Re: [dtn-interest] Re: comparing protocols for reliability etc.

Michael Demmer <demmer@cs.berkeley.edu> Thu, 26 July 2007 14:40 UTC

Received: from gateway0.EECS.Berkeley.EDU (gateway0.EECS.Berkeley.EDU [169.229.60.93]) by webbie.berkeley.intel-research.net (8.11.6/8.11.6) with ESMTP id l6QEe7J00851 for <dtn-interest@mailman.dtnrg.org>; Thu, 26 Jul 2007 07:40:07 -0700
Received: from [192.168.1.2] (dsl081-061-178.sfo1.dsl.speakeasy.net [64.81.61.178]) (authenticated bits=0) by gateway0.EECS.Berkeley.EDU (8.14.1/8.13.5) with ESMTP id l6QEe5t5012791 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Thu, 26 Jul 2007 07:40:06 -0700 (PDT)
In-Reply-To: <200707252351.AAA12198@cisco.com>
References: <DB2FCBA0-E83E-4C78-84DB-167883CEEB93@virgin.net> <200707252351.AAA12198@cisco.com>
Mime-Version: 1.0 (Apple Message framework v752.3)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <EECE17CC-5F6F-4A6B-9B73-75B14E504A5D@cs.berkeley.edu>
Cc: dtn-interest <dtn-interest@mailman.dtnrg.org>
Content-Transfer-Encoding: 7bit
From: Michael Demmer <demmer@cs.berkeley.edu>
Subject: Re: [dtn-interest] Re: comparing protocols for reliability etc.
X-Applemailsentby: demmer
Date: Thu, 26 Jul 2007 07:40:00 -0700
To: Darren Long <darren.long@virgin.net>
X-Mailer: Apple Mail (2.752.3)
Sender: dtn-interest-admin@mailman.dtnrg.org
Errors-To: dtn-interest-admin@mailman.dtnrg.org
X-BeenThere: dtn-interest@mailman.dtnrg.org
X-Mailman-Version: 2.0.13
Precedence: bulk
List-Unsubscribe: <http://mailman.dtnrg.org/mailman/listinfo/dtn-interest>, <mailto:dtn-interest-request@mailman.dtnrg.org?subject=unsubscribe>
List-Id: Delay Tolerant Networking Interest List <dtn-interest.mailman.dtnrg.org>
List-Post: <mailto:dtn-interest@mailman.dtnrg.org>
List-Help: <mailto:dtn-interest-request@mailman.dtnrg.org?subject=help>
List-Subscribe: <http://mailman.dtnrg.org/mailman/listinfo/dtn-interest>, <mailto:dtn-interest-request@mailman.dtnrg.org?subject=subscribe>
List-Archive: <http://mailman.dtnrg.org/pipermail/dtn-interest/>

My instinct is that since we're going ahead with a definition for a  
hop-by-hop checksum only bundle authentication block, then we don't  
_need_ additional convergence-layer specific mechanisms for data  
integrity beyond what's provided by the lower transport layers.

This saves us the trouble (and potential errors) of defining and  
implementing specific checksum algorithms for each convergence layer.

-mike


>> I posted a few days ago amongst the turmoil of the recent paper
>> regarding data integrity.  Curiously, there have been no responses.
>> Hasn't anyone any comments?  If I'm very off plot, I'd hope someone
>> would put me straight.  Otherwise, I'm hoping someone might agree.
>
> Darren - you're not off plot. Many of us have travelled to the IETF  
> in Chicago, so the stuff related to in-the-room discussion has  
> taken precedence.
>
> IP fragmentation is unlikely because these convergence layers are  
> usually only supposed to travel one hop across a local link, and in  
> those scenarios they will know and use the local link MTU.  
> (Protecting against errors in lower layers segmenting and  
> reassembling packets is something I would be concerned about.)  For  
> a convergence layer that can traverse the public Internet - TCP has  
> Path MTU discovery to avoid fragmentation. Also, intermediate  
> fragmentation is avoided in the IPv6 design. Weakness of the one's- 
> complement checksum with large MTUs (especially jumbograms) is  
> another issue.
>
> We've spent a lot of time on the list discussing reliability to  
> catch residual errors - I certainly think that if a convergence  
> layer is advertised as "reliable" it should at least make an  
> attempt to catch all errors - and that's why we added the MD5  
> integrity checksum in Saratoga, to provide an attempt at an e2e  
> checksum to help applications that don't check what they receive.  
> This means that Saratoga can provide a better, more reliable UDP- 
> based convergence layer.
>
> The bundle protocol should imo always be reliable in both framing  
> and payload content, which it currently isn't - something there has  
> been much discussion of here in Chicago, post our payload checksum  
> block draft.
>
> L.
>
> http://www.ee.surrey.ac.uk/Personal/L.Wood/dtn/
>
> ===
> Hi all,
>
> I find this to be an interesting topic of discussion, and I can't
> help but chip in with some comments of my own.
>
> One possible concern that isn't addresses in the paper is the degree
> of error detection capability in the implemented CLs in the DTN2
> reference implementation.  I'm thinking specifically of the TCP and
> UDP CLs.
>
> In the UDP CL implementation, bundles are accepted for transmission
> up to the maximum UDP datagram size (64kB).  With typical link MTU
> sizes, this bundle/datagram would undergo IP fragmentation, which is
> apparently to be considered "very harmful" to data integrity in the
> "right" circumstances.
>
> Is it the intention to resort to bundle protocol extensions to handle
> the detection of residual errors above the CL, or should there be
> strong enough mechanisms in the CL itself?
>
> Similarly, the TCP CL implementation provides no additional error
> detection mechanisms above TCP itself, which suffers from the same
> check-summing weakness as UDP.  My concern with the TCP CL relates to
> TCP operation over routes bisected with TCP PEPs.  There are PILC
> documents that describe the potential impact of TCP PEPs to the
> end-to-end assumption of TCP, and coupling this with the additional
> potential for the PEPs to inject errors undetectable by the TCP/IP
> stack suggest to me that additional integrity checking should be
> provided in the CL, where I believe more efficient recovery options
> are available.
>
> I wonder what others think?
>
> Cheers,
>
> Darren
> _______________________________________________
> dtn-interest mailing list
> dtn-interest@mailman.dtnrg.org
> http://mailman.dtnrg.org/mailman/listinfo/dtn-interest