SlideShare une entreprise Scribd logo
1  sur  22
Unreliable inter
process
communication in
Ethernet: Migrating
to RINA with the
shim DIF
15/10/13

Sander Vrijders, Dimitri
Staessens, Didier Colle,
Mario Pickavet
Ghent University – iMinds
Eleni Trouva, Eduard
Grasa
i2CAT
John Day, Lou Chitkushev
Boston University
1
Communication between application
processes
 Not to be confused with communication between
interfaces  TCP/IP !!!
 Basic premise: All networking is inter process
communication and IPC only
 All communication goes through three phases:
 Enrollment
 Flow allocation
 Data transfer
15/10/13

2
Enrollment
 Creates/maintains/distributes/deletes the
information within a layer that is needed to
create instances of communication
 Often ignored in the current internet architecture
 Addresses, maximum packet size, …
 More well-formed enrollment phases in IEEE
802.11 (WiFi) and IEEE 802.1q (VLAN)

15/10/13

3
Flow allocation
 Creates/maintains/deletes the shared state
between connection endpoint-ids necessary to
support the functions of the data transfer phase
 For unicast: between 2 communication
processes
 Also often ignored, forgotten
 Without a flow allocation phase, all Protocol
Data Units (PDUs) are implicitly accepted

15/10/13

4
Data transfer
 The actual sending of data
 In the current architecture the other phases are
often skipped
 Immediately skipping to data transfer causes
unreliable inter process communication

15/10/13

5
Examining the Ethernet Header
 Ethernet II: specification released by DEC, Intel,
Xerox (hence also called DIX Ethernet)
Preamble

MAC dest

MAC src

802.1q
header
(optional)

Ethertype

Payload

FCS

Interfram
e gap

7 bytes

6 bytes

6 bytes

4 bytes

2 bytes

42-1500
bytes

4 bytes

12 bytes

15/10/13

6
Examining the Ethernet header
 IEEE 802.3 Frame
Preamble

MAC dest

MAC src

802.1q
header
(optional)

Length

Payload

FCS

Interfram
e gap

7 bytes

6 bytes

6 bytes

4 bytes

2 bytes

42-1500
bytes

4 bytes

12 bytes

 Combined with IEEE 802.2 (LLC)
DSAP

SSAP

Control

Information

1 byte

1 byte

1-2 bytes

M bytes (M>=0 )

15/10/13

7
Ethertype
 Identifies the syntax of the encapsulated
protocol
 Layers below need to know the syntax of the
layer above
 Layer violation!
 Same for the protocol id in the IPv4 header

15/10/13

8
Consequences of using an Ethertype
 Also means only one flow can be distinguished
between an address pair
 The MAC address doubles as the connection
endpoint-id

15/10/13

9
Same problem with LLC?
 Source and Destination Service Access Points
(SAPs) are the connection endpoint-ids
 Allow for more than one flow to be distinguished
between two communicating nodes
 Still fixed endpoints
 All traffic will still be accepted

15/10/13

10
Recursive InterNet Architecture (RINA)
 New internetwork architecture
 Unified theory of networking
 A layer = a distributed application that provides
IPC over a certain scope, called a Distributed
IPC Facility (DIF)
 Recurse as much as needed
 Can be configured to a certain policy

15/10/13

11
Architectural model
Application Specific
Tasks

System (Host)

System
(Router)

Appl.
Process

Other Mgt. Tasks
IPC Mgt. Tasks
Multipl
exing
SDU
Protec
tion

IPC
Resource
Mgt.

Mgmt
Agemt

Inter DIF
Directory

IPC
Process

Shim IPC
Process

DIF

IPC
Process

Shim DIF
over TCP/UDP

Appl.
Process

Mgmt
Agemt

Shim IPC
Process

Shim IPC
Process

Shim DIF
over Ethernet

IPC API
Data Transfer

Data Transfer
Data Transfer
Data Transfer
Relaying and
Multiplexing
SDU Protection

State Vector
State Vector
State Vector

SDU Delimiting

Layer Management

Data Transfer Control
Transmission
Transmission
Transmission
Control
Control
Control
Retransmission
Retransmission
Retransmission
Control
Control
Control
Flow Control
Flow Control
Flow Control

CACEP
RIB
Daemon

RIB
RIB

Enrollment

Authentication

Flow Allocation

CDAP
Parser/Generator

Resource
Allocation
Forwarding Table
Generator

Increasing timescale (functions performed less often) and complexity

System
(Host)

IPC
Process
Mgmt
Agemt
Shim IPC
Process
Recursive InterNet Architecture
 Recognizes the three phases all communication
goes through!
 Other advantages of RINA:
 Inherent support for QoS
 Multihoming and mobility
 More secure

