TOC 
Network Working GroupJ. Wyllie
Internet-DraftOhio University
Intended status: ExperimentalW. Eddy
Expires: May 21, 2008Verizon
 J. Ishac
 W. Ivancic
 NASA
 S. Ostermann
 Ohio University
 November 18, 2007


Automated Bundle Agent Discovery for Delay/Disruption-Tolerant Networking
draft-wyllie-dtnrg-badisc-01

Status of this Memo

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”

The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.

This Internet-Draft will expire on May 21, 2008.

Abstract

In Delay/Disruption-Tolerant Networking (DTN), Bundle Agents form an overlay network that forwards DTN bundles between their source and destination applications. This document describes a mechanism that Bundle Agents can use to discover when they are in contact with one another and optionally provide information on the additional properties of current or future contacts, such as duration and capabilities. This information can be used to trigger bundle forwarding or make future bundle scheduling decisions.



Table of Contents

1.  Introduction
    1.1.  Terminology
    1.2.  Protocol Overview
2.  Message Format
    2.1.  Bundle Processing Control Flags
    2.2.  Autodiscovery Message Format
    2.3.  Autodiscovery Flags
    2.4.  Capabilities
        2.4.1.  Convergence Layers Supported
        2.4.2.  Grokability of Schemes
        2.4.3.  Structure of the Capabilities SDNVs
    2.5.  Autodiscovery Protocol Type
3.  Convergence Layer Behavior
4.  Processing Behavior
    4.1.  Exported Bundling Agent Interface
    4.2.  Bundling Daemon Autodiscovery Request Handling
    4.3.  Processing of Received Autodiscovery Bundles
    4.4.  Adding and Overwriting Contact Times
    4.5.  Bundle Status Reports
5.  Examples
    5.1.  Sensor Node to Sensor Node
    5.2.  Deep-Space Probe to Earth Discovery
    5.3.  LEO Satellites to Terrestrial Center
    5.4.  Updating and Overwriting Contacts
    5.5.  A Note on Flexibility
6.  Security Considerations
    6.1.  Security in a Trusted Network
    6.2.  Security in an Untrusted Network
7.  IANA Considerations
8.  Acknowledgements
9.  Informative References
§  Authors' Addresses
§  Intellectual Property and Copyright Statements




 TOC 

1.  Introduction

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119] (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.).

The Delay/Disruption-Tolerant Networking (DTN) architecture [RFC4838] (Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., and H. Weiss, “Delay-Tolerant Networking Architecture,” April 2007.) describes an overlay network of Bundle Agents (BAs). Each BA manages the forwarding of bundles during contacts with other BAs and queues bundles between contacts. As the bundle format and basic forwarding operations were designed, it became clear that an automated means for BAs to discover neighboring nodes, their neighbors' capabilities, and contact times was needed. This document describes such a mechanism as well as the mechanism's relationship to potential DTN routing protocols.

While the mechanism described within this document is specifically designed to convey peer-to-peer contact information between two BAs that are adjacent in the overlay topology, it also can be used as one of the building blocks to enable multi-hop routing decisions between BAs. To clarify, consider a typical Internet routing protocol (e.g. OSPF [RFC2328] (Moy, J., “OSPF Version 2,” April 1998.)) which has two main types of messages: (1) "Hello" messages used to automatically discover connectivity with other directly-reachable peers, and (2) messages used to update databases of connectivity information for further hops. The mechanism described in this document satisfies the first function ("Hello" messaging) within a DTN overlay by allowing Bundle Agents to automatically discover other nodes to which they can directly forward bundles.

Previously, implementations of DTN Bundle Agents provided these functions using either static, manual configuration or ad-hoc, custom advertisement mechanisms that were neither formally defined nor independent of convergence layers. This document provides a means that will interoperate between differing BA implementations and allow them to exchange contact information over any shared convergence layers.

This exchange of contact information can be useful even when contact properties are known in advance. It can be used to verify the pre-configured information or reveal discrepancies in contact properties (expected duration, expected future contact times, etc.).

