Delay-tolerant networking (DTN) is an approach to
computer network architecture that seeks to address the technical issues in
heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space.
Recently, the term disruption-tolerant networking has gained currency in the United States due to support from
DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.
History
In the 1970s, spurred by the
decreasing size of computers, researchers began developing technology for routing between non-fixed locations of computers. While the field of ad hoc routing was inactive throughout the 1980s, the widespread use of wireless protocols reinvigorated the field in the 1990s as
mobile ad hoc networking (MANET) and
vehicular ad hoc networking became areas of increasing interest.
Concurrently with (but separate from) the MANET activities, DARPA had funded NASA, MITRE and others to develop a proposal for the
Interplanetary Internet (IPN). Internet pioneer
Vint Cerf and others developed the initial IPN architecture, relating to the necessity of networking technologies that can cope with the significant delays and packet corruption of deep-space communications. In 2002,
Kevin Fall
Kevin () is the anglicized form of the Irish masculine given name (; mga, Caoimhghín ; sga, Cóemgein ; Latinized as ). It is composed of "dear; noble"; Old Irish and ("birth"; Old Irish ).
The variant '' Kevan'' is anglicized from , a ...
started to adapt some of the ideas in the IPN design to terrestrial networks and coined the term ''delay-tolerant networking'' and the DTN acronym. A paper published in 2003 SIGCOMM conference gives the motivation for DTNs. The mid-2000s brought about increased interest in DTNs, including a growing number of
academic conferences on delay and disruption-tolerant networking, and growing interest in combining work from sensor networks and MANETs with the work on DTN. This field saw many optimizations on classic ad hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability, and other areas of research that are well understood in traditional
computer networking.
Routing
The ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as
AODV
Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc networks (MANETs) and other wireless ad hoc networks. It was jointly developed in July 2003 in Nokia Research Center, University of California, Santa Barbara an ...
and
DSR fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination. A common technique used to maximize the probability of a message being successfully transferred is to replicate many copies of the message in the hope that one will succeed in reaching its destination. This is feasible only on networks with large amounts of local storage and internode bandwidth relative to the expected traffic. In many common problem spaces, this inefficiency is outweighed by the increased efficiency and shortened delivery times made possible by taking maximum advantage of available unscheduled forwarding opportunities. In others, where available storage and internode throughput opportunities are more tightly constrained, a more discriminate algorithm is required.
Other concerns
Bundle protocols
In efforts to provide a shared framework for algorithm and application development in DTNs, RFC 4838 and RFC 5050 were published in 2007 to define a common abstraction to software running on disrupted networks. Commonly known as the Bundle Protocol, this protocol defines a series of contiguous data blocks as a bundle—where each bundle contains enough semantic information to allow the application to make progress where an individual block may not. Bundles are
routed
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. Broadly, routing is performed in many types of networks, including circuit-switched networks, such as the public switched telephone netwo ...
in a
store and forward manner between participating
nodes
In general, a node is a localized swelling (a "knot") or a point of intersection (a Vertex (graph theory), vertex).
Node may refer to:
In mathematics
*Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two ...
over varied network transport technologies (including both
IP and non-
IP based transports). The transport layers carrying the bundles across their local networks are called ''bundle convergence layers.'' The bundle architecture therefore operates as an
overlay network, providing a new naming architecture based on
Endpoint Identifiers
An endpoint, end-point or end point may refer to:
* Endpoint (band), a hardcore punk band from Louisville, Kentucky
* Endpoint (chemistry), the conclusion of a chemical reaction, particularly for titration
* Outcome measure, a measure used as an e ...
(EIDs) and coarse-grained
class of service offerings.
Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the
store and forward nature of delay-tolerant protocols, routing solutions for delay-tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the RFC 5050 Bundle Protocol specification includes "bulk", "normal", and "expedited" markings.
In October 2014 the Internet Engineering Task Force (IETF) instantiated
Delay Tolerant Networking working groupto review and revise the protocol specified in RFC5050. The Bundle Protocol for CCSDS is a profile of RFC5050 specifically addressing the Bundle Protocol's utility for data communication in space missions.
Security issues
Addressing security issues has been a major focus of the bundle protocol. Possible attacks take the form of nodes behaving as a "black hole" or a "flooder".
Security concerns for delay-tolerant networks vary depending on the environment and application, though
authentication and
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
are often critical. These security guarantees are difficult to establish in a network without continuous bi-directional end-to-end paths between devices because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently visible devices. Solutions have typically been modified from
mobile ad hoc network and distributed security research, such as the use of distributed certificate authorities and
PKI PKI may refer to:
* Partai Komunis Indonesia, the Communist Party of Indonesia
* Peter Kiewit Institute
The Peter Kiewit Institute is a facility in Omaha, Nebraska, United States which houses academic programs from the University of Nebraska� ...
schemes. Original solutions from the delay-tolerant research community include: 1) the use of
identity-based encryption ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user ( ...
, which allows nodes to receive
information encrypted with their public identifier; and 2) the use of tamper-evident tables with a
gossiping protocol;
Implementations
There are a number of implementations of the Bundle Protocol:
BPv6 (RFC5050, Bundle Protocol for CCSDS)
The main implementation of BPv6 are listed below. A number of other implementations exist.
*
NASA Interplanetary Overlay Network (ION)—Written in C; designed to run on a wide variety of platforms; conforms to restrictions for space flight software (e.g. no dynamic memory allocation).
IBR-DTN��C++ - based; runs on routers with OpenWRT; also contains JAVA applications (router and user apps) for use on Android.
DTN2��C++ - based; designed to be a reference / learning / teaching implementation of the Bundle Protocol.
BPv7 (Internet Research Task Force RFC)
The draft of BPv7 lists six known implementations.
µPCN��C; built upon the POSIX API as well as FreeRTOS and intended to run on low-cost micro satellites.
* PyDTN—Python; developed by X-works and during the IETF 101 Hackathon.
Terra��Java; developed in the context of terrestrial DTN.
dtn7-go��Go; implementation focused on easy extensibility and suitable for research.
dtn7-rs��Rust; intended for environments with limited resources and performance requirements.
*
NASA Interplanetary Overlay Network (ION)—C; intended to be usable in embedded environments including spacecraft flight computers.
Research efforts
Various research efforts are currently investigating the issues involved with DTN:
* Th
Delay-Tolerant Networking Research Group
* Th
Technology and Infrastructure for Developing Regionsproject at
UC Berkeley
* Th
Bytewallaresearch project at th
Royal Institute of Technology, KTH* The
KioskNet KioskNet is a system, developed at the University of Waterloo, to provide very low cost Internet access to rural villages in developing countries, based on the concept of delay-tolerant networking. It uses vehicles, such as buses, to ferry data betw ...
research project at the
University of Waterloo.
* Th
DieselNetresearch project at the
University of Massachusetts Amherst, Amherst.
* Th
ResiliNets Research Initiativeat the
University of Kansas and
Lancaster University
Lancaster University (legally The University of Lancaster) is a public university, public research university in Lancaster, Lancashire, Lancaster, Lancashire, England. The university was established in 1964 by royal charter, as one of several pla ...
.
* Th
HaggleEU research project.
* The
Space Internetworking Center
Space Internetworking Center (SPICE) ( gr, Κέντρο Διαστημικής Διαδικτύωσης) in Xanthi, Greece, was founded in September 2010, having acquired funding from FP-7 Research Potential programmeFP7-REGPOT-2010-1 Grant Agree ...
EU/FP7 project at the
Democritus University of Thrace.
* Th
N4CEU/FP7 research project.
* Th
DARPA project.
* Th
EMMAan
OPTRACOMprojects at
TU Braunschweig
The Technische Universität Braunschweig (unofficially University of Braunschweig – Institute of Technology), commonly referred to as TU Braunschweig, is the oldest ' (comparable to an institute of technology in the American system) in Germany. ...
* Th
DTNat
Helsinki University of Technology.
* Th
SARAHproject, funded by the French National Research Agency
ANR.
* The development of th
DoDWAN platforma
Université Bretagne Sud
* Th
CROWDproject, funded by the French National Research Agency
ANR.
* Th
PodNetproject at
KTH Stockholm and
ETH Zurich.
Some research efforts look at DTN for the
Interplanetary Internet by examining use of the Bundle Protocol in space:
* Th
Saratogaproject at the
University of Surrey
The University of Surrey is a public research university in Guildford, Surrey, England. The university received its royal charter in 1966, along with a number of other institutions following recommendations in the Robbins Report. The institut ...
, which was the first to test the bundle protocol in space on the UK-DMC
Disaster Monitoring Constellation satellite in 2008.
*
NASA JPL
The Jet Propulsion Laboratory (JPL) is a federally funded research and development center and NASA field center in the City of La Cañada Flintridge, California, United States.
Founded in the 1930s by Caltech researchers, JPL is owned by NASA an ...
's Deep Impact Networking (DINET) Experiment on board the ''
Deep Impact''/
EPOXI spacecraft.
* BioServe Space Technologies, one of the first payload developers to adopt the DTN technology, has utilized their CGBA (Commercial Generic Bioprocessing Apparatus) payloads on board the
ISS, which provide computational/communications platforms, to implement the DTN protocol.
* NASA, ESA Use Experimental Interplanetary Internet to Test Robot From International Space Station
See also
*
Logistical Networking Information Logistics (IL) deals with the flow of information between human and / or machine actors within or between any number of organizations that in turn form a value creating network (see, e.g.). IL is closely related to information management ...
*
Message switching
*
Store and forward
References
{{DEFAULTSORT:Delay-Tolerant Networking
Network architecture
Network protocols