Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks
|
|
- Jasmin Cunningham
- 8 years ago
- Views:
Transcription
1 Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks Jason D. Watson, Mark Pellerito, Charlie Gladden, and Huirong Fu Abstract The goal of this research is to simulate and analyze an Inter-Vehicle Communication (IVC) Mobile Ad hoc Network (MANET). Automobiles of the future will take advantage of IVC capabilities, in which vehicles will communicate with one another wirelessly. The Crash Avoidance Metrics Partnership (CAMP) Vehicle Safety Communications Consortium (VSCC) has identified three scenarios that are representative of the capabilities of future vehicular networks: Curve Speed Warning (CSW), Traffic Signal Violation Warning (TSVW), and Extended Brake Lights (EBL). We consider only EBL, as it is the only scenario that involves direct communication between vehicles. This research aims to simulate the EBL scenario over an IVC network, and analyze the network using accepted metrics and benchmarks. The resulting performance data may influence and motive future research efforts. Keywords Inter-Vehicle Communication, Mobile Ad hoc Networks, Simulation, Throughput, One-way Delay I. INTRODUCTION Vehicles of the future will be driven and controlled by a network. Vehicles will not be independent of one another. The goal of this research was to collect data about the interaction of the vehicle network through computer simulation. Performance metrics used in this study are communication delay (one-way, max) and data throughput. The goal is to simulate inter-vehicle communications and to determine the feasibility of implementing crash avoidance systems. Current technologies used in vehicle communications are discussed briefly here as a background to IVC technologies. The Opticom System, which is developed by Federal Signal and 3M, is a priority control system. It controls traffic lights to provide emergency vehicles the right-of-way to traffic situations. It is a wireless, infrared, authenticated, vehicle communications emergency vehicle system. Police cars, fire trucks, and emergency vehicles can be prioritized on the road in emergency situations. These vehicles are allowed to safely pass through the light. The Intelligent Transportation Society of America (ITS) This material is based upon work supported by the National Science Foundation under Grant No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. The authors are with Oakland University, Rochester Hills, MI, USA. The authors may be reached by s: {watsonj9@gmail.com, mjpeller@gmail.com, cegladde@oakland.edu, and fu@oakland.edu}, phone: , or fax: has developed and deployed Intelligent Transportation Systems (ITS) for 5 years. It improves safety, security, and efficiency of transportation. It helps vehicles to avoid crashes and to eliminate traffic delays. Real-time travel information and efficient traffic management are also a few of its capabilities. The FastTRAC System enables fast and safer travel routing and advanced controls of vehicles. It is a real-time computer-controlled traffic management system. It determines traffic flow, and helps to reduce serious intersection accidents. The Traffic Information System (TIMS) automatically shares information with the Michigan Department of Transportation. The system video cameras can be pole mounted. Longer duration green lights for heavier traffic flows are enabled to allow emergency vehicles to pass through. The Fleetnet System is the equivalent of the Internet on the road. It is an inter-vehicle communication platform. There is a need for local information while driving to extend a driver s range of awareness. Fleetnet can provide a service to create greater driver awareness. It can notify drivers of upcoming traffic jams. It can query the system for available alternate routes. In the future, children may make chat friends or play interactive games with other neighbor traffic flow children. Drivers may also receive detailed fuel station prices and services. II. THEORETICAL ASPECTS While vehicle-to-infrastructure communication is quite prevalent in many production systems, vehicle-to-vehicle communications are currently limited in general to signal lights for drivers to indicate to others of current and anticipated driving actions. Because wireless data communications can be performed with relatively high bandwidth as compared to a signal light, more information about a driver s or car s actions can be relayed more quickly using MANETs than with conventional signals. Additionally, coupling the MANET to an automated driving or braking system would be more straightforward than to conventional signals. Modes of communication including link protocol as well as packet size are yet to be determined. We investigate these variables through simulations. Some terms and concepts used throughout this research are presented here as background knowledge. The drop-tail queuing method drops packets from the tail of the queue when a routing
2 buffer is full [3]. The Ad hoc On-demand Distance Vector (AODV) routing algorithm is an algorithm for routing data across Wireless Mesh Networks, in which a route to a destination is established only on demand [4]. Media Access Control (MAC) provides addressing and channel access control mechanisms that make it possible for several network nodes to communicate within a multipoint network [5]. Time Division Multiple Access (TDMA) is a channel access method for shared medium (usually radio) networks that allows several users to share the same frequency channel by dividing the signal into different timeslots [6]. The 8. standard is the set of Wireless LAN/WLAN standards developed by working group of the IEEE LAN/MAN Standards Committee (IEEE 8) [3]. III. SIMULATION RESULTS A. Simulation Overview The objective of this research is to simulate and analyze an Inter-Vehicle Communication (IVC) Mobile Ad hoc Network (MANET), and then analyze the network using accepted metrics and benchmarks. The Extended Brake Lights (EBL) scenario was chosen for this simulation [5]. The goal of this scenario is to extend the range of brake lights in emergency braking situations via radio transmission. The network reference model consisted of two vehicle platoons with three vehicles each. Communication between the vehicles occurs only when the vehicles are braking or stopped. The fixed parameters that were used were drop-tail queuing, the AODV routing protocol, and a velocity of 5 mph (.4 m/s). Example scenarios are listed below. When the simulation begins, the first vehicle platoon is moving vertically, while the second vehicle platoon is stopped and communicating at an intersection, as illustrated in Fig.. Fig.. Subsequent movement of the two vehicle platoons in the simulation. Performance metrics that were most applicable to intervehicular communications were chosen for this simulation, including one-way delay, max delay, and throughput. Packet size and Medium Access Control (MAC) type were chosen as the variable parameters for this simulation. The packet size was varied from 5 to bytes. The MAC type was either TDMA or 8.. The NS- Network Simulator was chosen as the simulation tool for this research [9]. NS- was executed on a Windows XP system using the Cygwin environment. The network model was written in Tcl. The fixed parameters were configured in the Tcl code as shown in Fig. 3. set val (ifg) Queue/DropTail / PriQueue set val (rp) AODV $ns_ node-config -adhocrouting $val (rp) \ -ifqtype $val (ifq) $ns_ at. $node_ () setdest Fig. 3. Tcl code sample showing configuration of fixed parameters. The one-way delay and max delay were computed offline by parsing the trace file. Throughput was collected in the Tcl file as shown in Fig.4. set time. set bw [$tcpsink set bytes_] set now [$ns_ now] puts $thrufd $now [expr $bw/$time*8/] $ns_ at [expr $now+$time] record Fig. 4. Tcl code sample showing throughput data collection. Fig.. Initial movement of the two vehicle platoons in the simulation. When the first vehicle platoon reaches the intersection, it stops and begins communicating. The second vehicle platoon then begins to move horizontally and stops communicating, as illustrated in Fig.. The following command was used to execute the simulation: ns.exe vanet-test.tcl (NOTE: ns.exe and nam.exe must both be in the Cygwin PATH). The above command automatically launches the Nam network animator when the simulation completes. The performance data was then written to trace files. B. Trial Results Recall that the variable parameters for this simulation were packet size and MAC type. The packet size for trial was, bytes, and the MAC type was Time-Division Multiple Access (TDMA). Trial was used as the base trial
3 to which the subsequent trials were compared. ) One-way Delay: An analysis of the one-way delay was performed for the trial scenario. One-way delay data was overall and transient state one-way delay data for the first vehicle platoon are presented in Fig. 5 and Fig. 6. One-way Delay (Platoon ) Fig. 5. One-way delay for the first vehicle platoon of Trial as a function of packet ID. The transient state for the one-way delay lasts until approximately packet 5, at which point it enters the steady state with a oneway delay of approximately.6 seconds. Transient State One-way Delay (Platoon ) Fig. 6. Transient state one-way delay for the first vehicle platoon of Trial as a function of packet ID. average one-way delay was.945 s, the minimum was.4 s, and the maximum was.636 s. For the trailing vehicle in the platoon, the average one-way delay was.3 s, the minimum was.76 s, and the maximum was.63 s. platoon. For the middle vehicle in the platoon, the average one-way delay was.99 s, the minimum was.4 s, and the maximum was.636 s. For the trailing vehicle in the platoon, the average one-way delay was. s, the minimum was.76 s, and the maximum was.63 s. ) Throughput: An analysis of the throughput was performed for the trial scenario. Throughput data was throughput data for the first vehicle platoon is presented in Fig. 7. Throughput (in Mbps) Throughput (Platoon ) Time (in sec) Fig. 7. Throughput for the first vehicle platoon of Trial as a function of time. The vehicles begin communicating at approximately seconds, at which point packets are sent at a constant bit rate until the simulation ends. The average, minimum, and maximum throughput were calculated for the platoon. The average throughput was.988 Mbps, the minimum was Mbps, and the maximum was.54 Mbps. platoon. The average throughput was.94 Mbps, the minimum was Mbps, and the maximum was.54 Mbps. A confidence level analysis was performed for the throughput data of trial. It was determined that the actual average throughput for such a scenario is within.596 Mbps of the observed value, with a 95% confidence and a 5.3% relative precision. C. Trial Results The packet size for trial was 5 bytes, and the MAC type was Time-Division Multiple Access (TDMA). Trial was compared to trial to determine the impact of packet size on the IVC network. ) One-way Delay: An analysis of the one-way delay was performed for the trial scenario. One-way delay data was overall and transient state one-way delay data for the first vehicle platoon are presented in Fig. 8 and Fig. 9. One-way Delay (Platoon ) Fig. 8. One-way delay for the first vehicle platoon of Trial as a function of packet ID. The transient state for the one-way delay lasts until
4 approximately packet 5, at which point it enters the steady state with a oneway delay of approximately.6 seconds. Transient State One-way Delay (Platoon ) Fig. 9. Transient state one-way delay for the first vehicle platoon of Trial as a function of packet ID. average one-way delay was.943 s, the minimum was.38 s, and the maximum was.634 s. For the trailing vehicle in the platoon, the average one-way delay was.9 s, the minimum was.74 s, and the maximum was.68 s. platoon. For the middle vehicle in the platoon, the average one-way delay was.97 s, the minimum was.38 s, and the maximum was.634 s. For the trailing vehicle in the platoon, the average one-way delay was. s, the minimum was.74 s, and the maximum was.68 s. ) Throughput: An analysis of the throughput was performed for the trial scenario. Throughput data was throughput data for the first vehicle platoon is presented in Fig.. Throughput (in Mbps) Throughout (Platoon ) Time (in sec) Fig.. Throughput for the first vehicle platoon of Trial as a function of time. The vehicles begin communicating at approximately seconds, at which point packets are sent at a constant bit rate until the simulation ends. The average, minimum, and maximum throughput were calculated for the platoon. The average throughput was.5 Mbps, the minimum was Mbps, and the maximum was.34 Mbps. platoon. The average throughput was.497 Mbps, the minimum was Mbps, and the maximum was.34 Mbps. A confidence level analysis was performed for the throughput data of trial. It was determined that the actual average throughput for such a scenario is within.45 Mbps of the observed value, with a 95% confidence and a 4.8% relative precision. D. Trial 3 Results The packet size for trial 3 was, bytes, and the MAC type was 8.. Trial 3 was compared to trial to determine the impact of MAC type on the IVC network. ) One-way Delay: An analysis of the one-way delay was performed for the trial 3 scenario. One-way delay data was overall and transient state one-way delay data for the first vehicle platoon are presented in Fig. and Fig One-way Delay (Platoon ) Fig.. One-way delay for the first vehicle platoon of Trial 3 as a function of packet ID. The transient state for the one-way delay lasts until approximately packet 5, at which point it enters the steady state with a one-way delay of approximately.5 seconds..5.5 Transient State One-way Delay (Platoon ) 5 5 Fig.. Transient state one-way delay for the first vehicle platoon of Trial 3 as a function of packet ID. average one-way delay was.459 s, the minimum was.4 s, and the maximum was.8 s. For the trailing vehicle in the platoon, the average one-way delay was.9 s, the minimum was. s, and the maximum was.485
5 s. The overall and transient state one-way delay data for the second vehicle platoon are presented in Fig. 3 and Fig One-way Delay (Platoon ) Fig. 3. One-way delay for the second vehicle platoon of Trial 3 as a function of packet ID. The transient state for the one-way delay lasts until approximately packet, at which point it enters the steady state with a one-way delay of approximately.5 seconds..5.5 Transient State One-way Delay (Platoon ) 5 5 Fig. 4. Transient state one-way delay for the second vehicle platoon of Trial 3 as a function of packet ID. average one-way delay was.48 s, the minimum was. s, and the maximum was.477 s. For the trailing vehicle in the platoon, the average one-way delay was.59 s, the minimum was.54 s, and the maximum was.487 s. ) Throughput: An analysis of the throughput was performed for the trial 3 scenario. Throughput data was throughput data for the first vehicle platoon is presented in Fig. 5. Throughput (in Mbps) Throughput (Platoon ) Time (in sec) Fig. 5. Throughput for the first vehicle platoon of Trial 3 as a function of time. The vehicles begin communicating at approximately seconds, at which point packets are sent at a constant bit rate until the simulation ends. The average, minimum, and maximum throughput were calculated for the platoon. The average throughput was.346 Mbps, the minimum was Mbps, and the maximum was.678 Mbps. platoon. The average throughput was.3 Mbps, the minimum was Mbps, and the maximum was.59 Mbps. A confidence level analysis was performed for the throughput data of trial 3. It was determined that the actual average throughput for such a scenario is within.358 Mbps of the observed value, with a 95% confidence and a.8% relative precision. E. Analysis of Results A comparison of trials and demonstrates the impact of packet size on the one-way delay and throughput of the IVC network. Recall that the packet size was, bytes in trial, and was reduced to 5 bytes in trial. As expected, the reduced packet size results in a reduction in throughput, since fewer bytes are being sent across the network. Somewhat unexpectedly, however, are the results of the oneway delay comparison. The one-way delay for trial and trial is essentially unchanged, suggesting that the primary source of the delay was not the size of the packets being exchanged, but rather the overhead associated with the TCP and TDMA protocols. A comparison of trials and 3 demonstrates the impact of the MAC type on the one-way delay and throughput of the IVC network. Recall that the MAC type was TDMA in trial, and was changed to 8. in trial 3. The throughput for trial 3 was significantly greater than the throughput for trial. This is due largely to the fact that packets are sent with a greater frequency when using 8., as compared to using TDMA. Also, the one-way delay for trial 3 was significantly less than the one-way delay for trial. This confirms that the primary source of delay with trial is associated with the use of TDMA. In TDMA, senders and receivers must wait until their assigned time slice before they can process packets, which may cause unnecessary overhead. There is a tradeoff involved with the decision to use TDMA or 8.. As shown, the use of 8. can greatly
6 improve network performance. An important consideration for IVC networks, however, is security. It has been suggested that a combination of TDMA and Frequency Hopping Spread Spectrum (FHSS) may be used as a means to help prevent Denial-of-Service (DoS) attacks on IVC networks []. Therefore, they may be a tradeoff between performance and security when faced with the decision of which MAC type to use. This research suggests, however, that the one-way delay associated with the use of TDMA may not be practical in emergency braking situations. The one-way delay statistics can be used to assess whether or not drivers will have sufficient time to stop under the scenarios presented here. The one-way delay of the initial packet will be used for this assessment, since this will be the first indication to trailing vehicles that a lead vehicle is applying its brakes. Under trials and, in which the one-way delay was essentially unchanged, the average oneway delay for the initial packet was.4 s. At.4 m/s (5 mph), a trailing vehicle would travel approximately 5.38 meters. The vehicles in the simulation were positioned at a distance of 5 m. Therefore, a trailing vehicle will have traveled over % of the separating distance before receiving indication that the lead vehicle has applied its