Internet Yesterday, Today and Tomorrow
Download
Report
Transcript Internet Yesterday, Today and Tomorrow
DTN Research Challenges
Vint Cerf
MCI
March 1, 2005
Basics
Overcoming
delay and disruption in
hostile tactical environments
Building resilience into communication
protocols and system architecture
Avoiding brittleness in the above
Operating with efficiency comparable to
today’s protocols in benign
environments
Architecture
Layering design and functionality
Overlaying TCP/IP networks
Role of IPv6 deployment, mixed mode
operation
Non-IP network integration (sensor networks,
et al)
Bundle functionality and interfaces
Convergence layer designs
Definition of Regions
Self-Organization
Neighbor
discovery
Region discovery
Secure authentication
Topology management
CF mobility
Anecdote (packet radio, velocity,
connectivity detection, radiation)
Mobility
Critical
requirements
Flexible
“joining” with the network(s)
Strong authentication
Multipath routing when available
Power awareness (AGC, efficient power
utilization, pt-pt vs omni, multiple antennas,
phased arrays…)
Naming and addressing conventions, late
binding mechanisms
Security
Strong authentication
Playback, virus, worm resistance
Confidentiality
Key management (rekeying!)
Application to DNS, routing, endpoint
communication, custody transfers and antispoofing
Multilayer implementation
Dealing with Overrun Situation
Persistence
Persistent
process operation in the face
of operating system reboots
Persistent “sessions” or “associations”
in the presence of disruption
“Presence” maintenance
Time Keeping
Reliable
and accurate time keeping for:
Position
location
Scheduling of transmissions
Spread spectrum sequencing (hopping,
direct spread chipping, signal acquisition)
and other spectrum sharing methods
Time on Target and other tactical
maneuvers
Fire control, Fire/Forget, Standoff weapons
Efficiency
Header
compression
Exploitation of broadcasts, flooding
Region and Administrative naming
conventions
Cacheing (when is cache invalidated?)
Real-time applications (RPV,
conferencing, sensor networks,…)
Flow and Congestion Control
Resilience
in the face of high delay
variance
Prioritization and Custody Control
Distinguishing congestion from delay
Multipath forwarding, efficient
elimination of duplicates
Routing
Dealing
with variably aged connectivity
data
Multipath forwarding (How many?
Which?)
Authentication of routing information
Scheduled and opportunistic link
detection
Simulation and Testing
Mathematical
and operational modeling
Integration of real systems with
simulated environments
Interoperability testing
Field testing (on maneuvers)
Air,
land, sea, satellite
Maintenance and Operation
Fault
detection, isolation and repair
Operational data reporting
Network Management (configuration
control, congestion response,
prioritization…)
Security! Overrun resistance!
Deployment
Use
of existing communication systems
(EPLRS, JTIDS, newer systems)
Pre-configuration and fixed points vs
self-organization
Interworking with older systems
Phasing of deployment (where, when,
how)