Scalable Opportunistic VANET Content Routing With Encounter Information
|
|
- Angelica Newton
- 5 years ago
- Views:
Transcription
1 Scalable Opportunistic VANET Content Routing With Encounter Information Yu-Ting Yu, Yuanjie Li, Xingyu Ma, Wentao Shang, M. Y. Sanadidi, Mario Gerla University of California Los Angeles, CA 90095, USA {yutingyu, yuanjieli, xingyuma, wentashang, medy, Abstract Recently, Information Centric Networking (ICN) has attracted much attention also for mobiles. Unlike host-based communication models, ICN promotes data names as the firstclass citizen in the network. However, the current ICN namebased routing requires Interests be routed by name to the nearest replica, implying the Interests are flooded in VANET. This introduces large overhead and consequently degrades wireless network performance. In order to maintain the efficiency of ICN implementation in VANET, we propose an opportunistic geoinspired content based routing method. Our method utilizes the last encounter information of each node to infer the locations of content holders. With this information, the Interests can be georouted instead of being flooded to reduce the congestion level of the entire network. The simulation results show that our proposed method reduces the scope of flooding to less than two hops and improves retrieval rate by 1.42 times over flooding-based methods. Keywords VANET; ICN; Routing I. INTRODUCTION Information Centric Networking (ICN) [1], also referred as named data networking (NDN), has attracted much attention. ICN treats the name of the data, rather than the IP address of the host where the data resides, as first-class citizen in the network. In ICN, a data object is retrieved based on its content identity instead of the IP address. In order to fetch the data with a certain name, the content requester must issue an Interest packet with that name. The Interest packet is then routed to the content holder using name-based routing. Once the content holder receives the Interest, it returns the corresponding data content along the breadcrumb path left by the Interest. Recently, several applications of ICN to VANETs have been published [2][3]. Intuitively, the multi-source nature and innetwork caching feature of ICNs are helpful to overcome the mobility and intermittent connectivity challenges that were difficult to solve with traditional IP networks. For example, a data retrieval failure due to intermittent connectivity can be recovered more quickly by leveraging distributed caches. However, with so much content around, the major challenge in VANET ICN design is routing scalability. A method that can efficiently locate the content holder without flooding is much desired. In VANETs, it has been difficult to maintain stable routes (either name-based or IP-based) to various destinations without flooding [4]. To improve VANET routing scalability, researchers have proposed to utilize geo-coordinate information (available to vehicles with GPS service) in the r+outing process [5][6][7]. The basic idea is to forward the packets in the direction of the destination in a greedy manner. The geo-routing routes are constructed on-demand; the next hop is dynamically selected from the neighbors according to their distances to the destination. In the simplest greedy georouting method, the neighbor that is closest to the destination is selected. Geo-routing works well if the sender knows the position of the destination. However, in ICN, the requester node only knows the name of the content it is requesting. Therefore, in order to apply geo-routing, we first need a mechanism that performs content location discovery correctly and efficiently. Our target scenario is as follows. The ad-hoc network is represented by vehicles connected with WiFi. Each vehicle carries some contents, which can be either location dependent (e.g. traffic jam information on highway 110 ) or location independent (e.g. widget.mp3 ), which means the location of the content is not reflected in its name. In this paper, we focus only on location-independent content since the location dependent contents can be retrieved simply by forwarding the Interest packets to the associated location. We propose Last Encounter Content Routing (LER), which keeps track of content locations using last encounter information and performs opportunistic geographical routing. To reduce content discovery overhead, the content locations are maintained at each node. When two vehicles encounter each other, they exchange their content lists and the content locations known to them. In this way, the local content location information is updated each time when a vehicle encounters others. Later if this vehicle receives an Interest with a name that matches an entry in its list of content locations, it forwards this Interest by geo-routing instead of flooding, which is widely used in current ICN. The Interest is only flooded at first when the location is unknown, and only until a relay found matching location information. The rest of this paper is organized as follows. We discuss related work in Section II. In Section III, we introduce our protocol, Last Encounter Content Routing (LER). The system implementation details are further discussed in Section IV. The simulation results are discussed in Section V. We conclude this paper in Section VI /13/$ IEEE
