Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VKlvJG022396 for ; Fri, 31 Oct 2008 13:47:57 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9VKaRsF022115 for ; Fri, 31 Oct 2008 16:36:27 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9VKaRYo022110; Fri, 31 Oct 2008 16:36:27 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Fri, 31 Oct 2008 16:36:27 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C93B98.5885265E" Date: Fri, 31 Oct 2008 16:36:25 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002FE5634@IMCSRV4.MITRE.ORG> In-Reply-To: <6.2.1.2.2.20081031162349.026ff530@po2.bbn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: Ack7l/1wr0rFQrXETgy+9aEKoZAhJwAADlng References: <6.2.1.2.2.20081031162349.026ff530@po2.bbn.com> From: "Symington, Susan F." To: "Jon Shapiro" , X-OriginalArrivalTime: 31 Oct 2008 20:36:27.0488 (UTC) FILETIME=[593B0E00:01C93B98] Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 20:47:58 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C93B98.5885265E Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I am available until 4PM EST on both days (11/12 and 11/13). =20 -susan =20 ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Jon Shapiro Sent: Friday, October 31, 2008 4:31 PM To: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue =20 It seems like 11/12 or 11/13 are good dates for people. So lets try those as targets.=20 I am available until 4p EST on 11/12, and all day on 11/13. Does anybody have restriction(s) on either days? Thanks! - Jon Shapiro ________________________________ Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249 BBN Technologies=20 10 Moulton St. Cambridge MA, 02138 (617) 873-4383 "The early bird gets the worm, but the second mouse gets the cheese." ------_=_NextPart_001_01C93B98.5885265E Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I am available until 4PM EST on both days (11/12 and = 11/13).

 

-susan

 

**********************************************************= *******

Susan Symington

The MITRE Corporation

susan@mitre.org

703-983-7209 (voice)

703-983-7142 (fax)

**********************************************************= ********

From:= dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf = Of Jon Shapiro
Sent: Friday, October 31, 2008 4:31 PM
To: dtn-interest@mailman.dtnrg.org
Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation = Issue

 

It seems like 11/12 or 11/13 are good dates for people.  So lets try those as targets.

I am available until 4p EST on 11/12, and all day on 11/13.  Does = anybody have restriction(s) on either days?

Thanks!
- Jon Shapiro



Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249

BBN Technologies
10 Moulton St.
Cambridge MA, 02138

(617) 873-4383

"The early bird gets the worm, but the second mouse gets the = cheese."

------_=_NextPart_001_01C93B98.5885265E-- Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VKk9wR022282 for ; Fri, 31 Oct 2008 13:46:09 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9VKYdP6017536 for ; Fri, 31 Oct 2008 16:34:39 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9VKYcGL017522; Fri, 31 Oct 2008 16:34:38 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Fri, 31 Oct 2008 16:34:39 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C93B98.17FFB8DE" Date: Fri, 31 Oct 2008 16:34:35 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002FE5633@IMCSRV4.MITRE.ORG> In-Reply-To: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: Ack7eqY/bLunyKcrQ2ODY62P+SBL/AAF0eag References: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> From: "Symington, Susan F." To: "Jon Shapiro" , X-OriginalArrivalTime: 31 Oct 2008 20:34:39.0097 (UTC) FILETIME=[189FE690:01C93B98] Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 20:46:10 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C93B98.17FFB8DE Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Jon, =20 Hopefully some of your answers can be found in the I-D that I uploaded to the IETF website this morning (http://www.ietf.org/internet-drafts/draft-irtf-dtnrg-bundle-encapsulat ion-04.txt ) . Based on this I-D, I have provided responses to your questions interspersed below: =20 ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Jon Shapiro Sent: Friday, October 31, 2008 1:00 PM To: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue =20 Hi All, The recent discussion concerning the Bundle-In-Bundle feature has raised a number of questions for me as I strive to understand its use while familiarizing myself with the current reference implementation. As BBN is working on a DTN implementation that should include this feature, I propose that we have a teleconference, hosted by BBN, where all of the interested parties could participate and hopefully come to a resolution. =20 I propose that we hold this teleconference on 5-Nov-08, 1-2pm EST, if this works for the interested parties. If not, please propose an alternate date and time. If this topic and teleconference does not interest you please skip the remainder and thank you for your time. If this topic does interest you please let me know and I will send the teleconference connection information to you. A summary of my understanding of the feature and concerns follows. The previous scheme for encapsulating a Bundle-in-a-Bundle, henceforth BIB, was to place the entire bundle B1 inside another bundle wB1, essentially by putting another primary block in front of B1's primary block, and placing (wrapping) the original primary block and payload of B1 in the wB1 payload block. This scheme allowed the application agent to send bundle B1 to nodes without triggering (the original set of) BPA actions for B1. The wrapper bundle wB1 was an administrative record type bundle. Note that the scheme to wrap B1 inside bundle wB1, may be generalized to allow multiple bundles B1, B2, B3 etc. to be wrapped inside wB1, and may also allow wB1 to be extended (or wrapped inside wB2) so as to include additional bundles B4, B5. The lack of specificity in this matter is a weakness and needs to be addressed, especially given the objections stemming from the limitation on custody transfer below, as the handling of each inner bundle is presumed to be identical when wrapped inside wBN. =20 The previously proposed BIB scheme using administrative records as the wrapper had a problem (as noted by Peter Lovell) in that RFC 5050 sec. 4.2, states: "If the bundles processing control flags indicate that the bundle's application data unit is an administrative record, then the custody transfer requested flag must be zero and all status report request flags must be zero." This requirement basically limits the use of administrative records to their intended "signal" or "report" uses (see RFC 5050 sec. 5.1), and prevents their use for BIB use since it was considered important to allow custody transfer to be used for the wrapped bundle(s). =20 Susan Symington has proposed that one of three alternate proposals therefore be followed:=20 1. Accept this limitation. 2. Change the RFC 5050 section 4.2 rule to remove this limitation. 3. Use a different mechanism instead of the administrative record. One proposal is to use an extension block to hold both the original version of the modified primary block fields and information such as count and offset values that can be used to reconstitute the wrapped bundle(s) from the payload block. =20 These are all excellent points, but I am not sure how to understand them without context. I believe that a number of basic questions need to be addressed as we move forward with any BIB scheme. These questions are: 1. What are the uses for Bundle-In-Bundle? [Susan] A. The use you mention (delivering a cached bundle to a different EID than is listed as the destination in the bundle).=20 B. Sending a multicast bundle across a network to a specific destination D1 node (so that it is not disseminated as a multicast bundle between the source and destination D1, but it is disseminated as a multicast bundle once it is forwarded onward from D1).=20 1a. Why can't it be done currently? [Susan] A. Use case A because we don't have an integrity ciphersuite defined that permits it. And B. Use case B because you simply can't do this now in the BP. 1b. Who needs the BIB feature? [Susan] A. Folks wanting to perform content-centric distribution of cached data to new nodes that join a network, using the current integrity ciphersuite. B. Folks wanting to implement custodial multicast and send custodial retransmissions efficiently. 2. How are BIBs created? (by the app, or by the BPA?) [Susan] The application agent of the bundle node creates the BIB. It creates an encapsulating bundle, and, in the simplest case (1 bundle is encapsulated) it puts the bundle to be encapsulated into this encapsulating bundle's payload field, and adds a BiB Encapsulation block to the encapsulating bundle. The destination EID of the encapsulating bundle must be an EID of which the node that will be de-encapsulating the bundle is a member.=20 3. How are BIBs treated in transit? (hopefully as just another bundle) [Susan] Yes, they are just bundles and are just forwarded from hop to hop until they reach their destination. It is at the destination that they get treated differently, based only on the fact that they contain a BIB encapsulation block. 4. How are BIBs treated at the endpoints? (handled by app or BPA?) [Susan] They are delivered at their destination endpoint node (just like any other bundles). What is different is how the application agent of the node treats them once they are delivered. The application agent extracts the encapsulated bundles and passes each of the extracted bundles to the BPA for processing as if they had just been received from another node. This means they may then be delivered and /or forwarded by the BPA, as appropriate. =20 I hope these answers help. =20 -susan First: What are the uses, why isn't it already covered, why is it needed. The most concrete example (use case) so far is that a new node (N-new) appears in the network and requests information which exists as a previously delivered multicast bundle on an existing node (N-old). N-old wants to send the multicast data to N-new without flooding the network. Therefore N-old wants to substitute a unicast address in place of the multicast address, at least during intermediate hops, so that the bundle transport only consumes a minimal set of resources. N-old may require custody transfer and other services for this bundle that differ from the original set of services used to transport the bundle. Finally, the bundle may be protected by a checksum that is calculated across both its payload and primary block, such that the original multicast destination address has been included in the checksum. Therefore the original primary block can only be modified in transit, but not once it arrives (if the checksum needs to be calculated at each step the original block could be resurrected en-route for this purpose, and then re-wrapped). =20 Other considerations:=20 A) Flexibility is specifying different handling from original bundle handling such as custody transfer: It seems a bit odd that a multicast bundle would require custody transfer, since the node holding it (N-old) is presumably part of the same multicast group that N-new is a member of. However on the working assumption that N-new could be a better custodian than a resource bound N-old, and for maximum flexibility, it seems valid to keep this as part of the BIB requirements. =20 B) Multiple bundles within a single wrapped bundle: It also seems fair to allow multiple bundles to be wrapped inside a single bundle, so long as all of the bundles being wrapped together all share the same endpoint(s) and in transit handling requirements (custody transfer, etc.). The use case above could be reformulated such that N-old is holding multiple multicast bundles to send to N-new, and thus wishes to form a wrapped bundle wB1 consisting of B1, B2 and B3. The resulting bundle aggregate would then be handled as a single bundle, although it might get fragmented en-route. =20 C) Allowing other bundles to be added to an existing (wrapped or unwrapped) bundle: The utility of further wrapping additional bundles along with previously wrapped bundles seems reasonable (perhaps some node along the way determines to add bundles in response to the same request). However it appears to force several decisions. First, it appears to require that the BPA, as the entity that handles wrapped bundles 'in the tunnel', know how to peek inside them (i.e., the payload of a wrapped bundle can not be opaque). This in turn seems to require that the BPA be the entity that decides to wrap bundles in the first place, as an in-transit bundle has not reached the endpoint so the application would not be part of the processing, while the BPA would. =20 Including this feature raises a number of questions. Is it needed? Would it prevent the application from generating wrapped bundles as well? Would it impose a more complicated control interface between the application(s) and the BPA to support application wrapping? Why limit the BPA to extending pre-existing wrapped bundles - i.e., why not allow bundle aggregation (via wrapped bundles) whenever the BPA detects multiple bundles traveling to the same endpoint(s) with the same handling? Is this desired? =20 D) Layering of interfaces, features: My main concern about any BIB implementation is that it should follow the layering philosophy, where the entity that wraps the bundle is the entity that un-wraps it, to avoid complicated control flows between separate layers. As the discussion concerning extending an existing (wrapped or unwrapped) bundle by the BPA to include other bundles indicates, there appear to be several choices: 1) If the application agent is wrapping and handing a wrapped bundle down to the BPA, it should expect to be delivered the wrapped bundle at the tunnel endpoint(s), and it should be the entity that unwraps the bundle upon delivery. This would seem to prevent the BPA from further wrapping additional bundles en-route as the wrapped bundle would then be an opaque payload. 2) If the application-to-BPA interface is defined such that it allows a set of bundles to be sent to a unicast endpoint then it would be the BPA that does the wrapping, and it should be the BPA that does the unwrapping, so that the BPA would then present each un-wrapped bundle to the endpoint application as if it had arrived separately. If the BPA was doing the wrapping, it could add other bundles en-route. This approach would allow the BPA to further wrap bundles en-route, and would allow the BPA to initiate bundle wrapping if so desired.=20 3) These two approaches could be combined using different mechanisms for the application vs. the BPA to wrap bundles. In this approach, any bundles wrapped by the application would be handled as a single bundle back to the application by the BPA, and this bundle would have to be un-wrapped by the application. The BPA, however, could add bundles to any existing bundle it handled so long as the bundle handling and endpoint were the same. This scheme would create two parallel mechanisms, one for the application and one for the BPA, for managing Bundle-In-Bundle. =20 To some degree these are low level details. However they are broadly determined by the entity that is given the role of wrapping (and un-wrapping) bundles, and this brings me back to my original questions 1 and 2 - what are the uses for this service and how is it invoked. Once we have consensus on answers to those, I believe the other answers will be more forthcoming. =20 Thank you for reading so far. I look forward to hearing your thoughts on these matters. - Jon Shapiro ________________________________ Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249 BBN Technologies=20 10 Moulton St. Cambridge MA, 02138 (617) 873-4383 "The early bird gets the worm, but the second mouse gets the cheese." ------_=_NextPart_001_01C93B98.17FFB8DE Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Jon,

 

Hopefully some of your answers can be found in the I-D = that I uploaded to the IETF website this morning (http://www.ietf.org/internet-drafts/draft-irtf-dt= nrg-bundle-encapsulation-04.txt) . Based on this I-D, I have provided responses to your questions interspersed = below:

 

**********************************************************= *******

Susan Symington

The MITRE Corporation

susan@mitre.org

703-983-7209 (voice)

703-983-7142 (fax)

**********************************************************= ********

From:= dtn-interest-bounces@maillists.intel-research.net = [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Jon Shapiro
Sent: Friday, October 31, 2008 1:00 PM
To: dtn-interest@mailman.dtnrg.org
Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation = Issue

 

Hi All,

The recent discussion concerning the Bundle-In-Bundle feature has raised = a number of questions for me as I strive to understand its use while familiarizing myself with the current reference implementation.  As = BBN is working on a DTN implementation that should include this feature, I = propose that we have a teleconference, hosted by BBN, where all of the = interested parties could participate and hopefully come to a resolution. 

I propose that we hold this teleconference on 5-Nov-08, 1-2pm EST, if = this works for the interested parties.  If not, please propose an = alternate date and time.  If this topic and teleconference does not interest = you please skip the remainder and thank you for your time.  If this = topic does interest you please let me know and I will send the teleconference = connection information to you.


A summary of my understanding of the feature and concerns follows.

The previous scheme for encapsulating a Bundle-in-a-Bundle, henceforth = BIB, was to place the entire bundle B1 inside another bundle wB1, essentially by = putting another primary block in front of B1's primary block, and placing = (wrapping) the original primary block and payload of B1 in the wB1 payload = block.  This scheme allowed the application agent to send bundle B1 to nodes = without triggering (the original set of) BPA actions for B1.  The wrapper = bundle wB1 was an administrative record type bundle.

Note that the scheme to wrap B1 inside bundle wB1, may be generalized to = allow multiple bundles B1, B2, B3 etc. to be wrapped inside wB1, and may also = allow wB1 to be extended (or wrapped inside wB2) so as to include additional = bundles B4, B5.  The lack of specificity in this matter is a weakness and = needs to be addressed, especially given the objections stemming from the = limitation on custody transfer below, as the handling of each inner bundle is presumed = to be identical when wrapped inside wBN.  

The previously proposed BIB scheme using administrative records as the = wrapper had a problem (as noted by Peter Lovell) in that RFC 5050 sec. 4.2, = states: "If the bundles processing control flags indicate that the bundle's application data unit is an administrative record, then the custody = transfer requested flag must be zero and all status report request flags must be zero."  This requirement basically limits the use of = administrative records to their intended "signal" or "report" uses = (see RFC 5050 sec. 5.1), and prevents their use for BIB use since it was = considered important to allow custody transfer to be used for the wrapped = bundle(s). 

Susan Symington has proposed that one of three alternate proposals = therefore be followed:

1. Accept this limitation.
2. Change the RFC 5050 section 4.2 rule to remove this limitation.
3. Use a different mechanism instead of the administrative record.  = One proposal is to use an extension block to hold both the original version = of the modified primary block fields and information such as count and offset = values that can be used to reconstitute the wrapped bundle(s) from the payload block.  

These are all excellent points, but I am not sure how to understand them without context.  I believe that a number of basic questions need = to be addressed as we move forward with any BIB scheme.  These questions = are:

        1. What are the uses for Bundle-In-Bundle?

[Susan]  A. The use you mention (delivering a cached = bundle to a different EID than is listed as the destination in the bundle). =

         &nbs= p;     B. Sending a multicast bundle across a network to a specific destination = D1  node (so that it is not disseminated as a multicast bundle between the source = and  destination D1, but it is disseminated as a multicast bundle once it is forwarded = onward from D1).


            &= nbsp;   1a. Why can't it be done currently?

[Susan] A. Use case A because we don’t have an = integrity ciphersuite defined that permits it.

And        B. Use case = B because you simply can’t do this now in the = BP.


            &= nbsp;   1b. Who needs the BIB feature?

[Susan] A. Folks wanting to perform content-centric = distribution of cached data to new nodes that join a network, using the current = integrity ciphersuite.

         &nbs= p;   B. Folks wanting to implement custodial multicast and send custodial retransmissions  efficiently.


        2.  How are BIBs = created?  (by the app, or by the BPA?)

[Susan] The application agent of the bundle node creates = the BIB. It creates an encapsulating bundle,  and, in the simplest case = (1 bundle is encapsulated) it puts the bundle to be encapsulated into this encapsulating bundle’s payload field, and adds a BiB Encapsulation = block to the encapsulating bundle. The destination EID of the encapsulating = bundle must be an EID of which the node that will be de-encapsulating the bundle is = a member.


        3.  How are BIBs treated = in transit?  (hopefully as just another bundle)

[Susan] Yes, they are just bundles and are just forwarded = from hop to hop until they reach their destination. It is at the destination = that they get treated differently, based only on the fact that they contain a = BIB encapsulation block.
        4.  How are BIBs treated = at the endpoints?  (handled by app or BPA?)
[Susan] They are delivered at their destination endpoint = node (just like any other bundles). What is different is how the application agent = of the node treats them once they are delivered. The application agent extracts the encapsulated bundles and passes each of the extracted bundles to the BPA = for processing as if they had just been received from another node. This = means they may then be delivered and /or forwarded by the BPA, as = appropriate.

 

I hope these answers = help.

 

-susan
First: What are the uses, why isn't it already covered, why is it = needed.

The most concrete example (use case) so far is that a new node (N-new) = appears in the network and requests information which exists as a previously = delivered multicast bundle on an existing node (N-old).  N-old wants to send = the multicast data to N-new without flooding the network.  Therefore = N-old wants to substitute a unicast address in place of the multicast address, = at least during intermediate hops, so that the bundle transport only = consumes a minimal set of resources.  N-old may require custody transfer and = other services for this bundle that differ from the original set of services = used to transport the bundle.  Finally, the bundle may be protected by a = checksum that is calculated across both its payload and primary block, such that = the original multicast destination address has been included in the = checksum.  Therefore the original primary block can only be modified in transit, = but not once it arrives (if the checksum needs to be calculated at each step the original block could be resurrected en-route for this purpose, and then re-wrapped). 

Other considerations:

A) Flexibility is specifying different handling from original bundle = handling such as custody transfer:

It seems a bit odd that a multicast bundle would require custody = transfer, since the node holding it (N-old) is presumably part of the same = multicast group that N-new is a member of.  However on the working assumption = that N-new could be a better custodian than a resource bound N-old, and for = maximum flexibility, it seems valid to keep this as part of the BIB = requirements. 

B) Multiple bundles within a single wrapped bundle:

It also seems fair to allow multiple bundles to be wrapped inside a = single bundle, so long as all of the bundles being wrapped together all share = the same endpoint(s) and in transit handling requirements (custody transfer, etc.).  The use case above could be reformulated such that N-old is holding multiple multicast bundles to send to N-new, and thus wishes to = form a wrapped bundle wB1 consisting of B1, B2 and B3. The resulting bundle = aggregate would then be handled as a single bundle, although it might get = fragmented en-route. 

C) Allowing other bundles to be added to an existing (wrapped or = unwrapped) bundle:

The utility of further wrapping additional bundles along with previously wrapped bundles seems reasonable (perhaps some node along the way = determines to add bundles in response to the same request).  However it appears = to force several decisions.  First, it appears to require that the BPA, as = the entity that handles wrapped bundles 'in the tunnel', know how to peek = inside them (i.e., the payload of a wrapped bundle can not be opaque).  = This in turn seems to require that the BPA be the entity that decides to wrap = bundles in the first place, as an in-transit bundle has not reached the endpoint = so the application would not be part of the processing, while the BPA = would. 

Including this feature raises a number of questions.  Is it = needed?  Would it prevent the application from generating wrapped bundles as = well?  Would it impose a more complicated control interface between the = application(s) and the BPA to support application wrapping?  Why limit the BPA to extending pre-existing wrapped bundles - i.e., why not allow bundle = aggregation (via wrapped bundles) whenever the BPA detects multiple bundles = traveling to the same endpoint(s) with the same handling?  Is this = desired? 

D) Layering of interfaces, features:

My main concern about any BIB implementation is that it should follow = the layering philosophy, where the entity that wraps the bundle is the = entity that un-wraps it, to avoid complicated control flows between separate = layers.  As the discussion concerning extending an existing (wrapped or = unwrapped) bundle by the BPA to include other bundles indicates, there appear to be several choices:

1) If the application agent is wrapping and handing a wrapped bundle = down to the BPA, it should expect to be delivered the wrapped bundle at the = tunnel endpoint(s), and it should be the entity that unwraps the bundle upon delivery.  This would seem to prevent the BPA from further wrapping additional bundles en-route as the wrapped bundle would then be an = opaque payload.

2) If the application-to-BPA interface is defined such that it allows a = set of bundles to be sent to a unicast endpoint then it would be the BPA that = does the wrapping, and it should be the BPA that does the unwrapping, so that the = BPA would then present each un-wrapped bundle to the endpoint application as = if it had arrived separately.  If the BPA was doing the wrapping, it = could add other bundles en-route. This approach would allow the BPA to further = wrap bundles en-route, and would allow the BPA to initiate bundle wrapping if = so desired.

3) These two approaches could be combined using different mechanisms for = the application vs. the BPA to wrap bundles.  In this approach, any = bundles wrapped by the application would be handled as a single bundle back to = the application by the BPA, and this bundle would have to be un-wrapped by = the application.  The BPA, however, could add bundles to any existing = bundle it handled so long as the bundle handling and endpoint were the = same.  This scheme would create two parallel mechanisms, one for the = application and one for the BPA, for managing Bundle-In-Bundle.  


To some degree these are low level details.  However they are = broadly determined by the entity that is given the role of wrapping (and = un-wrapping) bundles, and this brings me back to my original questions 1 and 2 - what = are the uses for this service and how is it invoked.  Once we have = consensus on answers to those, I believe the other answers will be more forthcoming.  

Thank you for reading so far.  I look forward to hearing your = thoughts on these matters.

- Jon Shapiro



Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249

BBN Technologies
10 Moulton St.
Cambridge MA, 02138

(617) 873-4383

"The early bird gets the worm, but the second mouse gets the = cheese."

------_=_NextPart_001_01C93B98.17FFB8DE-- Received: from mx11.bbn.com (mx11.bbn.com [128.33.0.80]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VKg7RQ022062 for ; Fri, 31 Oct 2008 13:42:08 -0700 Received: from dhcp89-069-173.bbn.com ([128.89.69.173] helo=7C-541.bbn.com) by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from ) id 1Kw0dh-0001QX-FM for dtn-interest@mailman.dtnrg.org; Fri, 31 Oct 2008 16:30:37 -0400 Message-Id: <6.2.1.2.2.20081031162349.026ff530@po2.bbn.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.1.2 Date: Fri, 31 Oct 2008 16:30:37 -0400 To: dtn-interest@mailman.dtnrg.org From: Jon Shapiro Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_22389343==.ALT" Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 20:42:08 -0000 --=====================_22389343==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed It seems like 11/12 or 11/13 are good dates for people. So lets try those as targets. I am available until 4p EST on 11/12, and all day on 11/13. Does anybody have restriction(s) on either days? Thanks! - Jon Shapiro ---------- Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249 BBN Technologies 10 Moulton St. Cambridge MA, 02138 (617) 873-4383 "The early bird gets the worm, but the second mouse gets the cheese." --=====================_22389343==.ALT Content-Type: text/html; charset="us-ascii" It seems like 11/12 or 11/13 are good dates for people.  So lets try those as targets.

I am available until 4p EST on 11/12, and all day on 11/13.  Does anybody have restriction(s) on either days?

Thanks!
- Jon Shapiro


Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249

BBN Technologies
10 Moulton St.
Cambridge MA, 02138

(617) 873-4383

"The early bird gets the worm, but the second mouse gets the cheese."

--=====================_22389343==.ALT-- Received: from alpha.xerox.com (alpha.Xerox.COM [13.1.64.93]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VKFqj9020803 for ; Fri, 31 Oct 2008 13:15:53 -0700 Received: from [10.224.14.254] ([13.0.211.9]) by alpha.xerox.com with SMTP id <321916(2)>; Fri, 31 Oct 2008 13:04:12 PDT Message-Id: From: Ignacio Solis To: DTN Interest List In-Reply-To: <8E507634779E22488719233DB3DF9FF002FE5615@IMCSRV4.MITRE.ORG> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Fri, 31 Oct 2008 13:04:11 PDT References: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com><4F6A2EF2-9B7C-4391-BC70-9B315F077437@cs.berkeley.edu><490B44A5.5000807@bbn.com> <8E507634779E22488719233DB3DF9FF002FE5615@IMCSRV4.MITRE.ORG> X-Mailer: Apple Mail (2.929.2) Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 20:15:53 -0000 On Oct 31, 2008, at 12:49 PM, Symington, Susan F. wrote: > 11/11 is Veteran's Day (a federal holiday). How about 11/12 or 11/13? I'm out next week on vacation (in case that is still under consideration), so I would prefer the following one. Any day/time works, but being west coast the later the better for me. Nacho > I would also like to note that earlier this morning I uploaded a > revised draft of the Bundle-in-Bundle Encapsulation I-D to the IETF > website. This version uses the mechanism of an extension block rather > than an administrative record to implement encapsulation. You can > find > this new ID at: > > http://www.ietf.org/internet-drafts/draft-irtf-dtnrg-bundle- > encapsulati > on-04.txt > > I haven't had a chance to read through Jon's email yet. > > -susan > ***************************************************************** > Susan Symington > The MITRE Corporation > susan@mitre.org > 703-983-7209 (voice) > 703-983-7142 (fax) > ****************************************************************** > >> -----Original Message----- >> From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn- >> interest-bounces@maillists.intel-research.net] On Behalf Of Kevin >> Fall >> Sent: Friday, October 31, 2008 3:04 PM >> To: Daniel Ellard >> Cc: DTN Interest List >> Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue >> >> that works for me. thx -K >> >> On Oct 31, 2008, at Oct 3110:47 AMPDT, Daniel Ellard wrote: >> >>> Kevin Fall wrote: >>>> Hi. That particular date/time is not possible for me. The >>>> following week is much easier, generally. How about Nov 10, at 1pm >>>> eastern? I am free nearly the whole day, except for 2-3pm Pacific. >>> >>> 11/10 some of the BBN folk are out all day. 11/11? >>> >>> -Dan >>> >> >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VK1A7h020155 for ; Fri, 31 Oct 2008 13:01:11 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9VJneY9025855 for ; Fri, 31 Oct 2008 15:49:41 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9VJneF7025847; Fri, 31 Oct 2008 15:49:40 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Fri, 31 Oct 2008 15:49:41 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Fri, 31 Oct 2008 15:49:38 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002FE5615@IMCSRV4.MITRE.ORG> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: Ack7jBWhmwrgCb0NT6a69q86z3vTigABI6OA References: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com><4F6A2EF2-9B7C-4391-BC70-9B315F077437@cs.berkeley.edu><490B44A5.5000807@bbn.com> From: "Symington, Susan F." To: "Kevin Fall" , "Daniel Ellard" X-OriginalArrivalTime: 31 Oct 2008 19:49:41.0001 (UTC) FILETIME=[D06F1F90:01C93B91] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9VK1A7h020155 Cc: DTN Interest List Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 20:01:11 -0000 11/11 is Veteran's Day (a federal holiday). How about 11/12 or 11/13? I would also like to note that earlier this morning I uploaded a revised draft of the Bundle-in-Bundle Encapsulation I-D to the IETF website. This version uses the mechanism of an extension block rather than an administrative record to implement encapsulation. You can find this new ID at: http://www.ietf.org/internet-drafts/draft-irtf-dtnrg-bundle-encapsulati on-04.txt I haven't had a chance to read through Jon's email yet. -susan ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** >-----Original Message----- >From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn- >interest-bounces@maillists.intel-research.net] On Behalf Of Kevin Fall >Sent: Friday, October 31, 2008 3:04 PM >To: Daniel Ellard >Cc: DTN Interest List >Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue > >that works for me. thx -K > >On Oct 31, 2008, at Oct 3110:47 AMPDT, Daniel Ellard wrote: > >> Kevin Fall wrote: >>> Hi. That particular date/time is not possible for me. The >>> following week is much easier, generally. How about Nov 10, at 1pm >>> eastern? I am free nearly the whole day, except for 2-3pm Pacific. >> >> 11/10 some of the BBN folk are out all day. 11/11? >> >> -Dan >> > >_______________________________________________ >dtn-interest mailing list >dtn-interest@maillists.intel-research.net >http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from gateway0.EECS.Berkeley.EDU (gateway0.EECS.Berkeley.EDU [169.229.60.87]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VJFogG018012 for ; Fri, 31 Oct 2008 12:15:50 -0700 Received: from kfalls-computer.research.intel-research.net (bldmz-nat-161-164.berkeley.intel-research.net [12.155.161.164]) (authenticated bits=0) by gateway0.EECS.Berkeley.EDU (8.14.3/8.13.5) with ESMTP id m9VJ4IA9006898 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Fri, 31 Oct 2008 12:04:20 -0700 (PDT) Message-Id: From: Kevin Fall To: Daniel Ellard In-Reply-To: <490B44A5.5000807@bbn.com> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Fri, 31 Oct 2008 12:04:12 -0700 References: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> <4F6A2EF2-9B7C-4391-BC70-9B315F077437@cs.berkeley.edu> <490B44A5.5000807@bbn.com> X-Mailer: Apple Mail (2.929.2) Cc: DTN Interest List Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 19:15:50 -0000 that works for me. thx -K On Oct 31, 2008, at Oct 3110:47 AMPDT, Daniel Ellard wrote: > Kevin Fall wrote: >> Hi. That particular date/time is not possible for me. The >> following week is much easier, generally. How about Nov 10, at 1pm >> eastern? I am free nearly the whole day, except for 2-3pm Pacific. > > 11/10 some of the BBN folk are out all day. 11/11? > > -Dan > Received: from mx3.bbn.com (mx3.bbn.com [128.33.1.81]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VHwkwK014321 for ; Fri, 31 Oct 2008 10:58:46 -0700 Received: from senshu.bbn.com ([128.89.80.164]) by mx3.bbn.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from ) id 1Kvy5d-0007nC-Cn; Fri, 31 Oct 2008 13:47:18 -0400 Message-ID: <490B44A5.5000807@bbn.com> Date: Fri, 31 Oct 2008 13:47:17 -0400 From: Daniel Ellard Organization: BBN Technologies User-Agent: Thunderbird 2.0.0.17 (Macintosh/20080914) MIME-Version: 1.0 To: Kevin Fall References: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> <4F6A2EF2-9B7C-4391-BC70-9B315F077437@cs.berkeley.edu> In-Reply-To: <4F6A2EF2-9B7C-4391-BC70-9B315F077437@cs.berkeley.edu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 17:58:46 -0000 Kevin Fall wrote: > Hi. That particular date/time is not possible for me. The following > week is much easier, generally. How about Nov 10, at 1pm eastern? I am > free nearly the whole day, except for 2-3pm Pacific. 11/10 some of the BBN folk are out all day. 11/11? -Dan Received: from gateway0.EECS.Berkeley.EDU (gateway0.EECS.Berkeley.EDU [169.229.60.87]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VHT9na012906 for ; Fri, 31 Oct 2008 10:29:09 -0700 Received: from kfalls-computer.research.intel-research.net (bldmz-nat-161-164.berkeley.intel-research.net [12.155.161.164]) (authenticated bits=0) by gateway0.EECS.Berkeley.EDU (8.14.3/8.13.5) with ESMTP id m9VHHdTb005223 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Fri, 31 Oct 2008 10:17:40 -0700 (PDT) Message-Id: <4F6A2EF2-9B7C-4391-BC70-9B315F077437@cs.berkeley.edu> From: Kevin Fall To: Jon Shapiro In-Reply-To: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> Content-Type: multipart/alternative; boundary=Apple-Mail-7-205634092 Mime-Version: 1.0 (Apple Message framework v929.2) Date: Fri, 31 Oct 2008 10:17:33 -0700 References: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> X-Mailer: Apple Mail (2.929.2) Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 17:29:09 -0000 --Apple-Mail-7-205634092 Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Hi. That particular date/time is not possible for me. The following week is much easier, generally. How about Nov 10, at 1pm eastern? I am free nearly the whole day, except for 2-3pm Pacific. thx - K On Oct 31, 2008, at Oct 3110:00 AMPDT, Jon Shapiro wrote: > Hi All, > > The recent discussion concerning the Bundle-In-Bundle feature has > raised a number of questions for me as I strive to understand its > use while familiarizing myself with the current reference > implementation. As BBN is working on a DTN implementation that > should include this feature, I propose that we have a > teleconference, hosted by BBN, where all of the interested parties > could participate and hopefully come to a resolution. > > I propose that we hold this teleconference on 5-Nov-08, 1-2pm EST, > if this works for the interested parties. If not, please propose an > alternate date and time. If this topic and teleconference does not > interest you please skip the remainder and thank you for your time. > If this topic does interest you please let me know and I will send > the teleconference connection information to you. > > > A summary of my understanding of the feature and concerns follows. > > The previous scheme for encapsulating a Bundle-in-a-Bundle, > henceforth BIB, was to place the entire bundle B1 inside another > bundle wB1, essentially by putting another primary block in front of > B1's primary block, and placing (wrapping) the original primary > block and payload of B1 in the wB1 payload block. This scheme > allowed the application agent to send bundle B1 to nodes without > triggering (the original set of) BPA actions for B1. The wrapper > bundle wB1 was an administrative record type bundle. > > Note that the scheme to wrap B1 inside bundle wB1, may be > generalized to allow multiple bundles B1, B2, B3 etc. to be wrapped > inside wB1, and may also allow wB1 to be extended (or wrapped inside > wB2) so as to include additional bundles B4, B5. The lack of > specificity in this matter is a weakness and needs to be addressed, > especially given the objections stemming from the limitation on > custody transfer below, as the handling of each inner bundle is > presumed to be identical when wrapped inside wBN. > > The previously proposed BIB scheme using administrative records as > the wrapper had a problem (as noted by Peter Lovell) in that RFC > 5050 sec. 4.2, states: "If the bundles processing control flags > indicate that the bundle's application data unit is an > administrative record, then the custody transfer requested flag must > be zero and all status report request flags must be zero." This > requirement basically limits the use of administrative records to > their intended "signal" or "report" uses (see RFC 5050 sec. 5.1), > and prevents their use for BIB use since it was considered important > to allow custody transfer to be used for the wrapped bundle(s). > > Susan Symington has proposed that one of three alternate proposals > therefore be followed: > > 1. Accept this limitation. > 2. Change the RFC 5050 section 4.2 rule to remove this limitation. > 3. Use a different mechanism instead of the administrative record. > One proposal is to use an extension block to hold both the original > version of the modified primary block fields and information such as > count and offset values that can be used to reconstitute the wrapped > bundle(s) from the payload block. > > These are all excellent points, but I am not sure how to understand > them without context. I believe that a number of basic questions > need to be addressed as we move forward with any BIB scheme. These > questions are: > > 1. What are the uses for Bundle-In-Bundle? > 1a. Why can't it be done currently? > 1b. Who needs the BIB feature? > 2. How are BIBs created? (by the app, or by the BPA?) > 3. How are BIBs treated in transit? (hopefully as just > another bundle) > 4. How are BIBs treated at the endpoints? (handled by app > or BPA?) > > First: What are the uses, why isn't it already covered, why is it > needed. > > The most concrete example (use case) so far is that a new node (N- > new) appears in the network and requests information which exists as > a previously delivered multicast bundle on an existing node (N- > old). N-old wants to send the multicast data to N-new without > flooding the network. Therefore N-old wants to substitute a unicast > address in place of the multicast address, at least during > intermediate hops, so that the bundle transport only consumes a > minimal set of resources. N-old may require custody transfer and > other services for this bundle that differ from the original set of > services used to transport the bundle. Finally, the bundle may be > protected by a checksum that is calculated across both its payload > and primary block, such that the original multicast destination > address has been included in the checksum. Therefore the original > primary block can only be modified in transit, but not once it > arrives (if the checksum needs to be calculated at each step the > original block could be resurrected en-route for this purpose, and > then re-wrapped). > > Other considerations: > > A) Flexibility is specifying different handling from original bundle > handling such as custody transfer: > > It seems a bit odd that a multicast bundle would require custody > transfer, since the node holding it (N-old) is presumably part of > the same multicast group that N-new is a member of. However on the > working assumption that N-new could be a better custodian than a > resource bound N-old, and for maximum flexibility, it seems valid to > keep this as part of the BIB requirements. > > B) Multiple bundles within a single wrapped bundle: > > It also seems fair to allow multiple bundles to be wrapped inside a > single bundle, so long as all of the bundles being wrapped together > all share the same endpoint(s) and in transit handling requirements > (custody transfer, etc.). The use case above could be reformulated > such that N-old is holding multiple multicast bundles to send to N- > new, and thus wishes to form a wrapped bundle wB1 consisting of B1, > B2 and B3. The resulting bundle aggregate would then be handled as a > single bundle, although it might get fragmented en-route. > > C) Allowing other bundles to be added to an existing (wrapped or > unwrapped) bundle: > > The utility of further wrapping additional bundles along with > previously wrapped bundles seems reasonable (perhaps some node along > the way determines to add bundles in response to the same request). > However it appears to force several decisions. First, it appears to > require that the BPA, as the entity that handles wrapped bundles 'in > the tunnel', know how to peek inside them (i.e., the payload of a > wrapped bundle can not be opaque). This in turn seems to require > that the BPA be the entity that decides to wrap bundles in the first > place, as an in-transit bundle has not reached the endpoint so the > application would not be part of the processing, while the BPA would. > > Including this feature raises a number of questions. Is it needed? > Would it prevent the application from generating wrapped bundles as > well? Would it impose a more complicated control interface between > the application(s) and the BPA to support application wrapping? Why > limit the BPA to extending pre-existing wrapped bundles - i.e., why > not allow bundle aggregation (via wrapped bundles) whenever the BPA > detects multiple bundles traveling to the same endpoint(s) with the > same handling? Is this desired? > > D) Layering of interfaces, features: > > My main concern about any BIB implementation is that it should > follow the layering philosophy, where the entity that wraps the > bundle is the entity that un-wraps it, to avoid complicated control > flows between separate layers. As the discussion concerning > extending an existing (wrapped or unwrapped) bundle by the BPA to > include other bundles indicates, there appear to be several choices: > > 1) If the application agent is wrapping and handing a wrapped bundle > down to the BPA, it should expect to be delivered the wrapped bundle > at the tunnel endpoint(s), and it should be the entity that unwraps > the bundle upon delivery. This would seem to prevent the BPA from > further wrapping additional bundles en-route as the wrapped bundle > would then be an opaque payload. > > 2) If the application-to-BPA interface is defined such that it > allows a set of bundles to be sent to a unicast endpoint then it > would be the BPA that does the wrapping, and it should be the BPA > that does the unwrapping, so that the BPA would then present each un- > wrapped bundle to the endpoint application as if it had arrived > separately. If the BPA was doing the wrapping, it could add other > bundles en-route. This approach would allow the BPA to further wrap > bundles en-route, and would allow the BPA to initiate bundle > wrapping if so desired. > > 3) These two approaches could be combined using different mechanisms > for the application vs. the BPA to wrap bundles. In this approach, > any bundles wrapped by the application would be handled as a single > bundle back to the application by the BPA, and this bundle would > have to be un-wrapped by the application. The BPA, however, could > add bundles to any existing bundle it handled so long as the bundle > handling and endpoint were the same. This scheme would create two > parallel mechanisms, one for the application and one for the BPA, > for managing Bundle-In-Bundle. > > > To some degree these are low level details. However they are > broadly determined by the entity that is given the role of wrapping > (and un-wrapping) bundles, and this brings me back to my original > questions 1 and 2 - what are the uses for this service and how is it > invoked. Once we have consensus on answers to those, I believe the > other answers will be more forthcoming. > > Thank you for reading so far. I look forward to hearing your > thoughts on these matters. > > - Jon Shapiro > > > Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249 > > BBN Technologies > 10 Moulton St. > Cambridge MA, 02138 > > (617) 873-4383 > > "The early bird gets the worm, but the second mouse gets the cheese." > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest --Apple-Mail-7-205634092 Content-Type: text/html; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hi.  That particular = date/time is not possible for me. The following week is much easier, = generally.  How about Nov 10, at 1pm eastern?  I am free = nearly the whole day, except for 2-3pm = Pacific.

thx
- = K


On Oct 31, 2008, at Oct 3110:00 = AMPDT, Jon Shapiro wrote:

Hi = All,

The recent discussion concerning the Bundle-In-Bundle = feature has raised a number of questions for me as I strive to = understand its use while familiarizing myself with the current reference = implementation.  As BBN is working on a DTN implementation that = should include this feature, I propose that we have a teleconference, = hosted by BBN, where all of the interested parties could participate and = hopefully come to a resolution. 

I propose that we hold = this teleconference on 5-Nov-08, 1-2pm EST, if this works for the = interested parties.  If not, please propose an alternate date and = time.  If this topic and teleconference does not interest you = please skip the remainder and thank you for your time.  If this = topic does interest you please let me know and I will send the = teleconference connection information to you.


A summary of = my understanding of the feature and concerns follows.

The = previous scheme for encapsulating a Bundle-in-a-Bundle, henceforth BIB, = was to place the entire bundle B1 inside another bundle wB1, essentially = by putting another primary block in front of B1's primary block, and = placing (wrapping) the original primary block and payload of B1 in the = wB1 payload block.  This scheme allowed the application agent to = send bundle B1 to nodes without triggering (the original set of) BPA = actions for B1.  The wrapper bundle wB1 was an administrative = record type bundle.

Note that the scheme to wrap B1 inside = bundle wB1, may be generalized to allow multiple bundles B1, B2, B3 etc. = to be wrapped inside wB1, and may also allow wB1 to be extended (or = wrapped inside wB2) so as to include additional bundles B4, B5.  = The lack of specificity in this matter is a weakness and needs to be = addressed, especially given the objections stemming from the limitation = on custody transfer below, as the handling of each inner bundle is = presumed to be identical when wrapped inside wBN.  

= The previously proposed BIB scheme using administrative records as the = wrapper had a problem (as noted by Peter Lovell) in that RFC 5050 sec. = 4.2, states: "If the bundles processing control flags indicate that the = bundle's application data unit is an administrative record, then the = custody transfer requested flag must be zero and all status report = request flags must be zero."  This requirement basically limits the = use of administrative records to their intended "signal" or "report" = uses (see RFC 5050 sec. 5.1), and prevents their use for BIB use since = it was considered important to allow custody transfer to be used for the = wrapped bundle(s). 

Susan Symington has proposed that one = of three alternate proposals therefore be followed:

1. Accept = this limitation.
2. Change the RFC 5050 section 4.2 rule to remove = this limitation.
3. Use a different mechanism instead of the = administrative record.  One proposal is to use an extension block = to hold both the original version of the modified primary block fields = and information such as count and offset values that can be used to = reconstitute the wrapped bundle(s) from the payload block.   =

These are all excellent points, but I am not sure how to = understand them without context.  I believe that a number of basic = questions need to be addressed as we move forward with any BIB = scheme.  These questions are:

=         1. What are the uses for = Bundle-In-Bundle?
=             &n= bsp;   1a. Why can't it be done currently?
=             &n= bsp;   1b. Who needs the BIB feature?
=         2.  How are BIBs = created?  (by the app, or by the BPA?)
=         3.  How are BIBs treated = in transit?  (hopefully as just another bundle)
=         4.  How are BIBs treated = at the endpoints?  (handled by app or BPA?)

