101  DTN Store-Carry-Forward

In 60 Seconds

Delay-Tolerant Networks use a store-carry-forward paradigm: a node stores a message locally, physically carries it while moving, and forwards opportunistically when encountering another node. DTN is not slow networking – it is fundamentally different from TCP/IP because it assumes disconnection is normal, not a failure condition.

Minimum Viable Understanding
  • Delay-Tolerant Networks (DTN) enable communication where no continuous end-to-end path exists, using a store-carry-forward paradigm instead of traditional immediate forwarding
  • Store-carry-forward works in three steps: a node stores a message in local memory, physically carries it while moving, and forwards it opportunistically when encountering another node
  • DTN is not “slow networking” – it is fundamentally different from TCP/IP because it assumes disconnection is normal (not a failure), making it the only option for wildlife tracking, disaster zones, and rural areas without infrastructure

“Oh no!” cried Sammy the Sensor. “I need to send my temperature reading to the base station, but it’s 10 kilometers away and my radio only reaches 100 meters!”

Bella the Battery shook her head. “There’s no Wi-Fi tower, no phone tower, nothing in between. Traditional networking says: ‘Sorry, network unreachable!’”

“But wait!” said Max the Microcontroller. “What if a friendly delivery truck drives by tomorrow? Sammy could hand the message to the truck driver, the driver carries it across the desert, and drops it off at the base station!”

“That’s Store-Carry-Forward!” Lila the LED explained. “Store the message in memory, Carry it while you move, Forward it when you meet someone heading the right way. It might take a day instead of a second, but the message GETS THERE!”

Real-world example: In Africa, zebras wear GPS collars. When two zebras meet at a watering hole, their collars swap data. Days later, one zebra wanders near a base station and all the data downloads. Scientists get their migration maps – just a few days late!

101.1 Learning Objectives

By the end of this chapter, you will be able to:

  • Explain DTN Concepts: Describe Delay-Tolerant Networks and their fundamental assumptions about disconnection
  • Analyze Disconnected Scenarios: Identify IoT applications where continuous connectivity is unavailable and justify DTN suitability
  • Apply Store-Carry-Forward: Implement the core DTN paradigm for intermittent connectivity in real deployments
  • Distinguish DTN from Traditional Routing: Compare DTN approaches with connected ad hoc protocols and evaluate when each is appropriate

101.2 Prerequisites

Before diving into this chapter, you should be familiar with:

  • Ad Hoc Routing: Proactive (DSDV): Understanding proactive routing protocols helps contextualize why traditional approaches fail in disconnected networks and how DTN fundamentally differs from table-driven routing
  • Ad Hoc Routing: Reactive (DSR): Knowledge of on-demand routing and route discovery mechanisms provides the foundation for understanding why DTN requires store-carry-forward instead of immediate path establishment
  • Ad Hoc Routing: Hybrid (ZRP): Zone-based routing concepts introduce the idea of handling disconnected network partitions, which DTN extends with mobility and opportunistic forwarding
  • Multi-Hop Fundamentals: Multi-hop networking concepts and relay node behavior are essential background for understanding how DTN leverages mobile nodes as data carriers
  • Networking Basics: Fundamental networking concepts, addressing, and packet forwarding provide the baseline understanding for how DTN modifies traditional end-to-end communication
  • DTN (Delay-Tolerant Network): Network architecture accommodating intermittent connectivity, long delays, and high error rates
  • Store-Carry-Forward: Core DTN paradigm; nodes store messages locally, carry them as they move, and forward when contact occurs
  • Intermittent Connectivity: Characteristic of DTN environments; no end-to-end path exists simultaneously, contacts are opportunistic
  • Contact: Period when two DTN nodes can communicate; determined by proximity, mobility patterns, and communication range
  • Bundle Protocol: DTN’s network layer (RFC 9171); provides store-and-forward, custody transfer, and end-to-end delivery
  • Custody Transfer: DTN mechanism where a receiving node takes responsibility for reliable delivery, allowing the sender to delete its copy
  • Disruption Tolerance: DTN’s ability to operate despite network partitions, link failures, and extreme delays (minutes to days)
  • Convergence Layer: DTN adaptation layer connecting Bundle Protocol to underlying transport (TCP, Bluetooth, Wi-Fi Direct)

101.3 For Beginners: Delay-Tolerant Networks and Social Routing

Imagine you’re trying to send a letter in a remote village with no postal service. Traditional networks assume you can call the post office anytime. But what if there’s no phone line? Delay-Tolerant Networks (DTN) solve this by treating communication like passing physical mail through travelers.

The Problem: No Connected Path

Traditional routing (DSDV, DSR, ZRP) assumes you can find a continuous path from source to destination. But imagine these scenarios: - Wildlife tracking: Animals roam miles apart with no fixed infrastructure - Rural villages: No internet connection, only a bus that visits once per day - Disaster zones: Infrastructure destroyed, only sporadic connections

In these cases, there’s NO end-to-end path at any moment. Traditional routing fails completely.

Store-Carry-Forward: The Post Office Analogy

DTN works like sending letters via travelers: 1. Store: Write your letter and give it to a passing traveler (they store it in their bag) 2. Carry: Traveler physically moves while carrying your letter 3. Forward: When traveler meets someone heading toward your recipient, they hand off the letter

Real-World Example: DakNet in rural India: - Villages have Wi-Fi kiosks but no internet - Farmers upload questions about crop prices to kiosk - Bus with Wi-Fi drives by twice daily, collects questions - At town, bus uploads to internet gateway - Responses downloaded to bus - Bus delivers answers on return trip - Latency: 24-48 hours (acceptable for non-urgent queries)

Term Simple Explanation Everyday Analogy
DTN Network that tolerates disconnections and delays Mail delivery vs phone call
Store-Carry-Forward Save message, physically move, then send Carrying USB drive between computers

When to Use DTN:

  • Wildlife tracking (animals rarely meet)
  • Disaster recovery (infrastructure down)
  • Space networks (extreme delays)
  • Rural connectivity (intermittent access)
  • Video streaming (requires continuous connection)
  • Real-time gaming (cannot tolerate delays)

Why This Matters for IoT:

Many IoT scenarios have intermittent connectivity by nature. DTN enables communication where traditional networking simply fails - you either use DTN or have no network at all! Understanding when to tolerate delays (hours) vs requiring real-time (milliseconds) is key to choosing the right IoT architecture.

Learning Resources:

  • Simulations Hub: DTN simulators like The ONE Simulator for testing epidemic routing, spray-and-wait, and social-based protocols in realistic mobility scenarios
  • Knowledge Gaps Hub: Common DTN misconceptions including “DTN is just slow networking” and “epidemic routing wastes resources” clarifications
  • Videos Hub: Visual explanations of store-carry-forward paradigm, ZebraNet wildlife tracking, and DakNet rural connectivity case studies
  • Quizzes Hub: Self-assessment questions on DTN performance trade-offs, utility function design, and protocol selection for intermittent connectivity

Why These Matter:

DTN routing challenges traditional networking assumptions. The Simulations Hub provides hands-on tools to visualize how messages propagate through disconnected networks. Knowledge Gaps addresses the misconception that DTN is simply “broken networking” - it’s actually a deliberate architectural choice for scenarios where continuous connectivity is physically impossible (wildlife tracking, rural areas, disaster zones).

Deep Dives:

Protocols:

Architecture:

Learning:

The Misconception:

Many students think DTN is simply traditional networking with high latency - like a slow internet connection. They assume DTN protocols are inefficient versions of TCP/IP that could be “fixed” with better routing algorithms.

