SlideShare a Scribd company logo
1 of 9
Download to read offline
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
192 Copyright © 2018. IJEMR. All Rights Reserved.
Volume-8, Issue-6, December 2018
International Journal of Engineering and Management Research
Page Number: 192-200
DOI: doi.org/10.31033/ijemr.8.6.19
Improving QoS of VANET using Network Coding
Dr. Bajulunisha.A1
and Guna Sundari.C2
1
Associate Professor & Head, Department of Computer Science & Engineering, Roever College of Engineering &
Technology, Perambalur, Tamil Nadu, INDIA
2
Associate Professor, Department of Computer Science & Engineering, Roever College of Engineering & Technology,
Perambalur, Tamil Nadu, INDIA
1
Corresponding Author: nbajulu.cse2011@gmail.com
ABSTRACT
Vehicular Ad hoc Networks -VANET as a sub
class of Mobile Ad hoc Networks -MANET provides a
wireless communication among vehicles and vehicle to road
side equipment. VANET allows vehicles to form a self-
organized network without the need for permanent
infrastructure. With high number of nodes and mobility,
ensuring the Quality of Service- QoS in VANET is a
challenging task. QoS is essential to improve the
communication efficiency in vehicular networks. Thus a
study of QoS in VANET is useful as a fundamental for
constructing an effective vehicular network. In this paper,
we propose Network coding Technique to improve
Bandwidth utilization on VANET. When two sources are
involved in broadcasting in the same area and at same time
, the relay will make use of Network coding to reduce the
Bandwidth consumption. While receiving the packet, a
relay has to decide whether to send the packet directly to
reduce the delay or use Network coding for effective
Bandwidth utilization. In order to make trade off, we
introduce two kind of protocols named Buffer Size Control
Scheme -BSCS and Time Control Scheme -TCS. By this
two protocols, we aim to reduce the delay that is
experienced by each packet and achieving better
bandwidth utilization.
Keywords-- VANET, Network Coding, BSCS, TCS,
QoS
I. INTRODUCTION
Network Coding allows the nodes to combine
the packets and make linear combination of the data
before forwarding it to the next node instead of simply
storing and forwarding. In Network Coding, the routers
and switches have the capability of encoding of the
incoming packets and transmitting them to the neighbor
nodes. If N packets in the source node are encoded
together, one innovative packet is formed. The receiver
needs a minimum of N such innovative coded packets to
be able to decode all the N packets sent by the source
node successfully.
NC refers to the concept of coding multiple
packets into a single coded packet to optimise
throughput. This technique enables us to transmit
multiple packets in a single transmission; hence
transmitting more data for the same number of
transmissions or requiring less transmissions to send the
same amount of data, when compared to traditional
routing mechanisms.NC increases network throughput to
the maximum throughput as specified by the min-cut
max-flow theorem[2].
The theorem states that the maximum
throughput achievable in a network is equal to the
minimum removed links that will disable any data flow
between the source and destination nodes. The theorem
is depicted in figure 1: In this scenario, source node S
wants to send packets a and b to destination nodes X and
Y . The minimum cut between source node S and
destination nodes X and Y that will disable
communication, is two. Therefore the maximum
throughput obtainable in this network is two. After a full
round of transmissions, three packets reached the
destination nodes. Two packets were sent. This translates
to a suboptimal throughput of 1.5 (3/2).
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
193 Copyright © 2018. IJEMR. All Rights Reserved.
Figure.2 Min – cut Max- flow Theorem
When NC is implemented, the throughput
increases to two, as depicted in figure 2.
In this scenario, packets a and b are coded at
node C. The coded packet is sent in a single transmission
to node D, and delivered to the destination nodes X and
Y in the next transmission. The destination nodes then
use the packets they have overheard from previous
transmissions in order to decode the coded packet. In this
scenario, four packets have reached the destination
nodes, and it translates to two (4/2), which is the
maximum obtainable throughput of the network. The
following example explains the concept in more detail.
A single coded packet is created by means of
XORing individual packets with each other. A coded
packet is decoded by being XORed with a sufficient
number of different individual packets it’s comprised of.
The set of single packets used to decode the coded
packet will determine the retrieved packet obtained from
the coded packet. Please refer to figure 3. Packet (1) and
(2) respectively represents packets a and b from the
previous example, depicted in figure 2. The coded packet
comprised of the two packets is represented by packet
(3). By XORing either of packets (1) or (2) with the
coded packet (3) will decode the coded packet and
deliver the other packet as illustrated in (4) and (5).
Figure.3 Network with Network Coding
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
194 Copyright © 2018. IJEMR. All Rights Reserved.
The pipe line encoding aims to reduce the
coding delay as well as to further improve the
throughput [3]. Normally, packets are not sent from an
application all at once, in pipeline coding, we relax the
limitation of waiting for all data packets of a generation
