Delay-tolerant networking
   HOME

TheInfoList



OR:

Delay-tolerant networking (DTN) is an approach to
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
architecture that seeks to address the technical issues in
heterogeneous network In computer networking, a heterogeneous network is a network connecting computers and other devices where the operating systems and protocols have significant differences. For example, local area networks (LANs) that connect Microsoft Windows and ...
s that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space. Recently, the term disruption-tolerant networking has gained currency in the United States due to support from
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the A ...
, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.


History

In the 1970s, spurred by the decreasing size of computers, researchers began developing technology for routing between non-fixed locations of computers. While the field of ad hoc routing was inactive throughout the 1980s, the widespread use of wireless protocols reinvigorated the field in the 1990s as mobile ad hoc networking (MANET) and vehicular ad hoc networking became areas of increasing interest. Concurrently with (but separate from) the MANET activities, DARPA had funded NASA, MITRE and others to develop a proposal for the Interplanetary Internet (IPN). Internet pioneer
Vint Cerf Vinton Gray Cerf (; born June 23, 1943) is an American Internet pioneer and is recognized as one of " the fathers of the Internet", sharing this title with TCP/IP co-developer Bob Kahn. He has received honorary degrees and awards that include ...
and others developed the initial IPN architecture, relating to the necessity of networking technologies that can cope with the significant delays and packet corruption of deep-space communications. In 2002, Kevin Fall started to adapt some of the ideas in the IPN design to terrestrial networks and coined the term ''delay-tolerant networking'' and the DTN acronym. A paper published in 2003 SIGCOMM conference gives the motivation for DTNs. The mid-2000s brought about increased interest in DTNs, including a growing number of
academic conferences An academic conference or scientific conference (also congress, symposium, workshop, or meeting) is an event for researchers (not necessarily academics) to present and discuss their scholarly work. Together with academic or scientific journals an ...
on delay and disruption-tolerant networking, and growing interest in combining work from sensor networks and MANETs with the work on DTN. This field saw many optimizations on classic ad hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability, and other areas of research that are well understood in traditional
computer networking A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
.


Routing

The ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as
AODV Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc networks (MANETs) and other wireless ad hoc networks. It was jointly developed in July 2003 in Nokia Research Center, University of California, Santa Barbara an ...
and DSR fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination. A common technique used to maximize the probability of a message being successfully transferred is to replicate many copies of the message in the hope that one will succeed in reaching its destination. This is feasible only on networks with large amounts of local storage and internode bandwidth relative to the expected traffic. In many common problem spaces, this inefficiency is outweighed by the increased efficiency and shortened delivery times made possible by taking maximum advantage of available unscheduled forwarding opportunities. In others, where available storage and internode throughput opportunities are more tightly constrained, a more discriminate algorithm is required.


Other concerns


Bundle protocols

In efforts to provide a shared framework for algorithm and application development in DTNs, RFC 4838 and RFC 5050 were published in 2007 to define a common abstraction to software running on disrupted networks. Commonly known as the Bundle Protocol, this protocol defines a series of contiguous data blocks as a bundle—where each bundle contains enough semantic information to allow the application to make progress where an individual block may not. Bundles are
routed Routing is the process of selecting a path for traffic in a network or between or across multiple networks. Broadly, routing is performed in many types of networks, including circuit-switched networks, such as the public switched telephone netwo ...
in a
store and forward Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
manner between participating nodes over varied network transport technologies (including both IP and non- IP based transports). The transport layers carrying the bundles across their local networks are called ''bundle convergence layers.'' The bundle architecture therefore operates as an
overlay network An overlay network is a computer network that is layered on top of another network. Structure Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through ...
, providing a new naming architecture based on Endpoint Identifiers (EIDs) and coarse-grained
class of service Class of service (COS or CoS) is a parameter used in data and voice protocols to differentiate the types of payloads contained in the packet being transmitted. The objective of such differentiation is generally associated with assigning prioritie ...
offerings. Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the
store and forward Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
nature of delay-tolerant protocols, routing solutions for delay-tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the RFC 5050 Bundle Protocol specification includes "bulk", "normal", and "expedited" markings. In October 2014 the Internet Engineering Task Force (IETF) instantiated
Delay Tolerant Networking working group
to review and revise the protocol specified in RFC5050. The Bundle Protocol for CCSDS is a profile of RFC5050 specifically addressing the Bundle Protocol's utility for data communication in space missions.


Security issues

Addressing security issues has been a major focus of the bundle protocol. Possible attacks take the form of nodes behaving as a "black hole" or a "flooder". Security concerns for delay-tolerant networks vary depending on the environment and application, though
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
and
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
are often critical. These security guarantees are difficult to establish in a network without continuous bi-directional end-to-end paths between devices because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently visible devices. Solutions have typically been modified from mobile ad hoc network and distributed security research, such as the use of distributed certificate authorities and PKI schemes. Original solutions from the delay-tolerant research community include: 1) the use of
identity-based encryption ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user ...
, which allows nodes to receive information encrypted with their public identifier; and 2) the use of tamper-evident tables with a gossiping protocol;


Implementations

There are a number of implementations of the Bundle Protocol:


BPv6 (RFC5050, Bundle Protocol for

CCSDS The Consultative Committee for Space Data Systems (CCSDS) was founded in 1982 for governmental and quasi-governmental space agencies to discuss and develop standards for space data and information systems. Currently composed of "eleven member agenc ...
)

The main implementation of BPv6 are listed below. A number of other implementations exist. * NASA Interplanetary Overlay Network (ION)—Written in C; designed to run on a wide variety of platforms; conforms to restrictions for space flight software (e.g. no dynamic memory allocation).
IBR-DTN
C++ - based; runs on routers with OpenWRT; also contains JAVA applications (router and user apps) for use on Android.
DTN2
C++ - based; designed to be a reference / learning / teaching implementation of the Bundle Protocol.


