Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS

Similar documents
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

PIONEER RESEARCH & DEVELOPMENT GROUP

Analyzing Routing Protocols Performance in VANET Using p and g

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Aanchal Walia #1, Pushparaj Pal *2

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

The Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Performance Evaluation of Various Routing Protocols in MANET

Avoiding Traffic Congestion Using Position Based Routing Protocol in VANET

Reliable Routing In VANET Using Cross Layer Approach

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

Methods to Resolve Traffic Jams using VANET

Congestion Control Technique with Safety Transmission of Messages in Vehicular Ad Hoc Network

Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocol

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN

Routing Protocols in MANET: Comparative Study

Introduction to Mobile Ad hoc Networks (MANETs)

Performance Analysis and Enhancement of Routing Protocol in Manet

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Survey - Energy Efficient Routing Protocols in MANET

Performance Evaluation of MANET through NS2 Simulation

2013, IJARCSSE All Rights Reserved Page 85

Routing Protocols in Mobile Ad-Hoc Network

Intelligent Transportation System For Vehicular Ad-Hoc Networks

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Power aware Multi-path Routing Protocol for MANETS

Computation of Multiple Node Disjoint Paths

Impact of Hello Interval on Performance of AODV Protocol

Performance Analysis of Ad Hoc Routing Protocols For Vehicular Ad Hoc - Networks

A Survey of Vehicular Ad hoc Networks Routing Protocols

Keywords: Adhoc Network, Vehicular Adhoc Network, VANET, position-based routing protocols. I. INTRODUCTION

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

OVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS

An Efficient Vehicle-to-Vehicle communication protocol to avoid the congestion in VANETs.

Mitigating Superfluous Flooding of Control Packets MANET

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Effect of Radio-Wave Propagation Model On Network Performance With AODV Routing Protocol For IL-VANET

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Routing Protocols in MANETs

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets

A Review on Vehicular Ad-Hoc Network

Analysis of Routing Protocols over VANET

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

EZR: Enhanced Zone Based Routing In Manet

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Protection Against DDOS Using Secure Code Propagation In The VANETs

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) REQUIREMENTS FOR ALTERNATE ROUTES IN MANET ABSTRACT

QUANTITATIVE ANALYSIS OF VANET ROUTING PROTOCOLS IN URBAN AND HIGHWAY SCENARIOS

A Literature survey on Improving AODV protocol through cross layer design in MANET

IJMIE Volume 2, Issue 6 ISSN:

Effects of Caching on the Performance of DSR Protocol

Design and Simulation of Vehicular Adhoc Network using SUMO and NS2

Comparison of Three Greedy Routing Algorithms for Efficient Packet Forwarding in VANET

II. ROUTING CATEGORIES

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN

Keywords VANET, Routing protocols, AODV, DSR, DSDV.

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Mobile-Gateway Routing for Vehicular Networks 1

Performance Evaluation of VoIP over VANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

[Shilpa R et al., 3(6): June, 2016] ISSN Impact Factor 2.675

Transcription:

