Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks

Size: px
Start display at page:

Download "Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks"

Transcription

1 Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks Jason D. Watson, Mark Pellerito, Charlie Gladden, and Huirong Fu Abstract The goal of this research is to simulate and analyze an Inter-Vehicle Communication (IVC) Mobile Ad hoc Network (MANET). Automobiles of the future will take advantage of IVC capabilities, in which vehicles will communicate with one another wirelessly. The Crash Avoidance Metrics Partnership (CAMP) Vehicle Safety Communications Consortium (VSCC) has identified three scenarios that are representative of the capabilities of future vehicular networks: Curve Speed Warning (CSW), Traffic Signal Violation Warning (TSVW), and Extended Brake Lights (EBL). We consider only EBL, as it is the only scenario that involves direct communication between vehicles. This research aims to simulate the EBL scenario over an IVC network, and analyze the network using accepted metrics and benchmarks. The resulting performance data may influence and motive future research efforts. Keywords Inter-Vehicle Communication, Mobile Ad hoc Networks, Simulation, Throughput, One-way Delay I. INTRODUCTION Vehicles of the future will be driven and controlled by a network. Vehicles will not be independent of one another. The goal of this research was to collect data about the interaction of the vehicle network through computer simulation. Performance metrics used in this study are communication delay (one-way, max) and data throughput. The goal is to simulate inter-vehicle communications and to determine the feasibility of implementing crash avoidance systems. Current technologies used in vehicle communications are discussed briefly here as a background to IVC technologies. The Opticom System, which is developed by Federal Signal and 3M, is a priority control system. It controls traffic lights to provide emergency vehicles the right-of-way to traffic situations. It is a wireless, infrared, authenticated, vehicle communications emergency vehicle system. Police cars, fire trucks, and emergency vehicles can be prioritized on the road in emergency situations. These vehicles are allowed to safely pass through the light. The Intelligent Transportation Society of America (ITS) This material is based upon work supported by the National Science Foundation under Grant No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. The authors are with Oakland University, Rochester Hills, MI, USA. The authors may be reached by s: {watsonj9@gmail.com, mjpeller@gmail.com, cegladde@oakland.edu, and fu@oakland.edu}, phone: , or fax: has developed and deployed Intelligent Transportation Systems (ITS) for 5 years. It improves safety, security, and efficiency of transportation. It helps vehicles to avoid crashes and to eliminate traffic delays. Real-time travel information and efficient traffic management are also a few of its capabilities. The FastTRAC System enables fast and safer travel routing and advanced controls of vehicles. It is a real-time computer-controlled traffic management system. It determines traffic flow, and helps to reduce serious intersection accidents. The Traffic Information System (TIMS) automatically shares information with the Michigan Department of Transportation. The system video cameras can be pole mounted. Longer duration green lights for heavier traffic flows are enabled to allow emergency vehicles to pass through. The Fleetnet System is the equivalent of the Internet on the road. It is an inter-vehicle communication platform. There is a need for local information while driving to extend a driver s range of awareness. Fleetnet can provide a service to create greater driver awareness. It can notify drivers of upcoming traffic jams. It can query the system for available alternate routes. In the future, children may make chat friends or play interactive games with other neighbor traffic flow children. Drivers may also receive detailed fuel station prices and services. II. THEORETICAL ASPECTS While vehicle-to-infrastructure communication is quite prevalent in many production systems, vehicle-to-vehicle communications are currently limited in general to signal lights for drivers to indicate to others of current and anticipated driving actions. Because wireless data communications can be performed with relatively high bandwidth as compared to a signal light, more information about a driver s or car s actions can be relayed more quickly using MANETs than with conventional signals. Additionally, coupling the MANET to an automated driving or braking system would be more straightforward than to conventional signals. Modes of communication including link protocol as well as packet size are yet to be determined. We investigate these variables through simulations. Some terms and concepts used throughout this research are presented here as background knowledge. The drop-tail queuing method drops packets from the tail of the queue when a routing

2 buffer is full [3]. The Ad hoc On-demand Distance Vector (AODV) routing algorithm is an algorithm for routing data across Wireless Mesh Networks, in which a route to a destination is established only on demand [4]. Media Access Control (MAC) provides addressing and channel access control mechanisms that make it possible for several network nodes to communicate within a multipoint network [5]. Time Division Multiple Access (TDMA) is a channel access method for shared medium (usually radio) networks that allows several users to share the same frequency channel by dividing the signal into different timeslots [6]. The 8. standard is the set of Wireless LAN/WLAN standards developed by working group of the IEEE LAN/MAN Standards Committee (IEEE 8) [3]. III. SIMULATION RESULTS A. Simulation Overview The objective of this research is to simulate and analyze an Inter-Vehicle Communication (IVC) Mobile Ad hoc Network (MANET), and then analyze the network using accepted metrics and benchmarks. The Extended Brake Lights (EBL) scenario was chosen for this simulation [5]. The goal of this scenario is to extend the range of brake lights in emergency braking situations via radio transmission. The network reference model consisted of two vehicle platoons with three vehicles each. Communication between the vehicles occurs only when the vehicles are braking or stopped. The fixed parameters that were used were drop-tail queuing, the AODV routing protocol, and a velocity of 5 mph (.4 m/s). Example scenarios are listed below. When the simulation begins, the first vehicle platoon is moving vertically, while the second vehicle platoon is stopped and communicating at an intersection, as illustrated in Fig.. Fig.. Subsequent movement of the two vehicle platoons in the simulation. Performance metrics that were most applicable to intervehicular communications were chosen for this simulation, including one-way delay, max delay, and throughput. Packet size and Medium Access Control (MAC) type were chosen as the variable parameters for this simulation. The packet size was varied from 5 to bytes. The MAC type was either TDMA or 8.. The NS- Network Simulator was chosen as the simulation tool for this research [9]. NS- was executed on a Windows XP system using the Cygwin environment. The network model was written in Tcl. The fixed parameters were configured in the Tcl code as shown in Fig. 3. set val (ifg) Queue/DropTail / PriQueue set val (rp) AODV $ns_ node-config -adhocrouting $val (rp) \ -ifqtype $val (ifq) $ns_ at. $node_ () setdest Fig. 3. Tcl code sample showing configuration of fixed parameters. The one-way delay and max delay were computed offline by parsing the trace file. Throughput was collected in the Tcl file as shown in Fig.4. set time. set bw [$tcpsink set bytes_] set now [$ns_ now] puts $thrufd $now [expr $bw/$time*8/] $ns_ at [expr $now+$time] record Fig. 4. Tcl code sample showing throughput data collection. Fig.. Initial movement of the two vehicle platoons in the simulation. When the first vehicle platoon reaches the intersection, it stops and begins communicating. The second vehicle platoon then begins to move horizontally and stops communicating, as illustrated in Fig.. The following command was used to execute the simulation: ns.exe vanet-test.tcl (NOTE: ns.exe and nam.exe must both be in the Cygwin PATH). The above command automatically launches the Nam network animator when the simulation completes. The performance data was then written to trace files. B. Trial Results Recall that the variable parameters for this simulation were packet size and MAC type. The packet size for trial was, bytes, and the MAC type was Time-Division Multiple Access (TDMA). Trial was used as the base trial

3 to which the subsequent trials were compared. ) One-way Delay: An analysis of the one-way delay was performed for the trial scenario. One-way delay data was overall and transient state one-way delay data for the first vehicle platoon are presented in Fig. 5 and Fig. 6. One-way Delay (Platoon ) Fig. 5. One-way delay for the first vehicle platoon of Trial as a function of packet ID. The transient state for the one-way delay lasts until approximately packet 5, at which point it enters the steady state with a oneway delay of approximately.6 seconds. Transient State One-way Delay (Platoon ) Fig. 6. Transient state one-way delay for the first vehicle platoon of Trial as a function of packet ID. average one-way delay was.945 s, the minimum was.4 s, and the maximum was.636 s. For the trailing vehicle in the platoon, the average one-way delay was.3 s, the minimum was.76 s, and the maximum was.63 s. platoon. For the middle vehicle in the platoon, the average one-way delay was.99 s, the minimum was.4 s, and the maximum was.636 s. For the trailing vehicle in the platoon, the average one-way delay was. s, the minimum was.76 s, and the maximum was.63 s. ) Throughput: An analysis of the throughput was performed for the trial scenario. Throughput data was throughput data for the first vehicle platoon is presented in Fig. 7. Throughput (in Mbps) Throughput (Platoon ) Time (in sec) Fig. 7. Throughput for the first vehicle platoon of Trial as a function of time. The vehicles begin communicating at approximately seconds, at which point packets are sent at a constant bit rate until the simulation ends. The average, minimum, and maximum throughput were calculated for the platoon. The average throughput was.988 Mbps, the minimum was Mbps, and the maximum was.54 Mbps. platoon. The average throughput was.94 Mbps, the minimum was Mbps, and the maximum was.54 Mbps. A confidence level analysis was performed for the throughput data of trial. It was determined that the actual average throughput for such a scenario is within.596 Mbps of the observed value, with a 95% confidence and a 5.3% relative precision. C. Trial Results The packet size for trial was 5 bytes, and the MAC type was Time-Division Multiple Access (TDMA). Trial was compared to trial to determine the impact of packet size on the IVC network. ) One-way Delay: An analysis of the one-way delay was performed for the trial scenario. One-way delay data was overall and transient state one-way delay data for the first vehicle platoon are presented in Fig. 8 and Fig. 9. One-way Delay (Platoon ) Fig. 8. One-way delay for the first vehicle platoon of Trial as a function of packet ID. The transient state for the one-way delay lasts until

4 approximately packet 5, at which point it enters the steady state with a oneway delay of approximately.6 seconds. Transient State One-way Delay (Platoon ) Fig. 9. Transient state one-way delay for the first vehicle platoon of Trial as a function of packet ID. average one-way delay was.943 s, the minimum was.38 s, and the maximum was.634 s. For the trailing vehicle in the platoon, the average one-way delay was.9 s, the minimum was.74 s, and the maximum was.68 s. platoon. For the middle vehicle in the platoon, the average one-way delay was.97 s, the minimum was.38 s, and the maximum was.634 s. For the trailing vehicle in the platoon, the average one-way delay was. s, the minimum was.74 s, and the maximum was.68 s. ) Throughput: An analysis of the throughput was performed for the trial scenario. Throughput data was throughput data for the first vehicle platoon is presented in Fig.. Throughput (in Mbps) Throughout (Platoon ) Time (in sec) Fig.. Throughput for the first vehicle platoon of Trial as a function of time. The vehicles begin communicating at approximately seconds, at which point packets are sent at a constant bit rate until the simulation ends. The average, minimum, and maximum throughput were calculated for the platoon. The average throughput was.5 Mbps, the minimum was Mbps, and the maximum was.34 Mbps. platoon. The average throughput was.497 Mbps, the minimum was Mbps, and the maximum was.34 Mbps. A confidence level analysis was performed for the throughput data of trial. It was determined that the actual average throughput for such a scenario is within.45 Mbps of the observed value, with a 95% confidence and a 4.8% relative precision. D. Trial 3 Results The packet size for trial 3 was, bytes, and the MAC type was 8.. Trial 3 was compared to trial to determine the impact of MAC type on the IVC network. ) One-way Delay: An analysis of the one-way delay was performed for the trial 3 scenario. One-way delay data was overall and transient state one-way delay data for the first vehicle platoon are presented in Fig. and Fig One-way Delay (Platoon ) Fig.. One-way delay for the first vehicle platoon of Trial 3 as a function of packet ID. The transient state for the one-way delay lasts until approximately packet 5, at which point it enters the steady state with a one-way delay of approximately.5 seconds..5.5 Transient State One-way Delay (Platoon ) 5 5 Fig.. Transient state one-way delay for the first vehicle platoon of Trial 3 as a function of packet ID. average one-way delay was.459 s, the minimum was.4 s, and the maximum was.8 s. For the trailing vehicle in the platoon, the average one-way delay was.9 s, the minimum was. s, and the maximum was.485

5 s. The overall and transient state one-way delay data for the second vehicle platoon are presented in Fig. 3 and Fig One-way Delay (Platoon ) Fig. 3. One-way delay for the second vehicle platoon of Trial 3 as a function of packet ID. The transient state for the one-way delay lasts until approximately packet, at which point it enters the steady state with a one-way delay of approximately.5 seconds..5.5 Transient State One-way Delay (Platoon ) 5 5 Fig. 4. Transient state one-way delay for the second vehicle platoon of Trial 3 as a function of packet ID. average one-way delay was.48 s, the minimum was. s, and the maximum was.477 s. For the trailing vehicle in the platoon, the average one-way delay was.59 s, the minimum was.54 s, and the maximum was.487 s. ) Throughput: An analysis of the throughput was performed for the trial 3 scenario. Throughput data was throughput data for the first vehicle platoon is presented in Fig. 5. Throughput (in Mbps) Throughput (Platoon ) Time (in sec) Fig. 5. Throughput for the first vehicle platoon of Trial 3 as a function of time. The vehicles begin communicating at approximately seconds, at which point packets are sent at a constant bit rate until the simulation ends. The average, minimum, and maximum throughput were calculated for the platoon. The average throughput was.346 Mbps, the minimum was Mbps, and the maximum was.678 Mbps. platoon. The average throughput was.3 Mbps, the minimum was Mbps, and the maximum was.59 Mbps. A confidence level analysis was performed for the throughput data of trial 3. It was determined that the actual average throughput for such a scenario is within.358 Mbps of the observed value, with a 95% confidence and a.8% relative precision. E. Analysis of Results A comparison of trials and demonstrates the impact of packet size on the one-way delay and throughput of the IVC network. Recall that the packet size was, bytes in trial, and was reduced to 5 bytes in trial. As expected, the reduced packet size results in a reduction in throughput, since fewer bytes are being sent across the network. Somewhat unexpectedly, however, are the results of the oneway delay comparison. The one-way delay for trial and trial is essentially unchanged, suggesting that the primary source of the delay was not the size of the packets being exchanged, but rather the overhead associated with the TCP and TDMA protocols. A comparison of trials and 3 demonstrates the impact of the MAC type on the one-way delay and throughput of the IVC network. Recall that the MAC type was TDMA in trial, and was changed to 8. in trial 3. The throughput for trial 3 was significantly greater than the throughput for trial. This is due largely to the fact that packets are sent with a greater frequency when using 8., as compared to using TDMA. Also, the one-way delay for trial 3 was significantly less than the one-way delay for trial. This confirms that the primary source of delay with trial is associated with the use of TDMA. In TDMA, senders and receivers must wait until their assigned time slice before they can process packets, which may cause unnecessary overhead. There is a tradeoff involved with the decision to use TDMA or 8.. As shown, the use of 8. can greatly

6 improve network performance. An important consideration for IVC networks, however, is security. It has been suggested that a combination of TDMA and Frequency Hopping Spread Spectrum (FHSS) may be used as a means to help prevent Denial-of-Service (DoS) attacks on IVC networks []. Therefore, they may be a tradeoff between performance and security when faced with the decision of which MAC type to use. This research suggests, however, that the one-way delay associated with the use of TDMA may not be practical in emergency braking situations. The one-way delay statistics can be used to assess whether or not drivers will have sufficient time to stop under the scenarios presented here. The one-way delay of the initial packet will be used for this assessment, since this will be the first indication to trailing vehicles that a lead vehicle is applying its brakes. Under trials and, in which the one-way delay was essentially unchanged, the average oneway delay for the initial packet was.4 s. At.4 m/s (5 mph), a trailing vehicle would travel approximately 5.38 meters. The vehicles in the simulation were positioned at a distance of 5 m. Therefore, a trailing vehicle will have traveled over % of the separating distance before receiving indication that the lead vehicle has applied its brakes. This may or may not leave the vehicle with a sufficient stopping distance, depending on a number of other parameters, including the condition of the brakes, the condition of the tires, the condition of the road, and the reaction time of the driver, among others. Under trial 3, however, the average one-way delay for the initial packet was only.8 s. At the same velocity, a trailing vehicle would travel only.4 meters, only.8% of the separating distance. This would likely provide the driver enough time to stop under most conditions. IV. CONCLUSION AND FUTURE WORK The results produced through simulation strongly suggest that an IVC MANET implementation would be feasible. Simulation results indicate a holistically reasonable amount of communication delay to corresponding overall throughput. For greater accuracy, the study would require further simulation with a larger and more complex vehicular configuration to more closely mimic that of actual traffic scenarios. Because the performance of 8.-based communications appeared to be much more efficient and capable of handling a greater load, it is the wireless protocol we suggest as a basis for continued research in the area of IVC MANETs. Additionally, a packet size of bytes is suggested as a basis for work to determine ideal 8.- based IVC MANET packet sizes. We have therefore determined that 8. technologies, as well as larger data packet sizes, are a basis for continued research. REFERENCES [] Aijaz, Amer, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Koch, and T. Leinmuller, Attacks on Inter Vehicle Communication Systems an Analysis, 3rd International Workshop on Intelligent Transportation (WIT 6), March 4-5, 6. [] Blum, Jeremy, and A. Eskandarian, The Threat of Intelligent Collisions, IT Pro, January/February 4, 4-9. [3] Car Car Communication Consortium, Retrieved November 7, 6 from [4] Chen, Wai and Shengwei Cai, "Ad Hoc Peer-to-Peer Network Architecture for Vehicle Safety Communications," IEEE Communications Magazine, April 5, 4(43), 7. [5] Crash Avoidance Metrics Partnership (CAMP) Vehicle Safety Communications Consortium (VSCC), Vehicle Safety Communications Project Task : WAVE/DSRC Security Extension Final Task Report, October 8, 4. [6] Federal Signal Lightbars, Sirens, and Audible-Visual Warning Devices, Retrieved November 7, 6 from [7] Fleming, Bryan, J. Watson, M. Pellerito, and H. Fu, Prevention of DoS Attacks on Inter-Vehicle Communications, 7 SAE World Congress. [8] Franz, Walter, FleetNet Internet on the Road, WDR Computernacht: Das intelligente Auto, November 3-4,. [9] Franz, Walter J., H. Hartenstein, and B. Bochow, Internet on the Road via Inter-Vehicle Communications, Workshop der Informatik : Mobile Communications over Wireless LAN: Research and Applications, September. [] GENI: Global Environment for Network Innovations, Retrieved October 3, 6 from [] Guo, Jinhua, Towards Secure, Robust, and Scalable Vehicular Ad hoc Networks, Presented November, 6 at Oakland University. [] Guo, Jinhua and Nathan Balon, Vehicular Ad Hoc Networks and Dedicated Short-Range Communication, unpublished, September, 6. [3] Hassan, Mahbub, and R. Jain, High Performance TCP/IP Networking, Prentice Hall, Upper Saddle River, NJ, 4, ISBN [4] Hubaux, Jean-Pierre, S. Capkun, and J. Luo, The Security and Privacy of Smart Vehicles, IEEE Security and Privacy, May/June 4, [5] Intelligent Transportation Society of America, Retrieved November 7, 6 from [6] Jurgen, Ronald, Automotive Electronics Handbook, McGraw-Hill, New York, NY, 999, ISBN [7] Mangipudi, Kumar, R. Katti, and H. Fu, Authentication and Key Agreement Protocols Preserving Anonymity, International Journal of Network Security, November 6, 3(3), [8] Michiardi, Pietro and Refik Molva, CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks, Communication and Multimedia Security Conference, September 6 7,. [9] The Network Simulator ns-, Retrieved October 6, 6 from [] Reumerman, H.-J., M. Roggero, and M. Ruffini, "The Application- Based Clustering Concept and Requirements for Intervehicle Networks," IEEE Communications Magazine, April 5, 4(43), 8 3. [] Road Commission for Oakland County Online, Retrieved November 7, 6 from [] Scalable Network Technologies: QualNet Developer, Retrieved October 6, 6 from [3] Wikimedia Foundation, Inc., IEEE 8., Wikipedia, the free encyclopedia, December 7, 6. [4] Wikimedia Foundation, Inc., Ad-hoc On-demand Distance Vector, Wikipedia, the free encyclopedia, November, 6. [5] Wikimedia Foundation, Inc., Media Access Control, Wikipedia, the free encyclopedia, December, 6. [6] Wikimedia Foundation, Inc., Time division multiple access, Wikipedia, the free encyclopedia,

7 December 4, 6. [7] Zhao, Feng, Leonidas Guibas, Wireless Sensor Networks, McGraw- Hill, New York, NY, 4, ISBN , 4.

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Inter-Vehicle P2P Cmmunication Experimental On-Board Terminal

Inter-Vehicle P2P Cmmunication Experimental On-Board Terminal Inter- PP Cmmunication Experimental On-Board Terminal T. Nishida, K. Eguchi Y. Okamoto Yokosuka ITS Research Center NiCT Kanagawa, Japan to-nishida@nict.go.jp T. Warabino, T. Ohseki, T. Fukuhara, K. Saito,

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

Road-Based Routing Protocol for Vanet Using Sumo and Move

Road-Based Routing Protocol for Vanet Using Sumo and Move International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Car Connections. Johan Lukkien. System Architecture and Networking

Car Connections. Johan Lukkien. System Architecture and Networking Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard

Performance Evaluation of the IEEE 802.11p WAVE Communication Standard Performance Evaluation of the IEEE 8.p WAVE Communication Standard Stephan Eichler (s.eichler@tum.de), Institute of Communication Networks, Technische Universität München Abstract In order to provide Dedicated

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols

Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Impact of Mobility Management on Heterogeneous Wireless Network

Impact of Mobility Management on Heterogeneous Wireless Network Impact of Mobility Management on Heterogeneous Wireless Network Mrs.Viddhulata Mohite 1,Research Scholar, Bharati Vidyapeeth University College of Enginnering, Pune,India Email:viddhulata.mohite@gmail.com

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet

An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and

More information

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Technical Document on Vehicular Networks

Technical Document on Vehicular Networks Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Internet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support

Internet Access Protocol Providing QoS in Vehicular Networks with Infrastructure Support Proceedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conference Toronto, Canada, September 17-20, 2006 WA6.3 Internet Access Protocol Providing QoS in Vehicular Networks with

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Analysis of Denial of Service Attack Using Proposed Model

Analysis of Denial of Service Attack Using Proposed Model Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Securing Wireless Access for Vehicular Environments (WAVE)

Securing Wireless Access for Vehicular Environments (WAVE) Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Optimization of VoIP over 802.11e EDCA based on synchronized time

Optimization of VoIP over 802.11e EDCA based on synchronized time Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS

VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS VEHICULAR NETWORKS DEPLOYMENT VIEW: APPLICATIONS, DEPLOYMENT ARCHITECTURES AND SECURITY MEANS Hassnaa Moustafa and Gilles Bourdon France Telecom R&D (Orange Labs) 38-40 rue du General Leclerc, 92794 Issy

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety

Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety PUBLIC SAFETY -to- Wireless Communication Protocols for Enhancing Highway Traffic Safety Subir Biswas, Michigan State University Raymond Tatchikou, University of Kaiserslautern Francois Dion, Michigan

More information

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,

More information

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks 2013 IEEE 27th International Conference on Advanced Information Networking and Applications A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks Daichi Amagata, Yuya Sasaki, Takahiro Hara,

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Service Level Analysis of Video Conferencing over Wireless Local Area Network

Service Level Analysis of Video Conferencing over Wireless Local Area Network Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

IEEE 1609.4 DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications. Qi Chen, Daniel Jiang, Luca Delgrossi

IEEE 1609.4 DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications. Qi Chen, Daniel Jiang, Luca Delgrossi 28-1-2-1 IEEE 1609.4 DSRC Multi-Channel Operations and Its Implications on Vehicle Safety Communications Qi Chen, Daniel Jiang, Luca Delgrossi Mercedes-Benz Research & Development North America, Inc. {qi.chen,

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information