SlideShare a Scribd company logo
LailiAidi (aidi@kth.se)
Jung Changsu (changsu@kth.se)
   Many evolving wireless networks have
    characteristics different from the Internet.
    •   The instability of the link
    •   Long propagation and queuing delays
    •   Extremely asymmetric data rate
    •   High link error rates


   Delay Tolerant networks are designed to provide
    • reliable transmission
    • Interoperable communications between wide range of
      networks




                                                           2
 The Interplanetary Internet initiative: find a solution
  & suggestion network architecture, support reliable
  transmission between a station on the Earth and
  satellites, with an overlay network concept
 IRTF DTN Research Group: Interplanetary Internet
  under challenged networks
 DARPA Disruption Tolerant Networking program:
  Protocols for transmitting bundles to DTN nodes




                                                            3
 Path   and Link
 • High Error and Asymmetric Rate
 • Disconnection
 • Long and Variable Delay
 Network
 • Intermittent Connectivity
 • Security
 End    System
 • Limited Longevity
 • Low Duty Cycle Operation
 • Limited Resources



                                    4
 Link-repair   approach
Maintaining the end-to-end reliability and fate-sharing
 model of Internet
 Network-specific   proxy agent
Accessing internet from challenged networks, vice versa

 Message-oriented   reliable overlay architecture:
 Interoperability properties + Robust non-
 interactive delivery semantics + CoS

 Store-and-Forward     message switching:
 Gateway concept - Hold data until it has a scheduled
 transfer, In-network storage

                                                          5
 Region
 •   Regional network concept
 •   Interconnect different networks
 •   Own communication protocol
 •   Unique ID
 Node
 • Host: Sends or receives bundles and requires storage for
   queuing bundles.
 • Router: Forwards each bundles in the same DTN
   region, requires storage to store incoming packets
 • Gateway - support interoperability: interconnection
   point, forwards bundles to other DTN regions with different
   protocol stacks.


                                                                 6
   Bundle: message
    • Bundle header: Fragmentation
    • Control information: handling, storing, disposing
    • Source-application’s user data

   Fragmentation
    • To increase the possibility of delivery & increase
      performance
    • Proactive fragmentation
      • Predicted Contact volume + Optimize its usage
    • Reactive fragmentation
      • disconnection while transmitting fragmented bundles + Send
        smaller fragments


                                                                     7
   Bundle Layer




                   (2)




                         8
   Class of Service




                       (2)




                             9
   Name Tuple :
    • Region: Globally unique, reduce forwarding tables size
    • Entity Name: Identifier in specified region, not globally
      unique

   Contact Knowledge Oracle:encapsulate particular
    knowledge of network (Null, Contact Summary, Complete
    Contact, Queuing, Traffic On Demand)
   Group Membership Oracle:encapsulate particular
    knowledge of group dynamic (Local, Delay, Complete)




                                                                  10
   Objective: Maximize the probability of message delivery
•   time-varying multi-graph: no guarantee of the availability
    of the next hops link
•   Asymmetric data rate sender vs. receiver
•   high error rate link: retransmission
•   Contact intervals and volumes: unknown precisely ahead
    of time

 Routing     Algorithm Class
•   Zero Knowledge: Poor performance
•   Complete Knowledge: Complete knowledge
•   Partial Knowledge: Route message independently based
    on the future traffic demand.



                                                                 11
   Single-copy technique:
    • EMDDA: evaluating different routing metrics, no network
      traffic consideration
    • Deterministic node mobility assumption

   Multi-copy techniques:
    • Flooding-based protocols: non resource-constrained
      environments
    • Quota-based protocols: resource-constrained
      environments (quota flag to every message )




                                                                12
 Unicast-based  routing (UBR)
 Broadcast-Based Routing (BBR)
 Tree-Based Routing (TBR)
 Group-Based Routing (GBR)
 Context Aware Multicast Routing
 Static tree-based routing (STBR)
 Dynamic Tree-Based Multicasting Algorithm
  (DTBR)
 Context Aware Multicast Routing (CAMR)




                                              13
   Issues in bundle layer
    •   Vulnerable to attack because it is an overlay network
    •   Bundles can be modified
    •   Unauthorized insertion of bundles.
    •   Accept only authenticated messages

   Bundle Security
    • Authentication is carried out in routers and gateways
    • Public-key cryptography
        • both users and forwarders have their own key-pairs and certificates
    • A sender uses its private key to sign bundles and create
      bundle-specific signature.
    • A forwarding node replaces the sender’s signature with its
      own.



                                                                                14
   Open Issues in Bundle Security
    • The level of flexibility
       The bundle security protocol prevents insecure combination of
        application such as including plain-text signatures.
       Can support VPN but the complexity can cause high cost


    • Key Management
       No key management schemes exist in DTN deployments
       Existing schemes need hard coding.


    • Canonicalization of bundles
       Requires the same bytes of bundle of signature for integrity
       Bundles may be changed during traversal between nodes




                                                                        15
 Analyticalresearch, Mobility model
 Free-space Optical Communications: smart
  mobile phone-based mobile ad-hoc networks
  (MANETs)
 Radio Frequency (RF)
 Ultra-Wide Band (UWB)
 Acoustic (Sonar, Ultrasonic)




                                              16
 Outer  Space / Deep-Space Networks
  Inter Planetary Networks: communication
  network robustness, timeliness data return
 Terrestrial Civilian Network
  Mule Networks (ZebraNet), Challenge Links
  (SenDT)
 Acoustic underwater networks
 Battlefield networks




                                               17
   Overview
    •   Developed by the University of Waterloo
    •   Providing low cost Internet services to the poorest villages
    •   Vehicles are used to deliver data
    •   Services:
         birth, marriage, and death certificates
         Medical consultation and agricultural problems
    • Key concepts for a robust system
           Low-cost(70$/kiosk/month)
           low-power kiosk controller (6~8W)
           Using refurbished PCs without hard disks
           Free software


                                                                     Figure 11. KioskNet overview
                                          S.Guo, M.H. Falaki, U.Ismail, E.A. Oliver, S.UrRahman, A. Seth, M.A. Zaharia, and S.Keshav.
                                          “Design and Implementation of the KioskNet System (Extended Version)”. [Online].




                                                                                                                                 18
   Components
    • Kiosk
       Kiosk controller provide a network boot function, a network file
        system, user management, and network connectivity
    • Ferries
       a car, buses, motorcycles or trains
       contact with kiosk controllers and gateways using opportunistic ways
    • Gateway
       connected to the Internet through DSL or broadband
       receives data from a ferry and uploads the data to the proxy
    • Proxy
       Support communication between kiosk users and a legacy server
    • Legacy Server
       Typical servers supporting applications such as IMAP, SMTP and HTTP




                                                                               19
   Security Architecture
    • Entities
       KioskNet Franchisers, Franchisees, Users, Application Service providers

    • Certificate
       All entities have a 2048-bit RSA key and a public key
       Proxy broadcasts a public key for users, franchisees and ASPs

    • Infrastructure Integrity
       Digital signatures are used on all remote commands and software updates
        from franchiser

    • User data protection
       This system offers encrypted virtual space for each user’s home directory



                                                                                    20
   The main goal of a DTN
    • Interoperability
       between different kinds of networks in wide-ranging regions even
        though many limitations

    • Reliable transmission based on overlay network

   The implementation of DTNs will be a good solution for
    challenged networks
    • For example: KioskNet




                                                                           21
Questions?




              22

More Related Content

What's hot (20)

PPT
HiperLAN.ppt
SwarnaKumariChinni
 
PDF
Distributed Systems
Paulo Gandra de Sousa
 
PPSX
Congestion control in TCP
selvakumar_b1985
 
PPTX
message communication protocols in IoT
FabMinds
 
PPT
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
PPTX
Data enrichment
FabMinds
 
PDF
Design issues of dos
vanamali_vanu
 
PPTX
CoAP - Web Protocol for IoT
Aniruddha Chakrabarti
 
PPTX
Tcp
Varsha Kumar
 
PPTX
Networking ppt by swapi
Swapi Pawar
 
PPT
The cellular concept
ZunAib Ali
 
PDF
MQTT - Protocol for the Internet of Things
University of Pretoria
 
PPTX
IP Security
Keshab Nath
 
PPTX
User datagram protocol (udp)
Ramola Dhande
 
PPTX
Gprs architecture
DeekshithaReddy23
 
PDF
Chapter 3 : User Datagram Protocol (UDP)
Ministry of Higher Education
 
PDF
Multi Carrier Modulation OFDM & FBMC
Vetrivel Chelian
 
DOCX
EC8004 - Wireless Networks Question Bank
KannanKrishnana
 
PPT
Legal issues in cloud computing
movinghats
 
HiperLAN.ppt
SwarnaKumariChinni
 
Distributed Systems
Paulo Gandra de Sousa
 
Congestion control in TCP
selvakumar_b1985
 
message communication protocols in IoT
FabMinds
 
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
Data enrichment
FabMinds
 
Design issues of dos
vanamali_vanu
 
CoAP - Web Protocol for IoT
Aniruddha Chakrabarti
 
Networking ppt by swapi
Swapi Pawar
 
The cellular concept
ZunAib Ali
 
MQTT - Protocol for the Internet of Things
University of Pretoria
 
IP Security
Keshab Nath
 
User datagram protocol (udp)
Ramola Dhande
 
Gprs architecture
DeekshithaReddy23
 
Chapter 3 : User Datagram Protocol (UDP)
Ministry of Higher Education
 
Multi Carrier Modulation OFDM & FBMC
Vetrivel Chelian
 
EC8004 - Wireless Networks Question Bank
KannanKrishnana
 
Legal issues in cloud computing
movinghats
 

Viewers also liked (20)

PPTX
Routing in Delay Tolerant Networks
Anubhav Mahajan
 
PPTX
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
PDF
Delay Tolerant Network - Journal
Laili Aidi
 
PDF
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Nasir Bhutta
 
PPT
Opportunistic Networking
Noorin Fatima
 
PPTX
Vanet ppt
Akash Raghunath
 
PDF
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 
PPTX
Vehicular network
Dr Shashikant Athawale
 
PDF
Delay tolerant network routing protocol a comprehensive survey with hybrid...
eSAT Journals
 
PPT
Rmdtn ppt
varsha mohite
 
PPTX
Advanced Wireless Technologies
Dr Shashikant Athawale
 
PPTX
Vanet Presentation
Sayed_Hossain
 
PPTX
Introduction to VANET
Akanksha Upadhyay
 
PPTX
Intro to DTN and routing classification
Shivi Shukla
 
PDF
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication
 
PPTX
wireless sensor network my seminar ppt
Eisha Madhwal
 
PDF
Ch1 delays, loss, and throughput l5
Syed Ariful Islam Emon
 
PDF
Social-aware Opportunistic Routing
Waldir Moreira
 
PPT
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 
Routing in Delay Tolerant Networks
Anubhav Mahajan
 
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
Delay Tolerant Network - Journal
Laili Aidi
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Nasir Bhutta
 
Opportunistic Networking
Noorin Fatima
 
Vanet ppt
Akash Raghunath
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 
Vehicular network
Dr Shashikant Athawale
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
eSAT Journals
 
Rmdtn ppt
varsha mohite
 
Advanced Wireless Technologies
Dr Shashikant Athawale
 
Vanet Presentation
Sayed_Hossain
 
Introduction to VANET
Akanksha Upadhyay
 
Intro to DTN and routing classification
Shivi Shukla
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication
 
wireless sensor network my seminar ppt
Eisha Madhwal
 
Ch1 delays, loss, and throughput l5
Syed Ariful Islam Emon
 
Social-aware Opportunistic Routing
Waldir Moreira
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 
Ad

