DTN-based Vehicular Cloud for Post-disaster Information Sharing

Size: px
Start display at page:

Download "DTN-based Vehicular Cloud for Post-disaster Information Sharing"

Transcription

1 DTN-based Vehicular Cloud for Post-disaster Information Sharing Celimuge Wu, Tsutomu Yoshinaga University of Electro-Communications Chofu-shi, Tokyo, Japan Yusheng Ji National Institute of Informatics Tokyo, Japan Abstract We first propose a framework which utilizes vehicular delay tolerant network (DTN) to form a vehicular cloud in order to provide information exchange without communication infrastructure. The framework does not rely on cellular network and therefore provides an approach which is suitable for postdisaster communication where cellular network is unavailable or severely congested. The paper also proposes a protocol which is able to provide vehicle-to-cloud communication in frequently changing vehicular environment. The protocol takes into account the link throughput, additional signal coverage, connection time, and the probability to encounter a RSU for the forwarder selection by using a fuzzy logic-based approach. The protocol also employs a network coding approach to reduce the overhead while maintaining a high data delivery ratio. We use computer simulations to evaluate the proposed framework. I. INTRODUCTION Vehicular ad hoc networks (VANETs) have been attracting interest for their potential roles in many applications such as intelligent transport systems. In this paper, we propose a framework which utilizes VANETs to provide communications in post-disaster situations. The communication is one of the most important requirements for post-disaster management. However, the cellular infrastructure could be destroyed or difficult to access due to the sudden increase of user traffics. VANETs could be a promising solution for post-disaster communication because vehicles could have sufficient battery and fast movement which facilitate efficient dissemination of critical information. Designing an efficient multi-hop communication protocol in VANETs is a very challenging task. Most existing routing protocols [] [6] discuss the routing problem under the assumption of a connected network topology. However, in many cases, there is no multi-hop path between the source node and the destination node. The concept of delay-tolerant networking (DTN) [7] [9] has been proposed to provide communication in a situation that no end-to-end connectivity exists (at least the connectivity is intermittent, or high error rates exist). The main approach of DTN protocols is to deliver data to an intermediate node which is not currently connected with the destination node but will possibly reach the destination in future. DTN is known as a solution to provide communications for a challenged network. There have been some DTN protocols for VANETs [7] [7]. Khabbaz et al. [] have discussed the bundle delivery problem for twohop vehicular delay tolerant networks, and proposed a protocol which could minimize bundle delivery delay. Targeting for the same network, Khabbaz et al. [] have discussed the problem of information delivery delay minimization, and proposed a probabilistic bundle release scheme. They conducted a study on the estimation of the bundle queueing, transit, and endto-end delivery delay. Most studies [2] [4] have discussed vehicular DTN based on theoretical analysis and showed the efficiency of DTN approach. However, only a few of them [5] [7] discussed about the routing procedure of the DTN. Balasubramanian al. [5] have treated DTN routing as a resource allocation problem, and proposed a framework to optimize delivery delay or delay bounded data delivery ratio. Cai et al. [6] have proposed a protocol for two-hop DTNs. In [6], the relay nodes are selected by considering both the encounter probability among nodes and the transmission cost which is defined based on a game theoretical approach. Cao et al. [7] have proposed EBRR (Encounter-Based Replication Routing) which considers the nodal encounter history information. Similar to [7], most existing routing protocols make routing decision based on historical information. However, the historical information does not make sense in VANETs because the probability of two vehicles meeting multiple times is very low unless they are moving to the same direction with similar velocity (in this case, these two vehicles have the similar encounter properties and therefore replicating the data from one vehicle to the other vehicle does not result in a significant improvement of destination encounter probability). All the existing protocols use the same approach where the data are replicated when there is a better candidate. However, this is not always correct depending on the number of copies and the nodes which have the copies. Therefore, it is important to consider the destination encounter probability of forwarders (who have a copy of the data) and the number of forwarders jointly. In this paper, we first propose a framework which utilizes vehicular DTN to provide communication for post-disaster management. In the framework, a vehicular cloud is formed by vehicles and road side units (RSUs) as shown in Fig.. We than propose a DTN protocol which is able to provide vehicleto-cloud (vehicle-to-rsu) communication in the framework. The protocol takes into account achievable throughput between the sender and forwarder node, additional radio coverage of the forwarder node, and connection time between the sender /7/$3. 27 IEEE 67

