Program 3
On this page
Interact with the cloud thorugh a gateway
Objectives
In this project, you are going to build on the first project. You will have a gateway (your PI) that downloads a command from a remote web page. The client (your partner’s PI) is not secure and can not connect to the network. However, it can talk to the gateway to retrieve the command. It then perfors the command (LIGHTON and LIGHTOFF). All communications in this assignment MUST use UDP sockets (SOCK_DGRAM) and NOT TCP.
The objectives are:
– Learn to create robust network protocols
– Learn about reliable communication
– How a IoT gateway might work. This is typically used to isolate insecure and/or resource constrained IoT devices.
Gateway Specifications
The Gateway (we name it anonGateway) takes two arguments:
$ anonGateway -p <PORT> -s <LOG FILE LOCATION> -w <web page to download>
1.PORT
- The port Gateway listens on.
2.Log file location
- Where you will keep a record of actions.
3.Web page to download
- Which webpage to download and serve.
For example:
$ anonGateway -p 30000 -l /tmp/logfile -w https://tntech-ngin.github.io/S23-CSC4200/docs/prologue/LIGHTON_COMMAND
or
$ anonGateway -p 30000 -l /tmp/logfile -w https://tntech-ngin.github.io/S23-CSC4200/docs/prologue/LIGHTOFF_COMMAND
You can use python URLLIB2 to download the page and parse it to decide which command the page contains. Here is a helpful tutorial: https://docs.python.org/3/howto/urllib2.html
Gateway’s Functional requirements
- The Gateway should gracefully process incorrect port number and exit with a non-zero error code
- The Gateway should send a FIN after done sending the data to the client
- The Gateway should download the file specified by -p and serve it from the memory (you don’t need to write the retrieved page to a file, just save it to a variable/string)
- The Gateway runs indefinitely - it does not exit.
Client Specifications
The client (we name it anonclient) takes four arguments:
$ anonclient -s <Gateway-IP> -p <PORT> -l LOGFILE -f <file_to_write_to>
The client takes three arguments:
1.Gateway IP
- The IP address of the anonGateway.
2.PORT
- The port the Gateway listens on.
3.Log file location
- Where you will keep a record of packets you received.
4.File to write to
- Where you will write the retrieved content.
For example:
$ anonclient -s 192.168.2.1 -p 6543 -l LOGFILE -f test.txt
Packet Specification
The payload of each UDP packet sent by Gateway and client MUST start with the following 12-byte header. All fields are in network order (most significant bit first):
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Acknowledgment Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Not Used |A|S|F|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Where:
Sequence Number (32 bits): The sequence number of the first data octet in this packet (except when SYN is present). If SYN is present the sequence number is the initial sequence number (randomly choosen).
Acknowledgement Number (32 bits): If the ACK control bit is set, this field contains the value of the next sequence number the sender of the segment is expecting to receive. Once a connection is established this is always sent.
The acknowledgement number is given in the unit of bytes (how many bytes you have sent)
Not Used (29 bits): Must be zero.
A (ACK, 1 bit): Indicates that there the value of Acknowledgment Number field is valid
S (SYN, 1 bit): Synchronize sequence numbers
F (FIN, 1 bit): Finish, No more data from sender
This is the protocol you will implement
The client opens a UDP socket and initiate 3-way handshake to the specified hostname/ip and port. For an explanation of how a three way handshake works, see the next three steps. Essentially, the client and Gateway will exchange three packets with the following flags sets: (1) SYN (2) SYN|ACK (3)ACK. At the end of the handshake, they will have learned each other’s sequence number.
Handshake Step 1: Anonclient sends a UDP packet with the following parameters:
- src-ip=anonclient_IP, src-port=anonclient_port, dst-ip=anonGateway_ip, dst-port=anonGateway_port, Sequence Number set to 12345 (or chosen randomly), SYN flag set to 1, ACK flag set to 0, FIN flag set to 0.
- Handshake Step 2: AnonGateway sends a UDP packet with the following parameters:
- src-ip=anonGateway_IP, src-port=anonGateway_port, dst-ip=anonclient_ip, dst-port=anonclient_port. Sequence Number set to 100 (or chosen randomly), ACK number set to 12346 (Clients seq number + 1) SYN flag set to 1, ACK flag set to 1, FIN flag set to 0.
- Handshake Step 3: Anonclient sends a UDP packet with the following parameters:
- src-ip=anonclient_IP, src-port=anonclient_port, dst-ip=anonGateway_ip, dst-port=anonGateway_port, Sequence Number set to 12346 (ACK from Gateway), ACK number set to 101 (Gateway seq number + 1), SYN flag set to 0, ACK flag set to 1, FIN flag set to 0.
- Now both anonclient and anonGateway knows each others’ sequence numbers and communication can begin. You only perform this handshake once.
- Gateway sends 512 bytes of data in an UDP packet as a payload. It also increases the sequence number (seq_to_send = client_seq_received + 1), and sets the ACK flag.
- The Client acknowledges the number of bytes it received by setting the ACK flag, and adding the number of bytes received to the previous client sequence number (seq_to_send = Gateway_seq_received + number of bytes received).
- Upon receiving this ACK, the Gateway creates another packet, sets the ACK flag, updates the sequence number, and sends another 512 bytes.
- This interaction continues until all data is sent to the client.
- The last packet from the Gateway has the FIN bit set.
- The client will send a packet with both FIN and ACK bit set. This completes the data transfer.
- Once the interaction is complete, write the retrieved content to a file (on the client side).
- Client then parses the first line of the content and executes the command in the file. If the command can not be parsed, it logs the error.
Here is what a sample interaction looks like before the command (e.g., LIGHTON/LIGHTOFF) is parsed and executed.
Gateway Client
| |
| seq=12345, ack=0, SYN |
| <------------------------------------------|
| seq=100, ack=12346, SYN, ACK |
| ----------------------------------------- >|
| seq=12346, ack=101, ACK |
| <----------------------------------------- |####handshake complete, start getting data
|seq=101, ack=12347, ACK,512Byte payload |
| -----------------------------------------> |
| seq=12347, ack=614, ACK |
| <----------------------------------------- |
|seq=614,ack=12348,ACK,512Byte payload |
| ----------------------------------------- >|
| seq=12348, ack=1126, ACK |
| <----------------------------------------- |
|seq=1126, ack=12349,ACK,512Byte payload |
| ----------------------------------------- >|
| seq=12349, ack=1638, ACK |
| <----------------------------------------- |
|seq=1638, ack=12350, FIN, payload=5bytes |
| -----------------------------------------> |
|seq=12350, ack=1643, FIN, ACK |
| <----------------------------------------- |
Additional requirements:
- Code must compile/run on your PI - we will test your code only on the PI.
- For each packet received, log both at Gateway and receiver in the following format:
"RECV" <Sequence Number> <Acknowledgement Number> ["ACK"] ["SYN"] ["FIN"]
"SEND" <Sequence Number> <Acknowledgement Number> ["ACK"] ["SYN"] ["FIN"]
Hints
def create_packet(**kwargs):
data = struct.pack('!I', s_n) #pack the version
....
data += struct.pack("!c", ack) #pack the ACK
data += struct.pack("!c", syn) #pack the SYN
data += struct.pack("!c", fin) #pack the FIN
....
return data
send_data = create_packet(sequence_number=100, ack_number=0, ack = 'Y', syn = 'N', fin = 'N', payload=data)