A CONTEXT-BASED VEHICULAR COMMUNICATION PROTOCOL

Size: px
Start display at page:

Download "A CONTEXT-BASED VEHICULAR COMMUNICATION PROTOCOL"

Transcription

1 (PIMRC24), to be held in Barcelona, Spain, 5-8 September 24 A CONTEXT-BASED VEHICULAR COMMUNICATION PROTOCOL Ioan Chisalita and Nahid Shahmehri Department of Computer and Information Science, Linköping University, S , Linköping, Sweden Phone: , Fax: , {ioach, nahsh}@ida.liu.se Abstract Research in traffic safety has indicated that active safety systems provide a better service to drivers when they use data about nearby vehicles. For supplying such information inter-vehicle communication is employed. In this paper we propose a distributed communication protocol that allows the vehicles to organize the communication network in a decentralized manner. For information dissemination we use an anonymous contextbased broadcast protocol. The receivers determine whether they are the intended destination of sent messages based on knowledge about their local environment. Simulation results indicate that the proposed protocol performs well in terms of communication performance and filtering of the received information. Keywords: inter-vehicle communication, context-based protocol, anonymous broadcast. I. INTRODUCTION Accident statistics reveal that every year half a million people loose their lives due to traffic accidents [1]. Extensive costs are also related with car crashes [1][2]. Therefore, traffic accidents became a major issue of concern for the society and their reduction is considered very important by the automotive industry and transport safety administrations [3]. Consequently, efforts were directed towards studying and designing technologies that make it possible to develop systems that can help in avoiding accidents [4][5]. Within these developments, the intervehicle communication, used for providing the exchange of data between vehicles, is considered a key technology [2][6]. The use of onboard safety systems that analyze not only data describing the immediate surrounding of a vehicle, but also data provided by other vehicles for accurately detecting hazards in traffic, is predicted to lead to a major reduction of the amount and severity of crashes [6][7]. The design of an efficient vehicular communication system poses a series of technical challenges. The communicating hosts are moving at high speed and the communication links need to be established frequently. This requires a highly dynamic management of the links. Strict requirements on the latency of the data dissemination need to be fulfilled for traffic safety applications. The communication may also imply exchange of data between hosts whose identities are not known by default. Other important aspects that need to be considered when designing a vehicular communication system are the extent of the service area, the required bandwidth, the forwarding of information and the adaptability to the environment [8]. Several approaches using dedicated infrastructures, cellular networks or direct communication have been considered for developing vehicular communication systems. In [8] we have provided an investigation of these solutions, and selected the direct communication between vehicles as the most appropriate alternative for supporting safety applications. Within this solution a vehicle equipped with a communication device (e.g. a transceiver) is referred to as a host. These hosts exchange safety-related data (e.g. vehicle location, road status) that is used by in-vehicle active safety systems (e.g. collision warning and avoidance systems) for determining risks associated with road traffic. II. RELATED WORK The vehicular network we address in this work is an ad-hoc network. For this type of network, there exist proactive and reactive routing protocols intended to provide efficient data dissemination. We introduce these solutions and discuss impediments that can hinder their use in vehicular networks. Examples of proactive protocols are Wireless Routing Protocol (WRP) and Destination-Sequenced Distance- Vector routing protocol (DSDV) [9]. These protocols require a host to maintain consistent routing information that describes how a packet can be transmitted throughout the network from one host to another. Each host maintains a number of routing tables reflecting the host s view of the network. For consistency reasons, each host needs to announce to the other hosts the modifications of its view. Examples of reactive protocols are Ad-hoc On-demand Distance Vector routing protocol (AODV) and Temporally Ordered Routing Algorithm (TORA) [9]. These protocols create routes only when a sender host needs to transmit data to another host. The establishment of a route is performed using route discovery mechanisms that are specific to each protocol. A route is maintained until the destination is no longer reachable or until the route is not needed anymore. An important feature of some routing protocols for adhoc networks is the use of geographic information (i.e. host position) when forwarding data [1]. An example is the Location-Aided Routing (LAR) where the destination of a packet is indicated by a combination of an identifier of the destination and an estimation of its position. One of the issues that hinder the applicability of the above mentioned protocols to vehicular communication is the anonymity of the hosts. In traffic safety applications a vehicle needs to receive information from a number of vehicles in its proximity rather than receiving data from a specific vehicle. It is not feasible for a vehicle to maintain