The remainder of this document contains a high-level overview of the discovery mechanism's design in Section 1.2 (Protocol Overview), a specification of the message formats used in Section 3 (Convergence Layer Behavior) and Section 2 (Message Format), and a description of the rules for generating and processing these messages in Section 4 (Processing Behavior). In addition, Section 5 (Examples) contains example message exchanges to clarify the protocol's operation.



 TOC 

1.1.  Terminology

Defining neighboring nodes on a typical network is fairly straightforward. However, the overlay nature of a DTN complicates the definition of neighboring DTN BAs. Furthermore, communication may be unidirectional in DTNs: for example, DTN node A may be able to send to DTN node B, but not vice versa. We therefore define the following terms:

Neighbor:
Two nodes are said to be 'neighbors' over a convergence layer if and only if the nodes can communicate symmetrically directly over that convergence layer. For example, assume A, B, and C are all DTN BAs, and A is connected to B over one TCP convergence layer adapter while B is connected to C over another TCP convergence layer adapter, but TCP segments between A and C are blocked by a firewall, so no direct contact between them is possible. A and C are not neighbors while B is a neighbor to both A and C, regardless of how many IP-layer hops exist between them. The convergence layers here imply connection symmetry: if B were connected to C over a convergence layer which only permitted unidirectional transmission (e.g. FLUTE), B may not be a neighbor to C, and instead might be one of the following:
Pitcher:
When a contact exists between two nodes, but they are not neighbors because they lack bidirectional connectivity, one is called a "pitcher", and the other a "catcher". The node that can only send over the convergence layer takes the role of the pitcher. A pitcher meets the definition of "neighbor" in every other way. As an example, A is a pitcher to B over a particular convergence layer adapter if A can directly send and B can directly receive using that convergence layer.
Catcher:
A node that can only receive over a convergence layer adapter fills the role of catcher. A catcher meets the definition of "neighbor" in every other way. As an example, A is a catcher to B over a particular convergence layer adapter if A can directly receive and B can directly send using that convergence layer.
In-Contact:
A node X is said to be 'in-contact' to another node Y if X is either a neighbor, pitcher, or catcher to node Y.

The terms 'pitcher' and 'catcher' were borrowed from JPL's implementation of the Asynchronous Message Service.



 TOC 

1.2.  Protocol Overview

BA autodiscovery is complicated by the diverse set of deployment environments in which DTN may be used. As stated in [RFC4838] (Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., and H. Weiss, “Delay-Tolerant Networking Architecture,” April 2007.), deployment environments may include networks with any combination of:

To adequately accommodate all of these environments, the protocol in this document provides two levels of information: (1) domain-specific and (2) domain-independent, where a domain refers to a particular class of deployment environment. Domain-specific information typically is needed to determine the expected duration and other properties that are clearly determined by different factors. For instance, deep-space networks have known and stable orbital properties while terrestrial vehicular ad-hoc networks have unknown and fairly random motion and link fading. Domain-independent information directly specifies contact properties that can be determined and communicated independently of any particular deployment environment. As a result, it contains only basic information that is consistently useful across environments such as the remaining amount of storage space and EIDs in use.

This dual-level design provides flexibility in determining information about other BAs. For example, DTN-enabled nodes on a local sensor network may send domain-specific bundles including both power levels and received signal strengths to a central point that determines contact times and durations. In contrast, DTN-enabled deep-space probes may send no domain-specific information at all, instead relying on preconfigured schedules or internal ephemeris data to determine contacts, and using autodiscovery only as a status and sanity check of the DTN-level networking configuration.

The protocol also allows for third-party configuration of contact information (a third DTN node may inform two other nodes about their expected contact times). This can facilitate remote configuration. For instance, 'dumb' sensor network nodes may not have complete information to determine optimal contact times on their own. However, a single, more sophisticated node can communicate this information to the entire sensor network. The potential for misuse of this capability raises some security concerns that are discussed in Section 6 (Security Considerations).



