the negotiation problem
play

The Negotiation Problem Jana Iyengar Bryan Ford Franklin & - PowerPoint PPT Presentation

The Negotiation Problem Jana Iyengar Bryan Ford Franklin & Marshall College Yale University jiyengar@fandm.edu bryan.ford@yale.edu Presentation for TSVAREA meeting Nov 13, 2009 http://baford.info/tng A Proliferation of Layers and


  1. The Negotiation Problem Jana Iyengar Bryan Ford Franklin & Marshall College Yale University jiyengar@fandm.edu bryan.ford@yale.edu Presentation for TSVAREA meeting – Nov 13, 2009 http://baford.info/tng

  2. A Proliferation of Layers and Layer Combinations Application HTTP FTP DNS RTP HTTP SSL Transport SSL DTLS Security TCP Transport SCTP TCP UDP DCCP IPsec IPv6 IPsec Network IPsec HTTP IPv6 Security IPsec SSL Teredo UDP TCP UDP Network (DirectAccess) IP IPv6 IP Data Ethernet Token-Ring PPP Link Ethernet

  3. Future: Ever More Layers/Combinations? Further Multi-Streaming Multipath Decomposition Transports Transports [“Breaking Up the SCTP [rfc4960], SCTP [rfc4960], Transport Logjam”, SST [SIGCOMM'07] MPTCP [WIP] HotNets'08] Application Application Application Semantic Stream Stream Multipath Transport Isolation Channel Subflow Subflow Flow Network Network Endpoint Link Link Network Link

  4. The Negotiation Problem Decisions, decisions! Application HTTP SIP IAX Transport SSL DTLS Security Transport TCP SCTP UDP DCCP Network IPv4 IPv6 IPv4 IPv6

  5. Compatibility and Preference Which combinations do both endpoints support? Which combinations do they prefer ? SIP IAX SIP IAX ? DTLS DTLS UDP DCCP UDP DCCP IPv4 IPv6 IPv4 IPv6 Host A Host B

  6. Talk Outline ● Three negotiation strategies (2 explicit, 1 implicit) — Including a new in-band negotiation mechanism — Combined explicit/implicit negotiation ● A framework for negotiation ● Discussion

  7. Negotiation Strategies Implicit Negotiation

  8. Approach 1: Try and Fall Back Host A Host B SCTP INIT SCTP RST TCP INIT TCP ACK

  9. Challenge 1: Controlling Delay ● Failures can incur timeouts (e.g., due to NATs) ● … potentially compounded by layering Timeout(s) SIP IAX SIP IAX Timeout(s) DTLS DTLS Timeout(s) UDP DCCP UDP DCCP Timeout(s) IPv4 IPv6 IPv4 IPv6 Host B Host A

  10. Approach 2: Try in Parallel Host A Host B SCTP INIT TCP INIT SCTP RST TCP ACK

  11. Challenge 2a: Redundant State Host A Host B SCTP INIT TCP INIT SCTP ACK TCP ACK

  12. Challenge 2b: Combinations Layering can lead to explosion of choices SIP IAX SIP DTLS IAX DTLS UDP UDP UDP UDP IPv4 IPv4 IPv4 IPv4 SIP IAX SIP IAX SIP DTLS IAX DTLS DCCP DCCP DCCP DCCP IPv4 IPv4 IPv4 IPv4 DTLS SIP IAX SIP DTLS IAX DTLS UDP DCCP UDP UDP UDP UDP IPv6 IPv6 IPv6 IPv6 Host B SIP IAX IPv4 IPv6 SIP DTLS IAX DTLS DCCP DCCP DCCP DCCP IPv6 IPv6 IPv6 IPv6 Host A

  13. Negotiation Strategies Implicit Negotiation Explicit Out-of-band Negotiation

  14. Approach 3: Out-of-Band Information Host A DNS Server Host B DNS++ Req DNS++ Reply SIP IAX DTLS UDP DCCP IPv4 IPv6 SIP DTLS DCCP IPv6

  15. Challenge 3a: Administration DNS server must know: DNS Server Host B ● Name → IP mapping (as before) ● Entire protocol stack supported by Host B “Dynamic DNS++”? ● Protocol options? ⇒ Synchronization Nightmare?

