DTN Research Challenges Vint Cerf MCI March 1, 2005.

Slides:



Advertisements
Similar presentations
Report from the Networking in Times of Disaster. What is a Disaster? Networks that work in times of disaster should address: Events that affect a network.
Advertisements

© 2005 The MITRE Corporation. Intel Berkeley Research Lab. All rights reserved The DTNRG: Where are we? R. Durst – The MITRE Corporation K. Fall – DTNRG.
Chris Karlof and David Wagner
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
UWB UWB: High speed(>100Mbps), small area(WPAN), accurate positioning and distance measuring. Blue tooth: although it’s low speed, it has a more mature.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6-The Next Generation Protocol RAMYA MEKALA UIN:
Group #1: Protocols for Wireless Mobile Environments.
Introduction to Wireless Sensor Networks
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Routing Security in Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
March 13, 2003 Routing Functional Components Steven D. Jones (JHU/APL) Chunyue Liu (CCNY) Tarek Saadawi (CCNY) I-Jeng Wang (JHU/APL)
Announcements List Lab is still under construction Next session we will have paper discussion, assign papers,
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 18. Virtual-Circuit Networks: Frame Relay and ATM
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 Which Standards are needed toward Future Wireline and Wireless IP Network ? Hee Chang Chung, Jun Kyun Choi
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
Test-Bed for testing scenarios of new DTN architecture AsiaFI 2008 August, 2008 Multimedia and Mobile Communication Lab.
Standard for a Convergent Digital Home Network for Heterogeneous Technologies Zhimeng Du 12/5/2013.
A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel.
The Network of Information: Architecture and Applications SAIL – Scalable and Adaptable Internet Solutions Bengt Ahlgren et. al Presented by wshin.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
V. Tsaoussidis, DUTH – Greece
Ch 11. Multiple Antenna Techniques for WMNs Myungchul Kim
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
DTN Network Management Scenarios and General Requirements Will Ivancic
Outline Motivation Protocol Terminology Implementation architecture SDNV Addressing scheme Bundle format Primary block Generic Block Processing Bundle.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Ad Hoc Network.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Packet Radio Networks Fixed or mobile nodes that communicate via radios –Advantages: »Fast (re) deployment and set-up of network »Ability to support.
Wireless Mesh Networks Myungchul Kim
FIND-Mobility Workshop BBN Technologies Cambridge, September 27, 2007.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Introduction Wireless devices offering IP connectivity
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
IT443 – Network Security Administration Instructor: Bo Sheng
Introduction to Wireless Sensor Networks
Chapter 3: Open Systems Interconnection (OSI) Model
Computer Networking A Top-Down Approach Featuring the Internet
An Overview of Security Issues in Sensor Network
Presentation transcript:

DTN Research Challenges Vint Cerf MCI March 1, 2005

Basics u Overcoming delay and disruption in hostile tactical environments u Building resilience into communication protocols and system architecture u Avoiding brittleness in the above u Operating with efficiency comparable to today’s protocols in benign environments

Architecture u Layering design and functionality u Overlaying TCP/IP networks u Role of IPv6 deployment, mixed mode operation u Non-IP network integration (sensor networks, et al) u Bundle functionality and interfaces u Convergence layer designs u Definition of Regions

Self-Organization u Neighbor discovery u Region discovery u Secure authentication u Topology management u CF mobility u Anecdote (packet radio, velocity, connectivity detection, radiation)

Mobility u Critical requirements u Flexible “joining” with the network(s) u Strong authentication u Multipath routing when available u Power awareness (AGC, efficient power utilization, pt-pt vs omni, multiple antennas, phased arrays…) u Naming and addressing conventions, late binding mechanisms

Security u Strong authentication u Playback, virus, worm resistance u Confidentiality u Key management (rekeying!) u Application to DNS, routing, endpoint communication, custody transfers and anti- spoofing u Multilayer implementation u Dealing with Overrun Situation

Persistence u Persistent process operation in the face of operating system reboots u Persistent “sessions” or “associations” in the presence of disruption u “Presence” maintenance

Time Keeping u Reliable and accurate time keeping for: u Position location u Scheduling of transmissions u Spread spectrum sequencing (hopping, direct spread chipping, signal acquisition) and other spectrum sharing methods u Time on Target and other tactical maneuvers u Fire control, Fire/Forget, Standoff weapons

Efficiency u Header compression u Exploitation of broadcasts, flooding u Region and Administrative naming conventions u Cacheing (when is cache invalidated?) u Real-time applications (RPV, conferencing, sensor networks,…)

Flow and Congestion Control u Resilience in the face of high delay variance u Prioritization and Custody Control u Distinguishing congestion from delay u Multipath forwarding, efficient elimination of duplicates

Routing u Dealing with variably aged connectivity data u Multipath forwarding (How many? Which?) u Authentication of routing information u Scheduled and opportunistic link detection

Simulation and Testing u Mathematical and operational modeling u Integration of real systems with simulated environments u Interoperability testing u Field testing (on maneuvers) u Air, land, sea, satellite

Maintenance and Operation u Fault detection, isolation and repair u Operational data reporting u Network Management (configuration control, congestion response, prioritization…) u Security! Overrun resistance!

Deployment u Use of existing communication systems (EPLRS, JTIDS, newer systems) u Pre-configuration and fixed points vs self-organization u Interworking with older systems u Phasing of deployment (where, when, how)