8/16/2019 Lec 14_10_Oct
1/29
BITS PilaniPilani Campus
Advanced Computer
Networks (CS ZG525)Virendra S Shekhawat
Department of Computer Science and Information Systems
8/16/2019 Lec 14_10_Oct
2/29
BITS PilaniPilani Campus
First Semester 2015-2016Lecture-14 [10th Oct 2015]
8/16/2019 Lec 14_10_Oct
3/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Agenda
• History of Delay Tolerant Networking [CH-25]
– Lecture Slides
• DTN Architecture and Bundle Protocol [CH-26] – Reading
• A Delay-Tolerant Network Architecture for Challenged Internets [K Fall,
2003]
•
www.kevinfall.com/seipage/papers/p27-fall.pdf
3Advanced Computer Networks CS G525
8/16/2019 Lec 14_10_Oct
4/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Topics…
• Challenged Networks and their Limitations
• Solutions
– Fixing Internet Protocols
– Delay Tolerant Networks (DTNs)
• DTN Architecture
– Bundle Protocol
4Advanced Computer Networks CS G525
8/16/2019 Lec 14_10_Oct
5/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Introduction
• In 2002, Kevin Fall started to design terrestrial
networks, called as IPN
– termed this new architecture as Delay/Disruption Tolerant
Networks
• Initial efforts have been focused on combining the
solutions for MANETs and Sensor networks
• Later, such networks have also been termed as
challenged networks
Advanced Computer Networks CS G525
5
8/16/2019 Lec 14_10_Oct
6/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Challenged Networks
• Characteristics
– Latency
– Bandwidth Limitations
– Error Probability
– Node Longevity (aka life time)
– Path Stability
Advanced Computer Networks CS G525
6
8/16/2019 Lec 14_10_Oct
7/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Path and Link Characteristics[1]
• High Latency Low Data Rate
– Transmission and propagation delay is proportional
to transmission medium (ignoring queuing delay)
– For transmission rates of 10 Kbps having delays in
the order of few seconds
• e.g. Underwater acoustic modems and low power radios
for sensor nodes
– Asymmetric data rates (downlink and uplink)
• e.g. Remote instruments, Military assets
Advanced Computer Networks CS G525
7
8/16/2019 Lec 14_10_Oct
8/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Path and Link Characteristics[2]
• Disconnection
– Disconnection due to fault (may occur in
conventional networks as well)
– Non-faulty disconnections occur due to motion
and low-duty-cycle system operation
– Disconnection due to low-duty-cycle is common
among low capacity devices (e.g. sensor networks)
Advanced Computer Networks CS G525
8
8/16/2019 Lec 14_10_Oct
9/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Path and Link Characteristics[3]
• Long Queuing Times
– Queuing delay is significant in multi hop paths (in sec)
– Due to disconnection queuing delay may become
large (hours, even in days)
• Problem:
– Source initiated retransmission becomes costly in
such networks
Advanced Computer Networks CS G525
9
8/16/2019 Lec 14_10_Oct
10/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Network Architectures
• Interoperability Considerations – Challenged networks are not designed with
consideration of interoperability as such
–
Getting communication between nodes itself isbiggest challenge!
• Security
– In challenged n/w bandwidth is a precious resource
hence uses should be authenticated – End to end authentication approaches are not
worth… Why?
Advanced Computer Networks CS G525
10
8/16/2019 Lec 14_10_Oct
11/29BITS Pilani, Pilani CampusFirst Sem 2015-16
End System Characteristics
• Limited Longevity
– Nodes are placed in hostile environment like militarynetworks, sensor networks in coal mines etc.
– Node life is limited and long periods of disconnections
• Low Duty Cycle Operation
– To increase longevity for battery power operated nodes, lowduty-cycle is desirable
• Limited Resources
– Limited memory and processing power
– Implication: Previous data should be transmitted before newdata is produced otherwise node will loose the data
Advanced Computer Networks CS G525
11
8/16/2019 Lec 14_10_Oct
12/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Solutions
• Fixing Internet Protocols
– PEP, Boosters and Proxies
• Come up with an Additional Architecture
– Delay Tolerant Message Based Overlay
Architecture
Advanced Computer Networks CS G525
12
8/16/2019 Lec 14_10_Oct
13/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Fixing Internet Protocols
• PEP, Boosters and Proxies (aka middle boxes) – Discouraged by the IETF as violating the fate sharing
principle (connection state should reside only in endhosts)
– They may keep some information for connection state
– Proxies are application specific . Inter Proxycommunication is not exists at this point of time
• E-mail (aka asynchronous message delivery system) – Positives: Flexible naming, asynchronous message based
operation, and in-band error reporting
– Negatives: Lack of dynamic routing, Weakly defineddelivery semantics, lack of consistent applicationinterface
Advanced Computer Networks CS G525
13
8/16/2019 Lec 14_10_Oct
14/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Problems With TCP/IP Network
• IP routing drops a packet if next hop route is notavailable immediately
– Problematic with frequently disconnected links
• Internet’s fate sharing does not hold for many such
networks
– It may be quite useful to hand-off its end node connectionstate if it has other tasks to accomplish, particularly forpower or memory limited nodes
• Usually Internet applications are designed for lowdelay that may not be suitable for challengednetworks
Advanced Computer Networks CS G525
14
8/16/2019 Lec 14_10_Oct
15/29BITS Pilani, Pilani CampusFirst Sem 2015-16
What is DTN…?