The Reality:

DTN fundamentally differs from traditional networking in its assumptions about connectivity:

Traditional Networks (TCP/IP):

  • Assumption: End-to-end path exists when communication starts
  • Failure mode: Packets dropped if path breaks during transmission
  • Retransmission: Source resends if ACK not received (assumes path will reconnect)
  • Use case: Internet, LANs, cellular networks with continuous infrastructure

Delay-Tolerant Networks:

  • Assumption: No end-to-end path exists at any single moment
  • Acceptance: Disconnection is normal, not a failure condition
  • Store-carry-forward: Nodes physically transport data between disconnected regions
  • Use case: Wildlife tracking (animals 10km apart), rural areas (no infrastructure), disaster zones (damaged infrastructure)

Concrete Example:

ZebraNet wildlife tracking cannot use traditional TCP/IP because: - Zebras roam 5-20km apart (beyond radio range) - No cellular towers in remote African savanna - Battery budget: 3 years of operation - Data collection: GPS positions every hour

Why TCP/IP fails: Attempting TCP connection from Zebra A to base station fails immediately - no routing path exists. TCP gives up and reports “network unreachable.”

Why DTN works: Zebra A stores GPS data locally. When Zebra B passes within 100m (days later), they exchange buffered data. Zebra B later encounters Zebra C near watering hole base station. Data reaches researchers after 3-7 day delay, which is acceptable for migration studies.

Key Insight:

DTN isn’t “slow networking” - it’s intermittent connectivity networking. Latency isn’t a bug; it’s the price of operation where infrastructure doesn’t exist. The alternative isn’t “faster DTN” - it’s no communication at all.

When to Use:

  • No infrastructure possible (wildlife, disaster, space)
  • Communication can tolerate hours/days delay
  • Mobile nodes can carry data physically
  • Real-time requirements (video streaming, gaming)
  • Infrastructure available (use Wi-Fi/cellular instead)

101.4 Disconnected Ad Hoc Networks

⏱️ ~10 min | ⭐⭐ Intermediate | 📋 P04.C01.U01

Side-by-side comparison of connected ad hoc network with continuous paths between all nodes versus disconnected network showing isolated island partitions where no routing paths exist between separate groups of nodes
Figure 101.1: Connected vs disconnected ad hoc networks showing intermittent connectivity challenges

Traditional routing protocols (DSDV, DSR, ZRP) assume a connected path exists between source and destination. This assumption fails in many IoT scenarios.

101.4.1 Connected vs Disconnected Networks

Comparison diagram showing connected ad hoc network with multiple routing paths versus disconnected network partitioned into isolated islands with no paths between groups, illustrating why traditional routing protocols fail in sparse DTN deployments
Figure 101.2: Comparison of connected versus disconnected ad hoc networks showing connectivity differences

Alternative View:

Timeline diagram illustrating DTN store-carry-forward over multiple days: Node A stores message at Day 0, encounters Node B at Day 1 and forwards copy, Node B carries message while traveling, encounters base station at Day 3 and delivers, showing how DTN tolerates disconnections that would block traditional routing
Figure 101.3: Timeline showing store-carry-forward operation across multiple days. Unlike traditional routing that fails immediately on disconnection, DTN tolerates days of delay by storing messages locally, forwarding on opportunistic contacts, and eventually delivering when carriers encounter the destination.
Side-by-side comparison of traditional TCP/IP routing versus DTN paradigm: left side shows traditional network with continuous path requirement and immediate failure on disconnection; right side shows DTN with store-carry-forward approach that tolerates intermittent connectivity and delivers data despite no simultaneous end-to-end path
Figure 101.4: Alternative view: Side-by-side comparison of traditional routing versus DTN paradigm. Traditional assumes connected paths exist, fails on disconnection. DTN assumes NO path exists, uses store-carry-forward for eventual delivery. This fundamental difference makes DTN suitable for wildlife tracking, disaster zones, and rural connectivity where infrastructure is impossible.