2 and the forwarder node. The proposed protocol also employs a network coding-based approach to improve the probability of successful data delivery with low overhead. We use computer simulations to evaluate the proposed protocol. Fig.. Vehicular cloud formed by vehicles and RSUs. The remainder of the paper is organized as follows. We first introduce the proposed DTN-based vehicular cloud framework in section II. In section III, we give a detailed description of the proposed vehicle-to-rsu protocol. Simulation results are presented in section IV. Finally, we present our conclusions and future work in section V. A. Assumption II. PROPOSED FRAMEWORK Each node (vehicle) is equipped with a positioning device. RSUs have sufficient storage devices to save all the packets in flight. Each node knows the road map information. Each RSU sends own location information using beacon messages with a predefined interval ( second by default), and therefore each vehicle is able to know the RSUs in vicinity. Each node disseminates the information about velocity, location, and the nearest RSU by using beacon messages. RSUs are connected with each other using wired communication line. B. Vehicular cloud with DTN As shown in Fig., the proposed framework uses an approach where vehicles and RSUs form a cloud. All intermediate data (the data that are not delivered to the destination yet) will be maintained by RSUs. Since RSUs are connected with each other, the information exchange can be conducted by using RSU as a contact point. From the service perspective, there are two main types of communications in the framework specifically vehicle-to-rsu (user-to-cloud) communication and RSU-to-vehicle (cloud-to-user) communication. Vehicle-to-RSU communication is used to send user data (such as data sensed from the vehicles, or data sensed from pedestrians) to the cloud, and RSU-to-vehicle communication is useful when a user wants to acquire information from the cloud. By storing data on the RSUs, vehicles (users) can exchange information without other infrastructure support. Providing acknowledgments to received data is important. In the proposed framework, after receiving each block of user data, the RSU which is the closest to the user will send acknowledgment to the user (the size of data block will be determined by the end user). Since RSUs are inter-connected, the cloud receives the data if any RSU receives that. In this paper, we also propose a vehicle-to-rsu routing protocol for the framework (this will be explained in the next subsection). RSU-to-vehicle communication can be conducted in a similar way. For the RSU-to-vehicle communication, the vehicle sends a request to the RSU which is the nearest to itself, and then the RSU schedules the transmission according to the network topology information. III. PROPOSED VEHICLE-TO-RSU PROTOCOL The protocol selects forwarder nodes to replicate the data. The sender node evaluates each neighbor node by taking into account multiple metrics specifically throughput factor (TPF), additional coverage factor (ACF), and connection time factor (CTF) by using a fuzzy logic (see III-A). The protocol also employs a network-coding approach to improve the data delivery probability with low overhead (see III-C). A. Fuzzy logic-based forwarder evaluation We consider three metrics specifically throughput factor (TPF), additional coverage factor (ACF), and connection time factor (CTF). TPF is used to take into account the possible throughput between the sender and a forwarder. It is important to consider this factor especially for low bandwidth network because this determines how much data can be delivered within a short time. ACF denotes how much the forwarder can improve the destination encounter probability. CTF is used to take into account the connection time between the two nodes, which is another factor influencing the total throughput. ) Throughput factor (TPF): TPF is calculated as { d(x) TPF c (x) = R, d(x) <= R (), d(x) > R. where c is the current node (the node which does the calculation), and d(x) is the distance between the current node and its neighbor node x. R is the maximum distance over which stable communications can be provided. The users can tune this parameter in order to make the protocol work efficiently in various situations. However, the tuning of this parameter is outside the scope of this paper. 2) Additional coverage factor (ACF): ACF is calculated as ACF c (x) = V(y) V(x) max y Nc V(y) where V( ) denotes the velocity, and N c is the one-hop neighbor set of the current node (c). If the relative vehicle velocity between two vehicles is higher, ACF of the corresponding vehicle is higher because the vehicle is more likely to encounter a new RSU. (2) 68

