p ro gr a m s a nd t he m e s in w irele ss n et w orkin g in th e str...
TRANSCRIPT
!!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!"#$%&'()*
%+")&+)$,$-)+.&/0/1'$233/+"45)3
67$%)85)#9)*$6::7
Programs and Themes inWireless Networking in the Strategic
Technology Office at DARPA
+;<8=
><8?/8!
>@<<!8<:;=
FIND Workshop, Cambridge, MA
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
<'$6")-
IntroductionBackground
• Problems in Tactical Wireless Networks• Technology Opportunities
DARPA STO Wireless Programs (among many)• XG – spectrum agile networking• DTN – disruption tolerant networking• WNaN – densely-deployed low-cost multi-channel radios;
distributed, adaptive, and scalable networking• CN – low power radios• IFPS – rescue beacon
Cross-Program TechnologiesPolicy / Ontology / Machine ReasoningNetwork Security
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!/85/A#*8(6-*")*
+7"-)7-*,)3*;-7B)(6(CD
APPROVED FOR PUBLIC RELEASE
E=/8 FG! >/8
+7"-)7-*H*;-7B)(6(CD*I
+-%2"7-*+H;
>')3,.-)$,6*8-#-,%7B
!/85/
;()D*;-$B-%*J*!"%-7$(%
+$%,$-C"7*;-7B)(6(CD*<44"7-*K+;<L
;4<"($=/&)'>$;"*)+5/*
M(..')"7,$"()#
?&@/*#45"/&$233A*4&+)$4&($%A*<"<49"0"5'
B4*0'$B&5*'>$C48"($C)4+5"/&>$%8)+"40$D/*+)3
E4*"5"#)
"#$ %&'$ %($ )'$ ''$
!-4-)#-*+7"-)7-#
G)4(%.,$"()*;-7B)(6(CD
F"7%(#D#$-.#*;-7B)(6(CD
G)4(%.,$"()*
=N16("$,$"()
G)4(%.,$"()*/O,%-)-##
+1-7",6*5%(P-7$#
;,7$"7,6*;-7B)(6(CD
+$%,$-C"7*;-7B)(6(CD
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;,7$"7,6*8,3"(*E-$O(%Q")C!"#$%&'(&)*(+
• Spectrum completely allocated• The military radio acquisition-performance death spiral• Many non-IP non-interoperable radios• COTS economies, COTS straitjacket• Disruption – Terrain, Weather, Jammers, Self-Jamming, Dynamics, Crypto• Scaling – Very hard to build ad hoc nets larger than about 50 nodes• Security designed for the 70s, not for PDAs• Operational deployment takes forever!• Tactical / military traffic statistics different from Internet• IP protocols evolved in a world with quasi-static topology - imposing
e2e IP on MANETs just doesn’t work!• Hub & spoke architecture colors thinking about MANETs..• Addressing doesn’t match topology (dynamics)• Stack layering doesn’t seem to fit MANETs
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
<11(%$')"$"-#R
• Spectacular increases in storage and computing resources since the 70s – what can we do with them?Adaptation & Self-organization
• Correlated usage a Good Thing if we design to it• Hardware is cheap; manufacturing costs a declining
fraction of unit cost; inexpensive programmable radio ICs coming availableUse COTS technologies, but build for use in MANETsExtensible standards
4. Spectrum assigned, but in practice unused
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
ST*5%(C%,.*M()7-1$
/'$()(.('#/'$()(.('#
!D),."7*!D),."7*
+1-7$%'.+1-7$%'.
:$"6"U,$"():$"6"U,$"()
8-,7$8-,7$8-,7$
MB,%,7$-%"U-MB,%,7$-%"U-MB,%,7$-%"U-
+-)#-+-)#-+-)#-
/3,1$/3,1$/3,1$
/66*+1-7$%'.*F,D*V-*/##"C)-39*V'$W
F,N".'.*/.16"$'3-#
>%-X'-)7D*KFYUL
/.16"3'-*K3V.L
Y-,2D*:#-
+1,%#-*:#-
Y-,2D*:#-
F-3"'.*:#-
@-##*$B,)*Z[*<77'1,)7D@-##*$B,)*Z[*<77'1,)7D
WF(#$*+1-7$%'.*G#*:)'#-3R
ST*5%(2"3-#*+1-7$%'.*/77-##W*
?(%63O"3-\
!D),."7,66D*@(7,$-*+1-7$%'.9*<%C,)"U-*E-$O(%Q#9*
,)3*G.16-.-)$*5(6"7"-#*$(*=)#'%-*E(*G)$-%4-%-)7-\
F,N".'.*/.16"$'3-#
>%-X'-)7D*KFYUL
/.16"3'-*K3V.L
G)7"#-*E-O*:#-%#
-)+.&"+40$F.400)&1)3G* ="1.H%8))(>$I"()94&($%)&3"&1
* 2(485"<)$J*/5/+/03$4&($K)5L/*M"&1
* %'35)#$J)*@/*#4&+)$4&($%+4049"0"5'
* K/&H?&5)*@)*)&+)$N8)*45"/&3
K)4*H-)*#$?#84+5G* ?&+*)43)($N8)*45"/&40$,"-".*/*$0$O%"#A054&)/A3$233)53$4&($E"33"/&3P$4&($-)#8/
* ?&+*)43)($F/##A&"+45"/&3$4&($CD$%'35)#$,"-"#*$0
* ?&+*)43)($F/##A&"+45"/&3$1+/*".*/*$0
DA5A*)$?#84+5G* Q)'$5/$;'&4#"+$-/8/0/1'>$R4&(L"(5.$4&($C)3/A*+)$E4&41)#)&5$"&$I"*)0)33$K)5L/*M3$OIK4K>$)5+SP
ST*"#*)($*&'"63")C*,*2+3&1"4*'9*ST*"#*&'"63")C*$B-*$-7B)(6(C"-#*
,)3*#D#$-.*7()7-1$#*4(%*506"7*#&8-+#$9:7&;%+*,)3*$B-*<=>&
?6#9+"%+&*6&8-+#$9:7&@##+%%*,%-*,2,"6,&6-*$(*,)D*)-$O(%Q-3*%,3"(
T(,60*;-7B)(6(CD*=),&6")C*!D),."7*H*E()]")$-%4-%")C*:#-*(4*
:)(77'1"-3*+1-7$%'.