Disconnected Network Causes:

  1. Sparse node density: Nodes too far apart for single-connected component
  2. Node mobility: Moving nodes create temporary islands
  3. Sleep scheduling: Duty-cycling creates temporal disconnections
  4. Harsh environment: Obstacles, terrain block connections
  5. Failure: Node/link failures partition network

Traditional Protocols Fail:

  • DSDV: Can’t maintain routes across partitions
  • DSR: Route discovery fails if no connected path
  • Packets dropped at partition boundaries

101.4.2 Delay-Tolerant Networks (DTN)

Delay-Tolerant Networks enable communication across disconnected networks using store-carry-forward paradigm.

Store-Carry-Forward Principle
DTN store-carry-forward protocol diagram showing three phases: node stores packet in buffer, physically moves while carrying data, and forwards packet upon encountering destination or relay, enabling communication across disconnected networks
Figure 101.5: Store-carry-forward protocol description for delay-tolerant networking

Geometric visualization of Delay-Tolerant Network architecture showing multiple disconnected network islands with mobile nodes acting as data mules carrying messages between partitions, bundle protocol layer providing store-and-forward capability above traditional transport layers, and custody transfer mechanisms ensuring reliable delivery across intermittent connections

DTN architecture visualization
Figure 101.6: The DTN architecture introduces a new networking paradigm where disconnection is the norm rather than an exception. The Bundle Protocol operates above transport layers, treating messages as self-contained bundles that can survive arbitrary delays and disruptions. This architecture enables communication in environments where traditional end-to-end connectivity is impossible, from deep space missions to wildlife tracking in remote areas.

Geometric diagram illustrating DTN store-and-forward mechanism with source node creating a bundle, intermediate nodes storing bundles in persistent storage while waiting for forwarding opportunities, custody transfers between nodes ensuring reliability, and eventual delivery to destination after multiple hops across disconnected network segments

DTN store-and-forward mechanism
Figure 101.7: The store-and-forward mechanism is the heart of DTN operation. Unlike TCP which expects immediate acknowledgments, DTN bundles can be stored for hours, days, or even weeks at intermediate nodes. Custody transfer ensures that each node takes responsibility for the bundle until successfully passed to the next hop, providing reliability guarantees even across intermittent connections.
Store:
Intermediate nodes buffer packets (store in local memory)
Carry:
Mobile nodes physically transport packets while moving
Forward:
When encountering new nodes, forward buffered packets

Key Difference from Traditional:

  • Traditional: Immediate hop-by-hop forwarding
  • DTN: Opportunistic forwarding when contact opportunities arise
  • Tolerates disconnections by accepting storage delays
Sequence diagram showing DTN store-carry-forward message flow: source node buffers packet and forwards to Carrier 1 on contact, Carrier 1 physically moves while buffering then transfers to Carrier 2, Carrier 2 transports toward destination and delivers on encounter, demonstrating opportunistic forwarding across disconnected network segments
Figure 101.8: Store-carry-forward sequence diagram showing DTN message flow from source node buffering packet, forwarding to carrier 1 upon contact, carrier 1 moving while buffering and transferring to carrier 2, carrier 2 transporting toward destination, and final delivery upon encounter with destination node.

DTN Application Scenarios:

  1. Wildlife tracking: Animals carry sensors, transfer data when near base stations
  2. Vehicular networks: Cars carry messages between disconnected road segments
  3. Rural IoT: Mobile collectors (buses, delivery vehicles) gather sensor data
  4. Disaster recovery: Intermittent connectivity due to infrastructure damage
  5. Space networks: Planetary exploration with extreme propagation delays

101.5 DTN Contact Window Calculator

Estimate how much data can be exchanged during an opportunistic DTN contact:

101.6 Knowledge Check

Test your understanding of DTN fundamentals.

Test Your Understanding

Question 1: What is the fundamental assumption that distinguishes DTN from traditional TCP/IP networking?

