MILITARY AD-HOC NETWORKS

被引:0
|
作者
Stefan, Raluca Mariana [1 ]
Serban, Mariuta [1 ]
机构
[1] Spiru Haret Univ, Bucharest, Romania
关键词
Computer Networks; DTN Architecture; Military Networks; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The highly successful architecture and protocols of today's Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. Often deployed in mobile and extreme environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. The DTN architecture operates as an overlay above the transport layers of the networks, it interconnects and provides key services such as in-network data storage and retransmission, authenticated forwarding and a wide class of service. An example of such network is Military Ad-Hoc Network which may operate in hostile environments where mobility, environmental factors, or intentional jamming may be cause for disconnection. In addition, data traffic on these networks may have to compete for bandwidth with other services at higher priority. Such systems also may have especially strong infrastructure protection requirements.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [21] Using WEP in ad-hoc networks
    Guyot, Vincent
    2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, : 224 - 227
  • [22] Ad-Hoc Networks at Global Scale
    Cruz, Rene L.
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [23] Probabilistic Management of Ad-Hoc Networks
    Badonnel, Remi
    State, Radu
    Festor, Olivier
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 339 - 350
  • [24] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287
  • [25] Secret instantiation in ad-hoc networks
    Kulkarni, SS
    Gouda, MG
    Arora, A
    COMPUTER COMMUNICATIONS, 2006, 29 (02) : 200 - 215
  • [26] SECURING VEHICULAR AD-HOC NETWORKS
    Caballero-Gil, P.
    Hernandez-Goya, C.
    Fuster-Sabater, A.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (01): : 25 - 35
  • [27] Fairness and QoS in ad-hoc networks
    Berqia, Amine
    Angoma, Blaise
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 16 - +
  • [28] Capacitated reliability for Ad-hoc networks
    Cook, Jason L.
    Ramirez-Marquez, Jose Emmanuel
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2007 PROCEEDINGS, 2006, : 192 - +
  • [29] Recent Advances in Ad-hoc Networks
    Ramasamy, Velmani
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 132 - 132
  • [30] Actors for mobile ad-hoc networks
    Dedecker, J
    Van Belle, W
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 482 - 494