Disruption Tolerant Networking
نویسندگان
چکیده
منابع مشابه
Towards Securing Disruption-Tolerant Networking
Most of the existing Internet applications are built on the assumption of immediate end-to-end connectivity. However, there are many scenarios, like messaging in sparsely populated areas, in which immediate connectivity is not available. Traditional approaches for communication security may not apply in such disruption-prone environments. Recently, the use of identity-based cryptography has bee...
متن کاملSome thoughts on Disruption Tolerant Networking for asynchronous networking applications
From 03.04.05 to 06.04.05, the Dagstuhl Seminar 05142 Disruption Tolerant Networking was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and...
متن کاملProviding Authentication in Delay/Disruption Tolerant Networking (DTN) Environment
DTN environment is characterized by intermittent connectivity, high/variable delay, heterogeneity, high error rate and asymmetric data rate amongst others. These characteristics accounts for the poor behavior of Internet protocols in this environment. To address these problems, DTN was conceived and designed together with specialized protocols to carry out its services. Its emergence called for...
متن کاملDelay and Disruption-Tolerant Networking (DTN) II Dagstuhl Seminar
From 08.02. to 11.02.2009, the Dagstuhl Seminar 09071 Delay and Disruption-Tolerant Networking (DTN) II was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas ...
متن کاملDisruption Tolerant Networking Dagstuhl Seminar 05142 – Executive Summary
During the past 40+ years, numerous architectures were developed for network communication, including the ISO OSI reference model and its related protocol specifications and – of course – the Internet architecture. These network architectures have been designed with some implicit assumptions about specific target applications and deployment scenarios. Among the most important assumptions are sp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer and Information Science
سال: 2008
ISSN: 1913-8997,1913-8989
DOI: 10.5539/cis.v1n1p69