SlideShare a Scribd company logo
1 of 5
Download to read offline
Journal of Information Engineering and Applications                                                      www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.4, 2011

       Qualitative Based Comparison of Routing Protocols for

                                                     VANET
                            Suresh Kumar *, K.D.Narayan , Jogendra Kumar
                   G. B. Pant Engineering College, Pauri-Garhwal Uttarakhand , (India)
         Email: * suresh15nirala@yahoo.com



Abstract
 Vehicular ad hoc network is one of the most promising applications of MANET that an inter communication system.
In VANET nodes which are vehicles can move safety with high speed and generally must communicate quickly
reliably. When an accident occurs in a road or highway, alarm messages must be disseminated, instead of ad hoc
routed, to inform all other vehicles. Vehicular ad hoc network architecture and cellular technology to achieve intelligent
communication and improve road traffic safety and efficiency .To organize their in vehicle computing system, vehicle
to vehicle ad hoc networks, hybrid architecture with special properties such as high mobility, network portioning and
constrained topology .there is a lot of research about VANET for driving services, traffic information services, user
communication and information services. VANET can perform effective communication by utilizing routing
information. Some researchers are contributed a lots in the area of VANET. In this articles mainly focusing on
significant features, performance improvement in comparisons of routing protocol for vehicular ad hoc network
(VANET).

Keywords: VANET, Routing Protocol, PBR, CAR, CBR etc.

1 Introduction
A VANET is a form of Vehicular Mobile ad-hoc Networks [1], to provide communication among nearby vehicles and
between vehicles and nearby fixed equipment i.e. roadside equipment. Roads are saturated; safety distance and
reasonable speeds are hardly respected. VANETs allow vehicles to avoid problems, either by taking any desired action
or by alerting the driver. Besides the road safety enhancements that VANETs will bring, they also open doors too many
applications to enhance the driving and traveling comfort, like Internet access from a car .VANET or Intelligent
Vehicular Ad-Hoc Networking provides an intelligent way of using vehicular Networking. With the sharp increase of
vehicles on roads in the recent years, driving becomes more challenging and dangerous. The main goal of VANET is
providing safety and comfort for passengers helping drivers on the roads by anticipating hazardous. Each vehicle
equipped with VANET device will be a node in the Ad-hoc network and can receive & relay other messages through
the wireless network. Collision warning, Road signal arms and in place traffic view will give the driver essential tool to
decide the best path along the way events or bad traffic areas. VANET has unique characteristics like high mobility
with the constraint of road topology, initially low market penetration ratio, unbounded network size, infrastructure
support that Differentiate it from MANET. From the above mentioned characteristics, it is evident that conventional
MANET routing Protocols have difficulties from finding stable routing paths in VANET environments. Therefore,
more and more researchers have concentrated on proposing suitable routing protocols to deal with the highly dynamic
nature of VANET. The routing Protocols in VANET are categorized into various types’ likes Topology based, Position
based, Geocast based, Cluster based, broadcast Based and Infrastructure based.

2 Applications of VANET [2]
VANET application can be divided into following categories
      VANET provides ubiquitous connectivity on the road to mobile users.
      Intelligent Transport System (ITS) provides efficient vehicle to vehicle communications in VANET.
      ITS have variety of applications like cooperative traffic monitoring, control of Traffic flows, blind crossing
       and collision prevention.
      Comfort application is the application to allow the passenger to communicate with other vehicles and with
       internet hosts, which improves passengers comfort.
      VANET provides internet connectivity to vehicular nodes while on the movement so that passenger can
       download music, send emails, watch online movies and can online chatting etc.


13 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                     www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.4, 2011

3 Network Architecture and characteristics of VANET
Wireless ad hoc networks do not depend on fixed infrastructure, access point or infrastructure less network for
communication and dissemination of information. The architecture of VANET consists of three categories: Pure
cellular/WLAN, Pure Ad hoc and hybrid. VANET may use fixed cellular gateways and WLAN/WiMax access points
at traffic intersections to connect to the internet, gather traffic information or for routing purposes. This network
architecture is pure cellular or WLAN. VANET can compile both cellular network and WLAN to form the network.
Stationery or fixed gateways around the road sides also provides connectivity to vehicles. In such a scenario all
vehicles and road sides’ devices form pure mobile ad hoc networks. Hybrid architecture consists of both infrastructure
networks and ad Hoc networks together. Nodes in VANET can self organized and self manage the information in a
distributed fashion without any centralized authority. Since the nodes are mobile so data transmission is less reliable
and sub optimal. Some of the distinguishing features of VANET [1, 3]:

Features                           Description
Highly Dynamic Topology            Vehicles are moving VANET is always changing at high speed, by formed network
                                   topology.

Frequently disconnected           Changing node density due to occurs when highly dynamic topology frequently
network topology                  disconnected network.
Unlimited Battery Power and       Nodes of VANET are not subject to power and storage limitation in sensor
Storage capacity                  networks. Nodes have limited amount of energy and computing power
On Board Sensors networks         VANET routing protocols consists of many nodes of sensors network which provide
                                  useful information for many GPS unit which provides location information of nodes.
                                 Table 1 showing various features of VANET

4 Overview of Routing Protocols IN VANET
In VANET, the routing protocols are classified into various categories: Topology based, Position based, Cluster based,
Geocast, Broadcast.

4.1 Topology based routing protocols
Topology based routing protocols which discover the route and maintain routing information in a table before the
sender starts transmitting data. They are divided into Proactive, Reactive and hybrid protocols.
         Proactive protocols [9]: all the nodes of the networks in proactive protocol or table driven routing
          protocols periodically exchanging the knowledge of topology. The proactive protocols do not have initial
          route discovery delay but consumes lot of bandwidth for periodic updates of topology. E.g. fisheye state
          routing (FSR), Optimized Link State Routing Protocol (OLSR), and Topology Dissemination Based on
          Reverse-Path Forwarding (TBRPF) etc.
         Reactive protocols [9]: Reactive routing protocols or on-demand routing protocols periodically update the
          routing table, when some data is there to send. When use flooding process for route discovery, which causes
          more routing overhead and also suffer from the initial route discovery process, which make them unsuitable
          for safety applications in VANET. E.g. Ad hoc on demand distance vector (AODV), Dynamic Source
          Routing (DSR), Temporally-Ordered Routing Algorithm (TORA) etc.
         Hybrid protocols [9]: Hybrid routing protocols is combination of reactive routing protocols and proactive
          routing protocols which reduce the control overhead of proactive routing protocols and decrease the initial
          Route discovery delay in reactive routing protocols. E.g. Zone Routing protocol (ZRP), Hybrid Routing
          Protocol (HARP) etc

4.2 Positions based routing protocol
Position based routing consists of class of routing Algorithm. Which is sharing the property of geographic positioning
information in order to select the next forwarding hops? The packet is send without any map knowledge to the one hop
neighbor which is closest to destination. Position based routing better performance because that is no need to be created
and maintained global route from source node to destination node. Position based routing is divided in two types:
Position based greedy Vehicle to Vehicle protocols, Delay Tolerant Protocols etc.

         Position Based Greedy vehicle to vehicle Protocols [1]: In Greedy vehicle to vehicle routing
          Protocols strategy and intermediate node should possessed position of itself, position of its neighbor and
          destination position in the route forward message to the farthest neighbor in the direction of the next
          destination. The main goal of these protocols is min delay routing protocols to transmit data packets to

14 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                    www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.4, 2011

         destination as soon as possible that Various types of position based greedy Vehicle to Vehicle protocols likes
         GSR, GPSR, CAR, ASTAR, STBR, CBF etc.

        Geographic Source Routing (GSR) [4]: GSR used in mobile ad hoc network. To improve the
         performance because to use many application of MANET in vehicular ad hoc network VANET scenario by
         incorporating in to it greedy forwarding of messages toward the destination. If at any hop there are no nodes
         in the direction of destination then GPSR utilizes a recovery strategy known as perimeter mode. The
         perimeter mode has two components.
        Makes local conversion of connectivity graph into planar graph by removing redundant edges that is called
         distributed planarization algorithm.
        Online routing algorithm that operates on planer graphs. VANET perimeter mode of GPSR is used. In GPSR
         if any obstruction or void occurs then algorithm enter perimeter mode and planner graph routing algorithm
         start operations, it involves sending the message to intermediate neighbor instead of sending to farthest node,
         but this method introduces long delays due to greater no. of hop counts.
        Due to fast movement of vehicles, routing loops are introduced which causes dissemination of messages to
         long path.
        GPSR uses static street map and location information about every node, since GPSR does not consider
         vehicle density of streets so it is not an efficient method for VANET.

4.3 Geocast based protocols [5]
Geocast routing is basically a location based multicast routing used to send a message to all vehicles in a pre-defined
geographical region. It is main objective to deliver the packet from source node to all other nodes within a specified
geographical region Zone of Relevance ZOR. In Geocast routing vehicles outside the ZOR are not alerted to avoid
unnecessary hasty reaction. It normally defines a forwarding zone where it directs the flooding of packets in order to
reduce message overhead and network congestion caused by simply flooding packets everywhere. In the destination
zone, unicast routing can be used to forward the packet. One pitfall of Geocast is network partitioning and also
unfavorable neighbors which may hinder the proper forwarding of messages. E.g. IVG, DG-CASTOR and DRG.

        Robust Vehicular Routing (ROVER) [5]: The ZOR is defined as a rectangle specified by its
         corner coordinates. It is a reliable geographical multicast protocol where only control packets are broadcasted
         in the network and the data packets are unicasted. The main objective of the protocol is to send a message to
         all other vehicles within a specified Zone of Relevance (ZOR).

        DTSG [8]: The main aim of DTSG protocol is to work even with sparse density networks. It provides
         vehicles speed for better performance .It work done by dynamically adjusts the protocol depending on
         network density. It have two phases: pre-stable and stable period. Pre-stable phase helps the message to be
         disseminated within the region, and stable-period intermediate node uses store and forward method for a
         predefined time within the region. It also tries to control balance between packet delivery ratio and network
         cost.

4.4 Cluster based protocols
Each cluster has one cluster-head, which is responsible for intra and inter-cluster management functions. Intra-cluster
nodes communicate each other using direct links, whereas inter-cluster communication is performed via cluster headers
.In Cluster-based routing protocols vehicles near to each other form a cluster. In cluster based routing protocols the
formation of clusters and the selection of the cluster-head is an important issue. In VANET due to high mobility
dynamic cluster formation is a towering process
      .Hierarchical Cluster Based (HCB) routing [3]: Hierarchical Cluster routing protocol designed for
          highly mobility ad hoc networks. HCB is two-layer communication architecture. In layer-1 mostly nodes
          have single radio interface and they communicate with each other via multi-hop path. Among these nodes
          some also have another interface with long radio communication range called super nodes which exist both
          on layer-1and 2. Super nodes are able to communicate with each other via the base station in layer-2. During
          the cluster formation, each node will attach to the nearest cluster header and super nodes will become cluster
          headers in layer-1. In HCB, intra-cluster routing is performed independently in each cluster. Cluster heads
          exchange membership information periodically to enable inter-cluster routing.

        Cluster Based Location Routing (CBLR) [7]: It is a reactive or on demand routing protocol and
         cluster based routing protocol. Each cluster header maintains a routing table contains the addresses and
         geographic locations of the cluster members and gateways nodes, and it also maintains a Cluster Neighbor
         Table that contains information about all neighboring clusters. When a source wants to send data to a
15 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                           www.iiste.org
    ISSN 2224-5758 (print) ISSN 2224-896X (online)
    Vol 1, No.4, 2011

              destination, it first checks whether the destination is in the same cluster or not. If it is in same cluster, it sends
              the packet to the closest neighbor to the destination. Otherwise, the source stores the data packet in its buffer,
              starts a timer and broadcasts Location Request (LREQ) packets. CBLR is suitable for high mobility networks
              because it updates the location of the source and destination every time before data transmission starts.

             Cluster-Based Directional Routing Protocol (CBDRP) [2,7]: It divides the vehicles into clusters
              and vehicles which are moving in same direction form a cluster. The source sends the message to its cluster
              header and then it forwards the message to header which is in the same cluster with the destination. At last
              the destination header sends the message to the destination. The cluster header selection and maintenance is
              same like CBR but it considers velocity and direction of a vehicle.

    4.5 Broadcast based protocols
    Broadcast is based on hierarchal structure for highway network. In broadcast the highway is divided into virtual cells
    which move like vehicles. The nodes in the highway are organized into two level of hierarchy: the first Level hierarchy
    includes all the nodes in a cell, the second level hierarchy is represented by cell reflectors, which are few nodes located
    closed to geographical centre of cell. Some Cell reflected behaves for certain interval of time as cluster head and
    handles the emergency messages coming from same members of the cell or nearby neighbor. This protocol performs
    similar to flooding base routing protocols for message broadcasting and routing overhead .

             Distributed vehicular broadcast protocol (DVCAST) [1,7]: Each vehicle uses a flag variable to
              check whether the packet is redundant or not and It is uses local topology information by using the periodic
              hello messages for broadcasting the information. DVCAST protocol divides the vehicles into three types
              depending on the local connectivity as well connected, sparsely connected, totally disconnected
              neighborhood. In well connected neighborhood it uses persistence scheme weighted persistence, slotted 1and
              persistence. In sparsely connected neighborhood after receiving the broadcast message, vehicles can
              immediately rebroadcast with vehicles moving in the same direction. In totally disconnected neighborhood
              vehicles are used to store the broadcast message until another vehicle enters into transmission range,
              otherwise if the time expires it will discard the packet. DVCAST protocol causes high control overhead and
              delay in end to end data transfer.

             Urban Multihop Broadcast protocol (UMB) [3]: This protocol performs with much success at higher
              packet loads and vehicle traffic densities without any prior topology information to sender node tries to select
              the furthest node in the broadcast direction for forwarding and acknowledging the packet. it is designed to
              overcome the interference, packet collision and hidden node problems during message distribution in multi
              hop broadcast.

    V Conclusion
    In this article discusses various qualitative based routing protocols of VANET and routing protocols, comparing the
    various features is absolutely essential to come up with new proposals for VANET. The performance of VANET
    routing protocols depend on various parameters like mobility model, driving environment and many more Routing is an
    important component in vehicle-to-vehicle and infrastructure-to-vehicle communication to design an efficient routing
    protocol for all VANET applications is very hard. Thus this papers focus on features and comparison of different
    categories of VANET routing protocols. Such as position based, geocast and cluster based protocols are more reliable
    for               most              of               the             applications           in             VANET.

References:
[1] Kevin,Uichin Lee, Mario Gerla[2010], “Survey of Routing         Protocols in Vehicular Ad Hoc Networks in Car2Car
communication consortium”.
[2] Yu Wang and Fan Li,[2000] “Vehicular Ad Hoc Networks” in Guide to Wireless Ad HocNetworks, Computer
communication and Networks, DOI 10.1007/978-1-84800-328-6_20.
[3] Sandhaya Kohli, Bandanjot Kaur, “A comparative study of Routing Protocols in VANET”
[4] B. Karp and H.T. Kung[2000], “GPSR: Greedy perimeter stateless routing for wireless networks”, in Proceedings of the
ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom).



    16 | P a g e
    www.iiste.org
Journal of Information Engineering and Applications                                               www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.4, 2011

[5] M. Kihl, M. Sichitiu, T. Ekeroth and M. Rozenberg[2007], ”Reliable Geographical Multicast Routing in Vehicular Adhoc
Networks” , Lecture Notes in Computer Science 4517 LNCS[C], pp. 315- 325.
[6] Raj K. Shrestha, Sangman Moh, Ilyong Chung, and Dongmin Choi[2010], ”Vertex-based multi-hop vehicle-toinfrastructure
routing for vehicular ad hoc networks”, IEEE proceedings of 43rd Hawaii International Conference on System Sciences (HICSS)
[7] Jagadeesh Kakarla, S Siva Sathya[Augest,2011],” A Survey on Routing Protocols and its Issues in VANET” International
Journal of Computer Applications (0975 – 8887) Volume 28– No.4.
[8] Hamidreza Rahbar, Kshira sagar Naik, Amiya Nayak[2001], “DTSG: Dynamic Time-Stable Geocast Routing in Vehicular Ad
Hoc Networks”, IEEE Symposium on Computers and Communi-cations, pp. 198–203,.
[9] C.Siva Rammurty and B.S.Manoj[2011] ,“Ad hoc wireless networks architectures and protocols” ISBN 978-81-317-0688-6.



AUTHOR PROFILES:
*Suresh Kumar is working as an Assistant Professor in Department of Computer Science and Engineering at G.B.
Pant Engineering College Pauri Garhwal, Uttarakhand, India. His area of interest includes Sensor network, ad hoc
network , image processing and also published various research papers in leading journal & conferences.

**K.D.Narayan is working as an Assistant Professor in Department of Computer Science and Engineering at G.B.
Pant Engineering College Pauri Garhwal, Uttarakhand, India. His area of interest includes Sensor network and ad
hoc network.

***Jogendra Kumar received his B.E. degree in Computer Science & Engineering from H.N.B Garhwal
University Shrinagar Uttarakhand (India) in 2008 and he is currently doing M.Tech (CSE) degree from UTU
University Dehradun Uttarakhand (India) in G.B. Pant Engineering College Pauri Garhwal, Uttarakhand, (India).
His research interest includes mobile ad hoc networks and wireless sensor networks systems.

Routing           Proactive         Reactive          Cluster based     Broadcast         Geocast based     Position based
Protocols         protocols         protocols         protocols         based protocols   protocols         protocols
Realistic         Yes               Yes               No                Yes               Yes               Yes
Traffic Flow
Recovery          Multi Hop         Carry &           Carry &           Carry &           Broadcast         Carry &
Strategy          Forwarding        Forward packet    Forward packet    Forward packet    nature            Forward packet
                  packet
Virtual           No                No                Yes               No                No                No
Infrastructure

Prior             Multihop          Multihop          Multihop          Multihop          Multihop          Heuristic
Forwarding

Scenario          Urban             Urban             Urban             Highway           Highway           Urban
Digital Map       No                No                Yes               No                No                No

.                         Table 2: Comparison of Various Protocols of VANET.




17 | P a g e
www.iiste.org

More Related Content

What's hot

Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...Joarder Kamal
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challengesBehroz Zarrinfar
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanetAlexander Decker
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanetAlexander Decker
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
IRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief ReviewIRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief ReviewIRJET Journal
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 

What's hot (17)

Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Q045058791
Q045058791Q045058791
Q045058791
 
Cm34531538
Cm34531538Cm34531538
Cm34531538
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
A Comprehensive Study on Multi-hop Ad hoc Networking and Applications: MANET ...
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
40120140504001
4012014050400140120140504001
40120140504001
 
Vanet routing protocols issues and challenges
Vanet routing protocols   issues and challengesVanet routing protocols   issues and challenges
Vanet routing protocols issues and challenges
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
 
14251D6514
14251D651414251D6514
14251D6514
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
IRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief ReviewIRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief Review
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 

Similar to Comparison of Routing Protocols for Vehicular Ad Hoc Networks (VANETs

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...ijwmn
 
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...IJCSIS Research Publications
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
H046405864
H046405864H046405864
H046405864IOSR-JEN
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
 
A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks IOSR Journals
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanetscsandit
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 

Similar to Comparison of Routing Protocols for Vehicular Ad Hoc Networks (VANETs (20)

Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
APPLICABILITY OF OVERLAY NON-DELAY TOLERANT POSITION-BASED PROTOCOLS IN HIGHW...
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
H046405864
H046405864H046405864
H046405864
 
VANET
VANETVANET
VANET
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
 
A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks A Survey on Vehicular Ad hoc Networks
A Survey on Vehicular Ad hoc Networks
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Performance evaluation of vanets
Performance evaluation of vanetsPerformance evaluation of vanets
Performance evaluation of vanets
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Jh2516461655
Jh2516461655Jh2516461655
Jh2516461655
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Comparison of Routing Protocols for Vehicular Ad Hoc Networks (VANETs

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.4, 2011 Qualitative Based Comparison of Routing Protocols for VANET Suresh Kumar *, K.D.Narayan , Jogendra Kumar G. B. Pant Engineering College, Pauri-Garhwal Uttarakhand , (India) Email: * suresh15nirala@yahoo.com Abstract Vehicular ad hoc network is one of the most promising applications of MANET that an inter communication system. In VANET nodes which are vehicles can move safety with high speed and generally must communicate quickly reliably. When an accident occurs in a road or highway, alarm messages must be disseminated, instead of ad hoc routed, to inform all other vehicles. Vehicular ad hoc network architecture and cellular technology to achieve intelligent communication and improve road traffic safety and efficiency .To organize their in vehicle computing system, vehicle to vehicle ad hoc networks, hybrid architecture with special properties such as high mobility, network portioning and constrained topology .there is a lot of research about VANET for driving services, traffic information services, user communication and information services. VANET can perform effective communication by utilizing routing information. Some researchers are contributed a lots in the area of VANET. In this articles mainly focusing on significant features, performance improvement in comparisons of routing protocol for vehicular ad hoc network (VANET). Keywords: VANET, Routing Protocol, PBR, CAR, CBR etc. 1 Introduction A VANET is a form of Vehicular Mobile ad-hoc Networks [1], to provide communication among nearby vehicles and between vehicles and nearby fixed equipment i.e. roadside equipment. Roads are saturated; safety distance and reasonable speeds are hardly respected. VANETs allow vehicles to avoid problems, either by taking any desired action or by alerting the driver. Besides the road safety enhancements that VANETs will bring, they also open doors too many applications to enhance the driving and traveling comfort, like Internet access from a car .VANET or Intelligent Vehicular Ad-Hoc Networking provides an intelligent way of using vehicular Networking. With the sharp increase of vehicles on roads in the recent years, driving becomes more challenging and dangerous. The main goal of VANET is providing safety and comfort for passengers helping drivers on the roads by anticipating hazardous. Each vehicle equipped with VANET device will be a node in the Ad-hoc network and can receive & relay other messages through the wireless network. Collision warning, Road signal arms and in place traffic view will give the driver essential tool to decide the best path along the way events or bad traffic areas. VANET has unique characteristics like high mobility with the constraint of road topology, initially low market penetration ratio, unbounded network size, infrastructure support that Differentiate it from MANET. From the above mentioned characteristics, it is evident that conventional MANET routing Protocols have difficulties from finding stable routing paths in VANET environments. Therefore, more and more researchers have concentrated on proposing suitable routing protocols to deal with the highly dynamic nature of VANET. The routing Protocols in VANET are categorized into various types’ likes Topology based, Position based, Geocast based, Cluster based, broadcast Based and Infrastructure based. 2 Applications of VANET [2] VANET application can be divided into following categories  VANET provides ubiquitous connectivity on the road to mobile users.  Intelligent Transport System (ITS) provides efficient vehicle to vehicle communications in VANET.  ITS have variety of applications like cooperative traffic monitoring, control of Traffic flows, blind crossing and collision prevention.  Comfort application is the application to allow the passenger to communicate with other vehicles and with internet hosts, which improves passengers comfort.  VANET provides internet connectivity to vehicular nodes while on the movement so that passenger can download music, send emails, watch online movies and can online chatting etc. 13 | P a g e www.iiste.org
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.4, 2011 3 Network Architecture and characteristics of VANET Wireless ad hoc networks do not depend on fixed infrastructure, access point or infrastructure less network for communication and dissemination of information. The architecture of VANET consists of three categories: Pure cellular/WLAN, Pure Ad hoc and hybrid. VANET may use fixed cellular gateways and WLAN/WiMax access points at traffic intersections to connect to the internet, gather traffic information or for routing purposes. This network architecture is pure cellular or WLAN. VANET can compile both cellular network and WLAN to form the network. Stationery or fixed gateways around the road sides also provides connectivity to vehicles. In such a scenario all vehicles and road sides’ devices form pure mobile ad hoc networks. Hybrid architecture consists of both infrastructure networks and ad Hoc networks together. Nodes in VANET can self organized and self manage the information in a distributed fashion without any centralized authority. Since the nodes are mobile so data transmission is less reliable and sub optimal. Some of the distinguishing features of VANET [1, 3]: Features Description Highly Dynamic Topology Vehicles are moving VANET is always changing at high speed, by formed network topology. Frequently disconnected Changing node density due to occurs when highly dynamic topology frequently network topology disconnected network. Unlimited Battery Power and Nodes of VANET are not subject to power and storage limitation in sensor Storage capacity networks. Nodes have limited amount of energy and computing power On Board Sensors networks VANET routing protocols consists of many nodes of sensors network which provide useful information for many GPS unit which provides location information of nodes. Table 1 showing various features of VANET 4 Overview of Routing Protocols IN VANET In VANET, the routing protocols are classified into various categories: Topology based, Position based, Cluster based, Geocast, Broadcast. 4.1 Topology based routing protocols Topology based routing protocols which discover the route and maintain routing information in a table before the sender starts transmitting data. They are divided into Proactive, Reactive and hybrid protocols.  Proactive protocols [9]: all the nodes of the networks in proactive protocol or table driven routing protocols periodically exchanging the knowledge of topology. The proactive protocols do not have initial route discovery delay but consumes lot of bandwidth for periodic updates of topology. E.g. fisheye state routing (FSR), Optimized Link State Routing Protocol (OLSR), and Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) etc.  Reactive protocols [9]: Reactive routing protocols or on-demand routing protocols periodically update the routing table, when some data is there to send. When use flooding process for route discovery, which causes more routing overhead and also suffer from the initial route discovery process, which make them unsuitable for safety applications in VANET. E.g. Ad hoc on demand distance vector (AODV), Dynamic Source Routing (DSR), Temporally-Ordered Routing Algorithm (TORA) etc.  Hybrid protocols [9]: Hybrid routing protocols is combination of reactive routing protocols and proactive routing protocols which reduce the control overhead of proactive routing protocols and decrease the initial Route discovery delay in reactive routing protocols. E.g. Zone Routing protocol (ZRP), Hybrid Routing Protocol (HARP) etc 4.2 Positions based routing protocol Position based routing consists of class of routing Algorithm. Which is sharing the property of geographic positioning information in order to select the next forwarding hops? The packet is send without any map knowledge to the one hop neighbor which is closest to destination. Position based routing better performance because that is no need to be created and maintained global route from source node to destination node. Position based routing is divided in two types: Position based greedy Vehicle to Vehicle protocols, Delay Tolerant Protocols etc.  Position Based Greedy vehicle to vehicle Protocols [1]: In Greedy vehicle to vehicle routing Protocols strategy and intermediate node should possessed position of itself, position of its neighbor and destination position in the route forward message to the farthest neighbor in the direction of the next destination. The main goal of these protocols is min delay routing protocols to transmit data packets to 14 | P a g e www.iiste.org
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.4, 2011 destination as soon as possible that Various types of position based greedy Vehicle to Vehicle protocols likes GSR, GPSR, CAR, ASTAR, STBR, CBF etc.  Geographic Source Routing (GSR) [4]: GSR used in mobile ad hoc network. To improve the performance because to use many application of MANET in vehicular ad hoc network VANET scenario by incorporating in to it greedy forwarding of messages toward the destination. If at any hop there are no nodes in the direction of destination then GPSR utilizes a recovery strategy known as perimeter mode. The perimeter mode has two components.  Makes local conversion of connectivity graph into planar graph by removing redundant edges that is called distributed planarization algorithm.  Online routing algorithm that operates on planer graphs. VANET perimeter mode of GPSR is used. In GPSR if any obstruction or void occurs then algorithm enter perimeter mode and planner graph routing algorithm start operations, it involves sending the message to intermediate neighbor instead of sending to farthest node, but this method introduces long delays due to greater no. of hop counts.  Due to fast movement of vehicles, routing loops are introduced which causes dissemination of messages to long path.  GPSR uses static street map and location information about every node, since GPSR does not consider vehicle density of streets so it is not an efficient method for VANET. 4.3 Geocast based protocols [5] Geocast routing is basically a location based multicast routing used to send a message to all vehicles in a pre-defined geographical region. It is main objective to deliver the packet from source node to all other nodes within a specified geographical region Zone of Relevance ZOR. In Geocast routing vehicles outside the ZOR are not alerted to avoid unnecessary hasty reaction. It normally defines a forwarding zone where it directs the flooding of packets in order to reduce message overhead and network congestion caused by simply flooding packets everywhere. In the destination zone, unicast routing can be used to forward the packet. One pitfall of Geocast is network partitioning and also unfavorable neighbors which may hinder the proper forwarding of messages. E.g. IVG, DG-CASTOR and DRG.  Robust Vehicular Routing (ROVER) [5]: The ZOR is defined as a rectangle specified by its corner coordinates. It is a reliable geographical multicast protocol where only control packets are broadcasted in the network and the data packets are unicasted. The main objective of the protocol is to send a message to all other vehicles within a specified Zone of Relevance (ZOR).  DTSG [8]: The main aim of DTSG protocol is to work even with sparse density networks. It provides vehicles speed for better performance .It work done by dynamically adjusts the protocol depending on network density. It have two phases: pre-stable and stable period. Pre-stable phase helps the message to be disseminated within the region, and stable-period intermediate node uses store and forward method for a predefined time within the region. It also tries to control balance between packet delivery ratio and network cost. 4.4 Cluster based protocols Each cluster has one cluster-head, which is responsible for intra and inter-cluster management functions. Intra-cluster nodes communicate each other using direct links, whereas inter-cluster communication is performed via cluster headers .In Cluster-based routing protocols vehicles near to each other form a cluster. In cluster based routing protocols the formation of clusters and the selection of the cluster-head is an important issue. In VANET due to high mobility dynamic cluster formation is a towering process  .Hierarchical Cluster Based (HCB) routing [3]: Hierarchical Cluster routing protocol designed for highly mobility ad hoc networks. HCB is two-layer communication architecture. In layer-1 mostly nodes have single radio interface and they communicate with each other via multi-hop path. Among these nodes some also have another interface with long radio communication range called super nodes which exist both on layer-1and 2. Super nodes are able to communicate with each other via the base station in layer-2. During the cluster formation, each node will attach to the nearest cluster header and super nodes will become cluster headers in layer-1. In HCB, intra-cluster routing is performed independently in each cluster. Cluster heads exchange membership information periodically to enable inter-cluster routing.  Cluster Based Location Routing (CBLR) [7]: It is a reactive or on demand routing protocol and cluster based routing protocol. Each cluster header maintains a routing table contains the addresses and geographic locations of the cluster members and gateways nodes, and it also maintains a Cluster Neighbor Table that contains information about all neighboring clusters. When a source wants to send data to a 15 | P a g e www.iiste.org
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.4, 2011 destination, it first checks whether the destination is in the same cluster or not. If it is in same cluster, it sends the packet to the closest neighbor to the destination. Otherwise, the source stores the data packet in its buffer, starts a timer and broadcasts Location Request (LREQ) packets. CBLR is suitable for high mobility networks because it updates the location of the source and destination every time before data transmission starts.  Cluster-Based Directional Routing Protocol (CBDRP) [2,7]: It divides the vehicles into clusters and vehicles which are moving in same direction form a cluster. The source sends the message to its cluster header and then it forwards the message to header which is in the same cluster with the destination. At last the destination header sends the message to the destination. The cluster header selection and maintenance is same like CBR but it considers velocity and direction of a vehicle. 4.5 Broadcast based protocols Broadcast is based on hierarchal structure for highway network. In broadcast the highway is divided into virtual cells which move like vehicles. The nodes in the highway are organized into two level of hierarchy: the first Level hierarchy includes all the nodes in a cell, the second level hierarchy is represented by cell reflectors, which are few nodes located closed to geographical centre of cell. Some Cell reflected behaves for certain interval of time as cluster head and handles the emergency messages coming from same members of the cell or nearby neighbor. This protocol performs similar to flooding base routing protocols for message broadcasting and routing overhead .  Distributed vehicular broadcast protocol (DVCAST) [1,7]: Each vehicle uses a flag variable to check whether the packet is redundant or not and It is uses local topology information by using the periodic hello messages for broadcasting the information. DVCAST protocol divides the vehicles into three types depending on the local connectivity as well connected, sparsely connected, totally disconnected neighborhood. In well connected neighborhood it uses persistence scheme weighted persistence, slotted 1and persistence. In sparsely connected neighborhood after receiving the broadcast message, vehicles can immediately rebroadcast with vehicles moving in the same direction. In totally disconnected neighborhood vehicles are used to store the broadcast message until another vehicle enters into transmission range, otherwise if the time expires it will discard the packet. DVCAST protocol causes high control overhead and delay in end to end data transfer.  Urban Multihop Broadcast protocol (UMB) [3]: This protocol performs with much success at higher packet loads and vehicle traffic densities without any prior topology information to sender node tries to select the furthest node in the broadcast direction for forwarding and acknowledging the packet. it is designed to overcome the interference, packet collision and hidden node problems during message distribution in multi hop broadcast. V Conclusion In this article discusses various qualitative based routing protocols of VANET and routing protocols, comparing the various features is absolutely essential to come up with new proposals for VANET. The performance of VANET routing protocols depend on various parameters like mobility model, driving environment and many more Routing is an important component in vehicle-to-vehicle and infrastructure-to-vehicle communication to design an efficient routing protocol for all VANET applications is very hard. Thus this papers focus on features and comparison of different categories of VANET routing protocols. Such as position based, geocast and cluster based protocols are more reliable for most of the applications in VANET. References: [1] Kevin,Uichin Lee, Mario Gerla[2010], “Survey of Routing Protocols in Vehicular Ad Hoc Networks in Car2Car communication consortium”. [2] Yu Wang and Fan Li,[2000] “Vehicular Ad Hoc Networks” in Guide to Wireless Ad HocNetworks, Computer communication and Networks, DOI 10.1007/978-1-84800-328-6_20. [3] Sandhaya Kohli, Bandanjot Kaur, “A comparative study of Routing Protocols in VANET” [4] B. Karp and H.T. Kung[2000], “GPSR: Greedy perimeter stateless routing for wireless networks”, in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). 16 | P a g e www.iiste.org
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.4, 2011 [5] M. Kihl, M. Sichitiu, T. Ekeroth and M. Rozenberg[2007], ”Reliable Geographical Multicast Routing in Vehicular Adhoc Networks” , Lecture Notes in Computer Science 4517 LNCS[C], pp. 315- 325. [6] Raj K. Shrestha, Sangman Moh, Ilyong Chung, and Dongmin Choi[2010], ”Vertex-based multi-hop vehicle-toinfrastructure routing for vehicular ad hoc networks”, IEEE proceedings of 43rd Hawaii International Conference on System Sciences (HICSS) [7] Jagadeesh Kakarla, S Siva Sathya[Augest,2011],” A Survey on Routing Protocols and its Issues in VANET” International Journal of Computer Applications (0975 – 8887) Volume 28– No.4. [8] Hamidreza Rahbar, Kshira sagar Naik, Amiya Nayak[2001], “DTSG: Dynamic Time-Stable Geocast Routing in Vehicular Ad Hoc Networks”, IEEE Symposium on Computers and Communi-cations, pp. 198–203,. [9] C.Siva Rammurty and B.S.Manoj[2011] ,“Ad hoc wireless networks architectures and protocols” ISBN 978-81-317-0688-6. AUTHOR PROFILES: *Suresh Kumar is working as an Assistant Professor in Department of Computer Science and Engineering at G.B. Pant Engineering College Pauri Garhwal, Uttarakhand, India. His area of interest includes Sensor network, ad hoc network , image processing and also published various research papers in leading journal & conferences. **K.D.Narayan is working as an Assistant Professor in Department of Computer Science and Engineering at G.B. Pant Engineering College Pauri Garhwal, Uttarakhand, India. His area of interest includes Sensor network and ad hoc network. ***Jogendra Kumar received his B.E. degree in Computer Science & Engineering from H.N.B Garhwal University Shrinagar Uttarakhand (India) in 2008 and he is currently doing M.Tech (CSE) degree from UTU University Dehradun Uttarakhand (India) in G.B. Pant Engineering College Pauri Garhwal, Uttarakhand, (India). His research interest includes mobile ad hoc networks and wireless sensor networks systems. Routing Proactive Reactive Cluster based Broadcast Geocast based Position based Protocols protocols protocols protocols based protocols protocols protocols Realistic Yes Yes No Yes Yes Yes Traffic Flow Recovery Multi Hop Carry & Carry & Carry & Broadcast Carry & Strategy Forwarding Forward packet Forward packet Forward packet nature Forward packet packet Virtual No No Yes No No No Infrastructure Prior Multihop Multihop Multihop Multihop Multihop Heuristic Forwarding Scenario Urban Urban Urban Highway Highway Urban Digital Map No No Yes No No No . Table 2: Comparison of Various Protocols of VANET. 17 | P a g e www.iiste.org