to be received from the Application. The coding module
is implemented at the network layer and it does
encoding, decoding, and broadcasting.
When the source receives a data packet from
the transport layer, it first stores the data in the
generation buffer. Thereafter, based on the coding
redundancy, a number of coded packets are generated
and sent out. For each generated coded packet, the
source first randomly generates the coding coefficients.
Secondly, it checks the generation buffer. For a missing
packet, which has not arrived yet, the corresponding
coefficient is set to zero. Finally, the source encodes the
data packets based on this encoding vector, and sends it
to the lower layer.
Figure.4Network Coding in detail
A destination first examines whether the
received coded packet is innovative or not. An
innovative packet will be stored in the generation buffer.
Afterward, the decoding module invokes Gaussian
Elimination routines and attempts to decode data
packets. After decoding, newly decoded data packets
will be stored into another decoding buffer and then
delivered to the upper layer. In particular, the pipeline
coding is used to protect the data from degradation
beyond packet loss.
II. BACK GROUND
To illustrate how our proposal will work in such
scenario, let us consider the following example. Assume
we have two sources, source1 which is a restaurant
advertising its services including the new offers and the
menu, while the other source, source2, is a gas station
advertising the opening hours and the prices. The two
sources source1 and source2 are located N hop’s
distance from each other on the same road, and each
source is willing to disseminate its data in a certain area
which is the shared distance between them. Thus, the
packets will need to be relayed at intermediate nodes to
cover all the area (see Fig. 5).
Figure. 5 Network Scenario
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
195 Copyright © 2018. IJEMR. All Rights Reserved.
In order to disseminate one packet from
source1,the packet will be relayed at intermediate nodes;
thus, the packet will be broadcasted from source1 and
then relayed which make two broadcasting events; the
same will happen for a packet to be disseminated by
source2. Thus, disseminating one packet from source1
and one packet from source2 will cost four broadcasting
events. Now, let us consider the same scenario using the
network coding technique; in this case, after source1 and
source2 broadcast their packets, the relay will encode the
two packets into one packet and relay it. So, the network
coding technique will cost three broadcasting events and
traditional broadcasting takes four.
Since the vehicles that are located one hop
away from source1 already have a copy of the packet
disseminated by source1, and the vehicles that are
located one hop away from source2 have a copy of the
packet that is disseminated by source2, both groups of
vehicles will be able to retrieve and decode the received
encoded packet.
When we find how much of the bandwidth can
be saved in case of the network coding, let us say we
have A packets to be disseminated from source1 and B
packets to be disseminated from source2. In the
conventional broadcasting case, the relay will need to
relay A+B packets; if we assume that each packet will
consume
1
T
of the bandwidth, a total of
A+B
T
of the
bandwidth will be consumed. Assuming the network
coding, each packet from source1 will be combined with
a packet from source2; therefore, only a number of Max
(A or B) packets will be rebroadcasted. This will
consume
Max (A or B)
T
of the bandwidth. Therefore, the
improvement in the overall throughput will be
Max (A or B)
A+B
.
However, if there is the same number of packets from
both directions, then up to 50 % of the consumed
bandwidth can be saved when we use the network
coding technique. The intermediate nodes that act as
relays could be either stationary nodes, where they could
be RSUs attached to the light poles on the road, or they
could be mobile nodes, and in this case, they might be
any vehicle in the radio range of the source.
2.1 Buffer Size Control Scheme - BSCS
This scheme aims to control the imposed delay
by controlling the size of the buffer. If the utilization of
the queue increases, the average delay per packet will
also increase. So in this scheme, the relay will decide to
queue the packet based on the number of the packets in
the queue when the packet arrived. In other words, the
probability of p queuing a packet is proportional to the
size of that queue when the packet arrived.
P =
1
size of Queue
(1)
However, doing so might cause a newly arrived
packet to be relayed while the older packets are still
waiting for coding opportunity in the queue. This will
cause the packets to be disseminated out of order and
might cause the queued packets to be disseminated too
late for the application to consider them. So, instead, the
relay will actually queue the new packet with probability
p calculated as above, while queue the packet and release
the head of the queue with probability 1 − p. Figure.6
explains the steps the relay will follow when receiving a
new packet.
Assuming the data rate for both source1 and
source2 in Fig.5 are Poisson distribution and equal to λ1
and λ2, respectively, and the queue is a M/M/1 model.
Then the arrival rate at the queue λq is
λq= λ2 1‐ P 0 + λ2 X P X P(0) (2)
Where P(0) is the probability of the queue to be
empty. However, since every packet arrived from
source1 will cause a packet from the queue to be
released, the departure rate μq of the queue is
µq = λ1 + λ2(1‐P (0)) (1‐p) (3)