Cluster Based Message Dissemination for Broadcasting the Emergency/Warning Messages using a Novel Scheduling in VANETS M. A. Berlin Department of computer science and engineering R. M. D Engineering College Chennai, India S. Muthu Sundari Department of computer science and engineering R. M. D Engineering College Chennai, India Abstract- Vehicular ad hoc networks are a special case of mobile ad hoc networks (MANETs). Unlike MANETs, VANET nodes are moving very fast. It becomes quite challenging to maintain a stable path for broadcasting Emergency and Warning (E/ W) messages from a risk zone. So routing takes an important role in VANETs. Reducing network overhead, avoiding network congestion, traffic congestion and increasing packet delivery ratio are the major issues of routing in VANETs. So it is essential to broadcast the risk notification (RN) messages such as accident and injury prevention messages, congestion control messages, road condition and other emergency/ warning messages in time to the rear vehicles. In this paper we propose a novel approach to categorize the messages and to give priority for the E/ W messages using a scheduling algorithm. The neighboring vehicles broadcast the RN messages from the risk zone using inter- zone clusters and intra- zone clusters communication to the rear vehicle by applying the proposed scheduling algorithm. Our simulation results show that this approach performs well and produce less network overhead, congestion control and high packet delivery ratio. We compared our approach with the existing protocol. Keywords- VANETs, RN messages, Risk zone, Cluster, Scheduling I. INTRODUCTION Vehicular ad hoc networks (VANETS), also called Vehicle to Vehicle Communication (V2VC) or Inter Vehicle Communication(IVC). In VANETs, the mobile nodes are vehicles with high mobility. Due to the high dynamic topology of VANETs, the routing path frequently breaks. Intelligent Transport System (ITS) covers the new tr of computer and communication technologies and applications used for traffic management that aims to improve passenger safety and increase the efficiency of the transportation systems [16]. It includes a wide range of technology for vehicular information such as vehicle communication system, Global Positioning System (GPS),digital mapping, video cameras, sensor and technologies together with advanced information processing to provide relevant and timely information to users and traffic management systems to reduce traffic congestion, improve traffic efficiency, avoid accidents and improve road safety. Vehicular Ad Hoc Network (VANET) is a special purpose Mobile Ad-Hoc Network (MANET) that is an important component of ITS. VANET is used for the exchange of messages between vehicle to vehicle (V2V) and also between vehicles and fixed roadside equipment (V2R) used for traffic management. Vehicles communicate using on-board sensors and communication equipment using Dedicated Short Range Communications (DSRC) that includes wireless technologies like WIFI, IEEE 802.11, WIMAX, IEEE 802.15 and Bluetooth [15]. There are a number of significant differences between VANET and MANET [14]. VANETs like MANETs allow vehicles to form a self-organized network without the requirement of permanent infrastructures. However, VANETs have a highly dynamic topology as compared to MANET, due to the high mobility of vehicles and the movement of the vehicles can be from both directions. On the other hand, unlike MANET, vehicular movements are restricted to a geographical pattern, such as a network of streets or highways. Unlike MANET, vehicles support substantial power resources for V2R and V2V communication. Another important aspect of VANET is that, a good portion of the messages exchanged are both delay-critical and safety-critical. The main problems related to VANETs are the high speed of moving vehicles, causes frequent path breaks. So in our approach, we use clusters (self organizing vehicles into groups) for broadcasting warning messages. The government and many manufacturers are mostly trying to adapt many rules in transport management for the smooth and safety driving. Hence, the accident rate is reduced for some level. However, in our day to day life, ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 177

some thousands or countless number of accidents are happened all over the world. Our country goods are transported by long trucks. It causes high traffic and congestion on high ways. It will affect all the rear vehicles. Some system should be introduced for clearing traffic and for broadcasting safety related messages to the rear vehicles. So, we have developed an approach to broadcast emergency/ warning messages in time to the rear vehicles. Our proposed approach is compared with the existing protocol such as REACT [3]. The rest of the paper is organized as follows: Section II deals about related work; section III describes Last Received First Served (LRFS) scheduling, section IV deals about LRFS scheduling algorithm, and section V deals simulation and results using NS2. II. RELATED WORKS The protocol proposed in [2], describes a novel energy efficient risk notification message protocol to broadcast risk messages. It identifies the risk zone and broadcasts the risk message. It increases the network overhead by broadcasting the risk messages to each other. In [5], many scheduling algorithms are used to broadcast the risk notification messages. In this approach, the RN messages are sent to each neighboring nodes individually without grouping as cluster. So it increases the network overhead and network congestion. The protocol proposed in [8], determines the status of its neighbors by sing beacons periodically. It behaves based on the broadcast message it received. It mainly concentrates on reducing number of duplicate beacons using broadcast suppression approach. In [9], a spatio- temporal emergency information dissemination protocol (STEID) is used to quickly disseminate traffic alerts such as accidents or congestion for the neighboring vehicles. It uses WiFi clusters connected through proxy servers and cellular network. In this approach, the emergency message is propagated within the cluster and unicasted to the server over cellular links. Each new emergency message is informed to the police by the servers. The protocol (REACT) proposed in [3] uses not only geographical information for both position and speed, but also road map information. A node that wants to s a packet can choose the best forwarder using the knowledge of both neighbors and road maps. It finds the distance between current node and the destination. This difference is considered as a threshold. Then the distance will be calculated between the neighbor s and the destination. The node with minimum distance is considered as next forwarder. Our proposed system is very simple technique for disseminating E/ W messages. In [10], a fast alarm message broadcasting in vehicular ad hoc network is used for broadcasting emergency alarm messages to the nearest vehicles. It uses sensors to identify the risk zone. It is not sure that sensors are deployed everywhere on the highways. The technique used in [1, 11] describes a new Hybrid VANET Routing Protocol (HVRP) for forming clusters to broadcast emergency messages. It uses inter and intra cluster routing protocol. The multi path routing protocols are implemented in [4, 6, 12, 13]. These protocols perform two phases: route discovery and route maintenance. During route discovery phase, multiple paths are selected for the same source and destination. Initially it uses a primary path for forwarding messages. If any of the links on primary path fails, then it goes for route maintenance phase. Now any other path from the already discovered multipath will be selected to take over the data dissemination. III. LRFS SCHEDULING The Last Receive First S scheduling consists of the following modules Cluster formation Multipath Routing Identification of risk locations Scheduling E/ W messages A. Cluster Formation The VANET nodes are organized into groups called clusters. How cluster is formed? Each vehicle broadcasts HELLO beacons to its neighbors for finding nearest cluster. Then it waits for t seconds. If that vehicle receives any HELLO packet from any nearest cluster with cluster ID within t seconds, then it joins as a member of that cluster. Otherwise, it will consider itself as a Cluster Head (CH). Each cluster has a cluster head. The other nodes are known as members of that cluster. Normally, the cluster head broadcasts the emergency messages to its members. The cluster head and its members maintain a routing table. Each members and its CH maintains routing information in proactive approach. Each members of that cluster find a path with other cluster members in reactive approach. This scenario in VANETs is shown in fig 1. It consists of four clusters. In that, the nodes c, j, o and v are cluster heads. The risk zone is shown at cluster 2. ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 178

