Re: [dtn-interest] Comments on RFC 4838

Michael Noisternig <michael.noisternig@cased.de> Wed, 19 June 2013 12:37 UTC

Return-Path: <michael.noisternig@cased.de>
X-Original-To: dtn-interest@ietfa.amsl.com
Delivered-To: dtn-interest@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 164E121F9374 for <dtn-interest@ietfa.amsl.com>; Wed, 19 Jun 2013 05:37:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.054
X-Spam-Level:
X-Spam-Status: No, score=-2.054 tagged_above=-999 required=5 tests=[AWL=-0.097, BAYES_00=-2.599, HELO_EQ_DE=0.35, MISSING_HEADERS=1.292, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id knZQCx3YAuw1 for <dtn-interest@ietfa.amsl.com>; Wed, 19 Jun 2013 05:36:57 -0700 (PDT)
Received: from lnx503.hrz.tu-darmstadt.de (lnx503.hrz.tu-darmstadt.de [130.83.156.232]) by ietfa.amsl.com (Postfix) with ESMTP id 2FAB521F873C for <dtn-interest@irtf.org>; Wed, 19 Jun 2013 05:35:58 -0700 (PDT)
Received: from mail.cased.de (mail.cased.de [130.83.33.42]) by lnx503.hrz.tu-darmstadt.de (8.14.4/8.14.4/HRZ/PMX) with ESMTP id r5JCZuZ3018425 for <dtn-interest@irtf.org>; Wed, 19 Jun 2013 14:35:56 +0200 (envelope-from michael.noisternig@cased.de)
Received: from [130.83.33.155] (cased155.cased.tu-darmstadt.de [130.83.33.155]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.cased.de (Postfix) with ESMTPSA id 4DCB27FA01A for <dtn-interest@irtf.org>; Wed, 19 Jun 2013 14:30:53 +0200 (CEST)
Message-ID: <51C1A47B.7020706@cased.de>
Date: Wed, 19 Jun 2013 14:30:51 +0200
From: Michael Noisternig <michael.noisternig@cased.de>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130509 Thunderbird/17.0.6
MIME-Version: 1.0
CC: dtn-interest@irtf.org
References: <51C0232F.3060607@cased.de> <20130619090629.5AE3343C5393@mail.arces.unibo.it>
In-Reply-To: <20130619090629.5AE3343C5393@mail.arces.unibo.it>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-PMX-TU: seen v1.2 by 5.6.1.2065439, Antispam-Engine: 2.7.2.376379, Antispam-Data: 2013.6.19.122430
X-PMX-RELAY: outgoing
Subject: Re: [dtn-interest] Comments on RFC 4838
X-BeenThere: dtn-interest@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The Delay-Tolerant Networking Research Group \(DTNRG\) - Announce." <dtn-interest.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/dtn-interest>
List-Post: <mailto:dtn-interest@irtf.org>
List-Help: <mailto:dtn-interest-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2013 12:37:02 -0000

Thanks Caini, that is a very nice scenario!

So the issue to be solved is disseminating the new EID throughout the 
network. I still see an issue where you don't know beforehand which DTN 
network the intended destination currently (or in the future) resides 
in. I mean, the new device may log in in some network with a dtn2:// 
scheme, right? Then how can you properly address this device?

Michael

Am 19.06.2013 11:06, schrieb Caini Carlo:
> Dear Michael,
>    just a brief comment about late binding. You wrote:
>> Late binding is a nice concept, but of course it conflicts with
>> routing under mobility where identities do not necessarily represent
>> locations.
>
> I agree with you on the fact that is a nice concept, but not just this.
> In my opinion, it is a real feature which does not conflict with
> mobility, but actually helps in dealing with mobility.
> I will give you this example, taken from my research experience on DTN
> and smartphones (Nokia N900 with DTN2 on board).
>
> Phase 1 (sending a bundle to a non existing device)
> Suppose that you want to send a bundle to the smartphone of a friend of
> you, but you do not know anything about it but its dtn EID (e.g.
> dtn://myfriendsmartphone.dtn). Not only are you unaware of the IP
> address, but also of the location, of the fact that is switched on or
> off, and, in the most extreme case, of the same existence of the
> physical device. In spite of all, and thanks to the late binding, you
> can send a bundle to the mentioned EID, the DTN networks can route it
> until the bundle reaches a gateway where the bundle has to be stored
> because there are no routes to destination. Actually, the physical
> destination may be non existing at this time.
>
> Phase 2 (delivery a bundle to a device bought after bundle sending)
> The following day your friend buys a device, install DTN2 on it,
> configure the links in such a way that an ALWAYSON TCP link is
> established to the gateway. Then it switches on the device, the TCP
> convergence layer automatically establishes a link to the gateway and
> informs the gateway about its dtn identity (its EID). The gateway can
> now derive the association between the declared EID and the IP of the
> sender (late binding is performed here), and as a consequence: a) an
> opportunistic link to the smartphone is established; b) a route to the
> smartphone EID through this opportunistic link is written. Finally the
> bundle that was sent before your friend actually had bought the device
> is eventually delivered. Happy end.
>
> This is not science fiction, but what you can do now with the present
> DTN2 implementation, to deal with mobility (let me credit Stephen
> Farrell for this nice feature). Of course you can do more or less the
> same with Dropbox. The difference is that the gateway can be yours.
>
> Frankly speaking, it took me a while (I mean a few years) before really
> understanding the potentiality (i.e. the subtle implications) of "late
> binding", because of its novelty.  Now I love it. And I hope you will as
> well.
>
> Yours,
>      Carlo Caini
>
>
>
> At 11.06 18/06/2013, Michael Noisternig wrote:
>> Dear DTNRG members,
>>
>> in our research group we are currently investigating the use of DTN
>> functionality for a wireless communication scenario where we expect
>> classical mobile ad-hoc communication protocols to behave poorly due
>> to infrequent end-to-end connectivity. As part of this research I have
>> read up on the documents produced by your working group. By now, I
>> have got several comments, questions and criticism on these documents
>> that I would like to share with you. Below I'll start with reviewing
>> RFC 4838 on "a delay-tolerant architecture". I'll review other
>> documents in subsequent mails.
>>
>> That said, I realize that you are likely aware of several of the
>> issues I am bringing up and that you are already discussing better
>> protocol solutions for DTN networking. I will read up on your mailing
>> list archives when time permits, but I do want to stress here that a
>> good architecture document is a prerequisite for a good protocol
>> specification. In the mean time, I am still hoping for my comments to
>> be of value to you, and I am looking forward to your kind response.
>>
>> Kind regards,
>> Michael
>>
>> ---->8----
>>
>> Quite frankly, I was a bit disappointed by RFC 4838 because I think
>> the document promises something different than what it delivers. I had
>> expected an analysis of the different kinds of network architectures
>> delay-tolerant protocols might be applicable for, exploring the
>> difference between homogeneous and heterogeneous networks, the
>> difference between long delays but possibly relatively stable
>> intermediate connections vs. short delays but frequent disruptions,
>> whether networks are fully ad-hoc or have access to an infrastructure
>> backbone, etc. All these aspects clearly influence the solution space,
>> including whether an overlay with separate addressing (and routing) is
>> needed or whether a DTN protocol be directly integrated at L3, whether
>> interactivity between network nodes is feasible, how (key) management
>> can be supported, how routing can be supported, etc. What I did find
>> in the document instead was "a DTN architecture for the bundle overlay
>> protocol". As such the document already makes the assumption that DTN
>> networks consist of heterogeneous interconnected networks and that the
>> bundle overlay protocol is the appropriate solution. However,
>> homogeneous resource-constrained networks are unlikely to benefit from
>> the bundle overlay protocol, even when compressed headers (CBHE) are
>> used and the protocol is directly implemented at L3. As such (and in
>> part because of the complexity of the bundle security solution), I do
>> not see ourselves using the bundle protocol "as is" for our envisaged
>> application scenario. I will comment more on the bundle protocol
>> specification in a subsequent mail. Following are some
>> section-specific comments on RFC 4838.
>>
>> 3.2 and 3.3:
>> What wasn't really clear to me in both RFC 4838 and 5050 was the whole
>> node-to-EID registration process. A node registers to an EID, and an
>> application somehow gets associated/registered with a node (via some
>> socket API?). (So there seem to be two separate registration
>> processes.) Then if all applications connect to the same node (e.g., a
>> daemon) how do the applications get multiplexed on the channel? Or is
>> there a 1-1 relationship between applications and nodes? If an
>> application selects the EID to register to how can we assure a unique
>> "singleton" EID for each node? How do these EIDs get registered within
>> the network?
>>
>> 3.3.1:
>> I have some comments on the use of URIs; I'll postpone these to my
>> review of RFC 5050.
>>
>> 3.3.2:
>> Late binding is a nice concept, but of course it conflicts with
>> routing under mobility where identities do not necessarily represent
>> locations. How is this issue going to be resolved? I'm not sure
>> leaving this as an implementation matter is the appropriate "solution".
>>
>> Related to this, can (or how can) DTN nodes from different networks
>> (with different schemes) register to the same EID?
>>
>> 3.6.2:
>> "Administrative records are sent as bundles with a source EID
>>    set to one of the EIDs associated with the DTN node generating the
>>    administrative record."
>> So, a node can be registered with multiple EIDs, and multiple nodes
>> can register with a particular EID. Then how are we supposed to find
>> out who is the actual source of the administrative record? Why not
>> require the source EID be set to the EID of the endpoint that uniquely
>> identifies the DTN node (the "singleton" endpoint)?
>>
>> Bundle Delivery: So my understanding is that whereas this
>> administrative record is only being sent for complete ADUs rather than
>> individual bundles, if a source wishes to receive acknowledgments for
>> individual bundles it should request for Bundle Reception messages to
>> be sent by DTN nodes? And what is to do when bundle fragments
>> (erroneously) contain conflicting report-to-EIDs? (This question
>> actually better applies to RFC 5050.)
>>
>> 3.10, 6th paragraph:
>> Custody Transfer Accepted Signal: This should be "Custody Signal"
>> according to RFC 5050.
>> _______________________________________________
>> dtn-interest mailing list
>> dtn-interest@irtf.org
>> https://www.irtf.org/mailman/listinfo/dtn-interest
>