• A Delay Tolerant Networking architecture (DTN) providesinteroperability between different challenged networks
•
End to end message delivery is defined as “bundle layer”
• The “bundle layer” forms an overlay that employs
persistent storage to help combat network interruption
• Devices implementing the “bundle layer” are called DTN
nodes
Advanced Computer Networks CS G525
15
8/16/2019 Lec 14_10_Oct
16/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Delay Tolerant Message Based
Overlay Architecture
• DTN Architecture composed of regions and gateways• DTN Gateways are point which can serve as a basis for both
translation (region specific encodings) as well as enforce policy andcontrol information
Advanced Computer Networks CS G52516
8/16/2019 Lec 14_10_Oct
17/29BITS Pilani, Pilani CampusFirst Sem 2015-16
The Bundle Protocol
• The bundle protocol tiestogether the lower-layerprotocols
• Application programs can
communicate across the sameor different sets of lower-layerprotocols
• A bundle-protocol agent stores
and forwards entire bundles(or bundle fragments) betweennodes
Advanced Computer Networks CS G52517
8/16/2019 Lec 14_10_Oct
18/29BITS Pilani, Pilani CampusFirst Sem 2015-16
DTN Nodes
Advanced Computer Networks CS G52518
Source: Delay- and Disruption-Tolerant Networks (DTNs): A Tutorial - Version 3.2, Sept 2015
8/16/2019 Lec 14_10_Oct
19/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Delay Isolation via Transport
Protocol Termination
Advanced Computer Networks CS G52519
Source: Delay- and Disruption-Tolerant Networks (DTNs): A Tutorial - Version 3.2, Sept 2015
8/16/2019 Lec 14_10_Oct
20/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Custody Transfers
• The bundle protocol supports node-to-node
retransmission (at both the transport and the
bundle layers) by means of custody transfers
• A bundle custodian must store a bundle untileither
– another node accepts custody (ack is required here)
– expiration of the bundle’s time-to-live
• Points of retransmission progressively forward
toward the destination using Custody Transfers
Advanced Computer Networks CS G52520
8/16/2019 Lec 14_10_Oct
21/29BITS Pilani, Pilani CampusFirst Sem 2015-16
Classes of Bundle Service
• Custody Transfer – Delegation of retransmission responsibility
• Return Receipt – Confirmation by the destination to the source
• Priority of Delivery – Bulk, Normal, or Expedited
• Time to Live –
Congestion control is the main purpose of thisfunction
– Notion of congestion in DTN is insufficient memory tostore the bundle at DTN node
Advanced Computer Networks CS G52521
8/16/2019 Lec 14_10_Oct
22/29BITS Pilani, Pilani CampusFirst Sem 2015-16
End Points
• A bundle endpoint is a set of zero or more nodesthat all identify themselves by the same
endpoint ID
• An endpoint ID is a uniform resource identifier(URI) text string using the syntax
– :
–ex. dtn://abc/file1
Advanced Computer Networks CS G52522
8/16/2019 Lec 14_10_Oct
23/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Path Selection and Scheduling
• Routes are made of contacts which arecommunication opportunities
• A contact has a number of parameters:
– Start & end times
– Capacity (aka buffer at nodes)
– Latency
– Endpoints
–
Direction• Problems include determining existence of
contacts, knowing the state of pending messagesand efficiently assigning messages to contacts
Advanced Computer Networks CS G52523
8/16/2019 Lec 14_10_Oct
24/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Convergence Layer
• The bundle forwarding function requires anunderlying reliable delivery mechanism withmessage boundaries.
• An implementation of DTN would requiretransport-layer specific convergence layers
– For example, TCP would require a convergence layerto add message boundaries
• Reliable delivery can, at worst, be implementedwith timeouts and retransmission
Advanced Computer Networks CS G52524
8/16/2019 Lec 14_10_Oct
25/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
Time Synchronization
• DTN requires a form of time synchronization.
• It is used for:
– Identifying message fragments.
– Purging messages which have exceeded their lifetimes.
• The paper recommends time synchronization to on
the order of 1ms.
• It is questionable whether this would be possible inthe varied networks that DTN is supposed to work
with
Advanced Computer Networks CS G52525
8/16/2019 Lec 14_10_Oct
26/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
DTN Applications[1]
• Military and Intelligence – Mobile ad-hoc networks (MANETs) for wireless
communication and monitoring, cargo tracking, search and
rescue communication, unmanned aerial vehicle (UAV)
communication and control
• Public Service and Safety:
– Security and disaster communication, search and rescue
communication, humanitarian relief monitoring, smart-city
event-response, smart transportation networks, smartelectric-power networks, global airport-traffic control,
infrastructure-integrity monitoring, unmanned aerial vehicle
(UAV) communication and control, remote learning
Advanced Computer Networks CS G52526
8/16/2019 Lec 14_10_Oct
27/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
DTN Applications[2]
• Environmental Monitoring: – Animal migration, soil properties and stability,
atmospheric and oceanographic conditions,
seismological events• Undersea Communication:
– Submarines, unmanned undersea vehicles, oil and
mining undersurface sensors. Beneath the surface of
water, only sound is effective for communication over
distance, and the speed of sound in water is only
about 1 km/sec
Advanced Computer Networks CS G52527
8/16/2019 Lec 14_10_Oct
28/29
BITS Pilani, Pilani CampusFirst Sem 2015-16
DTN Applications[3]
• Commercial
– Cargo and vehicle tracking (by road, rail, sea, and air),
in-store and in-warehouse asset tracking, data
transactions (e.g., financial, reservations),agricultural crop monitoring, processing-plant
monitoring, communication in underground mines
• Space Agencies
– International Space Station communication
(currently operational for research), interplanetary
communication, future space-debris monitoring.
Advanced Computer Networks CS G52528
8/16/2019 Lec 14_10_Oct
29/29
Thank You !
29