09071 Executive Summary – Delay and Disruption-Tolerant Networking (DTN) II

Authors Kevin Fall, Cecilia Mascolo, Jörg Ott, Lars Wolf

Thumbnail PDF


  • Filesize: 38 kB
  • 5 pages

Document Identifiers

Author Details

Kevin Fall
Cecilia Mascolo
Jörg Ott
Lars Wolf

Cite AsGet BibTex

Kevin Fall, Cecilia Mascolo, Jörg Ott, and Lars Wolf. 09071 Executive Summary – Delay and Disruption-Tolerant Networking (DTN) II. In Delay and Disruption-Tolerant Networking (DTN) II. Dagstuhl Seminar Proceedings, Volume 9071, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)


Today's Internet architecture and protocols, while perfectly suitable for well- connected users, may easily experience serious performance degradation and entirely stop working in more challenged networking environments. These correspondong scenarios all share two commonalities: that an end-to-end path between two communicating nodes may not exist at any single point in time and that communication delay may be significant. With the continued expansion of the Internet into new areas, these environments become commonplace and are no longer restricted to exotic sensing applications but are quickly becoming relevant to consumers in everyday life. Many attempts over recent years of incrementally fixing the Internet protocols in a bottom up fashion have only achieved partial successes, and a more fundamental approach is needed to address networking environments in which delays and disconnections may last for significant periods of time, and are the rule rather than the exception. Delay-tolerant Networking (DTN) has taken a more encompassing approach to dealing with virtually all types of connectivity challenges, from bit rate to errors to delays to disruptions. By providing a novel communication abstraction that relies exclusively on asynchronous hop-by-hop message passing with no need for instant end-to-end connectivity, DTN concepts enable communications even under adverse conditions. This comes, however, at the cost of interactivity of communications, rendering any kind state synchronization or validation more difficult and raising new challenges. These include routing protocols – that need to operate under often unknown future conditions, security mechanisms – that can no longer carry out instant key derivation or validation even if a security infrastructure was in place, and applica- tion protocols and paradigms – that can no longer rely on simple lower layer abstrac- tions promising (mostly) instant and reliable interactions.
  • DTN
  • simulations
  • mobility
  • delay-tolerant networking
  • ad-hoc networking
  • routing


  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    PDF Downloads
Questions / Remarks / Feedback

Feedback for Dagstuhl Publishing

Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail