Survey of buffer management policies for delay tolerant networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Buffer Management for Preferential Delivery in Opportunistic Delay Tolerant Networks

Delay Tolerant Networks (DTN) present many challenges that are not present in traditional networks. Many stem from the need to deal with disconnections which directly impacts routing and forwarding. However as these networks enable communication between wide range of devices, there are secondary problems that routing strategies may need to take care of such as to deal with limited resources lik...

متن کامل

A Knapsack-based buffer management strategy for delay-tolerant networks

In delay-tolerant networks, the dramatic change of topology and the frequent interruption of connections make it difficult to forward the message to destination. Routing protocols in DTNs seek to improve the delivery ratio through increasing the number of message copies. However, the redundant message copies easily cause the occurrence of buffer’s overflowing. In this paper, in order to maximiz...

متن کامل

Integrating Buffer Management with Epidemic Routing in Delay Tolerant Networks

Problem statement: The Design of Delay Tolerant Network (DTN) routing protocols has focused to operate in an environment where there is no guarantee of end to end path between source and destination at all points of time. The DTN research has focussed primarily on applications that are delay tolerant. But it can also be used to provide real time information like accident alert in VANETs and eme...

متن کامل

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is th...

متن کامل

Decentralised Key Management for Delay Tolerant Networks

Advances in ubiquitous mobile computing has given rise to the pervasive deployment of physical devices embedded with sensors, software, and wireless communications that collect and exchange data. These devices are adept for deployment in environments with minimal existing infrastructure, as the devices themselves become the components of a functioning network. With the addition of mobility, the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Engineering

سال: 2014

ISSN: 2051-3305,2051-3305

DOI: 10.1049/joe.2014.0067