- Delay Tolerant Networking
Delay-Tolerant Networking (DTN) is an approach to
computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space.Recently, the term "Disruption-Tolerant Networking" has gained currency in the United States due to support from
DARPA , who have funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.History
In the 1970s, spurred by the micronization of computing, researchers began developing technology for routing between non-fixed locations of computers. While the field of ad-hoc routing was inactive throughout the 1980s, the wide-spread use of wireless protocols reinvigorated the field in the 1990s as mobile ad-hoc routing and
vehicular ad-hoc network ing became areas of increasing interest.Concurrently with (but separate from) the MANET activities, DARPA had funded NASA, MITRE and others todevelop a proposal for the the
Interplanetary Internet (IPN). Internet pioneerVint Cerf and others developed the initial IPN architecture, relating to the necessity of networking technologies that can cope with the significant delays and packet corruption of deep-space communications. In 2002,Kevin Fall started to adapt some of the ideas in the IPN design to terrestrial networks and coined the term "Delay Tolerant Networking" and the DTN acronym. A paper published in 2003 SIGCOMM conference gives the motivation for DTNs. The mid-2000s brought about increased interest in DTNs, including a growing number ofacademic conferences on delay and disruption tolerant networking, and growing interest in combining work from sensor networks and MANETs with the work on DTN. This field saw many optimizations on classic ad-hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability, and other areas of research that are well understood in traditionalcomputer networking .Routing
The ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as AODV [Citation | last = Perkins | first = C. | last2 = Royer | first2 = E. | contribution = Ad-hoc on-demand distance vector routing | title = The Second IEEE Workshop on Mobile Computing Systems and Applications | year = 1999] and DSR [Citation | last = Johnson | first = D. | last2 = Maltz | first2 = D. | contribution = Dynamic source routing in ad hoc wireless networks | pages = 153 - 181 | title = Mobile Computing | year = 1996 | publisher = Kluwer Academic] fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination [John Burgess, Brian Gallagher, David Jensen, and Brian Neil Levine. MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proc. IEEE INFOCOM, April 2006.] [Philo Juang, Hidekazu Oki, Yong Wang, Margaret Martonosi, Li Shiuan Peh, and Daniel Rubenstein. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. SIGOPS Oper. Syst. Rev., 36(5):96–107, 2002.] [Augustin Chaintreau, Pan Hui, Jon Crowcroft, Christophe Diot, Richard Gass, and James Scott. Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6):606–620, 2007.] . A common technique used to maximize the probability of a message is successfully transferred is to replicate many copies of the message in hopes that one will succeed in reaching its destination [Citation | last = Vahdat | first = Amin | last2 = Becker | first2 = David | contribution = Epidemic routing for partially connected ad hoc networks | title = Technical Report CS-2000-06 | publisher = Duke University | year = 2000] .
Other concerns
Bundle Protocols
In efforts to provide a shared framework for algorithm and application development in DTNs, RFC 4838 and RFC 5050 were published in 2007 to define a common abstraction to software running on disrupted networks. Commonly known as the Bundle Protocol, this protocol defines a series of contiguous data blocks as a bundle—where each bundle contains enough semantic information to allow the application to make progress where an individual block may not. Bundles are routed in a
store and forward manner between participating nodes over varied network transport technologies (including both IP and non-IP based transports). The transport layers carrying the bundles across their local networks are called "bundle convergence layers." The bundle architecture therefore operates as anoverlay network , providing a new naming architecture based on Endpoint Identifiers (EIDs) and coarse-grainedclass of service offerings.Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the
store and forward nature of delay-tolerant protocols, routing solutions for delay tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the RFC 5050 Bundle Protocol specification includes 'bulk', 'normal', and 'expedited' markings.Security
Addressing security issues has been a major focus of the bundle protocol.
Security concerns for delay-tolerant networks vary depending on theenvironment and application, though
authentication andprivacy are often critical. These security guarantees are difficult toestablish in a network without persistent connectivity because thenetwork hinders complicated cryptographic protocols, hinders key exchange, and each devicemust identify other intermittently-visible devices. ["Anonymity and security in delay tolerant networks" A. Kate, G. Zaverucha, and U. Hengartner. 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007)] ["Security Considerations in Space and Delay Tolerant Networks" S. Farrell and V. Cahill. Proceedings of the 2nd IEEE International Conference on Space Mission Challenges for Information Technology] Solutions have typically been modified frommobile ad hoc network anddistributed security research, such as the use of distributedcertificate authorities andPKI schemes. Original solutions fromthe delay tolerant research community include the use ofidentity-based encryption , which allows nodes to receiveinformation encrypted with their public identifier. ["Practical security for disconnected nodes" Seth, A. Keshav, S. 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2005.]Research efforts
Various research efforts are currently investigating the issues involved with DTN:
* The [http://www.dtnrg.org/ The Delay Tolerant Networking Research Group] .
* The [http://tier.cs.berkeley.edu/ Technology and Infrastructure for Developing Regions] project atUC Berkeley
* TheKioskNet research project at theUniversity of Waterloo .
* The [http://prisms.cs.umass.edu/dome/ DieselNet] research project at theUniversity of Massachusetts , Amherst.
* The [http://wiki.ittc.ku.edu/resilinets ResiliNets Research Initiative] at theUniversity of Kansas andLancaster University .
* The [http://haggleproject.org Haggle] EU research project.
* The [http://personal.ee.surrey.ac.uk/Personal/L.Wood/saratoga/ Saratoga] project at theUniversity of Surrey .
* The [http://www.n4c.eu N4C] EU/FP7 research project.
* The [http://www.darpa.mil/STO/strategic/wireless.html WNaN] DARPA project.
* TheNASA JPL 's Deep Impact Networking (DINET) Experiment on board theDeep Impact /EPOXI spacecraft.Footnotes
Wikimedia Foundation. 2010.