The average queuing delay Dq can be expressed as follows:
Dq =
1
μq− λq
(4)
However, the average delay per packet from source2 (e.g., the slower source)
Ddir =
λq
λ2
x Dq (5)
Where λq λ2 represents the probability of a packet to be queued.
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
196 Copyright © 2018. IJEMR. All Rights Reserved.
Figure.6 BSCS Flow Chart
2.2 Time-Limited Scheme –TLS
In this method, the relay will put all the packets
that come from the slow source; however, the relay sets
a delay limit to each packet. It means that the packet will
not going to be buffered more than a certain time Tmax.
As soon as, a relay receives a packet from the slow
source, it will be queued directly, but sets a timer and
after Tmax, if the packet is still in the queue, then it
should be sent immediately without encoding. Figure 7
explains the procedure executed by the relay in TLS.
2.3 TCS Delay Analysis
Considering the same assumption of the
previous scheme, as the relay will queue all the packets
from the slow source, the arrival rate of the queue will be
λ2, while the departure rate remains only λ1. However,
the packet will not stay longer than Tmax in the queue,
by considering this, the average queue delay can be
expressed as follows:
Dq = {Tmax,
1
λ1−λ2
, λ1- λ2 <=
1
Tmax
(6)
III. PURE NETWORK CODING
SCHEME
In this case, all the packets from source2 will be
immediately buffered in the queue, while the packets
from sources will be sent directly, either encoded if the
queue is non-empty or as native packet if the queue is
empty.
If P = 1, then equation 2,3 & 4 becomes
λq = λ2
µq = λ1
Dq =
1
λ1−λ2
(7)
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
197 Copyright © 2018. IJEMR. All Rights Reserved.
Figure.7 TCS Flow chart
3.1 Stationary Relay Scenario
Our first scenario is when all the relays over the
area of interest are stationary RSUs that are installed on
the light poles. In this case, the RSUs are placed with a
radio range distance between them.
3.2 Mobile Relay Scenario
Here, we consider the vehicles which have to
cooperate with each other in order to disseminate the
data between the sources. However, the main challenge
in our protocol will be how to select the vehicle that
should act as a relay.
In order to increase the coding opportunities,
we have the same node to work as relay during all the
periods of the transmission. However, certain classes of
clustering and/or broadcasting algorithms might be
suitable to implement our protocol [4 - 6]. In those
classes, the header of the cluster will always be
responsible for all the rebroadcasting operations.
We adopt the relay selection method that is
described in [7]. In this, the road area is divided into
virtual segments or grids, with the role of the relay is
assigned to one vehicle in each segment, and when the
current relay leaves the segment, it will hand over all its
buffered data to a new relay. In other words, the same
relay will continue to relay the packets until it leaves the
segment and hand its data to the new relay.
When the width of the segment will be the width of the
two directions of the road, that is, the two directions of
the road will have one relay. Based on the vehicles
velocity and their location from the end of the segment,
the vehicle that will spend more time in the segment will
be selected as the relay for the corresponding segment.
IV. SIMULATION SETUP AND
NUMERICAL RESULTS
To simulate a scenario such as the one that is
described in Figure.5 a network simulator NS3 is
Experimented using IEEE 802.11p Table 1 shows the
simulation parameter setting for our protocol. We set the
two sources to randomly generate the packets, and we
use the Poisson distribution to calculate the interval
between the generated packets. We set λ2 to be 1
packet/sec; however, λ1 is varied throughout the
simulation. The speeds of the vehicles were set to be
between 36 and 54 km/h. Initially, 250 vehicles were
distributed into a road area of 4000 m in both road
directions.
The simulation runs for 20 s before the sources
started sending their data. Tmax is set to be 0.3 for the
TCS, while the segment size is 250 m in the case of
mobile relay scheme However, for the stationary relay
scenario, three relays were placed with a distance of 500
m between them.
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
198 Copyright © 2018. IJEMR. All Rights Reserved.
Simulation parameter value
Radio Range 600 m
MAC Protocol 802.11p(WAVE)
Area of interest 2000 m
Packet size 1000 bytes
Physical layer setting Modulation type Data Rate Channel BW
OFDM 6Mbps 10Mhz
Table.1 The Simulation Parameters
Our Objective is to to achieve better bandwidth
utilization while controlling the imposed delay. We
consider the following performance metrics to proof
performance improvements through our protocol.
4.1 The hop delay
This is the average time the packet from the
buffered traffic might spend at each hop. Figure 8 shows
the average hop delay for the packets that is sent by
source2Figure 8a represents the stationary relay
scenario. In the symmetric flows case (e.g., λ1/ λ2 = 1),
pure network coding will lead to unbounded delay while
both BSCS and TCS schemes shows considerable
amount of control on the imposed delay. On the other
hand, for both pure network coding and BSCS scheme,
as the ratio between the two traffic (e.g., λ1/ λ2)
increases, the experienced delay decreases, e.g., when
λ1/ λ2 = 1.5, the delay was 1 and 2s for BSCS and pure
NC, respectively, while when λ1/λ2 = 2.5, the delay was
0.75 s for both schemes.
That is reasonable as the fact that λ1 is assumed
