Computer Science ›› 2018, Vol. 45 ›› Issue (12): 19-23,31.doi: 10.11896/j.issn.1002-137X.2018.12.003

• Surveys • Previous Articles     Next Articles

Survey of DTN Architecture and Key Technologies

HUANG Xing-he1, LI Ai-jing1,2, WANG Hai1   

  1. (College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China)1
    (School of Electronic Information and Electrical Engineering,Shanghai Jiao Tong University,Shanghai 200240,China)2
  • Received:2018-03-25 Online:2018-12-15 Published:2019-02-25

Abstract: Disruption / Delay tolerant network (DTN) is a totally new network model abstracted from MANET(Mobile Ad-hoc network).Different from traditional wireless mobile Ad-hoc networks,DTN is mainly used in high-delay and instable environment.As an emerging study area for restricted network environment,DTN uses a special mode “store-carry-forward” for data transfer,so as to combat the effects of higher latency and disruption in restricted networks.The development of DTN will provide a more reliable communication for scenarios such as future military wars,space communications,disaster relief and so on.In this paper,firstly,the architecture and characteristics of DTN were analyzed.Then the DTN routing protocol was studied from the aspects of the calculated amount,reliability and dependence on other node’s state information.Finally,some difficult problems on DTN were presented,and some research topics that might bring great progress to DTN systems were emphasized.

Key words: Delay/Disruption tolerant network, Architecture, Routing algorithm

CLC Number: 