 TOC 

2.  Message Format



 TOC 

2.1.  Bundle Processing Control Flags

Bundle Processing Control Flags MUST adhere to the following guidelines:

Therefore, the low-order Bundle Processing Control Flags SHOULD be set to:

   000Z0Y0X

where the value of X is determined by whether the current bundle is a fragment, the value of Y is determined by whether the domain-specific case allows for fragmentation, and the value of Z is determined by the number of intended destinations.



 TOC 

2.2.  Autodiscovery Message Format

In order to work regardless of the convergence layer adapters that are available, BA autodiscovery uses DTN bundles to communicate its data. More specifically, all autodiscovery data is encoded in the payload block of the bundle. Some of the autodiscovery fields use Self-Delimiting Numeric Values (SDNVs) [I‑D.irtf‑dtnrg‑sdnv] (Eddy, W., “Using Self-Delimiting Numeric Values in Protocols,” January 2010.) within the messaging format, as in several other parts of the Bundle Protocol and its extensions.

Any bundles related to autodiscovery MUST contain the domain-independent portion of the autodiscovery bundle, followed optionally by the domain-specific portion. The fields should be ordered as follows:



 TOC 

2.3.  Autodiscovery Flags

The bits of the Autodiscovery Flags indicate which optional fields of the Autodiscovery Block are present, and are explained in detail below:

   Bit 0 -- Start Time Present
   Bit 1 -- End Time Present
   Bit 2 -- Connection is bidirectional
   Bit 3-7 -- Reserved



 TOC 

2.4.  Capabilities

Though many capabilities could be considered domain-specific, some capabilities are nearly ubiquitous in utility and relevance. Those capabilities are defined here. To reduce bit overhead when not all capabilities are relevant or desired, the capabilities are set as a two-level SDNV. The top-level SDNV specifies which second-level SDNVs are present in the bundle. Each second-level is a categorized SDNV with flags signifying the presence or absence of some capability.

Currently, two second-level SDNVs are defined. Therefore, the top-level capabilities SDNV has the following values:

For any capabilities that are not defined, default values may be chosen by the BA in an implementation-specific manner.



 TOC 

2.4.1.  Convergence Layers Supported

This capabilities SDNV defines over which convergence layers the BA can communicate. Setting the convergence layer bit indicates that the convergence layer is understood; clearing indicates that it is not. Currently, the SDNV is defined as follows:



 TOC 

2.4.2.  Grokability of Schemes

This capabilities SDNV defines which EID schemes the BA can understand. Currently, the SDNV defines the following:



 TOC 

2.4.3.  Structure of the Capabilities SDNVs

All capabilities information is included as part of the "capabilities" section of the discovery header. The top-level SDNV MUST be present. If any of its bits are set, the accompanying SDNV MUST be concatenated immediately following the top-level SDNV. If multiple second-level SDNVs are indicated, they MUST be concatenated together in the order in which they are indicated in the top-level SDNV.



 TOC 

2.5.  Autodiscovery Protocol Type

If an autodiscovery bundle contains domain-specific information, this field indicates the structure of the payload data. Effectively, this field defines the "domain" of the domain-specific portion. Currently, the following fields are defined:

Domain-specific information, in a bundle which has any, immediately follows the payload of the autodiscovery message.



 TOC 

3.  Convergence Layer Behavior

Due to the nature of an overlay network, autodiscovery may take place over many different convergence layers. In addition, depending on the convergence layer used, convergence layer discovery might be necessary prior to bundling discovery. For instance, when using Bluetooth as a convergence layer, paired devices must undergo device discovery and service discovery before encapsulated data (such as the autodiscovery bundle) can be sent. Therefore, initiating autodiscovery over Bluetooth for previously unknown devices will require cooperation between device/service discovery and the bundling layer [BTSPEC] (, “Specification of the Bluetooth System,” July 2007.). If any data obtained in service discovery is relevant, it could be communicated as domain-specific information in the discovery bundle. For the common terrestrial Internet protocols TCP and UDP, discovery over TCP implies that the devices have bidirectional communication where discovery over UDP can use unidirectional communication and multicast. TCP requires handshaking prior to bundle communication; UDP does not.

