DTN Research Challenges Vint Cerf MCI March 1, 2005
Basics u Overcoming delay and disruption in hostile tactical environments u Building resilience into communication protocols and system architecture u Avoiding brittleness in the above u Operating with efficiency comparable to today’s protocols in benign environments
Architecture u Layering design and functionality u Overlaying TCP/IP networks u Role of IPv6 deployment, mixed mode operation u Non-IP network integration (sensor networks, et al) u Bundle functionality and interfaces u Convergence layer designs u Definition of Regions
Self-Organization u Neighbor discovery u Region discovery u Secure authentication u Topology management u CF mobility u Anecdote (packet radio, velocity, connectivity detection, radiation)
Mobility u Critical requirements u Flexible “joining” with the network(s) u Strong authentication u Multipath routing when available u Power awareness (AGC, efficient power utilization, pt-pt vs omni, multiple antennas, phased arrays…) u Naming and addressing conventions, late binding mechanisms
Security u Strong authentication u Playback, virus, worm resistance u Confidentiality u Key management (rekeying!) u Application to DNS, routing, endpoint communication, custody transfers and anti- spoofing u Multilayer implementation u Dealing with Overrun Situation
Persistence u Persistent process operation in the face of operating system reboots u Persistent “sessions” or “associations” in the presence of disruption u “Presence” maintenance
Time Keeping u Reliable and accurate time keeping for: u Position location u Scheduling of transmissions u Spread spectrum sequencing (hopping, direct spread chipping, signal acquisition) and other spectrum sharing methods u Time on Target and other tactical maneuvers u Fire control, Fire/Forget, Standoff weapons
Efficiency u Header compression u Exploitation of broadcasts, flooding u Region and Administrative naming conventions u Cacheing (when is cache invalidated?) u Real-time applications (RPV, conferencing, sensor networks,…)
Flow and Congestion Control u Resilience in the face of high delay variance u Prioritization and Custody Control u Distinguishing congestion from delay u Multipath forwarding, efficient elimination of duplicates
Routing u Dealing with variably aged connectivity data u Multipath forwarding (How many? Which?) u Authentication of routing information u Scheduled and opportunistic link detection
Simulation and Testing u Mathematical and operational modeling u Integration of real systems with simulated environments u Interoperability testing u Field testing (on maneuvers) u Air, land, sea, satellite
Maintenance and Operation u Fault detection, isolation and repair u Operational data reporting u Network Management (configuration control, congestion response, prioritization…) u Security! Overrun resistance!
Deployment u Use of existing communication systems (EPLRS, JTIDS, newer systems) u Pre-configuration and fixed points vs self-organization u Interworking with older systems u Phasing of deployment (where, when, how)