ScienceDirect. Reliable Contention-based Beaconless Packet Forwarding Algorithm for VANET Streets

Similar documents
RELIABLE RECOVERY STRATEGY FOR CONTENTION-BASED FORWARDING IN VEHICULAR AD HOC NETWORK STREETS

BRAVE: Beacon-less Routing Algorithm for Vehicular Environments

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

COMPARATIVE STUDY OF POSITION BASED ROUTING PROTOCOLS IN VANET

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Keywords: Adhoc Network, Vehicular Adhoc Network, VANET, position-based routing protocols. I. INTRODUCTION

Beaconless Packet Forwarding Approach for Vehicular Urban Environment

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Reliable Routing In VANET Using Cross Layer Approach

Aanchal Walia #1, Pushparaj Pal *2

Methods to Resolve Traffic Jams using VANET

The Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Analyzing Routing Protocols Performance in VANET Using p and g

Impact of Hello Interval on Performance of AODV Protocol

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Available online at ScienceDirect. Procedia Technology 17 (2014 )

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

BGR: Blind Geographic Routing for Sensor Networks

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

Figure 1: Ad-Hoc routing protocols.

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

A Survey of Vehicular Ad hoc Networks Routing Protocols

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

2013, IJARCSSE All Rights Reserved Page 85

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Mobile-Gateway Routing for Vehicular Networks 1

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

To enhance Routing in ZigBee Wireless Networks

Vertex-Based Multihop Vehicle-to-Infrastructure Routing for Vehicular Ad Hoc Networks

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Design and Simulation of Vehicular Adhoc Network using SUMO and NS2

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

SUMMERY, CONCLUSIONS AND FUTURE WORK

Performance Evaluation of Various Routing Protocols in MANET

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

AODV-PA: AODV with Path Accumulation

Performance Analysis and Enhancement of Routing Protocol in Manet

A Qualitative Survey on Position Based Unicast Routing Protocols in Vehicular Ad hoc Networks (VANETs)

Investigation on OLSR Routing Protocol Efficiency

Evaluation of Information Dissemination Characteristics in a PTS VANET

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Multipath Position Based Routing Protocol For Mobile Ad-Hoc Network Using Adaptive Beacon Forwarding Scheme

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Performance Analysis of MANET Routing Protocols OLSR and AODV

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

Traffic-Aware Opportunistic Data Delivery Strategy for Urban Vehicular Ad Hoc Networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Routing Protocols in MANETs

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

JOURNAL OF INTERNATIONAL ACADEMIC RESEARCH FOR MULTIDISCIPLINARY Impact Factor 2.417, ISSN: , Volume 3, Issue 11, December 2015

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Performance Analysis of Aodv Protocol under Black Hole Attack

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Reliable Routing Scheme for VANETs in City Environment

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

PERFORMANCE EVALUATION OF MOBILITY AND ROUTING PROTOCOLS FOR VEHICULAR AD HOC NETWORKS USING NS-2 AND VANETMOBISIM

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

An Improved Vehicular Ad Hoc Routing Protocol for City Environments

A New Efficient and Energy-aware Clustering Algorithm for the OLSR Protocol

AWERProcedia Information Technology & Computer Science

A Receiver-Based Forwarding Scheme to Minimize Multipath Formation in VANET

Systematic Review on Routing Protocols for Vehicular Ad Hoc Networks: A Survey and Future Perspectives

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

The Performance of MANET Routing Protocols for Scalable Video Communication

PIONEER RESEARCH & DEVELOPMENT GROUP

Transcription:

