2015
DOI: 10.1109/mcom.2015.7295460
|View full text |Cite
|
Sign up to set email alerts
|

Design considerations in applying disruption tolerant networking to tactical edge networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…From the network perspective (3), TNT creates an infrastructure that uses patterns of data rates change and mobility traces, simulating a wide range of network scenarios. These scenarios are deployed in a real test-bed or emulated environments in order to test a given military system (2). In this investigation, TNT is instantiated to deploy network scenarios in a test-bed with real military radios.…”
Section: The Tnt Designmentioning
confidence: 99%
“…From the network perspective (3), TNT creates an infrastructure that uses patterns of data rates change and mobility traces, simulating a wide range of network scenarios. These scenarios are deployed in a real test-bed or emulated environments in order to test a given military system (2). In this investigation, TNT is instantiated to deploy network scenarios in a test-bed with real military radios.…”
Section: The Tnt Designmentioning
confidence: 99%
“…In this figure, TNT orchestrates the experiment by deploying all necessary scripts over the network nodes right before the experiment starts. After the user configures the experiment (as described earlier in Section III-A), TNT starts the experiment deploying (1) the application on the sender and receiver nodes (user data flows); (2) TABLE I: Experimental setup in the sender node, which has an interface with the radio and with the link disconnection prototype; (3) the military system (here the adaptive data flow shaping mechanism) on the sender node in order to avoid buffer overflow; and (4) the monitoring and data analysis which collect, prepare, processing and visualize the experiment outputs as describes later in this section.…”
Section: A Test Environmentmentioning
confidence: 99%
“…R ADIO links at the edge of tactical networks are exposed to several sources of randomness that may impact the current link data rate [1]- [6]. For example, the sources of randomness are node mobility, type of terrain, physical obstacles, weather conditions, radio jamming by an adversary, physical/cyber attacks and so on.…”
Section: Introductionmentioning
confidence: 99%