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!/85/*ST*5%(C%,.*G)2-#$.-)$#
ST*5%($($D1-ST*5%($($D1-
H*!-.()#$%,$"()H*!-.()#$%,$"()
+1-7$%'.*/O,%-)-##+1-7$%'.*/O,%-)-##
G)$-%4-%-)7-G)$-%4-%-)7-
=44-7$#=44-7$#
/##-##.-)$/##-##.-)$
V-B,2"(%V-B,2"(%
/3,1$"2-/3,1$"2-
E-$O(%QE-$O(%Q
<1-%,$"()<1-%,$"()
+1-7$%'.*
F-,#'%-.-)$#
+-)#(%*;-7B)(6(CD +"C),6*5%(7-##")C*/6C(%"$B.#
!"#$%"&'$-3*+-)#")C
/6C(%"$B.#
G===*^_``G===*^_``5(6"7D
!-#7%"1$"()
+1-7$%'.*/3,1$"2-
E-$O(%Q")C
<1$"."U")C
+$%,$-C"-#
5(6"7D
8-,#()")C
M,1,&"6"$D
,)3*/44(%3,&"6"$D
!D),."7#
+'&)("#-
!-$-7$"()
G)7%-,#-3
/O,%-)-##
5-%4(%.,)7-
=N1-%".-)$#
F-$B(3(6(CD
>%,.-O(%Q*H
+-.,)$"7#
=)C")--%")C
V,#"#
E()]G)$-%4-%")C
<1-%,$"()
;,7$"7#
5(6"7D
@,)C',C-
=)4(%7-.-)$
G.16-.-)$,$"()
/##-##.-)$#
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;B-*ST*a=6-7$%(.,C)-$"7*<&#$,76-*M('%#-b
!"#$%
!"#$%&'()*+,#(-.
"$/,001
"%/,2
3(45-&6(7(+8&9:7.*;<-(+8&=>(?@(84
A<BB.*&C/9'
DE&@*(;.&F<-5
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
ST*H*5(6"7D
+ T)&)*40$3/0A5"/&$5/$4(485"<)$*4("/$+4&U5$9)$
V!"#$%&'()W
* 6::$%/<)*)"1&5")3>$5./A34&(3$/@$94&(3
* B#)*1"&1$5)+.&/0/1")3$L"00$.4<)$5/$9)$
4++/##/(45)(
+ ;2CJ2$?&<)35"&1$"&$F%$35*A+5A*)$@/*$
E4+."&)$C)43/&"&1$/&$J/0"+")3
* C)43/&"&1$-)+.&/0/1")3$5/$F/&5*/0$C)40H
-"#)$J*/+)33
* ;)+04*45"<)$X4&1A41)$@/*$J*/<490)$J/0"+'$
BY8*)33"/&$4&($?#80)#)&545"/&$
+ J4*5"5"/&)($J/0"+")3$"&5/$-L/$
F45)1/*")3
* J/0"+'$B&@/*+)#)&5$OJ)*#"55)($
N8)*45"/&P
* N85"#"Z"&1$OK)5L/*M$4&($29/<)P
+-7%-$,%D*(4*+$,$-**
;-6-7(..')"7,$"()#*H*5'&6"7*G)4(%.,$"()
+-7%-$,%D*(4*+$,$-**+-7%-$,%D*(4*+$,$-**
;-6-7(..')"7,$"()#*;-6-7(..')"7,$"()#*
H*5'&6"7*G)4(%.,$"()H*5'&6"7*G)4(%.,$"()
F")"#$%D*(4*
M(..')"7,$"()#
F")"#$%D*(4*F")"#$%D*(4*
M(..')"7,$"()#M(..')"7,$"()#
8-C'6,$(%D*
/'$B(%"$D*(4*
M(..')"7,$"()#*
H*5(#$#
8-C'6,$(%D*8-C'6,$(%D*
/'$B(%"$D*(4*/'$B(%"$D*(4*
M(..')"7,$"()#*M(..')"7,$"()#*
H*5(#$#H*5(#$#
8-C'6,$(%D**/'$B(%"$D*(4*
;-6-7(..')"7,$"()#*
,)3*5(#$#
8-C'6,$(%D**/'$B(%"$D*(4*8-C'6,$(%D**/'$B(%"$D*(4*
;-6-7(..')"7,$"()#*;-6-7(..')"7,$"()#*
,)3*5(#$#,)3*5(#$#F")"#$%D*(4*5'&6"7*?(%Q#9*;%,)#1(%$9*
H*?,$-%*FC$
F")"#$%D*(4*5'&6"7*F")"#$%D*(4*5'&6"7*
?(%Q#9*;%,)#1(%$9*?(%Q#9*;%,)#1(%$9*
H*?,$-%*FC$H*?,$-%*FC$
!-1,%$.-)$*
(4*;%,3-*H*G)3'#$%D
!-1,%$.-)$*!-1,%$.-)$*
(4*;%,3-*H*(4*;%,3-*H*
G)3'#$%DG)3'#$%D
F")"#$%D*(4*+7"-)7-9*
;-7B)(6(CD9*H*
G))(2,$"()
F")"#$%D*(4*F")"#$%D*(4*
+7"-)7-9*+7"-)7-9*
;-7B)(6(CD9*H*;-7B)(6(CD9*H*
G))(2,$"()G))(2,$"()
F")"#$%D*(4*
G)3'#$%D9*
=.16(D.-)$9*H*M(..')"7,$"()#
F")"#$%D*(4*F")"#$%D*(4*
G)3'#$%D9*G)3'#$%D9*
=.16(D.-)$9*H*=.16(D.-)$9*H*
M(..')"7,$"()#M(..')"7,$"()#
F")"#$%D*(4*
;%,)#1(%$*H*
M(..')"7,$"()#
F")"#$%D*(4*F")"#$%D*(4*
;%,)#1(%$*H*;%,)#1(%$*H*
M(..')"7,$"()#M(..')"7,$"()#
F")"#$%D*(4*M"2"6*/44,"%#*H*
M(..')"7,$"()#
F")"#$%D*(4*M"2"6*F")"#$%D*(4*M"2"6*
/44,"%#*H*/44,"%#*H*
M(..')"7,$"()#M(..')"7,$"()#F")"#$%D*(4*
=7()(."7#9*
>"),)7-9*H*
G)3'#$%D
F")"#$%D*(4*F")"#$%D*(4*
=7()(."7#9*=7()(."7#9*
>"),)7-9*H*>"),)7-9*H*
G)3'#$%DG)3'#$%D
F")"#$%D*(4*
;%,)#1(%$*H*
M(..')"7,$"()#
F")"#$%D*(4*F")"#$%D*(4*
;%,)#1(%$*H*;%,)#1(%$*H*
M(..')"7,$"()#M(..')"7,$"()#
F")"#$%D*(4*
G)4%,#$%'7$'%-
F")"#$%D*(4*F")"#$%D*(4*
G)4%,#$%'7$'%-G)4%,#$%'7$'%-
F")"#$%D*(4*;%,)#1(%$9*
5(#$#9*H*;-6-7(..')"7,$"()#
F")"#$%D*(4*;%,)#1(%$9*F")"#$%D*(4*;%,)#1(%$9*
5(#$#9*H*5(#$#9*H*
;-6-7(..')"7,$"()#;-6-7(..')"7,$"()#
!-1,%$.-)$*
(4*5'&6"7*
=)$-%1%"#-
!-1,%$.-)$*!-1,%$.-)$*
(4*5'&6"7*(4*5'&6"7*
=)$-%1%"#-=)$-%1%"#-
8-C'6,$(%D
G)$-%(1-%,&"6"$D