BPv7 (Internet Research Task Force RFC)

The draft of BPv7 lists six known implementations.
µPCN
C; built upon the POSIX API as well as FreeRTOS and intended to run on low-cost micro satellites. * PyDTN—Python; developed by X-works and during the IETF 101 Hackathon.
Terra
Java; developed in the context of terrestrial DTN.
dtn7-go
Go; implementation focused on easy extensibility and suitable for research.
dtn7-rs
Rust; intended for environments with limited resources and performance requirements. * NASA Interplanetary Overlay Network (ION)—C; intended to be usable in embedded environments including spacecraft flight computers.


Research efforts

Various research efforts are currently investigating the issues involved with DTN: * Th
Delay-Tolerant Networking Research Group
* Th
Technology and Infrastructure for Developing Regions
project at
UC Berkeley The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California) is a public land-grant research university in Berkeley, California. Established in 1868 as the University of California, it is the state's first land-grant uni ...
* Th
Bytewalla
research project at th
Royal Institute of Technology, KTH
* The KioskNet research project at the
University of Waterloo The University of Waterloo (UWaterloo, UW, or Waterloo) is a public research university with a main campus in Waterloo, Ontario, Canada. The main campus is on of land adjacent to "Uptown" Waterloo and Waterloo Park. The university also operates ...
. * Th
DieselNet
research project at the
University of Massachusetts Amherst The University of Massachusetts Amherst (UMass Amherst, UMass) is a public research university in Amherst, Massachusetts and the sole public land-grant university in Commonwealth of Massachusetts. Founded in 1863 as an agricultural college, ...
, Amherst. * Th
ResiliNets Research Initiative
at the
University of Kansas The University of Kansas (KU) is a public research university with its main campus in Lawrence, Kansas, United States, and several satellite campuses, research and educational centers, medical centers, and classes across the state of Kansas. T ...
and
Lancaster University , mottoeng = Truth lies open to all , established = , endowment = £13.9 million , budget = £317.9 million , type = Public , city = Bailrigg, City of Lancaster , country = England , coor = , campus = Bailrigg , faculty ...
. * Th
Haggle
EU research project. * The Space Internetworking Center EU/FP7 project at the
Democritus University of Thrace The Democritus University of Thrace (DUTH; el, Δημοκρίτειο Πανεπιστήμιο Θράκης), established in July 1973, is based in Komotini, Greece and has campuses in the Thracian cities of Xanthi, Komotini, Alexandroupoli and O ...
. * Th
N4C
EU/FP7 research project. * Th

DARPA project. * Th
EMMA
an
OPTRACOM
projects at
TU Braunschweig The Technische Universität Braunschweig (unofficially University of Braunschweig – Institute of Technology), commonly referred to as TU Braunschweig, is the oldest ' (comparable to an institute of technology in the American system) in Germany ...
* Th
DTN
at
Helsinki University of Technology Helsinki University of Technology (TKK; fi, Teknillinen korkeakoulu; sv, Tekniska högskolan) was a technical university in Finland. It was located in Otaniemi, Espoo in the metropolitan area of Greater Helsinki. The university was founded in ...
. * Th
SARAH
project, funded by the French National Research Agency
ANR
. * The development of th
DoDWAN platform
a
Université Bretagne Sud
* Th
CROWD
project, funded by the French National Research Agency
ANR
. * Th
PodNet
project at KTH Stockholm and ETH Zurich. Some research efforts look at DTN for the Interplanetary Internet by examining use of the Bundle Protocol in space: * Th
Saratoga
project at the
University of Surrey The University of Surrey is a public research university in Guildford, Surrey, England. The university received its royal charter in 1966, along with a number of other institutions following recommendations in the Robbins Report. The institu ...
, which was the first to test the bundle protocol in space on the UK-DMC
Disaster Monitoring Constellation The Disaster Monitoring Constellation for International Imaging (DMCii) or just Disaster Monitoring Constellation (DMC) consists of a number of remote sensing satellites constructed by Surrey Satellite Technology Ltd (SSTL) and operated for the A ...
satellite in 2008. *
NASA The National Aeronautics and Space Administration (NASA ) is an independent agency of the US federal government responsible for the civil space program, aeronautics research, and space research. NASA was established in 1958, succeedin ...
JPL's Deep Impact Networking (DINET) Experiment on board the '' Deep Impact''/
EPOXI ''EPOXI'' was a compilation of NASA Discovery program missions led by the University of Maryland and principal investigator Michael A'Hearn, with co-operation from the Jet Propulsion Laboratory and Ball Aerospace. ''EPOXI'' uses the '' Deep Imp ...
spacecraft. * BioServe Space Technologies, one of the first payload developers to adopt the DTN technology, has utilized their CGBA (Commercial Generic Bioprocessing Apparatus) payloads on board the
ISS The International Space Station (ISS) is the largest modular space station currently in low Earth orbit. It is a multinational collaborative project involving five participating space agencies: NASA (United States), Roscosmos (Russia), JAXA (J ...
, which provide computational/communications platforms, to implement the DTN protocol. * NASA, ESA Use Experimental Interplanetary Internet to Test Robot From International Space Station


See also

* Logistical Networking *
Message switching In telecommunications, message switching involves messages routed in their entirety, one hop at a time. It evolved from circuit switching and was the precursor of packet switching. History Western Union operated a message switching system, Plan ...
*
Store and forward Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...


References

{{DEFAULTSORT:Delay-Tolerant Networking Network architecture Network protocols