Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni VANETs
|
|
- Stewart Hodge
- 8 years ago
- Views:
Transcription
1 VANETs Ing. Alessandro Leonardi
2 VANETs Vehicular Ad-hoc NETworks (VANETs) can be considered as a subset of Mobile Ad hoc NETworks (MANETs) with unique characteristics. A typical VANET consists of vehicles and access points along the road. Vehicles move on the roads sharing information between themselves and with the Internet through the access points.
3 Vehicles communication Vehicle-to-vehicle communication Multi-hop communication Vehicle-to-infrastructure communication
4 VANETs vs. MANETs Vehicles mobility Vehicles often move at high speed but their mobility is rather regular and predictable Network topology High speed movement creates scenarios characterized by a very dynamic network topology No significant power constraint Vehicles can always rely on recharging batteries Localization An accurate estimate of vehicles position can be made available through GPS systems or on-board sensors
5 PHY/MAC
6 DSRC/802.11p (1/2) Dedicated Short Range Communication (DSRC) was released in 2002 by the American Society for Testing and Materials (ASTM) In 2003 the standardization moved to IEEE Forum and changed the name from DSRC to WAVE (Wireless Ability in Vehicular Environments) also known as p
7 DSRC/802.11p (2/2) The standard is based on IEEE a PHY layer and IEEE MAC layer Seven 10 MHz channels at 5.9GHz one control channel and six service channels
8 DSRC/802.11p vs a (1/3) a is designed for high data rate multimedia communications in indoor environment with low user mobility DSRC PHY uses a variation of OFDM modulation scheme to multiplex data high spectral efficiency, simple transceiver design and avoids multipath fading
9 DSRC/802.11p vs a (2/3) DSRC/802.11p reduces the signal bandwidth from 20MHz to 10MHz all parameter values are doubled in time domain in order to increase the robustness to ISI caused by the multi-path delay spread and Doppler spread effect Data rates from 6 up to 27 Mbps Transmit power level are changed to fit requirements of outdoor vehicular communications communication ranges up to 1000 meters
10 DSRC/802.11p vs a (3/3)
11 DSRC/802.11p MAC MAC layer of DSRC is very similar to the IEEE MAC based on CSMA/CA with some minor modifications DSRC involves vehicle-to-vehicle and vehicle-toinfrastructure communications
12 DSRC/802.11p scenarios relative speed between vehicles is low despite high absolute speed the effect of mobility can be ignored and considered only multi-hop aspects the key attribute necessary for communications in this kind of scenario is the need for very high download rates over a short duration
13 MAC problems Scenario a) Starvation due to hidden terminal exposed terminal Solutions: Scenario b) limiting data transmission duration by using small maximum TCP window size MAC layer approaches (MACAW) Low efficiency and instability due to shortened connection time Solutions: low overhead protocol (no RTS/CTS handshake) no variable rates because this leads to overestimation or underestimation of the NAV used in future
14 MAC issues Priority, response time and reliability should be assured because are basic requirements of safety applications Approaches: Different CWs and backoff increase parameters for different priority classes in data traffic (e.g., DFS) Assigning shorter CWs to low-delay real-time service Static slot assignment for high-priority traffic and dynamic assignment for the low-priority traffic
15 Routing
16 Routing Protocols for VANETs (1/3) Proactive algorithms (table-driven) better performance in terms of delay but they need a considerable amount of control traffic (e.g., OLSR) Reactive algorithms (on-demand) minimize the number of broadcast packets by creating routes only on demand (e.g., AODV) Several studies demonstrate that neither of the two protocol classes outperform the other in every vehicular scenarios.