First: What are = the uses, why isn't it already covered, why is it needed.

The = most concrete example (use case) so far is that a new node (N-new) = appears in the network and requests information which exists as a = previously delivered multicast bundle on an existing node (N-old).  = N-old wants to send the multicast data to N-new without flooding the = network.  Therefore N-old wants to substitute a unicast address in = place of the multicast address, at least during intermediate hops, so = that the bundle transport only consumes a minimal set of = resources.  N-old may require custody transfer and other services = for this bundle that differ from the original set of services used to = transport the bundle.  Finally, the bundle may be protected by a = checksum that is calculated across both its payload and primary block, = such that the original multicast destination address has been included = in the checksum.  Therefore the original primary block can only be = modified in transit, but not once it arrives (if the checksum needs to = be calculated at each step the original block could be resurrected = en-route for this purpose, and then re-wrapped). 

Other = considerations:

A) Flexibility is specifying different handling = from original bundle handling such as custody transfer:

It seems = a bit odd that a multicast bundle would require custody transfer, since = the node holding it (N-old) is presumably part of the same multicast = group that N-new is a member of.  However on the working assumption = that N-new could be a better custodian than a resource bound N-old, and = for maximum flexibility, it seems valid to keep this as part of the BIB = requirements. 

B) Multiple bundles within a single wrapped = bundle:

It also seems fair to allow multiple bundles to be = wrapped inside a single bundle, so long as all of the bundles being = wrapped together all share the same endpoint(s) and in transit handling = requirements (custody transfer, etc.).  The use case above could be = reformulated such that N-old is holding multiple multicast bundles to = send to N-new, and thus wishes to form a wrapped bundle wB1 consisting = of B1, B2 and B3. The resulting bundle aggregate would then be handled = as a single bundle, although it might get fragmented en-route.  =

C) Allowing other bundles to be added to an existing (wrapped = or unwrapped) bundle:

The utility of further wrapping additional = bundles along with previously wrapped bundles seems reasonable (perhaps = some node along the way determines to add bundles in response to the = same request).  However it appears to force several = decisions.  First, it appears to require that the BPA, as the = entity that handles wrapped bundles 'in the tunnel', know how to peek = inside them (i.e., the payload of a wrapped bundle can not be = opaque).  This in turn seems to require that the BPA be the entity = that decides to wrap bundles in the first place, as an in-transit bundle = has not reached the endpoint so the application would not be part of the = processing, while the BPA would. 

Including this feature = raises a number of questions.  Is it needed?  Would it prevent = the application from generating wrapped bundles as well?  Would it = impose a more complicated control interface between the application(s) = and the BPA to support application wrapping?  Why limit the BPA to = extending pre-existing wrapped bundles - i.e., why not allow bundle = aggregation (via wrapped bundles) whenever the BPA detects multiple = bundles traveling to the same endpoint(s) with the same handling?  = Is this desired? 

D) Layering of interfaces, = features:

My main concern about any BIB implementation is that = it should follow the layering philosophy, where the entity that wraps = the bundle is the entity that un-wraps it, to avoid complicated control = flows between separate layers.  As the discussion concerning = extending an existing (wrapped or unwrapped) bundle by the BPA to = include other bundles indicates, there appear to be several = choices:

1) If the application agent is wrapping and handing a = wrapped bundle down to the BPA, it should expect to be delivered the = wrapped bundle at the tunnel endpoint(s), and it should be the entity = that unwraps the bundle upon delivery.  This would seem to prevent = the BPA from further wrapping additional bundles en-route as the wrapped = bundle would then be an opaque payload.

2) If the = application-to-BPA interface is defined such that it allows a set of = bundles to be sent to a unicast endpoint then it would be the BPA that = does the wrapping, and it should be the BPA that does the unwrapping, so = that the BPA would then present each un-wrapped bundle to the endpoint = application as if it had arrived separately.  If the BPA was doing = the wrapping, it could add other bundles en-route. This approach would = allow the BPA to further wrap bundles en-route, and would allow the BPA = to initiate bundle wrapping if so desired.

3) These two = approaches could be combined using different mechanisms for the = application vs. the BPA to wrap bundles.  In this approach, any = bundles wrapped by the application would be handled as a single bundle = back to the application by the BPA, and this bundle would have to be = un-wrapped by the application.  The BPA, however, could add bundles = to any existing bundle it handled so long as the bundle handling and = endpoint were the same.  This scheme would create two parallel = mechanisms, one for the application and one for the BPA, for managing = Bundle-In-Bundle.  


To some degree these are low = level details.  However they are broadly determined by the entity = that is given the role of wrapping (and un-wrapping) bundles, and this = brings me back to my original questions 1 and 2 - what are the uses for = this service and how is it invoked.  Once we have consensus on = answers to those, I believe the other answers will be more = forthcoming.  

Thank you for reading so far.  I = look forward to hearing your thoughts on these matters.

- Jon = Shapiro



Jon Shapiro - Lead Software Engineer, Mobile = Networking Systems, 6/249

BBN Technologies
10 Moulton = St.
Cambridge MA, 02138

(617) 873-4383

"The early = bird gets the worm, but the second mouse gets the cheese."

=
= _______________________________________________
dtn-interest mailing = list
dtn-interest@mai= llists.intel-research.net
http://maillists.intel-research.net/mailm= an/listinfo/dtn-interest

= --Apple-Mail-7-205634092-- Received: from mx3.bbn.com (mx3.bbn.com [128.33.1.81]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9VHBjmx012085 for ; Fri, 31 Oct 2008 10:11:45 -0700 Received: from dhcp89-069-173.bbn.com ([128.89.69.173] helo=7C-541.bbn.com) by mx3.bbn.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from ) id 1KvxMA-00078X-A5; Fri, 31 Oct 2008 13:00:18 -0400 Message-Id: <6.2.1.2.2.20081031125028.023e95f8@po2.bbn.com> X-Mailer: QUALCOMM Windows Eudora Version 6.2.1.2 Date: Fri, 31 Oct 2008 13:00:18 -0400 To: dtn-interest@mailman.dtnrg.org From: Jon Shapiro Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_9770187==.ALT" Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Oct 2008 17:11:45 -0000 --=====================_9770187==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Hi All, The recent discussion concerning the Bundle-In-Bundle feature has raised a number of questions for me as I strive to understand its use while familiarizing myself with the current reference implementation. As BBN is working on a DTN implementation that should include this feature, I propose that we have a teleconference, hosted by BBN, where all of the interested parties could participate and hopefully come to a resolution. I propose that we hold this teleconference on 5-Nov-08, 1-2pm EST, if this works for the interested parties. If not, please propose an alternate date and time. If this topic and teleconference does not interest you please skip the remainder and thank you for your time. If this topic does interest you please let me know and I will send the teleconference connection information to you. A summary of my understanding of the feature and concerns follows. The previous scheme for encapsulating a Bundle-in-a-Bundle, henceforth BIB, was to place the entire bundle B1 inside another bundle wB1, essentially by putting another primary block in front of B1's primary block, and placing (wrapping) the original primary block and payload of B1 in the wB1 payload block. This scheme allowed the application agent to send bundle B1 to nodes without triggering (the original set of) BPA actions for B1. The wrapper bundle wB1 was an administrative record type bundle. Note that the scheme to wrap B1 inside bundle wB1, may be generalized to allow multiple bundles B1, B2, B3 etc. to be wrapped inside wB1, and may also allow wB1 to be extended (or wrapped inside wB2) so as to include additional bundles B4, B5. The lack of specificity in this matter is a weakness and needs to be addressed, especially given the objections stemming from the limitation on custody transfer below, as the handling of each inner bundle is presumed to be identical when wrapped inside wBN. The previously proposed BIB scheme using administrative records as the wrapper had a problem (as noted by Peter Lovell) in that RFC 5050 sec. 4.2, states: "If the bundles processing control flags indicate that the bundle's application data unit is an administrative record, then the custody transfer requested flag must be zero and all status report request flags must be zero." This requirement basically limits the use of administrative records to their intended "signal" or "report" uses (see RFC 5050 sec. 5.1), and prevents their use for BIB use since it was considered important to allow custody transfer to be used for the wrapped bundle(s). Susan Symington has proposed that one of three alternate proposals therefore be followed: 1. Accept this limitation. 2. Change the RFC 5050 section 4.2 rule to remove this limitation. 3. Use a different mechanism instead of the administrative record. One proposal is to use an extension block to hold both the original version of the modified primary block fields and information such as count and offset values that can be used to reconstitute the wrapped bundle(s) from the payload block. These are all excellent points, but I am not sure how to understand them without context. I believe that a number of basic questions need to be addressed as we move forward with any BIB scheme. These questions are: 1. What are the uses for Bundle-In-Bundle? 1a. Why can't it be done currently? 1b. Who needs the BIB feature? 2. How are BIBs created? (by the app, or by the BPA?) 3. How are BIBs treated in transit? (hopefully as just another bundle) 4. How are BIBs treated at the endpoints? (handled by app or BPA?) First: What are the uses, why isn't it already covered, why is it needed. The most concrete example (use case) so far is that a new node (N-new) appears in the network and requests information which exists as a previously delivered multicast bundle on an existing node (N-old). N-old wants to send the multicast data to N-new without flooding the network. Therefore N-old wants to substitute a unicast address in place of the multicast address, at least during intermediate hops, so that the bundle transport only consumes a minimal set of resources. N-old may require custody transfer and other services for this bundle that differ from the original set of services used to transport the bundle. Finally, the bundle may be protected by a checksum that is calculated across both its payload and primary block, such that the original multicast destination address has been included in the checksum. Therefore the original primary block can only be modified in transit, but not once it arrives (if the checksum needs to be calculated at each step the original block could be resurrected en-route for this purpose, and then re-wrapped). Other considerations: A) Flexibility is specifying different handling from original bundle handling such as custody transfer: It seems a bit odd that a multicast bundle would require custody transfer, since the node holding it (N-old) is presumably part of the same multicast group that N-new is a member of. However on the working assumption that N-new could be a better custodian than a resource bound N-old, and for maximum flexibility, it seems valid to keep this as part of the BIB requirements. B) Multiple bundles within a single wrapped bundle: It also seems fair to allow multiple bundles to be wrapped inside a single bundle, so long as all of the bundles being wrapped together all share the same endpoint(s) and in transit handling requirements (custody transfer, etc.). The use case above could be reformulated such that N-old is holding multiple multicast bundles to send to N-new, and thus wishes to form a wrapped bundle wB1 consisting of B1, B2 and B3. The resulting bundle aggregate would then be handled as a single bundle, although it might get fragmented en-route. C) Allowing other bundles to be added to an existing (wrapped or unwrapped) bundle: The utility of further wrapping additional bundles along with previously wrapped bundles seems reasonable (perhaps some node along the way determines to add bundles in response to the same request). However it appears to force several decisions. First, it appears to require that the BPA, as the entity that handles wrapped bundles 'in the tunnel', know how to peek inside them (i.e., the payload of a wrapped bundle can not be opaque). This in turn seems to require that the BPA be the entity that decides to wrap bundles in the first place, as an in-transit bundle has not reached the endpoint so the application would not be part of the processing, while the BPA would. Including this feature raises a number of questions. Is it needed? Would it prevent the application from generating wrapped bundles as well? Would it impose a more complicated control interface between the application(s) and the BPA to support application wrapping? Why limit the BPA to extending pre-existing wrapped bundles - i.e., why not allow bundle aggregation (via wrapped bundles) whenever the BPA detects multiple bundles traveling to the same endpoint(s) with the same handling? Is this desired? D) Layering of interfaces, features: My main concern about any BIB implementation is that it should follow the layering philosophy, where the entity that wraps the bundle is the entity that un-wraps it, to avoid complicated control flows between separate layers. As the discussion concerning extending an existing (wrapped or unwrapped) bundle by the BPA to include other bundles indicates, there appear to be several choices: 1) If the application agent is wrapping and handing a wrapped bundle down to the BPA, it should expect to be delivered the wrapped bundle at the tunnel endpoint(s), and it should be the entity that unwraps the bundle upon delivery. This would seem to prevent the BPA from further wrapping additional bundles en-route as the wrapped bundle would then be an opaque payload. 2) If the application-to-BPA interface is defined such that it allows a set of bundles to be sent to a unicast endpoint then it would be the BPA that does the wrapping, and it should be the BPA that does the unwrapping, so that the BPA would then present each un-wrapped bundle to the endpoint application as if it had arrived separately. If the BPA was doing the wrapping, it could add other bundles en-route. This approach would allow the BPA to further wrap bundles en-route, and would allow the BPA to initiate bundle wrapping if so desired. 3) These two approaches could be combined using different mechanisms for the application vs. the BPA to wrap bundles. In this approach, any bundles wrapped by the application would be handled as a single bundle back to the application by the BPA, and this bundle would have to be un-wrapped by the application. The BPA, however, could add bundles to any existing bundle it handled so long as the bundle handling and endpoint were the same. This scheme would create two parallel mechanisms, one for the application and one for the BPA, for managing Bundle-In-Bundle. To some degree these are low level details. However they are broadly determined by the entity that is given the role of wrapping (and un-wrapping) bundles, and this brings me back to my original questions 1 and 2 - what are the uses for this service and how is it invoked. Once we have consensus on answers to those, I believe the other answers will be more forthcoming. Thank you for reading so far. I look forward to hearing your thoughts on these matters. - Jon Shapiro ---------- Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249 BBN Technologies 10 Moulton St. Cambridge MA, 02138 (617) 873-4383 "The early bird gets the worm, but the second mouse gets the cheese." --=====================_9770187==.ALT Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi All,

The recent discussion concerning the Bundle-In-Bundle feature has raised a number of questions for me as I strive to understand its use while familiarizing myself with the current reference implementation.  As BBN is working on a DTN implementation that should include this feature, I propose that we have a teleconference, hosted by BBN, where all of the interested parties could participate and hopefully come to a resolution. 

I propose that we hold this teleconference on 5-Nov-08, 1-2pm EST, if this works for the interested parties.  If not, please propose an alternate date and time.  If this topic and teleconference does not interest you please skip the remainder and thank you for your time.  If this topic does interest you please let me know and I will send the teleconference connection information to you.


A summary of my understanding of the feature and concerns follows.

The previous scheme for encapsulating a Bundle-in-a-Bundle, henceforth BIB, was to place the entire bundle B1 inside another bundle wB1, essentially by putting another primary block in front of B1's primary block, and placing (wrapping) the original primary block and payload of B1 in the wB1 payload block.  This scheme allowed the application agent to send bundle B1 to nodes without triggering (the original set of) BPA actions for B1.  The wrapper bundle wB1 was an administrative record type bundle.

Note that the scheme to wrap B1 inside bundle wB1, may be generalized to allow multiple bundles B1, B2, B3 etc. to be wrapped inside wB1, and may also allow wB1 to be extended (or wrapped inside wB2) so as to include additional bundles B4, B5.  The lack of specificity in this matter is a weakness and needs to be addressed, especially given the objections stemming from the limitation on custody transfer below, as the handling of each inner bundle is presumed to be identical when wrapped inside wBN.  

The previously proposed BIB scheme using administrative records as the wrapper had a problem (as noted by Peter Lovell) in that RFC 5050 sec. 4.2, states: "If the bundles processing control flags indicate that the bundle's application data unit is an administrative record, then the custody transfer requested flag must be zero and all status report request flags must be zero."  This requirement basically limits the use of administrative records to their intended "signal" or "report" uses (see RFC 5050 sec. 5.1), and prevents their use for BIB use since it was considered important to allow custody transfer to be used for the wrapped bundle(s). 

Susan Symington has proposed that one of three alternate proposals therefore be followed:

1. Accept this limitation.
2. Change the RFC 5050 section 4.2 rule to remove this limitation.
3. Use a different mechanism instead of the administrative record.  One proposal is to use an extension block to hold both the original version of the modified primary block fields and information such as count and offset values that can be used to reconstitute the wrapped bundle(s) from the payload block.  

These are all excellent points, but I am not sure how to understand them without context.  I believe that a number of basic questions need to be addressed as we move forward with any BIB scheme.  These questions are:

        1. What are the uses for Bundle-In-Bundle?
            &nbs= p;   1a. Why can't it be done currently?
            &nbs= p;   1b. Who needs the BIB feature?
        2.  How are BIBs created?  (by the app, or by the BPA?)
        3.  How are BIBs treated in transit?  (hopefully as just another bundle)
        4.  How are BIBs treated at the endpoints?  (handled by app or BPA?)

First: What are the uses, why isn't it already covered, why is it needed.

The most concrete example (use case) so far is that a new node (N-new) appears in the network and requests information which exists as a previously delivered multicast bundle on an existing node (N-old).  N-old wants to send the multicast data to N-new without flooding the network.  Therefore N-old wants to substitute a unicast address in place of the multicast address, at least during intermediate hops, so that the bundle transport only consumes a minimal set of resources.  N-old may require custody transfer and other services for this bundle that differ from the original set of services used to transport the bundle.  Finally, the bundle may be protected by a checksum that is calculated across both its payload and primary block, such that the original multicast destination address has been included in the checksum.  Therefore the original primary block can only be modified in transit, but not once it arrives (if the checksum needs to be calculated at each step the original block could be resurrected en-route for this purpose, and then re-wrapped). 

Other considerations:

A) Flexibility is specifying different handling from original bundle handling such as custody transfer:

It seems a bit odd that a multicast bundle would require custody transfer, since the node holding it (N-old) is presumably part of the same multicast group that N-new is a member of.  However on the working assumption that N-new could be a better custodian than a resource bound N-old, and for maximum flexibility, it seems valid to keep this as part of the BIB requirements. 

B) Multiple bundles within a single wrapped bundle:

It also seems fair to allow multiple bundles to be wrapped inside a single bundle, so long as all of the bundles being wrapped together all share the same endpoint(s) and in transit handling requirements (custody transfer, etc.).  The use case above could be reformulated such that N-old is holding multiple multicast bundles to send to N-new, and thus wishes to form a wrapped bundle wB1 consisting of B1, B2 and B3. The resulting bundle aggregate would then be handled as a single bundle, although it might get fragmented en-route. 

C) Allowing other bundles to be added to an existing (wrapped or unwrapped) bundle:

The utility of further wrapping additional bundles along with previously wrapped bundles seems reasonable (perhaps some node along the way determines to add bundles in response to the same request).  However it appears to force several decisions.  First, it appears to require that the BPA, as the entity that handles wrapped bundles 'in the tunnel', know how to peek inside them (i.e., the payload of a wrapped bundle can not be opaque).  This in turn seems to require that the BPA be the entity that decides to wrap bundles in the first place, as an in-transit bundle has not reached the endpoint so the application would not be part of the processing, while the BPA would. 

Including this feature raises a number of questions.  Is it needed?  Would it prevent the application from generating wrapped bundles as well?  Would it impose a more complicated control interface between the application(s) and the BPA to support application wrapping?  Why limit the BPA to extending pre-existing wrapped bundles - i.e., why not allow bundle aggregation (via wrapped bundles) whenever the BPA detects multiple bundles traveling to the same endpoint(s) with the same handling?  Is this desired? 

D) Layering of interfaces, features:

My main concern about any BIB implementation is that it should follow the layering philosophy, where the entity that wraps the bundle is the entity that un-wraps it, to avoid complicated control flows between separate layers.  As the discussion concerning extending an existing (wrapped or unwrapped) bundle by the BPA to include other bundles indicates, there appear to be several choices:

1) If the application agent is wrapping and handing a wrapped bundle down to the BPA, it should expect to be delivered the wrapped bundle at the tunnel endpoint(s), and it should be the entity that unwraps the bundle upon delivery.  This would seem to prevent the BPA from further wrapping additional bundles en-route as the wrapped bundle would then be an opaque payload.

2) If the application-to-BPA interface is defined such that it allows a set of bundles to be sent to a unicast endpoint then it would be the BPA that does the wrapping, and it should be the BPA that does the unwrapping, so that the BPA would then present each un-wrapped bundle to the endpoint application as if it had arrived separately.  If the BPA was doing the wrapping, it could add other bundles en-route. This approach would allow the BPA to further wrap bundles en-route, and would allow the BPA to initiate bundle wrapping if so desired.

3) These two approaches could be combined using different mechanisms for the application vs. the BPA to wrap bundles.  In this approach, any bundles wrapped by the application would be handled as a single bundle back to the application by the BPA, and this bundle would have to be un-wrapped by the application.  The BPA, however, could add bundles to any existing bundle it handled so long as the bundle handling and endpoint were the same.  This scheme would create two parallel mechanisms, one for the application and one for the BPA, for managing Bundle-In-Bundle.  


To some degree these are low level details.  However they are broadly determined by the entity that is given the role of wrapping (and un-wrapping) bundles, and this brings me back to my original questions 1 and 2 - what are the uses for this service and how is it invoked.  Once we have consensus on answers to those, I believe the other answers will be more forthcoming.  

Thank you for reading so far.  I look forward to hearing your thoughts on these matters.

- Jon Shapiro


Jon Shapiro - Lead Software Engineer, Mobile Networking Systems, 6/249

BBN Technologies
10 Moulton St.
Cambridge MA, 02138

(617) 873-4383

"The early bird gets the worm, but the second mouse gets the cheese."

--=====================_9770187==.ALT-- Received: from gateway0.EECS.Berkeley.EDU (gateway0.EECS.Berkeley.EDU [169.229.60.87]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9TGEjLX009474 for ; Wed, 29 Oct 2008 09:14:45 -0700 Received: from [192.168.1.76] ([156.152.12.167]) (authenticated bits=0) by gateway0.EECS.Berkeley.EDU (8.14.3/8.13.5) with ESMTP id m9TG495Y029187 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for ; Wed, 29 Oct 2008 09:04:10 -0700 (PDT) Message-Id: From: Kevin Fall To: DTN Interest List Content-Type: text/plain; charset=ISO-8859-1; format=flowed; delsp=yes Mime-Version: 1.0 (Apple Message framework v929.2) Date: Wed, 29 Oct 2008 09:04:03 -0700 X-Mailer: Apple Mail (2.929.2) Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9TGEjLX009474 Subject: [dtn-interest] today's "Morning Edition" on NPR X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Oct 2008 16:14:45 -0000 Today I got in my car and just caught the end of this article--- http://www.npr.org/templates/story/story.php?storyId=96249274 October 29, 2008 · Vint Cerf, the man widely regarded as the father of the Internet, is working with NASA to create an Internet for the rest of the solar system. When the U.S. sends devices into outer space it uses point-to-point radio communication systems that are tailored to individual spacecraft. Cerf is trying to create a standard protocol that can be used by various spacecraft. It'll be tested aboard the International Space Station in 2009. Received: from smtp.netlab.hut.fi (keskus.netlab.hut.fi [130.233.154.176]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9R7iO7w015820 for ; Mon, 27 Oct 2008 00:44:25 -0700 Received: from pc89.netlab.hut.fi (keskus.netlab.hut.fi [130.233.154.176]) by smtp.netlab.hut.fi (Postfix) with ESMTP id 23257C50F1 for ; Mon, 27 Oct 2008 09:34:54 +0200 (EET) Message-ID: <49056F1E.8030604@netlab.tkk.fi> Date: Mon, 27 Oct 2008 09:34:54 +0200 From: Joerg Ott User-Agent: Thunderbird 2.0.0.17 (Macintosh/20080914) MIME-Version: 1.0 To: dtn-interest@mailman.dtnrg.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit Subject: [dtn-interest] Final CFP: KiVS Workshop on Disruption Tolerant Communication in Mobile Networks X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Oct 2008 07:44:26 -0000 KiVS 2009 Workshop on Disruption Tolerant Communication in Mobile Networks ==================================================== to be held in Kassel, Germany, on 5 or 6 March 2009 Delay and Disruption-tolerant Networking (DTNs) is an active and currently widely discussed research area, reflected in numerous international workshops and in manifold contributions to high profile conferences. Research in this field includes highly dynamic networks with challenging communication conditions, so that nodes may no longer rely on end-to-end connectivity. Particularly a high degree of node mobility with variable characteristics may cause rapid changes in network topology. While challenging for some scenarios, others many benefit from extensive mobility, e.g., to leverage mobility for information dissemination and (partly) substitute setting up costly infrastructure networks. Examples for challenging environments include vehicular networks, networks comprising mobile sensor nodes, Internet access in remote areas, and interplanetary communications. The present Internet protocols are built on assumptions of connected networks which makes them unsuited for dealing with the conditions found in challenged networks. Current research investigates alternative approaches capable of effciently handling frequent disruptions, non-existent end-to-end paths, long delays, and only short periods of connectivity and thereby enable new applications in challenging networking environments. Topics ------ For this workshop, we solicit papers in the following areas: o Applications o Network and system architectures o DTN implementations and evaluation o Security o Routing o Congestion control o Multicasting and broadcasting o Synchronization o Management, monitoring and lonfiguration o Testbeds, practical application experience, and results o Simulations o Mobility Contents -------- We are planning to accept 8-10 full papers for presentation at the workshop and publication in the KiVS workshop proceedings. Selection will follow a single-blind peer review process with three reviews per paper. Selected papers will present novel research results in a solid manner, clearly contrast their approaches to related work, and have an impact on present and future research. In particular, the ideas will stir lively discussions at the workshop, by characterizing existing probblems, raising new issues, and offering answers to open questions. We encourage contributions documenting deployment experience of DTNs in a scientific manner. Contributions are limited to 8 pages incl. figures, tables, and references using single column layout with 12-point font (following the LNCS style). Paper submissions shall be done via http://www.comtec.eecs.uni-kassel.de/conftool_kivs2009/ Submitted papers must not have been published before or submitted elsewere. Accepted paper will be published in the workshop proceedings by Springer Verlag. Important Dates --------------- Paper deadline: 5 November 2008, 23:59 CET Notification of acceptance: 30 November 2008 Camera ready version: 27 December 2008 Workshop date: 5 or 6 March 2009 Workshop Co-Chairs ------------------ Jörg Ott, Helsinki University of Technology, Email: jo@netlab.tkk.fi Lars Wolf, TU Braunschweig, Email: wolf@ibr.cs.tu-bs.de Preliminary TPC --------------- Marc Bechler (BMW) Carsten Bormann (Univ. Bremen) Lars Eggert (Nokia Research Center) Hannes Hartenstein (Univ. Karlsruhe) Dirk Kutscher (Univ. Bremen) Martin Mauve (Univ. Düsseldorf) Martin May (ETH Zürich) Jörg Widmer (NTT DoCoMo) Received: from impregnable.uta.edu (impregnable.uta.edu [129.107.56.5]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9OH3gqu012097 for ; Fri, 24 Oct 2008 10:03:43 -0700 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AuAGAIiaAUmBazg8/2dsb2JhbACCSC+PWaduBgKGHlyCTQEIeg X-IronPort-AV: E=Sophos;i="4.33,479,1220227200"; d="scan'208,217";a="119798276" Received: from wolf3.uta.edu (HELO MAILST1.uta.edu) ([129.107.56.60]) by mail.uta.edu with ESMTP; 24 Oct 2008 16:55:22 +0000 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C935F9.4D7001C7" X-MimeOLE: Produced By Microsoft Exchange V6.5 Date: Fri, 24 Oct 2008 11:55:02 -0500 Message-ID: <5FC9D45135986C4398EFDB937D693394019A01C6@MAILST1.uta.edu> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: IQ2S'09: Last Call for papers - Deadline: October 31! Thread-Index: Acj1bf+J6Fn6NoDHQueuiSFQVV0eswAAlQS8AAvX59gADTSFugABI5sjAADNfikAAFgktQusOK3hAABoTPMAL2BjkAAAQYZWAADwNnAAAlIS/QAADE1vAABfE78AAJE1YwAARAEKAAAv+rsAAD9YUAAAB62MAdiTzbsCTRVMFw== References: <162B8AFBFBBB2148A9A1B8F9C5753428FE5412@mailbe01.teak.local.net> <162B8AFBFBBB2148A9A1B8F9C575342803264283@mailbe01.teak.local.net> <358486CF38F8EA409E72DAB944FBC60602DEA60F@MAILFS2.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC5@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC6@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC7@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC8@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A00F0@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A00F2@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0108@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A010A@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0115@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A012E@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A012F@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0131@MAILST1.uta.edu> <5FC9D45135986C4398EFDB93 7D693394019A0133@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0134@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0135@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0136@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0137@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0163@MAILST1.uta.edu> From: "Ammari, Habib M" To: Subject: [dtn-interest] IQ2S'09: Last Call for papers - Deadline: October 31! X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 24 Oct 2008 17:03:43 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C935F9.4D7001C7 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Dear Colleagues, We apologize if you receive multiple copies. Please find below the Call for papers for IQ2S 2009, The First = International Workshop on Information Quality and Quality of Service for Pervasive Computing, = which will be held in conjunction with IEEE PerCom 2009, Galveston, Texas, March 9-13, = 2009. [+++++++ DEADLINE HAS BEEN EXTENDED TO OCTOBER 31! +++++++] We would appreciate it very much if you could disseminate this CFP to = your colleagues and students! Best Regards, Wendong Xiao, Institute for Infocomm Research, Singapore Habib M. Ammari, the University of Texas at Arlington, USA Program Co-Chairs -------------------------------------------------------------------------= ----------------------------------------------------------- CALL FOR PAPERS =20 The First International Workshop on Information Quality and Quality of = Service for Pervasive Computing (IQ2S 2009) Website: http://iq2s2009.i2r.a-star.edu.sg = = > > In Conjunction with IEEE PerCom 2009 (http://www.percom.org = > > ) Galveston, Texas, March 9-13, 2009 =20 Quality of service (QoS) has been studied in various building = blocks in pervasive computing, e.g., different QoS mechanisms are = presented for wireless or wired networks, with QoS metrics being = described in terms of delay, bandwidth, and/or data loss etc. The = emerging pervasive computing is application-driven and mission-critical, = therefore the information quality (IQ), such as the accuracy of target = tracking or event detection, is also critical for the end users, service = providers and the system designers. IQ and QoS provisioning for = pervasive computing is challenging and difficult due to the = resource-constrained, dynamic and distributed nature of the system, the = weakness under security attacking, and the lack of a holistic design = approach which takes into account the different types of resources and = their inter-dependencies. =20 The objective of this workshop is to provide a forum to exchange = ideas, present results, share experience, and enhance collaborations = among researchers, professionals, and application developers in various = aspects of IQ and QoS for pervasive computing. Topics of interest = include but are not limited to: * System architecture for IQ and QoS provisioning * IQ-oriented signal & information processing (e.g., = source coding and data compression) * QoS for target/event detection, localization, = tracking and classification * QoS for wireless ad hoc and sensor networks = (including coverage and connectivity) * QoS for task mapping and scheduling * Cross-layer design for coordinated QoS (including = IQ-QoS integration) * Adaptative IQ and QoS under dynamic environments * Trust, security and privacy issues in IQ and QoS * Development environments and programming languages = for IQ and QoS * IQ and QoS for emerging pervasive computing = applications, such as three-dimensional wireless sensor networks (like = underwater sensor network), healthcare, and structural health monitoring * Prototype test-bed design, implementation, and = field trials Submission Instructions The submitted paper should be in the IEEE conference format = (author guidelines can be found at = ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM = ) = and should be no more than 6 pages in length. The paper should not be = previously published or currently under review elsewhere. Only = electronic submissions in PDF format will be considered. Detailed = electronic submission procedures will be announced later. All = submissions will be peer-reviewed and selected based on their = originality, merit, and relevance to the workshop. Accepted papers will = be published by the IEEE Computer Society Press in the combined PerCom = 2009 workshops proceedings. At least one author of each accepted paper = must register and attend the workshop to present the paper. General Co-Chairs Sajal K. Das, the University of Texas at Arlington, USA Chen Khong Tham, Institute for Infocomm Research, Singapore =20 Program Co-Chairs Wendong Xiao, Institute for Infocomm Research, Singapore Habib M. Ammari, the University of Texas at Arlington, USA =20 Important Dates Paper submission: October 31, 2008 Author notification: December 19, 2008 Camera-ready due: January 7, 2009 -------------------------------------------------------------------------= ----------------------------------------------------------- ------_=_NextPart_001_01C935F9.4D7001C7 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= [computational.science] IQ2S'09: Call for papers=0A= =0A= =0A=
Dear = Colleagues,

We =0A= apologize if you receive multiple copies.
=0A=
=0A=

Please find below the Call for papers for IQ2S 2009, = The First =0A= International Workshop
on Information Quality and Quality of Service = for =0A= Pervasive Computing, which will be held
in conjunction with IEEE = PerCom 2009, =0A= Galveston, Texas, March 9-13, 2009.

=0A=

[+++++++ DEADLINE HAS BEEN EXTENDED TO OCTOBER 31! =0A= +++++++]

=0A=


We would appreciate it very much if you could = disseminate =0A= this CFP to your colleagues and students!

Best = Regards,

Wendong =0A= Xiao, Institute for Infocomm Research, Singapore
Habib M. Ammari, the =0A= University of Texas at Arlington, USA

Program =0A= Co-Chairs

--------------------------------------------------------= -------------------------------------------------------------------------= ---
CALL =0A= FOR PAPERS
      
The First = International =0A= Workshop on Information Quality and Quality of Service for Pervasive = Computing =0A= (IQ2S 2009)
Website: http://iq2s2009.i2r.a-star.edu= .sg =0A= <http://iq2s2009.i2r.a-star.ed= u.sg/>  =0A= <http://iq2s2009.i2r.a-star.edu.sg/ =0A= > >
In Conjunction with IEEE PerCom 2009 (http://www.percom.org <http://www.percom.org/>  = <http://www.percom.org/ =0A= > > )
Galveston, Texas, March 9-13, =0A= 2009

      
   &nb= sp;    =0A= Quality of service (QoS) has been studied in various building blocks in =0A= pervasive computing, e.g., different QoS mechanisms are presented for = wireless =0A= or wired networks, with QoS metrics being described in terms of delay, =0A= bandwidth, and/or data loss etc. The emerging pervasive computing is =0A= application-driven and mission-critical, therefore the information = quality (IQ), =0A= such as the accuracy of target tracking or event detection, is also = critical for =0A= the end users, service providers and the system designers. IQ and QoS =0A= provisioning for pervasive computing is challenging and difficult due to = the =0A= resource-constrained, dynamic and distributed nature of the system, the = weakness =0A= under security attacking, and the lack of a holistic design approach = which takes =0A= into account the different types of resources and their =0A= inter-dependencies.
      
 &nbs= p;      =0A= The objective of this workshop is to provide a forum to exchange ideas, = present =0A= results, share experience, and enhance collaborations among researchers, =0A= professionals, and application developers in various aspects of IQ and = QoS for =0A= pervasive computing. Topics of interest include but are not limited =0A= to:

        =0A= *            = System =0A= architecture for IQ and QoS =0A= provisioning

        =0A= *            = IQ-oriented =0A= signal & information processing (e.g., source coding and data =0A= compression)

        =0A= *            QoS = for =0A= target/event detection, localization, tracking and =0A= classification

        =0A= *            QoS = for =0A= wireless ad hoc and sensor networks (including coverage and =0A= connectivity)

        =0A= *            QoS = for task =0A= mapping and scheduling

        =0A= *            = Cross-layer =0A= design for coordinated QoS (including IQ-QoS =0A= integration)

        =0A= *            = Adaptative =0A= IQ and QoS under dynamic =0A= environments

        =0A= *            = Trust, =0A= security and privacy issues in IQ and =0A= QoS

        =0A= *            = Development =0A= environments and programming languages for IQ and =0A= QoS

        =0A= *            IQ = and QoS =0A= for emerging pervasive computing applications, such as three-dimensional =0A= wireless sensor networks (like underwater sensor network), healthcare, = and =0A= structural health = monitoring

        =0A= *            = Prototype =0A= test-bed design, implementation, and field =0A= trials

        Submission =0A= Instructions

        The = submitted =0A= paper should be in the IEEE conference format (author guidelines can be = found at =0A= ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM =0A= <ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM&g= t; =0A= ) and should be no more than 6 pages in length. The paper should not be =0A= previously published or currently under review elsewhere. Only = electronic =0A= submissions in PDF format will be considered. Detailed electronic = submission =0A= procedures will be announced later. All submissions will be = peer-reviewed and =0A= selected based on their originality, merit, and relevance to the = workshop. =0A= Accepted papers will be published by the IEEE Computer Society Press in = the =0A= combined PerCom 2009 workshops proceedings. At least one author of each = accepted =0A= paper must register and attend the workshop to present the =0A= paper.

        General =0A= Co-Chairs

        Sajal K. = Das, the =0A= University of Texas at Arlington, =0A= USA
        Chen Khong Tham, = Institute for =0A= Infocomm Research, =0A= Singapore
      
   &n= bsp;    =0A= Program Co-Chairs
        Wendong = Xiao, =0A= Institute for Infocomm Research, =0A= Singapore
        Habib M. Ammari, = the =0A= University of Texas at Arlington, =0A= USA
      
    &n= bsp;   =0A= Important Dates
        Paper =0A= submission:     October 31, =0A= 2008
        Author = notification:  =0A= December 19, 2008
        = Camera-ready =0A= due:     January 7, =0A= 2009
-----------------------------------------------------------------= -------------------------------------------------------------------

