• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Xiangqun, Liu Lixiang, Hu Xiaohui, Zeng Kaixiang. Delay /Disruption-Tolerant Network Study[J]. Journal of Computer Research and Development, 2009, 46(8): 1270-1277.
Citation: Li Xiangqun, Liu Lixiang, Hu Xiaohui, Zeng Kaixiang. Delay /Disruption-Tolerant Network Study[J]. Journal of Computer Research and Development, 2009, 46(8): 1270-1277.

Delay /Disruption-Tolerant Network Study

More Information
  • Published Date: August 14, 2009
  • Although often not explicitly stated, the existing Internet model is based on a number of assumptions, such as: an end-to-end path exists between the source and its destination at all time, the maximum delay is not excessive, and the packet drop probability is small. However, a class of challenged networks, which are called DTN (delay/disrupton-tolerant network), emerge in many circumstances. DTN is greatly different from the traditional network model. It has long delay, frequent disruption, no end-to-end path simultaneously, and the network nodes have the capability of limited storage/processing. As a result, the present network protocols, such as Transfer Control Protocol (TCP), can not satisfy the applications over DTN. Some recent advanced researches in DTN are reviewed in this paper. Firstly, the main organizations working on DTN topic and typical characteristics of DTN are introduced. Then several classical overlay protocols of DTN are presented, such as bundle protocol, and some routing algorithms, including single copy routing algorithms based on knowledge and multicopy routing algorithms, are compared. Moreover, DTN researches in deep space communication, ferine animal, water quality survey and remote village connecting with Internet are discussed as real examples of DTN. Finally, the open issues and challenges of DTN in near future are proposed.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (835) PDF downloads (564) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return