!-2"7-
E-$O(%Q
8-C"(),6
E,$"(),6[ M"$D]+1-7"4"7*+1-7$%'.*5(6"7D
[ ?,2-4(%.*F(3-[ !-2"7-*!'$D*MD76-*@"."$#*
[ E-$O(%Q/3."##"() Y,%3O,%-*
@"."$#+-7'%"$D
/3."##"()
8('$")C
/33%-##")C
;%,)#1(%$
M()#$,)$6D*+B"4$")C*
G)$-%#-7$"()
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;%,)#7-"2-%
+D#$-.+$%,$-CD8-,#()-%
ST*<1-%,$"(),6*M()7-1$
+-6-7$
<11(%$')"$"-#*
5(6"7D8-,#()-%
!-2-6(1<1$"()#* 5%(7-##
8-X'-#$*
!-$-%.")-
<11(%$')"$"-
#*
c-#dE(*
(%*/33"$
"(),6*
M()#$%,
")$#*
/77%-3"$-3
5(6"7D
8>*G)4(*/7X'"#"$"()
8+6%*6A&)''-
5(6"7D*=)C")-
8,3"(56,$4(%.
B+%%"A+
!/'3
8>*8-#('%7-
8-X'-#$
8>*;%,)#."$*
56,)
5(6"7D
/'$B(%5(6"7D
/'$B(%5(6"7D
/'$B(%
Down
load
!!!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;"3*A85"/&G$I.'$K/5$?J\
• FCS Communications Position Reports Used as Measure
• Highly Favorable Metric UsedLoss of 2 Successive (1 Sec Interval)
Reports Considered as Disconnected
IP is unreliable in tactical military networks• Dynamic military MANETs see rapid topology
changes and episodic connectivity• Tactical radio users know user names, roles, or
frequencies, not IP addresses• Tactical/edge military networks may be a mix of
IP and non-IP radios – no general mechanism for IP apps to bridge heterogeneous networks
?"%-6-##*)-$O(%Q#*$-)3*$(*B,2-*
'#,&6-*6(7,6*7())-7$"2"$D9*&'$*(4$-)*
7,)A$*%-,7B*&,7Q*$(*")4%,#$%'7$'%-
;%,44"7*")*."6"$,%D*$,7$"7,6*)-$O(%Q#*
$-)3#*$(*&-*B"CB6D*7(%%-6,$-39*)($*
C,'##",)*,#*")*$B-*G)$-%)-$
>M+*e-B"76-9*>$\*V-))")C*f``Z
!,!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
G5*8('$")C*2#\*!;E*!-6"2-%D
G5*K:!5*(%*;M5L*
O(%Q#*()6D*"4*$B-%-*
"#*G5*7()$")'"$D*
&-$O--)*)(3-#*4(%*
3'%,$"()*(4*$%,)#4-%
Kg*%('$")C*$".-L
!;E*&%"3C-#*G5*,)3*)()]
G5*1,$B#9*H*B(63#*3,$,*
3'%")C*")$-%2,6#*OB-)*
6")Q#*,6()C*$B-*1,$B*,%-*
)($*,2,"6,&6-
Disruptions break the connection
DTN custodians hold data for next link
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!;E*")*,*E'$#B-66
“Postal model” of CommunicationsStore and Forward, Incremental Delivery
source
destination
Persistent Storage
RoutingOpportunistic,
scheduled, epidemic,
Disrupted Region
!;E*1%(2"3-#*)-$O(%Q*#-%2"7-#*,7%(##*3"#%'1$"()*
,)3*.,##"2-*3"44-%-)7-#*")*3-6,D*,)3*&,)3O"3$B
Link Decoupling
Message Bundling
minimize interactivity
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
DTN Network Stack
;-K$%)*<"+)3
O)S1S>$*/A5"&1>$*)0"49"0"5'>$3)+A*"5'-
!;E*/5G
2880"+45"/&3
X"&M$X4')*
K)5L/*M$X4')*
!;E*M()2-%C-)7-*@,D-%
-*4&38/*5$X4')*
RA&(0)$X4')*$*+$,)%'$,)-%$,./%01.#$23
2880"+45"/&3$O)S1S>
45$-16'78%9'5:;1<=>$
3)&3/*$&)5L/*M3$
A3"&1$@"0)$5*4&3@)*>$
#)3341"&1>$)5+SP
X-J -FJ ];J
B5.)*&)5 2-E C4("/$F/##3$O>!&?>$@AP
?J
?J%BF^=2?JB
C8-.*8.-
C8-.*8.-
,,?(G.&+*&+
-5.*&?+H
.*&?<I.*&
F*+-+)+
?7
?(G.&+*&+
-5.*&?+H
.*&?<I.*&
F*+-+)+
?7
;-K$%)*<"+)3
O)S1S>$*/A5"&1>$*)0"49"0"5'>$3)+A*"5'-
!;E*/5G
2880"+45"/&3
X"&M$X4')*
K)5L/*M$X4')*
!;E*M()2-%C-)7-*@,D-%
-*4&38/*5$X4')*
RA&(0)$X4')*$*+$,)%'$,)-%$,./%01.#$23
2880"+45"/&3$O)S1S>
45$-16'78%9'5:;1<=>$
3)&3/*$&)5L/*M3$
A3"&1$@"0)$5*4&3@)*>$
#)3341"&1>$)5+SP
X-J -FJ ];J
B5.)*&)5 2-E C4("/$F/##3$O>!&?>$@APB5.)*&)5 2-E C4("/$F/##3$O>!&?>$@AP
?J?J
?J%BF^=2?JB
C8-.*8.-
C8-.*8.-
,,?(G.&+*&+
-5.*&?+H
.*&?<I.*&
F*+-+)+
?7
?(G.&+*&+
-5.*&?+H
.*&?<I.*&
F*+-+)+
?7
IPN/DTNRG CoreFunctionality:Bundle ProtocolDelay Tolerance
Routing across ScheduledDisruptionsLate BindingIP-Agnostic
+Organize information flow into self-contained bundles+Create intelligent networks that manage the flow of bundles thru the network+Pass messages thru the network incrementally, with successive responsibility – no e2e links!
