Internet Yesterday, Today and Tomorrow

Download Report

Transcript Internet Yesterday, Today and Tomorrow

DTN Research Challenges
Vint Cerf
MCI
March 1, 2005
Basics
 Overcoming
delay and disruption in
hostile tactical environments
 Building resilience into communication
protocols and system architecture
 Avoiding brittleness in the above
 Operating with efficiency comparable to
today’s protocols in benign
environments
Architecture
Layering design and functionality
 Overlaying TCP/IP networks
 Role of IPv6 deployment, mixed mode
operation
 Non-IP network integration (sensor networks,
et al)
 Bundle functionality and interfaces
 Convergence layer designs
 Definition of Regions

Self-Organization
 Neighbor
discovery
 Region discovery
 Secure authentication
 Topology management
 CF mobility
 Anecdote (packet radio, velocity,
connectivity detection, radiation)
Mobility
 Critical
requirements
 Flexible
“joining” with the network(s)
 Strong authentication
 Multipath routing when available
 Power awareness (AGC, efficient power
utilization, pt-pt vs omni, multiple antennas,
phased arrays…)
 Naming and addressing conventions, late
binding mechanisms
Security
Strong authentication
 Playback, virus, worm resistance
 Confidentiality
 Key management (rekeying!)
 Application to DNS, routing, endpoint
communication, custody transfers and antispoofing
 Multilayer implementation
 Dealing with Overrun Situation

Persistence
 Persistent
process operation in the face
of operating system reboots
 Persistent “sessions” or “associations”
in the presence of disruption
 “Presence” maintenance
Time Keeping
 Reliable
and accurate time keeping for:
 Position
location
 Scheduling of transmissions
 Spread spectrum sequencing (hopping,
direct spread chipping, signal acquisition)
and other spectrum sharing methods
 Time on Target and other tactical
maneuvers
 Fire control, Fire/Forget, Standoff weapons
Efficiency
 Header
compression
 Exploitation of broadcasts, flooding
 Region and Administrative naming
conventions
 Cacheing (when is cache invalidated?)
 Real-time applications (RPV,
conferencing, sensor networks,…)
Flow and Congestion Control
 Resilience
in the face of high delay
variance
 Prioritization and Custody Control
 Distinguishing congestion from delay
 Multipath forwarding, efficient
elimination of duplicates
Routing
 Dealing
with variably aged connectivity
data
 Multipath forwarding (How many?
Which?)
 Authentication of routing information
 Scheduled and opportunistic link
detection
Simulation and Testing
 Mathematical
and operational modeling
 Integration of real systems with
simulated environments
 Interoperability testing
 Field testing (on maneuvers)
 Air,
land, sea, satellite
Maintenance and Operation
 Fault
detection, isolation and repair
 Operational data reporting
 Network Management (configuration
control, congestion response,
prioritization…)
 Security! Overrun resistance!
Deployment
 Use
of existing communication systems
(EPLRS, JTIDS, newer systems)
 Pre-configuration and fixed points vs
self-organization
 Interworking with older systems
 Phasing of deployment (where, when,
how)