to be the departure rate of the queue, and as the departure
rate of the queue increases, the average delay in the
queue decreases. It is worth to mention here that BSCS
outperforms the pure network coding mainly when the
two traffics are symmetric, or the ratio between them is
low. For the case of the mobile relay, the dynamic nature
of the relay has affected the stability of the network,
where the network behaviour was difficult to predict;
however for the BSCS and TCS schemes, the
performance was better than the pure network coding
scenario.
4.2 The Throughput Improvement
In Fig. 9 shows the improvement in the network
throughput. Although, pure network coding achieves up
to almost 50 % in the throughput improvement when (λ1
= λ2), yet it must be considered that, this performance
costs the network unbounded delay Thirty-eight percent
improvement in the bandwidth usage has been recorded
for the BSCS scheme when λ1 = λ2 when the relay is
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
199 Copyright © 2018. IJEMR. All Rights Reserved.
stationary. This is to be considered a good performance,
since the BSCS scheme decreases the imposed delay.
However, as the ratio between λ1 and λ2 increases, the
performance of both pure network coding and BSCS
become more similar.
The increment in the ratio between the λ1 and
λ2 causes a decrement in the improvement of the
throughput. In the TCS scheme, the improvement in the
throughput remains constant despite the ratio between λ1
and λ2, which refers to the fixed coding opportunity the
protocol gives to the packet despite the rate of the data.
V. CONCLUSIONS
In this paper, we consider VANET non-safety
applications, where two sources are disseminating the
data in a common area of interest. To reduce the network
congestion, we are using the same relay to rebroadcast
the packets from both resources. And for better
utilization of the bandwidth, we propose the network
coding technique to be used by the relay when
broadcasting the packets. By this method, we record up
to 38 % improvement in the throughput. In order to
control the imposed delay, two versions of our protocols
have been described. We have tested both BSCS and
TCS protocols under both stationary and mobile relay
scenarios and showed a noticeable decrease in the
imposed delay with respect to the pure network coding
scenario. We are upgrading our mobile relay selection
methodology to improve the performance of the
protocols in the fully dynamic environment.
REFERENCES
[1] Pallavi A. Targe & M. P. Satone. (2016). VANET
based real-time intelligent transportation system.
International Journal of Computer Applications, 145(4),
34-38.
[2] Mario J. Engelbrecht & Magdalena J. Grobler.
(2012). Development of an energy and geographic
aware opportunistic network coding scheme. Available
at:
http://www.satnac.org.za/proceedings/2012/papers/4.Li
mited_Range_Communications/89.pdf.
[3] Chien-Chia Chen, Soon Y. Oh, Phillip Tao, Mario
Gerla, & M. Y. Sanadidi. (2017). Pipeline network
coding for multicast streams. Available at:
http://www.icmu.org/icmu2010/Papers/5-2.pdf.
[4] S.A.M. Ahmed, S.H.S. Ariffin, & N. Fisal. (2014).
Survey on broadcasting in VANET. Research Journal of
Applied Sciences, Engineering and Technology, 7(18),
3733-3739.
[5] S.-H. Cha, Lee K.-W., & H.-S. Cho. (2012). Grid-
based predictive geographical routing for inter-vehicle
communication in urban areas. International Journal of
Distributed Sensor Networks. Available at:
https://journals.sagepub.com/doi/pdf/10.1155/2012/8194
97.
[6] Y Luo, W Zhang, & Y Hu. (2012). A new cluster
based routing protocol for VANET. Networks Security,
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
200 Copyright © 2018. IJEMR. All Rights Reserved.
Wireless Communications and Trusted Computing,
International Conference on (NSWCTC), Wuhan, Hubei,
China, 176-180.
[7] S Hamato, S Ariffin, & N Fisal. (2014). Contention
free time efficient broadcasting protocol for safety
applications in VANETs. International Review on
Computers and Software (IRECOS) 9(11), 1923–1931.
Available at:
http://dx.doi.org/10.15866/irecos.v9i11.4551
[8] Y Zeng, K Xiang, D Li, & AV Vasilakos. (2013).
Directional routing and scheduling for green vehicular
delay tolerant networks. Wireless Networks 19(2), 161-
173.
[9] J Liu, J Wan, Q Wang, P Deng, K Zhou, & Y Qiao.
(2016). A survey on position-based routing for vehicular
ad hoc networks. Springer Telecommunication Systems,
62, 15-30. DOI: 10.1007/s11235-015-9979-7, 2015.
[10] L Peng, G Song, Y Shui, & AV Vasilakos. (2012).
Code pipe: An opportunistic feeding and routing
protocol for reliable multicast with pipelined network
coding. INFOCOM, Proceedings IEEE, 100–108.
[11] G Karagiannis, O Altintas, E Ekici, G Heijenk, B
Jarupan, K Lin, & T Weil. (2011). Vehicular
networking: a survey and tutorial on requirements,
architectures, challenges, standards and solutions.
Communications Surveys & Tutorials, 13(4), 584–616.
[12] Y Zeng, K Xiang, & D Li, AV. (2013). Vasilakos,
directional routing and scheduling for green vehicular
delay tolerant networks. Wireless Networks 19(2), 161–
173.
[13] Shereen A. M. Ahmed, Sharifah H. S. Ariffin, &
Norsheila Fisal. (2015). Network coding techniques for
VANET advertising applications. EURASIP Journal on
Wireless Communications and Networking, 200. DOI
10.1186/s13638-015-0421-3.
[14] Dingde Jiang, Zhengzheng Xu, Wenpan Li, &
Zhenhua Chen. (2015). Network coding-based energy-
efficient multicast routing algorithm for multi-hop
wireless networks, The Journal of Systems and Software,
104(C), 152-165.

