Paper Presentation: "A Delay Tolerant Network Architecture for
Download
Report
Transcript Paper Presentation: "A Delay Tolerant Network Architecture for
A Delay-Tolerant Network
Architecture for Challenged
Internets
Author: Kevin Fall
Paper Presentation: Vinay Goel
Internet Service Model
TCP/IP based
End to end IPC using concatenation of
potentially dissimilar link layer
technologies
Packet-switched model of service
A number of key assumptions…
Key Assumptions
Assumptions
End to end path exists b/w data source and its
peer(s)
Maximum RTT b/w any node pairs is not
excessive
End to end packet drop probability is low
A class of challenged networks violate one or
more of the assumptions
Examples of challenged
networks
Terrestrial Mobile Networks
Unexpectedly partitioned due to node mobility,
changes in signal strength etc.
Exotic Media Networks
High latencies with predictable interruption,
suffer outage due to environmental conditions
etc.
Military Ad-hoc Networks
Hostile environments
Mobility, environmental factors, or intentional
jamming may cause disconnection
Data traffic competing for bandwidth
Characteristics of these
networks
Path and Link characteristics
High latency, low data rate
Disconnection
Long queuing times
Network Architectures
Interoperability considerations
Security
End system characteristics
Limited longevity
Low duty cycle operation
Limited resources
Adapt Internet to these
environments?
Link-repair approaches
Engineer problem links to appear more similar to
the types of links for which TCP/IP was designed
“fool” the internet protocols: strive to maintain
end-to-end reliability etc.
Attach these networks to the edge of the
Internet
Use of a special proxy agent
Provides access to and from challenged networks
from the Internet
No support for using such networks for data
transit
Link repair approaches
In-network entities (“middle boxes”)
Performance Enhancing Proxies (PEPs) &
protocol boosters
Contain state necessary for connection violating
the Internet fate sharing principles
Confound end-to-end diagnostics and reliability,
increase system complexity if mobility is frequent
Pose a significant challenge for end-to-end security
mechanisms
Application Layer proxies
Provide specialized Internet-to-”special
network” name mapping & protocol
translation
Used at the edge of special networks
Disadvantage: their specificity
Either respond to a specialized set of commands
or act as raw data conduits
Limit the ability to re-use proxies for different
applications
Fail to take advantage of special resources (storage,
processing capabilities etc.)
Electronic Mail
Asynchronous message delivery system
Provides an abstraction that comes close to
addressing many problems
Flexible naming, asynchronous message-based
operation etc.
Falls short
Lack of dynamic routing
Weakly defined delivery semantics
lack of consistent API
What’s the most desirable
framework?
A network service and API providing
non-interactive messaging
System should combine some overlay
routing capability (such as in P2P
systems) with delay-tolerant and
disconnection-tolerant properties of email
Delay Tolerant Message Based
Overlay Architecture
Based on abstraction of message switching
Message aggregates known as “bundles”
Routers that handle them are called “bundle
forwarders” or DTN gateways
Architecture provides a store-and-forward
gateway function between various network
architectures
Regions and DTN gateways
Two nodes are in the same region if they can
communicate without using DTN gateways
DTN gateway
Point through which data must pass in order to
gain entry to a region
Can serve as a basis for both translation and well
as a point to enforce policy and control
Name Tuples
Identifiers for objects or groups of objects
DTN name tuple {Region Name, Entity Name}
First portion is a globally unique,
hierarchically structured region name
Interpreted by DTN gateways to find the path(s)
to one or more DTN gateways at the edge of the
specified region
Second portion identifies a name resolvable
within the specified region
Need not be unique outside the region
Name resolution
Only region identifier is used for
routing a message that is in transit
across a collection of regions
Entity name information is locally
interpreted in the destination region
Form of late binding
A Postal Class of Service
Priority based resource allocation
Adopt a subset of the types of services
provided by US Postal Service
Attractive characteristics
Low, ordinary and high priority delivery
Return receipt, delivery records
Path Selection and Scheduling
Architecture targeted at networks where an
end-to-end path can’t be assumed to exist
Routes are comprised of a cascade of timedependent contacts (communication
opportunities)
Particular details of path selection and
scheduling - heavily influenced by regionspecific routing protocols and algorithms
Custody Transfer and
Reliability
Custody transfer: acknowledged delivery of a
message from one DTN hop to the next and
corresponding passing of reliable delivery
responsibility.
End hosts do not ordinarily need to keep a
copy of data that has been custodially
transferred to a DTN next hop
Custody transfer can be viewed as a
performance optimization for end-to-end
reliability that involves endpoint movement
Convergence Layers and
Retransmission
Facilities provided by transport protocols in
use within the regions may vary significantly
Bundle forwarding assumes underlying
reliable delivery capability with message
boundaries when performing custody
transfer
Transport protocols lacking these features must
be augmented
Include transport-protocol-specific
convergence layers
Time Synchronization
Coarse Level
Identifying message fragments
Purging messages that have exceeded
their source specified lifetimes
Stringent constraints
Scheduling, path selection
Congestion management
Security
Verifiable access to the carriage of traffic at
a particular class of service
Avoid carrying traffic potentially long
distances that is later found to be prohibited
Each message includes an immutable
“postage stamp” containing
Verifiable identity of sender, an approval, class of
service etc.
Credentials checked at each DTN hop by
routers; use of public key cryptography
Congestion and Flow Control
Flow control: limiting the sending rate
of a DTN node to its next (DTN) hop
Attempt to take advantage of underlying
protocols’ mechanisms
Congestion control: handling of
contention for the persistent storage of
a DTN gateway
Shared priority queue for allocating
custody storage
Application Interface
Applications must be careful not to expect
timely responses
Must be capable of operating in a region
where a request/response RTT may exceed
the longevity of the client and server
processes
Structured to continue operating in the face
of reboots or network partitioning as much
as possible
Conclusion
Design embraces notion of message
switching with in-network storage &
retransmission, late-binding of names
& routing tolerant of network
partitions
Puts forth several design decisions
worthy of consideration
Questions?