Vehicular cloud computing: from intelligent transport to urban surveillance
|
|
|
- Warren Smith
- 10 years ago
- Views:
Transcription
1 Vehicular cloud computing: from intelligent transport to urban surveillance VCA 2012 Cyprus, June 19, 2012 Mario Gerla UCLA, Computer Science Dept
2 Mobile Cloud Computing (MCC) Workshop! Colocated with Sigcomm 2012, Helsinki! Workshop date: August 17, 2012! Organizers:! Mario Gerla (University of California Los Angeles)" Dijiang Huang (Arizona State University)"
3 Outline! From Internet Clouds to Mobile Clouds! Types of mobile clouds" Principles and Challenges" Mobile Computing platform design tools" The evolution of vehicular communications! Initial applications: safety and content distrinution" Two Vehicle Cloud Applications:! Urban surveillance" Vehicular Traffic Management" Tools for Mobile Computing Cloud support! UCLA Vehicle Campus Testbed! Future Directions!!
4 The Mobile Cloud! Internet Cloud (eg Amazon, Google etc)! Immense computer, storage resources" BroadBand Connectivity" Services, security" Mobile Cloud Computing (traditional)! What most researchers mean:" Access to the Internet Cloud from mobiles" Tradeoffs between local and cloud computing (eg m-health)" Recently, new Mobile Cloud paradigm:! Mobile nodes increasingly powerful (storage, process, sensors)" Emerging distributed applications not suited for Amazon" Enter: Mobile Computing Cloud (MCC)!
5 Several types of Mobile Clouds! Vehicular Cloud! Intelligent Transport applications" Surveillance" Opportunistic formation" Personal Cloud! Info and advertisment dissemination" Mobile health apps" Dependent on the Internet cloud" Influenced by social networks" Mission Oriented Cloud! Not opportunistic ; rather planned for a goal" Scouting of a particular terrain"
6 Observed trends: Vehicular Cloud 1. Vehicles perform increasingly more complex (sensor) data collection/processing road alarms (pedestrian crossing, electr. brake lights, etc) cooperative content downloading via P2P car- torrent surveillance (video, mechanical, chemical sensors) road mapping via crowd sourcing accident, crime witnessing (for forensic investigations, etc) 2. Spectrum is scarce => Internet upload expensive With Vehicular Cloud Computing: Keep and process data on vehicle cloud instead of uploading to Internet cloud
7 Example of Vehicular Cloud Vehicles in the same geographic domain form a P2P cloud and engage in collaborative activities P2P communications leveraging spectrum holes in the urban unlicensed spectrum Inter-cloud communications via Infrastructure (3G, WiFI) food and gas info. Related work: MobiCloud Dijian Huang Maui MSR Auton Vehi Clouds-S. Olariu IC Net On Wheels Fan Bai GM regulating entrance to the evacuation highway
8 Vehicle Cloud vs Internet Cloud Both offer a significant pool of resources:! computing, storage, communications" However:! Vehicular applications are mainly location relevant! Data Sources: Drivers or environment" Customers: generally the drivers " Vehicle cloud interacts with:! Internet cloud" Personal (smart phone) cloud" Exception: emergency VANET! During an emergency the infrastructure is destroyed"! Emergency cloud is isolated, works on its own power" Vehicles (especially E-vehicles) become the ONLY available computing/ comms resource"
9 Vehicle Cloud computing - classification Cloud computing classification: Sensing the environment Communications to exchange data Processing of on-board data Interaction with Internet Cloud (and edge cloud)
10 Vehicle Cloud Support Tools! Content Based Addressing! CCX, NDN, Haggle etc" Efficient Dissemination/propagation! Synchronization! Collaborative Team formation! Spectrum sensing; cog. frequency selection! Security/Privacy; authentication; revocation!
