Delay-tolerant networking (DTN) is an approach to
computer network
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
architecture that seeks to address the technical issues in
heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space.
Recently, the term disruption-tolerant networking has gained currency in the United States due to support from
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.
History
In the 1970s, spurred by the
decreasing size of computers, researchers began developing technology for routing between non-fixed locations of computers. While the field of ad hoc routing was inactive throughout the 1980s, the widespread use of wireless protocols reinvigorated the field in the 1990s as
mobile ad hoc networking (MANET) and
vehicular ad hoc networking became areas of increasing interest.
Concurrently with (but separate from) the MANET activities, DARPA had funded NASA, MITRE and others to develop a proposal for the
Interplanetary Internet (IPN). Internet pioneer
Vint Cerf
Vinton Gray Cerf (; born June 23, 1943) is an American Internet pioneer and is recognized as one of "the fathers of the Internet", sharing this title with TCP/IP co-developer Robert Kahn.
He has received honorary degrees and awards that inclu ...
and others developed the initial IPN architecture, relating to the necessity of networking technologies that can cope with the significant delays and packet corruption of deep-space communications. In 2002,
Kevin Fall started to adapt some of the ideas in the IPN design to terrestrial networks and coined the term ''delay-tolerant networking'' and the DTN acronym. A paper published in 2003 SIGCOMM conference gives the motivation for DTNs. The mid-2000s brought about increased interest in DTNs, including a growing number of
academic conferences
An academic conference or scientific conference (also congress, symposium, workshop, or meeting) is an event for researchers (not necessarily academics) to present and discuss their scholarly work. Together with academic or scientific journals a ...
on delay and disruption-tolerant networking, and growing interest in combining work from sensor networks and MANETs with the work on DTN. This field saw many optimizations on classic ad hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability, and other areas of research that are well understood in traditional
computer networking
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
.
Routing
The ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as
AODV and
DSR fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination. A common technique used to maximize the probability of a message being successfully transferred is to replicate many copies of the message in the hope that one will succeed in reaching its destination. This is feasible only on networks with large amounts of local storage and internode bandwidth relative to the expected traffic. In many common problem spaces, this inefficiency is outweighed by the increased efficiency and shortened delivery times made possible by taking maximum advantage of available unscheduled forwarding opportunities. In others, where available storage and internode throughput opportunities are more tightly constrained, a more discriminate algorithm is required.
Other concerns
Bundle protocols
In efforts to provide a shared framework for algorithm and application development in DTNs, were published in 2007 to define a common abstraction to software running on disrupted networks. Commonly known as the Bundle Protocol, this protocol defines a series of contiguous data blocks as a bundle—where each bundle contains enough semantic information to allow the application to make progress where an individual block may not. Bundles are
routed in a
store and forward
Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
manner between participating
nodes over varied network transport technologies (including both
IP and non-
IP based transports). The transport layers carrying the bundles across their local networks are called ''bundle convergence layers.'' The bundle architecture therefore operates as an
overlay network
An overlay network is a logical computer network that is protocol layering, layered on top of a physical network. The concept of overlay networking is distinct from the traditional model of OSI model, OSI layered networks, and almost always assum ...
, providing a new naming architecture based on
Endpoint Identifiers (EIDs) and coarse-grained
class of service offerings.
Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the
store and forward
Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
nature of delay-tolerant protocols, routing solutions for delay-tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the Bundle Protocol specification includes "bulk", "normal", and "expedited" markings.
In October 2014 the Internet Engineering Task Force (IETF) instantiated
Delay Tolerant Networking working groupto review and revise the protocol specified in . The Bundle Protocol for CCSDS is a profile of RFC 5050 specifically addressing the Bundle Protocol's utility for data communication in space missions.
As of January 2022, the IETF published the following RFCs related to BPv7: .
In January 2025, was published, which updates RFC 9171.
Security issues
Addressing security issues has been a major focus of the bundle protocol. Possible attacks take the form of nodes behaving as a "black hole" or a "flooder".
Security concerns for delay-tolerant networks vary depending on the environment and application, though
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
and
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
are often critical. These security guarantees are difficult to establish in a network without continuous bi-directional end-to-end paths between devices because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently visible devices. Solutions have typically been modified from
mobile ad hoc network
A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as router (computing), routers or wireless acces ...
and distributed security research, such as the use of distributed certificate authorities and
PKI schemes. Original solutions from the delay-tolerant research community include: 1) the use of
identity-based encryption
Identity-based encryption (IBE), is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's ema ...
, which allows nodes to receive
information encrypted with their public identifier; and 2) the use of tamper-evident tables with a
gossiping protocol;
Implementations
There are a number of implementations of the Bundle Protocol:
BPv6 (RFC 5050, Bundle Protocol for CCSDS)
The main implementation of BPv6 are listed below. A number of other implementations exist.
High-rate DTN��C++17 - based; performance-optimized DTN; runs directly on Linux and Windows.
*
NASA Interplanetary Overlay Network (ION)—Written in C; designed to run on a wide variety of platforms; conforms to restrictions for space flight software (e.g. no dynamic memory allocation).
IBR-DTN��C++ - based; runs on routers with OpenWRT; also contains Java applications (router and user apps) for use on Android.
DTN2��C++ - based; designed to be a reference / learning / teaching implementation of the Bundle Protocol.
DTN Marshal Enterprise (DTNME)��C++ - based; Enterprise solution; designed as an operational DTN implementation. Currently used in ISS operations. DTNME is a single implementation supporting both BPv6 and BPv7.
BPv7
The following BPv7 implementations exist among others and are partially listed in the BPv7 RFC draft.