2 II. RELATED WORK ICN in mobile environments is a recently emerging research area. In [8], J. Wang et al. propose an ICN-based data collection system for vehicular networks. This system requires car manufacturers to reserve special prefixes and ask network providers to announce name prefixes in advance. J. Lee et al. propose a proxy-based scheme for increasing efficiency of mobile retrievals [9]. In [2], L. Wang et al propose an ICN-based traffic dissemination system with opportunistic-style flooding. Flooding-based Interest forwarding is the standard in ICN. Two flooding-based forwarding paradigms, proactive and reactive, have been analyzed in [10]. The proactive approach disseminates the content names and locations periodically so that all nodes may maintain routing information for known contents. In contrast, the reactive approach does not advertise content locations in advance; instead, data consumers floods Interests to retrieve Data. In [10], the authors compare the performance of reactive flooding, proactive flooding, and Geographic Hash Table (GHT) in MANET ICN. Their results show that the reactive flooding approach outperforms the other two in both latency and data availability. In [11], a broadcast-based routing mechanism that reactively locates data, Listen-First Broadcast-Later (LFBL), is proposed. In LFBL, only the first Interest is flooded. Data and the following Interests are forwarded via the best route the previous Interests traversed. LFBL improves the data availability and avoids the routing message exchange. However, LFBL encounters route maintenance issues and rediscovery costs that escalate in high mobility. Proactive content routing is difficult in ICN due to the routing overhead induced by the significant volume of names. Hierarchical Bloom Filter Routing (HBFR) [3] is an attempt to tackle the challenge by using a geographical hierarchy and Bloomfilters to enable scalable content lookup. However, HBFR is designed specifically to accommodate high priority applications. A content routing scheme for general-purpose ICN applications that does not incur the overhead of reactive flooding or of proactive maintenance is still to be defined. In this paper, we answer this challenge using Geo-routing combined with Last Encounter destination discovery. Our scheme leverages and adapts to content retrieval the previously published LER protocol developed for conventional MANET routing [12]. Last Encounter exploits node mobility and is thus ideally suited to VANETs. III. PROTOCOL DESIGN In this section, we introduce the opportunistic content routing protocol, Last Encounter Content Routing (LER). A. Basic Idea Since we consider only the location-independent contents, every content here will be assigned a globally unique name, Table. 1. The format of Last Encounter List (LEL) Content Vehicle Location Time Name ID Widget.mp3 B (x,y) 12:00pm although the unique name may still follow the hierarchical naming format in [1]. LER is based on name-based ICN routing. In other words, a vehicle must issue an Interest to retrieve the content, and the data follows the breadcrumb of Interests. Therefore, we focus on discussing the Interest forwarding hereafter. We enhance the ICN routing by integrating the last encounter information concept [12][13], which helps vehicles gather the location of content providers. LER has two phases. In the first phase, the forwarding nodes do not know the location of the content. Thus, like in traditional ICN Interest routing, the naïve requester floods the Interest to search for the content location, which is defined as a geo-coordinate. The second phase starts once the Interest reaches a relay that has the location information of the particular content name requested. At this point, the routing module stamps the destination location in the Interest and afterwards the Interest routing switches from flooding to geo-routing. During the geo-routing process, the relay nodes keep updating the destination location if they have newer information. B. LER Example We use the following example to further explain the idea. Suppose a vehicle A wants to retrieve a content named widget.mp3. While A does not know who holds the content, vehicle B has the content widget.mp3. Each vehicle maintains two data structures: content list and Last Encounter List (LEL). The content list, which is periodically advertised to one-hop neighbors, summarizes all the contents the node itself has. When vehicles receive their neighbors content lists, they merge the information carried within the lists into their LELs. Each entry of the LEL includes the content name, the provider ID, the encounter location, and the encounter time. Note that (as a difference