Certain capabilities of a convergence layer node may be relevant in the bundling autodiscovery process. For instance, when using TCP, it may be relevant to communicate the round-trip time (RTT) to the bundle layer as it may impact routing decisions. Extra features like this can be included as part of a domain-specific protocol.

The capabilities as described in are explicitly for the bundle layer. Convergence layer-specific information (aside from their existence) is purposefully not included there. Communicating relevant convergence layer-specific information can be done in a domain-specific protocol.

Due to the myriad convergence layers over which bundles are expected to travel, exact mechanisms for executing bundle-layer autodiscovery over convergence layers are outside the scope of this document and are left as future work.



 TOC 

4.  Processing Behavior

Due to the domain-specific portions of autodiscovery, exact processing of autodiscovery bundles can vary widely between domains. Therefore, only a general framework for autodiscovery bundle processing is given in this document while exact autodiscovery procedures for particular domains is defined separately.

Autodiscovery functions can either be implemented within a BA, or as one or more external 'helper' applications. An interface supporting both types of implementation are outlined below. Although a helper application may assist in interpreting autodiscovery payloads, autodiscovery is not itself a DTN application. Autodiscovery bundles are addressed to the administrative endpoints of BAs themselves, whose EIDs are not suffixed with an application de-muxing token, or otherwise altered. In this way, autodiscovery works for all EID schemes regardless of how EIDs are constructed within them.



 TOC 

4.1.  Exported Bundling Agent Interface

In addition to providing the basic bundling API as defined in [SB07] (Scott, K. and S. Burleigh, “Bundle Protocol Specification,” April 2007.), the daemon SHOULD allow for explicit values specified for the following fields in an outgoing bundle:

Exactly how this interface is supplied (e.g. via IPC, RPC, etc) is an implementation-specific consideration.

A BA SHOULD use the "expedited" priority for all autodiscovery bundles, given that they may affect immediate decisions and are typically small bundles, although this interface MAY be extended in some implementations to allow the priority to be specified.



 TOC 

4.2.  Bundling Daemon Autodiscovery Request Handling

Requests for autodiscovery will be honored as long as the supplied parameters are valid and the requested convergence layer adapter exists and is capable of sending bundles.

Upon receiving a request to initiate autodiscovery, the BA MUST initiate this procedure regardless of its current knowledge of contacts. It will, however, maintain its current contact information base entries at least until autodiscovery completes.



 TOC 

4.3.  Processing of Received Autodiscovery Bundles

Processing of incoming autodiscovery responses proceeds differently depending on the Autodiscovery Type field:

Zero (fully domain-independent):
A domain-independent bundle can be processed entirely within any bundle agent capable of autodiscovery. The contact information given in the autodiscovery message can be used to update the contact information base at the bundle agent's discretion.
Non-Zero (domain-specific):
Upon reception of an Autodiscovery Bundle with a domain-specific payload (indicated by a non-zero Autodiscovery Type code), the bundle agent can either process the domain-specific payload itself (if it understands the autodiscovery protocol used) or may hand the entire payload block to external autodiscovery code that can suggest changes to the bundle agent's contact information base after processing.

It is possible that after receiving an Autodiscovery Bundle, a bundle agent will wish to advertise its own view of contact information in response. This is fully at the discretion of the bundle agent or external autodiscovery code.



 TOC 

4.4.  Adding and Overwriting Contact Times

When a valid new contact is received, it will be updated according to the following rules:

More recently-received and valid updates will always be added to the BA. Only the contact window, pitcher EID, and catcher EID are considered in decisions to keep or eliminate older discovery entries.

If no contact information about the pitcher and catcher currently exists, or if contact information exists but does not overlap with the time period specified in the received bundle, then the contact information will be added to the BA without modification to existing entries.

If contact information about the pitcher and catcher currently exists and overlaps the time period specified in the received bundle at any point in time, the now "outdated" entry should be deleted in its entirety, including the part which does not overlap with the newly-received bundle. Other entries pertaining to the pitcher and catcher which have no time overlap with the newly received bundles SHOULD be retained.