+Opportunistically leverage link availability, multiple routes..+Agnostic to lower layers in the stack – use existing transport and network layers via shims, or interface to native link layer
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!;E*!-#"C)*5%")7"16-#
• Maintain advances thru the network, advance messages incrementally – don’t plow the same ground twice
• Minimize network chit-chat – build complete transactions to make best use of scarce link uptime – eg DNS
• Build a sequence of local control operations and use late binding – avoid dependence on remote information
• Take advantage of network hetero-geneity – allow different network components to use local technology and optimizations
#('%7-
3-#$"),$"()
3"#%'1$-3*,%-,#
“Think globally, act locally!”
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
DARPA DTN Phase 1 Technology Focus
• Fuzzy Delivery Scheduling – Making network routing decisions when available / optimal paths are uncertain
• Policy-based Resource Planning and Utilization – Moving Intelligence into Network to Make “Best” Choices on Delivery
• Late Binding – Enable Network to Deliver Traffic Without end-to-end Address and Routing Info
• Trusted Delivery – Provide authentication in the absence of connectivity to PKI etc – Security intrinsic in DTN, not an afterthought
• Multicast – multiple flavors built-in with store-and-forward
• Plug-in Architecture – Tool-chain-independent extension of non-military core to military-specific behaviors
DTNRG Core
DARPA Phase 1 Technology Focus
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
FNK;NC
T45)L4'
I)9
%)*<)*
!;E*")*M<E!<8*KE($"(),6*+".'6,$"()L
;)04'$_::#3
`aM983
X/33'^X/330)33$J)*"/(3
b)."+0)$X2K X2K
?*345
X2K
FNK;NC
T45)L4'
-4+5"+40$N83$F)&5)*
I)9$R*/L3)*>$F.45>$F6JF
FNK;NC
T45)L4'FNK;NC$!A#8
F/##4&($b)."+0)
BJXC% BJXC%
?*345
?*345BJXC% BJXC%
FNK;NC
T45)L4'
5C
25C
2
CONDOR Phase 2 Implementation
5C
25C
2
5C
25C
2
CONDOR Phase 3 Implementation (& Phase 1 Simulation)
FNK;NC$!A#8
F/##4&($b)."+0)
;)04'$c:#3>$`aM983
X/33'^NA541)$J)*"/(3
;)04'$c:#3>$`aM983
X/33'^NA541)$J)*"/(3
Tacticomp5 Tacticomp5
;)04'$_::#3$`aM983
X/33'^X/330)33$J)*"/(3
TCP TCPTCP
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!;E*2\*;M50*M<E!<8*+".'6,$"()
DTN Phase 1 – initial workSimulated network connectivity betw
EPLRS to EPLRS over SATCOMDemonstrated 10x improvement in
latency & completion rateDTN Phase 2 – Building DTN into
CONDORDevelop a CONDOR-specific DTN
installationExperiment, evaluate, & demonstrate
DTN benefits in CONDORReal Data in Real CONDOR System
Significant Performance Improvement on-the-move via DTN
Data analysis underway
Decoupling Links & Store&Forward Provide 10x Performance Compared to TCP
M()#-7'$"2-*^`]hVD$-*>"6-*8-$%"-2,6#*(2-%*fi*B('%#
:
c::
d:::
dc::
6:::
6c::
e:::
ec::
a:::
d: e: c: 7: f: dd:
de:
dc:
d7:
df:
6d:
6e:
6c:
67:
6f:
>"6-*8-$%"-2,6*;".-*K#-7()3#L
E'.&-%*(4*>"6-*;%,)#4-%#
/&,)3()-3*^`]hVD$-*>"6-*;%,)#4-%#*")*fi*B('%#
`
^^j
:
6:
a:
`:
_:
d::
d6:
da:
/&,)3()-3
SS
^`*hVD$-*>"6-*;%,)#4-%#*")*fi*B('%#
kZl
kjl`
:
c::
d:::
dc::
6:::
6c::
e:::
ec::
a:::
=--J
;-K
M(.16-$-3
HTTP
DTN
!.!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!;E*56'C]")*/%7B"$-7$'%-
Modularization thru RPC-like/XML interfaces – toolchain independent
• Isolates core forwarding functionality by specifying plug-in extension interfaces.