Similar to Delay Tolerant Network - Presentation (20)

PPTX
Rpl telecom bretagne
Pascal Thubert
 
PPT
Chapter1 intro
Diego Corrales
 
PPT
3rd edition chapter1
nguyễn cầm
 
PPTX
MVA slides lesson 7
Fabio Almeida- Oficina Eletrônica
 
PPTX
98 366 mva slides lesson 7
suddenven
 
PPT
Overlaynetworks-SDN-COMPUTER NETWORKS.ppt
MARIAMICHAELVISUWASA
 
PPTX
Chapter 1 overview-stij3053 - Network Design
nakomuri
 
PPT
VOICE
CiscoV1
 
PPTX
Networking
Prashant Anand
 
PPT
5. telecomm & network security
7wounders
 
PPT
Jaimin chp-1 - introduction - 2011 batch
Jaimin Jani
 
PDF
UNDERWATER SENSORS NETWORKS
Alessandro Gonella
 
PDF
Advanced Computing Techonologies
Kathirvel Ayyaswamy
 
PPT
Data & comp. communication
Ashwin Namewar
 
PPT
Computer networks--osi model
Aditya Mehta
 
PPT
Internetworking.49
myrajendra
 
PPT
Inter-Networking Overview
Ravi Shairaywal
 
PPTX
Distributed Systems - Information Technology
Sagar Mehta
 
PPSX
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Mshari Alabdulkarim
 
PPT
06 fr technology-030420
jitendra Samal
 
Rpl telecom bretagne
Pascal Thubert
 
Chapter1 intro
Diego Corrales
 
3rd edition chapter1
nguyễn cầm
 
98 366 mva slides lesson 7
suddenven
 
Overlaynetworks-SDN-COMPUTER NETWORKS.ppt
MARIAMICHAELVISUWASA
 
Chapter 1 overview-stij3053 - Network Design
nakomuri
 
VOICE
CiscoV1
 
Networking
Prashant Anand
 
5. telecomm & network security
7wounders
 
Jaimin chp-1 - introduction - 2011 batch
Jaimin Jani
 
UNDERWATER SENSORS NETWORKS
Alessandro Gonella
 
Advanced Computing Techonologies
Kathirvel Ayyaswamy
 
Data & comp. communication
Ashwin Namewar
 
Computer networks--osi model
Aditya Mehta
 
Internetworking.49
myrajendra
 
Inter-Networking Overview
Ravi Shairaywal
 
Distributed Systems - Information Technology
Sagar Mehta
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Mshari Alabdulkarim
 
06 fr technology-030420
jitendra Samal
 
Ad

More from Laili Aidi (20)

PDF
Mobile Music Business Models in Asia's Emerging Markets
Laili Aidi
 
PDF
Stream Control Transmission Protocol (SCTP) - Introduction
Laili Aidi
 
PDF
Internet of Things
Laili Aidi
 
PDF
Study Abroad in the Land of Nobel
Laili Aidi
 
PDF
Go International: Challenges and Opportunities
Laili Aidi
 
PDF
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Laili Aidi
 
PDF
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Laili Aidi
 
PPT
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Laili Aidi
 
PDF
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Laili Aidi
 
PDF
Music Service Monetization 2.0
Laili Aidi
 
PDF
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Laili Aidi
 
PDF
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Laili Aidi
 
PPTX
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
PDF
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Laili Aidi
 
PDF
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Laili Aidi
 
PDF
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
Laili Aidi
 
PDF
Sweden’s Telecom Markets, Actors & Roles - Presentation
Laili Aidi
 
PDF
Condroid KTH Summer CSD 2011 - Final Report
Laili Aidi
 
PDF
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Laili Aidi
 
PDF
Condroid KTH Summer CSD 2011 - Press Release
Laili Aidi
 
Mobile Music Business Models in Asia's Emerging Markets
Laili Aidi
 
Stream Control Transmission Protocol (SCTP) - Introduction
Laili Aidi
 
Internet of Things
Laili Aidi
 
Study Abroad in the Land of Nobel
Laili Aidi
 
Go International: Challenges and Opportunities
Laili Aidi
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Laili Aidi
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Laili Aidi
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Laili Aidi
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Laili Aidi
 