  16. Challenge 3b: E2E Robustness If endpoints agree on confguration X, will it work? SIP IAX SIP IAX DTLS DTLS UDP DCCP UDP DCCP UDP DCCP IPv4 IPv6 IPv4 IPv6 IPv4 IPv6 Host A Host B Middlebox

  17. Negotiation Strategies Implicit Negotiation Explicit Explicit Out-of-band In-band Negotiation Negotiation

  18. Approach 4: In-band Negotiation ● Hosts explicitly describe possible confgurations during initial “meta-communication” exchange, before actual communication commences “Hi, I speak: “Hi, I speak: SIP IAX SIP IAX DTLS DTLS UDP DCCP UDP DCCP IPv4 IPv6 ” ” IPv4 IPv6 Host A Host B

  19. Message 1: Initiator → Responder: Propose Protocol Graph Negotiation Message 1 goal (SIP) opt1 opt2 Host A Host B (alternatives) TLS DTLS opt1 opt2 opt1 opt2 TCP DCCP opt1 opt2 opt1 opt2 base (IP)

  20. Message 2: Responder → Initiator: Revise Protocol Graph Negotiation Message 2 goal (SIP) opt1 opt2 Host A Host B TLS DTLS opt1 opt2 opt1 opt2 TCP DCCP opt1 opt2 opt1 opt2 base (IP)

  21. Message 3: Initiator → Responder: Acknowledge Protocol Graph Negotiation Message 3 goal (SIP) opt2 Host A Host B TLS opt1 TCP base (IP)

  22. Message 4+: According to Negotiated Stack Host A Host B Normal Packets SIP TLS TCP

  23. Concurrent Protocol Initialization Whenever feasible: — embed protocol-specifc handshake info into graph — run handshakes concurrently while negotiating Host A Host B 1 SIP 2 SIP REGISTER 200 OK TLS DTLS TLS DTLS ClientHello ClientHello ServerHello ServerHello TCP DCCP TCP DCCP INIT Request INIT-ACK Reply IP IP

  24. Key Benefts of Negotiation Model ● Happens strictly between nodes concerned — Users, Name server admins don't have to care ● Middleboxes can participate in process ● Protocol graph representation scales to handle: — Arbitrarily deep protocol stacks — Many alternatives per layer ● Setup whole “layer cakes” in minimal # of RTTs — With options (For representing and transmitting graph, negotiation transport protocol, etc., see our HotNets '09 paper)

  25. Contexts and Stacks ● Context ≡ underlying substrate; cannot change ● Stack ≡ protocols to be set up; can change Example 1: Application-Level Example 2: OS-Level, VoIP Protocol Stack Negotiation Application-Transparent Transport Stack Negotiation SIP IAX HTTP OS Stack API DTLS TCP SST OS Stack API UDP DCCP DCCP Context Context IPv4 IPv6 IPv4 IPv6

  26. Negotiation Across Contexts Scenario 1: Application-Level Scenario 2: Application-Transparent VoIP Protocol Stack Negotiation Transport Protocol Negotiation SIP IAX HTTP OS Stack API DTLS TCP SST OS Stack API UDP DCCP DCCP Context Context IPv4 IPv6 IPv4 IPv6 App can't send 1 packet OS can't send 1 packet that's both UDP & DCCP! that's both IPv4 & IPv6! ⇒ must try each context separately

  27. Combined Solution 1.Identify feasible communication Context(s) — e.g., UDP session (IP a :port a , IP b :port b ) 2.Negotiate Stack within each context: a) Initiator sends a Protocol Graph Proposal b)Responder returns Revised Protocol Graph c)(Optional) further protocol graph revision steps d)Peers commit, Acknowledge Protocol Graph e)Communication proceeds via negotiated protocols

  28. Combined Implicit/Explicit Solution ● Implicit, parallel negotiation across contexts ● Explicit, in-band negotiation within a context Host A Host B Nego Req SIP IAX DTLS Nego Reply UDP SIP IAX IP DTLS UDP SIP IP UDP IP

  29. A Framework for Negotiation

  30. Negotiation Strategies Implicit Negotiation Explicit Explicit Out-of-band In-band Negotiation Negotiation

  31. The Negotiation Triangle Implicit Negotiation Multi-Context End-to-end Support Robustness Explicit Explicit In-band Out-of-band Negotiation Negotiation Combinatorial Scalability

  32. The Negotiation Triangle Implicit Negotiation Multi-Context End-to-end Support Robustness Explicit Explicit Out-of-band In-band Negotiation Negotiation Combinatorial Scalability For any given negotiation strategy, you get two of three desirable properties T o get all three properties, a hybrid of at least two strategies is necessary

  33. Arigato! The foodgates are open! (Please join tae@ietf.org for discussions)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend