Download Internet Yesterday, Today and Tomorrow

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
DTN Research Challenges
Vint Cerf
MCI
March 1, 2005
Basics
 Overcoming
delay and disruption in
hostile tactical environments
 Building resilience into communication
protocols and system architecture
 Avoiding brittleness in the above
 Operating with efficiency comparable to
today’s protocols in benign
environments
Architecture
Layering design and functionality
 Overlaying TCP/IP networks
 Role of IPv6 deployment, mixed mode
operation
 Non-IP network integration (sensor networks,
et al)
 Bundle functionality and interfaces
 Convergence layer designs
 Definition of Regions

Self-Organization
 Neighbor
discovery
 Region discovery
 Secure authentication
 Topology management
 CF mobility
 Anecdote (packet radio, velocity,
connectivity detection, radiation)
Mobility
 Critical
requirements
 Flexible
“joining” with the network(s)
 Strong authentication
 Multipath routing when available
 Power awareness (AGC, efficient power
utilization, pt-pt vs omni, multiple antennas,
phased arrays…)
 Naming and addressing conventions, late
binding mechanisms
Security
Strong authentication
 Playback, virus, worm resistance
 Confidentiality
 Key management (rekeying!)
 Application to DNS, routing, endpoint
communication, custody transfers and antispoofing
 Multilayer implementation
 Dealing with Overrun Situation

Persistence
 Persistent
process operation in the face
of operating system reboots
 Persistent “sessions” or “associations”
in the presence of disruption
 “Presence” maintenance
Time Keeping
 Reliable
and accurate time keeping for:
 Position
location
 Scheduling of transmissions
 Spread spectrum sequencing (hopping,
direct spread chipping, signal acquisition)
and other spectrum sharing methods
 Time on Target and other tactical
maneuvers
 Fire control, Fire/Forget, Standoff weapons
Efficiency
 Header
compression
 Exploitation of broadcasts, flooding
 Region and Administrative naming
conventions
 Cacheing (when is cache invalidated?)
 Real-time applications (RPV,
conferencing, sensor networks,…)
Flow and Congestion Control
 Resilience
in the face of high delay
variance
 Prioritization and Custody Control
 Distinguishing congestion from delay
 Multipath forwarding, efficient
elimination of duplicates
Routing
 Dealing
with variably aged connectivity
data
 Multipath forwarding (How many?
Which?)
 Authentication of routing information
 Scheduled and opportunistic link
detection
Simulation and Testing
 Mathematical
and operational modeling
 Integration of real systems with
simulated environments
 Interoperability testing
 Field testing (on maneuvers)
 Air,
land, sea, satellite
Maintenance and Operation
 Fault
detection, isolation and repair
 Operational data reporting
 Network Management (configuration
control, congestion response,
prioritization…)
 Security! Overrun resistance!
Deployment
 Use
of existing communication systems
(EPLRS, JTIDS, newer systems)
 Pre-configuration and fixed points vs
self-organization
 Interworking with older systems
 Phasing of deployment (where, when,
how)