3 3) Connection time factor (CTF): CTF is calculated as { CT c(x) max CTF c (x) = y Nc CT, CT c(y) c(x) <= T data (3), CT c (x) > T data where CT c (x) is the connection time to the neighbor x, and T data is the time required to send all the data. CT c (x) is calculated based on the relative velocity of c and x. Typically, a larger connection time means that the deliverable data size is large. Note that the throughput is dependent on many factors especially the inter-vehicle distance. The total achievable date size is the product of throughput and connection time, which means that the result is dependent on TPF and CTF. 4) Procedure: The sender node calculates the evaluation value for each neighbor as follows, and selects the neighbor node which has the largest evaluation value as the (next) forwarder. Step: Fuzzification Use predefined linguistic variables and membership functions to convert throughput factor (TPF), additional coverage factor (ACF), and connection time factor (CTF) to fuzzy values (see Fig. 2, Fig. 3, and Fig. 4). Step2: Fuzzy operation Map the fuzzy values to predefined IF/THEN rules (see Table I) and combine the rules to get the rank of the neighbor as a fuzzy value. Step3: Defuzzification Use a predefined output membership function (see Fig. 5) and defuzzification method (we use the Center of Gravity method) to convert the fuzzy output value to a numerical value (evaluation value). Degree Degree Small Medium Large ACF Fig. 3. ACF membership function. Short Medium Long CTF Fig. 4. CTF membership function. TABLE I FUZZY RULES Degree Small Medium Large B. Forwarder node selection TPF Fig. 2. TPF membership function. In the forwarder node selection, we evaluate each candidate node by taking into account throughput factor (TPF), additional coverage factor (ACF), and connection time factor (CTF). We also consider another metric, RSU meeting probability (RMP). For each road, the forwarder node could be selected from whether the forward direction or backward direction depending on the RSU location. RMP is calculated based on each vehicle s velocity information and RSU information (if the RSU information is unavailable, we can calculate RMP based on the number of road segments that are involved in the upcoming intersection). The probability of making turn at Rule No. Throughput Coverage Connection time Rank Large Large Long Perfect 2 Large Large Medium Good 3 Large Large Short Unpreferable 4 Large Medium Long Good 5 Large Medium Medium Acceptable 6 Large Medium Short Bad 7 Large Small Long Unpreferable 8 Large Small Medium Bad 9 Large Small Short VeryBad Medium Large Long Good Medium Large Medium Acceptable 2 Medium Large Short Bad 3 Medium Medium Long Acceptable 4 Medium Medium Medium Unpreferable 5 Medium Medium Short Bad 6 Medium Small Long Bad 7 Medium Small Medium Bad 8 Medium Small Short VeryBad 9 Small Large Long Unpreferable 2 Small Large Medium Bad 2 Small Large Short VeryBad 22 Small Medium Long Bad 23 Small Medium Medium Bad 24 Small Medium Short VeryBad 25 Small Small Long Bad 26 Small Small Medium VeryBad 27 Small Small Short VeryBad each intersection is considered in this metric. For example, as shown in Fig. 6, After the source node S selects node F as a forwarder node, and then can know there is 3 probability that 69

4 VeryBad Bad Unpreferable Acceptable Good Perfect Fig. 5. Output membership function. node F would meet the RSU (there will be three road segments specifically A, B, and C). Each sender node selects the next forwarder node until the sum of RSU meeting probabilities of all the forwarder vehicles reaches (see III-C) (we use the sum of RSU meeting probabilities of all the forwarder vehicles because the calculation is simple and sufficient to indicate the level of real RSU meeting probability). Algorithm Actions for sending each block of data : Divide the data in to 2 parts, specifically a and b. 2: Calculate a XOR b. 3: Sort all the possible candidate nodes according to the value of fuzzy logic-based forwarder evaluation. 4: Transmit the data blocks, specifically a, b, and a XOR b independently as follows 5: repeat 6: Get a new forwarder node which shows the highest fuzzy evaluation value. 7: Transmit the data to the selected forwarder node. 8: Calculate the RSU meeting probability based on the selected forwarder node. 9: until RSU meeting probability of the selected forwarder nodes meets. Table II shows the transmission procedure comparison between the proposed protocol and the conventional approach such as EBRR [7]. G denotes the first group of vehicles which are specified by the sender node (in Fig. 7, G denotes the set of V, V2 and V3). As shown in Fig. 6, the vehicle S is the sender node. The forwarder nodes selected by the sender node could take one of the three road segments specifically A, B, and C (here we consider the vehicle is moving towards the same direction as the sender node; the vehicle velocity is known). For the proposed protocol, the loss probability for each coded segment is ( 2 3 )4 = 6 8. Therefore, the reception probability for the whole data block is ( 6 8 )3 ( ) 3 2 ( 6 8 )(6 8 )2 =.9. For the conventional routing protocols, the reception probability for the whole data block ( a and b ) is ( ( 2 3 )8 )( ( 2 3 )4 ) =.77. We can observe that the proposed protocol can significantly improve the packet delivery probability. Fig. 6. An example of intersection. C. Network coding-based data transmissions We use network coding to reduce the number of required transmissions while providing a high possibility of data delivery (see Algorithm ). For brevity, we explain the proposed protocol by using a simple example as shown in Fig. 6 and Fig. 7. The source node has to send two packets specifically a and b. In the proposed protocol, the sender nodes first sends a, then b, and finally a XOR b. If the RSU can receive any two of these three packets, the original data ( a and b ) can be retrieved. For the packet a, the sender node selects three different vehicles to forward the data considering the probability of meeting the RSU (as explained in the previous subsection, each vehicle has 3 probability to meet the RSU; in order to satisfy the sum of probability reaches, three vehicles are required). Similarly, the sender node does the same action for packet b and a XOR b. Fig. 7. An example of network coding-based data forwarding (replication). TABLE II TRANSMISSION PROCEDURE COMPARISON Time Slot No. 2 3 Sent data (Proposed) a b a XOR b Sent data (Conventional) a b a (or b) Forwarder group (Proposed) G G2 G3 Forwarder group (Conventional) G G G2 IV. SIMULATION RESULTS We used ns-2.34 [8] to conduct simulations for street scenarios. We evaluated the protocol s performance in various vehicle velocities and various vehicle densities. The vehicle 7

