Study for Implementation of VANET with Transport Layer Protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cross-layer Mobile Chord P2P protocol design for VANET

Efficient content distribution is one of the emerging applications in vehicular networks. To provide scalable content distribution in vehicular networks, Chord peer-to-peer overlay could be applied. Most P2P protocols, including Chord, are designed for wired-line network, and might perform poorly in mobile networks. Mobile Chord (MChord) is proposed to enhance the P2P performance over vehicular...

متن کامل

A Study and Analysis of DADCQ Protocol for VANET

The DADCQ protocol utilizes the distance method to select forwarding nodes. The performance of this method Depends heavily on the value of the decision threshold, but it is difficult to choose a value that results in good performance across all Scenarios. Node density, spatial distribution pattern, and wireless channel quality all affect the optimal value. Broadcast protocols Tailored to vehicu...

متن کامل

Optimizing OLSR Protocol for VANET

Vehicular ad hoc network is a non infrastructure network where each network node not only acts as a host but also acts as a router. The environment is highly dynamic due to mobile nature of nodes. The proper functioning of these networks depends upon a routing protocol that can respond to the rapid changes in the topology. Our interest is focused on the OLSR routing protocol, which uses hello a...

متن کامل

Implementation guide for the ISO Transport Protocol

The text description in the IS 8073 contains deliberate expressions of nondeterminism and indeterminism in the behavior of the transport protocol for the sake of flexibility in application. (Nondeterminism in this context means that the order of execution for a set of actions that can be taken is not specified. Indeterminism means that the execution of a given action cannot be predicted on the ...

متن کامل

Fortification of Transport Layer Security Protocol

Proving an identity over a public link is complex when there is communication between Client and Server. Secure Shell protocol is deployed, to determine a client's identity through Password-based key exchange schemes, over a public network, by sharing a (short) password only, with a session key. Most of the existing schemes are vulnerable to various dictionary attacks. SSL is the de facto stand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2014

ISSN: 0975-8887

DOI: 10.5120/15739-4687