IEEE International Conference on Vehicular Electronics and Safety, 2005.
DOI: 10.1109/icves.2005.1563614
|View full text |Cite
|
Sign up to set email alerts
|

Congestion control in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 70 publications
(33 citation statements)
references
References 11 publications
0
33
0
Order By: Relevance
“…Lars Wischhof and Hermann Rohling provide a Utility-Based Packet Forwarding and Congestion Control Scheme (UBPFCC) [12] that works on top of IEEE 802.11 MAC protocol and is focused only on non-safety applications. This approach needs the road to be segmented for calculating the message utility metric, thus it cannot be readily applied to VANET.…”
Section: Related Workmentioning
confidence: 99%
“…Lars Wischhof and Hermann Rohling provide a Utility-Based Packet Forwarding and Congestion Control Scheme (UBPFCC) [12] that works on top of IEEE 802.11 MAC protocol and is focused only on non-safety applications. This approach needs the road to be segmented for calculating the message utility metric, thus it cannot be readily applied to VANET.…”
Section: Related Workmentioning
confidence: 99%
“…This has led to a range of recent studies which have focused on developing new congestion protocols more suitable to the challenges of VANETs: dynamic (and fast) network topology changes; dynamic network density changes; network scale problems; peculiar interference issues; limited bandwidth; etc. Indeed, improvements and refinements to VANET-specific congestion control protocols continue to be made [15,14,3,2]. In most of these, however, the analysis of a proposed method relies on simulations for an evaluation of its efficacy.…”
Section: Introductionmentioning
confidence: 99%
“…The control algorithm uses an application specific utility unction and encodes the quantitative utility information in each transmitted data packet in a transparent way for all users within a local environment [8]. A decentralized algorithm then calculates the "average utility value" of each individual node based on the utility of its data packets and assigns a share of the available data rate proportional to the relative priority.…”
Section: Literature Surveymentioning
confidence: 99%