July 7, 2015
Anshul Kantawala
18
Class of Service
Similar to the Postal service
Delivery priority: low, ordinary, high
Notifications of mailing, delivery to
receiver and route taken
Reliable delivery using custody transfer
at each routing hop
July 7, 2015
Anshul Kantawala
19
Path Selection and Scheduling
End-to-end path routing path cannot
be assumed to exist
Can solve a multicommodity flow
optimization problem using
approximate algorithms, since the
protocol is message based
July 7, 2015
Anshul Kantawala
20
Custody Transfer
Two types of message nodes
Persistent (P) and non-persistant (NP)
P nodes assumed to contain persistent
memory storage and participate in
custody transfer
Custody Transfer
Acknowledged delivery of message from
one DTN hop to the next and passing of
reliability delivery responsibility
July 7, 2015
Anshul Kantawala
21
Custody Transfer (cont.)
Advantages
Relieves potentially resource-poor end
nodes from maintaining end-to-end
connection states
Useful for overcoming high loss rates
along the delivery path
As reliable as typical end-to-end
reliability
July 7, 2015
Anshul Kantawala
22
Protocol Translation and
Convergence Layers
Bundle forwarding function assumes
underlying reliable delivery capability with
message boundaries
Convergence layer augments underlying network
protocols appropriately
July 7, 2015
Anshul Kantawala
23
Time Synchronization
Need for time synchronization
Provide a mechanism to deliver preprogrammed control instructions to be
executed at future points in time
Use for scheduling, path selection and to
remove expired pending messages
Propose time synchronization on the
order of 1 ms
July 7, 2015
Anshul Kantawala
24
Security
Each message contains
Identity of sender
Requested class of service (CoS)
Use public key cryptography
First DTN router verifies user and
validates CoS request
Re-signs message using its key
Core routers need only cache keys of
their neighbours
July 7, 2015
Anshul Kantawala
25
Congestion and Flow Control
Flow control is hop-by-hop
Uses underlying protocols mechanisms if
they exist
Congestion control
Refers to contention of persistent storage
at a DTN forwarder
Current approach uses a priority queue
Priority inversion and head-of-line
blocking can occur
July 7, 2015
Anshul Kantawala
26
Application Interface
Applications must be able to operate
in a regime where request/response
time may exceed the longevity of the
client and server processes
Application interface is non-blocking
Also has registration and callback
functions between bundle-based
applications and the local forwarding
agent
July 7, 2015
Anshul Kantawala
27
Implementation
July 7, 2015
Anshul Kantawala
28
Implementation (cont.)
Prototype DTN system under Linux
Application interface
Rudimentary bundle forwarding across
scheduled and “always on” connections
Detection of new and lost contacts
Two convergence layers
TCP/IP
Bundle-based proxy to the Berkeley mote
network
July 7, 2015
Anshul Kantawala
29
Conclusion
DTN architecture attempts to provide
interoperable communications
between and among challenged
networks
Design uses message switching with
in-network retransmission, latebinding of names and routing tolerant
of network partitioning
July 7, 2015
Anshul Kantawala
30