Proactive algorithms employ classical routing strategies such as distance vector routing (DSDV) or Link State Routing. Generally the proactive algorithms maintain routing information in its routing table about the available paths even if the paths are not used so long. So it needs high storage space in the table. In our approach, we use proactive algorithm only within the cluster by identifying the entire unused link within the cluster based on the beacon rate cluster1 cluster2 cluster3 cluster4 a d CH1 c b f e g RZ CH2 h i k m l p CH3 o n s t u CH4 v w Where a, b, c, etc are cluster members RZ- Risk Zone Fig 1: Cluster scenario received. The link with less beacon rate is known as Link weak. The details of the node with less beacon count will not be maintained in the table. This provides high packet delivery ratio and low network overhead. B. Multipath Routing Within the cluster, each CH and its members use multipath routing to broadcast the emergency/ warning messages. Before sing the E/W messages, the source node S, selects two or three multiple paths from its routing table for the same destination D. Among this three routes, initially, only one primary path will be used for broadcasting. If any path breaks, then another alternate path will be selected by the source node. C. Identification of risk locations In the proposed approach, we assume that the risk zone will be identified by the affected cluster (the cluster which has risk zone). In Fig 1, the affected cluster in cluster 2. So this cluster tries to make alert to all the rear clusters and forward clusters by broadcasting the emergency/ warning messages such as accident prevention, congestion control. In the above figure, the rear clusters are cluster 3 and cluster 4. The forward cluster is cluster 1. So that the rear clusters can select the alternate route without reaching risk zone. The E/ W packet transmission and scheduling are explained in the following sections. The structure of emergency risk message is given in Fig. 2: CID- Cluster ID SID- Source ID MType- Message Type (Congestion, Accident, others) SeqNo- Sequence number Payload- Message RPosition- Risk Location Fig: 2 structure of emergency risk message ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 179

The E/ W messages are generated by the affected cluster. It is known as Cluster ERZ. It attaches its CID, SID, MType, SeqNo, Payload (message) and risk location (latitude and longitude). The risk location is determined by each vehicle from its GPS receiver. D. Scheduling E/W messages Each cluster calculates the distance between neighboring clusters. The Cluster ERZ periodically receives the Hello packet from the rear and forward clusters. These clusters are not aware of the emergency risk zone. The members of Cluster ERZ will calculate the distance between the risk zone and the other clusters. Now the members of Cluster ERZ maintain a table with the following details. SID CID Lat Lng T Message Received Distance NID CID Message Type Seq No T1 Lat1 Lng1 Where SID- Source ID CID- Cluster ID Lat- Latitude of source Lng- Longitude of source T- Message generated time NID- Node ID Lat1- Latitude of node Lng1- Longitude of node Fig 3: The Cluster ERZ table contents In Fig. 3, SID is the ID of the vehicle which generates E/ W messages from risk zone. CID is the ID of the cluster which is the CH of that source node. The E/ W generated time are T. The message received time from rear node is T1. Each member of Cluster ERZ will save the distance detail of the entire rear cluster. The distance is calculated from lat and lng of source node and lat1 and lng1 of rear vehicle using Haversine Formula [7]. Each member nodes of Cluster ERZ uses LRFS (Last Received First Served) scheduling to forward the E/W messages. Those nodes will not broadcast E/ W messages to the rear and forward clusters immediately. Because, in highways, the moving speed of vehicle nodes are too high. So before sing E/ W message by the affected cluster, all nearest rear and forward clusters creates traffic congestion. Therefore, it is not essential to s emergency messages to the nearest clusters of risk zone. So our main objective is to s E/ W messages to the clusters which is somewhat far away from the risk zone. Then only the network and traffic congestion will be avoided. For doing this, our proposed system uses a $ threshold waiting time. We know that, in VANETs, each vehicle broadcasts HELLO packets periodically. The Cluster ERZ receives HELLO packets from rear and forward clusters. Each member of Cluster ERZ waits for $ time. It calculates distance between Cluster ERZ and rear clusters. This parameter value is stored in the Cluster ERZ table. It starts to forward message if calculated time exceeds $ time. The Cluster ERZ will broadcast the E/ W message through the neighboring cluster. The message will be forwarded to the cluster (Cluster safe ) if its distance is higher than any other cluster. The reactive routing protocol is used to broadcast HELLO messages between inter clusters. The members or the cluster head of Cluster safe which received the E/ W message will s a Hello reply packet to the source of Cluster ERZ. Simultaneously, it passes the E/ W message to the other members of its own cluster and its CH. Thus, congestion will be highly avoided in the critical zone. ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 180