More examples to illustrate the updating procedure can be found in Section 5.4 (Updating and Overwriting Contacts).



 TOC 

4.5.  Bundle Status Reports

As any bundle sender can request a Bundle Status Report (a Bundle Reception Status Report in this case), Autodiscovery Bundles may also be acknowledged using this mechanism, if desired. These could be utilized by a bundle agent or external autodiscovery code in order to suppress retransmission of autodiscovery information, for instance, when sending over unreliable convergence layer adapters that lack feedback of their own (e.g. single-packet UDP). This is not necessary in all domains, and since information gained through autodiscovery is generally advisory, it is assumed that Bundle Status Reports will not be frequently requested for Autodiscovery Bundles.



 TOC 

5.  Examples



 TOC 

5.1.  Sensor Node to Sensor Node

In this example, dozens of sensor nodes are deployed in an area without any infrastructure and must discover one another in order to communicate at the bundle layer. All nodes are connected on the same network. Exact discovery would depend on the domain-specific protocol used, but it could look similar to the the diagram below:


     Sensor node                         Sensor node
  (s) MULTICAST HELLO ----------------->

                      <----------------- HELLO / BATTERY LIFE (s)

      (consults signal power level)
      (consults battery life)

  (i) CALCULATED
      CONTACT TIME    ----------------->
                      <----------------- BUNDLE RECEIVED



 TOC 

5.2.  Deep-Space Probe to Earth Discovery

In this example, a deep-space node has a set contact schedule with Earth nodes established prior to each window of communication. Due to some event that causes re-allocation of ground-station resources, changing the space probe's schedule may be necessary.


     Deep-Space Satellite                      Earth Node
  (i)       <----------------------------- CONTACT TIME



 TOC 

5.3.  LEO Satellites to Terrestrial Center

Many LEO satellites are particularly concerned with optimizing link utilization, and primarly send data downwards. Contacts with ground stations can be brief, on the order of several minutes, so synchronizing clocks and getting the BA onboard a satellite to be ready to forward at the correct time can be accomplished through autodiscovery. The authoritative timing figure would be the terrestrial station, which would asynchronously send contact time information to the satellite on some schedule that let it optimize its forwarding decisions to avoid reactive fragmentation due to interrupted transfers and possibly to ensure that transmission preconditions are met before the contact (transmitter powered up, on correct frequency, using correct modulation and coding, etc.).


     LEO Satellite                             Earth Node
                                         (consults ephemeris data)
		   <-------------------- CONTACT TIME (i)
		                         (time a1, time a2)
     ASYNC. DATA   -------------------->
		   <-------------------- CONTACT TIME (i)
		                         (time b1, time b2)
		   <-------------------- CONTACT TIME (i)
		                         (time c1, time c2)
     ASYNC. DATA   -------------------->



 TOC 

5.4.  Updating and Overwriting Contacts

This section provides examples for updating and overwriting contact information depending on discovery bundles received.

Existing contact windows are numbered 1...n: the received bundle is labeled X.


-------------------------- time --------------------------->

  --------   ------------------------------
 |   1    | |             X                |
  --------   ------------------------------

-------------------------- time --------------------------->

Procedure: 1 is kept; X is added


-------------------------- time --------------------------->

  --------   ---
 |   1    | | 2 |
  --------   ---

              ---------------------------------
	     |               X                 |
	      ---------------------------------

-------------------------- time --------------------------->

Procedure: 1 is kept, 2 is removed, and X is added


-------------------------- time --------------------------->

  --------   ---       ------------      -----------
 |   1    | | 2 |     |     3      |    |     4     |
  --------   ---       ------------      -----------

              -----------------------
	     |          X            |
	      -----------------------

-------------------------- time --------------------------->

Procedure: 1 is kept, 2 and 3 are removed, 4 is kept, and X is added.



 TOC 

5.5.  A Note on Flexibility

The lack of structure in the protocol is due to the necessary flexibility in deployment. The domain-independent timing packets are meant to give a universal way to apply discovery and timing principles to any DTN environment that does not currently exist. The domain-dependent part is meant to add the needed flexibility to adhere to all DTN environments. Consequently, there is no 'typical' example that generalizes all DTN neighbor discovery.