brakes. This may or may not leave the vehicle with a sufficient stopping distance, depending on a number of other parameters, including the condition of the brakes, the condition of the tires, the condition of the road, and the reaction time of the driver, among others. Under trial 3, however, the average one-way delay for the initial packet was only.8 s. At the same velocity, a trailing vehicle would travel only.4 meters, only.8% of the separating distance. This would likely provide the driver enough time to stop under most conditions. IV. CONCLUSION AND FUTURE WORK The results produced through simulation strongly suggest that an IVC MANET implementation would be feasible. Simulation results indicate a holistically reasonable amount of communication delay to corresponding overall throughput. For greater accuracy, the study would require further simulation with a larger and more complex vehicular configuration to more closely mimic that of actual traffic scenarios. Because the performance of 8.-based communications appeared to be much more efficient and capable of handling a greater load, it is the wireless protocol we suggest as a basis for continued research in the area of IVC MANETs. Additionally, a packet size of bytes is suggested as a basis for work to determine ideal 8.- based IVC MANET packet sizes. We have therefore determined that 8. technologies, as well as larger data packet sizes, are a basis for continued research. REFERENCES [] Aijaz, Amer, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Koch, and T. Leinmuller, Attacks on Inter Vehicle Communication Systems an Analysis, 3rd International Workshop on Intelligent Transportation (WIT 6), March 4-5, 6. [] Blum, Jeremy, and A. Eskandarian, The Threat of Intelligent Collisions, IT Pro, January/February 4, 4-9. [3] Car Car Communication Consortium, Retrieved November 7, 6 from [4] Chen, Wai and Shengwei Cai, "Ad Hoc Peer-to-Peer Network Architecture for Vehicle Safety Communications," IEEE Communications Magazine, April 5, 4(43), 7. [5] Crash Avoidance Metrics Partnership (CAMP) Vehicle Safety Communications Consortium (VSCC), Vehicle Safety Communications Project Task : WAVE/DSRC Security Extension Final Task Report, October 8, 4. [6] Federal Signal Lightbars, Sirens, and Audible-Visual Warning Devices, Retrieved November 7, 6 from [7] Fleming, Bryan, J. Watson, M. Pellerito, and H. Fu, Prevention of DoS Attacks on Inter-Vehicle Communications, 7 SAE World Congress. [8] Franz, Walter, FleetNet Internet on the Road, WDR Computernacht: Das intelligente Auto, November 3-4,. [9] Franz, Walter J., H. Hartenstein, and B. Bochow, Internet on the Road via Inter-Vehicle Communications, Workshop der Informatik : Mobile Communications over Wireless LAN: Research and Applications, September. [] GENI: Global Environment for Network Innovations, Retrieved October 3, 6 from [] Guo, Jinhua, Towards Secure, Robust, and Scalable Vehicular Ad hoc Networks, Presented November, 6 at Oakland University. [] Guo, Jinhua and Nathan Balon, Vehicular Ad Hoc Networks and Dedicated Short-Range Communication, unpublished, September, 6. [3] Hassan, Mahbub, and R. Jain, High Performance TCP/IP Networking, Prentice Hall, Upper Saddle River, NJ, 4, ISBN [4] Hubaux, Jean-Pierre, S. Capkun, and J. Luo, The Security and Privacy of Smart Vehicles, IEEE Security and Privacy, May/June 4, [5] Intelligent Transportation Society of America, Retrieved November 7, 6 from [6] Jurgen, Ronald, Automotive Electronics Handbook, McGraw-Hill, New York, NY, 999, ISBN [7] Mangipudi, Kumar, R. Katti, and H. Fu, Authentication and Key Agreement Protocols Preserving Anonymity, International Journal of Network Security, November 6, 3(3), [8] Michiardi, Pietro and Refik Molva, CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks, Communication and Multimedia Security Conference, September 6 7,. [9] The Network Simulator ns-, Retrieved October 6, 6 from [] Reumerman, H.-J., M. Roggero, and M. Ruffini, "The Application- Based Clustering Concept and Requirements for Intervehicle Networks," IEEE Communications Magazine, April 5, 4(43), 8 3. [] Road Commission for Oakland County Online, Retrieved November 7, 6 from [] Scalable Network Technologies: QualNet Developer, Retrieved October 6, 6 from [3] Wikimedia Foundation, Inc., IEEE 8., Wikipedia, the free encyclopedia, December 7, 6. [4] Wikimedia Foundation, Inc., Ad-hoc On-demand Distance Vector, Wikipedia, the free encyclopedia, November, 6. [5] Wikimedia Foundation, Inc., Media Access Control, Wikipedia, the free encyclopedia, December, 6. [6] Wikimedia Foundation, Inc., Time division multiple access, Wikipedia, the free encyclopedia,
