SlideShare a Scribd company logo
1 of 77
Vehicular Ad-hoc NETwork (VANET)
Speaker: Yi-Ting Mai
Contact info. :wkb@wkb.idv.tw
Date: 2010/05/04
2
Outline
Overview of VANETs
Physical Layer and MAC protocols for VANETs
Broadcast Routing Protocols for VANETs
Applications for VANETs
3
Why Vehicular Networks?
Safety
– On US highways (2004):
• 42,800 Fatalities, 2.8 Million Injuries
• ~$230.6 Billion cost to society
– Combat the awful side-effects of road traffic
• In the EU, around 40,000 people die yearly on the roads; more
than 1.5 millions are injured
• Traffic jams generate a tremendous waste of time and of fuel
– Most of these problems can be solved by providing
appropriate information to the driver or to the vehicle
4
Why Vehicular Networks? (cont.)
Efficiency
– Traffic jams waste time and fuel
– In 2003, US drivers lost a total of 3.5 billion hours
and 5.7 billion gallons of fuel to traffic congestion
Profit
– Safety features and high-tech devices have become
product differentiators
5
6
What is a VANET?
7
A taxonomy of vehicular
communication systems
8
Inter-vehicle communication (IVC)
Systems
IVC systems are completely infrastructure-free;
only onboard units (OBUs) sometimes also
called in-vehicle equipment (IVE) are needed.
9
IVC systems
Single-hop and multihop IVCs (SIVCs and
MIVCs).
SIVC systems are useful for applications
requiring short-range communications (e.g., lane
merging, automatic cruise control)
MIVC systems are more complex than SIVCs but
can also support applications that require long-
range communications (e.g., traffic monitoring)
10
IVC systems
a) Single-hop IVC system b) Multihop IVC system
11
Vehicular Communication
Future Vehicular Communication Scenario
Internet
Internet Gateway
Vehicle
12
Vehicular Communication-DSRC
In 2003, FCC established the service and license
rules for Dedicated Short Range
Communications (DSRC) Service.
– DSRC is a communication service that uses the 5.9 GHz
band (5.850-5.925 GHz band) for the use of public safety
and private application.
– The vehicular related services and communication
standards enable vehicles and roadside beacons to form
VANETs (Vehicular Ad Hoc Networks) in which the
mobile nodes (vehicles) can communicate each other
without central access points.
13
VANETs vs. MANETs
A VANET consists of vehicles to form a network which
is similar to a Mobile Ad Hoc Network (MANET).
However, there are following differences between these
two networks.
– Vehicles mobility
• Vehicles move at high speed but mobility is regular and predictable
– Network topology
• High speed movement makes network topology dynamic
– No significant power constraint
• Recharging batteries from vehicle
– Localization
• Vehicles position estimate accurately through GPS systems or on-
board sensors
14
Features of VANETs
The characteristics of VANETs can be summarized after
comparing with the MANETs.
– Dynamic topology
• Nomadic nodes with very high speed movement cause frequent
topology variation
– Mobility models
• Vehicles move along original trajectories completely different from
typical MANET scenarios
– Infinite energy supply
• Power constraint can be neglected thanks to always recharging
batteries
– Localization functionality
• Vehicle can be equipped with accurate positioning systems (GPS and
GALILEO) integrated by electronic maps
15
Operating Environment
According to the environments of operating
vehicles, the VANETs can be established in the
following situations:
– City environments, disaster situations, extreme
weather conditions, and so on.
• For instance: City environments, have certain unique
characteristics:
– Many tall buildings obstructing and interfering the transmission
signals,
– In the highway scenario, vehicles are closer together than, thus
incur interference if their transmission range are large,
– The topology is usually two dimensional (e.g. with cross streets).
16
Scopes of VANETs (1/2)
Communication range of VANETs
– Short/medium-range communication systems (vehicle-to-
vehicle or vehicle-to-roadside)
Applications of VANETs
– The VANETs vision includes vehicular real-time and safety
applications, sharing the wireless channel with mobile applications
from a large, decentralized array of commercial service providers.
– VANET safety applications include collision and other safety
warnings.
– Non-safety applications include real-time traffic congestion and
routing information, high-speed tolling, mobile infotainment, and
many others.
17
Scopes of VANET (2/2)
VANET research issues
– Safety and non-safety applications
– Roadside-to-vehicle and vehicle-to-vehicle communication
– Communication protocol design
– Channel modeling
– Modulation and coding
– Power control and scalability issues
– Multi-channel organization and operation
– Security issues and countermeasures
– Privacy issues
– Network management
– Simulation frameworks & real-world testbeds
18
Threat model
Presented in SeVeCom (Secure Vehicular
Communication) project
An attacker can be:
– Insider / Outsider
– Malicious / Rational
– Active / Passive
– Local / Extended
Attacks can be mounted on:
– Safety-related applications
– Traffic optimization applications
– Payment-based applications
– Privacy
19
Attack 1 : Bogus traffic information
Traffic
jam
ahead
• Attacker: insider, rational, active
20
Attack 2 : Generate “Intelligent
Collisions”
SLOW
DOWN
The way
is clear• Attacker: insider, malicious, active
21
Attack 3: Cheating with identity,
speed, or position
Wasn’t me!
• Attacker: insider, rational, active
22
Attack 4: Jamming
23
Attack 5: Tunnel
24
Attack 6: Tracking
25
Protocols of Layers in VANETs
In this topic, we introduce the physical layer and the
802.11 related MAC protocols. Afterwards, the routing
protocols between vehicles are presented.Finally, the
applications of VANETs are proposed.
– The physical layer and the 802.11 related protocols.
• The physical layer and the MAC layer of DSRC/802.11p
• 802.11 DCF
– Routing protocols
• Position-based Routing (Unicast)
• Geocasting Routing (Multicast)
• Broadcast Routing
– Applications of VANETs.
Physical Layer and MAC protocols
for VANETs
27
Physical/MAC Layers
DSRC/802.11p
– Dedicated Short Range Communication (DSRC) was
released in 2002 by the American Society for Testing
and Materials (ASTM).
– In 2003, the standardization moved to IEEE Forum
and changed the name from DSRC to WAVE
(Wireless Ability in Vehicular Environments), which
was also known as 802.11p.
28
DSRC/802.11p Physical Layer (1/4)
DSRC/802.11p
– The standard of 802.11p is based on IEEE 802.11a
PHY layer and IEEE 802.11 MAC layer
• Seven 10 MHz channels at 5.9GHz
• one control channel and six service channels
Vehicle to
vehicle
Service
channel
Service
channel
Control
channel
Intersection
CH 172 CH 174 CH 182CH 180CH 178CH 176 CH 184
5.855
5.925
5.915
5.905
5.895
5.885
5.875
5.865
Frequency (GHz)
Optionally combined
service channels
29
DSRC/802.11p Physical Layer (2/4)
DSRC/802.11p vs. 802.11a
– 802.11a is designed for high data rate multimedia
communications in indoor environment with low user
mobility.
– DSRC PHY uses a variation of OFDM modulation
scheme to multiplex data.
• high spectral efficiency, simple transceiver design and
avoids multi-path fading
30
DSRC/802.11p Physical Layer (3/4)
DSRC/802.11p vs. 802.11a
– DSRC/802.11p reduces the signal bandwidth from
20MHz to 10MHz.
• all parameter values are doubled in time domain in order
to increase the robustness (e.g. timeout increase) to ISI
caused by the multi-path delay spread and Doppler
spread effect
– Data rates are between 6 and 27 Mbps
– Transmit power level are changed to fit requirements
of outdoor vehicular communications
• communication ranges up to 1000 meters
31
DSRC/802.11p Physical Layer (4/4)
Parameters DSRC/802.11p 802.11a
Information data rate Mb/s 3, 4.5, 6, 9, 12, 18, 24, and
27
6, 9, 12, 18, 24, 36, 48, and
54
Modulation BPSK, QPSK, 16-QAM, 64-
QAM
BPSK, QPSK, 16-QAM, 64-
QAM
Coding rate 1/2, 1/3, 3/4 1/2, 1/3, 3/4
Number of subcarriers 52 (=48+4) 52 (=48+4)
OFDM symbol duration 8μs 4μs
Guard time 1.6μs 0.8μs
FFT period 6.4μs 3.2μs
Preamble duration 32μs 16μs
Subcarrier frequency
spacing
0.15625MHz 0.3125MHz
32
Revolution and Design in 802.11
DCF
The revolution of 802.11 DCF can be described
in the following.
– The design of avoiding collisions: The design to
solve the collisions including collisions incurred by
the terminal problem.
– The improvement design to IEEE 802.11 DCF
33
The Design of Avoiding Collisions
The design of avoiding collisions
– In mobile wireless networks, the objectives of MAC protocols
is to avoid collisions, process contention, and re-tramsit lost
packets to increase the overall throughput. In previous works,
the design of avoiding collisions can be described in the
following.
• Carrier Sense Multiple Access Protocols, CSMA: A mobile node uses
carrier sensing technology to detect whether there is any node using
the channel before transmitting data to avoid collisions.
• The problems in the CSMA: hidden- and exposed- terminal problems
• Terminal problems:
– Hidden terminal problem
– Exposed terminal problem
34
Medium Access Control (MAC)
LAN(Ethernet)
– CSMA/CD ( Carrier Sense Multiple Access with
Collision Detection )
WLAN(802.11)
– CSMA/CA (Carrier Sensing Multiple
Access/Collision Avoidance)
35
CSMA/CD
CSMA/CD (Carrier Sense Multiple
Access/ Collision Detection)
36
CSMA/CD (cont.)
37
CSMA/CA
CSMA/CA (Carrier Sense Multiple Access/
Collision Avoidance)
MH
MH
MH
MH
Sender Receiver
38
Hidden-Terminal Problem
The hidden-terminal problem occurs when node