More specific examples of neighbor discovery can be found in documentation describing domain-specific exchanges.



 TOC 

6.  Security Considerations

Nearly all threats that apply to other neighbor discovery protocols apply to DTN neighbor discovery. As suggested in [RFC3756] (Nikander, P., Kempf, J., and E. Nordmark, “IPv6 Neighbor Discovery (ND) Trust Models and Threats,” May 2004.), many of these are solved by ensuring a 'trusted' network. Networks that are not trusted are subject to different limitations (and expectations), so we deal with probable attacks and mitigations for each network separately.



 TOC 

6.1.  Security in a Trusted Network

Unlike general networking in the Internet, in DTN scenarios, there are many cases where a 'stranger' on the network is an unexpected condition. For example, sensor networks in poorly-connected environments are often controlled by a single organization which grants connection to only approved nodes. This may be implemented through link-layer encryption, keying of spreading sequences, or other means. Currently, as these two deployment environments are the two major proposed uses for DTN, securing the 'trusted' network against attack deserves further consideration.

The most likely attack on a trusted network is an attack where a node infiltrates a closed network, masquerading as a trusted node using a trusted address. To mitigate this attack, one could pre-share symmetric keys and use encryption with nodes that are allowed on the closed network. Blocks to accomplish this are defined in [DTNSEC] (Symington, S. and S. Farrell, “Bundle Security Protocol Specification,” April 24 2007.). All aspects of neighbor discovery, therefore, could be encrypted using these keys. In this manner, no nodes lacking the pre-shared key (and, by extension, permission to use the network) can communicate on the network.

In nodes that can afford the overhead of public-key cryptography, [DTNSEC] (Symington, S. and S. Farrell, “Bundle Security Protocol Specification,” April 24 2007.) also supports X.509 certificate processing. This would be more desirable for nodes that may communicate with many entities (such as the international space station) that each require separate keys (such as member nations with varying levels of cooperation). If necessary, this would also help protect the system from a single point of failure as in the pre-shared key system, only one pre-shared key needs to be compromised to compromise an entire system.



 TOC 

6.2.  Security in an Untrusted Network

Though many currently proposed deployments of DTN involve closed networks, future DTN networks may include untrusted public networks [haggle] (Scott, J., Hui, P., Crowcroft, J., and C. Diot, “Haggle: A Networking Architecture Designed Around Mobile Users,” January 2006.). For example, a DTN node on a public transportation system may send a bundle to a curbside receiver which would then forward it through the network. As part of public transportation, it is impossible to guarantee trust to nodes on the network, so the above system will not work.

In this environment, likely attacks generally are some variation of man-in-the-middle attacks. For instance, a PDA on the public transportation system may masquerade as a router and sniff traffic or deny it altogether. As stated in [RFC4251] (Ylonen, T. and C. Lonvick, “The Secure Shell (SSH) Protocol Architecture,” January 2006.), there is no known way to prevent these attacks outright.

To help mitigate these attacks, we propose a 'fingerprint' system combined with public-key cryptography. If a node considers the above attack serious enough, it can require public-key cryptography as provided in [DTNSEC] (Symington, S. and S. Farrell, “Bundle Security Protocol Specification,” April 24 2007.), storing the fingerprint of the server's public key. In a man-in-the-middle attack, the fingerprint would change, and the user could be notified in an appropriate way. This system is very similar to the fingerprinting system currently in widespread use in SSHv2 [RFC4251] (Ylonen, T. and C. Lonvick, “The Secure Shell (SSH) Protocol Architecture,” January 2006.).

Due to the potentially severe limitations on processing power and bandwidth of DTN nodes, all of the above security is optional with respect to neighbor discovery. In many deployments, the costs may simply outweigh the benefits.



 TOC 

7.  IANA Considerations

This document does not update or create any IANA registries.