from [12]) one content can be provided by multiple vehicles, so there can be multiple entries for the same content name, each of which represents a different vehicle. Suppose vehicle B has the content that vehicle A desires. B previously broadcasted its content list to its nearby vehicle C at 12:00 pm at location (x, y). The LEL of C is shown in Table 1. That is, vehicle C can provide an approximate destination location for content widget.mp3. Suppose now vehicle A broadcasts its Interest for widget.mp3. The Interest is received by all nearby vehicles, C and D. C and D then search their LELs for widget.mp3. As vehicle D cannot find any entry matching this name, it prepares to broadcast this Interest to its neighbors to continue the search. However, C has found the match. It adds the destination location geo-coordinates, destination nodeid, and encounter time to the Interest packet, and send the Interest packet out by opportunistic geo-routing, as discussed in the next section. Upon receiving C s Interest, D realizes the Interest is delivered by geo-routing and carries content provider information. It thus aborts the rebroadcast. If there are multiple vehicles for one content, there can be many strategies to choose the vehicle to serve the Interest. In our implementation, we randomly choose one vehicle to serve the Interest for the purpose of diversity and load balance. Note that during the geo-routing process, if the relay has newer location information about the selected vehicle with content (i.e. the encounter time is newer than the one recorded in the Interest), it
3 preferred. In Phase 2, we are still looking for more recent location advertisemants (as in Greedy LER [12]).Therefore, we select nodes satisfying one of the following conditions as eligible forwarders: 1. Relays who have more recent location information. 2. Relays who are nearer to the destination than the last hop is. Only the eligible forwarders join the contention process in phase 2. The other vehicles are ineligible and automatically drop the Interests. For the eligible forwarders without more recent location information, the expiration timer is calculated as follows: Figure 1. LER Geo-routing prioritization updates the destination location and encounter time in the Interest and redirects the packet to the new location coordinates. C. Collision Avoidance and Opportunistic Geo-Routing Each time a vehicle broadcasts an Interest, potentially all nearby vehicles may rebroadcast the same Interest, inducing unnecessary redundant Interest and consequently redundant data transmissions. Therefore, we apply timer-based rebroadcast mechanism [15] to reduce the overhead. The basic idea is as follows: once the vehicles receive an Interest, they rebroadcast this Interest upon the expiration of a timer. Before the timer expires, if the vehicle hears other vehicles rebroadcast the same Interest, it may decide to cancel its scheduled transmission. Hence among all the vehicles within a small range, only few vehicles will rebroadcast Interest first due to their shorter timers, and others will cancel their Interest rebroadcast accordingly. This significantly reduces the number of Interest rebroadcast. The expiration timer design is as follows. Nodes that have more recent location information than the one carried in the packet set their expiration timer randomly within [0, T update]. Since highest priority is always given to forwarders who have relatively recent location information, the random timer for other nodes is set to be larger than T update. In phase 1 (the flooding-based content search phase), the primary goal is to expand the search range. In other words, the farther neighbors must be given higher priority. Therefore, phase 1 expiration timer is calculated as follows. = +( ) (, ) (1) T dist is the defined maximum waiting time, D max is the vehicle s transmission range, D transmitter is the distance from the vehicle to the last hop. Note that the farther this vehicle is from the last hop, the shorter it needs to wait for rebroadcasting Interest. Another criterium for selecting the expiration timers is to favor unexplored areas rather than farthest nodes, like in BLOOGO [20]. We will pursue this other option in future work. Phase 2 (the geo-routing phase) is triggered when a provider s geographic location is found. In the geographic forwarding, vehicles closer to the content provider are T = +( ) (2) where D ref is the distance from the vehicle to the reference point and D max is the maximum distance between the eligible forwarders within last hop s range to the reference point. The reference point is defined as the nearest possible geo-coordinate to the destination within last hop s transmission range. That is, position R in Figure 1. In Figure 1 A and D represents the last hop and the destination, respectively. The intuition of this setting is to normalize the timer by the maximum distance of the forwarder set to the reference point. The cancelling mechanism is straightforward: when a node receives a duplicate Interest from other nodes, it cancels its scheduled rebroadcast if 1. It does not have newer location update. and 2. (a) It is closer to last hop (in phase 1) than the duplicate packet sender. (b) It is farther to the reference point (in phase 2) than the duplicate packet sender. IV IMPLEMENTATION A. Overview In this section, we introduce the implementation of our design. Our implementation is based on ndnsim [16], a NS-3 based simulator. The revised ndnsim stack is shown in Figure 2. There are two major modifications in ndnsim protocol stack. Figure 2 The protocol stack of ndnsim