=0A= =0A= =0A= ------_=_NextPart_001_01C935F9.4D7001C7-- Received: from alpha.xerox.com (alpha.Xerox.COM [13.1.64.93]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9NIYEV9014402 for ; Thu, 23 Oct 2008 11:34:15 -0700 Received: from [13.2.117.234] ([13.2.117.234]) by alpha.xerox.com with SMTP id <321228(1)>; Thu, 23 Oct 2008 11:25:44 PDT Message-ID: <4900C1A8.60403@parc.com> Date: Thu, 23 Oct 2008 11:25:44 PDT From: Ignacio Solis User-Agent: Mozilla-Thunderbird 2.0.0.17 (X11/20081018) MIME-Version: 1.0 To: "Symington, Susan F." References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> <8E507634779E22488719233DB3DF9FF002F86302@IMCSRV4.MITRE.ORG> In-Reply-To: <8E507634779E22488719233DB3DF9FF002F86302@IMCSRV4.MITRE.ORG> X-Enigmail-Version: 0.95.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: "dtn-interest@mailman.dtnrg.org" Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 18:34:15 -0000 Symington, Susan F. wrote > The situation (of sending an integrity-protected > multicast bundle to a singleton address) that we are trying to solve > arises because the integrity checksum is calculated over the > destination EID. If the integrity checksum were not calculated over the > destination EID, then the multicast destination EID in the cached > bundle could simply be replaced by the singleton destination to which > we want to send the bundle, and the bundle could be sent to the > singleton destination from the cache. Perhaps defining such a bundle > integrity ciphersuite should be the solution that we focus on for that > situation. This is actually my point. I _like_ the fact that the EID is part of the integrity checksum. This means that an application can rely on it. What I don't like is us (the "bottom layers") having to modify it. > Maybe bundles sent to multicast addresses should always use a (to be > defined) integrity checksum that is not calculated over the destination > EID whereas bundles sent to singleton EIDs may use either type of > checksum. From a content-centric viewpoint, the destination to which > the bundle is sent really is irrelevant, so why protect its integrity, > especially when protecting its integrity restricts what you can > usefully do with that bundle? What we need to protect is the content > and whatever metadata is used to make the decision regarding the > bundle's relevance. Perhaps we need an alternative integrity checksum > that is defined for the content-centric data dissemination approach > rather biased toward the source-to-destination "call" paradigm of > transmission as the current one is. However, even if we define a new > integrity checksum to deal with this situation, it still seems like > encapsulation would be useful for the situation I identified in the > custodial multicast draft. Will we really never want tunnels? My argument is that we always want "tunnels". To me, the "tunnel" mode seems like the real mode, and the non-tunnel mode seems like sending a naked Application Data Unit. > I guess my response to you amounts to this: I'm open to your objections > and I'd like to understand your ideas better. I am not a strong > advocate of encapsulation per se; I just want a way to do the two > things that I know encapsulation can enable me to do. I can see and > have said how we might solve the first situation with a new integrity > ciphersuite instead of encapsulation (though I don't know what > objections others might raise to that), but I can't see how we'd solve > the second situation (the situation from the custodial multicast > extensions document). I wonder if others see additional situations in > which they would like to use encapsulation. Once again, I like encapsulation. What I don't like is that we're having to encapsulate ourselves because the original bundles couldn't handle the problem. Also, I'm fine completely postponing this discussion until one day when we all have free time to brainstorm. My "perfect solution", which is not a solution, more like a problem statement, is probably impractical. So let me say something more along the lines of the problem we have. Let me restate the basic problem you describe in this email: - We use destination EIDs to forward and route bundles - Destination EIDs are protected by the integrity checksum Problem: We want to (re)deliver a bundle (B1) and using the current destination EID would prove problematic Solution 1 - encapsulate the bundle (B1) into another bundle (B2). Send bundle B2 to the destination we want to reach. Decapsulate, deliver to original EID. Solution 2 - don't include destination EIDs as part of the integrity check. Modify bundle B1 to reach the destination we want. Crazy Solution 3 - have 2 destination EIDs fields, one protected by the integrity check, the other just used for forwarding and routing For now, due to Real World (TM) constraints, I think solution 1, the one you are pursuing, is the right one. I don't like Solution 2 because I would like to keep the destination EID intact. I'm not advocating Solution 3, it's just to illustrate there are always alternatives. Later I will send an email with some of the concerns more clearly stated from the Content-Based side. They will probably support the need for tunneling under the current system. Nacho >> -----Original Message----- >> From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn- >> interest-bounces@maillists.intel-research.net] On Behalf Of Ignacio >> Solis >> Sent: Wednesday, October 22, 2008 6:18 PM >> To: dtn-interest@mailman.dtnrg.org >> Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue >> >> Hi all. >> >> I just want to make a meta comment. As a disclaimer, I feel biased >> towards content-centricity. >> >> It seems to me that what we're trying to solve with the BiB is an >> inherent flaw in the design of DTN. Basically, DTN ties down the way >> we transport the data with the data/meta information. >> Now we're having problems because due to "integrity-protection" we >> can't transfer the bundle the way we need to. To solve this problem, >> we are designing a bundle protocol to move bundles. >> >> This might be why I'm trying to design our DTN content approach as, >> basically, an overlay over DTN. DTN is used as a way to move the >> content around, but the content is by nature, self-contained. >> >> In this instance, we're trying to treat the bundle as self-contained, >> but still want it to be flexible enough to be moved around, and for >> this we're designing a new protocol. >> >> If this discussion (I don't mean my ideas, I mean the main thread) >> leads to a good BiB protocol, wouldn't we gravitate towards using the >> BiB protocol more than the normal Bundle protocol? After all, it will >> be more "flexible". >> >> I understand that a lot of work has been done on DTN, and I do realize >> I might be speaking about impractical things, I just wanted to voice >> my ideas publicly. >> >> Don't take me too seriously, >> >> Nacho >> >> >> >> >> On Oct 21, 2008, at 12:37 PM, Symington, Susan F. wrote: >>> Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle >>> (BiB) Encapsulation. There are several options for how to address >>> this issue, and I would like to get a feel for the DTN community's >>> preferences. >>> >>> First of all, why do we want an encapsulation capability? Here is an >>> example of when BiB Encapsulation is handy: suppose a DTN cache has >>> some bundles stored on it. One of the bundles has a multicast >>> address as its destination EID and this bundle is integrity- >>> protected using a PIB. A new member joins the multicast group. We >>> would like to be able to send this new member the bundle. If we >>> simple send out the bundle as it is found in the cache, it is going >>> to go to all group members. If we change the destination EID of this >>> bundle, it can be sent to only the new member (as desired), but the >>> bundles integrity check will fail. Instead, we'd like to be able to >>> encapsulate this bundle so the encapsulating bundle can be addressed >>> directly to the new member only. >>> >>> Secondly, what is the problem that Peter has pointed out with the >>> way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle- >>> encapsulation-03? The problem has to do with using an >>> administrative record as the mechanism to encapsulate bundles. >>> According to the Bundle Protocol, if a bundle is carrying an >>> administrative record, the bundle cannot have its custody transfer >>> requested bit set. This means that if the original bundle that is >>> sent has its custody transfer bit set and then this bundle is >>> encapsulated (by being placed in an administrative record that is >>> carried by an encapsulating bundle), no node can take custody of the >>> encapsulating bundle as it travels through the network. Only after >>> the original bundle is de-encapsulated can a node take custody of >>> the original de-encapsulated bundle. The whole time the bundle is >>> in the encapsulation "tunnel", the encapsulating bundle cannot be >>> taken custody of. In terms of the example use of BiB encapsulation >>> given above, there would be no way to take a bundle from a DTN >>> cache, encapsulate it in another bundle, and send this new bundle to >>> a newly joining group member custodially. >>> >>> There seem to be three options for addressing this: >>> 1. Do nothing. Leave the BiB Encapsulation I-D as written and >>> live with the fact that encapsulating bundles cannot be sent >>> custodially. >>> 2. Change the rule in section 4.2 (page 15) of the Bundle >>> Protocol Specification (RFC 5050) to enable bundles whose >>> application data unit is an administrative record of type BiB >>> Encapsulation to have a custody transfer requested flag of 1. >>> 3. Rewrite the BiB Encapsulation I-D to perform encapsulation >>> using an extension block instead of an administrative record. The >>> extension block would indicate that the payload of the bundle >>> contains one or more encapsulated bundles (and it could also provide >>> their offsets). The payload of the bundle would contain the actual >>> encapsulated bundles. (We want the encapsulated bundle(s) to be in >>> the payload and not in an extension block to allow for >>> fragmentation.) Some changes to the conceptual model and terminology >>> now used in the Bundle Protocol (BP) would be required in order to >>> be able to define encapsulation in this manner. As defined now, the >>> BP requires that when a bundle reaches a bundle node that is a >>> member of the bundle's destination endpoint, the bundle must be >>> delivered (section 5.7 of the BP, step2). Delivery means that the >>> bundles' application data unit (apdu), which consists of one or more >>> encapsulated bundles (along with any offset information if more than >>> one bundle has been encapsulated), would have to be presented to the >>> node's application agent (section 3.1 of the BP, page 6). In the >>> case of encapsulation, this application agent would in turn have to >>> take each of these bundles and hand them back to the bundle protocol >>> agent, in order, to each be processed as if they had just been >>> received from another node (as described in section 5.6 of the BP). >>> Where this doesn't exactly fit in now with the terminology and >>> conceptual model used in the BP is that the application agent, to >>> which the apdu is presented as part of the delivery process, >>> consists of two elements: an administrative element, and an >>> application-specific element. Neither of these two elements, as >>> currently defined in the BP, seems capable of handling the apdu of >>> encapsulated bundles as desired. >>> a. The application-specific element is unsuitable because the >>> only interface between the BPA and the application-specific element >>> of the application agent is the BP service interface (BP, page 6); >>> however, submitting a bundle to the BPA to be processed as if it has >>> just be received from another node is not one of the services listed >>> as being offered as part of this interface (see section 3.3 of the >>> BP). >>> b. The administrative element is unsuitable because according >>> to the BP, the administrative element of an application agent >>> constructs and requests transmission of administrative records and >>> accepts delivery of and processes custody signals; it doesn't accept >>> delivery of arbitrary apdus. (This is why we originally defined >>> administrative records to be the mechanism for encapsulating > bundles- >>> so the administrative records could be delivered to the >>> administrative element of the application agent and dealt with by >>> them.) Something would have to be changed in the terminology and >>> conceptual model of the BP as currently written to enable the >>> encapsulating bundle to be delivered to an entity that can then >>> extract the one or more encapsulated bundles and provide these back >>> to the BPA to be processed as if they had just been received from >>> another node. >>> >>> Right now I think I prefer option 2. I would like to understand how >>> much opposition there is to this option (if any) and I welcome any >>> other comments/ideas folks might have. >>> >>> If you've read this far, thanks. If you respond, even more thanks. >>> >>> -susan >>> ***************************************************************** >>> Susan Symington >>> The MITRE Corporation >>> susan@mitre.org >>> 703-983-7209 (voice) >>> 703-983-7142 (fax) >>> ****************************************************************** >>> >> >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest -- Ignacio Solis - Member of Research Staff - PARC - isolis@parc.com GPG KEY: 523B5BCA | 1940 66A8 45B2 5504 8109 85A1 8976 554A 523B 5BCA Received: from stl-smtpout-01.boeing.com (stl-smtpout-01.boeing.com [130.76.96.56]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9NFZxUF006325 for ; Thu, 23 Oct 2008 08:35:59 -0700 Received: from slb-av-01.boeing.com (slb-av-01.boeing.com [129.172.13.4]) by stl-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with ESMTP id m9NFRqOu022167 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 23 Oct 2008 10:28:02 -0500 (CDT) Received: from slb-av-01.boeing.com (localhost [127.0.0.1]) by slb-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id m9NFRprD016850; Thu, 23 Oct 2008 08:27:51 -0700 (PDT) Received: from XCH-NWBH-11.nw.nos.boeing.com (xch-nwbh-11.nw.nos.boeing.com [130.247.55.84]) by slb-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id m9NFRldw016692; Thu, 23 Oct 2008 08:27:51 -0700 (PDT) Received: from XCH-NW-5V2.nw.nos.boeing.com ([130.247.55.45]) by XCH-NWBH-11.nw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 23 Oct 2008 08:27:51 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 23 Oct 2008 08:27:50 -0700 Message-ID: <8C7C41A176AC0B468BEFB2EFD9BDAB99062F098B@XCH-NW-5V2.nw.nos.boeing.com> In-Reply-To: <53B52415C756A84E8A169F0E3673A329018C083B@IMCSRV6.MITRE.ORG> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Oasys won't configure Thread-Index: AckqQqvrV0DPYgAIR32VrmNk0xGRjQGNuIowASqISyA= References: <8C7C41A176AC0B468BEFB2EFD9BDAB990620D876@XCH-NW-5V2.nw.nos.boeing.com> <53B52415C756A84E8A169F0E3673A329018C083B@IMCSRV6.MITRE.ORG> From: "Duke, Martin" To: "Andresen, Jason R." , X-OriginalArrivalTime: 23 Oct 2008 15:27:51.0854 (UTC) FILETIME=[E9BF84E0:01C93523] X-TM-AS-Product-Ver: SMEX-8.0.0.1285-5.500.1027-16234.003 X-TM-AS-Result: No--45.029900-0.000000-31 X-TM-AS-User-Approved-Sender: Yes X-TM-AS-User-Blocked-Sender: No Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9NFZxUF006325 Subject: Re: [dtn-interest] Oasys won't configure X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 15:36:00 -0000 For the record, I was able to get it to work on FreeBSD with the following steps: 1) Typing "aclocal" and "autoconf". 2) Changing the last line in the oasys configure file from 'make' to 'gmake'. 3) Applying the 4 patches to oasys and dtn from the sourceforge site. 4) Using 'gmake' instead of 'make' after the configure ran. Martin > -----Original Message----- > From: Andresen, Jason R. [mailto:jandrese@mitre.org] > Sent: Friday, October 17, 2008 10:02 AM > To: Duke, Martin; dtn-interest@mailman.dtnrg.org > Subject: RE: [dtn-interest] Oasys won't configure > > I had the same problem on FreeBSD. The problem is that > configure is calling make instead of gmake, but it's assuming > that it has GNU make as "make", not BSD Make. > > The good news is that those errors are harmless. If you run > "gmake", you should be able to build both DTN and oasys. > However, you will run into one other compile error later on. > In one of the files (I forget which), there is a reference to > a size_t (or something similar) without the corresponding > header included. If you just try to include the header by > hand, the build will blow up, but if you search and replace > all of those "size_t" instances in the one file with "int", > the build goes through and the bundle daemon seems to work > normally. I have not been able to track down the proper fix > for that yet, so there is no patch. Sorry. > > >-----Original Message----- > >From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn- > >interest-bounces@maillists.intel-research.net] On Behalf Of Duke, > Martin > >Sent: Thursday, October 09, 2008 3:10 PM > >To: dtn-interest@mailman.dtnrg.org > >Subject: [dtn-interest] Oasys won't configure > > > >I've downloaded dtn-2.6.0 and oasys-1.3.0 from the DTN sourceforge > site. > > > >I unzipped them into parallel directories, with BerkeleyDB 4.7.25 > >installed on my FreeBSD 7.0 system. > > > >I then typed > >cd oasys-1.3.0 > >./configure --with-dbver=4.7 > > > >And after a while I get this: > > > >"Makefile", line 209: Missing dependency operator > "Makefile", line 212: > >Need an operator "Rules.make", line 124: warning: duplicate > script for > >target "%.o" > >ignored > >"Rules.make", line 125: warning: duplicate script for target "%.o" > >ignored > >"Rules.make", line 135: warning: duplicate script for target "%.E" > >ignored > >"Rules.make", line 136: warning: duplicate script for target "%.E" > >ignored > >"Rules.make", line 148: Missing dependency operator > "Rules.make", line > >150: Need an operator "Rules.make", line 153: Missing dependency > >operator "Rules.make", line 154: Missing dependency operator > >"Rules.make", line 155: Need an operator "Makefile", line > 243: Missing > >dependency operator "Makefile", line 247: Need an operator > "Makefile", > >line 274: Need an operator "Makefile", line 275: Need an operator > >"Makefile", line 276: Need an operator "Makefile", line 277: Need an > >operator "Makefile", line 472: Need an operator "Makefile", > line 474: > >Need an operator "Makefile", line 479: Need an operator > >make: fatal errors encountered -- cannot continue > > > >Am I using the wrong distribution? Is there a configuration flag I > >should be using? > > > >Thanks! > >Martin > > > >All the other output listed below (preceeding the above): > > > >[root@freebsd7 /home/core/dtn/oasys-1.3.0]# ./configure > --with-dbver=4.7 > >checking location of source directory... > >"/usr/home/core/dtn/oasys-1.3.0" > >checking location of build directory... > "/usr/home/core/dtn/oasys-1.3.0" > >checking for a C compiler (trying gcc gcc-4.1 gcc-4.0 gcc-3.4 > >gcc-3.3)... > >checking for gcc... gcc > >checking for C compiler default output file name... a.out checking > >whether the C compiler works... yes checking whether we are cross > >compiling... no checking for suffix of executables... > >checking for suffix of object files... o checking whether we > are using > >the GNU C compiler... yes checking whether gcc accepts -g... yes > >checking for gcc option to accept ISO C89... none needed > checking for a > >C++ compiler (trying g++ g++-4.0 g++-4.0 g++-3.4 > >g++-3.3)... > >checking for g++... g++ > >checking whether we are using the GNU C++ compiler... yes checking > >whether g++ accepts -g... yes checking whether the C++ compiler > >works... yes checking how to run the C preprocessor... gcc > -E checking > >for the version of the GNU C compiler... 4.2.1 checking for > the version > >of the GNU C++ compiler... 4.2.1 checking for ar... ar checking for > >ranlib... ranlib checking whether to compile with debugging... yes > >checking whether to compile with memory debugging... no checking > >whether to compile with lock debugging (default yes)... yes checking > >whether to compile with optimization... no checking whether > to compile > >with profiling... no checking whether to link statically... > no checking > >whether to link using static external libraries... no > checking whether > >to try to build shared libraries... yes checking whether the > compiler > >supports -fPIC... yes checking whether the compiler can link > a dynamic > >library with > -shared... > >yes > >checking extension for dynamic libraries... so checking if > the compiler > >supports -Wl,--rpath=.... yes checking for grep that handles > long lines > >and -e... /usr/bin/grep checking for egrep... /usr/bin/grep > -E checking > >for sys/types.h... yes checking for sys/stat.h... yes checking for > >stdlib.h... yes checking for string.h... yes checking for > memory.h... > >yes checking for strings.h... yes checking for inttypes.h... yes > >checking for stdint.h... yes checking for unistd.h... yes > checking for > >gawk... no checking for mawk... no checking for nawk... nawk > checking > >for a BSD-compatible install... /usr/bin/install -c checking whether > >make sets $(MAKE)... yes checking for ranlib... (cached) ranlib > >checking for library containing pthread_create... -lpthread checking > >for pthread_yield... yes checking for library containing > >pthread_setspecific... none required checking for library containing > >socket... none required checking for library containing > >gethostbyname... none required checking for library containing > >xdr_int... none required checking for ANSI C header files... yes > >checking err.h usability... yes checking err.h presence... > yes checking > >for err.h... yes checking execinfo.h usability... no checking > >execinfo.h presence... no checking for execinfo.h... no checking for > >stdint.h... (cached) yes checking for string.h... (cached) > yes checking > >synch.h usability... no checking synch.h presence... no checking for > >synch.h... no checking sys/cdefs.h usability... yes checking > >sys/cdefs.h presence... yes checking for sys/cdefs.h... yes checking > >for sys/types.h... (cached) yes checking for an ANSI C-conforming > >const... yes checking for inline... inline checking for working > >volatile... yes checking for mode_t... yes checking value for > >_FILE_OFFSET_BITS preprocessor symbol... 64 checking for > off_t... yes > >checking size of off_t... 8 checking return type of signal > handlers... > >void checking for size_t... yes checking for ptrdiff_t... > yes checking > >for uint32_t... yes checking for u_int32_t... yes checking for > >fdatasync... no checking for getaddrinfo... yes checking for > >gethostbyname... yes checking for gethostbyname_r... yes > checking for > >getopt_long... yes checking for inet_aton... yes checking for > >inet_pton... yes checking for pthread_yield... (cached) yes checking > >for sched_yield... yes checking whether to compile with non-atomic > >"atomic" routines... no checking whether to compile with > assembly-based > >atomic functions... > yes > >checking for --with-python... no > >checking for python... /usr/local/bin/python checking whether python > >distutils can build an extension module... yes checking for library > >containing pow... -lm checking for library containing dlopen... none > >required > > > >configure: checking for tcl installation (version 8.4) checking for > >tcl.h (version 8.4) in /usr/include... no checking for tcl.h > (version > >8.4) in /usr/local/include... no checking for tcl.h (version 8.4) in > >/usr/include/tcl8.4... no checking for tcl.h (version 8.4) in > >/usr/local/include/tcl8.4... yes checking for tcl library in > /usr/lib: > >-ltcl8.4 ... no checking for tcl library in /usr/lib: -ltcl84 ... no > >checking for tcl library in /usr/lib: -ltcl ... no checking for tcl > >library in /usr/local/lib: -ltcl8.4 ... no checking for tcl > library in > >/usr/local/lib: -ltcl84 ... yes checking whether to compile > with google > >profiling... no checking whether bluetooth support should be > enabled... > >try checking for library containing baswap... no checking > >bluetooth/bluetooth.h usability... no checking bluetooth/bluetooth.h > >presence... no checking for bluetooth/bluetooth.h... no checking > >whether bluetooth support was found... no checking whether expat > >support should be enabled... try checking for expat in /usr/include, > >/usr/lib, -lexpat... no checking for expat in /usr/include, > >/usr/local/lib, -lexpat... no checking for expat in > /usr/local/include, > >/usr/lib, -lexpat... yes checking whether libexpat was found... yes > >checking whether xerces-c support should be enabled... try checking > >whether xerces-c (>= v2.6.0) was found... no checking whether > >tclreadline support should be enabled... try checking for library > >containing readline... -lreadline checking whether readline is GNU > >readline or BSD editline... editline checking whether tclreadline > >support was found... yes checking whether zlib support should be > >enabled... try checking for library containing compress... > -lz checking > >for library containing compressBound... none required > checking whether > >zlib support was found... yes checking for xsd... xsd checking for > >Berkeley DB header (version 4.7) in /usr/include... no checking for > >Berkeley DB header (version 4.7) in /usr/local/include... > >no > >checking for Berkeley DB header (version 4.7) in > >/usr/local/include/db4.7... no checking for Berkeley DB > header (version > >4.7) in /usr/local/include/db4... no checking for Berkeley DB header > >(version 4.7) in /usr/local/include/db47... no checking for > Berkeley DB > >header (version 4.7) in /usr/local/BerkeleyDB.4.7/include... yes > >checking for Berkeley DB library in /usr/local/BerkeleyDB.4.7/lib, > >-ldb-4.7... yes > >configure: creating ./config.status > >config.status: creating Rules.make > >config.status: creating System.make > >config.status: creating oasys-config.h > >config.status: oasys-config.h is unchanged > > > >_______________________________________________ > >dtn-interest mailing list > >dtn-interest@maillists.intel-research.net > >http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from alpha.xerox.com (alpha.Xerox.COM [13.1.64.93]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9N2csvc002975 for ; Wed, 22 Oct 2008 19:38:55 -0700 Received: from [13.2.117.234] ([13.2.117.234]) by alpha.xerox.com with SMTP id <387650(2)>; Wed, 22 Oct 2008 19:31:04 PDT Message-ID: <48FFE1E8.5000201@parc.com> Date: Wed, 22 Oct 2008 19:31:04 PDT From: Ignacio Solis User-Agent: Mozilla-Thunderbird 2.0.0.17 (X11/20081018) MIME-Version: 1.0 To: "dtn-interest@mailman.dtnrg.org" References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> <48FFCA82.90500@jpl.nasa.gov> In-Reply-To: <48FFCA82.90500@jpl.nasa.gov> X-Enigmail-Version: 0.95.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 02:38:55 -0000 Scott Burleigh wrote: > Ignacio Solis wrote: >> Hi all. >> >> I just want to make a meta comment. As a disclaimer, I feel biased >> towards content-centricity. >> >> It seems to me that what we're trying to solve with the BiB is an >> inherent flaw in the design of DTN. Basically, DTN ties down the way >> we transport the data with the data/meta information. >> Now we're having problems because due to "integrity-protection" we >> can't transfer the bundle the way we need to. To solve this problem, >> we are designing a bundle protocol to move bundles. >> >> This might be why I'm trying to design our DTN content approach as, >> basically, an overlay over DTN. DTN is used as a way to move the >> content around, but the content is by nature, self-contained. >> >> In this instance, we're trying to treat the bundle as self-contained, >> but still want it to be flexible enough to be moved around, and for >> this we're designing a new protocol. >> >> If this discussion (I don't mean my ideas, I mean the main thread) >> leads to a good BiB protocol, wouldn't we gravitate towards using the >> BiB protocol more than the normal Bundle protocol? After all, it will >> be more "flexible". >> > I doubt it, Nacho. I can't think of any operational scenario in the > work I'm doing where that flexibility would be useful. It seems to me > that there are better ways of achieving all the same objectives without it. > > Can you say some more about what you mean when you say "DTN ties down > the way we transport the data with the data/meta information"? Is what > Susan is proposing really that different from any other sort of > tunneling? Why isn't the content of a bundle already "self-contained"? > What's an example of a case where the design of DTN makes it impossible > to transfer the bundle the way we need to? Maybe I read things wrong. It's what I got from the description in Susan's email: "If we change the destination EID of this bundle, it can be sent to only the new member (as desired), but the bundles integrity check will fail." This seems to imply to me that the way we check for integrity includes checking the destination EID. And, because this is the destination we use for forwarding/actual delivery, we can't change it without affecting the integrity check. So (please correct me if I'm wrong): An application wants to send a bundle. It gives this bundle some EIDs (source, dest, etc) and payload. And it expects these to be delivered to the destination application. The destination can then check who it is from, who it was for, etc. This is, in a sense, meta-information about the payload. There is an association that exists between the payload and those EIDs. My comment was that the forwarding/routing/storing/caching/delivery engine, relies on those fields. So if the forwarding, or routing, or caching needs to change those fields, it can't. I'm not proposing to break the association the application has made. What I wish we had is a way to use our own "internal" fields (which could be potentially initialized to the same value), so that we are free to change them. This kind of sounds ridiculous. And partially I'm glancing over things, like "why would we limit the association the application is making to the EID format?", "why are we duplicating EIDs?" "are you talking about EIDs or tags/meta data"? Maybe I see every problem as a nail since I want to sell my hammer. Having said that, I think Bundle-in-Bundle is a really good thing given the system we're working in. It gives the BPA the freedom to move bundles around without affecting what the application thought was static. Maybe I'm just projecting what I wish was more like "Content-in-Bundle". Where I (as the content-routing/storing/forwarding engine) could move things around freely (bundles), while treating the Content as a read-only chunk that doesn't dictate my operation. Nacho PS. I have read the RFC and drafts, but I don't remember every detail, so maybe I'm generalizing a problem that doesn't actually exist (or is very specific to me). -- Ignacio Solis - Member of Research Staff - PARC - isolis@parc.com GPG KEY: 523B5BCA | 1940 66A8 45B2 5504 8109 85A1 8976 554A 523B 5BCA Received: from mail.jpl.nasa.gov (sentrion1.jpl.nasa.gov [128.149.139.105]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9N0wsDZ030811 for ; Wed, 22 Oct 2008 17:58:54 -0700 Received: from xmta3.jpl.nasa.gov (xmta3.jpl.nasa.gov [137.78.160.111]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m9N0pHaj024952 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Thu, 23 Oct 2008 00:51:17 GMT Received: from [127.0.0.1] (dhcp-79-22-229.jpl.nasa.gov [137.79.22.229]) by xmta3.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m9N0pEFc011787 for ; Wed, 22 Oct 2008 17:51:15 -0700 Message-ID: <48FFCA82.90500@jpl.nasa.gov> Date: Wed, 22 Oct 2008 17:51:14 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: dtn-interest@mailman.dtnrg.org References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> In-Reply-To: <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Source-IP: dhcp-79-22-229.jpl.nasa.gov [137.79.22.229] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 00:58:54 -0000 Ignacio Solis wrote: > Hi all. > > I just want to make a meta comment. As a disclaimer, I feel biased > towards content-centricity. > > It seems to me that what we're trying to solve with the BiB is an > inherent flaw in the design of DTN. Basically, DTN ties down the way > we transport the data with the data/meta information. > Now we're having problems because due to "integrity-protection" we > can't transfer the bundle the way we need to. To solve this problem, > we are designing a bundle protocol to move bundles. > > This might be why I'm trying to design our DTN content approach as, > basically, an overlay over DTN. DTN is used as a way to move the > content around, but the content is by nature, self-contained. > > In this instance, we're trying to treat the bundle as self-contained, > but still want it to be flexible enough to be moved around, and for > this we're designing a new protocol. > > If this discussion (I don't mean my ideas, I mean the main thread) > leads to a good BiB protocol, wouldn't we gravitate towards using the > BiB protocol more than the normal Bundle protocol? After all, it will > be more "flexible". > I doubt it, Nacho. I can't think of any operational scenario in the work I'm doing where that flexibility would be useful. It seems to me that there are better ways of achieving all the same objectives without it. Can you say some more about what you mean when you say "DTN ties down the way we transport the data with the data/meta information"? Is what Susan is proposing really that different from any other sort of tunneling? Why isn't the content of a bundle already "self-contained"? What's an example of a case where the design of DTN makes it impossible to transfer the bundle the way we need to? Scott Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9N0vhI4030733 for ; Wed, 22 Oct 2008 17:57:44 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9N0o8bk032299 for ; Wed, 22 Oct 2008 20:50:08 -0400 Received: from imcfe2.MITRE.ORG (imcfe2.mitre.org [129.83.29.4]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9N0o7Dt032288; Wed, 22 Oct 2008 20:50:07 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by imcfe2.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Wed, 22 Oct 2008 20:50:07 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C934A9.4B235E6C" Date: Wed, 22 Oct 2008 20:50:06 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002F86303@IMCSRV4.MITRE.ORG> In-Reply-To: <48FFC6E9.3070507@jpl.nasa.gov> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: Ack0p8EvPKkwuSZrQt67H1vgD7Z/RwAAQ50w References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <48FFC6E9.3070507@jpl.nasa.gov> From: "Symington, Susan F." To: "Scott Burleigh" , X-OriginalArrivalTime: 23 Oct 2008 00:50:07.0622 (UTC) FILETIME=[4B6B7260:01C934A9] Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 00:57:44 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C934A9.4B235E6C Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Thanks, Scott. It's good news to learn that you don't see a problem reconciling option 3 with the current conceptual model and terminology in the BP. =20 -susan ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Scott Burleigh Sent: Wednesday, October 22, 2008 8:36 PM To: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue =20 Symington, Susan F. wrote:=20 All, =20 Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) Encapsulation. There are several options for how to address this issue, and I would like to get a feel for the DTN community's preferences. =20 First of all, why do we want an encapsulation capability? Here is an example of when BiB Encapsulation is handy: suppose a DTN cache has some bundles stored on it. One of the bundles has a multicast address as its destination EID and this bundle is integrity-protected using a PIB. A new member joins the multicast group. We would like to be able to send this new member the bundle. If we simple send out the bundle as it is found in the cache, it is going to go to all group members. If we change the destination EID of this bundle, it can be sent to only the new member (as desired), but the bundles integrity check will fail. Instead, we'd like to be able to encapsulate this bundle so the encapsulating bundle can be addressed directly to the new member only.=20 =20 Secondly, what is the problem that Peter has pointed out with the way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with using an administrative record as the mechanism to encapsulate bundles. According to the Bundle Protocol, if a bundle is carrying an administrative record, the bundle cannot have its custody transfer requested bit set. This means that if the original bundle that is sent has its custody transfer bit set and then this bundle is encapsulated (by being placed in an administrative record that is carried by an encapsulating bundle), no node can take custody of the encapsulating bundle as it travels through the network. Only after the original bundle is de-encapsulated can a node take custody of the original de-encapsulated bundle. The whole time the bundle is in the encapsulation "tunnel", the encapsulating bundle cannot be taken custody of. In terms of the example use of BiB encapsulation given above, there would be no way to take a bundle from a DTN cache, encapsulate it in another bundle, and send this new bundle to a newly joining group member custodially.=20 =20 There seem to be three options for addressing this: Do nothing. Leave the BiB Encapsulation I-D as written and live with the fact that encapsulating bundles cannot be sent custodially. Change the rule in section 4.2 (page 15) of the Bundle Protocol Specification (RFC 5050) to enable bundles whose application data unit is an administrative record of type BiB Encapsulation to have a custody transfer requested flag of 1. Rewrite the BiB Encapsulation I-D to perform encapsulation using an extension block instead of an administrative record. The extension block would indicate that the payload of the bundle contains one or more encapsulated bundles (and it could also provide their offsets). The payload of the bundle would contain the actual encapsulated bundles. (We want the encapsulated bundle(s) to be in the payload and not in an extension block to allow for fragmentation.) Some changes to the conceptual model and terminology now used in the Bundle Protocol (BP) would be required in order to be able to define encapsulation in this manner. As defined now, the BP requires that when a bundle reaches a bundle node that is a member of the bundle's destination endpoint, the bundle must be delivered (section 5.7 of the BP, step2). Delivery means that the bundles' application data unit (apdu), which consists of one or more encapsulated bundles (along with any offset information if more than one bundle has been encapsulated), would have to be presented to the node's application agent (section 3.1 of the BP, page 6). In the case of encapsulation, this application agent would in turn have to take each of these bundles and hand them back to the bundle protocol agent, in order, to each be processed as if they had just been received from another node (as described in section 5.6 of the BP). Where this doesn't exactly fit in now with the terminology and conceptual model used in the BP is that the application agent, to which the apdu is presented as part of the delivery process, consists of two elements: an administrative element, and an application-specific element. Neither of these two elements, as currently defined in the BP, seems capable of handling the apdu of encapsulated bundles as desired.=20 The application-specific element is unsuitable because the only interface between the BPA and the application-specific element of the application agent is the BP service interface (BP, page 6); however, submitting a bundle to the BPA to be processed as if it has just be received from another node is not one of the services listed as being offered as part of this interface (see section 3.3 of the BP). I don't see any obstacle here, Susan. "Delivering a received bundle" is one of the expected services. What the application-specific element of the application agent does with a delivered bundle is wholly an implementation matter. I can easily imagine, for instance, an endpoint ID convention that enables the destination endpoint to be specified somehow as "BiB handler". When the bundle is delivered to that endpoint, the application-specific element of the application agent deals with it by processing it as if it had been delivered by another node. Speaking just for myself, I also don't yet see this capability as being especially useful. I think we tend to do too much within "bundling" already and would be better served by leaving some capabilities to other, well, layers. But if we really want to do this, I think some sort of extension block scheme would be the cleaner approach. Scott The administrative element is unsuitable because according to the BP, the administrative element of an application agent constructs and requests transmission of administrative records and accepts delivery of and processes custody signals; it doesn't accept delivery of arbitrary apdus. (This is why we originally defined administrative records to be the mechanism for encapsulating bundles-so the administrative records could be delivered to the administrative element of the application agent and dealt with by them.) Something would have to be changed in the terminology and conceptual model of the BP as currently written to enable the encapsulating bundle to be delivered to an entity that can then extract the one or more encapsulated bundles and provide these back to the BPA to be processed as if they had just been received from another node.=20 ------_=_NextPart_001_01C934A9.4B235E6C Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Thanks, Scott. = It’s good news to learn that you don’t see a problem reconciling option 3 with the = current conceptual model and terminology in the BP.

 

-susan

**********************************************************= *******

Susan Symington

The MITRE Corporation

susan@mitre.org

703-983-7209 (voice)

703-983-7142 (fax)

**********************************************************= ********

From: = dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf = Of Scott Burleigh
Sent: Wednesday, October 22, 2008 8:36 PM
To: dtn-interest@mailman.dtnrg.org
Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation = Issue

 

Symington, Susan F. wrote:

All,

 

Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) Encapsulation. There are several options for how = to address this issue, and I would like to get a feel for the DTN = community’s preferences.

 

First of all, why do we want an encapsulation = capability? Here is an example of when BiB Encapsulation is handy: suppose a DTN = cache has some bundles stored on it. One of the bundles has a multicast address as = its destination EID and this bundle is integrity-protected using a PIB. A = new member joins the multicast group. We would like to be able to send this = new member the bundle. If we simple send out the bundle as it is found in = the cache, it is going to go to all group members. If we change the = destination EID of this bundle, it can be sent to only the new member (as desired), but = the bundles integrity check will fail. Instead, we’d like to be able = to encapsulate this bundle so the encapsulating bundle can be addressed directly to the = new member only.

 

Secondly, what is the problem that Peter has = pointed out with the way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with = using  an administrative record as the mechanism to encapsulate bundles.  According to the Bundle Protocol, if a bundle is carrying an administrative record, the bundle cannot have its custody transfer = requested bit set. This means that if the original bundle that is sent has its = custody transfer bit set and then this bundle is encapsulated (by being placed = in an administrative record that is carried by an encapsulating bundle), no = node can take custody of the encapsulating bundle as it travels through the = network. Only after the original bundle is de-encapsulated can a node take = custody of the original de-encapsulated bundle.  The whole time the bundle is = in the encapsulation “tunnel”, the encapsulating bundle cannot be = taken custody of.  In terms of the example use of BiB encapsulation given above, = there would be no way to take a bundle from a DTN cache, encapsulate it in another = bundle, and send this new bundle to a newly joining group member custodially. =

 

There seem to be three options for addressing = this:

Do nothing. = Leave the BiB Encapsulation I-D as written and live with the fact that encapsulating = bundles cannot be sent custodially.

Change the rule = in section 4.2 (page 15) of the Bundle Protocol Specification (RFC 5050) to enable = bundles whose application data unit is an administrative record of type BiB = Encapsulation to have a custody transfer requested flag of 1.

Rewrite the BiB Encapsulation I-D to perform encapsulation using an extension block = instead of an administrative record. The extension block would indicate that the = payload of the bundle contains one or more encapsulated bundles (and it could = also provide their offsets). The payload of the bundle would contain the = actual encapsulated bundles. (We want the encapsulated bundle(s) to be in the = payload and not in an extension block to allow for fragmentation.) Some changes = to the conceptual model and terminology now used in the Bundle Protocol (BP) = would be required in order to be able to define encapsulation in this manner. As = defined now, the BP requires that when a bundle reaches a bundle node that is a = member of the bundle’s destination endpoint, the bundle must be delivered = (section 5.7 of the BP, step2). Delivery means that the bundles’ application = data unit (apdu), which consists of one or more encapsulated bundles (along with = any offset information if more than one bundle has been encapsulated), would = have to be presented to the node’s application agent (section 3.1 of = the BP, page 6). In the case of encapsulation, this application agent would in turn = have to take each of these bundles and hand them back to the bundle protocol = agent, in order, to each be processed as if they had just been received from = another node (as described in section 5.6 of the BP). Where this doesn’t = exactly fit in now with the terminology and conceptual model used in the BP is that the application agent, to which the apdu is presented as part of the = delivery process,  consists of two elements: an administrative element, and = an application-specific element. Neither of these two elements, as = currently defined in the BP, seems capable of handling the apdu of encapsulated = bundles as desired.

The application-specific element is unsuitable because the only interface = between the BPA and the application-specific element of the application agent is = the BP service interface (BP, page 6); however, submitting a bundle to the BPA = to be processed as if it has just be received from another node is not one of = the services listed as being offered as part of this interface (see section = 3.3 of the BP).

I don't see any obstacle here, Susan.  "Delivering a received bundle" is one of the expected services.  What the application-specific element of the application agent does with a = delivered bundle is wholly an implementation matter.  I can easily imagine, = for instance, an endpoint ID convention that enables the destination = endpoint to be specified somehow as "BiB handler".  When the bundle is delivered to that endpoint, the application-specific element of the = application agent deals with it by processing it as if it had been delivered by = another node.

Speaking just for myself, I also don't yet see this capability as being especially useful.  I think we tend to do too much within "bundling" already and would be better served by leaving some capabilities to other, well, layers.  But if we really want to do = this, I think some sort of extension block scheme would be the cleaner = approach.

Scott

The administrative element is unsuitable because according to the BP, the administrative element of an application agent  constructs and = requests transmission of administrative records and accepts delivery of and = processes custody signals; it doesn’t accept delivery of arbitrary apdus. = (This is why we originally defined administrative records to be the mechanism for = encapsulating bundles—so the administrative records could be delivered to the = administrative element of the application agent and dealt with by them.) Something = would have to be changed in the terminology and conceptual model of the BP as = currently written to enable the encapsulating bundle to be delivered to an entity = that can then extract the one or more encapsulated bundles and provide these = back to the BPA to be processed as if they had just been received from another = node.

------_=_NextPart_001_01C934A9.4B235E6C-- Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9N0quKK030493 for ; Wed, 22 Oct 2008 17:52:56 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9N0jKGB020541 for ; Wed, 22 Oct 2008 20:45:20 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9N0jKEg020527; Wed, 22 Oct 2008 20:45:20 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Wed, 22 Oct 2008 20:45:20 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Wed, 22 Oct 2008 20:45:18 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002F86302@IMCSRV4.MITRE.ORG> In-Reply-To: <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: Ack0lHRKA/+KF6DBT6iXpYHksM7E6AAB1a0g References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> From: "Symington, Susan F." To: "Ignacio Solis" , X-OriginalArrivalTime: 23 Oct 2008 00:45:20.0417 (UTC) FILETIME=[A03B7110:01C934A8] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9N0quKK030493 Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 00:52:57 -0000 Nacho, It may be that we really don't need encapsulation or that encapsulation is a bad idea; I don't know. The situation that I identified (sending an integrity-protected bundle with a multicast EID from a DTN cache to a singleton endpoint) is one example of how encapsulation can be useful. A second situation that I have identified is in the DTN Custodial Multicast Extension draft (http://www.ietf.org/internet-drafts/draft-symington-dtnrg-bundle-multi cast-custodial-04.txt). In that example, a custodian receives a "Failed" custody signal for a multicast bundle from a specific downstream node, in which case the custodian wants to retransmit the multicast bundle to that downstream node. It may want to conserve bandwidth by encapsulating the multicast bundle in a singleton bundle for bandwidth-efficient transmission to the downstream node; this node can then de-encapsulate the multicast bundle and forward the multicast bundle further. There may be other uses of encapsulation as well--examples that are analogous to the ways that tunnels are used today in networks, but that remains to be seen. Maybe we want to avoid tunnels. If defining encapsulation really does just amount to defining another bundle protocol to move bundles, then it doesn't seem very appealing. I'm not sure I agree with you when you say that "what we're trying to solve with the BiB is an inherent flaw in the design of DTN". It may, however, be an inherent flaw in the integrity checksum ciphersuite as currently defined. The situation (of sending an integrity-protected multicast bundle to a singleton address) that we are trying to solve arises because the integrity checksum is calculated over the destination EID. If the integrity checksum were not calculated over the destination EID, then the multicast destination EID in the cached bundle could simply be replaced by the singleton destination to which we want to send the bundle, and the bundle could be sent to the singleton destination from the cache. Perhaps defining such a bundle integrity ciphersuite should be the solution that we focus on for that situation. Maybe bundles sent to multicast addresses should always use a (to be defined) integrity checksum that is not calculated over the destination EID whereas bundles sent to singleton EIDs may use either type of checksum. From a content-centric viewpoint, the destination to which the bundle is sent really is irrelevant, so why protect its integrity, especially when protecting its integrity restricts what you can usefully do with that bundle? What we need to protect is the content and whatever metadata is used to make the decision regarding the bundle's relevance. Perhaps we need an alternative integrity checksum that is defined for the content-centric data dissemination approach rather biased toward the source-to-destination "call" paradigm of transmission as the current one is. However, even if we define a new integrity checksum to deal with this situation, it still seems like encapsulation would be useful for the situation I identified in the custodial multicast draft. Will we really never want tunnels? I guess my response to you amounts to this: I'm open to your objections and I'd like to understand your ideas better. I am not a strong advocate of encapsulation per se; I just want a way to do the two things that I know encapsulation can enable me to do. I can see and have said how we might solve the first situation with a new integrity ciphersuite instead of encapsulation (though I don't know what objections others might raise to that), but I can't see how we'd solve the second situation (the situation from the custodial multicast extensions document). I wonder if others see additional situations in which they would like to use encapsulation. -susan ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** >-----Original Message----- >From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn- >interest-bounces@maillists.intel-research.net] On Behalf Of Ignacio >Solis >Sent: Wednesday, October 22, 2008 6:18 PM >To: dtn-interest@mailman.dtnrg.org >Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue > >Hi all. > >I just want to make a meta comment. As a disclaimer, I feel biased >towards content-centricity. > >It seems to me that what we're trying to solve with the BiB is an >inherent flaw in the design of DTN. Basically, DTN ties down the way >we transport the data with the data/meta information. >Now we're having problems because due to "integrity-protection" we >can't transfer the bundle the way we need to. To solve this problem, >we are designing a bundle protocol to move bundles. > >This might be why I'm trying to design our DTN content approach as, >basically, an overlay over DTN. DTN is used as a way to move the >content around, but the content is by nature, self-contained. > >In this instance, we're trying to treat the bundle as self-contained, >but still want it to be flexible enough to be moved around, and for >this we're designing a new protocol. > >If this discussion (I don't mean my ideas, I mean the main thread) >leads to a good BiB protocol, wouldn't we gravitate towards using the >BiB protocol more than the normal Bundle protocol? After all, it will >be more "flexible". > >I understand that a lot of work has been done on DTN, and I do realize >I might be speaking about impractical things, I just wanted to voice >my ideas publicly. > >Don't take me too seriously, > >Nacho > > > > >On Oct 21, 2008, at 12:37 PM, Symington, Susan F. wrote: >> Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle >> (BiB) Encapsulation. There are several options for how to address >> this issue, and I would like to get a feel for the DTN community's >> preferences. >> >> First of all, why do we want an encapsulation capability? Here is an >> example of when BiB Encapsulation is handy: suppose a DTN cache has >> some bundles stored on it. One of the bundles has a multicast >> address as its destination EID and this bundle is integrity- >> protected using a PIB. A new member joins the multicast group. We >> would like to be able to send this new member the bundle. If we >> simple send out the bundle as it is found in the cache, it is going >> to go to all group members. If we change the destination EID of this >> bundle, it can be sent to only the new member (as desired), but the >> bundles integrity check will fail. Instead, we'd like to be able to >> encapsulate this bundle so the encapsulating bundle can be addressed >> directly to the new member only. >> >> Secondly, what is the problem that Peter has pointed out with the >> way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle- >> encapsulation-03? The problem has to do with using an >> administrative record as the mechanism to encapsulate bundles. >> According to the Bundle Protocol, if a bundle is carrying an >> administrative record, the bundle cannot have its custody transfer >> requested bit set. This means that if the original bundle that is >> sent has its custody transfer bit set and then this bundle is >> encapsulated (by being placed in an administrative record that is >> carried by an encapsulating bundle), no node can take custody of the >> encapsulating bundle as it travels through the network. Only after >> the original bundle is de-encapsulated can a node take custody of >> the original de-encapsulated bundle. The whole time the bundle is >> in the encapsulation "tunnel", the encapsulating bundle cannot be >> taken custody of. In terms of the example use of BiB encapsulation >> given above, there would be no way to take a bundle from a DTN >> cache, encapsulate it in another bundle, and send this new bundle to >> a newly joining group member custodially. >> >> There seem to be three options for addressing this: >> 1. Do nothing. Leave the BiB Encapsulation I-D as written and >> live with the fact that encapsulating bundles cannot be sent >> custodially. >> 2. Change the rule in section 4.2 (page 15) of the Bundle >> Protocol Specification (RFC 5050) to enable bundles whose >> application data unit is an administrative record of type BiB >> Encapsulation to have a custody transfer requested flag of 1. >> 3. Rewrite the BiB Encapsulation I-D to perform encapsulation >> using an extension block instead of an administrative record. The >> extension block would indicate that the payload of the bundle >> contains one or more encapsulated bundles (and it could also provide >> their offsets). The payload of the bundle would contain the actual >> encapsulated bundles. (We want the encapsulated bundle(s) to be in >> the payload and not in an extension block to allow for >> fragmentation.) Some changes to the conceptual model and terminology >> now used in the Bundle Protocol (BP) would be required in order to >> be able to define encapsulation in this manner. As defined now, the >> BP requires that when a bundle reaches a bundle node that is a >> member of the bundle's destination endpoint, the bundle must be >> delivered (section 5.7 of the BP, step2). Delivery means that the >> bundles' application data unit (apdu), which consists of one or more >> encapsulated bundles (along with any offset information if more than >> one bundle has been encapsulated), would have to be presented to the >> node's application agent (section 3.1 of the BP, page 6). In the >> case of encapsulation, this application agent would in turn have to >> take each of these bundles and hand them back to the bundle protocol >> agent, in order, to each be processed as if they had just been >> received from another node (as described in section 5.6 of the BP). >> Where this doesn't exactly fit in now with the terminology and >> conceptual model used in the BP is that the application agent, to >> which the apdu is presented as part of the delivery process, >> consists of two elements: an administrative element, and an >> application-specific element. Neither of these two elements, as >> currently defined in the BP, seems capable of handling the apdu of >> encapsulated bundles as desired. >> a. The application-specific element is unsuitable because the >> only interface between the BPA and the application-specific element >> of the application agent is the BP service interface (BP, page 6); >> however, submitting a bundle to the BPA to be processed as if it has >> just be received from another node is not one of the services listed >> as being offered as part of this interface (see section 3.3 of the >> BP). >> b. The administrative element is unsuitable because according >> to the BP, the administrative element of an application agent >> constructs and requests transmission of administrative records and >> accepts delivery of and processes custody signals; it doesn't accept >> delivery of arbitrary apdus. (This is why we originally defined >> administrative records to be the mechanism for encapsulating bundles- >> so the administrative records could be delivered to the >> administrative element of the application agent and dealt with by >> them.) Something would have to be changed in the terminology and >> conceptual model of the BP as currently written to enable the >> encapsulating bundle to be delivered to an entity that can then >> extract the one or more encapsulated bundles and provide these back >> to the BPA to be processed as if they had just been received from >> another node. >> >> Right now I think I prefer option 2. I would like to understand how >> much opposition there is to this option (if any) and I welcome any >> other comments/ideas folks might have. >> >> If you've read this far, thanks. If you respond, even more thanks. >> >> -susan >> ***************************************************************** >> Susan Symington >> The MITRE Corporation >> susan@mitre.org >> 703-983-7209 (voice) >> 703-983-7142 (fax) >> ****************************************************************** >> > > >_______________________________________________ >dtn-interest mailing list >dtn-interest@maillists.intel-research.net >http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from mail.jpl.nasa.gov (sentrion2.jpl.nasa.gov [128.149.139.106]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9N0m9rh030281 for ; Wed, 22 Oct 2008 17:48:09 -0700 Received: from xmta2.jpl.nasa.gov (xmta2.jpl.nasa.gov [137.78.160.56]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m9N0eWI3032049 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Thu, 23 Oct 2008 00:40:32 GMT Received: from [127.0.0.1] (dhcp-79-22-229.jpl.nasa.gov [137.79.22.229]) by xmta2.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m9N0eUM9003296 for ; Wed, 22 Oct 2008 17:40:30 -0700 Message-ID: <48FFC7FE.6090409@jpl.nasa.gov> Date: Wed, 22 Oct 2008 17:40:30 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: dtn-interest@mailman.dtnrg.org References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <48FE3928.1040509@cs.tcd.ie> In-Reply-To: <48FE3928.1040509@cs.tcd.ie> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Source-IP: dhcp-79-22-229.jpl.nasa.gov [137.79.22.229] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 00:48:09 -0000 Stephen Farrell wrote: > Hi Susan, > > (How come you get to explain all the hard-to-explain things? ;-) > > I think I'd rather explore option 3. And isn't the interface > spec part of rfc 5050 optional or am I mis-remembering? If > its optional, then non-conformance with an optional API > doesn't seem to be a big deal - a different API for tunnel > endpoints would seem reasonable anyway. (Though I don't > care very much if we define one or not.) > Stephen, no worries: section 3.3 isn't an interface spec, it isn't an API, and it's not normative. It's just a list of "expected" services -- no MUSTs, no SHALLs. > I can imagine a bunch of wrinkles if custody can be turned > on for things like custody acks, so I'd rather not go down > the road of your option 2. > > I guess I'd agree that the current situation isn't very good > if bundles can't be taken into custody whilst inside tunnels. > So I suppose that means I don't like option 1 either. > I agree on both counts. Scott Received: from mail.jpl.nasa.gov (sentrion2.jpl.nasa.gov [128.149.139.106]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9N0hYX0030004 for ; Wed, 22 Oct 2008 17:43:34 -0700 Received: from xmta2.jpl.nasa.gov (xmta2.jpl.nasa.gov [137.78.160.56]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m9N0Zuxl029214 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Thu, 23 Oct 2008 00:35:57 GMT Received: from [127.0.0.1] (dhcp-79-22-229.jpl.nasa.gov [137.79.22.229]) by xmta2.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m9N0ZsRR002018 for ; Wed, 22 Oct 2008 17:35:55 -0700 Message-ID: <48FFC6E9.3070507@jpl.nasa.gov> Date: Wed, 22 Oct 2008 17:35:53 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: dtn-interest@mailman.dtnrg.org References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> In-Reply-To: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> Content-Type: multipart/alternative; boundary="------------050009020905040202090806" X-Source-IP: dhcp-79-22-229.jpl.nasa.gov [137.79.22.229] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Oct 2008 00:43:35 -0000 This is a multi-part message in MIME format. --------------050009020905040202090806 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Symington, Susan F. wrote: > > All, > > > > Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) > Encapsulation. There are several options for how to address this > issue, and I would like to get a feel for the DTN community's preferences. > > > > First of all, why do we want an encapsulation capability? Here is an > example of when BiB Encapsulation is handy: suppose a DTN cache has > some bundles stored on it. One of the bundles has a multicast address > as its destination EID and this bundle is integrity-protected using a > PIB. A new member joins the multicast group. We would like to be able > to send this new member the bundle. If we simple send out the bundle > as it is found in the cache, it is going to go to all group members. > If we change the destination EID of this bundle, it can be sent to > only the new member (as desired), but the bundles integrity check will > fail. Instead, we'd like to be able to encapsulate this bundle so the > encapsulating bundle can be addressed directly to the new member only. > > > > Secondly, what is the problem that Peter has pointed out with the way > BiB encapsulation is now defined in > draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with > using an administrative record as the mechanism to encapsulate > bundles. According to the Bundle Protocol, if a bundle is carrying an > administrative record, the bundle cannot have its custody transfer > requested bit set. This means that if the original bundle that is sent > has its custody transfer bit set and then this bundle is encapsulated > (by being placed in an administrative record that is carried by an > encapsulating bundle), no node can take custody of the encapsulating > bundle as it travels through the network. Only after the original > bundle is de-encapsulated can a node take custody of the original > de-encapsulated bundle. The whole time the bundle is in the > encapsulation "tunnel", the encapsulating bundle cannot be taken > custody of. In terms of the example use of BiB encapsulation given > above, there would be no way to take a bundle from a DTN cache, > encapsulate it in another bundle, and send this new bundle to a newly > joining group member custodially. > > > > There seem to be three options for addressing this: > > 1. Do nothing. Leave the BiB Encapsulation I-D as written and > live with the fact that encapsulating bundles cannot be sent custodially. > > 2. Change the rule in section 4.2 (page 15) of the Bundle > Protocol Specification (RFC 5050) to enable bundles whose application > data unit is an administrative record of type BiB Encapsulation to > have a custody transfer requested flag of 1. > > 3. Rewrite the BiB Encapsulation I-D to perform encapsulation > using an extension block instead of an administrative record. The > extension block would indicate that the payload of the bundle contains > one or more encapsulated bundles (and it could also provide their > offsets). The payload of the bundle would contain the actual > encapsulated bundles. (We want the encapsulated bundle(s) to be in the > payload and not in an extension block to allow for fragmentation.) > Some changes to the conceptual model and terminology now used in the > Bundle Protocol (BP) would be required in order to be able to define > encapsulation in this manner. As defined now, the BP requires that > when a bundle reaches a bundle node that is a member of the bundle's > destination endpoint, the bundle must be delivered (section 5.7 of the > BP, step2). Delivery means that the bundles' application data unit > (apdu), which consists of one or more encapsulated bundles (along with > any offset information if more than one bundle has been encapsulated), > would have to be presented to the node's application agent (section > 3.1 of the BP, page 6). In the case of encapsulation, this application > agent would in turn have to take each of these bundles and hand them > back to the bundle protocol agent, in order, to each be processed as > if they had just been received from another node (as described in > section 5.6 of the BP). Where this doesn't exactly fit in now with the > terminology and conceptual model used in the BP is that the > application agent, to which the apdu is presented as part of the > delivery process, consists of two elements: an administrative > element, and an application-specific element. Neither of these two > elements, as currently defined in the BP, seems capable of handling > the apdu of encapsulated bundles as desired. > > a. The application-specific element is unsuitable because the > only interface between the BPA and the application-specific element of > the application agent is the BP service interface (BP, page 6); > however, submitting a bundle to the BPA to be processed as if it has > just be received from another node is not one of the services listed > as being offered as part of this interface (see section 3.3 of the BP). > I don't see any obstacle here, Susan. "Delivering a received bundle" is one of the expected services. What the application-specific element of the application agent does with a delivered bundle is wholly an implementation matter. I can easily imagine, for instance, an endpoint ID convention that enables the destination endpoint to be specified somehow as "BiB handler". When the bundle is delivered to that endpoint, the application-specific element of the application agent deals with it by processing it as if it had been delivered by another node. Speaking just for myself, I also don't yet see this capability as being especially useful. I think we tend to do too much within "bundling" already and would be better served by leaving some capabilities to other, well, layers. But if we really want to do this, I think some sort of extension block scheme would be the cleaner approach. Scott > > b. The administrative element is unsuitable because according to > the BP, the administrative element of an application agent constructs > and requests transmission of administrative records and accepts > delivery of and processes custody signals; it doesn't accept delivery > of arbitrary apdus. (This is why we originally defined administrative > records to be the mechanism for encapsulating bundles---so the > administrative records could be delivered to the administrative > element of the application agent and dealt with by them.) Something > would have to be changed in the terminology and conceptual model of > the BP as currently written to enable the encapsulating bundle to be > delivered to an entity that can then extract the one or more > encapsulated bundles and provide these back to the BPA to be processed > as if they had just been received from another node. > --------------050009020905040202090806 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Symington, Susan F. wrote:

All,

 

Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) Encapsulation. There are several options for how to address this issue, and I would like to get a feel for the DTN community’s preferences.

 

First of all, why do we want an encapsulation capability? Here is an example of when BiB Encapsulation is handy: suppose a DTN cache has some bundles stored on it. One of the bundles has a multicast address as its destination EID and this bundle is integrity-protected using a PIB. A new member joins the multicast group. We would like to be able to send this new member the bundle. If we simple send out the bundle as it is found in the cache, it is going to go to all group members. If we change the destination EID of this bundle, it can be sent to only the new member (as desired), but the bundles integrity check will fail. Instead, we’d like to be able to encapsulate this bundle so the encapsulating bundle can be addressed directly to the new member only.

 

Secondly, what is the problem that Peter has pointed out with the way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with using  an administrative record as the mechanism to encapsulate bundles.  According to the Bundle Protocol, if a bundle is carrying an administrative record, the bundle cannot have its custody transfer requested bit set. This means that if the original bundle that is sent has its custody transfer bit set and then this bundle is encapsulated (by being placed in an administrative record that is carried by an encapsulating bundle), no node can take custody of the encapsulating bundle as it travels through the network. Only after the original bundle is de-encapsulated can a node take custody of the original de-encapsulated bundle.  The whole time the bundle is in the encapsulation “tunnel”, the encapsulating bundle cannot be taken custody of.  In terms of the example use of BiB encapsulation given above, there would be no way to take a bundle from a DTN cache, encapsulate it in another bundle, and send this new bundle to a newly joining group member custodially.

 

There seem to be three options for addressing this:

1.       Do nothing. Leave the BiB Encapsulation I-D as written and live with the fact that encapsulating bundles cannot be sent custodially.

2.       Change the rule in section 4.2 (page 15) of the Bundle Protocol Specification (RFC 5050) to enable bundles whose application data unit is an administrative record of type BiB Encapsulation to have a custody transfer requested flag of 1.

3.      Rewrite the BiB Encapsulation I-D to perform encapsulation using an extension block instead of an administrative record. The extension block would indicate that the payload of the bundle contains one or more encapsulated bundles (and it could also provide their offsets). The payload of the bundle would contain the actual encapsulated bundles. (We want the encapsulated bundle(s) to be in the payload and not in an extension block to allow for fragmentation.) Some changes to the conceptual model and terminology now used in the Bundle Protocol (BP) would be required in order to be able to define encapsulation in this manner. As defined now, the BP requires that when a bundle reaches a bundle node that is a member of the bundle’s destination endpoint, the bundle must be delivered (section 5.7 of the BP, step2). Delivery means that the bundles’ application data unit (apdu), which consists of one or more encapsulated bundles (along with any offset information if more than one bundle has been encapsulated), would have to be presented to the node’s application agent (section 3.1 of the BP, page 6). In the case of encapsulation, this application agent would in turn have to take each of these bundles and hand them back to the bundle protocol agent, in order, to each be processed as if they had just been received from another node (as described in section 5.6 of the BP). Where this doesn’t exactly fit in now with the terminology and conceptual model used in the BP is that the application agent, to which the apdu is presented as part of the delivery process,  consists of two elements: an administrative element, and an application-specific element. Neither of these two elements, as currently defined in the BP, seems capable of handling the apdu of encapsulated bundles as desired.

a.       The application-specific element is unsuitable because the only interface between the BPA and the application-specific element of the application agent is the BP service interface (BP, page 6); however, submitting a bundle to the BPA to be processed as if it has just be received from another node is not one of the services listed as being offered as part of this interface (see section 3.3 of the BP).

I don't see any obstacle here, Susan.  "Delivering a received bundle" is one of the expected services.  What the application-specific element of the application agent does with a delivered bundle is wholly an implementation matter.  I can easily imagine, for instance, an endpoint ID convention that enables the destination endpoint to be specified somehow as "BiB handler".  When the bundle is delivered to that endpoint, the application-specific element of the application agent deals with it by processing it as if it had been delivered by another node.

Speaking just for myself, I also don't yet see this capability as being especially useful.  I think we tend to do too much within "bundling" already and would be better served by leaving some capabilities to other, well, layers.  But if we really want to do this, I think some sort of extension block scheme would be the cleaner approach.

Scott

b.      The administrative element is unsuitable because according to the BP, the administrative element of an application agent  constructs and requests transmission of administrative records and accepts delivery of and processes custody signals; it doesn’t accept delivery of arbitrary apdus. (This is why we originally defined administrative records to be the mechanism for encapsulating bundles—so the administrative records could be delivered to the administrative element of the application agent and dealt with by them.) Something would have to be changed in the terminology and conceptual model of the BP as currently written to enable the encapsulating bundle to be delivered to an entity that can then extract the one or more encapsulated bundles and provide these back to the BPA to be processed as if they had just been received from another node.

--------------050009020905040202090806-- Received: from alpha.xerox.com (alpha.Xerox.COM [13.1.64.93]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9MMPeYa023738 for ; Wed, 22 Oct 2008 15:25:40 -0700 Received: from manza-wlan.parc.xerox.com ([13.1.110.79]) by alpha.xerox.com with SMTP id <387499(1)>; Wed, 22 Oct 2008 15:17:43 PDT Message-Id: <711FB52C-F272-4A12-B041-51A2E5920283@parc.com> From: Ignacio Solis To: dtn-interest@mailman.dtnrg.org In-Reply-To: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> Content-Type: text/plain; charset=WINDOWS-1252; format=flowed; delsp=yes Mime-Version: 1.0 (Apple Message framework v929.2) Date: Wed, 22 Oct 2008 15:17:43 PDT References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> X-Mailer: Apple Mail (2.929.2) Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9MMPeYa023738 Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 22 Oct 2008 22:25:40 -0000 Hi all. I just want to make a meta comment. As a disclaimer, I feel biased towards content-centricity. It seems to me that what we're trying to solve with the BiB is an inherent flaw in the design of DTN. Basically, DTN ties down the way we transport the data with the data/meta information. Now we're having problems because due to "integrity-protection" we can't transfer the bundle the way we need to. To solve this problem, we are designing a bundle protocol to move bundles. This might be why I'm trying to design our DTN content approach as, basically, an overlay over DTN. DTN is used as a way to move the content around, but the content is by nature, self-contained. In this instance, we're trying to treat the bundle as self-contained, but still want it to be flexible enough to be moved around, and for this we're designing a new protocol. If this discussion (I don't mean my ideas, I mean the main thread) leads to a good BiB protocol, wouldn't we gravitate towards using the BiB protocol more than the normal Bundle protocol? After all, it will be more "flexible". I understand that a lot of work has been done on DTN, and I do realize I might be speaking about impractical things, I just wanted to voice my ideas publicly. Don't take me too seriously, Nacho On Oct 21, 2008, at 12:37 PM, Symington, Susan F. wrote: > Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle > (BiB) Encapsulation. There are several options for how to address > this issue, and I would like to get a feel for the DTN community’s > preferences. > > First of all, why do we want an encapsulation capability? Here is an > example of when BiB Encapsulation is handy: suppose a DTN cache has > some bundles stored on it. One of the bundles has a multicast > address as its destination EID and this bundle is integrity- > protected using a PIB. A new member joins the multicast group. We > would like to be able to send this new member the bundle. If we > simple send out the bundle as it is found in the cache, it is going > to go to all group members. If we change the destination EID of this > bundle, it can be sent to only the new member (as desired), but the > bundles integrity check will fail. Instead, we’d like to be able to > encapsulate this bundle so the encapsulating bundle can be addressed > directly to the new member only. > > Secondly, what is the problem that Peter has pointed out with the > way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle- > encapsulation-03? The problem has to do with using an > administrative record as the mechanism to encapsulate bundles. > According to the Bundle Protocol, if a bundle is carrying an > administrative record, the bundle cannot have its custody transfer > requested bit set. This means that if the original bundle that is > sent has its custody transfer bit set and then this bundle is > encapsulated (by being placed in an administrative record that is > carried by an encapsulating bundle), no node can take custody of the > encapsulating bundle as it travels through the network. Only after > the original bundle is de-encapsulated can a node take custody of > the original de-encapsulated bundle. The whole time the bundle is > in the encapsulation “tunnel”, the encapsulating bundle cannot be > taken custody of. In terms of the example use of BiB encapsulation > given above, there would be no way to take a bundle from a DTN > cache, encapsulate it in another bundle, and send this new bundle to > a newly joining group member custodially. > > There seem to be three options for addressing this: > 1. Do nothing. Leave the BiB Encapsulation I-D as written and > live with the fact that encapsulating bundles cannot be sent > custodially. > 2. Change the rule in section 4.2 (page 15) of the Bundle > Protocol Specification (RFC 5050) to enable bundles whose > application data unit is an administrative record of type BiB > Encapsulation to have a custody transfer requested flag of 1. > 3. Rewrite the BiB Encapsulation I-D to perform encapsulation > using an extension block instead of an administrative record. The > extension block would indicate that the payload of the bundle > contains one or more encapsulated bundles (and it could also provide > their offsets). The payload of the bundle would contain the actual > encapsulated bundles. (We want the encapsulated bundle(s) to be in > the payload and not in an extension block to allow for > fragmentation.) Some changes to the conceptual model and terminology > now used in the Bundle Protocol (BP) would be required in order to > be able to define encapsulation in this manner. As defined now, the > BP requires that when a bundle reaches a bundle node that is a > member of the bundle’s destination endpoint, the bundle must be > delivered (section 5.7 of the BP, step2). Delivery means that the > bundles’ application data unit (apdu), which consists of one or more > encapsulated bundles (along with any offset information if more than > one bundle has been encapsulated), would have to be presented to the > node’s application agent (section 3.1 of the BP, page 6). In the > case of encapsulation, this application agent would in turn have to > take each of these bundles and hand them back to the bundle protocol > agent, in order, to each be processed as if they had just been > received from another node (as described in section 5.6 of the BP). > Where this doesn’t exactly fit in now with the terminology and > conceptual model used in the BP is that the application agent, to > which the apdu is presented as part of the delivery process, > consists of two elements: an administrative element, and an > application-specific element. Neither of these two elements, as > currently defined in the BP, seems capable of handling the apdu of > encapsulated bundles as desired. > a. The application-specific element is unsuitable because the > only interface between the BPA and the application-specific element > of the application agent is the BP service interface (BP, page 6); > however, submitting a bundle to the BPA to be processed as if it has > just be received from another node is not one of the services listed > as being offered as part of this interface (see section 3.3 of the > BP). > b. The administrative element is unsuitable because according > to the BP, the administrative element of an application agent > constructs and requests transmission of administrative records and > accepts delivery of and processes custody signals; it doesn’t accept > delivery of arbitrary apdus. (This is why we originally defined > administrative records to be the mechanism for encapsulating bundles— > so the administrative records could be delivered to the > administrative element of the application agent and dealt with by > them.) Something would have to be changed in the terminology and > conceptual model of the BP as currently written to enable the > encapsulating bundle to be delivered to an entity that can then > extract the one or more encapsulated bundles and provide these back > to the BPA to be processed as if they had just been received from > another node. > > Right now I think I prefer option 2. I would like to understand how > much opposition there is to this option (if any) and I welcome any > other comments/ideas folks might have. > > If you’ve read this far, thanks. If you respond, even more thanks. > > -susan > ***************************************************************** > Susan Symington > The MITRE Corporation > susan@mitre.org > 703-983-7209 (voice) > 703-983-7142 (fax) > ****************************************************************** > Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9MIGRgV012447 for ; Wed, 22 Oct 2008 11:16:27 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9MI8wlf004433 for ; Wed, 22 Oct 2008 14:08:58 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9MI8wFv004410; Wed, 22 Oct 2008 14:08:58 -0400 Received: from IMCSRV1.MITRE.ORG ([129.83.20.158]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Wed, 22 Oct 2008 14:08:57 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Date: Wed, 22 Oct 2008 14:08:55 -0400 Message-ID: In-Reply-To: <48FE3928.1040509@cs.tcd.ie> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: AckzzndNGMN04b8sRGCbISML4+WhEQAiErIg References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> <48FE3928.1040509@cs.tcd.ie> From: "Scott, Keith L." To: "Stephen Farrell" , "Symington, Susan F." X-OriginalArrivalTime: 22 Oct 2008 18:08:57.0850 (UTC) FILETIME=[40B7B5A0:01C93471] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by maillists.intel-research.net id m9MIGRgV012447 Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 22 Oct 2008 18:16:28 -0000 Stephen, I don't think option 2 is as bad as you fear. Allowing custody to be set ONLY on admin records that contain encapsulated bundles would NOT (I think, and if I'm wrong then this whole line of argument goes away) allow the custody bit to be set on other admin records such as custody ACKs. There would be a weirdness if you encapsulated multiple bundles into one encapsulating bundle and the inner bundles were a mix of custodially-marked and non-custodially-marked bundles, but policy about what types of bundles can be mixed in an encapsulation bundle could address this. This approach would mean that bundle routers could not reject bundles solely on the combination of (Custody, Administrative) without also consulting the administrative record type. In any case, I also think there are cases where not allowing custody of encapsulated bundles (option 1) would result in poor performance. Just because the 'raw bundle interface' (that would be used by an application agent to 're-inject' bundles for forwarding) isn't part of section 3.3 of RFC5050 doesn't mean that it's not something that could be implemented. --keith -----Original Message----- From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Stephen Farrell Sent: Tuesday, October 21, 2008 4:19 PM To: Symington, Susan F. Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Hi Susan, (How come you get to explain all the hard-to-explain things? ;-) I think I'd rather explore option 3. And isn't the interface spec part of rfc 5050 optional or am I mis-remembering? If its optional, then non-conformance with an optional API doesn't seem to be a big deal - a different API for tunnel endpoints would seem reasonable anyway. (Though I don't care very much if we define one or not.) I can imagine a bunch of wrinkles if custody can be turned on for things like custody acks, so I'd rather not go down the road of your option 2. I guess I'd agree that the current situation isn't very good if bundles can't be taken into custody whilst inside tunnels. So I suppose that means I don't like option 1 either. S. Symington, Susan F. wrote: > All, > > > > Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) > Encapsulation. There are several options for how to address this issue, > and I would like to get a feel for the DTN community’s preferences. > > > > First of all, why do we want an encapsulation capability? Here is an > example of when BiB Encapsulation is handy: suppose a DTN cache has some > bundles stored on it. One of the bundles has a multicast address as its > destination EID and this bundle is integrity-protected using a PIB. A > new member joins the multicast group. We would like to be able to send > this new member the bundle. If we simple send out the bundle as it is > found in the cache, it is going to go to all group members. If we change > the destination EID of this bundle, it can be sent to only the new > member (as desired), but the bundles integrity check will fail. Instead, > we’d like to be able to encapsulate this bundle so the encapsulating > bundle can be addressed directly to the new member only. > > > > Secondly, what is the problem that Peter has pointed out with the way > BiB encapsulation is now defined in > draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with > using an administrative record as the mechanism to encapsulate bundles. > According to the Bundle Protocol, if a bundle is carrying an > administrative record, the bundle cannot have its custody transfer > requested bit set. This means that if the original bundle that is sent > has its custody transfer bit set and then this bundle is encapsulated > (by being placed in an administrative record that is carried by an > encapsulating bundle), no node can take custody of the encapsulating > bundle as it travels through the network. Only after the original bundle > is de-encapsulated can a node take custody of the original > de-encapsulated bundle. The whole time the bundle is in the > encapsulation “tunnelâ€, the encapsulating bundle cannot be taken custody > of. In terms of the example use of BiB encapsulation given above, there > would be no way to take a bundle from a DTN cache, encapsulate it in > another bundle, and send this new bundle to a newly joining group member > custodially. > > > > There seem to be three options for addressing this: > > 1. Do nothing. Leave the BiB Encapsulation I-D as written and live > with the fact that encapsulating bundles cannot be sent custodially. > > 2. Change the rule in section 4.2 (page 15) of the Bundle Protocol > Specification (RFC 5050) to enable bundles whose application data unit > is an administrative record of type BiB Encapsulation to have a custody > transfer requested flag of 1. > > 3. Rewrite the BiB Encapsulation I-D to perform encapsulation using > an extension block instead of an administrative record. The extension > block would indicate that the payload of the bundle contains one or more > encapsulated bundles (and it could also provide their offsets). The > payload of the bundle would contain the actual encapsulated bundles. (We > want the encapsulated bundle(s) to be in the payload and not in an > extension block to allow for fragmentation.) Some changes to the > conceptual model and terminology now used in the Bundle Protocol (BP) > would be required in order to be able to define encapsulation in this > manner. As defined now, the BP requires that when a bundle reaches a > bundle node that is a member of the bundle’s destination endpoint, the > bundle must be delivered (section 5.7 of the BP, step2). Delivery means > that the bundles’ application data unit (apdu), which consists of one or > more encapsulated bundles (along with any offset information if more > than one bundle has been encapsulated), would have to be presented to > the node’s application agent (section 3.1 of the BP, page 6). In the > case of encapsulation, this application agent would in turn have to take > each of these bundles and hand them back to the bundle protocol agent, > in order, to each be processed as if they had just been received from > another node (as described in section 5.6 of the BP). Where this doesn’t > exactly fit in now with the terminology and conceptual model used in the > BP is that the application agent, to which the apdu is presented as part > of the delivery process, consists of two elements: an administrative > element, and an application-specific element. Neither of these two > elements, as currently defined in the BP, seems capable of handling the > apdu of encapsulated bundles as desired. > > a. The application-specific element is unsuitable because the only > interface between the BPA and the application-specific element of the > application agent is the BP service interface (BP, page 6); however, > submitting a bundle to the BPA to be processed as if it has just be > received from another node is not one of the services listed as being > offered as part of this interface (see section 3.3 of the BP). > > b. The administrative element is unsuitable because according to > the BP, the administrative element of an application agent constructs > and requests transmission of administrative records and accepts delivery > of and processes custody signals; it doesn’t accept delivery of > arbitrary apdus. (This is why we originally defined administrative > records to be the mechanism for encapsulating bundles—so the > administrative records could be delivered to the administrative element > of the application agent and dealt with by them.) Something would have > to be changed in the terminology and conceptual model of the BP as > currently written to enable the encapsulating bundle to be delivered to > an entity that can then extract the one or more encapsulated bundles and > provide these back to the BPA to be processed as if they had just been > received from another node. > > > > Right now I think I prefer option 2. I would like to understand how much > opposition there is to this option (if any) and I welcome any other > comments/ideas folks might have. > > > > If you’ve read this far, thanks. If you respond, even more thanks. > > > > -susan > > ***************************************************************** > > Susan Symington > > The MITRE Corporation > > susan@mitre.org > > 703-983-7209 (voice) > > 703-983-7142 (fax) > > ****************************************************************** > > > ----------------------------------------------------------------------- - > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest _______________________________________________ dtn-interest mailing list dtn-interest@maillists.intel-research.net http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from relay.imagine.ie (dns1.dns.imagine.ie [87.232.1.40]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9LMlpAE023864 for ; Tue, 21 Oct 2008 15:47:51 -0700 Received: from mail1.int.imagine.ie (mail1 [87.232.1.152]) by relay.imagine.ie (Postfix) with ESMTP id 1C5762E4D96; Tue, 21 Oct 2008 21:17:39 +0100 (IST) Received: from [10.87.48.5] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail1.int.imagine.ie (8.13.4/8.13.4/Debian-3) with ESMTP id m9LKHZpj005768 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 21 Oct 2008 21:17:36 +0100 Message-ID: <48FE3928.1040509@cs.tcd.ie> Date: Tue, 21 Oct 2008 21:18:48 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: "Symington, Susan F." References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> In-Reply-To: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Bayes-Prob: 0.0001 (Score 0) X-Spam-Score: 0.00 () [Hold at 8.00] X-Canit-Stats-ID: 33431982 - 0dccfca3fe31 (trained as not-spam) X-CanItPRO-Stream: outgoing X-Scanned-By: CanIt (www . roaringpenguin . com) on 87.232.1.52 Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2008 22:47:52 -0000 Hi Susan, (How come you get to explain all the hard-to-explain things? ;-) I think I'd rather explore option 3. And isn't the interface spec part of rfc 5050 optional or am I mis-remembering? If its optional, then non-conformance with an optional API doesn't seem to be a big deal - a different API for tunnel endpoints would seem reasonable anyway. (Though I don't care very much if we define one or not.) I can imagine a bunch of wrinkles if custody can be turned on for things like custody acks, so I'd rather not go down the road of your option 2. I guess I'd agree that the current situation isn't very good if bundles can't be taken into custody whilst inside tunnels. So I suppose that means I don't like option 1 either. S. Symington, Susan F. wrote: > All, > > > > Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) > Encapsulation. There are several options for how to address this issue, > and I would like to get a feel for the DTN community’s preferences. > > > > First of all, why do we want an encapsulation capability? Here is an > example of when BiB Encapsulation is handy: suppose a DTN cache has some > bundles stored on it. One of the bundles has a multicast address as its > destination EID and this bundle is integrity-protected using a PIB. A > new member joins the multicast group. We would like to be able to send > this new member the bundle. If we simple send out the bundle as it is > found in the cache, it is going to go to all group members. If we change > the destination EID of this bundle, it can be sent to only the new > member (as desired), but the bundles integrity check will fail. Instead, > we’d like to be able to encapsulate this bundle so the encapsulating > bundle can be addressed directly to the new member only. > > > > Secondly, what is the problem that Peter has pointed out with the way > BiB encapsulation is now defined in > draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with > using an administrative record as the mechanism to encapsulate bundles. > According to the Bundle Protocol, if a bundle is carrying an > administrative record, the bundle cannot have its custody transfer > requested bit set. This means that if the original bundle that is sent > has its custody transfer bit set and then this bundle is encapsulated > (by being placed in an administrative record that is carried by an > encapsulating bundle), no node can take custody of the encapsulating > bundle as it travels through the network. Only after the original bundle > is de-encapsulated can a node take custody of the original > de-encapsulated bundle. The whole time the bundle is in the > encapsulation “tunnelâ€, the encapsulating bundle cannot be taken custody > of. In terms of the example use of BiB encapsulation given above, there > would be no way to take a bundle from a DTN cache, encapsulate it in > another bundle, and send this new bundle to a newly joining group member > custodially. > > > > There seem to be three options for addressing this: > > 1. Do nothing. Leave the BiB Encapsulation I-D as written and live > with the fact that encapsulating bundles cannot be sent custodially. > > 2. Change the rule in section 4.2 (page 15) of the Bundle Protocol > Specification (RFC 5050) to enable bundles whose application data unit > is an administrative record of type BiB Encapsulation to have a custody > transfer requested flag of 1. > > 3. Rewrite the BiB Encapsulation I-D to perform encapsulation using > an extension block instead of an administrative record. The extension > block would indicate that the payload of the bundle contains one or more > encapsulated bundles (and it could also provide their offsets). The > payload of the bundle would contain the actual encapsulated bundles. (We > want the encapsulated bundle(s) to be in the payload and not in an > extension block to allow for fragmentation.) Some changes to the > conceptual model and terminology now used in the Bundle Protocol (BP) > would be required in order to be able to define encapsulation in this > manner. As defined now, the BP requires that when a bundle reaches a > bundle node that is a member of the bundle’s destination endpoint, the > bundle must be delivered (section 5.7 of the BP, step2). Delivery means > that the bundles’ application data unit (apdu), which consists of one or > more encapsulated bundles (along with any offset information if more > than one bundle has been encapsulated), would have to be presented to > the node’s application agent (section 3.1 of the BP, page 6). In the > case of encapsulation, this application agent would in turn have to take > each of these bundles and hand them back to the bundle protocol agent, > in order, to each be processed as if they had just been received from > another node (as described in section 5.6 of the BP). Where this doesn’t > exactly fit in now with the terminology and conceptual model used in the > BP is that the application agent, to which the apdu is presented as part > of the delivery process, consists of two elements: an administrative > element, and an application-specific element. Neither of these two > elements, as currently defined in the BP, seems capable of handling the > apdu of encapsulated bundles as desired. > > a. The application-specific element is unsuitable because the only > interface between the BPA and the application-specific element of the > application agent is the BP service interface (BP, page 6); however, > submitting a bundle to the BPA to be processed as if it has just be > received from another node is not one of the services listed as being > offered as part of this interface (see section 3.3 of the BP). > > b. The administrative element is unsuitable because according to > the BP, the administrative element of an application agent constructs > and requests transmission of administrative records and accepts delivery > of and processes custody signals; it doesn’t accept delivery of > arbitrary apdus. (This is why we originally defined administrative > records to be the mechanism for encapsulating bundles—so the > administrative records could be delivered to the administrative element > of the application agent and dealt with by them.) Something would have > to be changed in the terminology and conceptual model of the BP as > currently written to enable the encapsulating bundle to be delivered to > an entity that can then extract the one or more encapsulated bundles and > provide these back to the BPA to be processed as if they had just been > received from another node. > > > > Right now I think I prefer option 2. I would like to understand how much > opposition there is to this option (if any) and I welcome any other > comments/ideas folks might have. > > > > If you’ve read this far, thanks. If you respond, even more thanks. > > > > -susan > > ***************************************************************** > > Susan Symington > > The MITRE Corporation > > susan@mitre.org > > 703-983-7209 (voice) > > 703-983-7142 (fax) > > ****************************************************************** > > > ------------------------------------------------------------------------ > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from ndmsnpf03.ndc.nasa.gov (ndmsnpf03.ndc.nasa.gov [198.117.0.123]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9LKKu6E017229 for ; Tue, 21 Oct 2008 13:20:56 -0700 Received: from ndjsppt02.ndc.nasa.gov (ndjsppt02.ndc.nasa.gov [198.117.1.101]) by ndmsnpf03.ndc.nasa.gov (Postfix) with ESMTP id 3CDCD2D8018; Tue, 21 Oct 2008 15:13:51 -0500 (CDT) Received: from ndjsxgw03.ndc.nasa.gov (ndjsxgw03.ndc.nasa.gov [129.166.32.111]) by ndjsppt02.ndc.nasa.gov (8.14.1/8.14.1) with ESMTP id m9LKDrjb017518; Tue, 21 Oct 2008 15:13:53 -0500 Received: from NDJSEVS25A.ndc.nasa.gov ([129.166.32.124]) by ndjsxgw03.ndc.nasa.gov with Microsoft SMTPSVC(6.0.3790.3959); Tue, 21 Oct 2008 15:13:50 -0500 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Tue, 21 Oct 2008 15:13:49 -0500 Message-ID: In-Reply-To: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Bundle-in-Bundle Encapsulation Issue Thread-Index: AckztHNapo3jwEXnTcmzQOpAwjQQrwAA8DQg References: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> From: "Eddy, Wesley M. (GRC-RCN0)[VZ]" To: "Symington, Susan F." , X-OriginalArrivalTime: 21 Oct 2008 20:13:50.0968 (UTC) FILETIME=[888D0780:01C933B9] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9LKKu6E017229 Subject: Re: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2008 20:20:57 -0000 >-----Original Message----- >From: dtn-interest-bounces@maillists.intel-research.net >[mailto:dtn-interest-bounces@maillists.intel-research.net] On >Behalf Of Symington, Susan F. >Sent: Tuesday, October 21, 2008 3:37 PM > > ... > >There seem to be three options for addressing this: > >1. Do nothing. Leave the BiB Encapsulation I-D as >written and live with the fact that encapsulating bundles >cannot be sent custodially. > >2. Change the rule in section 4.2 (page 15) of the >Bundle Protocol Specification (RFC 5050) to enable bundles >whose application data unit is an administrative record of >type BiB Encapsulation to have a custody transfer requested flag of 1. > >3. Rewrite the BiB Encapsulation I-D to perform >encapsulation using an extension block instead of an >administrative record. ... Some >changes to the conceptual model and terminology now used in >the Bundle Protocol (BP) would be required in order to be able >to define encapsulation in this manner. Option 1 is easiest in the short-term, but does it limit performance in any scenarios that have been proposed for operational concepts? If so, then we shouldn't pick option 1, but if not, then option 1 seems fine to me. Option 2 seems like a loophole that leads to bizarre little pieces of logic in the implementation and is difficult for people to keep in their heads when analyzing a problem or maintaining and enhancing code. Option 3 might be the most correct thing to do, though it involves reworking a small amount of the RFC 5050 text. I think this is perfectly fine and the right thing to do, if it's determined that option 1 is going to limit deployment or performance in some realistic case. Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9LJiac2015578 for ; Tue, 21 Oct 2008 12:44:36 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9LJbWYO004467 for ; Tue, 21 Oct 2008 15:37:32 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9LJbWL7004453 for ; Tue, 21 Oct 2008 15:37:32 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Tue, 21 Oct 2008 15:37:29 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C933B4.73F1EB52" Date: Tue, 21 Oct 2008 15:37:27 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002F85FB3@IMCSRV4.MITRE.ORG> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Bundle-in-Bundle Encapsulation Issue Thread-Index: AckztHNapo3jwEXnTcmzQOpAwjQQrw== From: "Symington, Susan F." To: X-OriginalArrivalTime: 21 Oct 2008 19:37:29.0907 (UTC) FILETIME=[74898830:01C933B4] Subject: [dtn-interest] Bundle-in-Bundle Encapsulation Issue X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2008 19:44:37 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C933B4.73F1EB52 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable All, =20 Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) Encapsulation. There are several options for how to address this issue, and I would like to get a feel for the DTN community's preferences. =20 First of all, why do we want an encapsulation capability? Here is an example of when BiB Encapsulation is handy: suppose a DTN cache has some bundles stored on it. One of the bundles has a multicast address as its destination EID and this bundle is integrity-protected using a PIB. A new member joins the multicast group. We would like to be able to send this new member the bundle. If we simple send out the bundle as it is found in the cache, it is going to go to all group members. If we change the destination EID of this bundle, it can be sent to only the new member (as desired), but the bundles integrity check will fail. Instead, we'd like to be able to encapsulate this bundle so the encapsulating bundle can be addressed directly to the new member only.=20 =20 Secondly, what is the problem that Peter has pointed out with the way BiB encapsulation is now defined in draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with using an administrative record as the mechanism to encapsulate bundles. According to the Bundle Protocol, if a bundle is carrying an administrative record, the bundle cannot have its custody transfer requested bit set. This means that if the original bundle that is sent has its custody transfer bit set and then this bundle is encapsulated (by being placed in an administrative record that is carried by an encapsulating bundle), no node can take custody of the encapsulating bundle as it travels through the network. Only after the original bundle is de-encapsulated can a node take custody of the original de-encapsulated bundle. The whole time the bundle is in the encapsulation "tunnel", the encapsulating bundle cannot be taken custody of. In terms of the example use of BiB encapsulation given above, there would be no way to take a bundle from a DTN cache, encapsulate it in another bundle, and send this new bundle to a newly joining group member custodially.=20 =20 There seem to be three options for addressing this: 1. Do nothing. Leave the BiB Encapsulation I-D as written and live with the fact that encapsulating bundles cannot be sent custodially. 2. Change the rule in section 4.2 (page 15) of the Bundle Protocol Specification (RFC 5050) to enable bundles whose application data unit is an administrative record of type BiB Encapsulation to have a custody transfer requested flag of 1. 3. Rewrite the BiB Encapsulation I-D to perform encapsulation using an extension block instead of an administrative record. The extension block would indicate that the payload of the bundle contains one or more encapsulated bundles (and it could also provide their offsets). The payload of the bundle would contain the actual encapsulated bundles. (We want the encapsulated bundle(s) to be in the payload and not in an extension block to allow for fragmentation.) Some changes to the conceptual model and terminology now used in the Bundle Protocol (BP) would be required in order to be able to define encapsulation in this manner. As defined now, the BP requires that when a bundle reaches a bundle node that is a member of the bundle's destination endpoint, the bundle must be delivered (section 5.7 of the BP, step2). Delivery means that the bundles' application data unit (apdu), which consists of one or more encapsulated bundles (along with any offset information if more than one bundle has been encapsulated), would have to be presented to the node's application agent (section 3.1 of the BP, page 6). In the case of encapsulation, this application agent would in turn have to take each of these bundles and hand them back to the bundle protocol agent, in order, to each be processed as if they had just been received from another node (as described in section 5.6 of the BP). Where this doesn't exactly fit in now with the terminology and conceptual model used in the BP is that the application agent, to which the apdu is presented as part of the delivery process, consists of two elements: an administrative element, and an application-specific element. Neither of these two elements, as currently defined in the BP, seems capable of handling the apdu of encapsulated bundles as desired.=20 a. The application-specific element is unsuitable because the only interface between the BPA and the application-specific element of the application agent is the BP service interface (BP, page 6); however, submitting a bundle to the BPA to be processed as if it has just be received from another node is not one of the services listed as being offered as part of this interface (see section 3.3 of the BP).=20 b. The administrative element is unsuitable because according to the BP, the administrative element of an application agent constructs and requests transmission of administrative records and accepts delivery of and processes custody signals; it doesn't accept delivery of arbitrary apdus. (This is why we originally defined administrative records to be the mechanism for encapsulating bundles-so the administrative records could be delivered to the administrative element of the application agent and dealt with by them.) Something would have to be changed in the terminology and conceptual model of the BP as currently written to enable the encapsulating bundle to be delivered to an entity that can then extract the one or more encapsulated bundles and provide these back to the BPA to be processed as if they had just been received from another node.=20 =20 Right now I think I prefer option 2. I would like to understand how much opposition there is to this option (if any) and I welcome any other comments/ideas folks might have. =20 If you've read this far, thanks. If you respond, even more thanks. =20 -susan ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** ------_=_NextPart_001_01C933B4.73F1EB52 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

All,

 

Peter Lovell has pointed out an issue with DTN Bundle-in-Bundle (BiB) Encapsulation. There are several options for how = to address this issue, and I would like to get a feel for the DTN = community’s preferences.

 

First of all, why do we want an encapsulation = capability? Here is an example of when BiB Encapsulation is handy: suppose a DTN cache = has some bundles stored on it. One of the bundles has a multicast address as its destination EID and this bundle is integrity-protected using a PIB. A = new member joins the multicast group. We would like to be able to send this = new member the bundle. If we simple send out the bundle as it is found in = the cache, it is going to go to all group members. If we change the = destination EID of this bundle, it can be sent to only the new member (as desired), but = the bundles integrity check will fail. Instead, we’d like to be able = to encapsulate this bundle so the encapsulating bundle can be addressed = directly to the new member only.

 

Secondly, what is the problem that Peter has = pointed out with the way BiB encapsulation is now defined in = draft-irtf-dtnrg-bundle-encapsulation-03? The problem has to do with using  an administrative record as the mechanism to encapsulate bundles.  According to the Bundle = Protocol, if a bundle is carrying an administrative record, the bundle cannot have its = custody transfer requested bit set. This means that if the original bundle that = is sent has its custody transfer bit set and then this bundle is encapsulated = (by being placed in an administrative record that is carried by an encapsulating = bundle), no node can take custody of the encapsulating bundle as it travels = through the network. Only after the original bundle is de-encapsulated can a node = take custody of the original de-encapsulated bundle.  The whole time the = bundle is in the encapsulation “tunnel”, the encapsulating bundle = cannot be taken custody of.  In terms of the example use of BiB = encapsulation given above, there would be no way to take a bundle from a DTN cache, encapsulate it in another bundle, and send this new bundle to a newly = joining group member custodially.