  1. DTN assumes faster hardware is available
  2. DTN assumes no end-to-end connected path exists at any single moment
  3. DTN assumes all nodes are stationary
  4. DTN assumes unlimited bandwidth is available

b) DTN assumes no end-to-end connected path exists at any single moment. Traditional TCP/IP requires a continuous path from source to destination; packets are dropped if the path breaks. DTN fundamentally accepts that disconnection is the norm and uses store-carry-forward to deliver data despite having no simultaneous end-to-end connectivity.

Question 2: In the store-carry-forward paradigm, what does the “carry” phase involve?

  1. Compressing data to reduce packet size
  2. Encrypting data for secure transmission
  3. A mobile node physically transporting buffered data while moving
  4. Forwarding packets through a series of routers

c) A mobile node physically transporting buffered data while moving. This is what makes DTN unique: data literally travels inside a device (person, vehicle, animal) as it moves through the physical world. The three phases are: store (buffer locally), carry (physically move), forward (transfer to another node upon contact).

Question 3: Why would traditional routing protocols (DSDV, DSR, ZRP) fail in a wildlife tracking deployment where GPS-collared animals roam 5-20km apart?

  1. The protocols are too slow for animal movement speeds
  2. Animals cannot carry routing hardware
  3. No continuous radio path exists between distant animals, so route discovery fails immediately
  4. The protocols consume too much energy for animal collars

c) No continuous radio path exists between distant animals. With radio range of ~100m and animals 5-20km apart, there is no connected multi-hop path. DSDV cannot maintain routing tables across partitions, DSR route discovery floods fail because they cannot reach disconnected segments, and ZRP has the same limitation. Only DTN’s store-carry-forward works: data waits until animals physically encounter each other.

101.7 Worked Example: DTN Buffer Sizing for Wildlife Tracking

Scenario: A conservation team deploys GPS collars on 80 elephants across a 2,500 km2 wildlife reserve in Amboseli, Kenya. Each collar collects GPS coordinates every 30 minutes and must deliver data to 3 base stations positioned at watering holes. Elephants encounter other elephants or base stations opportunistically. Design the DTN buffer, estimate delivery latency, and calculate the required battery budget.

Given parameters:

GPS reading size:           32 bytes (lat/lon/time/battery)
Collection interval:        30 minutes (48 readings/day)
Average inter-contact time: 18 hours (elephant-to-elephant)
Average elephant-to-base:   4.2 days (based on movement patterns)
Message copies (spray-and-wait): L = 6 copies per reading
Radio: CC2650 BLE (10 mA TX, 6 mA RX, 1 uA sleep)
Contact duration:           45 seconds average (watering hole overlap)
Radio data rate:            250 kbps (802.15.4)
Battery: 3.6V D-cell lithium (19,000 mAh)
Collar lifetime target:     3 years

Step 1 – Per-collar daily data generation:

Own data:     48 readings/day x 32 bytes = 1,536 bytes/day
With headers: 48 x (32 + 12 byte DTN header) = 2,112 bytes/day

Step 2 – Buffer sizing for spray-and-wait (L=6):

Each collar carries its own data PLUS replicas received from other elephants. With spray-and-wait, a source creates L=6 copies and distributes them to the first L/2 = 3 contacts. Each collar may carry copies for multiple other elephants.

Maximum delivery delay:       14 days (worst case before data expires)
Own data buffered:            14 days x 2,112 bytes = 29,568 bytes
Relay data from contacts:     Estimated 3 other elephants' copies at any time
                              3 x 14 days x 2,112 bytes = 88,704 bytes
Total buffer required:        29,568 + 88,704 = 118,272 bytes ~ 128 KB
CC2650 RAM: 20 KB (insufficient) -> use external 256 KB SPI flash

Step 3 – Contact capacity analysis:

Data per contact window:    45 sec x 250 kbps / 8 = 1,406,250 bytes
                            (far exceeds buffer size -- not a bottleneck)
Spray phase:                Source distributes L/2 = 3 copies in first
                            3 contacts (1 copy per contact)
Wait phase:                 Each copy holder waits for base station contact

Step 4 – Expected delivery latency (Groenevelt model):

For spray-and-wait with L copies among N=80 elephants and 3 base stations:

Mean inter-contact rate (elephant-elephant): lambda_ee = 1/18 hr^-1
Mean inter-contact rate (elephant-base):     lambda_eb = 1/(4.2 x 24) hr^-1
                                                       = 1/100.8 hr^-1

Expected delivery delay (spray phase + wait phase):
  T_spray = H(L/2) / (N x lambda_ee)
          = H(3) / (80 x 1/18)
          = (1 + 1/2 + 1/3) / 4.44
          = 1.833 / 4.44
          = 0.41 hours (25 minutes to distribute 3 copies)

  T_wait  = 1 / (L/2 x lambda_eb + (N-L/2) x lambda_ee x lambda_eb / ...)
          ~ 1 / (3 x 1/100.8)    (simplified: 3 copies seeking base)
          = 33.6 hours = 1.4 days

  Total expected delay: 0.41 + 33.6 = 34.0 hours ~ 1.4 days

This is acceptable for ecology research where weekly data collection was the prior baseline.

Step 5 – Energy budget for 3-year lifetime:

Radio contacts per day:     ~1.3 (1/18 hr inter-contact x 24 hr)
TX per contact:             2,112 bytes own + ~2,112 bytes relay = 4,224 bytes
TX time per contact:        4,224 x 8 / 250,000 = 0.135 seconds
RX time per contact:        ~0.135 seconds (receiving relay data)
Discovery beacon (BLE):     Every 5 min, 1 ms at 10 mA = 0.01 mAs each
                            288 beacons/day x 0.01 mAs = 2.88 mAs/day

Daily energy:
  TX:       1.3 contacts x 0.135 s x 10 mA = 1.755 mAs
  RX:       1.3 contacts x 0.135 s x 6 mA  = 1.053 mAs
  Beacons:  2.88 mAs
  GPS:      48 fixes x 30 mA x 1 s = 1,440 mAs  (dominates!)
  Sleep:    86,400 s x 1 uA = 86.4 mAs
  MCU wake: 48 x 3 mA x 0.5 s = 72 mAs
  ──────────────────────────────────
  Total:    1,604 mAs/day = 0.446 mAh/day

3-year budget: 0.446 x 1,095 days = 488 mAh
Battery:       19,000 mAh (D-cell lithium)
Margin:        19,000 / 488 = 38.9x safety factor

GPS acquisition dominates energy (89.7% of budget). The DTN radio component adds only ~0.36% overhead, confirming that store-carry-forward is extremely energy-efficient – the radio sleeps >99.99% of the time.

Step 6 – Delivery reliability analysis:

With L=6 copies and 3 base stations:
  P(at least one copy reaches base within 14 days):
  P(single copy fails) = e^(-14 x 24 / 100.8) = e^(-3.33) = 0.036
  P(all 3 wait-copies fail) = 0.036^3 = 4.6 x 10^-5
  P(delivery) = 1 - 4.6 x 10^-5 = 99.995%

  For 80 elephants x 48 readings/day x 365 days = 1,401,600 readings/year
  Expected lost readings: 1,401,600 x 4.6 x 10^-5 = 64 readings/year (0.005%)

For spray-and-wait routing with \(L\) copies among \(N\) nodes and \(M\) base stations, delivery probability follows an exponential contact process. The expected delivery delay for a single copy is:

\[T_{wait} = \frac{1}{\frac{L}{2} \times \lambda_{eb}}\]

where \(\lambda_{eb}\) is the elephant-to-base contact rate (\(1/100.8\) hr\(^{-1}\) in our case). With \(L=6\) copies, this gives \(T_{wait} = 33.6\) hours.