11 Roadmap ahead Evolution of Vehicular Communications Emerging Vehicle Cloud applications Surveillance Monitoring the environment events (natural or manmade) Urban Traffic management: From totally centralized to locally distributed to evacuation
12 The Vehicle Transport Challenge! Safety! 33,963 deaths/year (2009)" 5,800,000 crashes/year " Leading cause of death for ages 4 to 34! Mobility! 4.2 billion hours of travel delay" $78 billion cost of urban congestion" Environment! 2.9 billion gallons of wasted fuel" 22% CO 2 from vehicles"
13 In 2003 DOT launches: Vehicle Infrastr. Integration (VII)! VII Consortium: USDOT, automakers, suppliers,..! Goal: V2V and V2I comms protocols to prevent accidents! Technology validation;" Business Model Evaluation" Legal structure, policies" Testbeds: Michigan, Oakland (California)! However: 10 year to deploy 300,000 RSUs and install DSRC on 100% cars! Meanwhile: can do lots with 3G and smart phones! Can we speed up proof of concept?! Enter Connected Vehicle ( )!
14 The Connected Vehicle Program! Previous Veh Infrastr Integr (VII) Model (2003-9)! DSRC based for all applications" Start with V2I (for all application types) and evolve into V2V (safety) " Current DOT s Connected Vehicle Plan! Non-safety (mobility, environment)! Leverage existing data sources & communications; include DSRC as it becomes available" Safety DSRC! Aggressively pursue V2V; " Can leveraging of nomadic devices & retrofitting accelerate benefits?"
15 Standard: DSRC / IEEE p/ WAVE! Dedicated 5.9Ghz spectrum! Derived from a!! Three types of channels: V2V service, V2I service and control broadcast channel! IEEE 1609.x: channel allocation, channel estimation, power, data rate control, etc! Forward radar Display Event data recorder (EDR) Positioning system Computing platform Communication facility Rear radar
16 Emerging Application Areas! Safe Navigation! Location Relevant Content Distr.! Urban Sensing! Efficient, Intelligent, Clean Transport!
17 ! " V2V for Safe navigation! Forward Collision Warning,! Intersection Collision Warning.! Advisories to other vehicles about road perils! Ice on bridge, Congestion ahead,."!
18 Car to Car communications for Safe Driving! Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 75 mph Acceleration: + 20m/sec^2 Coefficient of friction:.65 Driver Attention: Yes Etc. Alert Status: None Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 65 mph Acceleration: - 5m/sec^2 Coefficient of friction:.65 Driver Attention: Yes Etc. Alert Status: None Alert Status: Inattentive Driver on Right Alert Status: Slowing vehicle ahead Alert Status: Passing vehicle on left Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 75 mph Acceleration: + 10m/sec^2 Coefficient of friction:.65 Driver Attention: Yes Etc. Alert Status: Passing Vehicle on left Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 45 mph Acceleration: - 20m/sec^2 Coefficient of friction:.65 Driver Attention: No Etc.
19 Location relevant content delivery! Traffic information! Local attractions, advertisements! Tourist information, etc!! CarTorrent : cooperative download of location multimedia files! " "
20 You are driving to Vegas You hear of this new show on the radio Video preview on the web (10MB)
21 One option: Highway Infostation download Internet file
22 Incentive for opportunistic ad hoc networking Problems: Stopping at gas station for full download is a nuisance Downloading from GPRS/3G too slow and quite expensive 3G broadcast services (MBMS, MediaFLO) only for TV Observation: many other drivers are interested in download sharing Solution: Co-operative P2P Downloading via Car-Torrent (like Bit Torrent in the Internet)!!!!!
23 CarTorrent: Basic Idea! Internet Download a piece Outside Range of Gateway Transferring Piece of File from Gateway
24 Co-operative Download: Car Torrent! Internet Vehicle-Vehicle Communication Exchanging Pieces of File Later
25 Simulation Results! Completion time density! 200 nodes 40% popularity Time (seconds)
26 Surveillance Scenario: storage and retrieval! Participating Cars ( busess, taxicabs, commuters):! Continuously collect images from the street (store data locally)" Process the data and detect an event" Classify the event as Meta-data (Type, Option, Loc, time,vehicle ID)" Question: how to access this info?! - Sensing - Processing Summary Harvesting CRASH Crash Summary Reporting Meta-data : Img, -. (10,10), V10
27 Mobility-assisted Meta-data Diffusion/ Harvesting (Mobeyes 2007)! HREP HREQ Agent harvests a set of missing meta-data from neighbors Periodical meta-data broadcasting + Broadcasting meta-data to neighbors + Listen/store received meta-data
28 MobEyes: Mobility-assisted Epidemic Dissemination! Mobeyes exploit mobility to disseminate metadata!! Source periodically broadcasts meta-data to neighbors! Only source can advertise meta-data" Neighbors store advertisements in their local memory" Drop stale data" A mobile agent (the police) harvests meta-data from vehicles by querying them (with Bloom filter)!
29 Urban Surveillance as a Service! Suppose a green truck was involved in a suicidal terrorist attack! The truck blows up " The Agency wants to find out the approach path of the vehicle" Wants to learn if any accomplices drove along with the truck up to the target" Conventional solution: road side video cameras! Sophisticated attacker can avoid video cameras, or disable them" Mobeyes based solution:! Reconstruct the path by using the other vehicles video cameras" We have run a simulation experiment in a 2kmx2km area, with 100 vehicles roaming! Vehicles watch each other and agent reconstructs all paths"
30 Trace Reconstruction!
31 Trace Reconstruction!
32 Intelligent navigation!! GPS Based Navigators! Dash Express (came to market in 2008):! Synergy between Navigator Server and City Transport Authority!
33 NAVOPT Navigator Assisted Route Optimization!! On Board Navigator! Interacts with the Server" Periodically transmits GPS and route" Receives route instructions" Manhattan grid (10x10)! 5 routes (F1~ F5) from source to destination" Link capacity: 14,925 [vehicles/h]" F2,5 F3,4 S F5 F2 Shortest path F1 F3 D F4
34 Analytic Results! Total average delay (h/veh)! 0.45" 0.4" 0.35" Average delay (hour)! 0.3" 0.25" 0.2" 0.15" shortest path" flow deviation" 0.1" 0.05" 0" 13500" 13600" 13700" 13800" 13900" 14000" 14100" 14200" 14300" 14400" 14500" 14600" 14700" 14800"
35 Analytic Results (cont)! Average speed (Km/h)! 70" 60" 50" Speed (Km/h)! 40" 30" shortest path" flow deviation" 20" 10" 0" 13500" 13600" 13700" 13800" 13900" 14000" 14100" 14200" 14300" 14400" 14500" 14600" 14700" 14800"
36 Sumo simulation results! Sumo-0.12! 10 X10 grid" Road segment: 400m" Length of vehicle: 4m" Max speed limit: 60Km/h" Average delay! Delay increases drastically around rate [veh/h] in case of shortest path" In NAVOPT, delay slightly increases around 20000"
37 What happens when the grid gets congested?! As density increases, flow decreases! Eventually the system comes to a stand still (bottleneck)" The gradient flow optimization (eg Flow Deviation) works only in free flow mode (below congestion density level)! Function no longer convex => many local minima" In congested mode, new techniques must be used" Question: how can the Navigator Server detect that the system is congested and how badly?! Must correlate and interpret the space-time probes obtained by vehicles"
38 Lessons Learned! When density increases beyond critical value, the mode changes from FREE FLOW to CONGESTED! Phase transition delayed by V2V communications" The Navigator Server can detect congestion because the velocity on the road segment is uneven:! Random, distributed slow down => Shockwaves" Localized traffic jam => backlog propagation" If the system is congested, basic gradient method optimization does not work:! Function is not convex => multiple local optima" Need to exercise FLOW CONTROL! "
39 Nav Opt Next Steps! Make the process {traffic measmt and route enforcement} iterativly! Deal with Free Flow as well as Backlogged! SUMO + Qualnet will be used as the simulation platform! Include pollution component based on engine regime! Include pollution costs in the optimization!
