Book ChapterDOI
On-Demand Joint Predictive Flooding in Vehicular Ad Hoc Networks
H. N. Jithendra,D. Rekha +1 more
- pp 12-22
Reads0
Chats0
TLDR
A predictive flooding in VANET (PFV) which has a flavor of flooding protocol for data transfer and the results show that the PFV considerably reduces the network load in terms of forwards with an increase in the performance of data dissemination as well.Abstract:
Vehicular ad hoc networks (VANET) are flavor of mobile ad hoc networks. With the increase in the development of mobile technology in the last decade or so, we see increased interest in the development in VANET protocols as well. In this paper, we propose a routing protocol that uses predictive position information of neighboring nodes for data dissemination. The highly dynamic topology of VANET results in route discovered by a routing protocol to be intermittent. Hence, in this work we propose a predictive flooding in VANET (PFV) which has a flavor of flooding protocol for data transfer. Our results show that the PFV considerably reduces the network load in terms of forwards with an increase in the performance of data dissemination as well.read more
References
More filters
Proceedings ArticleDOI
A performance comparison of multi-hop wireless ad hoc network routing protocols
TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Proceedings ArticleDOI
Mitigating routing misbehavior in mobile ad hoc networks
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Book
Ad Hoc Wireless Networks: Architectures and Protocols
C. Siva Ram Murthy,B. S. Manoj +1 more
TL;DR: The book starts off with the fundamentals of wireless networking (wireless PANs, LANs, MANs, WANs, and wireless Internet) and goes on to address such current topics as Wi-Fi networks, optical wireless networks, and hybrid wireless architectures.
Proceedings ArticleDOI
Performance analysis of the CONFIDANT protocol
TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Journal ArticleDOI
Performance comparison of two on-demand routing protocols for ad hoc networks
TL;DR: It is demonstrated that even though DSR and AODV share similar on-demand behavior, the differences in the protocol mechanics can lead to significant performance differentials.