The probability that all \(L/2\) wait-phase copies fail to reach the base within deadline \(D\) is:

\[P_{fail} = \left(e^{-\lambda_{eb} \times D}\right)^{L/2} = \left(e^{-\frac{14 \times 24}{100.8}}\right)^3 = 4.6 \times 10^{-5}\]

This exponential decay means each additional copy provides diminishing returns: \(L=2\) gives 88% delivery, \(L=4\) gives 98%, \(L=6\) gives 99.995%, but \(L=8\) only improves to 99.9998%.

Decision: Use spray-and-wait with L=6, 256 KB SPI flash buffer, 5-minute BLE discovery beacons. Expected delivery latency of 1.4 days with 99.995% reliability is well within ecology research requirements. The 3-year battery lifetime has a 38.9x safety margin.

Real-World Reference: The ZebraNet project (Princeton University, 2004) deployed DTN collars on zebras in Mpala Research Centre, Kenya, achieving 3-7 day average delivery latency with 80%+ delivery ratio using simpler epidemic flooding. The Save the Elephants foundation (Samburu, Kenya, 2018) demonstrated GPS collar lifetimes exceeding 4 years with duty-cycled satellite uplinks. Our spray-and-wait design improves on epidemic flooding’s delivery ratio (99.995% vs ~80%) while using 3x less buffer space.

101.8 Concept Relationships

Concept Relationship Connected Concept
Store-Carry-Forward Enables communication where no Continuous End-to-End Path Exists
Opportunistic Forwarding Transfers data only during brief Contact Windows
DTN Paradigm Assumes disconnection is normal rather than TCP/IP Failure Condition
Buffer Management Determines data retention during extended Storage Periods
Contact Prediction Uses mobility patterns to improve Forwarding Decisions

101.9 See Also

Common Pitfalls

DTN violates fundamental Internet assumptions: end-to-end paths may not exist, ACKs may take hours, and connections close between packets. TCP/IP protocols fail in DTN environments. DTN requires designing around contact opportunities rather than continuous connectivity.

DTN is not a way to make any application work with delays. Applications must be designed to function with minutes-to-hours of delivery delay. Email works in DTN; real-time video does not. Identify which components of your application are delay-tolerant before deciding to use DTN.

DTN nodes accumulate messages waiting for delivery opportunities. Without systematic buffer management (priority queues, TTL enforcement, drop policies), storage fills and new important messages cannot be accepted. Buffer management is a first-class design concern in DTN, not an optimization.

Custody transfer means the receiver takes responsibility for delivery — but if all nodes holding custody of a message exhaust their buffers or fail before delivery, the message is lost. DTN custody transfer improves reliability over hop-by-hop but does not provide absolute delivery guarantees.

101.10 Summary

This chapter introduced the fundamentals of Delay-Tolerant Networks:

  • Disconnected Networks: Traditional routing protocols (DSDV, DSR, ZRP) fail when no continuous path exists between source and destination, which occurs in sparse deployments, high mobility, sleep scheduling, and harsh environments
  • DTN Paradigm: Unlike traditional networking that assumes connectivity, DTN assumes disconnection is normal and designs around it using store-carry-forward
  • Store-Carry-Forward: The core DTN mechanism where nodes buffer packets locally (store), physically transport them while mobile (carry), and transfer them opportunistically when encountering other nodes (forward)
  • Key Distinction: DTN isn’t “slow networking” - it’s intermittent connectivity networking where latency is the accepted price of operation in infrastructure-less environments
  • Application Scenarios: Wildlife tracking, vehicular networks, rural IoT, disaster recovery, and space communications all benefit from DTN’s tolerance of disconnection

101.11 What’s Next

If you want to… Read this
Study epidemic routing algorithms DTN Epidemic Routing
Explore social routing for DTN DTN Social Routing
Learn about DTN applications DTN Applications
Compare with reactive ad hoc routing DSR Fundamentals and Route Discovery
Review all emerging network paradigms Ad Hoc Networks Review