2016
DOI: 10.1007/s11276-016-1294-z
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey of network coding in vehicular ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(18 citation statements)
references
References 98 publications
0
18
0
Order By: Relevance
“…rough this way, the delay of data dissemination can be reduced and system throughput and resource utilization of the system are improved. Moreover, it has been proved that network coding technology has great potential for ensuring security and reducing packet loss [18][19][20]. In VANETs, the performance of data dissemination determines whether safety-related and user-related applications information can be provided for vehicle users in time and reliably.…”
Section: Network Coding-based Data Dissemination In Vanetsmentioning
confidence: 99%
See 1 more Smart Citation
“…rough this way, the delay of data dissemination can be reduced and system throughput and resource utilization of the system are improved. Moreover, it has been proved that network coding technology has great potential for ensuring security and reducing packet loss [18][19][20]. In VANETs, the performance of data dissemination determines whether safety-related and user-related applications information can be provided for vehicle users in time and reliably.…”
Section: Network Coding-based Data Dissemination In Vanetsmentioning
confidence: 99%
“…e original IDNCassisted algorithms without admission control are labeled as EDF, SIN, and PVDD, respectively. e algorithms with (1) If R i receives a newly arriving request r i then (2) Determine the priority of r i ; (3) if r i is high priority then (4) Admit r i and put r i into the high priority service queue; (5) else (6) Vectorize r i as rv ij , the mean vector of VE α as rv α , and the mean vector of VE β as rv β ; (7) Calculate rv α and rv β as described in Section 4.2.1; (8) Calculate the distance between rv ij and rv α , and the distance between rv ij and rv β , respectively; (9) Compare the distances (10) if dist(rv ij , rv α ) ≤ dist(rv ij , rv β ) then (11) Reject r i ; (12) Send a rejection message to the vehicle; (13) else (14) if dist(rv ij , rv α ) > dist(rv ij , rv β ) then (15) Admit r i and put r i into the low priority service queue; (16) end if (17) end if (18) end if (19) network coding-aware admission control are denoted as EDF_NCaAC, SIN_NCaAC, and PVDD_NCaAC. e results are obtained when the system is in a steady state and all data points are based on the average of over 5000 simulation runs.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The V2I communications are based on the LTE-Advanced technology. These video dissemination protocols may be improved through network coding techniques (e.g., [22]) that enable to overcome packets losses at different vehicles thanks to a limited number of coded packets. Note that, unlike our work, these video dissemination studies focus on a given multimedia message or video that has to be delivered to all considered vehicles.…”
Section: Related Workmentioning
confidence: 99%
“…As the authors of [17] say, NC improves throughput, minimizes transmission rate, reduces energy consumption, and minimizes energy per bit for multicasting in wireless networks. NC [18], [19] has an advantage of the content distribution at low bit rate because NC reduces duplicate packets [20], [21].…”
Section: Copyright Cmentioning
confidence: 99%