High-rate DTN��C++17 - based; performance-optimized DTN; runs directly on Linux and Windows.
μPCN��C; built upon the POSIX API as well as FreeRTOS and intended to run on low-cost micro satellites.
µD3TN��C; actively maintained, space-tested DTN protocol implementation initially based on µPCN.
* PyDTN—Python; developed by X-works and during the IETF 101 Hackathon.
Terra��Java; developed in the context of terrestrial DTN.
dtn7-go��Go; implementation focused on easy extensibility and suitable for research.
dtn7-rs��Rust; intended for environments with limited resources and performance requirements.
*
NASA Interplanetary Overlay Network (ION)—C; intended to be usable in embedded environments including spacecraft flight computers.
DTN Marshal Enterprise (DTNME)��C++ - based; Enterprise solution; designed as an operational DTN implementation. Currently used in ISS operations. DTNME is a single implementation supporting both BPv6 and BPv7.
NASA BPLibC; A Bundle Protocol library and associated applications by Goddard Space Flight Center. Intended for general use, particularly in space flight applications, integration wit
cFS(core Flight System), and other applications where store-and-forward capabilities are needed. First time will be used on PACE missio
Research efforts
Various research efforts are currently investigating the issues involved with DTN:
* Th
Delay-Tolerant Networking Research Group
* Th
Technology and Infrastructure for Developing Regionsproject at
UC Berkeley
The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California), is a public land-grant research university in Berkeley, California, United States. Founded in 1868 and named after the Anglo-Irish philosopher George Berkele ...
* Th
Bytewallaresearch project at th
Royal Institute of Technology, KTH* The
KioskNet research project at the
University of Waterloo
The University of Waterloo (UWaterloo, UW, or Waterloo) is a Public university, public research university located in Waterloo, Ontario, Canada. The main campus is on of land adjacent to uptown Waterloo and Waterloo Park. The university also op ...
.
* Th
DieselNet research project at the
University of Massachusetts Amherst
The University of Massachusetts Amherst (UMass Amherst) is a public land-grant research university in Amherst, Massachusetts, United States. It is the flagship campus of the University of Massachusetts system and was founded in 1863 as the ...
, Amherst.
* Th
ResiliNets Research Initiativeat the
University of Kansas
The University of Kansas (KU) is a public research university with its main campus in Lawrence, Kansas, United States. Two branch campuses are in the Kansas City metropolitan area on the Kansas side: the university's medical school and hospital ...
and
Lancaster University
Lancaster University (officially The University of Lancaster) is a collegiate public university, public research university in Lancaster, Lancashire, England. The university was established in 1964 by royal charter, as one of several new univer ...
.
* Th
HaggleEU research project.
* The
Space Internetworking Center EU/FP7 project at the
Democritus University of Thrace.
* Th
N4CEU/FP7 research project.
* Th
DARPA project.
* Th
EMMAan
OPTRACOMprojects at
TU Braunschweig
* Th
DTNat
Helsinki University of Technology
Helsinki University of Technology (TKK; ; , HUT in international usage) was a technical university in Finland. It was located in Otaniemi, Espoo in the Helsinki metropolitan area, and it was one of the three universities from which the modern d ...
.
* Th
SARAH project, funded by the French National Research Agency
ANR.
* The development of th
DoDWAN platforma
Université Bretagne Sud
* Th
CROWD project, funded by the French National Research Agency
ANR.
* Th
PodNetproject at
KTH Stockholm and
ETH
Eth ( , uppercase: ⟨Ð⟩, lowercase: ⟨ð⟩; also spelled edh or eð), known as in Old English, is a letter used in Old English, Middle English, Icelandic, Faroese (in which it is called ), and Elfdalian.
It was also used in Sca ...
Zurich.
Some research efforts look at DTN for the
Interplanetary Internet by examining use of the Bundle Protocol in space:
* Th
Saratogaproject at the
University of Surrey
The University of Surrey is a public research university in Guildford, Surrey, England. The university received its Royal Charter, royal charter in 1966, along with a Plate glass university, number of other institutions following recommendations ...
, which was the first to test the bundle protocol in space on the UK-DMC
Disaster Monitoring Constellation
The Disaster Monitoring Constellation for International Imaging (DMCii) or just Disaster Monitoring Constellation (DMC) consists of a number of remote sensing satellites constructed by Surrey Satellite Technology Ltd (SSTL) and operated for the Alg ...
satellite in 2008.
*
NASA
The National Aeronautics and Space Administration (NASA ) is an independent agencies of the United States government, independent agency of the federal government of the United States, US federal government responsible for the United States ...
JPL's Deep Impact Networking (DINET) Experiment on board the ''
Deep Impact''/
EPOXI
''EPOXI'' was a compilation of NASA Discovery program missions led by the University of Maryland and principal investigator Michael A'Hearn, with co-operation from the Jet Propulsion Laboratory and Ball Aerospace. ''EPOXI'' uses the '' Deep I ...
spacecraft.
* BioServe Space Technologies, one of the first payload developers to adopt the DTN technology, has utilized their CGBA (Commercial Generic Bioprocessing Apparatus) payloads on board the
ISS, which provide computational/communications platforms, to implement the DTN protocol.
* NASA, ESA Use Experimental Interplanetary Internet to Test Robot From International Space Station
See also
*
Logistical Networking
*
Message switching In telecommunications, message switching involves messages routed in their entirety, one hop at a time. It evolved from circuit switching and was the precursor of packet switching.
An example of message switching is email in which the message is s ...
*
Store and forward
Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
References
{{DEFAULTSORT:Delay-Tolerant Networking
Network architecture
Network protocols