279 research outputs found

    A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking

    Get PDF
    Grup de recerca SENDA (Security of Network and Distributed Applications)In this paper, we introduce software code to improve Delay and Disruption Tolerant Networking (DTN) performance. DTN is extremely useful when source and destination nodes are intermittently connected. DTN implementations use application-specific routing algorithms to overcome those limitations. However, current implementations do not support the concurrent execution of several routing algorithms. In this paper, we contribute to this issue providing a solution that consists on extending the messages being communicated by incorporating software code for forwarding, lifetime control and prioritisation purposes. Our proposal stems from the idea of moving the routing algorithms from the host to the message. This solution is compatible with Bundle Protocol (BP) and facilitates the deployment of applications with new routing needs. A real case study based on an emergency scenario is presented to provide details of a real implementation. Several simulations are presented to prove the feasibility and usability of the system and to analyse its performance in comparison to state-of-the-art approaches

    Effective C2 Comms to the Tactical Edge in Challenged, Disrupted, and Denied Environments

    Get PDF
    Native IP networks are ill-equipped to handle the communication challenges found in wireless comms environments, resulting in communications outages that degrade C2 data flow and subject the user to disconnection, timeouts, and repeated login requests. We counter these limitations by integrating DTN (Disruption-Tolerant Networking) technology into the IP network using software+hardware or software-only solutions as appropriate. This work evaluates the tradeoffs between the currently available DTN software implementations and seeks to identify the one with the highest technical readiness level, as well as any barriers to adoption that may be present. We find that no current implementation is fully ready, and that each have particular pros and cons to adoption.Naval Research ProgramPrepared for Topic Sponsor: Maj Jeffrey Sykes, USMC, HQMC Aviation; Research Sponsor HQMC Aviation; Research POC Name: Maj Scott CuomoN16-M343-

    Emulating opportunistic networks with KauNet Triggers

    Get PDF
    In opportunistic networks the availability of an end-to-end path is no longer required. Instead opportunistic networks may take advantage of temporary connectivity opportunities. Opportunistic networks present a demanding environment for network emulation as the traditional emulation setup, where application/transport endpoints only send and receive packets from the network following a black box approach, is no longer applicable. Opportunistic networking protocols and applications additionally need to react to the dynamics of the underlying network beyond what is conveyed through the exchange of packets. In order to support IP-level emulation evaluations of applications and protocols that react to lower layer events, we have proposed the use of emulation triggers. Emulation triggers can emulate arbitrary cross-layer feedback and can be synchronized with other emulation effects. After introducing the design and implementation of triggers in the KauNet emulator, we describe the integration of triggers with the DTN2 reference implementation and illustrate how the functionality can be used to emulate a classical DTN data-mule scenario

    DTN7: An Open-Source Disruption-tolerant Networking Implementation of Bundle Protocol 7

    Full text link
    In disruption-tolerant networking (DTN), data is transmitted in a store-carry-forward fashion from network node to network node. In this paper, we present an open source DTN implementation, called DTN7, of the recently released Bundle Protocol Version 7 (draft version 13). DTN7 is written in Go and provides features like memory safety and concurrent execution. With its modular design and interchangeable components, DTN7 facilitates DTN research and application development. Furthermore, we present results of a comparative experimental evaluation of DTN7 and other DTN systems including Serval, IBR-DTN, and Forban. Our results indicate that DTN7 is a flexible and efficient open-source multi-platform implementation of the most recent Bundle Protocol Version 7.Comment: 18th International Conference on Ad Hoc Networks and Wireless (AdHoc-Now 2019

    The Evolution of a DTN Routing Protocol - PRoPHETv2

    Get PDF
    Research within Delay- and Disruption Tolerant Networks (DTN) has evolved into a mature research area. PRoPHET is a routing protocol for DTNs that was developed when DTN research was in its infancy and which has been studied by many. In this paper we investigate how the protocol can evolve to meet new challenges that has been identified through research and practical experience. We propose some minor modifications to the routing metric cal- culations done in PRoPHET which has potential to alleviate some issues and improve the performance of the protocol. Using these modifications, we define an updated version of the protocol called PRoPHETv2. We run simulations to verify the operation of the protocol and compare its performance against the original version of the protocol as well as some other routing protocols. The evalua- tions are done using both traces from an existing DTN deployment and a synthetic mobility model. Since the basic mechanisms of the protocol remain the same, migrating existing implementations to the new version of PRoPHET is possible with limited effort

    Experience with Delay-Tolerant Networking from Orbit

    Get PDF
    We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protoco

    Data Muling for Broadband and Long Range Wireless Underwater Communications

    Get PDF
    During the past years, there has been an increasing interest in the exploration of underwater wireless communications. This interest has been related mainly to the need for establishing a reliable way of transferring large amounts of data gathered on remote locations in the ocean. This data comes from environmental exploration, oil and gas industries, or marine data from Autonomous Underwater Vehicles (AUVs). These activities require innovative solutions that can provide high bitrates at low costs. With this in mind, and given the current solutions - Optical, Acoustic, and Radio Frequency -, there is the need to create a solution that takes advantage of each technology and overcomes their limitations. In the case of optical communications, they can provide high bitrates, but requires line of sight, and depend significantly on water turbidity. Although acoustic solutions can provide a large range of operation, they have a low bandwidth due to the frequency of operation, and so they are not suitable for transferring high amounts of data. Finally, current radio frequency (RF) solutions allow high bit rates but are limited by the operation range due to the substantial attenuation of electromagnetic waves underwater. With this in mind, it is possible to say that currently, there is no solution for broadband long-range underwater communications. This dissertation aims to develop a solution that allows the increase of throughput and range of underwater wireless communications. To achieve this, a set of underwater data mules will be used. They will take advantage of the high bitrates of RF wireless communications and the long-range associated with acoustic solutions. With this dissertation, communication protocols designed for delay and disruption tolerant networks (DTNs) will be explored, and a protocol that will enable the scheduling of mules will be proposed and implemented, taking advantage of an out-of-band acoustic channel for controlling the mules, and the DTN for data transfer. The solution will be evaluated in a freshwater testbed

    Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey

    Get PDF
    Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research
    corecore