C sends data to node B, as shown in the
following Figure.
A B C
39
Hidden-Terminal Problem (cont.)
MH
MH
MH
MH
Sender Receiver
40
Exposed-Terminal Problem
The exposed-terminal problem occurs when
node C is exhibited to transmit data to node D.
A C DB
Broadcast ranges of each node
(Interfere)
41
Exposed-Terminal Problem (cont.)
MH
MH
MH
MH
x
Sender Receiver
42
CSMA/CA (cont.)
ReceiverSender
RTS
CTS
MH
MH
MH
MH
Data
ACK
43
The Designs to Solve the Hidden-
Terminal Problem
The Designs to Solve the Hidden-Terminal
Problem
– The design of using busy tone channel
– The design of MACA (IEEE 802.11 DCF)
44
The Design with Busy Tone Channel
Protocol
– Each node equipped with an extra busy tone channel to send
out the busy signals when the node is processing data
transmission.
– When a node would like to transmit data, it detects weather
there are nodes issuing the signals by other nodes in its
range.
– If a node detects no signal, it can process the transmission.
Problems
– Needed an extra busy tone channel.
– The hidden-terminal is solved, but the exposed-terminal
problem still exists.
45
IEEE 802.11 DCF
To solve the hidden-terminal problem, MACA proposed
the Multiple Access Collision Avoidance protocol, which
is adapted by the IEEE 802.11 MAC to be the IEEE
802.11 DCF.
– Contention period
– Handshake period
– Data period
– ACK period
data ACK
CTS
contention
4 1
8 4
6 3 SIFSSIFS
Defer Access
handshake
RTS SIFS data
NAV
ACK
Sender
Receiver
Others
46
Contention Period of IEEE 802.11
DCF
Contention period
– Interval Frame Space, IFS
• Short IFS, SIFS) : CTS, ACK, or Poll Response
• PCF (PIFS)
• DCF (DIFS)
47
Handshake period of IEEE 802.11
DCF
Handshake period
– In MACA, before processing data transmission, a sender
broadcasts a RTS (Request To Send) signal to inform its
neighbors that it will send out data.
– When a neighbor except the sender and the receiver receives
the RTS signal, it use the NAV (Network Allocation Vector) to
exhibit itself to issue signals to avoid occurring interference of
data transmission.
– When the receiver receives the RTS, it will reply a CTS (Clear
To Send) signal if it accepts the RTS request.
– Similarly, when a neighbor of the receiver except the sender
receivers the CTS, it uses the NAV to exhibit itself to send
any signal.
48
Data and ACK Periods of IEEE
802.11 DCF
Data period
– After completing the handshaking period, the sender
and the receiver can transit data, while the neighbors
of these two nodes are exhibited by the NAV until the
finishing data transmission.
ACK period
– After the completion of data transmission, the
receiver sends a ACK to the sender to show that the
data has been received.
– At the same time, all neighbors are in the listening
status for contending the channel.
49
IEEE 802.11 DCF and Problems
With the protocol (IEEE 802.11 DCF) mentioned
above can solve the hidden-terminal problems
The problems of IEEE 802.11 DCF
– The exposed-terminal problems exists.
– The number of contention nodes during the
contention period increases.
– The length of backoff time period.
50
Exposed-Terminal in IEEE 802.11
DCF
With IEEE 802.11 DCF, the nodes are exhibited
by NAV increase. Therefore, the problem of
exposed-terminal becomes more serious than
CSMA.
– In CSMA, only node C is exhibited to send or receive
data.
– In IEEE 802.11 DCF, nodes C and D are exhibited.
AC B D AC B D
(a) (b)
51
The Power Control Design
The design of controlling power to improve the
exposed-terminal problem.
– With detecting the strength of signals, the power of
data transmission can be controlled to fit the
distance between two nodes.
– With the decrease of exhibited area, the exposed-
terminal problem can be improved.
AC B E AC BD E FD F
52
The Power Control Design
Problems:
– With controlling power, the problem of exposed-
terminal can be improved, the hidden-terminal
problem may occur.
53
The Spilt-Channel Design to Improve
the Problem of Contending for the
Channel
Spilt-channel design
– Two pipeline stages of contending for the channel.
• Nodes that would like to send data contending at the first
stage. If nodes pass the first one, they can contending for
the channel at the second stage.
• The number of nodes contending for the channel is
reduced.
– To avoid occurring starvation, the protocol uses the
weight schemes to make some nodes enter the
second stage directly.
54
Influence of the Backoff Time
The length of backoff time:
– If the node density in IEEE 802.11 DCF is high, to
avoid collisions in the contention period, the backoff
time should be increase.
– If the node density in IEEE 802.11 DCF is low, too
long backoff time incurs the time waste of waiting.
55
Dynamic Adjustment of Backoff Time
Schemes: Dynamic adjustment for the backoff
time to reduce the waste of bandwidth utilization.
– Three kinds of the dynamic adjustments
– Successful history records.
– Polling the neighbors
– Statistical method: With the statistic list, the length of
backoff time can be decided according to the statistic
list.
56
DSRC/802.11p MAC Layer (1/2)
DSRC/802.11p MAC
– MAC layer of DSRC is very similar to the IEEE
802.11 MAC based on CSMA/CA with some minor
modifications.
– DSRC involves vehicle-to-vehicle and vehicle-to-
infrastructure communications.
57
DSRC/802.11p MAC Layer (2/2)
Vehicle-to-Vehicle
– relative speed : low
– absolute speed: high
– multi-hop relay
Vehicle-to-Infrastructure
– high download rates over
a short duration
(a) distributed mobile multihop network
58
ADSL/WiFi
WorkstationWiMax/3.5G
DSRC/802.11 DSRC/802.11
V-V communication
V-I communication
V-V communication
V-I communication
TTS Server
Communication architecture
Broadcast Routing Protocol for
VANETs
60
Broadcast Routing
In Inter-Vehicle Communication Systems
(IVC) , broadcasting is an efficient method to
spread messages.
The reasons of occurring broadcast storm
– In a broadcasting network, the situations of
contentions and collisions often take place if an
efficient broadcasting scheme is not used.
– The result incurred by broadcasting is called
broadcast storm.
61
Broadcast Storm
In VANETs, broadcast is used for disseminating
the traffic information :
– Detour route
– Accident alert
– Construction warning
– etc…
Some messages will be periodically broadcasted
by roadside unit (RSU) for several hours or even
some days.
– The problem of broadcast storm in VANET is more
serious than that in MANET
62
Broadcast Routing
Message Dissemination
– Ideal solution: Minimum Connected Dominating Set, which
minimizes packet rtx and preserves network connectivity.
– Realistic solutions: trade-off between robustness and
redundancy.
The important concern in designing a broadcast scheme
in VANET.
– How to design broadcast algorithm to efficiently transmit
messages to the target nodes.
– To design a broadcast algorithm to make the desired vehicles
to receive the message as soon as possible.
63
Four Broadcasting Strategies
Different broadcasting strategies to select the
forwarding nodes:
– Probability-based
– Location-based
– Neighbor-based
– Cluster-based
64
Broadcast Routing
1. Probability-based:
– A given PDF determines the decision, for example
depending on the number of copies a node has
received.
– The strategy is often dynamic.
– PDF = probability distribution function
65
Broadcast Routing
Probability-based
Car A
PDF = 0.8
Car B
PDF = 0.5
Forwarding Node choose
66
Broadcast Routing
Location-based
– The selection criterion is the amount of additional
area that would be covered by enabling a node to
forward.
– Some proposal also computes position prediction as
useful input information.
67
Broadcast Routing
Location-based Target
Forwarding Node choose
Car B
wants to turn right
Car A
68
Broadcast Routing
Neighbor-based
– A node is selected depending on its neighbors status
(for instance, the status concerns how a neighbor is
connected to the network).
69
Broadcast Routing
Neighbor-based
Target
Forwarding Node choose
Car B
Car A
Collect the information of neighbors
70
Broadcast Routing
Cluster-based
– Nodes are grouped in clusters represented by an
elected cluster-head. Only cluster-heads forward
packets.
– Nodes in the same cluster share some features (e.g.,
relative speed in VANETs).
– Reclustering on-demand or periodically.
71
Broadcast Routing
Cluster-based
Cluster-Header
Cluster-Header
Gateway-Node
Forwarding Node choose
Applications for VANETs
73
Assistance for Safe Navigation
Traffic safety
– Detecting dangerous situations
– Sending warning messages to other cars using ad-
hoc networking
Traffic management services
– Traffic congestion
– Weather forecast
– Road works
74
Assistance for Safe Navigation (1/3)
There are some components must be included
into a smart car.
75
Assistance for Safe Navigation (2/3)
Overview of the demonstrator routing
architecture
76
Assistance for Safe Navigation (3/3)
A danger situation:
– The system sends the warning message immediately
after there are cars accident occurring.
77
RDS/DVB/DAB
GSM/GPRS/3G/
3.5G/WiMAX
WiFi/DSRC
Service
terminals
Signal
exchanging
facilities
車內網路
智慧車輛智慧車輛
智慧駕駛智慧駕駛
Ubiquitous UseUbiquitous Use
Intelligent Vehicle
•Intelligent Driving
•Advanced Safety Features
Intelligent Vehicle
•Intelligent Driving
•Advanced Safety Features
Innovated Services
Vehicle Infotainment Service UNS LifeUNS Life
ETC/
CVO
Mobile
Business
services
Multi-Modal
Navigation/
Reservation
E-call/
Maintenance
& warrantee
LBS/
Social Networking
Safety Warning/
Mitigation
智慧道路智慧道路
WiFi/Cellular/DSRC
GPS/RDS/DVB/DAB
+
Urban Nomadic/pedestrians
Telematics
整合車 、家庭與 公室應用內 辦
Source: adapted from TEEMA, 2007/12
車載產業及智慧交通願景

