Академический Документы
Профессиональный Документы
Культура Документы
Outline
Data-oriented Networking
DTNs
To the beginning...
What if you could re-architect the way bulk
data transfer applications worked
HTTP
FTP
Email
etc.
US
B
Xfe
NE
r
SENDERT
NE
T
CACH
E
6
Xfe
r
US
NETB
Interne
t
wirele
ss
NET
Xfe
r
Multipath
( DS
L)
RECEIV
Features ER
Multipath and Mirror support
Store-carry-forward
ALG
Application
Data Transfer
Middleware
Object
Exchange
Transport
Network
Data Link
Physical
Router
Bridge
Softwaredefined radio
Application Protocol
and Data
Xfer Service
Receiver
Xfer Service
Data
Transfer Service responsible for finding/transferring data
Transfer Service is shared by applications
OID
Cryptographic
Hash
Desc1
Desc2
Desc3
Hash 2
File Data
Rabin Fingerprints
Given Value - 8
Natural Boundary
Natural Boundary
10
11
12
Self-certifying Names
A piece of data comes with a public key and
a signature.
Client can verify the data did come from the
principal by
Checking the public key hashes into P, and
Validating that the signature corresponds to the
public key.
Sende
r
put(X)
OID, Hints
Xfer
Service
Receiv
er
get(OID, Hints)
Transfer
Plugins
read()
data
Xfer
Service
14
16
Forwarding FIND(P:L)
When FIND(P:L) arrives to a RH:
If theres an entry in the registration table, the
FIND is sent to the next-hop RH.
If theres no entry, the RH forwards the FIND
towards to its provider.
18
UDP TCP
Physical
The Hourglass Model
Transport
(TCP/Other)
Network (IP/Other)
Data Link
Physical
Increases
Data
Delivery
Flexibility
Flexibilit
Data Link
e
h
t
p
u
g
n
i
v
Mo
t
s
i
a
W
Thin
Limits
Applicati
on
Innovatio
n
Innovati
Applications
Applications
19
Data Blocks
Data Labels
Application
Support
Exposes much of
underlying networks
capability
Lower Layer
Support
Requires end-to-end
connectivity
Supports arbitrary
transport
Outline
Data-oriented Networking
DTNs
21
New Challenges
Very large E2E delay
Propagation delay = seconds to minutes
Disconnected situations can make delay worse
Fragmentation function:
Round to nearest 8 byte boundary
Whole datagram lost if any fragment lost
Fragments time-out if not delivered (sort of) quickly
24
Insufficient resources
Routing table size in sensor networks
Topology discovery dominates capacity
26
27
TCP PEPs
Modify the ACK stream
Smooth/pace ACKS avoids TCP bursts
Drop ACKs avoids congesting return
channel
Local ACKs go faster, goodbye e2e reliability
Local retransmission (snoop)
Fabricate zero-window during short-term
disruption
Security
Tunneling may render PEP useless
Can give PEP your key, but do you really want to?
Fate Sharing
Now the PEP is a critical component
Mobility
Correctness depends on type of state
(similar to routing asymmetry issue)
30
Components
32
33
URIs
Internet standard naming scheme [RFC3986]
Format: <scheme> : <SSP>
Message Abstraction
Network protocol data unit: bundles
DTN Routing
DTN Routers form an overlay network
only selected/configured nodes participate
nodes have persistent storage
City
bike
Village
38
City
bandwidth
Village 1
time (days)
bike
satellite
phone
Connectivity: Village 1 City
39
Knowledge-Performance Tradeoff
Performance
ity
x
ple
a
m
r
o
f
er
e,
c
n
om
c
r
e
h
g
Oracle
i
h
Algorith
m
LP
EDAQ
Contacts
EDL
p
r
+
e
Q
h
Hig
ContactsContacts Queuing
ED
+
+
+
MED
Queuing Queuing Traffic
FC ContactsContacts (local) (global)
None Summary
Use of Knowledge Oracles
41
Intuition:
Reduces risk due to outlier bad contacts
43
Erasure Codes
Message n blocks
Encoding
Opportunistic Forwarding
Decoding
Message n blocks
44
DTN Security
Bundle Agent
Bundle Application
Source
Destination
Receiver/
Sender
Sender
BAH
Receiver/
Sender
BAH
BAH
Receiver/
Sender
BAH
PSH
45