15/10/13

13
Flow allocation in RINA
 Application A performs a flow allocation request
 Application B responds to this request
 Accept
 Deny

 If positive reply, a flow is created:
 Port-id is assigned for further reference
 Connection (with CEP-id) is maintained in lower layer
while there is active data transfer

15/10/13

14
After flow allocation

15/10/13

15
Flow allocation in TCP/IP
 UDP has the same problem as Ethernet





No flow allocation
“Well-known ports”  security risk
Either manual configuration needed for flow allocation
Or use of other protocols (for instance SIP)

 TCP has an incomplete flow allocation phase
 But, overloads the uses of the TCP port (port-id and
CEP-id)  another security risk
 So, no decoupling of the flow allocation (port-id) and
data transfer phase (CEP-id)
15/10/13

16
Shim IPC process for 802.1q
 Interfaces a new model to a legacy
implementation  shim
 Allows RINA DIFs to use it unchanged
 Only provides the capability of a legacy layer
 Simulates flow allocation

15/10/13

17
Shim IPC process over 802.1q
 Spans a single Ethernet segment
 VLAN id is shim DIF name: joining the VLAN is
considered enrolling in the shim DIF
 Uses Ethernet II: Only one user of the shim DIF
 Reuses the Address Resolution Protocol (ARP)
 In RINA knowing which application is available at
what address(es) is part of enrollment
 For DIFs with small scope it can be part of flow
allocation, just broadcast the allocate request

15/10/13

18
Placement of the different PMs

15/10/13

19
State diagram

15/10/13

20
Conclusion
 Creating the shim DIF over Ethernet reveals
something about the nature of layers
 For reliable inter process communication, three
phases have to be present
 Port-id and CEP-id have to be decoupled!
 Port-ids seem to be a necessity for a clean
separation of layers

15/10/13

21
Questions ?
Sander Vrijders
sander.vrijders@intec.ugent.be
www.ibcn.intec.ugent.be
Internet Based Communication
Networks and Services (IBCN)
Department of Information
Technology (INTEC)
Ghent University - iMinds
15/10/13

22

Contenu connexe

Tendances

RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussion
Eleni Trouva
 
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
Eleni Trouva
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 

Tendances (20)

IRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, DublinIRATI @ RINA Workshop 2014, Dublin
IRATI @ RINA Workshop 2014, Dublin
 
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
RINA overview and ongoing research in EC-funded projects, ISO SC6 WG7
 
RINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussionRINA detailed components overview and implementation discussion
RINA detailed components overview and implementation discussion
 
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
RINA motivation, introduction and IRATI goals. IEEE ANTS 2012
 
Pristine glif 2015
Pristine glif 2015Pristine glif 2015
Pristine glif 2015
 
Irati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA WorkshopIrati goals and achievements - 3rd RINA Workshop
Irati goals and achievements - 3rd RINA Workshop
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016
 
RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014RINA Tutorial @ IEEE Globecom 2014
RINA Tutorial @ IEEE Globecom 2014
 
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
EU-Taiwan Workshop on 5G Research, PRISTINE introductionEU-Taiwan Workshop on 5G Research, PRISTINE introduction
EU-Taiwan Workshop on 5G Research, PRISTINE introduction
 
Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...Reconstructing computer networking with RINA: how solid scientific foundation...
Reconstructing computer networking with RINA: how solid scientific foundation...
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Rina IRATI @ GLIF Singapoure -2013
Rina IRATI @ GLIF Singapoure -2013Rina IRATI @ GLIF Singapoure -2013
Rina IRATI @ GLIF Singapoure -2013
 
1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop1. RINA motivation - TF Workshop
1. RINA motivation - TF Workshop
 
Architectures and buildings
Architectures and buildingsArchitectures and buildings
Architectures and buildings
 
3. RINA use cases, results, benefits
3. RINA use cases, results, benefits3. RINA use cases, results, benefits
3. RINA use cases, results, benefits
 
Pristine rina-tnc-2016
Pristine rina-tnc-2016Pristine rina-tnc-2016
Pristine rina-tnc-2016
 
Rina acc-icc16-stein
Rina acc-icc16-steinRina acc-icc16-stein
Rina acc-icc16-stein
 
RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017RINA research results - NGP forum - SDN World Congress 2017
RINA research results - NGP forum - SDN World Congress 2017
 
Eucnc rina-tutorial
Eucnc rina-tutorialEucnc rina-tutorial
Eucnc rina-tutorial
 
2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)2016 06-10-ieee-sdn (1)
2016 06-10-ieee-sdn (1)
 

En vedette

En vedette (14)