4 Interest: Name2? Last Encounter List Name1 V1 V3 V4 Name2 V0 V1 Location Table V0 V1 (X0, Y0) + Age0 (X1, Y1) + Age1 Forward to (X0, Y0)! Figure 4 LEL implementation Figure 3 Forwarding implementation First, we replace WiFiDeviceFace, which is the wireless interface implementation in original ndnsim, by NetV2VDeviceFace. NetV2VDeviceFace handles the vehicleto-vehicle link and all ad-hoc forwarding functions in our system. The forwarding process is summarized in Figure 3. Note that both Interest and Data forwarding may be cancelled when corresponding data is received. Second, we implement the Last Encounter List (LEL) as a specialized application. To realize the content list exchange in the NDN pull-based model, all nodes broadcast LEL Interest packet periodically, and producers reply with LEL data packets carrying its content list. B. LEL applications The LEL records the known content providers (i.e. vehicles), their location information and the age of this information. We define that the location expires after T expire seconds. The LEL is implemented as a two level mapping, as shown in Figure 4. The first level maps the content name to a list of content providers (LastEncounterList) and the second level maps a content provider to its location (LocationTable). All nodes are both producer and consumer for our specialized LEL application. In other words, all nodes have the LEL producer application and LEL consumer application installed on them. The LEL producer application is responsible for two tasks: (1) adding the node s contents to its LastEncounterList and (2) replying LEL Interests. The LEL consumer application, on the other hand, initiates LEL Interests periodically and merge the neighbors LEL reply into its own LEL. Figure 4 illustrates the procedure of content location lookup. To route an Interest, the relay first searches a provider s vehicle ID by the specified content name in LastEncounterList and then finds the location corresponding to this vehicle ID from LocationTable. IV. SIMULATION RESULTS A. Simulation Setup We summarize the simulation parameters as follows: MAC and PHY parameters: We use the Adhoc WIFI module defined in ns-3. The wireless transmission range is set to be 150 meters. The maximum expiration time T dist is 0.1 second. We use CORNER propagation model [17] to simulate signal loss in urban environments. Urban environment and mobility model: The urban map we use is shown in Figure 5, which comes from TIGER/Line files [18] collected by Census Bureau. We generate a 120s mobility trace using SUMO [19] to simulate practical vehicle movements. Application: For each trial, we randomly choose one vehicle as content consumer and one vehicle as content provider. The producer publishes prefix /prefix to its neighbors using LEL application. The consumer requests contents named /prefix/seq every 1 second, in which seq starts from 0 and increases by 1 each time. That is, the consumer sends Interests named /prefix/1, /prefix/2,, Figure 5 The urban map used in simulation
5 Flooding LER (a) (b) Figure 6 The CDF of (a) the number of hops in flooding phase; (b) the total number of traversed hops etc. All requests are served by the provider based on longest prefix matching. B. The efficiency of Content Search We first study the relationship between LEL exchange frequency and the efficiency of content search. We set LEL exchange period T to be 1s, 5s and 10s, and examine (1) the number of flooding hops before switching to geo-routing and (2) the total number of hops an Interest traverses. The results are shown in Figure 6. In Figure 6(a), we can clearly see that when LEL exchange frequency increases, the number of Interest flooding hops during search phase decreases significantly: when T = 10s, 63% of Interests can find the provider within just one hop. When T = 1s, the probability of locating provider in one hop increases to 92%. This is because the more frequent vehicles exchange LEL with each other, the more information each vehicle collects, and therefore the more likely a provider can be located. On the other hand, as shown in Figure 6(b), the total number of traversed forwarding hops for retrieving a content mostly remains unchanged regardless of the Figure 7 Retrieval rate change of LEL exchange frequency. LEL exchange frequency only affects the probability of finding a content provider; the actual number of forwarding hops mostly depends on the distance between the