  • TP393
[1]BURLEIGH S,HOOKE A,TORGERSON L,et al.Delay-tole-rant networking:an approach to interplanetary Internet [J].IEEE Communications Magazine,2003,41(6):128-136.
[2]RODRIGUES J J P C,SOARES V N G J.An introduction to delay and disruption-tolerant networks (DTNs)[M]∥Advances in Delay-Tolerant Networks (DTNs).2015:1-21.
[3]SCOTT K,BURLEIGH S.Bundle Protocol S-pecification [EB/OL].https://www.rfc-editor.org /rfc/rfc5050.txt.
[4]HU J H,ZHOU X W.Research on DTN architecture and its key protocols[C]∥Geomatics Science and Technology.Xi’an:Air Force Engineering University,2010:1-8.(in Chinese)
胡佳慧,周贤伟.DTN体系结构及其重要协议研究 [C]∥2010国防空天信息技术前沿论坛论文集.西安:空军工程大学,2010:1-8.
[5]UNNIKRISHNAN E,RAVICHANDRAN V,SUDHAKAR S,et al.Delay Tolerant Network for Space[C]∥International Conference on Signal Processing and Integrated Networks.New York:IEEE,2016:591-595.
[6]BURLEIGH S,RAMADAS M,FARRELL S.Licklider Transmission Protocol-Motivation [J].Optics Letters,2008,29(10):1051-1074.
[7]ZHAO K,WANG R,BURLEIGH S C,et al.Modeling memory-variation dynamics for the Licklider transmission protocol in deep-space communications[J].IEEE Transactions on Aerospace Electronic Systems,2015,51(4):2510-2524.
[8]YU Q,BURLEIGH S C,WANG R,et al.Performance modeling of licklider transmission protocol (LTP) in deep-space communication[J].IEEE Transactions on Aerospace & Electronic Systems,2015,51(3):1609-1620.
[9]WU H,LI Y,JIAO J,et al.LTP asynchronous accelerated retransmission strategy for deep space communications[C]∥IEEE International Conference on Wireless for Space and Extreme Environments.New York:IEEE,2017:99-104.
[10]MCKIM J,JACKSON C,EDDY W.Using Saratoga with aBundle Agent as a Convergence Layer for Delay-Tolerant Networking [EB/OL].http://tools.ietf.org/pdf/draft-wood-dtnrg-saratoga-07.pdf.
[11]DEMMER M,OTT J,PERREAULT S.Delay-Tolerant Net-working TCP Convergence-Layer Protocol [EB/OL].https://tools.ietf.org/html/rfc7242.
[12]KRISHNAN R,BASU P,MIKKELSON J M,et al.The SPINDLE Disruption-Tolerant Net-working System [C]∥Military Communications Conference,2007.New York:Milcom,IEEE,2007:1-7.
[13]KAWABATA N,YAMASAKI Y,OHSAKI H.On Message Delivery Delay of Epidemic DTN Routing with Broadcasting ACKs[C]∥IEEE,Computer Software and Applications Conference.New York:IEEE Computer Society,2017:701-704.
[14]SETH A,KROEKER D,ZAHARIA M,et al.Low-cost communication for rural internet kiosks using mechanical backhaul [C]∥International Conference on Mobile Computing and Networking.New York:ACM,2006:334-345.
[15]DEMMER M,OTT J,PERREAULT S.Delay-Tolerant Net-working TCP Convergence-Layer Protocol[EB/OL].https://www.rfc-editor.org/pdfrfc/rfc7242.txt.pdf.
[16]SHINKO I,ODA T,SPAHO E,et al.A Simulation SystemBased on ONE and SUMO Simulators:Performance Evaluation of First Contact,Prophet and Spray-and-Wait DTN Protocols[C]∥International Conference on Broadband and Wireless Computing,Communication and Applications.New York:IEEE,2015:137-142.
[17]SPYROPOULOS T,POSUNIS K,RAGHAVENDRA C S.Spray and wait:efficient routing scheme for intermittently connected mobile networks [C]∥Proceedings of ACM SIGCOM-M Workshop on Delay-Tolerant Networking.New York:AVM,2002:252-259.
[18]SPYROPOULOS T,PSOUNIS K,RAGHAVENDRA C S.Efficient routing in intermittently connected mobile networks:the multiple-copy case [J].IEEE/ACM Transactions on Networking,2008,16(1):63-76.
[19]SISODIYA S,SHARMA P,TIWARI S K.A new modifiedspray and wait routing algorithm for heterogeneous delay tole-rant network[C]∥International Conference on I-Smac.New York:IEEE,2017:843-848.
[20]LINDGREN A,DORIA A,SCHELEN O.Probabilistic routing in intermittently connected networks [J].Acm Skimobile Mobile Computing & Communications Review,2004,7(3):19-20.
[21]YUSUKE I,TOSHIAKI M.A DTN routing algorithm adopting the “Community” and “Centrality” parameters used in social networks[C]∥2018 International Conference on Information Networking (ICOIN).New York:IEEE,2018:211-216.
[22]ALAOUI E A A,AGOUJIL S,HAJAR M,et al.Improving the data delivery using DTN routing hierarchical topology (DRHT)[C]∥International Conference on Wireless Networks and Mobile Communications.New York:IEEE,2016:1-5.
[23]ALAOUI S E,RAMAMURTHY B.Routing optimization forDTN-based space networks using a temporal graph model[C]∥IEEE International Conference on Communications.New York:IEEE,2016:1-6.
[24]MTIBA A,MAYM,DIOTC,et al.People rank:social opportu-nistic forwarding [C]∥Conference on Information Communications.New York:IEEE Press,2010:111-115.
[25]WANG G Z,YAN L J,ZHENG L,et al.Social routing based on location preference prediction in DTN[C]∥2017 11th IEEE International Conference on Anti-counterfeiting,Security and Identification(ASID).New York:IEEE,2017:154-157.
[26]LIU C,WU J.Routing in a cyclic mob space [C]∥ACM International Symposium on Mobile Ad Hoc NETWORKING and Computing.New York:ACM,2008:351-360.
[27]QI W,SONG Q,WANG X,et al.Trajectory Data Mining-Based Routing in DTN-enabled Vehicular Ad Hoc Networks[J].IEEE Access,2017,PP(99):128-138.
[28]LIU J,TANG M,YU G.Adaptive Spray and Wait RoutingBased on Relay-Probability of Node in DTN [C]∥2012 International Conference on Computer Science & Service System (CSSS).New York:IEEE,2012:1138-1141.
[29]WANG G Z,ZHENG L,YAN L J,et al.Probabilistic routing algorithm based on transmission capability of nodes in DTN[C]∥2017 11th IEEE International Conference on Anti-counterfeiting,Security and Identification (ASID).New York:IEEE,2017:146-149.
[30]HUANG Z,ZHANG Q,XIN X,et al.DTN routing algorithm based on service probability and limited copy for satellite networks[C]∥International Conference on Optical Communications and Networks.New York:IEEE,2017:1-3.
[31]CONG L,YANG H,WANG Y,et al.Research on the Routing Algorithm of LEO-Satellite DTN Network Based on Multi-Attribute Decision Making[C]∥International Conference on Intelligent Computation Technology and Automation.New York:IEEE,2017:166-171.
[32]HE J,XU C,WU Y.Resource-efficient routing protocol basedon historical encounter time interval in DTN[C]∥IEEE International Conference on Computer and Communications.New York:IEEE,2017:2026-2031.
[33]LIN F,WANG Y,WU H.Testbed Implementation of Delay/Fault-Tolerant Mobile Sensor Network (DFT-MSN) [C]∥IEEE International Conference on Pervasive Computing and Communications Workshops.New York:IEEE,2006.
[34]ZHAO W.A message ferrying approach for data delivery insparse mobile ad hoc networks [C]∥ACM International Symposium on Mobile Ad Hoc Networking and Computing.New York:ACM,2004:187-198.
[35]ZHAO W,AMMAR M,ZEGURA E.Controlling the mobility of multiple data transport ferries in a delay-tolerant network [C]∥INFOCOM 2005.Joint Conference of the IEEE Computer and Communications Societies.New York:IEEE,2005:1407-1418.
[36]ZHANG H,LU N,MA J,et al.HNSARA:A history-and-node-state-based active routing algorithm for DTN[C]∥International Conference on Cyberspace Technology.England:IET,2015:1-5.
[37]KAWAMOTO Y,NISHIYAMA H,KATO N.Toward terminal-to-terminal communication networks:A hybrid MANET and DTN approach[C]∥IEEE,International Workshop on Compu-ter Aided Modeling and Design of Communication Links and Networks.New York:IEEE,2014:228-232.
[1] ZHAO Lei, ZHOU Jin-he. ICN Energy Efficiency Optimization Strategy Based on Content Field of Complex Networks [J]. Computer Science, 2019, 46(9): 137-142.
[2] YANG Liu, WANG Chuang, WANG Jun-yi. System Design of Space Information Network Architecture [J]. Computer Science, 2019, 46(6A): 309-311.
[3] LIANG Ping-yuan, LI Jie, PENG Jiao, WANG Hui. Research on 3D Dynamic Clustering Routing Algorithm Based on Cooperative MIMO for UWSN [J]. Computer Science, 2019, 46(6A): 336-342.
[4] WANG Hua-hua, ZHOU Yuan-wen, LIU Jiang-bing. Hybrid-based Network Congestion Control Routing Algorithm for LLN [J]. Computer Science, 2019, 46(6): 107-111.
[5] QIN Dong-ming, YU Jian, ZHANG Bo, ZHAO Qin. Massive Data Parallel Query Platform Based on Distributed Shared-nothing Architecture [J]. Computer Science, 2019, 46(4): 44-49.
[6] DAI Liang,MEI Yang,QIAO Chao,MENG Yun,LV Jin-ming. Survey on Short-term Traffic Flow Forecasting Based on Deep Learning [J]. Computer Science, 2019, 46(3): 39-47.
[7] PAN Hao, ZHENG Wei, ZHANG Zi-feng, LU Chao-qun. Study on Fractal Features of Software Networks [J]. Computer Science, 2019, 46(2): 166-170.
[8] XU Qi-ze, HAN Wen-ting, CHEN Jun-shi, AN Hong. Optimization of Breadth-first Search Algorithm Based on Many-core Platform [J]. Computer Science, 2019, 46(1): 314-319.
[9] LI Lu-lu, QIU Xue-hong, ZHOU Duan and ZHANG Jian-xian. Research on Fault Tolerant Technology for Networks-on-Chip [J]. Computer Science, 2018, 45(3): 305-310.
[10] LIU Kai, LIANG Xin, ZHANG Jun-ping. Analysis on Technical Support Equipments’ Software Invalidation Based on Soft and Hard Integrated System Methodology [J]. Computer Science, 2018, 45(11A): 494-496,517.
[11] ZHANG Ying-jie, ZHU Xue-feng. Review of Pattern Driven Software Architecture Design [J]. Computer Science, 2018, 45(11A): 48-52.
[12] ZHAO Ran, PAN Gen-mei. High Reliable Data Collection Algorithm in Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2018, 45(11A): 303-307.
[13] ZHANG Guang-lan, YANG Qiu-hui, CHENG Xue-mei, JIANG Ke, WANG Shuai, TAN Wu-kun. Application of Sequence Pattern Mining in Communication Network Alarm Prediction [J]. Computer Science, 2018, 45(11A): 535-538,563.
[14] WU Zhong-zhi. Research on Hierarchical Modeling Technology of Typical System Based on Architecture [J]. Computer Science, 2018, 45(11A): 542-544.
[15] LI Dong-yue, YANG Gang, QIAN Bo. Research on Architecture of Internet of Things [J]. Computer Science, 2018, 45(11A): 27-31.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .