Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni VANETs

Size: px
Start display at page:

Download "Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni VANETs"

Transcription

1 VANETs Ing. Alessandro Leonardi

2 VANETs Vehicular Ad-hoc NETworks (VANETs) can be considered as a subset of Mobile Ad hoc NETworks (MANETs) with unique characteristics. A typical VANET consists of vehicles and access points along the road. Vehicles move on the roads sharing information between themselves and with the Internet through the access points.

3 Vehicles communication Vehicle-to-vehicle communication Multi-hop communication Vehicle-to-infrastructure communication

4 VANETs vs. MANETs Vehicles mobility Vehicles often move at high speed but their mobility is rather regular and predictable Network topology High speed movement creates scenarios characterized by a very dynamic network topology No significant power constraint Vehicles can always rely on recharging batteries Localization An accurate estimate of vehicles position can be made available through GPS systems or on-board sensors

5 PHY/MAC

6 DSRC/802.11p (1/2) Dedicated Short Range Communication (DSRC) was released in 2002 by the American Society for Testing and Materials (ASTM) In 2003 the standardization moved to IEEE Forum and changed the name from DSRC to WAVE (Wireless Ability in Vehicular Environments) also known as p

7 DSRC/802.11p (2/2) The standard is based on IEEE a PHY layer and IEEE MAC layer Seven 10 MHz channels at 5.9GHz one control channel and six service channels

8 DSRC/802.11p vs a (1/3) a is designed for high data rate multimedia communications in indoor environment with low user mobility DSRC PHY uses a variation of OFDM modulation scheme to multiplex data high spectral efficiency, simple transceiver design and avoids multipath fading

9 DSRC/802.11p vs a (2/3) DSRC/802.11p reduces the signal bandwidth from 20MHz to 10MHz all parameter values are doubled in time domain in order to increase the robustness to ISI caused by the multi-path delay spread and Doppler spread effect Data rates from 6 up to 27 Mbps Transmit power level are changed to fit requirements of outdoor vehicular communications communication ranges up to 1000 meters

10 DSRC/802.11p vs a (3/3)

11 DSRC/802.11p MAC MAC layer of DSRC is very similar to the IEEE MAC based on CSMA/CA with some minor modifications DSRC involves vehicle-to-vehicle and vehicle-toinfrastructure communications

12 DSRC/802.11p scenarios relative speed between vehicles is low despite high absolute speed the effect of mobility can be ignored and considered only multi-hop aspects the key attribute necessary for communications in this kind of scenario is the need for very high download rates over a short duration

13 MAC problems Scenario a) Starvation due to hidden terminal exposed terminal Solutions: Scenario b) limiting data transmission duration by using small maximum TCP window size MAC layer approaches (MACAW) Low efficiency and instability due to shortened connection time Solutions: low overhead protocol (no RTS/CTS handshake) no variable rates because this leads to overestimation or underestimation of the NAV used in future

14 MAC issues Priority, response time and reliability should be assured because are basic requirements of safety applications Approaches: Different CWs and backoff increase parameters for different priority classes in data traffic (e.g., DFS) Assigning shorter CWs to low-delay real-time service Static slot assignment for high-priority traffic and dynamic assignment for the low-priority traffic

15 Routing

16 Routing Protocols for VANETs (1/3) Proactive algorithms (table-driven) better performance in terms of delay but they need a considerable amount of control traffic (e.g., OLSR) Reactive algorithms (on-demand) minimize the number of broadcast packets by creating routes only on demand (e.g., AODV) Several studies demonstrate that neither of the two protocol classes outperform the other in every vehicular scenarios.

17 Routing Protocols for VANETs (2/3) Traditional MANETs routing protocols require an explicit route establishment phase before the data transmission begins They are not adequate to low delivery-latency requirement for safety applications Routing protocols for VANETs should rely on packet forwarding based on geographic location of sender and receiver should be broadcast oriented

18 Routing Protocols for VANETs (3/3) Position-based unicast routing (geographical forwarding) these routing protocols exploit the availability of accurate location information more suited to dense networks and to frequent network disconnections (e.g., GPSR) Geocast routing a kind of multicast routing where the destination nodes are characterized by their geographical coordinates in VANETs nodes interested in notifications of traffic congestions or warnings are located in the same place

19 Broadcast (1/2) Majority of applications for VANETs rely on broadcast dissemination of information in the applications area Blind flooding is the first approach to achieve broadcasting since it does not require local or global topology information Broadcasting has a strong influence on network performance Serious redundancy, contention and collision problems can occur as a result of flooding An efficient broadcast protocol should minimize the total number of packet retransmissions, while at the same time preserving network connectivity

20 Broadcast (2/2) A trade-off between robustness and redundancy should be found Different approaches: probability-based a node forwards the packet with a probability p which depends on network scenario location-based the idea is to select as relays those nodes that permit to cover the widest additional area neighbor-based the nodes decide whether broadcasting the message or not on the status of their neighbors cluster-based nodes are grouped into small clusters each one managed by a particualr node called cluster-head which has the task of retransmitting broadcast messages

21 Classes of Applications Assistance for Safe Navigation Internet Connectivity

22 Assistance for Safe Navigation (1/4) Traffic safety It is possible to detect dangerous situations through on- board sensors Warning messages propagate to other vehicles through ad- hoc networking Traffic management services Access points along the road distribute information about traffic congestion, weather forecast,, road works,, etc.

23 Assistance for Safe Navigation (2/4) Smart vehicle s onboard instrumentation: Newer cars include features as recording,, processing, positioning and location capabilities. Communication facility supports wireless data exchange with other vehicles or fixed stations. Forward radar Event data recorder (EDR) Positioning system Communication facility Display Computing platform Rear radar

24 Assistance for Safe Navigation (3/4) A potential danger scenario : The system automatically triggers the propagation of warning messages by exploiting multi-hop ad-hoc communications Vehicle-to-roadside communication Inter-vehicle communication Roadside base station Emergency event

25 Assistance for Safe Navigation (4/4) Overview of some vehicular safety and communication projects: European Community has recently funded a forum to support the development of a network system offering assistance to the drivers. Many interesting features are presented in the following projects: CarTalk 2000 FleetNet

26 CarTalk 2000 (1/5) Objectives: - Development of co-operative driver assistance systems based upon inter-vehicle communication - Development of a mobile ad-hoc radio network as a communication platform with the aim of preparing a future standard PARTNERS: Centro Ricerche Fiat, DaimlerChrysler, Siemens Mobile, Bosch

27 Applications: CarTalk 2000 (2/5) - Information and Warning Functions: transmission of warning messages during breakdown,, high traffic density or congestion,, or dangerous road surface conditions. This allows an early warning of the driver of following vehicles on the same road.

28 CarTalk 2000 (3/5) Applications: - Communication-based Longitudinal Control System: Existing Adaptive Cruise Control systems only react on the vehicle directly in front. By integrating communication, these systems may adapt longitudinal control to the traffic in front and can allow anticipating to an early braking maneuver when an invisible vehicle beyond the direct predecessor in front is braking. This leads to a more natural following behavior.

29 CarTalk 2000 (4/5) Applications: - Co-operative Assistance Systems: A typical scenario for co-operation is the highway entry and merging scenario. Today, misunderstandings between drivers on the highway and on the entry-lane cause critical situations. By exchanging information up to simple trajectory plans, critical situations can be foreseen and solved by the vehicles themselves.

30 CarTalk 2000 (5/5) Technologies: - Communication System: A key technology for CarTALK 2000 is the development of a mobile multi-hop ad-hoc radio communication system that meets the requirements set by the applications. It will be based on a UMTS radio access technology, using a spatial-aware position-based multi-hop routing protocol.

31 FleetNet (1/6) Objectives: - Development of a communication platform for inter-vehicle communications - Implementation of demonstrator applications - Development and standardization of promising strategies and solutions in order to improve drivers and passengers safety and comfort PARTNERS: DaimlerChrysler AG, Fraunhofer FOKUS, NEC Europe Ltd, Robert Bosch GmbH, Siemens AG, TEMIC Telefunken, microelectronic GmbH, Universities of Mannheim, Hamburg-Harburg, Karlsruhe,, Hannover.

32 FleetNet (2/6) Applications: - Cooperative driver assistance : - Emergency notification - Overtaking assistance - Obstacle warning

33 FleetNet (3/6) Applications: - Decentralized floating car data : - Traffic jam monitor - Dynamic navigation - Route weather forecast

34 FleetNet (4/6) Applications: - User communications and information services : - Hot-spot Internet access - Inter-vehicle chat - Distributed games

35 FleetNet (5/6) Key Features: - Wireless multi-hop ad hoc networking - Unlicensed radio frequency bands - Allows for low cost data transmission - Position-based routing and location-based services - Internet access and integration - Open solution

36 FleetNet (6/6) Technologies: - FleetNet plans to use a UTRA TDD radio hardware: UMTS Terrestrial Radio Access system will be enhanced or replaced by FleetNet protocols enabling operation ad hoc mode. - Radar-based communication currently under feasibility study will focus on safety-related applications. - During the FleetNet development process IEEE wireless LAN components will be used intermediately for testing and verification purposes.

37 Internet Connectivity (1/2) Internet-based services Access to ,, web browsing,, etc. Video and audio applications P2P Chatting, multiplayer games On board file sharing

38 Internet Connectivity (2/2) Some proposed systems : Drive-thru Internet CarTorrent

39 Proposed Architecture : Drive-thru (1/5) One or more locally interconnected access points form a so- called connectivity-island, several of them along a road or in the same area may be interconnected and cooperate to provide network access with intermittent connectivity to drivers in a larger area.

40 Drive-thru (2/5) Features: - Investigation about the feasibility of providing network connectivity and, ultimately,, Internet access to mobile users in vehicles by testing UDP and TCP performance in a real vehicular scenario using IEEE b and g hardware - Hot spots along the road will provide WLAN access for some (relatively( short) period of time to vehicles driving by. - Conventional client-server approach

41 Drive-thru (3/5) Measurement scenario and findings:

42 Drive-thru (4/5) Findings from measurements: - Both UDP and TCP tests performed over IEEE b and g hardware suggest to subdivide a connectivity session into three distinct phases: Entry phase Production phase Exit phase Only in the production phase a stable connectivity jointly with a maximum throughput value is possible, while in the entry and exit phases performances decrease due to a higher number of lost packets and link-layer retransmissions.

43 Drive-thru (5/5) Results and impact on Internet applications: - Usability of exsisting IEEE radio hardware to transmit a significant amount of data during a connectivity session - Limited connectivity period and variable transmission characteristics limit the usage of the system for continous communications such as IP telefony while transaction based application like sending an could be performed exploiting more than one connectivity window

44 CarTorrent (1/11) Key Features: - Cooperative P2P vehicular strategy proposed for content delivery of large multimedia files - Communication efficient swarming protocol which uses a gossip mechanism to propagate content avalaibility informations that leverages the broadcast nature of wireless medium - Piece-selection strategy which takes proximity into account for the exchange of information pieces

45 CarTorrent (2/11) Key factors for using opportuninistic ad hoc networking models: - Problems: Stopping at gas station for full download is a nuisance Downloading from GPRS/3G too slow and quite expensive - Observation: Many other drivers are interested in download sharing (like in the Internet) - Solution: Co-operative P2P Downloading via Car-Torrent

46 CarTorrent (3/11) Infostation model : downloads only at infostation Download pieces Roadside base station Vehicle-to-roadside communication Internet

47 CarTorrent (4/11) Basic idea: Co-operative download phase 1 Download pieces Roadside base station Vehicle-to-roadside communication Internet

48 CarTorrent (5/11) Basic idea: Co-operative download phase 2 Inter-vehicle communication Roadside base station Internet

49 CarTorrent (6/11) A Bit Torrent review: - Swarming: Parallel downloads among a mesh of cooperating peers - Scalable: System capacity increases with increase in number of peers - Tracker: Handles peer discovery Centralized Tracker: single point of failure Observation: Might not work for Wireless scenarios, because of intermittent connectivity Issue: Mobility increases churn of nodes participating in a download

50 CarTorrent (7/11) A picture of Bit Torrent system: Uploader/downloader Uploader/downloader Uploader/downloader Tracker Uploader/downloader Uploader/downloader

51 CarTorrent (8/11) Gossip protocol : FIles are divided in chunks. A Gossip message containing Torrent ID, Chunk list and Timestamp is propagated by each peer.

52 CarTorrent (9/11) Peer Selection Strategies: Problem: how to select the peer for downloading? Possible selections schemes: 1) Rarest First: BitTorrent-like policy of searching for the rarest bitfield in your peerlist and downloading it 2) Closest Rarest: download closest missing piece (break ties on rarity) 3) Rarer vs Closer: weights the rare pieces based on the distance to the closest peer who has that piece.