40 Distributed traffic management! Centralized traffic management cannot react promptly to local traffic perturbations! A doubled parked truck in the next block; A traffic accident; A sudden surge of traffic" Internet based Navigator Server cannot micro-manage traffic for scalability reasons " Enter distributed, v-cloud based traffic mgmt! Distributed approach a good complement of centralized supervision" On the Effectiveness of an Opportunistic Traffic Management System for Vehicular Networks, Leontiadis et al, IEEE Trans on ITS Dec 2011!!
41 CATE: Comp Assisted Travl Environment! Vehicles crowd source traffic information and traffic load data base:! 1) sensing traffic information from road segment travel time;" 2) sharing it with neighboring vehicles (in an ad hoc manner); and" 3) dynamically recomputing the best route to destination from the current position." The study was done by simulation:! QUALNET a popular event driven MANET simulator, and" MobiDense, a mobility simulator that combines topology and traffic flow information to generate a mobility trace." Case Study: Traffic pattern for Portland obtained from Los Alamos Lab" Potential limitations of CATE:! Delay in traffic loads propagation; lack of trip destination info"
42 Traffic loading w/o CATE! Green no congest Yellow moderate Red heavy congest"
43 Traffic loading with CATE! Green no congest Yellow moderate Red heavy congest"
44 Histogram of vehicle decreased trv time!
45 Information Propagation Speed! Two-dimensional Heatmap of age of received information (in seconds) about the link highlighted by the arrow (bridge)."
46 CATE tested on C-VET! Up to 8 vehicles roaming the Campus with GPS, WiFi radios and 250m range! Static throughput between two nodes = 30Mps! At 30km/h througput = 7Mbps! Propagation of a 2MB block (traffic sample) from one node to the other 7 nodes:! First vehicle received full block in 20s" Next four in < 72s" Last two in < 125s " C-VeT experiments are comparable with Portland simulation results!
47 Integrating Centralized and Distributed traffic management! Central Navigator Server (in the Amazon cloud):! Provides MACRO traffic instructions" Is aware of user destinations" Accounts for possible congestion fees" Can perform ECO-Routing (accounting for pollution)" Interacts with City Traffic/Planning Department (traffic lights, Green waves, access ramp control)" Distributed (CATE-like) traffic management in the Vehicular Cloud:! Can handle sudden traffic jams, accidents, other anomalies" Provides miopic traffic redirections w/o preempting Server" Can be a safety net when infrastructure fails" Amzon Cloud + Vehicle Cloud :! Improves scalability, reaction time, robustness to disasters"
48 Vehicle Cloud Support Tools! Content Based Addressing! CCX, NDN, Haggle etc" Efficient Dissemination! Synchronization! Collaborative Team formation! Spectrum sensing; cog. frequency selection! Security/Privacy!
49 CBMEN ENCODERS DARPA CBMEN Program Content Based MANET - Edge Networking Mark-Oliver Stehr, (SRI) David Anhalt, Hua Li (SET) José Joaquin Garcia-Luna-Aceves (UCSC)! Mario Gerla (UCLA) 49
50 Finding content in a MANET! MANET is ideally suited for emergency & tactical operations, but!! hard to find content" no search engine" Goal: Scalable, efficient content search in MANETs Content Based Networking! 50
51 Network Coding to assist content retrieval! File/1 Interest triggers download of content File/1 Content is encoded in three blocks File/2 File/3 File/2 File/3 File/1 File/2 File/3 File (coded) File (coded) File (coded) Get File/1, File/2, File/3 at once 51
52 Applying Cognitive Radios to Wi-Fi based Vehicular Networks
53 Real Time Surveillance in Urban Motorcade! Urban motorcade:! Surveillance video multicast!escort cars transmit video streams to agents in motorcade using WiFi! Problem: urban WiFi is becoming increasingly congested! Approach: Use Cognitive Radios to minimize impact on urban WiFI! presidential motorcade
54 Westwood experiment (4 blocks) IEEE b/g! 50 Mhz 227APs discovered using wireless card in automatic detection mode. Orthogonal channels 1,6,11 are predominant
55 Urban WiFi Spectrum Sharing Problem! Secondary users! Escorts generate surveillance video streams and multicast to patrollers" Store and forward within motorcade only" Primary network residential WiFi users! Dense WiFi access point deployment must minimize disruption of residential WiFi" In turn, minimize interference caused by residential traffic on motorcade"
56 On-Demand Multicast Routing Protocol (ODMRP)! S F F R F F On-demand mesh creation! A source initiates Join Query flooding when it has data to send." Intermediate nodes relay Join Query after recording the previous hop as backward pointer." Multicast subscribers send Join Reply messages, following backward pointers to the source." Upon receiving a Join Reply, a node declares itself as part of the forwarding group." R R R R mesh Join Query Join Reply
57 CoCast: Cognitive Multicast! Join Query flooding in the Common Control Channel! Cognitive nodes compute Active channels (two-way available) after receiving Join Queries that contain Available channels.! Available! 3, 6, 7! Available! 1, 5, 7! Active! Listen! Transmit! S" Available! 1, 2, 4, 5! Active! Listen! Transmit! 1,5,7 7 data channels (1~7), 1 common control channel (0) Available! 1, 2, 5, 6! Active! Listen! Transmit! 1, 5 F" 1, 2, 5 F" Available! 1, 2, 4, 6! Active! 1, 2, 6 Listen! Transmit! 1,2,5,6 F" F" Available! 2, 4, 6! Active! 2, 6 Listen! Transmit! 1,2,4,6 R" R" R" Active! 6 Listen! Transmit! Available! 1, 2, 6, 7! Active! 1, 2, 6 Listen! Transmit! Available! 1, 2, 6! Active! 2, 6 Listen! Transmit!
58 CoCast: Channel Allocation! Sending back Join Reply! Receiver selects Listen channel from Active channel list, and reports in JR" Forward nodes set own TX Channel to Listen channels of downstream node" Goal: minimize # of channel frequency switches along path" Available! 3, 6, 7! Available! 1, 5, 7! Active! Listen! Transmit! 1 S" Available! 1, 2, 4, 5! Active! 1, 5! Listen! Transmit! F" 2 Available! 1, 2, 5, 6! Active! 1, 2, 5! Listen! Transmit! 2 2, 6 F" 6 2 Available! 1, 2, 4, 6! Active! 1, 2, 6! Listen! Transmit! F" F" Available! 2, 4, 6! Active! 2, 6! Listen! Transmit! R" R" R" Active! 6! Listen! 6 Transmit! Available! 1, 2, 6, 7! Active! 1, 2, 6! Listen! 6 Transmit! Available! 1, 2, 6! Active! 2, 6! Listen! 2 Transmit!
59 Simulation Setup! Simulation configuration in QualNet 3.9! Parameter" Value" Number of Nodes! 100! Mobility! Switching delay (D switch )! Number of channels! Channel data rate! Packet size/rate! RGM model, 20m/s! 0~50 ms! 7 Data channels, 1 CCC! 2 Mbps! 512 Bytes, 4pps! Reference Group Mobility Model! Random way point motion within the motorcade" Each geographic area has different WiFi channel occupancies! Channel idle/busy state changes in space and time"
60 Simulation Results! Variable number of video sources! 2 ~ 10 source nodes within the same motorcade" Comparison between ODMRP and CoCast in terms of delivery ratio! Static case vs. mobile case "" CoCast scales better with increasing number of source nodes! Nice surprise: frequency switching along the path mitigates HIDDEN TERMINAL"
61 SORA SDR Kit High-performance Software Defined Radio kit from MSR Asia. Exploits multiple cores available in CPU. 3+ stations available. Plans Implementation of Cognitive Protocols OFDM channel measurements OFDM subcarrier assignment 61
62 C-Ve T Campus - Vehicular Testbed E. Giordano, A. Ghosh,! G. Marfia, S. Ho, J.S. Park, PhD! System Design: Giovanni Pau, PhD! Advisor: Mario Gerla, PhD!!
