1 / 14

DTN Research Challenges

DTN Research Challenges. Vint Cerf MCI March 1, 2005. Basics. Overcoming delay and disruption in hostile tactical environments Building resilience into communication protocols and system architecture Avoiding brittleness in the above

greeng
Download Presentation

DTN Research Challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DTN Research Challenges Vint Cerf MCI March 1, 2005

  2. Basics • Overcoming delay and disruption in hostile tactical environments • Building resilience into communication protocols and system architecture • Avoiding brittleness in the above • Operating with efficiency comparable to today’s protocols in benign environments

  3. Architecture • Layering design and functionality • Overlaying TCP/IP networks • Role of IPv6 deployment, mixed mode operation • Non-IP network integration (sensor networks, et al) • Bundle functionality and interfaces • Convergence layer designs • Definition of Regions

  4. Self-Organization • Neighbor discovery • Region discovery • Secure authentication • Topology management • CF mobility • Anecdote (packet radio, velocity, connectivity detection, radiation)

  5. Mobility • Critical requirements • Flexible “joining” with the network(s) • Strong authentication • Multipath routing when available • Power awareness (AGC, efficient power utilization, pt-pt vs omni, multiple antennas, phased arrays…) • Naming and addressing conventions, late binding mechanisms

  6. Security • Strong authentication • Playback, virus, worm resistance • Confidentiality • Key management (rekeying!) • Application to DNS, routing, endpoint communication, custody transfers and anti-spoofing • Multilayer implementation • Dealing with Overrun Situation

  7. Persistence • Persistent process operation in the face of operating system reboots • Persistent “sessions” or “associations” in the presence of disruption • “Presence” maintenance

  8. Time Keeping • Reliable and accurate time keeping for: • Position location • Scheduling of transmissions • Spread spectrum sequencing (hopping, direct spread chipping, signal acquisition) and other spectrum sharing methods • Time on Target and other tactical maneuvers • Fire control, Fire/Forget, Standoff weapons

  9. Efficiency • Header compression • Exploitation of broadcasts, flooding • Region and Administrative naming conventions • Cacheing (when is cache invalidated?) • Real-time applications (RPV, conferencing, sensor networks,…)

  10. Flow and Congestion Control • Resilience in the face of high delay variance • Prioritization and Custody Control • Distinguishing congestion from delay • Multipath forwarding, efficient elimination of duplicates

  11. Routing • Dealing with variably aged connectivity data • Multipath forwarding (How many? Which?) • Authentication of routing information • Scheduled and opportunistic link detection

  12. Simulation and Testing • Mathematical and operational modeling • Integration of real systems with simulated environments • Interoperability testing • Field testing (on maneuvers) • Air, land, sea, satellite

  13. Maintenance and Operation • Fault detection, isolation and repair • Operational data reporting • Network Management (configuration control, congestion response, prioritization…) • Security! Overrun resistance!

  14. Deployment • Use of existing communication systems (EPLRS, JTIDS, newer systems) • Pre-configuration and fixed points vs self-organization • Interworking with older systems • Phasing of deployment (where, when, how)

More Related