p ro gr a m s a nd t he m e s in w irele ss n et w orkin g in th e str...

39
! !"#$%"&’$"() +$,$-.-)$ /0 /11%(2-3 4(% 5’&6"7 8-6-,#-9 !"#$%"&’$"() :)6"."$-3 !"# %&’()* %+")&+) , -)+.&/0/1’ 233/+"45)3 67 %)85)#9)* 6::7 Programs and Themes in Wireless Networking in the Strategic Technology Office at DARPA +;<8= ><8?/8! >@<<! 8<:;= FIND Workshop, Cambridge, MA

Upload: others

Post on 05-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

!!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!"#$%&'()*

%+")&+)$,$-)+.&/0/1'$233/+"45)3

67$%)85)#9)*$6::7

Programs and Themes inWireless Networking in the Strategic

Technology Office at DARPA

+;<8=

><8?/8!

>@<<!8<:;=

FIND Workshop, Cambridge, MA

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

<'$6")-

IntroductionBackground

• Problems in Tactical Wireless Networks• Technology Opportunities

DARPA STO Wireless Programs (among many)• XG – spectrum agile networking• DTN – disruption tolerant networking• WNaN – densely-deployed low-cost multi-channel radios;

distributed, adaptive, and scalable networking• CN – low power radios• IFPS – rescue beacon

Cross-Program TechnologiesPolicy / Ontology / Machine ReasoningNetwork Security

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!/85/A#*8(6-*")*

+7"-)7-*,)3*;-7B)(6(CD

APPROVED FOR PUBLIC RELEASE

E=/8 FG! >/8

+7"-)7-*H*;-7B)(6(CD*I

+-%2"7-*+H;

>')3,.-)$,6*8-#-,%7B

!/85/

;()D*;-$B-%*J*!"%-7$(%

+$%,$-C"7*;-7B)(6(CD*<44"7-*K+;<L

;4<"($=/&)'>$;"*)+5/*

M(..')"7,$"()#

?&@/*#45"/&$233A*4&+)$4&($%A*<"<49"0"5'

B4*0'$B&5*'>$C48"($C)4+5"/&>$%8)+"40$D/*+)3

E4*"5"#)

"#$ %&'$ %($ )'$ ''$

!-4-)#-*+7"-)7-#

G)4(%.,$"()*;-7B)(6(CD

F"7%(#D#$-.#*;-7B)(6(CD

G)4(%.,$"()*

=N16("$,$"()

G)4(%.,$"()*/O,%-)-##

+1-7",6*5%(P-7$#

;,7$"7,6*;-7B)(6(CD

+$%,$-C"7*;-7B)(6(CD

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;,7$"7,6*8,3"(*E-$O(%Q")C!"#$%&'(&)*(+

• Spectrum completely allocated• The military radio acquisition-performance death spiral• Many non-IP non-interoperable radios• COTS economies, COTS straitjacket• Disruption – Terrain, Weather, Jammers, Self-Jamming, Dynamics, Crypto• Scaling – Very hard to build ad hoc nets larger than about 50 nodes• Security designed for the 70s, not for PDAs• Operational deployment takes forever!• Tactical / military traffic statistics different from Internet• IP protocols evolved in a world with quasi-static topology - imposing

e2e IP on MANETs just doesn’t work!• Hub & spoke architecture colors thinking about MANETs..• Addressing doesn’t match topology (dynamics)• Stack layering doesn’t seem to fit MANETs

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

<11(%$')"$"-#R

• Spectacular increases in storage and computing resources since the 70s – what can we do with them?Adaptation & Self-organization

• Correlated usage a Good Thing if we design to it• Hardware is cheap; manufacturing costs a declining

fraction of unit cost; inexpensive programmable radio ICs coming availableUse COTS technologies, but build for use in MANETsExtensible standards

4. Spectrum assigned, but in practice unused

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

ST*5%(C%,.*M()7-1$

/'$()(.('#/'$()(.('#

!D),."7*!D),."7*

+1-7$%'.+1-7$%'.

:$"6"U,$"():$"6"U,$"()

8-,7$8-,7$8-,7$

MB,%,7$-%"U-MB,%,7$-%"U-MB,%,7$-%"U-

+-)#-+-)#-+-)#-

/3,1$/3,1$/3,1$

/66*+1-7$%'.*F,D*V-*/##"C)-39*V'$W

F,N".'.*/.16"$'3-#

>%-X'-)7D*KFYUL

/.16"3'-*K3V.L

Y-,2D*:#-

+1,%#-*:#-

Y-,2D*:#-

F-3"'.*:#-

@-##*$B,)*Z[*<77'1,)7D@-##*$B,)*Z[*<77'1,)7D

WF(#$*+1-7$%'.*G#*:)'#-3R

ST*5%(2"3-#*+1-7$%'.*/77-##W*

?(%63O"3-\

!D),."7,66D*@(7,$-*+1-7$%'.9*<%C,)"U-*E-$O(%Q#9*

,)3*G.16-.-)$*5(6"7"-#*$(*=)#'%-*E(*G)$-%4-%-)7-\

F,N".'.*/.16"$'3-#

>%-X'-)7D*KFYUL

/.16"3'-*K3V.L

G)7"#-*E-O*:#-%#

-)+.&"+40$F.400)&1)3G* ="1.H%8))(>$I"()94&($%)&3"&1

* 2(485"<)$J*/5/+/03$4&($K)5L/*M"&1

* %'35)#$J)*@/*#4&+)$4&($%+4049"0"5'

* K/&H?&5)*@)*)&+)$N8)*45"/&3

K)4*H-)*#$?#84+5G* ?&+*)43)($N8)*45"/&40$,"-".*/*$0$O%"#A054&)/A3$233)53$4&($E"33"/&3P$4&($-)#8/

* ?&+*)43)($F/##A&"+45"/&3$4&($CD$%'35)#$,"-"#*$0

* ?&+*)43)($F/##A&"+45"/&3$1+/*".*/*$0

DA5A*)$?#84+5G* Q)'$5/$;'&4#"+$-/8/0/1'>$R4&(L"(5.$4&($C)3/A*+)$E4&41)#)&5$"&$I"*)0)33$K)5L/*M3$OIK4K>$)5+SP

ST*"#*)($*&'"63")C*,*2+3&1"4*'9*ST*"#*&'"63")C*$B-*$-7B)(6(C"-#*

,)3*#D#$-.*7()7-1$#*4(%*506"7*#&8-+#$9:7&;%+*,)3*$B-*<=>&

?6#9+"%+&*6&8-+#$9:7&@##+%%*,%-*,2,"6,&6-*$(*,)D*)-$O(%Q-3*%,3"(

T(,60*;-7B)(6(CD*=),&6")C*!D),."7*H*E()]")$-%4-%")C*:#-*(4*

:)(77'1"-3*+1-7$%'.

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!/85/*ST*5%(C%,.*G)2-#$.-)$#

ST*5%($($D1-ST*5%($($D1-

H*!-.()#$%,$"()H*!-.()#$%,$"()

+1-7$%'.*/O,%-)-##+1-7$%'.*/O,%-)-##

G)$-%4-%-)7-G)$-%4-%-)7-

=44-7$#=44-7$#

/##-##.-)$/##-##.-)$

V-B,2"(%V-B,2"(%

/3,1$"2-/3,1$"2-

E-$O(%QE-$O(%Q

<1-%,$"()<1-%,$"()

+1-7$%'.*

F-,#'%-.-)$#

+-)#(%*;-7B)(6(CD +"C),6*5%(7-##")C*/6C(%"$B.#

!"#$%"&'$-3*+-)#")C

/6C(%"$B.#

G===*^_``G===*^_``5(6"7D

!-#7%"1$"()

+1-7$%'.*/3,1$"2-

E-$O(%Q")C

<1$"."U")C

+$%,$-C"-#

5(6"7D

8-,#()")C

M,1,&"6"$D

,)3*/44(%3,&"6"$D

!D),."7#

+'&)("#-

!-$-7$"()

G)7%-,#-3

/O,%-)-##

5-%4(%.,)7-

=N1-%".-)$#

F-$B(3(6(CD

>%,.-O(%Q*H

+-.,)$"7#

=)C")--%")C

V,#"#

E()]G)$-%4-%")C

<1-%,$"()

;,7$"7#

5(6"7D

@,)C',C-

=)4(%7-.-)$

G.16-.-)$,$"()

/##-##.-)$#

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;B-*ST*a=6-7$%(.,C)-$"7*<&#$,76-*M('%#-b

!"#$%

!"#$%&'()*+,#(-.

"$/,001

"%/,2

3(45-&6(7(+8&9:7.*;<-(+8&=>(?@(84

A<BB.*&C/9'

DE&@*(;.&F<-5

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

ST*H*5(6"7D

+ T)&)*40$3/0A5"/&$5/$4(485"<)$*4("/$+4&U5$9)$

V!"#$%&'()W

* 6::$%/<)*)"1&5")3>$5./A34&(3$/@$94&(3

* B#)*1"&1$5)+.&/0/1")3$L"00$.4<)$5/$9)$

4++/##/(45)(

+ ;2CJ2$?&<)35"&1$"&$F%$35*A+5A*)$@/*$

E4+."&)$C)43/&"&1$/&$J/0"+")3

* C)43/&"&1$-)+.&/0/1")3$5/$F/&5*/0$C)40H

-"#)$J*/+)33

* ;)+04*45"<)$X4&1A41)$@/*$J*/<490)$J/0"+'$

BY8*)33"/&$4&($?#80)#)&545"/&$

+ J4*5"5"/&)($J/0"+")3$"&5/$-L/$

F45)1/*")3

* J/0"+'$B&@/*+)#)&5$OJ)*#"55)($

N8)*45"/&P

* N85"#"Z"&1$OK)5L/*M$4&($29/<)P

+-7%-$,%D*(4*+$,$-**

;-6-7(..')"7,$"()#*H*5'&6"7*G)4(%.,$"()

+-7%-$,%D*(4*+$,$-**+-7%-$,%D*(4*+$,$-**

;-6-7(..')"7,$"()#*;-6-7(..')"7,$"()#*

H*5'&6"7*G)4(%.,$"()H*5'&6"7*G)4(%.,$"()

F")"#$%D*(4*

M(..')"7,$"()#

F")"#$%D*(4*F")"#$%D*(4*

M(..')"7,$"()#M(..')"7,$"()#

8-C'6,$(%D*

/'$B(%"$D*(4*

M(..')"7,$"()#*

H*5(#$#

8-C'6,$(%D*8-C'6,$(%D*

/'$B(%"$D*(4*/'$B(%"$D*(4*

M(..')"7,$"()#*M(..')"7,$"()#*

H*5(#$#H*5(#$#

8-C'6,$(%D**/'$B(%"$D*(4*

;-6-7(..')"7,$"()#*

,)3*5(#$#

8-C'6,$(%D**/'$B(%"$D*(4*8-C'6,$(%D**/'$B(%"$D*(4*

;-6-7(..')"7,$"()#*;-6-7(..')"7,$"()#*

,)3*5(#$#,)3*5(#$#F")"#$%D*(4*5'&6"7*?(%Q#9*;%,)#1(%$9*

H*?,$-%*FC$

F")"#$%D*(4*5'&6"7*F")"#$%D*(4*5'&6"7*

?(%Q#9*;%,)#1(%$9*?(%Q#9*;%,)#1(%$9*

H*?,$-%*FC$H*?,$-%*FC$

!-1,%$.-)$*

(4*;%,3-*H*G)3'#$%D

!-1,%$.-)$*!-1,%$.-)$*

(4*;%,3-*H*(4*;%,3-*H*

G)3'#$%DG)3'#$%D

F")"#$%D*(4*+7"-)7-9*

;-7B)(6(CD9*H*

G))(2,$"()

F")"#$%D*(4*F")"#$%D*(4*

+7"-)7-9*+7"-)7-9*

;-7B)(6(CD9*H*;-7B)(6(CD9*H*

G))(2,$"()G))(2,$"()

F")"#$%D*(4*

G)3'#$%D9*

=.16(D.-)$9*H*M(..')"7,$"()#

F")"#$%D*(4*F")"#$%D*(4*

G)3'#$%D9*G)3'#$%D9*

=.16(D.-)$9*H*=.16(D.-)$9*H*

M(..')"7,$"()#M(..')"7,$"()#

F")"#$%D*(4*

;%,)#1(%$*H*

M(..')"7,$"()#

F")"#$%D*(4*F")"#$%D*(4*

;%,)#1(%$*H*;%,)#1(%$*H*

M(..')"7,$"()#M(..')"7,$"()#

F")"#$%D*(4*M"2"6*/44,"%#*H*

M(..')"7,$"()#

F")"#$%D*(4*M"2"6*F")"#$%D*(4*M"2"6*

/44,"%#*H*/44,"%#*H*

M(..')"7,$"()#M(..')"7,$"()#F")"#$%D*(4*

=7()(."7#9*

>"),)7-9*H*

G)3'#$%D

F")"#$%D*(4*F")"#$%D*(4*

=7()(."7#9*=7()(."7#9*

>"),)7-9*H*>"),)7-9*H*

G)3'#$%DG)3'#$%D

F")"#$%D*(4*

;%,)#1(%$*H*

M(..')"7,$"()#

F")"#$%D*(4*F")"#$%D*(4*

;%,)#1(%$*H*;%,)#1(%$*H*

M(..')"7,$"()#M(..')"7,$"()#

F")"#$%D*(4*

G)4%,#$%'7$'%-

F")"#$%D*(4*F")"#$%D*(4*

G)4%,#$%'7$'%-G)4%,#$%'7$'%-

F")"#$%D*(4*;%,)#1(%$9*

5(#$#9*H*;-6-7(..')"7,$"()#

F")"#$%D*(4*;%,)#1(%$9*F")"#$%D*(4*;%,)#1(%$9*

5(#$#9*H*5(#$#9*H*

;-6-7(..')"7,$"()#;-6-7(..')"7,$"()#

!-1,%$.-)$*

(4*5'&6"7*

=)$-%1%"#-

!-1,%$.-)$*!-1,%$.-)$*

(4*5'&6"7*(4*5'&6"7*

=)$-%1%"#-=)$-%1%"#-

8-C'6,$(%D

G)$-%(1-%,&"6"$D

!-2"7-

E-$O(%Q

8-C"(),6

E,$"(),6[ M"$D]+1-7"4"7*+1-7$%'.*5(6"7D

[ ?,2-4(%.*F(3-[ !-2"7-*!'$D*MD76-*@"."$#*

[ E-$O(%Q/3."##"() Y,%3O,%-*

@"."$#+-7'%"$D

/3."##"()

8('$")C

/33%-##")C

;%,)#1(%$

M()#$,)$6D*+B"4$")C*

G)$-%#-7$"()

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;%,)#7-"2-%

+D#$-.+$%,$-CD8-,#()-%

ST*<1-%,$"(),6*M()7-1$

+-6-7$

<11(%$')"$"-#*

5(6"7D8-,#()-%

!-2-6(1<1$"()#* 5%(7-##

8-X'-#$*

!-$-%.")-

<11(%$')"$"-

#*

c-#dE(*

(%*/33"$

"(),6*

M()#$%,

")$#*

/77%-3"$-3

5(6"7D

8>*G)4(*/7X'"#"$"()

8+6%*6A&)''-

5(6"7D*=)C")-

8,3"(56,$4(%.

B+%%"A+

!/'3

8>*8-#('%7-

8-X'-#$

8>*;%,)#."$*

56,)

5(6"7D

/'$B(%5(6"7D

/'$B(%5(6"7D

/'$B(%

Down

load

!!!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;"3*A85"/&G$I.'$K/5$?J\

• FCS Communications Position Reports Used as Measure

• Highly Favorable Metric UsedLoss of 2 Successive (1 Sec Interval)

Reports Considered as Disconnected

IP is unreliable in tactical military networks• Dynamic military MANETs see rapid topology

changes and episodic connectivity• Tactical radio users know user names, roles, or

frequencies, not IP addresses• Tactical/edge military networks may be a mix of

IP and non-IP radios – no general mechanism for IP apps to bridge heterogeneous networks

?"%-6-##*)-$O(%Q#*$-)3*$(*B,2-*

'#,&6-*6(7,6*7())-7$"2"$D9*&'$*(4$-)*

7,)A$*%-,7B*&,7Q*$(*")4%,#$%'7$'%-

;%,44"7*")*."6"$,%D*$,7$"7,6*)-$O(%Q#*

$-)3#*$(*&-*B"CB6D*7(%%-6,$-39*)($*

C,'##",)*,#*")*$B-*G)$-%)-$

>M+*e-B"76-9*>$\*V-))")C*f``Z

!,!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

G5*8('$")C*2#\*!;E*!-6"2-%D

G5*K:!5*(%*;M5L*

O(%Q#*()6D*"4*$B-%-*

"#*G5*7()$")'"$D*

&-$O--)*)(3-#*4(%*

3'%,$"()*(4*$%,)#4-%

Kg*%('$")C*$".-L

!;E*&%"3C-#*G5*,)3*)()]

G5*1,$B#9*H*B(63#*3,$,*

3'%")C*")$-%2,6#*OB-)*

6")Q#*,6()C*$B-*1,$B*,%-*

)($*,2,"6,&6-

Disruptions break the connection

DTN custodians hold data for next link

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!;E*")*,*E'$#B-66

“Postal model” of CommunicationsStore and Forward, Incremental Delivery

source

destination

Persistent Storage

RoutingOpportunistic,

scheduled, epidemic,

Disrupted Region

!;E*1%(2"3-#*)-$O(%Q*#-%2"7-#*,7%(##*3"#%'1$"()*

,)3*.,##"2-*3"44-%-)7-#*")*3-6,D*,)3*&,)3O"3$B

Link Decoupling

Message Bundling

minimize interactivity

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

DTN Network Stack

;-K$%)*<"+)3

O)S1S>$*/A5"&1>$*)0"49"0"5'>$3)+A*"5'-

!;E*/5G

2880"+45"/&3

X"&M$X4')*

K)5L/*M$X4')*

!;E*M()2-%C-)7-*@,D-%

-*4&38/*5$X4')*

RA&(0)$X4')*$*+$,)%'$,)-%$,./%01.#$23

2880"+45"/&3$O)S1S>

45$-16'78%9'5:;1<=>$

3)&3/*$&)5L/*M3$

A3"&1$@"0)$5*4&3@)*>$

#)3341"&1>$)5+SP

X-J -FJ ];J

B5.)*&)5 2-E C4("/$F/##3$O>!&?>$@AP

?J

?J%BF^=2?JB

C8-.*8.-

C8-.*8.-

,,?(G.&+*&+

-5.*&?+H

.*&?<I.*&

F*+-+)+

?7

?(G.&+*&+

-5.*&?+H

.*&?<I.*&

F*+-+)+

?7

;-K$%)*<"+)3

O)S1S>$*/A5"&1>$*)0"49"0"5'>$3)+A*"5'-

!;E*/5G

2880"+45"/&3

X"&M$X4')*

K)5L/*M$X4')*

!;E*M()2-%C-)7-*@,D-%

-*4&38/*5$X4')*

RA&(0)$X4')*$*+$,)%'$,)-%$,./%01.#$23

2880"+45"/&3$O)S1S>

45$-16'78%9'5:;1<=>$

3)&3/*$&)5L/*M3$

A3"&1$@"0)$5*4&3@)*>$

#)3341"&1>$)5+SP

X-J -FJ ];J

B5.)*&)5 2-E C4("/$F/##3$O>!&?>$@APB5.)*&)5 2-E C4("/$F/##3$O>!&?>$@AP

?J?J

?J%BF^=2?JB

C8-.*8.-

C8-.*8.-

,,?(G.&+*&+

-5.*&?+H

.*&?<I.*&

F*+-+)+

?7

?(G.&+*&+

-5.*&?+H

.*&?<I.*&

F*+-+)+

?7

IPN/DTNRG CoreFunctionality:Bundle ProtocolDelay Tolerance

Routing across ScheduledDisruptionsLate BindingIP-Agnostic

+Organize information flow into self-contained bundles+Create intelligent networks that manage the flow of bundles thru the network+Pass messages thru the network incrementally, with successive responsibility – no e2e links!

+Opportunistically leverage link availability, multiple routes..+Agnostic to lower layers in the stack – use existing transport and network layers via shims, or interface to native link layer

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!;E*!-#"C)*5%")7"16-#

• Maintain advances thru the network, advance messages incrementally – don’t plow the same ground twice

• Minimize network chit-chat – build complete transactions to make best use of scarce link uptime – eg DNS

• Build a sequence of local control operations and use late binding – avoid dependence on remote information

• Take advantage of network hetero-geneity – allow different network components to use local technology and optimizations

#('%7-

3-#$"),$"()

3"#%'1$-3*,%-,#

“Think globally, act locally!”

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

DARPA DTN Phase 1 Technology Focus

• Fuzzy Delivery Scheduling – Making network routing decisions when available / optimal paths are uncertain

• Policy-based Resource Planning and Utilization – Moving Intelligence into Network to Make “Best” Choices on Delivery

• Late Binding – Enable Network to Deliver Traffic Without end-to-end Address and Routing Info

• Trusted Delivery – Provide authentication in the absence of connectivity to PKI etc – Security intrinsic in DTN, not an afterthought

• Multicast – multiple flavors built-in with store-and-forward

• Plug-in Architecture – Tool-chain-independent extension of non-military core to military-specific behaviors

DTNRG Core

DARPA Phase 1 Technology Focus

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

FNK;NC

T45)L4'

I)9

%)*<)*

!;E*")*M<E!<8*KE($"(),6*+".'6,$"()L

;)04'$_::#3

`aM983

X/33'^X/330)33$J)*"/(3

b)."+0)$X2K X2K

?&#4*345

X2K

FNK;NC

T45)L4'

-4+5"+40$N83$F)&5)*

I)9$R*/L3)*>$F.45>$F6JF

FNK;NC

T45)L4'FNK;NC$!A#8

F/##4&($b)."+0)

BJXC% BJXC%

?&#4*345

?&#4*345BJXC% BJXC%

FNK;NC

T45)L4'

5C

25C

2

CONDOR Phase 2 Implementation

5C

25C

2

5C

25C

2

CONDOR Phase 3 Implementation (& Phase 1 Simulation)

FNK;NC$!A#8

F/##4&($b)."+0)

;)04'$c:#3>$`aM983

X/33'^NA541)$J)*"/(3

;)04'$c:#3>$`aM983

X/33'^NA541)$J)*"/(3

Tacticomp5 Tacticomp5

;)04'$_::#3$`aM983

X/33'^X/330)33$J)*"/(3

TCP TCPTCP

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!;E*2\*;M50*M<E!<8*+".'6,$"()

