License
when quoting this document, please refer to the following
URN: urn:nbn:de:0030-drops-23574
URL: http://drops.dagstuhl.de/opus/volltexte/2009/2357/

Fall, Kevin ; Mascolo, Cecilia ; Ott, Jörg ; Wolf, Lars

09071 Executive Summary -- Delay and Disruption-Tolerant Networking (DTN) II

pdf-format:
Dokument 1.pdf (39 KB)


Abstract

Today's Internet architecture and protocols, while perfectly suitable for well- connected users, may easily experience serious performance degradation and entirely stop working in more challenged networking environments. These correspondong scenarios all share two commonalities: that an end-to-end path between two communicating nodes may not exist at any single point in time and that communication delay may be significant. With the continued expansion of the Internet into new areas, these environments become commonplace and are no longer restricted to exotic sensing applications but are quickly becoming relevant to consumers in everyday life. Many attempts over recent years of incrementally fixing the Internet protocols in a bottom up fashion have only achieved partial successes, and a more fundamental approach is needed to address networking environments in which delays and disconnections may last for significant periods of time, and are the rule rather than the exception. Delay-tolerant Networking (DTN) has taken a more encompassing approach to dealing with virtually all types of connectivity challenges, from bit rate to errors to delays to disruptions. By providing a novel communication abstraction that relies exclusively on asynchronous hop-by-hop message passing with no need for instant end-to-end connectivity, DTN concepts enable communications even under adverse conditions. This comes, however, at the cost of interactivity of communications, rendering any kind state synchronization or validation more difficult and raising new challenges. These include routing protocols -- that need to operate under often unknown future conditions, security mechanisms -- that can no longer carry out instant key derivation or validation even if a security infrastructure was in place, and applica- tion protocols and paradigms -- that can no longer rely on simple lower layer abstrac- tions promising (mostly) instant and reliable interactions.

BibTeX - Entry

@InProceedings{fall_et_al:DSP:2009:2357,
  author =	{Kevin Fall and Cecilia Mascolo and J{\"o}rg Ott and Lars Wolf},
  title =	{09071 Executive Summary -- Delay and Disruption-Tolerant Networking (DTN) II},
  booktitle =	{Delay and Disruption-Tolerant Networking (DTN) II },
  year =	{2009},
  editor =	{Kevin Fall and Cecilia Mascolo and J{\"o}rg Ott and Lars Wolf},
  number =	{09071},
  series =	{Dagstuhl Seminar Proceedings},
  ISSN =	{1862-4405},
  publisher =	{Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2009/2357},
  annote =	{Keywords: DTN, simulations, mobility, MANET, delay-tolerant networking, ad-hoc networking, routing}
}

Keywords: DTN, simulations, mobility, MANET, delay-tolerant networking, ad-hoc networking, routing
Seminar: 09071 - Delay and Disruption-Tolerant Networking (DTN) II
Issue date: 2009
Date of publication: 16.12.2009


DROPS-Home | Fulltext Search | Imprint Published by LZI