17 Routing Protocols for VANETs (2/3) Traditional MANETs routing protocols require an explicit route establishment phase before the data transmission begins They are not adequate to low delivery-latency requirement for safety applications Routing protocols for VANETs should rely on packet forwarding based on geographic location of sender and receiver should be broadcast oriented
18 Routing Protocols for VANETs (3/3) Position-based unicast routing (geographical forwarding) these routing protocols exploit the availability of accurate location information more suited to dense networks and to frequent network disconnections (e.g., GPSR) Geocast routing a kind of multicast routing where the destination nodes are characterized by their geographical coordinates in VANETs nodes interested in notifications of traffic congestions or warnings are located in the same place
19 Broadcast (1/2) Majority of applications for VANETs rely on broadcast dissemination of information in the applications area Blind flooding is the first approach to achieve broadcasting since it does not require local or global topology information Broadcasting has a strong influence on network performance Serious redundancy, contention and collision problems can occur as a result of flooding An efficient broadcast protocol should minimize the total number of packet retransmissions, while at the same time preserving network connectivity
20 Broadcast (2/2) A trade-off between robustness and redundancy should be found Different approaches: probability-based a node forwards the packet with a probability p which depends on network scenario location-based the idea is to select as relays those nodes that permit to cover the widest additional area neighbor-based the nodes decide whether broadcasting the message or not on the status of their neighbors cluster-based nodes are grouped into small clusters each one managed by a particualr node called cluster-head which has the task of retransmitting broadcast messages
21 Classes of Applications Assistance for Safe Navigation Internet Connectivity
22 Assistance for Safe Navigation (1/4) Traffic safety It is possible to detect dangerous situations through on- board sensors Warning messages propagate to other vehicles through ad- hoc networking Traffic management services Access points along the road distribute information about traffic congestion, weather forecast,, road works,, etc.
23 Assistance for Safe Navigation (2/4) Smart vehicle s onboard instrumentation: Newer cars include features as recording,, processing, positioning and location capabilities. Communication facility supports wireless data exchange with other vehicles or fixed stations. Forward radar Event data recorder (EDR) Positioning system Communication facility Display Computing platform Rear radar
24 Assistance for Safe Navigation (3/4) A potential danger scenario : The system automatically triggers the propagation of warning messages by exploiting multi-hop ad-hoc communications Vehicle-to-roadside communication Inter-vehicle communication Roadside base station Emergency event
25 Assistance for Safe Navigation (4/4) Overview of some vehicular safety and communication projects: European Community has recently funded a forum to support the development of a network system offering assistance to the drivers. Many interesting features are presented in the following projects: CarTalk 2000 FleetNet
26 CarTalk 2000 (1/5) Objectives: - Development of co-operative driver assistance systems based upon inter-vehicle communication - Development of a mobile ad-hoc radio network as a communication platform with the aim of preparing a future standard PARTNERS: Centro Ricerche Fiat, DaimlerChrysler, Siemens Mobile, Bosch
27 Applications: CarTalk 2000 (2/5) - Information and Warning Functions: transmission of warning messages during breakdown,, high traffic density or congestion,, or dangerous road surface conditions. This allows an early warning of the driver of following vehicles on the same road.
28 CarTalk 2000 (3/5) Applications: - Communication-based Longitudinal Control System: Existing Adaptive Cruise Control systems only react on the vehicle directly in front. By integrating communication, these systems may adapt longitudinal control to the traffic in front and can allow anticipating to an early braking maneuver when an invisible vehicle beyond the direct predecessor in front is braking. This leads to a more natural following behavior.
29 CarTalk 2000 (4/5) Applications: - Co-operative Assistance Systems: A typical scenario for co-operation is the highway entry and merging scenario. Today, misunderstandings between drivers on the highway and on the entry-lane cause critical situations. By exchanging information up to simple trajectory plans, critical situations can be foreseen and solved by the vehicles themselves.
30 CarTalk 2000 (5/5) Technologies: - Communication System: A key technology for CarTALK 2000 is the development of a mobile multi-hop ad-hoc radio communication system that meets the requirements set by the applications. It will be based on a UMTS radio access technology, using a spatial-aware position-based multi-hop routing protocol.
31 FleetNet (1/6) Objectives: - Development of a communication platform for inter-vehicle communications - Implementation of demonstrator applications - Development and standardization of promising strategies and solutions in order to improve drivers and passengers safety and comfort PARTNERS: DaimlerChrysler AG, Fraunhofer FOKUS, NEC Europe Ltd, Robert Bosch GmbH, Siemens AG, TEMIC Telefunken, microelectronic GmbH, Universities of Mannheim, Hamburg-Harburg, Karlsruhe,, Hannover.