5 movement was generated by [9], [2]. The maximal vehicle velocity was 8 km/h, and the average transmission range was 25 m. We used a street scenario as shown in Fig. 8 and every street had two lanes in each direction. The distance between any two neighboring intersections was 4 m. We used IEEE 82.p MAC (2 Mbps) to simulate realistic VANET scenarios. Nakagami propagation model was used to simulate the channel fading (see Table III). We used these parameter values because they model a realistic wireless channel of VANETs [2]. In the simulations, one sender node was sending 4Mbytes data to the vehicular cloud. The proposed protocol was compared with EBRR [7]. The error bars indicate the 95% confidence intervals. TABLE III PARAMETERS OF NAKAGAMI MODEL gamma gamma gamma2 d gamma d gamma m m m2 d m d m 8 2 ratio of Proposed ( RSU) in 8km/h is larger than the one in 6km/h. Data delivery ratio EBRR ( RSU) EBRR (2 RSUs) Proposed ( RSU) Proposed (2 RSUs) Velocity of the sender node (km/h) Fig. 9. Data delivery ratio for various sender vehicle velocities (the results for RSU and 2 RSUs scenarios are the same for EBRR). B. Data delivery ratio for various vehicle densities Fig. shows the data delivery ratio for various node velocities. The velocity of the sender nodes was 6 km/h. The proposed protocol can significantly improve the data delivery ratio by using multiple forwarder nodes and network coding. When the number of possible candidate nodes is large enough, the proposed protocol can attain near percent data delivery ratio even in the -RSU scenario. Fig. 8. An example of simulation scenario. A. Data delivery ratio for various sender vehicle velocities Fig. 9 shows the data delivery ratio for various sender vehicle velocities (node S is the sender node in Fig. 8). The number of nodes in the transmission range was. By taking into account encounter duration and inter-meeting time, EBRR intends to choose a vehicle which has a lower relative velocity as the sender node (in most cases, inter-meeting time in street scenarios is large enough to neglect). Therefore, EBRR always selects only one forwarder node (the one which has the lowest relative velocity as the sender node), resulting in a small data delivery ratio. Since the proposed protocol can distribute the data using multiple forwarder nodes and also increase the data retrieval probability by using network coding, the data delivery ratio is significantly improved. In the figure, Proposed ( RSU) and Proposed (2 RSUs) denote the result of the proposed protocol in -RSU scenario (only RSU- was available) and 2-RSU scenario (two RSUs, specifically RSU- and RSU-2, were available) respectively. When the velocity of the sender node is higher, the probability of selecting more forwarder nodes is higher because the sender node could meet more vehicles. This is why the data delivery Data delivery ratio EBRR ( RSU) EBRR (2 RSUs) Proposed ( RSU) Proposed (2 RSUs) Number of nodes in the transmission range Fig.. Data delivery ratio for various numbers of vehicles in the transmission range (the results for RSU and 2 RSUs scenarios are the same for EBRR). C. Delay for various vehicle densities We simulated the proposed protocol for a larger scale vehicular network as shown in Fig. where the distance between any two neighboring intersections was 4 m. Fig. 2 shows the delay for various numbers of vehicles in the transmission range. Here, the delay denotes the elapsed time for transmitting the 4Mbytes data. The average length of traffic light was 3 7

