TheFast Adaptive and Secure Protocol(FASP) is aproprietarydata transferprotocol.FASP is a network-optimized network protocol created by Michelle C. Munson and Serban Simu, productized byAspera,and now owned byIBMsubsequent to its acquisition of Aspera. The associated client/server software packages are also commonly called Aspera.[1][2]The technology ispatentedunder US Patent #8085781,Bulk Data Transfer,#20090063698,Method and system for aggregate bandwidth control.[3]and others.
Communication protocol | |
Abbreviation | FASP |
---|---|
Purpose | Data transfer |
Developer(s) | Michelle C. Munson and Serban Simu |
Introduction | |
Based on | UDP |
Port(s) | tcp/22, udp/33001 |
Built upon theconnectionlessUDPprotocol, FASP does not expect any feedback on everypacketsent, and yet provides fully reliable data transfer over best effort IP networks. Only the packets marked as really lost must be requested again by the recipient. As a result, it does not suffer as much loss of throughput asTCPdoes on networks with highlatencyor highpacket lossand avoids the overhead of naive "UDP data blaster" protocols.[4][5]The protocol innovates upon naive "data blaster" protocols through an optimal control-theoretic retransmission algorithm and implementation that achieves maximumgoodputand avoids redundant retransmission of data. Its control model is designed to fill the available bandwidth of the end-to-end path over which the transfer occurs with only "good" and needed data.
Large organizations like theEuropean Nucleotide Archive,[2]the USNational Institutes of HealthNational Center for Biotechnology Information[6]and others[7]use the protocol. The technology was recognized with many awards including an Engineering Emmy from the Academy of Film and Television.
Security
editFASP has built-in security mechanisms that do not affect the transmission speed. Theencryptionalgorithmsused are based exclusively onopen standards.Some product implementation use secure key exchange and authentication such asSSH.
The data is optionally encrypted or decrypted immediately before sending and receiving with theAES-128.To counteract attacks by monitoring the encrypted information during long transfers, the AES is operated incipher feedback modewith a random, publicinitialization vectorfor each block. In addition, an integrity check of eachdata blocktakes place, in which case, for example, aman-in-the-middle attackwould be noticed.
Protocol
editFASP's controlportis TCP port 22 – the same port that SSH uses. For data transfer, it begins at UDP port 33001, which increments with each additional connection thread.[1]
FASP's flow control algorithm, unlike TCP's, completely ignores packet drops. Instead, it acts on changes in measured packet delivery time. When that is growing, queues are getting longer and channel bandwidth is exceeded; falling, queues are getting shorter. Acting on this information is complicated because the receiver has it and the sender needs it, but its lifetime is often less than the transmission delay; and measurements are noisy. Thus, the sender uses a predictive filter fed updates from the receiver.[8]
The transmission rate is chosen to match and not exceed the available channel bandwidth, and trigger no drops, accounting for all traffic on the channel.[9]By contrast, TCP slowly increases its rate until it sees a packet drop and falls back, interpreting any drop as congestion. On a channel with long delay and frequent packet loss, TCP never approaches the actual bandwidth available. FASP cooperates with TCP flows on the same channel, using up bandwidth TCP leaves unused.
See also
editReferences
edit- ^ab"Aspera high speed file transfer: Let the cloud protocol wars begin".The Register.
- ^ab"European Nucleotide Archive: Downloading using Aspera".
- ^"Method and system for aggregate bandwidth control".
- ^"Aspera - High-speed file transfer software -".downloads.asperasoft.com.
- ^"FASP transfer protocol speeds data transmission to the cloud".
- ^"NCBI 1000 Genomes: Aspera Download".
- ^"Aspera Joint Partner Solutions".asperasoft.com.20 January 2018.
- ^"Ex Aspera Dev here. I did the encryption and early parallel work. There is a lot... | Hacker News".
- ^Klimek, Ivan (2011).Wide Area Network Traffic Optimization.Faculty of Electrical Engineering and Informatics. Košice: Technical University of Košice. p. 49.