32 FleetNet (2/6) Applications: - Cooperative driver assistance : - Emergency notification - Overtaking assistance - Obstacle warning
33 FleetNet (3/6) Applications: - Decentralized floating car data : - Traffic jam monitor - Dynamic navigation - Route weather forecast
34 FleetNet (4/6) Applications: - User communications and information services : - Hot-spot Internet access - Inter-vehicle chat - Distributed games
35 FleetNet (5/6) Key Features: - Wireless multi-hop ad hoc networking - Unlicensed radio frequency bands - Allows for low cost data transmission - Position-based routing and location-based services - Internet access and integration - Open solution
36 FleetNet (6/6) Technologies: - FleetNet plans to use a UTRA TDD radio hardware: UMTS Terrestrial Radio Access system will be enhanced or replaced by FleetNet protocols enabling operation ad hoc mode. - Radar-based communication currently under feasibility study will focus on safety-related applications. - During the FleetNet development process IEEE wireless LAN components will be used intermediately for testing and verification purposes.
37 Internet Connectivity (1/2) Internet-based services Access to ,, web browsing,, etc. Video and audio applications P2P Chatting, multiplayer games On board file sharing
38 Internet Connectivity (2/2) Some proposed systems : Drive-thru Internet CarTorrent
39 Proposed Architecture : Drive-thru (1/5) One or more locally interconnected access points form a so- called connectivity-island, several of them along a road or in the same area may be interconnected and cooperate to provide network access with intermittent connectivity to drivers in a larger area.
40 Drive-thru (2/5) Features: - Investigation about the feasibility of providing network connectivity and, ultimately,, Internet access to mobile users in vehicles by testing UDP and TCP performance in a real vehicular scenario using IEEE b and g hardware - Hot spots along the road will provide WLAN access for some (relatively( short) period of time to vehicles driving by. - Conventional client-server approach
41 Drive-thru (3/5) Measurement scenario and findings:
42 Drive-thru (4/5) Findings from measurements: - Both UDP and TCP tests performed over IEEE b and g hardware suggest to subdivide a connectivity session into three distinct phases: Entry phase Production phase Exit phase Only in the production phase a stable connectivity jointly with a maximum throughput value is possible, while in the entry and exit phases performances decrease due to a higher number of lost packets and link-layer retransmissions.
43 Drive-thru (5/5) Results and impact on Internet applications: - Usability of exsisting IEEE radio hardware to transmit a significant amount of data during a connectivity session - Limited connectivity period and variable transmission characteristics limit the usage of the system for continous communications such as IP telefony while transaction based application like sending an could be performed exploiting more than one connectivity window
44 CarTorrent (1/11) Key Features: - Cooperative P2P vehicular strategy proposed for content delivery of large multimedia files - Communication efficient swarming protocol which uses a gossip mechanism to propagate content avalaibility informations that leverages the broadcast nature of wireless medium - Piece-selection strategy which takes proximity into account for the exchange of information pieces
45 CarTorrent (2/11) Key factors for using opportuninistic ad hoc networking models: - Problems: Stopping at gas station for full download is a nuisance Downloading from GPRS/3G too slow and quite expensive - Observation: Many other drivers are interested in download sharing (like in the Internet) - Solution: Co-operative P2P Downloading via Car-Torrent
46 CarTorrent (3/11) Infostation model : downloads only at infostation Download pieces Roadside base station Vehicle-to-roadside communication Internet
47 CarTorrent (4/11) Basic idea: Co-operative download phase 1 Download pieces Roadside base station Vehicle-to-roadside communication Internet
48 CarTorrent (5/11) Basic idea: Co-operative download phase 2 Inter-vehicle communication Roadside base station Internet
49 CarTorrent (6/11) A Bit Torrent review: - Swarming: Parallel downloads among a mesh of cooperating peers - Scalable: System capacity increases with increase in number of peers - Tracker: Handles peer discovery Centralized Tracker: single point of failure Observation: Might not work for Wireless scenarios, because of intermittent connectivity Issue: Mobility increases churn of nodes participating in a download
50 CarTorrent (7/11) A picture of Bit Torrent system: Uploader/downloader Uploader/downloader Uploader/downloader Tracker Uploader/downloader Uploader/downloader
51 CarTorrent (8/11) Gossip protocol : FIles are divided in chunks. A Gossip message containing Torrent ID, Chunk list and Timestamp is propagated by each peer.
