Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
DTN Research Challenges Vint Cerf MCI March 1, 2005 Basics Overcoming delay and disruption in hostile tactical environments Building resilience into communication protocols and system architecture Avoiding brittleness in the above Operating with efficiency comparable to today’s protocols in benign environments Architecture Layering design and functionality Overlaying TCP/IP networks Role of IPv6 deployment, mixed mode operation Non-IP network integration (sensor networks, et al) Bundle functionality and interfaces Convergence layer designs Definition of Regions Self-Organization Neighbor discovery Region discovery Secure authentication Topology management CF mobility Anecdote (packet radio, velocity, connectivity detection, radiation) Mobility Critical requirements Flexible “joining” with the network(s) Strong authentication Multipath routing when available Power awareness (AGC, efficient power utilization, pt-pt vs omni, multiple antennas, phased arrays…) Naming and addressing conventions, late binding mechanisms Security Strong authentication Playback, virus, worm resistance Confidentiality Key management (rekeying!) Application to DNS, routing, endpoint communication, custody transfers and antispoofing Multilayer implementation Dealing with Overrun Situation Persistence Persistent process operation in the face of operating system reboots Persistent “sessions” or “associations” in the presence of disruption “Presence” maintenance Time Keeping Reliable and accurate time keeping for: Position location Scheduling of transmissions Spread spectrum sequencing (hopping, direct spread chipping, signal acquisition) and other spectrum sharing methods Time on Target and other tactical maneuvers Fire control, Fire/Forget, Standoff weapons Efficiency Header compression Exploitation of broadcasts, flooding Region and Administrative naming conventions Cacheing (when is cache invalidated?) Real-time applications (RPV, conferencing, sensor networks,…) Flow and Congestion Control Resilience in the face of high delay variance Prioritization and Custody Control Distinguishing congestion from delay Multipath forwarding, efficient elimination of duplicates Routing Dealing with variably aged connectivity data Multipath forwarding (How many? Which?) Authentication of routing information Scheduled and opportunistic link detection Simulation and Testing Mathematical and operational modeling Integration of real systems with simulated environments Interoperability testing Field testing (on maneuvers) Air, land, sea, satellite Maintenance and Operation Fault detection, isolation and repair Operational data reporting Network Management (configuration control, congestion response, prioritization…) Security! Overrun resistance! Deployment Use of existing communication systems (EPLRS, JTIDS, newer systems) Pre-configuration and fixed points vs self-organization Interworking with older systems Phasing of deployment (where, when, how)