consumer and the selected provider. C. The Efficiency of LER In this section, we compare the traditional ICN floodingbased Interest forwarding with LER. We set LEL exchange period T to be 1s. Figure 7 shows the retrieval rate of both approaches. We define the retrieval rate as the number of successful retrievals to all attempts. We observe that without LER, only 47% of Interests can be successfully served, while 67% of Interests are successfully served with LER. Note that the major reason an Interest cannot be successfully served is due to the channel loss and the contention at MAC layer. In order to ensure reliable transmission, the Interest is retransmitted if not satisfied after a pre-defined interval. The retrieval rate is worse if this mechanism is not implemented. Consequently, LER improves retrieval rate over flooding-based forwarding since the contention is less with lower congestion level. The congestion level can be interpreted by Figure 8. Figure 8 presents the CDF of the total number of nodes forwarding data of each name. In general, LER requires less nodes participating the data forwarding since the Interests are forwarded by fewer relays. Figure 8 The CDF of total number of data forwarding
6 V. CONCLUSIONS We introduce LER, a content routing protocol designed for general-purpose data retrieval in ICN. LER integrates last encounter content discovery and geographical opportunistic forwarding to achieve low overhead and congestion level. Our simulation results show that LER can eliminate flooding overhead in 90% of our simulation when the broadcast interval is as short as 1 second. Moreover, the retrieval rate is improved by 42% when using LER instead of traditional flooding-based ICN routing. REFERENCES [1] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, Networking named content, in Proceedings of CoNEXT 09, [2] L. Wang, A. Afanasyev, R. Kuntz, R. Vuyyuru, R. Wakikawa, and L. Zhang, Rapid Traffic Information Dissemination Using Named Data, [3] Y.-T. Yu, X. Li, M. Gerla, and M. Y. Sanadidi, Scalable VANET Content Routing Using Hierarchical BloomFilters, in Proceedings of IWCMC 13, Jul [4] J. Härri, F. Filali, and C. Bonnet, "Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns," in Med-Hoc-Net 2006, 5th Annual Mediterranean Ad Hoc Networking Workshop, IFIP, Jun [5] Karp, Brad, and Hsiang-Tsung Kung. "GPSR: Greedy perimeter stateless routing for wireless networks." Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, [6] Zorzi, Michele, and Ramesh R. Rao. "Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multihop performance." Mobile Computing, IEEE Transactions on 2.4 (2003): [7] Lee, Kevin C., Uichin Lee, and Mario Gerla. "TO-GO: TOpology-assist geo-opportunistic routing in urban vehicular grids." Wireless On-Demand Network Systems and Services, WONS Sixth International Conference on. IEEE, [8] Jiangzhe Wang, Ryuji Wakikawa, and Lixia Zhang DMND: Collecting data from mobiles using named data. In Proceedings of 2010 Vehicular Networking Conference (VNC 10). IEEE. [9] Jihoon Lee, Daeyoub Kim, Myeong-Wuk Jang, and Byoung-Joon Lee Proxy-based mobility management scheme in mobile content centric networking (CCN) environments. In Proceedings of 2011 IEEE International Conference on Consumer Electronics (ICCE 11). IEEE. [10] Matteo Varvello, Ivica Rimac, Uichin Lee, Lloyd Greenwald, and Volker Hilt On the design of content-centric MANETs. In Proceedings of 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services (WONS 11). IEEE. [11] Michael Meisel, Vasileios Pappas, and Lixia Zhang Ad hoc networking via named data. In Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture (MobiArch '10). ACM, New York, NY, USA, 3-8. [12] M. Grossglauser and M. Vetterli, Locating mobile nodes with ease: learning efficient routes from encounter histories alone, IEEE/ACM Trans. Netw., 14(3): , June [13] N. Sarafijanovic-Djukic and M. Grossglauser, Last encounter routing under random waypoint mobility, In NETWORKING, [14] U. Lee, J. Lee, J.-S. Park, and M. Gerla, Fleanet: A virtual market place on vehicular networks, Vehicular Technology, IEEE Transactions on, 59(1): , jan [15] S. Biswas and R. Morris, "Opportunistic routing in multi-hop wireless networks," SIGCOMM Comput. Commun. Rev., vol. 34, no. 1, pp , Jan [16] A. Afanasyev, I. Moiseenko, and L. Zhang, ndnsim: NDN simulator for NS-3, NDN, Technical Report NDN-0005, 2012 [17] Giordano, Eugenio, et al. "CORNER: a realistic urban propagation model for VANET." Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on. IEEE, [18] Miller, Catherine L. "TIGER/Line Files Technical Documentation. UA US Department of Commerce, Geography Division, US Census Bureau." [19] Krajzewicz, Daniel, et al. "Sumo (simulation of urban mobility)." Proc. of the 4th Middle East Symposium on Simulation and Modelling [20] F. Angius, M. Gerla, and G. Pau. "BLOOGO: BLOOm filter based GOssip algorithm for wireless NDN." Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design- Architecture, Algorithms, and Applications. ACM, 2012.