DTN Phase 1 – initial workSimulated network connectivity betw

EPLRS to EPLRS over SATCOMDemonstrated 10x improvement in

latency & completion rateDTN Phase 2 – Building DTN into

CONDORDevelop a CONDOR-specific DTN

installationExperiment, evaluate, & demonstrate

DTN benefits in CONDORReal Data in Real CONDOR System

Significant Performance Improvement on-the-move via DTN

Data analysis underway

Decoupling Links & Store&Forward Provide 10x Performance Compared to TCP

M()#-7'$"2-*^`]hVD$-*>"6-*8-$%"-2,6#*(2-%*fi*B('%#

:

c::

d:::

dc::

6:::

6c::

e:::

ec::

a:::

d: e: c: 7: f: dd:

de:

dc:

d7:

df:

6d:

6e:

6c:

67:

6f:

>"6-*8-$%"-2,6*;".-*K#-7()3#L

E'.&-%*(4*>"6-*;%,)#4-%#

/&,)3()-3*^`]hVD$-*>"6-*;%,)#4-%#*")*fi*B('%#

`

^^j

:

6:

a:

`:

_:

d::

d6:

da:

/&,)3()-3

SS

^`*hVD$-*>"6-*;%,)#4-%#*")*fi*B('%#

kZl

kjl`

:

c::

d:::

dc::

6:::

6c::

e:::

ec::

a:::

=--J

;-K

M(.16-$-3

HTTP

DTN

!.!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!;E*56'C]")*/%7B"$-7$'%-

Modularization thru RPC-like/XML interfaces – toolchain independent

• Isolates core forwarding functionality by specifying plug-in extension interfaces.

• Benefit from COTS economies of scale

• Allow 3rd-party extensions• Clean-slate design possible

for many DTN components• Plug-ins allow cost control• Export control simplified

• No Military Code / Requirements in Open Source Product

• RFC Approved, Drafts en-Qd

COTS economies of scale without the COTS functionality straitjacket!

=*(@4.&:.-H..8&5.-.*+4.8.+>7&8.-H+*G7

;M5

M()2-%C-)7-*@,D-%#

+$(%,C-

!;E>(%O,%3-%

8('$")C

/116"7,$"()*G)$-%4,7-

8('$")Cd5(6"7DF(3'6-

5-%#"#$-)$+$(%,C-

:!5 @;5E()]G5

/116"7,$"()*/ /116"7,$"()*V /116"7,$"()*M

R0A)$D/*+)$

-*4+M"&1F.45

R455)*'$

2L4*)$

C/A5"&1

F/&5*/0

F4+."&1$^$F/&5)&5$

2((*)33490)$

%5/*41)$^

C/A5"&1$;454943)

I)9$

9*/L3"&1

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

Current DARPA DTN Technology Focus

• DTN storage as cache – bandwidth and latency reduction associated with correlated demand on one end of a thin pipe

• Content-based access to information – allows collaboration & data sharing at tactical edge – get away from addresses

• Support for continuously-changing edges – DTN nodes need not be on the routing path

• Policy adaptation for rapid deployment• Temporal Security – a new security model

for protecting information on portable devices

DTNRG Core

DARPA Phase 1 Technology Focus

DARPA Phase 2 Technology Focus

V,)3O"3$Bd8-6",&"6"$D

!"#$,)7-^`*F-C,&1#*Y"CB6D*

8-6",&6-*M())-7$"2"$D

?"%-6-##*=)76,2-#

TGT*>"&-%*M(%-

^`*T"C,&1#*Y"CB6D*

8-6",&6-*M())-7$"2"$D

Zi*h"6(&1#*=1"#(3"7*

M())-7$"2"$D

,!!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

On Beyond Disruption!

Resource UtilizationSubsequent requests for same data receive copies already cached in the network – only one copy of the data ever crosses any given link.

^#$ f)3 k%3* Requests for same dataggg

Reso

urce

s Us

ed to

G

et D

ata

Integrated Push-Pull Pub-SubTimeBandwidth

Push Pull IntegratedPush/Pull

• Good overall• Subsequent

requests build ‘akamai’

F4+."&1$"&$5.)$54+5"+40$+0/A(3$h$#$'-17)%<1/%B)%C'-)%$,1/%1%("CB%$-1/#.$%B"::)-

[ C)(A+)3$94&(L"(5.$()#4&(3$94+M$5/$+/*)

[ C)(A+)3$045)&+'F*)45)$('&4#"+$3)0@H@/*#"&1$V2M4#4"3W

?&5)1*45)($8A3.H8A00$8A9H3A9$("33)#"&45"/&$/@$(454

2++)33$5/$"&@/*#45"/&$9'$+/&5)&5$()3+*"85"/&>$+/&5)Y5>$/*$5'8)$*45.)*$5.4&$9'$&)5L/*M$4((*)33

K)5L/*MH#4&41)($8)*3"35)&+)$/@$"&@/*#45"/&$@0/L"&1$5.*A$5.)$&)5

DE?%5)F)-17)#%#$'-17)8%G-'<)##./78%5'<15%<'//)<$.F.$H8%1/(%$,)%<'--)51$.'/%':%./:'-CI1$.'/%-)J")#$#%./%$1<$.<15%/)$#%$'%G-'F.()K

,,!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

M()$-)$]V,#-3*E-$O(%Q")C

Caching and disruption tolerance can improve performance at the tactical edge, eg blue force tracking / SA

Content-based addressing provides a mechanism for sharing data at the edge, supports transition from C2 to a collaborative environment (CPOF)

Supports a wide variety of use cases, such as:

CBN Design Philosophy: Rich descriptions of contentRich descriptions of nodesOrganize content distribution around supply and

demandUser describes content to the network, not address of

contentUser accesses nodes with names or roles, not addressTactical deployments largely use static address

assignments – IP address assignments drive deployments.. overhead on deployment, don’t reflect topology of dynamic network