 

There seem to be three options for addressing = this:

1.       Do nothing. Leave the BiB Encapsulation I-D as = written and live with the fact that encapsulating bundles cannot be sent = custodially.

2.       Change the rule in section 4.2 (page 15) of the = Bundle Protocol Specification (RFC 5050) to enable bundles whose application = data unit is an administrative record of type BiB Encapsulation to have a custody transfer requested flag of 1.

3.      Rewrite the BiB Encapsulation I-D to = perform encapsulation using an extension block instead of an administrative = record. The extension block would indicate that the payload of the bundle contains = one or more encapsulated bundles (and it could also provide their offsets). The payload of the bundle would contain the actual encapsulated bundles. (We = want the encapsulated bundle(s) to be in the payload and not in an extension = block to allow for fragmentation.) Some changes to the conceptual model and terminology now used in the Bundle Protocol (BP) would be required in = order to be able to define encapsulation in this manner. As defined now, the BP = requires that when a bundle reaches a bundle node that is a member of the = bundle’s destination endpoint, the bundle must be delivered (section 5.7 of the = BP, step2). Delivery means that the bundles’ application data unit = (apdu), which consists of one or more encapsulated bundles (along with any = offset information if more than one bundle has been encapsulated), would have to be = presented to the node’s application agent (section 3.1 of the BP, page 6). In the = case of encapsulation, this application agent would in turn have to take each of = these bundles and hand them back to the bundle protocol agent, in order, to = each be processed as if they had just been received from another node (as = described in section 5.6 of the BP). Where this doesn’t exactly fit in now with the terminology and conceptual model used in the BP is that the application = agent, to which the apdu is presented as part of the delivery process, =  consists of two elements: an administrative element, and an application-specific element. Neither of these two elements, as currently defined in the BP, = seems capable of handling the apdu of encapsulated bundles as desired.

a.       = The application-specific element is unsuitable because the only interface = between the BPA and the application-specific element of the application agent is the = BP service interface (BP, page 6); however, submitting a bundle to the BPA = to be processed as if it has just be received from another node is not one of = the services listed as being offered as part of this interface (see section = 3.3 of the BP).

b.      = The administrative element is unsuitable because according to the BP, the administrative element of an application agent  constructs and = requests transmission of administrative records and accepts delivery of and = processes custody signals; it doesn’t accept delivery of arbitrary apdus. = (This is why we originally defined administrative records to be the mechanism for encapsulating bundles—so the administrative records could be = delivered to the administrative element of the application agent and dealt with by = them.) Something would have to be changed in the terminology and conceptual model of the = BP as currently written to enable the encapsulating bundle to be delivered to = an entity that can then extract the one or more encapsulated bundles and = provide these back to the BPA to be processed as if they had just been received = from another node.

 

Right now I think I prefer option = 2. I would like to understand how much opposition there is to this option (if = any) and I welcome any other comments/ideas folks might = have.

 

If you’ve read this far, = thanks. If you respond, even more thanks.

 

-susan

***************************************= **************************

Susan Symington

The MITRE Corporation

susan@mitre.org

703-983-7209 (voice)

703-983-7142 (fax)

*************= *****************************************************

------_=_NextPart_001_01C933B4.73F1EB52-- Received: from cs.tcd.ie (relay.cs.tcd.ie [134.226.32.56]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9LFQH5m003852 for ; Tue, 21 Oct 2008 08:26:17 -0700 Received: from localhost (localhost [127.0.0.1]) by relay.cs.tcd.ie (Postfix) with ESMTP id EEB993FBC1 for ; Tue, 21 Oct 2008 16:19:17 +0100 (IST) X-Virus-Scanned: amavisd-new at cs.tcd.ie Received: from cs.tcd.ie ([127.0.0.1]) by localhost (smtp.cs.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7uFy9l6zhGWT for ; Tue, 21 Oct 2008 16:19:17 +0100 (IST) Received: from [134.226.62.18] (cswireless62-18.cs.tcd.ie [134.226.62.18]) by smtp.cs.tcd.ie (Postfix) with ESMTP id 346753FBC3 for ; Tue, 21 Oct 2008 16:19:16 +0100 (IST) Message-ID: <48FDF340.10904@cs.tcd.ie> Date: Tue, 21 Oct 2008 16:20:32 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: DTN References: <48E5ECD9.1020807@cs.tcd.ie> In-Reply-To: <48E5ECD9.1020807@cs.tcd.ie> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [dtn-interest] Possible DTNRG standalone meeting - San Francisco March 19-20 2009 X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2008 15:26:17 -0000 Hi, Based on responses received so far, it looks like we should take this opportunity to meet, so please add March 19-20 2009 to your diaries. Thanks to Google for hosting and to Adrian Hooke for organising, Regards, Stephen. PS: Current IETF schedule [1] has us meeting in MSP on Thursday Nov 20 0900-1130, but of course that can still change. [1] https://datatracker.ietf.org/meeting/73/agenda.html Stephen Farrell wrote: > Hi, > > Earlier we had some discussion about meeting frequency and > whether to have a standalone DTNRG meeting early next year. > > Thanks to Google (as prompted by Adrian Hooke from NASA) we > have an offer to host us for a 2 day slot just before the San > Francisco IETF, in Mountain View on 19-20 March. > > I realise that this'd make for a looooong trip for regular > IETFers, but OTOH, that's probably cheaper and not all of > us go to every IETF so maybe its ok. But since I'm not sure > I'd like to check. > > So, can you let Kevin and I know (offlist, any time in the > next week) if you'd plan to attend as above, or if you think > its such a terrible idea to have a meeting right before an > IETF that you're not coming but you otherwise would have come > to a standalone meeting. > > In other words just send one of the following to Kevin and I, > before the end of Oct 10: > > a) I plan to attend, or, > b) I would plan to go to a DTNRG standalone, but won't attend this > because its adjacent to the IETF meeting, or, > c) I can't make that date/location, but don't care about IETF > adjacency, or, > d) why are you bothering me with this nonsense? :-) > > I'll get back to the list then... (If there are split opinions > or something then let's discuss that then, rather than have an > abstract discussion now about whether its good, bad or indifferent > to have IRTF RGs meet just before the IETF.) > > Thanks, > Stephen. > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from mail.newbay.com (87-198-172-198.ptr.magnet.ie [87.198.172.198]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9L8u8Ca018041 for ; Tue, 21 Oct 2008 01:56:08 -0700 Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.newbay.com (Postfix) with ESMTP id 1A256100406B3; Tue, 21 Oct 2008 09:49:16 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail.newbay.com ([127.0.0.1]) by localhost (mail.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lchHsUVq8Bgj; Tue, 21 Oct 2008 09:49:15 +0100 (IST) Received: from [192.168.3.55] (unknown [192.168.3.55]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.newbay.com (Postfix) with ESMTP id A5F7D1003F4DF; Tue, 21 Oct 2008 09:49:04 +0100 (IST) Message-ID: <48FD97CC.6080701@cs.tcd.ie> Date: Tue, 21 Oct 2008 09:50:20 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: Paul Edelman References: <6c3baadf0810201928ia48ad1cx9c20d7d98aa3d303@mail.gmail.com> In-Reply-To: <6c3baadf0810201928ia48ad1cx9c20d7d98aa3d303@mail.gmail.com> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] Looking to build on top of DTN X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2008 08:56:09 -0000 Hi Paul, Most of that is more suited for the dtn-users list, the archive of which also probably contains some useful answers. I suggest moving the discussion there. Stephen. Paul Edelman wrote: > Hello all, > > My name is Paul Edelman. I am a masters candidate with the department > of computer science at Baylor University. We are looking at doing some > research / project work using the DTN reference implementation, > specifically building on top of DTN or even modifying DTN for the > purposes of experimentation. For some time now I have been going > through the available publications including the latest architectural > retrospective, available release documents, the DTN manual, as well as > the wiki. Despite all of that I still have a few questions. > > 1. The DTN daemon configuration file (dtnd.conf) lists support for > the following routing algorithms: static, flood, neighborhood, > linkstate, and external. What routing protocols are currently > mature in the implementation? For these protocols where might I > find specific documentation? > > 2. Does support for Prophet routing still exist? > > 3. What is the best source of information for a developer new to the > reference implementation? > > 4. In practice what is the state of the reference implementation, and > how is it currently being used? > > Really what I am looking for is how we can practically use the DTN > reference implementation, where the items listed above are our core > questions. Thank you very much for your time. > > Sincerely, > > *Paul Edelman* > Department of Computer Science > Baylor University > paul_edelman@baylor.edu > paul.edelman@gmail.com > > > ------------------------------------------------------------------------ > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.235]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9L2ZGLP000545 for ; Mon, 20 Oct 2008 19:35:17 -0700 Received: by rv-out-0506.google.com with SMTP id b25so1896404rvf.49 for ; Mon, 20 Oct 2008 19:28:32 -0700 (PDT) Received: by 10.141.83.15 with SMTP id k15mr5331498rvl.74.1224556112553; Mon, 20 Oct 2008 19:28:32 -0700 (PDT) Received: by 10.141.37.3 with HTTP; Mon, 20 Oct 2008 19:28:32 -0700 (PDT) Message-ID: <6c3baadf0810201928ia48ad1cx9c20d7d98aa3d303@mail.gmail.com> Date: Mon, 20 Oct 2008 21:28:32 -0500 From: "Paul Edelman" To: dtn-interest@mailman.dtnrg.org MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_54520_10622239.1224556112528" Subject: [dtn-interest] Looking to build on top of DTN X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Oct 2008 02:35:17 -0000 ------=_Part_54520_10622239.1224556112528 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline Hello all, My name is Paul Edelman. I am a masters candidate with the department of computer science at Baylor University. We are looking at doing some research / project work using the DTN reference implementation, specifically building on top of DTN or even modifying DTN for the purposes of experimentation. For some time now I have been going through the available publications including the latest architectural retrospective, available release documents, the DTN manual, as well as the wiki. Despite all of that I still have a few questions. 1. The DTN daemon configuration file (dtnd.conf) lists support for the following routing algorithms: static, flood, neighborhood, linkstate, and external. What routing protocols are currently mature in the implementation? For these protocols where might I find specific documentation? 2. Does support for Prophet routing still exist? 3. What is the best source of information for a developer new to the reference implementation? 4. In practice what is the state of the reference implementation, and how is it currently being used? Really what I am looking for is how we can practically use the DTN reference implementation, where the items listed above are our core questions. Thank you very much for your time. Sincerely, *Paul Edelman* Department of Computer Science Baylor University paul_edelman@baylor.edu paul.edelman@gmail.com ------=_Part_54520_10622239.1224556112528 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline
Hello all,

My name is Paul Edelman.  I am a masters candidate with the department of computer science at Baylor University.  We are looking at doing some research / project work using the DTN reference implementation, specifically building on top of DTN or even modifying DTN for the purposes of experimentation.  For some time now I have been going through the available publications including the latest architectural retrospective, available release documents, the DTN manual, as well as the wiki.  Despite all of that I still have a few questions.

  1. The DTN daemon configuration file (dtnd.conf) lists support for the following routing algorithms: static, flood, neighborhood, linkstate, and external.  What routing protocols are currently mature in the implementation?   For these protocols where might I find specific documentation?

  2. Does support for Prophet routing still exist?

  3. What is the best source of information for a developer new to the reference implementation?

  4. In practice what is the state of the reference implementation, and how is it currently being used?

Really what I am looking for is how we can practically use the DTN reference implementation, where the items listed above are our core questions.  Thank you very much for your time.

Sincerely,

Paul Edelman
Department of Computer Science
Baylor University
paul_edelman@baylor.edu
paul.edelman@gmail.com
------=_Part_54520_10622239.1224556112528-- Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9HH78kv009743 for ; Fri, 17 Oct 2008 10:07:09 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9HH1rVZ008980 for ; Fri, 17 Oct 2008 13:01:54 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9HH1rxK008959; Fri, 17 Oct 2008 13:01:53 -0400 Received: from IMCSRV6.MITRE.ORG ([129.83.20.237]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Fri, 17 Oct 2008 13:01:53 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Fri, 17 Oct 2008 13:01:51 -0400 Message-ID: <53B52415C756A84E8A169F0E3673A329018C083B@IMCSRV6.MITRE.ORG> In-Reply-To: <8C7C41A176AC0B468BEFB2EFD9BDAB990620D876@XCH-NW-5V2.nw.nos.boeing.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Oasys won't configure Thread-Index: AckqQqvrV0DPYgAIR32VrmNk0xGRjQGNuIow References: <8C7C41A176AC0B468BEFB2EFD9BDAB990620D876@XCH-NW-5V2.nw.nos.boeing.com> From: "Andresen, Jason R." To: "Duke, Martin" , X-OriginalArrivalTime: 17 Oct 2008 17:01:53.0443 (UTC) FILETIME=[0DEB2F30:01C9307A] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m9HH78kv009743 Subject: Re: [dtn-interest] Oasys won't configure X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Oct 2008 17:07:09 -0000 I had the same problem on FreeBSD. The problem is that configure is calling make instead of gmake, but it's assuming that it has GNU make as "make", not BSD Make. The good news is that those errors are harmless. If you run "gmake", you should be able to build both DTN and oasys. However, you will run into one other compile error later on. In one of the files (I forget which), there is a reference to a size_t (or something similar) without the corresponding header included. If you just try to include the header by hand, the build will blow up, but if you search and replace all of those "size_t" instances in the one file with "int", the build goes through and the bundle daemon seems to work normally. I have not been able to track down the proper fix for that yet, so there is no patch. Sorry. >-----Original Message----- >From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn- >interest-bounces@maillists.intel-research.net] On Behalf Of Duke, Martin >Sent: Thursday, October 09, 2008 3:10 PM >To: dtn-interest@mailman.dtnrg.org >Subject: [dtn-interest] Oasys won't configure > >I've downloaded dtn-2.6.0 and oasys-1.3.0 from the DTN sourceforge site. > >I unzipped them into parallel directories, with BerkeleyDB 4.7.25 >installed on my FreeBSD 7.0 system. > >I then typed >cd oasys-1.3.0 >./configure --with-dbver=4.7 > >And after a while I get this: > >"Makefile", line 209: Missing dependency operator >"Makefile", line 212: Need an operator >"Rules.make", line 124: warning: duplicate script for target "%.o" >ignored >"Rules.make", line 125: warning: duplicate script for target "%.o" >ignored >"Rules.make", line 135: warning: duplicate script for target "%.E" >ignored >"Rules.make", line 136: warning: duplicate script for target "%.E" >ignored >"Rules.make", line 148: Missing dependency operator >"Rules.make", line 150: Need an operator >"Rules.make", line 153: Missing dependency operator >"Rules.make", line 154: Missing dependency operator >"Rules.make", line 155: Need an operator >"Makefile", line 243: Missing dependency operator >"Makefile", line 247: Need an operator >"Makefile", line 274: Need an operator >"Makefile", line 275: Need an operator >"Makefile", line 276: Need an operator >"Makefile", line 277: Need an operator >"Makefile", line 472: Need an operator >"Makefile", line 474: Need an operator >"Makefile", line 479: Need an operator >make: fatal errors encountered -- cannot continue > >Am I using the wrong distribution? Is there a configuration flag I >should be using? > >Thanks! >Martin > >All the other output listed below (preceeding the above): > >[root@freebsd7 /home/core/dtn/oasys-1.3.0]# ./configure --with-dbver=4.7 >checking location of source directory... >"/usr/home/core/dtn/oasys-1.3.0" >checking location of build directory... "/usr/home/core/dtn/oasys-1.3.0" >checking for a C compiler (trying gcc gcc-4.1 gcc-4.0 gcc-3.4 >gcc-3.3)... >checking for gcc... gcc >checking for C compiler default output file name... a.out >checking whether the C compiler works... yes >checking whether we are cross compiling... no >checking for suffix of executables... >checking for suffix of object files... o >checking whether we are using the GNU C compiler... yes >checking whether gcc accepts -g... yes >checking for gcc option to accept ISO C89... none needed >checking for a C++ compiler (trying g++ g++-4.0 g++-4.0 g++-3.4 >g++-3.3)... >checking for g++... g++ >checking whether we are using the GNU C++ compiler... yes >checking whether g++ accepts -g... yes >checking whether the C++ compiler works... yes >checking how to run the C preprocessor... gcc -E >checking for the version of the GNU C compiler... 4.2.1 >checking for the version of the GNU C++ compiler... 4.2.1 >checking for ar... ar >checking for ranlib... ranlib >checking whether to compile with debugging... yes >checking whether to compile with memory debugging... no >checking whether to compile with lock debugging (default yes)... yes >checking whether to compile with optimization... no >checking whether to compile with profiling... no >checking whether to link statically... no >checking whether to link using static external libraries... no >checking whether to try to build shared libraries... yes >checking whether the compiler supports -fPIC... yes >checking whether the compiler can link a dynamic library with -shared... >yes >checking extension for dynamic libraries... so >checking if the compiler supports -Wl,--rpath=.... yes >checking for grep that handles long lines and -e... /usr/bin/grep >checking for egrep... /usr/bin/grep -E >checking for sys/types.h... yes >checking for sys/stat.h... yes >checking for stdlib.h... yes >checking for string.h... yes >checking for memory.h... yes >checking for strings.h... yes >checking for inttypes.h... yes >checking for stdint.h... yes >checking for unistd.h... yes >checking for gawk... no >checking for mawk... no >checking for nawk... nawk >checking for a BSD-compatible install... /usr/bin/install -c >checking whether make sets $(MAKE)... yes >checking for ranlib... (cached) ranlib >checking for library containing pthread_create... -lpthread >checking for pthread_yield... yes >checking for library containing pthread_setspecific... none required >checking for library containing socket... none required >checking for library containing gethostbyname... none required >checking for library containing xdr_int... none required >checking for ANSI C header files... yes >checking err.h usability... yes >checking err.h presence... yes >checking for err.h... yes >checking execinfo.h usability... no >checking execinfo.h presence... no >checking for execinfo.h... no >checking for stdint.h... (cached) yes >checking for string.h... (cached) yes >checking synch.h usability... no >checking synch.h presence... no >checking for synch.h... no >checking sys/cdefs.h usability... yes >checking sys/cdefs.h presence... yes >checking for sys/cdefs.h... yes >checking for sys/types.h... (cached) yes >checking for an ANSI C-conforming const... yes >checking for inline... inline >checking for working volatile... yes >checking for mode_t... yes >checking value for _FILE_OFFSET_BITS preprocessor symbol... 64 >checking for off_t... yes >checking size of off_t... 8 >checking return type of signal handlers... void >checking for size_t... yes >checking for ptrdiff_t... yes >checking for uint32_t... yes >checking for u_int32_t... yes >checking for fdatasync... no >checking for getaddrinfo... yes >checking for gethostbyname... yes >checking for gethostbyname_r... yes >checking for getopt_long... yes >checking for inet_aton... yes >checking for inet_pton... yes >checking for pthread_yield... (cached) yes >checking for sched_yield... yes >checking whether to compile with non-atomic "atomic" routines... no >checking whether to compile with assembly-based atomic functions... yes >checking for --with-python... no >checking for python... /usr/local/bin/python >checking whether python distutils can build an extension module... yes >checking for library containing pow... -lm >checking for library containing dlopen... none required > >configure: checking for tcl installation (version 8.4) >checking for tcl.h (version 8.4) in /usr/include... no >checking for tcl.h (version 8.4) in /usr/local/include... no >checking for tcl.h (version 8.4) in /usr/include/tcl8.4... no >checking for tcl.h (version 8.4) in /usr/local/include/tcl8.4... yes >checking for tcl library in /usr/lib: -ltcl8.4 ... no >checking for tcl library in /usr/lib: -ltcl84 ... no >checking for tcl library in /usr/lib: -ltcl ... no >checking for tcl library in /usr/local/lib: -ltcl8.4 ... no >checking for tcl library in /usr/local/lib: -ltcl84 ... yes >checking whether to compile with google profiling... no >checking whether bluetooth support should be enabled... try >checking for library containing baswap... no >checking bluetooth/bluetooth.h usability... no >checking bluetooth/bluetooth.h presence... no >checking for bluetooth/bluetooth.h... no >checking whether bluetooth support was found... no >checking whether expat support should be enabled... try >checking for expat in /usr/include, /usr/lib, -lexpat... no >checking for expat in /usr/include, /usr/local/lib, -lexpat... no >checking for expat in /usr/local/include, /usr/lib, -lexpat... yes >checking whether libexpat was found... yes >checking whether xerces-c support should be enabled... try >checking whether xerces-c (>= v2.6.0) was found... no >checking whether tclreadline support should be enabled... try >checking for library containing readline... -lreadline >checking whether readline is GNU readline or BSD editline... editline >checking whether tclreadline support was found... yes >checking whether zlib support should be enabled... try >checking for library containing compress... -lz >checking for library containing compressBound... none required >checking whether zlib support was found... yes >checking for xsd... xsd >checking for Berkeley DB header (version 4.7) in /usr/include... no >checking for Berkeley DB header (version 4.7) in /usr/local/include... >no >checking for Berkeley DB header (version 4.7) in >/usr/local/include/db4.7... no >checking for Berkeley DB header (version 4.7) in >/usr/local/include/db4... no >checking for Berkeley DB header (version 4.7) in >/usr/local/include/db47... no >checking for Berkeley DB header (version 4.7) in >/usr/local/BerkeleyDB.4.7/include... yes >checking for Berkeley DB library in /usr/local/BerkeleyDB.4.7/lib, >-ldb-4.7... yes >configure: creating ./config.status >config.status: creating Rules.make >config.status: creating System.make >config.status: creating oasys-config.h >config.status: oasys-config.h is unchanged > >_______________________________________________ >dtn-interest mailing list >dtn-interest@maillists.intel-research.net >http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from indomitable.uta.edu (indomitable.uta.edu [129.107.56.238]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9CNuNIh022698 for ; Sun, 12 Oct 2008 16:56:23 -0700 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AsYGAIIq8kiBazg8/2dsb2JhbACCRC+PQZ9ZBgKEfD1mAQh9 X-IronPort-AV: E=Sophos;i="4.33,398,1220227200"; d="scan'208,217";a="112756453" Received: from wolf3.uta.edu (HELO MAILST1.uta.edu) ([129.107.56.60]) by mail.uta.edu with ESMTP; 12 Oct 2008 23:53:14 +0000 x-mimeole: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C92CC5.B039B5FA" Date: Sun, 12 Oct 2008 18:53:13 -0500 Message-ID: <5FC9D45135986C4398EFDB937D693394019A0163@MAILST1.uta.edu> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: IQ2S'09: Call for papers - DEADLINE HAS BEEN EXTENDED: October 31 Thread-Index: Acj1bf+J6Fn6NoDHQueuiSFQVV0eswAAlQS8AAvX59gADTSFugABI5sjAADNfikAAFgktQusOK3hAABoTPMAL2BjkAAAQYZWAADwNnAAAlIS/QAADE1vAABfE78AAJE1YwAARAEKAAAv+rsAAD9YUAAAB62MAdiTzbs= References: <162B8AFBFBBB2148A9A1B8F9C5753428FE5412@mailbe01.teak.local.net> <162B8AFBFBBB2148A9A1B8F9C575342803264283@mailbe01.teak.local.net> <358486CF38F8EA409E72DAB944FBC60602DEA60F@MAILFS2.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC5@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC6@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC7@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC8@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A00F0@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A00F2@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0108@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A010A@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0115@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A012E@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A012F@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0131@MAILST1.uta.edu> <5FC9D45135986C4398EFDB93 7D693394019A0133@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0134@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0135@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0136@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0137@MAILST1.uta.edu> From: "Ammari, Habib M" To: Subject: [dtn-interest] IQ2S'09: Call for papers - DEADLINE HAS BEEN EXTENDED: October 31 X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 12 Oct 2008 23:56:24 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C92CC5.B039B5FA Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Dear Colleagues, We apologize if you receive multiple copies. Please find below the Call for papers for IQ2S 2009, The First = International Workshop on Information Quality and Quality of Service for Pervasive Computing, = which will be held in conjunction with IEEE PerCom 2009, Galveston, Texas, March 9-13, = 2009. [+++++++ DEADLINE HAS BEEN EXTENDED TO OCTOBER 31! +++++++] We would appreciate it very much if you could disseminate this CFP to = your colleagues and students! Best Regards, Wendong Xiao, Institute for Infocomm Research, Singapore Habib M. Ammari, the University of Texas at Arlington, USA Program Co-Chairs -------------------------------------------------------------------------= ----------------------------------------------------------- CALL FOR PAPERS =20 The First International Workshop on Information Quality and Quality of = Service for Pervasive Computing (IQ2S 2009) Website: http://iq2s2009.i2r.a-star.edu.sg = = > > In Conjunction with IEEE PerCom 2009 (http://www.percom.org = > > ) Galveston, Texas, March 9-13, 2009 =20 Quality of service (QoS) has been studied in various building = blocks in pervasive computing, e.g., different QoS mechanisms are = presented for wireless or wired networks, with QoS metrics being = described in terms of delay, bandwidth, and/or data loss etc. The = emerging pervasive computing is application-driven and mission-critical, = therefore the information quality (IQ), such as the accuracy of target = tracking or event detection, is also critical for the end users, service = providers and the system designers. IQ and QoS provisioning for = pervasive computing is challenging and difficult due to the = resource-constrained, dynamic and distributed nature of the system, the = weakness under security attacking, and the lack of a holistic design = approach which takes into account the different types of resources and = their inter-dependencies. =20 The objective of this workshop is to provide a forum to exchange = ideas, present results, share experience, and enhance collaborations = among researchers, professionals, and application developers in various = aspects of IQ and QoS for pervasive computing. Topics of interest = include but are not limited to: * System architecture for IQ and QoS provisioning * IQ-oriented signal & information processing (e.g., = source coding and data compression) * QoS for target/event detection, localization, = tracking and classification * QoS for wireless ad hoc and sensor networks = (including coverage and connectivity) * QoS for task mapping and scheduling * Cross-layer design for coordinated QoS (including = IQ-QoS integration) * Adaptative IQ and QoS under dynamic environments * Trust, security and privacy issues in IQ and QoS * Development environments and programming languages = for IQ and QoS * IQ and QoS for emerging pervasive computing = applications, such as three-dimensional wireless sensor networks (like = underwater sensor network), healthcare, and structural health monitoring * Prototype test-bed design, implementation, and = field trials Submission Instructions The submitted paper should be in the IEEE conference format = (author guidelines can be found at = ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM = ) = and should be no more than 6 pages in length. The paper should not be = previously published or currently under review elsewhere. Only = electronic submissions in PDF format will be considered. Detailed = electronic submission procedures will be announced later. All = submissions will be peer-reviewed and selected based on their = originality, merit, and relevance to the workshop. Accepted papers will = be published by the IEEE Computer Society Press in the combined PerCom = 2009 workshops proceedings. At least one author of each accepted paper = must register and attend the workshop to present the paper. General Co-Chairs Sajal K. Das, the University of Texas at Arlington, USA Chen Khong Tham, Institute for Infocomm Research, Singapore =20 Program Co-Chairs Wendong Xiao, Institute for Infocomm Research, Singapore Habib M. Ammari, the University of Texas at Arlington, USA =20 Important Dates Paper submission: October 31, 2008 Author notification: December 19, 2008 Camera-ready due: January 7, 2009 -------------------------------------------------------------------------= ----------------------------------------------------------- ------_=_NextPart_001_01C92CC5.B039B5FA Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= [computational.science] IQ2S'09: Call for papers=0A= =0A= =0A=
Dear Colleagues,

We apologize if = you receive =0A= multiple copies.
=0A=

Please find below the Call for papers for IQ2S 2009, = The First =0A= International Workshop
on Information Quality and Quality of Service = for =0A= Pervasive Computing, which will be held
in conjunction with IEEE = PerCom 2009, =0A= Galveston, Texas, March 9-13, 2009.

=0A=

[+++++++ DEADLINE HAS BEEN EXTENDED TO OCTOBER 31! =0A= +++++++]

=0A=


We would appreciate it very much if you could = disseminate =0A= this CFP to your colleagues and students!

Best = Regards,

Wendong =0A= Xiao, Institute for Infocomm Research, Singapore
Habib M. Ammari, the =0A= University of Texas at Arlington, USA

Program =0A= Co-Chairs

--------------------------------------------------------= -------------------------------------------------------------------------= ---
CALL =0A= FOR PAPERS
      
The First = International =0A= Workshop on Information Quality and Quality of Service for Pervasive = Computing =0A= (IQ2S 2009)
Website: http://iq2s2009.i2r.a-star.edu= .sg =0A= <http://iq2s2009.i2r.a-star.ed= u.sg/>  =0A= <http://iq2s2009.i2r.a-star.edu.sg/ =0A= > >
In Conjunction with IEEE PerCom 2009 (http://www.percom.org <http://www.percom.org/>  = <http://www.percom.org/ =0A= > > )
Galveston, Texas, March 9-13, =0A= 2009

      
   &nb= sp;    =0A= Quality of service (QoS) has been studied in various building blocks in =0A= pervasive computing, e.g., different QoS mechanisms are presented for = wireless =0A= or wired networks, with QoS metrics being described in terms of delay, =0A= bandwidth, and/or data loss etc. The emerging pervasive computing is =0A= application-driven and mission-critical, therefore the information = quality (IQ), =0A= such as the accuracy of target tracking or event detection, is also = critical for =0A= the end users, service providers and the system designers. IQ and QoS =0A= provisioning for pervasive computing is challenging and difficult due to = the =0A= resource-constrained, dynamic and distributed nature of the system, the = weakness =0A= under security attacking, and the lack of a holistic design approach = which takes =0A= into account the different types of resources and their =0A= inter-dependencies.
      
 &nbs= p;      =0A= The objective of this workshop is to provide a forum to exchange ideas, = present =0A= results, share experience, and enhance collaborations among researchers, =0A= professionals, and application developers in various aspects of IQ and = QoS for =0A= pervasive computing. Topics of interest include but are not limited =0A= to:

        =0A= *            = System =0A= architecture for IQ and QoS =0A= provisioning

        =0A= *            = IQ-oriented =0A= signal & information processing (e.g., source coding and data =0A= compression)

        =0A= *            QoS = for =0A= target/event detection, localization, tracking and =0A= classification

        =0A= *            QoS = for =0A= wireless ad hoc and sensor networks (including coverage and =0A= connectivity)

        =0A= *            QoS = for task =0A= mapping and scheduling

        =0A= *            = Cross-layer =0A= design for coordinated QoS (including IQ-QoS =0A= integration)

        =0A= *            = Adaptative =0A= IQ and QoS under dynamic =0A= environments

        =0A= *            = Trust, =0A= security and privacy issues in IQ and =0A= QoS

        =0A= *            = Development =0A= environments and programming languages for IQ and =0A= QoS

        =0A= *            IQ = and QoS =0A= for emerging pervasive computing applications, such as three-dimensional =0A= wireless sensor networks (like underwater sensor network), healthcare, = and =0A= structural health = monitoring

        =0A= *            = Prototype =0A= test-bed design, implementation, and field =0A= trials

        Submission =0A= Instructions

        The = submitted =0A= paper should be in the IEEE conference format (author guidelines can be = found at =0A= ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM =0A= <ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM&g= t; =0A= ) and should be no more than 6 pages in length. The paper should not be =0A= previously published or currently under review elsewhere. Only = electronic =0A= submissions in PDF format will be considered. Detailed electronic = submission =0A= procedures will be announced later. All submissions will be = peer-reviewed and =0A= selected based on their originality, merit, and relevance to the = workshop. =0A= Accepted papers will be published by the IEEE Computer Society Press in = the =0A= combined PerCom 2009 workshops proceedings. At least one author of each = accepted =0A= paper must register and attend the workshop to present the =0A= paper.

        General =0A= Co-Chairs

        Sajal K. = Das, the =0A= University of Texas at Arlington, =0A= USA
        Chen Khong Tham, = Institute for =0A= Infocomm Research, =0A= Singapore
      
   &n= bsp;    =0A= Program Co-Chairs
        Wendong = Xiao, =0A= Institute for Infocomm Research, =0A= Singapore
        Habib M. Ammari, = the =0A= University of Texas at Arlington, =0A= USA
      
    &n= bsp;   =0A= Important Dates
        Paper =0A= submission:     October 31, =0A= 2008
        Author = notification:  =0A= December 19, 2008
        = Camera-ready =0A= due:     January 7, =0A= 2009
-----------------------------------------------------------------= -------------------------------------------------------------------

=0A= =0A= =0A= ------_=_NextPart_001_01C92CC5.B039B5FA-- Received: from mail.jpl.nasa.gov (sentrion1.jpl.nasa.gov [128.149.139.105]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9C3MLwi004096 for ; Sat, 11 Oct 2008 20:22:22 -0700 Received: from xmta2.jpl.nasa.gov (xmta2.jpl.nasa.gov [137.78.160.56]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m9C3JXOu012149 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Sun, 12 Oct 2008 03:19:34 GMT Received: from [127.0.0.1] (vpn-149-244-027.jpl.nasa.gov [128.149.244.27]) by xmta2.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m9C3JRoC009334 for ; Sat, 11 Oct 2008 20:19:31 -0700 Message-ID: <48F16CBE.5020608@jpl.nasa.gov> Date: Sat, 11 Oct 2008 20:19:26 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: dtn-interest@mailman.dtnrg.org References: <20081009235750.AKO45377@metis.its.uow.edu.au><754BCCB1-0B2D-44A0-9592-9C88AA3BAB68@surrey.ac.uk> <48F012AE.70102@jpl.nasa.gov> <4835AFD53A246A40A3B8DA85D658C4BE7B0C7E@EVS-EC1-NODE4.surrey.ac.uk> In-Reply-To: <4835AFD53A246A40A3B8DA85D658C4BE7B0C7E@EVS-EC1-NODE4.surrey.ac.uk> Content-Type: multipart/alternative; boundary="------------000507010502090800040509" X-Source-IP: vpn-149-244-027.jpl.nasa.gov [128.149.244.27] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 12 Oct 2008 03:22:22 -0000 This is a multi-part message in MIME format. --------------000507010502090800040509 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit L.Wood@surrey.ac.uk wrote: > > I'd call that the 'Bundle architecture' for clarity, since it's > entirely built around bundles, and RFC4838 is clearly about bundles. > > Drawing a distinction between "Delay-Tolerant Networking" and > "delay-tolerant networking" really doesn't work in e.g. German, where > all nouns are capitalized - or in the New York Times heading style, > which does the same. I doubt that drawing a line similar to the > distinction between 'the Internet' and 'an internet' (or catenet) is > useful. > > If I say 'we run our DTNs over IP', what have I just said? Talking of > carrying bundles over IP is clearer as to how the Bundle architecture > and the Internet architecture are combined. > > I believe that as a research group, the DTNRG should look at and > consider all aspects of DTNs (or, if you like, dtns...), with a wider > view than just the focus on bundling. > An entirely valid point of view, Lloyd. Revisiting general topics in delay-tolerant networking can sometimes yield valuable new insights. What we want to be sure not to do is introduce confusion over what the terms "Delay-Tolerant Networking" and "DTN" denote. They have specific and well-understood meanings. There is no such thing as "Bundle architecture"; there is a Delay-Tolerant Networking architecture, and there is a Bundle Protocol that is one prominent feature of that architecture. There may well be other possible architectures for delay-tolerant networking (just as the Internet architecture is not the only possible architecture for internetworking); if so, they deserve their own names. English uses capitalization to distinguish between proper and common nouns that are spelled the same, and German and the New York Times manage to keep up one way or another: we all seem comfortable with distinguishing between "underground" and "Underground", "democrat" and "Democrat", "united nations" and "United Nations", "autonomous system" and "Autonomous System". I don't think there's a problem here. Scott > > > > > More precisely, there's a useful distinction to be drawn between > > delay-tolerant networking in a general sense and Delay-Tolerant > > Networking (or "DTN"), a specific communications architecture that is > > characterized in some detail in RFC 4838. The latter, which is largely > > based on Bundle Protocol (RFC 5050), is the principal focus of the DTN > > Research Group of the IRTF, though ruminations on the former are often > > interesting as well. > > > > Scott > --------------000507010502090800040509 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit L.Wood@surrey.ac.uk wrote:
RE: [dtn-interest] Integrating IP with BP

I'd call that the 'Bundle architecture' for clarity, since it's entirely built around bundles, and RFC4838 is clearly about bundles.

Drawing a distinction between "Delay-Tolerant Networking" and "delay-tolerant networking" really doesn't work in e.g. German, where all nouns are capitalized - or in the New York Times heading style, which does the same. I doubt that drawing a line similar to the distinction between 'the Internet' and 'an internet' (or catenet) is useful.

If I say 'we run our DTNs over IP', what have I just said? Talking of carrying bundles over IP is clearer as to how the Bundle architecture and the Internet architecture are combined.

I believe that as a research group, the DTNRG should look at and consider all aspects of DTNs (or, if you like, dtns...), with a wider view than just the focus on bundling.

An entirely valid point of view, Lloyd.  Revisiting general topics in delay-tolerant networking can sometimes yield valuable new insights.

What we want to be sure not to do is introduce confusion over what the terms "Delay-Tolerant Networking" and "DTN" denote.  They have specific and well-understood meanings.  There is no such thing as "Bundle architecture"; there is a Delay-Tolerant Networking architecture, and there is a Bundle Protocol that is one prominent feature of that architecture.  There may well be other possible architectures for delay-tolerant networking (just as the Internet architecture is not the only possible architecture for internetworking); if so, they deserve their own names.

English uses capitalization to distinguish between proper and common nouns that are spelled the same, and German and the New York Times manage to keep up one way or another: we all seem comfortable with distinguishing between "underground" and "Underground", "democrat" and "Democrat", "united nations" and "United Nations", "autonomous system" and "Autonomous System".  I don't think there's a problem here.

Scott

<http://www.ee.surrey.ac.uk/Personal/L.Wood/><L.Wood@surrey.ac.uk>

> More precisely, there's a useful distinction to be drawn between
> delay-tolerant networking in a general sense and Delay-Tolerant
> Networking (or "DTN"), a specific communications architecture that is
> characterized in some detail in RFC 4838.  The latter, which is largely
> based on Bundle Protocol (RFC 5050), is the principal focus of the DTN
> Research Group of the IRTF, though ruminations on the former are often
> interesting as well.
>
> Scott


--------------000507010502090800040509-- Received: from mail133.messagelabs.com (mail133.messagelabs.com [195.245.230.179]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m9BI72mL011379 for ; Sat, 11 Oct 2008 11:07:03 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-15.tower-133.messagelabs.com!1223748265!33416714!1 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 27213 invoked from network); 11 Oct 2008 18:04:25 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-15.tower-133.messagelabs.com with SMTP; 11 Oct 2008 18:04:25 -0000 Received: from EVS-EC1-NODE4.surrey.ac.uk ([131.227.102.139]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Sat, 11 Oct 2008 19:04:25 +0100 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C92BCB.CB23F621" Date: Sat, 11 Oct 2008 19:04:24 +0100 Message-ID: <4835AFD53A246A40A3B8DA85D658C4BE7B0C7E@EVS-EC1-NODE4.surrey.ac.uk> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Integrating IP with BP Thread-Index: AckrTg3LTkNSpyYJQ6SisT2KM5ChFAAe3/wp References: <20081009235750.AKO45377@metis.its.uow.edu.au><754BCCB1-0B2D-44A0-9592-9C88AA3BAB68@surrey.ac.uk> <48F012AE.70102@jpl.nasa.gov> From: To: , X-OriginalArrivalTime: 11 Oct 2008 18:04:25.0013 (UTC) FILETIME=[CB8CD650:01C92BCB] Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Oct 2008 18:07:04 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C92BCB.CB23F621 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable I'd call that the 'Bundle architecture' for clarity, since it's entirely = built around bundles, and RFC4838 is clearly about bundles. Drawing a distinction between "Delay-Tolerant Networking" and = "delay-tolerant networking" really doesn't work in e.g. German, where = all nouns are capitalized - or in the New York Times heading style, = which does the same. I doubt that drawing a line similar to the = distinction between 'the Internet' and 'an internet' (or catenet) is = useful. If I say 'we run our DTNs over IP', what have I just said? Talking of = carrying bundles over IP is clearer as to how the Bundle architecture = and the Internet architecture are combined. I believe that as a research group, the DTNRG should look at and = consider all aspects of DTNs (or, if you like, dtns...), with a wider = view than just the focus on bundling. L. > More precisely, there's a useful distinction to be drawn between=20 > delay-tolerant networking in a general sense and Delay-Tolerant=20 > Networking (or "DTN"), a specific communications architecture that is=20 > characterized in some detail in RFC 4838. The latter, which is = largely=20 > based on Bundle Protocol (RFC 5050), is the principal focus of the DTN = > Research Group of the IRTF, though ruminations on the former are often = > interesting as well. > > Scott ------_=_NextPart_001_01C92BCB.CB23F621 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: [dtn-interest] Integrating IP with BP

I'd call that the 'Bundle architecture' for clarity, = since it's entirely built around bundles, and RFC4838 is clearly about = bundles.

Drawing a distinction between "Delay-Tolerant Networking" and = "delay-tolerant networking" really doesn't work in e.g. = German, where all nouns are capitalized - or in the New York Times = heading style, which does the same. I doubt that drawing a line similar = to the distinction between 'the Internet' and 'an internet' (or catenet) = is useful.

If I say 'we run our DTNs over IP', what have I just said? Talking of = carrying bundles over IP is clearer as to how the Bundle architecture = and the Internet architecture are combined.

I believe that as a research group, the DTNRG should look at and = consider all aspects of DTNs (or, if you like, dtns...), with a wider = view than just the focus on bundling.

L.

<http://www.ee.surrey= .ac.uk/Personal/L.Wood/><L.Wood@surrey.ac.uk>

> More precisely, there's a useful distinction to be drawn = between
> delay-tolerant networking in a general sense and Delay-Tolerant
> Networking (or "DTN"), a specific communications = architecture that is
> characterized in some detail in RFC 4838.  The latter, which = is largely
> based on Bundle Protocol (RFC 5050), is the principal focus of the = DTN
> Research Group of the IRTF, though ruminations on the former are = often
> interesting as well.
>
> Scott

------_=_NextPart_001_01C92BCB.CB23F621-- Received: from mail.jpl.nasa.gov (sentrion1.jpl.nasa.gov [128.149.139.105]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m9B2jQbe001709 for ; Fri, 10 Oct 2008 19:45:26 -0700 Received: from xmta3.jpl.nasa.gov (xmta3.jpl.nasa.gov [137.78.160.111]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m9B2h5aR013517 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Sat, 11 Oct 2008 02:43:06 GMT Received: from [127.0.0.1] (vpn-149-244-033.jpl.nasa.gov [128.149.244.33]) by xmta3.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m9B2grBZ012757 for ; Fri, 10 Oct 2008 19:43:03 -0700 Message-ID: <48F012AE.70102@jpl.nasa.gov> Date: Fri, 10 Oct 2008 19:42:54 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: DTN References: <20081009235750.AKO45377@metis.its.uow.edu.au> <754BCCB1-0B2D-44A0-9592-9C88AA3BAB68@surrey.ac.uk> In-Reply-To: <754BCCB1-0B2D-44A0-9592-9C88AA3BAB68@surrey.ac.uk> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Source-IP: vpn-149-244-033.jpl.nasa.gov [128.149.244.33] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Oct 2008 02:45:27 -0000 Lloyd Wood wrote: > Mohammad, > > We've done what you ask by carrying the bundle protocol over an IP- > based convergence layer - Saratoga - in a private IP network (that > happens to involve a low-earth-orbiting satellite.) > > http://info.ee.surrey.ac.uk/Personal/L.Wood/dtn/ > > bundles can be carried over TCP-based or UDP-based convergence layers. > The way to carry over TCP is not agreed; implementations do different > things. The way to carry direct over UDP is not agreed, as > implementations do different things, while Licklider, which is capable > of running over UDP, and Saratoga, which only runs over UDP, provide > alternative ways of carrying bundles over UDP. > > So, a bundle agent that is able to output and accept bundles over TCP/ > IP or something/UDP/IP or direct over UDP is sufficient to turn a > private DTN-like IP network into a bundle network. Most development of > the reference bundle protocol implementation has been over IP networks. > > (there's a useful distinction to be drawn between DTNs in the abstract > and bundle network implementations.) > More precisely, there's a useful distinction to be drawn between delay-tolerant networking in a general sense and Delay-Tolerant Networking (or "DTN"), a specific communications architecture that is characterized in some detail in RFC 4838. The latter, which is largely based on Bundle Protocol (RFC 5050), is the principal focus of the DTN Research Group of the IRTF, though ruminations on the former are often interesting as well. Scott Received: from ndmsnpf01.ndc.nasa.gov (ndmsnpf01.ndc.nasa.gov [198.117.0.121]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99Jes3n013513 for ; Thu, 9 Oct 2008 12:40:54 -0700 Received: from ndjsppt03.ndc.nasa.gov (ndjsppt03.ndc.nasa.gov [198.117.1.102]) by ndmsnpf01.ndc.nasa.gov (Postfix) with ESMTP id 1E5BE26014D; Thu, 9 Oct 2008 14:39:09 -0500 (CDT) Received: from ndjsxgw03.ndc.nasa.gov (ndjsxgw03.ndc.nasa.gov [129.166.32.111]) by ndjsppt03.ndc.nasa.gov (8.14.1/8.14.1) with ESMTP id m99Jd72d026499; Thu, 9 Oct 2008 14:39:07 -0500 Received: from NDJSEVS25B.ndc.nasa.gov ([129.166.32.125]) by ndjsxgw03.ndc.nasa.gov with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 14:39:09 -0500 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Date: Thu, 9 Oct 2008 14:39:03 -0500 Message-ID: In-Reply-To: <8C7C41A176AC0B468BEFB2EFD9BDAB990620D876@XCH-NW-5V2.nw.nos.boeing.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Oasys won't configure thread-index: AckqQqvrV0DPYgAIR32VrmNk0xGRjQAA5kAQ References: <8C7C41A176AC0B468BEFB2EFD9BDAB990620D876@XCH-NW-5V2.nw.nos.boeing.com> From: "Ivancic, William D. (GRC-RHN0)" To: "Duke, Martin" , X-OriginalArrivalTime: 09 Oct 2008 19:39:09.0116 (UTC) FILETIME=[B2B69FC0:01C92A46] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m99Jes3n013513 Subject: Re: [dtn-interest] Oasys won't configure X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 19:40:54 -0000 There are some patch files in sourceforge. You need to apply the patches. Try that first. Also, it "may" be the operating system. I briefly tried DTN-2.6 on Fedora 9 and had problems, but didn't have much time to really look into what was happening or document them sufficiently to go to the list for quesitons. /will > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On > Behalf Of Duke, Martin > Sent: Thursday, October 09, 2008 3:10 PM > To: dtn-interest@mailman.dtnrg.org > Subject: [dtn-interest] Oasys won't configure > > I've downloaded dtn-2.6.0 and oasys-1.3.0 from the DTN > sourceforge site. > > I unzipped them into parallel directories, with BerkeleyDB > 4.7.25 installed on my FreeBSD 7.0 system. > > I then typed > cd oasys-1.3.0 > ./configure --with-dbver=4.7 > > And after a while I get this: > > "Makefile", line 209: Missing dependency operator "Makefile", > line 212: Need an operator "Rules.make", line 124: warning: > duplicate script for target "%.o" > ignored > "Rules.make", line 125: warning: duplicate script for target "%.o" > ignored > "Rules.make", line 135: warning: duplicate script for target "%.E" > ignored > "Rules.make", line 136: warning: duplicate script for target "%.E" > ignored > "Rules.make", line 148: Missing dependency operator > "Rules.make", line 150: Need an operator "Rules.make", line > 153: Missing dependency operator "Rules.make", line 154: > Missing dependency operator "Rules.make", line 155: Need an > operator "Makefile", line 243: Missing dependency operator > "Makefile", line 247: Need an operator "Makefile", line 274: > Need an operator "Makefile", line 275: Need an operator > "Makefile", line 276: Need an operator "Makefile", line 277: > Need an operator "Makefile", line 472: Need an operator > "Makefile", line 474: Need an operator "Makefile", line 479: > Need an operator > make: fatal errors encountered -- cannot continue > > Am I using the wrong distribution? Is there a configuration > flag I should be using? > > Thanks! > Martin > > All the other output listed below (preceeding the above): > > [root@freebsd7 /home/core/dtn/oasys-1.3.0]# ./configure > --with-dbver=4.7 checking location of source directory... > "/usr/home/core/dtn/oasys-1.3.0" > checking location of build directory... > "/usr/home/core/dtn/oasys-1.3.0" > checking for a C compiler (trying gcc gcc-4.1 gcc-4.0 gcc-3.4 > gcc-3.3)... > checking for gcc... gcc > checking for C compiler default output file name... a.out > checking whether the C compiler works... yes checking whether > we are cross compiling... no checking for suffix of executables... > checking for suffix of object files... o checking whether we > are using the GNU C compiler... yes checking whether gcc > accepts -g... yes checking for gcc option to accept ISO > C89... none needed checking for a C++ compiler (trying g++ > g++-4.0 g++-4.0 g++-3.4 > g++-3.3)... > checking for g++... g++ > checking whether we are using the GNU C++ compiler... yes > checking whether g++ accepts -g... yes checking whether the > C++ compiler works... yes checking how to run the C > preprocessor... gcc -E checking for the version of the GNU C > compiler... 4.2.1 checking for the version of the GNU C++ > compiler... 4.2.1 checking for ar... ar checking for > ranlib... ranlib checking whether to compile with > debugging... yes checking whether to compile with memory > debugging... no checking whether to compile with lock > debugging (default yes)... yes checking whether to compile > with optimization... no checking whether to compile with > profiling... no checking whether to link statically... no > checking whether to link using static external libraries... > no checking whether to try to build shared libraries... yes > checking whether the compiler supports -fPIC... yes checking > whether the compiler can link a dynamic library with -shared... > yes > checking extension for dynamic libraries... so checking if > the compiler supports -Wl,--rpath=.... yes checking for grep > that handles long lines and -e... /usr/bin/grep checking for > egrep... /usr/bin/grep -E checking for sys/types.h... yes > checking for sys/stat.h... yes checking for stdlib.h... yes > checking for string.h... yes checking for memory.h... yes > checking for strings.h... yes checking for inttypes.h... yes > checking for stdint.h... yes checking for unistd.h... yes > checking for gawk... no checking for mawk... no checking for > nawk... nawk checking for a BSD-compatible install... > /usr/bin/install -c checking whether make sets $(MAKE)... yes > checking for ranlib... (cached) ranlib checking for library > containing pthread_create... -lpthread checking for > pthread_yield... yes checking for library containing > pthread_setspecific... none required checking for library > containing socket... none required checking for library > containing gethostbyname... none required checking for > library containing xdr_int... none required checking for ANSI > C header files... yes checking err.h usability... yes > checking err.h presence... yes checking for err.h... yes > checking execinfo.h usability... no checking execinfo.h > presence... no checking for execinfo.h... no checking for > stdint.h... (cached) yes checking for string.h... (cached) > yes checking synch.h usability... no checking synch.h > presence... no checking for synch.h... no checking > sys/cdefs.h usability... yes checking sys/cdefs.h presence... > yes checking for sys/cdefs.h... yes checking for > sys/types.h... (cached) yes checking for an ANSI C-conforming > const... yes checking for inline... inline checking for > working volatile... yes checking for mode_t... yes checking > value for _FILE_OFFSET_BITS preprocessor symbol... 64 > checking for off_t... yes checking size of off_t... 8 > checking return type of signal handlers... void checking for > size_t... yes checking for ptrdiff_t... yes checking for > uint32_t... yes checking for u_int32_t... yes checking for > fdatasync... no checking for getaddrinfo... yes checking for > gethostbyname... yes checking for gethostbyname_r... yes > checking for getopt_long... yes checking for inet_aton... yes > checking for inet_pton... yes checking for pthread_yield... > (cached) yes checking for sched_yield... yes checking whether > to compile with non-atomic "atomic" routines... no checking > whether to compile with assembly-based atomic functions... > yes checking for --with-python... no checking for python... > /usr/local/bin/python checking whether python distutils can > build an extension module... yes checking for library > containing pow... -lm checking for library containing > dlopen... none required > > configure: checking for tcl installation (version 8.4) > checking for tcl.h (version 8.4) in /usr/include... no > checking for tcl.h (version 8.4) in /usr/local/include... no > checking for tcl.h (version 8.4) in /usr/include/tcl8.4... no > checking for tcl.h (version 8.4) in > /usr/local/include/tcl8.4... yes checking for tcl library in > /usr/lib: -ltcl8.4 ... no checking for tcl library in > /usr/lib: -ltcl84 ... no checking for tcl library in > /usr/lib: -ltcl ... no checking for tcl library in > /usr/local/lib: -ltcl8.4 ... no checking for tcl library in > /usr/local/lib: -ltcl84 ... yes checking whether to compile > with google profiling... no checking whether bluetooth > support should be enabled... try checking for library > containing baswap... no checking bluetooth/bluetooth.h > usability... no checking bluetooth/bluetooth.h presence... no > checking for bluetooth/bluetooth.h... no checking whether > bluetooth support was found... no checking whether expat > support should be enabled... try checking for expat in > /usr/include, /usr/lib, -lexpat... no checking for expat in > /usr/include, /usr/local/lib, -lexpat... no checking for > expat in /usr/local/include, /usr/lib, -lexpat... yes > checking whether libexpat was found... yes checking whether > xerces-c support should be enabled... try checking whether > xerces-c (>= v2.6.0) was found... no checking whether > tclreadline support should be enabled... try checking for > library containing readline... -lreadline checking whether > readline is GNU readline or BSD editline... editline checking > whether tclreadline support was found... yes checking whether > zlib support should be enabled... try checking for library > containing compress... -lz checking for library containing > compressBound... none required checking whether zlib support > was found... yes checking for xsd... xsd checking for > Berkeley DB header (version 4.7) in /usr/include... no > checking for Berkeley DB header (version 4.7) in /usr/local/include... > no > checking for Berkeley DB header (version 4.7) in > /usr/local/include/db4.7... no checking for Berkeley DB > header (version 4.7) in /usr/local/include/db4... no checking > for Berkeley DB header (version 4.7) in > /usr/local/include/db47... no checking for Berkeley DB header > (version 4.7) in /usr/local/BerkeleyDB.4.7/include... yes > checking for Berkeley DB library in > /usr/local/BerkeleyDB.4.7/lib, -ldb-4.7... yes > configure: creating ./config.status > config.status: creating Rules.make > config.status: creating System.make > config.status: creating oasys-config.h > config.status: oasys-config.h is unchanged > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from smtpout3.cns.ohiou.edu (smtpout3.cns.ohiou.edu [132.235.51.106]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99JE0pq012213 for ; Thu, 9 Oct 2008 12:14:01 -0700 X-IronPort-AV: E=Sophos;i="4.33,385,1220241600"; d="scan'208,217";a="486753449" Received: from oak3a.cats.ohiou.edu (HELO oak.cats.ohiou.edu) ([132.235.8.151]) by smtpout3.cns.ohiou.edu with ESMTP; 09 Oct 2008 15:12:09 -0400 Received: from 132.235.232.204 by pm2 (PureMessage); Thu Oct 9 15:11:24 2008 Received: from lin4.its.ohiou.edu (lin4.its.ohiou.edu [132.235.232.204]) (authenticated bits=0) by oak.cats.ohiou.edu (8.13.1/8.13.1) with ESMTP id m99JBNde1687224 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Thu, 9 Oct 2008 15:11:23 -0400 (EDT) Message-Id: <81A74BC6-33B6-4632-A004-93ECF04E3DB8@ohiou.edu> From: Hans Kruse To: "Scott, Keith L." In-Reply-To: Content-Type: multipart/alternative; boundary=Apple-Mail-8-459146912 Mime-Version: 1.0 (Apple Message framework v929.2) Date: Thu, 9 Oct 2008 15:11:22 -0400 References: <20081009235750.AKO45377@metis.its.uow.edu.au> <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk><48EE3350.1010102@jpl.nasa.gov> <01B6D2E1-39B1-4918-9BD3-53A9E8B7B120@surrey.ac.uk> X-Mailer: Apple Mail (2.929.2) X-PMX-Version: 4.7.1.128075, Antispam-Engine: 2.5.2.313940, Antispam-Data: 2008.10.9.113047 (pm2) X-PMX-Information: http://technology.ohio.edu/email/filtering/ X-PMX-Spam: Gauge=IIIIIII, Probability=7%, Report='BODY_SIZE_9000_9999 0, __BOUNCE_CHALLENGE_SUBJ 0, __C230066_P5 0, __CP_URI_IN_BODY 0, __CT 0, __CTYPE_HAS_BOUNDARY 0, __CTYPE_MULTIPART 0, __CTYPE_MULTIPART_ALT 0, __HAS_HTML 0, __HAS_MSGID 0, __HAS_X_MAILER 0, __MIME_HTML 0, __MIME_VERSION 0, __SANE_MSGID 0, __TAG_EXISTS_HTML 0' Cc: DTN , Lloyd Wood , Scott Burleigh Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 19:14:01 -0000 --Apple-Mail-8-459146912 Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Right -- this is a way to test and demo when we don't have access to actual space links. In our demo we sent IP in bundles that traveled over LTP over UDP, which allowed us to demo the comparison of LTP retransmission versus TCP retransmission (we focused on errors, not delays. As someone stated earlier, many Internet applications do not tolerate delay regardless of transport). On Oct 9, 2008, at 1:36 PM, Scott, Keith L. wrote: > To be more specific, I believe the TCP DTNTunnel application that > ships > with the reference implementation terminates the 'Internet-side' > connections and tunnels the data in bundles. That is, TCP connections > and UDP datagrams are explicitly addressed to the tunnel ingress > points, and there's a static mapping between the ingress and the > destination IP address / Protocol / Port on the far side of the > tunnel. > This makes it easy, as with the Web application David described, to do > simple proofs-of-concept and to demonstrate DTN ideas using existing > applications without writing any code. You're right though in that > this isn't really tunneling the IP packets over bundles. > > > --keith > > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf > Of > Lloyd Wood > Sent: Thursday, October 09, 2008 1:13 PM > To: Scott Burleigh > Cc: DTN; Lloyd Wood > Subject: Re: [dtn-interest] Integrating IP with BP > > But in the dtntunnel example, the bundle has to be carried over > _something_ - most likely a TCP or UDP-based convergence layer over a > link layer. > > The value of IP-bundle-IP does not seem greater than IP-in-IP. I'm > having trouble seeing any value to carrying IP in bundles; that seems > less useful than PWE3 pseudowires. > > L. > > > On 9 Oct 2008, at 17:37, Scott Burleigh wrote: > >> Lloyd Wood wrote: >>> When is it a tunnel and not a convergence layer? >>> >> Depends on which is on top. When BP runs over IP (normally TCP/IP or >> UDP/IP) -- that is, bundles are encapsulated within IP packets -- >> the IP >> stack is functioning as a DTN convergence-layer mechanism. When IP >> runs >> over BP -- that is, IP packets are encapsulated within bundles -- we >> usually think of that as "tunneling"; the encapsulation relationship > >> is >> inverted from the more typical configuration. >> >> Scott > > DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ > > > > > > > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest Hans Kruse, Professor J. Warren McClure School of Information and Telecommunication Systems Adjunct Associate Professor of Electrical Engineering and Computer Science 292 Lindley Hall, Ohio University, Athens, OH, 45701 740-593-4891 voice, 740-593-4889 fax --Apple-Mail-8-459146912 Content-Type: text/html; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Right -- this is a way to test = and demo when we don't have access to actual space links.  In our = demo we sent IP in bundles that traveled over LTP over UDP, which = allowed us to demo the comparison of LTP retransmission versus = TCP retransmission (we focused on errors, not delays.  As someone = stated earlier, many Internet applications do not tolerate = delay regardless of transport).


On Oct = 9, 2008, at 1:36 PM, Scott, Keith L. wrote:

To be = more specific, I believe the TCP DTNTunnel application that = ships
with the reference implementation terminates the = 'Internet-side'
connections and tunnels the data in bundles. =  That is, TCP connections
and UDP datagrams are explicitly = addressed to the tunnel ingress
points, and there's a static mapping = between the ingress and the
destination IP address / Protocol / Port = on the far side of the tunnel.
This makes it easy, as with the Web = application David described, to do
simple proofs-of-concept and to = demonstrate DTN ideas using existing
applications without writing any = code.  You're right though in that
this isn't really tunneling = the IP packets over bundles.


--keith


-----Original = Message-----
From: dtn-inte= rest-bounces@maillists.intel-research.net
[mailto:d= tn-interest-bounces@maillists.intel-research.net] On Behalf = Of
Lloyd Wood
Sent: Thursday, October 09, 2008 1:13 PM
To: = Scott Burleigh
Cc: DTN; Lloyd Wood
Subject: Re: [dtn-interest] = Integrating IP with BP

But in the dtntunnel example, the bundle = has to be carried over  
_something_ - most likely a TCP or = UDP-based convergence layer over a  
link layer.

The = value of IP-bundle-IP does not seem greater than IP-in-IP. I'm =  
having trouble seeing any value to carrying IP in bundles; = that seems  
less useful than PWE3 = pseudowires.

L.


On 9 Oct 2008, at 17:37, Scott = Burleigh wrote:

Lloyd Wood = wrote:
When is it a tunnel and not a convergence = layer?

Depends on which is on top.  When BP runs over IP = (normally TCP/IP or
UDP/IP) -- = that is, bundles are encapsulated within IP packets -- =  
the = IP
stack is functioning as a = DTN convergence-layer mechanism.  When IP =  
runs
over BP -- = that is, IP packets are encapsulated within bundles -- = we
usually think of that as = "tunneling"; the encapsulation = relationship

is
inverted from = the more typical configuration.

Scott

DTN work: http://info= .ee.surrey.ac.uk/Personal/L.Wood/saratoga/

<http://info.surrey.ac.u= k/Personal/L.Wood/><L.Wood@surrey.ac.uk>




_______________________________________________
dtn-interest = mailing list
dtn-interest@mai= llists.intel-research.net
http://maillists.intel-research.net/mailm= an/listinfo/dtn-interest

__________________________________________= _____
dtn-interest mailing = list
dtn-interest@maillists.intel-research.net
http://maillists.inte= l-research.net/mailman/listinfo/dtn-interest
<= br>

