DTN – Disruption Tolerant Networking

Abbreviated as DTN, Disruption Tolerant Networking is a networking architecture that is designed to provide communications in the most unstable and stressed environments, where the network would normally be subject to frequent and long lasting disruptions and high bit error rates that could severely degrade normal communications. It is an experimental protocol developed by the Delay & Disruption Tolerant Networking Research Group, which operates under the Internet Research Task Force.

A Different Approach to TCP/IP

DTN works using different kind of approach than TCP/IP for packet delivery that is more resilient to disruption than TCP/IP. DTN is based on a new experimental protocol called the Bundle Protocol (RFC 5050). The Bundle Protocol (BP) sits at the application layer of some number of constituent internets, forming a store-and-forward overlay network. BP operates as an overlay protocol that links together multiple subnets (such as Ethernet-based LANs) into a single network.

Store-And-Forward

The basic idea behind DTN network is that endpoints aren’t always continuously connected. In order to facilitate data transfer, DTN uses a store-and-forward approach across routers that is more disruption-tolerant than TCP/IP. However, the DTN approach doesn’t necessarily mean that all DTN routers on a network would require large storage capacity in order to maintain end-to-end data integrity.

Disruption Tolerant Networks are frequently used in disaster relief missions, peace-keeping missions, and in vehicular networks. Most recently NASA has tested DTN technology for spacecraft communications.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...