Each Node Can Provide Content to Any Other Node

G**)--3*,*.,1

get blue force

updates

map

give me sensor data

push sensor data to net

send my position

!;E*7,7B-

94+M$

5/$

+/*)

“I want maps for my area”, not “I want to ftp to 192.168.4.17”

“Give me a map of NW Baghdad with all intel since 0400 linked to it”

“Send this information to any unit w/i 200m of any bridge over the Tigris”

“Cache data relevant to the current mission”“Send this information to blue forces w/i a klick of me”“Acquire and report back to me sensor data w/i a klick of

my current position”“Monitor and report to me information as it becomes

available about red forces on the road to the airport”Enable two connected edge nodes to exchange blue

force data even when server disconnected

,/!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

+-7'%"$D

Three Security Problems in tactical networks2. Denial of Service (DoS) attacks against a thin pipe by a

compromised node

^`*F-C,&1#*Y"CB6D*

8-6",&6-*M())-7$"2"$D

TGT*>"&-%*M(%-

^`*T"C,&1#*Y"CB6D*

8-6",&6-*M())-7$"2"$D

Zi*h"6(&1#*=1"#(3"7*

M())-7$"2"$D

Compromised Node DoS Packets

DoS Attack Against 64Kpbs link

DTN Bundle Security Protocol Provides a General Mechanism for Authenticating Bundles Before They Enter a DTN Network

Applications that use DTN can use security for free

Security Perimeter

E^

F^

Ef Ek

/'$B-)$"7,$"()*#B('63*B,2-*

&--)*&'"6$*")$(*$B-*G)$-%)-$*

4%(.*$B-*&-C"))")C

,0!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;-.1(%,6*+-7'%"$D

Three Security Problems in tactical networks2. Denial of Service attacks against thin waist by a compromised

node• Loss of equipment exposes decrypted data on the node

Standard COMSEC – red-black separation w/encryption in the network – assumes nodes are physically secure - data is safe when it’s at the node (can be red/decrypted), but protect data in the network against tapping with encryption (black).

Low-cost nodes (WNaN radios, laptops, PDAs) no longer physically secure, so a lost radio or laptop exposes the information on it.

The current security model doesn’t work for portable devices!

Instead of red-black physical separation, provide red-black temporal separation – transitory access to the data thru bundle layer decryption

Data stays black until/unless the application is processing it, and goes away when the application goes away.

DTN bundle security mechanism & TSE move the security infrastructure to the tactical boundary.

;".-

!;E

;454$/&0'$()+*'85)($@/*$4++)33

M'%%-)$

;454$()+*'85)($45$)&($3'35)#

Temporal Security Model

,1!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

M,7B")C*H*+-7'%"$D

Three Security Problems in tactical networks2. Denial of Service (DoS) attacks against thin waist by a

compromised node3. Loss of equipment exposes decrypted data on the node• Caching / matching data that the node is not authorized to read

Solution: keep data in black in servers, network caches, and local cache.Decrypt data only when app asks for it, and scrub data when app exits

Common Encrypted Metadata Allows Encrypted Data to be Identified and Delivered from Network Node Cache to End Point

Problem: in DTN, every bundle can be protected with a different security association .. How to operate a cache with encrypted bundles?Solution: 1) Common security association for metadata2) Different security association for data and metadata3) Cache hits by matching on metadata

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

?E,E*]*/3,1$"2-*8,3"(#*H*/3,1$"2-*E-$O(%Q")C

+ %"&10)$CD$J*/+)33"&1$%0"+)$C)80"+45)($5/$

@/*#$a$-*4&3+)"<)*$b/"+)^;454$$C4("/3

+ B4*0'$.4*(L4*)$4&($&)5L/*M"&1$+4849"0"5'$5/$

)&490)$)Y8)*"#)&545"/&>$--J$()<)0/8#)&5$9'$

3)*<"+)3

* I/*M"&1$*4("/$9'$%)85)#9)*$6::_$

+ X/L$5)+.&"+40$*"3M>$0/L$+/35$*"3M$5/$#4Y"#"Z)$

8*/949"0"5'$/@$3A++)33@A0$5*4&3"5"/&

+ RA"05$"&$;'&4#"+$%8)+5*A#$F4849"0"5'

* 2</"(3$38)+5*A#$^$&)5L/*M$804&&"&1

?E,E*Y,%3O,%-*T(,6#0[ I*j``*1-%*i*;%,)#7-"2-%*E(3-[ +1-7$%,66D*/3,1$"2-[ FGF<*4(%*Y"CB*M,1,7"$D*")*

:%&,)*=)2"%().-)$#

[ F-.&-%*(4*>('%*+'&)-$O(%Q#* Simultaneously

f\Zb*N*^\lb*N*Z\jb

m'6D*`l*>(%.*>,7$(%*m'6D*`l*>(%.*>,7$(%*

f\fb*N*^\Zb*N*j\kb

E(2*`_*>(%.*>,7$(%*E(2*`_*>(%.*>,7$(%*

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;B-*?E,E*/3,1$"2-*8,3"(

+ 2$;"@@)*)&5$288*/4+.$5/$2@@/*(490)$E"0"54*'$-4+5"+40$K)5L/*M3+ 2+.")<)3G* 5-%4(%.,)7-$9'$2(485"<)$K)5L/*M"&1>$C4&1)$9'$K)5L/*M$C)04'$

* /44(%3,&"6"$D$9'$%8)+5*A#$2(48549"0"5'>$*)04Y)3$*)iA"*)#)&53$/&$CD$@*/&5H)&(

* +7,6,&"6"$D$9'$#A05"80)$5*4&3+)"<)*3$4&($#A05"80)$,$('&4#"+$8.'3"+40$&)5L/*M3

* 8-6",&"6"$D$5.*/A1.$EA05"80)$%"#A054&)/A3$K)5L/*M$F/&&)+5"/&3$4&($-*4&3+)"<)*3$"&$B4+.$K/()S

+ ;2CJ2$jT$-)+.&/0/1'$@/*$FN-%$/8)*45"/&$"&$()&3)$CD$)&<"*/&#)&53+ a$?&()8)&()&5$CD$-*4&3+)"<)*3$F4&$N8)*45)$F/00)+5"<)0'$/*$?&("<"(A400'$@/*$EA05"80)$K)5L/*M$F/&&)+5"/&3

B4+.$O/@$aP$F.4&&)0G

2@@/*(49"0"5'$9'$."1.$</0A#)$4&($."1.$"&5)1*45"/&$0)<)0$FN-%$?F3>$,$9'$A3)$/@$

;'&4#"+$%8)+5*A#$5/$)&3A*)$."1.$iA40"5'$CD$+.4&&)0$4<4"049"0"5'$L"5./A5$."1.$0"&)4*"5' :)"$*M(#$*:)3-%*Ij``*")*n',)$"$D

234567859:;9<73;3=87

,>?@9A9!>B@9A9?>1@

C:;D9C3EF:;

G9H>H!I9J634E79:K9LC9$M7;8:359

N49"74O79P4MN;:4D74FO

LC9P4MN;:4D74F

"QL&Q9(R9"S43DNE9#T7EF;UD9

#74ON4V93459QOONV4D74F

C;7WU74ES9

#787EFN:4

,A,X9/A/X90A0)%)$

$C")X9Y&#ZX9[&#ZX9YQ)9):5U83FN:4

Y9\9!1HCN8F7;9Y

]T9F:9/9Z)L34V7

!?Z[&#9F:9!H9)[&#"3F39L3F7

!9<3FF9^9';34OE7NM7;X909<3FFO9

':F38

&:_7;

.HH9)2`9F:9?9R2`9J:4FN4U:UOC;7WU74ES9

L34V7

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;O(*MB("7-#9*,)3*,*YD&%"3

M<;+

F"6"$,%D*

+1-7"4"7

@(O*M(#$9*&'$*\*\*\*

;D1"7,66D*G)4%,#$%'7$'%-*V,#-3

@"."$-3*(%*M"2"6*+1-7$%'.

@"."$-3*8(&'#$)-##9*Y,%3)-##9*W

a=N1-)#-3b9*#(*M,)*V-*8,1"36D*<&#(6-$-3

8-7(C)"U-*F,)'4,7$'%-*"#*!-7%-,#")C*

M(.1()-)$*(4*M(#$

@-2-%,C-*Y"CB*e(6'.-*M<;+*5,%$#

!-2-6(1*F"6"$,%D*+1-7"4"7*8,3"(*!-#"C)

!-2-6(1*/3,1$"2-*;-7B)(6(CD*$(*<2-%7(.-*

M<;+*5,%$#*@"."$,$"()#

?E,E

/11%(,7B

Y"CB6D*M,1,&6-9*&'$*W

Y"CB6D*=N1-)#"2-

+6(O*;-7B)(6(CD*/3(1$"()dG)#-%$"()

@()C*;-%.*G)2-#$.-)$#*K+$,$"79*G)$-%(1-%,&"6"$D*;,"6L

M()#$%,")")C*()*E-O*!(7$%")-9*W

/*!"44-%-)$*/11%(,7B*$(*/44(%3,&"6"$D/*!"44-%-)$*/11%(,7B*$(*/44(%3,&"6"$D

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

!D),."7**+1-7$%'.*"#*G.1(%$,)$*4(%*F(%-*$B,)**+1-7$%'.*F,),C-.-)$

Spectrum Adaptation EnablesLower cost but effective military hardwareLeveraging of “cellular” and “WiMax” production

base to reduce DoD costNetworks that achieve performance by migrating

bandwidth...not buying for worst caseScalable mobile networksOperation in dense RF environments

+1-7$%'.*F,),C-.-)$*")*

$B-*8,3"(*"#*$B-*h-D*

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

?E,E*F/E=;+*/7B"-2-*8-6",&"6"$D*$B%('CB*!"2-%#-*5,$B#*,)3*>%-X'-)7"-#

;(3,DA#*F-#B*(%*F/E=; ?E,E

[ X/L$C)0"49"0"5'$;A)$5/$%"&10)$X"&M$

C/A5)3[ R4&(L"(5.$;*/83$43$E/*)$C4("/3$

2(()($5/$K)5L/*M[ R4&(L"(5.$F/&35*4"&)($9'$EA5A40$

?&5)*@)*)&+)$h$E/*)$K/()3$(/$K/5$

F*)45)$E/*)$F484+"5'[ X4*1)$KA#9)*$/@$K/()3$/&$%"&10)$

D*)iA)&+")3

[ EA05"80)$X"&M3$4&($C/A5)3$J*/<"()$

="1.$C)0"49"0"5'[ R4&(L"(5.$?&+*)43)3$43$E/*)$C4("/3$

2(()($5/$K)5L/*M[ ;"<)*3"5'$"&$D*)iA)&+'$2</"(3$

?&5)*@)*)&+)[ ;'&4#"+$%8)+5*A#$F4&$]3)$K)5L/*M$

5/$VE4M)$R)@/*)$R*)4MW$D/*$

;)8)&(490)$N8)*45"/&

M(6(%*!-1"7$#*,66*%,3"(#*()*

$B-*#,.-*4%-X'-)7D M(6(%*!-1"7$#*#'&])-$*4%-X'-)7"-#

FGF<*F(3-*E($*!-1"7$-3

?E,E*/%7B"$-7$'%-*/33%-##-#*h)(O)*?E,E*/%7B"$-7$'%-*/33%-##-#*h)(O)*?-,Q)-##-#*(4*M'%%-)$*F/E=;*;-7B)(6(CD?-,Q)-##-#*(4*M'%%-)$*F/E=;*;-7B)(6(CD

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

?E,E*E-$O(%Q#*+'11(%$*G)$-%7())-7$"2"$D*O"$B*@-C,7D*+D#$-.#*K=)3*(4*5%(C%,.L

E()]?E,EE-$O(%Q*G)4%,#$%'7$'%-

KTGT9*?GE];9*+/;M<F9*m;8+9W

?E,E*F/E=;

?E,E*F/E=;

?E,E*F/E=;

F'6$"16-9*!D),."7*G)$-%4,7-*5(")$#

/)D*E(3-*M,)*+-%2-*,#*,*@-C,7D*G)$-%4,7-

?E,E*!-2"7-#*<1-%,$-*;B%('CB*,)3*G)$-%(1-%,$-*?"$B*E()]?E,E*G)4%,#$%'7$'%-#

/)D*E(3-*M,)*G)$-%4,7-*O"$B*,)*G5*8('$-%*(%*!-2"7-*;B%('CB*,)*8m]ij*

M())-7$"()

@-C,7D8,3"(

E-$O(%Q#

IK2K$F4&$]3)$2&'$?J$K)5L/*M$5/$BY5)&($C4&1)>$-40M$IK2K$F4&$]3)$2&'$?J$K)5L/*M$5/$BY5)&($C4&1)>$-40M$5/$X)14+'$%'35)#3>$2++)33$?&@/*#45"/&>$4&($B&.4&+)$5/$X)14+'$%'35)#3>$2++)33$?&@/*#45"/&>$4&($B&.4&+)$

K)5L/*M$J)*@/*#4&+)K)5L/*M$J)*@/*#4&+)

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

;B-*h-D*$(*?E,E*8(&'#$)-##

FGF<FGF<

V-,.V-,.>(%.")C>(%.")C

E'66")CE'66")C

;(1(6(CD;(1(6(CD56,))")C56,))")C

+1-7$%'.+1-7$%'.56,))")C56,))")C

!-2"7-!-2"7-+1'%#9*W+1'%#9*W

8-6(7,$-/%(')3*+1'%

+1-7$%'.;((*;"CB$

8-]16,)/7%(##*E-$O(%Q

8-]16,);(1(6(CD

:),2("3,&6-+$%()C+"C),6

E--3F(%-*8,)C-

=,7B*;-7B)(6(CD*M,)*;B%(O*a;('CBb*+"$',$"()#*$(*($B-%*F(%-*+'"$,&6-*

;-7B)(6(C"-#*

E(*T((3**FGF<*5,$B#

E-$O(%Q]?"3-

8,3"(*!-2"7-

@")Q

F(2-*$(*E-O*5%-#-6-7$(%**

V,)3+$%()C+$%()CE-"CB&(%E-"CB&(%+"C),6+"C),6

!D),."7!D),."7+1-7$%'.+1-7$%'.

!D),."7*+1-7$%'.*

h-D*$(*/3,1$"2-*

E-$O(%Q")C

/3,1$,$"()*,$*/66*@,D-%#*"#*h-D*$(*8(&'#$*5-%4(%.,)7-

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

CD$D"05)*$D*/&5H)&(

@(O*M(#$*?E,E*8,3"(*!-#"C)Km'6D*`lL

[ e-%"4"-3*!-#"C)*$B,$*"#*8-,3D*4(%*5%(3'7$"()e-%"4"-3*!-#"C)*$B,$*"#*8-,3D*4(%*5%(3'7$"()[ 5%($($D1")C*5-%4(%.-3*()*5%(3'7$"()*@")-5%($($D1")C*5-%4(%.-3*()*5%(3'7$"()*@")-[ /66*5,%$#*/2,"6,&6-*;(3,D/66*5,%$#*/2,"6,&6-*;(3,D[ G)3-1-)3-)$6D*e-%"4"-3*M(#$*=#$".,$-#G)3-1-)3-)$6D*e-%"4"-3*M(#$*=#$".,$-#

23"+2.)4($

CD?F

TJJR43)94&($G$

6j$;A40$F/*)

;%J$^$2CE

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

?B,$*!/85/*"#*)($*$,7Q6")C

Optimality, Extensions (v. Existence Proofs)1. Implications of WNaN-type radios and self-organizing

networks2. Optimizations of algorithms, services etc3. Different / better solutions to same / similar problems

Incremental rollouts of radical new network technosNetwork technology has massive inertia. The world will

never let us do another IPv4 – IPv6 transition. Why not multiple protocols & extensible networking hw?

Name spaces

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

/%-,#*!/85/*?('63*@"Q-*$(*+--*?(%Q-3

How to Deploy New Networking Technologies (DoD context)Content v. PacketsDTN Applications!Better toolkits!Wireless Issues

Scaling & Management of Ultra-Dense NetsDisruption Tolerant serverless p2pPolicy-governed self-organizing sysems

Wireless a fundamentally different metaphor.. Wired world offers a clean separation between CS & EE.

Not true of wireless! Each layer needs information from other layers.. Power management, inhomogeneities, delay-bandwidth differences, disruption

Curriculum issue here? CS students need to know physical layer, EE need to know network layers

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

/)3*G)*M()76'#"()R

WNaN radios should be available in September. Is there interest in the academic community in having WNaN radios to work with?

We’re willing to work the issues if there’s interest.

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

n'-#$"()#o

Thank you!

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

BACKUPS

!"#$%"&'$"()*+$,$-.-)$*/0*/11%(2-3*4(%*5'&6"7*8-6-,#-9*!"#$%"&'$"()*:)6"."$-3

MB,$$")-##*")*>;5

55 link traversals before first “data” byte returned to user

1st data xferAssumes interactive session, DNS query, anon. ftp, directory listing, change directory, “get README.txt”