2 (PIMRC24), to be held in Barcelona, Spain, 5-8 September 24 the identities of any other vehicle that may receive data sent by it. Consequently, it is an advantage in not requiring a sending vehicle to know the addresses of nearby vehicles. It is still possible to provide a vehicle with the identities of neighboring vehicles using dedicated packets. However, this may lead to communication overload due to the transmission and forwarding of a large number of packets. It also introduces latency in providing the needed safetyrelated data to vehicles. Therefore, routing protocols that require the sender to know the identity of the receiver do not work well for safety-oriented vehicular communication. The vehicular environment is very dynamic as vehicles frequently change their driving orientation and randomly exit and join the roads. Consequently, the vehicular network can often be fragmented. Therefore, the maintenance of a consistent view of the network as required by proactive protocols would be extremely difficult. It would also lead to communication overload and to high delays in data provision since a large number of route updates need to be performed. The dynamic of traffic also hinders the use of protocols that require position estimation when forwarding data since these can be inaccurate. The issues mentioned above indicate the need for developing a new vehicular communication protocol that does not require knowledge of the network topology (e.g. neighboring hosts addresses) or updates of routes. III. PROPOSED PROTOCOL The vehicular communication protocol needs to provide the exchange of safety-related data between vehicles. Since this information is used for determining the risks in traffic, it needs to be disseminated in a timely manner. The protocol also needs to provide reliable communication between a possibly large number of hosts. The random establishment of links and frequent link failures need to be considered. Forwarding of data may be necessary if line-of-sight communication is not possible. Further, the vehicles should be able to select the important data from the received information. Also, the size of the exchanged data should be reasonably low for not overloading the communication. Furthermore, the vehicles need to be able to send both regular data describing their momentary view of the traffic and diverse notifications about events in traffic. Considering these requirements, we propose an anonymous context-based broadcast protocol. Our protocol can be seen as a reactive protocol where the communication is performed using anonymous broadcast for disseminating short messages between hosts. Each host broadcasts messages that can be received and accepted by other hosts within its transmission range. We did not consider the addresses of the communicating hosts to be a priori known and our protocol requires the receivers to analyze the content of the received messages for determining if the embedded data is of importance. When the information in a received message is important for traffic safety, the receiver accepts the message and uses the data contained by it. Otherwise, the message is dropped. Based on the content of the message, the receiver can decide to forward the message. We refer to the process of analyzing, considering, dropping or forwarding a message by a host as information filtering and forwarding. This process is implemented by algorithms that take into consideration elements related with the momentary traffic situation of the receiving host (e.g. host position, relative distance to sender). Therefore, the communication protocol is called context-based. The proposed protocol makes it possible to achieve a small latency in data provision and to accommodate random communication between hosts. The use of short messages facilitates the efficient utilization of the communication channel. A reliable dissemination of safety data can also be achieved when messages are sent frequently enough for the hosts to receive them at short intervals. By defining different types of messages the protocol provides both regular data exchange and event-based communication. The information filtering assures that the receiving hosts are provided with data of importance for their momentary traffic situation. Based on the received data, the hosts aggregate in local networks. In this work we have considered a host-oriented approach for organizing these networks [11]. In this approach, each host defines, constructs and maintains its own local network. Thus, each host takes the role of an organizer host by analyzing the information received from other hosts and deciding which of them should belong to its own local network. This group of hosts is continually updated. With regard to diverse traffic situations it is common that vehicles in the close vicinity have data of interest for each other. Therefore, we assumed a limited space and composition for a local network. The number of hosts that can coexist at any moment in a local network was limited to a Maximum Number of Hosts (MNH, e.g. 15). The geographical extent of a local network was limited to a Service Area Threshold (SAT, e.g. 3 meters). In our communication protocol we defined different types of messages for data dissemination. Since the constant update of data describing the traffic is needed for each host, we defined Basic Safety Messages (BSM) that are sent over regular time intervals. These messages contain information that describes the sending host s momentary view of the traffic situation. Further, there are traffic events that can trigger the sending of notifications. Examples are the detection of an accident or when the driver requires some specific data. For a host to be able to send notifications about such events we defined dedicated messages (e.g. warning, infotainement, and service request messages). In our proposal we assumed that each host is equipped with accurate positioning devices such as Global Positioning System (GPS) receivers. This assumption is feasible since the market penetration of positioning devices is rapidly growing [2], and the accuracy of these devices can be less than one meter [3][6].