More Related Content

What's hot

OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
 
Delay jitter control for real time communication
Delay jitter control for real time communicationDelay jitter control for real time communication
Delay jitter control for real time communicationMasud Rana
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Enhanced Protocol for Wireless Content-Centric Network
Enhanced Protocol for Wireless Content-Centric Network Enhanced Protocol for Wireless Content-Centric Network
Enhanced Protocol for Wireless Content-Centric Network csandit
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
Digital and Analog--Bachelor of Computer Application
Digital and Analog--Bachelor of Computer ApplicationDigital and Analog--Bachelor of Computer Application
Digital and Analog--Bachelor of Computer ApplicationAjay Kumar
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.docVideoguy
 
Route Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless NetworksRoute Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless NetworksIJRES Journal
 

What's hot (16)

Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
 
I046054549
I046054549I046054549
I046054549
 
Delay jitter control for real time communication
Delay jitter control for real time communicationDelay jitter control for real time communication
Delay jitter control for real time communication
 
network security
network securitynetwork security
network security
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Enhanced Protocol for Wireless Content-Centric Network
Enhanced Protocol for Wireless Content-Centric Network Enhanced Protocol for Wireless Content-Centric Network
Enhanced Protocol for Wireless Content-Centric Network
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
Digital and Analog--Bachelor of Computer Application
Digital and Analog--Bachelor of Computer ApplicationDigital and Analog--Bachelor of Computer Application
Digital and Analog--Bachelor of Computer Application
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
sarasism2006.doc
sarasism2006.docsarasism2006.doc
sarasism2006.doc
 
Route Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless NetworksRoute Reservation In Adhoc Wireless Networks
Route Reservation In Adhoc Wireless Networks
 

Similar to Improving QoS of VANET using Network Coding

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...Nexgen Technology
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...IJRTEMJOURNAL
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 

Similar to Improving QoS of VANET using Network Coding (20)

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
E017422935
E017422935E017422935
E017422935
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Wan notes
Wan notesWan notes
Wan notes
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Telephony
TelephonyTelephony
Telephony
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
3
33
3
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 

More from Dr. Amarjeet Singh

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...Dr. Amarjeet Singh
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...Dr. Amarjeet Singh
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in IndiaDr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Dr. Amarjeet Singh
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidDr. Amarjeet Singh
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureDr. Amarjeet Singh
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Dr. Amarjeet Singh
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewDr. Amarjeet Singh
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Dr. Amarjeet Singh
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Dr. Amarjeet Singh
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryDr. Amarjeet Singh
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemDr. Amarjeet Singh
 

More from Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Improving QoS of VANET using Network Coding

  • 1. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 192 Copyright © 2018. IJEMR. All Rights Reserved. Volume-8, Issue-6, December 2018 International Journal of Engineering and Management Research Page Number: 192-200 DOI: doi.org/10.31033/ijemr.8.6.19 Improving QoS of VANET using Network Coding Dr. Bajulunisha.A1 and Guna Sundari.C2 1 Associate Professor & Head, Department of Computer Science & Engineering, Roever College of Engineering & Technology, Perambalur, Tamil Nadu, INDIA 2 Associate Professor, Department of Computer Science & Engineering, Roever College of Engineering & Technology, Perambalur, Tamil Nadu, INDIA 1 Corresponding Author: nbajulu.cse2011@gmail.com ABSTRACT Vehicular Ad hoc Networks -VANET as a sub class of Mobile Ad hoc Networks -MANET provides a wireless communication among vehicles and vehicle to road side equipment. VANET allows vehicles to form a self- organized network without the need for permanent infrastructure. With high number of nodes and mobility, ensuring the Quality of Service- QoS in VANET is a challenging task. QoS is essential to improve the communication efficiency in vehicular networks. Thus a study of QoS in VANET is useful as a fundamental for constructing an effective vehicular network. In this paper, we propose Network coding Technique to improve Bandwidth utilization on VANET. When two sources are involved in broadcasting in the same area and at same time , the relay will make use of Network coding to reduce the Bandwidth consumption. While receiving the packet, a relay has to decide whether to send the packet directly to reduce the delay or use Network coding for effective Bandwidth utilization. In order to make trade off, we introduce two kind of protocols named Buffer Size Control Scheme -BSCS and Time Control Scheme -TCS. By this two protocols, we aim to reduce the delay that is experienced by each packet and achieving better bandwidth utilization. Keywords-- VANET, Network Coding, BSCS, TCS, QoS I. INTRODUCTION Network Coding allows the nodes to combine the packets and make linear combination of the data before forwarding it to the next node instead of simply storing and forwarding. In Network Coding, the routers and switches have the capability of encoding of the incoming packets and transmitting them to the neighbor nodes. If N packets in the source node are encoded together, one innovative packet is formed. The receiver needs a minimum of N such innovative coded packets to be able to decode all the N packets sent by the source node successfully. NC refers to the concept of coding multiple packets into a single coded packet to optimise throughput. This technique enables us to transmit multiple packets in a single transmission; hence transmitting more data for the same number of transmissions or requiring less transmissions to send the same amount of data, when compared to traditional routing mechanisms.NC increases network throughput to the maximum throughput as specified by the min-cut max-flow theorem[2]. The theorem states that the maximum throughput achievable in a network is equal to the minimum removed links that will disable any data flow between the source and destination nodes. The theorem is depicted in figure 1: In this scenario, source node S wants to send packets a and b to destination nodes X and Y . The minimum cut between source node S and destination nodes X and Y that will disable communication, is two. Therefore the maximum throughput obtainable in this network is two. After a full round of transmissions, three packets reached the destination nodes. Two packets were sent. This translates to a suboptimal throughput of 1.5 (3/2).
  • 2. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 193 Copyright © 2018. IJEMR. All Rights Reserved. Figure.2 Min – cut Max- flow Theorem When NC is implemented, the throughput increases to two, as depicted in figure 2. In this scenario, packets a and b are coded at node C. The coded packet is sent in a single transmission to node D, and delivered to the destination nodes X and Y in the next transmission. The destination nodes then use the packets they have overheard from previous transmissions in order to decode the coded packet. In this scenario, four packets have reached the destination nodes, and it translates to two (4/2), which is the maximum obtainable throughput of the network. The following example explains the concept in more detail. A single coded packet is created by means of XORing individual packets with each other. A coded packet is decoded by being XORed with a sufficient number of different individual packets it’s comprised of. The set of single packets used to decode the coded packet will determine the retrieved packet obtained from the coded packet. Please refer to figure 3. Packet (1) and (2) respectively represents packets a and b from the previous example, depicted in figure 2. The coded packet comprised of the two packets is represented by packet (3). By XORing either of packets (1) or (2) with the coded packet (3) will decode the coded packet and deliver the other packet as illustrated in (4) and (5). Figure.3 Network with Network Coding
  • 3. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 194 Copyright © 2018. IJEMR. All Rights Reserved. The pipe line encoding aims to reduce the coding delay as well as to further improve the throughput [3]. Normally, packets are not sent from an application all at once, in pipeline coding, we relax the limitation of waiting for all data packets of a generation to be received from the Application. The coding module is implemented at the network layer and it does encoding, decoding, and broadcasting. When the source receives a data packet from the transport layer, it first stores the data in the generation buffer. Thereafter, based on the coding redundancy, a number of coded packets are generated and sent out. For each generated coded packet, the source first randomly generates the coding coefficients. Secondly, it checks the generation buffer. For a missing packet, which has not arrived yet, the corresponding coefficient is set to zero. Finally, the source encodes the data packets based on this encoding vector, and sends it to the lower layer. Figure.4Network Coding in detail A destination first examines whether the received coded packet is innovative or not. An innovative packet will be stored in the generation buffer. Afterward, the decoding module invokes Gaussian Elimination routines and attempts to decode data packets. After decoding, newly decoded data packets will be stored into another decoding buffer and then delivered to the upper layer. In particular, the pipeline coding is used to protect the data from degradation beyond packet loss. II. BACK GROUND To illustrate how our proposal will work in such scenario, let us consider the following example. Assume we have two sources, source1 which is a restaurant advertising its services including the new offers and the menu, while the other source, source2, is a gas station advertising the opening hours and the prices. The two sources source1 and source2 are located N hop’s distance from each other on the same road, and each source is willing to disseminate its data in a certain area which is the shared distance between them. Thus, the packets will need to be relayed at intermediate nodes to cover all the area (see Fig. 5). Figure. 5 Network Scenario