IV. ALGORITHM FOR LRFS In fig 1, the Cluster ERZ is cluster 2. The members of that cluster are g, h, i and k. The cluster head is j. The cluster head j met an accident with the other cluster. So it creates traffic and network congestion. Now the nodes g, h, i and k will wait for $ time to receive HELLO packet from its rear and forward clusters, cluster 1, cluster 3 and cluster 4 without sing E/ W messages. The algorithm to perform this operation is given below: (i) calculated time=0 (ii) identify the risk location (iii) for each packet received from other cluster (iv) maintain its latitude and longitude in its table (v) calculate distance and enter into the table (vi) wait for $ seconds (vii) calculated time= calculated time + 1 (viii) if (calculated time > $) (ix) S E/W message to the Cluster safe Based on fig 1, the distance value is calculated between cluster 1- cluster2, cluster 2- cluster 3 and cluster 2- cluster 4. The calculated distance value is stored in Cluster ERZ table. Based on the calculated distance value, the Cluster ERZ will decide that the cluster 4 is very far away from the risk zone. Therefore, the cluster 4 is Cluster safe. The Cluster ERZ will s E/ W message to Cluster safe Action of CH of Cluster safe We assume that the nodes s and t (members of cluster 4) will receive the E/ W messages first from the risk zone. Now these nodes give priority to the E/ W messages. Suddenly, the nodes s and t are for sing an ACK packet to the source of the risk zone. Simultaneously, it passes the same E/ W message using proactive routing protocol within the intra- cluster to u, w and cluster head v. Then the CH v will give the emergency diversion message to all its members. This scenario is shown in the following algorithm. (i) (ii) (iii) (iv) (v) (vi) for each E/W message to member of Cluster safe immediate ACK to the source of E/ W simultaneously sing E/ W to its CH for each E/ W message to CH s immediate message within its cluster member to divert its path for each E/ W to member node ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 181

(vii) s ACK to its CH After receiving the emergency warning message from its cluster head, the member of that cluster will s an ACK message to its CH. Then all the nodes try to divert its current path. V. SIMULATION AND RESULTS The simulation of the proposed algorithm was based on NS2. The transmission range was set to 500m. The simulation has been done with multiple nodes. Fig 3. shows the simulation carried out in NS2 for 75 nodes. TABLE I. PARAMETERS USED IN NS2 Channel Type Channel/ Wireless Channel Propagation model Propagation/ Two ray Ground MAC Mac/ 802.11 Antenna Bidirectional No. of nodes 75 Transmission 500m Range The performance graph is shown below. The figure 4 shows that the proposed system uses n clusters. So it needs n number of E/ W messages to disseminate all clusters exactly once. 25 20 15 10 5 0 5 7 10 12 15 20 Fig 4: Clusters with E/ W message in proposed system The following Fig. 5 shows the performance of the existing systems. Some of the existing system are not using clusters and scheduling algorithms to disseminate E/ W messages. It simply broadcasts the emergency message to all the neighboring nodes individually. It increases the traffic and network overhead. Based on the solution given in fig 5, if there are 25 nodes (vehicles), then 25 E/ W messages will be flooded. So, if number vehicle increases, number of packets to be broadcast also increased. But in fig 4, the packet to be broadcast count increases based on the number of clusters. Using our proposed approach, it is enough sing one E/ W message to one cluster. ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 182

