- Delay-tolerant networking
-
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space.
Recently, the term disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.
Contents
History
Further information: History of delay-tolerant networkingIn the 1970s, spurred by the micronization of computing, researchers began developing technology for routing between non-fixed locations of computers. While the field of ad-hoc routing was inactive throughout the 1980s, the widespread use of wireless protocols reinvigorated the field in the 1990s as mobile ad-hoc networking (MANET) and vehicular ad-hoc networking became areas of increasing interest.
Concurrently with (but separate from) the MANET activities, DARPA had funded NASA, MITRE and others to develop a proposal for the Interplanetary Internet (IPN). Internet pioneer Vint Cerf and others developed the initial IPN architecture, relating to the necessity of networking technologies that can cope with the significant delays and packet corruption of deep-space communications. In 2002, Kevin Fall started to adapt some of the ideas in the IPN design to terrestrial networks and coined the term delay-tolerant networking and the DTN acronym. A paper published in 2003 SIGCOMM conference gives the motivation for DTNs.[1] The mid-2000s brought about increased interest in DTNs, including a growing number of academic conferences on delay and disruption-tolerant networking, and growing interest in combining work from sensor networks and MANETs with the work on DTN. This field saw many optimizations on classic ad-hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability, and other areas of research that are well understood in traditional computer networking.
Routing
Further information: Routing in delay-tolerant networkingThe ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as AODV[2] and DSR[3] fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination.[4][5][6] A common technique used to maximize the probability of a message being successfully transferred is to replicate many copies of the message in the hope that one will succeed in reaching its destination.[7] This is feasible only on networks with large amounts of local storage and internode bandwidth relative to the expected traffic. In many common problem spaces, this inefficiency is outweighed by the increased efficiency and shortened delivery times made possible by taking maximum advantage of available unscheduled forwarding opportunities. In others, where available storage and internode throughput opportunities are more tightly constrained, a more discriminate algorithm is required.
Other concerns
Bundle protocols
In efforts to provide a shared framework for algorithm and application development in DTNs, RFC 4838 and RFC 5050 were published in 2007 to define a common abstraction to software running on disrupted networks. Commonly known as the Bundle Protocol, this protocol defines a series of contiguous data blocks as a bundle—where each bundle contains enough semantic information to allow the application to make progress where an individual block may not. Bundles are routed in a store and forward manner between participating nodes over varied network transport technologies (including both IP and non-IP based transports). The transport layers carrying the bundles across their local networks are called bundle convergence layers. The bundle architecture therefore operates as an overlay network, providing a new naming architecture based on Endpoint Identifiers (EIDs) and coarse-grained class of service offerings.
Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the store and forward nature of delay-tolerant protocols, routing solutions for delay-tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the RFC 5050 Bundle Protocol specification includes 'bulk', 'normal', and 'expedited' markings.
Security
Addressing security issues has been a major focus of the bundle protocol.
Security concerns for delay-tolerant networks vary depending on the environment and application, though authentication and privacy are often critical. These security guarantees are difficult to establish in a network without persistent connectivity because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently-visible devices.[8][9] Solutions have typically been modified from mobile ad hoc network and distributed security research, such as the use of distributed certificate authorities[10] and PKI schemes. Original solutions from the delay-tolerant research community include: 1) the use of identity-based encryption, which allows nodes to receive information encrypted with their public identifier;[11] and 2) the use of tamper-evident tables with a gossiping protocol;[12]
Research efforts
Various research efforts are currently investigating the issues involved with DTN:
- The The Delay-Tolerant Networking Research Group.
- The Technology and Infrastructure for Developing Regions project at UC Berkeley
- The Bytewalla research project at the Royal Institute of Technology, KTH
- The KioskNet research project at the University of Waterloo.
- The DieselNet research project at the University of Massachusetts, Amherst.
- The ResiliNets Research Initiative at the University of Kansas and Lancaster University.
- The Haggle EU research project.
- The N4C EU/FP7 research project.
- The WNaN DARPA project.
- The EMMA project at TU Braunschweig
- The DTN networking at Helsinki University of Technology.
- The SARAH project, funded by the French National Research Agency (ANR).
- The development of the DoDWAN platform at the University of South Brittany.
- The CROWD project, funded by the French National Research Agency (ANR).