7 December 4, 6. [7] Zhao, Feng, Leonidas Guibas, Wireless Sensor Networks, McGraw- Hill, New York, NY, 4, ISBN , 4.
INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
More informationInter-Vehicle P2P Cmmunication Experimental On-Board Terminal
Inter- PP Cmmunication Experimental On-Board Terminal T. Nishida, K. Eguchi Y. Okamoto Yokosuka ITS Research Center NiCT Kanagawa, Japan to-nishida@nict.go.jp T. Warabino, T. Ohseki, T. Fukuhara, K. Saito,
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationIntelligent Transportation System for Vehicular Ad-Hoc Networks
Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular
More informationRoad-Based Routing Protocol for Vanet Using Sumo and Move
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationCar Connections. Johan Lukkien. System Architecture and Networking
Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationPerformance Evaluation of the IEEE 802.11p WAVE Communication Standard
Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler (s.eichler@tum.de), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationPerformance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationHow To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationIJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationSecurity Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
More informationComparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,
More informationVoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationResearch Projects in the Mobile Computing and Networking (MCN) Lab
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationImpact of Mobility Management on Heterogeneous Wireless Network
Impact of Mobility Management on Heterogeneous Wireless Network Mrs.Viddhulata Mohite 1,Research Scholar, Bharati Vidyapeeth University College of Enginnering, Pune,India Email:viddhulata.mohite@gmail.com
More informationTowards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationAn Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
More informationPerformance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,
More information1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationPerformance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationAn Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationHow To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
More informationA Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationTechnical Document on Vehicular Networks
Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationIntroduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo
Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationInternet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support
Proceedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conference Toronto, Canada, September 17-20, 2006 WA6.3 Internet Access Protocol Providing QoS in Vehicular Networks with
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationAnalysis of Denial of Service Attack Using Proposed Model
Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationSecuring Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationother. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
More informationOptimization of VoIP over 802.11e EDCA based on synchronized time
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationVEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS
VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS Hassnaa Moustafa and Gilles Bourdon France Telecom R&D (Orange Labs) 38-40 rue du General Leclerc, 92794 Issy
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationVehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety
PUBLIC SAFETY -to- Wireless Communication Protocols for Enhancing Highway Traffic Safety Subir Biswas, Michigan State University Raymond Tatchikou, University of Kaiserslautern Francois Dion, Michigan
More informationOn the Potential of Network Coding for Cooperative Awareness in Vehicular Networks
On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,
More informationEnergy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
More informationA survey on Wireless Mesh Networks
A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationA Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks
2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,
More informationA Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationService Level Analysis of Video Conferencing over Wireless Local Area Network
Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity
More informationSecuring Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
More informationSecure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationAdaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks
Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla
More informationDDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,
More informationIEEE 1609.4 DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications. Qi Chen, Daniel Jiang, Luca Delgrossi
28-1-2-1 IEEE 1609.4 DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications Qi Chen, Daniel Jiang, Luca Delgrossi Mercedes-Benz Research & Development North America, Inc. {qi.chen,
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationSimulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
More information