scispace - formally typeset
Book ChapterDOI

On-Demand Joint Predictive Flooding in Vehicular Ad Hoc Networks

H. N. Jithendra, +1 more
- pp 12-22
Reads0
Chats0
TLDR
A predictive flooding in VANET (PFV) which has a flavor of flooding protocol for data transfer and the results show that the PFV considerably reduces the network load in terms of forwards with an increase in the performance of data dissemination as well.
Abstract
Vehicular ad hoc networks (VANET) are flavor of mobile ad hoc networks. With the increase in the development of mobile technology in the last decade or so, we see increased interest in the development in VANET protocols as well. In this paper, we propose a routing protocol that uses predictive position information of neighboring nodes for data dissemination. The highly dynamic topology of VANET results in route discovered by a routing protocol to be intermittent. Hence, in this work we propose a predictive flooding in VANET (PFV) which has a flavor of flooding protocol for data transfer. Our results show that the PFV considerably reduces the network load in terms of forwards with an increase in the performance of data dissemination as well.

read more

References
More filters
Proceedings ArticleDOI

A performance comparison of multi-hop wireless ad hoc network routing protocols

TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Book

Ad Hoc Wireless Networks: Architectures and Protocols

TL;DR: The book starts off with the fundamentals of wireless networking (wireless PANs, LANs, MANs, WANs, and wireless Internet) and goes on to address such current topics as Wi-Fi networks, optical wireless networks, and hybrid wireless architectures.
Proceedings ArticleDOI

Performance analysis of the CONFIDANT protocol

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Journal ArticleDOI

Performance comparison of two on-demand routing protocols for ad hoc networks

TL;DR: It is demonstrated that even though DSR and AODV share similar on-demand behavior, the differences in the protocol mechanics can lead to significant performance differentials.
Related Papers (5)