52 CarTorrent (9/11) Peer Selection Strategies: Problem: how to select the peer for downloading? Possible selections schemes: 1) Rarest First: BitTorrent-like policy of searching for the rarest bitfield in your peerlist and downloading it 2) Closest Rarest: download closest missing piece (break ties on rarity) 3) Rarer vs Closer: weights the rare pieces based on the distance to the closest peer who has that piece.
53 CarTorrent (10/11) Impact of Selection Strategy :
54 CarTorrent (11/11) Attractive aspects of CarTorrent solutions: - Bandwidth at the infostation is limited and not convenient - It can become congested if all vehicles stop - It is a nuisance as I must stop and waste time - GPRS and 3G bandwidth is also limited and expensive - The car to car bandwidth on the freeway is huge and practically unlimited! - Car to car radios already paid for by safe navigation requirement - CarTorrent transmissions are reliable - they involve only few hops (proximity routing)
55 Vehicular mobility models and simulators Modeling vehicular traffic Vehicular simulators
56 Issues: Modeling vehicular traffic (1/5) One key problem in the study of VANETs is the need to characterize vehicular nodes mobility and traffic patterns in order to produce mobility models that reflect as close as possible the real behaviour of mobile systems Mobility model affects the simulation results
57 Approaches: Modeling vehicular traffic (2/5) Based on a level-of- detail classification, traditionally, three types of approaches have been used: Microscopic models Kinetic models Macroscopic models
58 Modeling vehicular traffic (3/5) Microscopic models: The most basic and detailed approaches are microscopic or car following models, modeling the actual response of individual vehicles to their predecessor Each vehicle is described on the microscopic scale by its space x(t) and speed v(t) coordinates at time t
59 Kinetic models: Modeling vehicular traffic (4/5) Present an intermediate step between the other two models Partially derived from microscopic models and used to obtain fluid dynamic equations,, so leading to macroscopic models Effective approach for the derivation of valid vehicular traffic models which takes also into account for the psycho- physiological nature of driver interaction (microscopic( level) A distribution function f(x,v,t) describes the number of vehicles with a certain location and speed at time t
60 Modeling vehicular traffic (5/5) Macroscopic models: Coarsest level of description In most applications one is neither interested in the exact evolution of the singles vehicle nor in the distribution function f Use fluid dynamic equations Main quantities are the density, the mean speed variance of vehicles and speed
61 Issues: Vehicular simulators (1/3) While it is crucial to test and evaluate protocol implementations in a real testbed environment, simulations are still commonly used as a first step in any protocol development for VANETs research VANETs imply specific motion patterns that make the common random mobility models used in unrealistic MANETs
62 A quick overview : Vehicular simulators (2/3) Recently new open-source tools are available for generation of vehicular mobility patterns. Most of them are capable of producing traces for network simulators such as ns-2 or OpNet STRAW: The Street Random Waypoint tool provides road topology extraction from the maps of the TIGER database as well as micromobility support.. The main drawback is that it produces traces not usable by different well-known network simulators but only by the SWANS platform on which it is based
63 A quick overview : Vehicular simulators (3/3) CanuMobiSim: is a tool for the generation of movement traces in a variety of conditions. Extrapolation of real topologies from detailed Geographical Data Files (GDF) are possible, many different mobility models are implemented,, a GUI is present,, and the tool can generate mobility traces for ns-2 and other simulators. Micromobility is considerated, implementing several car-to- car models.