Music Service Monetization 2.0
Laili Aidi
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Laili Aidi
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Laili Aidi
 
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Laili Aidi
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Laili Aidi
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
Laili Aidi
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Final Report
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Press Release
Laili Aidi
 

Recently uploaded (20)

PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 

Delay Tolerant Network - Presentation

  • 2. Many evolving wireless networks have characteristics different from the Internet. • The instability of the link • Long propagation and queuing delays • Extremely asymmetric data rate • High link error rates  Delay Tolerant networks are designed to provide • reliable transmission • Interoperable communications between wide range of networks 2
  • 3.  The Interplanetary Internet initiative: find a solution & suggestion network architecture, support reliable transmission between a station on the Earth and satellites, with an overlay network concept  IRTF DTN Research Group: Interplanetary Internet under challenged networks  DARPA Disruption Tolerant Networking program: Protocols for transmitting bundles to DTN nodes 3
  • 4.  Path and Link • High Error and Asymmetric Rate • Disconnection • Long and Variable Delay  Network • Intermittent Connectivity • Security  End System • Limited Longevity • Low Duty Cycle Operation • Limited Resources 4
  • 5.  Link-repair approach Maintaining the end-to-end reliability and fate-sharing model of Internet  Network-specific proxy agent Accessing internet from challenged networks, vice versa  Message-oriented reliable overlay architecture: Interoperability properties + Robust non- interactive delivery semantics + CoS  Store-and-Forward message switching: Gateway concept - Hold data until it has a scheduled transfer, In-network storage 5
  • 6.  Region • Regional network concept • Interconnect different networks • Own communication protocol • Unique ID  Node • Host: Sends or receives bundles and requires storage for queuing bundles. • Router: Forwards each bundles in the same DTN region, requires storage to store incoming packets • Gateway - support interoperability: interconnection point, forwards bundles to other DTN regions with different protocol stacks. 6
  • 7. Bundle: message • Bundle header: Fragmentation • Control information: handling, storing, disposing • Source-application’s user data  Fragmentation • To increase the possibility of delivery & increase performance • Proactive fragmentation • Predicted Contact volume + Optimize its usage • Reactive fragmentation • disconnection while transmitting fragmented bundles + Send smaller fragments 7
  • 8. Bundle Layer (2) 8
  • 9. Class of Service (2) 9
  • 10. Name Tuple : • Region: Globally unique, reduce forwarding tables size • Entity Name: Identifier in specified region, not globally unique  Contact Knowledge Oracle:encapsulate particular knowledge of network (Null, Contact Summary, Complete Contact, Queuing, Traffic On Demand)  Group Membership Oracle:encapsulate particular knowledge of group dynamic (Local, Delay, Complete) 10
  • 11. Objective: Maximize the probability of message delivery • time-varying multi-graph: no guarantee of the availability of the next hops link • Asymmetric data rate sender vs. receiver • high error rate link: retransmission • Contact intervals and volumes: unknown precisely ahead of time  Routing Algorithm Class • Zero Knowledge: Poor performance • Complete Knowledge: Complete knowledge • Partial Knowledge: Route message independently based on the future traffic demand. 11
  • 12. Single-copy technique: • EMDDA: evaluating different routing metrics, no network traffic consideration • Deterministic node mobility assumption  Multi-copy techniques: • Flooding-based protocols: non resource-constrained environments • Quota-based protocols: resource-constrained environments (quota flag to every message ) 12
  • 13.  Unicast-based routing (UBR)  Broadcast-Based Routing (BBR)  Tree-Based Routing (TBR)  Group-Based Routing (GBR)  Context Aware Multicast Routing  Static tree-based routing (STBR)  Dynamic Tree-Based Multicasting Algorithm (DTBR)  Context Aware Multicast Routing (CAMR) 13