3 addressingthe problem130123
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123
 
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
 
The hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguelThe hague rina-workshop-welcome-miguel
The hague rina-workshop-welcome-miguel
 
Rina sim workshop
Rina sim workshopRina sim workshop
Rina sim workshop
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
 
The hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzoThe hague rina-workshop-interop-deployment_vincenzo
The hague rina-workshop-interop-deployment_vincenzo
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
 
The hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diegoThe hague rina-workshop-nfv-diego
The hague rina-workshop-nfv-diego
 
The hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peymanThe hague rina-workshop-congestioncontrol-peyman
The hague rina-workshop-congestioncontrol-peyman
 
The hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduardThe hague rina-workshop-mobility-eduard
The hague rina-workshop-mobility-eduard
 
Congestion Control in Recursive Network Architectures
Congestion Control in Recursive Network ArchitecturesCongestion Control in Recursive Network Architectures
Congestion Control in Recursive Network Architectures
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 

Similaire à Unreliable inter process communication in Ethernet: Migrating to RINA with the shim DIF

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

Similaire à Unreliable inter process communication in Ethernet: Migrating to RINA with the shim DIF (20)

TCP/IP Modal
TCP/IP ModalTCP/IP Modal
TCP/IP Modal
 
53426980 tcp-ip
53426980 tcp-ip53426980 tcp-ip
53426980 tcp-ip
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
TCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple ExplanationTCP/IP-Protocol Suite-Simple Explanation
TCP/IP-Protocol Suite-Simple Explanation
 
Tcp ip-ppt
Tcp ip-pptTcp ip-ppt
Tcp ip-ppt
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP&IP Model.pptx
TCP&IP Model.pptxTCP&IP Model.pptx
TCP&IP Model.pptx
 
tcp-ip-ppt-protocols-140212011249-phpapp02.ppt
tcp-ip-ppt-protocols-140212011249-phpapp02.ppttcp-ip-ppt-protocols-140212011249-phpapp02.ppt
tcp-ip-ppt-protocols-140212011249-phpapp02.ppt
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Presentation on TCP\IP protocols
Presentation on TCP\IP protocolsPresentation on TCP\IP protocols
Presentation on TCP\IP protocols
 
CNF.Chap.5.pptx
CNF.Chap.5.pptxCNF.Chap.5.pptx
CNF.Chap.5.pptx
 
Communication Networks 1
Communication Networks 1Communication Networks 1
Communication Networks 1
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Unreliable inter process communication in Ethernet: Migrating to RINA with the shim DIF