6 ACKNOWLEDGMENT This research was supported in part by JST Strategic International Collaborative Research Program (SICORP). Fig.. Simulation scenario for large scale vehicular networks. seconds. The velocity of the sender node was 6km/h. The proposed protocol can reduce the data delivery delay significantly by improving the RSU encounter probability by using multiple forwarder nodes. The consideration of additional coverage factor for the forwarder selection also contributes to the short delay. Delay (s) EBRR Proposed Number of nodes in the transmission range Fig. 2. Delay for various numbers of vehicles in the transmission range. V. CONCLUSIONS AND FUTURE WORK We proposed a framework which utilizes vehicular delay tolerant network (DTN) to provide communication for postdisaster management, and then designed a routing protocol for vehicle-to-rsu commination in this framework. The routing protocol takes into account the achievable throughput between the sender and forwarder node, additional radio coverage of the forwarder node, and connection time between the sender and the forwarder node. The protocol also conducts a networkcoding based data replication by considering RSU encounter probability. Through computer simulations, we confirmed the advantages of the proposed protocol over a recent DTN protocol. In future work, we will discuss the downlink transmission (RSU-to-vehicle) for the proposed framework. The combination of multi-hop transmission and DTN protocols is also considered as a future work. REFERENCES [] D. Lin, J. Kang, A. Squicciarini, Y. Wu, S. Gurung, and O. Tonguz, MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs, IEEE Trans. Mobile Comput., DOI:.9/TMC , 26. [2] C. Wu, S. Ohzahata, Y. Ji, and Toshihiko Kato, How to Utilize Interflow Network Coding in VANETs: A Backbone-Based Approach, IEEE Trans. Intell. Transp. Syst., vol.7, no.8, pp , 26. [3] C. Wu, Y. Ji, F. Liu, S. Ohzahata, and Toshihiko Kato, Toward Practical and Intelligent Routing in Vehicular Ad Hoc Networks, IEEE Trans. Veh. Technol., vol.64, no.2, pp , 25. [4] M. H. Eiza and Q. Ni, An Evolving Graph-Based Reliable Routing Scheme for VANETs, IEEE Trans. Veh. Technol., vol.62, no.4, pp , 23. [5] R. Jiang, Y. Zhu, T. He, Y. Liu, and L.M. Ni, Exploiting Trajectory- Based Coverage for Geocast in Vehicular Networks, IEEE Trans. Parallel and Distrib. Syst., vol.25, no.2, pp , 24. [6] C.-M. Huang and S.-Y. Lin, Timer-based greedy forwarding algorithm in vehicular ad hoc networks, IET Intelligent Transport Systems, vol.8, no.4, pp , 24. [7] P.R. Pereira, A. Casaca, J.J.P.C. Rodrigues, V.N.G.J. Soares, J. Triay, and C. Cervello-Pastor, From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks, IEEE Commun. Surveys Tuts., vol.4, no.4, pp.66-82, 22. [8] M.J. Khabbaz, C.M. Assi, and W.F. Fawaz, Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges, IEEE Commun. Surveys Tuts., vol.4, no.2, pp.67-64, 22. [9] S.M. Tornell, C.T. Calafate, J.-C. Cano, and P. Manzoni, DTN Protocols for Vehicular Networks: An Application Oriented Overview, IEEE Commun. Surveys Tuts., vol.7, no.2, pp , 25. [] M. J. Khabbaz, H. M. K. Alazemi, and C. M. Assi, Delay-Aware Data Delivery in Vehicular Intermittently Connected Networks, IEEE Trans. Commun., vol.6, no.3, pp.34 43, 23. [] M. J. Khabbaz, W. F. Fawaz, and C. M. Assi, Modeling and Delay Analysis of Intermittently Connected Roadside Communication Networks, IEEE Trans. Veh. Technol., vol.6, no.6, pp , 22. [2] Y. Li, D. Jin, Z. Wang, L. Zeng, and S. Chen, Coding or Not: Optimal Mobile Data Offloading in Opportunistic Vehicular Networks, IEEE Trans. Intell. Transp. Syst., vol.5, no., pp , 24. [3] D. Niyato and P. Wang, Optimization of the Mobile Router and Traffic Sources in Vehicular Delay-Tolerant Network, IEEE Trans. Veh. Technol., vol.58, no.9, pp , 29. [4] A. Agarwal, D. Starobinski, and T.D.C. Little, Phase Transition of Message Propagation Speed in Delay-Tolerant Vehicular Networks, IEEE Trans. Intell. Transp. Syst., vol.3, no., pp , 22. [5] A. Balasubramanian, B. N. Levine, and A. Venkataramani, Replication Routing in DTNs: A Resource Allocation Approach, IEEE/ACM Trans. Networking, vol.8, no.2, pp , 2. [6] Y. Cai, Y. Fan, and D. Wen, An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks, IEEE Trans. Veh. Technol., vol.65, no., pp , 26. [7] Y. Cao, N. Wang, Z. Sun, and H. Cruickshank, A Reliable and Efficient Encounter-Based Routing Framework for Delay/Disruption Tolerant Networks, IEEE Sensors Journal, vol.5, no.7, pp.44 48, 25. [8] The Network Simulator - ns-2, Accessed on Dec. 23, 25. [9] D. Krajzewicz, G. Hertkorn, C. Rossel and P. Wagner, SUMO (Simulation of Urban MObility): An open-source traffic simulation, Proc. 4th Middle East Symposium on Simulation and Modelling (MESM22), SCS European Publishing House, pp.83 87, 22. [2] TraNS (Traffic and Network Simulation Environment), Accessed on Feb. 23, 2. [2] A. Khan, S. Sadhu, and M. Yeleswarapu, A comparative analysis of DSRC and 82. over Vehicular Ad hoc Networks, Project Report, University of California, Santa Barbara, pp. 8,

