140 likes | 174 Views
Explore challenges faced in building resilient communication systems for tactical environments. Overcome delays, disruptions, and security threats while ensuring efficiency and persistence. Address issues like mobility, naming conventions, security, and time synchronization.
E N D
DTN Research Challenges Vint Cerf MCI March 1, 2005
Basics • Overcoming delay and disruption in hostile tactical environments • Building resilience into communication protocols and system architecture • Avoiding brittleness in the above • Operating with efficiency comparable to today’s protocols in benign environments
Architecture • Layering design and functionality • Overlaying TCP/IP networks • Role of IPv6 deployment, mixed mode operation • Non-IP network integration (sensor networks, et al) • Bundle functionality and interfaces • Convergence layer designs • Definition of Regions
Self-Organization • Neighbor discovery • Region discovery • Secure authentication • Topology management • CF mobility • Anecdote (packet radio, velocity, connectivity detection, radiation)
Mobility • Critical requirements • Flexible “joining” with the network(s) • Strong authentication • Multipath routing when available • Power awareness (AGC, efficient power utilization, pt-pt vs omni, multiple antennas, phased arrays…) • Naming and addressing conventions, late binding mechanisms
Security • Strong authentication • Playback, virus, worm resistance • Confidentiality • Key management (rekeying!) • Application to DNS, routing, endpoint communication, custody transfers and anti-spoofing • Multilayer implementation • Dealing with Overrun Situation
Persistence • Persistent process operation in the face of operating system reboots • Persistent “sessions” or “associations” in the presence of disruption • “Presence” maintenance
Time Keeping • Reliable and accurate time keeping for: • Position location • Scheduling of transmissions • Spread spectrum sequencing (hopping, direct spread chipping, signal acquisition) and other spectrum sharing methods • Time on Target and other tactical maneuvers • Fire control, Fire/Forget, Standoff weapons
Efficiency • Header compression • Exploitation of broadcasts, flooding • Region and Administrative naming conventions • Cacheing (when is cache invalidated?) • Real-time applications (RPV, conferencing, sensor networks,…)
Flow and Congestion Control • Resilience in the face of high delay variance • Prioritization and Custody Control • Distinguishing congestion from delay • Multipath forwarding, efficient elimination of duplicates
Routing • Dealing with variably aged connectivity data • Multipath forwarding (How many? Which?) • Authentication of routing information • Scheduled and opportunistic link detection
Simulation and Testing • Mathematical and operational modeling • Integration of real systems with simulated environments • Interoperability testing • Field testing (on maneuvers) • Air, land, sea, satellite
Maintenance and Operation • Fault detection, isolation and repair • Operational data reporting • Network Management (configuration control, congestion response, prioritization…) • Security! Overrun resistance!
Deployment • Use of existing communication systems (EPLRS, JTIDS, newer systems) • Pre-configuration and fixed points vs self-organization • Interworking with older systems • Phasing of deployment (where, when, how)