53 CarTorrent (10/11) Impact of Selection Strategy :

54 CarTorrent (11/11) Attractive aspects of CarTorrent solutions: - Bandwidth at the infostation is limited and not convenient - It can become congested if all vehicles stop - It is a nuisance as I must stop and waste time - GPRS and 3G bandwidth is also limited and expensive - The car to car bandwidth on the freeway is huge and practically unlimited! - Car to car radios already paid for by safe navigation requirement - CarTorrent transmissions are reliable - they involve only few hops (proximity routing)

55 Vehicular mobility models and simulators Modeling vehicular traffic Vehicular simulators

56 Issues: Modeling vehicular traffic (1/5) One key problem in the study of VANETs is the need to characterize vehicular nodes mobility and traffic patterns in order to produce mobility models that reflect as close as possible the real behaviour of mobile systems Mobility model affects the simulation results

57 Approaches: Modeling vehicular traffic (2/5) Based on a level-of- detail classification, traditionally, three types of approaches have been used: Microscopic models Kinetic models Macroscopic models

58 Modeling vehicular traffic (3/5) Microscopic models: The most basic and detailed approaches are microscopic or car following models, modeling the actual response of individual vehicles to their predecessor Each vehicle is described on the microscopic scale by its space x(t) and speed v(t) coordinates at time t

59 Kinetic models: Modeling vehicular traffic (4/5) Present an intermediate step between the other two models Partially derived from microscopic models and used to obtain fluid dynamic equations,, so leading to macroscopic models Effective approach for the derivation of valid vehicular traffic models which takes also into account for the psycho- physiological nature of driver interaction (microscopic( level) A distribution function f(x,v,t) describes the number of vehicles with a certain location and speed at time t

60 Modeling vehicular traffic (5/5) Macroscopic models: Coarsest level of description In most applications one is neither interested in the exact evolution of the singles vehicle nor in the distribution function f Use fluid dynamic equations Main quantities are the density, the mean speed variance of vehicles and speed

61 Issues: Vehicular simulators (1/3) While it is crucial to test and evaluate protocol implementations in a real testbed environment, simulations are still commonly used as a first step in any protocol development for VANETs research VANETs imply specific motion patterns that make the common random mobility models used in unrealistic MANETs

62 A quick overview : Vehicular simulators (2/3) Recently new open-source tools are available for generation of vehicular mobility patterns. Most of them are capable of producing traces for network simulators such as ns-2 or OpNet STRAW: The Street Random Waypoint tool provides road topology extraction from the maps of the TIGER database as well as micromobility support.. The main drawback is that it produces traces not usable by different well-known network simulators but only by the SWANS platform on which it is based

63 A quick overview : Vehicular simulators (3/3) CanuMobiSim: is a tool for the generation of movement traces in a variety of conditions. Extrapolation of real topologies from detailed Geographical Data Files (GDF) are possible, many different mobility models are implemented,, a GUI is present,, and the tool can generate mobility traces for ns-2 and other simulators. Micromobility is considerated, implementing several car-to- car models.

64 Future research and challenges Solutions proposed for VANETs are inspired to well-known paradigms defined for ad hoc networks and they do not fully exploit the peculiar features characterizing VANETs Most current research on multi-hop networks assumes fixed or very slow varying network topology the effect of high mobility in ad hoc networks should be fully investigated new mobility models should be developed New algorithms should be designed taking into consideration severe delayconstraints of safety applications and real-time applications new MAC schemes routing schemes should provide a good tradeoff between reliability and overhead Location privacy schemes should be designed to prevent or mitigate tracking of vehicles during their communication with other vehicles or the road-side infrastructure

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications 1 Opportunistic Ad Hoc Networking: the Case for Car to Car Communications Mobiquitous 2005 Mario Gerla Computer Science Dept UCLA What is an opportunistic ad hoc net? A wireless ad hoc extension of the

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Initial Survey of VANET papers

Initial Survey of VANET papers Initial Survey of VANET papers Nathan Balon A review of papers on vehicular ad hoc networks, identifying the emphasis of each paper: 1. What problem is addressed? 2. What solution is proposed? 3. How do

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Vehicular Cloud. Fan Zhang

Vehicular Cloud. Fan Zhang Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information

More information

Road-Based Routing Protocol for Vanet Using Sumo and Move

Road-Based Routing Protocol for Vanet Using Sumo and Move International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A

More information

Internet on the Road via Inter-Vehicle Communications

Internet on the Road via Inter-Vehicle Communications Internet on the Road via Inter-Vehicle Communications Dr. Walter J. Franz 1, Dr. Hannes Hartenstein 2, Bernd Bochow 3 1) DaimlerChrysler AG, walter.franz@daimlerchrysler.com 2) NEC Europe Ltd., hannes.hartenstein@ccrle.nec.de

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Advanced Computer Networks

Advanced Computer Networks Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks Outline Ad hoc networks Differences to other networks Applications Research areas Routing Other research areas Enabling Technologies

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Technical Document on Vehicular Networks

Technical Document on Vehicular Networks Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

Performance Monitoring on Networked Virtual Environments

Performance Monitoring on Networked Virtual Environments Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