A Reinforcement Learning-based Data Storage Scheme for Vehicular Ad Hoc Networks

A Reinforcement Learning-based Data Storage Scheme for Vehicular Ad Hoc Networks This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TVT.26.2643665,

More information

Computational Intelligence Inspired Data Delivery for Vehicle-to-roadside Communications

Computational Intelligence Inspired Data Delivery for Vehicle-to-roadside Communications This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TVT.28.28766,

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,350 108,000 1.7 M Open access books available International authors and editors Downloads Our

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

Intelligent Transportation System For Vehicular Ad-Hoc Networks

Intelligent Transportation System For Vehicular Ad-Hoc Networks INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 6 69 Intelligent Transportation System For Vehicular Ad-Hoc Networks T. Sujitha, S. Punitha Devi Department

More information

A Beacon Rate Control Scheme Based on Fuzzy Logic for Vehicular Ad-hoc Networks

A Beacon Rate Control Scheme Based on Fuzzy Logic for Vehicular Ad-hoc Networks 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology A Beacon Rate Control Scheme Based on Fuzzy Logic for Vehicular Ad-hoc Networks Ning Wang 1,

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

Routing Protocol with Quality Optimization for Vehicular Ad Hoc Networks

Routing Protocol with Quality Optimization for Vehicular Ad Hoc Networks Routing Protocol with Quality Optimization for Vehicular Ad Hoc Networks E. Priyanka 1, M.Vijaya Kanth 2 M.Tech, Department of CSE, JNTUACE, Ananthapuramu, Andhra Pradesh, India 1 Lecturer, Department

More information

Hybrid Routing Scheme for Vehicular Delay Tolerant Networks

Hybrid Routing Scheme for Vehicular Delay Tolerant Networks Hybrid Routing Scheme for Vehicular Delay Tolerant Networks Sayed Fawad Ali Shah 1, Mohammad Haseeb Zafar 1,2, Ivan Andonovic 2 and Tariqullah Jan 1 1 Department of Electrical Engineering, University of

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

ENSC 427, Spring 2012

ENSC 427, Spring 2012 ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Data Pouring and Buffering on The Road: A New Data Dissemination Paradigm for Vehicular Ad Hoc Networks

Data Pouring and Buffering on The Road: A New Data Dissemination Paradigm for Vehicular Ad Hoc Networks Data Pouring and Buffering on The Road: A New Data Dissemination Paradigm for Vehicular Ad Hoc Networks Jing Zhao, Yang Zhang and Guohong Cao Department of Computer Science and Engineering The Pennsylvania

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Mobile-Gateway Routing for Vehicular Networks 1

Mobile-Gateway Routing for Vehicular Networks 1 Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia

More information

An Efficient Message Protocol Using Multichannel with Clustering

An Efficient Message Protocol Using Multichannel with Clustering An Efficient Message Protocol Using Multichannel with Clustering Jaejeong Lee 1 and Byoungchul Ahn 2* Dept. of Computer Engineering, Yeungnam University, Gyeongsan, Korea. *Corresponding author: Byoungchul

More information

Car-2-X Simulations: Dezentrale Systeme und Netzdienste Institut für Telematik. Dr. Jérôme Härri

Car-2-X Simulations: Dezentrale Systeme und Netzdienste Institut für Telematik. Dr. Jérôme Härri Car-2-X Simulations: Tools, Methodology, Performance Results Dezentrale Systeme und Netzdienste Institut für Telematik Dr. Jérôme Härri With help of J. Mittag, F. Schmidt-Eisenlohr, M. Killat T. Tiellert,

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks

A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks Saeed Fathi Ghiri 1 and Morteza Rahmani and Hassan Almasi 2 1 Department of Computer Engineering, Azad University

More information

Evaluation of Effective Vehicle Probe Information Delivery with Multiple Communication Methods

Evaluation of Effective Vehicle Probe Information Delivery with Multiple Communication Methods Communications and Network, 2015, 7, 71-80 Published Online May 2015 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/10.4236/cn.2015.72007 Evaluation of Effective Vehicle Probe Information

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS Information Management and Business Review Vol. 6, No. 3, pp. 115-120, Jun 2014 (ISSN 2220-3796) Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS * Kashif Naseer Qureshi, Abdul Hanan Abdullah

More information

Design and Implementation of Vehicular Network Simulator for Data Forwarding Scheme Evaluation

Design and Implementation of Vehicular Network Simulator for Data Forwarding Scheme Evaluation 2017 31st International Conference on Advanced Information Networking and Applications Workshops Design and Implementation of Vehicular Network Simulator for Data Forwarding Scheme Evaluation Bien Aime

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

High Throughput in MANET Using relay algorithm and rebroadcast probability

High Throughput in MANET Using relay algorithm and rebroadcast probability RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,

More information

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Performance Evaluation of Adaptive Control Channel Interval in VANET Based on Network Simulation Model

Performance Evaluation of Adaptive Control Channel Interval in VANET Based on Network Simulation Model Performance Evaluation of Adaptive Control Channel Interval in VANET Based on Network Simulation Model Rendy Munadi Doan Perdana Shalahuddin Al Ayyubi rendymunadi@telkomuniversity.ac.id doanperdana@telkomuniversity.ac.id

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

AN ADAPTIVE BROADCAST MECHANISM TO IMPROVE ALERT MESSAGE DISSEMINATION IN VANETS

AN ADAPTIVE BROADCAST MECHANISM TO IMPROVE ALERT MESSAGE DISSEMINATION IN VANETS AN ADAPTIVE BROADCAST MECHANISM TO IMPROVE ALERT MESSAGE DISSEMINATION IN VANETS Nidhin A S 1, Vinaya K 2 1 PG Scholar, Computer Science & Engineering Department, KCG College of Technology, Chennai, India

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Study on and Outdoor for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Ibrahim khider,prof.wangfurong.prof.yinweihua,sacko Ibrahim khider, Communication Software and

More information

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes Nobuhisa Komatsu, Masahiro Sasabe, and Shoji Kasahara Graduate School of Information Science, Nara Institute

More information

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School

More information

VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks

VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks This paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at VeMAC: A Novel Multichannel MAC Protocol for Vehicular Ad Hoc Networks Hassan Aboubakr

More information

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET R. Nirmala 1, R. Sudha 2 Assistant Professor, Department of Computer Science, K.S.R College of Arts & Science (Autonomous),

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Network Connectivity Analysis of VANET using Fuzzy Logic Controller

Network Connectivity Analysis of VANET using Fuzzy Logic Controller Network Connectivity Analysis of VANET using Fuzzy Logic Controller Poonam Rathore 1 and Laxmi Shrivastava 2 1,2 Department of Electronics and Communication, Madhav Institute of Technology and Science,

More information

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET K. Lakshmi 1, K.Thilagam 2, K. Rama 3, A.Jeevarathinam 4, S.Manju Priya 5. 1,3&4 Lecturer, Dept. of Computer Applications,

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks

Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks RESEARCH Open Access Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks Kaouther Abrougui 1,2*, Azzedine Boukerche 1,2 and Hussam Ramadan 3 Abstract

