Custody transfer for Reliable Delivery in DTN

Authors:Kevin Fall, Wei Hong, Samuel Madden

Year:2003

 

What is custody transfer?

—Accepting a message with custody transfer amounts to promising not to delete it until it can be reliably delivered to another node providing custody(or to the message’s destination)

 

What is a custodian?

—Nodes holding a message with custody are called custodians.

 

Sole custody and joint custody

Ordinarily there is a single custodian for a message,but in some cuircumstances more than one custodian owns a message or message fragment

 

In some circumstances a node that had previously been accepting messages and custody for them may cease accepting custody (while continuing to accept messages ) if local node resources become substantially consumed and it may resume accepting custody when resources become more plentiful.

 

Joint custody occurs when the acknowledgement and custody acceptance message is not received by the previous custodian.At this point, the previous custodian has not recevied notice of the custody transfer,and the current custodian has already asserted custody.Therefore,both nodes believed each is the custodiano of the message and attempts to forwards the message at its custodian.

 

Joint custodian leads to message duplication.DTN destination nodes, or intermediate nodes, must be able to deal with duplication by recording the receipt of unique messages to indentify duplicate messages and eliminate them from the DTN, which requires future work. 

 

Whether to accept a particular message based on message size, security, maximum message lifetime and local policy constraints.

 

Fragmentation

     Messages may be fragmented or aggregated as they traverse the network.Fragmentation may be employed by a sending node in circumstances where a contact may not be of suficient volume to move an entire message to its next hop.Another form of fragmentation, called reactive fragmentation, may be employed by a receiving next-hop node if a link should become inoperative while a message is transfered.

     Fragments can be reassembled when multiple fragments for the same destination together await an outgoing communication opportunity.If reassembly of fragments does not occur in the network, it is accomplished at the end(receiver).

 

Advantages of custody transfer:

    Free storage resources comparatively quickly ( especially important to sensor networks.)

 

Address of head-of-line blocking

    Three strategies(at least):

    1. reservation of persistent storage to non-custody transfer messages.(how much storage to reserve?based on dynamics of topology,link bandwidth,maximum available storage and expected size of messages.)
    2. in-memory store-and-forward.(limited to the amount of available volatile memory and is subject to loss upon node outage)
    3. cut-through in-memory routing(minimizing overhead at the router)

 

Semantics of the transfer operation

    Messages indicate their current custodian in the DTN protocol header and  this field is updated as custody of the message is moved from custodian to custodian.The ability to transfer fragments complicates this situation somewhat.

posted on 2010-08-26 11:48  扶蘇  阅读(311)  评论(0编辑  收藏  举报

导航