  • 4. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 195 Copyright © 2018. IJEMR. All Rights Reserved. In order to disseminate one packet from source1,the packet will be relayed at intermediate nodes; thus, the packet will be broadcasted from source1 and then relayed which make two broadcasting events; the same will happen for a packet to be disseminated by source2. Thus, disseminating one packet from source1 and one packet from source2 will cost four broadcasting events. Now, let us consider the same scenario using the network coding technique; in this case, after source1 and source2 broadcast their packets, the relay will encode the two packets into one packet and relay it. So, the network coding technique will cost three broadcasting events and traditional broadcasting takes four. Since the vehicles that are located one hop away from source1 already have a copy of the packet disseminated by source1, and the vehicles that are located one hop away from source2 have a copy of the packet that is disseminated by source2, both groups of vehicles will be able to retrieve and decode the received encoded packet. When we find how much of the bandwidth can be saved in case of the network coding, let us say we have A packets to be disseminated from source1 and B packets to be disseminated from source2. In the conventional broadcasting case, the relay will need to relay A+B packets; if we assume that each packet will consume 1 T of the bandwidth, a total of A+B T of the bandwidth will be consumed. Assuming the network coding, each packet from source1 will be combined with a packet from source2; therefore, only a number of Max (A or B) packets will be rebroadcasted. This will consume Max (A or B) T of the bandwidth. Therefore, the improvement in the overall throughput will be Max (A or B) A+B . However, if there is the same number of packets from both directions, then up to 50 % of the consumed bandwidth can be saved when we use the network coding technique. The intermediate nodes that act as relays could be either stationary nodes, where they could be RSUs attached to the light poles on the road, or they could be mobile nodes, and in this case, they might be any vehicle in the radio range of the source. 2.1 Buffer Size Control Scheme - BSCS This scheme aims to control the imposed delay by controlling the size of the buffer. If the utilization of the queue increases, the average delay per packet will also increase. So in this scheme, the relay will decide to queue the packet based on the number of the packets in the queue when the packet arrived. In other words, the probability of p queuing a packet is proportional to the size of that queue when the packet arrived. P = 1 size of Queue (1) However, doing so might cause a newly arrived packet to be relayed while the older packets are still waiting for coding opportunity in the queue. This will cause the packets to be disseminated out of order and might cause the queued packets to be disseminated too late for the application to consider them. So, instead, the relay will actually queue the new packet with probability p calculated as above, while queue the packet and release the head of the queue with probability 1 − p. Figure.6 explains the steps the relay will follow when receiving a new packet. Assuming the data rate for both source1 and source2 in Fig.5 are Poisson distribution and equal to λ1 and λ2, respectively, and the queue is a M/M/1 model. Then the arrival rate at the queue λq is λq= λ2 1‐ P 0 + λ2 X P X P(0) (2) Where P(0) is the probability of the queue to be empty. However, since every packet arrived from source1 will cause a packet from the queue to be released, the departure rate μq of the queue is µq = λ1 + λ2(1‐P (0)) (1‐p) (3) The average queuing delay Dq can be expressed as follows: Dq = 1 μq− λq (4) However, the average delay per packet from source2 (e.g., the slower source) Ddir = λq λ2 x Dq (5) Where λq λ2 represents the probability of a packet to be queued.
  • 5. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 196 Copyright © 2018. IJEMR. All Rights Reserved. Figure.6 BSCS Flow Chart 2.2 Time-Limited Scheme –TLS In this method, the relay will put all the packets that come from the slow source; however, the relay sets a delay limit to each packet. It means that the packet will not going to be buffered more than a certain time Tmax. As soon as, a relay receives a packet from the slow source, it will be queued directly, but sets a timer and after Tmax, if the packet is still in the queue, then it should be sent immediately without encoding. Figure 7 explains the procedure executed by the relay in TLS. 2.3 TCS Delay Analysis Considering the same assumption of the previous scheme, as the relay will queue all the packets from the slow source, the arrival rate of the queue will be λ2, while the departure rate remains only λ1. However, the packet will not stay longer than Tmax in the queue, by considering this, the average queue delay can be expressed as follows: Dq = {Tmax, 1 λ1−λ2 , λ1- λ2 <= 1 Tmax (6) III. PURE NETWORK CODING SCHEME In this case, all the packets from source2 will be immediately buffered in the queue, while the packets from sources will be sent directly, either encoded if the queue is non-empty or as native packet if the queue is empty. If P = 1, then equation 2,3 & 4 becomes λq = λ2 µq = λ1 Dq = 1 λ1−λ2 (7)
  • 6. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 197 Copyright © 2018. IJEMR. All Rights Reserved. Figure.7 TCS Flow chart 3.1 Stationary Relay Scenario Our first scenario is when all the relays over the area of interest are stationary RSUs that are installed on the light poles. In this case, the RSUs are placed with a radio range distance between them. 3.2 Mobile Relay Scenario Here, we consider the vehicles which have to cooperate with each other in order to disseminate the data between the sources. However, the main challenge in our protocol will be how to select the vehicle that should act as a relay. In order to increase the coding opportunities, we have the same node to work as relay during all the periods of the transmission. However, certain classes of clustering and/or broadcasting algorithms might be suitable to implement our protocol [4 - 6]. In those classes, the header of the cluster will always be responsible for all the rebroadcasting operations. We adopt the relay selection method that is described in [7]. In this, the road area is divided into virtual segments or grids, with the role of the relay is assigned to one vehicle in each segment, and when the current relay leaves the segment, it will hand over all its buffered data to a new relay. In other words, the same relay will continue to relay the packets until it leaves the segment and hand its data to the new relay. When the width of the segment will be the width of the two directions of the road, that is, the two directions of the road will have one relay. Based on the vehicles velocity and their location from the end of the segment, the vehicle that will spend more time in the segment will be selected as the relay for the corresponding segment. IV. SIMULATION SETUP AND NUMERICAL RESULTS To simulate a scenario such as the one that is described in Figure.5 a network simulator NS3 is Experimented using IEEE 802.11p Table 1 shows the simulation parameter setting for our protocol. We set the two sources to randomly generate the packets, and we use the Poisson distribution to calculate the interval between the generated packets. We set λ2 to be 1 packet/sec; however, λ1 is varied throughout the simulation. The speeds of the vehicles were set to be between 36 and 54 km/h. Initially, 250 vehicles were distributed into a road area of 4000 m in both road directions. The simulation runs for 20 s before the sources started sending their data. Tmax is set to be 0.3 for the TCS, while the segment size is 250 m in the case of mobile relay scheme However, for the stationary relay scenario, three relays were placed with a distance of 500 m between them.
  • 7. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 198 Copyright © 2018. IJEMR. All Rights Reserved. Simulation parameter value Radio Range 600 m MAC Protocol 802.11p(WAVE) Area of interest 2000 m Packet size 1000 bytes Physical layer setting Modulation type Data Rate Channel BW OFDM 6Mbps 10Mhz Table.1 The Simulation Parameters Our Objective is to to achieve better bandwidth utilization while controlling the imposed delay. We consider the following performance metrics to proof performance improvements through our protocol. 4.1 The hop delay This is the average time the packet from the buffered traffic might spend at each hop. Figure 8 shows the average hop delay for the packets that is sent by source2Figure 8a represents the stationary relay scenario. In the symmetric flows case (e.g., λ1/ λ2 = 1), pure network coding will lead to unbounded delay while both BSCS and TCS schemes shows considerable amount of control on the imposed delay. On the other hand, for both pure network coding and BSCS scheme, as the ratio between the two traffic (e.g., λ1/ λ2) increases, the experienced delay decreases, e.g., when λ1/ λ2 = 1.5, the delay was 1 and 2s for BSCS and pure NC, respectively, while when λ1/λ2 = 2.5, the delay was 0.75 s for both schemes. That is reasonable as the fact that λ1 is assumed to be the departure rate of the queue, and as the departure rate of the queue increases, the average delay in the queue decreases. It is worth to mention here that BSCS outperforms the pure network coding mainly when the two traffics are symmetric, or the ratio between them is low. For the case of the mobile relay, the dynamic nature of the relay has affected the stability of the network, where the network behaviour was difficult to predict; however for the BSCS and TCS schemes, the performance was better than the pure network coding scenario. 4.2 The Throughput Improvement In Fig. 9 shows the improvement in the network throughput. Although, pure network coding achieves up to almost 50 % in the throughput improvement when (λ1 = λ2), yet it must be considered that, this performance costs the network unbounded delay Thirty-eight percent improvement in the bandwidth usage has been recorded for the BSCS scheme when λ1 = λ2 when the relay is
  • 8. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 199 Copyright © 2018. IJEMR. All Rights Reserved. stationary. This is to be considered a good performance, since the BSCS scheme decreases the imposed delay. However, as the ratio between λ1 and λ2 increases, the performance of both pure network coding and BSCS become more similar. The increment in the ratio between the λ1 and λ2 causes a decrement in the improvement of the throughput. In the TCS scheme, the improvement in the throughput remains constant despite the ratio between λ1 and λ2, which refers to the fixed coding opportunity the protocol gives to the packet despite the rate of the data. V. CONCLUSIONS In this paper, we consider VANET non-safety applications, where two sources are disseminating the data in a common area of interest. To reduce the network congestion, we are using the same relay to rebroadcast the packets from both resources. And for better utilization of the bandwidth, we propose the network coding technique to be used by the relay when broadcasting the packets. By this method, we record up to 38 % improvement in the throughput. In order to control the imposed delay, two versions of our protocols have been described. We have tested both BSCS and TCS protocols under both stationary and mobile relay scenarios and showed a noticeable decrease in the imposed delay with respect to the pure network coding scenario. We are upgrading our mobile relay selection methodology to improve the performance of the protocols in the fully dynamic environment. REFERENCES [1] Pallavi A. Targe & M. P. Satone. (2016). VANET based real-time intelligent transportation system. International Journal of Computer Applications, 145(4), 34-38. [2] Mario J. Engelbrecht & Magdalena J. Grobler. (2012). Development of an energy and geographic aware opportunistic network coding scheme. Available at: http://www.satnac.org.za/proceedings/2012/papers/4.Li mited_Range_Communications/89.pdf. [3] Chien-Chia Chen, Soon Y. Oh, Phillip Tao, Mario Gerla, & M. Y. Sanadidi. (2017). Pipeline network coding for multicast streams. Available at: http://www.icmu.org/icmu2010/Papers/5-2.pdf. [4] S.A.M. Ahmed, S.H.S. Ariffin, & N. Fisal. (2014). Survey on broadcasting in VANET. Research Journal of Applied Sciences, Engineering and Technology, 7(18), 3733-3739. [5] S.-H. Cha, Lee K.-W., & H.-S. Cho. (2012). Grid- based predictive geographical routing for inter-vehicle communication in urban areas. International Journal of Distributed Sensor Networks. Available at: https://journals.sagepub.com/doi/pdf/10.1155/2012/8194 97. [6] Y Luo, W Zhang, & Y Hu. (2012). A new cluster based routing protocol for VANET. Networks Security,
  • 9. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 200 Copyright © 2018. IJEMR. All Rights Reserved. Wireless Communications and Trusted Computing, International Conference on (NSWCTC), Wuhan, Hubei, China, 176-180. [7] S Hamato, S Ariffin, & N Fisal. (2014). Contention free time efficient broadcasting protocol for safety applications in VANETs. International Review on Computers and Software (IRECOS) 9(11), 1923–1931. Available at: http://dx.doi.org/10.15866/irecos.v9i11.4551 [8] Y Zeng, K Xiang, D Li, & AV Vasilakos. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks 19(2), 161- 173. [9] J Liu, J Wan, Q Wang, P Deng, K Zhou, & Y Qiao. (2016). A survey on position-based routing for vehicular ad hoc networks. Springer Telecommunication Systems, 62, 15-30. DOI: 10.1007/s11235-015-9979-7, 2015. [10] L Peng, G Song, Y Shui, & AV Vasilakos. (2012). Code pipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. INFOCOM, Proceedings IEEE, 100–108. [11] G Karagiannis, O Altintas, E Ekici, G Heijenk, B Jarupan, K Lin, & T Weil. (2011). Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions. Communications Surveys & Tutorials, 13(4), 584–616. [12] Y Zeng, K Xiang, & D Li, AV. (2013). Vasilakos, directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks 19(2), 161– 173. [13] Shereen A. M. Ahmed, Sharifah H. S. Ariffin, & Norsheila Fisal. (2015). Network coding techniques for VANET advertising applications. EURASIP Journal on Wireless Communications and Networking, 200. DOI 10.1186/s13638-015-0421-3. [14] Dingde Jiang, Zhengzheng Xu, Wenpan Li, & Zhenhua Chen. (2015). Network coding-based energy- efficient multicast routing algorithm for multi-hop wireless networks, The Journal of Systems and Software, 104(C), 152-165.