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION ABSTRACT 1st International Conference on Applied Soft Computing Techniques 22 & 23.04.2017 In association with International Journal of Scientific Research in Science and Technology Optimal Polling Point

More information

A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET

A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET Khaleel Husain and Azlan Awang Abstract Receiver-based data forwarding schemes are well suited for vehicular environment due

More information

TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks

TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks 2017 31st International Conference on Advanced Information Networking and Applications Workshops TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular Networks JunSik Jeong, Yiwen

More information

A Dynamic Time Scalable Hybrid Location based Ad hoc Routing Protocol

A Dynamic Time Scalable Hybrid Location based Ad hoc Routing Protocol A Dynamic Time Scalable Hybrid Location based Ad hoc Routing Protocol Priyanka P Jadhav 1, Manoj M. Dongre 2 1, 2 Electronics and Telecommunication Department, Ramrao Adik Institute of Technology, Navi

More information

SNR-BASED DYNAMIC MANET ON DEMAND ROUTING PROTOCOL FOR VANET NETWORKS

SNR-BASED DYNAMIC MANET ON DEMAND ROUTING PROTOCOL FOR VANET NETWORKS SNR-BASED DYNAMIC MANET ON DEMAND ROUTING PROTOCOL FOR VANET NETWORKS Mohamed Elshaikh, Ong Bi Lynn, Mohd Nazri bin Mohd Warip, Phak Len Ehkan, Fazrul Faiz Zakaria and Naimah Yakoob School of Computer

More information

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks

MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks MobiT: A Distributed and Congestion- Resilient Trajectory Based Routing Algorithm for Vehicular Delay Tolerant Networks Li Yan, Haiying Shen and Kang Chen ACM/IEEE IoTDI Pittsburgh, USA April 2017 Playground

More information

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology Circulation in Computer Science Vol.2, No.7, pp: (9-13), August 2017 https://doi.org/10.22632/ccs-2017-252-41 Performance Analysis of IEEE 802.15.4 based Sensor Networks for Large Scale Tree Topology Ziyad

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Research Article Multihop Data Delivery Virtualization for Green Decentralized IoT

Research Article Multihop Data Delivery Virtualization for Green Decentralized IoT Hindawi Wireless Communications and Mobile Computing Volume 7, Article ID 985784, 9 pages https://doi.org/.55/7/985784 Research Article Multihop Data Delivery Virtualization for Green Decentralized IoT

More information

An Integrated Framework for Fog Communications and Computing in Internet of Vehicles

An Integrated Framework for Fog Communications and Computing in Internet of Vehicles University of Florence Department of Information Engineering An Integrated Framework for Fog Communications and Computing in Internet of Vehicles Alessio Bonadio, Francesco Chiti, Romano Fantacci name.surname@unifi.it

More information

ITS (Intelligent Transportation Systems) Solutions

ITS (Intelligent Transportation Systems) Solutions Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Message Routing in Vehicular Delay-Tolerant Networks Based on Human Behavior

Message Routing in Vehicular Delay-Tolerant Networks Based on Human Behavior Message Routing in Vehicular Delay-Tolerant Networks Based on Human Behavior Gil Eduardo de Andrade, Luiz A. de Paula Lima Jr., Alcides Calsavara, José Aélio de Oliveira Jr., Gisane Michelon Post-Graduate

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM D.Yamini 1, J. Jayavel 2 1 III-M.tech(IT), Department of Information technology,

More information

Achieving Data Utility Fairness in Periodic Dissemination for VANETs

Achieving Data Utility Fairness in Periodic Dissemination for VANETs Achieving Data Utility Fairness in Periodic Dissemination for VANETs Ramon S. Schwartz, Anthony E. Ohazulike and Hans Scholten {r.s.schwartz, a.e.ohazulike, hans.scholten}@utwente.nl University of Twente

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

A Simulation Framework for V2V Wireless Systems

A Simulation Framework for V2V Wireless Systems A Simulation Framework for V2V Wireless Systems CHRISTIAN NELSON, CARL GUSTAFSON, FREDRIK TUFVESSON DEPARTMENT OF ELECTRICAL AND INFORMATION TECHNOLOGY, LUND UNIVERSITY, SWEDEN IN COLLABORATION WITH ALEXEY

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Performance Evaluation of VoIP over VANET

Performance Evaluation of VoIP over VANET (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of VoIP over VANET Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com Publishing

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information