• Benefit from COTS economies of scale
• Allow 3rd-party extensions• Clean-slate design possible
for many DTN components• Plug-ins allow cost control• Export control simplified
• No Military Code / Requirements in Open Source Product
• RFC Approved, Drafts en-Qd
COTS economies of scale without the COTS functionality straitjacket!
=*(@4.&:.-H..8&5.-.*+4.8.+>7&8.-H+*G7
;M5
M()2-%C-)7-*@,D-%#
+$(%,C-
!;E>(%O,%3-%
8('$")C
/116"7,$"()*G)$-%4,7-
8('$")Cd5(6"7DF(3'6-
5-%#"#$-)$+$(%,C-
:!5 @;5E()]G5
/116"7,$"()*/ /116"7,$"()*V /116"7,$"()*M
R0A)$D/*+)$
-*4+M"&1F.45
R455)*'$
2L4*)$
C/A5"&1
F/&5*/0
F4+."&1$^$F/&5)&5$
2((*)33490)$
%5/*41)$^
C/A5"&1$;454943)
I)9$
9*/L3"&1
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
Current DARPA DTN Technology Focus
• DTN storage as cache – bandwidth and latency reduction associated with correlated demand on one end of a thin pipe
• Content-based access to information – allows collaboration & data sharing at tactical edge – get away from addresses
• Support for continuously-changing edges – DTN nodes need not be on the routing path
• Policy adaptation for rapid deployment• Temporal Security – a new security model
for protecting information on portable devices
DTNRG Core
DARPA Phase 1 Technology Focus
DARPA Phase 2 Technology Focus
V,)3O"3$Bd8-6",&"6"$D
!"#$,)7-^`*F-C,&1#*Y"CB6D*
8-6",&6-*M())-7$"2"$D
?"%-6-##*=)76,2-#
TGT*>"&-%*M(%-
^`*T"C,&1#*Y"CB6D*
8-6",&6-*M())-7$"2"$D
Zi*h"6(&1#*=1"#(3"7*
M())-7$"2"$D
,!!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
On Beyond Disruption!
Resource UtilizationSubsequent requests for same data receive copies already cached in the network – only one copy of the data ever crosses any given link.
^#$ f)3 k%3* Requests for same dataggg
Reso
urce
s Us
ed to
G
et D
ata
Integrated Push-Pull Pub-SubTimeBandwidth
Push Pull IntegratedPush/Pull
• Good overall• Subsequent
requests build ‘akamai’
F4+."&1$"&$5.)$54+5"+40$+0/A(3$h$#$'-17)%<1/%B)%C'-)%$,1/%1%("CB%$-1/#.$%B"::)-
[ C)(A+)3$94&(L"(5.$()#4&(3$94+M$5/$+/*)
[ C)(A+)3$045)&+'F*)45)$('&4#"+$3)0@H@/*#"&1$V2M4#4"3W
?&5)1*45)($8A3.H8A00$8A9H3A9$("33)#"&45"/&$/@$(454
2++)33$5/$"&@/*#45"/&$9'$+/&5)&5$()3+*"85"/&>$+/&5)Y5>$/*$5'8)$*45.)*$5.4&$9'$&)5L/*M$4((*)33
K)5L/*MH#4&41)($8)*3"35)&+)$/@$"&@/*#45"/&$@0/L"&1$5.*A$5.)$&)5
DE?%5)F)-17)#%#$'-17)8%G-'<)##./78%5'<15%<'//)<$.F.$H8%1/(%$,)%<'--)51$.'/%':%./:'-CI1$.'/%-)J")#$#%./%$1<$.<15%/)$#%$'%G-'F.()K
,,!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
M()$-)$]V,#-3*E-$O(%Q")C
Caching and disruption tolerance can improve performance at the tactical edge, eg blue force tracking / SA
Content-based addressing provides a mechanism for sharing data at the edge, supports transition from C2 to a collaborative environment (CPOF)
Supports a wide variety of use cases, such as:
CBN Design Philosophy: Rich descriptions of contentRich descriptions of nodesOrganize content distribution around supply and
demandUser describes content to the network, not address of
contentUser accesses nodes with names or roles, not addressTactical deployments largely use static address
assignments – IP address assignments drive deployments.. overhead on deployment, don’t reflect topology of dynamic network
Each Node Can Provide Content to Any Other Node
G**)--3*,*.,1
get blue force
updates
map
give me sensor data
push sensor data to net
send my position
!;E*7,7B-
94+M$
5/$
+/*)
“I want maps for my area”, not “I want to ftp to 192.168.4.17”
“Give me a map of NW Baghdad with all intel since 0400 linked to it”