3 (PIMRC24), to be held in Barcelona, Spain, 5-8 September 24 Security and privacy are issues of concern in vehicular networks and we have identified different security requirements for our proposed protocol. However, in this paper we did not address security aspects and rather focus on the functionality of the communication protocol. IV. THE PROTOCOL FUNCTIONALITY The functionality of the protocol relies on the following rules for information management: Acceptance of a message by a host: a received basic safety message is accepted if the information filtering process indicates that the message contains data of interest. Messages other than basic safety messages and warning messages are not accepted if the receiving host does not maintain data about the sender at the receiving moment. Local maintenance of data describing senders: a host H maintains data about a sending host S as long as within a time interval TR another basic safety message from S is accepted by H. If this event does not happen, H removes all information about S. Each time a new basic message is received and accepted by a host H, the time interval TR related with this record is reinitialized. Transmission of basic safety messages: a host regularly transmits basic safety messages at short intervals. A timer TB is associated with the transmission of these messages and initialized each time a message is transmitted. When this timer triggers, a new BSM is created and transmitted. Transmission of messages other than basic safety messages: messages other than BSM are transmitted as the result of events that appear in traffic. The conceptual functionality of the communication protocol for reception of messages is illustrated in figure 1. Received Message Information Filtering Write data in database Accept Message Communication System Timer Message Not Accepted Drop message Communication System Database Delete outdated records Figure 1. Communication protocol conceptual functionality In this paper we focus on the exchange of Basic Safety Messages (BSM), which structure is presented in figure 2. TID is a type identifier of the host, SID is the sender host identity and MSqn is the message sequence number. The type identifier can be used for characterizing hosts other than vehicles (e.g. roadside servers [11]). However, in this paper we consider all hosts to be vehicles. PS1 and PS2 are two consecutive most recent positioning data of the host and VSp is its speed and VHd its heading. VSt is the status of the host - we currently consider two generic values, good and poor. HIDs are the identities of the other hosts from the same local network as the sender, and NH is their number. RT is the road type (i.e. divided or undivided), RID is the road identity and RSp is the speed limit on the road. RSl is the road slipperiness indication - we currently consider two values, slippery and dry. The fields marked with * are used if the data can be provided by some onboard system. TID SID MSqn PS1 PS2 VSp VSt VHd* HIDs RID* RT* RSl* NH RSp* Figure 2. Basic safety message structure Another important type of messages are the Warning Messages (WAM), which provide indications about events that appear in traffic. These messages include the position of such events and a description of them. The proposed protocol provides a flexible mechanism for the host to accept warnings based on their importance [8]. The warning messages are subject to retransmission based on counters. Due to the anonymous broadcast and the dynamic selfmanagement of the network, the need for forwarding messages (i.e. routing) is reduced to those cases when the hosts can not directly exchange data due to transmission problems (e.g. interference, shadowing). Still, routing is necessary and we propose the use of an automatic mediation mechanism based on the characteristics of hosts that are able to directly communicate. As shown in the BSM structure, each host indicates the other hosts that are part of its local network. When a host accepts a message, it analyzes its local network composition to determine if there are hosts that may be interested in this message. These are hosts that also indicate that they did not receive (yet) the message. As analysis method we used a basic approach that compares the distance between the current sender and the other hosts with a threshold value that was set to SAT. Thus, if this distance is lower than SAT the accepted message is retransmitted. The information filtering is performed using decision mechanisms implemented as IF-THEN rules based on analyses of traffic situations and guidelines provided for collision avoidance systems (e.g. as in [3][4][5]). These rules take into consideration a number of parameters. Primary parameters are provided by the receiver s internal sensors and by data contained within accepted BSMs. They are the identity, velocity, heading, position records and status of the sender and the receiver, the properties (i.e. type, slipperiness and speed limit) of the roads they travel on, and the number of hosts in the receiver s local network. Derived parameters, obtained by analyzing primary parameters are: Relative distance between sender and receiver. Similar heading: we estimated if two vehicles travel in the same direction by evaluating the difference between their headings and compare it with a threshold value. If the difference is smaller than this value, the vehicles are considered to travel in the same direction. We have used 9 o as the threshold value (the reference was North). Hosts on the same road: we estimated if two hosts are situated on the same road. The employed algorithm analyses the movement vectors of the vehicles between their two successive positioning records. The angle between these vectors is evaluated and, if close to o or 18 o, the vehicles are considered to be on the same road.