More Related Content

What's hot

Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
VEHICLE TO VEHICLE WIRELESS COMMUNICATION
VEHICLE TO VEHICLE WIRELESS COMMUNICATIONVEHICLE TO VEHICLE WIRELESS COMMUNICATION
VEHICLE TO VEHICLE WIRELESS COMMUNICATIONRahul Natarajan
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication Mohamed Zaki
 
Automotive radar system
Automotive radar systemAutomotive radar system
Automotive radar systemPrasadmalai
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communicationMrityunjaya Chauhan
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communicationSangita Das
 
5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)ITU
 
VSAT( Very Small Aperture Terminal) :- In Detail
VSAT( Very Small Aperture Terminal) :- In DetailVSAT( Very Small Aperture Terminal) :- In Detail
VSAT( Very Small Aperture Terminal) :- In DetailNitish Kumar
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc networkAshish Prajapat
 

What's hot (20)

V2V tech
V2V techV2V tech
V2V tech
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
VEHICLE TO VEHICLE WIRELESS COMMUNICATION
VEHICLE TO VEHICLE WIRELESS COMMUNICATIONVEHICLE TO VEHICLE WIRELESS COMMUNICATION
VEHICLE TO VEHICLE WIRELESS COMMUNICATION
 
Vehicle to vehicle communication
Vehicle to vehicle communication  Vehicle to vehicle communication
Vehicle to vehicle communication
 
Automotive radar system
Automotive radar systemAutomotive radar system
Automotive radar system
 
Vehicle to vehicle communication
Vehicle to vehicle communicationVehicle to vehicle communication
Vehicle to vehicle communication
 
vechile to vechile communication
vechile to vechile communicationvechile to vechile communication
vechile to vechile communication
 
5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)5G and Automative : Cellular V2X (vehicle-to-everything)
5G and Automative : Cellular V2X (vehicle-to-everything)
 
V2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular InfrastructureV2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular Infrastructure
 
VSAT( Very Small Aperture Terminal) :- In Detail
VSAT( Very Small Aperture Terminal) :- In DetailVSAT( Very Small Aperture Terminal) :- In Detail
VSAT( Very Small Aperture Terminal) :- In Detail
 
Vehicular ad hoc network
Vehicular ad hoc networkVehicular ad hoc network
Vehicular ad hoc network
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
VANET (BY-VEDANT)
VANET (BY-VEDANT)VANET (BY-VEDANT)
VANET (BY-VEDANT)
 
VSAT
VSATVSAT
VSAT
 
Cellular V2X
Cellular V2XCellular V2X
Cellular V2X
 
5G NR-based C-V2X
5G NR-based C-V2X5G NR-based C-V2X
5G NR-based C-V2X
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 

Viewers also liked

The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETAnkit Singh
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulationciza2013
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
 
Using traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETUsing traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETMohammadAlmalag
 
An overview of vehicular ad hoc networks
An overview of vehicular ad hoc networksAn overview of vehicular ad hoc networks
An overview of vehicular ad hoc networksvyshnavi evss
 
Vanet - routage unicast et adressage
Vanet - routage unicast et adressageVanet - routage unicast et adressage
Vanet - routage unicast et adressageGhazi Tekaya
 
DSRC : The future of safer driving
DSRC : The future of safer drivingDSRC : The future of safer driving
DSRC : The future of safer drivingLavakush Verma
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)UzmaRuhy
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationArifur Rahman
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobilesDurairaja
 

Viewers also liked (20)

Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
VEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOKVEHICULAR ADHOC NETKWOK
VEHICULAR ADHOC NETKWOK
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANET
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
VANET overview & technical review
VANET overview &  technical reviewVANET overview &  technical review
VANET overview & technical review
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Using traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANETUsing traffic flow for cluster formation in VANET
Using traffic flow for cluster formation in VANET
 
An overview of vehicular ad hoc networks
An overview of vehicular ad hoc networksAn overview of vehicular ad hoc networks
An overview of vehicular ad hoc networks
 
Vanet - routage unicast et adressage
Vanet - routage unicast et adressageVanet - routage unicast et adressage
Vanet - routage unicast et adressage
 
VANET
VANETVANET
VANET
 
DSRC : The future of safer driving
DSRC : The future of safer drivingDSRC : The future of safer driving
DSRC : The future of safer driving
 
Vanet routing
Vanet routingVanet routing
Vanet routing
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)Li-Fi Technology (Perfect slides)
Li-Fi Technology (Perfect slides)
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home Automation
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 

