folie 1 analysis of sm-exchange protocol using sm&c mal dlr/gsoc author: s.gully

14
Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Upload: brett-paul

Post on 05-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 1

Analysis of SM-Exchange Protocol using SM&C MAL

DLR/GSOC

Author: S.Gully

Page 2: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 2

IdeaUse the SM&C MAL as underlying communication service in the SM Document Exchange protocol

Sender ReceiverSM message set port

message set

exception response

SM exception response port

UM:SM Entity CM:SM Entity<<underlying communication

service>>

Document Exchange Protocol

SM&C MAL ?

Page 3: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 3

Req.Nr. Requirement MAL compliance

UCS-0001

The underlying communication service shall be reliable – that is, the underlying communication service must ensure that every document sent from a communication entity is actually delivered to the destination communication entity.

compliant

UCS-0002

The underlying communication service shall authenticate the Network Source of each document carried by the service and validate that the Network Source is permitted to send documents to the Network Destination.NOTES1.As used in this Recommended Standard, Network Source and Network Destination refer to the SM entities as they are known to the underlying communication service.2.The format of the identification of the Network Source and Network Destination within the underlying communication technology is dependent upon that technology.3.References [18], [19], and [20] specify the security mechanisms for authentication, data privacy, and data integrity that are recommended for use when the SCCS-SM documents are encoded as XML documentsReferences [18], [19], and [20] specify the security mechanisms for authentication, data privacy, and data integrity that are recommended for use when the SCCS-SM documents are encoded as XML documents

compliant (Directory + Loginservices)

UCS-0003

Documents for which the Network Source cannot be authenticated and recognized shall be discarded by the communication service.NOTE - There is no requirement on the underlying communication service to notify the Network Source when a document is dropped because of failure to authenticate the Network Source or recognize it on behalf of the intended Network Destination. Only when the underlying communication service authenticates the Network Source and recognizes it as a legitimate Network Source for the intended Network Destination does it deliver the document to the Network Destination

compliant

Requirements (1/2)

Page 4: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 4

Requirements (2/2)

Req.Nr. Requirement MAL compliance

UPS-0004

The underlying communication service shall supply the authenticated identity of the Network Source of the document to the SM document exchange protocol.NOTE - As specified in 3.3 the SM document exchange protocol uses that authenticated identity for the purposes of (a) verifying the authority of the SM entity located at the Network Source to issue documents in the context of the Service Agreement that is identified in the message, and (b) allowing the document exchange protocol and the SCCS-SM applications that use it to know where to send responses, if necessary.

compliant

MPS-0005

The underlying communication service shall provide the ability for an SM entity to send documents to two logically separate ports on a peer SM entity. These logically separate ports, the SM message set port and the SM exception response port, are used by the document exchange protocol to separate SM operation message traffic from protocol exception reporting traffic.

not compliant (MAL has only 1 address / end point)Solution: SM Service must implements virtual ports A (send/receive request/response) and port B (send / receive Error) as a layer over the MAL

Page 5: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 5

Document Exchange Protocol

Sequence Diagram

SM Service must implement checkand send exceptionresponse

SM Service must implement checkand send exceptionresponse

SM Service must implement checkand send exceptionresponse

Page 6: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 6

Message structure

The MessageSet / Message structure should map the following class structures.

SmMessageSet Class Diagram

SM Service must definethe SmMessageSet as„data“ part of the MAL messages

Page 7: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 7

Document Exchange - Two phase Operation Procedure Pattern

The two-phase operation procedure pattern begin with the Invoker sending an operation invocation message. The performer starts a timer and return a successfulReturn if he can perform the invocation under time or a FailedReturn / FailedReturnWithDenial if not.

• SM Service must managethe timer

• SM Service should use aMAL REQUEST IP:-REQUEST contains the invocation-RESPONSE contains the Sucess-fullReturn, FailedReturn or Failed-ReturnWithDenial-RESPONSE ERROR could be send in case of an exception error

Page 8: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 8

MAL – REQUEST Interaction Pattern ?

What is about a Return message that generates an exception ???

Page 9: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 9

Document Exchange - Three phase Operation Procedure Pattern

The three-phase operation procedure pattern begin with the Invoker sending an operation invocation message. The performer estimate how long it will take to process the operation, starts a timer and return an acknowledgeReturn containing the time estimation information “expectedDispositionTime”. The Invoker starts a timer upon receiving the acknowledge and wait for a return. The Performer performs the invocated operation it possible and return a sucessfullReturn, or returns a failedReturn/failedReturnWithDenial if the operation could not be preformed or the timer ran out before.

• SM Service must managethe performer and invoker timers

• SM Service should use a MAL INVOKE IP to map this operation:-INVOKE contains the invocation-ACK contains the acknowledgement-ACK ERROR could be sentin case of an exception error-RESPONSE contains the Sucess-fullReturn, FailedReturn or Failed-ReturnWithDenial-RESPONSE ERROR could be send in case of an exception error

Page 10: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 10

MAL – INVOKE Interaction Pattern ?

What is about an Acknowledge or Return message that generate an exception ???

Page 11: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 11

Document Exchange - Notify Operation Procedure Pattern

The notify operation procedure begin with the Notifier sending a notification message. The Recipent should then confirm to the Notifier that the notification has been received by sending a confirmation message.

• SM Service must managethe notifier and recipient timers

• SM Service should use a MAL REQUEST IP to map this operation:-REQUEST contains the notification-RESPONSE contains the confir-mation-RESPONSE ERROR could be sentin case of an exception error

Page 12: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 12

MAL – REQUEST Interaction Pattern ?

What is about a Confirmation message that generatess an exception ???

Page 13: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 13

Other Solution – use MAL SUBMIT IP for each send message

• Each send message operation should use the MAL SUBMIT IP:-SUBMIT contains the sended message-ACK is not used-ERROR could be send in case of an exception error

• SM Service have to define the two-phase, three-phase and notifica-tion operations as multiple MAL SUBMIT IPs and implement the operation flow control !!!

Page 14: Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully

Folie 14

ConclusionUsing the SM&C MAL as underlying communication service in the SM Document Exchange protocol is possible. A “Document Exchange Service Layer” should be developed, that implement the following features, common to all SM service operations:

1) Use a MAL SUBMIT IP for sending each message / messageSet:

The SUBMIT message will contain the message/messageSet -> this will arrive to a virtual “message port”

The ACK message will not be used

The ACK ERROR message will contain the exception responses -> this will arrive to a virtual “exception port”

2) Take the SmMessageSet for the “data part” of the MAL message

3) Implement the syntax validation + increment number check + notification check on each message

4) Generate and take care of the timer(s)

5) Build and control the 2-phase, 3-phase and notification operation procedure patterns

Based on that “Document Exchange Service Layer”, SM services can be defined that correspond to the Service Package, Configuration Profile, Trajectory Prediction and Service Agreement operations.