“Send this information to any unit w/i 200m of any bridge over the Tigris”
“Cache data relevant to the current mission”“Send this information to blue forces w/i a klick of me”“Acquire and report back to me sensor data w/i a klick of
my current position”“Monitor and report to me information as it becomes
available about red forces on the road to the airport”Enable two connected edge nodes to exchange blue
force data even when server disconnected
,/!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
+-7'%"$D
Three Security Problems in tactical networks2. Denial of Service (DoS) attacks against a thin pipe by a
compromised node
^`*F-C,&1#*Y"CB6D*
8-6",&6-*M())-7$"2"$D
TGT*>"&-%*M(%-
^`*T"C,&1#*Y"CB6D*
8-6",&6-*M())-7$"2"$D
Zi*h"6(&1#*=1"#(3"7*
M())-7$"2"$D
Compromised Node DoS Packets
DoS Attack Against 64Kpbs link
DTN Bundle Security Protocol Provides a General Mechanism for Authenticating Bundles Before They Enter a DTN Network
Applications that use DTN can use security for free
Security Perimeter
E^
F^
Ef Ek
/'$B-)$"7,$"()*#B('63*B,2-*
&--)*&'"6$*")$(*$B-*G)$-%)-$*
4%(.*$B-*&-C"))")C
,0!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;-.1(%,6*+-7'%"$D
Three Security Problems in tactical networks2. Denial of Service attacks against thin waist by a compromised
node• Loss of equipment exposes decrypted data on the node
Standard COMSEC – red-black separation w/encryption in the network – assumes nodes are physically secure - data is safe when it’s at the node (can be red/decrypted), but protect data in the network against tapping with encryption (black).
Low-cost nodes (WNaN radios, laptops, PDAs) no longer physically secure, so a lost radio or laptop exposes the information on it.
The current security model doesn’t work for portable devices!
Instead of red-black physical separation, provide red-black temporal separation – transitory access to the data thru bundle layer decryption
Data stays black until/unless the application is processing it, and goes away when the application goes away.
DTN bundle security mechanism & TSE move the security infrastructure to the tactical boundary.
;".-
!;E
;454$/&0'$()+*'85)($@/*$4++)33
M'%%-)$
;454$()+*'85)($45$)&($3'35)#
Temporal Security Model
,1!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
M,7B")C*H*+-7'%"$D
Three Security Problems in tactical networks2. Denial of Service (DoS) attacks against thin waist by a
compromised node3. Loss of equipment exposes decrypted data on the node• Caching / matching data that the node is not authorized to read
Solution: keep data in black in servers, network caches, and local cache.Decrypt data only when app asks for it, and scrub data when app exits
Common Encrypted Metadata Allows Encrypted Data to be Identified and Delivered from Network Node Cache to End Point
Problem: in DTN, every bundle can be protected with a different security association .. How to operate a cache with encrypted bundles?Solution: 1) Common security association for metadata2) Different security association for data and metadata3) Cache hits by matching on metadata
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
?E,E*]*/3,1$"2-*8,3"(#*H*/3,1$"2-*E-$O(%Q")C
+ %"&10)$CD$J*/+)33"&1$%0"+)$C)80"+45)($5/$
@/*#$a$-*4&3+)"<)*$b/"+)^;454$$C4("/3
+ B4*0'$.4*(L4*)$4&($&)5L/*M"&1$+4849"0"5'$5/$
)&490)$)Y8)*"#)&545"/&>$--J$()<)0/8#)&5$9'$
3)*<"+)3
* I/*M"&1$*4("/$9'$%)85)#9)*$6::_$
+ X/L$5)+.&"+40$*"3M>$0/L$+/35$*"3M$5/$#4Y"#"Z)$