  • 14. Issues in bundle layer • Vulnerable to attack because it is an overlay network • Bundles can be modified • Unauthorized insertion of bundles. • Accept only authenticated messages  Bundle Security • Authentication is carried out in routers and gateways • Public-key cryptography • both users and forwarders have their own key-pairs and certificates • A sender uses its private key to sign bundles and create bundle-specific signature. • A forwarding node replaces the sender’s signature with its own. 14
  • 15. Open Issues in Bundle Security • The level of flexibility  The bundle security protocol prevents insecure combination of application such as including plain-text signatures.  Can support VPN but the complexity can cause high cost • Key Management  No key management schemes exist in DTN deployments  Existing schemes need hard coding. • Canonicalization of bundles  Requires the same bytes of bundle of signature for integrity  Bundles may be changed during traversal between nodes 15
  • 16.  Analyticalresearch, Mobility model  Free-space Optical Communications: smart mobile phone-based mobile ad-hoc networks (MANETs)  Radio Frequency (RF)  Ultra-Wide Band (UWB)  Acoustic (Sonar, Ultrasonic) 16
  • 17.  Outer Space / Deep-Space Networks Inter Planetary Networks: communication network robustness, timeliness data return  Terrestrial Civilian Network Mule Networks (ZebraNet), Challenge Links (SenDT)  Acoustic underwater networks  Battlefield networks 17
  • 18. Overview • Developed by the University of Waterloo • Providing low cost Internet services to the poorest villages • Vehicles are used to deliver data • Services:  birth, marriage, and death certificates  Medical consultation and agricultural problems • Key concepts for a robust system  Low-cost(70$/kiosk/month)  low-power kiosk controller (6~8W)  Using refurbished PCs without hard disks  Free software Figure 11. KioskNet overview S.Guo, M.H. Falaki, U.Ismail, E.A. Oliver, S.UrRahman, A. Seth, M.A. Zaharia, and S.Keshav. “Design and Implementation of the KioskNet System (Extended Version)”. [Online]. 18
  • 19. Components • Kiosk  Kiosk controller provide a network boot function, a network file system, user management, and network connectivity • Ferries  a car, buses, motorcycles or trains  contact with kiosk controllers and gateways using opportunistic ways • Gateway  connected to the Internet through DSL or broadband  receives data from a ferry and uploads the data to the proxy • Proxy  Support communication between kiosk users and a legacy server • Legacy Server  Typical servers supporting applications such as IMAP, SMTP and HTTP 19
  • 20. Security Architecture • Entities  KioskNet Franchisers, Franchisees, Users, Application Service providers • Certificate  All entities have a 2048-bit RSA key and a public key  Proxy broadcasts a public key for users, franchisees and ASPs • Infrastructure Integrity  Digital signatures are used on all remote commands and software updates from franchiser • User data protection  This system offers encrypted virtual space for each user’s home directory 20
  • 21. The main goal of a DTN • Interoperability  between different kinds of networks in wide-ranging regions even though many limitations • Reliable transmission based on overlay network  The implementation of DTNs will be a good solution for challenged networks • For example: KioskNet 21

Editor's Notes

  • #15: Unauthorized insertion of bundles- Can cause serious threats because of the node’s limited resources.- Can be exploited by increasing resource consumption (i.e. DoS attack)
  • #16: The level of flexibility The bundle security protocol prevents insecure combination of application such as including plain-text signatures.May support a VPN but the complexity can cause high cost for implementationKey ManagementNo key management schemes exist in DTN deploymentsExisting schemes need hard coding. Accordingly, replacement of trusted keys in all nodes makes it difficult to adopt this scheme. Canonicalization of bundlesThe definition of a canonical bundle form is an open issue for data integrityRequires the same bytes of bundle of signature for integrity