  • 1. Unreliable inter process communication in Ethernet: Migrating to RINA with the shim DIF 15/10/13 Sander Vrijders, Dimitri Staessens, Didier Colle, Mario Pickavet Ghent University – iMinds Eleni Trouva, Eduard Grasa i2CAT John Day, Lou Chitkushev Boston University 1
  • 2. Communication between application processes  Not to be confused with communication between interfaces  TCP/IP !!!  Basic premise: All networking is inter process communication and IPC only  All communication goes through three phases:  Enrollment  Flow allocation  Data transfer 15/10/13 2
  • 3. Enrollment  Creates/maintains/distributes/deletes the information within a layer that is needed to create instances of communication  Often ignored in the current internet architecture  Addresses, maximum packet size, …  More well-formed enrollment phases in IEEE 802.11 (WiFi) and IEEE 802.1q (VLAN) 15/10/13 3
  • 4. Flow allocation  Creates/maintains/deletes the shared state between connection endpoint-ids necessary to support the functions of the data transfer phase  For unicast: between 2 communication processes  Also often ignored, forgotten  Without a flow allocation phase, all Protocol Data Units (PDUs) are implicitly accepted 15/10/13 4
  • 5. Data transfer  The actual sending of data  In the current architecture the other phases are often skipped  Immediately skipping to data transfer causes unreliable inter process communication 15/10/13 5
  • 6. Examining the Ethernet Header  Ethernet II: specification released by DEC, Intel, Xerox (hence also called DIX Ethernet) Preamble MAC dest MAC src 802.1q header (optional) Ethertype Payload FCS Interfram e gap 7 bytes 6 bytes 6 bytes 4 bytes 2 bytes 42-1500 bytes 4 bytes 12 bytes 15/10/13 6
  • 7. Examining the Ethernet header  IEEE 802.3 Frame Preamble MAC dest MAC src 802.1q header (optional) Length Payload FCS Interfram e gap 7 bytes 6 bytes 6 bytes 4 bytes 2 bytes 42-1500 bytes 4 bytes 12 bytes  Combined with IEEE 802.2 (LLC) DSAP SSAP Control Information 1 byte 1 byte 1-2 bytes M bytes (M>=0 ) 15/10/13 7
  • 8. Ethertype  Identifies the syntax of the encapsulated protocol  Layers below need to know the syntax of the layer above  Layer violation!  Same for the protocol id in the IPv4 header 15/10/13 8
  • 9. Consequences of using an Ethertype  Also means only one flow can be distinguished between an address pair  The MAC address doubles as the connection endpoint-id 15/10/13 9
  • 10. Same problem with LLC?  Source and Destination Service Access Points (SAPs) are the connection endpoint-ids  Allow for more than one flow to be distinguished between two communicating nodes  Still fixed endpoints  All traffic will still be accepted 15/10/13 10
  • 11. Recursive InterNet Architecture (RINA)  New internetwork architecture  Unified theory of networking  A layer = a distributed application that provides IPC over a certain scope, called a Distributed IPC Facility (DIF)  Recurse as much as needed  Can be configured to a certain policy 15/10/13 11
  • 12. Architectural model Application Specific Tasks System (Host) System (Router) Appl. Process Other Mgt. Tasks IPC Mgt. Tasks Multipl exing SDU Protec tion IPC Resource Mgt. Mgmt Agemt Inter DIF Directory IPC Process Shim IPC Process DIF IPC Process Shim DIF over TCP/UDP Appl. Process Mgmt Agemt Shim IPC Process Shim IPC Process Shim DIF over Ethernet IPC API Data Transfer Data Transfer Data Transfer Data Transfer Relaying and Multiplexing SDU Protection State Vector State Vector State Vector SDU Delimiting Layer Management Data Transfer Control Transmission Transmission Transmission Control Control Control Retransmission Retransmission Retransmission Control Control Control Flow Control Flow Control Flow Control CACEP RIB Daemon RIB RIB Enrollment Authentication Flow Allocation CDAP Parser/Generator Resource Allocation Forwarding Table Generator Increasing timescale (functions performed less often) and complexity System (Host) IPC Process Mgmt Agemt Shim IPC Process
  • 13. Recursive InterNet Architecture  Recognizes the three phases all communication goes through!  Other advantages of RINA:  Inherent support for QoS  Multihoming and mobility  More secure 15/10/13 13
  • 14. Flow allocation in RINA  Application A performs a flow allocation request  Application B responds to this request  Accept  Deny  If positive reply, a flow is created:  Port-id is assigned for further reference  Connection (with CEP-id) is maintained in lower layer while there is active data transfer 15/10/13 14
  • 16. Flow allocation in TCP/IP  UDP has the same problem as Ethernet     No flow allocation “Well-known ports”  security risk Either manual configuration needed for flow allocation Or use of other protocols (for instance SIP)  TCP has an incomplete flow allocation phase  But, overloads the uses of the TCP port (port-id and CEP-id)  another security risk  So, no decoupling of the flow allocation (port-id) and data transfer phase (CEP-id) 15/10/13 16
  • 17. Shim IPC process for 802.1q  Interfaces a new model to a legacy implementation  shim  Allows RINA DIFs to use it unchanged  Only provides the capability of a legacy layer  Simulates flow allocation 15/10/13 17
  • 18. Shim IPC process over 802.1q  Spans a single Ethernet segment  VLAN id is shim DIF name: joining the VLAN is considered enrolling in the shim DIF  Uses Ethernet II: Only one user of the shim DIF  Reuses the Address Resolution Protocol (ARP)  In RINA knowing which application is available at what address(es) is part of enrollment  For DIFs with small scope it can be part of flow allocation, just broadcast the allocate request 15/10/13 18
  • 19. Placement of the different PMs 15/10/13 19
  • 21. Conclusion  Creating the shim DIF over Ethernet reveals something about the nature of layers  For reliable inter process communication, three phases have to be present  Port-id and CEP-id have to be decoupled!  Port-ids seem to be a necessity for a clean separation of layers 15/10/13 21
  • 22. Questions ? Sander Vrijders sander.vrijders@intec.ugent.be www.ibcn.intec.ugent.be Internet Based Communication Networks and Services (IBCN) Department of Information Technology (INTEC) Ghent University - iMinds 15/10/13 22

Notes de l'éditeur

  1. Remember, this is the architecture! DAF Support Tasks: The IPC Management (and other management: memory, storage, CPU) tasks are usually implemented as OS functionality. IPC Resource Management: Creation/Deletion of IPC processes Multiplexing (Usually inverse multiplexing, an application flow into multiple DIF flows, for example: 1 for video, 1 for audio, 1 for text, …) SDU Protection (CRCs, encryption, TTL, …) IDD (Inter DIF Directory, find out in what DIF the destination application process is executing)