8*/949"0"5'$/@$3A++)33@A0$5*4&3"5"/&
+ RA"05$"&$;'&4#"+$%8)+5*A#$F4849"0"5'
* 2</"(3$38)+5*A#$^$&)5L/*M$804&&"&1
?E,E*Y,%3O,%-*T(,6#0[ I*j``*1-%*i*;%,)#7-"2-%*E(3-[ +1-7$%,66D*/3,1$"2-[ FGF<*4(%*Y"CB*M,1,7"$D*")*
:%&,)*=)2"%().-)$#
[ F-.&-%*(4*>('%*+'&)-$O(%Q#* Simultaneously
f\Zb*N*^\lb*N*Z\jb
m'6D*`l*>(%.*>,7$(%*m'6D*`l*>(%.*>,7$(%*
f\fb*N*^\Zb*N*j\kb
E(2*`_*>(%.*>,7$(%*E(2*`_*>(%.*>,7$(%*
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;B-*?E,E*/3,1$"2-*8,3"(
+ 2$;"@@)*)&5$288*/4+.$5/$2@@/*(490)$E"0"54*'$-4+5"+40$K)5L/*M3+ 2+.")<)3G* 5-%4(%.,)7-$9'$2(485"<)$K)5L/*M"&1>$C4&1)$9'$K)5L/*M$C)04'$
* /44(%3,&"6"$D$9'$%8)+5*A#$2(48549"0"5'>$*)04Y)3$*)iA"*)#)&53$/&$CD$@*/&5H)&(
* +7,6,&"6"$D$9'$#A05"80)$5*4&3+)"<)*3$4&($#A05"80)$,$('&4#"+$8.'3"+40$&)5L/*M3
* 8-6",&"6"$D$5.*/A1.$EA05"80)$%"#A054&)/A3$K)5L/*M$F/&&)+5"/&3$4&($-*4&3+)"<)*3$"&$B4+.$K/()S
+ ;2CJ2$jT$-)+.&/0/1'$@/*$FN-%$/8)*45"/&$"&$()&3)$CD$)&<"*/&#)&53+ a$?&()8)&()&5$CD$-*4&3+)"<)*3$F4&$N8)*45)$F/00)+5"<)0'$/*$?&("<"(A400'$@/*$EA05"80)$K)5L/*M$F/&&)+5"/&3
B4+.$O/@$aP$F.4&&)0G
2@@/*(49"0"5'$9'$."1.$</0A#)$4&($."1.$"&5)1*45"/&$0)<)0$FN-%$?F3>$,$9'$A3)$/@$
;'&4#"+$%8)+5*A#$5/$)&3A*)$."1.$iA40"5'$CD$+.4&&)0$4<4"049"0"5'$L"5./A5$."1.$0"&)4*"5' :)"$*M(#$*:)3-%*Ij``*")*n',)$"$D
234567859:;9<73;3=87
,>?@9A9!>B@9A9?>1@
C:;D9C3EF:;
G9H>H!I9J634E79:K9LC9$M7;8:359
N49"74O79P4MN;:4D74FO
LC9P4MN;:4D74F
"QL&Q9(R9"S43DNE9#T7EF;UD9
#74ON4V93459QOONV4D74F
C;7WU74ES9
#787EFN:4
,A,X9/A/X90A0)%)$
$C")X9Y&#ZX9[&#ZX9YQ)9):5U83FN:4
Y9\9!1HCN8F7;9Y
]T9F:9/9Z)L34V7
!?Z[	F:9!H9)[&#"3F39L3F7
!9<3FF9^9';34OE7NM7;X909<3FFO9
':F38
&:_7;
.HH9)2`9F:9?9R2`9J:4FN4U:UOC;7WU74ES9
L34V7
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;O(*MB("7-#9*,)3*,*YD&%"3
M<;+
F"6"$,%D*
+1-7"4"7
@(O*M(#$9*&'$*\*\*\*
;D1"7,66D*G)4%,#$%'7$'%-*V,#-3
@"."$-3*(%*M"2"6*+1-7$%'.
@"."$-3*8(&'#$)-##9*Y,%3)-##9*W
a=N1-)#-3b9*#(*M,)*V-*8,1"36D*<&#(6-$-3
8-7(C)"U-*F,)'4,7$'%-*"#*!-7%-,#")C*
M(.1()-)$*(4*M(#$
@-2-%,C-*Y"CB*e(6'.-*M<;+*5,%$#
!-2-6(1*F"6"$,%D*+1-7"4"7*8,3"(*!-#"C)
!-2-6(1*/3,1$"2-*;-7B)(6(CD*$(*<2-%7(.-*
M<;+*5,%$#*@"."$,$"()#
?E,E
/11%(,7B
Y"CB6D*M,1,&6-9*&'$*W
Y"CB6D*=N1-)#"2-
+6(O*;-7B)(6(CD*/3(1$"()dG)#-%$"()
@()C*;-%.*G)2-#$.-)$#*K+$,$"79*G)$-%(1-%,&"6"$D*;,"6L
M()#$%,")")C*()*E-O*!(7$%")-9*W
/*!"44-%-)$*/11%(,7B*$(*/44(%3,&"6"$D/*!"44-%-)$*/11%(,7B*$(*/44(%3,&"6"$D
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
!D),."7**+1-7$%'.*"#*G.1(%$,)$*4(%*F(%-*$B,)**+1-7$%'.*F,),C-.-)$
Spectrum Adaptation EnablesLower cost but effective military hardwareLeveraging of “cellular” and “WiMax” production
base to reduce DoD costNetworks that achieve performance by migrating
bandwidth...not buying for worst caseScalable mobile networksOperation in dense RF environments
+1-7$%'.*F,),C-.-)$*")*
$B-*8,3"(*"#*$B-*h-D*
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
?E,E*F/E=;+*/7B"-2-*8-6",&"6"$D*$B%('CB*!"2-%#-*5,$B#*,)3*>%-X'-)7"-#
;(3,DA#*F-#B*(%*F/E=; ?E,E
[ X/L$C)0"49"0"5'$;A)$5/$%"&10)$X"&M$
C/A5)3[ R4&(L"(5.$;*/83$43$E/*)$C4("/3$
2(()($5/$K)5L/*M[ R4&(L"(5.$F/&35*4"&)($9'$EA5A40$
?&5)*@)*)&+)$h$E/*)$K/()3$(/$K/5$
F*)45)$E/*)$F484+"5'[ X4*1)$KA#9)*$/@$K/()3$/&$%"&10)$
D*)iA)&+")3
[ EA05"80)$X"&M3$4&($C/A5)3$J*/<"()$
="1.$C)0"49"0"5'[ R4&(L"(5.$?&+*)43)3$43$E/*)$C4("/3$
2(()($5/$K)5L/*M[ ;"<)*3"5'$"&$D*)iA)&+'$2</"(3$
?&5)*@)*)&+)[ ;'&4#"+$%8)+5*A#$F4&$]3)$K)5L/*M$
5/$VE4M)$R)@/*)$R*)4MW$D/*$
;)8)&(490)$N8)*45"/&
M(6(%*!-1"7$#*,66*%,3"(#*()*
$B-*#,.-*4%-X'-)7D M(6(%*!-1"7$#*#'&])-$*4%-X'-)7"-#