63 The Deployment! We plan to install our node equipment in:! 30 Campus operated vehicles (including shuttles and facility management trucks). " Exploit on a schedule and random campus fleet mobility patterns " 30 Commuting Vans: Measure urban pollution, traffic congestion etc" 12 Private Vehicles: controlled motion experiments " Cross campus connectivity:10 node WiFi Mesh + 2 WiMAX base stations" Support: NSF GENI, ARMY DURIP, CISCO!
64
65 C-VeT Goals! Provide:!! A shared virtualized environment to test new protocols! Full Virtualization! MadWiFi Virtualization (with on demand exclusive use)" Multiple OS support (Linux, Windows)" Assisted by:! Qualnet Simulator " VEMU fully virtualized Emulator" Enable:! Propagation experiments! Collection of mobility traces and network statistics! Use of platform for Urban Sensing, Geo routing etc! Deployment of innovative V2V/V2I applications!
66 Preliminary Experiments! Equipment:! Up to 6 cars roaming the UCLA Campus" abg radios" Routing protocol: OLSR" " Experiments:! Connectivity map computed by OLSR" Azureus P2P application" Propagation model validation" OLSR and AODV comparison" Crowd Sourcing to discover urban grid details (eg position of traffic lights, their cycle, etc)" "
67 Line of sight and Corner propagation models! Q. Sun et al, Analytical formulae for path loss prediction in urban street grid.., IEEE TVT, July 2005.
68 CORNER: fixed to mobile!
69 C-VeT Experiments in Progress!! Cognitive radios to improve spectrum utilization! Virtualized Router experiments! Multiple routing protocols (OLSR, AODV)" Multiple OS support (Linux, Windows). " Soft Handoff experiments (WiFI, WiMAX)! Multipath with Network Coding" Propagation model validation for 5.9 Ghz (DSRC frequency band)! Intelligent Navigation experiments! Dissemination delays"
70 Work ahead in Vehicle Cloud research Vehicle cloud formation and maintenance Subclouds with common social interests In-Cloud networking Cloud Content dissemination, storage, indexing, search (Content Centric Networking) Efficient spectrum usage (via cog radios) Exploit WiFi spectrum short range Exploit TV spectrum long range connections (to other vehicle clouds) User-centric security and privacy protection Interaction with Internet Cloud Interaction with pedestrian (people) clouds
71 The End! Thank You!
VANET Services and Mobile Vehicle Clouds
VANET Services and Mobile Vehicle Clouds Université de Lyon, Lyon, March 25, 2015 Mario Gerla UCLA, Computer Science Dept Mobile Computing Cloud Internet Cloud (eg Amazon, Google etc) Data center model
Technical Document on Vehicular Networks
Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress
Research Projects in the Mobile Computing and Networking (MCN) Lab
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing
INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
Vehicular Cloud. Fan Zhang
Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
The Vision of Vehicle Infrastructure Integration (VII)
The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Automotive Communication via Mobile Broadband Networks
Automotive Communication via Mobile Broadband Networks Dr. Joachim Sachs Ericsson Corporate Research, Aachen Contributors: René Rembarz, Mai-Anh Phan, Sabine Sories Where are we in telecommunications?
Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University
Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University Background Ph.D., Yale University (computer science, 1978) J.D., Duquesne University (law, 1981) Carnegie Mellon computer
September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS
September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 10:30 AM 12:00 PM AM01: Sustainable Transportation Performance Measures: Best Practices September 8th 10:30 AM
The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014
The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space. GPS 2: Big Data The Real Value of Your Social Media Accounts
22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space GPS 2: Big Data The Real Value of Your Social Media Accounts October 7, 2015 Kenneth Leonard Director, Intelligent Transportation
M2M ATDI services. M2M project development, Business model, Connectivity.
