Published May 2, 2026 | Version 0.1-seed
Working paper Open

When the Link Is the Variable: Delay-Tolerant Networking and Bundle Custody Transfer at the C5ISR Edge

Authors/Creators

  • 1. Non Sequitur Publishing

Description

Conventional networking treats the link as a constant: present, available on demand, reliable within its designed failure envelope, and amenable to retransmission when packets are lost. This assumption pervades transport protocols, application architecture, and operational doctrine from the enterprise datacenter to the forward-deployed tactical node. It is an assumption that the tactical edge systematically violates. At the C5ISR edge under DDIL conditions — Disrupted, Disconnected, Intermittent, Limited-bandwidth — the link is not a constant. It is a variable with a distribution of availability that must be characterized, managed, and exploited architecturally rather than assumed away operationally. This paper develops the architectural argument that treating the link as a variable demands a transport architecture fundamentally different from the connection-oriented model. The transport primitive is not a connection that carries data; it is a custody transfer that moves state across link windows. When the link is present, custody moves. When the link is absent, state is held — durably, verifiably, and with governance integrity — until the link returns. The Bundle Protocol and Delay-Tolerant Networking (DTN) architecture, originally developed for interplanetary communication, provide the engineering specification for this custody-based transport model. Applied to the tactical edge, they constitute the first substrate primitive that all subsequent operational guarantees depend upon. The paper argues, further, that transport custody is not merely a networking mechanism — it is a governance primitive. The decision of what gets custody priority, which nodes act as custodians, and what constitutes a custody failure requiring human escalation are governance decisions that the HGC³AE² framework must address before the transport architecture can be operationally sound. A custody-based transport layer that operates without governance is a store-and-forward system. A custody-based transport layer governed by the H half, curated by the C³ half, and enforced by the AE² half is the transport substrate of a tactically coherent C5ISR architecture.

This is Paper 3 of The Implications of Edge Degraded Ops — an 11-paper undecalogy on distributed state at the C5ISR edge under DDIL conditions. The frame paper is The Tactical Substrate; the load-bearing governance framework is HGC³AE² at the Degraded Edge.

Rights envelope: Citation permitted with full attribution. No reproduction, redistribution, or derivative works without written permission. AI/ML training use disallowed. See the citation policy at https://nonsequitur.tech/pubs/citation-policy/ for the full rights envelope.

Canonical site URL: https://nonsequitur.tech/white-papers/when-the-link-is-the-variable/

Files

when-the-link-is-the-variable-v0.1-seed.pdf

Files (356.4 kB)

Name Size Download all
md5:fabd3ec3f95580d94fbfa40a56330548
356.4 kB Preview Download

Additional details