Similar to VANETS Vehicular Adhoc NETworkS

Multimedia services in VANETs
Multimedia services in VANETsMultimedia services in VANETs
Multimedia services in VANETsMisbahFatima7
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networksDaisyWatson5
 
H046405864
H046405864H046405864
H046405864IOSR-JEN
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Alberto Los Santos Aransay
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksAmir Jafari
 
Technology, Business and Regulation of the Connected Car
Technology, Business and Regulation of the Connected CarTechnology, Business and Regulation of the Connected Car
Technology, Business and Regulation of the Connected Carmentoresd
 
Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Vishal Sharma, Ph.D.
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communicationsSaikiran Guduri
 
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVEROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVEIJCNCJournal
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...ijwmn
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET) Benyamin Moadab
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 

Similar to VANETS Vehicular Adhoc NETworkS (20)

Multimedia services in VANETs
Multimedia services in VANETsMultimedia services in VANETs
Multimedia services in VANETs
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Communications in Vehicular networks
Communications in Vehicular networksCommunications in Vehicular networks
Communications in Vehicular networks
 
H046405864
H046405864H046405864
H046405864
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
 
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
Vehicle to vehicle communication in COM2REACT (Alberto Los Santos)
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
 
Technology, Business and Regulation of the Connected Car
Technology, Business and Regulation of the Connected CarTechnology, Business and Regulation of the Connected Car
Technology, Business and Regulation of the Connected Car
 
Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12
 
Ec34781784
Ec34781784Ec34781784
Ec34781784
 
vehicular communications
vehicular communicationsvehicular communications
vehicular communications
 
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVEROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
ROUTING PROTOCOLS PERFORMANCE IN MOBILE AD-HOC NETWORKS USING MILLIMETER WAVE
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 
Intelligent transportation system
Intelligent transportation systemIntelligent transportation system
Intelligent transportation system
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
 
Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
50120130404054
5012013040405450120130404054
50120130404054
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

VANETS Vehicular Adhoc NETworkS

  • 1. Vehicular Ad-hoc NETwork (VANET) Speaker: Yi-Ting Mai Contact info. :wkb@wkb.idv.tw Date: 2010/05/04
  • 2. 2 Outline Overview of VANETs Physical Layer and MAC protocols for VANETs Broadcast Routing Protocols for VANETs Applications for VANETs
  • 3. 3 Why Vehicular Networks? Safety – On US highways (2004): • 42,800 Fatalities, 2.8 Million Injuries • ~$230.6 Billion cost to society – Combat the awful side-effects of road traffic • In the EU, around 40,000 people die yearly on the roads; more than 1.5 millions are injured • Traffic jams generate a tremendous waste of time and of fuel – Most of these problems can be solved by providing appropriate information to the driver or to the vehicle
  • 4. 4 Why Vehicular Networks? (cont.) Efficiency – Traffic jams waste time and fuel – In 2003, US drivers lost a total of 3.5 billion hours and 5.7 billion gallons of fuel to traffic congestion Profit – Safety features and high-tech devices have become product differentiators
  • 5. 5
  • 6. 6 What is a VANET?
  • 7. 7 A taxonomy of vehicular communication systems
  • 8. 8 Inter-vehicle communication (IVC) Systems IVC systems are completely infrastructure-free; only onboard units (OBUs) sometimes also called in-vehicle equipment (IVE) are needed.
  • 9. 9 IVC systems Single-hop and multihop IVCs (SIVCs and MIVCs). SIVC systems are useful for applications requiring short-range communications (e.g., lane merging, automatic cruise control) MIVC systems are more complex than SIVCs but can also support applications that require long- range communications (e.g., traffic monitoring)
  • 10. 10 IVC systems a) Single-hop IVC system b) Multihop IVC system
  • 11. 11 Vehicular Communication Future Vehicular Communication Scenario Internet Internet Gateway Vehicle
  • 12. 12 Vehicular Communication-DSRC In 2003, FCC established the service and license rules for Dedicated Short Range Communications (DSRC) Service. – DSRC is a communication service that uses the 5.9 GHz band (5.850-5.925 GHz band) for the use of public safety and private application. – The vehicular related services and communication standards enable vehicles and roadside beacons to form VANETs (Vehicular Ad Hoc Networks) in which the mobile nodes (vehicles) can communicate each other without central access points.
  • 13. 13 VANETs vs. MANETs A VANET consists of vehicles to form a network which is similar to a Mobile Ad Hoc Network (MANET). However, there are following differences between these two networks. – Vehicles mobility • Vehicles move at high speed but mobility is regular and predictable – Network topology • High speed movement makes network topology dynamic – No significant power constraint • Recharging batteries from vehicle – Localization • Vehicles position estimate accurately through GPS systems or on- board sensors
  • 14. 14 Features of VANETs The characteristics of VANETs can be summarized after comparing with the MANETs. – Dynamic topology • Nomadic nodes with very high speed movement cause frequent topology variation – Mobility models • Vehicles move along original trajectories completely different from typical MANET scenarios – Infinite energy supply • Power constraint can be neglected thanks to always recharging batteries – Localization functionality • Vehicle can be equipped with accurate positioning systems (GPS and GALILEO) integrated by electronic maps
  • 15. 15 Operating Environment According to the environments of operating vehicles, the VANETs can be established in the following situations: – City environments, disaster situations, extreme weather conditions, and so on. • For instance: City environments, have certain unique characteristics: – Many tall buildings obstructing and interfering the transmission signals, – In the highway scenario, vehicles are closer together than, thus incur interference if their transmission range are large, – The topology is usually two dimensional (e.g. with cross streets).
  • 16. 16 Scopes of VANETs (1/2) Communication range of VANETs – Short/medium-range communication systems (vehicle-to- vehicle or vehicle-to-roadside) Applications of VANETs – The VANETs vision includes vehicular real-time and safety applications, sharing the wireless channel with mobile applications from a large, decentralized array of commercial service providers. – VANET safety applications include collision and other safety warnings. – Non-safety applications include real-time traffic congestion and routing information, high-speed tolling, mobile infotainment, and many others.
  • 17. 17 Scopes of VANET (2/2) VANET research issues – Safety and non-safety applications – Roadside-to-vehicle and vehicle-to-vehicle communication – Communication protocol design – Channel modeling – Modulation and coding – Power control and scalability issues – Multi-channel organization and operation – Security issues and countermeasures – Privacy issues – Network management – Simulation frameworks & real-world testbeds
  • 18. 18 Threat model Presented in SeVeCom (Secure Vehicular Communication) project An attacker can be: – Insider / Outsider – Malicious / Rational – Active / Passive – Local / Extended Attacks can be mounted on: – Safety-related applications – Traffic optimization applications – Payment-based applications – Privacy
  • 19. 19 Attack 1 : Bogus traffic information Traffic jam ahead • Attacker: insider, rational, active
  • 20. 20 Attack 2 : Generate “Intelligent Collisions” SLOW DOWN The way is clear• Attacker: insider, malicious, active
  • 21. 21 Attack 3: Cheating with identity, speed, or position Wasn’t me! • Attacker: insider, rational, active
  • 25. 25 Protocols of Layers in VANETs In this topic, we introduce the physical layer and the 802.11 related MAC protocols. Afterwards, the routing protocols between vehicles are presented.Finally, the applications of VANETs are proposed. – The physical layer and the 802.11 related protocols. • The physical layer and the MAC layer of DSRC/802.11p • 802.11 DCF – Routing protocols • Position-based Routing (Unicast) • Geocasting Routing (Multicast) • Broadcast Routing – Applications of VANETs.
  • 26. Physical Layer and MAC protocols for VANETs
  • 27. 27 Physical/MAC Layers DSRC/802.11p – Dedicated Short Range Communication (DSRC) was released in 2002 by the American Society for Testing and Materials (ASTM). – In 2003, the standardization moved to IEEE Forum and changed the name from DSRC to WAVE (Wireless Ability in Vehicular Environments), which was also known as 802.11p.
  • 28. 28 DSRC/802.11p Physical Layer (1/4) DSRC/802.11p – The standard of 802.11p is based on IEEE 802.11a PHY layer and IEEE 802.11 MAC layer • Seven 10 MHz channels at 5.9GHz • one control channel and six service channels Vehicle to vehicle Service channel Service channel Control channel Intersection CH 172 CH 174 CH 182CH 180CH 178CH 176 CH 184 5.855 5.925 5.915 5.905 5.895 5.885 5.875 5.865 Frequency (GHz) Optionally combined service channels
  • 29. 29 DSRC/802.11p Physical Layer (2/4) DSRC/802.11p vs. 802.11a – 802.11a is designed for high data rate multimedia communications in indoor environment with low user mobility. – DSRC PHY uses a variation of OFDM modulation scheme to multiplex data. • high spectral efficiency, simple transceiver design and avoids multi-path fading
  • 30. 30 DSRC/802.11p Physical Layer (3/4) DSRC/802.11p vs. 802.11a – DSRC/802.11p reduces the signal bandwidth from 20MHz to 10MHz. • all parameter values are doubled in time domain in order to increase the robustness (e.g. timeout increase) to ISI caused by the multi-path delay spread and Doppler spread effect – Data rates are between 6 and 27 Mbps – Transmit power level are changed to fit requirements of outdoor vehicular communications • communication ranges up to 1000 meters
  • 31. 31 DSRC/802.11p Physical Layer (4/4) Parameters DSRC/802.11p 802.11a Information data rate Mb/s 3, 4.5, 6, 9, 12, 18, 24, and 27 6, 9, 12, 18, 24, 36, 48, and 54 Modulation BPSK, QPSK, 16-QAM, 64- QAM BPSK, QPSK, 16-QAM, 64- QAM Coding rate 1/2, 1/3, 3/4 1/2, 1/3, 3/4 Number of subcarriers 52 (=48+4) 52 (=48+4) OFDM symbol duration 8μs 4μs Guard time 1.6μs 0.8μs FFT period 6.4μs 3.2μs Preamble duration 32μs 16μs Subcarrier frequency spacing 0.15625MHz 0.3125MHz
  • 32. 32 Revolution and Design in 802.11 DCF The revolution of 802.11 DCF can be described in the following. – The design of avoiding collisions: The design to solve the collisions including collisions incurred by the terminal problem. – The improvement design to IEEE 802.11 DCF
  • 33. 33 The Design of Avoiding Collisions The design of avoiding collisions – In mobile wireless networks, the objectives of MAC protocols is to avoid collisions, process contention, and re-tramsit lost packets to increase the overall throughput. In previous works, the design of avoiding collisions can be described in the following. • Carrier Sense Multiple Access Protocols, CSMA: A mobile node uses carrier sensing technology to detect whether there is any node using the channel before transmitting data to avoid collisions. • The problems in the CSMA: hidden- and exposed- terminal problems • Terminal problems: – Hidden terminal problem – Exposed terminal problem
  • 34. 34 Medium Access Control (MAC) LAN(Ethernet) – CSMA/CD ( Carrier Sense Multiple Access with Collision Detection ) WLAN(802.11) – CSMA/CA (Carrier Sensing Multiple Access/Collision Avoidance)
  • 35. 35 CSMA/CD CSMA/CD (Carrier Sense Multiple Access/ Collision Detection)
  • 37. 37 CSMA/CA CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance) MH MH MH MH Sender Receiver
  • 38. 38 Hidden-Terminal Problem The hidden-terminal problem occurs when node C sends data to node B, as shown in the following Figure. A B C
  • 40. 40 Exposed-Terminal Problem The exposed-terminal problem occurs when node C is exhibited to transmit data to node D. A C DB Broadcast ranges of each node (Interfere)
  • 43. 43 The Designs to Solve the Hidden- Terminal Problem The Designs to Solve the Hidden-Terminal Problem – The design of using busy tone channel – The design of MACA (IEEE 802.11 DCF)
  • 44. 44 The Design with Busy Tone Channel Protocol – Each node equipped with an extra busy tone channel to send out the busy signals when the node is processing data transmission. – When a node would like to transmit data, it detects weather there are nodes issuing the signals by other nodes in its range. – If a node detects no signal, it can process the transmission. Problems – Needed an extra busy tone channel. – The hidden-terminal is solved, but the exposed-terminal problem still exists.
  • 45. 45 IEEE 802.11 DCF To solve the hidden-terminal problem, MACA proposed the Multiple Access Collision Avoidance protocol, which is adapted by the IEEE 802.11 MAC to be the IEEE 802.11 DCF. – Contention period – Handshake period – Data period – ACK period data ACK CTS contention 4 1 8 4 6 3 SIFSSIFS Defer Access handshake RTS SIFS data NAV ACK Sender Receiver Others
  • 46. 46 Contention Period of IEEE 802.11 DCF Contention period – Interval Frame Space, IFS • Short IFS, SIFS) : CTS, ACK, or Poll Response • PCF (PIFS) • DCF (DIFS)
  • 47. 47 Handshake period of IEEE 802.11 DCF Handshake period – In MACA, before processing data transmission, a sender broadcasts a RTS (Request To Send) signal to inform its neighbors that it will send out data. – When a neighbor except the sender and the receiver receives the RTS signal, it use the NAV (Network Allocation Vector) to exhibit itself to issue signals to avoid occurring interference of data transmission. – When the receiver receives the RTS, it will reply a CTS (Clear To Send) signal if it accepts the RTS request. – Similarly, when a neighbor of the receiver except the sender receivers the CTS, it uses the NAV to exhibit itself to send any signal.
  • 48. 48 Data and ACK Periods of IEEE 802.11 DCF Data period – After completing the handshaking period, the sender and the receiver can transit data, while the neighbors of these two nodes are exhibited by the NAV until the finishing data transmission. ACK period – After the completion of data transmission, the receiver sends a ACK to the sender to show that the data has been received. – At the same time, all neighbors are in the listening status for contending the channel.
  • 49. 49 IEEE 802.11 DCF and Problems With the protocol (IEEE 802.11 DCF) mentioned above can solve the hidden-terminal problems The problems of IEEE 802.11 DCF – The exposed-terminal problems exists. – The number of contention nodes during the contention period increases. – The length of backoff time period.
  • 50. 50 Exposed-Terminal in IEEE 802.11 DCF With IEEE 802.11 DCF, the nodes are exhibited by NAV increase. Therefore, the problem of exposed-terminal becomes more serious than CSMA. – In CSMA, only node C is exhibited to send or receive data. – In IEEE 802.11 DCF, nodes C and D are exhibited. AC B D AC B D (a) (b)
  • 51. 51 The Power Control Design The design of controlling power to improve the exposed-terminal problem. – With detecting the strength of signals, the power of data transmission can be controlled to fit the distance between two nodes. – With the decrease of exhibited area, the exposed- terminal problem can be improved. AC B E AC BD E FD F
  • 52. 52 The Power Control Design Problems: – With controlling power, the problem of exposed- terminal can be improved, the hidden-terminal problem may occur.
  • 53. 53 The Spilt-Channel Design to Improve the Problem of Contending for the Channel Spilt-channel design – Two pipeline stages of contending for the channel. • Nodes that would like to send data contending at the first stage. If nodes pass the first one, they can contending for the channel at the second stage. • The number of nodes contending for the channel is reduced. – To avoid occurring starvation, the protocol uses the weight schemes to make some nodes enter the second stage directly.
  • 54. 54 Influence of the Backoff Time The length of backoff time: – If the node density in IEEE 802.11 DCF is high, to avoid collisions in the contention period, the backoff time should be increase. – If the node density in IEEE 802.11 DCF is low, too long backoff time incurs the time waste of waiting.
  • 55. 55 Dynamic Adjustment of Backoff Time Schemes: Dynamic adjustment for the backoff time to reduce the waste of bandwidth utilization. – Three kinds of the dynamic adjustments – Successful history records. – Polling the neighbors – Statistical method: With the statistic list, the length of backoff time can be decided according to the statistic list.
  • 56. 56 DSRC/802.11p MAC Layer (1/2) DSRC/802.11p MAC – MAC layer of DSRC is very similar to the IEEE 802.11 MAC based on CSMA/CA with some minor modifications. – DSRC involves vehicle-to-vehicle and vehicle-to- infrastructure communications.
  • 57. 57 DSRC/802.11p MAC Layer (2/2) Vehicle-to-Vehicle – relative speed : low – absolute speed: high – multi-hop relay Vehicle-to-Infrastructure – high download rates over a short duration (a) distributed mobile multihop network
  • 58. 58 ADSL/WiFi WorkstationWiMax/3.5G DSRC/802.11 DSRC/802.11 V-V communication V-I communication V-V communication V-I communication TTS Server Communication architecture
  • 60. 60 Broadcast Routing In Inter-Vehicle Communication Systems (IVC) , broadcasting is an efficient method to spread messages. The reasons of occurring broadcast storm – In a broadcasting network, the situations of contentions and collisions often take place if an efficient broadcasting scheme is not used. – The result incurred by broadcasting is called broadcast storm.
  • 61. 61 Broadcast Storm In VANETs, broadcast is used for disseminating the traffic information : – Detour route – Accident alert – Construction warning – etc… Some messages will be periodically broadcasted by roadside unit (RSU) for several hours or even some days. – The problem of broadcast storm in VANET is more serious than that in MANET
  • 62. 62 Broadcast Routing Message Dissemination – Ideal solution: Minimum Connected Dominating Set, which minimizes packet rtx and preserves network connectivity. – Realistic solutions: trade-off between robustness and redundancy. The important concern in designing a broadcast scheme in VANET. – How to design broadcast algorithm to efficiently transmit messages to the target nodes. – To design a broadcast algorithm to make the desired vehicles to receive the message as soon as possible.
  • 63. 63 Four Broadcasting Strategies Different broadcasting strategies to select the forwarding nodes: – Probability-based – Location-based – Neighbor-based – Cluster-based
  • 64. 64 Broadcast Routing 1. Probability-based: – A given PDF determines the decision, for example depending on the number of copies a node has received. – The strategy is often dynamic. – PDF = probability distribution function
  • 65. 65 Broadcast Routing Probability-based Car A PDF = 0.8 Car B PDF = 0.5 Forwarding Node choose
  • 66. 66 Broadcast Routing Location-based – The selection criterion is the amount of additional area that would be covered by enabling a node to forward. – Some proposal also computes position prediction as useful input information.
  • 67. 67 Broadcast Routing Location-based Target Forwarding Node choose Car B wants to turn right Car A
  • 68. 68 Broadcast Routing Neighbor-based – A node is selected depending on its neighbors status (for instance, the status concerns how a neighbor is connected to the network).
  • 69. 69 Broadcast Routing Neighbor-based Target Forwarding Node choose Car B Car A Collect the information of neighbors
  • 70. 70 Broadcast Routing Cluster-based – Nodes are grouped in clusters represented by an elected cluster-head. Only cluster-heads forward packets. – Nodes in the same cluster share some features (e.g., relative speed in VANETs). – Reclustering on-demand or periodically.
  • 73. 73 Assistance for Safe Navigation Traffic safety – Detecting dangerous situations – Sending warning messages to other cars using ad- hoc networking Traffic management services – Traffic congestion – Weather forecast – Road works
  • 74. 74 Assistance for Safe Navigation (1/3) There are some components must be included into a smart car.
  • 75. 75 Assistance for Safe Navigation (2/3) Overview of the demonstrator routing architecture
  • 76. 76 Assistance for Safe Navigation (3/3) A danger situation: – The system sends the warning message immediately after there are cars accident occurring.
  • 77. 77 RDS/DVB/DAB GSM/GPRS/3G/ 3.5G/WiMAX WiFi/DSRC Service terminals Signal exchanging facilities 車內網路 智慧車輛智慧車輛 智慧駕駛智慧駕駛 Ubiquitous UseUbiquitous Use Intelligent Vehicle •Intelligent Driving •Advanced Safety Features Intelligent Vehicle •Intelligent Driving •Advanced Safety Features Innovated Services Vehicle Infotainment Service UNS LifeUNS Life ETC/ CVO Mobile Business services Multi-Modal Navigation/ Reservation E-call/ Maintenance & warrantee LBS/ Social Networking Safety Warning/ Mitigation 智慧道路智慧道路 WiFi/Cellular/DSRC GPS/RDS/DVB/DAB + Urban Nomadic/pedestrians Telematics 整合車 、家庭與 公室應用內 辦 Source: adapted from TEEMA, 2007/12 車載產業及智慧交通願景

Editor's Notes

  1. 在本章節的第一部份,我們主要概括性的介紹VANET;在第二部份我們則介紹VANET中繞路演算法的分類以及分類後的類別描述;最後一個部份則是著重在VANET應用面的討論以及介紹。
  2. 從這張圖我們可以看到車輛可以透過網路的Gateway連結到網路,而當車輛跟車輛之間的車間通訊時,則可以透過無線隨意網路的方式,車對車的連結通訊來達成。
  3. 首先,我們先來了解一下VANET發展的歷史簡介,在1999年,美國聯邦通訊委員會(FCC)分配頻譜頻段給車間及路邊通訊使用。而美國聯邦通訊委員會(FCC)更在2003年制定了DSRC協定的相關服務以及許可章程。DSRC的通訊服務使用了5.850~5.925GHz的頻帶以便讓一些公用的安全和隱私相關應用。所分配到的頻帶以及相關服務則能夠讓VANET運用在行動裝置的無線通訊上面,透過隨意網路的通訊方式車間或路間通訊將能夠不必透過集中式AP的輔助。
  4. 由於傳統MANET和VANET都是採用隨意網路所建置而成的架構,所以MANET和VANET其實是有很多地方都是非常類似的。然而,在這一部份我們將討論傳統MANET和VANET的一些差異性,主要分成三點來探討: (1)在電量上面的考慮,由於VANET可以透過車子本身的電量供電,所以不必像傳統MANET必須考慮到電量的因子。 (2)在移動性上面,VANET的移動性會根據道路的配置而比MANET來得有規律性,不像MANET是隨意移動的。 (3)在網路的拓樸上面,VANET考慮的可能是一個大型的都市,而MANET考慮的可能是一個大樓之類的小型區域。
  5. 透過上述比較VANET和傳統MANET的不同點,我們將可以規劃出VANET的特性: (1)動態的拓樸:行動節點(車輛)由於具有高速移動的特性,所以將會造成網路拓樸的時常變動。 (2)移動性的模組:行動節點(車輛)的移動會根據道路的特性而擁有特定的運行軌道,所以在移動的模組設計上面,VANET必須根據電子地圖上的路徑去進行規劃。 (3)無限的能量支援:VANET的行動節點是透過車輛來供電,所以在協定的設計上將可以不用考慮電量的問題。 (4)區域性:行動節點的區域定位上面,將可以透過GPS和GALILEO並且整合電子地圖來達到精準的位置資訊。
  6. 接下來我們介紹到VANET的運作環境,考慮到車輛的移動場所以及可能面臨的環境,我們將可以獲得VANET可能的運作環境,包含了:城市車輛擁擠的環境,災害發生情況的環境,惡劣的天氣環境等。 以城市環境為例,可能會有某些特性存在: 1. 許多高樓大廈等建築物或是其他障礙物可能會干擾傳輸訊號。 2. 車輛之間可能會因為過於接近,而當傳輸範圍過大的時候造成碰撞等問題發生。 3. 拓樸通常是使用二維的平面設計。
  7. VANET的領域中,在短程和中程的通訊範圍內,VANET的應用領域包含了:即時及安全性的應用,商業性的服務提供等。 VANET的安全應用又包含了車禍或是其他的安全警告等;而在非安全性應用則包含了:即時的交通資訊,路況的資訊,繞道的資訊,高速公路收費站的資訊以及其他車輛在行駛中可能使用到的相關服務等。
  8. 而在學術界的研究議題則如上面所述: 1 安全及非安全性的應用 2 路旁對車輛以及車間通訊 3 通訊協定的設計 4 頻道的模組設計 5 模組以及編碼 6 能源控制以及擴充性的議題 7 多通道組織以及運作的議題 8 安全性防護以及對應策略的議題 9 隱密性的議題 10 網路管理的議題 11 模擬架構以及真實測試平台的設計
  9. 接下來我們會先簡單介紹VANET實體層以及媒體存取層的運作,它所採用的架構是IEEE 802.11(詳細介紹可以參考本計劃其他章節)。 之後,我們則針對VANET車間通訊的繞路協定,主要的目標在於如何有效地找到一個或多個轉傳節點 (Forwarding Node),分別針對三種不同的casting協定來討論: 3.3 Position-based Routing (類似傳統的Unicast) 3.4 Geocasting Routing (類似傳統的Multicast) 3.5 Broadcast Routing 而在3.6的子章節中,我們則介紹幾個VANET的相關應用。
  10. 當我們討論到VANET底層的協定時,我們必須先了解DSRC是什麼? DSRC是在2002年被ASTM所釋出,而在2003年IEEE把它納入WAVE的標準中,而WAVE也是大家所常聽到的802.11p。
  11. 802.11p的標準是以IEEE 802.11a的實體層與媒體存取控制層為基礎所制定而成的。 在802.11p中通道總共被分成7個10MHz的子通道,其頻帶則是在5.9GHz。 這七個子通道主要是裡一個控制通道和六個服務通道所組成的,如圖所示。
  12. IEEE的802.11a標準主要是為了室內高資料速率的多媒體通訊所制定的,所以並不適用於移動性比較高的無線傳輸。 在DSRC的實體層協定(802.11p)則是採用以OFDM為基礎所修改而成的調變協定,所以能夠適用於資料多路傳輸,在設計上則是利用高頻譜的功效,簡單的無線電收發設計以及避免多條路徑所產生的fading(訊號時強時弱)所造成的影響,所以也就比802.11a更適用在移動性較高的無線傳輸。
  13. DSRC/802.11p把信號的頻寬從20MHz降低成10MHz,所有和時間有關的參數值都修改成原本(802.11a)的1倍為了增加其強健度。 另外,資料的傳輸率範圍為6Mbps到27Mbps。傳輸的能源level也被修正成能夠在室外通訊,通訊範圍也增加到1000公尺。
  14. 表格內為DSRC/802.11p和802.11a的參數比較。可以看到所有跟時間有關的參數都比802.11a降低了一半。
  15. 媒體存取層的設計可以被分成下面幾個部份: 首先為避免碰撞的媒體存取層的方法:因為終端問題所造成的碰撞問題的解決方法。 接著第二部份則是在於分散協調設計 (DCF) 的改良設計。 最後一個部份則是利用多通道技術,讓多對主機可以同時傳送資料來增加傳輸效率。
  16. 首先我們在第一部份先來介紹避免碰撞的問題的媒體存取方法設計。在行動隨意網路中,媒體存取控制層主要是處理競爭,碰撞,錯誤重傳以提高傳輸可靠度與傳輸效率,過去在解決競爭與碰撞的問題上有:使用載波偵測多重存取通訊協定 (Carrier Sense Multiple Access Protocols, CSMA), 主機在傳送資料前,必須以載波偵測通道是否在閒置的狀態下,通道閒置才允許傳送,用來預防多對主機同時使用通道造成的碰撞。然而CSMA的設計仍然會有終端問題存在,進而影響傳輸效率。而所謂的終端問題主要又被分成兩種:第一種是隱藏終端問題,第二種是暴露終端問題。
  17. 在第一種隱藏的終端 (Hidden-Terminal) 問題發生在第三主機(C)無法偵測來源主機的狀態,因此發出訊號干擾了兩個主機(A,B)間的傳輸。
  18. 第二種暴露的終端 (Exposed-Terminal) 問題則是發生在兩組(A,B)和(C,D)無關的存取行為,因為傳輸的涵蓋範圍導致影響到另一組無法傳輸,造成傳輸效率下降。
  19. 當介紹了上述兩種終端問題之後,我們接著介紹眾多學者所提出解決隱藏終端問題的方法,主要分成兩大部份。第一種方法是使用忙碌通道 (busy tone);第兩種方法則是使用IEEE 802.11 DCF相關的技術。
  20. 在使用忙碌通道解決隱藏終端問題中,其協定運作如下:在每個主機多設置一個忙碌通道,當主機需要傳輸資料時,就在該忙碌通道發出訊號(Busy Tone)通知其他主機,當其他主機需要傳輸資料前,如果偵測到忙碌通道有其他主機發出的訊號,就停止發出訊號,等到忙碌通道已經沒有其他主機的訊號,才發出訊號。但是這種技術仍然會發生一些問題,它需要額外設置一個忙碌通道來做忙碌通知的行為,使得原本使用單通道技術,變成硬體成本較高的多通道技術。另一方面,雖然解決了隱藏的終端問題,範圍內偵測到忙碌訊號的主機皆無法發出訊號,因此暴露的終端問題仍然是存在的。
  21. 為了解決隱藏終端,MACA提出了避免碰撞多重存取通訊協定(Multiple Access Collision Avoidance protocol),並且被IEEE 802.11 MAC所採用(IEEE 802.11 DCF)。而交握協定則包含了下面幾個階段的運作: 競爭階段 (Contention period) 交握階段 (Handshake period) 資料傳輸階段 (Data period) 確認階段 (ACK period)
  22. 在競爭階段 (Contention period)裡主要是藉由訊框間隔 (Interval Frame Space, IFS) 長短來決定發送訊框的時機。短訊框間隔 (Short IFS, SIFS)主要的來源是CTS, ACK, 或Poll Response。而PCF訊框間隔 (PIFS)主要是提供PCF運作服務的時間間隔。另外,DCF訊框間隔 (DIFS)則是提供DCF運作服務的時間間隔。
  23. 在交握時期 (Handshake period)中,透過MACA的設計我們可以知道,當行動主機想要傳送資料前,必須先廣播RTS(Request To Send) 的訊號來告訴其廣播範圍內的行動節點說他要傳送資料了。而當非接收者的鄰居節點如果收到 RTS訊號時,則會以網路配置向量(Network Allocation Vector,簡稱NAV) 禁止本身發出訊號,以免干擾了正在存取的主機。而當接收節點接收到來源端傳過來的RTS訊號後,便會回應來源端一個準備傳送訊號 CTS (Clear To Send)。相同地,當接收節點的鄰居主機接收到CTS控制訊號時,也會以NAV來禁止本身發出訊號,以免干擾了正在存取的主機。
  24. 在資料傳輸階段 (Data period)中,當交握階段完成後,傳輸者跟接收者則開始進行資料傳輸,而鄰居節點則開始將NAV的計數器倒數,當倒數到0時,則表示傳輸完成。最後一個階段則是確認階段 (ACK period),當資料傳輸完成後,接收者會回應一個確認訊號 (ACK)給傳輸者,表示傳輸已經確實被接收,而鄰居節點在這個階段也會將NAV的計數器倒數到0,並且回復到監聽狀態。
  25. 以上由MACA提出來的交換RTS與CTS訊號的行為,稱為IEEE 802.11 DCF交握協定 (handshake)。透過這種方式就能夠解決隱藏終端問題。然而使用IEEE 802.11 DCF仍然存在以下的問題,(1). 使得暴露終端的問題更加嚴重。(2). 讓競爭期間競爭通道使用權的節點變多。(3). 分散協調機制下 Backoff 時間長短的問題。
  26. 雖然透過IEEE 802.11 DCF的交握協定能夠有效地改善隱藏終端的問題,但是卻讓暴露終端的問題更加嚴重,因為被限制的範圍變大了,如圖所示,原本節點D所處的區域是不會受到影響的,但是經過交握協定後,則變成沒有辦法傳輸資料。也就是說,原本應用CSMA的方法時,當兩個行動節點正在傳遞資料時,只有傳送者的涵蓋範圍是不允許發送訊號的,如(a)所示,在主機A的涵蓋範圍內(綠色部分) 的鄰居主機B與C將被禁止發出訊號;但是交握協定的機制交換控制訊號後,當兩個行動節點正在傳遞資料時,不僅傳送者,連接收者的涵蓋範圍也都被禁止發送訊號,如(b) 所示,也就是說,傳送者與接收者的所有鄰居主機,如(b)中的B、C及D皆被禁止發出訊號。
  27. 因此,為了解決更嚴重的暴露終端問題就有學者提出利用訊號強度控制 (power control)的方法,主要的運作方式就在於減少訊號涵蓋範圍,利用偵測傳送與接收者的信號強度,以降低信號強度來縮小涵蓋的範圍,讓受限制的節點個數少一點。如圖所示,節點A和B經由控制訊號強度來減少干擾到其他節點的機會。
  28. 利用訊號強度控制的方法雖然可以改善暴露的終端問題,但是卻會因為節點之間訊號強度不一致的問題而引發另一個隱藏終端問題。
  29. 使用切割通道來改善過多節點競爭的問題,切割通道 (spilt-channel)主要的運作方式為:兩階段管線的通道切割方式,控制競爭通道的節點數量,節點會先在第一階段的通道競爭通道,只有取得第二階段的節點會進行第二階段的競爭通道。為了避免飢餓的問題,兩階段管線的通道切割方法會讓長時間處於第一階段競爭的節點直接進行第二階段的競爭通道。
  30. 最後,則是隨機訊框 (backoff) 時間長短的影響,對於隨機訊框的增減則是由於 IEEE 802.11 DCF 機制在高負載時,為了減少碰撞發生,必須加大隨機訊框(backoff)的範圍。例如鄰居數量增加為原來的兩倍,隨機訊框的範圍也必須調整為兩倍大,才能降低產生相同隨機訊框的機率。而隨機的訊框增加也代表了等待時間的增加,也就是說將會有越多主機等待傳輸,而造成效率降低。
  31. 經由動態調整隨機訊框,動態調整競爭期間的隨機訊框時間,適度的減少等待時間來降低頻寬的浪費。其動態調整的機制可分為三種:(1).傳送狀態機制:利用傳送成功的歷史紀錄來動態增加獲釋減小隨機訊框 。(2). 輪詢機制:篩選出有傳送需求的主機來減少隨機訊框。(3). 統計機制:統計出各種環境下的隨機訊框長度,做為動態調整的參數。
  32. 在媒體存取控制層的設計上,DSRC/802.11p和其他IEEE 802.11的標準類似,都是採用CSMA/CA的運作方式。而DSRC/802.11p則包含了車輛對車輛之間的通訊以及車輛對路邊基地台的通訊兩方面。
  33. 在DSRC/802.11p的傳輸方式如隨意網路的環境,可以被分成兩種,一種是多重跳躍,而另一種則是集中式單一跳躍的網路環境。在多重跳躍的網路環境中,行動節點可以利用隨意網路的點對點機制進行資料的傳輸;而在集中式單一跳躍則是適用在短時間擁有高下載率的傳輸環境。
  34. 而在VANET的廣播法則中,最理想的情況就是能夠使廣播訊號所能傳送到的鄰居集合數擁有最小的連結集合,也就是說,當發送一個廣播封包時,只讓最少數的節點收到。 但是在現實的情況卻是必須考慮到強健度(robustness)和以及redundancy,並且在這兩者之間取得一個最佳的平衡。 所謂的強健度,則是表示當發送一個廣播訊息時,能夠讓最多的人收到,並且幫忙轉傳到目的地節點。 而redundancy則是表示,當發送一個廣播訊息時,不想讓太多非相關的節點收到這個廣播封包。
  35. 在一個VANET的環境中,廣播是最常被用來散佈交通資訊的方法,而所謂的交通資訊則例如:繞路的資訊,事故的警告,道路建設的通知之類的資訊。而有一些訊息可能會需要週期性的被發送,有時候這種訊息必須被好幾個小時或是好幾天的發送,所以通常是藉由路旁的無線單位 (RSU)的輔助。但是,這一類訊息的發生,也就意味著利用廣播的方式來傳送資訊的風暴問題將會比傳統MANET來得嚴重。
  36. 最理想的訊息散佈是透過最少的連結集合,發送最少的封包,卻能讓整體網路節點收到這個封包資訊。然而,要達到最理想的情況卻是一個比較不可能實現的情況。在VANET中以廣播為主的設計重點: (1). 如何有效的將廣播訊息快速且有效的傳送到目標節點 (2). 在最短的時間內讓有需要知道廣播資訊的車輛接收到這個訊息。
  37. 而下面我們會介紹四種不同的廣播策略,主要是用來選擇轉傳節點(forwarding node),分別是1). Probability-based, 2). Location-based, 3). Neighbor-based, and 4). Cluster-based。
  38. 第一個方法是以機率為基礎的廣播策略:利用機率分散函數(PDF)去決定要轉傳的節點,在這個方法中,每一個節點都會去收集其他鄰居節點的廣播封包,並且去記錄自己的鄰居節點數。
  39. 根據範圍內各點的鄰居節點的密度,來決定 broadcast的 forwarding node。例如上圖中,A點鄰居節點密度為0.8,較B點的密度0.5高,所以broadcast會選擇A點作為forwarding node。
  40. 第二個方法則是採用位置為基礎的廣播策略:在這個選擇策略中,節點會根據自己以及鄰居節點的位置和目的地節點的位置來選擇一個轉傳的節點。在某些文獻中,也有透過預測鄰居節點未來的位置資料來當成計算的因子。
  41. 根據各點的位置來預測其移動路徑,選擇一點移動路徑可能會較為接近我們的傳送目標作為forwarding node。 例如上圖中,我們傳送目標在左上角,根據預測B車在前方叉路可能右轉,所以不選擇B車作為forwarding node,而選擇移動路徑較靠近我們傳送目標的A車。
  42. 第三個方法是以鄰居節點為基礎的廣播策略:轉傳節點的選擇策略會根據其鄰居節點的狀態來決定,舉例來說,當我們得知鄰居節點可能將要左轉,而目的地的是在前方直走處,這時候我們將不會選擇這一個右轉的鄰居節點來當成其轉傳節點。
  43. 根據各點收集到之鄰居節點資訊,與我們傳送目標位置來作判斷,決定下一個forwarding node。 例如上圖中,A車之鄰居節點較可能右轉進而較接近我們的傳送目標,所以選擇A車作為我們的forwarding node。
  44. 第四個方法則是以群集為基礎的播策略:行動節點會被集結成群集的網路拓樸,每一個群集都有一個群集的負責節點,當有資料要傳輸的時候,則透過這個負責節點傳輸到目的地節點所存在的群集中的負責節點,再轉傳到該目的地節點。
  45. 在每個cluster中有一點為cluster-header,各cluster-header的交集中亦有一點為Gateway-Node,此點作為forwarding-node。
  46. 在進入安全性應用介紹之前,我們先針對一個安全性應用必須具備有哪些條件加以介紹。在安全性方面的應用大致上必須具備有維護交通安全以及交通管理的功能。在交通安全方面每台車必須要具有監測危險狀況並且通知其他車輛的能力,而交通管理方面大致需要包含了交通疏導、道路施工通知、前方天氣預報等功能。
  47. 在一個vanet應用中,車輛通常必須具備有紀錄事件、定位以及資訊處理的能力。因此,在車輛當中必須具備有『雷達』:負責偵測障礙物以及車輛、『事件記錄器』:透過事件的紀錄在事故發生後能幫助責任釐清、『定位系統』:position or location based 定位系統有助於routing或其他應用、『計算單元』:對於接受的的資訊能夠依照不同的應用做一些處理,以及『通訊系統』:負責車輛與車輛之間的通訊。
  48. 上圖中說明了cartalk的routing 架構(此系統是使用position based routing),當GPS收到一些位址資訊後會送進系統並根據不同的應用來做不同的運算, routing資訊一旦計算完畢後會透過802.11的方式以車間通訊傳出出去。
  49. 圖中說明一個簡單的範例,當事故發生時應透過車輛之間的通訊以及車輛與存取點之間的通訊將事故訊息快速散播出去。透過車間通訊的幫助,駕駛人可以更遠、更早的知道事故或者道路資訊並有多餘的時間能夠反應,增加行車安全。