Collective Network Channel Decentralized Fountain Design Codes for Safe Communication in VANET Network
DOI:
https://doi.org/10.14419/ijet.v7i3.12.16500Published:
2018-07-20Keywords:
Vehicular Networks, Content Distribution, Data Dissemination, Broadcast, WSN, Finite length query, query recognition, flexible traffic control scheme.Abstract
Wireless sensor network is noticed as bulk aggregation of slender sensor knobs that can characterize themselves in a decentralized system. Wireless communications assist these trades to increase plant knowledge by acquiring additional measurements from processes and apparatus when wired communication would be infeasible. The merits of the space diversity and transmit nature of wireless transmissions to adopt combined accession in which node transmit the host, that recover the lost host with long credibility by overhearing the transmission of its acquaintance.
Article represents an indicating flexible unified management. On the basis of regular set code, the aspect of overall managed flexible WSN activity, local action conversion is protected.
References
[1] Anya Apavatjrut ,Claire Goursaud, Katia Jaffrès-Runser, Cristina Comaniciu, and Jean-Marie Gorce, â€Toward Increasing Packet Diversity for Relaying LT Fountain Codes in Wireless Sensor Networksâ€, IEEE Communications letters, vol. 15, no. 1, pp 52-54, January 2011.
[2] A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storageâ€,‖ IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2809–2816, June 2006.
[3] Balon N., and J. Guo, “Increasing Broadcast Reliability in Vehicular Ad Hoc Networks(VANET)â€,‖ In Proceeding of the 3rd
ACM International Workshop on Vehicular Ad Hoc Networks VANET, NY, USA, pp. 104-105, 2006.
[4] D. Wang, Q. Zhang, and J. Liu, “Partial Network Coding for Continuous Data Collection in Sensor Networksâ€, ‖ in Proc. of the Fourteenth IEEE International Workshop on Quality of Service (IWQoS), 2006.
[5] J. Ho, M. Wright, and S. K. Das, “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testingâ€, IEEE transactions on mobile computing, vol. 10, no. 6, June 2011.
[6] Joshi H. P., M. Sichitiu, and M. Kihl, “Distributed robust geocast multicast routing for inter-vehicle communicationâ€, in Proceedings of WEIRD Workshop on WiMax, Wireless and Mobility, pp. 9-21, 2007.
[7] H. Wu, Fujimoto, R., Guensler, R., and Hunter, M, “MDDV: a mobility-centric data dissemination algorithm for vehicular networkâ€, in Proceedings of the 1st ACM international Workshop on Vehicular Ad Hoc Networks, pp. 47-56, October, 2004.
[8] Swastik Brahma a, Mainak Chatterjee et. Al., “Traffic management in wireless sensor networks: Decoupling congestion control and fairnessâ€, Computer Communications 35, 670.681, 2012.
[9] “vehicular ad-hoc networks (VANET)â€,‖ in Proceedings of ACM International Symposium on Mobile Ad hoc Networking and Computing, pp. 3020-3026, 2008.
[10] Yang X., L. Liu, N.H. Vaidya, and F. Zhao, “A vehicle-to-vehicle communication protocol for cooperative collision warning in VANETâ€, In Proceedings of the 1st International Conference on Networking and Services, pp.114-123, 2004.
[11] Zong Da Chen, H.T. Kung, and Dario Vlah, “Ad hoc wireless networks over moving vehicles on highwaysâ€, In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 45-52, Oct. 2001.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-29
Published 2018-07-20