4 (PIMRC24), to be held in Barcelona, Spain, 5-8 September 24 Relative positioning of two hosts: we evaluated if a vehicle is behind or ahead of another vehicle. We used an algorithm that analyses the angle between the vector given by the two consecutive positions of a vehicle and the vector between the latest positions of the considered vehicles. This angle is compared with 9 o and indicates if a vehicle is ahead of or behind the other vehicle. Possibility of route contention: we evaluated if two vehicles can meet at an intersection. Using the two consecutive positions of the vehicles we first determined if an intersection point exists and calculated its coordinates. We then evaluated using the latest values of the vehicles velocities when they can arrive at the intersection point and compare these values. We then relaxed the requirement on strict equality of these time moments, and introduced a contention interval for modeling the dimension of vehicles and small variation of their speed. We note that some of the derived parameters can also be determined using positioning data and digital maps if these are available on vehicles [8]. A set of information filtering rules is presented in figure 3. The filtering process is intended to prevent a vehicle from receiving useless or misleading data. We note that the rules presented here are a proof of concept, being an example that we used in our work. The main aspects considered for defining these rules were: a limited number of vehicles in close proximity usually have important data, vehicles in front or behind on the same lane have data of interest, vehicles coming from an opposite direction may constitute a danger on undivided roads, and vehicles may collide if they arrive at an intersection at the same time (e.g. [3][4][12]). Exclusion rule: The Euclidean distance between the sender and the receiver is less than SAT. Regular rules: The sender and the receiver travel on the same road and have similar heading and [the receiver maintains data about less that MNH hosts or the sender is closer to the receiver than the farthest host previously considered]. The sender and receiver travel on the same undivided road and have different headings and the sender is ahead of the receiver and [the road is slippery or the sender status is poor or the sender speed is excessive] and [the receiver maintains data about less than MNH hosts or the sender is closer to the receiver than the farthest host previously considered]. The sender and the receiver travel on different roads and a route contention is detected and [the receiver maintains data about less than MNH hosts or the sender is closer to the receiver than the farthest host previously considered]. Figure 3. Information filtering rules When both the exclusion rule and one of the regular rules hold at the same time, the sender is considered of interest and the receiver accepts the message and uses the data. V. SIMULATION ENVIRONMENT AND RESULTS To investigate the performances of our protocol, we implemented it within the application layer of the GloMoSim mobile network simulator. Within our simulations we used realistic movement traces of vehicles, which were inputs for GloMoSim. We have generated these traces by constructing a traffic simulator that implemented the car-following model proposed in [13]. We defined four metrics for evaluating the performances of our protocol: message delay, packet collision, send errors and information filtering rate. These metrics were evaluated for exchange of basic messages and are described below. The message delay represents the time between the sending of a message and the moment when it is accepted by a host. The send errors represents the number of messages that could not be sent by a host due to transmission problems. The packet collision represents the sum of all collisions observed by all nodes during a simulation run. We note that the same collision can be counted several times. The information filtering rate is the ratio between the number of messages accepted and the number of messages received by a host. It is a measure of how much useful information can be extracted from the received data. For each simulation run, the results were averaged over the number of hosts. As free parameters we used the transmission interval for basic safety messages (i.e. TB), the network load (i.e. density of hosts) and the service communication area (i.e. SAT). We discuss in the following the results obtained by simulating for 12 seconds the communication between vehicles traveling on a 5-km bi-directional road and having the maximum values for speed, acceleration and deceleration as 36 m/s, 1 m/s 2 and -4,5 m/s 2 respectively. MNH was 15 and SAT was 3 m. When not modified, the vehicle density was 6 vehicles/km/lane. All vehicles were considered equipped with transceivers modeling signal-tonoise bounded radios at 2.4 GHz with a 2 Mbits bandwidth, 9dBm as transmission power and non-persistent CSMA as the medium access control (MAC) scheme. The propagation model was free space. The initial time point for sending basic safety messages was randomized between and.1 s. Figure 4 shows the message delay for modification of the communication service area and the transmission interval. We usually obtained small values for delay, which indicates that timely provision of safety-related data is possible. Higher delay values were obtained for low values of the transmission interval (i.e. less than.1 s). This indicates that the hosts were not able to efficiently use the medium and the sent messages collided frequently. For small transmission intervals, an extensive use of routing was noticed and led to an increase of traffic and larger delays. The message delays increased when the service area was larger than 3 meters and when the load density was high. This shows that the protocol works better for small (e.g. 3m) local networks Transmission Interval [s ec ] Figure 4. Delay for accepted basic safety messages

5 (PIMRC24), to be held in Barcelona, Spain, 5-8 September 24 The collisions and send errors for modification of the transmission interval are represented in figure 5. The number of collisions and send errors followed the same pattern. Since the vehicles tried to send their data very often when using small values of the transmission interval (i.e. less than.5 sec), a large number of collisions and send errors occurred. However, when the transmission interval was increased (i.e. over.1 s), the number of collisions and send errors decreased significantly. The number of collisions for modification of the load density and the communication service area are presented in figure 6. The number of collisions was low for communication areas less than 3 meters. An extensive increase of the number of collisions was obtained when increasing the load density. This was expected since more hosts competed for the transmission medium. Still, the large number of collisions obtained for high load densities indicates that more advanced MAC schemes and techniques (e.g. jittering) for avoiding synchronization of hosts need to be investigated Lo a d De ns ity [ve h/km /lane ] Figure 6. Collisions Communication Area and Load Density,4,3,2, Figure 5. Send errors and Collisions Transmission Interval Figure 7. Information filtering rate Figure 7 presents the information filtering rate when modifying the communication area and the transmission interval. The metric had lower values for small transmission intervals and stabilized around.25 for intervals larger than.1 s. For small communication areas, the metric exhibited small values, and then stabilized around.3 for larger areas (i.e. more than 3 meters). Further, the increase of the load density (not presented in figures) determined a decrease of the information filtering rate since more messages of no interest arrived at a host. Generally, in all simulations a major filtering of messages (i.e. 25%-35%) was noticed. This indicates the advantage of using the filtering technique when receiving data about vehicles in traffic. We also noticed an improvement of the bandwidth utilization when comparing our proposed protocol with a classic floodingbased broadcast protocol under the same conditions.,6,4,2 1 2 VI. CONCLUSION AND FUTURE WORK We have presented an approach to disseminating safetyrelated information in vehicular networks. We proposed a protocol that requires the receivers to analyze the content of exchanged messages for deciding if they are the intended destination of a message. This filtering of received data is performed considering the momentary traffic situation of the receiving vehicle. Simulations were conducted for variations of parameters of the communication protocol, and variations of the road traffic dynamics. The obtained results indicate that the communication between vehicles can be efficiently performed under certain settings of the proposed protocol. Future work will focus on extensions of the communication protocol. Techniques that allow an improvement of the communication performances and the dissemination of warning messages need to be further investigated. Extensions and a formal definition of the information filtering rules are also of interest. REFERENCES [1] International Road Traffic and Accident Database, Road Traffic Data and Accident Traffic Data, Feb 24. [2] Jones W. D., Keeping cars from crashing, IEEE Spectrum, vol. 38, pp. 4-45, Sep. 21. [3] Miller R., Huang Q. An adaptive peer-to-peer collision warning system, Vehicular Technology Conference, Birmingham, USA, pp , May 22. [4] R. Kiefer, D. LeBlanc; M. Palmer; J. Salinger; R. Deering; "Development and Validation of Functional Definitions and Evaluation Procedures for Collision Warning/Avoidance System", National Highway Traffic Safety Administration, USA, Aug [5] Talmadge S., Chu R., Eberhard C., Jordan K., Moffa P., "Performance Specifications for Collisions Avoidance Systems for Lane Change Crashes", TRW Space and Defense, USA,Aug. 2. [6] Kato S., Tsugawa S., Tokuda K., Matsui T., Fujii H., Vehicle control algorithms for cooperative driving with automated vehicles and intervehicle communications, IEEE Transactions on Intelligent Transportation Systems, no. 3, pp , Sept. 22. [7] Andrisano O., Verdone R., Nakagawa M., Intelligent transportation systems: the role of third generation mobile radio networks, IEEE Communication Magazine, pp , 9/2. [8] Chisalita I, Safety-oriented communication in mobile networks for vehicles (tentative title), Licentiate Thesis, Linköping University, Sweden (forthcoming 24). [9] Royer E.M., Toh C.K., A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal Communications, Vol. 6, Issue 2, pp , Apr [1] Mauve M., Widmer A., Hartenstein H., A survey on positionbased routing in mobile ad hoc networks, IEEE Network, Vol. 15, Issue 6, pp. 3-39, Nov.-Dec. 21. [11] Chisalita I., Shahmehri N. A peer-to-peer approach to vehicular communication for the support of traffic safety applications, ITSC 22, Singapore, pp , Sept. 22. [12] Najm W., Sen B., Smith J., Campbell B., Analysis of Light Vehicle Crashes and Pre-Crash Scenarios Based on the 2 General Estimates System, National Highway Traffic Safety Administration, USA, Feb 23. [13] Krauss S., Microscopic Modeling of Traffic Flow, PhD thesis, University of Cologne, Apr

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Jatinder Pal Singh, Nicholas Bambos Department of Electrical Engineering Stanford University, CA 943 {jatinder, bambos}@stanford.edu

More information

Safety and Infotainment Communications for Vehicles Opportunities and Challenges

Safety and Infotainment Communications for Vehicles Opportunities and Challenges Safety and Infotainment Communications for Vehicles Opportunities and Challenges Mahbub Hassan School of Computer Science and Engineering University of New South Wales, Sydney, Australia NSERC DIVA Distinguished

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe

VANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Data Dissemination in Ad Hoc Networks Based on Inter-Vehicle Communication

Data Dissemination in Ad Hoc Networks Based on Inter-Vehicle Communication Data Dissemination in Ad Hoc Networks Based on Inter-Vehicle Communication Lars Wischhof, Prof. Hermann Rohling {l.wischhof, rohling}@tu-harburg.de Technical University of Hamburg-Harburg, Germany Overview

More information

Performance Evaluation of IEEE a MAC Protocol for Vehicle Intersection Collision Avoidance System

Performance Evaluation of IEEE a MAC Protocol for Vehicle Intersection Collision Avoidance System Performance Evaluation of IEEE 82.11a MAC Protocol for Vehicle Intersection Collision Avoidance System Nader M. Rabadi, Member, IEEE and Syed M. Mahmud, Member, IEEE Electrical and Computer Engineering

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS

ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vol.2, Issue.2, Mar-Apr 2012 pp-062-066 ISSN: 2249-6645 ANALYSIS OF SAFETY MEASURES AND QUALITY ROUTING IN VANETS Vedha Vinodha.D*, Mrs.V.Seethalakshmi** *II M.E CS, Sri Shakthi Institute of Engineering

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Intelligent Transportation System For Vehicular Ad-Hoc Networks

Intelligent Transportation System For Vehicular Ad-Hoc Networks INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 6 69 Intelligent Transportation System For Vehicular Ad-Hoc Networks T. Sujitha, S. Punitha Devi Department

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

ENSC 427, Spring 2012

ENSC 427, Spring 2012 ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO

More information

Mobile-Gateway Routing for Vehicular Networks 1

Mobile-Gateway Routing for Vehicular Networks 1 Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

VITP: An Information Transfer Protocol for Vehicular Computing