FGF<*F(3-*E($*!-1"7$-3
?E,E*/%7B"$-7$'%-*/33%-##-#*h)(O)*?E,E*/%7B"$-7$'%-*/33%-##-#*h)(O)*?-,Q)-##-#*(4*M'%%-)$*F/E=;*;-7B)(6(CD?-,Q)-##-#*(4*M'%%-)$*F/E=;*;-7B)(6(CD
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
?E,E*E-$O(%Q#*+'11(%$*G)$-%7())-7$"2"$D*O"$B*@-C,7D*+D#$-.#*K=)3*(4*5%(C%,.L
E()]?E,EE-$O(%Q*G)4%,#$%'7$'%-
KTGT9*?GE];9*+/;M<F9*m;8+9W
?E,E*F/E=;
?E,E*F/E=;
?E,E*F/E=;
F'6$"16-9*!D),."7*G)$-%4,7-*5(")$#
/)D*E(3-*M,)*+-%2-*,#*,*@-C,7D*G)$-%4,7-
?E,E*!-2"7-#*<1-%,$-*;B%('CB*,)3*G)$-%(1-%,$-*?"$B*E()]?E,E*G)4%,#$%'7$'%-#
/)D*E(3-*M,)*G)$-%4,7-*O"$B*,)*G5*8('$-%*(%*!-2"7-*;B%('CB*,)*8m]ij*
M())-7$"()
@-C,7D8,3"(
E-$O(%Q#
IK2K$F4&$]3)$2&'$?J$K)5L/*M$5/$BY5)&($C4&1)>$-40M$IK2K$F4&$]3)$2&'$?J$K)5L/*M$5/$BY5)&($C4&1)>$-40M$5/$X)14+'$%'35)#3>$2++)33$?&@/*#45"/&>$4&($B&.4&+)$5/$X)14+'$%'35)#3>$2++)33$?&@/*#45"/&>$4&($B&.4&+)$
K)5L/*M$J)*@/*#4&+)K)5L/*M$J)*@/*#4&+)
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
;B-*h-D*$(*?E,E*8(&'#$)-##
FGF<FGF<
V-,.V-,.>(%.")C>(%.")C
E'66")CE'66")C
;(1(6(CD;(1(6(CD56,))")C56,))")C
+1-7$%'.+1-7$%'.56,))")C56,))")C
!-2"7-!-2"7-+1'%#9*W+1'%#9*W
8-6(7,$-/%(')3*+1'%
+1-7$%'.;((*;"CB$
8-]16,)/7%(##*E-$O(%Q
8-]16,);(1(6(CD
:),2("3,&6-+$%()C+"C),6
E--3F(%-*8,)C-
=,7B*;-7B)(6(CD*M,)*;B%(O*a;('CBb*+"$',$"()#*$(*($B-%*F(%-*+'"$,&6-*
;-7B)(6(C"-#*
E(*T((3**FGF<*5,$B#
E-$O(%Q]?"3-
8,3"(*!-2"7-
@")Q
F(2-*$(*E-O*5%-#-6-7$(%**
V,)3+$%()C+$%()CE-"CB&(%E-"CB&(%+"C),6+"C),6
!D),."7!D),."7+1-7$%'.+1-7$%'.
!D),."7*+1-7$%'.*
h-D*$(*/3,1$"2-*
E-$O(%Q")C
/3,1$,$"()*,$*/66*@,D-%#*"#*h-D*$(*8(&'#$*5-%4(%.,)7-
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
CD$D"05)*$D*/&5H)&(
@(O*M(#$*?E,E*8,3"(*!-#"C)Km'6D*`lL
[ e-%"4"-3*!-#"C)*$B,$*"#*8-,3D*4(%*5%(3'7$"()e-%"4"-3*!-#"C)*$B,$*"#*8-,3D*4(%*5%(3'7$"()[ 5%($($D1")C*5-%4(%.-3*()*5%(3'7$"()*@")-5%($($D1")C*5-%4(%.-3*()*5%(3'7$"()*@")-[ /66*5,%$#*/2,"6,&6-*;(3,D/66*5,%$#*/2,"6,&6-*;(3,D[ G)3-1-)3-)$6D*e-%"4"-3*M(#$*=#$".,$-#G)3-1-)3-)$6D*e-%"4"-3*M(#$*=#$".,$-#
23"+2.)4($
CD?F
TJJR43)94&($G$
6j$;A40$F/*)
;%J$^$2CE
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
?B,$*!/85/*"#*)($*$,7Q6")C
Optimality, Extensions (v. Existence Proofs)1. Implications of WNaN-type radios and self-organizing
networks2. Optimizations of algorithms, services etc3. Different / better solutions to same / similar problems
Incremental rollouts of radical new network technosNetwork technology has massive inertia. The world will
never let us do another IPv4 – IPv6 transition. Why not multiple protocols & extensible networking hw?
Name spaces
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
/%-,#*!/85/*?('63*@"Q-*$(*+--*?(%Q-3
How to Deploy New Networking Technologies (DoD context)Content v. PacketsDTN Applications!Better toolkits!Wireless Issues
Scaling & Management of Ultra-Dense NetsDisruption Tolerant serverless p2pPolicy-governed self-organizing sysems
Wireless a fundamentally different metaphor.. Wired world offers a clean separation between CS & EE.
Not true of wireless! Each layer needs information from other layers.. Power management, inhomogeneities, delay-bandwidth differences, disruption
Curriculum issue here? CS students need to know physical layer, EE need to know network layers
!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3
/)3*G)*M()76'#"()R
WNaN radios should be available in September. Is there interest in the academic community in having WNaN radios to work with?
We’re willing to work the issues if there’s interest.