Recently, the term Disruption-Tolerant Networking has gained currency in the United States due to support from DARPA, who have funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.
In the 1970s, spurred by the micronization of computing, researchers began developing technology for routing between non-fixed locations of computers. While the field of ad-hoc routing was inactive throughout the 1980s, the wide-spread use of wireless protocols reinvigorated the field in the 1990s as mobile ad-hoc routing and vehicular ad-hoc networking became areas of increasing interest.
Concurrently with (but separate from) the MANET activities, DARPA had funded NASA, MITRE and others to develop a proposal for the the Interplanetary Internet (IPN). Internet pioneer Vint Cerf and others developed the initial IPN architecture, relating to the necessity of networking technologies that can cope with the significant delays and packet corruption of deep-space communications. In 2002, Kevin Fall started to adapt some of the ideas in the IPN design to terrestrial networks and coined the term Delay Tolerant Networking and the DTN acronym. A paper published in 2003 SIGCOMM conference gives the motivation for DTNs. The mid-2000s brought about increased interest in DTNs, including a growing number of academic conferences on delay and disruption tolerant networking, and growing interest in combining work from sensor networks and MANETs with the work on DTN. This field saw many optimizations on classic ad-hoc and delay-tolerant networking algorithms and began to examine factors such as security, reliability, verifiability, and other areas of research that are well understood in traditional computer networking.
The ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as AODV and DSR fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination. A common technique used to maximize the probability of a message is successfully transferred is to replicate many copies of the message in hopes that one will succeed in reaching its destination.
Protocols using bundling must leverage application-level preferences for sending bundles across a network. Due to the store and forward nature of delay-tolerant protocols, routing solutions for delay tolerant networks can benefit from exposure to application-layer information. For example, network scheduling can be influenced if application data must be received in its entirety, quickly, or without variation in packet delay. Bundle protocols collect application data into bundles that can be sent across heterogeneous network configurations with high-level service guarantees. The service guarantees are generally set by the application level, and the RFC 5050 Bundle Protocol specification includes 'bulk', 'normal', and 'expedited' markings.
Security concerns for delay-tolerant networks vary depending on the environment and application, though authentication and privacy are often critical. These security guarantees are difficult to establish in a network without persistent connectivity because the network hinders complicated cryptographic protocols, hinders key exchange, and each device must identify other intermittently-visible devices. Solutions have typically been modified from mobile ad hoc network and distributed security research, such as the use of distributed certificate authorities and PKI schemes. Original solutions from the delay tolerant research community include the use of identity-based encryption, which allows nodes to receive information encrypted with their public identifier.
Various research efforts are currently investigating the issues involved with DTN:
The Emergence of Thinking Networks: It Is Easy and Cost-Effective to Distribute Localized Intelligence All across the Network
Oct 01, 2012; When examining Flame, the most sophisticated malware that has appeared to date, investigators discovered an interesting feature:...
Researchers from University of Texas Report Details of New Studies and Findings in the Area of Security and Communication Networks.
Nov 29, 2011; "Disruption-tolerant networking holds a great deal of potential for making communications easier and more flexible in pervasive...