- The PodNet project at KTH Stockholm and ETH Zurich.
Some research efforts look at DTN for the Interplanetary Internet by examining use of the Bundle Protocol in space:
- The Saratoga project at the University of Surrey, which was the first to test the bundle protocol in space on the UK-DMC Disaster Monitoring Constellation satellite in 2008.[13][14][15]
- NASA JPL's Deep Impact Networking (DINET) Experiment on board the Deep Impact/EPOXI spacecraft.[16][17]
- BioServe Space Technologies, one of the first payload developers to adopt the DTN technology, has utilized their CGBA (Commercial Generic Bioprocessing Apparatus) payloads onboard the ISS, which provide computational/communications platforms, to implement the DTN protocol.[18][19][20]
References
- ^ A Delay-Tolerant Network Architecture for Challenged Internets, K. Fall, SIGCOMM, August 2003.
- ^ Perkins, C.; Royer, E. (1999), "Ad-hoc on-demand distance vector routing", The Second IEEE Workshop on Mobile Computing Systems and Applications
- ^ Johnson, D.; Maltz, D. (1996), "Dynamic source routing in ad hoc wireless networks", Mobile Computing, Kluwer Academic, pp. 153–181
- ^ John Burgess, Brian Gallagher, David Jensen, and Brian Neil Levine. MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proc. IEEE INFOCOM, April 2006.
- ^ Philo Juang, Hidekazu Oki, Yong Wang, Margaret Martonosi, Li Shiuan Peh, and Daniel Rubenstein (2002). "Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet". SIGOPS Oper. Syst. Rev. 36 (5): 96–107. doi:10.1145/605397.605408.
- ^ Augustin Chaintreau, Pan Hui, Jon Crowcroft, Christophe Diot, Richard Gass, and James Scott (2007). "Impact of human mobility on opportunistic forwarding algorithms". IEEE Transactions on Mobile Computing 6 (6): 606–620. doi:10.1109/TMC.2007.1060.
- ^ Vahdat, Amin; Becker, David (2000), "Epidemic routing for partially connected ad hoc networks", Technical Report CS-2000-06, Duke University
- ^ "Anonymity and security in delay-tolerant networks" A. Kate, G. Zaverucha, and U. Hengartner. 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007)
- ^ "Security Considerations in Space and Delay-Tolerant Networks" S. Farrell and V. Cahill. Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology
- ^ DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
- ^ "Practical security for disconnected nodes" Seth, A. Keshav, S. 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2005.
- ^ MobiRate: Making Mobile Raters Stick to their Word. ACM Ubicomp 2008
- ^ Use of the Delay-Tolerant Networking Bundle Protocol from Space, L. Wood et al., Conference paper IAC-08-B2.3.10, 59th International Astronautical Congress, Glasgow, September 2008.
- ^ UK-DMC satellite first to transfer sensor data from space using 'bundle' protocol, press release, Surrey Satellite Technology Ltd, 11 September 2008.
- ^ CLEO Orbital Internet earns Time Magazine award, Robin Wolstenholme, Surrey Satellite Technology Ltd space blog, 14 November 2008.
- ^ A Better Network for Outer Space, Brittany Sauser, MIT Technology Review, 27 October 2008.
- ^ NASA Successfully Tests First Deep Space Internet, NASA press release 08-298, 18 November 2008.
- ^ Jenkins, Andrew; Kuzminsky, Sebastian; Gifford, Kevin K.; Holbrook, Mark; Nichols, Kelvin; Pitts, Lee. (2010). "Delay/Disruption-Tolerant Networking: Flight Test Results from the International Space Station." IEEE Aerospace Conference.
- ^ Gifford, Kevin K.; Jenkins, Andrew; Holbrook, Mark; Kuzminsky, Sebastian; Nichols, Kelvin; Pitts, Lee. (2010). "DTN Implementation and Utilization Options on the International Space Station." American Institute of Aeronautics and Astronautics.]
- ^ The Automation Group at BioServe Space Technologies University of Colorado, Boulder.
Channel access methods and Media access control (MAC)/Multiple-access protocols Channel based SDMA··Packet based Delay & disruption tolerantDuplexing methods Categories:- Channel access methods
- Network architecture
- Network protocols
Wikimedia Foundation. 2010.