The Optimal Methods of IVC Routing Protocol for VANET

The Optimal Methods of IVC Routing Protocol for VANET The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

An Improved Vehicular Ad Hoc Routing Protocol for City Environments

An Improved Vehicular Ad Hoc Routing Protocol for City Environments An Improved Vehicular Ad Hoc Routing Protocol for City Environments Moez Jerbi*, Sidi-Mohammed Senouci*, Rabah Meraihi* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion,

More information

Car-to-Car Communication

Car-to-Car Communication Car-to-Car Communication Stephan Eichler #, Christoph Schroth and Jörg Eberspächer # # Institute of Communication Networks, Technische Universität München, München, Germany Institute of Media and Communication

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN

PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN This report is submitted in partial fulfilment of the requirements for the Bachelor of Computer Science (Software

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks

Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks S. Gowrishankar, T.G. Basavaraju, M. Singh,

More information

Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks

Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Internet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support

Internet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support Proceedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conference Toronto, Canada, September 17-20, 2006 WA6.3 Internet Access Protocol Providing QoS in Vehicular Networks with

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

Simulation vs. Emulation: Evaluating Mobile Ad Hoc Network Routing Protocols

Simulation vs. Emulation: Evaluating Mobile Ad Hoc Network Routing Protocols Simulation vs. Emulation: Evaluating Mobile Ad Hoc Network Routing Protocols Furqan Haq and Thomas Kunz Systems and Computer Engineering Carleton University Ottawa, Ont., Canada K1S 5B haq_furqan@hotmail.com,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Automotive Communication via Mobile Broadband Networks

Automotive Communication via Mobile Broadband Networks Automotive Communication via Mobile Broadband Networks Dr. Joachim Sachs Ericsson Corporate Research, Aachen Contributors: René Rembarz, Mai-Anh Phan, Sabine Sories Where are we in telecommunications?

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

ReViV: Selective Rebroadcast Mechanism for Video

ReViV: Selective Rebroadcast Mechanism for Video ReViV: Selective Rebroadcast Mechanism for Video Streaming over VANET Abbas Bradai and Toufik Ahmed CNRS-LaBRI University of Bordeaux 351, Cours de la libération Talence, 33405 {bradai, tad} @labri.fr

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety

Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety PUBLIC SAFETY -to- Wireless Communication Protocols for Enhancing Highway Traffic Safety Subir Biswas, Michigan State University Raymond Tatchikou, University of Kaiserslautern Francois Dion, Michigan

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Wireless LAN Services for Hot-Spot

Wireless LAN Services for Hot-Spot Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,

More information

Monitoring Free Flow Traffic using Vehicular Networks

Monitoring Free Flow Traffic using Vehicular Networks Monitoring Free Flow Traffic using Vehicular Networks Hadi Arbabi and Michele C. Weigle Department of Computer Science Old Dominion University Norfolk, VA 23529 USA {marbabi, mweigle}@cs.odu.edu Abstract

More information

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Inter-Vehicle P2P Cmmunication Experimental On-Board Terminal

Inter-Vehicle P2P Cmmunication Experimental On-Board Terminal Inter- PP Cmmunication Experimental On-Board Terminal T. Nishida, K. Eguchi Y. Okamoto Yokosuka ITS Research Center NiCT Kanagawa, Japan to-nishida@nict.go.jp T. Warabino, T. Ohseki, T. Fukuhara, K. Saito,

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

TRAFFICINFO: AN ALGORITHM FOR VANET DISSEMINATION OF REAL- TIME TRAFFIC INFORMATION 1

TRAFFICINFO: AN ALGORITHM FOR VANET DISSEMINATION OF REAL- TIME TRAFFIC INFORMATION 1 TRAFFICINFO: AN ALGORITHM FOR VANET DISSEMINATION OF REAL- TIME TRAFFIC INFORMATION Ting Zhong 2 School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu,

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Simulation Based Analysis of VOIP over MANET

Simulation Based Analysis of VOIP over MANET Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Introduction to Ad hoc Networks

Introduction to Ad hoc Networks Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University Amitabh Mishra & Baruch Awerbuch

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler (s.eichler@tum.de), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated

More information

Mobile Ad Hoc Networks

Mobile Ad Hoc Networks Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is

More information

GPS (Global positioning system) enables a device to determine

GPS (Global positioning system) enables a device to determine 1 Application of GPS to Mobile IP and Routing in Wireless Networks Mustafa Ergen,Sinem Coleri,Baris Dundar,Rahul Jain, Anuj Puri Dept. of Electrical Eng. and Computer Sci. University of California, Berkeley

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information