Available online at www.sciencedirect.com ScienceDirect Procedia Technology 11 ( 2013 ) 1011 1017 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Reliable Contention-based Beaconless Packet Forwarding Algorithm for VANET Streets Mojtaba Asgari a,c, *, Mahamod Ismail a, Raed Alsaqour b a Department of Electrical, Electronic and Systems Engineering, Universiti Kebangsaan Malaysia, 43600 Bangi, Malaysia b School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Malaysia c Department of Computer Engineering, Faculty of Engineering, Islamic Azad University, Mashhad Branch, Mashhad, Iran Abstract Vehicular Ad hoc Networks are emerging class of Mobile Ad hoc Networks that provide wireless communication between vehicles with no need for any fixed infrastructure. It is proven that in highly dynamic vehicular environments beaconless position-based forwarding algorithms are more suitable than the algorithms that use periodic beacon information in their forwarding decisions. However, data packet broadcasting in forwarding mechanism of these algorithms leads to packet duplications in both forwarding area and the destination node and consequently increases the network overhead and wastes available bandwidth. In this paper we propose a new beaconless forwarding algorithm called CBBPF in which data packets are not broadcasted to the neighbors to avoid duplication. The simulative performance evaluation results in highway scenarios show that CBBPF operates properly in terms of packet delivery ratio and average end-to-end delay. 2013 The Authors. Published by by Elsevier B.V. Ltd. Open access under CC BY-NC-ND license. Selection and peer-review under responsibility of of the the Faculty of of Information Science Science & & Technology, Universiti Universiti Kebangsaan Kebangsaan Malaysia. Keywords:Contention-based; Beaconless; Position-based; Forwarding; Routing; CBBPF; IEEE 802.11p; VANET 1. Introduction Vehicular Ad hoc NETworks (VANETs) are rising subclass of Mobile Ad hoc NETworks (MANETs) which provide wireless vehicular communications services. These services range from safety applications to applications providing road information, advertisement and entertainment for drivers and passengers[1]-[2]. * Corresponding author. E-mail address: m_asgari_56@yahoo.com 2212-0173 2013 The Authors. Published by Elsevier Ltd. Open access under CC BY-NC-ND license. Selection and peer-review under responsibility of the Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia. doi: 10.1016/j.protcy.2013.12.288

1012 Mojtaba Asgari et al. / Procedia Technology 11 ( 2013 ) 1011 1017 The majority of vehicular applications require long-range communications (i.e., source and destination are at distant positions). Road traffic monitoring and Internet connectivity are examples of these applications. Long-range communications that require multi-hop routing are more complex than short-range communications. For example, frequent and unexpected topology changes occur in VANET due to the high mobility of vehicles. The network density also varies from extremely dense in large cities at rush hours to very sparse in highways at night or in rural areas. High mobility of vehicles and variations in network density and vehicles velocity are some characteristics of vehicular networks that make it challenging to design a proper routing protocol for VANETs. Traditional topology-based MANET routing algorithms may not be suitable for vehicular communications due to the special characteristics of VANETs. These algorithms either create and update routing tables proactively (such as DSDV [3] and OLSR [4]) or create routes only when needed to send data to the destination (such as AODV [5] and DSR [6]), are inefficient in highly dynamic vehicular networks, because construction and maintenance overhead of the routes increase as the network dynamic increases [7]. This problem degrades network performance and limits the scalability of these algorithms. Geographical position-based algorithms are other type of MANET routing algorithms, which do not establish the route between source and destination. Forwarding (relaying) decision is made on-the-fly based on the positions of neighbors and the position of destination. Information about the position of destination can be obtained from a location service. It can also obtained as simple as flooding messages in the destination area to find the destination and receive its reply. Information related to next-hop neighbors is obtained from small control messages called beacons (or hello messages) which every node (vehicle) in the network periodically broadcast to inform its one-hop neighbors of its existence and position [2]. Nodes also obtain their position through a positioning system like GPS or Galileo. Since GPS devices will be available in future vehicles, more position-based forwarding algorithms have been proposed for VANETs. GPCR [8], VADD [9] and ACAR [10] are examples of these algorithms. In positionbased forwarding scheme, each node has its own neighbor table to store list of one-hop neighbors and their positions. The table is updated by the information received from the beacons. When a packet need to be forwarded, the next relaying hop is chosen from the table in such a way that the forwarding progress is maximized (e.g., typically, this is the neighbor closest to the destination). This process continues until the packet reaches the destination. Hence, it is essential for each node in the forwarding path to keep precise neighbor information to successfully choose the next hop. When network dynamics increase, determining position of neighbors becomes unstable. If position information is not accurate, the chosen next hop may not be the best next hop, or even worse, it can be a node that is already out of the transmission range. Both cases lead to the inefficient or inaccurate forwarding decisions. Obtaining more up-to-date neighbor information requires more frequent beacon broadcasting (beaconing). However, it results in large communication overhead (bandwidth waste) and can also increase the probability of network congestion and packet collisions at the link layer especially in dense vehicular networks. Recently, new type of position-based forwarding algorithms such as BLR [11], CBF [12], BRAVE [13], DAF [14] and CoopGeo[15] have been proposed in the literature, which are called beaconless forwarding. In these algorithms, next hop is not selected by the forwarders and thus the need for beacon information in forwarding decisions is eliminated. In beaconless forwarding scheme, each relaying node includes its own and destination s positions in data packet header and broadcast the packet to its one-hop neighbors. Some neighbors located in a predefined forwarding area become candidate for next relaying node among the neighbors received the packet. The candidates are going to contend for data packet forwarding. The contention is as follow: 1) before starting to transmit, according to the candidate, forwarder and destination s positions a timer is set to defer the transmission; 2) during the deferring time, each candidate node listen to the wireless channel; if it overhear another candidate forwards the same packet, it drops its own copy, otherwise forward the packet by broadcasting it after the deferring time. This process continues until the packet reaches the destination. Data packet broadcasting in current beaconless forwarding algorithms leads to packet duplications in both forwarding area and the destination node and consequently increase overhead of the network and waste available bandwidth. Although definition of forwarding area which is used to delimit the potential next hop neighbors, can reduce the amount of redundant data, it cannot prevent duplicate packet generation in realistic scenarios. In reality, packets can be lost. Moreover, due to the obstacles, radio ranges of nodes and received signal powers can be different. Hence it is possible that two or more candidates do not overhear each other and act as the next forwarders [16].