M2M ATDI services M2M project development, Business model, Connectivity. Introduction Thanks to our leadership in Spectrum management, Prospective planning, Network deployment, ATDI was/is involved in
USDOT Connected Vehicle Overview
USDOT Connected Vehicle Overview RWM Stakeholder Meeting August 8, 2012 Dale Thompson, Intelligent Transportation Systems Joint Program Office, RITA, U.S. DOT 1 Overview NHTSA Decision Safety Pilot Policy-Architecture
Location Identification and Vehicle Tracking using VANET(VETRAC)
Location Identification and Vehicle Tracking using VANET(VETRAC) Supervisor Name: Md. Mosaddik Hasan Assistant Professor Dept. of CSE MBSTU Md. Al-Amin Nipu CE-10031 Dept. of CSE MBSTU Abstract: Large
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
Towards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Networking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo
Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,
Introduction to Computer Networking: Trends and Issues
Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,
Wireless Technologies in Industrial Markets
SOLUTION PAPER Wireless Technologies in Industrial Markets An Examination of Mesh Technologies in Mining Executive Summary Consumers and enterprises around the globe use standards-based 802.11a/b/g/n WiFi
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
The Optimal Methods of IVC Routing Protocol for VANET
The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Rethinking the Small Cell Business Model
CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1
WLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
LTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Wireless Broadband Access
Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Monitoring Free Flow Traffic using Vehicular Networks
Monitoring Free Flow Traffic using Vehicular Networks Hadi Arbabi and Michele C. Weigle Department of Computer Science Old Dominion University Norfolk, VA 23529 USA {marbabi, mweigle}@cs.odu.edu Abstract
Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni VANETs
VANETs Ing. Alessandro Leonardi VANETs Vehicular Ad-hoc NETworks (VANETs) can be considered as a subset of Mobile Ad hoc NETworks (MANETs) with unique characteristics. A typical VANET consists of vehicles
Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ
Craig McWilliams Craig Burrell Bringing Smarter, Safer Transport to NZ World Class Transport. Smarter, Stronger, Safer. Bringing Smarter Safer Transport to NZ Craig Burrell Infrastructure Advisory Director
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Traffic System for Smart Cities. Empowering Mobility Consulting Solutions Managed Services
Traffic System for Smart Cities Empowering Mobility Consulting Solutions Managed Services About US Leading provider of Toll Collection and Intelligent Transport Management Systems (ITS) More than a decade
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Securing Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance
Using Wireless Networks for Video Surveillance Version: 1 White Paper Using Wireless Networks for Video Surveillance Using Wireless Networks for Video Surveillance Version: 1 White Paper Table of Contents
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development
JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability
Output Power (without antenna) 5GHz 2.4GHz
Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,
Improving Driving Safety Through Automation
Improving Driving Safety Through Automation Congressional Robotics Caucus John Maddox National Highway Traffic Safety Administration July 25, 2012 NHTSA s Missions Safety Save lives, prevent injuries and
Energy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Current and Future Trends in Hybrid Cellular and Sensor Networks
2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao [email protected] www.huawei.com ETSI TC M2M Workshop 19-20 October
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
AAA AUTOMOTIVE ENGINEERING
AAA AUTOMOTIVE ENGINEERING Evaluation of Blind Spot Monitoring and Blind Spot Intervention Technologies 2014 AAA conducted research on blind-spot monitoring systems in the third quarter of 2014. The research
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy
INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Basic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Intelligent Transportation System for Vehicular Ad-Hoc Networks
Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Space-Based Position Navigation and Timing National Advisory Board
Space-Based Position Navigation and Timing National Advisory Board Intelligent Transportation System (ITS) Evolution GPS/GNSS Role in Emerging Vehicle Fleets and Highway Infrastructure Brian P. Cronin,
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
SECURITY AND EMERGENCY VEHICLE MANAGEMENT
SECURITY AND EMERGENCY VEHICLE MANAGEMENT Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 10 Purpose
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