100 80 60 40 20 0 25 35 50 60 75 85 Fig 5: E/ W message dissemination without using clusters In Fig. 6, the performance of proposed system is compared with the existing protocol REACT. The REACT protocol calculates the distance between current nodes with its destination. It also calculates the distance between neighboring nodes with the destination. All the nodes are with short distance from the risk zone.so it causes congestion. The proposed system calculates the distance between risk zone and the clusters based on its latitude and longitude. Thus, it reduces congestion. 100 80 60 40 20 0 5 7 10 12 15 20 REACT(no of nodes) Proposed system(clus ter) distance of neighbors distance of cluster from RZ Fig 6. Comparison of proposed system with REACT protocol CONCLUSION AND FUTURE WORK In this paper, we introduced a novel scheduling approach for reducing traffic and network congestion using clusters. Here we used clusters for reducing E/ W message count. It is enough to s only one E/ W message to the far away cluster. The node which receives the emergency message will intimate to all the other members of its cluster. By doing this the rear cluster can change its current path before reaching the risk zone. Due to this, the network congestion and traffic congestion will be highly reduced. Our proposed system is compared with REACT protocols. We argue that our proposed system provides better result than the other existing protocols. In the proposed approach, the road conditions and speed of the vehicles are not considered. So In our future work, we consider all the other parameters to produce best solution. REFERENCES [1] D. Rajini Grinath, S. Selvan, A novel cluster based routing algorithm for hybrid mobility model in VANET, International Journal of Computer Applications, vol. 1, no. 15, 2010. [2] Natarajan Maghanathan and Gordon W. Skelton, Risk notification message dissemination protocol for energy efficient broadcast in vehicular ad hoc networks, International Journal of Computer Science, February 2010 [3] Erwin van de velde, Chris Blondia and Luca Campeli, REACT: routing protocol for emergency applications in car- to- car networks using trajectories, Proceedings of the 32nd IEEE Conference on Local Computer Networks, pp. 613-619, 2007 ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 183

[4] Anuj Kumar, Yashwant Singh, Rohit Bajaj and Sonika, Multipath routing protocol with backtracking for mobile ad hoc networks, International Journal of Electronics Engineering, 2010, pp. 115-120 [5] Vishal Kumar and Narottam Chand, Data scheduling in VANETs: a Review, International Journal of Computer Science and Communication, vol 1, no 2, 2010, pp. 399-403 [6] Jai Shankar and Saravanan, An exted AODV protocol for multipath routing in MANETs, International journal of Engineering and Technology, vol 2, no. 4, Aug 2010. [7] http://www.movable-type.co.uk/scripts/latlong.html [8] O. Tanguz, N. Wisitponghuan, F. Bait, P. Mudaligut and V. Sadikat, Broadcasting in VANETs, Proceeding of the conference on mobile networking for vehicular environments, pp. 7-12, May 2007 [9] Josiane Nzouonta and Cristian Borea, STEID: a protocol for emergency information dissemination in vehicular networks, Report, department of computer science, New Jersy of technology, 2006 [10] Pakornsiri Akkhara, Yuji Sekiya and Yasushi Wakahara, Fast alarm message broadcasting in vehicular ad hoc networks, intelligent automation and computer engineering, vol. 52, 2008 [11] D. Rajini Grinath and Dr. S Selvan, Data Dissemination to regulate vehicular traffic using HVRP in urban mobility model, International Journal of Recent Trs in Engineering, vol. 1, no 1, May 2009 [12] Xuefei Li, Laurie Cuthbert, Node disjointness- based multipath routing for mobile ad hoc networks, ACM, Oct 2004 [13] Sung- Ju Lee, Mario Gerla,, Split multipath routing with maximally disjoint paths in ad hoc networks, IEEE international conference on communications, vol. 10, pp 3201 3205, 2001 [14] Mobile ad hoc networks: from wireless LANs to 4G networks - George Aggelou, TMH [15] Qing Xu, Raja Sengupta, Tony Mak and Jeff Ko, Vehicle- to vehicle safety messaging in DSRC, ACM, 2004, pg 19-28 [16] U. S. Department of Transportation, Intelligent Transportation Systems (ITS), Home, http:// www.its.dot.gov/index.htm ISSN : 0975-3397 Vol. 3 No. 1 Jan 2011 184