VITP: An Information Transfer Protocol for Vehicular Computing VITP: An Information Transfer Protocol for Vehicular Computing Marios D. Dikaiakos, Saif Iqbal,Tamer Nadeem, Liviu Iftode Adapted from the work of Marios D. Dikaiakos 2nd ACM International Symposium on

More information

The Challenges of Robust Inter-Vehicle Communications

The Challenges of Robust Inter-Vehicle Communications The Challenges of Robust Inter-Vehicle Communications IEEE VTC2005-Fall Marc Torrent-Moreno, Moritz Killat and Hannes Hartenstein DSN Research Group Institute of Telematics University of Karlsruhe Marc

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS Nandhini P. 1 and Ravi G. 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College of

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,

More information

Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs

Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs, Felix Schmidt-Eisenlohr, Moritz Killat, Jérôme Härri, Hannes Hartenstein Decentralized Systems and Network Services

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

AN ADAPTIVE BROADCAST MECHANISM TO IMPROVE ALERT MESSAGE DISSEMINATION IN VANETS

AN ADAPTIVE BROADCAST MECHANISM TO IMPROVE ALERT MESSAGE DISSEMINATION IN VANETS AN ADAPTIVE BROADCAST MECHANISM TO IMPROVE ALERT MESSAGE DISSEMINATION IN VANETS Nidhin A S 1, Vinaya K 2 1 PG Scholar, Computer Science & Engineering Department, KCG College of Technology, Chennai, India

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Hybrid Communication CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto Contents Project Overview Hybrid Communication Concepts Services Enabled by Hybrid Communication

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

A Review on Vehicular Ad-Hoc Network

A Review on Vehicular Ad-Hoc Network A Review on Vehicular Ad-Hoc Network Arshdeep Kaur 1, Shilpa Sharma 2 M.Tech Student, Dept. of Computer Science Engineering, Lovely Professional University, Phagwara, Punjab, India 1 Assistant Professor,

More information

Reducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories

Reducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories , October 21-23, 215, San Francisco, USA Reducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories Mohammad A. Alsmirat, Saleh Yousef Al-Rifai, and

More information

Sybil Attack Detection and Prevention Using AODV in VANET

Sybil Attack Detection and Prevention Using AODV in VANET Sybil Attack Detection and Prevention Using in VANET Navneet 1, Rakesh Gill 2 1 M. Tech. Student, GITM, Bilaspur-Tauru Road, Gurgaon (Haryana) navneet_tehlan@yahoo.com 2 Asst. Prof., GITM, Bilaspur-Tauru

