Study for Implementation of VANET with Transport Layer Protocol
نویسندگان
چکیده
منابع مشابه
Cross-layer Mobile Chord P2P protocol design for VANET
Efficient content distribution is one of the emerging applications in vehicular networks. To provide scalable content distribution in vehicular networks, Chord peer-to-peer overlay could be applied. Most P2P protocols, including Chord, are designed for wired-line network, and might perform poorly in mobile networks. Mobile Chord (MChord) is proposed to enhance the P2P performance over vehicular...
متن کاملA Study and Analysis of DADCQ Protocol for VANET
The DADCQ protocol utilizes the distance method to select forwarding nodes. The performance of this method Depends heavily on the value of the decision threshold, but it is difficult to choose a value that results in good performance across all Scenarios. Node density, spatial distribution pattern, and wireless channel quality all affect the optimal value. Broadcast protocols Tailored to vehicu...
متن کاملOptimizing OLSR Protocol for VANET
Vehicular ad hoc network is a non infrastructure network where each network node not only acts as a host but also acts as a router. The environment is highly dynamic due to mobile nature of nodes. The proper functioning of these networks depends upon a routing protocol that can respond to the rapid changes in the topology. Our interest is focused on the OLSR routing protocol, which uses hello a...
متن کاملImplementation guide for the ISO Transport Protocol
The text description in the IS 8073 contains deliberate expressions of nondeterminism and indeterminism in the behavior of the transport protocol for the sake of flexibility in application. (Nondeterminism in this context means that the order of execution for a set of actions that can be taken is not specified. Indeterminism means that the execution of a given action cannot be predicted on the ...
متن کاملFortification of Transport Layer Security Protocol
Proving an identity over a public link is complex when there is communication between Client and Server. Secure Shell protocol is deployed, to determine a client's identity through Password-based key exchange schemes, over a public network, by sharing a (short) password only, with a session key. Most of the existing schemes are vulnerable to various dictionary attacks. SSL is the de facto stand...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/15739-4687