SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

PERFORMANCE COMPARISON OF AODV AND OLSR
USING 802.11A AND DSRC (802.11P) PROTOCOLS IN
URBAN VANETS
Ederval Pablo Ferreira da Cruz1 and Bruno dos Santos Silva2
1

2

Federal Institute of Espirito Santo (IFES) – Campus Itapina, Colatina-ES, Brazil
Federal University of State of Rio de Janeiro (UNIRIO) , Rio de Janeiro-RJ, Brazil

ABSTRACT
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.

KEYWORDS
OLSR, AODV, Vehicular Networks, VANET, Performance & 802.11p

1. INTRODUCTION
In 1999, the Federal Communication Commission (FCC) defined to allocate a frequency
spectrum for vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) wireless communication. A
public safety and private applications communication service that uses the 5.850-5.925 GHz band
(or simply 5.9 GHz band) was established by the FCC in 2003. Such service is called Dedicated
Short Range Communications (DSRC) or 802.11p
[1,2] where the vehicles and beacons on
roadsides can form a Vehicular Ad Hoc Network (VANET). Several research groups and
automotive makers consider VANET an important technology for improving passenger’s safety
avoiding more accidents and deaths, efficiency of the actual transportation system and great
opportunities in commercial applications [3,4,5].
VANET consists of vehicles with radio-enabled equipments acting as mobile nodes and/or routers
for others nodes, with no existing pre-established infrastructure where such nodes connect
themselves in a decentralized, self-organizing manner and also establish multi hop routes. In a
VANET, it is possible to exchange information among vehicles, allowing the development of new
applications, introducing new services such as on-board-entertainment during the travels.
Furthermore, this technology can improve passengers’ safety by implementing active safety
systems (e.g. emergency breaking according to the traffic received) or automatic emergency calls
when an accident occurs.
VANET has some unique characteristics that distinguish it from other kinds of mobile ad hoc
networks.
DOI : 10.5121/ijcnc.2013.5612

195
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

•
Very dynamic topology: Vehicles move in high speed and with different mobility
patterns, reflecting in constant changes on the topology of VANETs.
•
Partitioned network and reduced contact time: Due to dynamic topology, the
connectivity of the VANETs can change frequently, creating a partitioned network, interfering
the communication of the nodes, especially when the vehicles density is low.
•
High range transmission: The DSRC service allows a range transmission up to 1000
meters.
Therefore, VANETs have some characteristics that make it very challenging. One of these
challenges is routing data between sender-destination nodes in a multi hop way.
Basically, the proposed protocols to VANET are classified in two groups [6]: 1) topology-based
protocols and 2) geography-based protocols. In this paper we compare two classics mobile
networks routing protocols: Optimized Link State Routing (OLSR) and Ad Hoc On-Demand
Distance Vector (AODV) using the 802.11a and 802.11p. The main contributions of our work
when compared to the existing literature are the following: 1) We measure the performance of
802.11p and 802.11a in a realistic urban scenario. 2) We also evaluate other performance metrics
when compared with other papers.

2. RELATED WORKS
Authors in [7] compare and evaluate performance of Ad-hoc On-Demand Distance Vector
(AODV), Dynamic Source Routing (DSR) and Swarm Intelligence based protocol. A variety of
simulations for VANET is performed, characterized by networks’ mobility and size.
In [8] transmission probabilities of 802.11p are modelled evaluating the effects of these
probabilities in DSR, Fish-Eye State Routing (FSR) and OLSR. AODV and OLSR are evaluated
in urban scenario where the authors enhanced HELLO and TC interval of OLSR and observe that
overall enhanced OLSR performs better than AODV in urban environments.
In the paper [9] an evaluation of AODV performance in VANET is realized by varying the
number of nodes maintaining the maximum velocity using 802.11.
Our work evaluates OLSR and AODV using 802.11p and 802.11a protocols in realistic urban
scenario. Moreover, five metrics performances are selected for evaluating performance of routing
protocols in VANETs

3. ROUTING PROTOCOLS
The ad hoc network protocols have as main objective to reduce energy consumption and the
signaling messages. Such protocols search to find the better route between a source-destiny node
by the information existing in the links of the network In Vehicular Ad Hoc Networks (VANET),
it is a great challenge to develop a protocol that copes with its characteristics and meets several
applications requirements. With the exchange of signalling messages, it is possible to cope with
the topology changes of the network. Thus, each node in the network has, previously, a routing
table containing the next hop or hops forward to the destiny node.
Figure 1, based in [10], displays a brief classification of the routing protocols used in VANETs.
The topology-based routing is divided in proactive and reactive mode.

196
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

VANET Routing Protocols

Geography-based

Topology-based

Proactive

Reactive

OLSR
AODV TORA

Non-DTN

DTN

Hybrid

DSR

Figure 1. Brief classification of VANET routing protocol

3.1 Proactive routing (Table-driven) protocols
Proactive routing protocols or table-driven routing only create paths when it is necessary to
forward a packet and it is not necessary to know all routes to all destiny nodes in the network.
These protocols require each node to maintain one or more tables to store routing information,
and they respond to change in network topology by propagating route update throughout the
network to maintain consistent network view. We can cite as examples of proactive protocol:
OLSR

I)

OLSR Protocol

The OLSR protocol [11] is based in topology information that works in a proactive mode and it is
one of the main routing protocols for ad hoc network. Each node periodically constructs and
maintains the set of neighbors that can reach in 1-hop and 2-hops. Furthermore, it presents an
extension called MPR (Multi Point Relay) [12,13], that minimizes the number of active relays
needed to achieve 2-hops neighbors avoiding flooding, reducing the signalling messages as can
be seen in the Figure 2.

(a)

(b)

Figure 2. Types of flooding: traditional flooding (a) and flooding using MPRs (b)

197
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

3.2 Reactive (On-Demand) routing protocols
In reactive (or on demand) routing protocols, the routes are created when required. When a source
node wants to send to a destination node, it invokes the route discovery mechanism to find the
path to the destination. This process is completed when once a source is found or all possible
route permutation has been examined. Once a route has been discovered and established, it is
maintained by some form of route maintenance procedure until either the destination becomes
inaccessible along every path from the source or route is no longer desired.

I)

AODV Protocol

AODV (Ad-hoc On-demand Distance Vector) [14] is a loop-free routing protocol for ad-hoc
networks based on vector distance algorithm, as DSDV [15]. It is designed to be self-starting in
an environment of mobile nodes, withstanding a variety of network behaviours such as node
mobility, link failures and packet losses.
The AODV protocol is based in topology information that works in a reactive mode, in other
words, when a source node wants to send data to a destination node, a route discovery process is
started. In this process, the source node broadcasts a ROUTE REQUEST (RREQ) packet to all
your neighbors. Neighbors nodes which do not know an active route to destination node, forward
the packet to their neighbors until an available route is found or the maximum number of hops is
reached. When an intermediate node knows an active route to the requested destination node, it
sends back a ROUTE REPLY (RREP) packet to the source node in unicast mode, enabling to the
node creates the route among the source and destination nodes. The main problem of the AODV
protocol in VANET environments is the route instability due to high mobility of the nodes,
breaking established paths constantly. Consequently, more packets are discarded and overhead
generated due to notifications of path breaks increase significantly.

4. PERFORMANCE EVALUATION
This section presents the evaluation of the AODV and OLSR protocols under 802.11a and
802.11p in an urban realistic scenario. The simulations were realized in the NS-2 simulator
version 2.33 [16]. We consider 3 different mobility scenarios, where the number of vehicles
varies from as follows: 40 vehicles (low density), 80 vehicles (medium density) and 120 vehicles
(high density). Table 1 summarizes the configuration of the simulation.
All vehicles are assumed to have a radio range of 350 meters and they are moving in the urban
scenario at a maximum speed of 20 meters per second. Vehicles are inserted in the map at a rate
of one vehicle per second and to better characterize a realistic urban scenario, there are trafficlights in the intersections and various lanes. Vehicles are launched in the map at a rate of one new
vehicle per second using random positions. When the vehicles mobility starts, the map is totally
empty, and the path requests start at the hundredth second (this means that the routing protocols
are only started after having a reasonable amount of running vehicles).

198
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
Table 1: Mobility scenarios and parameters set considered in the simulation

Scenario

Number of
Vehicles

Maximum
Speed (m/s)

Radio range
(meters)

Scenario 1
Scenario 2
Scenario 3

40
80
120

20
20
20

350
350
350

Propagation model
Unicast traffic
Broadcast traffic

Simulation
time
(seconds)
437
424
561

Two Ray Ground
11 Mbps
2 Mbps

The scenario of simulated urban VANET was generated using TraNS tool [17] that integrates
SUMO tool [18] and it was extracted from the TIGER/Line database of the US Census Bureau
[19]. Such scenario has a dimension of 4100 m x 3100 m area as illustrated in the Figure 3.

Figure3. Map of a Manhattan region, used in the realistic simulation urban scenario

Considering that all vehicles present in the map are able to route packets according to the routing
protocol being evaluated, the generation of the packets is divided in two phases:
1st phase: a packet is randomly destined to one of the active mobile nodes. This is the
packet responsible for the path creation if the routing protocol is reactive;
2nd phase: after the path being created, the source node periodically generates packets to
the same destination marked in the first phase (the period was set to 1s). The node stops the
packet generation when the original path breaks.
The results presented in this paper are averaged of 10 simulations for each mobility scenario and
for each protocol and each communication pattern. All simulations results presented were
obtained guaranteeing a 95% confidence interval.

4.1 Performance Metrics
As showed in the Table 1, the performance of the routing protocols AODV and OLSR with
802.11p and 802.11a MAC protocols was realized by varying the network density. The metrics to
assess the performance are given as follows:
1.

Path Availability: It is an available path between source node and destination node.

199
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

2.
End-to-End Delay: To the path P = {n1, n2,…, nk} where n1 is the source node and nk is
the destination node. Assuming that the packet is sent from node n1 at the moment t’1 and it is
received by node nk at the moment t’k, the delay is marked as t’1 - t’k.
3.
Number of Created Paths: It is sum of all created paths during the simulation.
4.
Path Length: A path P = {n1, n2,…, nk} of k nodes at the instant t1, the path length is set
by the number of hops that a packet realizes between a node source n1 and a destination node nk .
The final value about this metric is given by k-1 hops.
5.
Path Duration: Considering again a path P = {n1, n2,…, nk} of k nodes at the instant t1, the
path duration is set as the length of the major interval of time [t1, t2], while P sequence is
maintained.

5. RESULTS AND ANALYSIS
To visualize the results, they are showed in the Figures as follows and such results are discussed
for each performance metric evaluated.
•
Path availability: The results showed in the Figure 4 demonstrate that AODV and OLSR
protocols have better performance when 802.11p is used in all scenarios evaluated when
compared with 802.11a. By using 802.11p, AODV and OLSR protocols have practically the same
results.

Figure 4. Path availability of the AODV and OLSR protocols using 802.11a and 802.11p

•
End-to-End Delay: In the Figure 5, as can be seen, OLSR protocol when use 802.11p
outperforms 802.11a. Considering that delay is a crucial factor to be considering in VANETs, the
results show that using 802.11p is more efficient than 802.11a. AODV has poor performance as
the density increases where the cost of repeated route discovery procedures in AODV introduces
a large control traffic overhead and OLSR using 802.11p ends up outperforming AODV in almost
150% when AODV is using 802.11p and about 300% when AODV is using 802.11a.

200
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

Figure 5. End-to-End Delay of the AODV and OLSR protocols using 802.11a and 802.11p

•
Number of Created Paths: In the Figure 6 is presented the results of the number of created
paths by the OLSR and AODV protocols using 802.11p and 802.11a. The results show that using
AODV and OLSR protocols using 802.11p, more paths are created and consequently, more cars
can communicate with each other. AODV has better results due to the fact to use flooding
technique, getting more information about the network and creating more paths. Such technique
has more bandwidth consumption and collisions, consequently, increasing delay.

Figure 6. Number of Created Paths of the AODV and OLSR protocols using 802.11 and 802.11p

•
Path Length: AODV protocol has poor results using 802.11a and 802.11p. More number
of hops leads to higher probability of broken links. Then, OLSR protocol has more stables paths,
with minor probability of broken links.

201
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

Figure 7. Path Length of the AODV and OLSR protocols using 802.11a and 802.11p

•
Path Duration: Finally, Figure 8 shows the path duration. OLSR protocol uses MPR
nodes, reducing signaling messages and getting better results when compared with AODV,
mainly in scenario with medium vehicle density.

Figure 8. Path Duration of the AODV and OLSR protocols using 802.11a and 802.11p

6. CONCLUSIONS
In this paper, we evaluate AODV and OLSR topology-based protocols under 802.11a and
802.11p in an urban scenario considering different vehicle density. VANETs have a high dynamic
topology, where AODV protocol suffers to maintain routing table constantly updated increasing
signalling control messages. For most of the metrics evaluated in this paper, OLSR has better
performance that AODV, mainly when 802.11p is used showing that OLSR can be an alternative
to use in VANETs.

202
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

As future works, the authors are also interested in evaluating routing protocols for VANET in
urban scenarios with other realistic characteristics such as accidents, overtaking, points of interest
and higher number of nodes.

ACKNOWLEDGEMENTS
The authors would like to thank professor Larissa Broetto by revision the article and giving some
suggestions.

REFERENCES
[1]
[2]
[3]

[4]

[5]
[6]

[7]
[8]

[9]
[10]

[11]
[12]

[13]

[14]
[15]

[16]
[17]
[18]

The FCC DSRC web site. http://wireless.fcc.gov/services/its/dsrc/
Bryan Parno, Adrian Perrig, “Challenges in Securing Vehicular Networks”, Poster presented at
USENIX Security Symposium,August-04.
Szczurek P, Xu B, Wolfson O, Lin J. A methodology for the development of novel, vanet safety
applications. Proceedings of the ninth ACM international workshop on Vehicular internetworking, systems, and applications, June 2012; 119-122.
Vaghela VB, Shad DJ. Vehicular parking space discovery with agent approach. Proceedings of the
International Conference and Workshop on Emerging Trends in Technology. February 2011; 613617
Huang CM, Lin SY. An early collision warning algorithm for vehicles based on v2v
communication. International Journal of Communications Systems 2012; 25(6): 779-795.
Chennikara, J., Chen, W., Altintas, O., & Cai, S. (2001). Survey of routing protocols for intervehicle communications. Trird Annual International Conference Mobile and Ubiquitous Systems:
Networking and Services, 1-5.
Manvi, SS et al., ”Performance Analysis of AODV, DSR, and Swarm Intelligence Routing
Protocols In Vehicular Ad hoc Network Environment”, ICFCC, 2009
Nadeem Javaid, Ayesha Bibi, Safdar Hussain Bouk, Akmal Javaid, and Iwao Sasase. Modeling
enhancements in DSR, FSR, OLSR under mobility and scalability constraints in VANETs. ICC,
page 6504-6508. 2012
Khan, I. and Qayyum, A., ”Performance evaluation of AODV and OLSR in highly fading
vehicular ad hoc network environments”, INMIC, 2009
"Survey of Routing Protocols in Vehicular Ad Hoc Networks," Kevin C. Lee, Uichin Lee, Mario
Gerla, Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, IGI Global, Oct,
2009.
Jacquet, P., Muhlerthaler, P., Clausen, T., et al (2001). Optimized link state routing protocol for ad
hoc networks. IEEE International Multi Topic Conference, 62-68
Saadi Boudjit. “Autoconfiguration Algorithm For a Multiple Interfaces Adhoc Network Running
OLSR Routing Protocol”. International Journal of Computer Networks and Communications
(IJCNC). Vol. 5, No. 1, January 2013, 153-170.
Emanuel Bacelli, Juan Antonio Cordero and Philippe Jacquet. “OSPF over Multi-Hop Ad Hoc
Wireless Communications”. International Journal of Computer Networks and Communications
(IJCNC). Vol. 2, No. 5, September 2010, 37-56.
Perkins, C.E., & Royer, C.M. (1999). Ad-hoc on-demand distance vector routing. Second IEEE
Workshop on Mobile Computing Systems and Applications, 90-100.
Mahdipour, E. Rahmani, A.M. Aminian, E. ,” Performance Evaluation of Destination-Sequenced
Distance-Vector (DSDV) Routing Protocol”, Proceeding March 2009 , page(s): 186 – 190, ISBN:
978-0-7695-3567-8
Information Sciences Institute (2011). NS-2 Network Simulator (version 2.33). Available at
http://nsnam.isi.edu/nsnam/index.php/Main Page
TraNS (2011), Open source tool for realistic simulations of VANET applications. Available at
http://trans.ep.ch/
Krajzewicz, D.; Hertkorn, G.; Wagner, P. et al (2002)., Sumo (simulation of urban mobility), an
open-source trace simulation. 4th Middle East Symposium on Simulation and Modelling
(MESM2002), 183-187.
203
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
[19]
U.S. Census Bureau (2011). TIGER database / Line - Second edition. Available at:
http://www.census.gov/geo/www/tiger
Authors
Ederval Pablo Ferreira da Cruz received the graduation in Data Processing from the
University Center of Espirito Santo (UNESC), Brazil, in 2001 and the M.Sc degree from the
Federal University of State of Rio de Janeiro (UNIRIO), Brazil, in 2012. He is currently
professor of the Federal Institute of Espirito Santo (IFES) - Campus Itapina. His research
interests include vehicular networks and wireless sensor networks
Bruno dos Santos Silva is an undergraduate student at Federal University of State of Rio de
Janeiro (UNIRIO). Currently, he has a scholarship from CNPq at National Institute for Pure
and Applied Mathematics (IMPA).

204

More Related Content

What's hot

Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksijujournal
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrIAEME Publication
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluationijwmn
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETPrasanta kumr Manohari
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 

What's hot (19)

Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
E010322531
E010322531E010322531
E010322531
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
O26087092
O26087092O26087092
O26087092
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 

Viewers also liked

Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over NetworkIJCNCJournal
 
Mesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesMesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsIJCNCJournal
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsIJCNCJournal
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
 
A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesIJCNCJournal
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
 

Viewers also liked (18)

Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
 
Mesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast treesMesh pull backup parent pools for video-on-demand multicast trees
Mesh pull backup parent pools for video-on-demand multicast trees
 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated services
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
 

Similar to Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) protocols in urban vanets

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...IJCNCJournal
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET ijwmn
 
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET ijwmn
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...pijans
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantificationijwmn
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
A Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksA Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksIJERA Editor
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 

Similar to Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) protocols in urban vanets (20)

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
 
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
ACR: A CLUSTER-BASED ROUTING PROTOCOL FOR VANET
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
J011137479
J011137479J011137479
J011137479
 
A Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksA Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc Networks
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) protocols in urban vanets

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 PERFORMANCE COMPARISON OF AODV AND OLSR USING 802.11A AND DSRC (802.11P) PROTOCOLS IN URBAN VANETS Ederval Pablo Ferreira da Cruz1 and Bruno dos Santos Silva2 1 2 Federal Institute of Espirito Santo (IFES) – Campus Itapina, Colatina-ES, Brazil Federal University of State of Rio de Janeiro (UNIRIO) , Rio de Janeiro-RJ, Brazil ABSTRACT A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any communication infrastructure as base stations and/or access point. Frequent topological changes due to high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient in urban VANETs. KEYWORDS OLSR, AODV, Vehicular Networks, VANET, Performance & 802.11p 1. INTRODUCTION In 1999, the Federal Communication Commission (FCC) defined to allocate a frequency spectrum for vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) wireless communication. A public safety and private applications communication service that uses the 5.850-5.925 GHz band (or simply 5.9 GHz band) was established by the FCC in 2003. Such service is called Dedicated Short Range Communications (DSRC) or 802.11p [1,2] where the vehicles and beacons on roadsides can form a Vehicular Ad Hoc Network (VANET). Several research groups and automotive makers consider VANET an important technology for improving passenger’s safety avoiding more accidents and deaths, efficiency of the actual transportation system and great opportunities in commercial applications [3,4,5]. VANET consists of vehicles with radio-enabled equipments acting as mobile nodes and/or routers for others nodes, with no existing pre-established infrastructure where such nodes connect themselves in a decentralized, self-organizing manner and also establish multi hop routes. In a VANET, it is possible to exchange information among vehicles, allowing the development of new applications, introducing new services such as on-board-entertainment during the travels. Furthermore, this technology can improve passengers’ safety by implementing active safety systems (e.g. emergency breaking according to the traffic received) or automatic emergency calls when an accident occurs. VANET has some unique characteristics that distinguish it from other kinds of mobile ad hoc networks. DOI : 10.5121/ijcnc.2013.5612 195
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 • Very dynamic topology: Vehicles move in high speed and with different mobility patterns, reflecting in constant changes on the topology of VANETs. • Partitioned network and reduced contact time: Due to dynamic topology, the connectivity of the VANETs can change frequently, creating a partitioned network, interfering the communication of the nodes, especially when the vehicles density is low. • High range transmission: The DSRC service allows a range transmission up to 1000 meters. Therefore, VANETs have some characteristics that make it very challenging. One of these challenges is routing data between sender-destination nodes in a multi hop way. Basically, the proposed protocols to VANET are classified in two groups [6]: 1) topology-based protocols and 2) geography-based protocols. In this paper we compare two classics mobile networks routing protocols: Optimized Link State Routing (OLSR) and Ad Hoc On-Demand Distance Vector (AODV) using the 802.11a and 802.11p. The main contributions of our work when compared to the existing literature are the following: 1) We measure the performance of 802.11p and 802.11a in a realistic urban scenario. 2) We also evaluate other performance metrics when compared with other papers. 2. RELATED WORKS Authors in [7] compare and evaluate performance of Ad-hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Swarm Intelligence based protocol. A variety of simulations for VANET is performed, characterized by networks’ mobility and size. In [8] transmission probabilities of 802.11p are modelled evaluating the effects of these probabilities in DSR, Fish-Eye State Routing (FSR) and OLSR. AODV and OLSR are evaluated in urban scenario where the authors enhanced HELLO and TC interval of OLSR and observe that overall enhanced OLSR performs better than AODV in urban environments. In the paper [9] an evaluation of AODV performance in VANET is realized by varying the number of nodes maintaining the maximum velocity using 802.11. Our work evaluates OLSR and AODV using 802.11p and 802.11a protocols in realistic urban scenario. Moreover, five metrics performances are selected for evaluating performance of routing protocols in VANETs 3. ROUTING PROTOCOLS The ad hoc network protocols have as main objective to reduce energy consumption and the signaling messages. Such protocols search to find the better route between a source-destiny node by the information existing in the links of the network In Vehicular Ad Hoc Networks (VANET), it is a great challenge to develop a protocol that copes with its characteristics and meets several applications requirements. With the exchange of signalling messages, it is possible to cope with the topology changes of the network. Thus, each node in the network has, previously, a routing table containing the next hop or hops forward to the destiny node. Figure 1, based in [10], displays a brief classification of the routing protocols used in VANETs. The topology-based routing is divided in proactive and reactive mode. 196
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 VANET Routing Protocols Geography-based Topology-based Proactive Reactive OLSR AODV TORA Non-DTN DTN Hybrid DSR Figure 1. Brief classification of VANET routing protocol 3.1 Proactive routing (Table-driven) protocols Proactive routing protocols or table-driven routing only create paths when it is necessary to forward a packet and it is not necessary to know all routes to all destiny nodes in the network. These protocols require each node to maintain one or more tables to store routing information, and they respond to change in network topology by propagating route update throughout the network to maintain consistent network view. We can cite as examples of proactive protocol: OLSR I) OLSR Protocol The OLSR protocol [11] is based in topology information that works in a proactive mode and it is one of the main routing protocols for ad hoc network. Each node periodically constructs and maintains the set of neighbors that can reach in 1-hop and 2-hops. Furthermore, it presents an extension called MPR (Multi Point Relay) [12,13], that minimizes the number of active relays needed to achieve 2-hops neighbors avoiding flooding, reducing the signalling messages as can be seen in the Figure 2. (a) (b) Figure 2. Types of flooding: traditional flooding (a) and flooding using MPRs (b) 197
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 3.2 Reactive (On-Demand) routing protocols In reactive (or on demand) routing protocols, the routes are created when required. When a source node wants to send to a destination node, it invokes the route discovery mechanism to find the path to the destination. This process is completed when once a source is found or all possible route permutation has been examined. Once a route has been discovered and established, it is maintained by some form of route maintenance procedure until either the destination becomes inaccessible along every path from the source or route is no longer desired. I) AODV Protocol AODV (Ad-hoc On-demand Distance Vector) [14] is a loop-free routing protocol for ad-hoc networks based on vector distance algorithm, as DSDV [15]. It is designed to be self-starting in an environment of mobile nodes, withstanding a variety of network behaviours such as node mobility, link failures and packet losses. The AODV protocol is based in topology information that works in a reactive mode, in other words, when a source node wants to send data to a destination node, a route discovery process is started. In this process, the source node broadcasts a ROUTE REQUEST (RREQ) packet to all your neighbors. Neighbors nodes which do not know an active route to destination node, forward the packet to their neighbors until an available route is found or the maximum number of hops is reached. When an intermediate node knows an active route to the requested destination node, it sends back a ROUTE REPLY (RREP) packet to the source node in unicast mode, enabling to the node creates the route among the source and destination nodes. The main problem of the AODV protocol in VANET environments is the route instability due to high mobility of the nodes, breaking established paths constantly. Consequently, more packets are discarded and overhead generated due to notifications of path breaks increase significantly. 4. PERFORMANCE EVALUATION This section presents the evaluation of the AODV and OLSR protocols under 802.11a and 802.11p in an urban realistic scenario. The simulations were realized in the NS-2 simulator version 2.33 [16]. We consider 3 different mobility scenarios, where the number of vehicles varies from as follows: 40 vehicles (low density), 80 vehicles (medium density) and 120 vehicles (high density). Table 1 summarizes the configuration of the simulation. All vehicles are assumed to have a radio range of 350 meters and they are moving in the urban scenario at a maximum speed of 20 meters per second. Vehicles are inserted in the map at a rate of one vehicle per second and to better characterize a realistic urban scenario, there are trafficlights in the intersections and various lanes. Vehicles are launched in the map at a rate of one new vehicle per second using random positions. When the vehicles mobility starts, the map is totally empty, and the path requests start at the hundredth second (this means that the routing protocols are only started after having a reasonable amount of running vehicles). 198
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Table 1: Mobility scenarios and parameters set considered in the simulation Scenario Number of Vehicles Maximum Speed (m/s) Radio range (meters) Scenario 1 Scenario 2 Scenario 3 40 80 120 20 20 20 350 350 350 Propagation model Unicast traffic Broadcast traffic Simulation time (seconds) 437 424 561 Two Ray Ground 11 Mbps 2 Mbps The scenario of simulated urban VANET was generated using TraNS tool [17] that integrates SUMO tool [18] and it was extracted from the TIGER/Line database of the US Census Bureau [19]. Such scenario has a dimension of 4100 m x 3100 m area as illustrated in the Figure 3. Figure3. Map of a Manhattan region, used in the realistic simulation urban scenario Considering that all vehicles present in the map are able to route packets according to the routing protocol being evaluated, the generation of the packets is divided in two phases: 1st phase: a packet is randomly destined to one of the active mobile nodes. This is the packet responsible for the path creation if the routing protocol is reactive; 2nd phase: after the path being created, the source node periodically generates packets to the same destination marked in the first phase (the period was set to 1s). The node stops the packet generation when the original path breaks. The results presented in this paper are averaged of 10 simulations for each mobility scenario and for each protocol and each communication pattern. All simulations results presented were obtained guaranteeing a 95% confidence interval. 4.1 Performance Metrics As showed in the Table 1, the performance of the routing protocols AODV and OLSR with 802.11p and 802.11a MAC protocols was realized by varying the network density. The metrics to assess the performance are given as follows: 1. Path Availability: It is an available path between source node and destination node. 199
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 2. End-to-End Delay: To the path P = {n1, n2,…, nk} where n1 is the source node and nk is the destination node. Assuming that the packet is sent from node n1 at the moment t’1 and it is received by node nk at the moment t’k, the delay is marked as t’1 - t’k. 3. Number of Created Paths: It is sum of all created paths during the simulation. 4. Path Length: A path P = {n1, n2,…, nk} of k nodes at the instant t1, the path length is set by the number of hops that a packet realizes between a node source n1 and a destination node nk . The final value about this metric is given by k-1 hops. 5. Path Duration: Considering again a path P = {n1, n2,…, nk} of k nodes at the instant t1, the path duration is set as the length of the major interval of time [t1, t2], while P sequence is maintained. 5. RESULTS AND ANALYSIS To visualize the results, they are showed in the Figures as follows and such results are discussed for each performance metric evaluated. • Path availability: The results showed in the Figure 4 demonstrate that AODV and OLSR protocols have better performance when 802.11p is used in all scenarios evaluated when compared with 802.11a. By using 802.11p, AODV and OLSR protocols have practically the same results. Figure 4. Path availability of the AODV and OLSR protocols using 802.11a and 802.11p • End-to-End Delay: In the Figure 5, as can be seen, OLSR protocol when use 802.11p outperforms 802.11a. Considering that delay is a crucial factor to be considering in VANETs, the results show that using 802.11p is more efficient than 802.11a. AODV has poor performance as the density increases where the cost of repeated route discovery procedures in AODV introduces a large control traffic overhead and OLSR using 802.11p ends up outperforming AODV in almost 150% when AODV is using 802.11p and about 300% when AODV is using 802.11a. 200
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Figure 5. End-to-End Delay of the AODV and OLSR protocols using 802.11a and 802.11p • Number of Created Paths: In the Figure 6 is presented the results of the number of created paths by the OLSR and AODV protocols using 802.11p and 802.11a. The results show that using AODV and OLSR protocols using 802.11p, more paths are created and consequently, more cars can communicate with each other. AODV has better results due to the fact to use flooding technique, getting more information about the network and creating more paths. Such technique has more bandwidth consumption and collisions, consequently, increasing delay. Figure 6. Number of Created Paths of the AODV and OLSR protocols using 802.11 and 802.11p • Path Length: AODV protocol has poor results using 802.11a and 802.11p. More number of hops leads to higher probability of broken links. Then, OLSR protocol has more stables paths, with minor probability of broken links. 201
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Figure 7. Path Length of the AODV and OLSR protocols using 802.11a and 802.11p • Path Duration: Finally, Figure 8 shows the path duration. OLSR protocol uses MPR nodes, reducing signaling messages and getting better results when compared with AODV, mainly in scenario with medium vehicle density. Figure 8. Path Duration of the AODV and OLSR protocols using 802.11a and 802.11p 6. CONCLUSIONS In this paper, we evaluate AODV and OLSR topology-based protocols under 802.11a and 802.11p in an urban scenario considering different vehicle density. VANETs have a high dynamic topology, where AODV protocol suffers to maintain routing table constantly updated increasing signalling control messages. For most of the metrics evaluated in this paper, OLSR has better performance that AODV, mainly when 802.11p is used showing that OLSR can be an alternative to use in VANETs. 202
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 As future works, the authors are also interested in evaluating routing protocols for VANET in urban scenarios with other realistic characteristics such as accidents, overtaking, points of interest and higher number of nodes. ACKNOWLEDGEMENTS The authors would like to thank professor Larissa Broetto by revision the article and giving some suggestions. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] The FCC DSRC web site. http://wireless.fcc.gov/services/its/dsrc/ Bryan Parno, Adrian Perrig, “Challenges in Securing Vehicular Networks”, Poster presented at USENIX Security Symposium,August-04. Szczurek P, Xu B, Wolfson O, Lin J. A methodology for the development of novel, vanet safety applications. Proceedings of the ninth ACM international workshop on Vehicular internetworking, systems, and applications, June 2012; 119-122. Vaghela VB, Shad DJ. Vehicular parking space discovery with agent approach. Proceedings of the International Conference and Workshop on Emerging Trends in Technology. February 2011; 613617 Huang CM, Lin SY. An early collision warning algorithm for vehicles based on v2v communication. International Journal of Communications Systems 2012; 25(6): 779-795. Chennikara, J., Chen, W., Altintas, O., & Cai, S. (2001). Survey of routing protocols for intervehicle communications. Trird Annual International Conference Mobile and Ubiquitous Systems: Networking and Services, 1-5. Manvi, SS et al., ”Performance Analysis of AODV, DSR, and Swarm Intelligence Routing Protocols In Vehicular Ad hoc Network Environment”, ICFCC, 2009 Nadeem Javaid, Ayesha Bibi, Safdar Hussain Bouk, Akmal Javaid, and Iwao Sasase. Modeling enhancements in DSR, FSR, OLSR under mobility and scalability constraints in VANETs. ICC, page 6504-6508. 2012 Khan, I. and Qayyum, A., ”Performance evaluation of AODV and OLSR in highly fading vehicular ad hoc network environments”, INMIC, 2009 "Survey of Routing Protocols in Vehicular Ad Hoc Networks," Kevin C. Lee, Uichin Lee, Mario Gerla, Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, IGI Global, Oct, 2009. Jacquet, P., Muhlerthaler, P., Clausen, T., et al (2001). Optimized link state routing protocol for ad hoc networks. IEEE International Multi Topic Conference, 62-68 Saadi Boudjit. “Autoconfiguration Algorithm For a Multiple Interfaces Adhoc Network Running OLSR Routing Protocol”. International Journal of Computer Networks and Communications (IJCNC). Vol. 5, No. 1, January 2013, 153-170. Emanuel Bacelli, Juan Antonio Cordero and Philippe Jacquet. “OSPF over Multi-Hop Ad Hoc Wireless Communications”. International Journal of Computer Networks and Communications (IJCNC). Vol. 2, No. 5, September 2010, 37-56. Perkins, C.E., & Royer, C.M. (1999). Ad-hoc on-demand distance vector routing. Second IEEE Workshop on Mobile Computing Systems and Applications, 90-100. Mahdipour, E. Rahmani, A.M. Aminian, E. ,” Performance Evaluation of Destination-Sequenced Distance-Vector (DSDV) Routing Protocol”, Proceeding March 2009 , page(s): 186 – 190, ISBN: 978-0-7695-3567-8 Information Sciences Institute (2011). NS-2 Network Simulator (version 2.33). Available at http://nsnam.isi.edu/nsnam/index.php/Main Page TraNS (2011), Open source tool for realistic simulations of VANET applications. Available at http://trans.ep.ch/ Krajzewicz, D.; Hertkorn, G.; Wagner, P. et al (2002)., Sumo (simulation of urban mobility), an open-source trace simulation. 4th Middle East Symposium on Simulation and Modelling (MESM2002), 183-187. 203
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 [19] U.S. Census Bureau (2011). TIGER database / Line - Second edition. Available at: http://www.census.gov/geo/www/tiger Authors Ederval Pablo Ferreira da Cruz received the graduation in Data Processing from the University Center of Espirito Santo (UNESC), Brazil, in 2001 and the M.Sc degree from the Federal University of State of Rio de Janeiro (UNIRIO), Brazil, in 2012. He is currently professor of the Federal Institute of Espirito Santo (IFES) - Campus Itapina. His research interests include vehicular networks and wireless sensor networks Bruno dos Santos Silva is an undergraduate student at Federal University of State of Rio de Janeiro (UNIRIO). Currently, he has a scholarship from CNPq at National Institute for Pure and Applied Mathematics (IMPA). 204