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September-2013 831 Performance Analysis of Reactive and Proactive Routing Protocols for Vehicular Adhoc Network Ms. Monika

More information

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract: Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

More information

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University OUTLINE Intelligent Transportation Systems (ITS) Vehicle connectivity

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets Global Journal of Computer Science and Technology: E Network, Web & Security Volume 18 Issue 4 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS

INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS 1 NATARAJAN MEGHANATHAN, 2 AYOMIDE ODUNSI 1 Asstt Prof., Department of Computer Science, Jackson State University,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Protection Against DDOS Using Secure Code Propagation In The VANETs

Protection Against DDOS Using Secure Code Propagation In The VANETs Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks

Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks Impact of Link Discovery Delay on Optimized Link State Routing Protocol for Mobile ad hoc Networks Akhila Kondai Problem Report submitted to the Benjamin M. Statler College of Engineering and Mineral Resources

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

Vehicular Ad Hoc Networking - Overview

Vehicular Ad Hoc Networking - Overview - Overview CSI5140 Arnaud Casteigts http://www.site.uottawa.ca/ casteig/ October 21, 2008 Outline Quick Overview New possibilities VANETs Technological context Architecture Standards Introduction Broadcasting

More information

System Level Evaluation of LTE-V2V Mode 4 Communications and its Distributed Scheduling

System Level Evaluation of LTE-V2V Mode 4 Communications and its Distributed Scheduling IEEE copyright. This is an author-created postprint version. The final publication is available at http://ieeexplore.ieee.org/ System Level Evaluation of LTE-V2V Mode 4 Communications and its Distributed

More information

DSRC Field Trials Whitepaper

DSRC Field Trials Whitepaper DSRC Field Trials Whitepaper August 19, 2017 www.cohdawireless.com 1 Overview Cohda has performed more than 300 Dedicated Short Range Communications (DSRC) field trials, comparing DSRC radios from multiple

More information

Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network

Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network Bhagyashri P. Deshpande 1, Dr.A.S.Alvi 2 1 M.E(CSE) PRMIT&R, Badnera, Amravati 2 Professor,Dept. of CSE PRMIT&R,Badnera,

More information

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Cohda Wireless White Paper DSRC Field Trials

Cohda Wireless White Paper DSRC Field Trials Cohda Wireless White Paper DSRC Field Trials Copyright Cohda Wireless Pty Ltd ABN 84 107 936 309 Cohda Wireless Pty Ltd 82-84 Melbourne Street North Adelaide, SA 5006 Australia P +61 8 8364 4719 F +61

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Information Dissemination in Vehicular Ad-hoc Networks

Information Dissemination in Vehicular Ad-hoc Networks POLITEHNICA UNIVERSITY OF BUCHAREST COMPUTER SCIENCE DEPARTMENT GRADUATION PROJECT Information Dissemination in Vehicular Ad-hoc Networks Scientific Coordinators: Prof. Valentin Cristea, Ph.D, Politehnica

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Enabling Efficient and Accurate Large-Scale Simulations of VANETs for Vehicular Traffic Management

Enabling Efficient and Accurate Large-Scale Simulations of VANETs for Vehicular Traffic Management Enabling Efficient and Accurate Large-Scale Simulations of VANETs for Vehicular Traffic Management 1, Felix Schmidt-Eisenlohr 1, Hannes Hartenstein 1, Christian Rössel 2, Peter Vortisch 2, Silja Assenmacher

More information

Performance of DSDV Protocol over Sensor Networks

Performance of DSDV Protocol over Sensor Networks Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS A.Robertsingh 1, Suganya A 2 1 Asst.Prof, CSE, Kalasalingam University, Krishnankoil, India 2 Asst.Prof, CSE, Kalasalingam University,

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

MAC Protocols for VANETs

MAC Protocols for VANETs MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM

More information

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information