64 Future research and challenges Solutions proposed for VANETs are inspired to well-known paradigms defined for ad hoc networks and they do not fully exploit the peculiar features characterizing VANETs Most current research on multi-hop networks assumes fixed or very slow varying network topology the effect of high mobility in ad hoc networks should be fully investigated new mobility models should be developed New algorithms should be designed taking into consideration severe delayconstraints of safety applications and real-time applications new MAC schemes routing schemes should provide a good tradeoff between reliability and overhead Location privacy schemes should be designed to prevent or mitigate tracking of vehicles during their communication with other vehicles or the road-side infrastructure
Opportunistic Ad Hoc Networking: the Case for Car to Car Communications
1 Opportunistic Ad Hoc Networking: the Case for Car to Car Communications Mobiquitous 2005 Mario Gerla Computer Science Dept UCLA What is an opportunistic ad hoc net? A wireless ad hoc extension of the
More informationINTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationVehicular Cloud. Fan Zhang
Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information
More informationTowards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
More informationRoad-Based Routing Protocol for Vanet Using Sumo and Move
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationInternet on the Road via Inter-Vehicle Communications
Internet on the Road via Inter-Vehicle Communications Dr. Walter J. Franz 1, Dr. Hannes Hartenstein 2, Bernd Bochow 3 1) DaimlerChrysler AG, walter.franz@daimlerchrysler.com 2) NEC Europe Ltd., hannes.hartenstein@ccrle.nec.de
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationResearch Projects in the Mobile Computing and Networking (MCN) Lab
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationThe Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014
The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationSELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationComparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,
More informationTechnical Document on Vehicular Networks
Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationA Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationPERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN
PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN This report is submitted in partial fulfilment of the requirements for the Bachelor of Computer Science (Software
More informationDSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
More informationThe Optimal Methods of IVC Routing Protocol for VANET
The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International
More informationHow To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationAn Improved Vehicular Ad Hoc Routing Protocol for City Environments
An Improved Vehicular Ad Hoc Routing Protocol for City Environments Moez Jerbi*, Sidi-Mohammed Senouci*, Rabah Meraihi* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion,
More informationPropsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
More informationInternet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support
Proceedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conference Toronto, Canada, September 17-20, 2006 WA6.3 Internet Access Protocol Providing QoS in Vehicular Networks with
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationPriority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationCar-to-Car Communication
Car-to-Car Communication Stephan Eichler #, Christoph Schroth and Jörg Eberspächer # # Institute of Communication Networks, Technische Universität München, München, Germany Institute of Media and Communication
More informationISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationAutomotive Communication via Mobile Broadband Networks
Automotive Communication via Mobile Broadband Networks Dr. Joachim Sachs Ericsson Corporate Research, Aachen Contributors: René Rembarz, Mai-Anh Phan, Sabine Sories Where are we in telecommunications?
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationReViV: Selective Rebroadcast Mechanism for Video
ReViV: Selective Rebroadcast Mechanism for Video Streaming over VANET Abbas Bradai and Toufik Ahmed CNRS-LaBRI University of Bordeaux 351, Cours de la libération Talence, 33405 {bradai, tad} @labri.fr
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationIEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationIJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationUnit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
More informationAn Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
More informationVehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety
PUBLIC SAFETY -to- Wireless Communication Protocols for Enhancing Highway Traffic Safety Subir Biswas, Michigan State University Raymond Tatchikou, University of Kaiserslautern Francois Dion, Michigan
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationIntelligent Transportation System for Vehicular Ad-Hoc Networks
Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular
More informationSimulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationA Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationWireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
More informationMonitoring Free Flow Traffic using Vehicular Networks
Monitoring Free Flow Traffic using Vehicular Networks Hadi Arbabi and Michele C. Weigle Department of Computer Science Old Dominion University Norfolk, VA 23529 USA {marbabi, mweigle}@cs.odu.edu Abstract
More informationPerformance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAn Analysis of the Optimum Node Density for Ad hoc Mobile Networks
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer
More informationInter-Vehicle P2P Cmmunication Experimental On-Board Terminal
Inter- PP Cmmunication Experimental On-Board Terminal T. Nishida, K. Eguchi Y. Okamoto Yokosuka ITS Research Center NiCT Kanagawa, Japan to-nishida@nict.go.jp T. Warabino, T. Ohseki, T. Fukuhara, K. Saito,
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationTRAFFICINFO: AN ALGORITHM FOR VANET DISSEMINATION OF REAL- TIME TRAFFIC INFORMATION 1
TRAFFICINFO: AN ALGORITHM FOR VANET DISSEMINATION OF REAL- TIME TRAFFIC INFORMATION Ting Zhong 2 School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu,
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationMobile Ad Hoc Networks
Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is
More informationIntroduction to Ad hoc Networks
Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch
More informationOn the Potential of Network Coding for Cooperative Awareness in Vehicular Networks
On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationWireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationSecurity Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More information802.16 - Usage. Wireless Broadband Networks. Need for Speed WMAN
Wireless Broadband Networks - Usage WLAN: Support of mobile devices, but low data rate for higher number of users What to do for a high number of users or even needed QoS support? Problem of the last mile
More informationResearch Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationReal-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More information