Hans Kruse, Professor

J. Warren McClure School of Information and = Telecommunication Systems

Adjunct Associate Professor of Electrical Engineering and = Computer Science

292 Lindley Hall, Ohio University, Athens, OH, = 45701

740-593-4891 voice, 740-593-4889 fax


=

= --Apple-Mail-8-459146912-- Received: from blv-smtpout-01.boeing.com (blv-smtpout-01.boeing.com [130.76.32.69]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99JCSbf012135 for ; Thu, 9 Oct 2008 12:12:28 -0700 Received: from stl-av-01.boeing.com (stl-av-01.boeing.com [192.76.190.6]) by blv-smtpout-01.ns.cs.boeing.com (8.14.0/8.14.0/8.14.0/SMTPOUT) with ESMTP id m99JAS0c003462 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Thu, 9 Oct 2008 12:10:39 -0700 (PDT) Received: from stl-av-01.boeing.com (localhost [127.0.0.1]) by stl-av-01.boeing.com (8.14.0/8.14.0/DOWNSTREAM_RELAY) with ESMTP id m99JASSh018816 for ; Thu, 9 Oct 2008 14:10:28 -0500 (CDT) Received: from XCH-NWBH-11.nw.nos.boeing.com (xch-nwbh-11.nw.nos.boeing.com [130.247.55.84]) by stl-av-01.boeing.com (8.14.0/8.14.0/UPSTREAM_RELAY) with ESMTP id m99JAKPV018457 for ; Thu, 9 Oct 2008 14:10:27 -0500 (CDT) Received: from XCH-NW-5V2.nw.nos.boeing.com ([130.247.55.45]) by XCH-NWBH-11.nw.nos.boeing.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 12:10:20 -0700 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 9 Oct 2008 12:10:19 -0700 Message-ID: <8C7C41A176AC0B468BEFB2EFD9BDAB990620D876@XCH-NW-5V2.nw.nos.boeing.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: Oasys won't configure Thread-Index: AckqQqvrV0DPYgAIR32VrmNk0xGRjQ== From: "Duke, Martin" To: X-OriginalArrivalTime: 09 Oct 2008 19:10:20.0590 (UTC) FILETIME=[AC6E7CE0:01C92A42] X-TM-AS-Product-Ver: SMEX-8.0.0.1285-5.500.1027-16206.000 X-TM-AS-Result: No--8.102200-0.000000-31 X-TM-AS-User-Approved-Sender: Yes X-TM-AS-User-Blocked-Sender: No Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m99JCSbf012135 Subject: [dtn-interest] Oasys won't configure X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 19:12:28 -0000 I've downloaded dtn-2.6.0 and oasys-1.3.0 from the DTN sourceforge site. I unzipped them into parallel directories, with BerkeleyDB 4.7.25 installed on my FreeBSD 7.0 system. I then typed cd oasys-1.3.0 ./configure --with-dbver=4.7 And after a while I get this: "Makefile", line 209: Missing dependency operator "Makefile", line 212: Need an operator "Rules.make", line 124: warning: duplicate script for target "%.o" ignored "Rules.make", line 125: warning: duplicate script for target "%.o" ignored "Rules.make", line 135: warning: duplicate script for target "%.E" ignored "Rules.make", line 136: warning: duplicate script for target "%.E" ignored "Rules.make", line 148: Missing dependency operator "Rules.make", line 150: Need an operator "Rules.make", line 153: Missing dependency operator "Rules.make", line 154: Missing dependency operator "Rules.make", line 155: Need an operator "Makefile", line 243: Missing dependency operator "Makefile", line 247: Need an operator "Makefile", line 274: Need an operator "Makefile", line 275: Need an operator "Makefile", line 276: Need an operator "Makefile", line 277: Need an operator "Makefile", line 472: Need an operator "Makefile", line 474: Need an operator "Makefile", line 479: Need an operator make: fatal errors encountered -- cannot continue Am I using the wrong distribution? Is there a configuration flag I should be using? Thanks! Martin All the other output listed below (preceeding the above): [root@freebsd7 /home/core/dtn/oasys-1.3.0]# ./configure --with-dbver=4.7 checking location of source directory... "/usr/home/core/dtn/oasys-1.3.0" checking location of build directory... "/usr/home/core/dtn/oasys-1.3.0" checking for a C compiler (trying gcc gcc-4.1 gcc-4.0 gcc-3.4 gcc-3.3)... checking for gcc... gcc checking for C compiler default output file name... a.out checking whether the C compiler works... yes checking whether we are cross compiling... no checking for suffix of executables... checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ISO C89... none needed checking for a C++ compiler (trying g++ g++-4.0 g++-4.0 g++-3.4 g++-3.3)... checking for g++... g++ checking whether we are using the GNU C++ compiler... yes checking whether g++ accepts -g... yes checking whether the C++ compiler works... yes checking how to run the C preprocessor... gcc -E checking for the version of the GNU C compiler... 4.2.1 checking for the version of the GNU C++ compiler... 4.2.1 checking for ar... ar checking for ranlib... ranlib checking whether to compile with debugging... yes checking whether to compile with memory debugging... no checking whether to compile with lock debugging (default yes)... yes checking whether to compile with optimization... no checking whether to compile with profiling... no checking whether to link statically... no checking whether to link using static external libraries... no checking whether to try to build shared libraries... yes checking whether the compiler supports -fPIC... yes checking whether the compiler can link a dynamic library with -shared... yes checking extension for dynamic libraries... so checking if the compiler supports -Wl,--rpath=.... yes checking for grep that handles long lines and -e... /usr/bin/grep checking for egrep... /usr/bin/grep -E checking for sys/types.h... yes checking for sys/stat.h... yes checking for stdlib.h... yes checking for string.h... yes checking for memory.h... yes checking for strings.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for unistd.h... yes checking for gawk... no checking for mawk... no checking for nawk... nawk checking for a BSD-compatible install... /usr/bin/install -c checking whether make sets $(MAKE)... yes checking for ranlib... (cached) ranlib checking for library containing pthread_create... -lpthread checking for pthread_yield... yes checking for library containing pthread_setspecific... none required checking for library containing socket... none required checking for library containing gethostbyname... none required checking for library containing xdr_int... none required checking for ANSI C header files... yes checking err.h usability... yes checking err.h presence... yes checking for err.h... yes checking execinfo.h usability... no checking execinfo.h presence... no checking for execinfo.h... no checking for stdint.h... (cached) yes checking for string.h... (cached) yes checking synch.h usability... no checking synch.h presence... no checking for synch.h... no checking sys/cdefs.h usability... yes checking sys/cdefs.h presence... yes checking for sys/cdefs.h... yes checking for sys/types.h... (cached) yes checking for an ANSI C-conforming const... yes checking for inline... inline checking for working volatile... yes checking for mode_t... yes checking value for _FILE_OFFSET_BITS preprocessor symbol... 64 checking for off_t... yes checking size of off_t... 8 checking return type of signal handlers... void checking for size_t... yes checking for ptrdiff_t... yes checking for uint32_t... yes checking for u_int32_t... yes checking for fdatasync... no checking for getaddrinfo... yes checking for gethostbyname... yes checking for gethostbyname_r... yes checking for getopt_long... yes checking for inet_aton... yes checking for inet_pton... yes checking for pthread_yield... (cached) yes checking for sched_yield... yes checking whether to compile with non-atomic "atomic" routines... no checking whether to compile with assembly-based atomic functions... yes checking for --with-python... no checking for python... /usr/local/bin/python checking whether python distutils can build an extension module... yes checking for library containing pow... -lm checking for library containing dlopen... none required configure: checking for tcl installation (version 8.4) checking for tcl.h (version 8.4) in /usr/include... no checking for tcl.h (version 8.4) in /usr/local/include... no checking for tcl.h (version 8.4) in /usr/include/tcl8.4... no checking for tcl.h (version 8.4) in /usr/local/include/tcl8.4... yes checking for tcl library in /usr/lib: -ltcl8.4 ... no checking for tcl library in /usr/lib: -ltcl84 ... no checking for tcl library in /usr/lib: -ltcl ... no checking for tcl library in /usr/local/lib: -ltcl8.4 ... no checking for tcl library in /usr/local/lib: -ltcl84 ... yes checking whether to compile with google profiling... no checking whether bluetooth support should be enabled... try checking for library containing baswap... no checking bluetooth/bluetooth.h usability... no checking bluetooth/bluetooth.h presence... no checking for bluetooth/bluetooth.h... no checking whether bluetooth support was found... no checking whether expat support should be enabled... try checking for expat in /usr/include, /usr/lib, -lexpat... no checking for expat in /usr/include, /usr/local/lib, -lexpat... no checking for expat in /usr/local/include, /usr/lib, -lexpat... yes checking whether libexpat was found... yes checking whether xerces-c support should be enabled... try checking whether xerces-c (>= v2.6.0) was found... no checking whether tclreadline support should be enabled... try checking for library containing readline... -lreadline checking whether readline is GNU readline or BSD editline... editline checking whether tclreadline support was found... yes checking whether zlib support should be enabled... try checking for library containing compress... -lz checking for library containing compressBound... none required checking whether zlib support was found... yes checking for xsd... xsd checking for Berkeley DB header (version 4.7) in /usr/include... no checking for Berkeley DB header (version 4.7) in /usr/local/include... no checking for Berkeley DB header (version 4.7) in /usr/local/include/db4.7... no checking for Berkeley DB header (version 4.7) in /usr/local/include/db4... no checking for Berkeley DB header (version 4.7) in /usr/local/include/db47... no checking for Berkeley DB header (version 4.7) in /usr/local/BerkeleyDB.4.7/include... yes checking for Berkeley DB library in /usr/local/BerkeleyDB.4.7/lib, -ldb-4.7... yes configure: creating ./config.status config.status: creating Rules.make config.status: creating System.make config.status: creating oasys-config.h config.status: oasys-config.h is unchanged Received: from yw-out-2324.google.com (yw-out-2324.google.com [74.125.46.29]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99J2oKE011722 for ; Thu, 9 Oct 2008 12:02:51 -0700 Received: by yw-out-2324.google.com with SMTP id 3so43980ywj.79 for ; Thu, 09 Oct 2008 12:01:06 -0700 (PDT) Received: by 10.100.248.14 with SMTP id v14mr772287anh.36.1223578865546; Thu, 09 Oct 2008 12:01:05 -0700 (PDT) Received: by 10.100.3.1 with HTTP; Thu, 9 Oct 2008 12:01:05 -0700 (PDT) Message-ID: <59e8babf0810091201y62226459v51d8cc6b797d88df@mail.gmail.com> Date: Thu, 9 Oct 2008 12:01:05 -0700 From: "Michael Demmer" Sender: demmer@gmail.com To: "Scott, Keith L." In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <20081009235750.AKO45377@metis.its.uow.edu.au> <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk> <48EE3350.1010102@jpl.nasa.gov> <01B6D2E1-39B1-4918-9BD3-53A9E8B7B120@surrey.ac.uk> X-Google-Sender-Auth: 386cf8ea6e4ef1e7 Cc: DTN , Lloyd Wood , Scott Burleigh Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 19:02:51 -0000 One specific example of where I've found the TCP over DTN over TCP scenario to the useful is in the case of rsync. The rsync application itself is not tolerant of disconnections -- if the TCP connection breaks, the application quits and the sync process aborts. However, you can point an rsync process at a dtntunnel instance that encapsulates the TCP traffic as bundles that are then routed over some number of DTN hops to another rsync process. This way the rsyncs think they have a persistent connection until the sync process completes, even if there are intermittent TCP connections between the DTN routers in the middle. See http://www.dtnrg.org/wiki/DTN_Rsync for specific setup instructions. -m On Thu, Oct 9, 2008 at 10:36 AM, Scott, Keith L. wrote: > To be more specific, I believe the TCP DTNTunnel application that ships > with the reference implementation terminates the 'Internet-side' > connections and tunnels the data in bundles. That is, TCP connections > and UDP datagrams are explicitly addressed to the tunnel ingress > points, and there's a static mapping between the ingress and the > destination IP address / Protocol / Port on the far side of the tunnel. > This makes it easy, as with the Web application David described, to do > simple proofs-of-concept and to demonstrate DTN ideas using existing > applications without writing any code. You're right though in that > this isn't really tunneling the IP packets over bundles. > > > --keith > > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of > Lloyd Wood > Sent: Thursday, October 09, 2008 1:13 PM > To: Scott Burleigh > Cc: DTN; Lloyd Wood > Subject: Re: [dtn-interest] Integrating IP with BP > > But in the dtntunnel example, the bundle has to be carried over > _something_ - most likely a TCP or UDP-based convergence layer over a > link layer. > > The value of IP-bundle-IP does not seem greater than IP-in-IP. I'm > having trouble seeing any value to carrying IP in bundles; that seems > less useful than PWE3 pseudowires. > > L. > > > On 9 Oct 2008, at 17:37, Scott Burleigh wrote: > >> Lloyd Wood wrote: >>> When is it a tunnel and not a convergence layer? >>> >> Depends on which is on top. When BP runs over IP (normally TCP/IP or >> UDP/IP) -- that is, bundles are encapsulated within IP packets -- >> the IP >> stack is functioning as a DTN convergence-layer mechanism. When IP >> runs >> over BP -- that is, IP packets are encapsulated within bundles -- we >> usually think of that as "tunneling"; the encapsulation relationship > >> is >> inverted from the more typical configuration. >> >> Scott > > DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ > > > > > > > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99HgmhA008070 for ; Thu, 9 Oct 2008 10:42:48 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m99Hf5tc024395 for ; Thu, 9 Oct 2008 13:41:05 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m99Hf5rN024388; Thu, 9 Oct 2008 13:41:05 -0400 Received: from IMCSRV1.MITRE.ORG ([129.83.20.158]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Thu, 9 Oct 2008 13:41:05 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 9 Oct 2008 13:41:04 -0400 Message-ID: In-Reply-To: <59e8babf0810090908n16dfd588p1854aa9f4fb52d62@mail.gmail.com> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Integrating IP with BP Thread-Index: AckqKTYsCrG3SD3QTU+1tWm4rCnxlgADO7VA References: <20081009235750.AKO45377@metis.its.uow.edu.au> <59e8babf0810090908n16dfd588p1854aa9f4fb52d62@mail.gmail.com> From: "Scott, Keith L." To: "Michael Demmer" X-OriginalArrivalTime: 09 Oct 2008 17:41:05.0042 (UTC) FILETIME=[3446B720:01C92A36] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m99HgmhA008070 Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 17:42:48 -0000 Right. --keith -----Original Message----- From: demmer@gmail.com [mailto:demmer@gmail.com] On Behalf Of Michael Demmer Sent: Thursday, October 09, 2008 12:08 PM To: Scott, Keith L. Cc: David Young; mza981@uow.edu.au; DTN Subject: Re: [dtn-interest] Integrating IP with BP Just to be pedantic -- there's actually one dtntunnel application distributed with the reference implementation, and it has support for either TCP or UDP mode. -m On Thu, Oct 9, 2008 at 8:08 AM, Scott, Keith L. wrote: > DTN2 provides a couple of DTNTunnel applications that do just this (one > for TCP and one for UDP). > > These are great for small tests and demos. One problem can arise if > the applications themselves are not disruption-tolerant. Even though > DTN can keep IP packets from being dropped if the network gets > partitioned, the applications themselves may have heartbeats or > timeouts that will cause them to fail. > > Cool! > > --keith > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of > David Young > Sent: Thursday, October 09, 2008 10:41 AM > To: mza981@uow.edu.au > Cc: DTN > Subject: Re: [dtn-interest] Integrating IP with BP > > We played around with this concept for a university research fair. > > We wanted to turn DTN into something a layman(and children) could > understand, so we wrote an ion application (not dtn2, although I'm > sure a dtn2 application could be written) that accepted IP packets > from a tunnel at one DTN endpoint, put them into bundles, then sent > them to another DTN endpoint which un-bundled the traffic and released > it onto the internet. > It involved applications at each DTN endpoint, as well as tunnel-type > interfaces with special routing rules at either end. > > The end result was that we could provide a demonstration of DTN at the > research fair by allowing people to access the web on 2 computers (one > using DTN tunneling, one not). We would modify the link connecting > the computers to the internet by adding artificial packet delay and/or > artificial packet corruption. > > On Thu, Oct 9, 2008 at 9:57 AM, wrote: >> Hi everyone, >> >> I have a question, maybe silly, but I really appreciate if someone > could give some insight into this. >> >> How can we integrate conventional IP with Bundle Protocol? For > example, we have a private IP network which intends to send and receive > data to and from a DTN. What are the requirements for this scenario? >> >> Please let me if any resource on this matter is available. >> >> Thank you. >> >> Regards, >> Mohammad >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >> > > > > -- > David Young > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99HbwOg007813 for ; Thu, 9 Oct 2008 10:37:58 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m99HaFwG009748 for ; Thu, 9 Oct 2008 13:36:15 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m99HaFUm009715; Thu, 9 Oct 2008 13:36:15 -0400 Received: from IMCSRV1.MITRE.ORG ([129.83.20.158]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Thu, 9 Oct 2008 13:36:14 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 9 Oct 2008 13:36:13 -0400 Message-ID: In-Reply-To: <01B6D2E1-39B1-4918-9BD3-53A9E8B7B120@surrey.ac.uk> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Integrating IP with BP Thread-Index: AckqMvuhvOO0OG+GRHGGLkCuPUrZUAAADxHQ References: <20081009235750.AKO45377@metis.its.uow.edu.au> <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk><48EE3350.1010102@jpl.nasa.gov> <01B6D2E1-39B1-4918-9BD3-53A9E8B7B120@surrey.ac.uk> From: "Scott, Keith L." To: "Lloyd Wood" , "Scott Burleigh" X-OriginalArrivalTime: 09 Oct 2008 17:36:14.0997 (UTC) FILETIME=[87655C50:01C92A35] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m99HbwOg007813 Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 17:37:58 -0000 To be more specific, I believe the TCP DTNTunnel application that ships with the reference implementation terminates the 'Internet-side' connections and tunnels the data in bundles. That is, TCP connections and UDP datagrams are explicitly addressed to the tunnel ingress points, and there's a static mapping between the ingress and the destination IP address / Protocol / Port on the far side of the tunnel. This makes it easy, as with the Web application David described, to do simple proofs-of-concept and to demonstrate DTN ideas using existing applications without writing any code. You're right though in that this isn't really tunneling the IP packets over bundles. --keith -----Original Message----- From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Lloyd Wood Sent: Thursday, October 09, 2008 1:13 PM To: Scott Burleigh Cc: DTN; Lloyd Wood Subject: Re: [dtn-interest] Integrating IP with BP But in the dtntunnel example, the bundle has to be carried over _something_ - most likely a TCP or UDP-based convergence layer over a link layer. The value of IP-bundle-IP does not seem greater than IP-in-IP. I'm having trouble seeing any value to carrying IP in bundles; that seems less useful than PWE3 pseudowires. L. On 9 Oct 2008, at 17:37, Scott Burleigh wrote: > Lloyd Wood wrote: >> When is it a tunnel and not a convergence layer? >> > Depends on which is on top. When BP runs over IP (normally TCP/IP or > UDP/IP) -- that is, bundles are encapsulated within IP packets -- > the IP > stack is functioning as a DTN convergence-layer mechanism. When IP > runs > over BP -- that is, IP packets are encapsulated within bundles -- we > usually think of that as "tunneling"; the encapsulation relationship > is > inverted from the more typical configuration. > > Scott DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ _______________________________________________ dtn-interest mailing list dtn-interest@maillists.intel-research.net http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from mail115.messagelabs.com (mail115.messagelabs.com [195.245.231.179]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m99HFAG8006781 for ; Thu, 9 Oct 2008 10:15:11 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-4.tower-115.messagelabs.com!1223572407!38299241!1 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 8458 invoked from network); 9 Oct 2008 17:13:27 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-4.tower-115.messagelabs.com with SMTP; 9 Oct 2008 17:13:27 -0000 Received: from ads31.surrey.ac.uk ([131.227.120.131]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 18:13:26 +0100 Received: from [192.168.1.210] ([82.44.158.76]) by ads31.surrey.ac.uk over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 18:13:26 +0100 Message-Id: <01B6D2E1-39B1-4918-9BD3-53A9E8B7B120@surrey.ac.uk> From: Lloyd Wood To: Scott Burleigh In-Reply-To: <48EE3350.1010102@jpl.nasa.gov> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Thu, 9 Oct 2008 18:13:25 +0100 References: <20081009235750.AKO45377@metis.its.uow.edu.au> <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk> <48EE3350.1010102@jpl.nasa.gov> X-Mailer: Apple Mail (2.929.2) X-OriginalArrivalTime: 09 Oct 2008 17:13:26.0521 (UTC) FILETIME=[57B87E90:01C92A32] Cc: DTN , Lloyd Wood Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 17:15:11 -0000 But in the dtntunnel example, the bundle has to be carried over _something_ - most likely a TCP or UDP-based convergence layer over a link layer. The value of IP-bundle-IP does not seem greater than IP-in-IP. I'm having trouble seeing any value to carrying IP in bundles; that seems less useful than PWE3 pseudowires. L. On 9 Oct 2008, at 17:37, Scott Burleigh wrote: > Lloyd Wood wrote: >> When is it a tunnel and not a convergence layer? >> > Depends on which is on top. When BP runs over IP (normally TCP/IP or > UDP/IP) -- that is, bundles are encapsulated within IP packets -- > the IP > stack is functioning as a DTN convergence-layer mechanism. When IP > runs > over BP -- that is, IP packets are encapsulated within bundles -- we > usually think of that as "tunneling"; the encapsulation relationship > is > inverted from the more typical configuration. > > Scott DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Received: from mail.jpl.nasa.gov (sentrion2.jpl.nasa.gov [128.149.139.106]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99GdNau005121 for ; Thu, 9 Oct 2008 09:39:24 -0700 Received: from xmta1.jpl.nasa.gov (xmta1.jpl.nasa.gov [137.78.160.144]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m99GbdRY007642 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Thu, 9 Oct 2008 16:37:40 GMT Received: from [127.0.0.1] ([137.79.30.244]) by xmta1.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m99Gbajk019494 for ; Thu, 9 Oct 2008 09:37:38 -0700 Message-ID: <48EE3350.1010102@jpl.nasa.gov> Date: Thu, 09 Oct 2008 09:37:36 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: DTN References: <20081009235750.AKO45377@metis.its.uow.edu.au> <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk> In-Reply-To: <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Source-IP: [137.79.30.244] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 16:39:24 -0000 Lloyd Wood wrote: > When is it a tunnel and not a convergence layer? > Depends on which is on top. When BP runs over IP (normally TCP/IP or UDP/IP) -- that is, bundles are encapsulated within IP packets -- the IP stack is functioning as a DTN convergence-layer mechanism. When IP runs over BP -- that is, IP packets are encapsulated within bundles -- we usually think of that as "tunneling"; the encapsulation relationship is inverted from the more typical configuration. Scott Received: from mail114.messagelabs.com (mail114.messagelabs.com [195.245.231.163]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m99GALZg003532 for ; Thu, 9 Oct 2008 09:10:21 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-2.tower-114.messagelabs.com!1223568518!50943254!1 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 25253 invoked from network); 9 Oct 2008 16:08:39 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-2.tower-114.messagelabs.com with SMTP; 9 Oct 2008 16:08:39 -0000 Received: from ads31.surrey.ac.uk ([131.227.120.131]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 17:08:38 +0100 Received: from [192.168.1.210] ([82.44.158.76]) by ads31.surrey.ac.uk over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 17:08:38 +0100 Message-Id: <1A680385-7673-48CB-986B-4CFEEE3A7316@surrey.ac.uk> From: Lloyd Wood To: "Scott, Keith L." In-Reply-To: Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Thu, 9 Oct 2008 17:08:36 +0100 References: <20081009235750.AKO45377@metis.its.uow.edu.au> X-Mailer: Apple Mail (2.929.2) X-OriginalArrivalTime: 09 Oct 2008 16:08:38.0509 (UTC) FILETIME=[4A48F1D0:01C92A29] Cc: DTN , Lloyd Wood Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 16:10:22 -0000 When is it a tunnel and not a convergence layer? thanks, L. On 9 Oct 2008, at 16:08, Scott, Keith L. wrote: > DTN2 provides a couple of DTNTunnel applications that do just this > (one > for TCP and one for UDP). > > These are great for small tests and demos. One problem can arise if > the applications themselves are not disruption-tolerant. Even though > DTN can keep IP packets from being dropped if the network gets > partitioned, the applications themselves may have heartbeats or > timeouts that will cause them to fail. > > Cool! > > --keith > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf > Of > David Young > Sent: Thursday, October 09, 2008 10:41 AM > To: mza981@uow.edu.au > Cc: DTN > Subject: Re: [dtn-interest] Integrating IP with BP > > We played around with this concept for a university research fair. > > We wanted to turn DTN into something a layman(and children) could > understand, so we wrote an ion application (not dtn2, although I'm > sure a dtn2 application could be written) that accepted IP packets > from a tunnel at one DTN endpoint, put them into bundles, then sent > them to another DTN endpoint which un-bundled the traffic and released > it onto the internet. > It involved applications at each DTN endpoint, as well as tunnel-type > interfaces with special routing rules at either end. > > The end result was that we could provide a demonstration of DTN at the > research fair by allowing people to access the web on 2 computers (one > using DTN tunneling, one not). We would modify the link connecting > the computers to the internet by adding artificial packet delay and/or > artificial packet corruption. > > On Thu, Oct 9, 2008 at 9:57 AM, wrote: >> Hi everyone, >> >> I have a question, maybe silly, but I really appreciate if someone > could give some insight into this. >> >> How can we integrate conventional IP with Bundle Protocol? For > example, we have a private IP network which intends to send and > receive > data to and from a DTN. What are the requirements for this scenario? >> >> Please let me if any resource on this matter is available. >> >> Thank you. >> >> Regards, >> Mohammad >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >> > > > > -- > David Young > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Received: from mail-gx0-f16.google.com (mail-gx0-f16.google.com [209.85.217.16]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99G9gpV003501 for ; Thu, 9 Oct 2008 09:09:42 -0700 Received: by gxk9 with SMTP id 9so153406gxk.13 for ; Thu, 09 Oct 2008 09:08:01 -0700 (PDT) Received: by 10.142.232.20 with SMTP id e20mr156725wfh.138.1223568480712; Thu, 09 Oct 2008 09:08:00 -0700 (PDT) Received: by 10.143.156.17 with HTTP; Thu, 9 Oct 2008 09:08:00 -0700 (PDT) Message-ID: <59e8babf0810090908n16dfd588p1854aa9f4fb52d62@mail.gmail.com> Date: Thu, 9 Oct 2008 09:08:00 -0700 From: "Michael Demmer" Sender: demmer@gmail.com To: "Scott, Keith L." In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <20081009235750.AKO45377@metis.its.uow.edu.au> X-Google-Sender-Auth: ae45dc620f2e916d Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 16:09:42 -0000 Just to be pedantic -- there's actually one dtntunnel application distributed with the reference implementation, and it has support for either TCP or UDP mode. -m On Thu, Oct 9, 2008 at 8:08 AM, Scott, Keith L. wrote: > DTN2 provides a couple of DTNTunnel applications that do just this (one > for TCP and one for UDP). > > These are great for small tests and demos. One problem can arise if > the applications themselves are not disruption-tolerant. Even though > DTN can keep IP packets from being dropped if the network gets > partitioned, the applications themselves may have heartbeats or > timeouts that will cause them to fail. > > Cool! > > --keith > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of > David Young > Sent: Thursday, October 09, 2008 10:41 AM > To: mza981@uow.edu.au > Cc: DTN > Subject: Re: [dtn-interest] Integrating IP with BP > > We played around with this concept for a university research fair. > > We wanted to turn DTN into something a layman(and children) could > understand, so we wrote an ion application (not dtn2, although I'm > sure a dtn2 application could be written) that accepted IP packets > from a tunnel at one DTN endpoint, put them into bundles, then sent > them to another DTN endpoint which un-bundled the traffic and released > it onto the internet. > It involved applications at each DTN endpoint, as well as tunnel-type > interfaces with special routing rules at either end. > > The end result was that we could provide a demonstration of DTN at the > research fair by allowing people to access the web on 2 computers (one > using DTN tunneling, one not). We would modify the link connecting > the computers to the internet by adding artificial packet delay and/or > artificial packet corruption. > > On Thu, Oct 9, 2008 at 9:57 AM, wrote: >> Hi everyone, >> >> I have a question, maybe silly, but I really appreciate if someone > could give some insight into this. >> >> How can we integrate conventional IP with Bundle Protocol? For > example, we have a private IP network which intends to send and receive > data to and from a DTN. What are the requirements for this scenario? >> >> Please let me if any resource on this matter is available. >> >> Thank you. >> >> Regards, >> Mohammad >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >> > > > > -- > David Young > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from mail114.messagelabs.com (mail114.messagelabs.com [195.245.231.163]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m99G974I003470 for ; Thu, 9 Oct 2008 09:09:07 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-4.tower-114.messagelabs.com!1223568444!43450844!1 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 14007 invoked from network); 9 Oct 2008 16:07:25 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-4.tower-114.messagelabs.com with SMTP; 9 Oct 2008 16:07:25 -0000 Received: from ads31.surrey.ac.uk ([131.227.120.131]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 17:07:24 +0100 Received: from [192.168.1.210] ([82.44.158.76]) by ads31.surrey.ac.uk over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Thu, 9 Oct 2008 17:07:24 +0100 Message-Id: <754BCCB1-0B2D-44A0-9592-9C88AA3BAB68@surrey.ac.uk> From: Lloyd Wood To: "" In-Reply-To: <20081009235750.AKO45377@metis.its.uow.edu.au> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Thu, 9 Oct 2008 17:07:23 +0100 References: <20081009235750.AKO45377@metis.its.uow.edu.au> X-Mailer: Apple Mail (2.929.2) X-OriginalArrivalTime: 09 Oct 2008 16:07:24.0538 (UTC) FILETIME=[1E31DDA0:01C92A29] Cc: DTN , Lloyd Wood Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 16:09:08 -0000 Mohammad, We've done what you ask by carrying the bundle protocol over an IP- based convergence layer - Saratoga - in a private IP network (that happens to involve a low-earth-orbiting satellite.) http://info.ee.surrey.ac.uk/Personal/L.Wood/dtn/ bundles can be carried over TCP-based or UDP-based convergence layers. The way to carry over TCP is not agreed; implementations do different things. The way to carry direct over UDP is not agreed, as implementations do different things, while Licklider, which is capable of running over UDP, and Saratoga, which only runs over UDP, provide alternative ways of carrying bundles over UDP. So, a bundle agent that is able to output and accept bundles over TCP/ IP or something/UDP/IP or direct over UDP is sufficient to turn a private DTN-like IP network into a bundle network. Most development of the reference bundle protocol implementation has been over IP networks. (there's a useful distinction to be drawn between DTNs in the abstract and bundle network implementations.) hope this helps, L. On 9 Oct 2008, at 14:57, wrote: > Hi everyone, > > I have a question, maybe silly, but I really appreciate if someone > could give some insight into this. > > How can we integrate conventional IP with Bundle Protocol? For > example, we have a private IP network which intends to send and > receive data to and from a DTN. What are the requirements for this > scenario? > > Please let me if any resource on this matter is available. > > Thank you. > > Regards, > Mohammad DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99FACGk000713 for ; Thu, 9 Oct 2008 08:10:12 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m99F8WMv030845 for ; Thu, 9 Oct 2008 11:08:32 -0400 Received: from imcfe2.MITRE.ORG (imcfe2.mitre.org [129.83.29.4]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m99F8V3c030828; Thu, 9 Oct 2008 11:08:31 -0400 Received: from IMCSRV1.MITRE.ORG ([129.83.20.158]) by imcfe2.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Thu, 9 Oct 2008 11:08:31 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 9 Oct 2008 11:08:28 -0400 Message-ID: In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] Integrating IP with BP Thread-Index: AckqHYYrGIjo/UElSy2GnTKNY9j/BgAAC/Gg References: <20081009235750.AKO45377@metis.its.uow.edu.au> From: "Scott, Keith L." To: "David Young" , X-OriginalArrivalTime: 09 Oct 2008 15:08:31.0602 (UTC) FILETIME=[E4669D20:01C92A20] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m99FACGk000713 Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 15:10:12 -0000 DTN2 provides a couple of DTNTunnel applications that do just this (one for TCP and one for UDP). These are great for small tests and demos. One problem can arise if the applications themselves are not disruption-tolerant. Even though DTN can keep IP packets from being dropped if the network gets partitioned, the applications themselves may have heartbeats or timeouts that will cause them to fail. Cool! --keith -----Original Message----- From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of David Young Sent: Thursday, October 09, 2008 10:41 AM To: mza981@uow.edu.au Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP We played around with this concept for a university research fair. We wanted to turn DTN into something a layman(and children) could understand, so we wrote an ion application (not dtn2, although I'm sure a dtn2 application could be written) that accepted IP packets from a tunnel at one DTN endpoint, put them into bundles, then sent them to another DTN endpoint which un-bundled the traffic and released it onto the internet. It involved applications at each DTN endpoint, as well as tunnel-type interfaces with special routing rules at either end. The end result was that we could provide a demonstration of DTN at the research fair by allowing people to access the web on 2 computers (one using DTN tunneling, one not). We would modify the link connecting the computers to the internet by adding artificial packet delay and/or artificial packet corruption. On Thu, Oct 9, 2008 at 9:57 AM, wrote: > Hi everyone, > > I have a question, maybe silly, but I really appreciate if someone could give some insight into this. > > How can we integrate conventional IP with Bundle Protocol? For example, we have a private IP network which intends to send and receive data to and from a DTN. What are the requirements for this scenario? > > Please let me if any resource on this matter is available. > > Thank you. > > Regards, > Mohammad > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > -- David Young _______________________________________________ dtn-interest mailing list dtn-interest@maillists.intel-research.net http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99F69qF000513 for ; Thu, 9 Oct 2008 08:06:09 -0700 Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga101.fm.intel.com with ESMTP; 09 Oct 2008 07:58:23 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.33,383,1220252400"; d="scan'208";a="625191430" Received: from unknown (HELO azsmsx601.amr.corp.intel.com) ([10.2.121.193]) by fmsmga001.fm.intel.com with ESMTP; 09 Oct 2008 08:02:39 -0700 Received: from orsmsx602.amr.corp.intel.com (10.22.226.211) by azsmsx601.amr.corp.intel.com (10.2.121.193) with Microsoft SMTP Server (TLS) id 8.1.291.1; Thu, 9 Oct 2008 08:01:48 -0700 Received: from orsmsx504.amr.corp.intel.com ([10.22.226.207]) by orsmsx602.amr.corp.intel.com ([10.22.226.211]) with mapi; Thu, 9 Oct 2008 08:01:48 -0700 From: "Fall, Kevin" To: David Young , "mza981@uow.edu.au" Date: Thu, 9 Oct 2008 08:01:45 -0700 Thread-Topic: [dtn-interest] Integrating IP with BP Thread-Index: AckqHv5uwnBiV/bWQVGZZscC5L3kbAAAOpBg Message-ID: <02968BB921677D479DAB47F25B731223DE462ADC@orsmsx504.amr.corp.intel.com> References: <20081009235750.AKO45377@metis.its.uow.edu.au> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m99F69qF000513 Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 15:06:10 -0000 is this related to the "dtntunnel" app that goes out with the reference implementation? - K -----Original Message----- From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of David Young Sent: Thursday, October 09, 2008 7:41 AM To: mza981@uow.edu.au Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP We played around with this concept for a university research fair. We wanted to turn DTN into something a layman(and children) could understand, so we wrote an ion application (not dtn2, although I'm sure a dtn2 application could be written) that accepted IP packets from a tunnel at one DTN endpoint, put them into bundles, then sent them to another DTN endpoint which un-bundled the traffic and released it onto the internet. It involved applications at each DTN endpoint, as well as tunnel-type interfaces with special routing rules at either end. The end result was that we could provide a demonstration of DTN at the research fair by allowing people to access the web on 2 computers (one using DTN tunneling, one not). We would modify the link connecting the computers to the internet by adding artificial packet delay and/or artificial packet corruption. On Thu, Oct 9, 2008 at 9:57 AM, wrote: > Hi everyone, > > I have a question, maybe silly, but I really appreciate if someone could give some insight into this. > > How can we integrate conventional IP with Bundle Protocol? For example, we have a private IP network which intends to send and receive data to and from a DTN. What are the requirements for this scenario? > > Please let me if any resource on this matter is available. > > Thank you. > > Regards, > Mohammad > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > -- David Young _______________________________________________ dtn-interest mailing list dtn-interest@maillists.intel-research.net http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.229]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99EgbDp031795 for ; Thu, 9 Oct 2008 07:42:37 -0700 Received: by rv-out-0506.google.com with SMTP id b25so42005rvf.49 for ; Thu, 09 Oct 2008 07:40:57 -0700 (PDT) Received: by 10.141.41.12 with SMTP id t12mr141220rvj.282.1223563257736; Thu, 09 Oct 2008 07:40:57 -0700 (PDT) Received: by 10.140.208.4 with HTTP; Thu, 9 Oct 2008 07:40:57 -0700 (PDT) Message-ID: Date: Thu, 9 Oct 2008 10:40:57 -0400 From: "David Young" To: mza981@uow.edu.au In-Reply-To: <20081009235750.AKO45377@metis.its.uow.edu.au> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <20081009235750.AKO45377@metis.its.uow.edu.au> Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 14:42:37 -0000 We played around with this concept for a university research fair. We wanted to turn DTN into something a layman(and children) could understand, so we wrote an ion application (not dtn2, although I'm sure a dtn2 application could be written) that accepted IP packets from a tunnel at one DTN endpoint, put them into bundles, then sent them to another DTN endpoint which un-bundled the traffic and released it onto the internet. It involved applications at each DTN endpoint, as well as tunnel-type interfaces with special routing rules at either end. The end result was that we could provide a demonstration of DTN at the research fair by allowing people to access the web on 2 computers (one using DTN tunneling, one not). We would modify the link connecting the computers to the internet by adding artificial packet delay and/or artificial packet corruption. On Thu, Oct 9, 2008 at 9:57 AM, wrote: > Hi everyone, > > I have a question, maybe silly, but I really appreciate if someone could give some insight into this. > > How can we integrate conventional IP with Bundle Protocol? For example, we have a private IP network which intends to send and receive data to and from a DTN. What are the requirements for this scenario? > > Please let me if any resource on this matter is available. > > Thank you. > > Regards, > Mohammad > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > -- David Young Received: from yx-out-2324.google.com (yx-out-2324.google.com [74.125.44.29]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99ER2kS031022 for ; Thu, 9 Oct 2008 07:27:03 -0700 Received: by yx-out-2324.google.com with SMTP id 3so8517yxj.79 for ; Thu, 09 Oct 2008 07:25:23 -0700 (PDT) Received: by 10.100.46.10 with SMTP id t10mr207593ant.136.1223562322987; Thu, 09 Oct 2008 07:25:22 -0700 (PDT) Received: by 10.100.13.13 with HTTP; Thu, 9 Oct 2008 07:25:22 -0700 (PDT) Message-ID: <27ebb19c0810090725g3520548csa71caee2c09ba97b@mail.gmail.com> Date: Thu, 9 Oct 2008 10:25:22 -0400 From: "flavio esposito" To: mza981@uow.edu.au In-Reply-To: <20081009235750.AKO45377@metis.its.uow.edu.au> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <20081009235750.AKO45377@metis.its.uow.edu.au> Cc: DTN Subject: Re: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 14:27:03 -0000 Mohammad, You can start your research from the references of my work on "PreDA" It is only an initial result published in a DEMO session at CHANTS (@MOBICOM 2008) but at least I was the fastest to reply you :) I hope you find the testbed useful. If you have any questions, let us know. http://csr.bu.edu/preda/#Publications Flavio Esposito 2008/10/9 : > Hi everyone, > > I have a question, maybe silly, but I really appreciate if someone could give some insight into this. > > How can we integrate conventional IP with Bundle Protocol? For example, we have a private IP network which intends to send and receive data to and from a DTN. What are the requirements for this scenario? > > Please let me if any resource on this matter is available. > > Thank you. > > Regards, > Mohammad > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from evaki.its.uow.edu.au (evaki.its.uow.edu.au [130.130.68.32]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m99E0Tf1029838 for ; Thu, 9 Oct 2008 07:00:29 -0700 Received: from jinn-nat.its.uow.edu.au ([130.130.68.211] helo=jinn.its.uow.edu.au) by evaki.its.uow.edu.au with esmtp (Exim 4.69) (envelope-from ) id 1Knw2S-0001EJ-I3 for dtn-interest@mailman.dtnrg.org; Fri, 10 Oct 2008 00:58:48 +1100 Received: from metis.its.uow.edu.au (metis.its.uow.edu.au [130.130.68.28]) by jinn.its.uow.edu.au (MOS 3.10.2-GA) with ESMTP id AOR50792; Thu, 9 Oct 2008 23:57:51 +1000 (EST) Received: (from metis.its.uow.edu.au [130.130.68.101]) by metis.its.uow.edu.au (MOS 3.10.2-GA) with HTTP/1.1 id AKO45377 (AUTH mza981); Thu, 9 Oct 2008 23:57:50 +1000 (EST) From: To: DTN X-Mailer: Mirapoint Webmail Direct 3.10.2-GA MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-Id: <20081009235750.AKO45377@metis.its.uow.edu.au> Date: Thu, 9 Oct 2008 23:57:50 +1000 (EST) Subject: [dtn-interest] Integrating IP with BP X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Oct 2008 14:00:30 -0000 Hi everyone, I have a question, maybe silly, but I really appreciate if someone could give some insight into this. How can we integrate conventional IP with Bundle Protocol? For example, we have a private IP network which intends to send and receive data to and from a DTN. What are the requirements for this scenario? Please let me if any resource on this matter is available. Thank you. Regards, Mohammad Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m97K9pNc012356 for ; Tue, 7 Oct 2008 13:09:52 -0700 Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id m97K8sO9011449 for ; Tue, 7 Oct 2008 15:08:55 -0500 Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.12.11/8.13.1) with ESMTP id m97K8sSs026720 for ; Tue, 7 Oct 2008 15:08:55 -0500 Received: from [192.168.4.98] ([157.185.80.253]) by nemo.columbia.ads.sparta.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 7 Oct 2008 16:08:54 -0400 From: "Peter Lovell" To: "dtn interest" Date: Tue, 7 Oct 2008 16:08:53 -0400 Message-Id: <20081007200853.1278838090@127.0.0.1> X-Mailer: CTM PowerMail version 5.6.5 build 4509 English (intel) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-OriginalArrivalTime: 07 Oct 2008 20:08:54.0363 (UTC) FILETIME=[85FA32B0:01C928B8] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m97K9pNc012356 Subject: [dtn-interest] dtn X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Oct 2008 20:09:52 -0000 A distributed tree network -- probably a good application for dtn Received: from mail115.messagelabs.com (mail115.messagelabs.com [195.245.231.179]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m93IcOd2017620 for ; Fri, 3 Oct 2008 11:38:25 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-6.tower-115.messagelabs.com!1223057473!33741854!1 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 20248 invoked from network); 3 Oct 2008 18:11:14 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-6.tower-115.messagelabs.com with SMTP; 3 Oct 2008 18:11:14 -0000 Received: from ads31.surrey.ac.uk ([131.227.120.131]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 19:11:13 +0100 Received: from [192.168.1.210] ([82.44.158.76]) by ads31.surrey.ac.uk over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 19:11:13 +0100 Message-Id: From: Lloyd Wood To: Stephen Farrell , Kevin Fall , weddy@grc.nasa.gov In-Reply-To: <48E5ECD9.1020807@cs.tcd.ie> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Fri, 3 Oct 2008 19:11:12 +0100 References: <48E5ECD9.1020807@cs.tcd.ie> X-Mailer: Apple Mail (2.929.2) X-OriginalArrivalTime: 03 Oct 2008 18:11:13.0268 (UTC) FILETIME=[6B959B40:01C92583] Cc: DTN , Lloyd Wood Subject: Re: [dtn-interest] Possible DTNRG standalone meeting - San Francisco March 19-20 2009 X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 18:38:26 -0000 I would attend. A meeting near an IETF in SF can be combined with a trip to Cisco's San Jose HQ for me, so it's good all round. cheers, L. On 3 Oct 2008, at 10:58, Stephen Farrell wrote: > > Hi, > > Earlier we had some discussion about meeting frequency and > whether to have a standalone DTNRG meeting early next year. > > Thanks to Google (as prompted by Adrian Hooke from NASA) we > have an offer to host us for a 2 day slot just before the San > Francisco IETF, in Mountain View on 19-20 March. > > I realise that this'd make for a looooong trip for regular > IETFers, but OTOH, that's probably cheaper and not all of > us go to every IETF so maybe its ok. But since I'm not sure > I'd like to check. > > So, can you let Kevin and I know (offlist, any time in the > next week) if you'd plan to attend as above, or if you think > its such a terrible idea to have a meeting right before an > IETF that you're not coming but you otherwise would have come > to a standalone meeting. > > In other words just send one of the following to Kevin and I, > before the end of Oct 10: > > a) I plan to attend, or, > b) I would plan to go to a DTNRG standalone, but won't attend this > because its adjacent to the IETF meeting, or, > c) I can't make that date/location, but don't care about IETF > adjacency, or, > d) why are you bothering me with this nonsense? :-) > > I'll get back to the list then... (If there are split opinions > or something then let's discuss that then, rather than have an > abstract discussion now about whether its good, bad or indifferent > to have IRTF RGs meet just before the IETF.) > > Thanks, > Stephen. > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Received: from mail115.messagelabs.com (mail115.messagelabs.com [195.245.231.179]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m93GTub1011771 for ; Fri, 3 Oct 2008 09:29:56 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-2.tower-115.messagelabs.com!1223049764!57132717!1 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 11112 invoked from network); 3 Oct 2008 16:02:44 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-2.tower-115.messagelabs.com with SMTP; 3 Oct 2008 16:02:44 -0000 Received: from ads31.surrey.ac.uk ([131.227.120.131]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 17:02:44 +0100 Received: from [192.168.1.210] ([82.44.158.76]) by ads31.surrey.ac.uk over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 17:02:43 +0100 Message-Id: <5E74FBE6-6981-4560-9C06-66968A81B8B5@surrey.ac.uk> From: Lloyd Wood To: Peter Lovell In-Reply-To: <20081003132337.1985020735@127.0.0.1> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Fri, 3 Oct 2008 17:02:43 +0100 References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF 002E5AF5F@IMCSRV4.MITRE.ORG> <20081003001118.65661544@127.0.0.1> <48E5E421.5010401@cs.tcd.ie> <20081003132337.1985020735@127.0.0.1> X-Mailer: Apple Mail (2.929.2) X-OriginalArrivalTime: 03 Oct 2008 16:02:43.0721 (UTC) FILETIME=[78561790:01C92571] Cc: dtn interest , Lloyd Wood Subject: Re: [dtn-interest] Re(2): Re(2): mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 16:29:57 -0000 >> Exactly. For the rest of dtn, they're mutable (or, rather, >> mutability is > not defined). But payload integrity wants them immutable, for its > own benefit. > > Not fair -- payload integrity should not impose that requirement on > others. The above combines not having errors in a payload for payload integrity, with not having errors in header/metadata external to the payload. IP transport protocols (TCP/UDP, and ICMP etc. for IPv6) combines these in the single pseudo-header check for efficiency reasons (IPv6 discards the IPv4 header checksum because there's a tight control loop and it can do so.) Security usually needs to cover both payload and headers so that the destination and source addresses are included in the security check and not changed. But end-to-end (or better, since we're not at the application: edge-to-edge) header/metadata reliability can be done separately from payload integrity. Of the two: payload integrity and header (address field etc.) integrity, the latter is actually the more important, in that it is not optional. But there's no way to simply only cover the header/metadata fields and not the payloads with an edge-to-edge check between endnodes. (The existing custody transfer mechanism doesn't consider this at all.) It's worth trying this exercise - whenever you say 'mutability', say 'corruptability' instead. Mutability is a good idea. Corruptability is a good idea. Mutability opens the door to new applications and ways of using the network. Corruptability opens the door to new applications and ways of using the network. Is there a good reason for having corruptable EIDs? L. DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Received: from indomitable.uta.edu (indomitable.uta.edu [129.107.56.238]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m93Ehms0006912 for ; Fri, 3 Oct 2008 07:43:48 -0700 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: Aq4GADvG5UiBazg8/2dsb2JhbACCQy+PO6MrBgKGMDxiAQh9 X-IronPort-AV: E=Sophos;i="4.33,356,1220227200"; d="scan'208,217";a="111555880" Received: from wolf3.uta.edu (HELO MAILST1.uta.edu) ([129.107.56.60]) by mail.uta.edu with ESMTP; 03 Oct 2008 14:16:42 +0000 x-mimeole: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C92562.A8B90B84" Date: Fri, 3 Oct 2008 09:16:23 -0500 Message-ID: <5FC9D45135986C4398EFDB937D693394019A0137@MAILST1.uta.edu> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: IQ2S'09: Call for papers Thread-Index: Acj1bf+J6Fn6NoDHQueuiSFQVV0eswAAlQS8AAvX59gADTSFugABI5sjAADNfikAAFgktQusOK3hAABoTPMAL2BjkAAAQYZWAADwNnAAAlIS/QAADE1vAABfE78AAJE1YwAARAEKAAAv+rsAAD9YUAAAB62M References: <162B8AFBFBBB2148A9A1B8F9C5753428FE5412@mailbe01.teak.local.net> <162B8AFBFBBB2148A9A1B8F9C575342803264283@mailbe01.teak.local.net> <358486CF38F8EA409E72DAB944FBC60602DEA60F@MAILFS2.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC5@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC6@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC7@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D6933940199FFC8@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A00F0@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A00F2@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0108@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A010A@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0115@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A012E@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A012F@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0131@MAILST1.uta.edu> <5FC9D45135986C4398EFDB93 7D693394019A0133@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0134@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0135@MAILST1.uta.edu> <5FC9D45135986C4398EFDB937D693394019A0136@MAILST1.uta.edu> From: "Ammari, Habib M" To: Subject: [dtn-interest] IQ2S'09: Call for papers X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 14:43:49 -0000 This is a multi-part message in MIME format. ------_=_NextPart_001_01C92562.A8B90B84 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Dear Colleagues, We apologize if you receive multiple copies. Please find below the Call for papers for IQ2S 2009, The First = International Workshop on Information Quality and Quality of Service for Pervasive Computing, = which will be held in conjunction with IEEE PerCom 2009, Galveston, Texas, March 9-13, = 2009. We would appreciate it very much if you could disseminate this CFP to = your colleagues and students! Best Regards, Wendong Xiao, Institute for Infocomm Research, Singapore Habib M. Ammari, the University of Texas at Arlington, USA Program Co-Chairs -------------------------------------------------------------------------= ----------------------------------------------------------- CALL FOR PAPERS =20 The First International Workshop on Information Quality and Quality of = Service for Pervasive Computing (IQ2S 2009) Website: http://iq2s2009.i2r.a-star.edu.sg = = > > In Conjunction with IEEE PerCom 2009 (http://www.percom.org = > > ) Galveston, Texas, March 9-13, 2009 =20 Quality of service (QoS) has been studied in various building = blocks in pervasive computing, e.g., different QoS mechanisms are = presented for wireless or wired networks, with QoS metrics being = described in terms of delay, bandwidth, and/or data loss etc. The = emerging pervasive computing is application-driven and mission-critical, = therefore the information quality (IQ), such as the accuracy of target = tracking or event detection, is also critical for the end users, service = providers and the system designers. IQ and QoS provisioning for = pervasive computing is challenging and difficult due to the = resource-constrained, dynamic and distributed nature of the system, the = weakness under security attacking, and the lack of a holistic design = approach which takes into account the different types of resources and = their inter-dependencies. =20 The objective of this workshop is to provide a forum to exchange = ideas, present results, share experience, and enhance collaborations = among researchers, professionals, and application developers in various = aspects of IQ and QoS for pervasive computing. Topics of interest = include but are not limited to: * System architecture for IQ and QoS provisioning * IQ-oriented signal & information processing (e.g., = source coding and data compression) * QoS for target/event detection, localization, = tracking and classification * QoS for wireless ad hoc and sensor networks = (including coverage and connectivity) * QoS for task mapping and scheduling * Cross-layer design for coordinated QoS (including = IQ-QoS integration) * Adaptative IQ and QoS under dynamic environments * Trust, security and privacy issues in IQ and QoS * Development environments and programming languages = for IQ and QoS * IQ and QoS for emerging pervasive computing = applications, such as three-dimensional wireless sensor networks (like = underwater sensor network), healthcare, and structural health monitoring * Prototype test-bed design, implementation, and = field trials Submission Instructions The submitted paper should be in the IEEE conference format = (author guidelines can be found at = ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM = ) = and should be no more than 6 pages in length. The paper should not be = previously published or currently under review elsewhere. Only = electronic submissions in PDF format will be considered. Detailed = electronic submission procedures will be announced later. All = submissions will be peer-reviewed and selected based on their = originality, merit, and relevance to the workshop. Accepted papers will = be published by the IEEE Computer Society Press in the combined PerCom = 2009 workshops proceedings. At least one author of each accepted paper = must register and attend the workshop to present the paper. General Co-Chairs Sajal K. Das, the University of Texas at Arlington, USA Chen Khong Tham, Institute for Infocomm Research, Singapore =20 Program Co-Chairs Wendong Xiao, Institute for Infocomm Research, Singapore Habib M. Ammari, the University of Texas at Arlington, USA =20 Important Dates Paper submission: 25 October 2008 Author notification: 19 December 2008 Camera-ready due: 7 January 2009 -------------------------------------------------------------------------= ----------------------------------------------------------- ------_=_NextPart_001_01C92562.A8B90B84 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= =0A= [computational.science] IQ2S'09: Call for papers=0A= =0A= =0A=
Dear = Colleagues,

We =0A= apologize if you receive multiple copies.

Please find below the = Call for =0A= papers for IQ2S 2009, The First International Workshop
on Information = Quality =0A= and Quality of Service for Pervasive Computing, which will be held
in =0A= conjunction with IEEE PerCom 2009, Galveston, Texas, March 9-13, = 2009.

We =0A= would appreciate it very much if you could disseminate this CFP to your =0A= colleagues and students!

Best Regards,

Wendong Xiao, = Institute for =0A= Infocomm Research, Singapore
Habib M. Ammari, the University of Texas = at =0A= Arlington, USA

Program =0A= Co-Chairs

--------------------------------------------------------= -------------------------------------------------------------------------= ---
CALL =0A= FOR PAPERS
      
The First = International =0A= Workshop on Information Quality and Quality of Service for Pervasive = Computing =0A= (IQ2S 2009)
Website: http://iq2s2009.i2r.a-star.edu= .sg =0A= <http://iq2s2009.i2r.a-star.ed= u.sg/>  =0A= <http://iq2s2009.i2r.a-star.edu.sg/ =0A= > >
In Conjunction with IEEE PerCom 2009 (http://www.percom.org <http://www.percom.org/>  = <http://www.percom.org/ =0A= > > )
Galveston, Texas, March 9-13, =0A= 2009

      
   &nb= sp;    =0A= Quality of service (QoS) has been studied in various building blocks in =0A= pervasive computing, e.g., different QoS mechanisms are presented for = wireless =0A= or wired networks, with QoS metrics being described in terms of delay, =0A= bandwidth, and/or data loss etc. The emerging pervasive computing is =0A= application-driven and mission-critical, therefore the information = quality (IQ), =0A= such as the accuracy of target tracking or event detection, is also = critical for =0A= the end users, service providers and the system designers. IQ and QoS =0A= provisioning for pervasive computing is challenging and difficult due to = the =0A= resource-constrained, dynamic and distributed nature of the system, the = weakness =0A= under security attacking, and the lack of a holistic design approach = which takes =0A= into account the different types of resources and their =0A= inter-dependencies.
      
 &nbs= p;      =0A= The objective of this workshop is to provide a forum to exchange ideas, = present =0A= results, share experience, and enhance collaborations among researchers, =0A= professionals, and application developers in various aspects of IQ and = QoS for =0A= pervasive computing. Topics of interest include but are not limited =0A= to:

        =0A= *            = System =0A= architecture for IQ and QoS =0A= provisioning

        =0A= *            = IQ-oriented =0A= signal & information processing (e.g., source coding and data =0A= compression)

        =0A= *            QoS = for =0A= target/event detection, localization, tracking and =0A= classification

        =0A= *            QoS = for =0A= wireless ad hoc and sensor networks (including coverage and =0A= connectivity)

        =0A= *            QoS = for task =0A= mapping and scheduling

        =0A= *            = Cross-layer =0A= design for coordinated QoS (including IQ-QoS =0A= integration)

        =0A= *            = Adaptative =0A= IQ and QoS under dynamic =0A= environments

        =0A= *            = Trust, =0A= security and privacy issues in IQ and =0A= QoS

        =0A= *            = Development =0A= environments and programming languages for IQ and =0A= QoS

        =0A= *            IQ = and QoS =0A= for emerging pervasive computing applications, such as three-dimensional =0A= wireless sensor networks (like underwater sensor network), healthcare, = and =0A= structural health = monitoring

        =0A= *            = Prototype =0A= test-bed design, implementation, and field =0A= trials

        Submission =0A= Instructions

        The = submitted =0A= paper should be in the IEEE conference format (author guidelines can be = found at =0A= ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM =0A= <ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM&g= t; =0A= ) and should be no more than 6 pages in length. The paper should not be =0A= previously published or currently under review elsewhere. Only = electronic =0A= submissions in PDF format will be considered. Detailed electronic = submission =0A= procedures will be announced later. All submissions will be = peer-reviewed and =0A= selected based on their originality, merit, and relevance to the = workshop. =0A= Accepted papers will be published by the IEEE Computer Society Press in = the =0A= combined PerCom 2009 workshops proceedings. At least one author of each = accepted =0A= paper must register and attend the workshop to present the =0A= paper.

        General =0A= Co-Chairs

        Sajal K. = Das, the =0A= University of Texas at Arlington, =0A= USA
        Chen Khong Tham, = Institute for =0A= Infocomm Research, =0A= Singapore
      
   &n= bsp;    =0A= Program Co-Chairs
        Wendong = Xiao, =0A= Institute for Infocomm Research, =0A= Singapore
        Habib M. Ammari, = the =0A= University of Texas at Arlington, =0A= USA
      