Mojtaba Asgari et al. / Procedia Technology 11 ( 2013 ) 1011 1017 1013 This paper proposes a Contention-Based Beaconless Packet Forwarding (CBBPF) algorithm in which data packets are guaranteed to transmit to only one candidate to avoid the above mentioned problem in current beaconless forwarding algorithms. In the remainder of the paper, the operation of CBBPF, simulative performance evaluation of our algorithm, discussion and conclusion have been explained. 2. Contention-based beaconless packet forwarding algorithm The real deployment of a VANET routing protocol requires two phases to work properly. Routing and forwarding. The routing phase is needed to route data packets along different streets and forwarding phase is required to route the packets within the same street. In forwarding process, if destination is not located in the current street, the next junction, which is generated from the routing phase, will be considered as a destination of the packets in the current street. CBBPF forwards data packets hop-by-hop along a selected street using a contention-based next hop selection based on the beaconless geographical position-based approach. Thus, any routing strategy can employ CBBPF to forward packets along a street or a highway. CBBPF uses three packet types to perform its beaconless operation: REQUEST, REPLY and DATA. Given that perhaps multiple data flows (different pair of sources and destinations) exist in the network, it is essential for each of the messages to clearly identify as belonging to a particular data flow. Therefore, in addition to other fields that are required for each packet type, the header of these packets contains data source identifier, a sequence number which is set by the data source and assigned to the generated data packet, and destination (or next junction) identifier. We call combination of these three fields as a message key. In the following subsections we explain in detail how CBBPF forward data packets in beaconless manner and how next hop candidates contend for data packet forwarding. 2.1. Beaconless packet forwarding The forwarding mechanism of CBBPF is as follow: A forwarding node holding a data packet, first stores the data, then instead of broadcasting the DATA packet, broadcasts a REQUEST control packet and wait for receiving replies during a Tmaxtime. This REQUEST packet header includes the position of the forwarding node as well as the position of destination. Upon receipt of the REQUEST packet, every neighbor checks if it is closer to destination than the current node (i.e., it provides positive progress). If this is the case, this neighbor becomes a next hop candidate; otherwise it drops the REQUEST packet and goes back to its initial state. During Tmax period, candidates contend for packet forwarding by setting their timers, as will be described in the next subsection. The candidate that its timer expires first is the best next hop forwarder (i.e., the winning candidate). It broadcasts the REPLY control packet in such a way that it is clear that it replies to which forwarder node and for which data packet, by including a reply destination field and the message key in the reply header. Each node receiving this packet checks whether it is the reply destination. If it is the one, it sends the DATA packet to the winning candidate node which has sent the REPLY packet. Once that candidate receives the DATA, it acts as the new forwarder and repeats the process until the DATA reaches the destination. If other candidates receive the REPLY, they delete the related REQUEST received from the forwarder and cancel their contention timer. Then they go back to their initial state. If some candidates located at the forwarding area which are not able to overhear the REPLY (i.e., hidden terminal problem) send REPLY after their contention timer expiration they do not receive any DATA from the forwarder. This mechanism guarantees that there is only one copy of the DATA packet in the network. In VANET, every vehicle employs IEEE 802.11p standard at its physical and MAC layer. Since in CBBPF algorithm a DATA packet transmits in unicast approach, in each data transmission the winning candidate s MAC layer sends an acknowledgement message to the forwarder. To increase the reliability of the algorithm, CBBPF has been designed in cross layered method. The forwarder s MAC layer sends its data delivery report to the network layer to indicate whether the DATA has been successfully received at the winning candidate or not. If the forwarder does not receive the acknowledgement message, it retransmits the DATA packet up to two more attempts. If the attempts fail, the forwarder restarts the forwarding process. This method ensures hop-by-hop DATA packet delivery without considering any explicit acknowledgement control packet in the algorithm.

1014 Mojtaba Asgari et al. / Procedia Technology 11 ( 2013 ) 1011 1017 CBBPF does not use any recovery strategy for local minimum problem. This happens when a data packet get stuck in a forwarding node that does not have any neighbor with positive progress toward the destination (i.e., closer to the destination than itself). In the other words, the forwarder does not receive any REPLY packet during Tmax period. CBBPF adopt a store-carry-forward approach for solving this problem which frequently happens in VANETs due to their high dynamic and mobile topology. It means the moving forwarder stores the packet in a buffer until a new neighbor with positive progress appears in the network. The forwarder discovers these neighbors by receiving their periodic beacons that exist in the IEEE 802.11p standard, but the beacons information does not have any effect on forwarding decision making. 2.2. Contention-based next-hop selection To carry out contention at the next hop candidate nodes, the setting of the timers in CBBPF is based on the metric proposed in [17]. This metric is also exploited in other routing protocols such as CoopGeo and BRAVE. The timer values or waiting times should properly adjust. Among all candidates, the node providing the largest progress would have more chance to be selected as next hop. To reduce the number of hops a data packet travels in the network and to minimize the remaining distance to the destination at each hop, the progress P is defined as: P( f, d, n) dist( f, d)- dist( n, d) (1) wheref is the position of current forwarder, d the position of destination, n the position of neighbor and distrepresents the Euclidian distance between two nodes. Fig. 1. Area division in CBBPF algorithm As depicted in Fig. 1, the forwarder radio coverage area is divided into two areas, Positive Progress Area (PPA) and Negative Progress Area (NPA). A negative progress value (P) indicates that a neighbor is in NPA and is unsuitable for becoming a candidate node (N 4 and N 5 ). All the neighbors located in PPA can be considered as next hop candidates (N 1,N 2 and N 3 ). Therefore, here PPA is the forwarding area. The radio coverage area is also divided into given even Number of Sub Areas (NSA) with equal width, called Common Sub Areas (CSAs). The candidate nodes located at the same CSA provide similar progress toward the destination (D), and hence they have similar waiting times. To compute the waiting time, each candidate node first calculates the CSA it belongs to, by using the following formula: r- P( f, d, n) CSA NSA 2r (2)

Mojtaba Asgari et al. / Procedia Technology 11 ( 2013 ) 1011 1017 1015 wherer is the nominal transmission range which is equivalent to the largest progress. The CSA range from 0 to (NSA 1), which 0 belong to the area provides largest progress. After calculating the CSA, the candidate node computes the time needed to wait before sending the REPLY packet (T) with this equation: T T CSA rand NSA T max max ( ) ( ) NSA (3) As already mentioned in the previous subsection, Tmax is the maximum time that the forwarder waits to receive a REPLY from any candidate node. The rand(x) function generates a random value between 0 and x to reduce the probability of two or more candidates, which are located in the same CSA, to reply at the same time. This waiting time function ensures that candidates in the subareas with more progress send the REPLY packet earlier. 3. Performance evaluation A series of simulations have been conducted to evaluate performance of the CBBPF. In the following subsections, we explain the simulations setup and discuss the obtained results. 3.1. Simulation setup Our proposed algorithm has been implemented in ns-2 (version 2.35) [18] running under Ubuntu Linux. The SUMO (Simulation of Urban Mobility) tool (version 0.12.3)[19] has been employed to generate layout of the scenarios, vehicular traffic patterns and movement trace files. The generated movement trace files have been imported to the ns-2 as movement information of mobile nodes in the wireless network simulations. We used the MOVE (MObility model generator for VEhicular networks) utility (version 2.91) [20] as an interface between ns-2 and SUMO to facilitate generation of movement trace files and ns-2 scenarios without the difficulty of writing ns-2 simulation scripts as well as learning about the internal details of the SUMO simulator. Mobility model, data traffic and wireless network parameters are shown in Table 1. In all simulations, scenario layout is an 8 km two-way highway with three lanes in each direction. Vehicles travel in both directions with maximum road speed of 60, 90 and 120 km/h. Number of traveling vehicles is in the range of 50 to 500. Table 1.Simulation environment Mobility model parameter Setting Traffic parameter Setting Wireless parameter Simulation area 8 km highway Traffic model CBR, 4 sources PHY and MAC layers standard Number of lanes 2 3 Traffic duration 550 s Propagation model Max. road speed 60, 90, 120 km/h Packet size 512 bytes Transmission power Number of vehicles 50 ~ 500 Packet rate 1 pkt/s Transmission range Setting IEEE 802.11p Two-ray-ground -37.2 dbm 250 m For each simulation, there are 4 data sources, 2 mobile nodes and 2 fixed nodes located at one end of the road, which send 512 bytes CBR data packets to 2 fixed destinations located at the other end of the road. Each destination is assigned to one mobile and one fixed data source. Data sending rate is 4 Kb/s which is equal to 1 packet/s. The first data packet is sent after the first vehicle arrives to the end point of the road to ensure that vehicles are

1016 Mojtaba Asgari et al. / Procedia Technology 11 ( 2013 ) 1011 1017 distributed in the entire road. CBR traffic duration is 550 seconds and the simulation is terminated 50 seconds after the stopping of CBR traffic. Physical and MAC layer configurations are according to the predefined IEEE 802.11p parameters in ns-2 with only altering transmission power to provide a maximum transmission range of 250 m. The wireless signal propagation model is two-way-ground model. 3.2. Simulation results We consider packet delivery ratio (PDR), average end-to-end delay of received data packets and average storecarry time of these packets as performance metrics for our algorithm. Fig. 2a shows that the PDR increases as the network density increases. Thanks to the retransmission and storecarry-forward mechanisms, increasing the vehicle speed also does not affect the delivery ratio. a b c Fig. 2. Simulation results: (a) packet delivery ratio, (b) average delay in sparsely connected conditions and (c) average delay in fully connected conditions Fig. 2b and Fig. 2c represent the average end-to-end delay for data packets in sparse and dense network conditions respectively. This delay consists of two parts. One part is related to the total amount of time that a packet is stored in the forwarders buffer while it is carried with the forwarder nodes, when there is no neighbor with positive progress toward the destination (store-carry delay). The other part is related to the total time that is required to forward the packet to the next hops until it reaches the destination (forward delay). The results show that, in low vehicle density conditions, the majority of end-to-end delay is related to the store-carry delay (forward delay is less than one second, and it is too small to see in the Fig. 2b). In such sparse conditions, the packet cannot be successfully delivered to the next hop neighbors, and it is stored in the forwarding vehicles buffer. Hence, its delivery speed depends on the vehicles speed. In high density conditions, behavior of the CBBPF is perfect. It can tolerate the vehicular density increase without any considerable increase in the average end-to-end delay. Here, when the vehicles speed increases, the average end-to-end delay is also increases. The reason is that, with increasing

Mojtaba Asgari et al. / Procedia Technology 11 ( 2013 ) 1011 1017 1017 the vehicles speed, the connection time between the vehicles decreases which lead to a rise in the next hop packet delivery failure. The algorithm recovers from the failure by retransmitting the packet. 4. Conclusion In this paper we have briefly reviewed the existing forwarding algorithms in VANETs and based on the problems of these forwarding schemes, we have proposed a new forwarding algorithm called CBBPF (Contention-Based Beaconless Packet Forwarding). Unlike other beaconless algorithms, CBBPF transmits data packets in unicast approach instead of broadcasting them to the next hop neighbors. We have used a precise contention timer to prevent collisions between nearby vehicles. To tackle the frequent network partition problem, store-carry-forward approach is added to the algorithm. Data packet delivery at each hop is also guaranteed without considering any explicit acknowledgement control packet in the algorithm. Our simulation results show that CBBPF can be reliably applied to both sparse and dense vehicular environments. Acknowledgements This study has been conducted at the computer and network security laboratory, Universiti Kebangsaan Malaysia (UKM). The work was supported by the university through research grant DPP-2013-006. References [1] Willke TL, Tientrakool P, Maxemchuk NF. A Survey of Inter-vehicle Communication Protocols and Their Applications. IEEE Communications Surveys & Tutorials 2009;11:3 20. [2] Asgari M, Jumari K, Ismail M. Analysis of Routing Protocols in Vehicular Ad Hoc Network Applications. In: Zain J, Wan Mohd W, El- Qawasmeh E, editors. Software Engineering and Computer Systems, vol. 181, Springer Berlin Heidelberg; 2011, p. 384 97. [3] Perkins CE, Bhagwat P. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. conference on Communications architectures, protocols and applications, London: ACM; 1994, p. 234 44. [4] Clausen T, Jacquet P. RFC 3626: The Optimized Link State Routing Protocol (OLSR); 2003. [5] Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. Second IEEE Workshop on Mobile Computing Systems and Applications; 1999, p. 90 100. [6] Johnson D, Maltz D. Dynamic Source Routing in Ad Hoc Wireless Networks. In: Imielinski T, Korth H, editors. Mobile Computing SE-5, vol. 353, Springer US; 1996, p. 153 81. [7] Namboodiri V, Gao L. Prediction-based routing for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 2007;56:2332 45. [8] Lochert C, Mauve M, Füßler H, Hartenstein H. Geographic routing in city scenarios. ACM SIGMOBILE Mobile Computing and Communications Review 2005;9:69 72. [9] Jing Z, Guohong C. VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology 2008;57:1910 22. [10] Yang Q, Lim A, Li S, Fang J, Agrawal P. Acar: Adaptive Connectivity Aware Routing for Vehicular Ad Hoc Networks in City Scenarios. Mobile Networks and Applications 2010;15:36 60. [11] Heissenbüttel M, Braun T, Bernoulli T, Wälchli M. BLR: beacon-less routing algorithm for mobile ad hoc networks. Computer Communications 2004;27:1076 86. [12] Hartenstein H, Effelsberg W, Mauve M. Contention-based forwarding for street scenarios. 1st International Workshop in Intelligent Transportation; 2004. [13] Ruiz PM, Cabrera V, Martinez J a., Ros FJ. BRAVE: Beacon-less routing algorithm for vehicular environments. 7th IEEE International Conference on Mobile Adhoc and Sensor Systems, Ieee; 2010, p. 709 14. [14] Endo K, Inoue Y, Takahashi Y. Performance modeling of beaconless forwarding strategies in multi-hop wireless networks. Computer Comunications 2012;35:120 8. [15] Aguilar T, Syue S-J, Gauthier V, Afifi H, Wang C-L. CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks. IEEE Transactions on Wireless Communications 2011;10:2554 65. [16] Sanchez J, Ruiz P, Marin-Perez R. Beacon-less geographic routing made practical: challenges, design guidelines, and protocols. IEEE Communications Magazine 2009;47:85 91. [17] Sanchez JA, Marin-Perez R, Ruiz PM. BOSS: Beacon-less On Demand Strategy for Geographic Routing inwireless Sensor Networks. IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, Pisa: 2007, p. 1 10. [18]NS simulator, URL http://www.isi.edu/nsnam/ns/ (accessed 5.17.12). [19] Simulation of Urban MObility (SUMO), URL http://sumo.sourceforge.net (accessed 4.10.12). [20]MObility model generator for VEhicular networks (MOVE), URL lens1.csie.ncku.edu.tw/move/ (accessed 7.25.12).