DT-ICAN: A Disruption-Tolerant Information-Centric Ad-Hoc Network
DT-ICAN: A Disruption-Tolerant Information-Centric Ad-Hoc Network UCLA Computer Science Department Technical Report #TR130017 Yu-Ting Yu, Joshua Joy, Mario Gerla, M. Y. Sanadidi Computer Science Department
More informationBOND: Unifying Mobile Networks with Named Data. Michael Meisel
BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:
More informationNamed Data for Mobile AdHoc Networks
288 Intelligent Environments 2016 P. Novais and S. Konomi (Eds.) 2016 The authors and IOS Press. This article is published online with Open Access by IOS Press and distributed under the terms of the Creative
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationICAN: Information-Centric Context-Aware Ad-Hoc Network
ICAN: Information-Centric Context-Aware Ad-Hoc Network Yu-Ting Yu, Chris Tandiono, Xiao Li, You Lu, M.Y. Sanadidi, and Mario Gerla University of California Los Angeles, CA 90095, USA {yutingyu, cbtandiono,
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationListen First, Broadcast Later: Topology-Agnostic Forwarding under High Dynamics
1 Listen First, Broadcast Later: Topology-Agnostic Forwarding under High Dynamics Michael Meisel (UCLA), Vasileios Pappas (IBM Research), Lixia Zhang (UCLA) Abstract In this paper, we return to the drawing
More informationScalable VANET Content Routing Using Hierarchical Bloom Filters
Scalable VANET Content Routing Using Hierarchical Bloom Filters Yu-Ting Yu, Xiao Li, Mario Gerla and M. Y. Sanadidi Computer Science Dept., University of California, Los Angeles, CA 90095, USA {yutingyu,
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationDYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.
More informationRapid Traffic Information Dissemination Using Named Data
Rapid Traffic Information Dissemination Using Named Data Lucas Wang UCLA Los Angeles, CA, USA lucascs.ucla.edu Rama Vuyyuru Toyota InfoTechlogy Center Mountain View, CA, USA ramaus.toyota-itc.com Alexander
More informationBroadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks
Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:
More informationWireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013
Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing
More informationThe Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security
The Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security Parveen Kumar Research Scholar, CMJ University, Shillong, Meghalaya (India) Abstract In VANET, or Intelligent Vehicular
More informationHistogram-Based Density Discovery in Establishing Road Connectivity
Histogram-Based Density Discovery in Establishing Road Connectivity Kevin C. Lee, Jiajie Zhu, Jih-Chung Fan, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,
More informationHop-count Based Forwarding for Seamless Producer Mobility in NDN
Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract
More informationLocation-aware In-Network Monitoring in Wireless Sensor Networks
Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,
More informationTOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks
TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationReliable Routing In VANET Using Cross Layer Approach
Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,
More informationMeng Kuai and Xiaoyan Hong
Int. J. Ad Hoc and Ubiquitous Computing, Vol. x,. x, xxxx 1 Delay-tolerant forwarding strategy for named data networking in vehicular environment Meng Kuai and Xiaoyan Hong Department of Computer Science,
More informationQos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol
Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,
More informationA Survey of Vehicular Ad hoc Networks Routing Protocols
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey
More informationBGR: Blind Geographic Routing for Sensor Networks
BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract
More informationAnalyzing Routing Protocols Performance in VANET Using p and g
Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationVariable Length and Dynamic Addressing for Mobile Ad Hoc Networks
Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract
More informationIP Failure Handling Using Localized On-Demand Link State Routing
RESEARCH ARTICLE IP Failure Handling Using Localized On-Demand Link State Routing Prof. S.M.Sangve, Sushil Warkar, Amit Shirke, Kunal Solanke, Pratap Patil, Department of Computer Science and Engineering,
More informationMobile-Gateway Routing for Vehicular Networks 1
Mobile-Gateway Routing for Vehicular Networks 1 Hsin-Ya Pan, Rong-Hong Jan 2, Andy An-Kai Jeng, and Chien Chen Department of Computer Science National Chiao Tung University Hsinchu, 30010, Taiwan {hypan,
More informationReplica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes
Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationEnergy Aware and Anonymous Location Based Efficient Routing Protocol
Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering
More informationCOOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56
More informationReceiver Based Multicasting Protocol for Wireless Sensor Networks
Receiver Based Multicasting Protocol for Wireless Sensor Networks Madesha M Assistant Professor, Department of CSE Sahyadri College of Engineering and Management Chaya D Lecturer, Department of CSE H.M.S
More informationEFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM
EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM D.Yamini 1, J. Jayavel 2 1 III-M.tech(IT), Department of Information technology,
More informationEvaluation of Information Dissemination Characteristics in a PTS VANET
Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationIN a mobile ad hoc network, nodes move arbitrarily.
