{"title":"延迟/中断容忍网络及其在军事通信中的应用","authors":"Ziyi Lu, Jianhua Fan","doi":"10.1109/ICCDA.2010.5541302","DOIUrl":null,"url":null,"abstract":"With the gradual deepening and development of modern military warfare towards Network Centric Warfare (NCW), the performance of network protocols will play an important role. However, the popular network protocols based on end-to-end is not suited for military communication networks, which is long/variable delay, high error rates and greatly heterogeneous. Delay/Disruption Tolerant Network (DTN) is a new type of network architecture aiming at the network scenes which connection is periodic, intermittent, and/or prone to disruptions. Two application modes in military communications will be presented after the introduction of the main features of DTN network. At the end of paper, the security of DTN technology will be analyzed detailed.","PeriodicalId":190625,"journal":{"name":"2010 International Conference On Computer Design and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"46","resultStr":"{\"title\":\"Delay/Disruption Tolerant Network and its application in military communications\",\"authors\":\"Ziyi Lu, Jianhua Fan\",\"doi\":\"10.1109/ICCDA.2010.5541302\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the gradual deepening and development of modern military warfare towards Network Centric Warfare (NCW), the performance of network protocols will play an important role. However, the popular network protocols based on end-to-end is not suited for military communication networks, which is long/variable delay, high error rates and greatly heterogeneous. Delay/Disruption Tolerant Network (DTN) is a new type of network architecture aiming at the network scenes which connection is periodic, intermittent, and/or prone to disruptions. Two application modes in military communications will be presented after the introduction of the main features of DTN network. At the end of paper, the security of DTN technology will be analyzed detailed.\",\"PeriodicalId\":190625,\"journal\":{\"name\":\"2010 International Conference On Computer Design and Applications\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"46\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference On Computer Design and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCDA.2010.5541302\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference On Computer Design and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCDA.2010.5541302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Delay/Disruption Tolerant Network and its application in military communications
With the gradual deepening and development of modern military warfare towards Network Centric Warfare (NCW), the performance of network protocols will play an important role. However, the popular network protocols based on end-to-end is not suited for military communication networks, which is long/variable delay, high error rates and greatly heterogeneous. Delay/Disruption Tolerant Network (DTN) is a new type of network architecture aiming at the network scenes which connection is periodic, intermittent, and/or prone to disruptions. Two application modes in military communications will be presented after the introduction of the main features of DTN network. At the end of paper, the security of DTN technology will be analyzed detailed.