    &n= bsp;   =0A= Important Dates
        Paper =0A= submission:    25 October =0A= 2008
        Author = notification:  19 =0A= December 2008
        Camera-ready =0A= due:      7 January =0A= 2009
-----------------------------------------------------------------= -------------------------------------------------------------------
=0A= =0A= =0A= ------_=_NextPart_001_01C92562.A8B90B84-- Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m93Don3G004449 for ; Fri, 3 Oct 2008 06:50:49 -0700 Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id m93DNe5J023432; Fri, 3 Oct 2008 08:23:40 -0500 Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.12.11/8.13.1) with ESMTP id m93DNeFP005925; Fri, 3 Oct 2008 08:23:40 -0500 Received: from [192.168.4.98] ([157.185.80.253]) by nemo.columbia.ads.sparta.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 09:23:38 -0400 From: "Peter Lovell" To: "Stephen Farrell" Date: Fri, 3 Oct 2008 09:23:37 -0400 Message-Id: <20081003132337.1985020735@127.0.0.1> In-Reply-To: <48E5E421.5010401@cs.tcd.ie> References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF 002E5AF5F@IMCSRV4.MITRE.ORG> <20081003001118.65661544@127.0.0.1> <48E5E421.5010401@cs.tcd.ie> X-Mailer: CTM PowerMail version 5.6.5 build 4509 English (intel) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-OriginalArrivalTime: 03 Oct 2008 13:23:38.0961 (UTC) FILETIME=[3F374C10:01C9255B] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m93Don3G004449 Cc: dtn interest Subject: [dtn-interest] Re(2): Re(2): mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 13:50:52 -0000 On Fri, Oct 3, 2008, Stephen Farrell wrote: > >Hi Pete, > >Peter Lovell wrote: >> My preference to put the onus upon the system component that benefits, >> in this case it's bundle security. > >I don't understand the above. Mutable EIDs are a security benefit? Seems >the other way around to me - if we allow 'em generally, then they create >a security headache. Exactly. For the rest of dtn, they're mutable (or, rather, mutability is not defined). But payload integrity wants them immutable, for its own benefit. Not fair -- payload integrity should not impose that requirement on others. >(Though I still want to allow 'em.) That's OK with me -- I don't have a strong feeling either way. >> If payload integrity wants to include >> the source and destination addresses as part of the digest then it >> should carry those to the destination. > >Again, I'm confused. If there's a reason to mutate EIDs while a >bundle's in transit then that impacts on e2e integrity checks if >the EID is part of the digest. (Can't recall if it is or not >right now & that doc's one of our many currently expired >drafts it seems.) > >Am I missing something here - is there a (so far unstated) reason >for mutable EIDs in order to add something to the set of security >mechanisms? If so, maybe you can help me out with an example. Or >maybe I'm just confused as usual;-) The EID is part of the integrity check for payload integrity (aside: also for BA but that's hop-by-hop so there's no issue with mutability). So changing source or destination EID will break the payload integrity check (I remember the NAT and IPSec issues - something similar) As I said, I don't have a strong preference one way or the other. But ... - if it is mutable (and so it seems to be for bundle protocol), and - if Payload Integrity would like to digest it ... then PI should do the work. Cheers.....Peter Received: from mail83.messagelabs.com (mail83.messagelabs.com [195.245.231.83]) by maillists.intel-research.net (8.13.8/8.13.8) with SMTP id m93BsOKc031590 for ; Fri, 3 Oct 2008 04:54:24 -0700 X-VirusChecked: Checked X-Env-Sender: L.Wood@surrey.ac.uk X-Msg-Ref: server-13.tower-83.messagelabs.com!1223033179!63470022!2 X-StarScan-Version: 5.5.12.14.2; banners=-,-,- X-Originating-IP: [131.227.102.140] Received: (qmail 15979 invoked from network); 3 Oct 2008 11:26:24 -0000 Received: from ads40.surrey.ac.uk (HELO ads40.surrey.ac.uk) (131.227.102.140) by server-13.tower-83.messagelabs.com with SMTP; 3 Oct 2008 11:26:24 -0000 Received: from ads31.surrey.ac.uk ([131.227.120.131]) by ads40.surrey.ac.uk with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 12:26:21 +0100 Received: from [192.168.1.210] ([82.44.158.76]) by ads31.surrey.ac.uk over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 3 Oct 2008 12:26:20 +0100 Message-Id: From: Lloyd Wood To: Stephen Farrell In-Reply-To: <48E5E421.5010401@cs.tcd.ie> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Date: Fri, 3 Oct 2008 12:26:20 +0100 References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> <20081003001118.65661544@127.0.0.1> <48E5E421.5010401@cs.tcd.ie> X-Mailer: Apple Mail (2.929.2) X-OriginalArrivalTime: 03 Oct 2008 11:26:21.0234 (UTC) FILETIME=[DC676120:01C9254A] Cc: dtn interest , Lloyd Wood Subject: Re: [dtn-interest] Re(2): mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 11:54:25 -0000 On 3 Oct 2008, at 10:21, Stephen Farrell wrote: > Hi Pete, > > Peter Lovell wrote: >> My preference to put the onus upon the system component that >> benefits, >> in this case it's bundle security. > > I don't understand the above. Mutable EIDs are a security benefit? > Seems > the other way around to me - if we allow 'em generally, then they > create > a security headache. (Though I still want to allow 'em.) Well, making the EID mutable is also a reliability problem. It's hard to determine if changes in a mutable EID are deliberate or due to errors in hosts/links. (Since the bundle protocol isn't reliable anyway, this is arguably a minor loss.) A mutable EID also permits Network Address Translation (NAT) in the network. Given those points, why would this be a good idea? Susan notes: >>> Basically, the idea is that the destination EID field would >>> reference >>> the mutable portion of the destination EID twice: once in the >>> mutable >>> portion, so it would arrive at the destination in tact, and once >>> in the >>> non-mutable portion, so it could serve whatever its purpose is as >>> the >>> mutable part of the destination EID and not necessarily arrive at >>> the >>> destination EID in tact. This is equivalent to having the applications aware of IP addresses, and embedding IP addresses in their output. Breaks NAT, breaks application-level gateways, breaks layering... >>> Of course this means that we'd need two >>> special characters: one to distinguish the mutable from the non- >>> mutable >>> portion, and one to use within the non-mutable portion to identify >>> where the "would-be" mutable portion begins....and with this one >>> begins >>> to see the potential complexity that Stephen alludes to. The demarcation and special characters are the easy bit, really. (Easier than SDNVs.) It's what doing this implies to the entire architecture that is the real problem. One possibility might be to have the EID includes its own hash, which reliably indicates which part is mutable or not, but hashes the entire EID. To alter the mutable part, deliberately recomputing the hash would be required (akin to an IPv4 header checksum, and moving towards separate header/payload checks, rather than the payload+header-fields pseudoheader effects of existing canonicalisations). This isn't end-to- end, though. Making the EIDs mutable has a lot of far-reaching architectural and reliability effects. That it's not ruled out in the canonicalisation possibilities doesn't bode well for reliability, imo. L. DTN work: http://info.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Received: from mail.newbay.com (87-198-172-198.ptr.magnet.ie [87.198.172.198]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m93APHLu027035 for ; Fri, 3 Oct 2008 03:25:17 -0700 Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.newbay.com (Postfix) with ESMTP id 310D8100415EB for ; Fri, 3 Oct 2008 10:58:16 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail.newbay.com ([127.0.0.1]) by localhost (mail.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pD7Qb1QrhEm5 for ; Fri, 3 Oct 2008 10:58:15 +0100 (IST) Received: from [192.168.3.55] (unknown [192.168.3.55]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.newbay.com (Postfix) with ESMTP id A3B0F100415C7 for ; Fri, 3 Oct 2008 10:58:15 +0100 (IST) Message-ID: <48E5ECD9.1020807@cs.tcd.ie> Date: Fri, 03 Oct 2008 10:58:49 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: DTN X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: [dtn-interest] Possible DTNRG standalone meeting - San Francisco March 19-20 2009 X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 10:25:18 -0000 Hi, Earlier we had some discussion about meeting frequency and whether to have a standalone DTNRG meeting early next year. Thanks to Google (as prompted by Adrian Hooke from NASA) we have an offer to host us for a 2 day slot just before the San Francisco IETF, in Mountain View on 19-20 March. I realise that this'd make for a looooong trip for regular IETFers, but OTOH, that's probably cheaper and not all of us go to every IETF so maybe its ok. But since I'm not sure I'd like to check. So, can you let Kevin and I know (offlist, any time in the next week) if you'd plan to attend as above, or if you think its such a terrible idea to have a meeting right before an IETF that you're not coming but you otherwise would have come to a standalone meeting. In other words just send one of the following to Kevin and I, before the end of Oct 10: a) I plan to attend, or, b) I would plan to go to a DTNRG standalone, but won't attend this because its adjacent to the IETF meeting, or, c) I can't make that date/location, but don't care about IETF adjacency, or, d) why are you bothering me with this nonsense? :-) I'll get back to the list then... (If there are split opinions or something then let's discuss that then, rather than have an abstract discussion now about whether its good, bad or indifferent to have IRTF RGs meet just before the IETF.) Thanks, Stephen. Received: from mail.newbay.com (87-198-172-198.ptr.magnet.ie [87.198.172.198]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m939m5Yr025345 for ; Fri, 3 Oct 2008 02:48:06 -0700 Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.newbay.com (Postfix) with ESMTP id 9F24A100415EB; Fri, 3 Oct 2008 10:21:05 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail.newbay.com ([127.0.0.1]) by localhost (mail.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3gtQYSAn1bNf; Fri, 3 Oct 2008 10:21:04 +0100 (IST) Received: from [192.168.3.55] (unknown [192.168.3.55]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.newbay.com (Postfix) with ESMTP id 5F73E100415C7; Fri, 3 Oct 2008 10:21:03 +0100 (IST) Message-ID: <48E5E421.5010401@cs.tcd.ie> Date: Fri, 03 Oct 2008 10:21:37 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: Peter Lovell References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> <20081003001118.65661544@127.0.0.1> In-Reply-To: <20081003001118.65661544@127.0.0.1> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: dtn interest Subject: Re: [dtn-interest] Re(2): mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 09:48:07 -0000 Hi Pete, Peter Lovell wrote: > My preference to put the onus upon the system component that benefits, > in this case it's bundle security. I don't understand the above. Mutable EIDs are a security benefit? Seems the other way around to me - if we allow 'em generally, then they create a security headache. (Though I still want to allow 'em.) > If payload integrity wants to include > the source and destination addresses as part of the digest then it > should carry those to the destination. Again, I'm confused. If there's a reason to mutate EIDs while a bundle's in transit then that impacts on e2e integrity checks if the EID is part of the digest. (Can't recall if it is or not right now & that doc's one of our many currently expired drafts it seems.) Am I missing something here - is there a (so far unstated) reason for mutable EIDs in order to add something to the set of security mechanisms? If so, maybe you can help me out with an example. Or maybe I'm just confused as usual;-) S. > With EID references as we have > them, that should (although I haven't checked) require no additional > overhead in the common case where the address does not in fact change. > > Regards.....Peter > > > On Wed, Oct 1, 2008, Symington, Susan F. wrote: > >> Rajesh, >> >> This is an interesting thought. I don't know if there is a requirement >> to carry an entire destination EID in tact, but if there is, I think it >> could still be handled by an EID scheme that has a mutable and >> non-mutable part such as we are proposing. >> >> Would the requirement you are surmising be satisfied by a scheme in >> which the source places the entire (mutable and non-mutable portion) of >> the destination EID in the non-mutable part of the destination EID >> field, and then also places the mutable portion of the destination EID >> in the mutable portion of the destination EID field? (This is very >> difficult to explain without being confusing!) >> >> Basically, the idea is that the destination EID field would reference >> the mutable portion of the destination EID twice: once in the mutable >> portion, so it would arrive at the destination in tact, and once in the >> non-mutable portion, so it could serve whatever its purpose is as the >> mutable part of the destination EID and not necessarily arrive at the >> destination EID in tact. Of course this means that we'd need two >> special characters: one to distinguish the mutable from the non-mutable >> portion, and one to use within the non-mutable portion to identify >> where the "would-be" mutable portion begins....and with this one begins >> to see the potential complexity that Stephen alludes to. >> >> -susan >> ***************************************************************** >> Susan Symington >> The MITRE Corporation >> susan@mitre.org >> 703-983-7209 (voice) >> 703-983-7142 (fax) >> ****************************************************************** >> >>> -----Original Message----- >>> From: Rajesh Krishnan [mailto:rjsh.krshnn@gmail.com] >>> Sent: Monday, September 29, 2008 5:42 PM >>> To: Symington, Susan F. >>> Cc: dtn-interest@mailman.dtnrg.org >>> Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice >>> >>> Susan, >>> >>> Is there a requirement from any DTN stakeholders to record, protect, >>> and carry end-to-end the entire destination EID (with all attributes >>> intact) exactly as specified by the source? For example, recovery >> >from mis-routing might need this. >>> An alternative is to hold the mutations -- with audit records per >>> mutation if needed -- in a meta-data extension block. Definitely not >>> as nice as encoding mutables in the EID :( >>> >>> Best Regards, >>> Rajesh >>> >>> On Mon, Sep 29, 2008 at 4:26 PM, Symington, Susan F. >>> wrote: >>>> The Bundle Protocol defines EIDs to have the general structure of >>>> >>>> < scheme name > : < scheme-specific part >, says that the scheme is >>> the set >>>> of rules for parsing and interpreting the SSP, and pretty much >> leaves >>> things >>>> open from there. >>>> >>>> >>>> >>>> In the Bundle Security Protocol (BSP), as currently drafted, we >> assume >>> that >>>> EIDs are non-mutable. However, this is not necessarily a valid >>> assumption. >>>> One may want to have a scheme that defines an SSP that has both a >>>> non-mutable portion and a mutable portion. The mutable portion might >>> be used >>>> for purposes of mobility. Stephen Farrell offers the following >> example >>> of a >>>> possible EID: >>>> >>>> >>>> >>>> "dtn://foo.bar/baz?LASTSEENAT=10.0.0.1" >>>> >>>> >>>> >>>> where "LASTSEENAT=10.0.0.1" is a mutable part. (The exact definition >>> of the >>>> scheme is not what is important at this point. What is important is >>> that we >>>> recognize that EIDs may have non-mutable parts and we make sure that >>> the >>>> specifications are written correctly so as to allow for this >>> possibility.) >>>> >>>> >>>> As far as the BSP is concerned, we need to revise the mutable >>>> canonicalization section of the BSP to allow for the possibility >> that >>> EIDs >>>> may have mutable parts, because these parts of the EIDs will need to >>> be left >>>> out of the mutable canonical form. Making this change is not >> difficult >>> and >>>> in fact attached is a draft set of revisions for doing so. What does >>> get >>>> tricky, though, is that if every scheme has a different way of >>> denoting >>>> which parts of the EID are mutable and which are non-mutable, then >> any >>> given >>>> implementation of the BSP would have to be equipped with a different >>> set of >>>> rules for how to perform the canonicalization for each scheme. If >>> scheme >>>> Alpha says that all characters that follow the "|" character in the >>> SSP are >>>> mutable, then the BSP needs to know that for this scheme, all >>> characters >>>> that follow the "|" in the SSP get left out of the mutable canonical >>> form of >>>> the primary bundle block. If scheme Beta says that all characters >> that >>>> follow the "?" character are mutable, then the BSP would have to >> know >>> that >>>> for this scheme, all characters that follow the "?" in the SSP get >>> left out >>>> of the mutable canonical form of the primary bundle block. Clearly, >>> this is >>>> undesirable; we don't want to have to make changes to BSP >>> implementations >>>> every time a new scheme is defined. >>>> >>>> >>>> >>>> It would be a lot nicer if we could agree on a general rule that all >>> EIDs >>>> would follow for how to indicate which parts of an EID are mutable >> and >>> which >>>> are non-mutable. >>>> >>>> >>>> >>>> Attached is a word file that contains the revisions that I believe >> are >>>> needed to the BSP to enable security to work the way we intend for >> it >>> to >>>> work even if EIDs are mutable. These revisions apply only to the BSP >>> so if >>>> you aren't particularly interested in security, then you may not be >>>> interested in them. What should be of general interest though, is >> that >>> we >>>> have identified a need to define a general mechanism that all >> schemes >>> should >>>> use to indicate what parts of an SSP are mutable (if any). I hope we >>> can >>>> agree that one is needed and choose one. >>>> >>>> >>>> >>>> If you wish to reply and comment on the actual revisions to the BSP >>> that are >>>> attached, I think we should conduct that discussion on the dtn- >>> security >>>> list, so please send those responses to dtn-security instead of >>>> dtn-interest. >>>> >>>> >>>> >>>> If you wish to reply regarding the need to define and agree on a >>> convention >>>> that all schemes will follow to denote which parts of their SSPs are >>>> mutable, then that discussion should probably stay here in dtn- >>> interest. >>>> >>>> >>>> Thanks. >>>> >>>> >>>> >>>> -susan >>>> >>>> ***************************************************************** >>>> >>>> Susan Symington >>>> >>>> The MITRE Corporation >>>> >>>> susan@mitre.org >>>> >>>> 703-983-7209 (voice) >>>> >>>> 703-983-7142 (fax) >>>> >>>> ****************************************************************** >>>> >>>> _______________________________________________ >>>> dtn-interest mailing list >>>> dtn-interest@maillists.intel-research.net >>>> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >>>> >>>> >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from M4.sparta.com (M4.sparta.com [157.185.61.2]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m930cFMI000479 for ; Thu, 2 Oct 2008 17:38:16 -0700 Received: from Beta5.sparta.com (beta5.sparta.com [157.185.63.21]) by M4.sparta.com (8.13.5/8.13.5) with ESMTP id m930BNsp019180; Thu, 2 Oct 2008 19:11:23 -0500 Received: from nemo.columbia.ads.sparta.com (nemo.columbia.sparta.com [157.185.80.75]) by Beta5.sparta.com (8.12.11/8.13.1) with ESMTP id m930BNPr028111; Thu, 2 Oct 2008 19:11:23 -0500 Received: from [192.168.4.98] ([157.185.80.253]) by nemo.columbia.ads.sparta.com with Microsoft SMTPSVC(6.0.3790.3959); Thu, 2 Oct 2008 20:11:19 -0400 From: "Peter Lovell" To: Susan , "Rajesh Krishnan" Date: Thu, 2 Oct 2008 20:11:18 -0400 Message-Id: <20081003001118.65661544@127.0.0.1> In-Reply-To: <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> X-Mailer: CTM PowerMail version 5.6.5 build 4509 English (intel) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 X-OriginalArrivalTime: 03 Oct 2008 00:11:20.0270 (UTC) FILETIME=[8FF2B6E0:01C924EC] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m930cFMI000479 Cc: dtn interest Subject: [dtn-interest] Re(2): mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Oct 2008 00:38:16 -0000 Hi all, If I remember correctly, the bundle spec doesn't address the issue of the mutability, or otherwise, of the destination EID. That's only a requirement of bundle security (payload integrity, to be specific). So requiring it to be immutable is imposing a new requirement upon nodes which might not even implement bundle security at all. This is a discussion we've all had before :) My preference to put the onus upon the system component that benefits, in this case it's bundle security. If payload integrity wants to include the source and destination addresses as part of the digest then it should carry those to the destination. With EID references as we have them, that should (although I haven't checked) require no additional overhead in the common case where the address does not in fact change. Regards.....Peter On Wed, Oct 1, 2008, Symington, Susan F. wrote: >Rajesh, > >This is an interesting thought. I don't know if there is a requirement >to carry an entire destination EID in tact, but if there is, I think it >could still be handled by an EID scheme that has a mutable and >non-mutable part such as we are proposing. > >Would the requirement you are surmising be satisfied by a scheme in >which the source places the entire (mutable and non-mutable portion) of >the destination EID in the non-mutable part of the destination EID >field, and then also places the mutable portion of the destination EID >in the mutable portion of the destination EID field? (This is very >difficult to explain without being confusing!) > >Basically, the idea is that the destination EID field would reference >the mutable portion of the destination EID twice: once in the mutable >portion, so it would arrive at the destination in tact, and once in the >non-mutable portion, so it could serve whatever its purpose is as the >mutable part of the destination EID and not necessarily arrive at the >destination EID in tact. Of course this means that we'd need two >special characters: one to distinguish the mutable from the non-mutable >portion, and one to use within the non-mutable portion to identify >where the "would-be" mutable portion begins....and with this one begins >to see the potential complexity that Stephen alludes to. > >-susan >***************************************************************** >Susan Symington >The MITRE Corporation >susan@mitre.org >703-983-7209 (voice) >703-983-7142 (fax) >****************************************************************** > >>-----Original Message----- >>From: Rajesh Krishnan [mailto:rjsh.krshnn@gmail.com] >>Sent: Monday, September 29, 2008 5:42 PM >>To: Symington, Susan F. >>Cc: dtn-interest@mailman.dtnrg.org >>Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice >> >>Susan, >> >>Is there a requirement from any DTN stakeholders to record, protect, >>and carry end-to-end the entire destination EID (with all attributes >>intact) exactly as specified by the source? For example, recovery >>from mis-routing might need this. >> >>An alternative is to hold the mutations -- with audit records per >>mutation if needed -- in a meta-data extension block. Definitely not >>as nice as encoding mutables in the EID :( >> >>Best Regards, >>Rajesh >> >>On Mon, Sep 29, 2008 at 4:26 PM, Symington, Susan F. >>wrote: >>> The Bundle Protocol defines EIDs to have the general structure of >>> >>> < scheme name > : < scheme-specific part >, says that the scheme is >>the set >>> of rules for parsing and interpreting the SSP, and pretty much >leaves >>things >>> open from there. >>> >>> >>> >>> In the Bundle Security Protocol (BSP), as currently drafted, we >assume >>that >>> EIDs are non-mutable. However, this is not necessarily a valid >>assumption. >>> One may want to have a scheme that defines an SSP that has both a >>> non-mutable portion and a mutable portion. The mutable portion might >>be used >>> for purposes of mobility. Stephen Farrell offers the following >example >>of a >>> possible EID: >>> >>> >>> >>> "dtn://foo.bar/baz?LASTSEENAT=10.0.0.1" >>> >>> >>> >>> where "LASTSEENAT=10.0.0.1" is a mutable part. (The exact definition >>of the >>> scheme is not what is important at this point. What is important is >>that we >>> recognize that EIDs may have non-mutable parts and we make sure that >>the >>> specifications are written correctly so as to allow for this >>possibility.) >>> >>> >>> >>> As far as the BSP is concerned, we need to revise the mutable >>> canonicalization section of the BSP to allow for the possibility >that >>EIDs >>> may have mutable parts, because these parts of the EIDs will need to >>be left >>> out of the mutable canonical form. Making this change is not >difficult >>and >>> in fact attached is a draft set of revisions for doing so. What does >>get >>> tricky, though, is that if every scheme has a different way of >>denoting >>> which parts of the EID are mutable and which are non-mutable, then >any >>given >>> implementation of the BSP would have to be equipped with a different >>set of >>> rules for how to perform the canonicalization for each scheme. If >>scheme >>> Alpha says that all characters that follow the "|" character in the >>SSP are >>> mutable, then the BSP needs to know that for this scheme, all >>characters >>> that follow the "|" in the SSP get left out of the mutable canonical >>form of >>> the primary bundle block. If scheme Beta says that all characters >that >>> follow the "?" character are mutable, then the BSP would have to >know >>that >>> for this scheme, all characters that follow the "?" in the SSP get >>left out >>> of the mutable canonical form of the primary bundle block. Clearly, >>this is >>> undesirable; we don't want to have to make changes to BSP >>implementations >>> every time a new scheme is defined. >>> >>> >>> >>> It would be a lot nicer if we could agree on a general rule that all >>EIDs >>> would follow for how to indicate which parts of an EID are mutable >and >>which >>> are non-mutable. >>> >>> >>> >>> Attached is a word file that contains the revisions that I believe >are >>> needed to the BSP to enable security to work the way we intend for >it >>to >>> work even if EIDs are mutable. These revisions apply only to the BSP >>so if >>> you aren't particularly interested in security, then you may not be >>> interested in them. What should be of general interest though, is >that >>we >>> have identified a need to define a general mechanism that all >schemes >>should >>> use to indicate what parts of an SSP are mutable (if any). I hope we >>can >>> agree that one is needed and choose one. >>> >>> >>> >>> If you wish to reply and comment on the actual revisions to the BSP >>that are >>> attached, I think we should conduct that discussion on the dtn- >>security >>> list, so please send those responses to dtn-security instead of >>> dtn-interest. >>> >>> >>> >>> If you wish to reply regarding the need to define and agree on a >>convention >>> that all schemes will follow to denote which parts of their SSPs are >>> mutable, then that discussion should probably stay here in dtn- >>interest. >>> >>> >>> >>> Thanks. >>> >>> >>> >>> -susan >>> >>> ***************************************************************** >>> >>> Susan Symington >>> >>> The MITRE Corporation >>> >>> susan@mitre.org >>> >>> 703-983-7209 (voice) >>> >>> 703-983-7142 (fax) >>> >>> ****************************************************************** >>> >>> _______________________________________________ >>> dtn-interest mailing list >>> dtn-interest@maillists.intel-research.net >>> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >>> >>> > >_______________________________________________ >dtn-interest mailing list >dtn-interest@maillists.intel-research.net >http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from yx-out-2324.google.com (yx-out-2324.google.com [74.125.44.30]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m92KWD0G021855 for ; Thu, 2 Oct 2008 13:32:13 -0700 Received: by yx-out-2324.google.com with SMTP id 3so199996yxj.79 for ; Thu, 02 Oct 2008 13:05:26 -0700 (PDT) Received: by 10.142.178.2 with SMTP id a2mr21571wff.160.1222977926249; Thu, 02 Oct 2008 13:05:26 -0700 (PDT) Received: by 10.143.11.17 with HTTP; Thu, 2 Oct 2008 13:05:26 -0700 (PDT) Message-ID: Date: Thu, 2 Oct 2008 16:05:26 -0400 From: "Rajesh Krishnan" To: "Symington, Susan F." In-Reply-To: <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Oct 2008 20:32:14 -0000 Susan, If no restrictions are placed on the schema for the mutable and non-mutable portions (and as a special case they can be the same and have fields repeated), then I do not see any problems. This ensures the source has the same level of expressiveness on the intended destination as any intermediate node and its intent will not be overwritten (even if overridden by some intermediate nodes for shipping/handling). Overall it will be good to develop a generic reusable structure for metadata extension blocks, either based on RDF (thus enabling the disruption-tolerant semantic web and bundle exchanges between autonomous intelligent agents), or tuple-based as with say IETF packetbb. This avoids having to redefine/tweak the primary header every time someone wants to encode additional information (topology related or otherwise) in non-payload bundle blocks. Best Regards, Rajesh On Wed, Oct 1, 2008 at 2:10 PM, Symington, Susan F. wrote: > Rajesh, > > This is an interesting thought. I don't know if there is a requirement > to carry an entire destination EID in tact, but if there is, I think it > could still be handled by an EID scheme that has a mutable and > non-mutable part such as we are proposing. > > Would the requirement you are surmising be satisfied by a scheme in > which the source places the entire (mutable and non-mutable portion) of > the destination EID in the non-mutable part of the destination EID > field, and then also places the mutable portion of the destination EID > in the mutable portion of the destination EID field? (This is very > difficult to explain without being confusing!) > > Basically, the idea is that the destination EID field would reference > the mutable portion of the destination EID twice: once in the mutable > portion, so it would arrive at the destination in tact, and once in the > non-mutable portion, so it could serve whatever its purpose is as the > mutable part of the destination EID and not necessarily arrive at the > destination EID in tact. Of course this means that we'd need two > special characters: one to distinguish the mutable from the non-mutable > portion, and one to use within the non-mutable portion to identify > where the "would-be" mutable portion begins....and with this one begins > to see the potential complexity that Stephen alludes to. > > -susan > ***************************************************************** > Susan Symington > The MITRE Corporation > susan@mitre.org > 703-983-7209 (voice) > 703-983-7142 (fax) > ****************************************************************** > >>-----Original Message----- >>From: Rajesh Krishnan [mailto:rjsh.krshnn@gmail.com] >>Sent: Monday, September 29, 2008 5:42 PM >>To: Symington, Susan F. >>Cc: dtn-interest@mailman.dtnrg.org >>Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice >> >>Susan, >> >>Is there a requirement from any DTN stakeholders to record, protect, >>and carry end-to-end the entire destination EID (with all attributes >>intact) exactly as specified by the source? For example, recovery >>from mis-routing might need this. >> >>An alternative is to hold the mutations -- with audit records per >>mutation if needed -- in a meta-data extension block. Definitely not >>as nice as encoding mutables in the EID :( >> >>Best Regards, >>Rajesh >> >>On Mon, Sep 29, 2008 at 4:26 PM, Symington, Susan F. >>wrote: >>> The Bundle Protocol defines EIDs to have the general structure of >>> >>> < scheme name > : < scheme-specific part >, says that the scheme is >>the set >>> of rules for parsing and interpreting the SSP, and pretty much > leaves >>things >>> open from there. >>> >>> >>> >>> In the Bundle Security Protocol (BSP), as currently drafted, we > assume >>that >>> EIDs are non-mutable. However, this is not necessarily a valid >>assumption. >>> One may want to have a scheme that defines an SSP that has both a >>> non-mutable portion and a mutable portion. The mutable portion might >>be used >>> for purposes of mobility. Stephen Farrell offers the following > example >>of a >>> possible EID: >>> >>> >>> >>> "dtn://foo.bar/baz?LASTSEENAT=10.0.0.1" >>> >>> >>> >>> where "LASTSEENAT=10.0.0.1" is a mutable part. (The exact definition >>of the >>> scheme is not what is important at this point. What is important is >>that we >>> recognize that EIDs may have non-mutable parts and we make sure that >>the >>> specifications are written correctly so as to allow for this >>possibility.) >>> >>> >>> >>> As far as the BSP is concerned, we need to revise the mutable >>> canonicalization section of the BSP to allow for the possibility > that >>EIDs >>> may have mutable parts, because these parts of the EIDs will need to >>be left >>> out of the mutable canonical form. Making this change is not > difficult >>and >>> in fact attached is a draft set of revisions for doing so. What does >>get >>> tricky, though, is that if every scheme has a different way of >>denoting >>> which parts of the EID are mutable and which are non-mutable, then > any >>given >>> implementation of the BSP would have to be equipped with a different >>set of >>> rules for how to perform the canonicalization for each scheme. If >>scheme >>> Alpha says that all characters that follow the "|" character in the >>SSP are >>> mutable, then the BSP needs to know that for this scheme, all >>characters >>> that follow the "|" in the SSP get left out of the mutable canonical >>form of >>> the primary bundle block. If scheme Beta says that all characters > that >>> follow the "?" character are mutable, then the BSP would have to > know >>that >>> for this scheme, all characters that follow the "?" in the SSP get >>left out >>> of the mutable canonical form of the primary bundle block. Clearly, >>this is >>> undesirable; we don't want to have to make changes to BSP >>implementations >>> every time a new scheme is defined. >>> >>> >>> >>> It would be a lot nicer if we could agree on a general rule that all >>EIDs >>> would follow for how to indicate which parts of an EID are mutable > and >>which >>> are non-mutable. >>> >>> >>> >>> Attached is a word file that contains the revisions that I believe > are >>> needed to the BSP to enable security to work the way we intend for > it >>to >>> work even if EIDs are mutable. These revisions apply only to the BSP >>so if >>> you aren't particularly interested in security, then you may not be >>> interested in them. What should be of general interest though, is > that >>we >>> have identified a need to define a general mechanism that all > schemes >>should >>> use to indicate what parts of an SSP are mutable (if any). I hope we >>can >>> agree that one is needed and choose one. >>> >>> >>> >>> If you wish to reply and comment on the actual revisions to the BSP >>that are >>> attached, I think we should conduct that discussion on the dtn- >>security >>> list, so please send those responses to dtn-security instead of >>> dtn-interest. >>> >>> >>> >>> If you wish to reply regarding the need to define and agree on a >>convention >>> that all schemes will follow to denote which parts of their SSPs are >>> mutable, then that discussion should probably stay here in dtn- >>interest. >>> >>> >>> >>> Thanks. >>> >>> >>> >>> -susan >>> >>> ***************************************************************** >>> >>> Susan Symington >>> >>> The MITRE Corporation >>> >>> susan@mitre.org >>> >>> 703-983-7209 (voice) >>> >>> 703-983-7142 (fax) >>> >>> ****************************************************************** >>> >>> _______________________________________________ >>> dtn-interest mailing list >>> dtn-interest@maillists.intel-research.net >>> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >>> >>> > Received: from mail-gx0-f16.google.com (mail-gx0-f16.google.com [209.85.217.16]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m92KKAxE021284 for ; Thu, 2 Oct 2008 13:20:10 -0700 Received: by gxk9 with SMTP id 9so1871085gxk.13 for ; Thu, 02 Oct 2008 12:53:23 -0700 (PDT) Received: by 10.142.142.16 with SMTP id p16mr18465wfd.143.1222977203025; Thu, 02 Oct 2008 12:53:23 -0700 (PDT) Received: by 10.143.11.17 with HTTP; Thu, 2 Oct 2008 12:53:22 -0700 (PDT) Message-ID: Date: Thu, 2 Oct 2008 15:53:22 -0400 From: "Rajesh Krishnan" To: "Scott, Keith L." In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> <48E41074.2030507@jpl.nasa.gov> Cc: dtn-interest@mailman.dtnrg.org, Scott Burleigh Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Oct 2008 20:20:11 -0000 keith, Encoding multi-attribute content tags are definitely a possibility, in addition to destination attributes . For information retrieval applications, anything that gets encoded in a search URL or in a database query, analogues are definitely possible for DTN URIs. Best Regards, Rajesh On Thu, Oct 2, 2008 at 12:08 AM, Scott, Keith L. wrote: > I could see routing information like location hints being carried in an > extension block, but I could also see incorporating such information > into the EID as useful and not imposing much complexity on an > implementation. For example a space implementation that didn't need > such information might simply strip it and route based on the immutable > part of the EID and its local schedule information. > > Are there other things people might do with a mutable part of the EID > and could they be supported with extension blocks? > > --keith > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of > Scott Burleigh > Sent: Wednesday, October 01, 2008 8:06 PM > To: dtn-interest@mailman.dtnrg.org > Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice > > Symington, Susan F. wrote: >> Rajesh, >> >> This is an interesting thought. I don't know if there is a > requirement >> to carry an entire destination EID in tact, but if there is, I think > it >> could still be handled by an EID scheme that has a mutable and >> non-mutable part such as we are proposing. >> >> Would the requirement you are surmising be satisfied by a scheme in >> which the source places the entire (mutable and non-mutable portion) > of >> the destination EID in the non-mutable part of the destination EID >> field, and then also places the mutable portion of the destination > EID >> in the mutable portion of the destination EID field? (This is very >> difficult to explain without being confusing!) >> >> Basically, the idea is that the destination EID field would reference >> the mutable portion of the destination EID twice: once in the mutable >> portion, so it would arrive at the destination in tact, and once in > the >> non-mutable portion, so it could serve whatever its purpose is as the >> mutable part of the destination EID and not necessarily arrive at the >> destination EID in tact. Of course this means that we'd need two >> special characters: one to distinguish the mutable from the > non-mutable >> portion, and one to use within the non-mutable portion to identify >> where the "would-be" mutable portion begins....and with this one > begins >> to see the potential complexity that Stephen alludes to. >> > Does the benefit really justify piling on all this additional > complexity? I don't understand why any part of any EID needs to be > mutable, ever. Certainly as a bundle wends its way through the network > > it might be useful to accrete additional information that might be > useful for routing, or in fact for other purposes such as traffic > management, service charges, cries for help. But why stick all that > stuff in an EID? Why not use an extension block? Wouldn't that be > easier to parse, secure, document, etc.? > > Scott > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from mail.newbay.com (87-198-172-198.ptr.magnet.ie [87.198.172.198]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m92ARj1l025629 for ; Thu, 2 Oct 2008 03:27:45 -0700 Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.newbay.com (Postfix) with ESMTP id 93D7A1003F4C8; Thu, 2 Oct 2008 11:01:08 +0100 (IST) X-Virus-Scanned: amavisd-new at newbay.com Received: from mail.newbay.com ([127.0.0.1]) by localhost (mail.newbay.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4E9EO6oQ9L50; Thu, 2 Oct 2008 11:01:06 +0100 (IST) Received: from [192.168.2.140] (unknown [192.168.2.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.newbay.com (Postfix) with ESMTP id 7E8FD1004159E; Thu, 2 Oct 2008 11:01:05 +0100 (IST) Message-ID: <48E49C00.7010308@cs.tcd.ie> Date: Thu, 02 Oct 2008 11:01:36 +0100 From: Stephen Farrell User-Agent: Thunderbird 2.0.0.16 (X11/20080707) MIME-Version: 1.0 To: "Scott, Keith L." References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> <48E41074.2030507@jpl.nasa.gov> In-Reply-To: X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: dtn-interest@mailman.dtnrg.org, Scott Burleigh Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Oct 2008 10:27:46 -0000 I agree that extension blocks could be defined for pretty much anything that might be mutable in an EID. (And one answer to Susan's concern might be that that's what you have to do when you want to use the bundle security mechanisms.) Ignoring security however, I do like the idea of using the query string part of the URI for hints and other useful bits and pieces. I guess the logic is that a) its easier than defining/implementing a new extension block and requires no IANA-like numbering and b) assuming that routers that know nothing about such query string values will route based on the "left most" bits of the URI (i.e. scheme, authority part and path where those are present) the addition of query string values shouldn't cause (m)any problems, and (c) at least for query strings, there's lots of code that can do parsing etc. Probably boils down to it being easy to do and useful, but I suppose extension blocks are where we'd like to end up for any attributes that turn out to be broadly useful. Things I've thought about adding into query strings include: - routing hints (e.g. LASTSEENAT=somewhere) - key mgmt hints (e.g. KID=1234) - "friendly names" (e.g. FN=Camp1HotSpot) that might change for "luggable" nodes I'm sure I could invent more, but I guess the point is that I'd like to be able to play with this sort of thing to see if its actually useful without the overhead of a new extension block for each. As I said before, if some of the above do turn out to be generally useful, the right thing to do would probably be to define extension blocks then. Lastly, I guess there are different sorts of "mutable" here, for some of the above the EIDs would be v. unlikely to mutate during the transit time of a single bundle, but I'm not sure if Susan has other cases in mind. Stephen. Scott, Keith L. wrote: > I could see routing information like location hints being carried in an > extension block, but I could also see incorporating such information > into the EID as useful and not imposing much complexity on an > implementation. For example a space implementation that didn't need > such information might simply strip it and route based on the immutable > part of the EID and its local schedule information. > > Are there other things people might do with a mutable part of the EID > and could they be supported with extension blocks? > > --keith > > -----Original Message----- > From: dtn-interest-bounces@maillists.intel-research.net > [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of > Scott Burleigh > Sent: Wednesday, October 01, 2008 8:06 PM > To: dtn-interest@mailman.dtnrg.org > Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice > > Symington, Susan F. wrote: >> Rajesh, >> >> This is an interesting thought. I don't know if there is a > requirement >> to carry an entire destination EID in tact, but if there is, I think > it >> could still be handled by an EID scheme that has a mutable and >> non-mutable part such as we are proposing. >> >> Would the requirement you are surmising be satisfied by a scheme in >> which the source places the entire (mutable and non-mutable portion) > of >> the destination EID in the non-mutable part of the destination EID >> field, and then also places the mutable portion of the destination > EID >> in the mutable portion of the destination EID field? (This is very >> difficult to explain without being confusing!) >> >> Basically, the idea is that the destination EID field would reference >> the mutable portion of the destination EID twice: once in the mutable >> portion, so it would arrive at the destination in tact, and once in > the >> non-mutable portion, so it could serve whatever its purpose is as the >> mutable part of the destination EID and not necessarily arrive at the >> destination EID in tact. Of course this means that we'd need two >> special characters: one to distinguish the mutable from the > non-mutable >> portion, and one to use within the non-mutable portion to identify >> where the "would-be" mutable portion begins....and with this one > begins >> to see the potential complexity that Stephen alludes to. >> > Does the benefit really justify piling on all this additional > complexity? I don't understand why any part of any EID needs to be > mutable, ever. Certainly as a bundle wends its way through the network > > it might be useful to accrete additional information that might be > useful for routing, or in fact for other purposes such as traffic > management, service charges, cries for help. But why stick all that > stuff in an EID? Why not use an extension block? Wouldn't that be > easier to parse, secure, document, etc.? > > Scott > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > > _______________________________________________ > dtn-interest mailing list > dtn-interest@maillists.intel-research.net > http://maillists.intel-research.net/mailman/listinfo/dtn-interest > Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m924Yt1m009681 for ; Wed, 1 Oct 2008 21:34:56 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9248N69001693 for ; Thu, 2 Oct 2008 00:08:24 -0400 Received: from imcfe2.MITRE.ORG (imcfe2.mitre.org [129.83.29.4]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m9248Nhk001672; Thu, 2 Oct 2008 00:08:23 -0400 Received: from IMCSRV1.MITRE.ORG ([129.83.20.158]) by imcfe2.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Thu, 2 Oct 2008 00:08:23 -0400 x-mimeole: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Thu, 2 Oct 2008 00:08:20 -0400 Message-ID: In-Reply-To: <48E41074.2030507@jpl.nasa.gov> X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] mutable EIDs; a general rule would be nice Thread-Index: AckkI0DCyowsiNt4TzS5h4kb9W99dwAH/5hg References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> <48E41074.2030507@jpl.nasa.gov> From: "Scott, Keith L." To: "Scott Burleigh" , X-OriginalArrivalTime: 02 Oct 2008 04:08:23.0041 (UTC) FILETIME=[82F79710:01C92444] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m924Yt1m009681 Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Oct 2008 04:34:56 -0000 I could see routing information like location hints being carried in an extension block, but I could also see incorporating such information into the EID as useful and not imposing much complexity on an implementation. For example a space implementation that didn't need such information might simply strip it and route based on the immutable part of the EID and its local schedule information. Are there other things people might do with a mutable part of the EID and could they be supported with extension blocks? --keith -----Original Message----- From: dtn-interest-bounces@maillists.intel-research.net [mailto:dtn-interest-bounces@maillists.intel-research.net] On Behalf Of Scott Burleigh Sent: Wednesday, October 01, 2008 8:06 PM To: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice Symington, Susan F. wrote: > Rajesh, > > This is an interesting thought. I don't know if there is a requirement > to carry an entire destination EID in tact, but if there is, I think it > could still be handled by an EID scheme that has a mutable and > non-mutable part such as we are proposing. > > Would the requirement you are surmising be satisfied by a scheme in > which the source places the entire (mutable and non-mutable portion) of > the destination EID in the non-mutable part of the destination EID > field, and then also places the mutable portion of the destination EID > in the mutable portion of the destination EID field? (This is very > difficult to explain without being confusing!) > > Basically, the idea is that the destination EID field would reference > the mutable portion of the destination EID twice: once in the mutable > portion, so it would arrive at the destination in tact, and once in the > non-mutable portion, so it could serve whatever its purpose is as the > mutable part of the destination EID and not necessarily arrive at the > destination EID in tact. Of course this means that we'd need two > special characters: one to distinguish the mutable from the non-mutable > portion, and one to use within the non-mutable portion to identify > where the "would-be" mutable portion begins....and with this one begins > to see the potential complexity that Stephen alludes to. > Does the benefit really justify piling on all this additional complexity? I don't understand why any part of any EID needs to be mutable, ever. Certainly as a bundle wends its way through the network it might be useful to accrete additional information that might be useful for routing, or in fact for other purposes such as traffic management, service charges, cries for help. But why stick all that stuff in an EID? Why not use an extension block? Wouldn't that be easier to parse, secure, document, etc.? Scott _______________________________________________ dtn-interest mailing list dtn-interest@maillists.intel-research.net http://maillists.intel-research.net/mailman/listinfo/dtn-interest Received: from mail.jpl.nasa.gov (sentrion1.jpl.nasa.gov [128.149.139.105]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m920Wgh6031117 for ; Wed, 1 Oct 2008 17:32:42 -0700 Received: from xmta2.jpl.nasa.gov (xmta2.jpl.nasa.gov [137.78.160.56]) by mail.jpl.nasa.gov (Switch-3.3.2mp/Switch-3.3.2mp) with ESMTP id m9206F1N026488 (using TLSv1/SSLv3 with cipher DHE-RSA-AES256-SHA (256 bits) verified NO) for ; Thu, 2 Oct 2008 00:06:16 GMT Received: from [127.0.0.1] (dhcp-79-22-229.jpl.nasa.gov [137.79.22.229]) by xmta2.jpl.nasa.gov (Switch-3.2.6/Switch-3.2.6) with ESMTP id m9206CBZ008653 for ; Wed, 1 Oct 2008 17:06:13 -0700 Message-ID: <48E41074.2030507@jpl.nasa.gov> Date: Wed, 01 Oct 2008 17:06:12 -0700 From: Scott Burleigh User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: dtn-interest@mailman.dtnrg.org References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> In-Reply-To: <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Source-IP: dhcp-79-22-229.jpl.nasa.gov [137.79.22.229] X-Source-Sender: Scott.Burleigh@jpl.nasa.gov X-AUTH: Authorized X-AUTH: Authorized Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 02 Oct 2008 00:32:43 -0000 Symington, Susan F. wrote: > Rajesh, > > This is an interesting thought. I don't know if there is a requirement > to carry an entire destination EID in tact, but if there is, I think it > could still be handled by an EID scheme that has a mutable and > non-mutable part such as we are proposing. > > Would the requirement you are surmising be satisfied by a scheme in > which the source places the entire (mutable and non-mutable portion) of > the destination EID in the non-mutable part of the destination EID > field, and then also places the mutable portion of the destination EID > in the mutable portion of the destination EID field? (This is very > difficult to explain without being confusing!) > > Basically, the idea is that the destination EID field would reference > the mutable portion of the destination EID twice: once in the mutable > portion, so it would arrive at the destination in tact, and once in the > non-mutable portion, so it could serve whatever its purpose is as the > mutable part of the destination EID and not necessarily arrive at the > destination EID in tact. Of course this means that we'd need two > special characters: one to distinguish the mutable from the non-mutable > portion, and one to use within the non-mutable portion to identify > where the "would-be" mutable portion begins....and with this one begins > to see the potential complexity that Stephen alludes to. > Does the benefit really justify piling on all this additional complexity? I don't understand why any part of any EID needs to be mutable, ever. Certainly as a bundle wends its way through the network it might be useful to accrete additional information that might be useful for routing, or in fact for other purposes such as traffic management, service charges, cries for help. But why stick all that stuff in an EID? Why not use an extension block? Wouldn't that be easier to parse, secure, document, etc.? Scott Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by maillists.intel-research.net (8.13.8/8.13.8) with ESMTP id m91IauYK015030 for ; Wed, 1 Oct 2008 11:36:56 -0700 Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m91IAbsN012824 for ; Wed, 1 Oct 2008 14:10:37 -0400 Received: from IMCFE1.MITRE.ORG (imcfe1.mitre.org [129.83.29.3]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id m91IAaW2012797; Wed, 1 Oct 2008 14:10:36 -0400 Received: from IMCSRV4.MITRE.ORG ([129.83.20.161]) by IMCFE1.MITRE.ORG with Microsoft SMTPSVC(6.0.3790.1830); Wed, 1 Oct 2008 14:10:36 -0400 X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Wed, 1 Oct 2008 14:10:35 -0400 Message-ID: <8E507634779E22488719233DB3DF9FF002E5AF5F@IMCSRV4.MITRE.ORG> In-Reply-To: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: [dtn-interest] mutable EIDs; a general rule would be nice Thread-Index: AckifCYOovTm0jCQQSW7MvxvnXBQqABcQQbw References: <8E507634779E22488719233DB3DF9FF002E5AAEE@IMCSRV4.MITRE.ORG> From: "Symington, Susan F." To: "Rajesh Krishnan" X-OriginalArrivalTime: 01 Oct 2008 18:10:36.0802 (UTC) FILETIME=[0105D620:01C923F1] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by maillists.intel-research.net id m91IauYK015030 Cc: dtn-interest@mailman.dtnrg.org Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice X-BeenThere: dtn-interest@maillists.intel-research.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: Delay Tolerant Networking Interest List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Oct 2008 18:36:57 -0000 Rajesh, This is an interesting thought. I don't know if there is a requirement to carry an entire destination EID in tact, but if there is, I think it could still be handled by an EID scheme that has a mutable and non-mutable part such as we are proposing. Would the requirement you are surmising be satisfied by a scheme in which the source places the entire (mutable and non-mutable portion) of the destination EID in the non-mutable part of the destination EID field, and then also places the mutable portion of the destination EID in the mutable portion of the destination EID field? (This is very difficult to explain without being confusing!) Basically, the idea is that the destination EID field would reference the mutable portion of the destination EID twice: once in the mutable portion, so it would arrive at the destination in tact, and once in the non-mutable portion, so it could serve whatever its purpose is as the mutable part of the destination EID and not necessarily arrive at the destination EID in tact. Of course this means that we'd need two special characters: one to distinguish the mutable from the non-mutable portion, and one to use within the non-mutable portion to identify where the "would-be" mutable portion begins....and with this one begins to see the potential complexity that Stephen alludes to. -susan ***************************************************************** Susan Symington The MITRE Corporation susan@mitre.org 703-983-7209 (voice) 703-983-7142 (fax) ****************************************************************** >-----Original Message----- >From: Rajesh Krishnan [mailto:rjsh.krshnn@gmail.com] >Sent: Monday, September 29, 2008 5:42 PM >To: Symington, Susan F. >Cc: dtn-interest@mailman.dtnrg.org >Subject: Re: [dtn-interest] mutable EIDs; a general rule would be nice > >Susan, > >Is there a requirement from any DTN stakeholders to record, protect, >and carry end-to-end the entire destination EID (with all attributes >intact) exactly as specified by the source? For example, recovery >from mis-routing might need this. > >An alternative is to hold the mutations -- with audit records per >mutation if needed -- in a meta-data extension block. Definitely not >as nice as encoding mutables in the EID :( > >Best Regards, >Rajesh > >On Mon, Sep 29, 2008 at 4:26 PM, Symington, Susan F. >wrote: >> The Bundle Protocol defines EIDs to have the general structure of >> >> < scheme name > : < scheme-specific part >, says that the scheme is >the set >> of rules for parsing and interpreting the SSP, and pretty much leaves >things >> open from there. >> >> >> >> In the Bundle Security Protocol (BSP), as currently drafted, we assume >that >> EIDs are non-mutable. However, this is not necessarily a valid >assumption. >> One may want to have a scheme that defines an SSP that has both a >> non-mutable portion and a mutable portion. The mutable portion might >be used >> for purposes of mobility. Stephen Farrell offers the following example >of a >> possible EID: >> >> >> >> "dtn://foo.bar/baz?LASTSEENAT=10.0.0.1" >> >> >> >> where "LASTSEENAT=10.0.0.1" is a mutable part. (The exact definition >of the >> scheme is not what is important at this point. What is important is >that we >> recognize that EIDs may have non-mutable parts and we make sure that >the >> specifications are written correctly so as to allow for this >possibility.) >> >> >> >> As far as the BSP is concerned, we need to revise the mutable >> canonicalization section of the BSP to allow for the possibility that >EIDs >> may have mutable parts, because these parts of the EIDs will need to >be left >> out of the mutable canonical form. Making this change is not difficult >and >> in fact attached is a draft set of revisions for doing so. What does >get >> tricky, though, is that if every scheme has a different way of >denoting >> which parts of the EID are mutable and which are non-mutable, then any >given >> implementation of the BSP would have to be equipped with a different >set of >> rules for how to perform the canonicalization for each scheme. If >scheme >> Alpha says that all characters that follow the "|" character in the >SSP are >> mutable, then the BSP needs to know that for this scheme, all >characters >> that follow the "|" in the SSP get left out of the mutable canonical >form of >> the primary bundle block. If scheme Beta says that all characters that >> follow the "?" character are mutable, then the BSP would have to know >that >> for this scheme, all characters that follow the "?" in the SSP get >left out >> of the mutable canonical form of the primary bundle block. Clearly, >this is >> undesirable; we don't want to have to make changes to BSP >implementations >> every time a new scheme is defined. >> >> >> >> It would be a lot nicer if we could agree on a general rule that all >EIDs >> would follow for how to indicate which parts of an EID are mutable and >which >> are non-mutable. >> >> >> >> Attached is a word file that contains the revisions that I believe are >> needed to the BSP to enable security to work the way we intend for it >to >> work even if EIDs are mutable. These revisions apply only to the BSP >so if >> you aren't particularly interested in security, then you may not be >> interested in them. What should be of general interest though, is that >we >> have identified a need to define a general mechanism that all schemes >should >> use to indicate what parts of an SSP are mutable (if any). I hope we >can >> agree that one is needed and choose one. >> >> >> >> If you wish to reply and comment on the actual revisions to the BSP >that are >> attached, I think we should conduct that discussion on the dtn- >security >> list, so please send those responses to dtn-security instead of >> dtn-interest. >> >> >> >> If you wish to reply regarding the need to define and agree on a >convention >> that all schemes will follow to denote which parts of their SSPs are >> mutable, then that discussion should probably stay here in dtn- >interest. >> >> >> >> Thanks. >> >> >> >> -susan >> >> ***************************************************************** >> >> Susan Symington >> >> The MITRE Corporation >> >> susan@mitre.org >> >> 703-983-7209 (voice) >> >> 703-983-7142 (fax) >> >> ****************************************************************** >> >> _______________________________________________ >> dtn-interest mailing list >> dtn-interest@maillists.intel-research.net >> http://maillists.intel-research.net/mailman/listinfo/dtn-interest >> >>