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make
More informationVANET via Named Data Networking
VANET via Named Data Networking Giulio Grassi, Davide Pesavento, Giovanni Pau, Rama Vuyyuru, Ryuji Wakikawa, Lixia Zhang LIP6 Université Pierre et Marie Curie, Sorbonne Universités Paris, France Computer
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationA Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1059-1066 Research India Publications http://www.ripublication.com A Review on Efficient Opportunistic Forwarding
More informationData Naming in Vehicle-to-Vehicle Communications
Data Naming in Vehicle-to-Vehicle Communications Lucas Wang 1, Ryuji Wakikawa 2, Romain Kuntz 2, Rama Vuyyuru 2, and Lixia Zhang 1 1 Computer Science Department, University of California, Los Angeles 2
More informationOptimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing
, pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationA Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms
A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationPoonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)
An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationAvoiding Traffic Congestion Using Position Based Routing Protocol in VANET
Avoiding Traffic Congestion Using Position Based Routing Protocol in VANET Ms. D. Jeya 1, Mr P. Ranjith Kumar 2, Mr G. Naresh kumar 3 (M.E) PG-Scholar, Department of Computer Science And Engineering, Sri
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationPerformance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using
More informationMiddle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET
Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationUnderstanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol
IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 7, 2013 ISSN (online): 2321-0613 Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol Stavan Karia
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationGeographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing
309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationShortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationarxiv: v1 [cs.ni] 20 Sep 2016
Can NDN Perform Better than OLSR in Wireless Ad Hoc Networks? Thiago Teixeira, Cong Wang, Michael Zink University of Massachusetts Amherst 151 Holdsworth Way Amherst, Massachusetts {tteixeira, cwang1,
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationGLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS A.Robertsingh 1, Suganya A 2 1 Asst.Prof, CSE, Kalasalingam University, Krishnankoil, India 2 Asst.Prof, CSE, Kalasalingam University,
More informationPerformance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
More informationA Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET
A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET Khaleel Husain and Azlan Awang Abstract Receiver-based data forwarding schemes are well suited for vehicular environment due
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationHigh Throughput in MANET Using relay algorithm and rebroadcast probability
RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,
More informationEnergy-Efficient Content Retrieval in Mobile Cloud
Energy-Efficient Content Retrieval in Mobile Cloud You Lu *, Biao Zhou #, Lung-Chih Tung *, Mario Gerla* *Computer Science Department, UCL *Los ngeles, C 90095, US *{youlu, dragond, gerla}@cs.ucla.edu
More informationINTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN
657 Performance Evaluation of DDSR via NS- 3 Simulation using RSU s in Vehicular Network Abhay Deep Seth, Ankit Khare Abstract: - Mobile Ad hoc Networks (MANET) are wireless networks without an infrastructure,
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationA Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks
A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,
More informationPerformance Comparison of Scalable Location Services for Geographic Ad Hoc Routing
Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British
More informationPerformance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)
Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University
More informationA Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc
More informationImproving Performance in Ad hoc Networks through Location based Multi Hop Forwarding
Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer
More informationKeywords: Adhoc Network, Vehicular Adhoc Network, VANET, position-based routing protocols. I. INTRODUCTION
ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com A Review: Position based Routing Protocols in VANET Rathod Kirit R 1st PhD Scholar, Rai University, Ahmedabad, Gujarat
More informationTowards Optimal Data Delivery in Highly Mobile Wireless Ad Hoc Networks
Towards Optimal Data Delivery in Highly Mobile Wireless Ad Hoc Networks Varun G Menon Department of Computer Science Engineering Sathyabama University Chennai, India-600119 varungmenon46@gmail.com Joe
More informationPerformance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationMultiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks
Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,
More informationKeywords-MANETs, Multicast mode, Clustering, Inter-domain routing.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey of Multicast
More informationData-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network
Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor
More informationNearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationIntroduction to Sync
Introduction to Sync Outline NDN Sync overview Sync protocol design issues Sync protocol for mobile ad-hoc networks What is NDN Sync? New transport service for data-centric networking [1] Synchronizing
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationM-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks
M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks Lynn Choi 1, Jae Kyun Jung 1, Byong-Ha Cho 1, and Hyohyun Choi 2 1 Korea University, Anam-Dong, Sungbuk-Ku, Seoul, Korea
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationVANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe
VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation
More information