SlideShare a Scribd company logo
1 of 20
A Survey of Various Efficient and
Secure Routing Protocols for VANETs
Prepared By:
Abhijit Parmar
Contents
1. What is VANET?
2. Classification of routing protocols
3. Transmission strategies for packet forwarding
4. Other Routing Protocols
5. Conclusion
2
What is VANET?
 Vehicular Ad hoc Network (VANET) is a wireless
network that is formed between a collections of
cars connected by wireless links.
 The main applications are Safety applications,
Traffic management & User applications.
3
VANET Scenario 4
Classification
VANETRoutingProtocols
Transmission
Strategies
Broadcast
Unicast
Multicast
Routing
Information
Topology Based
Proactive
Reactive
Hybrid
Position Based
DTN
Non-DTN
Hybrid
5
Proactive Routing Protocol
 Proactive protocols allow a network node to use
the routing table to store routes information for all
other nodes.
 Here each entry in the table contains the next
hop node used in the path to the destination.
 The table must be updated frequently and
should be broadcast periodically to the
neighbors.
6
Reactive Routing Protocol
 Reactive routing protocols do not periodically
update the routing table when there is some data
to send.
 Reactive routing protocols are applicable to the
large size of the mobile ad hoc networks which
are highly mobility and frequent topology
changes.
7
Hybrid Routing Protocol
 Hybrid protocol is a mixture of both proactive and
reactive protocols.
 The hybrid protocol divides the network to many
zones to provide more reliability for route
discovery and maintenance processes.
8
Delay Tolerant Network (DTN)
Protocol
 In this network, all nodes help each other to
forward packets (store and forward scheme).
 These nodes may have a limited transmission
range, so packets transmission will take large
delays.
 DTN designed to perform efficiently in networks
with some characteristics:
i. Frequent disconnection communication,
ii. Large scale, long unavoidable delays,
iii. Limited bandwidth,
iv. Power constraints
9
Non-Delay Tolerant Network
(Non DTN) Protocol
 This type of protocol is only suitable for high
density network.
 In these protocols, the node forwards its packet to
the closest neighbor to the destination.
 Problem:- if there is no closest neighbor to the
current node.
10
Hybrid Routing Protocol
 Position routing protocol reduces control routing
overhead, it doesn't need to construct or
maintain a routing table because it only uses the
location information about the neighbors and
destination nodes, these issues made position-
based routing protocols scalable.
11
Transmission Strategies for
Packet Forwarding
 Delivery of information from a source to a
destination can be classified into three types:
1. Unicast protocols.
2. Broadcast protocols.
3. Multicast protocols.
12
Unicast Routing 13
Broadcast Routing 14
Multicast Routing 15
Other Routing Based
Protocols
 Various other routing protocols are as follows
1. Greedy Perimeter Coordinator Routing or Greedy
Source Routing Protocols(GPCR/GPSR).
2. Junction Based Multipath Source Routing
Protocols(JMSR).
16
GPCR/GPSR Protocol
 Greedy Perimeter Coordinator Routing,
Geographic Source Routing or Connectivity-
Aware Routing, use only one single route from the
source to destination.
 GPSR handles each packet separately.
17
JMSR Protocol
 JMSR is characterized as junction-based because
it is a geographic or position-based routing
protocol, where the junctions’ positions are of
much higher importance than the positions of the
nodes themselves.
 Packet forwarding is handled by the nodes within
the junctions.
18
Conclusion
 The study of different VANETs routing protocols,
help us to know which protocols is effective to be
used. The study help us to overcome the problems
such as low communication overhead, security,
etc.
19
Thank You
20

More Related Content

What's hot

Presentation pfe
Presentation pfePresentation pfe
Presentation pfeMalik Riahi
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanetVYSAKHMANAYATH
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksMichele Weigle
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...Alexander Decker
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalAlexander Decker
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs PresentationiQra Rafaqat
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSSridhar Raghavan
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETMayuresh Bhagat
 
Using traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETUsing traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETMohammadAlmalag
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANETSarah Baras
 
Multimedia services in VANETs
Multimedia services in VANETsMultimedia services in VANETs
Multimedia services in VANETsMisbahFatima7
 

What's hot (19)

Presentation pfe
Presentation pfePresentation pfe
Presentation pfe
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanet
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc NetworksData Aggregation and Dissemination in Vehicular Ad-Hoc Networks
Data Aggregation and Dissemination in Vehicular Ad-Hoc Networks
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
11.qualitative based comparison of routing protocols for vanet1212www.iiste.o...
 
Qualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212finalQualitative based comparison of routing protocols for vanet1212final
Qualitative based comparison of routing protocols for vanet1212final
 
VANETs Presentation
VANETs PresentationVANETs Presentation
VANETs Presentation
 
VANET
VANETVANET
VANET
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
VANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkSVANETS Vehicular Adhoc NETworkS
VANETS Vehicular Adhoc NETworkS
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Cooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANETCooperative Message Authentication Protocol(CMAP) in VANET
Cooperative Message Authentication Protocol(CMAP) in VANET
 
Using traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETUsing traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANET
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Vehicular ad hoc network - VANET
Vehicular ad hoc network - VANETVehicular ad hoc network - VANET
Vehicular ad hoc network - VANET
 
Multimedia services in VANETs
Multimedia services in VANETsMultimedia services in VANETs
Multimedia services in VANETs
 

Viewers also liked

Realistic simulations of delay tolerant networks
Realistic simulations of  delay tolerant networksRealistic simulations of  delay tolerant networks
Realistic simulations of delay tolerant networksAmir Krifa
 
A Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularA Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularGabriel Balderas
 
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh Networks
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh NetworksAn Inter-domain Routing Protocol for Multi-homed Wireless Mesh Networks
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh NetworksRaluca Musaloiu-E.
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Sharif Hossen
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETAnkit Gupta
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal ToutouhJamal Toutouh, PhD
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveypijans
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulationciza2013
 

Viewers also liked (20)

Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Realistic simulations of delay tolerant networks
Realistic simulations of  delay tolerant networksRealistic simulations of  delay tolerant networks
Realistic simulations of delay tolerant networks
 
A Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for VehicularA Survey of Geographic Routing Protocols for Vehicular
A Survey of Geographic Routing Protocols for Vehicular
 
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh Networks
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh NetworksAn Inter-domain Routing Protocol for Multi-homed Wireless Mesh Networks
An Inter-domain Routing Protocol for Multi-homed Wireless Mesh Networks
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
 
Secure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANETSecure Communication with Privacy Preservation in VANET
Secure Communication with Privacy Preservation in VANET
 
VANET Simulation - Jamal Toutouh
VANET Simulation - Jamal  ToutouhVANET Simulation - Jamal  Toutouh
VANET Simulation - Jamal Toutouh
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Final_Vanet
Final_VanetFinal_Vanet
Final_Vanet
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
Smart parking - Happiestminds !
Smart parking - Happiestminds !Smart parking - Happiestminds !
Smart parking - Happiestminds !
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
 

Similar to A Survey of Various Efficient and Secure Routing Protocols for VANETs

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanetAlexander Decker
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanetAlexander Decker
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...IJEEE
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 

Similar to A Survey of Various Efficient and Secure Routing Protocols for VANETs (20)

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
unit-4
unit-4 unit-4
unit-4
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Aodv
AodvAodv
Aodv
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

A Survey of Various Efficient and Secure Routing Protocols for VANETs

  • 1. A Survey of Various Efficient and Secure Routing Protocols for VANETs Prepared By: Abhijit Parmar
  • 2. Contents 1. What is VANET? 2. Classification of routing protocols 3. Transmission strategies for packet forwarding 4. Other Routing Protocols 5. Conclusion 2
  • 3. What is VANET?  Vehicular Ad hoc Network (VANET) is a wireless network that is formed between a collections of cars connected by wireless links.  The main applications are Safety applications, Traffic management & User applications. 3
  • 6. Proactive Routing Protocol  Proactive protocols allow a network node to use the routing table to store routes information for all other nodes.  Here each entry in the table contains the next hop node used in the path to the destination.  The table must be updated frequently and should be broadcast periodically to the neighbors. 6
  • 7. Reactive Routing Protocol  Reactive routing protocols do not periodically update the routing table when there is some data to send.  Reactive routing protocols are applicable to the large size of the mobile ad hoc networks which are highly mobility and frequent topology changes. 7
  • 8. Hybrid Routing Protocol  Hybrid protocol is a mixture of both proactive and reactive protocols.  The hybrid protocol divides the network to many zones to provide more reliability for route discovery and maintenance processes. 8
  • 9. Delay Tolerant Network (DTN) Protocol  In this network, all nodes help each other to forward packets (store and forward scheme).  These nodes may have a limited transmission range, so packets transmission will take large delays.  DTN designed to perform efficiently in networks with some characteristics: i. Frequent disconnection communication, ii. Large scale, long unavoidable delays, iii. Limited bandwidth, iv. Power constraints 9
  • 10. Non-Delay Tolerant Network (Non DTN) Protocol  This type of protocol is only suitable for high density network.  In these protocols, the node forwards its packet to the closest neighbor to the destination.  Problem:- if there is no closest neighbor to the current node. 10
  • 11. Hybrid Routing Protocol  Position routing protocol reduces control routing overhead, it doesn't need to construct or maintain a routing table because it only uses the location information about the neighbors and destination nodes, these issues made position- based routing protocols scalable. 11
  • 12. Transmission Strategies for Packet Forwarding  Delivery of information from a source to a destination can be classified into three types: 1. Unicast protocols. 2. Broadcast protocols. 3. Multicast protocols. 12
  • 16. Other Routing Based Protocols  Various other routing protocols are as follows 1. Greedy Perimeter Coordinator Routing or Greedy Source Routing Protocols(GPCR/GPSR). 2. Junction Based Multipath Source Routing Protocols(JMSR). 16
  • 17. GPCR/GPSR Protocol  Greedy Perimeter Coordinator Routing, Geographic Source Routing or Connectivity- Aware Routing, use only one single route from the source to destination.  GPSR handles each packet separately. 17
  • 18. JMSR Protocol  JMSR is characterized as junction-based because it is a geographic or position-based routing protocol, where the junctions’ positions are of much higher importance than the positions of the nodes themselves.  Packet forwarding is handled by the nodes within the junctions. 18
  • 19. Conclusion  The study of different VANETs routing protocols, help us to know which protocols is effective to be used. The study help us to overcome the problems such as low communication overhead, security, etc. 19