 TOC 

8.  Acknowledgements

Some of the work on this document was performed at NASA's Glenn Research Center with funding provided by NASA's Earth Science Technology Office.



 TOC 

9. Informative References

[BTSPEC] “Specification of the Bluetooth System,” July 2007.
[DTNSEC] Symington, S. and S. Farrell, “Bundle Security Protocol Specification,” draft-irtf-dtnrg-bundle-security (work in progress), April 24 2007.
[I-D.irtf-dtnrg-ltp] Ramadas, M., Burleigh, S., and S. Farrell, “Licklider Transmission Protocol - Specification,” draft-irtf-dtnrg-ltp-10 (work in progress), June 2008 (TXT).
[I-D.irtf-dtnrg-sdnv] Eddy, W., “Using Self-Delimiting Numeric Values in Protocols,” draft-irtf-dtnrg-sdnv-06 (work in progress), January 2010 (TXT).
[I-D.irtf-dtnrg-tcp-clayer] Demmer, M. and J. Ott, “Delay Tolerant Networking TCP Convergence Layer Protocol,” draft-irtf-dtnrg-tcp-clayer-02 (work in progress), November 2008 (TXT).
[I-D.wood-tsvwg-saratoga] Wood, L., McKim, J., Eddy, W., Ivancic, W., and C. Jackson, “Saratoga: A Scalable File Transfer Protocol,” draft-wood-tsvwg-saratoga-04 (work in progress), October 2009 (TXT).
[RFC2119] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” BCP 14, RFC 2119, March 1997 (TXT, HTML, XML).
[RFC2328] Moy, J., “OSPF Version 2,” STD 54, RFC 2328, April 1998 (TXT, HTML, XML).
[RFC3756] Nikander, P., Kempf, J., and E. Nordmark, “IPv6 Neighbor Discovery (ND) Trust Models and Threats,” RFC 3756, May 2004 (TXT).
[RFC3926] Paila, T., Luby, M., Lehtonen, R., Roca, V., and R. Walsh, “FLUTE - File Delivery over Unidirectional Transport,” RFC 3926, October 2004 (TXT).
[RFC4251] Ylonen, T. and C. Lonvick, “The Secure Shell (SSH) Protocol Architecture,” RFC 4251, January 2006 (TXT).
[RFC4838] Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., and H. Weiss, “Delay-Tolerant Networking Architecture,” RFC 4838, April 2007 (TXT).
[SB07] Scott, K. and S. Burleigh, “Bundle Protocol Specification,” draft-irtf-dtnrg-bundle-spec-10 (work in progress), April 2007.
[haggle] Scott, J., Hui, P., Crowcroft, J., and C. Diot, “Haggle: A Networking Architecture Designed Around Mobile Users,” IFIP WONS, Les Menuires, France, January 2006.


 TOC 

Authors' Addresses

  Jim Wyllie
  Ohio University
  EECS Department #18
  Stocker Center
  Athens, OH 45701
Phone:  +1-740-593-1562
Email:  jw280601@ohiou.edu
  
  Wesley M. Eddy
  Verizon Federal Network Systems
  NASA Glenn Research Center
  21000 Brookpark Rd, MS 54-5
  Cleveland, OH 44135
Phone:  216-433-6682
Email:  weddy@grc.nasa.gov
  
  Joseph Ishac
  NASA Glenn Research Center
  21000 Brookpark Road
  Cleveland, Ohio 44135
  USA
Phone:  +1-216-433-6587
Fax:  +1-216-433-8705
Email:  jishac@nasa.gov
  
  Will Ivancic
  NASA Glenn Research Center
  21000 Brookpark Road
  Cleveland, Ohio 44135
  USA
Phone:  +1-216-433-3494
Fax:  +1-216-433-8705
Email:  William.D.Ivancic@nasa.gov
  
  Shawn Ostermann
  Ohio University
  Department of Computer Science
  322b Stocker Center
  Athens, Ohio 45701
Phone:  +1-740-593-1234
Email:  ostermann@cs.ohiou.edu


 TOC 

Full Copyright Statement

Intellectual Property